On 2021/02/07 17:04, Christopher Zimmermann wrote:
> Hi,
> 
> a year ago I added support for our pf tables to the unbound ipset module.
> Upstream does not seem eager to merge it:
> https://github.com/NLnetLabs/unbound/pull/144
> 
> Implementing pf tables support was pretty straightforward. It has been more
> work to adjust module's privilege management to allow the modules to open
> privileget files like /dev/pf and keep them open across reloads.
> This is also what upstream was unsure about.
> 
> So below you find the diff against our base unbound.
> 
> Should this go in? Continue to wait for upstream?
> Suggestions for improvement?

I would not be happy about including this in base unbound. Partly
because it is a large diff to carry, partly unbound is a much more
complex process than I'd be happy with having direct access to
reconfigure PF.

The whole approach (including for linux ipset) doesn't seem ideal to
me. It would seem much better to have this done out-of-process with a
communication mechanism to allow sending the addresses across, then
unbound wouldn't need firewall-specific knowledge in the code, and
there's a clear separation of privilege.

Reply via email to