Re: kern/144187: [ipfw] deadlock using multiple ipfw nat and multiple limit statements

2011-07-02 Thread Dmitriy Demidov
Synopsis: [ipfw] deadlock using multiple ipfw nat and multiple limit statements State-Changed-From-To: open-feedback State-Changed-By: ae State-Changed-When: Tue Jun 28 05:29:45 UTC 2011 State-Changed-Why: Can you still reproduce this on a supported release? Or maybe you can test your rules

Re: looking to translate SRC port as well.

2011-02-25 Thread Dmitriy Demidov
In short, I have a sip server that is very restrictive on the dst port, and a sip trunk provider that is very restrictive on src ports. Naturally, its a great sip server, and a great sip trunk service, and the ports each one demands are not the same. the sip server listens on udp port 5080,

Re: help wanted with NAT under ipfw

2010-04-30 Thread Dmitriy Demidov
On Friday 30 April 2010, Robert Huff wrote: I have been trying to get NAT working under ipfw on: FreeBSD 9.0-CURRENT #0: Fri Apr 23 11:34:17 EDT 2010 amd64 and failing. The ipfw part works fine. I'm using: ipfw_load=YES ipfw_nat_load=YES # in-kernel ipfw nat

features request for kernel's libalias and ipfw nat

2010-02-23 Thread Dmitriy Demidov
Hi list, I just wonder how hard it would be to implement a following list of features: - ability to use proxy_rule statement in ipfw nat (natd -proxy_rule) - ability to see actual content of libalias nat table (ipfw nat 1 show table) - ability to use one aliasing table in multi nat instances

Re: ipfw nat and localy initiated UDP traffic (bad udp cksum)

2009-07-16 Thread Dmitriy Demidov
On Thursday 16 July 2009, Chuck Swiger wrote: On Jul 16, 2009, at 12:19 PM, Dmitriy Demidov wrote: Update about this issue. There is somthing wrong with UDP pass through - ipfw nat makes it bad cksum. tcpdump receives local network traffic before the checksums are computed (especially

Re: keep-state rules inadequately handles big UDP packets or fragmented IP packets?

2009-04-03 Thread Dmitriy Demidov
On Thursday 02 April 2009, Paolo Pisati wrote: Luigi Rizzo wrote: Ok then we may have a plan: you could do is implement REASS as an action (not as a microinstruction), with the following behaviour: - if the packet is a complete one, the rule behaves as a count (i.e. the firewall

Re: keep-state rules inadequately handles big UDP ?packets?or?fragmented IP packets?

2009-03-19 Thread Dmitriy Demidov
On Wednesday 18 March 2009, Oliver Fromme wrote: I'm just curious ... Is it really worth the effort to add fragment reassembly to IPFW? What advantage does it have? It would be much easier to simply pass all fragments with offset 1, and drop all fragments with offset 0 that are smaller

Re: keep-state rules inadequately handles big UDP packets or fragmented IP packets?

2009-03-17 Thread Dmitriy Demidov
On Tuesday 17 March 2009, Paolo Pisati wrote: FYI i have a patch for ipfw nat that reassemble a packet before nat[*], but if the idea of an explicit packet reassembly action sounds good, i could move the code over there. [*] actually the patch is really simple, it's just a call to ip_reass()

Re: keep-state rules inadequately handles big UDP packets or fragmented IP packets?

2009-03-15 Thread Dmitriy Demidov
On Sunday 15 March 2009, Sergey Matveychuk wrote: Dmitriy Demidov wrote: Hi Luigi. Thank you for answer. It is a big surprise for me that reassembling of IP datagrams is done not *before* they go into firewall, but *after* :( But what's wrong with it? A fragment got from net, pass

keep-state rules inadequately handles big UDP packets or fragmented IP packets?

2009-03-13 Thread Dmitriy Demidov
Hi list. I'm using DNS cache server Unbound-1.2.1. I want to start using DNSSEC via DLV (unbound gracefully allows it). My system is FreeBSD7-STABLE. I'm using ipfw. Original ipfw configuration: add check-state add deny icmp from any to any frag add allow icmp from any to me icmptypes 0,3,11