Re: pf - SCTP ports are not allowed in filter rules.

2021-04-25 Thread Kristof Provost
On 25 Apr 2021, at 7:56, Özkan KIRIK wrote: SCTP protocol header has src port and dst port fields. But pf doesn't supports. # echo "pass log (to pflog0) quick proto SCTP from any to any port 13873" | pfctl -f - stdin:1: port only applies to tcp/udp stdin:1: skipping rule due to errors stdin:

Re: [RFC] pf ioctl changes

2021-04-02 Thread Kristof Provost
On 27 Mar 2021, at 12:54, Kristof Provost wrote: > I hope to post preliminary patches in the coming week. > - https://reviews.freebsd.org/D29556 - https://reviews.freebsd.org/D29557 - https://reviews.freebsd.org/D29558 - https://reviews.freebsd.org/D29559 -

Re: [RFC] pf ioctl changes

2021-03-29 Thread Kristof Provost
On 29 Mar 2021, at 17:16, Cy Schubert wrote: In message <18dc1ea9-abfc-4a06-8710-a3068370e...@freebsd.org>, "Kristof Provost " writes: On 29 Mar 2021, at 16:03, Cy Schubert wrote: In message <24e09373-ebcd-4ed1-8b59-a44e687f2...@freebsd.org>, "Kristof Provost "

Re: [RFC] pf ioctl changes

2021-03-29 Thread Kristof Provost
On 29 Mar 2021, at 16:03, Cy Schubert wrote: In message <24e09373-ebcd-4ed1-8b59-a44e687f2...@freebsd.org>, "Kristof Provost " writes: Hi, There are several patches in the pipeline that require changes in pf’s interface between kernel and userspace. In the past these have

[RFC] pf ioctl changes

2021-03-27 Thread Kristof Provost
Hi, There are several patches in the pipeline that require changes in pf’s interface between kernel and userspace. In the past these have been handled in multiple ways. Either by simply making the change, breaking binary compatibility, or by introducing a v2 ioctl (e.g. DIOCADDALTQV1). While

Re: pfctl segmentation fault in pfctl_optimize.c

2021-03-12 Thread Kristof Provost
On 12 Mar 2021, at 14:00, Patrick Lamaiziere wrote: I've read the code of pfctl a bit. If pfctl crashes in pfctl_optimize_ruleset, is there a risk to leave pf in a bad state ? Looks like the rules are sent to pf via ioctl after the optimization so a crash before should be harmless (?). That s

Re: pfctl segmentation fault in pfctl_optimize.c

2021-03-10 Thread Kristof Provost
On 9 Mar 2021, at 11:05, Patrick Lamaiziere wrote: Hello, FreeBSD 11.4-RELEASE-p3 / amd64 Yesterday while loading a ruleset, pfctl core dumped with a segmentation fault (see gdb below) We are recently using some big tables so may be this is what triggered the problem (?), i can't reproduce th

Re: "set skip on lo" on 12.x and 13.0

2021-02-09 Thread Kristof Provost
On 9 Feb 2021, at 15:50, Marek Zarychta wrote: Dear list, I am observing changed behaviour of the rule "set skip on lo". This rule previously allowed for communication between the host and the jail no only on loopback interfaces, but also on shared network interfaces, for example, if a host h

Re: pflog0 showing up in my vnet jails

2021-02-03 Thread Kristof Provost
On 3 Feb 2021, at 7:11, R. Tyler Croy wrote: I noticed this evening that pflog0 is propagated into my vnet-based jails (12.2-RELEASE) and I'm somewhat surprised to see it there. My host's /etc/rc.conf simply has `pflog_enable="YES"`, so nothing too esoteric. My /etc/jail.conf doesn't do anythin

Re: PF not keeping counters in a counters-defined table

2021-01-05 Thread Kristof Provost
On 5 Jan 2021, at 20:35, Dobri Dobrev wrote: You are correct, Kristof. If I place the table in the rdr rule - it starts keeping counters, however, what is the point of having the ability to place a table in a rdr-anchor rule in the first place, if it won't be able to keep counters? Tables ar

Re: PF not keeping counters in a counters-defined table

2021-01-05 Thread Kristof Provost
On 5 Jan 2021, at 14:42, Dobri Dobrev wrote: # # /etc/pf.conf: set timeout tcp.first 45 set timeout tcp.opening 45 set timeout tcp.closing 15 set timeout tcp.finwait 15 set timeout tcp.closed 10 set

Re: net.pf.request_maxcount not working after upgrading from 12.1-RELEASE to 12.2 RELEASE.

2020-12-12 Thread Kristof Provost
On 12 Dec 2020, at 15:07, Franco Fichtner wrote: There's no reason for this to be a tunable. It's perfectly safe to change this at runtime. Well, RWTUN would have enabled both boot and runtime which is also "perfectly safe". :) Good idea. Done in 368588. I expect to be bothering people abou

Re: Packets passed by pf don't make it out?

2020-10-15 Thread Kristof Provost
On 14 Oct 2020, at 21:35, J David wrote: On Wed, Oct 14, 2020 at 3:20 PM Kristof Provost wrote: I’ve not dug very deep yet, but I wonder if we shouldn’t have to teach pf to change the source port to avoid conflicting states in the first place. That was my first thought as well, framed

Re: Packets passed by pf don't make it out?

2020-10-14 Thread Kristof Provost
On 14 Oct 2020, at 21:16, J David wrote: On Wed, Oct 14, 2020 at 1:59 PM Kristof Provost wrote: There’s good reason to do this, as we have to be able to match state on both the pre-translation side (when processing LAN -> WAN traffic) and post-translation (WAN -> LAN). So, basical

Re: Packets passed by pf don't make it out?

2020-10-14 Thread Kristof Provost
On 14 Oct 2020, at 18:52, J David wrote: On 12 Oct 2020, at 23:48, Andreas Longwitz wrote: pf gives this messages in debug mode (pfctl -x loud). Yes, with that setting I'm also seeing those messages. On Tue, Oct 13, 2020 at 5:35 PM Kristof Provost wrote: I see the same ‘stack key a

Re: Packets passed by pf don't make it out?

2020-10-13 Thread Kristof Provost
On 12 Oct 2020, at 23:48, Andreas Longwitz wrote: Hello, now I can confirm (on FreeBSD 10 Stable) what you see on fb2 when your program udp_client is running on fb1. pf creates a state for the first packet only, for the other packets pf failes to create a state with messages like pf: stack key

Re: The best of both worlds “using mac filtering in pf”

2020-07-10 Thread Kristof Provost
On 10 Jul 2020, at 22:37, Ultima wrote: Hey Kristof, (It’s already possible to use pf on top of a bridge in bump-in-the-wire mode. Given the gotchas in that code I **strongly** recommend people don’t use that functionality.) Do you mind going into details on the gotchas or providing links?

Re: The best of both worlds “using mac filtering in pf”

2020-07-10 Thread Kristof Provost
On 10 Jul 2020, at 19:57, l.m.v.br...@xs4all.nl wrote: Hello, I am using pfSense, build on top of pf. And of course pfSense/pf is a terrific firewall, however the world is changing in the direction of IPV6 and that leads to new issues and related new requirements. One of the major issues is

Re: pf - state counter tracking like pfsync

2020-06-28 Thread Kristof Provost
On 26 Jun 2020, at 13:56, Özkan KIRIK wrote: My goal is save pkt/byte counters of each expired/killed/closed states into a txt file. What is the right way to do this in userspace ? There’s no real right way to do this using pf. There are a couple of things that’ll get close, but no 100% solut

Re: Need a PF consultant

2020-06-21 Thread Kristof Provost
On 22 Jun 2020, at 2:06, David Mehler wrote: Thanks for all your replies. Donald, the IPv6 dns is working fine in this situation. Kristof, here's what I originally had in my pf.conf file for ICMP: pass out quick on $ext_if proto { icmp, icmp6 } modulate state pass in quick on $ext_if proto { i

Re: Need a PF consultant

2020-06-21 Thread Kristof Provost
On 21 Jun 2020, at 23:11, David Mehler wrote: Anyone a pf expert wanting to make some extra money? I'm in need of consulting, I'm having an issue with my PF configuration, I've got a much longer message with output and netstat and all that, if anyone is interested email me privately with rates a

Re: ALTQ feature of PF in FreeBSD

2020-03-04 Thread Kristof Provost
On 29 Feb 2020, at 0:35, Sean Yeh wrote: Hi FreeBSD-pf members, I hope you guys are enjoying your weekend! I was wondering if any of you happened to know if the code for the ALTQ feature of pf could be separated and used for NetBSD's pf function. I'm currently investigating methods to improve

Re: Updating our translation functionality

2020-02-27 Thread Kristof Provost
On 27 Feb 2020, at 10:08, J.R. Oldroyd wrote: I read back and found the thread last August "Update to PF from OpenBSD 6.5". I was going to ask the same thing but, given the complexities discussed in the responses there, perhaps the question should be asked a different way round. How much wo

Re: Flow of broadcast/multicast packets in pf when a bridge is present

2019-12-28 Thread Kristof Provost
> On 28 Dec 2019, at 12:52, Andreas Longwitz wrote: > > In the meantime I have understand I was wrong about the code snippet > >> mc2 = m_dup(m, M_NOWAIT); >> if (mc2 != NULL) { >> /* Keep the layer3 header aligned */ >> int i = min(mc2->m_pkthdr.len, max_protohdr); >> mc2

Re: Rule last match timestamp

2019-12-27 Thread Kristof Provost
On 27 Dec 2019, at 21:49, Franco Fichtner wrote: Hi, On 27. Dec 2019, at 6:45 PM, Kristof Provost wrote: What are you trying to accomplish? Some people believe that "last match" is a great metric to audit rules for intrusion detection and all sorts ruleset optimisation and

Re: Rule last match timestamp

2019-12-27 Thread Kristof Provost
On 26 Dec 2019, at 1:20, Özkan KIRIK wrote: > Hi, > > I need last match timestamps for each rule. ipfw has an option for this. > But pfctl -v -sr command doesnt show last match timestamp. > Is there way to gather this information in pf? > Pf does not track this. What are you trying to accomplish?

Re: Blocking SYN with data

2019-12-27 Thread Kristof Provost
On 26 Dec 2019, at 1:13, Özkan KIRIK wrote: Hi, I want to block SYN with data packets. I read the pf.conf manual, but couldn't find a clear way to do this. Is it possible to match packets greater then N bytes using pf on FreeBSD 12.1 stable? There isn’t a way to express this in pf right now

Re: PF frag entries limit reached on a server with hw.ncpu: 24

2019-12-27 Thread Kristof Provost
On 23 Dec 2019, at 12:00, Andreas Longwitz wrote: On one of my servers a saw some messages dssinet kernel: [zone: pf frag entries] PF frag entries limit reached The output of the command vmstat -z | grep "pf frag entries" was pf frag entries:40, 5000,0, 5000, 18760, 0,

Re: pf tracker

2019-09-06 Thread Kristof Provost
On 6 Sep 2019, at 2:51, ravi new wrote: In packet filter rule ,there is a text called "tracker" what is use of this? I’ve not seen ‘tracker’ before in pf rules. Do you have an example? Can i find syntax of packet filter rules of freebsd. man 5 pf.conf Regards, Kristof ___

Re: Update to PF from OpenBSD 6.5

2019-08-20 Thread Kristof Provost
On 20 Aug 2019, at 12:32, Goran Mekić wrote: > On Tue, Aug 20, 2019 at 11:49:18AM +0200, Kristof Provost wrote: >> One thing I’ve thought of trying, and that might be an interesting stepping >> stone, is to create a port (/usr/ports/net/opf or whatever) of OpenBSD’s pf. >> In

Re: Update to PF from OpenBSD 6.5

2019-08-20 Thread Kristof Provost
On 20 Aug 2019, at 11:36, Tom Marcoen wrote: Hey all, I'm quite new to FreeBSD so appologies if this is a stupid question. Is there a good reason for not upgrading PF to the version from OpenBSD 6.5? There are several reasons why updating pf is a non-trivial problem. From an e-mail I sent o

Re: pf and dummynet

2019-07-29 Thread Kristof Provost
On 29 Jul 2019, at 22:15, Rodney W. Grimes wrote: >> On 29 Jul 2019, at 20:22, mike tancsa wrote: >>> On 7/29/2019 1:51 PM, Kristof Provost wrote: >> In general I?d expect quality of service and bandwidth limits to only >> be effective in the upstream direction (when

Re: pf and dummynet

2019-07-29 Thread Kristof Provost
On 29 Jul 2019, at 20:22, mike tancsa wrote: On 7/29/2019 1:51 PM, Kristof Provost wrote: Also beware of gotchas with things like IPv6 fragment handling or route-to. I do not consider mixing firewalls to be a supported configuration. If it breaks you get to keep the pieces. Thanks, I was

Re: pf and dummynet

2019-07-29 Thread Kristof Provost
> On 2019-07-29 18:44:00 (+0100), Paul Webster via freebsd-pf > wrote: > > > > Sent from Mail for Windows 10 > > > > From: mike tancsa > > Sent: 29 July 2019 17:06 > > To: freebsd-pf@freebsd.org > > Subject: pf and dummynet > > > > I have a box I need to shape inbound and outbound traffic. It

Re: passthru ethernet interface

2019-05-25 Thread Kristof Provost
> On 22 May 2019, at 04:53, The Doctor via freebsd-questions > wrote: > > How do I set up in /etc/rc.conf an eth1 that will > attach ifself to the back of the router in my packet filtering (pf) box, > namely the $ext_if ? > You want to set a macro in your pf.conf, as documented in its man pag

Re: svn commit: r345760 - in head: contrib/pf sys/netpfil/pf sbin/pfctl

2019-04-02 Thread Kristof Provost
On 1 Apr 2019, at 23:06, Rodney W. Grimes wrote: On 1 Apr 2019, at 18:47, Rodney W. Grimes wrote: Those are: - scalability The project funding source is OS agnostic, would it help if the OpenBSD pf implementation was redone in a way that it had fine grained locking. Would it be possible to a

Re: svn commit: r345760 - in head: contrib/pf sys/netpfil/pf sbin/pfctl

2019-04-01 Thread Kristof Provost
On 1 Apr 2019, at 18:47, Rodney W. Grimes wrote: I know for a fact that there is desire, with financials avaliable, to get our code updated. I do not think there is any specific criteria desired, other than moved closer to the OpenBSD version. It’s a good goal, but there are three major issues

Re: rdr pass for proto tcp sometimes creates states with expire time zero and so breaking connections

2019-02-23 Thread Kristof Provost
On 19 Feb 2019, at 22:53, Andreas Longwitz wrote: Kristof Provost wrote: Because fetching a counter is a rather expansive function we should use counter_u64_fetch() in pf_state_expires() only when necessary. A "rdr pass" rule should not cause more effort than separate

Re: rdr pass for proto tcp sometimes creates states with expire time zero and so breaking connections

2019-02-18 Thread Kristof Provost
On 18 Feb 2019, at 18:30, Andreas Longwitz wrote: Ok, thanks, I will commit the patch shortly. I do not see a point in waiting for two more weeks, sure report me if anything goes wrong. your patch for counter(9) on i386 definitely solves my problem discussed in this thread. Because fetchin

Re: routing LAN traffic through/around a pf gateway

2019-01-24 Thread Kristof Provost
On 25 Jan 2019, at 9:37, James B. Byrne via freebsd-pf wrote: I have limited knowledge of PF being in the process of transitioning from 20+ years of RHEL/CentOS to FreeBSD. Neither do I possess a great fund of knowledge respecting IP routing. That said this is my problem: On a small test LA

Re: VNET jails and PF service

2018-12-13 Thread Kristof Provost
On 2018-12-13 13:06:00 (+0100), Kristof Provost wrote: > On 2018-12-13 12:35:05 (+0100), Goran Mekić wrote: > > On Thu, Dec 13, 2018 at 09:30:12AM +0100, Kristof Provost wrote: > > > On 2018-12-13 01:02:32 (+0100), Goran Mekić wrote: > > > > I can't start P

Re: VNET jails and PF service

2018-12-13 Thread Kristof Provost
On 2018-12-13 12:35:05 (+0100), Goran Mekić wrote: > On Thu, Dec 13, 2018 at 09:30:12AM +0100, Kristof Provost wrote: > > On 2018-12-13 01:02:32 (+0100), Goran Mekić wrote: > > > I can't start PF as service from vnet jail. I have devfs rule to unhide > > > bpf (fo

Re: VNET jails and PF service

2018-12-13 Thread Kristof Provost
On 2018-12-13 01:02:32 (+0100), Goran Mekić wrote: > I can't start PF as service from vnet jail. I have devfs rule to unhide > bpf (for dhclient) and pf that the jail is using. I can run "pfctl -e -f > /etc/pf.conf" but "service pf start" fails with: > > kldload: can't load pf: Operation not perm

Re: rdr pass for proto tcp sometimes creates states with expire time zero and so breaking connections

2018-11-13 Thread Kristof Provost
On 13 Nov 2018, at 22:01, Andreas Longwitz wrote: Are there any hints why the counter pf_default_rule->states_cur could get a negative value ? I’m afraid I have no idea right now. OK, in the meantime I did some more research and I am now quite sure the problem with the bogus pf_def

[Differential] D1309: VIMAGE PF fixes #1

2018-10-28 Thread kristof (Kristof Provost)
kristof closed this revision. kristof added a comment. Herald added subscribers: farrokhi, ae. Assorted pf VIMAGE fixes have been done, and pf is now usable inside VIMAGE jails. CHANGES SINCE LAST ACTION https://reviews.freebsd.org/D1309/new/ REVISION DETAIL https://reviews.freebsd.org/D

Re: rdr pass for proto tcp sometimes creates states with expire time zero and so breaking connections

2018-10-27 Thread Kristof Provost
On 27 Oct 2018, at 5:22, Andreas Longwitz wrote: Thanks very much for answer especially for the hint to openbsd. I wonder if there’s an integer overflow in the of_state_expires() calculation. The OpenBSD people have a cast to u_int64_t in their version: |timeout = (u_int64_t)timeout * (end - s

Re: rdr pass for proto tcp sometimes creates states with expire time zero and so breaking connections

2018-10-18 Thread Kristof Provost
On 15 Oct 2018, at 15:26, Andreas Longwitz wrote: On two of my FreeBSD 10 (r338093) firewall servers some incoming ssh connections stopped to work because pf started to create states with expire time zero (instead of 86400 sec) for translation statements like rdr pass on em0 proto tcp from any

Re: pf tables locking

2018-08-14 Thread Kristof Provost
On 14 Aug 2018, at 0:32, Kajetan Staszkiewicz wrote: On Monday, 13 August 2018 17:59:15 CEST Kristof Provost wrote: How about this? https://github.com/innogames/freebsd/commit/ d44a0d9487285fac8ed1d7372cc99cca83f616e6 That looks good to me. There’s a few minor issues, things like inconsistent

Re: pf tables locking

2018-08-13 Thread Kristof Provost
On 13 Aug 2018, at 17:06, Kajetan Staszkiewicz wrote: > On Monday, 13 August 2018 15:22:33 CEST Kristof Provost wrote: >> rules (and associated tables) won’t just go away while there’s still >> state, > > This is mostly what I wanted to ask about in this message. How is it ens

Re: pf tables locking

2018-08-13 Thread Kristof Provost
On 13 Aug 2018, at 0:09, Kajetan Staszkiewicz wrote: Hello group, Can anybody help me iwth pf_table.c and all operations on tables, especially pfr_update_stats? I'm working on implementing stats for redirection targets, that is for nat or route-to. I'm going through the code and I've found o

Re: Possible bug: 11.2-RELEASE guest with vtnet and PF

2018-07-02 Thread Kristof Provost
On 2 Jul 2018, at 16:17, Kristof Provost wrote: Hi Jakub, On 30 Jun 2018, at 17:07, Jakub Chromy wrote: I've just installed a 11.2-RELEASE guest under bhyve (hypervisor is 11.1-RELEASE)... and I cant use Virtio network interface with PF: odine:/boot/kernel# /sbin/pfctl -n -f ~/loca

Re: pf reload/resync and skipped interface groups on 11.2-RELEASE

2018-07-02 Thread Kristof Provost
On 2 Jul 2018, at 16:44, Felix J. Ogris wrote: this is a fresh install of 11.2-RELEASE amd64 with a minimal pf rule set. After the first reload/resync, any traffic on an interface that is skipped via an interface group statement in pf.conf is rejected: Thanks for the report. I think that’s th

Re: Possible bug: 11.2-RELEASE guest with vtnet and PF

2018-07-02 Thread Kristof Provost
Hi Jakub, On 30 Jun 2018, at 17:07, Jakub Chromy wrote: I've just installed a 11.2-RELEASE guest under bhyve (hypervisor is 11.1-RELEASE)... and I cant use Virtio network interface with PF: odine:/boot/kernel# /sbin/pfctl -n -f ~/local/tmp/pf.work *pfctl: pfi_get_ifaces: Bad file descriptor*

Re: "egress" group

2018-06-25 Thread Kristof Provost
On 25 Jun 2018, at 22:12, Joseph Ward wrote: My current pf.conf contains the following lines (with a lot of other stuff redacted for irrelevance): ext_if="em0" ... block log all pass in on $ext_if proto tcp from any to any port 22 flags S/SA keep state and it works great; ssh is able to get

Re: pfr_update_stats: assertion failed.

2018-06-24 Thread Kristof Provost
On 24 Jun 2018, at 21:07, Marek Zarychta wrote: On Sun, Jun 24, 2018 at 01:56:07PM +0200, Kristof Provost wrote: On 23 Jun 2018, at 18:46, Marek Zarychta wrote: On Sat, Jun 23, 2018 at 05:27:29PM +0200, Marek Zarychta wrote: On Sun, Oct 16, 2016 at 08:17:13PM +0200, Marek Zarychta wrote: The

Re: pfr_update_stats: assertion failed.

2018-06-24 Thread Kristof Provost
On 23 Jun 2018, at 18:46, Marek Zarychta wrote: On Sat, Jun 23, 2018 at 05:27:29PM +0200, Marek Zarychta wrote: On Sun, Oct 16, 2016 at 08:17:13PM +0200, Marek Zarychta wrote: The issue occurred first two years ago, after upgrade from 8 to 9 branch. Now this i386 machine is running 11.0-STABLE

Re: Is there an upper limit to PF's tables?

2018-06-18 Thread Kristof Provost
On 18 Jun 2018, at 0:19, Chris H wrote: Sorry. Looks like I might be coming to the party a little late. But I'm currently running a 9.3 box that runs as a IP (service) filter for much of a network. While I've patched the box well enough to keep it safe to continue running. I am reluctant to up(

Re: Is there an upper limit to PF's tables?

2018-06-14 Thread Kristof Provost
On 14 Jun 2018, at 19:40, Dave Horsfall wrote: I can't get access to kernel sauce right now, but I'm hitting over 1,000 entries from woodpeckers[*] etc; is there some upper limit, or is it just purely dynamic? aneurin% freebsd-version 10.4-RELEASE-p9 Ian already gave some good information

Re: pf nat log does not show source and destination port

2018-06-11 Thread Kristof Provost
Hi Fatemeh, On 11 Jun 2018, at 7:51, Fatemeh Mehdizadeh wrote: Hi all, I'm using pf to create nat. I'm on FreeBSD9.2. Note that FreeBSD 9.2 is not a supported version. It went out of support at the end of 2014. (See https://www.freebsd.org/security/unsupported.html) I would strongly recommend

Re: Required modification for round robin napt with ip address prefixes

2018-03-15 Thread Kristof Provost
On 14 Mar 2018, at 18:30, Steven Crangle wrote: I was looking for some advice on the type of locking required to stop a box panicking that utilises both napt and ip address prefixes. My colleague made a post a while ago, and we ended up getting distracted fixing other panics that showed up. Bu

Re: Kernel Panic

2018-03-01 Thread Kristof Provost
On 1 Mar 2018, at 15:37, Joe Jones wrote: yes we use pfsync. Yesterday we tried with pfsync switched off, the box still locked up but this time without a panic. We make the DIOCRADDADDRS ioctl on the master and the backup (we use CARPed pairs). Interesting. It might be related to pfsync. Is

Re: Kernel Panic

2018-02-28 Thread Kristof Provost
On 28 Feb 2018, at 9:52, Kristof Provost wrote: On 27 Feb 2018, at 20:40, Joe Jones wrote: we have a kernel panic after compiling with witness and invariant Feb 27 13:49:33 sovapn1 kernel: lock order reversal: Feb 27 13:49:33 sovapn1 kernel: 1st 0xfe000fed78b8 pf_idhash (pf_idhash) @ /usr

Re: Kernel Panic

2018-02-27 Thread Kristof Provost
On 27 Feb 2018, at 20:40, Joe Jones wrote: we have a kernel panic after compiling with witness and invariant Feb 27 13:49:33 sovapn1 kernel: lock order reversal: Feb 27 13:49:33 sovapn1 kernel: 1st 0xfe000fed78b8 pf_idhash (pf_idhash) @ /usr/src/sys/netpfil/pf/pf.c:1078 Feb 27 13:49:33 sova

Re: Kernel Panic

2018-02-26 Thread Kristof Provost
On 26 Feb 2018, at 17:06, Joe Jones wrote: Hi Kristof, we are not updating rules during the test although in production we will reload the rule set from time to time. We are constantly adding and removing from tables though, using the DIOCRADDADDRS and DIOCRDELADDRS ioctl, also DIOCKILLSTATE

Re: Kernel Panic

2018-02-14 Thread Kristof Provost
On 14 Feb 2018, at 23:47, Joe Jones wrote: Hi, we are running test traffic through our system, after between 1 and 12 hours we get a kernel panic, always in the pfr_pool_get function in /usr/src/sys/netpfil/pf/pf_table.c line 2140. After a bit of investigation I confirmed that ke2 is set to n

Re: problems with tftp-proxy in 11.1?

2018-01-23 Thread Kristof Provost
On 14 Dec 2017, at 8:16, Kristof Provost wrote: On 7 Dec 2017, at 18:02, John Jasen wrote: On Wed, Dec 6, 2017 at 5:01 PM, Kristof Provost wrote: On 6 Dec 2017, at 21:25, John Jasen wrote: On 12/04/2017 02:47 PM, Kristof Provost wrote: Okay, so this is interesting: 25013: ioctl

Re: problems with tftp-proxy in 11.1?

2017-12-13 Thread Kristof Provost
On 7 Dec 2017, at 18:02, John Jasen wrote: On Wed, Dec 6, 2017 at 5:01 PM, Kristof Provost wrote: On 6 Dec 2017, at 21:25, John Jasen wrote: On 12/04/2017 02:47 PM, Kristof Provost wrote: Okay, so this is interesting: 25013: ioctl(4,0xc04c4417 { IORW 0x44('D'), 23, 76 },0x7f

Re: problems with tftp-proxy in 11.1?

2017-12-06 Thread Kristof Provost
On 6 Dec 2017, at 21:25, John Jasen wrote: On 12/04/2017 02:47 PM, Kristof Provost wrote: On 4 Dec 2017, at 19:57, John Jasen wrote: Depending on circumstances, we see a lot or a very few of the following messages: "pf connection lookup failed (no rdr?)" That means

Re: problems with tftp-proxy in 11.1?

2017-12-04 Thread Kristof Provost
On 4 Dec 2017, at 19:57, John Jasen wrote: Depending on circumstances, we see a lot or a very few of the following messages: "pf connection lookup failed (no rdr?)" That means the state lookup (using ioctl(DIOCNATLOOK)) failed. There seem to be a couple of possible reasons why that might happe

Re: problems with tftp-proxy in 11.1?

2017-12-03 Thread Kristof Provost
On 2 Dec 2017, at 4:56, John Jasen wrote: > Attempts to run tftp-proxy across a freebsd system running pf result in > very slow performance and an endless amount of: > > "pf connection lookup failed (no rdr?)" > Is there something that has regressed in 11.1, or am I missing something? > I’m not aw

Re: Jail isolation from internal network and host (pf, vnet (vimage), freebsd 11.1)

2017-11-08 Thread Kristof Provost
On 7 Nov 2017, at 23:43, irukandji via freebsd-pf wrote: > Hi Everyone, > > Problem: isolating jail away from internal network and host "hosting" > it. > Environment: jail with 192.168.1.100, host 192.168.1.200, VIMAGE > enabled kernel, VNET (vnet0:JID) over bridge interface (bridge0), > single net

Re: NATted outbound traffic sometimes uses backup CARP IP on LACP/LAGG interface

2017-09-15 Thread Kristof Provost
On 15 Sep 2017, at 11:31, Dave Cottlehuber wrote: Can you explain what $if:0 resolves to, for example how does it relate to to the primary ipv4/6 addresses bound to that interface? I couldn't find a reference in the usual ifconfig manpages about this (ifname:#) format, the BNF grammar for pf.co

Re: NATted outbound traffic sometimes uses backup CARP IP on LACP/LAGG interface

2017-09-14 Thread Kristof Provost
On 14 Sep 2017, at 16:21, Dave Cottlehuber wrote: Outgoing traffic (from a jail) via PF NAT over a LAGG/LACP sometimes has the *backup* CARP IP address assigned to it. ### running configs ## pfctl indeed shows its a round-robin

Re: Is panic() the way to handle errors in pf?

2017-08-02 Thread Kristof Provost
On 1 Aug 2017, at 11:30, Kajetan Staszkiewicz wrote: > Hey, group. > > A thought came to me: is it really the best thing to panic when errors are > encountered within pf? I understand there are situations where it is safer for > the kernel to not continue running like some low-level operations in m

Re: Bridge forward detection bug in 11.1-RELEASE?

2017-07-31 Thread Kristof Provost
On 30 Jul 2017, at 22:19, Heikki Paatela wrote: I was having kernel panics with 10.2-RELEASE earlier, caused by https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=202351. It would seem that some change that has happened between 11.0 and 11.1 has introduced a similar problem. The patch fixed th

Re: pfctl does not clear limit couters

2017-04-14 Thread Kristof Provost
On 14 Apr 2017, at 8:24, Max wrote: "pfctl -F info" command doesn't clear limit counters (shown in "pfctl -vsi" output). I think, should be --- sys/netpfil/pf/pf_ioctl.c.orig 2017-04-14 09:10:25.17138 +0300 +++ sys/netpfil/pf/pf_ioctl.c 2017-04-14 09:13:21.55365 +0300 @@ -1835,

Re: When should I worry about performance tuning?

2017-03-29 Thread Kristof Provost
On 29 Mar 2017, at 22:06, Chris H wrote: OK. My association with FreeBSD has made me a prime target for every male hormone distributor on the net. Fact is; I can guarantee ~89 SPAM attempts in under 5 minutes, after creating a pr on bugzilla. At first I was angry, and frustrated. But decided to m

Re: pf, ALTQ and 10G

2017-03-28 Thread Kristof Provost
On 28 Mar 2017, at 9:33, Eugene M. Zheganin wrote: I need to implement QoS on a 10G interface (ix(4)) with bandwidth of 4-5 Gbit/sec. In general I'm using pf on FreeBSD, since I like it more than ipfw. But I'm aware that it's kind of ancient and wasn't updated for a long time from the upstream

Re: Support for the enc(4) pseudo-interface

2017-03-21 Thread Kristof Provost
On 21 Mar 2017, at 12:44, Miroslav Lachman wrote: Kristof Provost wrote on 2017/03/21 10:18: On 21 Mar 2017, at 9:43, Marin Bernard wrote: If there is no SA, it is impossible for a peer to ping another. As soon as IKE creates a SA, however, ping starts working. As you can see, the last rule

Re: Support for the enc(4) pseudo-interface

2017-03-21 Thread Kristof Provost
On 21 Mar 2017, at 9:43, Marin Bernard wrote: Thanks for answering. Yes, I know that pf accepts rules mentioning inexistent interfaces. What puzzles me here is that my ruleset is actually working. With peer0 = 1.2.3.4 and peer1 = 5.6.7.8, the following ruleset works as expected: - peers =

Re: Support for the enc(4) pseudo-interface

2017-03-20 Thread Kristof Provost
On 20 Mar 2017, at 23:08, Marin Bernard wrote: Yet, it appears that pf is able to handle references to enc(4) in its ruleset even if the kernel does not support it. Is it expected behaviour? Is it safe to use such a configuration on a production machine ? pf accepts rules for interfaces that d

Re: sonewconn: pru_attach() failed and kernel panic in PF

2017-03-06 Thread Kristof Provost
So it turns out I shouldn't commit things when jet lagged. You want r314810 in head. The other one was mistakenly done in stable/11. It needed to go there sooner or later so I'm just going to leave it. Regards, Kristof > On 5 Mar 2017, at 22:19, Kristof Provost wrote: >

Re: sonewconn: pru_attach() failed and kernel panic in PF

2017-03-05 Thread Kristof Provost
On 5 Mar 2017, at 21:42, Kristof Provost wrote: There’s only a couple of calls to uma_zfree() in pf_get_translations(). These are: * uma_zfree(V_pf_state_key_z, skp); * uma_zfree(V_pf_state_key_z, *nkp); * uma_zfree(V_pf_state_key_z, *skp); Going by the inconsistent pointer use the first

Re: sonewconn: pru_attach() failed and kernel panic in PF

2017-03-05 Thread Kristof Provost
On 27 Feb 2017, at 21:08, Ross wrote: Hello One of my machines panics almost every day. It is always like this: first there is a number of messages about "sonewconn: pcb 0xf80085478740: pru_attach() failed" at the same time and then panic. Here's an example: ... many lines of sonewco

Re: udp - weird behavior of reply-to

2017-01-13 Thread Kristof Provost
On 9 Jan 2017, at 18:25, Marek Zarychta wrote: On Sun, Jan 08, 2017 at 07:08:10PM +0100, Kristof Provost wrote: On 8 Jan 2017, at 15:55, Marek Zarychta wrote: The problem description doesn’t ring any bells with me, but I’m also not sure I’ve fully understood it. Can you document a minimal

Re: udp - weird behavior of reply-to

2017-01-09 Thread Kristof Provost
On 9 Jan 2017, at 18:25, Marek Zarychta wrote: On Sun, Jan 08, 2017 at 07:08:10PM +0100, Kristof Provost wrote: On 8 Jan 2017, at 15:55, Marek Zarychta wrote: The problem description doesn’t ring any bells with me, but I’m also not sure I’ve fully understood it. Can you document a minimal

Re: udp - weird behavior of reply-to

2017-01-08 Thread Kristof Provost
On 8 Jan 2017, at 15:55, Marek Zarychta wrote: Is it a bug to be officially submitted or it will not be possible to use reply-to for UDP traffic anymore? The problem description doesn’t ring any bells with me, but I’m also not sure I’ve fully understood it. Can you document a minimal reproduc

Re: Slow NAT on 10.3-RELEASE

2016-10-11 Thread Kristof Provost
On 11 Oct 2016, at 10:34, Kamil Choudhury wrote: I've seen some mention of checksum issues on NAT limiting performance, but that seems to have been fixed as of 10.2 in an errata. Have I stumbled upon an actual problem, or have I misconfigured something? It’s worth trying the workaround (i.e. d

Re: dscp set/get

2016-10-06 Thread Kristof Provost
On 6 Oct 2016, at 15:01, Mark Martinec wrote: Just adding recognition to a parser for a couple of DSCP constants to be mapped to TOS is not the solution. Keep in mind that DSCP is a 6-bit field, and TOS is an 8-bit field. The remaining two bits are used for ECN (Explicit Congestion Notification).

Re: dscp set/get

2016-10-06 Thread Kristof Provost
On 6 Oct 2016, at 10:30, Franco Fichtner wrote: On 06 Oct 2016, at 10:10 AM, Kristof Provost wrote: On 6 Oct 2016, at 6:57, Eugene M. Zheganin wrote: pf still lacks the DSCP handling, will it be difficult/expensive to add this ? AFAIK ipfw got this recently. pf has set-tos and tos keywords

Re: dscp set/get

2016-10-06 Thread Kristof Provost
On 6 Oct 2016, at 6:57, Eugene M. Zheganin wrote: > pf still lacks the DSCP handling, will it be difficult/expensive to add > this ? AFAIK ipfw got this recently. > pf has set-tos and tos keywords. What is it not letting you do? Regards, Kristof ___ free

Re: pf fastroute tag removal reviewers needed

2016-09-28 Thread Kristof Provost
On 28 Sep 2016, at 13:53, Franco Fichtner wrote: The main culprit of pfil not working correctly is pf's route-to and reply-to (and the tag formerly known as fastroute) as they would call if_output directly on the ifnet and consume their packets this way. That transmit code is also copied from if_

[Differential] D1944: PF and VIMAGE fixes

2016-08-16 Thread kristof (Kristof Provost)
kristof abandoned this revision. REVISION DETAIL https://reviews.freebsd.org/D1944 EMAIL PREFERENCES https://reviews.freebsd.org/settings/panel/emailpreferences/ To: kristof, trociny, gnn, zec, rodrigc, glebius, eri, bz, nvass-gmx.com Cc: ryan_timewasted.me, mmoll, javier_ovi_yahoo.com, farr

[Differential] D1944: PF and VIMAGE fixes

2016-08-16 Thread kristof (Kristof Provost)
kristof commandeered this revision. kristof edited reviewers, added: nvass-gmx.com; removed: kristof. kristof added a comment. I'm commandeering this so it can be closed, because the patch fro bz@ (https://reviews.freebsd.org/D6924) has been included. REVISION DETAIL https://reviews.freebsd

Re: How to set tos to 0

2016-08-10 Thread Kristof Provost
On 10 Aug 2016, at 16:23, Radek Krejča wrote: > this patch seems to be working. > Thanks for testing! > I will post bugreport. > The patch has already been committed to head (r303663). A bug would still be useful so I don’t forget to merge it back to 11 and 10. Regards, Kristof __

Re: Max altq bandwidth 4.26 Gbit

2016-08-10 Thread Kristof Provost
On 10 Aug 2016, at 14:38, Radek Krejča wrote: I have changed bandwidth to 100%, 90% or 95%. Syntax OK, but value stops at 1.27Gbit (it looks, that 1Gbit is default) When I give ifconfig, I see: media: Ethernet autoselect (10Gbase-SR ) It looks that "autodetection" of pf is broken to. I was

Re: Max altq bandwidth 4.26 Gbit

2016-08-10 Thread Kristof Provost
On 10 Aug 2016, at 11:19, Radek Krejča wrote: That looks like you might be hitting the maximum of an unsigned integer. Try using relative specifications (i.e. as a percentage) instead. Yes, I think so. But I dont know, that I can say relative specification for inteface bandwidth. Could you show

Re: Max altq bandwidth 4.26 Gbit

2016-08-10 Thread Kristof Provost
On 10 Aug 2016, at 9:28, Radek Krejča wrote: I need to shape 10G traffic, but I cant make bandwidth higher than 4.26 Gbit: pfctl shows: altq on int0 cbq bandwidth 4.26Gb tbrsize 36000 queue { default_nat.. but in pf.conf is: altq on $int_if cbq bandwidth 8550Mb queue { default_

Re: How to set tos to 0

2016-07-31 Thread Kristof Provost
On 31 Jul 2016, at 19:46, Radek Krejča wrote: I need to set TOS to 0 and remark it with rules. I am trying to use scrub to set tos to 0, but I have problem: scrub all fragment reassemble no-df set-tos 0 give Illegal value but scrub all fragment reassemble no-df set-tos 1 is working. I am try

Re: fragments processing

2016-05-20 Thread Kristof Provost
On 20 May 2016, at 18:57, Max wrote: 20.05.2016 11:53, Kristof Provost пишет: On 19 May 2016, at 19:49, Max wrote: The number of used frags (almost) never decreases. I don't have enough experience in programming. But I guess that the problem may be in "frag->fr_timeout = tim

  1   2   >