#
e4f2733d |
| 09-Jan-2025 |
Kristof Provost <kp@FreeBSD.org> |
pf: add 'allow-related' to always allow SCTP multihome extra connections
Allow users to choose to allow permitted SCTP connections to set up additional multihomed connections regardless of the rules
pf: add 'allow-related' to always allow SCTP multihome extra connections
Allow users to choose to allow permitted SCTP connections to set up additional multihomed connections regardless of the ruleset. That is, allow an already established connection to set up flows that would otherwise be disallowed.
In case of if-bound connections we initially set the extra associations to be floating, because we don't know what path they'll be taking when they're created. Once we see the first traffic we can bind them.
MFC after: 2 weeks Sponsored by: Orange Business Services Differential Revision: https://reviews.freebsd.org/D48453
show more ...
|
#
0300b49a |
| 09-Jan-2025 |
Kristof Provost <kp@FreeBSD.org> |
pf.conf.5: fix description for tcp.opening timeout
Issue reported by Felix Rust; ok jmc@
Obtained from: OpenBSD, bluhm <bluhm@openbsd.org>, 9278cfc6cf Sponsored by: Rubicon Communications, LLC ("Ne
pf.conf.5: fix description for tcp.opening timeout
Issue reported by Felix Rust; ok jmc@
Obtained from: OpenBSD, bluhm <bluhm@openbsd.org>, 9278cfc6cf Sponsored by: Rubicon Communications, LLC ("Netgate")
show more ...
|
#
b6a5e221 |
| 07-Jan-2025 |
Kristof Provost <kp@FreeBSD.org> |
pf.conf.5: make "self" a bit more visible
from Sebastian Benoit <benoit-lists at fb12.de>, ok/input jmc, reminder/input deraadt and too much of a trail to mention all of it, thx everybody involved
pf.conf.5: make "self" a bit more visible
from Sebastian Benoit <benoit-lists at fb12.de>, ok/input jmc, reminder/input deraadt and too much of a trail to mention all of it, thx everybody involved
Obtained from: OpenBSD, henning <henning@openbsd.org>, 682c71ec7c Sponsored by: Rubicon Communications, LLC ("Netgate")
show more ...
|
#
725003da |
| 20-Dec-2024 |
Ed Maste <emaste@FreeBSD.org> |
pf.conf.5: Fix endpoint-independent description
The description of the endpoint-independent option accidentally ended up in the middle of map-e-portset's text.
Fixes: 390dc369efaa ("pf: Add support
pf.conf.5: Fix endpoint-independent description
The description of the endpoint-independent option accidentally ended up in the middle of map-e-portset's text.
Fixes: 390dc369efaa ("pf: Add support for endpoint independent NAT bindings for UDP")
Reviewed by: kp Sponsored by: Tailscale Sponsored by: The FreeBSD Foundation Differential Revision: https://reviews.freebsd.org/D48158
show more ...
|
#
eaf484fd |
| 06-Dec-2024 |
Kristof Provost <kp@FreeBSD.org> |
pf.conf.5: document af-to (aka nat64)
the patch was started by todd about a year ago and have been finally finished by phessler and myself today; discussed with and tweaks from jmc, ok sthen, hennin
pf.conf.5: document af-to (aka nat64)
the patch was started by todd about a year ago and have been finally finished by phessler and myself today; discussed with and tweaks from jmc, ok sthen, henning
Obtained from: OpenBSD, mikeb <mikeb@openbsd.org>, 4d5e14dff3 Sponsored by: Rubicon Communications, LLC ("Netgate")
show more ...
|
Revision tags: release/14.2.0 |
|
#
6e1fc011 |
| 15-Oct-2024 |
Graham Percival <gperciva@tarsnap.com> |
manuals: Fix "unusual .Xr" warnings with a script
These were reported by `mandoc -T lint ...` as warnings: - unusual Xr order - unusual Xr punctuation
Fixes made by script in https://github.com/Tar
manuals: Fix "unusual .Xr" warnings with a script
These were reported by `mandoc -T lint ...` as warnings: - unusual Xr order - unusual Xr punctuation
Fixes made by script in https://github.com/Tarsnap/freebsd-doc-scripts
Signed-off-by: Graham Percival <gperciva@tarsnap.com> Reviewed by: mhorne, Alexander Ziaee <concussious.bugzilla@runbox.com> Sponsored by: Tarsnap Backup Inc. Pull Request: https://github.com/freebsd/freebsd-src/pull/1464
show more ...
|
#
d01949e8 |
| 02-Oct-2024 |
Kristof Provost <kp@FreeBSD.org> |
pf.conf.5: sync documentation with code on the matter of max state limit behavior
When one of the state limits is reached, further packets that would create state are dropped, until existing states
pf.conf.5: sync documentation with code on the matter of max state limit behavior
When one of the state limits is reached, further packets that would create state are dropped, until existing states time out. Discussed with mcbride, ok henning, jmc
Obtained from: OpenBSD, mikeb <mikeb@openbsd.org>, 677ed08ce1 Sponsored by: Rubicon Communications, LLC ("Netgate") Differential Revision: https://reviews.freebsd.org/D46932
show more ...
|
#
4f2ef756 |
| 24-Sep-2024 |
Graham Percival <gperciva@tarsnap.com> |
manuals: Fix "skipping end of block" .Ed errors
These were reported by `mandoc -T lint ...` as errors; this commit only handles unnecessary .Ed commands.
The rendered output (in ascii and html) is
manuals: Fix "skipping end of block" .Ed errors
These were reported by `mandoc -T lint ...` as errors; this commit only handles unnecessary .Ed commands.
The rendered output (in ascii and html) is not affected by this commit.
Signed-off-by: Graham Percival <gperciva@tarsnap.com> Reviewed by: mhorne MFC after: 3 days Sponsored by: Tarsnap Backup Inc. Pull Request: https://github.com/freebsd/freebsd-src/pull/1435
show more ...
|
Revision tags: release/13.4.0 |
|
#
f3ab00c2 |
| 03-Sep-2024 |
Kristof Provost <kp@FreeBSD.org> |
pf: add a new log opt PF_LOG_MATCHES
forces logging on all subsequent matching rules new log opt "matches" awesome for debugging, a rule like match log(matches) from $testbox will show you exactly w
pf: add a new log opt PF_LOG_MATCHES
forces logging on all subsequent matching rules new log opt "matches" awesome for debugging, a rule like match log(matches) from $testbox will show you exactly which subsequent rules match on that packet real ok theo assumed oks ryan & dlg bikeshedding many
Obtained from: OpenBSD, henning <henning@openbsd.org>, 1603e01ae4 Obtained from: OpenBSD, henning <henning@openbsd.org>, f496e91672 Obtained from: OpenBSD, henning <henning@openbsd.org>, 07481a9fee Sponsored by: Rubicon Communications, LLC ("Netgate") Differential Revision: https://reviews.freebsd.org/D46588
show more ...
|
#
e80f2a10 |
| 29-Aug-2024 |
Kristof Provost <kp@FreeBSD.org> |
pf.conf.5: document received-on
Reviewed by: zlei Obtained from: OpenBSD, dlg <dlg@openbsd.org>, 456093dddc Obtained from: OpenBSD, jmc <jmc@openbsd.org>, 2bf0158fa8 Obtained from: OpenBSD, deraadt
pf.conf.5: document received-on
Reviewed by: zlei Obtained from: OpenBSD, dlg <dlg@openbsd.org>, 456093dddc Obtained from: OpenBSD, jmc <jmc@openbsd.org>, 2bf0158fa8 Obtained from: OpenBSD, deraadt <deraadt@openbsd.org>, be785dc6e2 Sponsored by: Rubicon Communications, LLC ("Netgate") Differential Revision: https://reviews.freebsd.org/D46579
show more ...
|
#
339a1977 |
| 10-Sep-2024 |
Mark Johnston <markj@FreeBSD.org> |
pf: Add a sysctl to limit work done for rdr source port rewriting
It was pointed out that the current approach of exhaustively searching for a free source port might be very time consuming. Limit t
pf: Add a sysctl to limit work done for rdr source port rewriting
It was pointed out that the current approach of exhaustively searching for a free source port might be very time consuming. Limit the amount of work that we might do before giving up.
Reviewed by: kp Reported by: Eirik Øverby <ltning-freebsd@anduin.net> MFC after: 3 months Sponsored by: Klara, Inc. Sponsored by: Modirum Differential Revision: https://reviews.freebsd.org/D46495
show more ...
|
#
390dc369 |
| 06-Sep-2024 |
Tom Jones <thj@FreeBSD.org> |
pf: Add support for endpoint independent NAT bindings for UDP
With Endpoint Independent NAT bindings for UDP flows from a NATed source address are always mapped to the same ip:port pair on the NAT r
pf: Add support for endpoint independent NAT bindings for UDP
With Endpoint Independent NAT bindings for UDP flows from a NATed source address are always mapped to the same ip:port pair on the NAT router. This allows a client to connect to multiple external servers while appearing as the same host and enables NAT traversal without requiring the client to use a middlebox traversal protocol such as STUN or TURN.
Introduce the 'endpoint-independent' option to NAT rules to allow configuration of endpoint independent without effecting existing deployments.
This change satisfies REQ 1 and 3 of RFC 4787 also known as 'full cone' NAT.
Using Endpoint Independent NAT changes NAT exhaustion behaviour it does not introduce any additional security considerations compared to other forms of NAT.
PR: 219803 Co-authored-by: Damjan Jovanovic <damjan.jov@gmail.com> Co-authored-by: Naman Sood <mail@nsood.in> Reviewed-by: kp Sponsored-by: Tailscale Sponsored-by: The FreeBSD Foundation Differential Revision: https://reviews.freebsd.org/D11137
show more ...
|
#
9897a669 |
| 19-Aug-2024 |
Mark Johnston <markj@FreeBSD.org> |
pf: Let rdr rules modify the src port if doing so would avoid a conflict
If NAT rules cause inbound connections to different external IPs to be mapped to the same internal IP, and some application u
pf: Let rdr rules modify the src port if doing so would avoid a conflict
If NAT rules cause inbound connections to different external IPs to be mapped to the same internal IP, and some application uses the same source port for multiple such connections, rdr translation may result in conflicts that cause some of the connections to be dropped.
Address this by letting rdr rules detect state conflicts and modulate the source port to avoid them.
Reviewed by: kp, allanjude MFC after: 3 months Sponsored by: Klara, Inc. Sponsored by: Modirum Differential Revision: https://reviews.freebsd.org/D44488
show more ...
|
#
ea6d6add |
| 07-Jun-2024 |
Kristof Provost <kp@FreeBSD.org> |
pf.conf.5: remove 'set limit tables'
We've never supported this (or at least not since 2012) limit. Remove it from the man page.
Event: Kitchener-Waterloo Hackathon 202406
|
Revision tags: release/14.1.0, release/13.3.0 |
|
#
baf9b6d0 |
| 01-Dec-2023 |
Kristof Provost <kp@FreeBSD.org> |
pf: allow pflow to be activated per rule
Only generate ipfix/netflow reports (through pflow) for the rules where this is enabled. Reports can also be enabled globally through 'set state-default pflo
pf: allow pflow to be activated per rule
Only generate ipfix/netflow reports (through pflow) for the rules where this is enabled. Reports can also be enabled globally through 'set state-default pflow'.
Obtained from: OpenBSD Sponsored by: Rubicon Communications, LLC ("Netgate") Differential Revision: https://reviews.freebsd.org/D43108
show more ...
|
#
7e1affa2 |
| 17-Nov-2023 |
Igor Ostapenko <pm@igoro.pro> |
pf.conf.5: revise divert-to and divert-reply
|
Revision tags: release/14.0.0 |
|
#
ca9dbde8 |
| 27-Oct-2023 |
Kristof Provost <kp@FreeBSD.org> |
pf: support SCTP-specific timeouts
Allow SCTP state timeouts to be configured independently from TCP state timeouts.
Reviewed by: tuexen MFC after: 1 week Sponsored by: Orange Business Services Dif
pf: support SCTP-specific timeouts
Allow SCTP state timeouts to be configured independently from TCP state timeouts.
Reviewed by: tuexen MFC after: 1 week Sponsored by: Orange Business Services Differential Revision: https://reviews.freebsd.org/D42393
show more ...
|
#
5ed470bd |
| 19-Oct-2023 |
Kajetan Staszkiewicz <vegeta@tuxpowered.net> |
pf: Update documentation regarding matching, scrubbing and reassembly
Update pf documentation:
- default behaviour of fragment reassembly - introduction of scrub option for filter rules - disadv
pf: Update documentation regarding matching, scrubbing and reassembly
Update pf documentation:
- default behaviour of fragment reassembly - introduction of scrub option for filter rules - disadvantages of using the old scrub ruleset - options supported for match rules - fix missing list block end - remove duplicate description of match filter rule - update example to modern syntax
Reviewed by: kp Fragments obtained from: OpenBSD Sponsored by: InnoGames GmbH Differential Revision: https://reviews.freebsd.org/D42270
show more ...
|
#
b2c76c41 |
| 16-Aug-2023 |
Warner Losh <imp@FreeBSD.org> |
Remove $FreeBSD$: one-line nroff pattern
Remove /^\.\\"\s*\$FreeBSD\$$\n/
|
#
47d0c1fe |
| 21-Jun-2023 |
Kristof Provost <kp@FreeBSD.org> |
pf.conf.5: document SCTP support
Mention SCTP in the pf.conf.5
Reviewed by: tuexen MFC after: 3 weeks Sponsored by: Orange Business Services Differential Revision: https://reviews.freebsd.org/D40870
|
#
ef661d4a |
| 24-Apr-2023 |
Christian McDonald <cmcdonald@netgate.com> |
pf: introduce ridentifier and labels to ether rules
Make Ethernet rules more similar to the usual layer 3 rules by also allowing ridentifier and labels to be set on them.
Reviewed by: kp Sponsored
pf: introduce ridentifier and labels to ether rules
Make Ethernet rules more similar to the usual layer 3 rules by also allowing ridentifier and labels to be set on them.
Reviewed by: kp Sponsored by: Rubicon Communications, LLC ("Netgate")
show more ...
|
#
4bfffd8c |
| 21-Apr-2023 |
Kristof Provost <kp@FreeBSD.org> |
pf.conf.5: minor improvements
* Align 'on <interface>' parameter with the BNF, so use 'on <ifspec>' * Clarify etherprotospec BNF, to make it clearer that only numbers are supported.
Suggested by:
pf.conf.5: minor improvements
* Align 'on <interface>' parameter with the BNF, so use 'on <ifspec>' * Clarify etherprotospec BNF, to make it clearer that only numbers are supported.
Suggested by: Christian McDonald Sponsored by: Rubicon Communications, LLC ("Netgate")
show more ...
|
#
39282ef3 |
| 13-Apr-2023 |
Kajetan Staszkiewicz <vegeta@tuxpowered.net> |
pf: backport OpenBSD syntax of "scrub" option for "match" and "pass" rules
Introduce the OpenBSD syntax of "scrub" option for "match" and "pass" rules and the "set reassemble" flag. The patch is bac
pf: backport OpenBSD syntax of "scrub" option for "match" and "pass" rules
Introduce the OpenBSD syntax of "scrub" option for "match" and "pass" rules and the "set reassemble" flag. The patch is backward-compatible, pf.conf can be still written in FreeBSD-style.
Obtained from: OpenBSD MFC after: never Sponsored by: InnoGames GmbH Differential Revision: https://reviews.freebsd.org/D38025
show more ...
|
Revision tags: release/13.2.0 |
|
#
bdb82431 |
| 29-Mar-2023 |
Maxim Konovalov <maxim@FreeBSD.org> |
pf.conf.5: typo fixes
PR: 270501 (partially)
|
#
2da12891 |
| 22-Jan-2023 |
Poul-Henning Kamp <phk@FreeBSD.org> |
Document another example for "binat".
|