Re: [PATCH] ipfw logging through tcpdump ?

From: Kevin Oberman <oberman_at_es.net>
Date: Wed, 16 Dec 2009 11:56:55 -0800
> Date: Tue, 15 Dec 2009 09:06:04 -0800
> From: Julian Elischer <julian_at_elischer.org>
> Sender: owner-freebsd-current_at_freebsd.org
> 
> Luigi Rizzo wrote:
> > On Tue, Dec 15, 2009 at 10:09:47AM +0000, Bjoern A. Zeeb wrote:
> >> On Tue, 15 Dec 2009, Luigi Rizzo wrote:
> >>
> >> Hi,
> >>
> >>> The following ipfw patch (which i wrote back in 2001/2002) makes
> >>> ipfw logging possible through tcpdump -- it works by passing to the
> >>> fake device 'ipfw0' all packets matching rules marked 'log' .
> >>> The use is very simple -- to test it just do
> >>>
> >>> 	ipfw add 100 count log ip from any to any
> >>>
> >>> and then
> >>>
> >>> 	tcpdump -ni ipfw0
> >>>
> >>> will show all matching traffic.
> >>>
> >>> I think this is a quite convenient and flexible option, so if there
> >>> are no objections I plan to commit it to head.
> >>
> >> pf(4) has pflog(4).   Ideally calling it the same would be good though
> >> I wonder if two of the the three of our firewalls grow that feature,
> >> if we could have a common packet logging device rather than re-doing
> >> it for each implementation.
> >>
> >> Frankly,  I haven't looked at the details of the implementation but I
> >> found getting rul numbers with tcpdump -e etc. was pretty cool to
> >> identify where things were blocked or permitted.
> > 
> > this is something trivial which i have planned already -- stuff
> > 10-12 bytes in the MAC header with rule numbers and actions
> > is surely trivial.
> > 
> > Thanks for the pointer to pflog, i'll look at that.
> > 
> >> Also make sure that the per-VIMAGE interface will work correctly and
> >> as expected.
> > 
> > On this i would like more feedback -- is there anything special
> > that I am supposed to do to create per-vimage interfaces ?
> > Could you look at the code i sent ?
> > "ipfw0" uses the same attach/detach code used by if_tap.
> 
> 
> I'm not sure we should do everything just because we can.
> it gives us nothing that we can't already get. you can filter using
> ipfw netgraph -> netgraph bpf -> ng_socket
> you can efficiently capture packets with divert (or tee)
> you can write to pcap files using phk's program.

While I agree with the sentiment, the proposal is so simple and elegant
and so easy to use that I think it would be crazy to not do it. It's
just much easier to use on an impromptu basis than doing the netgraph
stuff (except for those who do lots of netgraph).
-- 
R. Kevin Oberman, Network Engineer
Energy Sciences Network (ESnet)
Ernest O. Lawrence Berkeley National Laboratory (Berkeley Lab)
E-mail: oberman_at_es.net			Phone: +1 510 486-8634
Key fingerprint:059B 2DDF 031C 9BA3 14A4  EADA 927D EBB3 987B 3751
Received on Wed Dec 16 2009 - 18:57:01 UTC

This archive was generated by hypermail 2.4.0 : Wed May 19 2021 - 11:39:59 UTC