Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

BSD Cafe Billboard

  1. Home
  2. BSD
  3. OpenBSD
  4. [Undeadly] Automatic expiry at timeout for pf(4) overload tables

[Undeadly] Automatic expiry at timeout for pf(4) overload tables

Scheduled Pinned Locked Moved OpenBSD
openbsdpacketfiltertables
2 Posts 1 Posters 8 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • CiotBSDC Offline
    CiotBSDC Offline
    CiotBSD
    wrote last edited by CiotBSD
    #1

    Network-oriented readers will be familiar with the concept of overload tables, commonly used with state tracking options to create adaptive rulesets for such things as punishing password-guessing botnets.

    A downside to tables that would tend to fill up indefinitely is that at some point they will be quite full, and the administrator would need to either manually run pfctl expire or set up a crontab entry to weed out old entries at intervals.

    • https://undeadly.org/cgi?action=article;sid=20260513064948
    • https://marc.info/?l=openbsd-tech&m=177846164902091&w=2

    ping: https://framapiaf.org/@openbsdjournal@mastodon.social/116565993077076112


    Enjoy-ID!
    Enjoy-IT!

    1 Reply Last reply
    1
    • CiotBSDC Offline
      CiotBSDC Offline
      CiotBSD
      wrote last edited by CiotBSD
      #2

      That’s an interesting idea, though I’m not sure if it’s relevant.

      The question I’m asking myself is: why is it problematic to use the expire option, which is designed for this very purpose? because sysadmins forget to configure it, which causes the relevant tables to grow?!


      I think this is more relevant:

      The "feature request" wish I have is to be able to backup/restore tables
      preserving the counters and timestamp for each entry.

      Currently I do a "pfctl -T show" and save to file on server shutdown.
      Then I do a "pfctl -T add" from filename to reload table on boot.
      Obviously this resets all the timestamps to the current boot time.
      I know, don't reboot.

      seen on: - https://undeadly.org/cgi?action=article;sid=20260513064948

      This seems me a good idea: save with good informations when rebooting is needed, as instance a "new" rebuilded kernel


      Enjoy-ID!
      Enjoy-IT!

      1 Reply Last reply
      0

      Hello! It looks like you're interested in this conversation, but you don't have an account yet.

      Getting fed up of having to scroll through the same posts each visit? When you register for an account, you'll always come back to exactly where you were before, and choose to be notified of new replies (either via email, or push notification). You'll also be able to save bookmarks and upvote posts to show your appreciation to other community members.

      With your input, this post could be even better 💗

      Register Login
      Reply
      • Reply as topic
      Log in to reply
      • Oldest to Newest
      • Newest to Oldest
      • Most Votes


      • Login

      • Don't have an account? Register

      • Login or register to search.
      Powered by NodeBB Contributors
      • First post
        Last post
      0
      • Categories
      • Recent
      • Tags
      • Popular
      • World
      • Users
      • Groups