Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 21 Jun 2023 15:36:53 +0000
From:      bugzilla-noreply@freebsd.org
To:        net@FreeBSD.org
Subject:   [Bug 272094] pfilctl IPFW hook order not works with PF route-to
Message-ID:  <bug-272094-7501-b4b62kNvrD@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-272094-7501@https.bugs.freebsd.org/bugzilla/>
References:  <bug-272094-7501@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D272094

--- Comment #5 from Gleb Smirnoff <glebius@FreeBSD.org> ---
(In reply to Alfa from comment #3)
> Sorry to bother but i am confused about PFILCTL tool, to make it clear Wh=
at is this tool's main purpose?

To change how firewalls are hooked into the network stack. Sorry for obvious
answer :) A more practical answer:

- Somebody may want to filter only on input, skipping any filtering on outp=
ut.
- There are some drivers that provide a NIC level hook. This allows to unho=
ok
firewalls from default path and hook them on the NIC only. First, these NIC
level hooks allow to drop packets at a much lower cost. Second, you can bui=
ld
your firewall based on interfaces, very much like Cisco or Juniper do.
- Although running a stack of firewalls (pf, ipfw, ipfilter) is not somethi=
ng
that is supported or recommended, some people do that and some configuratio=
ns
(apparently without route-to) work excellent. pfilctl allows to reconfigure=
 the
stack.

P.S. We probably should enable interface level hooks in general, for those
drivers that don't support NIC level hooks. That won't provide a packet drop
performance gain, but will allow to design router-style firewall with any N=
ICs.

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-272094-7501-b4b62kNvrD>