Re: User-space PPP source code

2008-01-07 Thread Bjoern A. Zeeb

On Mon, 7 Jan 2008, Krishnan Nair wrote:

Hi,


I am looking for user-space PPP source code, but couldn't find it. Could
you please let me know the path from where I can download it?


it lives in usr.sbin/ppp :
http://www.freebsd.org/cgi/cvsweb.cgi/src/usr.sbin/ppp/

How you can get get it is described in this chapter:
http://www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/mirrors.html

--
Bjoern A. Zeeb bzeeb at Zabbadoz dot NeT
Software is harder than hardware  so better get it right the first time.
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Current problem reports assigned to freebsd-net@FreeBSD.org

2008-01-07 Thread FreeBSD bugmaster
Current FreeBSD problem reports
Critical problems

S Tracker  Resp.  Description

f kern/115360  net[ipv6] IPv6 address and if_bridge don't play well toge

1 problem total.

Serious problems

S Tracker  Resp.  Description

a kern/38554   netchanging interface ipaddress doesn't seem to work
s kern/39937   netipstealth issue
f kern/62374   netpanic: free: multiple frees
s kern/81147   net[net] [patch] em0 reinitialization while adding aliase
o kern/92552   netA serious bug in most network drivers from 5.X to 6.X 
s kern/95665   net[if_tun] "ping: sendto: No buffer space available" wit
s kern/105943  netNetwork stack may modify read-only mbuf chain copies
o kern/106316  net[dummynet] dummynet with multipass ipfw drops packets 
o kern/108542  net[bce]: Huge network latencies with 6.2-RELEASE / STABL
o kern/112528  net[nfs] NFS over TCP under load hangs with "impossible p
o kern/112686  net[patm] patm driver freezes System (FreeBSD 6.2-p4) i38
o kern/112722  netIP v4 udp fragmented packet reject
o kern/113457  net[ipv6] deadlock occurs if a tunnel goes down while the
o kern/113842  net[ipv6] PF_INET6 proto domain state can't be cleared wi
o kern/114714  net[gre][patch] gre(4) is not MPSAFE and does not support
o kern/114839  net[fxp] fxp looses ability to speak with traffic
o kern/115239  net[ipnat] panic with 'kmem_map too small' using ipnat
o kern/116077  net6.2-STABLE panic during use of multi-cast networking c
o kern/116172  netNetwork / ipv6 recursive mutex panic
o kern/116185  netif_iwi driver leads system to reboot
o kern/116328  net[bge]: Solid hang with bge interface
o kern/116747  net[ndis] FreeBSD 7.0-CURRENT crash with Dell TrueMobile 
o kern/116837  netifconfig tunX destroy: panic
o kern/117271  net[tap] OpenVPN TAP uses 99% CPU on releng_6 when if_tap
o kern/117423  netDuplicate IP on different interfaces
o bin/117448   net[carp] 6.2 kernel crash
o kern/118880  net[ipv6] IP_RECVDSTADDR & IP_SENDSRCADDR not implemented
o kern/119225  net7.0-RC1 no carrier with Prism 2.5 wifi card

28 problems total.

Non-critical problems

S Tracker  Resp.  Description

o conf/23063   net[PATCH] for static ARP tables in rc.network
s bin/41647netifconfig(8) doesn't accept lladdr along with inet addr
o kern/54383   net[nfs] [patch] NFS root configurations without dynamic 
s kern/60293   netFreeBSD arp poison patch
o kern/95267   netpacket drops periodically appear
f kern/95277   net[netinet] [patch] IP Encapsulation mask_match() return
o kern/100519  net[netisr] suggestion to fix suboptimal network polling
o kern/102035  net[plip] plip networking disables parallel port printing
o conf/102502  net[patch] ifconfig name does't rename netgraph node in n
o conf/107035  net[patch] bridge interface given in rc.conf not taking a
o kern/112654  net[pcn] Kernel panic upon if_pcn module load on a Netfin
o kern/114915  net[patch] [pcn] pcn (sys/pci/if_pcn.c) ethernet driver f
o bin/116643   net[patch] fstat(1): add INET/INET6 socket details as in 
o bin/117339   net[patch] route(8): loading routing management commands 
o kern/118722  net[tcp] Many old TCP connections in SYN_RCVD state
o kern/118727  net[ng] [patch] add new ng_pf module
a kern/118879  net[bge] [patch] bge has checksum problems on the 5703 ch
o kern/118975  net[bge] [patch] Broadcom 5906 not handled by FreeBSD
o bin/118987   netifconfig -l [address_family] does not work correct on 

19 problems total.

___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: ipsec_tools will not compile after IPSEC_NAT_T patch

2008-01-07 Thread VANHULLEBUS Yvan
On Sat, Jan 05, 2008 at 04:55:21PM -0500, Lyle Scott III wrote:
> I applied the IPSEC_NAT_T patch from
> http://vanhu.free.fr/FreeBSD/patch-natt-freebsd6-2007-05-31.diff to FreeBSD
> 6.2-release-p9
> yesterday to include IPSEC_NAT_T support.
> i did a  make buildworld buildkernel && make installworld installkernel &&
> shutdown -r now

Hi.

To answer your previous mail, you'll need to add IPSEC_NAT_T option to
your configuration file, or kernel will be compiled without NAT-T
support.


> Now when i recompile /usr/ports/security/ipsec-tools it passes the test for
> checking if the nat_t patch is installed but the port fails in make.  I did
> some research and noticed the same function it errors at is in the patch.

Do you have the configure's output for this test ?



> Did i mess something up or what?  I'm not sure where to go from here.
> Should i just delete /usr/src/* and extract a new src and start over?
> 
> cc -DHAVE_CONFIG_H -I. -I../.. -I./../libipsec
> -I./../../src/racoon/missing -D_GNU_SOURCE
> -DSYSCONFDIR=\"/usr/local/etc/racoon\"  -DADMINPORTDIR=\"/var/db/racoon\"
> -pipe -g  -Wall -Werror -Wno-unused -MT isakmp.o -MD -MP -MF
> .deps/isakmp.Tpo -c -o isakmp.o isakmp.c
> isakmp.c: In function `isakmp_open':
> isakmp.c:1750: error: `UDP_ENCAP_ESPINUDP' undeclared (first use in this
> function)
> isakmp.c:1750: error: (Each undeclared identifier is reported only once
> isakmp.c:1750: error: for each function it appears in.)
> isakmp.c:1753: error: `UDP_ENCAP_ESPINUDP_NON_IKE' undeclared (first use in
> this function)
> isakmp.c:1757: error: `UDP_ENCAP' undeclared (first use in this function)
> *** Error code 1

Those defines are in netinet/udp.h
Please check if they are in your /usr/include/netinet/udp.h
If you find them there, that means your problem comes from your
shell's environment (check SYSDIR, etc...).
If you don't find those defines in /usr/include/netinet/udp.h, check
in /usr/src/sys/netinet/udp.h
If you find them, that means you had a problem while installing world,
if you didn't find them, that means you had a problem while applying
the patch.



Yvan.

-- 
NETASQ
http://www.netasq.com
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: Implementation of Sampling for BPF

2008-01-07 Thread Vadim Goncharov

07.01.08 @ 04:01 Peter Wood wrote:

I don't think that modifying bpf.c is good solution, as userland is not  
the only consumer of BPF, think, for example, about ng_bpf. Moreover,  
what is the purpose of sampling, after all? BPF was never intended to  
be reliable every-packet solution.


Certainly other things do use BPF, however in my case I'm not using  
them, and in the 1 in X solution I have developed so far it can be  
turned on and off and if it's of huge concern could be put between  
defines and a kernel config option be required to include it.


It's the question of doing things correctly(tm) so they are appropriate  
for inclusion into the main src tree of the FreeBSD Project - this must be  
universal enough to meet other people needs and to be supported. You of  
course are free to do any patches at your locals site for your individual  
needs - many people do that customization on their own.


I'm not looking to transform BPF into a solution to reliably sample  
every packet, I am looking at attempting to define which packets it  
discards so that there is an equal chance of sampling something that  
happens, rather then an unknown/unpredictable chance.


So what if a malicious packet will be skipped due sampling, packet which  
is by other means undistinguishable from others before detailed analysis?


I wanted to stop the packet being sent to BPF as high up the kernel  
chain as possible as to save as much CPU time as possible. There's no  
point in capturing everything we can and then having the user land  
program selectively chuck stuff when it could be done before all the  
various copying/switching/etc.


Low in chain instead of high, you mean? That's of course no point to sort  
out things in userland, but that's properties of given BPF program to  
filter - how much the userland program wants to receive before detailed  
analysis.


If you are monitoring in userland, Snort of course will not have enough  
time to process all of your data, so why not simply put at least two  
machines in parallel, one for each mirrored line?


1) This doesn't scale, in the next six to twelve months I'm going to be  
presented with a 10Gb uplink to our regional network. Now I know I'm  
going to have issues when that link reaches ~40% capacity anyway, but  
one thing at a time.


2) We don't have the machine room heat or power capacity spare to run  
more servers, and there are other projects that require capacity that  
are in the waiting list way ahead of mine.


I'd love to buy a commercial hardware solution, unfortunately my budget  
is short by about $750k. So here I am with my favourite OS instead. God  
knows I've benefited from using FreeBSD, as has the institute I work  
for, at least if I do it properly I can say "guys, it's yours if you  
want it".


Putting as many servers as needed does scale well if you need only sampled  
data - just put an appropriate sampler/load balancer before them. And  
using FreeBSD on that servers will be cheaper than commercial hardware  
solution, too.


3) Because of our constraints we are satisfied with sampled data, we  
don't need full streams, but we would like controlled sampled data.


Why sample is enough to you? What exactly do you need? May be you'd rather  
write some simpler expressions for in-kernel filtering instead of  
heavy-weighted Snort?


--
WBR, Vadim Goncharov
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: Implementation of Sampling for BPF

2008-01-07 Thread Peter Wood

Good Afternoon,

It's the question of doing things correctly(tm) so they are appropriate 
for inclusion into the main src tree of the FreeBSD Project - this must 
be universal enough to meet other people needs and to be supported. You 
of course are free to do any patches at your locals site for your 
individual needs - many people do that customization on their own.


Indeed, and the later part of your statement is what my primary goal is, however 
I'm unfamiliar with this part of the kernel and could do with a few pointers 
about what the correct way would be from a programmatic point of view.


So what if a malicious packet will be skipped due sampling, packet which 
is by other means undistinguishable from others before detailed analysis?


If this case happens it is unfortunate and it slips through the net, however 
malicious problems that I look for are more often flows rather then individual 
packets. We drop most protocols at the border that would give us an issue with 
one packet. There is a greater chance of managing to sample at least one packet 
of a malicious flow.


Low in chain instead of high, you mean? That's of course no point to 
sort out things in userland, but that's properties of given BPF program 
to filter - how much the userland program wants to receive before 
detailed analysis.


Please forgive my use of low and high, it seems to depend on which end of the 
stack you're looking from :). I meant as close to it coming into the kernel as 
possible, yes.


Putting as many servers as needed does scale well if you need only 
sampled data - just put an appropriate sampler/load balancer before 
them. And using FreeBSD on that servers will be cheaper than commercial 
hardware solution, too.


Again, no ability to buy a sampler/load balancer, nor any space/heat/power to 
run one in. My available equipment consists of two core networking devices, some 
fibre, two Intel gig optical cards and one powerful(ish) Dell server currently 
running FreeBSD 6.X, which needs bumping to 7.0 when it's released. The kit at 
the other end of these optical links is either busy or incapable of sampling.


Why sample is enough to you? What exactly do you need? May be you'd 
rather write some simpler expressions for in-kernel filtering instead of 
heavy-weighted Snort?


I'm afraid I will not discuss our exact requirements in an open forum, this 
seems unwise from a security point of view.


I would be happy to implement this as a BPF filter, but I'm unaware of how 
sample in the filter language and count with variables, rather then look at 
fields in a packet.


More additional uses I could possibly foresee:
* NetFlow Generation - For which sampling is perfectly acceptable, although we 
currently do this in hardware.


* Statistics Generation - What are our users using our network for, etc. Now of 
course a lot of this data can be obtained from NetFlow (as we do at current) but 
there are aspects that can't, like average packet sizes per protocol, etc, 
things like that.


* Research - I'm regularly asked for sampled data from our network from 
researchers (which currently I turn down) but I'm assuming that they think 
sampled data is quite suitable.


I can understand your hesitation about including something like this in the 
project as a whole, but as I've said this is primarily for our purposes.


If others would find it useful that's great and I'll maintain a patch on a 
webserver, if the project as a whole would find it useful that's great too.


It would be nice at least from a academic point of view for FreeBSD to support 
other research too, for example the work being done to separate the congestion 
control to permit easier testing of different methods.


P.
--
Peter Wood <[EMAIL PROTECTED]>
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: kern/109470: [wi] Orinoco Classic Gold PC Card Can't Channel Hop

2008-01-07 Thread remko
Synopsis: [wi] Orinoco Classic Gold PC Card Can't Channel Hop

Responsible-Changed-From-To: freebsd-bugs->freebsd-net
Responsible-Changed-By: remko
Responsible-Changed-When: Mon Jan 7 17:29:15 UTC 2008
Responsible-Changed-Why: 
Over to maintainer.

http://www.freebsd.org/cgi/query-pr.cgi?pr=109470
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: kern/117043: [em] Intel PWLA8492MT Dual-Port Network adapter EEPROM Checksum is Not Valid

2008-01-07 Thread remko
Synopsis: [em] Intel PWLA8492MT Dual-Port Network adapter EEPROM Checksum is 
Not Valid

Responsible-Changed-From-To: freebsd-bugs->freebsd-net
Responsible-Changed-By: remko
Responsible-Changed-When: Mon Jan 7 17:29:23 UTC 2008
Responsible-Changed-Why: 
Over to maintainer.

http://www.freebsd.org/cgi/query-pr.cgi?pr=117043
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: kern/119345: [ath] Unsuported Atheros 5424/2424 and CPU speedstep not recognized

2008-01-07 Thread remko
Synopsis: [ath] Unsuported Atheros 5424/2424 and CPU speedstep not recognized

Responsible-Changed-From-To: freebsd-bugs->freebsd-net
Responsible-Changed-By: remko
Responsible-Changed-When: Mon Jan 7 17:33:18 UTC 2008
Responsible-Changed-Why: 
For the if_ath part move over to -net

http://www.freebsd.org/cgi/query-pr.cgi?pr=119345
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: kern/119361: [bge] bge(4) transmit performance problem

2008-01-07 Thread remko
Synopsis: [bge] bge(4) transmit performance problem

Responsible-Changed-From-To: freebsd-bugs->freebsd-net
Responsible-Changed-By: remko
Responsible-Changed-When: Mon Jan 7 17:28:37 UTC 2008
Responsible-Changed-Why: 
reassign to -net team

http://www.freebsd.org/cgi/query-pr.cgi?pr=119361
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


OT: ifconfig bridge0 span foo0 (under linux)

2008-01-07 Thread Max Laier
Hi,

real quick OT question:  I have to move a setup to Linux :-\ and can't 
figure out how to do span ports with linux' brctl (or otherwise).  If any 
of you happen to know, please let me know.

This experiment made me - once again - appreciate the central 
documentation of FreeBSD.  With Linux I just don't know where to look :-\

Thanks and sorry for the noise, but I'm desperate by now.

-- 
/"\  Best regards,  | [EMAIL PROTECTED]
\ /  Max Laier  | ICQ #67774661
 X   http://pf4freebsd.love2party.net/  | [EMAIL PROTECTED]
/ \  ASCII Ribbon Campaign  | Against HTML Mail and News


signature.asc
Description: This is a digitally signed message part.


Re: kern/119432: route add -host -iface causes arp entry with nic's arp address (regression)

2008-01-07 Thread linimon
Synopsis: route add -host  -iface  causes arp entry with nic's arp 
address (regression)

Responsible-Changed-From-To: freebsd-bugs->freebsd-net
Responsible-Changed-By: linimon
Responsible-Changed-When: Mon Jan 7 20:13:12 UTC 2008
Responsible-Changed-Why: 
Over to maintainer(s).

http://www.freebsd.org/cgi/query-pr.cgi?pr=119432
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "[EMAIL PROTECTED]"