History log of /openbsd-src/usr.sbin/ftp-proxy/filter.c (Results 1 – 21 of 21)
Revision Date Author Comments
# 68928c43 21-Jan-2015 deraadt <deraadt@openbsd.org>

Include <netinet/in.h> before <net/pfvar.h>. In a future change when
ports is ready, <net/pfvar.h> will stop including a pile of balony.


# 08263cb1 18-Sep-2012 henning <henning@openbsd.org>

prio 0 is valid, therefore, I chose an "impossible" value for prio meaning
"not set" and used a PF_PRIO_NOTSET define for it. now that means that
everything that creates a struct pf_rule doesn't get

prio 0 is valid, therefore, I chose an "impossible" value for prio meaning
"not set" and used a PF_PRIO_NOTSET define for it. now that means that
everything that creates a struct pf_rule doesn't get away with bzero'ing it,
which turned out to be not so nice. so get rid of PF_PRIO_NOTSET, instead,
make a rule+state flag PFSTATE_SETPRIO which indicates wether the prio
should be set. ok benno claudio mikeb

show more ...


# a5bef057 07-Jul-2012 henning <henning@openbsd.org>

rename prio in struct pf_rule and related structs to set_prio so it is
utterly clear this is not a filter criteria but a packet modification thing.
also preparation for upcoming changes, including on

rename prio in struct pf_rule and related structs to set_prio so it is
utterly clear this is not a filter criteria but a packet modification thing.
also preparation for upcoming changes, including one to unscrew this mess
(I should not have to touch half the tree for this - ifixitlater)
not user visible, ok gcc

show more ...


# 6194c089 30-Apr-2012 haesbaert <haesbaert@openbsd.org>

Check for nat_range_high before creating the PF nat rule.

From Lawrence Teo.

ok camield, myself, mikeb.


# 05099a09 06-Mar-2012 mikeb <mikeb@openbsd.org>

catch up with "on rdomain" changes; ok claudio


# e3ab0f79 22-Jun-2011 sthen <sthen@openbsd.org>

fix whitespace


# 48ed0d11 28-Apr-2011 mikeb <mikeb@openbsd.org>

switch ftp-proxy over to divert-to instead of rdr-to. this avoids
an expensive state lookup (via natlook ioctl) and shrinks the code.
tested by me and sthen, ok reyk sthen


# 85ec68ab 25-Mar-2011 claudio <claudio@openbsd.org>

Use the rdomain information returned by DIOCNATLOOK to install the
nat-to and rdr-to rules with correct rtable rule attributes. This
allows to use ftp-proxy to proxy accross rdomains.
Tested and OK p

Use the rdomain information returned by DIOCNATLOOK to install the
nat-to and rdr-to rules with correct rtable rule attributes. This
allows to use ftp-proxy to proxy accross rdomains.
Tested and OK phessler@, OK henning@

show more ...


# 8ff17110 13-Jan-2010 claudio <claudio@openbsd.org>

pfr.rule.*.addr.type must be initialized to PF_ADDR_NONE for things that
are not used. bzero() of the rule structure is not enough.
Find with dlg@, OK mcbride@


# 36754172 12-Jan-2010 mcbride <mcbride@openbsd.org>

First pass at removing the 'pf_pool' mechanism for translation and routing
actions. Allow interfaces to be specified in special table entries for
the routing actions. Lists of addresses can now only

First pass at removing the 'pf_pool' mechanism for translation and routing
actions. Allow interfaces to be specified in special table entries for
the routing actions. Lists of addresses can now only be done using tables,
which pfctl will generate automatically from the existing syntax.

Functionally, this deprecates the use of multiple tables or dynamic
interfaces in a single nat or rdr rule.

ok henning dlg claudio

show more ...


# 4aba814d 22-Nov-2009 deraadt <deraadt@openbsd.org>

Move from the PF_RULESET_FILTER world order to PF_TRANS_RULESET
due to the standard henning+oga commit-and-run-for-beer problem.
ok claudio


# 14f90764 21-Nov-2009 claudio <claudio@openbsd.org>

If tagging is used use match rules instead of pass rules. This is needed
so that later pass rules will not overwrite the nat-to/rdr-to settings.
Because of this there must be an expilicit "pass .. ta

If tagging is used use match rules instead of pass rules. This is needed
so that later pass rules will not overwrite the nat-to/rdr-to settings.
Because of this there must be an expilicit "pass .. tagged proxytag .."
rule after the ftp-proxy anchor. OK henning@

show more ...


# bb9fd9ec 01-Sep-2009 claudio <claudio@openbsd.org>

Bring ftp-proxy in sync with the massive pf change just commited by Henning.
This changes the way the rdr/nat rules are added to pf. Now only a single
anchor is needed (the other ones do no longer ex

Bring ftp-proxy in sync with the massive pf change just commited by Henning.
This changes the way the rdr/nat rules are added to pf. Now only a single
anchor is needed (the other ones do no longer exist).
To convert your ruleset you need something like this at the start of your
ruleset:
# filter rules and anchors for ftp-proxy(8)
anchor "ftp-proxy/*"
pass in quick proto tcp to port ftp rdr-to 127.0.0.1 port 8021

This was tested by myself, sthen@, dlg@ and I think many more. OK by the same
people plus henning.

show more ...


# 8562b6e2 13-Jun-2008 claudio <claudio@openbsd.org>

Better error messages. Include the function causing the problem and do not
include the program name in logmsg() plus exit_daemon() does not return so
make it a void function. OK mpf@


# f9b24bdc 26-Feb-2008 henning <henning@openbsd.org>

Don't pass quick when tagging, so the tag can be used outside
the ftp-proxy anchor. Exotic setups with route-to etc.
can be implemented this way.
from camield, ok reyk beck canacar and manpage polis

Don't pass quick when tagging, so the tag can be used outside
the ftp-proxy anchor. Exotic setups with route-to etc.
can be implemented this way.
from camield, ok reyk beck canacar and manpage polished by jmc

show more ...


# 1a90e72a 01-Aug-2007 henning <henning@openbsd.org>

allow ftp-proxy to add tag statements to teh rules it inserts
clever, nice and easy diff from bsd@openbsd.rutgers.edu, ok pyr reyk


# 87d85e29 01-Dec-2006 camield <camield@openbsd.org>

forgot to update the comment as well


# 672bd2bf 01-Dec-2006 camield <camield@openbsd.org>

use flags S/SA for consistency with the rest of pf


# 8bfc93fd 07-Jun-2005 camield <camield@openbsd.org>

add OpenBSD cvs tags, prompted by xsa@


# 867a6359 07-Jun-2005 camield <camield@openbsd.org>

Introduce verbose option to control the logging of the pf rules.

ok beck mpf


# 3b53f69a 26-May-2005 camield <camield@openbsd.org>

Import new FTP proxy. Handles IPv6 and all FTP modes. It was
previously known as pftpx.

Not connected to the builds yet.

ok beck