From owner-freebsd-hackers@FreeBSD.ORG Thu Jan 8 09:25:39 2015 Return-Path: Delivered-To: freebsd-hackers@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 9337DF31 for ; Thu, 8 Jan 2015 09:25:39 +0000 (UTC) Received: from smtp.lamaiziere.net (net.lamaiziere.net [37.59.62.186]) by mx1.freebsd.org (Postfix) with ESMTP id 5ACC31A2 for ; Thu, 8 Jan 2015 09:25:38 +0000 (UTC) Received: from mr185083.univ-rennes1.fr (mr185083.univ-rennes1.fr [129.20.185.83]) by smtp.lamaiziere.net (Postfix) with ESMTPA id D6860610A; Thu, 8 Jan 2015 10:17:45 +0100 (CET) Received: from mr185083 (localhost [127.0.0.1]) by mr185083.univ-rennes1.fr (Postfix) with ESMTP id B224F7199; Thu, 8 Jan 2015 10:17:45 +0100 (CET) Date: Thu, 8 Jan 2015 10:17:44 +0100 From: Patrick Lamaiziere To: "O'Connor, Daniel" Subject: Re: if_pflow from OpenBSD Message-ID: <20150108101744.2c2a9eae@mr185083> In-Reply-To: <45056363-1E83-4318-B870-7F673993166B@emc.com> References: <45056363-1E83-4318-B870-7F673993166B@emc.com> X-Mailer: Claws Mail 3.10.1 (GTK+ 2.24.22; amd64-portbld-freebsd10.1) MIME-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 8bit X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.4.3 (smtp.lamaiziere.net [0.0.0.0]); Thu, 08 Jan 2015 10:17:45 +0100 (CET) Cc: FreeBSD Hackers X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 08 Jan 2015 09:25:39 -0000 Le Wed, 7 Jan 2015 07:26:42 -0500, "O'Connor, Daniel" a écrit : Hello, > Has anyone attempted a port of this? > (http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/sys/net/if_pflow.c) > > I used to use pfflowd but it broke due to pf changes and looks dead > upstream - if_pflow(4) seems like the canonical pf way now. May be you can try ng_netflow(4)? (I have to migrate an OpenBSD firewall to FreeBSD and any input on ng_netflow will be welcome.) Regards,