+ kp@
 
A very interesting question.
 
I think that's because, ng_ether(4) intercepts L2 traffic before it hits the firewall.
 
pf(4) can intercept L2 traffic, but I'm not sure that it can then filter it by L3/L4.

https://reviews.freebsd.org/D31737
 
Maybe kp@ will clarify this issue?
 
31.10.2024, 18:32, "Palle Girgensohn" <gir...@freebsd.org>:
 
 

 16 okt. 2024 kl. 18:17 skrev Patrick M. Hausen <hau...@punkt.de>:
 
 Hi!
 
 Am 16.10.2024 um 16:19 schrieb Palle Girgensohn <gir...@freebsd.org>:
 [...]
 but nothing happens, everything is passed directly into the jail:
 
 nc -l 4444 (inside the jail)
 
 and I can just telnet 1.2.3.4 4444 
 Try:
 
 sysctl net.link.bridge.pfil_member=0
 sysctl net.link.bridge.pfil_bridge=1
 
 Although I do not know if this ablies to netgraph or to if_bridge(4) only.
 
 But obviously your rules are not applied to the bridge interface. The default
 of the tunables above is the other way round - don't filter on bridge interfaces.
 
 HTH,
 Patrick

Hallo Patrick,

Thanks for the reply. It seems that these MIBs are related to if_bridge, not ng_bridge? I didn't have them at first, men after kldload if_bridge they appeared. They make no difference, though, so perhaps they do not relate to netgraph bridges?

Any idea what tuneables would do the job?

Thanks,

Palle

Reply via email to