cvs commit: src/sys/net/pf if_pfsync.c pf.c pf_ioctl.c pfvar.h src/usr.sbin/pfctl parse.y pf.conf.5 pf_print_state.c pfctl_parser.c pfctl_parser.h

Matthew Dillon dillon at crater.dragonflybsd.org
Fri Apr 11 11:23:32 PDT 2008


dillon      2008/04/11 11:21:49 PDT

DragonFly src repository

  Modified files:
    sys/net/pf           if_pfsync.c pf.c pf_ioctl.c pfvar.h 
    usr.sbin/pfctl       parse.y pf.conf.5 pf_print_state.c 
                         pfctl_parser.c pfctl_parser.h 
  Log:
  Implement a number of major new features to PF.
  
  * Implement several new options to keep/modulate/synproxy state.
    'pickups', 'no-pickups', and 'hash-only'.  Example:
  
      pass on $ext_if inet from any to any keep state (pickups)
  
  * Implement a SET directive to set the default keep policy.  Example:
  
      set keep-policy keep state (pickups)
      pass on $ext_if inet from any to any
  
  * Implement the 'no state' phrase for rules, disabling any previously
    specified default state policy for that rule (ala OpenBSD).
  
  'pickups' and 'hash-only' imply no flag restrictions, no-pickups implies
  flags S/SA.  When pickups are enabled the state code will re-establish state
  for existing TCP connections.  Because the tcp options passed in the SYNs
  are not known when this occurs, sequence space checking will be disabled
  for those connections.  The 'hash-only' mode allows pickups but disables
  sequence space checking regardless of whether the SYN packets were observed
  or not.
  
  The state code no longer attempts to do sequence space checking if it has
  no information on TCP options passed in SYN packets.  The SYN from both
  ends must be observed for sequence space checking to occur (which is what
  happens by default due to flag restrictions).
  
  It should be noted that OpenBSD defaults to 'keep state' with the equivalent
  of no-pickups.  The problem with this is that rebooting you router or
  otherwise losing state will cause existing TCP connections to be reset,
  and I do not think this is an appropriate default for PF.  DragonFly does
  not default to using keep state but introduces the global SET directive
  to allow it to be enabled by default.
  
  Finally, note that when using pickups or hash-only, if you desire PF to
  not drop TCP connections on loss of state you need to have a few more
  rules then usual to pickup on packets going the opposite direction.
  For example, if you allow outgoing connections then you ALSO have to keep
  state on INCOMING packets with 'flags /S' (i.e. 'established') in order
  to ensure that active connections can be re-established on loss of state
  by packets in either direction.
  
  This isn't too bad since anyone using queueing has to use multiple rule
  sets anyway to ensure that state is established on the proper queue.
  
  In anycase, DragonFly now allows you to pick your poison.  One global SET
  directive and you can use OpenBSD's policy, or you can make your own.
  
  In-consultation-with: Max Laier <max at love2party.net>
  
  Revision  Changes    Path
  1.7       +2 -0      src/sys/net/pf/if_pfsync.c
  1.18      +79 -14    src/sys/net/pf/pf.c
  1.14      +1 -0      src/sys/net/pf/pf_ioctl.c
  1.8       +13 -0     src/sys/net/pf/pfvar.h
  1.5       +93 -6     src/usr.sbin/pfctl/parse.y
  1.13      +80 -2     src/usr.sbin/pfctl/pf.conf.5
  1.3       +12 -1     src/usr.sbin/pfctl/pf_print_state.c
  1.3       +25 -2     src/usr.sbin/pfctl/pfctl_parser.c
  1.3       +1 -1      src/usr.sbin/pfctl/pfctl_parser.h


http://www.dragonflybsd.org/cvsweb/src/sys/net/pf/if_pfsync.c.diff?r1=1.6&r2=1.7&f=u
http://www.dragonflybsd.org/cvsweb/src/sys/net/pf/pf.c.diff?r1=1.17&r2=1.18&f=u
http://www.dragonflybsd.org/cvsweb/src/sys/net/pf/pf_ioctl.c.diff?r1=1.13&r2=1.14&f=u
http://www.dragonflybsd.org/cvsweb/src/sys/net/pf/pfvar.h.diff?r1=1.7&r2=1.8&f=u
http://www.dragonflybsd.org/cvsweb/src/usr.sbin/pfctl/parse.y.diff?r1=1.4&r2=1.5&f=u
http://www.dragonflybsd.org/cvsweb/src/usr.sbin/pfctl/pf.conf.5.diff?r1=1.12&r2=1.13&f=u
http://www.dragonflybsd.org/cvsweb/src/usr.sbin/pfctl/pf_print_state.c.diff?r1=1.2&r2=1.3&f=u
http://www.dragonflybsd.org/cvsweb/src/usr.sbin/pfctl/pfctl_parser.c.diff?r1=1.2&r2=1.3&f=u
http://www.dragonflybsd.org/cvsweb/src/usr.sbin/pfctl/pfctl_parser.h.diff?r1=1.2&r2=1.3&f=u





More information about the Commits mailing list