frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Open in hackernews

OpenBSD: PF queues break the 4 Gbps barrier

https://undeadly.org/cgi?action=article;sid=20260319125859
81•defrost•2h ago

Comments

bell-cot•2h ago
"Values up to 999G are supported, more than enough for interfaces today and the future." - Article

"When we set the upper limit of PC-DOS at 640K, we thought nobody would ever need that much memory." - Bill Gates

WhyNotHugo•2h ago
Honestly, I'm really curious about this number. 10bits is 1024, so why 999G specifically?
elevation•2h ago
Looks like an arbitrary validation cap. By the time we're maxing out the 64-bit underlying representation we probably won't be using Ethernet any more.
palmotea•2h ago
> By the time we're maxing out the 64-bit underlying representation we probably won't be using Ethernet any more.

We will be using Ethernet until the heat death of the universe, if we survive that long.

bell-cot•1h ago
https://en.wikipedia.org/wiki/Ethernet#History (& following sections)

Calling something "Ethernet" amounts to a promise that:

- From far enough up the OSI sandwich*, you can pretend that it's a magically-faster version of old-fashioned Ethernet

- It sticks to broadly accepted standards, so you won't get bitten by cutting-edge or proprietary surprises

*https://en.wikipedia.org/wiki/OSI_model

abound•2h ago
Looking at the patch itself (linked in the article), the description has this:

> We now support configuring bandwidth up to ~1 Tbps (overflow in m2sm at m > 2^40).

So I think that's it, 2^40 is ~1.099 trillion

throw0101d•2h ago
> "Values up to 999G are supported, more than enough for interfaces today and the future." - Article

Especially given that IEEE 802.3dj is working on 1.6T / 1600G, and is expected to publish the final spec in Summer/Autumn 2026:

* https://en.wikipedia.org/wiki/Terabit_Ethernet

Currently these interfaces are only on switches, but there are already NICs at 800G (P1800GO, Thor Ultra, ConnectX-8/9), so if you LACP/LAGG two together your bond is at 1600G.

arsome•1h ago
If you're moving those kind of speeds you're probably not doing packet filtering in software.
throw0101d•1h ago
But you may be using Unix-y software to manage the interfaces and do offload programming:

* https://en.wikipedia.org/wiki/Vector_Packet_Processing

* https://www.youtube.com/watch?v=ptm9h-Lf0gg ("VPP: A 1Tbps+ router with a single IPv4 address")

* https://en.wikipedia.org/wiki/Cumulus_Networks

himata4113•1h ago
I use VPP and handle bonded speeds of 200gbit. Not that far fetched to also do this at 1000gbit.
bitfilped•1h ago
Yes, we're already running 800G networks, so this phrasing seems really silly to me.
rayiner•1h ago
Can pf actually shape at speeds above 4 gbps?
ralferoo•1h ago
In the days when even cheap consumer hardware ships with 2.5G ports, this number seems weirdly low. Does this mean that basically nobody is currently using OpenBSD in the datacentre or anywhere that might be expecting to handle 10G or higher per port, or is it just filtering that's an issue?

I'm not surprised that the issue exists as even 10 years ago these speeds were uncommon outside of the datacentre, I'm just surprised that nobody has felt a pressing enough need to fix this earlier in the previous few years.

citrin_ru•1h ago
AFAIK performance is not a priority for OpenBSD project - security is (and other related qualities like code which is easy to understand and maintain). FreeBSD (at least when I followed it several years ago) had better performance both for ipfw and its own PF fork (not fully compatible with OpenBSD one).
traceroute66•1h ago
> AFAIK performance is not a priority for OpenBSD project - security is

TBF that was the case historically, but they have absolutely been putting in an effort into performance in their more recent releases.

Lots of stuff that used to be simply horrific on OpenBSD, such as multi-peer BGP full-table refreshes is SIGNIFICANTLY better in the last couple of years.

Clearly still not as good as FreeBSD, but compared to what it was...

toast0•1h ago
> Does this mean that basically nobody is currently using OpenBSD in the datacentre or anywhere that might be expecting to handle 10G or higher per port, or is it just filtering that's an issue?

This looks like it only affects bandwidth limiting. I suspect it's pretty niche to use OpenBSD as a traffic shaper at 10G+, and if you did, I'd imagine most of the queue limits would tend toward significantly less than 4G.

IcePic•1h ago
One thing could also be that by the time you have 10GE uplinks, shaping is not as important.

When we had 512kbit links, prioritizing VOIP would be a thing, and for asymmetric links like 128/512kbit it was prudent to prioritize small packets (ssh) and tcp ACKs on the outgoing link or the downloads would suffer, but when you have 5-10-25GE, not being able to stick an ACK packet in the queue is perhaps not the main issue.

traceroute66•1h ago
> Does this mean that basically nobody is currently using OpenBSD in the datacentre or anywhere

Half the problem is lack of proper drivers. I love OpenBSD but all the fibre stuff is just a bit half-baked.

For a long time OpenBSD didn't even have DOM (light-level monitoring etc.) exposed in its 1g fibre drivers. Stuff like that automatically kills off OpenBSD as a choice for datacentres where DOM stats are a non-negotiable hard requirement as they are so critical to troubleshooting.

OpenBSD finally introduced DOM stats for SFP somewhere around 2020–2021, but it doesn't always work, it depends if you have the right magic combination of SFP and card manufacturer. Whilst on FreeBSD it Just Works (TM).

And then overall, for higher speed optics, FreeBSD simply remains lightyears ahead (forgive the pun !). For example, Decisio make nice little router boxes with 10g SFP+ on them, FreeBSD has the drivers out-of-the-box, OpenBSD doesn't. And that's only an SFP+ example, its basically rolling-tumbleweed in a desert territory if you start venturing up to QSFP etc. ...

Someone•1h ago
The article is about allowing bandwidth restrictions in bytes/second that are larger than 2³²-1, not about how fast pf can filter packets.

I guess few people with faster ports felt the need to limit bandwidth for a service to something that’s that large.

FTA:

“OpenBSD's PF packet filter has long supported HFSC traffic shaping with the queue rules in pf.conf(5). However, an internal 32-bit limitation in the HFSC service curve structure (struct hfsc_sc) meant that bandwidth values were silently capped at approximately 4.29 Gbps, ” the maximum value of a u_int ".

With 10G, 25G, and 100G network interfaces now commonplace, OpenBSD devs making huge progress unlocking the kernel for SMP, and adding drivers for cards supporting some of these speeds, this limitation started to get in the way. Configuring bandwidth 10G on a queue would silently wrap around, producing incorrect and unpredictable scheduling behaviour.

A new patch widens the bandwidth fields in the kernel's HFSC scheduler from 32-bit to 64-bit integers, removing this bottleneck entirely.”

nine_k•12m ago
> silently wrap around, producing incorrect and unpredictable

Now I'm more scared to use OpenBSD than I was a minute before.

I strongly prefer software that fails loudly and explicitly.

chokan•26m ago
dsa
gigatexal•6m ago
It’s still single threaded. PF in FreeBSD is multithreaded. For home wan’s I’d be using openBSD. For anything else FreeBSD.

Astral to Join OpenAI

https://astral.sh/blog/openai
604•ibraheemdev•3h ago•398 comments

OpenBSD: PF queues break the 4 Gbps barrier

https://undeadly.org/cgi?action=article;sid=20260319125859
84•defrost•2h ago•22 comments

Juggalo Makeup Blocks Facial Recognition Technology (2019)

https://consequence.net/2019/07/juggalo-makeup-facial-recognition/
122•speckx•3h ago•55 comments

The Shape of Inequalities

https://www.andreinc.net/2026/03/16/the-shape-of-inequalities/
29•nomemory•1h ago•0 comments

macOS 26 breaks custom DNS settings including .internal

https://gist.github.com/adamamyl/81b78eced40feae50eae7c4f3bec1f5a
71•adamamyl•1h ago•19 comments

Consensus Board Game

https://matklad.github.io/2026/03/19/consensus-board-game.html
36•surprisetalk•2h ago•1 comments

Afroman found not liable in defamation case

https://nypost.com/2026/03/18/us-news/afroman-found-not-liable-in-bizarre-ohio-defamation-case/
753•antonymoose•6h ago•333 comments

Pretraining Language Models via Neural Cellular Automata

https://hanseungwook.github.io/blog/nca-pre-pre-training/
64•shmublu•4d ago•12 comments

Oil and gas prices jump after Iran and Israel attack gasfields

https://www.theguardian.com/business/2026/mar/19/oil-prices-gas-prices-rise-iran-israel-donald-trump
26•teleforce•33m ago•9 comments

Conway's Game of Life, in real life

https://lcamtuf.substack.com/p/conways-game-of-life-in-real-life
267•surprisetalk•12h ago•70 comments

Afroman Wins Civil Trial over Use of Police Raid Footage in His Music Videos

https://www.nytimes.com/2026/03/19/us/afroman-trial-lemon-cake-verdict.html
296•pseudolus•4h ago•43 comments

Nvidia greenboost: transparently extend GPU VRAM using system RAM/NVMe

https://gitlab.com/IsolatedOctopi/nvidia_greenboost
437•mmastrac•4d ago•120 comments

Gluon: Explicit Performance

https://www.lei.chat/posts/gluon-explicit-performance/
14•matt_d•3d ago•0 comments

Eniac, the First General-Purpose Digital Computer, Turns 80

https://spectrum.ieee.org/eniac-80-ieee-milestone
80•baruchel•10h ago•34 comments

Warranty Void If Regenerated

https://nearzero.software/p/warranty-void-if-regenerated
463•Stwerner•19h ago•282 comments

2% of ICML papers desk rejected because the authors used LLM in their reviews

https://blog.icml.cc/2026/03/18/on-violations-of-llm-review-policies/
161•sergdigon•5h ago•133 comments

How many branches can your CPU predict?

https://lemire.me/blog/2026/03/18/how-many-branches-can-your-cpu-predict/
67•ibobev•3h ago•18 comments

Hyper-optimized reverse geocoding API

https://github.com/traccar/traccar-geocoder
10•tananaev•1h ago•5 comments

Austin’s surge of new housing construction drove down rents

https://www.pew.org/en/research-and-analysis/articles/2026/03/18/austins-surge-of-new-housing-con...
697•matthest•16h ago•826 comments

Ramtrack.eu – RAM Price Intelligence

https://ramtrack.eu
10•nu11r0ut3•3h ago•3 comments

LotusNotes

https://computer.rip/2026-03-14-lotusnotes.html
152•TMWNN•4d ago•76 comments

Stdwin: Standard window interface by Guido Van Rossum [pdf]

https://ir.cwi.nl/pub/5998/5998D.pdf
66•ivanbelenky•2d ago•39 comments

Show HN: Duplicate 3 layers in a 24B LLM, logical deduction .22→.76. No training

https://github.com/alainnothere/llm-circuit-finder
202•xlayn•18h ago•72 comments

A sufficiently detailed spec is code

https://haskellforall.com/2026/03/a-sufficiently-detailed-spec-is-code
515•signa11•13h ago•279 comments

A Preview of Coalton 0.2

https://coalton-lang.github.io/20260312-coalton0p2/
17•varjag•4d ago•2 comments

Wander – A tiny, decentralised tool to explore the small web

https://susam.net/wander/
329•susam•1d ago•78 comments

'Your Frustration Is the Product'

https://daringfireball.net/2026/03/your_frustration_is_the_product
218•llm_nerd•4h ago•135 comments

The next fight over the use of facial recognition could be in the supermarkets

https://www.politico.com/newsletters/digital-future-daily/2026/03/16/the-facial-recognition-groce...
38•speckx•3h ago•17 comments

Nvidia NemoClaw

https://github.com/NVIDIA/NemoClaw
358•hmokiguess•1d ago•234 comments

The math that explains why bell curves are everywhere

https://www.quantamagazine.org/the-math-that-explains-why-bell-curves-are-everywhere-20260316/
187•ibobev•2d ago•112 comments