Re: pf for shifting UDP ports?

2025-04-23 Thread Stuart Henderson
On 2025-04-18, TSS wrote: > But also, I don't really want to modify the binary or have my own version > of xl2tpd that I compile from source. I know I was concerned about speed > earlier, but I can accept a little bit of pf delay for the convenience of > running stock code that someone else mainta

Re: pf for shifting UDP ports?

2025-04-20 Thread Philipp Buehler
Am 20.04.2025 10:54 schrieb Stuart Henderson: there is a lookup, but I'm not sure whether it ignores the nat-to rule entirely, or just the port. I suspect it probably ignores the rule entirely. (the complication with UDP is that there's no real state in the protocol, so PF just works on timers).

Re: pf for shifting UDP ports?

2025-04-20 Thread Stuart Henderson
On 2025-04-20, Philipp Buehler wrote: > Am 19.04.2025 19:57 schrieb Stuart Henderson: >> However: I don't think it's all that likely to help, I'd expect your >> upstream nat to have already changed the source port... > > `quick` comes to mind ofc - and also the fact about "already changed" if > t

Re: pf for shifting UDP ports?

2025-04-19 Thread Philipp Buehler
Am 19.04.2025 19:57 schrieb Stuart Henderson: However: I don't think it's all that likely to help, I'd expect your upstream nat to have already changed the source port... `quick` comes to mind ofc - and also the fact about "already changed" if the leet-rule comes first IF `from` is used, mind:

Re: pf for shifting UDP ports?

2025-04-19 Thread Stuart Henderson
On 2025-04-18, TSS wrote: > Hi again. I hope it's not unwelcome to ask a pf question here; I hope > this one isn't too elementary. > > I have a daemon that sends and receives UDP packets on port 1337. For > reasons, I would like to use pf on my computer (i.e. the one that's > running the daemon) t

Re: pf for shifting UDP ports?

2025-04-19 Thread Philipp Buehler
Am 18.04.2025 18:13 schrieb TSS: Search engines have not helped me out with this one, but my search skills were dubious even before the AI era. how about: pass out quick on vio0 proto udp from any port 1337 nat-to (vio0) port 13337 pass in quick on vio0 proto udp from any to self port 31337

Re: pf for shifting UDP ports?

2025-04-18 Thread TSS
On Fri, Apr 18, 2025 at 02:10:44PM -0700, obs...@loopw.com wrote: > fwiw, even if its only ports being translated its still called NAT (PAT > is a subset of NAT) - internally its all going through the same NAT > functions. I guess this makes me feel better about it being harder to Google. > break

Re: pf for shifting UDP ports?

2025-04-18 Thread obsdml
> .. | >+---+ o * . ~ *| >| my |--> UDP 1337 --> % . pf : . --|--> UDP 31337 --> clouds >|special| + . magic + |and >|daemon |<-- UDP 1337 <-- * _ , + <--|--- UDP 31337

Re: pf for shifting UDP ports?

2025-04-18 Thread TSS
On Fri, Apr 18, 2025 at 03:17:24PM -0400, Mike wrote: > Is your ISP blocking traffic or are you just doing this to see if you can? > I just can't think of a use case for what you're trying to do and wondering > if there could be a different way to achieve what you're trying to do. There is another

Re: pf for shifting UDP ports?

2025-04-18 Thread Mike
To add to my last email, you can do it in iptables but doesn't seem to be a way to go it in pf. For whatever reason I feel invested in this thread and might boot up an openbsd VM to try myself On Fri, Apr 18, 2025, 3:17 PM Mike wrote: > I don't think you can do that. > > Is your ISP blocking tra

Re: pf for shifting UDP ports?

2025-04-18 Thread Mike
I don't think you can do that. Is your ISP blocking traffic or are you just doing this to see if you can? I just can't think of a use case for what you're trying to do and wondering if there could be a different way to achieve what you're trying to do. On Fri, Apr 18, 2025, 12:16 PM TSS wrote:

Re: pf configuration for virtual machine

2025-01-29 Thread 04-psyche . totter
I am now able to make it work, though it was through trial and errors, so I'll appreciate any help in understanding why my solution works! If my configuration is like this, it all works fine: block all pass out inet all keep state # Config to allow virtual Machine VMM to access the internet DNS

Re: pf configuration for virtual machine

2025-01-29 Thread Dave Voutila
04-psyche.tot...@icloud.com writes: > Hi all, > > I have setup a virtual machine on my openbsd box, following the guide > https://www.openbsd.org/faq/faq16.html#VMMnet > > I have trouble configuring pf to give the the VM access to the internet. > > If my /etc/pf.conf contains the following lines,

Re: PF Question/Help

2024-12-29 Thread Ricky Cintron
On 2024-12-29 10:14, Jon Fineman wrote: On Tue, Dec 24, 2024 at 06:42:49PM -0400, Ricky Cintron wrote: On 2024-12-24 08:27, Jon Fineman wrote: third sub net ($wired3) (10.0.3.x) I would like to restrict traffic between it and the ISP. Clients on 10.0.3.x should not be able to access the othe

Re: PF Question/Help

2024-12-29 Thread Jon Fineman
On Tue, Dec 24, 2024 at 06:42:49PM -0400, Ricky Cintron wrote: On 2024-12-24 08:27, Jon Fineman wrote: third sub net ($wired3) (10.0.3.x) I would like to restrict traffic between it and the ISP. Clients on 10.0.3.x should not be able to access the other sub nets. Some notes: - You wrote t

Re: PF Question/Help

2024-12-24 Thread Ricky Cintron
On 2024-12-24 08:27, Jon Fineman wrote: On Tue, Dec 24, 2024 at 02:26:18AM +0100, Markus Wernig wrote: On 12/23/24 19:31, Jon Fineman wrote: third sub net ($wired3) (10.0.3.x) I would like to restrict traffic between it and the ISP. Clients on 10.0.3.x should not be able to access the other s

Re: PF Question/Help

2024-12-24 Thread Jon Fineman
On Tue, Dec 24, 2024 at 02:26:18AM +0100, Markus Wernig wrote: On 12/23/24 19:31, Jon Fineman wrote: third sub net ($wired3) (10.0.3.x) I would like to restrict traffic between it and the ISP. Clients on 10.0.3.x should not be able to access the other sub nets. Take a look at the rules from y

Re: PF Question/Help

2024-12-23 Thread Markus Wernig
On 12/23/24 19:31, Jon Fineman wrote: third sub net ($wired3) (10.0.3.x) I would like to restrict traffic between it and the ISP. Clients on 10.0.3.x should not be able to access the other sub nets. Take a look at the rules from your pf.conf: > block out quick from $wired3 to { $wired1 $wire

Re: PF Firewall Rules

2024-11-11 Thread Страхиња Радић
Дана 24/11/11 10:13AM, Peter N. M. Hansteen написа: > or with G's trackers That's where ungoogled-chromium (thankfully available as an official package in OpenBSD) with uMatrix[1] addon come in handy. [1]: https://github.com/gorhill/uMatrix

Re: PF Firewall Rules

2024-11-11 Thread Peter N. M. Hansteen
On Mon, Nov 11, 2024 at 08:37:13AM +, Richard Bostrom wrote: > I would like to build a music server using samba, minidlna, navidrome, maybe > jellyfin. > I need to know the simple firewall rules to open up the firewall for inbound > traffic for samba, jellyfin etc. > > I am used to ufw. I do

Re: PF block traffic on Virtual Network. Bug?

2024-09-23 Thread Luca Di Gregorio
> > > > 1 - PF with the 'no state' rule should let the traffic flow, > it means that PF has a bug, or > 2 - PF behaves as expected and traffic must not flow, or > 3 - the 'no state' rule is the wrong rule to let the traffic flow. > If so, I ignore what rule should be used in /etc/pf.conf. >

Re: Pf congestion troubleshooting

2024-09-17 Thread Marc Boisis
Hi, thank you very much for your help, it was a NAS sending 4000pps of "arp who-as" to all of this clients. Marc > On 13 Sep 2024, at 12:16, Peter N. M. Hansteen wrote: > > Hi, > > As Tom mentioned, one of the least resource consuming ways to identify sources > and volumes of the traffic seen

Re: Pf congestion troubleshooting

2024-09-13 Thread Peter N. M. Hansteen
Hi, As Tom mentioned, one of the least resource consuming ways to identify sources and volumes of the traffic seen on or in and out of your network is to set up for pflow aka netflow sensors and collectors. Based on the data you collect you can then analyse and make decisions that hopefully refl

Re: Pf congestion troubleshooting

2024-09-13 Thread Tom Smyth
Hi Marc, are you saying you are experiencing congestion and you want to identify the source of the congestion? iftop and pftop can give information on the top talkers on your network, if you want to do more comprehensive and historical analysis check out Peter Handsteen(of Book of PF fame) h

Re: pf can't redirect outgoing traffic to localhost

2024-06-29 Thread Marcus MERIGHI
Hello whistlez, whistlez...@riseup.net (whistlez), 2024.06.20 (Thu) 02:49 (CEST): > I have sslsplit listening on 127.0.0.1 port 10443 and I want redirect > all my outgoing desktop web traffic to sslsplit, then localhost port > 10443. SSLSPLIT is just a kind of transparent proxy but cannot be use

Re: pf tables questions

2024-06-13 Thread Willy Manga
On 13/06/2024 14:51, Willy Manga wrote: Hi, On 12/06/2024 12:50, Kapetanakis Giannis wrote: Hi, [...] 2) I've found this tool yesterday (iprange) that it's job is to optimize large sets of IPs/Networks https://github.com/firehol/iprange/wiki I think that's why you have the 'tables' [1] str

Re: pf tables questions

2024-06-13 Thread Willy Manga
Hi, On 12/06/2024 12:50, Kapetanakis Giannis wrote: Hi, [...] 2) I've found this tool yesterday (iprange) that it's job is to optimize large sets of IPs/Networks https://github.com/firehol/iprange/wiki I think that's why you have the 'tables' [1] structure with pf 1. https://man.openbsd.org

Re: pf anchors attached to irrelevant states

2024-05-20 Thread Kapetanakis Giannis
On 19/05/2024 19:35, Kapetanakis Giannis wrote: > On 19/05/2024 14:37, Stuart Henderson wrote: >> On 2024-05-19, Kapetanakis Giannis wrote: >>> This is a bit strange. pf works normal, but rules after an enchor an >>> being attached to the anchor (somehow). >>> >>> All states that are created from

Re: pf anchors attached to irrelevant states

2024-05-19 Thread Markus Wernig
On 5/19/24 13:37, Stuart Henderson wrote: I can confirm this is a problem, definitely seen in 7.4, I can't remember if 7.3 was affected. 7.2 from Dec 22 seems ok. Yes, 7.3 is affected. It is the same problem reported here: https://marc.info/?l=openbsd-misc&m=168754952806369

Re: pf anchors attached to irrelevant states

2024-05-19 Thread Kapetanakis Giannis
On 19/05/2024 14:37, Stuart Henderson wrote: On 2024-05-19, Kapetanakis Giannis wrote: This is a bit strange. pf works normal, but rules after an enchor an being attached to the anchor (somehow). All states that are created from rules after the anchor, show the anchor (pf rule) number instead

Re: pf anchors attached to irrelevant states

2024-05-19 Thread Stuart Henderson
On 2024-05-19, Kapetanakis Giannis wrote: > This is a bit strange. pf works normal, but rules after an enchor an > being attached to the anchor (somehow). > > All states that are created from rules after the anchor, show the anchor > (pf rule) number instead of (only) the rule number in pfctl -v

Re: pf nat64 rule not matching

2024-03-15 Thread Evan Sherwood
> I don't think there is at present. There are no "only use v4" or "only > use v6" addresses modifiers, and pf isn't figuring out for itself that > it only makes sense to use addresses from the relevant family for > af-to translation addresses (although it _does_ do this for nat-to). Good to know.

Re: pf nat64 rule not matching

2024-03-15 Thread Stuart Henderson
On 2024-03-15, Evan Sherwood wrote: > > Is there a way to configure this without hard-coding my IPv4 address? > I do not think my IPv4 address from my ISP is static, thus my original > interest in the ($wan:0) form. I don't think there is at present. There are no "only use v4" or "only use v6" ad

Re: pf nat64 rule not matching

2024-03-15 Thread Evan Sherwood
> Try changing ($wan:0) to $(wan) and see what happens. Huh, that worked! Thanks!

Re: pf nat64 rule not matching

2024-03-15 Thread Lyndon Nerenberg (VE7TFX/VE6BBM)
Try changing ($wan:0) to $(wan) and see what happens.

Re: pf nat64 rule not matching

2024-03-15 Thread Evan Sherwood
> Can you try if the same happens with a more specific rule (for > testing)? > > i.e.: > > pass in on igc3 inet6 from "put actual v6 prefix here" to 64:ff9b::/96 > af-to inet from "actual IP on igc0"/32 This worked! Specifically, I think the ($wan:0) was the problem. I could've sworn I tried this

Re: pf nat64 rule not matching

2024-03-15 Thread Stuart Henderson via misc
On 2024-03-15, Tobias Fiebig via misc wrote: > > Moin, >>     # perform nat64 (NOT WORKING) >>     pass in to 64:ff9b::/96 af-to inet from ($wan:0) > > Can you try if the same happens with a more specific rule (for > testing)? > > i.e.: > > pass in on igc3 inet6 from "put actual v6 prefix here" to

Re: pf nat64 rule not matching

2024-03-15 Thread Tobias Fiebig via misc
Moin, >     # perform nat64 (NOT WORKING) >     pass in to 64:ff9b::/96 af-to inet from ($wan:0) Can you try if the same happens with a more specific rule (for testing)? i.e.: pass in on igc3 inet6 from "put actual v6 prefix here" to 64:ff9b::/96 af-to inet from "actual IP on igc0"/32 I am su

Re: pf queues

2023-12-01 Thread 4
> On Thu, Nov 30, 2023 at 03:55:49PM +0300, 4 wrote: >> >> "cbq can entirely be expressed in it" ok. so how do i set priorities for >> queues in hfsc for my local(not for a router above that knows nothing about >> my existence. tos is an absolutely unviable concept in the real world) >> pf-rout

Re: pf queues

2023-12-01 Thread Stuart Henderson
On 2023/12/01 15:57, 4 wrote: > >But CBQ doesn't help anyway, you still have this same problem. > the problem when both from below and from above can be told to you "go and > fuck yourself" can't be solved, but cbq gives us two mechanisms we need- > priorities and traffic restriction. nothing mor

Re: pf queues

2023-12-01 Thread 4
> On 2023-12-01, 4 wrote: >I don't know why you are going on about SMT here. i'm talking about not sacrificing functionality for the sake of hypothetical performance. the slides say that using queues degrades performance by 10%. and you're saying there won't be anything in the queues until an o

Re: pf queues

2023-12-01 Thread Marko Cupać
On Fri, 1 Dec 2023 04:56:40 +0300 4 wrote: > match proto icmp set prio(6 7) queue(6-fly 7-ack) > how is this supposed to work at all? i.e. packets are placed both in > prio's queues 6/7(in theory priorities and queues are the same > thing), and in hsfc's queues 6-fly/7-ack at once? I am not sure

Re: pf queues

2023-12-01 Thread Stuart Henderson
On 2023-12-01, 4 wrote: >> On 2023-11-30, 4 wrote: >>> we can simply calculate such a basic thing as the flow rate by dividing the >>> number of bytes in the past packets by the time. we can control the speed >>> through delays in sending packets. this is one side of the question. as for >>> t

Re: pf queues

2023-12-01 Thread 4
> On 2023-11-30, 4 wrote: >> we can simply calculate such a basic thing as the flow rate by dividing the >> number of bytes in the past packets by the time. we can control the speed >> through delays in sending packets. this is one side of the question. as for >> the sequence, priorities work h

Re: pf queues

2023-12-01 Thread Stuart Henderson
On 2023-11-30, 4 wrote: > we can simply calculate such a basic thing as the flow rate by dividing the > number of bytes in the past packets by the time. we can control the speed > through delays in sending packets. this is one side of the question. as for > the sequence, priorities work here. y

Re: pf queues

2023-11-30 Thread 4
> On Wed, 29 Nov 2023 00:12:02 +0300 > 4 wrote: >> i haven't used queues for a long time, but now there is a need. >> previously, queues had not only a hierarchy, but also a priority. now >> there is no priority, only the hierarchy exists. > It took me quite some time to wrap my head around this

Re: pf queues

2023-11-30 Thread 4
> On 11/29/23 6:47 PM, Stuart Henderson wrote: >> On 2023-11-29, Daniel Ouellet wrote: yes, all this can be make without hierarchy, only with priorities(because hierarchy it's priorities), but who and why decided that eight would be enough? the one who created cbq- he created it f

Re: pf queues

2023-11-30 Thread Marko Cupać
On Wed, 29 Nov 2023 00:12:02 +0300 4 wrote: > i haven't used queues for a long time, but now there is a need. > previously, queues had not only a hierarchy, but also a priority. now > there is no priority, only the hierarchy exists. It took me quite some time to wrap my head around this, having

Re: pf queues

2023-11-30 Thread David Dahlberg
On Thu, 2023-11-30 at 15:55 +0300, 4 wrote: > "cbq can entirely be expressed in it" ok. so how do i set priorities > for queues in hfsc You stack HFSC with link-share service curves with linkshare criterion 1:0 - or in pf.conf(5) terms: "bandwidth 1" and "bandwidth 0". Or you do not configure queu

Re: pf queues

2023-11-30 Thread Daniel Ouellet
On 11/29/23 6:47 PM, Stuart Henderson wrote: On 2023-11-29, Daniel Ouellet wrote: yes, all this can be make without hierarchy, only with priorities(because hierarchy it's priorities), but who and why decided that eight would be enough? the one who created cbq- he created it for practical t

Re: pf queues

2023-11-30 Thread 4
> On Thu, Nov 30, 2023 at 02:57:23PM +0300, 4 wrote: >> so what happened to cbq? why such the powerful and useful thing was removed? >> or Theo delete it precisely because it was too good for obsd? %D > Actually, the new queueing system was done by Henning, planned as far back > as (at least) 201

Re: pf queues

2023-11-30 Thread Peter N. M. Hansteen
On Thu, Nov 30, 2023 at 03:55:49PM +0300, 4 wrote: > > "cbq can entirely be expressed in it" ok. so how do i set priorities for > queues in hfsc for my local(not for a router above that knows nothing about > my existence. tos is an absolutely unviable concept in the real world) > pf-router? i d

Re: pf queues

2023-11-30 Thread 4
> On 2023-11-29, 4 wrote: >> here is a simple task, there are millions of such tasks. there is an >> internet connection, and although it is declared as symmetrical 100mbit >> it's 100 for download, but for upload it depends on the time of day, so >> we can forget about the channel width and focus

Re: pf queues

2023-11-30 Thread Peter N. M. Hansteen
On Thu, Nov 30, 2023 at 02:57:23PM +0300, 4 wrote: > so what happened to cbq? why such the powerful and useful thing was removed? > or Theo delete it precisely because it was too good for obsd? %D Actually, the new queueing system was done by Henning, planned as far back as (at least) 2012 (https

Re: pf queues

2023-11-30 Thread 4
so what happened to cbq? why such the powerful and useful thing was removed? or Theo delete it precisely because it was too good for obsd? %D

Re: pf queues

2023-11-29 Thread Stuart Henderson
On 2023-11-29, Daniel Ouellet wrote: >> yes, all this can be make without hierarchy, only with priorities(because >> hierarchy it's priorities), but who and why decided that eight would be >> enough? the one who created cbq- he created it for practical tasks. but this >> "hateful eight" and thi

Re: pf queues

2023-11-29 Thread Stuart Henderson
On 2023-11-29, 4 wrote: > here is a simple task, there are millions of such tasks. there is an > internet connection, and although it is declared as symmetrical 100mbit > it's 100 for download, but for upload it depends on the time of day, so > we can forget about the channel width and focus on th

Re: pf queues

2023-11-29 Thread Daniel Ouellet
yes, all this can be make without hierarchy, only with priorities(because hierarchy it's priorities), but who and why decided that eight would be enough? the one who created cbq- he created it for practical tasks. but this "hateful eight" and this "flat-earth"- i don't understand what use they

Re: pf queues

2023-11-29 Thread 4
> On Wed, Nov 29, 2023 at 12:12:02AM +0300, 4 wrote: >> i haven't used queues for a long time, but now there is a need. previously, >> queues had not only a hierarchy, but also a priority. now there is no >> priority, only the hierarchy exists. i was surprised, but i thought that >> this is qu

Re: pf queues

2023-11-28 Thread Peter N. M. Hansteen
On Wed, Nov 29, 2023 at 12:12:02AM +0300, 4 wrote: > i haven't used queues for a long time, but now there is a need. previously, > queues had not only a hierarchy, but also a priority. now there is no > priority, only the hierarchy exists. i was surprised, but i thought that this > is quite in t

Re: PF Rules for Dual Upstream Gateways

2023-11-23 Thread Stuart Henderson
On 2023-11-22, Ian Timothy wrote: > Hello, > > I have two ISPs where one connection is primary and the other is > low-bandwidth for temporary failover only. ifstated handles the failover by > simply changing the default gateway. But under normal conditions I want to be > able to connect via eit

Re: pf logging in ascii and send to remote syslog

2023-11-11 Thread Daniele B.
Thnx, this seems toasting better..

Re: pf logging in ascii and send to remote syslog

2023-11-11 Thread Zé Loff
On Sat, Nov 11, 2023 at 06:32:26PM +0100, Daniele B. wrote: > > "Peter N. M. Hansteen" wrote: > > > something like the good old > > https://home.nuug.no/~peter/pf/newest/log2syslog.html should still > > work, I think. > > > > - Peter > > > To disable pflogd completely what to you consider best

Re: pf logging in ascii and send to remote syslog

2023-11-11 Thread Daniele B.
"Peter N. M. Hansteen" wrote: > something like the good old > https://home.nuug.no/~peter/pf/newest/log2syslog.html should still > work, I think. > > - Peter To disable pflogd completely what to you consider best: ifconfig pflog0 down or pflogd_flags="-f /dev/null" = Daniele Bonini

Re: pf logging in ascii and send to remote syslog

2023-11-11 Thread Hrvoje Popovski
On 11.11.2023. 12:13, Stuart Henderson wrote: > On 2023-11-11, Peter N. M. Hansteen wrote: >> On Fri, Nov 10, 2023 at 08:23:54PM +0100, Hrvoje Popovski wrote: >>> what would be best way to log pf logs in ascii and sent it to remote >>> syslog ? I'm aware of pflow but I need ascii pf logs on remote

Re: pf logging in ascii and send to remote syslog

2023-11-11 Thread Stuart Henderson
On 2023-11-11, Peter N. M. Hansteen wrote: > On Fri, Nov 10, 2023 at 08:23:54PM +0100, Hrvoje Popovski wrote: >> what would be best way to log pf logs in ascii and sent it to remote >> syslog ? I'm aware of pflow but I need ascii pf logs on remote syslog >> server. > > something like the good old

Re: pf logging in ascii and send to remote syslog

2023-11-11 Thread Peter N. M. Hansteen
On Fri, Nov 10, 2023 at 08:23:54PM +0100, Hrvoje Popovski wrote: > what would be best way to log pf logs in ascii and sent it to remote > syslog ? I'm aware of pflow but I need ascii pf logs on remote syslog > server. something like the good old https://home.nuug.no/~peter/pf/newest/log2syslog.ht

Re: PF queue bandwidth limited to 32bit value

2023-09-16 Thread Andy Lemin
> On 15 Sep 2023, at 18:54, Stuart Henderson wrote: > > On 2023/09/15 13:40, Andy Lemin wrote: >> Hi Stuart, >> >> Seeing as it seems like everyone is too busy, and my workaround >> (not queue some flows on interfaces with queue defined) seems of no >> interest, > > well, it might be, but I

Re: PF queue bandwidth limited to 32bit value

2023-09-15 Thread Stuart Henderson
On 2023/09/15 13:40, Andy Lemin wrote: > Hi Stuart, > > Seeing as it seems like everyone is too busy, and my workaround > (not queue some flows on interfaces with queue defined) seems of no > interest, well, it might be, but I'm not sure if it will fit with how queues work.. > and my current hac

Re: PF queue bandwidth limited to 32bit value

2023-09-14 Thread Andy Lemin
Hi Stuart,Seeing as it seems like everyone is too busy, and my workaround (not queue some flows on interfaces with queue defined) seems of no interest, and my current hack to use queuing on Vlan interfaces is a very incomplete and restrictive workaround;Would you please be so kind as to provide me

Re: PF queue bandwidth limited to 32bit value

2023-09-14 Thread Andrew Lemin
On Thu, Sep 14, 2023 at 7:23 PM Andrew Lemin wrote: > > > On Wed, Sep 13, 2023 at 8:35 PM Stuart Henderson < > stu.li...@spacehopper.org> wrote: > >> On 2023-09-13, Andrew Lemin wrote: >> > I have noticed another issue while trying to implement a 'prio'-only >> > workaround (using only prio orde

Re: PF queue bandwidth limited to 32bit value

2023-09-14 Thread Andrew Lemin
On Wed, Sep 13, 2023 at 8:35 PM Stuart Henderson wrote: > On 2023-09-13, Andrew Lemin wrote: > > I have noticed another issue while trying to implement a 'prio'-only > > workaround (using only prio ordering for inter-VLAN traffic, and HSFC > > queuing for internet traffic); > > It is not possibl

Re: PF queue bandwidth limited to 32bit value

2023-09-14 Thread Andrew Lemin
On Wed, Sep 13, 2023 at 8:22 PM Stuart Henderson wrote: > On 2023-09-12, Andrew Lemin wrote: > > A, thats clever! Having bandwidth queues up to 34,352M would > definitely > > provide runway for the next decade :) > > > > Do you think your idea is worth circulating on tech@ for further > > di

Re: PF queue bandwidth limited to 32bit value

2023-09-13 Thread Stuart Henderson
On 2023-09-13, Andrew Lemin wrote: > I have noticed another issue while trying to implement a 'prio'-only > workaround (using only prio ordering for inter-VLAN traffic, and HSFC > queuing for internet traffic); > It is not possible to have internal inter-vlan traffic be solely priority > ordered w

Re: PF queue bandwidth limited to 32bit value

2023-09-13 Thread Stuart Henderson
On 2023-09-12, Andrew Lemin wrote: > A, thats clever! Having bandwidth queues up to 34,352M would definitely > provide runway for the next decade :) > > Do you think your idea is worth circulating on tech@ for further > discussion? Queueing at bps resolution is rather redundant nowadays, even

Re: PF queue bandwidth limited to 32bit value

2023-09-12 Thread Andrew Lemin
On Wed, Sep 13, 2023 at 3:43 AM Andrew Lemin wrote: > Hi Stuart. > > On Wed, Sep 13, 2023 at 12:25 AM Stuart Henderson < > stu.li...@spacehopper.org> wrote: > >> On 2023-09-12, Andrew Lemin wrote: >> > Hi all, >> > Hope this finds you well. >> > >> > I have discovered that PF's queueing is still

Re: PF queue bandwidth limited to 32bit value

2023-09-12 Thread Andrew Lemin
Hi Stuart. On Wed, Sep 13, 2023 at 12:25 AM Stuart Henderson wrote: > On 2023-09-12, Andrew Lemin wrote: > > Hi all, > > Hope this finds you well. > > > > I have discovered that PF's queueing is still limited to 32bit bandwidth > > values. > > > > I don't know if this is a regression or not. >

Re: PF queue bandwidth limited to 32bit value

2023-09-12 Thread Stuart Henderson
On 2023-09-12, Andrew Lemin wrote: > Hi all, > Hope this finds you well. > > I have discovered that PF's queueing is still limited to 32bit bandwidth > values. > > I don't know if this is a regression or not. It's not a regression, it has been capped at 32 bits afaik forever (certainly was like t

Re: pf state-table-induced instability

2023-08-31 Thread David Gwynne
On Thu, Aug 31, 2023 at 04:10:06PM +0200, Gabor LENCSE wrote: > Dear David, > > Thank you very much for all the new information! > > I keep only those parts that I want to react. > > > > It is not a fundamental issue, but it seems to me that during my tests not > > > only four but five CPU cores

Re: pf state-table-induced instability

2023-08-31 Thread Gabor LENCSE
Dear David, Thank you very much for all the new information! I keep only those parts that I want to react. It is not a fundamental issue, but it seems to me that during my tests not only four but five CPU cores were used by IP packet forwarding: the packet processing is done in kernel threads

Re: pf state-table-induced instability

2023-08-30 Thread David Gwynne
On Wed, Aug 30, 2023 at 09:54:45AM +0200, Gabor LENCSE wrote: > Dear David, > > Thank you very much for your detailed answer! Now I have got the explanation > for seemingly rather strange things. :-) > > However, I have some further questions. Let me explain what I do now so that > you can more c

Re: pf state-table-induced instability

2023-08-30 Thread Gabor LENCSE
Dear David, Thank you very much for your detailed answer! Now I have got the explanation for seemingly rather strange things. :-) However, I have some further questions. Let me explain what I do now so that you can more clearly see the background. I have recently enabled siitperf to use mul

Re: pf state-table-induced instability

2023-08-28 Thread David Gwynne
On Mon, Aug 28, 2023 at 01:46:32PM +0200, Gabor LENCSE wrote: > Hi Lyndon, > > Sorry for my late reply. Please see my answers inline. > > On 8/24/2023 11:13 PM, Lyndon Nerenberg (VE7TFX/VE6BBM) wrote: > > Gabor LENCSE writes: > > > > > If you are interested, you can find the results in Tables 18

Re: pf state-table-induced instability

2023-08-28 Thread Gabor LENCSE
Hi Lyndon, Sorry for my late reply. Please see my answers inline. On 8/24/2023 11:13 PM, Lyndon Nerenberg (VE7TFX/VE6BBM) wrote: Gabor LENCSE writes: If you are interested, you can find the results in Tables 18 - 20 of this (open access) paper: https://doi.org/10.1016/j.comcom.2023.08.009 Th

Re: pf state-table-induced instability

2023-08-24 Thread Daniel Melameth
On Thu, Aug 24, 2023 at 12:31 PM Lyndon Nerenberg (VE7TFX/VE6BBM) wrote: > For over a year now we have been seeing instability on our firewalls > that seems to kick in when our state tables approach 200K entries. > The number varies, but it's a safe bet that once we cross the 180K > threshold, the

Re: pf state-table-induced instability

2023-08-24 Thread Daniel Melameth
On Thu, Aug 24, 2023 at 2:57 PM Gabor LENCSE wrote: > I used OpenBSD 7.1 PF during stateful NAT64 benchmarking measurements > from 400,000 to 40,000,000 states. (Of course, its connection setup and > packet forwarding performance degraded with the number of states, but > the degradation was not ve

Re: pf state-table-induced instability

2023-08-24 Thread Lyndon Nerenberg (VE7TFX/VE6BBM)
Gabor LENCSE writes: > If you are interested, you can find the results in Tables 18 - 20 of > this (open access) paper: https://doi.org/10.1016/j.comcom.2023.08.009 Thanks for the pointer -- that's a very interesting paper. After giving it a quick read through, one thing immediately jumps out.

Re: pf state-table-induced instability

2023-08-24 Thread Gabor LENCSE
Hi, But my immediate (and only -- please do NOT start a bikeshed on ruleset design!) question is: Is there a practical limit on the number of states pf can handle? I used OpenBSD 7.1 PF during stateful NAT64 benchmarking measurements from 400,000 to 40,000,000 states. (Of course, its

Re: PF rate limiting options valid for UDP?

2023-07-20 Thread Otto Moerbeek
On Thu, Jul 20, 2023 at 05:52:07PM +, mabi wrote: > --- Original Message --- > On Wednesday, July 19th, 2023 at 10:58 PM, Stuart Henderson > wrote: > > > For rules that pass traffic to your authoritative DNS servers, > > I don't think you need much longer than the time taken to answ

Re: PF rate limiting options valid for UDP?

2023-07-20 Thread mabi
--- Original Message --- On Wednesday, July 19th, 2023 at 10:58 PM, Stuart Henderson wrote: > For rules that pass traffic to your authoritative DNS servers, > I don't think you need much longer than the time taken to answer a > query. So could be quite a bit less. Right good point, I wi

Re: PF rate limiting options valid for UDP?

2023-07-19 Thread Gabor LENCSE
Hi, Are you already using your DNS server's response rate limiting features? Not yet, as I still believe I should stop as much as possible such traffic at the firewall before it even reaches the network behind my firewall. So at the software/daemon/service level it would be my last line of de

Re: PF rate limiting options valid for UDP?

2023-07-19 Thread Stuart Henderson
On 2023/07/19 19:54, mabi wrote: > --- Original Message --- > On Wednesday, July 19th, 2023 at 9:32 PM, Stuart Henderson > wrote: > > > If PF is struggling as it is, there's a good chance it will buckle > > completely if it has to do source tracking too > > That is also something I thou

Re: PF rate limiting options valid for UDP?

2023-07-19 Thread mabi
--- Original Message --- On Wednesday, July 19th, 2023 at 9:32 PM, Stuart Henderson wrote: > If PF is struggling as it is, there's a good chance it will buckle > completely if it has to do source tracking too That is also something I thought might be the case :| > Did you already tweak

Re: PF rate limiting options valid for UDP?

2023-07-19 Thread Stuart Henderson
On 2023/07/19 19:13, mabi wrote: > --- Original Message --- > On Wednesday, July 19th, 2023 at 12:40 PM, Stuart Henderson > wrote: > > > I don't think you understood what I wrote then - they are the > > opposite of helpful here. > > No, I do understand what you wrote but I should have e

Re: PF rate limiting options valid for UDP?

2023-07-19 Thread mabi
--- Original Message --- On Wednesday, July 19th, 2023 at 12:40 PM, Stuart Henderson wrote: > I don't think you understood what I wrote then - they are the > opposite of helpful here. No, I do understand what you wrote but I should have explained my case in more details. Behind my Open

Re: PF rate limiting options valid for UDP?

2023-07-19 Thread Kapetanakis Giannis
On 19/07/2023 13:31, Stuart Henderson wrote: > On 2023-07-19, Kapetanakis Giannis wrote: >> Maybe even better, can it run under relayd (redirect) on top of carp? > That's just rdr-to behind the scenes, no problem with that, though if > you want to do per IP rate limiting alongside load-balancing

Re: PF rate limiting options valid for UDP?

2023-07-19 Thread Stuart Henderson
On 2023-07-19, mabi wrote: > --- Original Message --- > On Tuesday, July 18th, 2023 at 10:59 PM, Stuart Henderson > wrote: > > >> PF's state-tracking options are only for TCP. (Blocking an IP >> based on number of connections from easily spoofed UDP is a good >> way to let third parties

Re: PF rate limiting options valid for UDP?

2023-07-19 Thread Stuart Henderson
On 2023-07-19, Kapetanakis Giannis wrote: > On 18/07/2023 23:59, Stuart Henderson wrote: >> PF's state-tracking options are only for TCP. (Blocking an IP >> based on number of connections from easily spoofed UDP is a good >> way to let third parties prevent your machine from communicating >> with

Re: PF rate limiting options valid for UDP?

2023-07-19 Thread mabi
--- Original Message --- On Tuesday, July 18th, 2023 at 10:59 PM, Stuart Henderson wrote: > PF's state-tracking options are only for TCP. (Blocking an IP > based on number of connections from easily spoofed UDP is a good > way to let third parties prevent your machine from communicating

Re: PF rate limiting options valid for UDP?

2023-07-19 Thread Kapetanakis Giannis
On 18/07/2023 23:59, Stuart Henderson wrote: > PF's state-tracking options are only for TCP. (Blocking an IP > based on number of connections from easily spoofed UDP is a good > way to let third parties prevent your machine from communicating > with IPs that may well get in the way i.e. trigger a "

  1   2   3   4   5   6   7   8   9   10   >