From owner-freebsd-bugs@FreeBSD.ORG Fri May 27 10:20:05 2005 Return-Path: X-Original-To: freebsd-bugs@hub.freebsd.org Delivered-To: freebsd-bugs@hub.freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 9BABE16A41C for ; Fri, 27 May 2005 10:20:05 +0000 (GMT) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [216.136.204.21]) by mx1.FreeBSD.org (Postfix) with ESMTP id 6038E43D4C for ; Fri, 27 May 2005 10:20:05 +0000 (GMT) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (gnats@localhost [127.0.0.1]) by freefall.freebsd.org (8.13.3/8.13.3) with ESMTP id j4RAK493099644 for ; Fri, 27 May 2005 10:20:04 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.13.3/8.13.1/Submit) id j4RAK4V6099643; Fri, 27 May 2005 10:20:04 GMT (envelope-from gnats) Date: Fri, 27 May 2005 10:20:04 GMT Message-Id: <200505271020.j4RAK4V6099643@freefall.freebsd.org> To: freebsd-bugs@FreeBSD.org From: "Andrey V. Elsukov" Cc: Subject: Re: kern/80642: [patch] IPFW small patch - new RULE OPTION X-BeenThere: freebsd-bugs@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: "Andrey V. Elsukov" List-Id: Bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 27 May 2005 10:20:05 -0000 The following reply was made to PR kern/80642; it has been noted by GNATS. From: "Andrey V. Elsukov" To: freebsd-bugs@FreeBSD.org Cc: Subject: Re: kern/80642: [patch] IPFW small patch - new RULE OPTION Date: Tue, 24 May 2005 03:50:06 GMT The following reply was made to PR kern/80642; it has been noted by GNATS. From: "Andrey V. Elsukov" To: bug-followup@FreeBSD.org, bu7cher@yandex.ru Cc: Subject: Re: kern/80642: [patch] IPFW small patch - new RULE OPTION Date: Tue, 24 May 2005 07:42:53 +0400 Sorry, my english is bad. :( Patch to IPFW2 for adding restrictions of the traffic with use IPFW bytes counters. It include two parts: * First part is ipfw_bound.patch, this part add ipfw rule options "bound VALUE" and "check-bound NUM". Example: # ipfw add 100 allow ip from any to any bound 10K # ipfw add 200 deny ip from any to any While bytes counter of rule 100 below 10 KBytes, it work. Example: # ipfw add 100 allow ip from A.B.C.D to any out xmit internet check-bound 200 # ipfw add 200 allow ip from any to A.B.C.D in recv internet bound 100M # ipfw add 300 deny ip from any to any via internet While bytes counter of rule 200 below 100 MBytes, rules 100 and 200 work. NOTE: Check-bound option search rule NUM like "ipfw skipto", but if rule NUM not contain bound option, then match fail. Second part is bound_change.patch, this part add control call to ipfw for boundary value change without bytes counter reset. Syntax: # ipfw bound NUM [set N] change VALUE. Files: For CURRENT: http://butcher.heavennet.ru/ipfw_bound/CURRENT/ipfw_bound.patch http://butcher.heavennet.ru/ipfw_bound/CURRENT/bound_change.patch For RELENG_5: http://butcher.heavennet.ru/ipfw_bound/RELENG_5/ipfw_bound.patch http://butcher.heavennet.ru/ipfw_bound/RELENG_5/bound_change.patch For RELENG_5_4: http://butcher.heavennet.ru/ipfw_bound/RELENG_5_4/ipfw_bound.patch http://butcher.heavennet.ru/ipfw_bound/RELENG_5_4/bound_change.patch -- WBR, Andrey V. Elsukov _______________________________________________ freebsd-bugs@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-bugs To unsubscribe, send any mail to "freebsd-bugs-unsubscribe@freebsd.org"