summaryrefslogtreecommitdiff
path: root/share
diff options
context:
space:
mode:
authorAlexandr Nedvedicky <sashan@cvs.openbsd.org>2021-12-26 01:00:33 +0000
committerAlexandr Nedvedicky <sashan@cvs.openbsd.org>2021-12-26 01:00:33 +0000
commit629c5769fb1d21ce842ab827490e1f41e96f5476 (patch)
treed9722bcc17c542ee688cb1f37b7e3bfc5f1cdca0 /share
parent786f0603c618af02399f751f6abfdf20c9eb7d9c (diff)
make 'set skip on ...' in pf.conf dynamic
This is an old issue in pf(4): whenever new interface appears in IP stack, we must reload pf.conf to apply 'set skip on ...' to newly plumbed network interfaces. Time has come to fix it. The idea is to also create pfi_kif for interfaces, which are referred by 'set skip on ...'. Such pfi_kif instances are created/destroyed by pfi_set_flags()/pfi_clear_flags(). claudio@ dragged my attention to this in Gouveia. Also his feedback helped me to put change into shape. OK claudio@
Diffstat (limited to 'share')
-rw-r--r--share/man/man5/pf.conf.57
1 files changed, 2 insertions, 5 deletions
diff --git a/share/man/man5/pf.conf.5 b/share/man/man5/pf.conf.5
index 9fbbd0ccf7a..4b997a9067a 100644
--- a/share/man/man5/pf.conf.5
+++ b/share/man/man5/pf.conf.5
@@ -1,4 +1,4 @@
-.\" $OpenBSD: pf.conf.5,v 1.589 2021/12/21 00:23:15 jmatthew Exp $
+.\" $OpenBSD: pf.conf.5,v 1.590 2021/12/26 01:00:32 sashan Exp $
.\"
.\" Copyright (c) 2002, Daniel Hartmeier
.\" Copyright (c) 2003 - 2013 Henning Brauer <henning@openbsd.org>
@@ -28,7 +28,7 @@
.\" ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
.\" POSSIBILITY OF SUCH DAMAGE.
.\"
-.Dd $Mdocdate: December 21 2021 $
+.Dd $Mdocdate: December 26 2021 $
.Dt PF.CONF 5
.Os
.Sh NAME
@@ -1383,9 +1383,6 @@ Packets passing in or out on such interfaces are passed as if pf was
disabled, i.e. pf does not process them in any way.
This can be useful on loopback and other virtual interfaces, when
packet filtering is not desired and can have unexpected effects.
-.Ar ifspec
-is only evaluated when the ruleset is loaded; interfaces created
-later will not be skipped.
PF filters traffic on all interfaces by default.
.It Ic set Cm state-defaults Ar state-option , ...
The