Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 29 Jul 2019 20:38:03 +0200
From:      "Kristof Provost" <kp@FreeBSD.org>
To:        "mike tancsa" <mike@sentex.net>
Cc:        "Paul Webster" <paul.g.webster@googlemail.com>, freebsd-pf@freebsd.org
Subject:   Re: pf and dummynet
Message-ID:  <F1B54673-B728-44D3-B3E9-F8A356A78C4A@FreeBSD.org>
In-Reply-To: <8e58346b-5540-b47e-e446-1a5bb11743d3@sentex.net>
References:  <d68129cd-40a4-e065-32c3-3f574eca537e@sentex.net> <5d3f305f.1c69fb81.90047.531f@mx.google.com> <20190729175134.GE10541@vega.codepro.be> <8e58346b-5540-b47e-e446-1a5bb11743d3@sentex.net>

next in thread | previous in thread | raw e-mail | index | archive | help
On 29 Jul 2019, at 20:22, mike tancsa wrote:
> On 7/29/2019 1:51 PM, Kristof Provost wrote:
>>
>> Also beware of gotchas with things like IPv6 fragment handling or
>> route-to.
>>
>> I do not consider mixing firewalls to be a supported configuration. 
>> If
>> it breaks you get to keep the pieces.
>
> Thanks, I was worried about that!  Is there a way to get altq to 
> limit
> inbound traffic directed to a server ?  I would prefer not mixing and
> matching, but I dont see any other way other than going to ipfw which 
> I
> would rather not
>
I don’t know. I’m not very familiar with altq.

In general I’d expect quality of service and bandwidth limits to only 
be effective in the upstream direction (when going from a fast link to a 
slow one). There’s no good way to limit how much traffic other 
machines send to you.

Regards,
Kristof
From owner-freebsd-pf@freebsd.org  Mon Jul 29 19:32:38 2019
Return-Path: <owner-freebsd-pf@freebsd.org>
Delivered-To: freebsd-pf@mailman.nyi.freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1])
 by mailman.nyi.freebsd.org (Postfix) with ESMTP id CD076B370F
 for <freebsd-pf@mailman.nyi.freebsd.org>; Mon, 29 Jul 2019 19:32:38 +0000 (UTC)
 (envelope-from mike@sentex.net)
Received: from pyroxene.sentex.ca (unknown [IPv6:2607:f3e0:0:3::18])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client CN "pyroxene.sentex.ca",
 Issuer "Let's Encrypt Authority X3" (not verified))
 by mx1.freebsd.org (Postfix) with ESMTPS id 43221690AE;
 Mon, 29 Jul 2019 19:32:38 +0000 (UTC) (envelope-from mike@sentex.net)
Received: from [IPv6:2607:f3e0:0:4:346a:6987:6201:ec77]
 ([IPv6:2607:f3e0:0:4:346a:6987:6201:ec77])
 by pyroxene.sentex.ca (8.15.2/8.15.2) with ESMTPS id x6TJWaST068466
 (version=TLSv1.2 cipher=AES128-SHA bits=128 verify=NO);
 Mon, 29 Jul 2019 15:32:36 -0400 (EDT) (envelope-from mike@sentex.net)
Subject: Re: pf and dummynet
To: Kristof Provost <kp@FreeBSD.org>
Cc: Paul Webster <paul.g.webster@googlemail.com>, freebsd-pf@freebsd.org
References: <d68129cd-40a4-e065-32c3-3f574eca537e@sentex.net>
 <5d3f305f.1c69fb81.90047.531f@mx.google.com>
 <20190729175134.GE10541@vega.codepro.be>
 <8e58346b-5540-b47e-e446-1a5bb11743d3@sentex.net>
 <F1B54673-B728-44D3-B3E9-F8A356A78C4A@FreeBSD.org>
From: mike tancsa <mike@sentex.net>
Message-ID: <bf5273a4-d674-e1d9-7bc4-36bef769b42a@sentex.net>
Date: Mon, 29 Jul 2019 15:32:36 -0400
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101
 Thunderbird/60.8.0
MIME-Version: 1.0
In-Reply-To: <F1B54673-B728-44D3-B3E9-F8A356A78C4A@FreeBSD.org>
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 8bit
Content-Language: en-US
X-Rspamd-Queue-Id: 43221690AE
X-Spamd-Bar: -
Authentication-Results: mx1.freebsd.org;
 spf=pass (mx1.freebsd.org: domain of mike@sentex.net designates
 2607:f3e0:0:3::18 as permitted sender) smtp.mailfrom=mike@sentex.net
X-Spamd-Result: default: False [-1.44 / 15.00]; ARC_NA(0.00)[];
 RDNS_NONE(1.00)[]; RCVD_COUNT_TWO(0.00)[2];
 RCVD_TLS_ALL(0.00)[]; FROM_HAS_DN(0.00)[];
 RCPT_COUNT_THREE(0.00)[3];
 R_SPF_ALLOW(-0.20)[+ip6:2607:f3e0::/32];
 NEURAL_HAM_LONG(-0.98)[-0.976,0]; TAGGED_RCPT(0.00)[];
 MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[sentex.net];
 TO_DN_SOME(0.00)[]; TO_MATCH_ENVRCPT_SOME(0.00)[];
 MX_GOOD(-0.01)[cached: smtp.sentex.ca];
 NEURAL_HAM_SHORT(-0.96)[-0.959,0];
 NEURAL_HAM_MEDIUM(-0.97)[-0.974,0];
 IP_SCORE(-1.72)[ipnet: 2607:f3e0::/32(-4.94), asn: 11647(-3.57), country:
 CA(-0.09)]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[];
 MIME_TRACE(0.00)[0:+];
 ASN(0.00)[asn:11647, ipnet:2607:f3e0::/32, country:CA];
 HFILTER_HOSTNAME_UNKNOWN(2.50)[]; MID_RHS_MATCH_FROM(0.00)[];
 FREEMAIL_CC(0.00)[googlemail.com]
X-BeenThere: freebsd-pf@freebsd.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Technical discussion and general questions about packet filter
 \(pf\)" <freebsd-pf.freebsd.org>
List-Unsubscribe: <https://lists.freebsd.org/mailman/options/freebsd-pf>,
 <mailto:freebsd-pf-request@freebsd.org?subject=unsubscribe>
List-Archive: <http://lists.freebsd.org/pipermail/freebsd-pf/>;
List-Post: <mailto:freebsd-pf@freebsd.org>
List-Help: <mailto:freebsd-pf-request@freebsd.org?subject=help>
List-Subscribe: <https://lists.freebsd.org/mailman/listinfo/freebsd-pf>,
 <mailto:freebsd-pf-request@freebsd.org?subject=subscribe>
X-List-Received-Date: Mon, 29 Jul 2019 19:32:38 -0000

On 7/29/2019 2:38 PM, Kristof Provost wrote:
>
> On 29 Jul 2019, at 20:22, mike tancsa wrote:
>
>     On 7/29/2019 1:51 PM, Kristof Provost wrote:
>
>         Also beware of gotchas with things like IPv6 fragment handling or
>         route-to.
>
>         I do not consider mixing firewalls to be a supported
>         configuration. If
>         it breaks you get to keep the pieces.
>
>     Thanks, I was worried about that!  Is there a way to get altq to limit
>     inbound traffic directed to a server ?  I would prefer not mixing and
>     matching, but I dont see any other way other than going to ipfw
>     which I
>     would rather not
>
> I don’t know. I’m not very familiar with altq.
>
> In general I’d expect quality of service and bandwidth limits to only
> be effective in the upstream direction (when going from a fast link to
> a slow one). There’s no good way to limit how much traffic other
> machines send to you.
>
Another problem is that altq doesnt seem to work with all NICs. 
Although cxgbe is listed in the man page still

# grep cxl /etc/pf.conf
altq on cxl0 cbq bandwidth 2000Mb queue { zrepl,  default }
# pfctl -f /etc/pf.conf
pfctl: cxl0: driver does not support altq
#

# man altq | grep -i cxgb
     bce(4), bfe(4), bge(4), bxe(4), cas(4), cxgbe(4), dc(4), de(4), ed(4),


    ---Mike





Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?F1B54673-B728-44D3-B3E9-F8A356A78C4A>