2011-06-28 11:57:25 +00:00
|
|
|
.\" $OpenBSD: pfsync.4,v 1.28 2009/02/17 10:05:18 dlg Exp $
|
2004-02-28 16:52:45 +00:00
|
|
|
.\"
|
|
|
|
.\" Copyright (c) 2002 Michael Shalayeff
|
2005-05-03 16:55:20 +00:00
|
|
|
.\" Copyright (c) 2003-2004 Ryan McBride
|
2004-02-28 16:52:45 +00:00
|
|
|
.\" All rights reserved.
|
|
|
|
.\"
|
|
|
|
.\" Redistribution and use in source and binary forms, with or without
|
|
|
|
.\" modification, are permitted provided that the following conditions
|
|
|
|
.\" are met:
|
|
|
|
.\" 1. Redistributions of source code must retain the above copyright
|
|
|
|
.\" notice, this list of conditions and the following disclaimer.
|
|
|
|
.\" 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
.\" notice, this list of conditions and the following disclaimer in the
|
|
|
|
.\" documentation and/or other materials provided with the distribution.
|
|
|
|
.\"
|
|
|
|
.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
|
|
|
|
.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
|
|
|
.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
|
|
.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
|
|
.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
|
|
.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF MIND,
|
|
|
|
.\" USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
|
|
.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
|
|
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
|
|
|
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
.\"
|
2004-04-18 13:59:12 +00:00
|
|
|
.\" $FreeBSD$
|
|
|
|
.\"
|
2014-12-21 09:53:29 +00:00
|
|
|
.Dd December 20, 2011
|
2004-02-28 16:52:45 +00:00
|
|
|
.Dt PFSYNC 4
|
|
|
|
.Os
|
|
|
|
.Sh NAME
|
|
|
|
.Nm pfsync
|
2009-08-18 16:13:59 +00:00
|
|
|
.Nd packet filter state table sychronisation interface
|
2004-02-28 16:52:45 +00:00
|
|
|
.Sh SYNOPSIS
|
2004-06-16 23:39:33 +00:00
|
|
|
.Cd "device pfsync"
|
2004-02-28 16:52:45 +00:00
|
|
|
.Sh DESCRIPTION
|
|
|
|
The
|
2004-06-16 23:39:33 +00:00
|
|
|
.Nm
|
|
|
|
interface is a pseudo-device which exposes certain changes to the state
|
|
|
|
table used by
|
|
|
|
.Xr pf 4 .
|
2004-06-16 23:26:00 +00:00
|
|
|
State changes can be viewed by invoking
|
2011-06-28 11:57:25 +00:00
|
|
|
.Xr tcpdump 1
|
2004-02-28 16:52:45 +00:00
|
|
|
on the
|
|
|
|
.Nm
|
|
|
|
interface.
|
2004-06-16 23:39:33 +00:00
|
|
|
If configured with a physical synchronisation interface,
|
|
|
|
.Nm
|
2009-08-18 16:13:59 +00:00
|
|
|
will also send state changes out on that interface,
|
2004-06-16 23:39:33 +00:00
|
|
|
and insert state changes received on that interface from other systems
|
|
|
|
into the state table.
|
|
|
|
.Pp
|
|
|
|
By default, all local changes to the state table are exposed via
|
|
|
|
.Nm .
|
2009-08-18 16:13:59 +00:00
|
|
|
State changes from packets received by
|
2004-06-16 23:39:33 +00:00
|
|
|
.Nm
|
|
|
|
over the network are not rebroadcast.
|
2009-08-18 16:13:59 +00:00
|
|
|
Updates to states created by a rule marked with the
|
2004-06-16 23:39:33 +00:00
|
|
|
.Ar no-sync
|
2009-08-18 16:13:59 +00:00
|
|
|
keyword are ignored by the
|
2004-06-16 23:39:33 +00:00
|
|
|
.Nm
|
|
|
|
interface (see
|
|
|
|
.Xr pf.conf 5
|
|
|
|
for details).
|
|
|
|
.Pp
|
|
|
|
The
|
|
|
|
.Nm
|
2009-08-18 16:13:59 +00:00
|
|
|
interface will attempt to collapse multiple state updates into a single
|
|
|
|
packet where possible.
|
|
|
|
The maximum number of times a single state can be updated before a
|
|
|
|
.Nm
|
|
|
|
packet will be sent out is controlled by the
|
2004-06-16 23:39:33 +00:00
|
|
|
.Ar maxupd
|
2005-05-03 16:55:20 +00:00
|
|
|
parameter to ifconfig
|
2004-06-16 23:39:33 +00:00
|
|
|
(see
|
|
|
|
.Xr ifconfig 8
|
2005-05-03 16:55:20 +00:00
|
|
|
and the example below for more details).
|
2009-08-18 16:13:59 +00:00
|
|
|
The sending out of a
|
|
|
|
.Nm
|
|
|
|
packet will be delayed by a maximum of one second.
|
2004-06-16 23:39:33 +00:00
|
|
|
.Sh NETWORK SYNCHRONISATION
|
|
|
|
States can be synchronised between two or more firewalls using this
|
|
|
|
interface, by specifying a synchronisation interface using
|
|
|
|
.Xr ifconfig 8 .
|
|
|
|
For example, the following command sets fxp0 as the synchronisation
|
2005-05-03 16:55:20 +00:00
|
|
|
interface:
|
2004-06-16 23:39:33 +00:00
|
|
|
.Bd -literal -offset indent
|
2005-05-03 16:55:20 +00:00
|
|
|
# ifconfig pfsync0 syncdev fxp0
|
2004-06-16 23:39:33 +00:00
|
|
|
.Ed
|
|
|
|
.Pp
|
2005-05-03 16:55:20 +00:00
|
|
|
By default, state change messages are sent out on the synchronisation
|
2009-08-18 16:13:59 +00:00
|
|
|
interface using IP multicast packets to the 244.0.0.240 group address.
|
|
|
|
An alternative destination address for
|
|
|
|
.Nm
|
|
|
|
packets can be specified using the
|
2005-05-03 16:55:20 +00:00
|
|
|
.Ic syncpeer
|
2009-08-18 16:13:59 +00:00
|
|
|
keyword.
|
|
|
|
This can be used in combination with
|
|
|
|
.Xr ipsec 4
|
|
|
|
to protect the synchronisation traffic.
|
2005-05-03 16:55:20 +00:00
|
|
|
In such a configuration, the syncdev should be set to the
|
|
|
|
.Xr enc 4
|
|
|
|
interface, as this is where the traffic arrives when it is decapsulated,
|
|
|
|
e.g.:
|
|
|
|
.Bd -literal -offset indent
|
|
|
|
# ifconfig pfsync0 syncpeer 10.0.0.2 syncdev enc0
|
|
|
|
.Ed
|
2004-06-16 23:39:33 +00:00
|
|
|
.Pp
|
2005-05-03 16:55:20 +00:00
|
|
|
It is important that the pfsync traffic be well secured
|
|
|
|
as there is no authentication on the protocol and it would
|
2004-06-16 23:39:33 +00:00
|
|
|
be trivial to spoof packets which create states, bypassing the pf ruleset.
|
2008-12-10 21:08:42 +00:00
|
|
|
Either run the pfsync protocol on a trusted network \- ideally a network
|
2005-05-03 16:55:20 +00:00
|
|
|
dedicated to pfsync messages such as a crossover cable between two firewalls,
|
|
|
|
or specify a peer address and protect the traffic with
|
|
|
|
.Xr ipsec 4 .
|
Restore a feature that was present in 5.x and 6.x, and was cleared in
7.x, 8.x and 9.x with pf(4) imports: pfsync(4) should suppress CARP
preemption, while it is running its bulk update.
However, reimplement the feature in more elegant manner, that is
partially inspired by newer OpenBSD:
- Rename term "suppression" to "demotion", to match with OpenBSD.
- Keep a global demotion factor, that can be raised by several
conditions, for now these are:
- interface goes down
- carp(4) has problems with ip_output() or ip6_output()
- pfsync performs bulk update
- Unlike in OpenBSD the demotion factor isn't a counter, but
is actual value added to advskew. The adjustment values for
particular error conditions are also configurable, and their
defaults are maximum advskew value, so a single failure bumps
demotion to maximum. This is for POLA compatibility, and should
satisfy most users.
- Demotion factor is a writable sysctl, so user can do
foot shooting, if he desires to.
2011-12-20 13:53:31 +00:00
|
|
|
.Pp
|
|
|
|
.Nm
|
|
|
|
has the following
|
|
|
|
.Xr sysctl 8
|
|
|
|
tunables:
|
|
|
|
.Bl -tag -width ".Va net.pfsync"
|
|
|
|
.It Va net.pfsync.carp_demotion_factor
|
|
|
|
Value added to
|
|
|
|
.Va net.inet.carp.demotion
|
|
|
|
while
|
|
|
|
.Nm
|
|
|
|
tries to perform its bulk update.
|
|
|
|
See
|
|
|
|
.Xr carp 4
|
|
|
|
for more information.
|
|
|
|
Default value is 240.
|
|
|
|
.El
|
2004-02-28 16:52:45 +00:00
|
|
|
.Sh EXAMPLES
|
2004-06-16 23:39:33 +00:00
|
|
|
.Nm
|
|
|
|
and
|
|
|
|
.Xr carp 4
|
|
|
|
can be used together to provide automatic failover of a pair of firewalls
|
|
|
|
configured in parallel.
|
2009-08-18 16:13:59 +00:00
|
|
|
One firewall will handle all traffic until it dies, is shut down, or is
|
|
|
|
manually demoted, at which point the second firewall will take over
|
|
|
|
automatically.
|
2004-06-16 23:39:33 +00:00
|
|
|
.Pp
|
|
|
|
Both firewalls in this example have three
|
|
|
|
.Xr sis 4
|
|
|
|
interfaces.
|
2005-05-03 16:55:20 +00:00
|
|
|
sis0 is the external interface, on the 10.0.0.0/24 subnet; sis1 is the
|
|
|
|
internal interface, on the 192.168.0.0/24 subnet; and sis2 is the
|
2004-06-16 23:39:33 +00:00
|
|
|
.Nm
|
|
|
|
interface, using the 192.168.254.0/24 subnet.
|
|
|
|
A crossover cable connects the two firewalls via their sis2 interfaces.
|
|
|
|
On all three interfaces, firewall A uses the .254 address, while firewall B
|
|
|
|
uses .253.
|
|
|
|
The interfaces are configured as follows (firewall A unless otherwise
|
|
|
|
indicated):
|
|
|
|
.Pp
|
2005-02-23 17:37:39 +00:00
|
|
|
Interfaces configuration in
|
|
|
|
.Pa /etc/rc.conf :
|
2004-06-16 23:39:33 +00:00
|
|
|
.Bd -literal -offset indent
|
2005-10-02 18:59:02 +00:00
|
|
|
network_interfaces="lo0 sis0 sis1 sis2"
|
2005-02-23 17:37:39 +00:00
|
|
|
ifconfig_sis0="10.0.0.254/24"
|
2011-12-20 13:32:56 +00:00
|
|
|
ifconfig_sis0_alias0="inet 10.0.0.1/24 vhid 1 pass foo"
|
2005-02-23 17:37:39 +00:00
|
|
|
ifconfig_sis1="192.168.0.254/24"
|
2011-12-20 13:32:56 +00:00
|
|
|
ifconfig_sis1_alias0="inet 192.168.0.1/24 vhid 2 pass bar"
|
2005-02-23 17:37:39 +00:00
|
|
|
ifconfig_sis2="192.168.254.254/24"
|
2005-10-02 18:59:02 +00:00
|
|
|
pfsync_enable="YES"
|
|
|
|
pfsync_syncdev="sis2"
|
2004-06-16 23:39:33 +00:00
|
|
|
.Ed
|
|
|
|
.Pp
|
|
|
|
.Xr pf 4
|
|
|
|
must also be configured to allow
|
|
|
|
.Nm
|
|
|
|
and
|
|
|
|
.Xr carp 4
|
|
|
|
traffic through.
|
|
|
|
The following should be added to the top of
|
|
|
|
.Pa /etc/pf.conf :
|
|
|
|
.Bd -literal -offset indent
|
2008-12-10 20:59:26 +00:00
|
|
|
pass quick on { sis2 } proto pfsync keep state (no-sync)
|
|
|
|
pass on { sis0 sis1 } proto carp keep state (no-sync)
|
2004-06-16 23:39:33 +00:00
|
|
|
.Ed
|
|
|
|
.Pp
|
2009-08-18 16:13:59 +00:00
|
|
|
It is preferable that one firewall handle the forwarding of all the traffic,
|
|
|
|
therefore the
|
2004-06-16 23:39:33 +00:00
|
|
|
.Ar advskew
|
|
|
|
on the backup firewall's
|
|
|
|
.Xr carp 4
|
2011-12-20 13:32:56 +00:00
|
|
|
vhids should be set to something higher than
|
2004-06-16 23:39:33 +00:00
|
|
|
the primary's.
|
|
|
|
For example, if firewall B is the backup, its
|
2005-02-23 17:37:39 +00:00
|
|
|
carp1 configuration would look like this:
|
2004-06-16 23:26:00 +00:00
|
|
|
would look like this:
|
2004-06-16 23:39:33 +00:00
|
|
|
.Bd -literal -offset indent
|
2011-12-20 13:32:56 +00:00
|
|
|
ifconfig_sis1_alias0="inet 192.168.0.1/24 vhid 2 pass bar advskew 100"
|
2004-06-16 23:39:33 +00:00
|
|
|
.Ed
|
|
|
|
.Pp
|
|
|
|
The following must also be added to
|
|
|
|
.Pa /etc/sysctl.conf :
|
2004-02-28 16:52:45 +00:00
|
|
|
.Bd -literal -offset indent
|
2004-06-16 23:39:33 +00:00
|
|
|
net.inet.carp.preempt=1
|
2004-02-28 16:52:45 +00:00
|
|
|
.Ed
|
|
|
|
.Sh SEE ALSO
|
2014-12-26 22:30:18 +00:00
|
|
|
.Xr tcpdump 1 ,
|
2005-05-03 16:55:20 +00:00
|
|
|
.Xr bpf 4 ,
|
2005-02-23 17:37:39 +00:00
|
|
|
.Xr carp 4 ,
|
2005-05-03 16:47:37 +00:00
|
|
|
.Xr enc 4 ,
|
2004-02-28 16:52:45 +00:00
|
|
|
.Xr inet 4 ,
|
|
|
|
.Xr inet6 4 ,
|
2005-05-03 16:55:20 +00:00
|
|
|
.Xr ipsec 4 ,
|
2004-02-28 16:52:45 +00:00
|
|
|
.Xr netintro 4 ,
|
|
|
|
.Xr pf 4 ,
|
2004-06-16 23:39:33 +00:00
|
|
|
.Xr pf.conf 5 ,
|
|
|
|
.Xr protocols 5 ,
|
2011-06-28 11:57:25 +00:00
|
|
|
.Xr rc.conf 5 ,
|
2014-12-26 22:30:18 +00:00
|
|
|
.Xr ifconfig 8
|
2004-02-28 16:52:45 +00:00
|
|
|
.Sh HISTORY
|
|
|
|
The
|
|
|
|
.Nm
|
|
|
|
device first appeared in
|
|
|
|
.Ox 3.3 .
|
2011-12-20 13:32:56 +00:00
|
|
|
It was first imported to
|
|
|
|
.Fx 5.3 .
|
2009-08-18 16:13:59 +00:00
|
|
|
.Pp
|
2005-02-23 17:37:39 +00:00
|
|
|
The
|
|
|
|
.Nm
|
2011-12-20 13:32:56 +00:00
|
|
|
protocol and kernel implementation were significantly modified in
|
|
|
|
.Fx 9.0 .
|
|
|
|
The newer protocol is not compatible with older one and will not interoperate
|
|
|
|
with it.
|