IPFILTER rule error

Erik Norgaard norgaard at locolomo.org
Tue Feb 14 07:14:09 PST 2006


Maxim Vetrov wrote:
> Hi,
> kernel conf:
> -------------------------------------------------------
> ...
> options        IPFILTER
> options        IPFILTER_LOG
> #options        IPFILTER_DEFAULT_BLOCK
> #options        IPSTEALTH
> ...
> -------------------------------------------------------

The rc scripts should load these modules if they are not compiled with 
the kernel, in that case they would show up with kldstat.

Try use kldstat and sysctl -a to see what's in your kernel, grep for ipf.

> services:
> -------------------------------------------------------
> ...
> sunrpc          111/tcp    rpcbind      #SUN Remote Procedure Call
> sunrpc          111/udp    rpcbind      #SUN Remote Procedure Call
> ...
> -------------------------------------------------------
> 
> ipf.rules:
> -------------------------------------------------------
> block in log on rl0 all head 20
> block out log on rl0 all head 25
> 
> 
> pass in quick on rl0 \
>  proto tcp/udp from any to any port = sunrpc keep state group 20
> pass in quick on rl0 \
>  proto tcp/udp from any to any port = 717 keep state group 20
> pass out quick on rl0 \
>  proto udp from any to any port = 111 keep state group 20
> --------------------------------------------------------
> 
> Steps to load the rules:
>> ipf -Fa
>> ipf -f /etc/ipf.rules
> 1:ioctl (add/insert rule): No such process

1st: IIRC, the number in the error line indicates the line the error 
occurred in - not sure though. That would be your first rule. I don't 
know if you posted the whole ruleset or if you cut out what seemed 
irrelevant to keep the post short.

2nd: Reading the ipf-howto I see no examples where port names are used, 
try using the port number to eliminate that posibility.

> And there is one more problem - despite that I have packet logging
> enabled by default (-Ds) through syslogd, log is empty!
> 
> syslog.conf:
> --------------------------------------------------------
> ...
> security.*      /var/log/security
> ...
> --------------------------------------------------------
> That file exists and have root rw permissions.

If you want to log to a separate file, why not let ipmon do that directly?

    # ipmon -D /var/log/security

Secondly, the empty log may not be that surprising in the first place if 
your ruleset is not loaded correctly.

Cheers, Erik
-- 
Ph: +34.666334818                                  web: www.locolomo.org
S/MIME Certificate: www.daemonsecurity.com/ca/8D03551FFCE04F06.crt
Subject ID:  9E:AA:18:E6:94:7A:91:44:0A:E4:DD:87:73:7F:4E:82:E7:08:9C:72
Fingerprint: 5B:D5:1E:3E:47:E7:EC:1C:4C:C8:3A:19:CC:AE:14:F5:DF:18:0F:B9


More information about the freebsd-questions mailing list