I have had numerous PF issues with PF over the years, some I never got answers to and others I think are bad design rather than bugs but here is my latest problem.
I have a server making outgoing TCP connections to a mysql server on the same lan (but with internet ip, same subnet).
I see in the PF log that return ack packets for 'some' but not all connections are been blocked by the default inbound deny rule. I say 'some' as it seems to be random. There is nothing special about the ones that get blocked.
the original ruleset is more then that but I have made it more simple to try and and stop the problem, so no modulate or synproxy state now used or any rate limiting but still the problem. I put the rule in bold which I assume should be allowing all return packets through.
I have a server making outgoing TCP connections to a mysql server on the same lan (but with internet ip, same subnet).
I see in the PF log that return ack packets for 'some' but not all connections are been blocked by the default inbound deny rule. I say 'some' as it seems to be random. There is nothing special about the ones that get blocked.
match): block in on bce0: x.x.x.x.3306 > y.y.y.y.43735: . ack 4136846456 win 520 <nop,nop,timestamp 1920029056 3483089099>
Code:
ext_if="bce0"
int_if="lo0"
set optimization normal
set loginterface $ext_if
set block-policy drop
set state-policy floating
set require-order yes
set fingerprints "/etc/pf.os"
set debug misc
set skip on lo0
scrub in all fragment reassemble no-df random-id
scrub out all max-mss 1460
pass in log quick on $ext_if proto { tcp, udp, icmp } from $trusted to any
pass out quick on $ext_if proto { tcp, udp, icmp } from any to $trusted
block drop in log all
antispoof log quick for $ext_if inet
pass out on $ext_if proto { udp, gre, icmp } from any to any keep state
[B]pass out on $ext_if proto tcp from $ext_if to any flags S/SA keep state[/B]
pass in quick on $ext_if proto tcp from any to any port { 22, 21, 53, 80, 443, 110, 995, 25, 465, 143, 993 } flags S/SA keep state
the original ruleset is more then that but I have made it more simple to try and and stop the problem, so no modulate or synproxy state now used or any rate limiting but still the problem. I put the rule in bold which I assume should be allowing all return packets through.