[nycbug-talk] PFSense Talk Followup, Fwd: igb(4) quad port patch for 7.x
Chris Buechler
nycbug at chrisbuechler.com
Thu Mar 4 19:57:09 EST 2010
On 3/4/2010 12:11 PM, Isaac Levy wrote:
>
> Thought I'd post this here for the record, since a number of people asked if I could send them the fix...
>
> My plan is to:
>
> 1) immeadiately foreword this on to the folks who now manage those boxes
>
> 2) see if I cant' get this pushed back over to the PFSense folks, in an attempt to propogate the patch using the FreeBSD 7.x base,
>
The next release, 2.0, is being built off RELENG_8 (what will be 8.1),
which should have that already. Not likely to be another release on
RELENG_7*.
Nicely done presentation Ike, thanks for promoting the project!
Some comments after listening to the talk (I missed some things,
listening to it in the background while working on other things, feel
free to follow up with questions):
1) IPv6 - that's likely to be the first thing that goes in after the 2.0
release. Just hasn't been a priority compared to many other things
because it's not available outside of tunneling for 99.99% of our user
base. That's starting to change though.
2) plain text passwords in config - that's from m0n0wall and we've kept
the same, anything that must be used in plain text (mpd (PPTP, PPPoE),
dynamic DNS) is stored in plain text. Those cannot be hashed. Explained
further here: http://doc.m0n0.ch/handbook/faq-plaintextpass.html It's
impossible to securely store those, so rather than obscure things in an
easily reversible format, we keep it blatantly obvious that the config
file has sensitive data and needs to be appropriately secured.
3) States on failover - states are (almost) fully preserved during
failover, that's the entire purpose of pfsync. There will be some loss
of states inevitably but you'll get the vast majority of them. The
primary is always syncing to the secondary, and vice versa. And when
your primary comes back up after rebooting or replacing hardware or
whatever, it gets a full state table sync from the secondary.
4) NAT reflection - in general, NAT reflection is supported, it's ugly
as it's just a bunch of netcat instances that forward traffic back in
(as the source must also be rewritten, and it gets looped through the
firewall). The better option is split DNS, but reflection does work fine
(it's disabled by default). The exclusion, which is the context it was
talked about in, is with server load balancing. There are options there,
depending on exactly how the setup works, but they usually involve
creating a separate load balancing pool listening on an internal IP and
using split DNS.
5) haproxy - noted this was mentioned, there's a relatively new package
for haproxy, a much more capable load balancer than the basic slbd
that's built in. It is relatively new but it's being used in production
and seems to be working fine. It's the best haproxy GUI out there from
what I've seen (tried looking at a number of others to get ideas as we
were designing things, ended up with something unlike what anyone else
has as no one else has done even a remotely good job of putting together
a full GUI for it). If you're going to try it, I'd recommend
haproxy-dev, as it's soon to be moved over to haproxy.
That's what I caught at least. If there were any questions that went
unanswered, feel free to ask.
I'll be at NYCBSDCon this year, look forward to seeing a number of you
whom I've met in the past at BSDCan, and meeting others.
We're also having a training tutorial at BSDCan this year for those of
you who can make it up there.
cheers,
Chris
More information about the talk
mailing list