<?php function tftpproxy_enabled(){ return true;} function tftpproxy_firewall($fw){ if (!tftpproxy_enabled()) { return; } $fw->registerAnchor('tftp-proxy/*', 'nat'); $fw->registerAnchor('tftp-proxy/*', 'rdr'); $fw->registerAnchor('tftp-proxy/*', 'fw');}
root@OPNsense01:~ # pfctl -sr | grep anchor anchor "tftp-proxy/*" all root@OPNsense01:~ # pfctl -sn | grep anchor nat-anchor "tftp-proxy/*" all rdr-anchor "tftp-proxy/*" all
acmsoda dgram udp wait root /usr/libexec/tftp-proxy tftp-proxy -v
/etc/rc.d/inetd onestart
root@OPNsense01:~ # sockstat -4 USER COMMAND PID FD PROTO LOCAL ADDRESS FOREIGN ADDRESS root inetd 90139 5 udp4 *:6969 *:*
08:42:16.952494 IP opnsense.57115 > tftp-server.tftp: 30 RRQ "pub.key" octet blksize 141608:42:16.953305 IP tftp-server.53052 > opnsense.57115: UDP, length 1508:42:16.955524 IP opnsense > tftp-server: ICMP opnsense udp port 57115 unreachable, length 36
Apr 23 08:42:16 fw01 tftp-proxy[9483]: tftpclient:5542 -> 127.0.0.1:6969/proxyIP:57115 -> TFTP-Server:69 "RRQ pub.key"Apr 23 08:42:17 fw01 kernel: pfr_update_stats: assertion failed.
Good news: Ich habe es hinbekommen:....3.: Prüfen ob die "anchors" nun der Firewall bekannt sindCode: [Select] root@OPNsense01:~ # pfctl -sr | grep anchor anchor "tftp-proxy/*" all root@OPNsense01:~ # pfctl -sn | grep anchor nat-anchor "tftp-proxy/*" all rdr-anchor "tftp-proxy/*" all...BlaCKJaCK