On Fri, 21 Aug 2020 08:56:12 +0200 Kristof Provost k...@freebsd.org said

On 21 Aug 2020, at 8:53, Chris wrote:
> On Fri, 21 Aug 2020 08:33:16 +0200 Kristof Provost k...@freebsd.org said
>
>> Hi Chris,
> Hello, Kristof. Thanks for the reply.
> Nice name BTW. ;-)
>>
>> On 21 Aug 2020, at 2:40, Chris wrote:
>> > We've been developing an appliance/server based on FreeBSD &&
>> > pf(4). We started some time ago, and have been using a very
>> > early version of 12. We're now collecting some 20,000,000
>> > IP's /mos. So we're satisfied we're close to releasing. As
>> > such, we needed to bring the release up to a supported
>> > (freebsd) version (12-STABLE). We would have done so sooner.
>> > But we need a stable (unchanging) testbed to evaluate what
>> > we're working on.
>> > We built and deployed a copy of 12-STABLE @r363918 that
>> > contained our work with pf(4). Booting into it failed
>> > unexpectedly with: cannot define table nets: too many
>> > elements. Consider increasing net.pf.request_maxcount.
>> > pfctl: Syntax error in config file: pf rules not loaded
>> > OK this didn't happen on our testbed prior to the upgrade
>> > with a combined count of ~97,000,900 IPs. In fact the OID
>> > mentioned didn't exist.
>> > For reference; our testbed provides DNS, www, mail for
>> > ~60 domains/hosts, as well as our pf(4) testing. We can
>> > happily load our tables, and run these services w/8Gb
>> > RAM.
>> > This OID is more a problem than a savior. Why not simply
>> > return ENOMEM?
>> >
>> To quote the commit message:
>>
>> pf ioctls frequently take a variable number of elements as >> argument. This can >> potentially allow users to request very large allocations. These >> will fail, >> but even a failing M_NOWAIT might tie up resources and result in >> concurrent >> M_WAITOK allocations entering vm_wait and inducing reclamation of >> caches.
>>
>> Limit these ioctls to what should be a reasonable value, but >> allow users to
>>     tune it should they need to.
>>
>> Now that pf can be used in vnet jails there’s a possibility of an >> attacker using pf to deny service to other jails (or the host) by >> exhausting memory. Imposing limits on pf request sizes mitigates >> this.
> Hadn't considered vnet. Thanks for mentioning it.
> But why must it be a read-only OID?
>
It doesn’t have to be, and in CURRENT it’s not: https://svnweb.freebsd.org/base?view=revision&revision=355744
That hasn’t been MFC’d for the excellent reason that I forgot.
Good news!

I’ll try to do that today, after I fix my dev-VM.
Hope it turns out to be an easy fix for you.

Thanks for all your time!

Best regards,
Kristof

--Chris


_______________________________________________
freebsd-stable@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "freebsd-stable-unsubscr...@freebsd.org"

Reply via email to