<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[[Undeadly] Automatic expiry at timeout for pf(4) overload tables]]></title><description><![CDATA[<blockquote>
<p dir="auto">Network-oriented readers will be familiar with the concept of overload tables, commonly used with state tracking options to create adaptive rulesets for such things as punishing password-guessing botnets.</p>
<p dir="auto">A downside to tables that would tend to fill up indefinitely is that at some point they will be quite full, and the administrator would need to either manually run pfctl expire or set up a crontab entry to weed out old entries at intervals.</p>
</blockquote>
<ul>
<li><a href="https://undeadly.org/cgi?action=article;sid=20260513064948" rel="nofollow ugc">https://undeadly.org/cgi?action=article;sid=20260513064948</a></li>
<li><a href="https://marc.info/?l=openbsd-tech&amp;m=177846164902091&amp;w=2" rel="nofollow ugc">https://marc.info/?l=openbsd-tech&amp;m=177846164902091&amp;w=2</a></li>
</ul>
<hr />
<p dir="auto"><em>ping: <a href="https://framapiaf.org/@openbsdjournal@mastodon.social/116565993077076112" rel="nofollow ugc">https://framapiaf.org/@openbsdjournal@mastodon.social/116565993077076112</a></em></p>
]]></description><link>https://billboard.bsd.cafe/topic/168/undeadly-automatic-expiry-at-timeout-for-pf-4-overload-tables</link><generator>RSS for Node</generator><lastBuildDate>Wed, 13 May 2026 13:21:18 GMT</lastBuildDate><atom:link href="https://billboard.bsd.cafe/topic/168.rss" rel="self" type="application/rss+xml"/><pubDate>Wed, 13 May 2026 08:06:52 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to [Undeadly] Automatic expiry at timeout for pf(4) overload tables on Wed, 13 May 2026 08:16:02 GMT]]></title><description><![CDATA[<p dir="auto">That’s an interesting idea, though I’m not sure if it’s relevant.</p>
<p dir="auto">The question I’m asking myself is: why is it problematic to use the <code>expire</code> option, which is designed for this very purpose? because sysadmins forget to configure it, which causes the relevant tables to grow?!</p>
<hr />
<p dir="auto">I think this is more relevant:</p>
<blockquote>
<p dir="auto">The "feature request" wish I have is to be able to backup/restore tables<br />
preserving the counters and timestamp for each entry.</p>
<p dir="auto">Currently I do a "pfctl -T show" and save to file on server shutdown.<br />
Then I do a "pfctl -T add" from filename to reload table on boot.<br />
Obviously this resets all the timestamps to the current boot time.<br />
I know, don't reboot.</p>
</blockquote>
<p dir="auto"><em>seen on: - <a href="https://undeadly.org/cgi?action=article;sid=20260513064948" rel="nofollow ugc">https://undeadly.org/cgi?action=article;sid=20260513064948</a></em></p>
<p dir="auto">This seems me a good idea: save with good informations when rebooting is needed, as instance a "new" rebuilded kernel</p>
]]></description><link>https://billboard.bsd.cafe/post/450</link><guid isPermaLink="true">https://billboard.bsd.cafe/post/450</guid><dc:creator><![CDATA[CiotBSD]]></dc:creator><pubDate>Wed, 13 May 2026 08:16:02 GMT</pubDate></item></channel></rss>