Current problem reports assigned to freebsd-ipfw@FreeBSD.org

2013-11-25 Thread FreeBSD bugmaster
Note: to view an individual PR, use:
  http://www.freebsd.org/cgi/query-pr.cgi?pr=(number).

The following is a listing of current problems submitted by FreeBSD users.
These represent problem reports covering all versions including
experimental development code and obsolete releases.


S Tracker  Resp.  Description

o kern/180731  ipfw   [ipfw] problem with displaying 255.255.255.255 address
o kern/180729  ipfw   [ipfw] ipfw nat show empty output
o kern/178482  ipfw   [ipfw] logging problem from vnet jail
o kern/178480  ipfw   [ipfw] dynamically loaded ipfw with a vimage kernel do
o kern/178317  ipfw   [ipfw] ipfw options need to specifed in specific order
o kern/177948  ipfw   [ipfw] ipfw fails to parse port ranges (p1-p2) for udp
o kern/176503  ipfw   [ipfw] ipfw layer2 problem
o conf/167822  ipfw   [ipfw] [patch] start script doesn't load firewall_type
o kern/166406  ipfw   [ipfw] ipfw does not set ALTQ identifier for ipv6 traf
o kern/165939  ipfw   [ipfw] bug: incomplete firewall rules loaded if tables
o kern/165190  ipfw   [ipfw] [lo] [patch] loopback interface is not marking 
o kern/158066  ipfw   [ipfw] ipfw + netgraph + multicast = multicast packets
o kern/157689  ipfw   [ipfw] ipfw nat config does not accept nonexistent int
f kern/155927  ipfw   [ipfw] ipfw stops to check packets for compliance with
o bin/153252   ipfw   [ipfw][patch] ipfw lockdown system in subsequent call 
o kern/153161  ipfw   [ipfw] does not support specifying rules with ICMP cod
o kern/148827  ipfw   [ipfw] divert broken with in-kernel ipfw
o kern/148430  ipfw   [ipfw] IPFW schedule delete broken.
o kern/148091  ipfw   [ipfw] ipfw ipv6 handling broken.
f kern/143973  ipfw   [ipfw] [panic] ipfw forward option causes kernel reboo
o kern/143621  ipfw   [ipfw] [dummynet] [patch] dummynet and vnet use result
o kern/137346  ipfw   [ipfw] ipfw nat redirect_proto is broken
o kern/137232  ipfw   [ipfw] parser troubles
o kern/129036  ipfw   [ipfw] 'ipfw fwd' does not change outgoing interface n
o kern/127230  ipfw   [ipfw] [patch] Feature request to add UID and/or GID l
f kern/122963  ipfw   [ipfw] tcpdump does not show packets redirected by 'ip
s kern/121807  ipfw   [request] TCP and UDP port_table in ipfw
o kern/116009  ipfw   [ipfw] [patch] Ignore errors when loading ruleset from
o kern/104682  ipfw   [ipfw] [patch] Some minor language consistency fixes a
o kern/103454  ipfw   [ipfw] [patch] [request] add a facility to modify DF b
o kern/103328  ipfw   [ipfw] [request] sugestions about ipfw table
o kern/97951   ipfw   [ipfw] [patch] ipfw does not tie interface details to 
o kern/95084   ipfw   [ipfw] [regression] [patch] IPFW2 ignores "recv/xmit/v
o kern/86957   ipfw   [ipfw] [patch] ipfw mac logging
o bin/83046ipfw   [ipfw] ipfw2 error: "setup" is allowed for icmp, but s
o kern/82724   ipfw   [ipfw] [patch] [request] Add setnexthop and defaultrou
o bin/78785ipfw   [patch] ipfw(8) verbosity locks machine if /etc/rc.fir
o kern/60719   ipfw   [ipfw] Headerless fragments generate cryptic error mes
s kern/55984   ipfw   [ipfw] [patch] time based firewalling support for ipfw
o kern/48172   ipfw   [ipfw] [patch] ipfw does not log size and flags
o kern/46159   ipfw   [ipfw] [patch] [request] ipfw dynamic rules lifetime f
a kern/26534   ipfw   [ipfw] Add an option to ipfw to log gid/uid of who cau

42 problems total.

___
freebsd-ipfw@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ipfw
To unsubscribe, send any mail to "freebsd-ipfw-unsubscr...@freebsd.org"


Re: ipfw table add problem

2013-11-25 Thread Ian Lepore
On Mon, 2013-11-25 at 15:30 +1100, Ian Smith wrote:
> On Sun, 24 Nov 2013 23:56:14 +0400, Alexander V. Chernikov wrote:
>  > On 24.11.2013 19:43, Özkan KIRIK wrote:
>  > > Hi,
>  > > 
>  > > I tested patch. This patch solves, ipfw table 1 add 4899
>  > Ok. So I'll commit this fix soon.
>  > > 
>  > > But, ipfw table 1 add 10.2.3.01 works incorrectly.
>  > > output is below.
>  > > # ./ipfw table 1 flush
>  > > # ./ipfw table 1 add 10.2.3.01
>  > inet_pton() does not recognize this as valid IPv4 address, so it is
>  > treated as usigned unteger key. It looks like this behavior is mentioned
>  > in STANDARDS section.
>  > > # ./ipfw table 1 list
>  > > 0.0.0.10/32 0
> 
> I'm wondering if "so don't do that" is really sufficient to deal with 
> this?  If it's not recognised as a valid address, shouldn't it fail to 
> add anything, with a complaint?  I don't see how a string containing 
> dots can be seen as a valid unsigned integer?

It's still not clear to me that inet_pton() is doing the right thing.
Per the rfc cited earlier in the thread, it's not supposed to interpret
the digits as octal or hex -- they are specifically declared to be
decimal numbers.  There's nothing invalid about "01" as a decimal
number.  The fact that many of us have a C-programming background and
tend to think of leading-zero as implying octal doesn't change that.

-- Ian




___
freebsd-ipfw@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ipfw
To unsubscribe, send any mail to "freebsd-ipfw-unsubscr...@freebsd.org"


Re: ipfw table add problem

2013-11-25 Thread Mark Andrews

In message <1385391778.1220.4.ca...@revolution.hippie.lan>, Ian Lepore writes:
> On Mon, 2013-11-25 at 15:30 +1100, Ian Smith wrote:
> > On Sun, 24 Nov 2013 23:56:14 +0400, Alexander V. Chernikov wrote:
> >  > On 24.11.2013 19:43, =D6zkan KIRIK wrote:
> >  > > Hi,
> >  > > =
> 
> >  > > I tested patch. This patch solves, ipfw table 1 add 4899
> >  > Ok. So I'll commit this fix soon.
> >  > > =
> 
> >  > > But, ipfw table 1 add 10.2.3.01 works incorrectly.
> >  > > output is below.
> >  > > # ./ipfw table 1 flush
> >  > > # ./ipfw table 1 add 10.2.3.01
> >  > inet_pton() does not recognize this as valid IPv4 address, so it is
> >  > treated as usigned unteger key. It looks like this behavior is mention=
> ed
> >  > in STANDARDS section.
> >  > > # ./ipfw table 1 list
> >  > > 0.0.0.10/32 0
> > =
> 
> > I'm wondering if "so don't do that" is really sufficient to deal with =
> 
> > this?  If it's not recognised as a valid address, shouldn't it fail to =
> 
> > add anything, with a complaint?  I don't see how a string containing =
> 
> > dots can be seen as a valid unsigned integer?
> 
> It's still not clear to me that inet_pton() is doing the right thing.
> Per the rfc cited earlier in the thread, it's not supposed to interpret
> the digits as octal or hex -- they are specifically declared to be
> decimal numbers.  There's nothing invalid about "01" as a decimal
> number.  The fact that many of us have a C-programming background and
> tend to think of leading-zero as implying octal doesn't change that.

But it does result in unexpected results when there is code that
does treat 070 as 56 not 70.  Rejecting ambigious input is a good
thing.  Part of what inet_pton() was trying to do was to get rid
of the ambiguity in address inputs by tightening up the specification.

10.2.3.70 is not ambigious
10.2.3.070 is ambigious

Mark

> -- Ian
> 
> 
> 
> 
> ___
> freebsd-sta...@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-stable
> To unsubscribe, send any mail to "freebsd-stable-unsubscr...@freebsd.org"
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org
___
freebsd-ipfw@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ipfw
To unsubscribe, send any mail to "freebsd-ipfw-unsubscr...@freebsd.org"