From owner-freebsd-pf@freebsd.org Mon Jul 29 16:06:53 2019 Return-Path: Delivered-To: freebsd-pf@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id F3197AE790 for ; Mon, 29 Jul 2019 16:06:53 +0000 (UTC) (envelope-from mike@sentex.net) Received: from pyroxene.sentex.ca (unknown [IPv6:2607:f3e0:0:3::18]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "pyroxene.sentex.ca", Issuer "Let's Encrypt Authority X3" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 90644898AF for ; Mon, 29 Jul 2019 16:06:43 +0000 (UTC) (envelope-from mike@sentex.net) Received: from [IPv6:2607:f3e0:0:4:346a:6987:6201:ec77] ([IPv6:2607:f3e0:0:4:346a:6987:6201:ec77]) by pyroxene.sentex.ca (8.15.2/8.15.2) with ESMTPS id x6TG6ex7053734 (version=TLSv1.2 cipher=AES128-SHA bits=128 verify=NO) for ; Mon, 29 Jul 2019 12:06:41 -0400 (EDT) (envelope-from mike@sentex.net) To: freebsd-pf@freebsd.org From: mike tancsa Subject: pf and dummynet Message-ID: Date: Mon, 29 Jul 2019 12:06:43 -0400 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.8.0 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit Content-Language: en-US X-Rspamd-Queue-Id: 90644898AF X-Spamd-Bar: - Authentication-Results: mx1.freebsd.org; spf=pass (mx1.freebsd.org: domain of mike@sentex.net designates 2607:f3e0:0:3::18 as permitted sender) smtp.mailfrom=mike@sentex.net X-Spamd-Result: default: False [-1.42 / 15.00]; ARC_NA(0.00)[]; RDNS_NONE(1.00)[]; RCVD_TLS_ALL(0.00)[]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2607:f3e0::/32]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-pf@freebsd.org]; TO_DN_NONE(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_HAM_LONG(-0.99)[-0.990,0]; DMARC_NA(0.00)[sentex.net]; MX_GOOD(-0.01)[smtp.sentex.ca]; NEURAL_HAM_SHORT(-0.91)[-0.905,0]; NEURAL_HAM_MEDIUM(-0.99)[-0.990,0]; IP_SCORE(-1.72)[ipnet: 2607:f3e0::/32(-4.94), asn: 11647(-3.57), country: CA(-0.09)]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:11647, ipnet:2607:f3e0::/32, country:CA]; HFILTER_HOSTNAME_UNKNOWN(2.50)[]; MID_RHS_MATCH_FROM(0.00)[]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-pf@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Technical discussion and general questions about packet filter \(pf\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 29 Jul 2019 16:06:54 -0000 I have a box I need to shape inbound and outbound traffic. It seems altq can only shape outbound packets and not limit inbound ?  If thats the case, what is the current state of mixing ipfw, dummynet and pf ? Writing large complex firewall rules works better from a readability POV (for us anyways) so I really prefer to use it. But I need to prevent zfs replication eating up BW over some WAN links, and dummynet seems to "just work" For ipfw I have 00010 6640359 9959147882 pipe 1 tcp from 192.168.128.0/20 to any 01000 3486901  228480912 allow ip from any to any and then checking my pf.conf rules, it seems to block and pass traffic as expected.  Is there anything I should explicitly check ?     ---Mike