Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 18 Jul 2025 12:50:38 -0700
From:      Lee Brown <leeb@ratnaling.org>
To:        "Patrick M. Hausen" <hausen@punkt.de>
Cc:        "freebsd-net@freebsd.org" <freebsd-net@freebsd.org>
Subject:   Re: net.inet.ip.fw.verbose in jails
Message-ID:  <CAFPNf5_%2BdQjxGc1VVmZ_YVv_UC5JG0wBaowu=3oaQKNS2S09kg@mail.gmail.com>
In-Reply-To: <C963E6A0-CF3B-4052-A954-46CC28134FA9@punkt.de>
References:  <C963E6A0-CF3B-4052-A954-46CC28134FA9@punkt.de>

next in thread | previous in thread | raw e-mail | index | archive | help

[-- Attachment #1 --]
I've had that happen if the jails don't have syslogd running inside them.

On Fri, Jul 18, 2025 at 6:25 AM Patrick M. Hausen <hausen@punkt.de> wrote:

> Hi all,
>
> one customer started to make more use of IPFW inside
> their vnet jails in our hosting environment.
>
> When they
>
> -       create a firewall rule with "log" set, like:
>         ipfw add 65532 allow log ip from me to any out
> -       set:
>         sysctl net.inet.ip.fw.verbose=1
>
> all *inside* a jail, the firewall rules work as expected, yet
> the log entries end up in /var/log/security on the host.
>
> All the time net.inet.ip.fw.verbose on the host is set to 0.
>
> Is this intentional? Or fundamental, because there is only
> a shared host kernel with jails?
>
> Or is it a bug?
>
> I checked multiple times, the sysctl variables can be set for
> each jail and the host independently just like each can have
> its own set of firewall rules.
>
> Kind regards,
> Patrick
> --
> punkt.de GmbH
> Patrick M. Hausen
> .infrastructure
>
> Sophienstr. 187
> 76185 Karlsruhe
>
> Tel. +49 721 9109500
>
> https://infrastructure.punkt.de
> info@punkt.de
>
> AG Mannheim 108285
> Geschäftsführer: Daniel Lienert, Fabian Stein
>
>

[-- Attachment #2 --]
<div dir="ltr">I&#39;ve had that happen if the jails don&#39;t have syslogd running inside them.</div><br><div class="gmail_quote gmail_quote_container"><div dir="ltr" class="gmail_attr">On Fri, Jul 18, 2025 at 6:25 AM Patrick M. Hausen &lt;<a href="mailto:hausen@punkt.de">hausen@punkt.de</a>&gt; wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">Hi all,<br>
<br>
one customer started to make more use of IPFW inside<br>
their vnet jails in our hosting environment.<br>
<br>
When they<br>
<br>
-       create a firewall rule with &quot;log&quot; set, like:<br>
        ipfw add 65532 allow log ip from me to any out<br>
-       set:<br>
        sysctl net.inet.ip.fw.verbose=1<br>
<br>
all *inside* a jail, the firewall rules work as expected, yet<br>
the log entries end up in /var/log/security on the host.<br>
<br>
All the time net.inet.ip.fw.verbose on the host is set to 0.<br>
<br>
Is this intentional? Or fundamental, because there is only<br>
a shared host kernel with jails?<br>
<br>
Or is it a bug?<br>
<br>
I checked multiple times, the sysctl variables can be set for<br>
each jail and the host independently just like each can have<br>
its own set of firewall rules.<br>
<br>
Kind regards,<br>
Patrick<br>
-- <br>
<a href="http://punkt.de" rel="noreferrer" target="_blank">punkt.de</a> GmbH<br>
Patrick M. Hausen<br>
.infrastructure<br>
<br>
Sophienstr. 187<br>
76185 Karlsruhe<br>
<br>
Tel. +49 721 9109500<br>
<br>
<a href="https://infrastructure.punkt.de" rel="noreferrer" target="_blank">https://infrastructure.punkt.de</a><br>;
<a href="mailto:info@punkt.de" target="_blank">info@punkt.de</a><br>
<br>
AG Mannheim 108285<br>
Geschäftsführer: Daniel Lienert, Fabian Stein<br>
<br>
</blockquote></div>

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAFPNf5_%2BdQjxGc1VVmZ_YVv_UC5JG0wBaowu=3oaQKNS2S09kg>