2.2-ALPHA Snapshots Available
-
@ermal:
strongswan instead of ipsec-tools.
Will settings be automatically migrated for ipsec tunnels, or does the move mean setting up the tunnels from scratch?
Having a very peculiar problem with my connection that started showing up since i started using the 2.1.1 betas, and that has been sticking around since then, so testing a different ipsec stack sound tempting…
-
Greetings All,
My first question can be ignored. I realize this is not possible as packets can only hold the next hop. I was working with someone and we basically assumed that it could work because some other devices let you create these route statement, but it turns out the only reason it was allowed was for documentation purposes and it shows that as usual pfSense is doing it correctly.
[IGNORE]
- Will pfSense ever allow for route creation with a remote gateway. e.g. If my default gateway is 1.1.1.1 and through it I can reach 2.2.2.2 and I want to create a route to 3.3.3.0/24, I can set most other business class routers and firewalls like Cisco ASAs so that 3.3.3.0/24 can be reached via 2.2.2.2 without having an IP in the same subnet as 2.2.2.2.
Is this a FreeBSD limitation? Is the fix a simple kernel flag or can the kernel be compiled to allow for this?
Additionally, I get that this can be an issue for multi-wan, but I would guess there is a way to deal with that as BSD is the basis for many high-end routers out there that support multi-wan.
Would the solution would be to have a rule that pushes traffic to 3.3.3.0/24 through the correct interface, using the default routing table. This is no big deal with the current setup as with multi-wan currently you have to create rules for all traffic that needs to use the default routing table.
The real technical challenge is when 2.2.2.2 can be reached via multiple WAN interfaces something has to be created to push this traffic through the active WAN with the highest priority.
[/IGNORE]- A More simple multi-WAN setup. Currently you have to create rules to use multi-WAN setups which means that you have to create separate rules for internal traffic. The idea is that the admin could specify multiple WANs as default with the LB and Failover metrics and all traffic to default would be sent down the appropriate WAN without special rules. Maybe other systems allow for this by creating their own IP stack with a routing table system that allows for this, so maybe it's not possible with stock BSD.
I believe that FreeBSD supports multiple routing tables. Could route-to be used with fibs or is there something that could replace route-to for use with fibs?
e.g. If a user has two wans pfSense could create two fibs. Each fib has all the same routes, I understand this would require code, except the default route for fib0 is the first WAN and the default route for fib1 is the second WAN. Then something like a gateway group could be created for the fibs. This would eliminate the need to create separate rules for local traffic which is required when using gateway groups.
Thanks,
Rhongomiant
-
"Support for AES-NI instruction and intrinsics has been added to gcc. The aesni module has been improved to use pipelining when possible. This results in a significant speed up for AES-XTS and AES-CBC decrypt. " according to: https://wiki.freebsd.org/WhatsNew/FreeBSD10#Kernel.2C_hardware_support_.26_other_low_level_improvements
I assume that 2.2 is built with LLVM and not gcc. LLVM has had AESNI for a few years now.
Support in LLVM / gcc only helps get the code compiled. Neither compiler will "recognize" the various modes of AES being compiled and magically emit the correct instruction sequence.
AES-XTS / AES-CBC are useful for storage. For IPSEC, typically AES-CTR mode is used (with SHA256 as a MAC).
Since IPSEC wants both crypto and MAC, you don't get a lot of speedup running AES-CTR mode. Thus the coming implementation of AES-GCM, which allows one to do the crypt and MAC parts in one flow, rather than two passes.
Early results say that we should be able to come close to filling a 10Gbps pipe. Certainly IPSEC at 1Gbps becomes possible, assuming hardware able to support same is used.
-
@gonzopancho:
"Support for AES-NI instruction and intrinsics has been added to gcc. The aesni module has been improved to use pipelining when possible. This results in a significant speed up for AES-XTS and AES-CBC decrypt. " according to: https://wiki.freebsd.org/WhatsNew/FreeBSD10#Kernel.2C_hardware_support_.26_other_low_level_improvements
I assume that 2.2 is built with LLVM and not gcc. LLVM has had AESNI for a few years now.
Support in LLVM / gcc only helps get the code compiled. Neither compiler will "recognize" the various modes of AES being compiled and magically emit the correct instruction sequence.
AES-XTS / AES-CBC are useful for storage. For IPSEC, typically AES-CTR mode is used (with SHA256 as a MAC).
Since IPSEC wants both crypto and MAC, you don't get a lot of speedup running AES-CTR mode. Thus the coming implementation of AES-GCM, which allows one to do the crypt and MAC parts in one flow, rather than two passes.
Early results say that we should be able to come close to filling a 10Gbps pipe. Certainly IPSEC at 1Gbps becomes possible, assuming hardware able to support same is used.
What about OpenVPN ? Will it see the same performance improvements as IPSEC?
-
Hello Everybody,
first of all thanks for the good job done by developers!
I wonder if in 2.2-ALPHA Snapshots is it working the IPv6 support in captive portal (which I read and verified was not available in 2.1.x)?
Thanks again
Dario
-
Do you intend to add support for mini-jumbo frames ie 2508 byte packets for better PPPoE support on UK FFTC circuits?
-
Is there any doc with a short list of changes/improvements in each snap? Just a couple of lines would let everyone know what to test and when not to expect changes in the issues at hand.
-
Is there any doc with a short list of changes/improvements in each snap? Just a couple of lines would let everyone know what to test and when not to expect changes in the issues at hand.
There is not a specific changelog that is written since the snapshots are automated. You can get an idea by checking the commit logs on github or by watching https://redmine.pfsense.org/projects/pfsense/activity
-
2.2-ALPHA (i386) built on Thu May 22 22:15:16 CDT 2014 FreeBSD 10.0-STABLE
I did manage to install this snapshot on a Parallels for Mac virtual machine and initial impression is that it works. However, the first install went bad because I resetted the virtual machine during the interface set up to add a second interface to the virtual machine. This caused the system think that the interface set up was already done but no config.xml configuration was saved and the system was unusable after that.
Note that I'm using vtnet interfaces for both WAN and LAN so they seem to be working fine when used with Parallels for Mac.
-
On the same snapshot I do have working IPv6 connectivity with SLAAC on WAN but the WAN_DHCP6 gateway keeps showing "Pending" and does not show any stats for the gateway.
-
Please start individual threads for issues, this is just an announcement thread not meant for troubleshooting.