-
zerotime
thanks mason
-
zerotime
!ztquote
-
zerotime
A diamond with a flaw is worth more than a pebble without imperfections. -Chinese Proverb [zerotime collection]
-
mason
zerotime: The quoting is a bit off-topic. There's #freebsd-social for that if you want. Regardless, you're welcome.
-
zerotime
it was more of a reference to your answer. flawed but useful enough to get me in the right direction
-
zerotime
openzfs-2.2 wasn't introduced in 13.x
-
polarian
hmmm
-
polarian
yeah I think there might be a bug here
-
polarian
-
polarian
IPv6 only jail, no bridge, attempting routed
-
polarian
NS is being ignored by tap, despite having the address
-
polarian
which isnt too much of a surprise, tap doesn't have a LLA
-
polarian
now iirc all ifaces should have an IP address, but this is mainly with IPv4, if an interface has a LLA then this can be used between two devices, however I just used global addresses
-
polarian
::4 is vm, ::3 is jail ::2 is host
-
polarian
sorry ::3 is tap
-
polarian
I have also tried with ::2, but this also ignores the NS
-
polarian
any ideas? I use a routed setup with IPv4 only
-
polarian
works fine there...
-
polarian
no NDP, no routing
-
polarian
this DOES work when bridged though, if I bridge tap0 to host works just fine
-
nulltaz
Does it make me a coward if I don't use PF on my AWS EC2 instance and just use the VPC security group inbound rules?
-
nulltaz
PF is frustrating me right now, as I try to learn it
-
martouf
imo not really
-
nulltaz
I just started reading about PF today, and I did kinda rush through building out my pf.conf. So maybe I'll learn to love it. But as of now, it seems like a pain.
-
Laidback_01
look up firewallbuilder - it's a cool older piece of software that did a decent job making pf rules.
fwbuilder.sourceforge.net I used this when I first started playing with pf trying to learn rules. If nothing else, you can generate a great starting point!
-
nimaje
polarian: poudriere just creates jails in the way it wants to use then, for example you can mix the jails with ports trees, so the choosen ports tree is null mounted when doing a build, if you just want to create a clean jail for building packages, there aren't specific requirements for that, just that you should clean it up for every package you build, poudriere uses zfs snapshots for that if you
-
nimaje
are on zfs
-
mage
I'm trying to zfs umount and I'm getting cannot unmount '/jails/foobar': pool or dataset is busy .. is there a way to find what is using the fs ?
-
mage
# fstat -m /jails/foobar doesn't report anything
-
mage
also what's the danger/implications of doing zfs umount -f ?
-
tsoome
as with any other forced umount - possible loss of application state resulting from app internal state getting lost.
-
BinGOs
a/win 48
-
nimaje
hm, I have configured my system to place coredumps under /var/coredumps/<uid>/ is there a way to automatically create that dir when a new user is added, be it by pw or by pkg? (/var/coredumps itself is only writeable by root)
-
» kevans wrote a whole ass daemon to get around the default coredump deficiencies
-
nimaje
what deficiencies did you work around with that daemon? is the code somewhere public?
-
kevans
-
kevans
most of my annoyances were with coredumps in jails
-
kevans
it works better on freebsd 15.0+ because i improved the kernel side to allow a kmod to handle coredumps, so it's paired with a kmod that I wrote that exfiltrates more information about the core
-
kevans
before that you'd have to look for a devd notification, but devd notifications are limited to < 1024 bytes in total
-
kevans
the other nice bit about that is that it actually pipes the core to ucored, so you can discard the core without it ever hitting the disk or move it elsewhere
-
nimaje
that tool sounds nice, any plans to replace the coredump handling with it in base? for that the default config probably has to read kern.corefile for where to put corefiles because of POLA
-
kevans
not offhand, since it does introduce complexity
-
AmyMalik
firefox seems to make the kernel leak memory until it's closed
-
polarian
nimaje: hmm... thats fine the thing is I want to use the base I compile myself
-
polarian
so can I just install a jail and poudriere will snapshot and restore it after building?
-
polarian
or does poudriere do any config to jails it makes itself
-
nimaje
not sure which expectations poudriere has for jails, but to manage jails it writes config on the host. You should look at
man.freebsd.org/cgi/man.cgi?query=poudriere-jail especially -c -b -m src=<path> and -c -m null -M <path> could be intersting for you
-
polarian
nimaje: thx
-
polarian
will look into it
-
polarian
imma jail bhyve and then virtualise freebsd 15.0 then run poudriere :p
-
polarian
will prob IPv6 only and then NAT64 on host because some sources might be cringe and not support IPv4
-
nimaje
as bhyve is mostly a program to configure vmm.ko I don't think jailing it will improve much, if it is even possible
-
rtprio
agreed, i don't see any value in that
-
kevans
nimaje: rtprio: bhyve device emulation happens in userland, not the kernel
-
kevans
(the contested bit being that the parts hand-waved over as 'the stuff that is not about configuring vmm.ko' is actually pretty important)
-
mason
Hey all. I'm pretty new to pf. Is it possible to specify timers with tables in pf, such that any entry added will be automatically removed after some amount of time?
-
mason
I'm specifically looking for an equivalent to the ipset: create blocklist hash:ip family inet hashsize 2048 maxelem 65536 timeout 604800
-
mason
(Which see, any entry added will expire on its own after a week.)
-
rwp
mason, I have been (softly) looking for the same thing myself. We are all blocking a lot of bad actor addresses these days. AFAIK I haven't found an implementation of a self expiring pf block yet.
-
rwp
I do set up fail2ban on FreeBSD though and fail2ban will keep track of expiration itself in its own sqlite database and then remove them later.
-
rwp
It's definitely not as clean of a solution as available with Linux ipset timeout expiration. It would be really great to have something like that available.
-
mason
Hrm, hrm. Alright. Thank you.
-
mason
Plus side, PF is really clean and quick to set up otherwise.
-
rwp
I also like pf quite a bit. It's missing this feature (until we find it or create it). And pf has other features which Linux does not have. (I must run afk now... Later!)
-
nulltaz
I was having a REALLY hard time getting PF to work. I work with Palo Alto firewalls every day at work, and have a lot of experience crafting Cisco ACL's, and PF just didn't make sense to me.
-
nulltaz
Then I read about adding 'quick' to rules.
-
nulltaz
BOOM, mind blown
-
isley
it's just last match vs first match
-
nulltaz
Yeah, the gear I've used before would stop at the first match. So I assumed that's how it worked in PF
-
mason
rwp: You might find that nft has some missing features. I remember when I moved from ipf to iptables I was dismayed at how many features were missing.
-
nulltaz
I had my Default Deny rule at the bottom of the rulebase lmao
-
topcat001
Is there any issue with using a compressed vdev as a swap device?
-
mason
topcat001: There have historically been problems with using zvols for swap under memory pressure.
-
mason
Compressed or otherwise.
-
topcat001
cool thanks! I'll just use a partition then.
-
mason
Safer.
-
mason
Note that using GELI for it is unproblematic.
-
topcat001
y definitely will encrypt it.
-
dvl
I have a new FreeBSD 15.0 host. The boot drive has both a freebsd-boot partition and an efi partition
-
dvl
2048 348 1 freebsd-boot (174K)
-
dvl
2396 66584 2 efi (33M)
-
dvl
I'm not familiar with this layou. I've only seen one or the other before.
-
dvl
*layout
-
nxjoseph
not sure but i guess freebsd installer does try to support both UEFI/BIOS booting methods soo there are 2 partitions.
-
mason
dvl: Having both is fine.
-
mason
dvl: With that you can boot legacy *or* UEFI.
-
mason
I set that up by default.
-
mason