Re: PF, Bridge, and IP on bridged interface [more]

2005-03-14 Thread Sean Kamath

[In a message on Wed, 02 Mar 2005 05:34:20 GMT,
  [EMAIL PROTECTED] wrote:]
>In my case, I'm running a SS20 with le* interfaces, which means that
>all interfaces use the same ethernet address.

I'm curious, doesn't setting local-mac-address? to true doesn't work
with LE's?  Only HME's and newer?  Actually, I guess only quad HME's
and newer, according to:

http://www.barbary.com/cookbooks/macaddress.html

So, I guess that leaves the question, can one change the ethernet
address of a NIC with ifconfig on OpenBSD? My 3.5 box doesn't seem to
allow it. . .

Sean


Re: pf vs ASIC firewalls

2005-03-14 Thread Mike Frantzen
 
> Could Someone please tell me the advantages of PF against Firewalls
> using the ASIC technology in terms of Security and perfomance??

Many (most? all?) vendors shipping what they call ASIC firewalls are
actually running software on a network processor (NPU). The benefit is
that most NPUs will process packets in real-time so if they claim to
support X gigabit per second then they can probably sustain that even
with minimum sized 64byte ethernet frames; a PF box doesn't stand a
chance with that high of a pps rate.

The down side to NPUs is that they have to service every packet in a
fixed amount of time so they can't do much. They need to have fixed
sized state and fragment reassembly tables.  They also aren't allowed to
do much work per packet.  You will also be able to surf Moore's law
better with a normal x86 processor than with an NPU.


Technically, your intel processor is an asic too.

.mike

 
> I happened to hear the following
> 
> "Netscreen is running in ASIC (they are boasting in their marketing) -
> and thus probably only is checking the first (or first few) packages and
> then handing all traffic control off to dumb packet shoveling hardware.
> So probably no checks "later" in the protocol. Similar problem with
> CheckPoint's "fastpath" option, btw."
> 
> Thankyou so much
> 
> kind regards
> 
> Siju


Re: pf vs ASIC firewalls

2005-03-14 Thread Ryan McBride
On Mon, Mar 14, 2005 at 03:50:23PM +0530, Siju George wrote:
> Could Someone please tell me the advantages of PF against Firewalls
> using the ASIC technology in terms of Security and perfomance??

If there is a bug in pf, we'll tell you, and  you can apply a patch.

If there is a bug in your ASIC, and the vendor tells you at all, there
are two options: go back to doing the packet processing in the
underpowered CPU, or replace the hardware.


Re: pf vs ASIC firewalls

2005-03-14 Thread Jason Opperisano
On Mon, Mar 14, 2005 at 03:50:23PM +0530, Siju George wrote:
> So probably no checks "later" in the protocol. Similar problem with
> CheckPoint's "fastpath" option, btw."

1) check point fw-1 is software, not hardware.
2) the "fastpath" option hasn't been around since 4.0 (and has always
   been deprecated).
3) in NG--all packets pass through the deep inspection filter engine
   (even if you enable the securexl acceleration feature).

-j

--
"Beer. Now there's a temporary solution."
--The Simpsons


Support for tables in ALTQ

2005-03-14 Thread Augusto César Radtke
Hello, I've been looking for this issue on the archive and Google but
I didn't find anything useful. Anyone has done any work with tables
and altq?

I'm working on a wireless ISP and we are currently shaping our users
with FreeBSD ipfw and pipes. I would like to migrate the server to
OpenBSD with PF to make the rules easier to understand using tables
for common rules (quite common in my configuration) but the problem is
that altq doesn't support tables like filtering does.

I would like to setup something like this:

altq on $iface_inet cbq bandwidth 1Gb queue { default_up, clientes_up }
altq on $iface_radio cbq bandwidth 1Gb queue { default_down, clientes_down }

queue default_up cbq(default)
queue clientes_up bandwidth 8Mb cbq { upload, bronze_up, prata_up,
ouro_up, diamante_up }

queue default_down cbq(default)
queue clientes_down bandwidth 8Mb cbq { download, bronze_down,
prata_down, ouro_down, diamante_down }

queue upload cbq(default)
queue bronze_up bandwidth 64Kb cbq
queue prata_up bandwidth 128Kb cbq
queue ouro_up bandwidth 256Kb cbq
queue diamante_up bandwidth 256Kb cbq

queue download cbq(default)
queue bronze_down bandwidth 64Kb cbq
queue prata_down bandwidth 256Kb cbq
queue ouro_down bandwidth 512Kb cbq
queue diamante_down bandwidth 1Mb cbq

And then apply a rule like this:

pass out on $iface_inet inet from  to any keep state
queue ouro_up
pass out on $iface_radio inet from any to  keep state
queue ouro_down

Actually this configuration make every client in  table
be inside the same queue "ouro_up" or "ouro_down", I would like to
have n queues based on "ouro_up" or "ouro_down" without having to
create every queue.

Is this possible with some modification in the actual code base or it
is a completly different approach? If it is possible without changing
too much code I would probably spend some time making this feature and
releasing it.

Thanks in advance.

Augusto


Please help: Setting up HA Firewall with carp and vlan Interfaces

2005-03-14 Thread Zenker, Olaf
Hello,

I hope this is not too much a switch related problem (and therefore OT):

I've got a problem with my ha-setup. Running two firewalls that are clustered
(no loadbalancing). Both sides (in- and outgoing) are connected to one switch
(Later there will be two switches).
State table changes are pronounced over pfsync (em0)(crosslink).

Problem is: both firewalls have serveral vlans defined on their outer Interface 
(fxp0).
Of course both vlans are identical, only difference is the mac address.
Because of that the firewalls allways complain about duplicate ip-addresses:
"duplicate IP address 192.168.90.69 sent from ethernet address
00:10:dc:f1:22:70"

How to solve this?
Do I have to setup a carp interface for every vlan?
But I guess this didn't solve the problem.
At all its working, but this warning messages keep spoiling my logs
and it's definitely not a clean solution.

Some more informations:

uname -a:

OpenBSD bsd_node1.smc-d.de 3.6 GENERIC#0 i386

sysctl net.inet.carp:

net.inet.carp.allow=1
net.inet.carp.preempt=1
net.inet.carp.log=0
net.inet.carp.arpbalance=0

ifconfig -a:

rl0: flags=8943 mtu 1500
address: 00:0a:cd:05:18:e8
media: Ethernet 100baseTX full-duplex
status: active
inet 192.168.90.248 netmask 0xffe0 broadcast 192.168.90.255
em0: flags=8843 mtu 1500
address: 00:10:dc:f5:b2:0b
media: Ethernet 1000baseT full-duplex
status: active
inet 10.10.10.1 netmask 0xfffc broadcast 10.10.10.3
fxp0: flags=8943 mtu 1500
address: 00:10:dc:f5:b2:0c
media: Ethernet 100baseTX full-duplex
status: active
inet 5.5.5.5 netmask 0xfff8 broadcast 5.5.5.7
pflog0: flags=141 mtu 33224
pfsync0: flags=41 mtu 1348
pfsync: syncif: em0 maxupd: 128
vlan9: flags=8843 mtu 1500
address: 00:10:dc:f5:b2:0c
vlan: 9 parent interface: fxp0
inet 82.210.20.190 netmask 0xfff8 broadcast 82.210.20.191
---snip---
(here several more vlans)
---snip---
carp0: flags=41 mtu 1500
carp: MASTER vhid 1 advbase 1 advskew 0
inet 192.168.90.249 netmask 0xffe0
carp1: flags=41 mtu 1500
carp: MASTER vhid 2 advbase 1 advskew 0
inet 5.5.5.6 netmask 0xfff8


netstat -sp carp:

carp:
18 packets received (IPv4)
0 packets received (IPv6)
0 packets discarded for bad interface
0 packets shorter than header
0 discarded for bad checksums
0 discarded packets with a bad version
0 discarded because packet too short
0 discarded for bad authentication
0 discarded for bad vhid
0 discarded because of a bad address list
159542 packets sent (IPv4)
0 packets sent (IPv6)


Thank you for any hints/replies.


Olaf Zenker
Systemmanager SMC Düsseldorf
T-Systems International GmbH
Global Network Factory
Systemmanagement Customer Solutions
Sohnstr.45, 40237 Düsseldorf
+49 211-9148-620 (tel)
+49 211-9148-975 (fax)
E-Mail: [EMAIL PROTECTED]
Internetseite: http://www.t-systems.com


pf vs ASIC firewalls

2005-03-14 Thread Siju George
Hi all,

Could Someone please tell me the advantages of PF against Firewalls
using the ASIC technology in terms of Security and perfomance??

I happened to hear the following

"Netscreen is running in ASIC (they are boasting in their marketing) -
and thus probably only is checking the first (or first few) packages and
then handing all traffic control off to dumb packet shoveling hardware.
So probably no checks "later" in the protocol. Similar problem with
CheckPoint's "fastpath" option, btw."

Thankyou so much

kind regards

Siju