anyone tried the Multi routing table code yet?

Julian Elischer julian at elischer.org
Fri May 30 09:45:33 UTC 2008


Rajkumar S wrote:
> On Sat, May 24, 2008 at 6:09 AM, Julian Elischer <julian at elischer.org> wrote:
>> subject says it all really..
> 
> I am using pf and rtable to setfib and get an pfctl: DIOCADDRULE:
> Device busy when trying to load "pass in quick on fxp0 from any to any
> keep state rtable 1"
> 

I'm not really familiar with the pf syntax
as I didn't do that part of the patch (max laier (CC'd) did)
and I don't use pf.

Max may be able to see if the patch to the pf code ahs an error.



> I can successfully load "pass in quick on fxp0 all flags S/SA keep
> state rtable 0" I am testing on FreeBSD CURRENT.
> 
> My routing tables are:
> 
> 
> [root at daemon /etc]# setfib -0 netstat -nrf inet
> Routing tables
> 
> Internet:
> Destination        Gateway            Flags    Refs      Use  Netif Expire
> default            192.168.3.100      UGS         0     2025   fxp0
> 127.0.0.1          127.0.0.1          UH          0        0    lo0
> 192.168.3.0/24     link#1             UC          0        0   fxp0
> 192.168.3.54       00:40:f4:b7:d7:ee  UHLW        1       40   fxp0   1179
> 192.168.3.100      00:80:48:38:1a:df  UHLW        2      149   fxp0   1173
> 192.168.4.0/24     link#1             UC          0        0   fxp0
> 192.168.4.4        00:80:48:1f:48:26  UHLW        1      141   fxp0   1120
> 192.168.5.0/24     link#3             UC          0        0   rue0
> [root at daemon /etc]# setfib -1 netstat -nrf inet
> Routing tables
> 
> Internet:
> Destination        Gateway            Flags    Refs      Use  Netif Expire
> default            192.168.5.4        UGS         0       13   rue0
> 127.0.0.1          127.0.0.1          UH          0        0    lo0
> 192.168.3.0/24     link#1             UC          0        0   fxp0
> 192.168.3.54       00:40:f4:b7:d7:ee  UHLW        1        0   fxp0   1176
> 192.168.3.100      00:80:48:38:1a:df  UHLW        1        5   fxp0   1170
> 192.168.4.0/24     link#1             UC          0        0   fxp0
> 192.168.4.4        00:80:48:1f:48:26  UHLW        1        0   fxp0   1117
> 192.168.5.0/24     link#3             UC          0        0   rue0
> 
> btw, does the rtable syntax allow to set route for packets generated
> by the pf host itself (like packets from squid). The catch is that
> they cannot be matched via a "pass in" rule, they are matched only on
> a "pass out" rule.

I don't know about pf, but in ipfw it definitely can be any packet at 
any time, but the outgoing packets have already made their routing 
decision before they hit the firewall so even though a table is 
associated with the packet, it's too late :-/ it has to be associated 
with the socket itself to really have effect.

> 
> Thanks and regards,
> 
> raj
> _______________________________________________
> freebsd-net at freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-net
> To unsubscribe, send any mail to "freebsd-net-unsubscribe at freebsd.org"



More information about the freebsd-net mailing list