Re: flow table format specifier rules (14.0)

2023-12-12 Thread Andrey V. Elsukov
add 6,2 0 ignored: 6,2 0 ipfw: Adding record failed: Invalid argument Hi, this is due to implementation. Internally a flow table depends from address family and thus you need to specify an address. -- WBR, Andrey V. Elsukov

Re: ipfw + bridge + epair + tags for vnet jails after upgrade to 13.1

2022-12-21 Thread Andrey V. Elsukov
this commit caused your problem https://reviews.freebsd.org/D32663 -- WBR, Andrey V. Elsukov OpenPGP_signature Description: OpenPGP digital signature

Re: NPTv6: prefix doesn't change in IPFW when prefix changes on dynamic interface

2022-11-24 Thread Andrey V. Elsukov
deprecated addresses from an interface. Then NPTv6 module will use first global prefix on the interface. -- WBR, Andrey V. Elsukov OpenPGP_signature Description: OpenPGP digital signature

Re: Throughput extremely decreases when IPFW 7000 mac based rules activated

2021-08-16 Thread Andrey V. Elsukov
ut for layer3 IP matching, not for layer2 MAC matching. We have a patch that adds ability to keep MAC addresses in the tables. I hope we will push it into upstreem soon. -- WBR, Andrey V. Elsukov OpenPGP_signature Description: OpenPGP digital signature

Re: is there a way to Port DragonflyBSD's IPFW3 to FreeBSD

2021-07-30 Thread Andrey V. Elsukov
SD's ipfw, than doing porting ipfw from DragonFly. But you can try :) -- WBR, Andrey V. Elsukov OpenPGP_signature Description: OpenPGP digital signature

Re: Lookup tables with dst-port as argument

2021-01-20 Thread Andrey V. Elsukov
red behavior? Hi, it seems you need to take alook at the 'lookup dst-port tablename' opcode. -- WBR, Andrey V. Elsukov ___ freebsd-ipfw@freebsd.org mailing list https://lists.freebsd.org/mailman/listinfo/freebsd-ipfw To unsubscribe, send any mail to "freebsd-ipfw-unsubscr...@freebsd.org"

Re: Rule optimization

2020-03-24 Thread Andrey V. Elsukov
I included. Hi, I think for 3 interfaces you will not see some noticeable difference, but when number of interfaces in the table will grow to tens or hundreds, it will work much better than the plain list of the rules. -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: nat64lsn first hop in traceroute has a source ip of the final host

2019-11-27 Thread Andrey V. Elsukov
On 26.11.2019 11:31, Marco van Tol wrote: > Did you find the time to look further into this? > If not I understand, no problem. > > Let me know if there's anything I can do to help. Hi, I'm sorry for the delay, I'll try to finish the patch at this weekend :) -- WBR, Andre

Re: nat64lsn first hop in traceroute has a source ip of the final host

2019-11-06 Thread Andrey V. Elsukov
rt to be coming from the router IP on > the first hop? > > Thank you very much in advance! Hi, I think I know where is the problem, I'll try to make the patch at the weekend. -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: Look for an ipfw example using NPTv6

2019-06-21 Thread Andrey V. Elsukov
e internal network, and use NPTv6 with "ext_if external_ifname" option. It will automatically use configured on the external interface prefix. This feature is available in stable/12+. -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: Look for an ipfw example using NPTv6

2019-06-19 Thread Andrey V. Elsukov
with such prefix. > Are you saying NPTv6 cannot rewrite a LL prefix to a public prefix, such > as the one held on the external interface? Yes. Link-local address must belong to the single "link", IPv6 scoped addresses architecture doesn't allow forward packets with link-local

Re: Look for an ipfw example using NPTv6

2019-06-19 Thread Andrey V. Elsukov
ateful. Thanks. NPTv6 module is targeted to translate routed traffic. IPv6 link-local addresses are not forward-able. Thus you can not configure nptv6 instance with such prefix. -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: ipfw: switching sets does stall the machine

2019-06-16 Thread Andrey V. Elsukov
ut the next rule for states that don't stop packet processing is the last rule. This is probably will not fit your requirements. -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: Patch to have ipfw0 work properly in jails

2019-02-12 Thread Andrey V. Elsukov
firewall_logif is set in rc.conf Hi, for what purpose do you use ipfw0? Running tcpdump and logger looks very ugly. -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: Dummynet + PF

2019-02-09 Thread Andrey V. Elsukov
d be required to make dummynet work with PF? Currently, > dummynet depends on IPFW, so I guess decoupling is one of the tasks? Hi, I think it doesn't really depend from ipfw, you can just remove this dependency from ip_dummynet.c. -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: ipfw -N show

2018-12-11 Thread Andrey V. Elsukov
/sbin/ipfw all install -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: ipfw -N show

2018-12-11 Thread Andrey V. Elsukov
ate->proto = IPPROTO_IPV6; >} > >static int > > > unfortunately, ipfw -N show still doesn't print the protocols: > > 00800 0 0 allow tcp from any to x.x.x.x 443 in recv bce0 > Did you reinstall the patched version of ipfw(8)? # ipfw add count tcp from any to ya.ru 443 out xmit lagg0 00100 count tcp from any to 87.250.250.242 443 out xmit lagg0 # ipfw -N show 100 00100 0 0 count tcp from any to ya.ru https out xmit lagg0 -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: ipfw -N show

2018-12-10 Thread Andrey V. Elsukov
ly some of latest patches from this commit log to your source code and then test. -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: Configuring IPv6 on jails

2018-10-30 Thread Andrey V. Elsukov
only in head/ yet. > > Would be nice! I’m on 12-STABLE. Hi, I published the patch: https://reviews.freebsd.org/D17765 For stable/12 you need to apply patch from r339537: https://reviews.freebsd.org/D17100 -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: Configuring IPv6 on jails

2018-10-29 Thread Andrey V. Elsukov
t; the external IPv4 address) Hi, I think I can add this feature to ipfw_nptv6 module, but I need some spare time to implement it. If you are interested, I'll send the patch to you later. What version do you use? I suspect the patch will use some features, that are present only in head/

Re: net.inet.ip.fw.dyn_keep_states (was: ipfw managing rules - best practice?)

2018-10-25 Thread Andrey V. Elsukov
"keep-state" or "limit" opcodes), this means that new rules will initiate the search in dynamic states, and for existing connection the state will be updated and because of this, the connection is still work. -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: ipfw managing rules - best practice?

2018-10-24 Thread Andrey V. Elsukov
want to test some patches, you can try :) I tried to apply the patch and observed that stable/11 has a small difference in UMA code, so you need to use this patch: https://people.freebsd.org/~ae/keep_states11.diff Again, I did not yet teseted it widely, and on stable/11 did not tested at all

Re: ipfw managing rules - best practice?

2018-09-05 Thread Andrey V. Elsukov
ke it working. I plan to reimplement this feature to be more useful and work with any rules, and not only with "allow" rules. -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: ipfw uid/gid debugging, tcpdump relation with ipfw and how to block direct access to port 25

2018-07-08 Thread Andrey V. Elsukov
s not sent out,but > dropped on the ipfw by the last deny rule). Seems like the packet how do you test this? > sent by sendmail doesn't belong to snmmsp group. I have tried gid > operator gid mail gid smmsp gid wheel - won't help. How to debug? -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: In-kernel NAT [ipfw] dropping large UDP return packets

2018-06-13 Thread Andrey V. Elsukov
(len <= MJUM9BYTES) mcl = m_getjcl(M_NOWAIT, MT_DATA, M_PKTHDR, MJUM9BYTES); else if (len <= MJUM16BYTES) mcl = m_getjcl(M_NOWAIT, MT_DATA, M_PKTHDR, MJUM16BYTES); else goto bad; -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: In-kernel NAT [ipfw] dropping large UDP return packets

2018-06-13 Thread Andrey V. Elsukov
reater than 4k, ipfw_nat() function will drop this packet. -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: Matching rules on ip4/ip6 with udp/tcp

2018-06-06 Thread Andrey V. Elsukov
22 in recv em0 not proto ip6 ipfw add 1 allow ip6 from any to me 22 in recv em0 proto tcp -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: Missing sysctl net.inet.ip.fw.dyn_keep_states on FreeBSD 11.2

2018-05-20 Thread Andrey V. Elsukov
in 11.2-STABLE and 12.0-RELEASE. I'm sorry about that. -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: removing some error states

2018-05-03 Thread Andrey V. Elsukov
t submit PR or patch, if you don't like some. Due to huge difference between old tables and what we have now, it is not always possible for one man to test all old features and properly merge them with new features. -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: IPFW and FTP client behind NAT

2018-02-15 Thread Andrey V. Elsukov
ermine the value that will be enough for this host. For example, set it to 250, 200, 150, 100. -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: FreeBSD11 ipfw sets.

2018-02-13 Thread Andrey V. Elsukov
should be fixed in freebsd11-stable. https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=224555 -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: ipfw: manpage: semantics of "receive" and "xmit" interfaces

2018-01-09 Thread Andrey V. Elsukov
n, now for outbound direction. And it can be matched by "out" and "xmit ed1" opcodes. The opcode "recv ed0" still can be matched too, but "in" opcode will not matched. A packet destined for local host is consumed by local IP stack and will not forwarded.

Re: ipfw pipe show yields "REDZONE: Buffer overflow detected..."

2017-12-20 Thread Andrey V. Elsukov
ses, but they are associated with the commands -- this is trivially > reproducible (for me, anyway). It would be nice if you created PR where you described steps to reproduce this. Your kernel/modules config, commands you used to get this result. -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: ipfw kernel NAT performance much worse in 11-Stable than 10-Stable

2017-08-31 Thread Andrey V. Elsukov
<PERFORMNUD,IFDISABLED,AUTO_LINKLOCAL> > You need to disable TSO on your interface, ipfw nat is not compatible with TCP segmentation offloading (this is noted in ipfw(8) BUGS section). Try to use: ifconfig igb1 -vlanhwtso -tso4 You can add these option to "ifconfig_igb1" variabl

Re: ipfw kernel NAT performance much worse in 11-Stable than 10-Stable

2017-08-31 Thread Andrey V. Elsukov
On 31.08.2017 13:01, Andrey V. Elsukov wrote: >> Does anybody please have any ideas on this, please? > > Can you show the output of `ifconfig igb1 | grep flags` on stable/10 and > stable/11? Sorry, I wanted to write `ifconfig igb1 | grep options`. -- WBR, Andrey V. Elsukov

Re: ipfw kernel NAT performance much worse in 11-Stable than 10-Stable

2017-08-31 Thread Andrey V. Elsukov
X: > nat 1 ip4 from any to any via igb1 > > I can provide the full set of rules if needed, but I think only those > two lines are relevant. > > Does anybody please have any ideas on this, please? Can you show the output of `ifconfig igb1 | grep flags` on stab

Re: Named states in ipfw (and old rulesets)

2016-08-14 Thread Andrey V. Elsukov
p from any to any // Allowed local services > - common block > > So, yes, comment is lost! It looks it never worked due to "goto done" in the code. -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: names for limit states?

2016-08-14 Thread Andrey V. Elsukov
On 14.08.16 15:04, Lev Serebryakov wrote: > Hello Ae, > > Looks like you didn't add names support for states with limits? Why? For me it looks like I did that. Why would you think differently? :) -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: IPFW: more "orthogonal? state operations, push into 11?

2016-08-04 Thread Andrey V. Elsukov
eated this rule :) -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: IPFW: more "orthogonal? state operations, push into 11?

2016-08-04 Thread Andrey V. Elsukov
similar, that was described by Lev. -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: IPFW: more "orthogonal? state operations, push into 11?

2016-08-03 Thread Andrey V. Elsukov
On 03.08.16 22:07, Lev Serebryakov wrote: > On 03.08.2016 21:03, Andrey V. Elsukov wrote: > >>> 1/ ability to use keep-state without an implicit check-state. <--- most >>> important for me. (store-state)? >>> 2/ ability to keep-state without actually doin

Re: your thoughts on a particualar ipfw action.

2016-08-02 Thread Andrey V. Elsukov
ablearg skipto is very inefficient. It's also a hard thing to set up > with a set of rules for each country (how many countries are there in > the internet allocation system?). You can build ipfw with enabled LINEAR_SKIPTO and use the same rules for most countries. -- WBR, Andrey V. Elsukov signat

Re: Significant missing item in 11.0 release notes

2016-08-01 Thread Andrey V. Elsukov
c tables will be created automatically (with warning). -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: Strange printing of rule with "unreach6" action

2016-07-19 Thread Andrey V. Elsukov
emoved) > > unreach6 address16005 80 5574 ip6 from any to 2001:4de0:ac10::1:1:14 I think it should be fixed after r297981. -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: ALPHA3 panic with ipfw+dummynet and gif/gre tunnels

2016-06-17 Thread Andrey V. Elsukov
Hi, this is known issue. https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=209466 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=162558 It looks the same, but for IPv6. -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: IPFW: more "orthogonal? state operations, push into 11?

2016-06-15 Thread Andrey V. Elsukov
s://reviews.freebsd.org/D6674 Also I reworked Lev's patch on top of my patch and made it simpler: https://reviews.freebsd.org/D1776#143557 -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: IPFW: more "orthogonal? state operations, push into 11?

2016-06-10 Thread Andrey V. Elsukov
iggers this opcode. So, you introduced new implicit behavior while thinking that resolve old wrong behavior. -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: IPFW: more "orthogonal? state operations, push into 11?

2016-06-08 Thread Andrey V. Elsukov
understand - beyond descriptions in > the abstract case; ie an actual working dual- or multi-flow example. > > I know these are "just doc" issues of little importance while testing > working code, and I haven't supplied any patches, so are just FWIW .. Will try to implement support for limit rules and update man. Thanks. -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: IPFW: more "orthogonal? state operations, push into 11?

2016-06-07 Thread Andrey V. Elsukov
ld be branched. -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: IPFW: more "orthogonal? state operations, push into 11?

2016-06-06 Thread Andrey V. Elsukov
deferred action looks too hackish to me. With the following patch you will be able create two different states, I think, and solve your task with NAT and dynamic rules: https://reviews.freebsd.org/D6674 -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: [RFC] ipfw named states support

2016-05-30 Thread Andrey V. Elsukov
On 30.05.16 07:56, Julian Elischer wrote: > On 18/05/2016 10:46 PM, Andrey V. Elsukov wrote: >> Hi All, >> >> We have the patch that adds named states support to ipfw. > > like it and have wished for this for along time > this allows per-interface state. Can stat

[RFC] ipfw named states support

2016-05-18 Thread Andrey V. Elsukov
isting rulesets. Probably, we can add some mandatory prefix to state name, e.g. ':'. -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: IPv6 NAT

2016-04-30 Thread Andrey V. Elsukov
oo. Hi, we have implemented IPv6 NPT (RFC 6296) and basic NAT64 (stateless and statefull) for ipfw. Currently we are preparing to commit them into FreeBSD head/. I hope I'll do this in several weeks before 11.0 freeze. -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: panic: refcount inconsistency: found: 0 total: 1

2015-11-03 Thread Andrey V. Elsukov
age. -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: proxy_rule is missing in kernel nat?

2015-09-28 Thread Andrey V. Elsukov
it looks like proxy_rule was forgotten when it was ported. -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: chnage source of IPFW

2015-06-01 Thread Andrey V. Elsukov
, you need to modify ip_fw_sockopt.c:check_ipfw_rule_body() function. -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: reass all from any to any kills IPv6 packets

2015-03-05 Thread Andrey V. Elsukov
? Both :) Hit this bug several years ago, seems it is still here AFAIR, I made the patch for such PR, but nobody wanted to test it :) https://people.freebsd.org/~ae/ipfw_ip6reass.diff Probably now I can test it myself a bit later. -- WBR, Andrey V. Elsukov signature.asc Description

Re: net.inet{,6}.fw.enable in /etc/rc

2014-09-22 Thread Andrey V. Elsukov
before running rc.d scripts at boot time, and enables it again in rc.d/ipfw script. Hi, I think this should be configurable, the change can be an unexpected for someone. -- WBR, Andrey V. Elsukov ___ freebsd-ipfw@freebsd.org mailing list http

Re: how does it pass in the rule sets

2014-04-21 Thread Andrey V. Elsukov
) functions to interact with kernel. In particular, do_cmd() function from ipfw2.c does it. -- WBR, Andrey V. Elsukov ___ freebsd-ipfw@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-ipfw To unsubscribe, send any mail to freebsd

Re: IPFW fwd not working after upgrade from 9.2 to 10.0

2014-02-06 Thread Andrey V. Elsukov
, which I'd like to use for responses to connections coming on on vtnet1. Under 9.2, the below worked fine: Hi, you can apply this patch: http://svnweb.freebsd.org/base?view=revisionrevision=260702 -- WBR, Andrey V. Elsukov ___ freebsd-ipfw@freebsd.org

Re: IPFW fwd not working after upgrade from 9.2 to 10.0

2014-02-06 Thread Andrey V. Elsukov
On 06.02.2014 12:31, Andrey V. Elsukov wrote: On 06.02.2014 04:08, John Nielsen wrote: I have been using IPFW FWD to do per-interface routing on a VM instance. The default gateway is on interface vtnet0, but there is a second interface, vtnet1, on a different network with its own public IP

[RFC] Enabling IPFIREWALL_FORWARD in run-time

2012-10-19 Thread Andrey V. Elsukov
/pfil_forward.diff Also we have done some tests with the ixia traffic generator connected via 10G network adapter. Tests have show that there is no visible difference, and there is no visible performance degradation. Any objections? -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP

Re: [RFC] Enabling IPFIREWALL_FORWARD in run-time

2012-10-19 Thread Andrey V. Elsukov
is undesirable, because we can have kernel without ipfw. So, i decided to choose pfil, because it could not work without pfil. -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: IPFW tables trouble

2012-05-16 Thread Andrey V. Elsukov
:/usr/obj/usr/src/sys/GENERIC amd64 Hi, Can you try update your 9.0-STABLE and test it again? There were some changes related to tables. -- WBR, Andrey V. Elsukov ___ freebsd-ipfw@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd

Re: ipfw features

2011-10-25 Thread Andrey V. Elsukov
On 25.10.2011 17:19, Серега Гончаров wrote: Hi all. Is there some plans to make ipfw can change ip header fields of going throught packets, like TTL, DF flag etc. pf and iptables can, so maybe in freebsd 9 it will be implemented? thanks. You can use ng_patch(4) for that. -- WBR, Andrey V

Re: fwd in ipfw module

2011-08-03 Thread Andrey V. Elsukov
On 03.08.2011 14:28, timp wrote: Do you know solution (for GENERIC kernel) that can port forwarding? I found /usr/ports/net/rinetd You can use pf(4). -- WBR, Andrey V. Elsukov ___ freebsd-ipfw@freebsd.org mailing list http://lists.freebsd.org

Re: ipfw fwd on FreeBSD 8.1, does it work?

2011-07-05 Thread Andrey V. Elsukov
does not work when ipfw loaded as module. -- WBR, Andrey V. Elsukov signature.asc Description: OpenPGP digital signature

Re: kern/131817: [ipfw] blocks layer2 packets that should not be blocked

2011-07-01 Thread Andrey V. Elsukov
The following reply was made to PR kern/131817; it has been noted by GNATS. From: Andrey V. Elsukov a...@freebsd.org To: bug-follo...@freebsd.org, eu...@grosbein.pp.ru Cc: Subject: Re: kern/131817: [ipfw] blocks layer2 packets that should not be blocked Date: Fri, 01 Jul 2011 12:56:14 +0400

Re: kern/157379: [ipfw] mtr does not work if I use ipfw nat

2011-06-06 Thread Andrey V. Elsukov
The following reply was made to PR kern/157379; it has been noted by GNATS. From: Andrey V. Elsukov a...@freebsd.org To: bug-follo...@freebsd.org, kes-...@yandex.ru Cc: Subject: Re: kern/157379: [ipfw] mtr does not work if I use ipfw nat Date: Mon, 06 Jun 2011 09:51:09 +0400 Hi, Can you

Re: kern/148157: [ipfw] IPFW in kernel nat BUG found in FreeBSD 8.1-PRERELEASE

2011-05-31 Thread Andrey V. Elsukov
The following reply was made to PR kern/148157; it has been noted by GNATS. From: Andrey V. Elsukov a...@freebsd.org To: bug-follo...@freebsd.org, poo...@hotmail.com, Vladislav Yershov vyers...@umc.com.ua Cc: Subject: Re: kern/148157: [ipfw] IPFW in kernel nat BUG found in FreeBSD 8.1

Re: kern/150798: [ipfw] ipfw2 fwd rule matches packets but does not do the job in fact.

2011-05-30 Thread Andrey V. Elsukov
The following reply was made to PR kern/150798; it has been noted by GNATS. From: Andrey V. Elsukov a...@freebsd.org To: bug-follo...@freebsd.org, a...@holymail.biz Cc: Subject: Re: kern/150798: [ipfw] ipfw2 fwd rule matches packets but does not do the job in fact. Date: Mon, 30 May 2011 15:37

Re: kern/147720: [ipfw] ipfw dynamic rules and fwd

2011-05-30 Thread Andrey V. Elsukov
The following reply was made to PR kern/147720; it has been noted by GNATS. From: Andrey V. Elsukov a...@freebsd.org To: bug-follo...@freebsd.org, dima_...@inbox.lv Cc: Subject: Re: kern/147720: [ipfw] ipfw dynamic rules and fwd Date: Mon, 30 May 2011 15:37:52 +0400 Hi, Can you test

Re: kern/147720: [ipfw] ipfw dynamic rules and fwd

2011-05-29 Thread Andrey V. Elsukov
The following reply was made to PR kern/147720; it has been noted by GNATS. From: Andrey V. Elsukov bu7c...@yandex.ru To: bug-follo...@freebsd.org, dima_...@inbox.lv Cc: Subject: Re: kern/147720: [ipfw] ipfw dynamic rules and fwd Date: Sun, 29 May 2011 14:41:03 +0400 This is an OpenPGP/MIME

Re: bin/156653: ipfw(8) reports missing file as parameter problem

2011-05-02 Thread Andrey V. Elsukov
The following reply was made to PR bin/156653; it has been noted by GNATS. From: Andrey V. Elsukov bu7c...@yandex.ru To: bug-follo...@freebsd.org, jcl...@speakeasy.net Cc: Subject: Re: bin/156653: ipfw(8) reports missing file as parameter problem Date: Mon, 02 May 2011 15:59:16 +0400 Hi

Re: kern/144869: [ipfw] [panic] Instant kernel panic when adding NAT rules using ipfw on em interfaces

2010-08-17 Thread Andrey V. Elsukov
The following reply was made to PR kern/144869; it has been noted by GNATS. From: Andrey V. Elsukov a...@freebsd.org To: Ildar Hizbulin hi...@vyborg.ru Cc: bug-follo...@freebsd.org, freebsd-ipfw@freebsd.org Subject: Re: kern/144869: [ipfw] [panic] Instant kernel panic when adding NAT rules using

Re: kern/144869: [ipfw] [panic] Instant kernel panic when adding NAT rules using ipfw on em interfaces

2010-08-17 Thread Andrey V. Elsukov
it was merged to stable/8 with r211241. -- WBR, Andrey V. Elsukov ___ freebsd-ipfw@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-ipfw To unsubscribe, send any mail to freebsd-ipfw-unsubscr...@freebsd.org

Re: svn commit: r200855 - in head/sys: net netgraph netinet netinet/ipfw

2010-02-12 Thread Andrey V. Elsukov
sets enabled, because IP_FW_GET command gets small buffer and after calculating wanted size it returns back without copying anything. -- WBR, Andrey V. Elsukov ___ freebsd-ipfw@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd

Re: kern/80642: [ipfw] [patch] ipfw small patch - new RULE OPTION

2008-07-09 Thread Andrey V. Elsukov
Paolo Pisati wrote: add packet counter as well. That's all possible with one opcode, though... if anyone post an updated patch, i'll commit it. Hi, Paolo. Any progress in this? I updated patch: http://butcher.heavennet.ru/patches/kernel/ipfw/ipfw_counterlimit.diff -- WBR, Andrey V

Re: tablearg q'n

2008-06-01 Thread Andrey V. Elsukov
rihad wrote: ipfw add pipe tablearg ip from 'table(0)' to 'table(1)' Which of the two tables will tablearg come from? Last 'table' argument will be used for tablearg. Any way to make the choice explicit? Patches are welcome =) -- WBR, Andrey V. Elsukov

Re: how much memory does increasing max rules for IPFW take up?

2008-05-15 Thread Andrey V. Elsukov
-allocated, or is it a static memory buffer? Each dynamic rule allocated dynamically. Be careful, too many dynamic rules will work very slow. -- WBR, Andrey V. Elsukov ___ freebsd-ipfw@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo

Re: how much memory does increasing max rules for IPFW take up?

2008-05-15 Thread Andrey V. Elsukov
which may return a false positive, bloomier filters are a refinement which tries to limit the false positives. There were some ideas from Vadim Goncharov about rewriting dynamic rules implementation.. -- WBR, Andrey V. Elsukov ___ freebsd-ipfw

Re: Syntax base IP

2008-05-06 Thread Andrey V. Elsukov
, Andrey V. Elsukov ___ freebsd-ipfw@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-ipfw To unsubscribe, send any mail to [EMAIL PROTECTED]

Re: kern/123174: [ipfw] table add value lists as ip/uint16 instead of uint32.

2008-04-28 Thread Andrey V. Elsukov
list # ifpw -n nat 1 show and probably others command which didn't use `test_only` flag. -- WBR, Andrey V. Elsukov ___ freebsd-ipfw@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-ipfw To unsubscribe, send any mail to [EMAIL

Re: addition to ipfw table..

2008-04-17 Thread Andrey V. Elsukov
? -- WBR, Andrey V. Elsukov Index: src/sbin/ipfw/ipfw2.c === RCS file: /ncvs/src/sbin/ipfw/ipfw2.c,v retrieving revision 1.118 diff -u -p -r1.118 ipfw2.c --- src/sbin/ipfw/ipfw2.c 27 Feb 2008 13:52:33 - 1.118 +++ src/sbin

Re: kern/80642: [ipfw] [patch] ipfw small patch - new RULE OPTION

2008-03-18 Thread Andrey V. Elsukov
as extension to current O_LIMIT opcode or something similar. Also i have question about my current implementation. Does it needed to have ability of humanized printing of limits, which was implemented before? -- WBR, Andrey V. Elsukov ___ freebsd-ipfw

Re: kern/80642: [ipfw] [patch] ipfw small patch - new RULE OPTION

2008-03-18 Thread Andrey V. Elsukov
IP addresses (currently I'm overlaying it on 32 bit ints) IPV6 addresses. skipto locations byte limits.. Yes, i agree. As I remember, we already talked about this some time ago. -- WBR, Andrey V. Elsukov ___ freebsd-ipfw@freebsd.org mailing list http

Re: kern/121122: [ipfw] [patch] add support to ToS IP PRECEDENCE fields

2008-02-26 Thread Andrey V. Elsukov
://www.freebsd.org/cgi/query-pr.cgi?pr=kern/103454 I added to CC several men who are active in ipfw area. It will be interested what you think about this? -- WBR, Andrey V. Elsukov ___ freebsd-ipfw@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo

Re: disabling syslog messages?

2007-12-26 Thread Andrey V. Elsukov
or by the kernel itself. I _could_ work around the issue by piping the ipfw: messages to /dev/null in syslogd, but there might be a cleaner solution? If you don't use `ipfw log ...` rules you can reset sysctl variable net.inet.ip.fw.verbose to 0 and these messages will not be logged. -- WBR, Andrey V

Re: bin/113803: [patch] bin/ipfw.8 - don't get bitten by the fwd rule

2007-10-07 Thread Andrey V. Elsukov
) will be good. -- WBR, Andrey V. Elsukov ___ freebsd-ipfw@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-ipfw To unsubscribe, send any mail to [EMAIL PROTECTED]

Re: bin/116458: [ipfw]: Logging problems with syslog and ipfw an 6.2.REL-p5

2007-09-19 Thread Andrey V. Elsukov
is not related to the ipfw. But you can try this patch: http://people.yandex-team.ru/~sem/FreeBSD/kernel/log_mutex.diff Please, report back if it will help you. -- WBR, Andrey V. Elsukov ___ freebsd-ipfw@freebsd.org mailing list http://lists.freebsd.org/mailman

Re: dummynet / ipfw2: panic, double fault

2007-09-03 Thread Andrey V. Elsukov
Hi, I got a trace for this fault. dummynet reinject packet to the ip_input through netisr_dispath. This procedure was done success several times, but in the next time it's fault. (kgdb) p ipfw_chk $1 = (int (*)(struct ip_fw_args *)) 0xc3374ea0 ipfw_chk (kgdb) l *(0xc3374ea0+0x16) 0xc3374eb6 is

Re: ipfw2 deep packet filtering

2007-08-30 Thread Andrey V. Elsukov
? There is no way to discover this information. Maybe, you can parse some specific protocols that contain a MAC addresses within packets. But this is hard and don't give a 100% results. The right way, IMHO, is an VPN-connections between Wireless clients and FreeBSD server. -- WBR, Andrey V

Re: bin/115372: [ipfw]: ipfw show prints ill result.

2007-08-10 Thread Andrey V. Elsukov
The following reply was made to PR bin/115372; it has been noted by GNATS. From: Andrey V. Elsukov [EMAIL PROTECTED] To: [EMAIL PROTECTED], [EMAIL PROTECTED] Cc: Maxim Konovalov [EMAIL PROTECTED], Oleg Bulyzhin [EMAIL PROTECTED] Subject: Re: bin/115372: [ipfw]: ipfw show prints ill result

Re: skipto bug

2007-06-12 Thread Andrey V. Elsukov
. The number 65535 is reserved for the tablearg. -- WBR, Andrey V. Elsukov ___ freebsd-ipfw@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-ipfw To unsubscribe, send any mail to [EMAIL PROTECTED]

[ipfw][patch] manipulation with rules within a specified sets

2007-05-29 Thread Andrey V. Elsukov
for implement a delete rules by template (text of rule), like a cisco-way (no some command). What you think about that? -- WBR, Andrey V. Elsukov ___ freebsd-ipfw@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-ipfw

Re: kern/112708: ipfw is seems to be broken to limit number of connections

2007-05-17 Thread Andrey V. Elsukov
The following reply was made to PR kern/112708; it has been noted by GNATS. From: Andrey V. Elsukov [EMAIL PROTECTED] To: [EMAIL PROTECTED], [EMAIL PROTECTED] Cc: Subject: Re: kern/112708: ipfw is seems to be broken to limit number of connections Date: Thu, 17 May 2007 16:42:16 +0400 Hi

Re: Problem applying TOS/DSCP patch in 6.2 RELEASE

2007-05-07 Thread Andrey V. Elsukov
Jim Sifferle wrote: Am I missing some intermediate steps? Thanks for any help... You can try to make with DEBUG_FLAGS=-I/usr/src/sys or replace header /usr/include/netinet/ip_fw.h with patched /usr/src/sys/netinet/ip_fw.h -- WBR, Andrey V. Elsukov

Re: kern/107305: [ipfw] ipfw fwd doesn't seem to work

2007-04-27 Thread Andrey V. Elsukov
Julian Elischer wrote: This was fixed in 6.[later] (6.2 at least, maybe 6.1) (The need for the EXTENDED option) Yes, i know. I think this PR can be closed. -- WBR, Andrey V. Elsukov ___ freebsd-ipfw@freebsd.org mailing list http://lists.freebsd.org

Re: kern/107305: [ipfw] ipfw fwd doesn't seem to work

2007-04-26 Thread Andrey V. Elsukov
The following reply was made to PR kern/107305; it has been noted by GNATS. From: Andrey V. Elsukov [EMAIL PROTECTED] To: [EMAIL PROTECTED], [EMAIL PROTECTED] Cc: Subject: Re: kern/107305: [ipfw] ipfw fwd doesn't seem to work Date: Fri, 27 Apr 2007 08:46:09 +0400 Hi, IP Address

[patch] /sbin/ipfw - mac/mac-type show as an options (small fix)

2007-04-16 Thread Andrey V. Elsukov
fix for this: http://butcher.heavennet.ru/patches/other/ipfw_mac_fix/ipfw2.c.diff My tests don't show other break, what you think about this patch? -- WBR, Andrey V. Elsukov ___ freebsd-ipfw@freebsd.org mailing list http://lists.freebsd.org/mailman

  1   2   >