summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorScott Ullrich <sullrich@pfsense.org>2006-10-17 21:28:07 +0000
committerScott Ullrich <sullrich@pfsense.org>2006-10-17 21:28:07 +0000
commit3696f576cb77dc1c038b2a36e2a3868b3a1f4336 (patch)
treedc83dea149da6f91f90ceda684cb40ebec222628
parent33082c49acbb47881d8a2065028c979fe8a96901 (diff)
downloadpfsense-3696f576cb77dc1c038b2a36e2a3868b3a1f4336.zip
pfsense-3696f576cb77dc1c038b2a36e2a3868b3a1f4336.tar.gz
Woops, we need the ftp anchor *BEFORE* the user rules, and the inital PASS rules *AFTER*.
This controls the initial port 21 connetion and once that is allowed through the ftp rules installed by pftpx should bypass USER_RULES.
-rw-r--r--etc/inc/filter.inc7
1 files changed, 4 insertions, 3 deletions
diff --git a/etc/inc/filter.inc b/etc/inc/filter.inc
index fdad4ea..ff2665c 100644
--- a/etc/inc/filter.inc
+++ b/etc/inc/filter.inc
@@ -2232,6 +2232,9 @@ EOD;
$ipfrules .= "\n# SSH lockout\n";
$ipfrules .= "block in log proto tcp from <sshlockout> to any port 22 label \"sshlockout\"\n\n";
+ $ipfrules .= "anchor \"ftpproxy\"\n";
+ $ipfrules .= "anchor \"pftpx/*\"\n";
+
if (isset($config['filter']['rule'])) {
/* Pre-cache all our rules so we only have to generate them once */
$rule_arr = array();
@@ -2417,8 +2420,6 @@ EOD;
}
$ipfrules .= <<<EOD
-anchor "ftpproxy"
-anchor "pftpx/*"
pass in quick on $lanif inet proto tcp from any to \$loopback port 8021 keep state label "FTP PROXY: Allow traffic to localhost"
pass in quick on $lanif inet proto tcp from any to \$loopback port 21 keep state label "FTP PROXY: Allow traffic to localhost"
pass in quick on $wanif inet proto tcp from port 20 to ($wanif) port > 49000 user proxy flags S/SA keep state label "FTP PROXY: PASV mode data connection"
@@ -2603,7 +2604,7 @@ function create_firewall_outgoing_rules_to_itself() {
$rule .="pass out quick on tap{$x} all keep state label \"let out anything from firewall host itself openvpn\"\n";
$rule .="pass in quick on tap{$x} all keep state label \"let out anything from firewall host itself openvpn\"\n";
}
- }
+ }
return $rule;
}
OpenPOWER on IntegriCloud