diff options
author | Scott Ullrich <sullrich@pfsense.org> | 2006-10-17 21:28:07 +0000 |
---|---|---|
committer | Scott Ullrich <sullrich@pfsense.org> | 2006-10-17 21:28:07 +0000 |
commit | 3696f576cb77dc1c038b2a36e2a3868b3a1f4336 (patch) | |
tree | dc83dea149da6f91f90ceda684cb40ebec222628 | |
parent | 33082c49acbb47881d8a2065028c979fe8a96901 (diff) | |
download | pfsense-3696f576cb77dc1c038b2a36e2a3868b3a1f4336.zip pfsense-3696f576cb77dc1c038b2a36e2a3868b3a1f4336.tar.gz |
Woops, we need the ftp anchor *BEFORE* the user rules, and the inital PASS rules *AFTER*.
This controls the initial port 21 connetion and once that is allowed through the ftp rules installed by pftpx should bypass USER_RULES.
-rw-r--r-- | etc/inc/filter.inc | 7 |
1 files changed, 4 insertions, 3 deletions
diff --git a/etc/inc/filter.inc b/etc/inc/filter.inc index fdad4ea..ff2665c 100644 --- a/etc/inc/filter.inc +++ b/etc/inc/filter.inc @@ -2232,6 +2232,9 @@ EOD; $ipfrules .= "\n# SSH lockout\n"; $ipfrules .= "block in log proto tcp from <sshlockout> to any port 22 label \"sshlockout\"\n\n"; + $ipfrules .= "anchor \"ftpproxy\"\n"; + $ipfrules .= "anchor \"pftpx/*\"\n"; + if (isset($config['filter']['rule'])) { /* Pre-cache all our rules so we only have to generate them once */ $rule_arr = array(); @@ -2417,8 +2420,6 @@ EOD; } $ipfrules .= <<<EOD -anchor "ftpproxy" -anchor "pftpx/*" pass in quick on $lanif inet proto tcp from any to \$loopback port 8021 keep state label "FTP PROXY: Allow traffic to localhost" pass in quick on $lanif inet proto tcp from any to \$loopback port 21 keep state label "FTP PROXY: Allow traffic to localhost" pass in quick on $wanif inet proto tcp from port 20 to ($wanif) port > 49000 user proxy flags S/SA keep state label "FTP PROXY: PASV mode data connection" @@ -2603,7 +2604,7 @@ function create_firewall_outgoing_rules_to_itself() { $rule .="pass out quick on tap{$x} all keep state label \"let out anything from firewall host itself openvpn\"\n"; $rule .="pass in quick on tap{$x} all keep state label \"let out anything from firewall host itself openvpn\"\n"; } - } + } return $rule; } |