Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 30 Aug 2019 12:27:40 +0200
From:      "Kristof Provost" <kp@FreeBSD.org>
To:        "Goran =?utf-8?q?Meki=C4=87?=" <meka@tilda.center>
Cc:        "Andrew White" <andywhite@gmail.com>, freebsd-net@freebsd.org
Subject:   Re: pf (rules and nat) + (ipfw + dummynet)
Message-ID:  <B6C36E1C-E1BD-4AA4-8223-E1990BD61291@FreeBSD.org>
In-Reply-To: <20190818093346.jjxdjkd5twzfg56c@hal9000.home.meka.rs>
References:  <CAOZMOUFfzoVj2mtOHcQRpkrjU%2B02-kik%2BNt7m0_oELUW=H=RXg@mail.gmail.com> <20190817215151.GA8888@vega.codepro.be> <20190818093346.jjxdjkd5twzfg56c@hal9000.home.meka.rs>

next in thread | previous in thread | raw e-mail | index | archive | help

On 18 Aug 2019, at 11:33, Goran Mekić wrote:
> Hello,
>
> If I knew we almost made it compile and boot (with dummynet, pf and 
> pflog loaded),
> I would postpone the previous email. :o)
>
> The code I'm working on is 
> https://github.com/mekanix/freebsd/tree/feature/pf+dummynet/12.0.
> It is nothing more than releng/12.0 branch into which I copied parts 
> of PFSense
> code until it started working. I still don't know how to test it, as 
> I'm not
> sure what's the PFSense's syntax for pf.conf. I know you can use "ipfw
> pipe list" to show the pipes without ipfw module loaded. Once loaded,
> ipfw lets you manage dummynet. What I do for now is load ipfw, set the
> pipes, unload ipfw.
>
> If anyone knows how to configure pf.conf so that it passes everything
> it receives to dummynet, I'm all ears. I will "fork" /sbin/ipfw and
> create /sbin/dnctl so we don't have to depend on IPFW at all, but I
> would like it to start working like this, first.
>
Apple do this through dnctl as you’re proposing: 
http://www.manpagez.com/man/8/dnctl/
They’ve even published source code for it: 
https://opensource.apple.com/source/network_cmds/network_cmds-543.260.3/dnctl/

I’m somewhat tempted towards an approach where the pipe definitions 
are part of pf.conf, for similarity with how ALTQ worked in pf, and how 
dummynet now works in ipfw. That’s probably not a hard requirement 
though. If it makes more sense to have two tools then let’s go for 
that.

> My concerns about this patch is that it changes IPFW, too. I don't 
> know
> if the following link is visible if you're not logged into github, but
> it shows the difference between releng/12.0 and this branch:
> https://github.com/freebsd/freebsd/compare/releng/12.0...mekanix:feature/pf+dummynet/12.0?expand=1
>
One of the issues I have with the PFSense patches is that they’re not 
broken down into usefully documented chunks. From a quick look that diff 
seems to contain completely unrelated changes.
Part of the effort is certainly going to be to tease that apart, and 
work out what bits are relevant (and *why*).

Best regards,
Kristof
From owner-freebsd-net@freebsd.org  Fri Aug 30 11:19:06 2019
Return-Path: <owner-freebsd-net@freebsd.org>
Delivered-To: freebsd-net@mailman.nyi.freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1])
 by mailman.nyi.freebsd.org (Postfix) with ESMTP id 4A9D5CB45F
 for <freebsd-net@mailman.nyi.freebsd.org>;
 Fri, 30 Aug 2019 11:19:06 +0000 (UTC)
 (envelope-from patfbsd@davenulle.org)
Received: from sender4-of-o59.zoho.com (sender4-of-o59.zoho.com
 [136.143.188.59])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits))
 (Client did not present a certificate)
 by mx1.freebsd.org (Postfix) with ESMTPS id 46KcS85cN3z4109
 for <freebsd-net@freebsd.org>; Fri, 30 Aug 2019 11:19:04 +0000 (UTC)
 (envelope-from patfbsd@davenulle.org)
ARC-Seal: i=1; a=rsa-sha256; t67163941; cv=none; d=zoho.com; s=zohoarc;
 b=Lbkog3vtZ0njz1v3vRcEVVAT+BoOt7B5BcqiiAmTCmxuDRamPv4RrfaFSaBKIAr63KBSj+EvD+kxrX/Y+l1Gc80LzfFiQeJaJVFhcAkXT3hDLWt3kNfcbHvfI9jGlyVQvLiUjxVm6Ax7hrTJMtdo1QGW5GeKH0eqnj48rsSEFLgARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zoho.com;
 s=zohoarc; t67163941;
 h=Content-Type:Content-Transfer-Encoding:Date:From:In-Reply-To:MIME-Version:Message-ID:References:Subject:To:ARC-Authentication-Results;
 bh=7z8QAvzBA8XXn2axV+W6V7qsi30wSwDOm5XMz3upOs0=;
 b=Xn6kSDSQukxYgw7pz80YCeW/lwdE3gCedqfnYZO2B9mZdFCudtYv/Xibzu007gx4NtXCJL5A1eyI19qcwMTnHpWEOJX7GbFOfTZpY2F5sNi+KJmZqrlhXyYFXaX5yYjS8A3ddnjq06c+Mq+EA222w40pMnIMEiTQK7OAi9XaXYIARC-Authentication-Results: i=1; mx.zoho.com;
 dkim=pass  header.iÚvenulle.org;
 spf=pass  smtp.mailfrom=patfbsd@davenulle.org;
 dmarc=pass header.from=<patfbsd@davenulle.org>
 header.from=<patfbsd@davenulle.org>
Received: from mr185033.univ-rennes1.fr (mr185033.univ-rennes1.fr
 [129.20.185.33]) by mx.zohomail.com
 with SMTPS id 1567163939869532.453351156497;
 Fri, 30 Aug 2019 04:18:59 -0700 (PDT)
Date: Fri, 30 Aug 2019 13:18:52 +0200
From: Patrick Lamaiziere <patfbsd@davenulle.org>
To: freebsd-net@freebsd.org
Subject: Re: problem with carp on 11.3-RELEASE
Message-ID: <20190830131852.42604d56@mr185033.univ-rennes1.fr>
In-Reply-To: <20190829125441.12197ea8@mr185033.univ-rennes1.fr>
References: <20190829125441.12197ea8@mr185033.univ-rennes1.fr>
X-Mailer: Claws Mail 3.16.0 (GTK+ 2.24.32; x86_64-pc-linux-gnu)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
X-ZohoMailClient: External
X-Rspamd-Queue-Id: 46KcS85cN3z4109
X-Spamd-Bar: -----
Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none;
 spf=none (mx1.freebsd.org: domain of patfbsd@davenulle.org has no SPF policy
 when checking 136.143.188.59) smtp.mailfrom=patfbsd@davenulle.org
X-Spamd-Result: default: False [-5.75 / 15.00]; RCVD_TLS_LAST(0.00)[];
 NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; FROM_HAS_DN(0.00)[];
 TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0];
 MIME_GOOD(-0.10)[text/plain]; TO_DN_NONE(0.00)[];
 DMARC_NA(0.00)[davenulle.org]; RCPT_COUNT_ONE(0.00)[1];
 IP_SCORE(-1.66)[ipnet: 136.143.188.0/24(-4.86), asn: 2639(-3.39), country:
 US(-0.05)]; NEURAL_HAM_SHORT(-0.99)[-0.987,0];
 RCVD_IN_DNSWL_NONE(0.00)[59.188.143.136.list.dnswl.org : 127.0.15.0];
 R_SPF_NA(0.00)[]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[];
 MIME_TRACE(0.00)[0:+]; RCVD_COUNT_TWO(0.00)[2];
 ASN(0.00)[asn:2639, ipnet:136.143.188.0/24, country:US];
 ARC_ALLOW(-1.00)[i=1]
X-BeenThere: freebsd-net@freebsd.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Networking and TCP/IP with FreeBSD <freebsd-net.freebsd.org>
List-Unsubscribe: <https://lists.freebsd.org/mailman/options/freebsd-net>,
 <mailto:freebsd-net-request@freebsd.org?subject=unsubscribe>
List-Archive: <http://lists.freebsd.org/pipermail/freebsd-net/>;
List-Post: <mailto:freebsd-net@freebsd.org>
List-Help: <mailto:freebsd-net-request@freebsd.org?subject=help>
List-Subscribe: <https://lists.freebsd.org/mailman/listinfo/freebsd-net>,
 <mailto:freebsd-net-request@freebsd.org?subject=subscribe>
X-List-Received-Date: Fri, 30 Aug 2019 11:19:06 -0000

On Thu, 29 Aug 2019 12:54:41 +0200
Patrick Lamaiziere <patfbsd@davenulle.org> wrote:

Hello,

> I've upgraded our two firewalls from 11.2-RELEASE-p11 to 11.3 release
> p3 and I'm seeing a problem with carp, the carp slave becomes briefly
> MASTER and returns to the slave state. This occurs often.

...

I've made an other attempt today and all is working fine.
I don't know where was the issue but I think that's not related to
FreeBSD.

Sorry for the noise :-)

Regards.




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?B6C36E1C-E1BD-4AA4-8223-E1990BD61291>