Re: ipfw stateful and ICMP

2014-03-12 Thread Julian Elischer
On 3/11/14, 1:05 AM, Dewayne Geraghty wrote: On 11/03/2014 2:53 PM, Julian Elischer wrote: It has annoyed me for some time that icmp packets refering ot an ongoing session can not be matched by a dynamic rule that goversn that session. For example, if you have a dynamic rule for tcp 1.2.3.4

ipfw stateful and ICMP

2014-03-10 Thread Julian Elischer
attack window. anyone have violent objections? (I'm currently rewriting the firewall rules at $DAYJOB and I think I'd like to have this, but as we're on 8.0 I'll have to wait a while before I can use my own patch :-) Julian ___ freebsd-ipfw@freebsd.org

Re: Bursty data transfer with Dummynet

2013-11-13 Thread Julian Elischer
between bursts is in order of seconds! My assumption about DummyNet is that while the queue is being drained new packets will be queued (i.e. there is no waiting to fill the queues before transmitting them using the specified bandwidth). On Tue, Nov 12, 2013 at 9:21 PM, Julian Elischerjul

Re: Bursty data transfer with Dummynet

2013-11-12 Thread Julian Elischer
On 11/12/13, 6:35 PM, Ahmed Hamza wrote: Hi All, I'm trying to use Dummynet to test the behaviour of my video streaming application in various network conditions. Dummynet was compiled and installed on an Ubuntu 12.04 box with a 2.6 Linux kernel. I'm experiencing a strange behaviour when I

Re: Bursty data transfer with Dummynet

2013-11-12 Thread Julian Elischer
On 11/12/13, 9:06 PM, Ahmed Hamza wrote: On Tue, Nov 12, 2013 at 8:50 PM, Julian Elischer jul...@freebsd.org wrote: On 11/12/13, 6:35 PM, Ahmed Hamza wrote: Hi All, I'm trying to use Dummynet to test the behaviour of my video streaming application in various network conditions. Dummynet

Re: DNAT in freebsd

2013-07-02 Thread Julian Elischer
On 7/2/13 10:21 PM, Sami Halabi wrote: Hi again, So far no solution Is there really no alternative in FreeBSD? oh I'm sure there are several solutions.. I looked at the original email but have since deleted it.. ah archives to the rescue ok so your request is a bit short on

Re: DNAT in freebsd

2013-07-02 Thread Julian Elischer
On 7/3/13 11:59 AM, Julian Elischer wrote: On 7/3/13 10:47 AM, Julian Elischer wrote: On 7/2/13 10:21 PM, Sami Halabi wrote: Hi again, So far no solution Is there really no alternative in FreeBSD? oh I'm sure there are several solutions.. I looked at the original email but have since

Re: IPFW divert with layer 2 interfaces

2013-01-24 Thread Julian Elischer
On 1/24/13 10:37 AM, Julian Elischer wrote: On 1/24/13 10:16 AM, Jake Guffey wrote: Hi: I am working on a network appliance based on FreeBSD, IPFW, and Suricata. In the scenario that I'm developing for, I need to divert packets sent over a layer 2 bridge for IPS processing. After

Re: firewall rules for core router

2013-01-08 Thread Julian Elischer
On 1/8/13 6:44 AM, Sami Halabi wrote: Anh one? בתאריך 7 בינו 2013 18:09, מאת Sami Halabi sodyn...@gmail.com: Hi, i have a core router that i want to enable firewall on it. is these enough for a start: ipfw add 100 allow all from any to any via lo0 ipfw add 25000 allow all from me to any ipfw

Re: firewall rules for core router

2013-01-08 Thread Julian Elischer
On 1/8/13 10:35 AM, Sami Halabi wrote: Thank you for your response. about fwd: w.x.y.z is a router.. do i still need something? will it forward the packet correctly? It will send them to where-ever it thinks they were originally sent to. בתאריך 8 בינו 2013 19:02, מאת Julian Elischer jul

Re: Limit Session Bandwidth

2013-01-07 Thread Julian Elischer
to do it all in 2 rules if you set up the table correctly. Tablearg in not mentioned in the 'pipe' command help entry but pipe IS mentioned in the tablearg section. let me know if it works! Julian . . more pipes . .. 6500 allow all from any to any so the I had special limit(large) for x.y.z.1

Re: newbie IPFW user - when handbook examples dont work...

2012-03-24 Thread Julian Elischer
On 3/24/12 7:08 PM, Da Rock wrote: On 03/25/12 02:56, Ian Smith wrote: On Sat, 24 Mar 2012, Da Rock wrote: On 03/18/12 02:31, Julian Elischer wrote: On 3/17/12 1:36 AM, Da Rock wrote: On 03/14/12 17:09, Rémy Sanchez wrote: [everything deleted].. ok I'm going to write a little

Re: Local IPv6 traffic not send over loopback?

2012-02-15 Thread Julian Elischer
On 2/15/12 1:44 PM, Freek Dijkstra wrote: Hi Julian and Terrence, Thanks for your tests! I'm now convinced there is a bug in ipfw. As Terrence and I tested, ipfw is matching rules, and reporting in the log, that IPv6 traffic between local IPv6 addresses (from me6 to me6) using an interface

Re: Local IPv6 traffic not send over loopback?

2012-02-14 Thread Julian Elischer
On 2/14/12 2:02 PM, Freek Dijkstra wrote: Hi, I added a few rules to my firewall to prevent spoofing source IP addresses. I encountered some (to me) unexpected behaviour where IPv6 traffic originating at the host would match an ipfw rule with in and recvinterface set. I very much appreciate it

Re: ipfw rule processing performances

2011-10-27 Thread Julian Elischer
On 10/26/11 8:53 PM, Ian Smith wrote: On Wed, 26 Oct 2011, Julian Elischer wrote: On 10/26/11 2:39 PM, Michael Sierchio wrote: On Wed, Oct 26, 2011 at 11:39 AM, Julian Elischerjul...@freebsd.org wrote: read up on all the things you can do with tablearg.. sometimes

Re: ipfw rule processing performances

2011-10-26 Thread Julian Elischer
On 10/26/11 11:28 AM, Karim wrote: On 11-10-25 11:30 PM, Michael Sierchio wrote: On Tue, Oct 25, 2011 at 6:43 PM, Julian Elischerjul...@freebsd.org wrote: I find that the structure of teh ruleset has a huge affect on the cpu usage. for example I immediately split incoming and outgoing

Re: ipfw rule processing performances

2011-10-26 Thread Julian Elischer
On 10/26/11 2:39 PM, Michael Sierchio wrote: On Wed, Oct 26, 2011 at 11:39 AM, Julian Elischerjul...@freebsd.org wrote: read up on all the things you can do with tablearg.. sometimes a single table can replace dozens of rules. Julian - would you be so kind as to give an example? - M off

Re: ipfw rule processing performances

2011-10-25 Thread Julian Elischer
On 10/25/11 8:36 AM, Karim wrote: Hi all, I am using ipfw with a fairly small amount of rules (~200). Most of those are skipto rules to different blocking and pass-through blocks. I use ipfw tags, ALTQ, nat, fwd and several deny and allow rules and I do not use/need tables. What I find is

Re: IPFW hidden/broken rule? (Free 7.2)

2011-09-14 Thread Julian Elischer
On 9/14/11 1:33 AM, Vladimir Budnev wrote: Hello list I am not sure which list this question must go to, so I am sending to -net and -ipfw lists. We have faced some strange problem with ipfw behavior, which we can't understand ourselves. An it really hurts:( We are running 7.2-RELEASE.

Re: DummyNet configuration for opportunistic Links for emulating DTN

2011-05-09 Thread Julian Elischer
On 5/9/11 9:46 AM, quamar niyaz wrote: Hi, I am working on a application which is meant for Delay Tolerant Network. I want to emulate the opportunistic link availability for the data sending nodes using dummyNet . One scenario, suppose from source node to destination node let's say a data link

Re: run pf or ipfw within a jail?

2011-05-08 Thread Julian Elischer
On 5/6/11 11:01 PM, Jack Raats wrote: Normally you run the firewall on the host machine not in the jail. well that's the whole point of the new virtually networking on jails. each jail has its own networking stack and can have interfaces directly attached that don't come through the host

Re: kern/155927: [ipfw] ipfw stops to check bags for compliance with the rules, letting everything Rules

2011-03-29 Thread Julian Elischer
On 3/27/11 11:44 PM, Luigi Rizzo wrote: On Mon, Mar 28, 2011 at 06:14:20AM +, lini...@freebsd.org wrote: Old Synopsis: Ipfw stops to check bags for compliance with the rules, letting everything Rules New Synopsis: [ipfw] ipfw stops to check bags for compliance with the rules, letting

Re: Strange problem

2011-02-11 Thread Julian Elischer
On 2/11/11 7:02 PM, Jason Mattax wrote: I'm currently running 8.1-RELEASE-p2 and attempting to set up a firewall with natd and ipfw. I was trying a more complicated ipfw script and had some problems. I reduced my rule set to the smallest sets I could manage to find the exact rule that causes

Re: Fwd: stunnel transparent proxy

2011-01-14 Thread Julian Elischer
On 1/10/11 11:47 AM, Jay Corrales wrote: Folks, Would it be possible to devise an ipfw 'fwd' rule to pass along a socket connection with IP_BINDANY set via stunnel that forwards it to another process? The problem I'm having is the vnc service on the other side cannot reply back to the IP

Re: Transparent Squid and traffic control

2011-01-04 Thread Julian Elischer
nets getting out to the outside interface # except for the wierdness of our next hop being such an address. ${fwcmd} add ${OUTGOING} allow icmp from ${oip} to ${onet}/${omask} keep-state ${fwcmd} add deny log all from any to table(1) # The firewall (and julian) can

Re: IPFW - NAT - two gateway -HELP

2011-01-01 Thread Julian Elischer
On 1/1/11 10:42 PM, Nima Khoramdin wrote: hello again ok Maybe I was wrong explain. I already have an ip address in my network is working with NAT ( nat to internal web server ) , i want to add another NIC with a new isp (IP) for backup, and new nat rule. how can i set two separated gateways

Re: layer2 ipfw 'fwd' support

2010-10-04 Thread Julian Elischer
On 10/4/10 10:16 AM, Eduardo Meyer wrote: On Mon, Oct 4, 2010 at 2:02 PM, Brandon Gooch jamesbrandongo...@gmail.com wrote: On Mon, Oct 4, 2010 at 9:44 AM, Eduardo Meyerdudu.me...@gmail.com wrote: Hello, In the past I have used this patch by Luigi Rizzo, which helped me well.

Re: layer2 ipfw 'fwd' support

2010-10-04 Thread Julian Elischer
On 10/4/10 12:18 PM, Eduardo Meyer wrote: On Mon, Oct 4, 2010 at 3:35 PM, Julian Elischerjul...@freebsd.org wrote: On 10/4/10 10:16 AM, Eduardo Meyer wrote: On Mon, Oct 4, 2010 at 2:02 PM, Brandon Gooch jamesbrandongo...@gmail.comwrote: On Mon, Oct 4, 2010 at 9:44 AM, Eduardo

Re: All in one machine running w/ Dansguardian+Squid+IPFW

2010-09-09 Thread Julian Elischer
On 9/8/10 11:26 PM, Ian Smith wrote: On Wed, 8 Sep 2010, Julian Elischer wrote: On 9/8/10 4:44 PM, Tony wrote: my setup looks like this PC1 - browser - firewall(redirects port 80 to ) - dansguardian( 127.0.0.1:) - squid(127.0.0.1:) - internet

Re: All in one machine running w/ Dansguardian+Squid+IPFW

2010-09-08 Thread Julian Elischer
On 9/8/10 2:46 PM, Tony wrote: I have one computer that has Dansguardian (127.0.0.1:) and Squid (127.0.0.1) and IPFW installed. From the same computer, I'm trying to redirect port 80 to Dansguardian's port using the rulesets below. Is this possible? I read that ipfw does not allow

Re: kern/146372: [ipfw] ipfw setfib does not work on local outgoing connections

2010-05-07 Thread julian
Synopsis: [ipfw] ipfw setfib does not work on local outgoing connections State-Changed-From-To: open-closed State-Changed-By: julian State-Changed-When: Fri May 7 15:00:00 PDT 2010 State-Changed-Why: Unfortunatly this is mostly unavoidable. The routing decision has already been made by the time

Re: rule 00000.

2010-04-07 Thread Julian Elischer
On 4/7/10 8:10 AM, Freddie Cash wrote: 2010/4/6 Erich Jenkins, Fuujin Group Ltder...@fuujingroup.com If you read the archives of this list, you'll find that this issue only applies to 8-STABLE after the 8.0 release. Thus, if you upgrade to 8.0-RELEASE, you will not run into this problem.

Re: dummynet and vnet kernel panic

2010-04-07 Thread Julian Elischer
On 4/7/10 1:38 PM, Luigi Rizzo wrote: On Wed, Apr 07, 2010 at 09:58:38PM +0200, Anders Hagman wrote: Hi When using dummynet inside a vnet node with a simple pipe the kernel panic on the first packet. I use 8.0-STABLE cvsuped at 7 Apr 15:28 The ipfw code with dummynet is largely changed and

Re: IPFIREWALL_FORWARD

2010-03-16 Thread Julian Elischer
n j wrote: it's needed for the functionality. you need to slightly change the behaviour or the existing stack in quite a number of places to handle a forwarded packet. Sorry for catching up with the thread so late, I was without Internet connection for the last couple of days. Thanks for all

Re: IPFIREWALL_FORWARD

2010-03-11 Thread Julian Elischer
n j wrote: A loadable module requires a coherent piece of code to implement the functionality, that can be put into the module. This option scatters tiny snippets of code throughout the exisitng TCP/UDP/IP/ipfw code. Is that just a matter of current implementation or is that 'scatter'

Re: IPFIREWALL_FORWARD

2010-03-10 Thread Julian Elischer
n j wrote: Hello, although this has probably been asked before, could anyone point me to some relevant information about why fwd/forward requires kernel recompile, i.e. it's not been made a kernel module? This prevents me from using freebsd-update and forces me to upgrade from source which -

Re: IPFIREWALL_FORWARD

2010-03-10 Thread Julian Elischer
Chris St Denis wrote: Julian Elischer wrote: n j wrote: Hello, although this has probably been asked before, could anyone point me to some relevant information about why fwd/forward requires kernel recompile, i.e. it's not been made a kernel module? This prevents me from using freebsd-update

Re: RFC: new ipfw options

2010-01-11 Thread Julian Elischer
Maxim Ignatenko wrote: 2009/12/9 Luigi Rizzo ri...@iet.unipi.it: 3. a hash version of 'table's Right now ipfw tables are implented as routing tables, which is great if you have to lookup a longest matching prefix, but a bit overkill if you care only for ports or jail ids, and totally

Re: ipfw modip - PR121122

2009-12-17 Thread Julian Elischer
eks...@freebsdbrasil.com.br wrote: Context: http://www.freebsd.org/cgi/query-pr.cgi?pr=121122 http://code.google.com/p/exports/wiki/ToSWorkAround http://forums.freebsd.org/showthread.php?t=7306 Any chance we will see Marcelo's work (or a derivative) commited to base? Are there serious

Re: dummynet issues

2009-12-01 Thread Julian Elischer
Kevin Smith wrote: Oleg Bulyzhin wrote: On Mon, Nov 30, 2009 at 11:58:55PM -0500, Ben Kelly wrote: I actually have not measured my bandwidth to validate dummynet. I have simply observed these messages repeating in my log: dummynet: OUCH! pipe should have been idle! Under normal

Re: Diverting sockets and streams

2009-11-04 Thread Julian Elischer
jakub wrote: Hi list, I have a newbie question about divert sockets but I can't find a direct answer. I have a rule like this: ipfw add divert tcp from me to any 80 keep-state If I understand it correctly, in order to check the data stream properly I have to deal with: 1. packet

Re: Using dummynet to restrict bandwidth with more than 2 active pipes / queues

2009-07-28 Thread Julian Elischer
Mark Sandford wrote: Sorry if anyone's wasted time looking at this. The problem appears to be with the traffic generator. Once we get above two generation processes we think that the data is being sent in bursts so although it appears to be right averaged over a second at a finer granularity the

Re: Does ipfw support interface groups?

2009-05-21 Thread Julian Elischer
Ermal Luçi wrote: Hello, can ipfw use somehow interface groups as pf(4) can? From a quick glance at documentation and not so through look at code it does not but i am sending this just if i missed something during my search! Thanks, no, but you can do em*

Re: Does ipfw support interface groups?

2009-05-21 Thread Julian Elischer
Freddie Cash wrote: Skipto is very powerful, and we use it in some cases. But I try not to use it very often, as it can lead to spaghetti rules that are hard to follow. :) We have one firewall where it takes a good 10 minutes to track the path a packet takes through the rulelist, as there

Re: IPFW MAX RULES COUNT PERFORMANCE

2009-04-28 Thread Julian Elischer
Daniel Dias Gonçalves wrote: Julian, You could give an example of rules with tables? I'm sorry I forgot that you want to count packets from each client. tables won't work for that. for counting I suggest the technique I show below, but for just allowing, you can add allowable addresses

Re: IPFW MAX RULES COUNT PERFORMANCE

2009-04-24 Thread Julian Elischer
, therefore simultaneous user. Understand ? I think so. do not add rules. have a single rule that looks in a table and add entries to the table when needed. Thanks, Daniel Julian Elischer escreveu: Daniel Dias Gonçalves wrote: Hi, My system is a FreeBSD 7.1R. When I add rules IPFW COUNT to 254

Re: IPFW MAX RULES COUNT PERFORMANCE

2009-04-23 Thread Julian Elischer
) which may also be good.. (or not)) julian ___ freebsd-ipfw@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-ipfw To unsubscribe, send any mail to freebsd-ipfw-unsubscr...@freebsd.org

Re: FreeBSD 7.1 IPv6 multihoming problem

2009-03-31 Thread Julian Elischer
zgabe wrote: Hi All, I am using laptop, FreeBSD 7.1 connecting to two ISPs (wlan and ppp) and I have IPv6 addresses. 'netstat -rn' says there is only one default gateway (for example wlan's default gateway). My problem is the following: If I ping the ppp tunnel from an other computer, my

Re: pls help on 3 interfaces

2009-03-19 Thread Julian Elischer
Lin Zhao wrote: too much thx for Julian Elischer John Nielsen. i've tried it, and it seems working now, but i don't know if i'm right in setting natd2 i just add one line in /etc/services as natd2 8669 and run a command: natd -n fxp1 -p 8669 seems so stupid. I assume you mean

Re: keep-state rules inadequately handles big UDP packets or fragmented IP packets?

2009-03-18 Thread Julian Elischer
Luigi Rizzo wrote: On Tue, Mar 17, 2009 at 03:39:45PM -0700, Julian Elischer wrote: ... Ok then we may have a plan: you could do is implement REASS as an action (not as a microinstruction), with the following behaviour: - if the packet is a complete one, the rule behaves as a count (i.e

Re: pls help on 3 interfaces

2009-03-18 Thread Julian Elischer
Lin Zhao wrote: hi all, wish my english is enough :-) my freebsd has 3 interfaces, like this, switch1 | -- fxp0| || |- internal ||freebsd71 | |rl0 |

Re: keep-state rules inadequately handles big UDP packets or fragmented IP packets?

2009-03-17 Thread Julian Elischer
Luigi Rizzo wrote: On Tue, Mar 17, 2009 at 11:02:48PM +0100, Paolo Pisati wrote: Luigi Rizzo wrote: Thinking more about it, i believe that calling reass as an explicit firewall action is useless, because if ip_reass fails due to lack of all fragments you are back to square one: what do

Re: ipfw amd bridge

2009-03-15 Thread Julian Elischer
Olivier Nicole wrote: Hi, I remember reqading in the past (4.x) that on a machine with bridged interfaces, only layer 2 rules of ipfw would apply. not quite. there are rules that do not work when called from a layer two point. e.g. divert does not work, nor does 'fwd' (without patches). Rules

Re: ipfw amd bridge

2009-03-15 Thread Julian Elischer
Olivier Nicole wrote: Thanks, I remember reqading in the past (4.x) that on a machine with bridged interfaces, only layer 2 rules of ipfw would apply. not quite. there are rules that do not work when called from a layer two point. e.g. divert does not work, nor does 'fwd' (without patches).

Re: rc.firewall quick change

2008-11-14 Thread Julian Elischer
Ian Smith wrote: On Thu, 13 Nov 2008, Julian Elischer wrote: At home I use the following change. basically, instead of doing 8 rules before and after the nat, use a table and to 1 rule on each side. any objections? Only that if people are already using tables for anything

Re: rc.firewall quick change

2008-11-14 Thread Julian Elischer
Bruce Evans wrote: On Fri, 14 Nov 2008, Julian Elischer wrote: Ian Smith wrote: On Thu, 13 Nov 2008, Julian Elischer wrote: At home I use the following change. basically, instead of doing 8 rules before and after the nat, use a table and to 1 rule on each side. any objections

Re: rc.firewall quick change

2008-11-14 Thread Julian Elischer
Doug Barton wrote: Julian Elischer wrote: I think the table is faster for mor ethan about 8 addresses (so we are borderline) but it's be hard to test.. You however use two rules so that would be slower. I'm not a firewall expert so I won't comment on the specifics but I do want to say

Re: change specific linux iptables rule set to ipfw rule set

2008-11-13 Thread Julian Elischer
Son, Yeongsik wrote: One of linux server contains rule set like these: iptables -A INPUT -p tcp --syn --dport 80 - m connlimit --conlimit-above 20 -j DROP iptables -A INPUT -m recent --name KIN -rcheck --seconds 300 -j DROP iptables -A INPUT -p tcp --syn --dport 80 -m connlimit

rc.firewall quick change

2008-11-13 Thread Julian Elischer
At home I use the following change. basically, instead of doing 8 rules before and after the nat, use a table and to 1 rule on each side. any objections? (warning, cut-n-paste patch.. will not apply) Index: rc.firewall === ---

Re: Portforwarding - still the same issue

2008-10-27 Thread Julian Elischer
Leander S. wrote: Roman Kurakin schrieb: John Hay wrote: On Mon, Oct 20, 2008 at 11:19:22PM +0200, Leander S. wrote: Hi, I'm trying to set up something like a HotSpot. Goal is it to force unregistred users to get redirected to the Captive Portalsite where they'll be able to agree my

Re: Any plans or desire for bulk addition to tables?

2008-10-27 Thread Julian Elischer
David Wolfskill wrote: On my systems that are directly connected to network not known to be relatively safe, I use ipfw a fair bit. Of late, I've taken to augmenting the usual rules that are sensitive to specific ports and the like with (early) rules that check certain ipfw tables; they are

Re: ipfw rules optimitsing

2008-10-17 Thread Julian Elischer
Anatoliy wrote: Greetings to all. I have a problem to optimise ipfw rules. When I have started to search for the decision there were some questions How it is possible to find out how many loading gives this or that rule or all corrected as a whole. Prompt as it better to make in practice? As it

Re: IPFW fwd issue.

2008-10-02 Thread Julian Elischer
Dan Johnson wrote: After beating my head against this for days I ran out of places to look for information, and almost sent this as a help request instead of an observation. So excuse the present tense. All I am actually trying to accomplish is a simple (This worked flawless last i tried under

Re: IPFW fwd issue.

2008-10-02 Thread Julian Elischer
Dan Johnson wrote: On Fri, Oct 3, 2008 at 12:01 AM, Julian Elischer [EMAIL PROTECTED]wrote: Dan Johnson wrote: After beating my head against this for days I ran out of places to look for information, and almost sent this as a help request instead of an observation. So excuse the present

Re: anyone have a netgraph node to do ipfw filtering?

2008-09-12 Thread Julian Elischer
Bjoern A. Zeeb wrote: On Thu, 11 Sep 2008, Julian Elischer wrote: Hi, I think someone sent me a link to an ng_ipfw_filter node once but I've lost it... (I think it was called ng_ipfw but that name is now taken by the netgraph/ipfw 'ipfw netgraph' packet divert option). Something that lets

Re: ipfw add skipto tablearg....

2008-08-19 Thread Julian Elischer
Luigi Rizzo wrote: On Wed, Aug 20, 2008 at 04:06:05AM +1000, Ian Smith wrote: On Tue, 19 Aug 2008, Luigi Rizzo wrote: On Tue, Aug 19, 2008 at 11:12:04PM +1000, Ian Smith wrote: ... Until $someone adds a direct skipto target jump at the virtual machine code level - big recalc hit when

Re: ipfw add skipto tablearg....

2008-08-19 Thread Julian Elischer
Luigi Rizzo wrote: On Wed, Aug 20, 2008 at 04:06:05AM +1000, Ian Smith wrote: On Tue, 19 Aug 2008, Luigi Rizzo wrote: On Tue, Aug 19, 2008 at 11:12:04PM +1000, Ian Smith wrote: ... Until $someone adds a direct skipto target jump at the virtual machine code level - big recalc hit when

Re: IPv6 tables?

2008-08-06 Thread Julian Elischer
versions (without looking at the code, just the manpage). I'm now wondering which approach would be less resource-hungry: Adding a separate table6 structure or modifying tables to accept v6. The former, to my mind, is more economical with large tables. Thanks to you and Julian for the replies

Re: IPv6 tables?

2008-08-05 Thread Julian Elischer
Matt Dawson wrote: Just a quick question: What would it take to have similar functionality to the IPv4 tables in ipfw for v6? Is there a specific reason it isn't there (other than the fact that I haven't got my finger out and learnt the neccessary to add it myself ;) )? there is no reason

Re: IPFW+Dummynet Capability

2008-07-20 Thread Julian Elischer
Kazi A. Sharif wrote: Hello Guys, I was planning to install a heavy duty bandwidth manager for my ISP. I went through some documentation and installed IPFW and Dummynet in FreeBSD 7.0. Before I spent so much time on this I need to know the limitations that are already noticed: 1. If we

Re: About IPFW for IPv6

2008-06-15 Thread Julian Elischer
Fabian Wenk wrote: Hello Edwin On 14.06.08 04:27, Edwin Sanjoto wrote: Do you know how to set firewall for IPv6 using IPFW? Just use ipfw the same like for IPv4, then since FreeBSD 6.x it does also support IPv6. If you still have an older version of FreeBSD, use ip6fw. there are some

Re: ipfw route to multigateways

2008-06-10 Thread Julian Elischer
Rosli Sukri wrote: hi scenario: users[lan]freebsdipfw[wan]-{gw1,gw2} where gw1 goes to isp1, and gw2 goes to isp2. easily done but how do you ensure the return packets come back the same way? requirements: ftp, http, https traffic goes to gw1 telnet, ssh, mail and pop goes to

Re: kern/123174: [ipfw] table add value lists as ip/uint16 instead of uint32.

2008-04-28 Thread julian
Synopsis: [ipfw] table add value lists as ip/uint16 instead of uint32. State-Changed-From-To: open-closed State-Changed-By: julian State-Changed-When: Mon Apr 28 12:15:05 PDT 2008 State-Changed-Why: fixed in all affected branches post release. dupplicate of another bug (also closed) (I forget

addition to ipfw table..

2008-04-16 Thread Julian Elischer
this change allows one to type ipfw table 2 add 1.1.1.1:255.255.255.0 0 in addition to the currently acceptable 1.1.1.1/24 0 The reason is that some programs supply the netmask in that (mask) form and a shell script trying to add it to a table has a hard time converting it to the currently

Re: bin/120720: [patch] [ipfw] unbreak POLA for ipfw table list

2008-04-04 Thread Julian Elischer
The following reply was made to PR bin/120720; it has been noted by GNATS. From: Julian Elischer [EMAIL PROTECTED] To: [EMAIL PROTECTED], [EMAIL PROTECTED] Cc: Subject: Re: bin/120720: [patch] [ipfw] unbreak POLA for ipfw table list Date: Fri, 04 Apr 2008 11:12:39 -0700 The change has been

Re: [HEADS UP!] IPFW Ideas: possible SoC 2008 candidate

2008-03-26 Thread Julian Elischer
Vadim Goncharov wrote: Hi Julian Elischer! On Mon, 24 Mar 2008 10:53:44 -0700; Julian Elischer wrote about 'Re: [HEADS UP!] IPFW Ideas: possible SoC 2008 candidate': here are some of my ideas for ipfw changes: 1/ redo locking so that packets do not have to get locks on the structure... I

Re: [HEADS UP!] IPFW Ideas: possible SoC 2008 candidate

2008-03-24 Thread Julian Elischer
here are some of my ideas for ipfw changes: 1/ redo locking so that packets do not have to get locks on the structure... I have several ideas on this 2/ allow separate firewalls to be used at different parts of the network stack (i.e allow multiple taboe sto co-exist) 3/ possibly keeping

Re: kern/80642: [ipfw] [patch] ipfw small patch - new RULE OPTION

2008-03-19 Thread Julian Elischer
Vadim Goncharov wrote: Hi Julian Elischer! On Tue, 18 Mar 2008 01:09:19 -0700; Julian Elischer wrote about 'Re: kern/80642: [ipfw] [patch] ipfw small patch - new RULE OPTION': About Vadim's prepositions: 1. tablearg: it's possible, but now we use u32 argument in tables, but counterlimits

Re: kern/80642: [ipfw] [patch] ipfw small patch - new RULE OPTION

2008-03-18 Thread Julian Elischer
Andrey V. Elsukov wrote: Paolo Pisati wrote: On Thu, Mar 13, 2008 at 09:21:11AM +, Vadim Goncharov wrote: http://www.freebsd.org/cgi/query-pr.cgi?pr=80642 Yes, this is useful, but some minor changes are needed, I think. First, rename it to bytelimit or somewhat. Second, allow this to use

Re: bin/120720: [patch] [ipfw] unbreak POLA for ipfw table list

2008-02-18 Thread Julian Elischer
Vadim Goncharov wrote: In-Reply-To: [EMAIL PROTECTED] References: [EMAIL PROTECTED] Hi Eugene Grosbein! On Fri, 15 Feb 2008 23:42:16 +0700 (KRAT); Eugene Grosbein [EMAIL PROTECTED] wrote: The command ipfw table 1 list used to format table values associated with network addresses as

Re: bin/120720: [patch] [ipfw] unbreak POLA for ipfw table list

2008-02-18 Thread Julian Elischer
The following reply was made to PR bin/120720; it has been noted by GNATS. From: Julian Elischer [EMAIL PROTECTED] To: Vadim Goncharov [EMAIL PROTECTED] Cc: Eugene Grosbein [EMAIL PROTECTED], freebsd-ipfw@freebsd.org, [EMAIL PROTECTED] Subject: Re: bin/120720: [patch] [ipfw] unbreak POLA

Re: bin/120720: [patch] [ipfw] unbreak POLA for ipfw table list

2008-02-18 Thread julian
Synopsis: [patch] [ipfw] unbreak POLA for ipfw table list State-Changed-From-To: open-closed State-Changed-By: julian State-Changed-When: Mon Feb 18 11:27:58 PST 2008 State-Changed-Why: Patch committed to -current and scheduled for MFC. http://www.freebsd.org/cgi/query-pr.cgi?pr=120720

Re: Fragmented Packet Reassembly and IPFW2

2007-11-13 Thread Julian Elischer
Curby wrote: Hi, this is slightly off-topic as it relates to IPFW2 in Mac OS X (as of Tiger, 10.4.x). I've read that when a FreeBSD machine running IPFW2 receives a fragmented TCP packet (and let's say that the machine itself is the intended destination), the packet is reassembled before it

Re: Fwd: Fragmented Packet Reassembly and IPFW2

2007-11-13 Thread Julian Elischer
Curby wrote: Julian and Vadim, thank you both for your replies. Here's a really old quote: The ip_input() routine in the kernel then dequeues the packet, performs sanity checks on the packet and determines the destination for the packet. If the destination is the local computer, the kernel

Re: IPFW Problem

2007-11-05 Thread Julian Elischer
Gardner Bell wrote: --- Julian Elischer [EMAIL PROTECTED] wrote: Gardner Bell wrote: I'm hoping some of you can help me out with the problem that I'm having as I'm not very good when it comes to networking.. I've recently configured 6.3-PRERELEASE with IPFW/NATD to act as my LAN's firewall

Re: source based forwarding code

2007-09-13 Thread Julian Elischer
Srimanta BSD wrote: Hi, Can someone please send me the link to download Source Based Forwarding implementation in FreeBsd 6.2 or other version. we use the firewall(s) to do so.. Look in the ipfw man pages for the 'fwd' command for ipfw. For pf there is another command, the name of which I

Re: getting state to work properly

2007-09-04 Thread Julian Elischer
Vadim Goncharov wrote: 31.08.07 @ 00:41 Russell Fulton wrote: Rule set appended -- anonymizing the rule set while keeping the sense would be a lot of work and I don't want to trim it down for fear of dropping something vital. As this network is not exposed to the internet and the firewall's

Re: redirect traffic based on destination port to another interface

2007-08-03 Thread Julian Elischer
Rudy Setiawan wrote: On 8/2/07, Julian Elischer [EMAIL PROTECTED] wrote: Rudy Setiawan wrote: Hi, I am trying to do a traffic redirection based on destination port to another interface/gateway. Currently, I have a freebsd box that does simple NAT and an Internet connection. I am planning

Re: Policy - based Routing problem Need help

2007-07-28 Thread Julian Elischer
Narek Gharibyan wrote: Hi all, I have a firewall/router with FreeBSD 6.2 installed on it. 2 ISP connection and 2 LAN connections. I need to do a policy-based routing. All I need that packets coming from one ISP interface return to that interface (incoming connections' source based routing) and

Re: a sysctl variable to query last ipfw rule number

2007-05-08 Thread Julian Elischer
A. Skrobov wrote: Such a variable is useful in scripts that add blocks of rules containing skipto actions; instead of hardcoding numbers for all the rules, they could be derived dynamically. I'm also looking at a version of skipto that uses RELATIVE numbering. (called just 'skip') i.e. ipfw

Re: Policy Routing natd+ipfw

2007-05-08 Thread Julian Elischer
Julian Elischer wrote: actually the kernel code is in the 6 branch but the ipfw program has not been taught how to set the values yet.. I just committed the change to RELENG_6 so the head of the 6 branch should be able to do this now. julian Kirk

Re: Policy Routing natd+ipfw

2007-05-07 Thread Julian Elischer
Kirk Davis wrote: Julian Elischer wrote: in -current you can implement a routing table via FWD and tables. in 6.x you need to specify the next hop. and an more explicit rule. Is there any information floating around on how to do this in current using the FWD rules and tables? Any pointer

Re: Policy Routing natd+ipfw

2007-05-07 Thread Julian Elischer
Kirk Davis wrote: Julian Elischer wrote: in -current you can implement a routing table via FWD and tables. in 6.x you need to specify the next hop. and an more explicit rule. Is there any information floating around on how to do this in current using the FWD rules and tables? Any pointer

Re: Policy Routing natd+ipfw

2007-05-06 Thread Julian Elischer
you can treat it as if it was non terminating. this means that you need to do the NAT before you do the FWD. julian ___ freebsd-ipfw@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-ipfw To unsubscribe, send any mail

Re: ipfw with nat - allowing by MAC address

2007-04-26 Thread Julian Elischer
I'm surprised you haven't tried the firewall set I sent you.. I practically wrote the whole thing for you. ___ freebsd-ipfw@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-ipfw To unsubscribe, send any mail to [EMAIL

Re: ipfw with nat - allowing by MAC address

2007-04-26 Thread Julian Elischer
Lubomir Georgiev wrote: Yeah! People, we can congratulate ourselves! We've done it! With a few modifications I've finally found the smallest working MAC filtered NAT system. So here's what I ended up with - I'm including the queues just for the entirety of the ruleset, they have nothing to do

Re: kern/107305: [ipfw] ipfw fwd doesn't seem to work

2007-04-26 Thread Julian Elischer
Andrey V. Elsukov wrote: The following reply was made to PR kern/107305; it has been noted by GNATS. This was fixed in 6.[later] (6.2 at least, maybe 6.1) (The need for the EXTENDED option) -- WBR, Andrey V. Elsukov ___

Re: ipfw with nat - allowing by MAC address

2007-04-25 Thread Julian Elischer
[EMAIL PROTECTED] wrote: Ok, I got home (when I have some time) and tried exactly your rule set. The main deal why it worked on my example and not your approach is: - once packets get dropped (denied) on layer2, it will never reach upper layers Thus, NO OTHER action besides deny will avoid the

Re: ipfw with nat - allowing by MAC address

2007-04-24 Thread Julian Elischer
Lubomir Georgiev wrote: OK, so let's get started. Here's my ruleset - 00300 131732 19262748 skipto 1200 ip from any to any { MAC any 00:19:d2:36:b8:48 or MAC 00:19:d2:36:b8:48 any } layer2 for a packet from a client through this machine to the internet: on the first pass (packet in

Re: ipfw with nat - allowing by MAC address

2007-04-24 Thread Julian Elischer
Julian Elischer wrote: Lubomir Georgiev wrote: OK, so let's get started. Here's my ruleset - 00300 131732 19262748 skipto 1200 ip from any to any { MAC any 00:19:d2:36:b8:48 or MAC 00:19:d2:36:b8:48 any } layer2 for a packet from a client through this machine to the internet

<    1   2   3   >