Current problem reports assigned to freebsd-ipfw@FreeBSD.org

2014-05-26 Thread FreeBSD bugmaster
Note: to view an individual PR, use:
  http://www.freebsd.org/cgi/query-pr.cgi?pr=(number).

The following is a listing of current problems submitted by FreeBSD users.
These represent problem reports covering all versions including
experimental development code and obsolete releases.


S Tracker  Resp.  Description

o kern/189720  ipfw   [ipfw] [patch] pps action for ipfw
o bin/187904   ipfw   [ipfw] ipfw(8) does not properly recognize the network
o kern/183479  ipfw   [ipfw] ipfw table contains duplicate entry.
o kern/180731  ipfw   [ipfw] problem with displaying 255.255.255.255 address
o kern/180729  ipfw   [ipfw] ipfw nat show empty output
o kern/178482  ipfw   [ipfw] logging problem from vnet jail
o kern/178480  ipfw   [ipfw] dynamically loaded ipfw with a vimage kernel do
o kern/178317  ipfw   [ipfw] ipfw options need to specifed in specific order
o kern/177948  ipfw   [ipfw] ipfw fails to parse port ranges (p1-p2) for udp
o kern/176503  ipfw   [ipfw] ipfw layer2 problem
o kern/170604  ipfw   [ipfw] ipv6 reass broken
o conf/167822  ipfw   [ipfw] [patch] start script doesn't load firewall_type
o kern/166406  ipfw   [ipfw] ipfw does not set ALTQ identifier for ipv6 traf
o kern/165939  ipfw   [ipfw] bug: incomplete firewall rules loaded if tables
o kern/165190  ipfw   [ipfw] [lo] [patch] loopback interface is not marking 
o kern/158066  ipfw   [ipfw] ipfw + netgraph + multicast = multicast packets
o kern/157689  ipfw   [ipfw] ipfw nat config does not accept nonexistent int
f kern/155927  ipfw   [ipfw] ipfw stops to check packets for compliance with
o bin/153252   ipfw   [ipfw][patch] ipfw lockdown system in subsequent call 
o kern/153161  ipfw   [ipfw] does not support specifying rules with ICMP cod
o kern/148827  ipfw   [ipfw] divert broken with in-kernel ipfw
o kern/148430  ipfw   [ipfw] IPFW schedule delete broken.
o kern/148091  ipfw   [ipfw] ipfw ipv6 handling broken.
f kern/143973  ipfw   [ipfw] [panic] ipfw forward option causes kernel reboo
o kern/143621  ipfw   [ipfw] [dummynet] [patch] dummynet and vnet use result
o kern/137346  ipfw   [ipfw] ipfw nat redirect_proto is broken
o kern/137232  ipfw   [ipfw] parser troubles
o kern/127230  ipfw   [ipfw] [patch] Feature request to add UID and/or GID l
f kern/122963  ipfw   [ipfw] tcpdump does not show packets redirected by 'ip
s kern/121807  ipfw   [request] TCP and UDP port_table in ipfw
o kern/116009  ipfw   [ipfw] [patch] Ignore errors when loading ruleset from
o kern/104682  ipfw   [ipfw] [patch] Some minor language consistency fixes a
o kern/103454  ipfw   [ipfw] [patch] [request] add a facility to modify DF b
o kern/103328  ipfw   [ipfw] [request] sugestions about ipfw table
o kern/97951   ipfw   [ipfw] [patch] ipfw does not tie interface details to 
o kern/95084   ipfw   [ipfw] [regression] [patch] IPFW2 ignores recv/xmit/v
o kern/86957   ipfw   [ipfw] [patch] ipfw mac logging
o bin/83046ipfw   [ipfw] ipfw2 error: setup is allowed for icmp, but s
o kern/82724   ipfw   [ipfw] [patch] [request] Add setnexthop and defaultrou
o bin/78785ipfw   [patch] ipfw(8) verbosity locks machine if /etc/rc.fir
o kern/60719   ipfw   [ipfw] Headerless fragments generate cryptic error mes
s kern/55984   ipfw   [ipfw] [patch] time based firewalling support for ipfw
o kern/48172   ipfw   [ipfw] [patch] ipfw does not log size and flags
o kern/46159   ipfw   [ipfw] [patch] [request] ipfw dynamic rules lifetime f
a kern/26534   ipfw   [ipfw] Add an option to ipfw to log gid/uid of who cau

45 problems total.

___
freebsd-ipfw@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ipfw
To unsubscribe, send any mail to freebsd-ipfw-unsubscr...@freebsd.org


Re: Dummynet pipe cascades

2014-05-26 Thread Luigi Rizzo
On Fri, May 23, 2014 at 03:53:18PM +0200, Patrick Zwickl wrote:
 Dear all,
 
 I am currently experimenting with ipfw dummynet features (coming rather from 
 the netem tc corner; so being new to dummynet and apologise for these kind of 
 questions) and was wondering how to syntactically achieve build cascades of 
 pipes? listed on [1]?s front page. Unfortunately, I could not find a minimal 
 example for this in the documentation (or I missed the point).
 
 Background: I am currently looking for concepts allowing me to put some 
 traffic into a pipe being followed by several queues, the scheduler and then 
 reinserted into another pipe (optimally as clean as possible). So, basically, 
 a cascade of pipes, optimally being able to consume from different other 
 pipes or interfaces. From the statement in [1], I assume ipfw + dummynet 
 could be the perfect playground for this, but from the syntax it was not 
 clear to me how this is done.
 
 Any pointer to a minimal example or any reading recommendation would be 
 highly appreciated (maybe I have been searching the wrong channels so far). 
 Thanks in advance for reading and potentially commenting :)

the trick to enable cascades is to set the sysctl variable
net.inet.ip.fw.one_pass=0
(or equivalent in linux, /sys/modules/...)
so that packets coming out from a pipe re-enter the
firewall at the next rule.

cheers
luigi
___
freebsd-ipfw@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ipfw
To unsubscribe, send any mail to freebsd-ipfw-unsubscr...@freebsd.org