1.\" $OpenBSD: carp.4,v 1.16 2004/12/07 23:41:35 jmc Exp $ 2.\" 3.\" Copyright (c) 2003, Ryan McBride. All rights reserved. 4.\" Copyright (c) 2011, Gleb Smirnoff <glebius@FreeBSD.org> 5.\" 6.\" Redistribution and use in source and binary forms, with or without 7.\" modification, are permitted provided that the following conditions 8.\" are met: 9.\" 1. Redistributions of source code must retain the above copyright 10.\" notice, this list of conditions and the following disclaimer. 11.\" 2. Redistributions in binary form must reproduce the above copyright 12.\" notice, this list of conditions and the following disclaimer in the 13.\" documentation and/or other materials provided with the distribution. 14.\" 15.\" THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND 16.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 17.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 18.\" ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE 19.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 20.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 21.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 22.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 23.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 24.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 25.\" SUCH DAMAGE. 26.\" 27.\" $FreeBSD$ 28.\" 29.Dd March 6, 2023 30.Dt CARP 4 31.Os 32.Sh NAME 33.Nm carp 34.Nd Common Address Redundancy Protocol 35.Sh SYNOPSIS 36.Cd "device carp" 37.Sh DESCRIPTION 38The CARP allows multiple hosts on the same local network to share a set of 39IPv4 and/or IPv6 addresses. 40Its primary purpose is to ensure that these 41addresses are always available. 42.Pp 43To use 44.Nm , 45the administrator needs to configure at a minimum a common virtual host ID 46(vhid), and attach at least one IP address to this vhid on each machine which 47is to take part in the virtual group. 48Additional parameters can also be set on a per-vhid basis: 49.Cm advbase 50and 51.Cm advskew , 52which are used to control how frequently the host sends advertisements when it 53is the master for a virtual host, and 54.Cm pass 55which is used to authenticate 56.Nm 57advertisements. 58The 59.Cm advbase 60parameter stands for 61.Dq "advertisement base" . 62It is measured in seconds and specifies the base of the advertisement interval. 63The 64.Cm advskew 65parameter stands for 66.Dq "advertisement skew" . 67It is measured in 1/256 of seconds. 68It is added to the base advertisement interval to make one host advertise 69a bit slower that the other does. 70Both 71.Cm advbase 72and 73.Cm advskew 74are put inside CARP advertisements. 75These values can be configured using 76.Xr ifconfig 8 , 77or through the 78.Dv SIOCSVH 79.Xr ioctl 2 . 80.Pp 81CARP defaults to using multicast messages, but can be configured to unicast 82announcements to peers using the 83.Cm peer 84and 85.Cm peer6 86parameters. Default addresses can be restored using 87.Cm mcast 88and 89.Cm mcast6 . 90Note that TTL verification is disabled if the peer address is not a multicast 91address. 92These values can be configured using 93.Xr ifconfig 8 , 94or through the 95.Dv SIOCSPEER 96.Xr ioctl 2 . 97.Pp 98CARP virtual hosts can be configured on multicast-capable interfaces: Ethernet, 99layer 2 VLAN, FDDI and Token Ring. 100An arbitrary number of virtual host IDs can be configured on an interface. 101An arbitrary number of IPv4 or IPv6 addresses can be attached to a particular 102vhid. 103It is important that all hosts participating in a vhid have the same list 104of prefixes configured on the vhid, since all the prefixes are included in the 105cryptographic checksum supplied in each advertisement. 106Multiple vhids running on one interface participate in master/backup 107elections independently. 108.Pp 109Additionally, there are a number of global parameters which can be set using 110.Xr sysctl 8 : 111.Bl -tag -width ".Va net.inet.carp.ifdown_demotion_factor" 112.It Va net.inet.carp.allow 113Allow 114.Nm 115operation. 116When disabled, virtual hosts remain in initial state, neither sending nor 117receiving announcements or traffic. 118Enabled by default. 119.It Va net.inet.carp.preempt 120Allow virtual hosts to preempt each other. 121When enabled, a vhid in a backup state would preempt a master that 122is announcing itself with a lower advskew. 123Disabled by default. 124.It Va net.inet.carp.dscp 125DSCP value in carp packet. 126Valid Values are 0 to 63. 127A value of 4 is equivalent to the old standard of TOS LOW_DELAY. 128TOS values were deprecated and replaced by DSCP in 1998. 129The default value is 56 (CS7/Network Control). 130.It Va net.inet.carp.log 131Determines what events relating to 132.Nm 133vhids are logged. 134A value of 0 disables any logging. 135A value of 1 enables logging state changes of 136.Nm 137vhids. 138Values above 1 enable logging of bad 139.Nm 140packets. 141The default value is 1. 142.It Va net.inet.carp.demotion 143This value shows the current level of CARP demotion. 144The value is added to the actual advskew sent in announcements for 145all vhids. 146During normal system operation the demotion factor is zero. 147However, problematic conditions raise its level: when 148.Nm 149experiences problem with sending announcements, when an interface 150running a vhid goes down, or while the 151.Xr pfsync 4 152interface is not synchronized. 153The demotion factor can be adjusted writing to the sysctl oid. 154The signed value supplied to the 155.Xr sysctl 8 156command is added to current demotion factor. 157This allows to control 158.Nm 159behaviour depending on some external conditions, for example on the status 160of some daemon utility. 161.It Va net.inet.carp.ifdown_demotion_factor 162This value is added to 163.Va net.inet.carp.demotion 164when an interface running a vhid goes down. 165The default value is 240 (the maximum advskew value). 166.It Va net.inet.carp.senderr_demotion_factor 167This value is added to 168.Va net.inet.carp.demotion 169when 170.Nm 171experiences errors sending its announcements. 172The default value is 240 (the maximum advskew value). 173.El 174.\".Sh ARP level load balancing 175.\"A 176.\".Nm 177.\"interface has limited abilities for load balancing incoming connections 178.\"between hosts in an Ethernet network. 179.\"For load-balancing operation, one needs several CARP interfaces that 180.\"are configured to the same IP address, but to a different vhids. 181.\"Once an ARP request is received, the CARP protocol will use a hashing 182.\"function against the source IP address in the ARP request to determine 183.\"which vhid the request will be assigned to. 184.\"If the corresponding CARP interface is the current 185.\"master interface, a reply will 186.\"be sent to the ARP request; 187.\"otherwise it will be ignored. 188.\"See the 189.\".Sx EXAMPLES 190.\"section for a practical example of load balancing. 191.\".Pp 192.\"The ARP load balancing implemented in 193.\".Nm 194.\"has some limitations. 195.\"First, ARP balancing only works on the local network segment. 196.\"It cannot balance traffic that crosses a router, because the 197.\"router itself will always be balanced to the same virtual host. 198.\"Second, ARP load balancing can lead to asymmetric routing 199.\"of incoming and outgoing traffic, and thus combining it with 200.\".Xr pfsync 4 201.\"is dangerous, because this creates a race condition between 202.\"balanced routers and a host they are serving. 203.\"Imagine an incoming packet creating state on the first router, being 204.\"forwarded to its destination, and the destination replying faster 205.\"than the state information is packed and synced with the second router. 206.\"If the reply would be load balanced to second router, it will be 207.\"dropped since the second router has not yet received information about 208.\"the connection state. 209.Sh STATE CHANGE NOTIFICATIONS 210Sometimes it is useful to get notified about 211.Nm 212status change events. 213This can be accomplished by using 214.Xr devd 8 215hooks. 216Master/slave events are signalled under system 217.Dv CARP . 218The subsystem specifies the vhid and name of the interface where 219the master/slave event occurred. 220The type of the message displays the new state of the vhid. 221Please see 222.Xr devd.conf 5 223and the 224.Sx EXAMPLES 225section for more information. 226.Sh EXAMPLES 227For firewalls and routers with multiple interfaces, it is desirable to 228failover all of the addresses running 229.Nm 230together, when one of the physical interfaces goes down. 231This is achieved by the use of the preempt option. 232Enable it on both hosts A and B: 233.Pp 234.Dl sysctl net.inet.carp.preempt=1 235.Pp 236Assume that host A is the preferred master and we are running the 237192.168.1.0/24 prefix on em0 and 192.168.2.0/24 on em1. 238This is the setup for host A (advskew is above 0 so it could be overwritten 239in the emergency situation from the other host): 240.Bd -literal -offset indent 241ifconfig em0 vhid 1 advskew 100 pass mekmitasdigoat 192.168.1.1/24 242ifconfig em1 vhid 2 advskew 100 pass mekmitasdigoat 192.168.2.1/24 243.Ed 244.Pp 245The setup for host B is identical, but it has a higher 246.Cm advskew : 247.Bd -literal -offset indent 248ifconfig em0 vhid 1 advskew 200 pass mekmitasdigoat 192.168.1.1/24 249ifconfig em1 vhid 2 advskew 200 pass mekmitasdigoat 192.168.2.1/24 250.Ed 251.Pp 252When one of the physical interfaces of host A fails, 253.Cm advskew 254is demoted to a configured value on all its 255.Nm 256vhids. 257Due to the preempt option, host B would start announcing itself, and thus 258preempt host A on both interfaces instead of just the failed one. 259.\".Pp 260.\"In order to set up an ARP balanced virtual host, it is necessary to configure 261.\"one virtual host for each physical host which would respond to ARP requests 262.\"and thus handle the traffic. 263.\"In the following example, two virtual hosts are configured on two hosts to 264.\"provide balancing and failover for the IP address 192.168.1.10. 265.\".Pp 266.\"First the 267.\".Nm 268.\"interfaces on host A are configured. 269.\"The 270.\".Cm advskew 271.\"of 100 on the second virtual host means that its advertisements will be sent 272.\"out slightly less frequently. 273.\".Bd -literal -offset indent 274.\"ifconfig carp0 create 275.\"ifconfig carp0 vhid 1 advskew 100 pass mekmitasdigoat 192.168.1.10/24 276.\"ifconfig carp1 create 277.\"ifconfig carp1 vhid 2 advskew 200 pass mekmitasdigoat 192.168.1.10/24 278.\".Ed 279.\".Pp 280.\"The configuration for host B is identical, except the 281.\".Cm advskew 282.\"is on virtual host 1 rather than virtual host 2. 283.\".Bd -literal -offset indent 284.\"ifconfig carp0 create 285.\"ifconfig carp0 vhid 1 advskew 200 pass mekmitasdigoat 192.168.1.10/24 286.\"ifconfig carp1 create 287.\"ifconfig carp1 vhid 2 advskew 100 pass mekmitasdigoat 192.168.1.10/24 288.\".Ed 289.\".Pp 290.\"Finally, the ARP balancing feature must be enabled on both hosts: 291.\".Pp 292.\".Dl sysctl net.inet.carp.arpbalance=1 293.\".Pp 294.\"When the hosts receive an ARP request for 192.168.1.10, the source IP address 295.\"of the request is used to compute which virtual host should answer the request. 296.\"The host which is master of the selected virtual host will reply to the 297.\"request, the other(s) will ignore it. 298.\".Pp 299.\"This way, locally connected systems will receive different ARP replies and 300.\"subsequent IP traffic will be balanced among the hosts. 301.\"If one of the hosts fails, the other will take over the virtual MAC address, 302.\"and begin answering ARP requests on its behalf. 303.Pp 304Processing of 305.Nm 306status change events can be set up by using the following devd.conf rule: 307.Bd -literal -offset indent 308notify 0 { 309 match "system" "CARP"; 310 match "subsystem" "[0-9]+@[0-9a-z\.]+"; 311 match "type" "(MASTER|BACKUP)"; 312 action "/root/carpcontrol.sh $subsystem $type"; 313}; 314.Ed 315.Pp 316To see 317.Nm 318packets decoded in 319.Xr tcpdump 1 320output, one needs to specify the 321.Fl T Ar carp 322option, otherwise 323.Xr tcpdump 1 324will interpret them as VRRP packets: 325.Bd -literal -offset indent 326tcpdump -npi vlan0 -T carp 327.Ed 328.Sh SEE ALSO 329.Xr tcpdump 1 , 330.Xr inet 4 , 331.Xr pfsync 4 , 332.Xr devd.conf 5 , 333.Xr rc.conf 5 , 334.Xr ifconfig 8 , 335.Xr sysctl 8 336.Sh HISTORY 337The 338.Nm 339device first appeared in 340.Ox 3.5 . 341The 342.Nm 343device was imported into 344.Fx 5.4 . 345In 346.Fx 10.0 , 347.Nm 348was significantly rewritten, and is no longer a pseudo-interface. 349