Re: [RFC] Enabling IPFIREWALL_FORWARD in run-time

2012-10-23 Thread n j
ork adapters, SMP kernel >> and network stack, several locks acquired in the path of each packet, >> and i have an ability to test this in the lab. >> >> So, i prepared the patch, that removes IPFIREWALL_FORWARD option from >> the kernel and makes this functionality alway

Re: [RFC] Enabling IPFIREWALL_FORWARD in run-time

2012-10-21 Thread Julian Elischer
acquired in the path of each packet, and i have an ability to test this in the lab. So, i prepared the patch, that removes IPFIREWALL_FORWARD option from the kernel and makes this functionality always build-in, but it is turned off by default and can be enabled via the sysctl(8) variable

Re: [RFC] Enabling IPFIREWALL_FORWARD in run-time

2012-10-21 Thread Eitan Adler
and network stack, several locks acquired in the path of each packet, > and i have an ability to test this in the lab. > > So, i prepared the patch, that removes IPFIREWALL_FORWARD option from > the kernel and makes this functionality always build-in, but it is > turned off by d

Re: [RFC] Enabling IPFIREWALL_FORWARD in run-time

2012-10-19 Thread Julian Elischer
acquired in the path of each packet, and i have an ability to test this in the lab. So, i prepared the patch, that removes IPFIREWALL_FORWARD option from the kernel and makes this functionality always build-in, but it is turned off by default and can be enabled via the sysctl(8) variable

Re: [RFC] Enabling IPFIREWALL_FORWARD in run-time

2012-10-19 Thread Alexander V. Chernikov
On 19.10.2012 18:05, Andre Oppermann wrote: On 19.10.2012 14:18, Andrey V. Elsukov wrote: On 19.10.2012 16:02, Andre Oppermann wrote:>> http://people.freebsd.org/~ae/pfil_forward.diff Also we have done some tests with the ixia traffic generator connected via 10G network adapter. Tests have sho

Re: [RFC] Enabling IPFIREWALL_FORWARD in run-time

2012-10-19 Thread Andre Oppermann
On 19.10.2012 14:18, Andrey V. Elsukov wrote: On 19.10.2012 16:02, Andre Oppermann wrote:>> http://people.freebsd.org/~ae/pfil_forward.diff Also we have done some tests with the ixia traffic generator connected via 10G network adapter. Tests have show that there is no visible difference, and th

Re: [RFC] Enabling IPFIREWALL_FORWARD in run-time

2012-10-19 Thread Ian Smith
ers, SMP kernel > and network stack, several locks acquired in the path of each packet, > and i have an ability to test this in the lab. > > So, i prepared the patch, that removes IPFIREWALL_FORWARD option from > the kernel and makes this functionality always build-in, but it is >

Re: [RFC] Enabling IPFIREWALL_FORWARD in run-time

2012-10-19 Thread Andrey V. Elsukov
On 19.10.2012 16:02, Andre Oppermann wrote:>> http://people.freebsd.org/~ae/pfil_forward.diff >> >> Also we have done some tests with the ixia traffic generator connected >> via 10G network adapter. Tests have show that there is no visible >> difference, and there is no visible performance degradat

Re: [RFC] Enabling IPFIREWALL_FORWARD in run-time

2012-10-19 Thread Andre Oppermann
acquired in the path of each packet, and i have an ability to test this in the lab. So, i prepared the patch, that removes IPFIREWALL_FORWARD option from the kernel and makes this functionality always build-in, but it is turned off by default and can be enabled via the sysctl(8) variable

Re: [RFC] Enabling IPFIREWALL_FORWARD in run-time

2012-10-19 Thread Zamri Besar
rs, SMP kernel > and network stack, several locks acquired in the path of each packet, > and i have an ability to test this in the lab. > > So, i prepared the patch, that removes IPFIREWALL_FORWARD option from > the kernel and makes this functionality always build-in, but it is > tu

[RFC] Enabling IPFIREWALL_FORWARD in run-time

2012-10-19 Thread Andrey V. Elsukov
an ability to test this in the lab. So, i prepared the patch, that removes IPFIREWALL_FORWARD option from the kernel and makes this functionality always build-in, but it is turned off by default and can be enabled via the sysctl(8) variable net.pfil.forward=1. http://people.freebsd.org/~ae

Re: IPFIREWALL_FORWARD

2010-03-10 Thread Julian Elischer
Chris St Denis wrote: Julian Elischer wrote: n j wrote: Hello, although this has probably been asked before, could anyone point me to some relevant information about why fwd/forward requires kernel recompile, i.e. it's not been made a kernel module? This prevents me from using freebsd-update a

Re: IPFIREWALL_FORWARD

2010-03-10 Thread Chris St Denis
Julian Elischer wrote: n j wrote: Hello, although this has probably been asked before, could anyone point me to some relevant information about why fwd/forward requires kernel recompile, i.e. it's not been made a kernel module? This prevents me from using freebsd-update and forces me to upgrade

Re: IPFIREWALL_FORWARD

2010-03-10 Thread Julian Elischer
n j wrote: Hello, although this has probably been asked before, could anyone point me to some relevant information about why fwd/forward requires kernel recompile, i.e. it's not been made a kernel module? This prevents me from using freebsd-update and forces me to upgrade from source which - eve

Re: Runtime control for the IPFIREWALL_FORWARD

2006-12-16 Thread Andrey V. Elsukov
>Andrey V. Elsukov wrote: >This introduces quite a bit of extra code into the path of IP packets. Yes, it will add a few extra checks like a "if (pfil_forward_enabled) {...}" >Some people are very sensitive about anything that slows down that path. I can introduce a new kernel option - NO_PFIL_F

Re: Runtime control for the IPFIREWALL_FORWARD

2006-12-15 Thread Julian Elischer
Andrey V. Elsukov wrote: Hi, All! I want get the IPFIREWALL_FORWARD feature without a kernel rebuild. And use forwarding with the ipfw kld. It's possible to have this functional in the base system? If yes, then which is preferred way: sysctl or kld? This introduces quite a bit of

Runtime control for the IPFIREWALL_FORWARD

2006-12-15 Thread Andrey V. Elsukov
Hi, All! I want get the IPFIREWALL_FORWARD feature without a kernel rebuild. And use forwarding with the ipfw kld. It's possible to have this functional in the base system? If yes, then which is preferred way: sysctl or kld? -- WBR, Andrey V. El

Solution for an IPFIREWALL_FORWARD panic?

2001-12-13 Thread Yar Tikhiy
Hello everybody, A kernel panic has been observed in both branches under the following conditions: o ipfw is configured with a "fwd" rule for outgoing packets that will match some RIP datagrams o GateD is started with RIP enabled and consequently sends a broadcast UDP datagram that matches th

RFC: ipfirewall_forward patch #2

2001-11-16 Thread Julian Elischer
Here is a fixed version of this patch. last one used an unitialised variable. Note: the whole ipfw/fwd scheme is non re-entrant. to fix it and some other parts of the code will require that we gain teh capability of associating extra state with a packet.. e.g. "this packet has been diverted" or

Re: RFC: ipfirewall_forward patch

2001-11-16 Thread Julian Elischer
ethfw should be implemented as a negraph module... (all teh hooks are already there) On Fri, 16 Nov 2001, Mikel King wrote: > Chrisy Luke wrote: > > > Mikel King wrote (on Nov 16): > > > Just curious, but what's a doddle? > > > > It's like a doodle, but with less o's and more d's. :) > > > > I

Re: RFC: ipfirewall_forward patch

2001-11-16 Thread Julian Elischer
A "doddle" is "a task so easy that you could do it in your sleep" (BTW the patch has a small bug.. but the fix is trivial.) On Fri, 16 Nov 2001, Mikel King wrote: > Just curious, but what's a doddle? > > Cheers, > mikel > > Julian Elischer wrote: > > > On Thu, 15 Nov 2001, Chrisy Luke wrot

Re: RFC: ipfirewall_forward patch

2001-11-16 Thread Mikel King
Chrisy Luke wrote: > Mikel King wrote (on Nov 16): > > Just curious, but what's a doddle? > > It's like a doodle, but with less o's and more d's. :) > > It essentially means "this is easy to do". > > Chris. > -- > == [EMAIL PROTECTED]T: +44 845 333 0122 > == Gl

Re: RFC: ipfirewall_forward patch

2001-11-16 Thread Chrisy Luke
Mikel King wrote (on Nov 16): > Just curious, but what's a doddle? It's like a doodle, but with less o's and more d's. :) It essentially means "this is easy to do". Chris. -- == [EMAIL PROTECTED]T: +44 845 333 0122 == Global IP Network Engineering, Easynet G

Re: RFC: ipfirewall_forward patch

2001-11-16 Thread Mikel King
Just curious, but what's a doddle? Cheers, mikel Julian Elischer wrote: > On Thu, 15 Nov 2001, Chrisy Luke wrote: > > > > only packets already leaving the system can be hijacked and forwarded > > > > to a 2nd machine. Incoming packets can only be forwarded to local > > > > addresses/port combin

Re: RFC: ipfirewall_forward patch

2001-11-14 Thread Julian Elischer
On Thu, 15 Nov 2001, Chrisy Luke wrote: > > > only packets already leaving the system can be hijacked and forwarded > > > to a 2nd machine. Incoming packets can only be forwarded to local > > > addresses/port combinations. > > My fault. I was being lazy when I wrote it. :) Ah it WAS you I comm

Re: RFC: ipfirewall_forward patch

2001-11-14 Thread Chrisy Luke
Excuse me feollowing up to myself, but... Chrisy Luke wrote (on Nov 15): > It looks good. The ipfw syntax doesn't quite make sense to me. > Also, are you requiring that they all be on the same ipfw rule number? Ignore this. Just occured to me you're sharing load based on a netmask. A small stat

Re: RFC: ipfirewall_forward patch

2001-11-14 Thread Chrisy Luke
Julian Elischer wrote (on Nov 15): > Oops forgot the patch.. here it is... I almost replied to the first - too quick off the mark! > Julian Elischer wrote: > > Ipfw 'fwd' at present has teh following restriction: > > > > only packets already leaving the system can be hijacked and forwarded >

Re: RFC: ipfirewall_forward patch

2001-11-14 Thread Julian Elischer
Oops forgot the patch.. here it is... Julian Elischer wrote: > > The following patch is expected to > allow the forwarding of INCOMING packets to an arbitrary next hop > controlled by the ipfw fwd command.. > > Ipfw 'fwd' at present has teh following restriction: > > only packets already le

RFC: ipfirewall_forward patch

2001-11-14 Thread Julian Elischer
The following patch is expected to allow the forwarding of INCOMING packets to an arbitrary next hop controlled by the ipfw fwd command.. Ipfw 'fwd' at present has teh following restriction: only packets already leaving the system can be hijacked and forwarded to a 2nd machine. Incoming packet