Hey kids!
I'm using FreeBSD-5.2.1 with pf firewall (the new OpenBSD one, as opposed to the other two firewalls the FreeBSD kernel happens to carry around), and, on top of that, the ALTQ packetshaping framework.
To make a long story short, this enables me to prioritize (or shape) packets on the firewall rules themselves.
That means, if I can identify the packets as mule-related, I can also deprioritize them enough so they don't bother my regular home network operation.
That said, I'm in a fix.
I can identify the incoming sessions just fine - TCP port X, UDP port X+3 and UDP port Y. I can build rules to catch them and prioritize them easily.
BUT
the outgoing sessions pose a problem - I have no definitive way to identify them. 80% of them or so connect to a client that uses default ports, and can be caught easily enough by catching tcp 4662 and udp 4672/4665. My problem is that the remaining 20% hog the traffic up.
Is there any TCP, IP or other attribute a firewall might recognize to set these packets aside from the rest of the traffic? (I have quite a bit of other traffic, of all sorts and flavours, so catching mule traffic using a default rule is a severe annoyance..)
Furtheremore, is there anyone here which tried this combination? (mule+pf+altq?)
Thanks!