New PF on FreeBSD snapshot available 58
Dan writes "Pyun YongHyeon and Max Laier announce a new release of PF for FreeBSD, which is available for download. Since the first release of PF at the end of March 2003, PF has undergone several major updates such as -current and ALTQ support. They have also removed bugs in IPv6, module handling and table support code and believe the current version 0.61 is very close to production use."
Re:PF? (Score:4, Informative)
PF is fairly new compared to IPFW and IPFilter, but it has reapidly been gaining advanced features and capabilities. Porting it to other operating systems is a good thing IMO - the more competition in this field, the better
Re:PF? (Score:1)
Those that have used all three packet filters know that PF is where it's at. Looking forward to seeing it added to the ports tre
Re:Now we have to relearn FreeBSD networking?? (Score:4, Informative)
In FreeBSD, there's IPFW *or* IPFilter *or* Packet Filter. IPFW has been around a long time, and the syntax has changed very little. New features have been added, though, but all the old features still work. Same with IPF. Nobody is forced to switch from IPFW to IPF or PF. They can continue to use IPFW.
It's much nicer to be able to continue to use the same packet filter across minor *and* major versions of an OS. It's also nice to have a choice of two or three packet filters.
I'll definitely stick to BSD for packet filtering. Linux is nothing more than a toy.
Re:Now we have to relearn FreeBSD networking?? (Score:2)
What's your beef with Linux's filters? I've found iptables to be really nice -- much better than ipchains (never used ipfwadm).
I just installed NetBSD for the first time (on VMWare on my Redhat box), so I guess I'll get a chance to see first-hand the *BSD side of packet filtering. Maybe I'll have a different opinion of iptabels in a couple of months.
Re:Now we have to relearn FreeBSD networking?? (Score:2, Informative)
The AC already replied, but I just want to point out he or she is correct. FreeBSD 5.0, by default, includes compatiable libraries and interfaces to run older code. This includes compat2, compat3, and (with the release of 5.0) compat4. There are kernel options, such as COMPAT_FREEBSD4,
Re:Now we have to relearn FreeBSD networking?? (Score:3, Insightful)
The beauty of IPFW (or IPF or PF) is that the syntax hasn't changed all that much, even though new features have been added. The syntax for the Li
Re:Now we have to relearn FreeBSD networking?? (Score:2)
I could say the same thing for perl, but I'd have a hard time coming down as hard on it as you have on iptables. However, it's all I've ever known in the world of filtering (except for Cisco's and AIX's filter rules). I guess syntax is a matter of taste and what we're comfortable with.
The other horrible thing about Linux packet filtering is that it only *just* got NAT figured out. Only took them 3 releases
Re:Now we have to relearn FreeBSD networking?? (Score:2)
IPTables was the first to support NAT, incoming, outgo
Re:Now we have to relearn FreeBSD networking?? (Score:3, Insightful)
I never started this as a war between Linux and FreeBSD. I can see you are strongly biased one way. But my point is FreeBSD and Linux combined make for 6 different packet filtering tools. This does not help network administrators. The reason why
Of you still have a lot against Linux, well just take FreeBSD then. I hope we can use pf 7 years from now.
Re:Now we have to relearn FreeBSD networking?? (Score:3, Interesting)
Having Emacs (yuck!
For Linux, it was closer to going from vi to ee to emacs for the base editor.
Re:Now we have to relearn FreeBSD networking?? (Score:2)
If Linux-land, the analogy is: 2.0 had vi and all was well. 2.2 removed vi and added emacs. 2.4 removed emacs and added pico. Three kernel releases, three new editors to learn. Sure, each editor includes a very rudimentary command emulator for the previous editors, but nobody can use them for real work.
In BSD-land, the analogy is: vi was added. A few releases later, emacs was added as an option. A few releases later, pico was added as an option. Users have the choice
For the acronym impaired (Score:2)
It might be helpful to provide rudimentary information like this in the slashdot articles.
hardly (Score:3, Funny)
who needs google when we've got
Grow up, troll (Score:1)
For those not keeping score... (Score:3, Informative)
FreeBSD [freebsd.org], up to now, has had two different firewalling methods. First off, there is the natively developed ipfw [freebsd.org] tool, which recently got a renovation and is now ipfw2 in -CURRENT. The alternative to ipfw is Darren Reed's ipfilter [slashdot.org], also known as just ipf. Both ipfw and ipfilter share similar capabilities, and it is generally user preference as to which one is used in FreeBSD.
Now, it seems somebody has made the effort to port yet another firewalling mechanism to FreeBSD, this time pf. The features it claims to have over ipfw are:
Presumably, some of these are rather desirable features. However, it is beyond me why FreeBSD needs yet another way to do firewalling when the interfaces and systems we have now already work well. It is my opinion that instead of porting something proprietary to OpenBSD like pf, time should have been spent either patching these features into ipfilter or ipfw to add functionality to an already accepted and loved firewalling mechanism. There is no reason FreeBSD needs to dig a deeper firewalling grave for itself like OpenBSD has done.
Re:For those not keeping score... (Score:2)
Can you explain what you mean by this? It's not a troll, I am genuinely interested in what you mean.
Re:For those not keeping score... (Score:2)
Re:For those not keeping score... (Score:3, Interesting)
pf has a lot of interesting things like alt-q integration (yes, not implemented in -current yet but there are working patches at altq's site), tables, etc (you mentioned them).
And yes, more is better. A lot of people (including me) use on some servers ipfw and ipfilter/ipnat at the same time because it's useful and you can take the best of each "world". pf introduction will give users even more options, noth
Re:For those not keeping score... (Score:2)
Why do you ignore ipfw here ?
ipfw is FreeBSD's very own and native packet filtering framework. It already has a number of those features ascribed to pf, and it works quite well with FreeBSD.
The very reason pf exists is that Theo and the Gang suffered from a mild rash of NIH when they needed packet filtering code after their run-in with the Ipf guy. Instead of just porting ipfw, they choose to do their ow
Re:For those not keeping score... (Score:1)
Re:For those not keeping score... (Score:1)
Re:For those not keeping score... (Score:2)
I don't care what you do with your lamp, but is is my opinion that you could spend your time doing much more productive things. Besides, NetBSD likely already runs on your lamp.
Re:For those not keeping score... (Score:4, Informative)
ipfw is basically a basic packet filter with a few things bodged on top of it (variable expansion, keeping state, etc) (OK, that's a bit unfair, but it's what it *feels* like to use). pf is a built-from-the-ground-up total firewall solution, with a hell of a lot of flexibility, and also several functions which will do in one line what it takes ipfw rather longer to do (e.g. anti-spoofing). Plus the simple command "scrub in all" on your border router immediately renders most TCP-fragmentation attacks benign.
Essentially, if you want a router with a bit of filtering, ipfw will do you. If you want a serious firewall, go for pf. However, if you want a serious firewall, you should already be going with OpenBSD anyway
Re:For those not keeping score... (Score:3, Interesting)
Actually, Theo's `licencing restrictions are for the lower orders not me' squabble with Darren Reed happened just when I was getting ready to put ina firewall. OBSD was the planned system, but theere is no way I was going to run a brand new piece of software in such a role, and I'm not sure I think PF is long enough in the tooth to be comfortable yet. So my firewall and the two I am setting up for work are FBSD/ipfw
Re:For those not keeping score... (Score:3, Interesting)
I'm using a 3.3 snapshot from March @ my small organization's 60pc firewall -- one as a bridge protecting my w2k server, the other as 3nic internet/nat+squid/dmz firewall -- both machines are utilizing altq to aggregate traffic nicely, on 64meg 166Mhz pentium classics
Re:For those not keeping score... (Score:2)
On this one I think the way IPFW is used on FBSD is defintley the Right Thing. You just add rules in a shell script and so you have the variable substitution, conditionals, tests and definable functions in a syntax everyone should be familair with.
Isn't the tsandard linux ipWHATEVERITISTHISWEEK filter similar? I set up some rules once some time ago and seem to remember it was a shellscript, though I didn't do anything big e
Re:For those not keeping score... (Score:3, Insightful)
Okay, so you admit your own explanation is biased and wrong. That basically invalidates that "point" you made. Have you looked at the rework of ipfw which is in FreeBSD 5.0-CURRENT and known as ipfw2?
Re:For those not keeping score... (Score:3, Insightful)
Re:For those not keeping score... (Score:1, Flamebait)
The manpage you quote is documenting a programmer's interface with IOCTLs and c structs. It neither proveides a usefull overview of pf nor does it tell you how to build rules with it.
If you read that and found it better than FreeBSD's concise and well written ipfw(8) manpage you must have smoked some very heavy stuff.
Re:For those not keeping score... (Score:2)
http://www.openbsd.org/cgi-bin/man.cgi?query=pf.c o nf&apropos=0&sektion=0&manpath=OpenBSD+Current&arc h=i386&format=html [openbsd.org]
Just look at all the little details they throw in. You don't *just* get tables, you can define them as being 'const' too, which is rather handy... The whole thing is carefully designed, not thrown together.
Re:For those not keeping score... (Score:1)
Re:For those not keeping score... (Score:2)
No they wouldn't, unless their company has a _lot_ of money to throw away. Firewalling devices, particularly that can handle links >100MB are *very* expensive. And you can take that large number and multiply it several times if you want anything resembling redundancy.
I really want to see pf on FreeBSD. It has recently
Re:For those not keeping score... (Score:2)
This is plain nonsense. Ipfw has all the bells and whistels you need, and quite some more. And, sorry, variable expansion under Unix is done in a shell or a macro preprocessor and not in the firewall control utility.
You (and maybe the pf author, too) apparently suffer from the Microsoft Word desease (Word calculates tables
Re:For those not keeping score... (Score:2)
Yes, ipfw is a great filter. That doesn't mean i
Re:For those not keeping score... (Score:1)
Means more choice, I think we Do need it (Score:1, Informative)
Also means I will have to port my "ROQ" script to it as well so people can easily set it up on FreeBSD 5.1 go to http://www.roq.com/bsd/ and you will see what I mean