Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 1 Oct 2016 11:43:08 +0200
From:      Franco Fichtner <franco@opnsense.org>
To:        Kristof Provost <kp@freebsd.org>
Cc:        freebsd-pf@freebsd.org
Subject:   Re: pf fastroute tag removal reviewers needed
Message-ID:  <CEDF651E-E9CE-4CA3-9FBE-FA9DA836C9E0@opnsense.org>
In-Reply-To: <D82461C3-EA8E-4379-9019-89717A99E8FA@FreeBSD.org>
References:  <022E4530-A6DF-452B-8978-43A9B10DA726@opnsense.org> <D82461C3-EA8E-4379-9019-89717A99E8FA@FreeBSD.org>

next in thread | previous in thread | raw e-mail | index | archive | help
Hi Kristof,

> On 28 Sep 2016, at 3:36 PM, Kristof Provost <kp@freebsd.org> wrote:
>=20
> On 28 Sep 2016, at 13:53, Franco Fichtner wrote:
>> The main culprit of pfil not working correctly is pf's
>> route-to and reply-to (and the tag formerly known as fastroute)
>> as they would call if_output directly on the ifnet and consume
>> their packets this way. That transmit code is also copied from
>> if_output() and should likely not be called from within pf,
>> especially when there is a pfil hook chain to go through.
>=20
> Agreed, but there=E2=80=99s another culprit: the v6 fragment handling =
code. It needs to
> call ip6_output()/ip6_forward() because it generates multiple output =
packets.
>=20
> Dealing with that has been on my todo list for a while now, but I=E2=80=99=
ve not even
> found the time to make a start at it.

Right, that also has some issues, but at least the pfil out hook
is invoked with this.

I see that ipfw also has some of those netinet code spots, which
undermine the integrity of pfil.  Would it make sense to take it
to another mailing list to raise awareness the issue to at least
not get any new code added that does this?


Thanks,
Franco=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CEDF651E-E9CE-4CA3-9FBE-FA9DA836C9E0>