Re: bridge rules are evaluated different compared to pf?

2022-07-26 Thread Cristian Danila
mments the uncommented section will block out > > traffic and second section will let it pass it. Somehow these > > rules behaves like rules added to pf but with 'quick' keyword. > > So I deduce that a catch all policy must be added last and not > > first like in pf > &g

Re: bridge rules are evaluated different compared to pf?

2022-07-26 Thread Claudio Jeker
--- > As you see in comments the uncommented section will block out > traffic and second section will let it pass it. Somehow these > rules behaves like rules added to pf but with 'quick' keyword. > So I deduce that a catch all policy must be added last and not > fi

bridge rules are evaluated different compared to pf?

2022-07-26 Thread Cristian Danila
these rules behaves like rules added to pf but with 'quick' keyword. So I deduce that a catch all policy must be added last and not first like in pf In manpage of ifconfig I see this: "Rules are processed in the order in which they were added to the interface" So I believe it makes sense th

pf behind the 2nd wifi router

2022-06-08 Thread T T
hi all . I'm running pf.conf behind the second wi-fi router . [openbsd PC]--wired lan-->2nd wifi router--wifi-->1st wifi router -->internet opebbsd address is 192.168.68.123 . /etc/pf.conf is - table { 0.0.0.0/8 10.0.0.0/8 127.0.0.0/8 169.254.0.0/16 \

Re: PF table issue on 7.1-Current

2022-06-07 Thread Sven F.
On Tue, Jun 7, 2022 at 11:34 AM Zé Loff wrote: > > On Tue, Jun 07, 2022 at 04:26:11PM +0300, Barbaros Bilek wrote: > > Hello Misc, > > > > I think there is an issue about PF tables at current. > > Here my working PF config sample before 7.1-Current. > > blo

Re: PF table issue on 7.1-Current

2022-06-07 Thread Zé Loff
On Tue, Jun 07, 2022 at 04:26:11PM +0300, Barbaros Bilek wrote: > Hello Misc, > > I think there is an issue about PF tables at current. > Here my working PF config sample before 7.1-Current. > block log quick inet from > pfctl -f /etc/pf.conf > Another software fills

PF table issue on 7.1-Current

2022-06-07 Thread Barbaros Bilek
Hello Misc, I think there is an issue about PF tables at current. Here my working PF config sample before 7.1-Current. block log quick inet from pfctl -f /etc/pf.conf Another software fills this Malicious table with this command: # pfctl -t Malicious -T add 1.2.3.4 1 table created

pf nat64 interface reference

2022-05-23 Thread Nicolas Goy
In my pf.conf, I have a line like this: wan = "re2" pass in quick on $priv inet6 from any to 64:ff9b::/96 af-to inet from $wan It used to work, but now it doesn't, I suspect that's because the order of the ip addresses have changed when I type "ifconfig". Now I have some ipv6 addresses before

Re: A speed test with Iperf , Relayd and PF

2022-05-13 Thread Stuart Henderson
use nodelay? That disables Nagle and is normally only wanted for interactive protocols like SSH. High chance that will be slowing things down. https://en.m.wikipedia.org/wiki/Nagle%27s_algorithm > If instead, I deactivate the relayd function and using a simple PF > redirecting with > &

Understanding pf statistics

2022-04-27 Thread Clint Pachl
In the following command, is "Packets" the number of dropped packets after 5,435,315 evaluations of that block rule? If so, is "Bytes" the total size of those 16,303 dropped packets? And is "States" zero because it is a block rule, thus no state created? # pfctl -s rules -vR11 block drop in log

thank you for faq..pf..ex.1 update...

2022-04-19 Thread harold felton
this is just a huge THANK YOU message... for whatever reason, i have been "trying" to get my openbsd router working correctly for many moons... no reason to explain all of the mistaken paths i have had, but finally, between the faq at https://www.openbsd.org/faq/pf/example1.html and t

Re: pf documentation

2022-04-07 Thread Stuart Henderson
On 2022-04-07, Steve Litt wrote: > I need some easy beginner's pf documentation as well as some > intermediate pf documentation. I plan to make an OpenBSD/pf firewall. I > haven't done this in ten years, and imagine pf and the process of > turning OpenBSD into a firewall have changed

Re: pf documentation

2022-04-07 Thread Tom Smyth
Steve, if you like books ... Peter Hansteen has written a book the book of pf which I have read and would recommend https://nostarch.com/pf3 and if you are interested in firewalls ingeneral and comparing features On Thu, 7 Apr 2022 at 10:40, Tom Smyth wrote: > > Hi Steve, > Im goin

Re: pf documentation

2022-04-07 Thread Tom Smyth
Hi Steve, Im going to give my usual answer here Peter Hansteen and Max Stucchi have an amazing tutorial on PF https://home.nuug.no/~peter/pftutorial/#1 but they explain the concepts really well recommend the class that they do in person .. for the latest features about PF in the version

Re: pf documentation

2022-04-07 Thread Brodey Dover
To be honest, I just used the handbook/FAQ. https://www.openbsd.org/faq/pf/example1.html Note that some grammar and syntax from Google search results will not work in newer versions of pf. Sent from my iPhone > On Apr 7, 2022, at 05:13, Steve Litt wrote: > > Hi all, > > I

Re: pf documentation

2022-04-07 Thread Janne Johansson
Den tors 7 apr. 2022 kl 11:12 skrev Steve Litt : > > Hi all, > > I need some easy beginner's pf documentation as well as some > intermediate pf documentation. I plan to make an OpenBSD/pf firewall. I > haven't done this in ten years, and imagine pf and the process of

pf documentation

2022-04-07 Thread Steve Litt
Hi all, I need some easy beginner's pf documentation as well as some intermediate pf documentation. I plan to make an OpenBSD/pf firewall. I haven't done this in ten years, and imagine pf and the process of turning OpenBSD into a firewall have changed in that time. Thanks, SteveT Steve Litt

Loading of pf rule hangs

2022-03-19 Thread Axel Rau
I just installed the recent fixes for 6.0 with syspatch. After reboot my pf rules have not been installed. pfctl -nvvf pf.conf shows rule loading hangs between these rules: - - - table persist file "/etc/pf/black_hole.txt" block drop in quick on $red_if from flags any - - - After a m

Re: PF pass not working (on complex "firewall")

2022-03-06 Thread Szél Gábor
Dear @misc We found the error! This is not PF problem. I found this: http://undeadly.org/cgi?action=article=20090127205841 If i modify an ipsec config *from:* ike active esp from 172.20.123.0/24 to 172.20.122.0/24 \ *to:* ike active esp from 172.20.123.0/24 *(192.168.123.0/24

PF pass not working (on complex "firewall")

2022-03-06 Thread Szél Gábor
Dear @misc We have an stupid problem. On a complex firewall (currently PF rules 1200 row), one PASS rule not working. I do not know why. There are many VLANs, WAN, LAN interfaces, many ipsec VPNs, CARP (master-backup), pfsync, etc ... PF main rules: # set

Re: PF bi-nat

2022-02-24 Thread Otto Moerbeek
little > > > to wrap my head around the concept. > > > > > > The OpenBSD FAQ (https://www.openbsd.org/faq/pf/nat.html) gives the > > > following example: > > > > > > "pass on tl0 from $web_serv_int to any binat-to $web_serv_ext" > > > > &g

Re: PF bi-nat

2022-02-24 Thread David Gwynne
On Wed, Feb 23, 2022 at 04:55:05PM +, Laura Smith wrote: > I've never had occasion to use bi-nat before and I'm struggling a little to > wrap my head around the concept. > > The OpenBSD FAQ (https://www.openbsd.org/faq/pf/nat.html) gives the following > example: > &

Re: pf queuing/bandwidth control question

2022-02-18 Thread Stuart Henderson
rk >>> * re2 so far unused >>> >>> I was setting up pf queues for bandwidth control as follows: >>> * one queue on re0 for outgoing traffic >>> * another queue on re1 for incoming traffic >>> >>> Now, I would like to connect a wireless

Re: pf queuing/bandwidth control question

2022-02-18 Thread Matthias Pressfreund
On 2022-02-17 18:56, Stuart Henderson wrote: > On 2022-02-17, Matthias Pressfreund wrote: >> On a server with 3 LAN interfaces (re0/1/2): >> * re0 connected to the ISP >> * re1 connected to the internal network >> * re2 so far unused >> >> I was set

Re: pf queuing/bandwidth control question

2022-02-17 Thread Stuart Henderson
On 2022-02-17, Matthias Pressfreund wrote: > On a server with 3 LAN interfaces (re0/1/2): > * re0 connected to the ISP > * re1 connected to the internal network > * re2 so far unused > > I was setting up pf queues for bandwidth control as follows: > * one queue on re0

pf queuing/bandwidth control question

2022-02-16 Thread Matthias Pressfreund
On a server with 3 LAN interfaces (re0/1/2): * re0 connected to the ISP * re1 connected to the internal network * re2 so far unused I was setting up pf queues for bandwidth control as follows: * one queue on re0 for outgoing traffic * another queue on re1 for incoming traffic Now, I would like

Re: Question about packet reassembly and pf

2022-02-07 Thread Stuart Henderson
(and allow "reassemble" as a synonym to avoid breaking existing configs). Not sure if it's worth it though, people using the more advanced options in PF certainly need to read the manual.

Re: Question about packet reassembly and pf

2022-02-07 Thread Stuart Henderson
On 2022-02-07, J Doe wrote: > My question is - is it unnecessary to include "reassemble tcp" in the > scrub rule if "set reassemble yes" has already been set ? I know the > FAQ example also doesn't explicitly state "set reassemble yes", but man > notes that that is the default setting. >

Question about packet reassembly and pf

2022-02-06 Thread J Doe
via "scrub" man states: "reassemble tcp Statefully normalises TCP connections. Reassemble tcp performs the following normalisations ..." The reassembly normalizations that are listed sound very useful, but I note in the pf FAQ example for a router[1] that the "

Re: GRE IP6/IP6 not working as soon as pf is enabled

2022-01-16 Thread Markus Wipp
yes, thats correct and just to make sure you got my last email. I was able to fix my issue inthe meantime by adding allow-opts > On 16. Jan 2022, at 12:40, David Gwynne wrote: > > you've set the net.inet.gre.allow sysctl to 1, right? > >> On 16 Jan 2022, at 17:05, Markus Wipp wrote: >> >>

Re: GRE IP6/IP6 not working as soon as pf is enabled

2022-01-16 Thread David Gwynne
you've set the net.inet.gre.allow sysctl to 1, right? > On 16 Jan 2022, at 17:05, Markus Wipp wrote: > > Hi David, > > First of all thank you so much taking the time for my question! > >> My first impression is that you're confusing where to apply policy to >> the encapsulated traffic. "pass

Fwd: GRE IP6/IP6 not working as soon as pf is enabled

2022-01-16 Thread Markus Wipp
bject: Re: GRE IP6/IP6 not working as soon as pf is enabled > Date: 16. January 2022 at 08:03:39 CET > To: Markus Wipp > > Hi, > > You look like you might understand german so I have a german link for you: > > https://wiki.freifunk-franken.de/w/Benutzer:PeterPhilipp#GRE_konf

Re: GRE IP6/IP6 not working as soon as pf is enabled

2022-01-15 Thread Markus Wipp
Hi David, First of all thank you so much taking the time for my question! > My first impression is that you're confusing where to apply policy to > the encapsulated traffic. "pass on gre proto gre" implies you're > trying to pass GRE packets as they go over gre(4) interfaces, but > it's the

Re: GRE IP6/IP6 not working as soon as pf is enabled

2022-01-15 Thread David Gwynne
On Sat, Jan 15, 2022 at 08:10:44PM +0100, Markus Wipp wrote: > Hi all, > > This is my first mail to an OpenBSD list, so I hope I chose the correct one. > > I???m trying to get a GRE tunnel in combination with pf working a few days now > on my OpenBSD (OpenBSD 7.0 (GENERIC.MP

GRE IP6/IP6 not working as soon as pf is enabled

2022-01-15 Thread Markus Wipp
Hi all, This is my first mail to an OpenBSD list, so I hope I chose the correct one. I’m trying to get a GRE tunnel in combination with pf working a few days now on my OpenBSD (OpenBSD 7.0 (GENERIC.MP) #232: Thu Sep 30 14:25:29 MDT 2021) If I disable pf with pfctl -d the connection is working

Re: Problem with some pf table defined outside of an anchor

2022-01-13 Thread Carlos Lopez
n >> that case. > > ‐‐‐ Original Message ‐‐‐ > > Le mercredi 12 janvier 2022 à 11:58, Carlos Lopez a > écrit : > >> Hi all, >> > >> I have a strange issue when I use a pf table inside an anchor. Error >> returned is: >>

Problem with some pf table defined outside of an anchor

2022-01-12 Thread Carlos Lopez
Hi all, I have a strange issue when I use a pf table inside an anchor. Error returned is: pfctl: warning: table already defined in anchor "pub-network/_2” Table is defined in global pf.conf file. In pf.conf I have defined some anchors by interface, like this: # Group of rules for p

Re: Help with basic pf rule to open port 25

2022-01-06 Thread Crystal Kolipe
On Thu, Jan 06, 2022 at 03:39:00PM -0500, Sean McBride wrote: > I don't actually want to use OpenSMTPD, I was just using it as a way to test > my experimental pf rules. I'l try to find some other way to test them. netcat # man nc

Re: Help with basic pf rule to open port 25

2022-01-06 Thread Sean McBride
nt to use OpenSMTPD, I was just using it as a way to test my experimental pf rules. I'l try to find some other way to test them. Thanks both for your replies and links to reading materials. Cheers, Sean

Re: Help with basic pf rule to open port 25

2022-01-05 Thread Crystal Kolipe
On Wed, Jan 05, 2022 at 11:03:02AM -0500, Sean McBride wrote: > pass in log quick on egress proto tcp to any port smtp > If on the OpenBSD system itself I do `telnet > localhost 25` I see the built-in OpenSTMPD. But if I telnet from another > machine on my LAN, I fail to connect. Shouldn't that

Re: Help with basic pf rule to open port 25

2022-01-05 Thread Tom Smyth
Hi Sean, Happy new year to you, do a netstat and make sure that your software is listening on an address other than loopback or all addresses (0.0.0.0) run the following command netstat -an If you want to check active rules in pf run the following command pfctl -sr if you ever want

Help with basic pf rule to open port 25

2022-01-05 Thread Sean McBride
Hi all, (Newbie and first time poster, please be gentle :)) I'm trying to set up spamd, and I think I'm having trouble with pf. So I tried to add a very basic test rule. I added to the beginning of /etc/pf.conf the following: pass in log quick on egress proto tcp to any port smtp

Re: Questions on pf limit table-entries PFR_KENTRY_HIWAT_SMALL

2022-01-01 Thread trondd
On Sat, January 1, 2022 8:02 pm, Paul Pace wrote: > Hello! > > I'm trying to understand the limits in PF, and I can't seem to figure > this out: > > In pf.conf(5) I see two limits called table-entries, and one of them is > > table-entries PFR_KENTRY_HIWAT_SMALL 1

Re : Re: Limitations of nested pf macros

2021-12-30 Thread Marin BERNARD
> I think it's expected. This is a simple construct and trying to use > it for something more complicated is likely to run into problems. > Manual pages usually talk about what is supported rather than what > isn't (it's difficult to evaluate all the things somebody might > try and explain why it

Re: Limitations of nested pf macros

2021-12-30 Thread Stuart Henderson
On 2021-12-30, Marin BERNARD wrote: > While building a pf ruleset, I found out that trying to nest macros > results in syntax errors, unless the original macros were defined > with double (nested) quoting (e.g.: "'0.0.0.0/0'" or "\"0.0.0.0/0\""). > >

Limitations of nested pf macros

2021-12-30 Thread Marin BERNARD
Hi, I'm using OpenBSD 7.0. While building a pf ruleset, I found out that trying to nest macros results in syntax errors, unless the original macros were defined with double (nested) quoting (e.g.: "'0.0.0.0/0'" or "\"0.0.0.0/0\""). I've read the man pages and the O

Re: I got a new ???em??? card. pf uses old ???self???

2021-12-20 Thread Crystal Kolipe
On Mon, Dec 20, 2021 at 05:38:45AM -0600, Luke Small wrote: > I reserved a new address for the new I350-T2 card and replaced unbound.conf > and all uses of it in /etc. > > ???tcpdump -aetvvipflog0??? still returns the old reserved address! > > What do I do? Post a more comprehensive bug report.

I got a new “em” card. pf uses old “self”

2021-12-20 Thread Luke Small
I reserved a new address for the new I350-T2 card and replaced unbound.conf and all uses of it in /etc. “tcpdump -aetvvipflog0” still returns the old reserved address! What do I do? -- -Luke

Got a new “em” card. pf uses old “self”

2021-12-20 Thread Luke Small
I reserved a new address for the new I350-T2 card and replaced unbound.conf and all uses of it in /etc. “tcpdump -aetvvipflog0” still returns the old reserved address! What do I do? -- -Luke

Re: pf synproxy

2021-11-12 Thread Stuart Henderson
here something obvious > I'm missing? I can give more detailed info (pf rules, ifconfig) > offline for anyone interested in helping out. There are some strange issues with synproxy, for example if you have pass in quick proto tcp to 157.240.1.35 synproxy state and try an http get to that a

Re: pf synproxy

2021-11-12 Thread Rosen Iliev
://www.openbsd.org/faq/pf/rdr.html Rosen Lyndon Nerenberg (VE7TFX/VE6BBM) wrote on 11/10/2021 14:41: I'm trying to get synproxy working on a firewall, using the following rule: pass quick proto tcp from any to $front_smtp4 port 25 synproxy state The firewall accepts the connection on the outside interface

pf synproxy

2021-11-10 Thread Lyndon Nerenberg (VE7TFX/VE6BBM)
interface. The state table shows a pair of entries with state PROXY:SRC and DST:PROXY which line up with the connection, but all I get it dead air. This seems like it should 'just work'. Is there something obvious I'm missing? I can give more detailed info (pf rules, ifconfig) offline for anyone

Re: pf and tap interfaces

2021-10-31 Thread tech-lists
at this stage is "is this possible". I'm asking that because I've looked in the pf section of the manual and have not found an example (yet) close enough to my enquiry. I think here it'd be better to ask firstly in an entirely OpenBSD 7.0 context. Like, OpenBSD has vmm now, its equivalen

Re: pf and tap interfaces

2021-10-31 Thread Theo de Raadt
tech-lists wrote: > On Sun, Oct 31, 2021 at 09:33:54AM -0600, Theo de Raadt wrote: > >tech-lists wrote: > > > >> I'm asking this here because I'm trying to do this with FreeBSD but > >> their pf has diverged a lot from OpenBSD's > > > >that is in

Re: pf and tap interfaces

2021-10-31 Thread tech-lists
On Sun, Oct 31, 2021 at 09:33:54AM -0600, Theo de Raadt wrote: tech-lists wrote: I'm asking this here because I'm trying to do this with FreeBSD but their pf has diverged a lot from OpenBSD's that is incorrect history. It is hard to see how 'absolutely minimal maintainance' can result

Re: pf and tap interfaces

2021-10-31 Thread tech-lists
Hi, On Sun, Oct 31, 2021 at 04:23:58PM +0100, Sebastian Benoit wrote: Maybe you could describe a bit more what you are trying to do. I'm trying to protect, with pf, a freebsd host running bhyve guests. The guests use tap interfaces. They are in the same network as the host

Re: pf and tap interfaces

2021-10-31 Thread Theo de Raadt
tech-lists wrote: > I'm asking this here because I'm trying to do this with FreeBSD but > their pf has diverged a lot from OpenBSD's that is incorrect history. It is hard to see how 'absolutely minimal maintainance' can result in divergence. At some point, pf's state table data stru

Re: pf and tap interfaces

2021-10-31 Thread Sebastian Benoit
> > I'm asking this here because I'm trying to do this with FreeBSD > but their pf has diverged a lot from OpenBSD's, and what I thought > would work does not. skip on $tap_ifs has unexpected results in that > traffic still gets blocked on the guest. > > If OpenBSD's pf d

pf and tap interfaces

2021-10-31 Thread tech-lists
Hello misc@ Generically, can OpenBSD [7.0] apply rules to *just* the ethernet interface, ignoring the bridge and tap interfaces? Can it do this natively or is a VLAN required as well? Or something else? I'm asking this here because I'm trying to do this with FreeBSD but their pf has diverged

Re: Library for the pf(4) device

2021-10-18 Thread J. K.
Hi Matthias! On 18.10.21 05:30, Matthias Pressfreund wrote: > Hi, > > maybe that would serve your purposes: > > https://github.com/mpfr/pftbld > Awesome! This is exactly what I have planned. Starred on GitHub. :) Many thanks and best regards.

Re: Library for the pf(4) device

2021-10-17 Thread Matthias Pressfreund
Hi, maybe that would serve your purposes: https://github.com/mpfr/pftbld On 2021-10-18 00:24, J. K. wrote: > Hi, > > Is there an existing library for pf(4) which includes > the same features like pfctl? Or at least add IP addresses > to a specific block table? > > Want

Library for the pf(4) device

2021-10-17 Thread J. K.
Hi, Is there an existing library for pf(4) which includes the same features like pfctl? Or at least add IP addresses to a specific block table? Want to build a some sort of application level IDS/IPS for my homepage. The concept (my goal): - Write a daemon which listen on a specific port

Re: pf block port scanning

2021-10-11 Thread Stuart Henderson
d to believe that source-track is not really the best idea if you want good performance out of PF). Probably the best way to hide which ports are really open on a machine is to answer connections on *every* port, which could be done with "pass in on proto tcp to self synproxy state", it's definitely a bodge though!

Re: pf block port scanning

2021-10-10 Thread Peter N. M. Hansteen
On Sun, Oct 10, 2021 at 02:48:04PM +0300, Barbaros Bilek wrote: > Hello Peter, > > I think you suggest me some work around like max-src-conn-rate, right? I would think both the rate and the number of simultaneous connections could be relevant here, yes. - Peter -- Peter N. M. Hansteen,

Re: pf block port scanning

2021-10-10 Thread Barbaros Bilek
> I try to block port scanning attempts with OpenBSD 6.9/amd64 + PF. > > At the top of my pf.conf i've added these lines but it didn't work. > > > > block in quick proto tcp all flags SF/SFRA label bps1 > > block in quick proto tcp all flags FPU/SFRAUP label bps3 > >

Re: pf block port scanning

2021-10-10 Thread Barbaros Bilek
ello misc, > > > > I try to block port scanning attempts with OpenBSD 6.9/amd64 + PF. > > At the top of my pf.conf i've added these lines but it didn't work. > > > > block in quick proto tcp all flags SF/SFRA label bps1 > > block in quick proto tcp all flags FPU/SFRAU

Re: pf block port scanning

2021-10-09 Thread Peter Nicolai Mathias Hansteen
> 7. okt. 2021 kl. 15:58 skrev Barbaros Bilek : > > Hello misc, > > I try to block port scanning attempts with OpenBSD 6.9/amd64 + PF. > At the top of my pf.conf i've added these lines but it didn't work. > > block in quick proto tcp all flags SF/SFRA label bps1 > b

Re: pf block port scanning

2021-10-09 Thread Stuart Henderson
On 2021-10-07, Barbaros Bilek wrote: > Hello misc, > > I try to block port scanning attempts with OpenBSD 6.9/amd64 + PF. > At the top of my pf.conf i've added these lines but it didn't work. > > block in quick proto tcp all flags SF/SFRA label bps1 > block in quick proto tcp

pf block port scanning

2021-10-07 Thread Barbaros Bilek
Hello misc, I try to block port scanning attempts with OpenBSD 6.9/amd64 + PF. At the top of my pf.conf i've added these lines but it didn't work. block in quick proto tcp all flags SF/SFRA label bps1 block in quick proto tcp all flags FPU/SFRAUP label bps3 block in quick proto tcp all flags

pf route-to reply-to ipv6 link local address does not work

2021-10-05 Thread Pierre-Edouard
Running openbsd 6.9 stable here I am not able to use a pf rule using route-to/reply-to with an ipv6  linklocal address. example: pass out inet6 route-to fe80::abcd%em0 The syntax is valid and therefore is accepted but the "%em0" is striped out when config is pushed. T

Re: problems with outbound load-balancing (PF sticky-address for destination IPs)

2021-09-29 Thread Andrew Lemin
onality would be for 'sticky-address' to consider > both > > > > source IP and destination IP after initially being load balanced by > > > > round-robin or random. > > > > > > Just use multipath routing, it will make sure that selected default > routes > >

Re: problems with outbound load-balancing (PF sticky-address for destination IPs)

2021-09-29 Thread Claudio Jeker
selected routes in a way to > > minimize the affected sessions. All this is done without any extra memory > > usage since the hashing function is smart. > > > > -- > > :wq Claudio > > > > > > > Thanks again, Andy. > > > > &g

Re: problems with outbound load-balancing (PF sticky-address for destination IPs)

2021-09-29 Thread Andrew Lemin
to nat-to on those links. > > On rerouting the multipath code reshuffles the selected routes in a way to > minimize the affected sessions. All this is done without any extra memory > usage since the hashing function is smart. > > -- > :wq Claudio > > > > Thanks ag

Re: problems with outbound load-balancing (PF sticky-address for destination IPs)

2021-09-29 Thread Claudio Jeker
; > > The current implementation of ‘sticky-address‘ relates only to a sticky > > source IP. > > https://www.openbsd.org/faq/pf/pools.html > > > > This is used for inbound server load balancing, by ensuring that all > > socket connections from the same client/user/IP

Re: problems with outbound load-balancing (PF sticky-address for destination IPs)

2021-09-28 Thread Andrew Lemin
f ‘sticky-address‘ relates only to a sticky > source IP. > https://www.openbsd.org/faq/pf/pools.html > > This is used for inbound server load balancing, by ensuring that all > socket connections from the same client/user/IP on the internet goes to the > same server on your local

Re: PF Outbound traffic Load Balancing over multiple tun/openvpn interfaces/tunnels

2021-09-28 Thread Andrew Lemin
Hi. Sorry for extremely slow reply! Did you add the return routes for your internal subnets into each of the per-tun rdomains? To test your tunnels are setup correctly; Once you have the external interface in rdomain 0, and each VPN instance's tun interface is bound to different rdomains etc, you

Re: Unexpected pf behavior for DHCP traffic?

2021-08-19 Thread Étienne
On 19/08/2021 19:01, Stefan Sperling wrote: Any idea? I suspect the packets towards vether0 are being dropped by pf. What does your pf.conf look like? I have been looking in that direction, and reduced my pf.conf to this: default_tcp_ports="{ 22 }" set block-policy retur

Re: Unexpected pf behavior for DHCP traffic?

2021-08-19 Thread Stefan Sperling
use bpf, thus see raw packets > > > > from the wire before pf can block them. Most daemons of this type > > > > also use bpf to send packets, and pf doesn't see these either > > > Does that prevent dhcpd from listening on any virtual interface? I'm > > > trying >

Re: Unexpected pf behavior for DHCP traffic?

2021-08-19 Thread Étienne
On 31/07/2021 19:27, Stefan Sperling wrote: On Sat, Jul 31, 2021 at 07:02:35PM +0100, Étienne wrote: On 30/07/2021 04:37, Theo de Raadt wrote: dhcpleased (and a few other daemons) use bpf, thus see raw packets from the wire before pf can block them. Most daemons of this type also use bpf

Re: Unexpected pf behavior for DHCP traffic?

2021-08-01 Thread Zack Newman
> > Does that prevent dhcpd from listening on any virtual interface? I'm trying > > to have it listen for requests on a vether in a bridge, and that fails (or > > I'm making a mistake). > It should work, unless are running dhclient/dhcpleased on the same machine, > because the bpf filter will eat

Re: Unexpected pf behavior for DHCP traffic?

2021-07-31 Thread Stefan Sperling
On Sat, Jul 31, 2021 at 07:02:35PM +0100, Étienne wrote: > On 30/07/2021 04:37, Theo de Raadt wrote: > > dhcpleased (and a few other daemons) use bpf, thus see raw packets > > from the wire before pf can block them. Most daemons of this type > > also use bpf to send packet

Re: Unexpected pf behavior for DHCP traffic?

2021-07-31 Thread Étienne
On 30/07/2021 04:37, Theo de Raadt wrote: dhcpleased (and a few other daemons) use bpf, thus see raw packets from the wire before pf can block them. Most daemons of this type also use bpf to send packets, and pf doesn't see these either Does that prevent dhcpd from listening on any virtual

Re: Openbsd pf firewall ipv6 routing

2021-07-30 Thread Daniel Melameth
t; > ISP-RouterOPENBSD/PFVLAN10—openWRT—Macbook > | > VLAN20__openWRT some Devices > | > | > Neighbour Access Point > > Recently I tried to enable IPv6 in openbs

Re: Unexpected pf behavior for DHCP traffic?

2021-07-30 Thread Stefan Sperling
gt; {timestamp} {ip2}.67 > {my_ip}.68: xid:0xfe51c9a3 Y:{my_ip} G:{ip1}[|bootp] > > I get that tcpdump taps to bpf so it can see both packets. > > And my understanding of your answer is that pf doesn't see the > first packet (DHCPREQUEST) since it's being sent using bpf. > > Th

Openbsd pf firewall ipv6 routing

2021-07-30 Thread Irshad
Hi I have following setup at home ,I am sharing internet with neighbour , our ISP provides IPV6 With 2001:16a2:cdd2:xx00::/56 prefix delegation , until now I was only using IPv4 NAT with following setup ISP-RouterOPENBSD/PFVLAN10—openWRT

Re: Unexpected pf behavior for DHCP traffic?

2021-07-29 Thread beebeetles
to bpf so it can see both packets. And my understanding of your answer is that pf doesn't see the first packet (DHCPREQUEST) since it's being sent using bpf. The second packet (DHCPACK) -- although dhcpleased has unfiltered access to -- is eventually visible to pf, thus will be blocked by pf and

Re: Unexpected pf behavior for DHCP traffic?

2021-07-29 Thread Theo de Raadt
dhcpleased (and a few other daemons) use bpf, thus see raw packets from the wire before pf can block them. Most daemons of this type also use bpf to send packets, and pf doesn't see these either. This behaviour is intentional, and useful. beebeet...@posteo.de wrote: > Hi all, > > I'

Unexpected pf behavior for DHCP traffic?

2021-07-29 Thread beebeetles
Hi all, I'm running OpenBSD 6.9 as a home router, and observed some behavior of pf that I can't really make sense of. The router runs dhcpleased to obtain its IP address from the ISP, and I have the following pf rules (only the relevant ones are shown): block drop all pass out on $ext_if

Re: Resolved - Was: Performance tuning PF.

2021-07-27 Thread Hrvoje Popovski
he test machines, I measured a > transfer rate of 942 Mb/s. The test program was iperf3. > > * With OpenBSD 6.8 running a bridged configuration on an Intel Atom > D525 with internal and external "em" nics, and filtering using pf. > I measured a rate of 775 ~ 850 Mb/s. Agai

Resolved - Was: Performance tuning PF.

2021-07-27 Thread Christopher Sean Hilton
acBook Pro's with Thunderbolt Ethernet adapters: * With just a GigE switch connecting the test machines, I measured a transfer rate of 942 Mb/s. The test program was iperf3. * With OpenBSD 6.8 running a bridged configuration on an Intel Atom D525 with internal and external "em" nics, a

Re: unexpected behavior with pf queues (bandwidth allocations seemingly ignored)

2021-07-24 Thread David Dahlberg
hurt). > > Based on some past threads I've read on related issues, I've tried adding > "max" specifications to each queue, but that hasn't helped, and it doesn't > seem it should be necessary based on the docs. Oddly, if I specify a max of > 13 on each rule -- with no suffi

Re: unexpected behavior with pf queues (bandwidth allocations seemingly ignored)

2021-07-24 Thread Scott Lewandowski
nal Message- > From: David Dahlberg > Sent: Saturday, July 24, 2021 8:47 AM > To: Scott Lewandowski > Cc: misc@openbsd.org > Subject: Re: unexpected behavior with pf queues (bandwidth allocations > seemingly ignored) > > Please try first to remove „min“. „Min“ makes it

Re: Performance tuning PF.

2021-07-24 Thread Stuart Henderson
On 2021-07-23, Christopher Sean Hilton wrote: > On Fri, Jul 23, 2021 at 11:19:35AM -0400, Chris Hilton wrote: >> On Thu, Jul 22, 2021 at 08:24:25PM +0200, Sebastian Benoit wrote: >> [ ...snip] >> >> > >> > If you can get the later generation Xeon-D machines with similar form >> > factor. Much

unexpected behavior with pf queues (bandwidth allocations seemingly ignored)

2021-07-23 Thread Scott Lewandowski
it should be necessary based on the docs. Oddly, if I specify a max of 13 on each rule -- with no suffix, which I accidentally did -- I seem to get the desired behavior, but in that case pf obviously isn't enforcing the max correctly, and I also see download speeds of less than 1KB/s. Adding th

Re: Performance tuning PF.

2021-07-23 Thread Stuart Henderson
On 2021/07/23 11:13, Christopher Sean Hilton wrote: > On Fri, Jul 23, 2021 at 10:04:25AM -, Stuart Henderson wrote: > > On 2021-07-22, Sebastian Benoit wrote: > > [ ...snip ] > > > > > > > The IO paths of those Atoms are slow. Disk IO is also lacking. > > > > The D525, yes. > > > > The

Re: Performance tuning PF.

2021-07-23 Thread Christopher Sean Hilton
On Fri, Jul 23, 2021 at 11:19:35AM -0400, Chris Hilton wrote: > On Thu, Jul 22, 2021 at 08:24:25PM +0200, Sebastian Benoit wrote: > [ ...snip] > > > > > If you can get the later generation Xeon-D machines with similar form > > factor. Much better hardware. > > > > So, I'm running the Atom

Re: Performance tuning PF.

2021-07-23 Thread Christopher Sean Hilton
On Thu, Jul 22, 2021 at 08:24:25PM +0200, Sebastian Benoit wrote: [ ...snip] > > If you can get the later generation Xeon-D machines with similar form > factor. Much better hardware. > So, I'm running the Atom machines because of power concerns. I'm not familiar with the Xeon-D line of

Re: Performance tuning PF.

2021-07-23 Thread Christopher Sean Hilton
On Fri, Jul 23, 2021 at 10:04:25AM -, Stuart Henderson wrote: > On 2021-07-22, Sebastian Benoit wrote: [ ...snip ] > > > > The IO paths of those Atoms are slow. Disk IO is also lacking. > > The D525, yes. > > The C2758 should cope with much more than 650-700Mb/s though maybe > not with

Re: pf question: IPv6 prefix changed, how to tell pf?

2021-07-23 Thread David Dahlberg
On Fri, 2021-07-23 at 08:21 +0200, Harald Dunkel wrote: > Deutsche Telekom gives me a new /56 prefix for my internal net and > a new /64 prefix for the external connection on every reboot of my > modem. The old internal prefix is not routed anymore. Question is, > how can I tell pf to

Re: Performance tuning PF.

2021-07-23 Thread Stuart Henderson
On 2021-07-22, Sebastian Benoit wrote: > Christopher Sean Hilton(ch...@vindaloo.com) on 2021.07.21 14:20:58 -0400: >> I have a packet filtering bridge running on PF and OpenBSD 6.8. My >> hardware is a SuperMicro Atom D525 service with dual Intel Gigabit >> Nics. I've adde

<    1   2   3   4   5   6   7   8   9   10   >