Unbound cache default reset time for 404 or upstream failovers

2023-06-25 Thread Daniele Bonini


Hello,

As I already stated before on my machine I'm using Unbound
local cache mechanism with its pros and cons.
One of the few cons that I mentioned to you lately was the prb,
sometimes occurring of faulty sites configuration that entering in the
Unbound cache lock me out during my subsequent retries fixed
things as required..
Playing with a new website I now noticed that although I'm using
the default values for Unbound cache ttl settings the cache
after some hours of inactivity reset itself almost in the dns
entries with problems (404 or upstream failovers).. 
I just wonder if this is the expected behavior and if yes
if you can let me know the default reset time for this kind 
of "resets" ?
Using OpenBSD 7.2

Thnks a lot, appreciated!

-- 
Daniele Bonini



Re: Weird pf NAT failure on apu2

2023-06-25 Thread Stephan Neuhaus

On 6/24/23 13:14, Stuart Henderson wrote:

On 2023-06-24, Stephan Neuhaus  wrote:

I now think that either the documentation is wrong, or
pf is wrong.  At any rate, there seems to be a rather
serious disconnect between the two. The FAQ clearly
says:

When a packet is selected by a match rule, parameters (e.g. nat-to) in
that rule are remembered and are applied to the packet when a pass rule
matching the packet is reached.


Yes that's wrong. Address changes take effect at the time the match rule
is processed when traversing the ruleset; rules processed later "see"
the rewritten address. As pf.conf(5) says,


Translation
  Translation options modify either the source or destination address
  and port of the packets associated with a stateful connection.  pf(4)
  modifies the specified address and/or port in the packet and
  recalculates IP, TCP, and UDP checksums as necessary.

  If specified on a match rule, subsequent rules will see packets as
  they look after any addresses and ports have been translated.  These
  rules will therefore have to filter based on the translated address
  and port number.


OK, that's clear and unambiguous, thanks! So it's a bug in the FAQ, not 
in pf itself.


Cheers

Stephan



Re: error when pkg_add'ing

2023-06-25 Thread Marc Espie
On Sat, Jun 24, 2023 at 06:44:11PM +0200, Pau A.S. wrote:
> thanks so much, Marcus; pkg_check helped to identify a LOT of corrupted
> files, which I deleted; after that I ran pkg_add -vu and it looks that one
> file survived:

Having A LOTS of problems in pkg_check usually means something in your
process is REALLY BAD.

As the guy who wrote (most of) pkg_add/pkg_check, I don't need pkg_check
all that often.

And it's mostly because of flakiness in the base system!!!
if you end up fixing A LOT through pkg_check, it means
that SOMETHING ELSE is usually wrong.



PF: (max-src-conn 1, max-src-conn-rate 1/1, overload )

2023-06-25 Thread Maxim Bourmistrov


Hello, 
I’m not part of this maillist, so rply me directly if necessery.
(Sent this pf@ which seems do not exists any more)
 
Following is given in pf.conf:
 
### int
pass in on int from any to any keep state \
        (max-src-conn 1, max-src-conn-rate 1/1, overload  )
pass out on int from any to  keep state \
       (max-src-conn 1, max-src-conn-rate 1/1, overload  )
 
This ever slows down traffic or gives none at all.
Idea is to to track all IOT and connections.
PF ever take to long to process this or even refuses(time out).
 
Rest of rules are old enough to state that those are working.
Above is new modd I’d like to introduce. Not working.
 
Prev. rule: pass on int all keep state. ← working all good.
 
Any one seen this before.
 
Br
//mxb
 
 
--
Maxim
 
--
Maxim