2005-05-03 16:55:20 +00:00
|
|
|
.\" $OpenBSD: pfsync.4,v 1.22 2005/02/24 15:53:17 jmc Exp $
|
2004-02-28 16:52:45 +00:00
|
|
|
.\"
|
|
|
|
.\" Copyright (c) 2002 Michael Shalayeff
|
2005-05-03 16:55:20 +00:00
|
|
|
.\" Copyright (c) 2003-2004 Ryan McBride
|
2004-02-28 16:52:45 +00:00
|
|
|
.\" All rights reserved.
|
|
|
|
.\"
|
|
|
|
.\" Redistribution and use in source and binary forms, with or without
|
|
|
|
.\" modification, are permitted provided that the following conditions
|
|
|
|
.\" are met:
|
|
|
|
.\" 1. Redistributions of source code must retain the above copyright
|
|
|
|
.\" notice, this list of conditions and the following disclaimer.
|
|
|
|
.\" 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
.\" notice, this list of conditions and the following disclaimer in the
|
|
|
|
.\" documentation and/or other materials provided with the distribution.
|
|
|
|
.\"
|
|
|
|
.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
|
|
|
|
.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
|
|
|
.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
|
|
.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
|
|
.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
|
|
.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF MIND,
|
|
|
|
.\" USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
|
|
.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
|
|
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
|
|
|
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
.\"
|
2004-04-18 13:59:12 +00:00
|
|
|
.\" $FreeBSD$
|
|
|
|
.\"
|
2006-06-06 12:35:53 +00:00
|
|
|
.Dd June 6, 2006
|
2004-02-28 16:52:45 +00:00
|
|
|
.Dt PFSYNC 4
|
|
|
|
.Os
|
|
|
|
.Sh NAME
|
|
|
|
.Nm pfsync
|
2005-05-03 16:55:20 +00:00
|
|
|
.Nd packet filter state table logging interface
|
2004-02-28 16:52:45 +00:00
|
|
|
.Sh SYNOPSIS
|
2004-06-16 23:39:33 +00:00
|
|
|
.Cd "device pfsync"
|
2004-02-28 16:52:45 +00:00
|
|
|
.Sh DESCRIPTION
|
|
|
|
The
|
2004-06-16 23:39:33 +00:00
|
|
|
.Nm
|
|
|
|
interface is a pseudo-device which exposes certain changes to the state
|
|
|
|
table used by
|
|
|
|
.Xr pf 4 .
|
2005-02-23 17:37:39 +00:00
|
|
|
.\" XXX: not yet!
|
|
|
|
.\" State changes can be viewed by invoking
|
2005-08-06 13:03:03 +00:00
|
|
|
.\" .Xr tcpdump 1
|
2005-02-23 17:37:39 +00:00
|
|
|
.\" on the
|
|
|
|
.\" .Nm
|
|
|
|
.\" interface.
|
2004-06-16 23:39:33 +00:00
|
|
|
If configured with a physical synchronisation interface,
|
|
|
|
.Nm
|
2005-02-23 17:37:39 +00:00
|
|
|
will send state changes out on that interface using IP multicast,
|
2004-06-16 23:39:33 +00:00
|
|
|
and insert state changes received on that interface from other systems
|
|
|
|
into the state table.
|
|
|
|
.Pp
|
|
|
|
By default, all local changes to the state table are exposed via
|
|
|
|
.Nm .
|
|
|
|
However, state changes from packets received by
|
|
|
|
.Nm
|
|
|
|
over the network are not rebroadcast.
|
|
|
|
States created by a rule marked with the
|
|
|
|
.Ar no-sync
|
|
|
|
keyword are omitted from the
|
|
|
|
.Nm
|
|
|
|
interface (see
|
|
|
|
.Xr pf.conf 5
|
|
|
|
for details).
|
|
|
|
.Pp
|
|
|
|
The
|
|
|
|
.Nm
|
|
|
|
interface will attempt to collapse multiple updates of the same
|
|
|
|
state into one message where possible.
|
|
|
|
The maximum number of times this can be done before the update is sent out
|
|
|
|
is controlled by the
|
|
|
|
.Ar maxupd
|
2005-05-03 16:55:20 +00:00
|
|
|
parameter to ifconfig
|
2004-06-16 23:39:33 +00:00
|
|
|
(see
|
|
|
|
.Xr ifconfig 8
|
2005-05-03 16:55:20 +00:00
|
|
|
and the example below for more details).
|
2004-02-28 16:52:45 +00:00
|
|
|
.Pp
|
|
|
|
Each packet retrieved on this interface has a header associated
|
|
|
|
with it of length
|
|
|
|
.Dv PFSYNC_HDRLEN .
|
|
|
|
The header indicates the version of the protocol, address family,
|
2005-05-03 16:55:20 +00:00
|
|
|
action taken on the following states, and the number of state
|
2004-02-28 16:52:45 +00:00
|
|
|
table entries attached in this packet.
|
2005-05-03 16:55:20 +00:00
|
|
|
This structure is defined in
|
2004-02-28 16:52:45 +00:00
|
|
|
.Aq Pa net/if_pfsync.h
|
2005-05-03 16:55:20 +00:00
|
|
|
as:
|
2004-02-28 16:52:45 +00:00
|
|
|
.Bd -literal -offset indent
|
|
|
|
struct pfsync_header {
|
|
|
|
u_int8_t version;
|
|
|
|
u_int8_t af;
|
|
|
|
u_int8_t action;
|
|
|
|
u_int8_t count;
|
|
|
|
};
|
|
|
|
.Ed
|
2004-06-16 23:39:33 +00:00
|
|
|
.Sh NETWORK SYNCHRONISATION
|
|
|
|
States can be synchronised between two or more firewalls using this
|
|
|
|
interface, by specifying a synchronisation interface using
|
|
|
|
.Xr ifconfig 8 .
|
|
|
|
For example, the following command sets fxp0 as the synchronisation
|
2005-05-03 16:55:20 +00:00
|
|
|
interface:
|
2004-06-16 23:39:33 +00:00
|
|
|
.Bd -literal -offset indent
|
2005-05-03 16:55:20 +00:00
|
|
|
# ifconfig pfsync0 syncdev fxp0
|
2004-06-16 23:39:33 +00:00
|
|
|
.Ed
|
|
|
|
.Pp
|
2006-06-06 12:35:53 +00:00
|
|
|
It is important that the underlying synchronisation interface is up
|
|
|
|
and has an IP address assigned.
|
|
|
|
.Pp
|
2005-05-03 16:55:20 +00:00
|
|
|
By default, state change messages are sent out on the synchronisation
|
2004-06-16 23:39:33 +00:00
|
|
|
interface using IP multicast packets.
|
|
|
|
The protocol is IP protocol 240, PFSYNC, and the multicast group
|
|
|
|
used is 224.0.0.240.
|
2005-05-03 16:55:20 +00:00
|
|
|
When a peer address is specified using the
|
|
|
|
.Ic syncpeer
|
|
|
|
keyword, the peer address is used as a destination for the pfsync traffic,
|
|
|
|
and the traffic can then be protected using
|
|
|
|
.Xr ipsec 4 .
|
|
|
|
In such a configuration, the syncdev should be set to the
|
|
|
|
.Xr enc 4
|
|
|
|
interface, as this is where the traffic arrives when it is decapsulated,
|
|
|
|
e.g.:
|
|
|
|
.Bd -literal -offset indent
|
|
|
|
# ifconfig pfsync0 syncpeer 10.0.0.2 syncdev enc0
|
|
|
|
.Ed
|
2004-06-16 23:39:33 +00:00
|
|
|
.Pp
|
2005-05-03 16:55:20 +00:00
|
|
|
It is important that the pfsync traffic be well secured
|
|
|
|
as there is no authentication on the protocol and it would
|
2004-06-16 23:39:33 +00:00
|
|
|
be trivial to spoof packets which create states, bypassing the pf ruleset.
|
2005-05-03 16:55:20 +00:00
|
|
|
Either run the pfsync protocol on a trusted network \- ideally a network
|
|
|
|
dedicated to pfsync messages such as a crossover cable between two firewalls,
|
|
|
|
or specify a peer address and protect the traffic with
|
|
|
|
.Xr ipsec 4 .
|
2004-06-16 23:39:33 +00:00
|
|
|
.Pp
|
2005-10-02 18:59:02 +00:00
|
|
|
For
|
|
|
|
.Nm
|
|
|
|
to start its operation automatically at the system boot time,
|
|
|
|
.Va pfsync_enable
|
|
|
|
and
|
|
|
|
.Va pfsync_syncdev
|
|
|
|
variables should be used in
|
|
|
|
.Xr rc.conf 5 .
|
|
|
|
It is not advisable to set up
|
|
|
|
.Nm
|
|
|
|
with common network interface configuration variables of
|
|
|
|
.Xr rc.conf 5
|
|
|
|
because
|
|
|
|
.Nm
|
|
|
|
must start after its
|
|
|
|
.Cm syncdev ,
|
|
|
|
which cannot be always ensured in the latter case.
|
2005-02-23 17:37:39 +00:00
|
|
|
.\" XXX: not yet!
|
2005-10-02 18:59:02 +00:00
|
|
|
.\" .Pp
|
2005-02-23 17:37:39 +00:00
|
|
|
.\" There is a one-to-one correspondence between packets seen by
|
|
|
|
.\" .Xr bpf 4
|
|
|
|
.\" on the
|
|
|
|
.\" .Nm
|
|
|
|
.\" interface, and packets sent out on the synchronisation interface, i.e.\&
|
|
|
|
.\" a packet with 4 state deletion messages on
|
|
|
|
.\" .Nm
|
|
|
|
.\" means that the same 4 deletions were sent out on the synchronisation
|
|
|
|
.\" interface.
|
|
|
|
.\" However, the actual packet contents may differ as the messages
|
|
|
|
.\" sent over the network are "compressed" where possible, containing
|
|
|
|
.\" only the necessary information.
|
2004-02-28 16:52:45 +00:00
|
|
|
.Sh EXAMPLES
|
2004-06-16 23:39:33 +00:00
|
|
|
.Nm
|
|
|
|
and
|
|
|
|
.Xr carp 4
|
|
|
|
can be used together to provide automatic failover of a pair of firewalls
|
|
|
|
configured in parallel.
|
|
|
|
One firewall handles all traffic \- if it dies or
|
|
|
|
is shut down, the second firewall takes over automatically.
|
|
|
|
.Pp
|
|
|
|
Both firewalls in this example have three
|
|
|
|
.Xr sis 4
|
|
|
|
interfaces.
|
2005-05-03 16:55:20 +00:00
|
|
|
sis0 is the external interface, on the 10.0.0.0/24 subnet; sis1 is the
|
|
|
|
internal interface, on the 192.168.0.0/24 subnet; and sis2 is the
|
2004-06-16 23:39:33 +00:00
|
|
|
.Nm
|
|
|
|
interface, using the 192.168.254.0/24 subnet.
|
|
|
|
A crossover cable connects the two firewalls via their sis2 interfaces.
|
|
|
|
On all three interfaces, firewall A uses the .254 address, while firewall B
|
|
|
|
uses .253.
|
|
|
|
The interfaces are configured as follows (firewall A unless otherwise
|
|
|
|
indicated):
|
|
|
|
.Pp
|
2005-02-23 17:37:39 +00:00
|
|
|
Interfaces configuration in
|
|
|
|
.Pa /etc/rc.conf :
|
2004-06-16 23:39:33 +00:00
|
|
|
.Bd -literal -offset indent
|
2005-10-02 18:59:02 +00:00
|
|
|
network_interfaces="lo0 sis0 sis1 sis2"
|
2005-02-23 17:37:39 +00:00
|
|
|
cloned_interfaces="carp0 carp1"
|
|
|
|
ifconfig_sis0="10.0.0.254/24"
|
|
|
|
ifconfig_sis1="192.168.0.254/24"
|
|
|
|
ifconfig_sis2="192.168.254.254/24"
|
|
|
|
ifconfig_carp0="vhid 1 pass foo 10.0.0.1/24"
|
|
|
|
ifconfig_carp1="vhid 2 pass bar 192.168.0.1/24"
|
2005-10-02 18:59:02 +00:00
|
|
|
pfsync_enable="YES"
|
|
|
|
pfsync_syncdev="sis2"
|
2004-06-16 23:39:33 +00:00
|
|
|
.Ed
|
|
|
|
.Pp
|
|
|
|
.Xr pf 4
|
|
|
|
must also be configured to allow
|
|
|
|
.Nm
|
|
|
|
and
|
|
|
|
.Xr carp 4
|
|
|
|
traffic through.
|
|
|
|
The following should be added to the top of
|
|
|
|
.Pa /etc/pf.conf :
|
|
|
|
.Bd -literal -offset indent
|
|
|
|
pass quick on { sis2 } proto pfsync
|
2006-06-06 12:35:53 +00:00
|
|
|
pass quick on { sis0 sis1 } proto carp keep state
|
2004-06-16 23:39:33 +00:00
|
|
|
.Ed
|
|
|
|
.Pp
|
|
|
|
If it is preferable that one firewall handle the traffic,
|
|
|
|
the
|
|
|
|
.Ar advskew
|
|
|
|
on the backup firewall's
|
|
|
|
.Xr carp 4
|
|
|
|
interfaces should be set to something higher than
|
|
|
|
the primary's.
|
|
|
|
For example, if firewall B is the backup, its
|
2005-02-23 17:37:39 +00:00
|
|
|
carp1 configuration would look like this:
|
2004-06-16 23:39:33 +00:00
|
|
|
.Bd -literal -offset indent
|
2005-02-23 17:37:39 +00:00
|
|
|
ifconfig_carp1="vhid 2 pass bar advskew 100 192.168.0.1/24"
|
2004-06-16 23:39:33 +00:00
|
|
|
.Ed
|
|
|
|
.Pp
|
|
|
|
The following must also be added to
|
|
|
|
.Pa /etc/sysctl.conf :
|
2004-02-28 16:52:45 +00:00
|
|
|
.Bd -literal -offset indent
|
2004-06-16 23:39:33 +00:00
|
|
|
net.inet.carp.preempt=1
|
2004-02-28 16:52:45 +00:00
|
|
|
.Ed
|
2005-02-23 17:37:39 +00:00
|
|
|
.Sh BUGS
|
|
|
|
Possibility to view state changes using
|
2005-07-14 20:29:08 +00:00
|
|
|
.Xr tcpdump 1
|
2005-02-23 17:37:39 +00:00
|
|
|
has not been ported from
|
|
|
|
.Ox
|
|
|
|
yet.
|
2004-02-28 16:52:45 +00:00
|
|
|
.Sh SEE ALSO
|
2005-05-03 16:55:20 +00:00
|
|
|
.Xr bpf 4 ,
|
2005-02-23 17:37:39 +00:00
|
|
|
.Xr carp 4 ,
|
|
|
|
.Xr ifconfig 8 ,
|
2004-02-28 16:52:45 +00:00
|
|
|
.Xr inet 4 ,
|
|
|
|
.Xr inet6 4 ,
|
2005-05-03 16:55:20 +00:00
|
|
|
.Xr ipsec 4 ,
|
2004-02-28 16:52:45 +00:00
|
|
|
.Xr netintro 4 ,
|
|
|
|
.Xr pf 4 ,
|
2004-06-16 23:39:33 +00:00
|
|
|
.Xr pf.conf 5 ,
|
|
|
|
.Xr protocols 5 ,
|
2005-02-23 17:37:39 +00:00
|
|
|
.Xr rc.conf 5
|
2004-02-28 16:52:45 +00:00
|
|
|
.Sh HISTORY
|
|
|
|
The
|
|
|
|
.Nm
|
|
|
|
device first appeared in
|
|
|
|
.Ox 3.3 .
|
2005-02-23 17:37:39 +00:00
|
|
|
The
|
|
|
|
.Nm
|
|
|
|
device was imported to
|
|
|
|
.Fx 5.3 .
|