Re: Source IP NAT

2018-08-01 Thread Julian Elischer
On 31/7/18 8:01 am, puneet_kumar kumar via freebsd-ipfw wrote: Hi, I am trying to change the IP of a TCP packet coming from client and send it to a server.  Client ->freebsd box --> Server. Let's say packet coming out from client has source IP: 1.1.1.1 and dst IP: 1.1.1.10, I am changing th

Re: In-kernel NAT [ipfw] dropping large UDP return packets

2018-06-17 Thread Julian Elischer
On 14/6/18 7:44 am, Jeff Kletsky wrote: On 6/13/18 1:28 PM, Andrey V. Elsukov wrote: On 13.06.2018 23:04, Jeff Kletsky wrote: The kernel version of libalias uses m_megapullup() function to make single contiguous buffer. m_megapullup() uses m_get2() function to allocate mbuf of appropriate siz

Re: In-kernel NAT [ipfw] dropping large UDP return packets

2018-06-17 Thread Julian Elischer
On 14/6/18 3:01 am, Andrey V. Elsukov wrote: On 13.06.2018 20:16, Jeff Kletsky wrote: When a T-Mobile "femto-cell" is trying to establish its IPv4, IPSEC tunnel to the T-Mobile provisioning servers, the reassembled, 4640-byte return packet is silently dropped by the in-kernel NAT, even though it

Re: In-kernel NAT [ipfw] dropping large UDP return packets

2018-06-17 Thread Julian Elischer
On 14/6/18 1:41 am, Michael Sierchio wrote: I see you have a case of Netgraph. Perhaps Julian will chime in. well I'm reading but not got any specific ideas at the moment.. Netgraph itself has no requirements on packet size or even contents. a node may however have some. On Wed, J

Re: Unexpected behavior ipfw check-state with count tag or call

2018-05-27 Thread Julian Elischer
On 27/5/18 11:32 pm, Julian Elischer wrote: On 27/5/18 9:03 am, Jeff wrote: TL;DR If an ipfw rule's action is "count [tag]" or "call" and initiates a keep-state, when the check-state is matched, the execution not only performs the action of the original rule, but a

Re: Unexpected behavior ipfw check-state with count tag or call

2018-05-27 Thread Julian Elischer
On 27/5/18 9:03 am, Jeff wrote: TL;DR If an ipfw rule's action is "count [tag]" or "call" and initiates a keep-state, when the check-state is matched, the execution not only performs the action of the original rule, but also the rule number. This results in the "continuation" being not where the

Re: Missing sysctl net.inet.ip.fw.dyn_keep_states on FreeBSD 11.2

2018-05-21 Thread Julian Elischer
On 21/5/18 2:45 am, Andrey V. Elsukov wrote: On 20.05.2018 11:00, 藍挺瑋 wrote: Hello, I upgraded my desktop system from FreeBSD 11.2-BETA1 last week, and I found the sysctl 'net.inet.ip.fw.dyn_keep_states' got removed. I upgraded it again to FreeBSD 11.2-BETA2 today, and I still could not find it

Re: removing some error states

2018-05-05 Thread Julian Elischer
fw.so, but I want to be able to use it with shell scripts. On 4/5/18 6:23 am, Alexander V. Chernikov wrote: 02.05.2018, 06:32, "Julian Elischer" : On 2/5/18 1:05 am, Julian Elischer wrote:  On 1/5/18 11:03 pm, Rodney W. Grimes wrote:  Many years ago I added code to ipfw so tha

Re: removing some error states

2018-05-01 Thread Julian Elischer
On 2/5/18 1:05 am, Julian Elischer wrote: On 1/5/18 11:03 pm, Rodney W. Grimes wrote: Many years ago I added code to ipfw so that if -q was set it would not complain about things that were unimportant, nor would it return an error code. Such things include removing table entries that are

Re: removing some error states

2018-05-01 Thread Julian Elischer
On 1/5/18 11:03 pm, Rodney W. Grimes wrote: Many years ago I added code to ipfw so that if -q was set it would not complain about things that were unimportant, nor would it return an error code. Such things include removing table entries that are already gone and similar sorts of 'safe' operation

removing some error states

2018-05-01 Thread Julian Elischer
Many years ago I added code to ipfw so that if -q was set it would not complain about things that were unimportant, nor would it return an error code. Such things include removing table entries that are already gone and similar sorts of 'safe' operations. The idea is that you can write 'naive' s

Re: IPFW NG

2018-02-21 Thread Julian Elischer
On 20/2/18 8:19 am, Le Baron d’Merde wrote: Hi. This is most curiosity, but I was reading this initiative to modernise/improve IPFW, and would like to know if that was abandoned or still going on? The WIKI entry date is quite old, date form 2012. https://wiki.freebsd.org/IpfwNg Project was n

Re: IPFW and FTP client behind NAT

2018-02-14 Thread Julian Elischer
On 14/2/18 2:35 pm, wishmaster wrote: Hi, colleagues. I have the main server/router and Samba server behind this one. This Samba server at every night sends some data via FTP to another server on the Internet. The first remote server is under my power and use about the same configuration as ma

Re: Question that has dogged me for a while.

2017-05-05 Thread Julian Elischer
On 6/5/17 8:14 am, Karl Denninger wrote: On 5/5/2017 19:08, Dr. Rolf Jansen wrote: Am 05.05.2017 um 20:53 schrieb Karl Denninger : On 5/5/2017 14:33, Julian Elischer wrote: On 5/5/17 1:48 am, Dr. Rolf Jansen wrote: Resolving this with ipfw/NAT may easily become quite complicated, if not

Re: Question that has dogged me for a while.

2017-05-05 Thread Julian Elischer
On 6/5/17 7:53 am, Karl Denninger wrote: On 5/5/2017 14:33, Julian Elischer wrote: On 5/5/17 1:48 am, Dr. Rolf Jansen wrote: Resolving this with ipfw/NAT may easily become quite complicated, if not impossible if you want to run a stateful nat'ting firewall, which is usually the better c

Re: Question that has dogged me for a while.

2017-05-05 Thread Julian Elischer
On 5/5/17 1:48 am, Dr. Rolf Jansen wrote: Resolving this with ipfw/NAT may easily become quite complicated, if not impossible if you want to run a stateful nat'ting firewall, which is usually the better choice. IMHO a DNS based solution is much more effective. On my gateway I have running the

Re: Question that has dogged me for a while.

2017-05-05 Thread Julian Elischer
On 5/5/17 2:06 am, Karl Denninger wrote: On 5/4/2017 12:12, Rodney W. Grimes wrote: Consider the following network configuration. Internet --- Gateway/Firewall -- Inside network (including a web host) 70.16.10.1/28 192.168.0.0/24 The address of the outside is FICT

Re: dummynet loses ports mask bits

2017-02-28 Thread Julian Elischer
On 1/3/17 1:54 am, Julian Elischer wrote: On 1/3/17 1:46 am, Luigi Rizzo wrote: On Tue, Feb 28, 2017 at 9:27 AM, Julian Elischer wrote: In the following example it appears that the mask bits for the port number are lost. before I raise a bug.. is there anyone who can see that I am doing

Re: dummynet loses ports mask bits

2017-02-28 Thread Julian Elischer
On 1/3/17 1:46 am, Luigi Rizzo wrote: On Tue, Feb 28, 2017 at 9:27 AM, Julian Elischer wrote: In the following example it appears that the mask bits for the port number are lost. before I raise a bug.. is there anyone who can see that I am doing anything wrong? I'm not sure what the q1

Re: dummynet loses ports mask bits

2017-02-28 Thread Julian Elischer
On 1/3/17 1:27 am, Julian Elischer wrote: In the following example it appears that the mask bits for the port number are lost. before I raise a bug.. is there anyone who can see that I am doing anything wrong? just realised I'm using wrong syntax need "mask dst-port" foo

dummynet loses ports mask bits

2017-02-28 Thread Julian Elischer
In the following example it appears that the mask bits for the port number are lost. before I raise a bug.. is there anyone who can see that I am doing anything wrong? I'm not sure what the q131053 stuff is about either, but.. -- FreeBSD fb10-cc03.kumo.c

Re: How to use IPFW to filter routing

2017-02-09 Thread Julian Elischer
On 3/2/17 2:58 pm, Ian Smith wrote: On Sun, 29 Jan 2017 18:52:58 +0100, Rakor wrote: > Hi and thanks for your reply! Just a couple of points in addition to Thomás' recent reply, which well covers most aspects .. quoting here went totally weird, so excuse any strangeness there; I'm just pluckin

Re: Ipfw+dummynet on Windows 10

2016-12-02 Thread Julian Elischer
On 25/11/2016 2:20 PM, Srikanth Reddy wrote: Hi Odhiambo, That's clear to me. I am not complaining that Ipfw not updated,I am requesting if any one could please help in achieving ipfw works on Windows 10 that's great help. Thanks and Regards, Srikanth. normally Luigi or one of his crew would h

Re: change packets with IPFW divert

2016-11-03 Thread Julian Elischer
On 19/10/2016 1:56 PM, Samira Nazari wrote: Thank you for all of your comments and help. In fact, I want to divert packets for one program that do header compression What kind of header compression? Also look at netgraph. Sam, Naz On Tue, Oct 18, 2016 at 7:33 PM, Ian Smith wrote: On Tu

Re: ipfw table expiry.. how to do it..?

2016-09-20 Thread Julian Elischer
2016 at 12:12, Ian Smith <mailto:smi...@nimnet.asn.au>> wrote: On Mon, 12 Sep 2016 11:04:26 +0800, Julian Elischer wrote: > Unfortunately we don't have any timers on table entries, so it's not possible > to see how long an entry has been in use, or idle.

Re: ipfw table expiry.. how to do it..?

2016-09-20 Thread Julian Elischer
On 11/09/2016 8:03 PM, Julian Elischer wrote: Unfortunately we don't have any timers on table entries, so it's not possible to see how long an entry has been in use, or idle. If I were to ha ve a captive portal, which placed the address of 'allowed' hosts into a table,

ipfw table expiry.. how to do it..?

2016-09-11 Thread Julian Elischer
Unfortunately we don't have any timers on table entries, so it's not possible to see how long an entry has been in use, or idle. If I were to ha ve a captive portal, which placed the address of 'allowed' hosts into a table, we would have no way to time them out when they go idle. The omly thi

Re: Notice on upcoming ipdbtools 1.1.1

2016-08-17 Thread Julian Elischer
On 16/08/2016 6:11 AM, Dr. Rolf Jansen wrote: Am 14.08.2016 um 12:15 schrieb Dr. Rolf Jansen : As was noticed by the port maintainer, the initial release of ipdbtools 1.1.0 into the ports did not compile on i386 systems because the lack of the __uint128_t data type on 32bit systems, and which

Re: your thoughts on a particualar ipfw action.

2016-08-11 Thread Julian Elischer
On 12/08/2016 8:20 AM, Dr. Rolf Jansen wrote: Am 11.08.2016 um 14:20 schrieb Ian Smith : On Thu, 11 Aug 2016 10:09:24 -0300, Dr. Rolf Jansen wrote: Am 11.08.2016 um 08:06 schrieb Ian Smith : On Wed, 10 Aug 2016 -0300, Dr. Rolf Jansen wrote: ... ... I just submitted a PR asking to add the new po

Re: your thoughts on a particualar ipfw action.

2016-08-11 Thread Julian Elischer
inconvenience of needing to change the name. With the great help of Julian, I was able to improve the man file and the latest version can be read online: https://cyclaero.github.io/ipdb/ Best regards Rolf ___ freebsd-ipfw@freebsd.org mailing list

Re: your thoughts on a particualar ipfw action.

2016-08-04 Thread Julian Elischer
On 5/08/2016 2:22 AM, Dr. Rolf Jansen wrote: I am completely free of passions on this CC encoding thingy. I won't use this feature anyway. Please, may I suggest that the experts of the ipfw community come to an agreement, and I then I will change the implementation accordingly. Another possib

Re: your thoughts on a particualar ipfw action.

2016-08-04 Thread Julian Elischer
On 5/08/2016 2:22 AM, Dr. Rolf Jansen wrote: I am completely free of passions on this CC encoding thingy. I won't use this feature anyway. Please, may I suggest that the experts of the ipfw community come to an agreement, and I then I will change the implementation accordingly. Another possibi

Re: your thoughts on a particualar ipfw action.

2016-08-04 Thread Julian Elischer
On 5/08/2016 12:15 PM, Michael Sierchio wrote: Wouldn't it make sense to use the ISO Numeric Code / UN M49 Numerical Code? actually it doesn't make sense. the source of data doesn't have that information in it so it would require a whole layer of mapping, including downloads. and it would have

Re: IPFW: more "orthogonal? state operations, push into 11?

2016-08-04 Thread Julian Elischer
On 5/08/2016 2:14 AM, Ian Smith wrote: On Fri, 5 Aug 2016 00:12:37 +0800, Julian Elischer wrote: > On 4/08/2016 6:50 PM, Andrey V. Elsukov wrote: > > On 04.08.16 06:42, Julian Elischer wrote: > > > so it's a combination of #1 and #2 in my list. I think I origin

Re: your thoughts on a particualar ipfw action.

2016-08-04 Thread Julian Elischer
On 5/08/2016 12:44 AM, Ian Smith wrote: On Wed, 3 Aug 2016 18:53:38 -0300, Dr. Rolf Jansen wrote: > > Am 03.08.2016 um 11:13 schrieb Julian Elischer : On 2/08/2016 8:50 PM, Dr. Rolf Jansen wrote: Am 02.08.2016 um 05:08 schrieb Julian Elischer : 'scuse savage reformatting, but I

Re: IPFW: more "orthogonal? state operations, push into 11?

2016-08-04 Thread Julian Elischer
On 4/08/2016 7:20 PM, Andrey V. Elsukov wrote: On 04.08.16 06:58, Julian Elischer wrote: o while thinking about states etc, it occured to me, what does THIS do on subsequent packets in the session? 10 skipto tablearg tcp from table(3) to me keep-state I think it will not work like you

Re: IPFW: more "orthogonal? state operations, push into 11?

2016-08-04 Thread Julian Elischer
On 4/08/2016 6:27 PM, Lev Serebryakov wrote: Hello Julian, Thursday, August 4, 2016, 6:42:45 AM, you wrote: A combination is less useful for me as you need to do: I'm against this too, as I really love orthogonality, as everybody know already, and your example is good example why.

Re: IPFW: more "orthogonal? state operations, push into 11?

2016-08-04 Thread Julian Elischer
On 4/08/2016 6:50 PM, Andrey V. Elsukov wrote: On 04.08.16 06:42, Julian Elischer wrote: so it's a combination of #1 and #2 in my list. I think I originally thought of having just #1. A combination is less useful for me as you need to do: 20 skipto 400 tcp from table(2) to me setup r

Re: IPFW: more "orthogonal? state operations, push into 11?

2016-08-03 Thread Julian Elischer
So while thinking about states etc, it occured to me, what does THIS do on subsequent packets in the session? 10 skipto tablearg tcp from table(3) to me keep-state On 4/08/2016 11:42 AM, Julian Elischer wrote: On 4/08/2016 3:08 AM, Andrey V. Elsukov wrote: On 03.08.16 22:07, Lev

Re: IPFW: more "orthogonal? state operations, push into 11?

2016-08-03 Thread Julian Elischer
On 4/08/2016 3:08 AM, Andrey V. Elsukov wrote: On 03.08.16 22:07, Lev Serebryakov wrote: On 03.08.2016 21:03, Andrey V. Elsukov wrote: 1/ ability to use keep-state without an implicit check-state. <--- most important for me. (store-state)? 2/ ability to keep-state without actually doing it <--

Re: IPFW: more "orthogonal? state operations, push into 11?

2016-08-03 Thread Julian Elischer
On 4/08/2016 12:44 AM, Lev Serebryakov wrote: On 02.08.2016 09:47, Julian Elischer wrote: I don't have rights to commit my changes, and looks like I can not persuade others that my changes are Ok as-is, with all changes, made on requests from reviewers. Personally, I think, that (1)

Re: your thoughts on a particualar ipfw action.

2016-08-03 Thread Julian Elischer
Wow, this is getting to be a very useful tool. thanks for all the work. I look forward to the port.. On 4/08/2016 5:53 AM, Dr. Rolf Jansen wrote: Am 03.08.2016 um 11:13 schrieb Julian Elischer : On 2/08/2016 8:50 PM, Dr. Rolf Jansen wrote: Am 02.08.2016 um 05:08 schrieb Julian Elischer

Re: your thoughts on a particualar ipfw action.

2016-08-03 Thread Julian Elischer
On 2/08/2016 8:50 PM, Dr. Rolf Jansen wrote: Am 02.08.2016 um 05:08 schrieb Julian Elischer : looking for thoughts from people who know the new IPFW features well.. A recent addition to our armory is the geoip program that, given an address can tell you what country it is in and given a

your thoughts on a particualar ipfw action.

2016-08-02 Thread Julian Elischer
looking for thoughts from people who know the new IPFW features well.. A recent addition to our armory is the geoip program that, given an address can tell you what country it is in and given a country code, can give an ipfw table that describes all the ip addresses in that country. SO I wa

Re: IPFW: more "orthogonal? state operations, push into 11?

2016-08-01 Thread Julian Elischer
me. 3/ multiple state tables? this was discussed and I thought I saw patches but I haven't seen it going in, <-- super luxurious On 20/06/2016 9:59 PM, Julian Elischer wrote: On 16/06/2016 12:11 AM, Ian Smith wrote: On Mon, 13 Jun 2016 23:18:24 +0800, Julian Elischer wrote: > On 10/06/

Re: ipfw divert filter for IPv4 geo-blocking

2016-08-01 Thread Julian Elischer
On 1/08/2016 7:16 PM, Dr. Rolf Jansen wrote: Am 01.08.2016 um 03:17 schrieb Julian Elischer : On 30/07/2016 10:17 PM, Dr. Rolf Jansen wrote: I finished the work on CIDR conformity of the IP ranges tables generated by the tool geoip. The main constraint is that the start and end address of an

Re: ipfw divert filter for IPv4 geo-blocking

2016-08-01 Thread Julian Elischer
On 30/07/2016 10:17 PM, Dr. Rolf Jansen wrote: Am 29.07.2016 um 10:23 schrieb Dr. Rolf Jansen : Am 29.07.2016 um 06:50 schrieb Julian Elischer : On 29/07/2016 5:22 PM, Julian Elischer wrote: On 29/07/2016 4:53 PM, Dr. Rolf Jansen wrote: Am 28.07.2016 um 23:48 schrieb Lee Brown : That makes

Re: ipfw divert filter for IPv4 geo-blocking

2016-08-01 Thread Julian Elischer
On 30/07/2016 10:17 PM, Dr. Rolf Jansen wrote: I am still a little bit amazed how ipfw come to accept incorrect CIDR ranges and arbitrarily moves the start/end addresses in order to achieve CIDR conformity, and that without any further notice, and that given that ipfw can be considered as bei

Re: ipfw divert filter for IPv4 geo-blocking

2016-07-29 Thread Julian Elischer
On 29/07/2016 5:22 PM, Julian Elischer wrote: On 29/07/2016 4:53 PM, Dr. Rolf Jansen wrote: Am 28.07.2016 um 23:48 schrieb Lee Brown : That makes sense to me. Your /20 range encompasses 201.222.16.0 - 201.222.31.255. If you want 201.222.20.0-201.222.31.255, you'll need 3 ranges: 201.222

Re: ipfw divert filter for IPv4 geo-blocking

2016-07-29 Thread Julian Elischer
.24.0/22 (201.222.24.0-201.222.27.255) 201.222.28.0/22 (201.222.28.0-201.222.31.255) Ian, Julian and Lee, Thank you vary much for your responses. In order not bloat the thread, I answer only to one message. I found the problem. As a matter of fact, the respective IP ranges in the LACNIC deleg

Re: ipfw divert filter for IPv4 geo-blocking

2016-07-28 Thread Julian Elischer
222.24.0/22 (201.222.24.0-201.222.27.255) 201.222.28.0/22 (201.222.28.0-201.222.31.255) this <http://www.subnet-calculator.com/cidr.php> helps :) On Thu, Jul 28, 2016 at 7:21 PM, Dr. Rolf Jansen wrote: Am 27.07.2016 um 12:31 schrieb Julian Elischer : On 27/07/2016 9:36 PM, Dr. Rolf Jansen

Re: ipfw divert filter for IPv4 geo-blocking

2016-07-27 Thread Julian Elischer
trimming On 27/07/2016 11:51 PM, Ian Smith wrote: On Wed, 27 Jul 2016 10:03:01 +0800, Julian Elischer wrote: [...] > country without changing everything else. > (the downside is that dynamic skipto's are not very efficient as they do a > linear search of the rules

Re: ipfw divert filter for IPv4 geo-blocking

2016-07-27 Thread Julian Elischer
On 27/07/2016 9:36 PM, Dr. Rolf Jansen wrote: Am 26.07.2016 um 23:03 schrieb Julian Elischer : On 27/07/2016 3:06 AM, Dr. Rolf Jansen wrote: There is another tool called geoip , that I uploaded to GitHub, and that I use for looking up country codes by IP addresses on the command line

Re: ipfw divert filter for IPv4 geo-blocking

2016-07-26 Thread Julian Elischer
On 27/07/2016 3:06 AM, Dr. Rolf Jansen wrote: Am 26.07.2016 um 13:23 schrieb Julian Elischer : On 26/07/2016 1:41 AM, Dr. Rolf Jansen wrote: Once a week, the IP ranges are compiled from original sources into a binary sorted table, containing as of today 83162 consolidated range/cc pairs. On

Re: ipfw divert filter for IPv4 geo-blocking

2016-07-26 Thread Julian Elischer
On 27/07/2016 1:40 AM, Michael Sierchio wrote: On Tue, Jul 26, 2016 at 9:26 AM, Julian Elischer wrote: table 1 { DE, NL } -> 1, { US, UK } -> 10100 table 2 { CN, KO, TR } -> 2 why multiple tables? if you load the table at once you can assign a cou

Re: ipfw divert filter for IPv4 geo-blocking

2016-07-26 Thread Julian Elischer
On 26/07/2016 1:01 AM, Jan Bramkamp wrote: On 25/07/16 16:28, Dr. Rolf Jansen wrote: I have written a ipfw divert filter daemon for IPv4 geo-blocking. It is working flawlessly on two server installations since a week. Anyway, I am still in doubt whether I do the blocking in the correct way.

Re: ipfw divert filter for IPv4 geo-blocking

2016-07-26 Thread Julian Elischer
On 26/07/2016 1:41 AM, Dr. Rolf Jansen wrote: Am 25.07.2016 um 12:47 schrieb Michael Sierchio : Writing a divert daemon is a praiseworthy project, but I think you could do this without sending packets to user land. You could use tables - … Am 25.07.2016 um 14:01 schrieb Jan Bramkamp : I wou

Re: IPFW: more "orthogonal? state operations, push into 11?

2016-06-20 Thread Julian Elischer
On 16/06/2016 12:11 AM, Ian Smith wrote: On Mon, 13 Jun 2016 23:18:24 +0800, Julian Elischer wrote: > On 10/06/2016 5:11 AM, Lev Serebryakov wrote: > > -BEGIN PGP SIGNED MESSAGE- > > Hash: SHA512 > > > > On 07.06.2016 00:53, Andrey V. Elsukov wrot

Re: IPFW: more "orthogonal? state operations, push into 11?

2016-06-13 Thread Julian Elischer
On 10/06/2016 5:11 AM, Lev Serebryakov wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 07.06.2016 00:53, Andrey V. Elsukov wrote: looking at provided description and examples, seems the main task you want to solve is problem with NAT. But from my point of view, you are trying to solv

Re: IPFW: more "orthogonal? state operations, push into 11?

2016-06-13 Thread Julian Elischer
On 7/06/2016 10:31 PM, Ian Smith wrote: On Tue, 7 Jun 2016 00:53:23 +0300, Andrey V. Elsukov wrote: > On 06.06.16 22:41, Lev Serebryakov wrote: > > > > I still hope to see https://reviews.freebsd.org/D1776 committed before > > 11-RELEASE. > > > > It seems to me, that I does everythi

Re: IPFW: more "orthogonal? state operations, push into 11?

2016-06-13 Thread Julian Elischer
On 7/06/2016 4:00 PM, Andrey V. Elsukov wrote: On 07.06.16 09:31, wishmaster wrote: With the following patch you will be able create two different states, I think, and solve your task with NAT and dynamic rules: https://reviews.freebsd.org/D6674 Will there be the patch in the 11-RELEASE? Hi,

Re: IPFW: more "orthogonal? state operations, push into 11?

2016-06-08 Thread Julian Elischer
On 7/06/2016 3:41 AM, Lev Serebryakov wrote: I still hope to see https://reviews.freebsd.org/D1776 committed before 11-RELEASE. It seems to me, that I does everything what was requested by reviewers. Please? I think I gave a blessing a long time ago.. you are blocked by melifaro I

Re: [RFC] ipfw named states support

2016-05-29 Thread Julian Elischer
On 26/05/2016 6:11 PM, Dmitry Selivanov wrote: 18.05.2016 17:46, Andrey V. Elsukov пишет: We have the patch that adds named states support to ipfw. The idea is that we add a symbolic name-label to each dynamic state in addition to IP addresses, protocol and ports. This introduces new syntax for

Re: [RFC] ipfw named states support

2016-05-29 Thread Julian Elischer
On 18/05/2016 10:46 PM, Andrey V. Elsukov wrote: Hi All, We have the patch that adds named states support to ipfw. like it and have wished for this for along time this allows per-interface state. Can state name be set to a variable we can set or something? then we could have subroutines tha

Re: ipfw fwd sends to port but also through gateway

2016-05-26 Thread Julian Elischer
On 26/05/2016 2:03 AM, Adonis Peralta wrote: Hi all, I am noticing something weird in regards to ipfw forwarding when I am attempting to set up squid web proxying. Here is the info: ipfw rule: ipfw -q add fwd 127.0.0.1,8080 tcp from 192.168.1.0/24{1-5,7-254} to any dst-port 80 in via igb0 //

Re: IPW problem

2016-05-22 Thread Julian Elischer
On 22/05/2016 4:39 AM, Jack Raats wrote: Hi everyone, I have the following problem. My home server has 2 NICs NIC1 bge0 ip-address 10.10.10.30 netmask 255.255.255.0 gateway 10.10.10.100 ADSL connection 10 Mbit/1 Mbit NIC2 bge1 ip-address 10.10.10.32 netmask 255.255.255.0 gateway 10.10.10.200

Re: Network goes down when installing ipfw

2016-03-13 Thread Julian Elischer
On 14/03/2016 7:37 AM, Julian Elischer wrote: On 11/03/2016 8:46 PM, Kulamani Sethi wrote: Dear all, I am using ipfw3. When i am installing ipfw driver in windows-7 machine the network goes down. If uninstall that driver again then network comes automatically. That means ipfw driver

Re: Network goes down when installing ipfw

2016-03-13 Thread Julian Elischer
On 11/03/2016 8:46 PM, Kulamani Sethi wrote: Dear all, I am using ipfw3. When i am installing ipfw driver in windows-7 machine the network goes down. If uninstall that driver again then network comes automatically. That means ipfw driver does not support. I have also digitall

Re: ipwf dummynet vs. kernel NAT and firewall rules

2016-03-10 Thread Julian Elischer
On 10/03/2016 11:35 AM, Mark Felder wrote: On Thu, Mar 10, 2016, at 00:53, Ian Smith wrote: On Wed, 9 Mar 2016 15:02:18 -0800, Don Lewis wrote: > On 9 Mar, Don Lewis wrote: > > On 9 Mar, Don Lewis wrote: > >> On 9 Mar, Don Lewis wrote: > >>> On 9 Mar, Freddie Cash wrote: >

Re: ipwf dummynet vs. kernel NAT and firewall rules

2016-03-10 Thread Julian Elischer
On 9/03/2016 10:53 PM, Ian Smith wrote: On Wed, 9 Mar 2016 15:02:18 -0800, Don Lewis wrote: > On 9 Mar, Don Lewis wrote: > > On 9 Mar, Don Lewis wrote: > >> On 9 Mar, Don Lewis wrote: > >>> On 9 Mar, Freddie Cash wrote: > > ?Do you have the sysctl net.inet.ip.fw.one_pass

Re: ipwf dummynet vs. kernel NAT and firewall rules

2016-03-10 Thread Julian Elischer
On 9/03/2016 9:32 AM, Don Lewis wrote: I'm trying to add FQ-CoDEL AQM to my FreeBSD 10 firewall box using this patch: , but I'm running into a problem that I think is caused by an interaction between in-kernel NAT and dummynet. I've set up two

Re: ipwf dummynet vs. kernel NAT and firewall rules

2016-03-10 Thread Julian Elischer
On 9/03/2016 1:00 PM, Don Lewis wrote: On 9 Mar, Don Lewis wrote: On 9 Mar, Don Lewis wrote: On 9 Mar, Freddie Cash wrote: ?Do you have the sysctl net.inet.ip.fw.one_pass set to 0 or 1? Aha, I've got it set to 1. If set to 1, the a dummynet match ends the trip through the rules, and the

Re: layer2 ipfw fwd

2015-12-25 Thread Julian Elischer
On 23/12/2015 11:49 PM, Mark Felder wrote: On Mon, Dec 21, 2015, at 08:40, Julian Elischer wrote: This is EXACTLY what the cisco/ironport web filter appliance does... If we had this in FreeBSD nobody would have to reinvent the wheel to build a similar appliance, right? And it might allow

Re: layer2 ipfw fwd

2015-12-22 Thread Julian Elischer
On 22/12/2015 10:57 PM, bycn82 wrote: Hi Julian, Thanks for the explanation. Since it is on layer2, that means we can differentiate traffic by MAC or other layer2 filters only. e.g , forward the traffic when the type is 0x800 and destination MAC is xx:yy:zz I meant the accuracy is a big

Re: layer2 ipfw fwd

2015-12-21 Thread Julian Elischer
ginal destination and forward the request, or, maybe it won't, depending on policy. But nothing else is aware of its existence. it is as though a segment of cable started filtering web content. This is EXACTLY what the cisco/ironport web filter appliance does... On Monday, 21 December 20

Re: layer2 ipfw fwd

2015-12-20 Thread Julian Elischer
On 21/12/2015 10:20 AM, Ganbold Tsagaankhuu wrote: Hi, Does ipfw support layer2 fwd to support transparent proxying on bridge? Does similar change like https://lists.freebsd.org/pipermail/freebsd-ipfw/2003-September/000526.html ever get committed? I don't believe this was applied.. I did simil

Re: Set a deny rule for a URL in IPFW by its domain name

2015-11-30 Thread Julian Elischer
On 30/11/2015 8:02 PM, Ian Smith wrote: On Mon, 30 Nov 2015 16:48:49 +0530, Kulamani Sethi wrote: > Hi all, >I am using ipfw3, can i block a URL by its domain name? When i am > setting rules in IPFW by its domain name, it simple set rule by its > corresponding IP. > Here example how

Re: Kernel NAT issues

2015-11-28 Thread Julian Elischer
On 27/11/2015 12:55 PM, Nathan Aherne wrote: Hi Julian, Thank you for replying. I was completely off grid for a while and only got back on it today. I thought that Vimage was probably the way to achieve what I want. The main reason I was staying away from Vimage was the reported bugs with it

Re: Kernel NAT issues

2015-11-22 Thread Julian Elischer
://kb.juniper.net/InfoCenter/index?page=content&id=KB24639&actp=search> Yes just like that. Regards, Nathan On 19 Nov 2015, at 2:46 am, Ian Smith mailto:smi...@nimnet.asn.au>> wrote: On Wed, 18 Nov 2015 22:17:29 +0800, Julian Elischer wrote: On 11/18/15 8:40 AM, Nathan Aherne

Re: Kernel NAT issues

2015-11-21 Thread Julian Elischer
age=content&id=KB24639&actp=search Yes just like that. Regards, Nathan On 19 Nov 2015, at 2:46 am, Ian Smith <mailto:smi...@nimnet.asn.au>> wrote: On Wed, 18 Nov 2015 22:17:29 +0800, Julian Elischer wrote: On 11/18/15 8:40 AM, Nathan Aherne wrote: For some reason hairpin

Re: Kernel NAT issues

2015-11-18 Thread Julian Elischer
On 11/18/15 8:40 AM, Nathan Aherne wrote: For some reason hairpin (loopback nat or nat reflection) does not seem to be working, which is why I chose IPFW in the first place. it would be good to see a diagram of what this actually means. ___ freebsd

Re: ipfw delete 100-300

2015-08-13 Thread Julian Elischer
On 8/13/15 10:41 PM, Ian Smith wrote: On Thu, 13 Aug 2015 16:30:15 +0200, Luigi Rizzo wrote: > On Thu, Aug 13, 2015 at 4:00 PM, Ian Smith wrote: > > On Thu, 13 Aug 2015 12:24:31 +0800, Julian Elischer wrote: > > > BTW, any ideas as to what causes this?

Re: ipfw delete 100-300

2015-08-13 Thread Julian Elischer
On 8/13/15 10:41 PM, Ian Smith wrote: On Thu, 13 Aug 2015 16:30:15 +0200, Luigi Rizzo wrote: > On Thu, Aug 13, 2015 at 4:00 PM, Ian Smith wrote: > > On Thu, 13 Aug 2015 12:24:31 +0800, Julian Elischer wrote: > > > BTW, any ideas as to what causes this?

Re: ipfw delete 100-300

2015-08-12 Thread Julian Elischer
BTW, any ideas as to what causes this? # ipfw show [...] 00400 00 deny ip from 10.12.1.0/24 to any in recv xn0 00500 0 16045693110842147038 deny ip from 204.109.63.0/25 to any in recv xn1 00600 00 allow ip from any to any in recv xn1 [...]

Re: ipfw delete 100-300

2015-08-03 Thread Julian Elischer
On 8/3/15 10:50 PM, Alexander V. Chernikov wrote: 03.08.2015, 17:14, "Ian Smith" : On Mon, 3 Aug 2015 17:38:18 +0800, Julian Elischer wrote: > my reading of the code I can see that 'ipfw delete 100-300' doesn't > work (well I know it doesn't work, but I

Re: ipfw delete 100-300

2015-08-03 Thread Julian Elischer
On 8/3/15 5:38 PM, Julian Elischer wrote: my reading of the code I can see that 'ipfw delete 100-300' doesn't work (well I know it doesn't work, but I had thought it was a bug), Now I see that its just 'not supported' It may be my imagination but (distant) past

ipfw delete 100-300

2015-08-03 Thread Julian Elischer
my reading of the code I can see that 'ipfw delete 100-300' doesn't work (well I know it doesn't work, but I had thought it was a bug), Now I see that its just 'not supported' It may be my imagination but (distant) past? ___ freebsd-ipfw@freebsd.org ma

Re: keep-state and in-kernel NAT exposes local ip on external interface

2015-07-29 Thread Julian Elischer
On 7/30/15 3:34 AM, Julian Elischer wrote: On 7/29/15 10:23 PM, bycn82 wrote: /Hi,/ /But I dont understand why you said C->D is already in the dynamic table? which line create the dynamic rule for it?/ /it happened on a previous packet at some other rule, for example 30 allow ip from

Re: keep-state and in-kernel NAT exposes local ip on external interface

2015-07-29 Thread Julian Elischer
rds,/ /bycn82/ On 29 July 2015 at 22:03, Julian Elischer <mailto:jul...@freebsd.org>> wrote: On 7/29/15 5:26 PM, bycn82 wrote: /Hi Julian,/ / / /So below are the rules in your example/ / / /5 skipto 10 from A to B / /6 skipto 11 from any to any/ /10{ac

Re: keep-state and in-kernel NAT exposes local ip on external interface

2015-07-29 Thread Julian Elischer
On 7/29/15 5:26 PM, bycn82 wrote: /Hi Julian,/ / / /So below are the rules in your example/ / / /5 skipto 10 from A to B / /6 skipto 11 from any to any/ /10{action} from A to B keep-state/ /11{action} from C to D/ / / / / /If I remove the "skipto" rules they will become/ // /10 {acti

Re: keep-state and in-kernel NAT exposes local ip on external interface

2015-07-29 Thread Julian Elischer
On 7/29/15 3:43 AM, Lev Serebryakov wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 28.07.2015 08:30, Ian Smith wrote: I have global lack of any spare time (and all my FreeBSD activity is only a hobby) for last ~2 months. I see the end of this unfortunate state of affairs in near fu

Re: ipfw on just inbound and not outbound

2015-04-15 Thread Julian Elischer
On 4/15/15 5:09 AM, hiren panchasara wrote: Apologies if this is something silly but I want to completely eliminate ipfw from outgoing traffic perspective. I just want to have it on incoming. I can always add "allow ip from any to any out" as the first rule but that is still ipfw doing something.

Re: [RFC][patch] New "keep-state-only" option (version 3)

2015-02-04 Thread Julian Elischer
able to specify which set I'm looking in. then you could have differnt dynamic rules for NAT'd and unNATed packets, and differnet rules for the same packets as they traverse different interfaces. Lev, I think this is an improvement, but I wonder if we can make it even better. Julian

Re: [RFC][patch] Two new actions: state-allow and state-deny

2015-02-04 Thread Julian Elischer
On 2/4/15 5:22 PM, Lev Serebryakov wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 04.02.2015 08:13, Julian Elischer wrote: yes I think "keep-state" should be deprecated and replaced or supplemented by 'save_state' that does NOT do an implicit 'check-st

Re: [RFC][patch] New "keep-state-only" option (version 3)

2015-02-04 Thread Julian Elischer
On 2/4/15 5:24 PM, Lev Serebryakov wrote: -- Re-installation of state (with second, third, etc... packet of connection) should update TCP state of state (sorry!), or it will die in 10 seconds. This version seems to be final (apart from name of new option!). It works perfectly on my route

Re: [RFC][patch] New "keep-state-only" option

2015-02-03 Thread Julian Elischer
On 2/4/15 1:32 PM, Julian Elischer wrote: On 2/4/15 12:13 AM, Lev Serebryakov wrote: And variants with multiple NATs and "nat global" becomes as easy as this, too! No stupid "skipto", no "keep-state" at "incoming from local network" parts of firewall

Re: [RFC][patch] New "keep-state-only" option

2015-02-03 Thread Julian Elischer
On 2/4/15 12:13 AM, Lev Serebryakov wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Ok, "allow-state"/"deny-state" was very limited idea. Here is more universal mechanism: new "keep-state-only" (aliased as "record-only") option, which works exactly as "keep-state" BUT cancel match of

Re: [RFC][patch] New "keep-state-only" option (version 2)

2015-02-03 Thread Julian Elischer
On 2/4/15 12:55 AM, Lev Serebryakov wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 03.02.2015 19:13, Lev Serebryakov wrote: Ok, "allow-state"/"deny-state" was very limited idea. Here is more universal mechanism: new "keep-state-only" (aliased as "record-only") option, which works ex

Re: [RFC][patch] Two new actions: state-allow and state-deny

2015-02-03 Thread Julian Elischer
On 2/3/15 6:23 PM, Lev Serebryakov wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 03.02.2015 13:04, Ian Smith wrote: Now to make stateful firewall with NAT you need to make some not very "readable" tricks to record state ("allow") of outbound connection before NAT, but pass packet t

Re: [RFC][patch] Two new actions: state-allow and state-deny

2015-02-03 Thread Julian Elischer
On 2/3/15 5:30 PM, Lev Serebryakov wrote: looking at my own rules I don't seem to have a problem.. You have "check-state" only once, on entrance, before all NATs, so it could work only for packets which don't need NAT. And looks like (correct me if I'm wrong) you don't try to track states o

  1   2   3   >