"established" on { tcp or udp } rules
Julian Elischer
julian at elischer.org
Wed Mar 19 13:56:37 PDT 2008
Freddie Cash wrote:
> On March 19, 2008 01:43 pm Freddie Cash wrote:
>> On March 19, 2008 01:34 pm Freddie Cash wrote:
>>> Just curious if the following rule will work correctly. It is
>>> accepted by the ipfw command. In the process of working out a test
>>> for it, but thought I'd ask here as well, just to be sure.
>>>
>>> ipfw add { tcp or udp } from me to any 53 out xmit fxp0
>>> ipfw add { tcp or udp } from any 53 to me in recv fxp0
>>> established
>>>
>>> Will the UDP packets go through correctly, even though "established"
>>> has no meaning for UDP streams, and the ipfw command will barf if you
>>> use it with just "ipfw add udp" rules?
>> Hmm, from the looks of things, it doesn't work. Even though it
>> specifies both tcp and udp, the rule only matches tcp packets from an
>> established connection.
>>
>> Perhaps a warning or error should be given when you try to use TCP
>> options on rules that aren't TCP-specific?
>>
>> Or am I missing something here?
>
> Guess I should probably have included a test case. From "ipfw show"
> output:
> 00100 3 162 allow { tcp or udp } from me to any dst-port 53 out xmit fxp0
>
> 00110 0 0 allow { tcp or udp } from any 53 to me in recv fxp0
> established
>
> 00120 3 409 allow { tcp or udp } from any 53 to me in recv fxp0
>
>
> Without a "deny ip from any to any" rule instead of the last rule, UDP DNS
> requests fail.
>
"count log" is the best thing to do test cases..
More information about the freebsd-net
mailing list