On Wed, 29 Jul 1998, David A. Ranch wrote:

> 
> >with kernel 2.0.35, with cacheing named, and sometimes it works well, and
> >sometimes not.  What doesn't work well is a Win 95 box on my network
> >looking at http://www.linuxhq.com (and many others).  
> 
> Did this happen with 2.0.34?  Personally, this sounds like our
> famous MTU bug.  Set your Internet connection's MTU to 1500
> and try again.

I've only set this up on the new kernel. My MTUs were set as:

W95(MTU=1500)-ethernet--(MTU=1006)eth0:Linux:diald(MTU1500)-phone-internet

Now:
W95(MTU=1500)-ethernet--(MTU=1500)eth0:Linux:diald(MTU1500)-phone-internet

It works fine now.  I hate running into infamous bugs.  Thank you.

I would guess that the route had fragmented the longer web pages, leaving
the short 'this page isn't here' pages to get through un-fragmented,
causing my spurious problem.  

  Is this problem also fixed with the MTU patch
http://www.indyramp.com/mirrors/ipmasq/masq-mtu-fix-0.3.patch.gz referred
to on the http://www.indyramp.com/mirrors/ipmasq/ resources page? 

Dave.  

PS: My working setup for diald, dynamic IP with first connection contact,
Linux 2.0.35/slackware, etc. is pasted on the end, along with the program
I used to generate the info.  Dave

> 
> --DAvid
> .----------------------------------------------------------------------------.
> |  David A. Ranch - Remote Access/Linux/PC hardware      [EMAIL PROTECTED]  |
> !----                                                                    ----!
> `----- For more detailed info, see http://www.ecst.csuchico.edu/~dranch -----'
> 

 .................................................................
 Dave Forrest                                [EMAIL PROTECTED]
 (804)-979-8634               http://watt.seas.virginia.edu/~drf5n



Working Configuration:
#### cat /etc/rc.d.rc.ipfw
#!/bin/sh
set -x ; # set +x;
# Setup IP firewalling/masquerading
# see http://www.indyramp.com/masq/
INSIDE=192.168.102.0/24
ANYWHERE=0.0.0.0/0
OUTSIDE=${ANYWHERE}
# Flush all commands
/sbin/ipfwadm -F -f
/sbin/ipfwadm -I -f
/sbin/ipfwadm -O -f
#per IP Masquerade Mini-Faq:
#  http://www.indyramp.com/mirrors/ipmasq/ipmasq-HOWTO.html
/sbin/ipfwadm -O -p accept
/sbin/ipfwadm -I -p accept
/sbin/ipfwadm -F -p deny
/sbin/ipfwadm -I -i deny -W sl0 -S ${INSIDE} -D ${ANYWHERE}
/sbin/ipfwadm -F  -a m -S ${INSIDE} -D ${OUTSIDE}
# enable first-packet re-writing per 
# http://www.linuxhq.com/patch/20-p0468.html
echo 1 > /proc/sys/net/ipv4/ip_dynaddr

# handy commands:
# cd /lib/modules/`uname -r`/ipv4 ; ls -a ip_masq* # lists the ipmasq
modules
# grep '' /proc/sys/net/ipv4/*  # shows the ip kernel setups
# ipfwadm -F -l ; ipfwadm -I -l ; ipfwadm -O -l ; ipfwadm -M -l # lists
# ifconfig  #

####  ipfwadm -F -l ; ipfwadm -I -l ; ipfwadm -O -l ; ipfwadm -M -l
IP firewall forward rules, default policy: deny
typ prot source               destination          ports
msq all  localnet/24          anywhere             n/a
IP firewall input rules, default policy: accept
typ prot source               destination          ports
den all  localnet/24          anywhere             n/a
IP firewall output rules, default policy: accept
IP masquerading entries
prot expire   source               destination          ports
tcp  03:15.44 hob.forrest          204.209.212.113      1192 (61495) ->
wwwtcp  10:34.18 hob.forrest          alyssa.indyramp.com  1197 (61499) ->
wwwtcp  10:41.42 hob.forrest          dijon.nais.com       1199 (61500) ->
wwwtcp  14:13.65 hob.forrest          watt.seas.virginia.edu 1178 (61482)
-> telnet
####  ls -a /lib/modules/`uname -r`/ipv4/ip_masq*
/lib/modules/2.0.35/ipv4/ip_masq_cuseeme.o
/lib/modules/2.0.35/ipv4/ip_masq_ftp.o
/lib/modules/2.0.35/ipv4/ip_masq_irc.o
/lib/modules/2.0.35/ipv4/ip_masq_quake.o
/lib/modules/2.0.35/ipv4/ip_masq_raudio.o
/lib/modules/2.0.35/ipv4/ip_masq_vdolive.o

####  grep '' /proc/sys/net/ipv4/*  # shows the ip kernel setups
/proc/sys/net/ipv4/arp_check_interval:6000
/proc/sys/net/ipv4/arp_confirm_interval:30000
/proc/sys/net/ipv4/arp_confirm_timeout:500
/proc/sys/net/ipv4/arp_dead_res_time:6000
/proc/sys/net/ipv4/arp_max_tries:3
/proc/sys/net/ipv4/arp_res_time:500
/proc/sys/net/ipv4/arp_timeout:6000
/proc/sys/net/ipv4/ip_dynaddr:1
/proc/sys/net/ipv4/ip_forward:1

####  ifconfig  #
lo        Link encap:Local Loopback  
          inet addr:127.0.0.1  Bcast:127.255.255.255  Mask:255.0.0.0
          UP BROADCAST LOOPBACK RUNNING  MTU:3584  Metric:1
          RX packets:3575 errors:0 dropped:0 overruns:0
          TX packets:3575 errors:0 dropped:0 overruns:0

eth0      Link encap:10Mbps Ethernet  HWaddr 00:40:05:24:34:84
          inet addr:192.168.102.10  Bcast:129.168.102.255
Mask:255.255.255.0
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:316693 errors:0 dropped:0 overruns:0
          TX packets:286995 errors:0 dropped:0 overruns:0
          Interrupt:11 Base address:0x300 

sl0       Link encap:Serial Line IP  
          inet addr:192.168.102.1  P-t-P:192.168.102.2  Mask:255.255.255.0
          UP POINTOPOINT RUNNING  MTU:1500  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0
          TX packets:140 errors:0 dropped:0 overruns:0

ppp0      Link encap:Point-Point Protocol  
          inet addr:205.139.233.151  P-t-P:205.197.102.56
Mask:255.255.255.0
          UP POINTOPOINT RUNNING  MTU:1500  Metric:1
          RX packets:2226 errors:0 dropped:0 overruns:0
          TX packets:2510 errors:0 dropped:0 overruns:0


####  route -n  # list the routing table w/o DNS lookups
Kernel routing table
Destination     Gateway         Genmask         Flags MSS    Window Use
Iface
192.168.102.2   *               255.255.255.255 UH    1500   0        0
sl0
205.197.102.56  *               255.255.255.255 UH    1500   0        0
ppp0
192.168.102.0   *               255.255.255.0   U     1006   0       98
eth0
127.0.0.0       *               255.0.0.0       U     3584   0       50 lo
default         *               *               U     1500   0       18
ppp0
default         *               *               U     1500   0       57
sl0

####  cat /etc/diald.conf
mode ppp
connect "chat -f /etc/chat_script.cstone"
device /dev/cua1
speed 115200
modem
lock
crtscts
local 192.168.102.1
remote 192.168.102.2
dynamic
defaultroute
fifo /var/adm/diald
proxyarp
include /usr/lib/diald/standard.filter

####  cat /etc/rc.d/check.ipfw
#!/bin/sh
#set -x ; # set +x; # Check the IP firewalling setup
# handy commands for checking the firewall:
echo -e '\n#### cat /etc/rc.d.rc.ipfw'
                cat /etc/rc.d/rc.ipfw
echo -e '\n####  ipfwadm -F -l ; ipfwadm -I -l ; ipfwadm -O -l ; ipfwadm
-M -l'
                 ipfwadm -F -l ; ipfwadm -I -l ; ipfwadm -O -l ; ipfwadm
-M -l
echo -e '\n####  ls -a /lib/modules/`uname -r`/ipv4/ip_masq*'
                 ls -a /lib/modules/`uname -r`/ipv4/ip_masq* 
echo -e "\n####  grep '' /proc/sys/net/ipv4/*  # shows the ip kernel
setups"
                 grep '' /proc/sys/net/ipv4/*  # shows the ip kernel
setups
echo -e '\n####  ifconfig  #'
                 ifconfig  #
echo -e '\n####  route -n  # list the routing table w/o DNS lookups'
                 route -n  # list the routing table w/o DNS lookups
echo -e '\n####  cat /etc/diald.conf'
                 cat /etc/diald.conf
echo -e '\n####  cat /etc/rc.d/check.ipfw'
                 cat /etc/rc.d/check.ipfw



---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]
For daily digest info, email [EMAIL PROTECTED]

Reply via email to