User Details
- User Since
- Sep 28 2014, 7:22 PM (607 w, 3 d)
Sat, May 16
Tue, May 12
Sat, May 9
Thu, May 7
Tue, May 5
Fri, May 1
Thu, Apr 30
Wed, Apr 29
Tue, Apr 28
Sun, Apr 26
Sat, Apr 25
Thu, Apr 23
I suppose we could spell the example rules like this too:
block out quick on $wan from any to { 255.255.255.255, ($wan:broadcast), 224.0.0.0/4, ff00::/8 } received-on any
but they're fine as they are. They result in the same rules in the kernel anyway.
Wed, Apr 22
There are good arguments for both blocking and allowing this I believe.
I'm not entirely sure where I fall. On the one hand, yes, users should be allowed to shoot themselves in the foot if they really want to, but on the other hand, it's non-obvious that this will happen. There are going to be a lot more users in the "I didn't want this to happen but it did" camp than there'd be in the "I want to do this dumb thing and pf won't let me." camp.
The pf change looks fine to me.
Tue, Apr 21
Apr 20 2026
If we tweak it slightly I guess we can express everything we need.
So here's a version where we deny the call from the indicated securelevel on up,
and don't do anything if the value is 0
Apr 19 2026
I did see a warning about that recently but didn't investigate too much. This (with Gleb's remark) makes sense.
Apr 17 2026
Apr 16 2026
Apr 15 2026
Thanks, I don't know how I messed that up, but mess that up I did.
Apr 14 2026
Apr 11 2026
Apr 9 2026
I'm not familiar enough with the build system to have opinions on how it got fixed.
Apr 7 2026
Apr 3 2026
Mar 30 2026
Ah, yes, thanks!
I'm seeing panics with this patch ("panic: lock "pf_keyhash" 0xfffffe00e8dffff8 already initialized").
I believe the problem is that hashalloc() allocates unzero'd memory, and which leads to incorrect assertions on the lock, if LO_INITIALIZED happens to be set in lo_flags.
Mar 27 2026
I've had a quick look at making pf use this, and I have a minor annoyance.
Mar 26 2026
Mar 25 2026
Mar 24 2026
Mar 22 2026
Mar 18 2026
Mar 16 2026
Mar 15 2026
Mar 12 2026
Mar 4 2026
Feb 27 2026
I haven't debugged it any depth (and won't be able to before early next week), but the new test case fails for me:
One small issue is that this patch claims to move these files. That's clearly unintentional. Perhaps an artefact of how it was uploaded?
Feb 25 2026
This is already in the tree, as cd0169c9379c400ec75b77e87ca770e37f964276. I managed to forget to add the 'differential revision' tag, so Phabricator didn't notice.
Feb 19 2026
(Not tested, but that just seems sensible.)
