Trouble with IPFW or TCP?
Julian Elischer
julian at elischer.org
Sat Apr 5 17:53:25 UTC 2008
Ian Smith wrote:
>
> I don't see why you think it's broken? Apart from obvious efficiency of
> having a check-state rule earlier, to get on with matching this packet
> against existing dynamic rules without wading through intervening rules,
> state is still only checked once; like it says, the O_PROBE_STATE opcode
> only causes a state check at the first check-state, keep-state or limit
> rule (encountered); any others found then become a short-path NOP.
>
> Personally I like to do traffic accounting before any packet is whisked
> off to be dealt with (and accounted by) any keep-state rules, though as
> your example shows that can be done afterwards, if not piped or such.
>
> But I can't see why you ever wouldn't want to check the existing state
> of any src-addr/src-port <-> dst-addr/dst-port packet before attempting
> to add a new dynamic rule for that same session?
My firewall rules a re very complex and I could want to change the
action stored with a particular session..
trivial example:
Assuming that keep-state did NOT do a check state:
10 check-state
100 skipto 1000 tcp from any to any in $inside keep-state
[...]
1000 skipto 2000 tcp from any to any iplen 1480-9200 keep-state
[...]
2000 count log ip from any to any
[....]
now I change the action for jumbo packets for accounting purposes to
go straight to 2000
with implicit check state..
1/ I have no way of changing what to do as the keep-state on 100 will
never bee done
2/ I have no idea what happens when you effectlvely do a
"1000 skipto 1000".
More information about the freebsd-net
mailing list