-
Notifications
You must be signed in to change notification settings - Fork 752
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Firewall / Rules - drop policy based routing validation on interface …
…rules as discussed in #5329 (comment)
- Loading branch information
1 parent
c28567e
commit b567ddb
Showing
1 changed file
with
0 additions
and
7 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
b567ddb
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Does this commit now also allows failover for outgoing squid connections?
b567ddb
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It should work on 22.1 betas if it was fixed correctly there (there was a change for it but I’m not convinced yet).
b567ddb
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@mimugmail I guess that depends, you should be able to direct packets on their way out, but this was already possible with floating rules. The difference is that we had a validation on "interface" rules to prevent outgoing gateways being selected unintended. As far as I know the issue is mainly in the "matching" part, when a service binds to a specific (loopback) interface, you should be able to force its destination (already, as this is the same pattern local services use to stick to an interface and ignore destination routing). Sometimes this is a bit mind boggling I guess.
b567ddb
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@AdSchellevis I think the question was about opnsense/src@e650ef36ba9ef originating from https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=257106
b567ddb
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@fichtner might be, but we're not shipping the cause of the bug report if I'm not mistaken freebsd/freebsd-src@41063b4, the
route-to
on outgoing traffic when bound to the interface should work (as does does the ticket about Wireguard+Unbound seem to suggest), I'm just not sure you can always easily bind traffic to the interface on every service (like squid). Long story short, the latests FreeBSD version might have changed behaviour, but to me it's unclear if it's different than what it was in FreeBSD 12.1 and earlier.