From owner-freebsd-current@freebsd.org Sun Oct 28 15:50:54 2018 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 5B2C010D6B90 for ; Sun, 28 Oct 2018 15:50:54 +0000 (UTC) (envelope-from bzeeb-lists@lists.zabbadoz.net) Received: from mx1.sbone.de (mx1.sbone.de [IPv6:2a01:4f8:13b:39f::9f:25]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mx1.sbone.de", Issuer "SBone.DE" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id EAA5D8A5F3 for ; Sun, 28 Oct 2018 15:50:53 +0000 (UTC) (envelope-from bzeeb-lists@lists.zabbadoz.net) Received: from mail.sbone.de (mail.sbone.de [IPv6:fde9:577b:c1a9:31::2013:587]) (using TLSv1 with cipher ADH-CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) by mx1.sbone.de (Postfix) with ESMTPS id F0C1E8D4A12D; Sun, 28 Oct 2018 15:50:51 +0000 (UTC) Received: from content-filter.sbone.de (content-filter.sbone.de [IPv6:fde9:577b:c1a9:31::2013:2742]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.sbone.de (Postfix) with ESMTPS id 32785D1F801; Sun, 28 Oct 2018 15:50:51 +0000 (UTC) X-Virus-Scanned: amavisd-new at sbone.de Received: from mail.sbone.de ([IPv6:fde9:577b:c1a9:31::2013:587]) by content-filter.sbone.de (content-filter.sbone.de [fde9:577b:c1a9:31::2013:2742]) (amavisd-new, port 10024) with ESMTP id 24RncPCEGndl; Sun, 28 Oct 2018 15:50:49 +0000 (UTC) Received: from [10.248.105.177] (fresh-ayiya.sbone.de [IPv6:fde9:577b:c1a9:f001::2]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by mail.sbone.de (Postfix) with ESMTPSA id 65AC2D1F7FD; Sun, 28 Oct 2018 15:50:49 +0000 (UTC) From: "Bjoern A. Zeeb" To: "Ernie Luzar" Cc: "FreeBSD current" Subject: Re: 12.0-BETA1 vnet with pf firewall Date: Sun, 28 Oct 2018 15:50:46 +0000 X-Mailer: MailMate (2.0BETAr6123) Message-ID: <6811B138-54C8-448F-A7F8-76374A077D8A@lists.zabbadoz.net> In-Reply-To: <5BD5D656.4050204@gmail.com> References: <5BD5D656.4050204@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; format=flowed X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 28 Oct 2018 15:50:54 -0000 On 28 Oct 2018, at 15:31, Ernie Luzar wrote: > Tested with host running ipfilter and vnet running pf. Tried loading > pf from host console or from vnet console using kldload pf.ko command > and get this error message; > > linker_load_file: /boot/kernel/pf.ko-unsupported file type. > > Looks like the 12.0 version of pf which is suppose to work in vnet > independent of what firewall is running on the host is not working. You cannot load pf from inside a jail (with or without vnet). Kernel modules are global objects loaded from the base system or you compile the devices into the kernel; it is their state which is virtualised. If you load multiple firewalls they will all be available to the base system and all jails+vnet. Whichever you configure in which one is up to you. Just be careful as an unconfigured firewall might have a default action affecting the outcome of the overall decision. For example you could have: a base system using ipfilter and setting pf to default accept everything and a jail+vnet using pf and setting ipfilter there to accept everything. Hope that clarifies some things. /bz