Date: Thu, 26 Feb 2004 14:40:49 -0800 From: Tim Kientzle <tim@kientzle.com> To: Robert Watson <rwatson@FreeBSD.org> Cc: Steve Kargl <sgk@troutmask.apl.washington.edu> Subject: Re: cvs commit: src/sys/contrib/pf/net if_pflog.c if_pflog.hif_pfsync.c src/sys/contrib/pf/netinet in4_cksum.c Message-ID: <403E75F1.2070302@kientzle.com> In-Reply-To: <Pine.NEB.3.96L.1040226150526.79901Y-100000@fledge.watson.org> References: <Pine.NEB.3.96L.1040226150526.79901Y-100000@fledge.watson.org>
next in thread | previous in thread | raw e-mail | index | archive | help
>>>Choice is good. Three firewalls is maybe pushing the limit, but these >>>three are Very Important to our community. Dunno about pf, but neither ipfw nor ipf have one feature I've been looking for. I'd like to be able to say something like: create set BLACKLIST drop ip in BLACKLIST where BLACKLIST is a user-defined and easily-modifiable set of arbitrary addresses. Probably implemented via a hash-table or search tree. Then I want to be able to modify the address set separately, without having to touch the rules per se: add 1.2.3.4 to BLACKLIST This would make it feasible to manage large sets (thousands) of blocked (or permitted) addresses without the performance degradation of walking a very long list of rules. It could also greatly simplify a lot of rulesets. The ideal mechanism would support arbitrary CIDR blocks: add 1.2.3.4/29 to BLACKLIST add 10.0.0.0/8 to BLACKLIST but the data structures that handle this sort of thing efficiently are admittedly a bit esoteric. Just a thought, Tim Kientzle
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?403E75F1.2070302>