Re: Firewalling jails and lo0

2016-08-06 Thread Bjoern A. Zeeb
On 6 Aug 2016, at 15:54, Niklaas Baudet von Gersdorff wrote: Hi, In the manual I read the advice to disable the firewall on the loopback interface (`set skip on lo0`) It makes sense to me: Why would I want to firewall traffic on the loopback interface? I have jails with IPs assigned on lo1. In

Re: Firewalling jails and lo0

2016-08-08 Thread Bjoern A. Zeeb
On 8 Aug 2016, at 8:19, Niklaas Baudet von Gersdorff wrote: Ernie Luzar [2016-08-07 13:20 -0400] : Aha. So once I assigned those traffic from/to jails should go through lo1 solely? YES. Thank you for clarifying that and your help. So, I attached additional IP addresses on the jail host sid

Re: Support for the enc(4) pseudo-interface

2017-03-21 Thread Bjoern A. Zeeb
On 21 Mar 2017, at 11:46, Kurt Jaeger wrote: Hi! If you want to filter on it it should work if you add ???device enc??? to your kernel config. The man page suggests that should then allow you to filter IPSec traffic on enc0. Shouldn't it be included in GENERIC if IPSec is now part of it?

Re: Support for the enc(4) pseudo-interface

2017-03-21 Thread Bjoern A. Zeeb
On 21 Mar 2017, at 12:12, Miroslav Lachman wrote: > Bjoern A. Zeeb wrote on 2017/03/21 12:56: >> On 21 Mar 2017, at 11:46, Kurt Jaeger wrote: >> >>> Hi! >>> >>>>> If you want to filter on it it should work if you add ???device >>>>>

Re: pf not checking traffic from tunnels

2017-05-30 Thread Bjoern A. Zeeb
On 30 May 2017, at 16:17, Kajetan Staszkiewicz wrote: Hello, I have a setup where FreeBSD-based routers serving datacenters are connected via gif tunnels which are additionally encrypted using transport mode IPsec. Each router runs pf and provides firewalling between multiple VLANs. Tunnel

Re: performance issue within VNET jail

2017-12-23 Thread Bjoern A. Zeeb
On 22 Dec 2017, at 20:30, Michael Grimm wrote: Hi — [ I am including freebsd-pf@FreeBSD.org now and removing freebsd-j...@freebsd.org ] [ Thread starts at https://lists.freebsd.org/pipermail/freebsd-net/2017-December/049470.html ] (#) there is a *dramatic* performance loss (

Re: [SOLVED] performance issue within VNET jail

2017-12-23 Thread Bjoern A. Zeeb
On 23 Dec 2017, at 14:06, Michael Grimm wrote: I will skip these questions for the time being, because I did solve my issue 15 minutes before your mail ;-) And I feel sorry for all your now "wasted" efforts in trying to help me. That’s OK. You solved the issue; that’s what’s important! Bec

Re: pf(4) status in 7.0-R

2007-06-06 Thread Bjoern A. Zeeb
ftp-proxy in ports. Pick your poison. ports. -- Bjoern A. Zeeb bzeeb at Zabbadoz dot NeT___ freebsd-pf@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-pf To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Re: conf/130381: [ip6] ipv6 not fully configured when pf startup script is run

2009-01-11 Thread Bjoern A. Zeeb
The following reply was made to PR conf/130381; it has been noted by GNATS. From: "Bjoern A. Zeeb" To: bug-follo...@freebsd.org, sd...@sdalu.com Cc: Gert Doering Subject: Re: conf/130381: [ip6] ipv6 not fully configured when pf startup script is run Date: Sun, 11 Jan 2009 18:47:45

Re: Network simulation using jails & vimage

2010-02-21 Thread Bjoern A. Zeeb
y on doesn't seem to work with 8.0. If 7.2 won't work for my needs, but 8 or 9-CURRENT will, is anyone aware of an updated ipfw DSCP patch? I haven't seen anything on Google or the freebsd-ipfw mailing list. what is DSCP? I guess Differentiated Services CodePoint (if talking MP

Re: Panic with VIMAGE and pf

2010-04-11 Thread Bjoern A. Zeeb
ar it is and how to get it. That might, btw., be the better list to ask VIMAGE questions;) /bz -- Bjoern A. Zeeb It will not break if you know what you are doing. ___ freebsd-pf@freebsd.org mailing list http://lists.freebsd.org/mailman

Re: kern/144311: [pf] [icmp] massive ICMP storm on lo0 occurs when using pf(4) 'reply-to'

2010-08-21 Thread Bjoern A. Zeeb
The following reply was made to PR kern/144311; it has been noted by GNATS. From: "Bjoern A. Zeeb" To: bug-follo...@freebsd.org, kasah...@nc.kyushu-u.ac.jp Cc: Subject: Re: kern/144311: [pf] [icmp] massive ICMP storm on lo0 occurs when using pf(4) 'reply-to' Date: Sat,

Re: NAT64 support in pf?

2011-02-17 Thread Bjoern A. Zeeb
-- Bjoern A. Zeeb You have to have visions! Stop bit received. Insert coin for new address family. ___ freebsd-pf@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-pf To unsubscribe, send any mail

Re: (no) PF from OpenBSD 4.7:

2011-02-20 Thread Bjoern A. Zeeb
software that sits on top of the syntax in a UI, etc. /bz -- Bjoern A. Zeeb You have to have visions! Stop bit received. Insert coin for new address family. ___ freebsd-pf@freebsd.org mailing list http://lists.f

Re: using ?include? like statement in pf.conf to include some parts from other files

2011-05-08 Thread Bjoern A. Zeeb
atch RSN and put it into HEAD afterwards. > > And there are various other messages on the lists that you are welcome to > search for if interested. > > > Good Luck. > > -- > > Regards, (jhell) > Jason Hellenthal > -- Bjoern A. Zeeb

Re: IPv6 day, PF and IPv6 fragments

2011-06-07 Thread Bjoern A. Zeeb
sure to which extend they now check. If you trust your hosts you can use something like: pass log quick inet6 proto ipv6-frag all to let the ipv6 fragments pass through without inspection. /bz -- Bjoern A. Zeeb You have to have visi

Re: IPv6 day, PF and IPv6 fragments

2011-06-07 Thread Bjoern A. Zeeb
s the packet on the path but if I am going to write 32k of data to UDP you'll see a lot of fragments no matter what. Actually this is the most common frag6 source I am seeing -- large DNS replies due to DNSsec, etc. /bz -- Bjoern A. Zeeb You have to ha

Fwd: svn commit: r223637 - in head: . contrib/pf/authpf contrib/pf/ftp-proxy contrib/pf/man contrib/pf/pfctl contrib/pf/pflogd sbin/pflogd sys/conf sys/contrib/altq/altq sys/contrib/pf/net sys/modules

2011-06-28 Thread Bjoern A. Zeeb
Begin forwarded message: > From: "Bjoern A. Zeeb" > Date: June 28, 2011 11:57:25 AM GMT+00:00 > To: src-committ...@freebsd.org, svn-src-...@freebsd.org, > svn-src-h...@freebsd.org > Subject: svn commit: r223637 - in head: . contrib/pf/authpf > contrib/pf/ftp-pro

Re: svn commit: r223637 - in head: . contrib/pf/authpf contrib/pf/ftp-proxy contrib/pf/man contrib/pf/pfctl contrib/pf/pflogd sbin/pflogd sys/conf sys/contrib/altq/altq sys/contrib/pf/net sys/modules

2011-06-28 Thread Bjoern A. Zeeb
s/contrib/pf/net sys/modules > s... > Date: Tue, 28 Jun 2011 11:57:25 +0000 (UTC) > From: Bjoern A. Zeeb > To: src-committ...@freebsd.org, svn-src-...@freebsd.org, > svn-src-h...@freebsd.org > > Author: bz > Date: Tue Jun 28 11:57:25 2011 > New Revision: 223637

Re: svn commit: r223637 - in head: . contrib/pf/authpf contrib/pf/ftp-proxy contrib/pf/man contrib/pf/pfctl contrib/pf/pflogd sbin/pflogd sys/conf sys/contrib/altq/altq sys/contrib/pf/net sys/modules

2011-06-29 Thread Bjoern A. Zeeb
On Jun 28, 2011, at 2:55 PM, Bjoern A. Zeeb wrote: > On Jun 28, 2011, at 12:13 PM, Anton Yuzhaninov wrote: > >> Original Message >> Subject: svn commit: r223637 - in head: . contrib/pf/authpf >> contrib/pf/ftp-proxy contrib/pf/man contrib/pf/pf

Re: svn commit: r223637 - in head: . contrib/pf/authpf contrib/pf/ftp-proxy contrib/pf/man contrib/pf/pfctl contrib/pf/pflogd sbin/pflogd sys/conf sys/contrib/altq/altq sys/contrib/pf/net sys/modules

2011-08-17 Thread Bjoern A. Zeeb
0 > flo@tb:~ # sudo pfctl -ss| wc -l > No ALTQ support in kernel > ALTQ related functions disabled > 12 > > Every new connection is added to the current entries but it seems they are > never removed?! > > I've set debug t

Re: Filtering inside IPSec tunnel

2011-10-11 Thread Bjoern A. Zeeb
om $ipsec_if to any >> block quick on $ipsec_if >> >> But I still ping the second point of IPSec tunnel. >> Where is my mistake? > > IIRC you also need the following in your kernel config: > > options IPSEC_FILTERTUNNEL > > (I think it use

Re: PF & Inside NAT

2011-10-17 Thread Bjoern A. Zeeb
, as in before any ipsec or routing decision; for long time pf had no concept of this, and yes, the pf in FreeBSD still lacks it. /bz -- Bjoern A. Zeeb You have to have visions! Stop bit received. Insert coin for new address family.

Fix for no state removal if compiled into kernel ... Fwd: svn commit: r226530 - head/sys/contrib/pf/net

2011-10-19 Thread Bjoern A. Zeeb
Hi, for all of you. pfsync will be next. If you want to fetch the patch, it's also here: http://people.freebsd.org/~bz/20111019-01-pf-state-removal.diff I'll make sure it'll be part of RC2. /bz Begin forwarded message: > From: "Bjoern A. Zeeb" > Date: 19.

pfsync locking changes - please test

2011-10-19 Thread Bjoern A. Zeeb
e and recompile. It's not all pf fixes but all for today and I'd really feel better for MFCing them in a couple of days if I get a couple of success reports;) /bz -- Bjoern A. Zeeb You have to have visions! Stop bit received. Insert coin for new

Re: panic loading/enabling pf on ARM RELENG_9

2011-10-22 Thread Bjoern A. Zeeb
u probably want these two: http://lists.freebsd.org/pipermail/freebsd-pf/2011-October/006360.html http://lists.freebsd.org/pipermail/freebsd-pf/2011-October/006364.html there are additional fixes from glebius in head r226609 and r226623. I will try these. Thanks. -- Bjoe

Re: NAT64 in PF.

2012-01-05 Thread Bjoern A. Zeeb
hitespace and all was fixed and nothing applied anymore. I am currently waiting (about a week) for someone else to finish some pf changes and will then probably unifdef the code and add the final derived version as went into OpenBSD. /bz -- Bjoern A. Zeeb You

Re: PF state key linking mismatch in FreeBSD 9.0-RELEASE

2012-01-12 Thread Bjoern A. Zeeb
originates and even if it's for documentation purposes to eventually decide if re-using the mbuf there is really cheaper to allocating a new one as other people lately found transporting other properties along with the mbuf and re-using that can lead to odd results. /bz -- Bjoern A. Z

Re: PF state key linking mismatch in FreeBSD 9.0-RELEASE

2012-01-12 Thread Bjoern A. Zeeb
rnel and either have the PR problem fixed or the printf removed. The latter can be done quickly the former needs a bit of time... /bz -- Bjoern A. Zeeb You have to have visions! It does not matter how good you are.

Re: kern/163208: [pf] PF state key linking mismatch

2012-01-21 Thread Bjoern A. Zeeb
G_9 Branchpoint. > So maybe the Fix was not complete? See thread from earlier this month on freebsd-pf -- Bjoern A. Zeeb You have to have visions! It does not matter how good you are. It matters what good you do! ___ freebsd

Re: kern/163208: [pf] PF state key linking mismatch

2012-01-21 Thread Bjoern A. Zeeb
The following reply was made to PR kern/163208; it has been noted by GNATS. From: "Bjoern A. Zeeb" To: =?iso-8859-1?Q?Tilman_Keskin=F6z?= Cc: Fabian Keil , bug-follo...@freebsd.org, freebsd-pf@freebsd.org Subject: Re: kern/163208: [pf] PF state key linking mismatch Date: Sat, 21 J

Re: Getting Involved

2012-01-21 Thread Bjoern A. Zeeb
break and not perform. Pick any single one at this point and let us know which one you'd prefer. A couple of developers lately had this discussion (though not everyone was present). I'll however be curious which way our users want it to be ... /bz -- Bjoern A. Zeeb

Re: Getting Involved

2012-01-26 Thread Bjoern A. Zeeb
I suppose I > could e-mail the original PF list to figure that out though. > mostly http://www.openbsd.org/cgi-bin/cvsweb/src/sys/net/ look for files matching *pf* -- Bjoern A. Zeeb You have to have visions! It does not matter how good you are. I

Re: [PATCH] GNU/kFreeBSD detection in PF

2012-01-30 Thread Bjoern A. Zeeb
f we shall unifdef pf as soon as someone get some other work in, so the entire #ifdef __FreeBSD__ checks would be gone. I think that's a lot better solution than further mangling things. /bz -- Bjoern A. Zeeb You have to have

Re: FreeBSD 9.0-RELEASE: VIMAGE and PF, Constant Kernel Panic

2012-02-19 Thread Bjoern A. Zeeb
pic of said panics. > http://i40.tinypic.com/2q00etz.jpg > > > Any advice on solving this will be appreciated. VIMAGE is experimental. pf is not yet supported as are a couple of other things including most cloned interfaces etc. -- Bjoern A. Zeeb You

Re: kern/164924: Re: kern/164271: pf] not working pf nat on FreeBSD 9.0 [regression]

2012-02-19 Thread Bjoern A. Zeeb
t > http://lists.freebsd.org/mailman/listinfo/freebsd-pf > To unsubscribe, send any mail to "freebsd-pf-unsubscr...@freebsd.org" -- Bjoern A. Zeeb You have to have visions! It does not matter how good you are. It matters what good you do! __

Re: kern/164402: [pf] pf crashes with a particular set of rules when first matching packet arrives

2012-04-17 Thread Bjoern A. Zeeb
are other issues when you do that at pfil(9) > E> level. > > Well, playing with two firewalls was never safe and clear, there always > be edge cases in such setups. A lot of people have used ipfw to filter L2 MAC addresses etc and pf for everything else in the past. So certainl

Re: IPv6 fragments firewall support?

2012-06-09 Thread Bjoern A. Zeeb
however unconditionally allow all fragments and trust a (bad) end host system: pass log quick inet6 proto ipv6-frag all (it has log set for a reason to be able to track them here) /bz -- Bjoern A. Zeeb You have to have visions! It does not matter how good you are.

Re: Regression with jails/IPv6/pf

2012-08-01 Thread Bjoern A. Zeeb
xpereincing problems with packets dropped due to invalid checksums with IPv6 and pf after the recent merges, can you report back if you also see this without "modulate state" in your pf.conf (if you have 'modulate' in there, can you try changing it to 'keep' and see if th

Re: Regression with jails/IPv6/pf

2012-08-01 Thread Bjoern A. Zeeb
On Wed, 1 Aug 2012, Matthew Seaman wrote: On 01/08/2012 18:13, Bjoern A. Zeeb wrote: Any of you who are expereincing problems with packets dropped due to invalid checksums with IPv6 and pf after the recent merges, can you report back if you also see this without "modulate state&quo

Re: [HEADS UP] merging projects/pf into head

2012-09-09 Thread Bjoern A. Zeeb
/Open we need to implement, ... more cherry picking on some changes ....;-) -- Bjoern A. Zeeb You have to have visions! Stop bit received. Insert coin for new address family. ___ freebsd-pf@freebsd.org m

Re: [HEADS UP] merging projects/pf into head

2012-09-09 Thread Bjoern A. Zeeb
s/has been pondered; we'll see who might come forward. /bz -- Bjoern A. Zeeb You have to have visions! Stop bit received. Insert coin for new address family. ___ freebsd-pf@freebsd.org mailing list http://li

Re: pf spurious packet drops [was: [HEADS UP] merging projects/pf into head]

2012-09-09 Thread Bjoern A. Zeeb
ld be interesting to know if these things were related. -- Bjoern A. Zeeb You have to have visions! Stop bit received. Insert coin for new address family. ___ freebsd-pf@freebsd.org mailing list http://lists.freebs

Re: nat before ipsec ...

2013-12-25 Thread Bjoern A. Zeeb
tly. There should be some posting from me on net@ or ipfw@ from sometime in the last decade. /bz -- Bjoe

Re: Why merging recent OpenBSD PF code is not easy (was Re: FOLLOW-UP)

2014-12-08 Thread Bjoern A. Zeeb
yet, and that’s Apple. Has anyone considered looking at their implementation shipping on millions of devices, requiring similar “API stability” as FreeBSD would love to support? Just a few things from the top of my head. — Bjoern A. Zeeb Charles Haddon

[Differential] D1944: PF and VIMAGE fixes

2016-05-26 Thread bz (Bjoern A. Zeeb)
___ freebsd-pf@freebsd.org mailing list https://lists.freebsd.org/mailman/listinfo/freebsd-pf To unsubscribe, send any mail to "freebsd-pf-unsubscr...@freebsd.org"

[Differential] D1944: PF and VIMAGE fixes

2016-06-22 Thread bz (Bjoern A. Zeeb)
bz added a comment. Can I have you guys have a look at https://reviews.freebsd.org/D6924 Thanks REVISION DETAIL https://reviews.freebsd.org/D1944 EMAIL PREFERENCES https://reviews.freebsd.org/settings/panel/emailpreferences/ To: nvass-gmx.com, trociny, kristof, gnn, zec, rodrigc, gl

[Differential] [Reopened] D1309: VIMAGE PF fixes #1

2015-01-06 Thread bz (Bjoern A. Zeeb)
bz reopened this revision. bz added a comment. This revision is now accepted and ready to land. Even if this would have been merged properly and not broken the build there's still stuff that is wrong for initialisation with different net contexts in this and that needs to be fixed properly. REV