Re: match queue ignored

2011-08-17 Thread william dunand
>>> Greetings, >>> >>> I tried setting up the following into pf.conf on both 4.9 and latest snapshot: >>> >>> altq on $ext_if priq queue {q1, q2} >>> queue q1 priority 1 priq(default) >>> queue q2 priority 2 >>> pass all queue q1 >>> match all queue q2 >>> >>> And I see nothing going into q2. >>> I

Re: match queue ignored

2011-08-17 Thread william dunand
> Greetings, > > I tried setting up the following into pf.conf on both 4.9 and latest snapshot: > > altq on $ext_if priq queue {q1, q2} > queue q1 priority 1 priq(default) > queue q2 priority 2 > pass all queue q1 > match all queue q2 > > And I see nothing going into q2. > Is this the expected beha

match queue ignored

2011-08-15 Thread william dunand
Greetings, I tried setting up the following into pf.conf on both 4.9 and latest snapshot: altq on $ext_if priq queue {q1, q2} queue q1 priority 1 priq(default) queue q2 priority 2 pass all queue q1 match all queue q2 And I see nothing going into q2. Is this the expected behavior? Thanks for you

Re: pf rdr-to outgoing to local port issues

2011-02-24 Thread william dunand
> pass out log(matches) quick inet proto tcp from any to 89.176.141.250 port = > www rdr-to 127.0.0.1 port 8080 I think rdr-to is meant to be use on inbound rules.

Re: nat static-port option

2011-02-01 Thread william dunand
On Tue, Feb 1, 2011 at 6:43 AM, Josh Smith wrote: > misc@, > > I recently acquired a playstation 3 and have been running into some > difficulties playing it online behing my openbsd gateway. After doing > some research and testing I have been able to overcome most of these > problems by appending

Re: pf.conf: "match" seems to clean up previous "log" statements.

2010-06-15 Thread william dunand
> When you use 'match' to set options (e.g. nat-to) it does that for > for *subsequent* rules, it doesn't retrospectively loop back and > change addresses on a rule which has *already* been processed. Yes I know that much. And as my pass rules care about the not-yet translated source addresses, th

Re: pf.conf: "match" seems to clean up previous "log" statements.

2010-06-14 Thread william dunand
> ah, yes, I see what you mean, but this depends on the values chosen for > A, B, somewhere, something. Yeah sorry for the vagueness :) Anyway I tested it just in case and as expected it didn't work. > it might be simpler to combine the rules e.g. > > pass out on $ext_if proto tcp from {A, B} to

Re: pf.conf: "match" seems to clean up previous "log" statements.

2010-06-14 Thread william dunand
quot;match ... nat-to" rules to have to be after the related pass rules. Thanks again for your help. William On Tue, Jun 15, 2010 at 12:28 AM, Stuart Henderson wrote: > On 2010-06-14, william dunand wrote: >> Well this rule-set's purpose is just to illustrate the "probl

Re: pf.conf: "match" seems to clean up previous "log" statements.

2010-06-14 Thread william dunand
purpose this > match rule can serve, so it's not entirely surprising this hasn't > been noticed before... What are you trying to do with this? > > > On 2010-06-14, william dunand wrote: >> Dear list, >> >> I just noticed something strange with pf (4.7) an

pf.conf: "match" seems to clean up previous "log" statements.

2010-06-14 Thread william dunand
Dear list, I just noticed something strange with pf (4.7) and I wondered if someone could help me to understand it. Let's consider the following simple rule-set: set skip on lo0 pass all block out log on bge0 inet proto tcp from any to x.x.x.x port 80 match out on bge0 inet proto tcp from any t

ifstated behavior

2010-04-14 Thread william dunand
Hi misc, I was playing around with ifstated, trying to understand exactly how it behaves, and came up with a few assumptions for which I could not find any contradiction or confirmation in the docs. So I'd appreciate if someone familiar with ifstated internals could shed some light. -

Re: Preempt: apparently no effect on advskew

2010-04-13 Thread william dunand
Tue, Apr 13, 2010 at 04:32:12PM +0900, william dunand wrote: >> Dear list, >> >> I am currently setting up two 4.6 boxed to act as carp'ed firewalls. > > [...] > >> Even though I got to quite satisfying results, I am confused about the >> net.inet.carp.p

Preempt: apparently no effect on advskew

2010-04-13 Thread william dunand
Dear list, I am currently setting up two 4.6 boxed to act as carp'ed firewalls. - On the active node: % cat /etc/hostname.bge1 inet 10.100.0.1 255.255.255.0 NONE -inet6 % cat hostname.pfsync0 up syncdev bge1 % cat /etc/hostname.bge0 inet xxx.xxx.xxx.48 255.25

Re: Wondering about openbsd way to update for patches.

2008-11-28 Thread william dunand
What about the following process : - Install release - Download the release's src.tar.gz and sys.tar.gz from one of the official FTP - Extract those in /usr/src - wget all the patches listed on http://openbsd.org/errata44.html - Read http://openbsd.org/faq/faq10.html#Patches - Read instructi

Re: Using PF to NAT internal addresses over an IPSec link

2008-08-15 Thread william dunand
ested in knowing the clean and mighty way to hide your local subnet topography. Maybe using an intermediate local interface may help, as it was suggested by Marc-Andre. Regards, William 2008/8/15 Toby Burress <[EMAIL PROTECTED]>: > On Fri, Aug 15, 2008 at 05:09:08PM +0900, william d

Re: Using PF to NAT internal addresses over an IPSec link

2008-08-15 Thread william dunand
you paste and show us the output of netstat -rnf encap and also if possible your pf.conf ? Regards, William 2008/8/15 Toby Burress <[EMAIL PROTECTED]>: > On Fri, Aug 15, 2008 at 01:24:59PM +0900, william dunand wrote: >> Hi, >> >> I tried to reproduce what you want in my

Re: Using PF to NAT internal addresses over an IPSec link

2008-08-14 Thread william dunand
Hi, I tried to reproduce what you want in my testing environment and managed to make it work. What you have to do is : - In your ipsec.conf, add an rule from your local network to the distant 172.25.0.1 (this rule is needed in order to route the traffic to enc0) - Add a nat rule on enc0 in your

Re: OpenBSD 4.3 running in VirtualBox? Anyone have it working properly?

2008-08-07 Thread william dunand
2008/8/7 Jordi Beltran Creix <[EMAIL PROTECTED]>: > I tried to run a recent i386 4.4 beta on a KVM/QEMU virtual machine > under Ubuntu and there are some problems with the emulated network. > The driver constantly reports timeouts. >> re0: watchdog timeout > As a side effect the connection is very

Firmware loading delay for malo on Zaurus

2008-07-25 Thread William Dunand
Hi, I recently purchased a marvell based CF wifi card for my zaurus, which is running 4.4-beta snapshot (2008-07-03). After installing the package malo-firmware-1.4.tgz I was encountering the following messages when plugging the card : malo0: main FW not loaded! So I took a quick look at th