MPLS and Google SoC

2008-02-14 Thread Ryan French

Hi All,

My name is Ryan French. I am a uni student at Waikato University in New 
Zealand. This year I will be porting the Ayame project (an 
implementation of the MPLS networking stack) to FreeBSD as part of my 
course. I was wondering if there was anyone out there wanting to be a 
mentor for me with this project for the google summer of code. I'm not 
quite sure if this is the right way to try and find someone.


Thanks for any help,

Ryan French.
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: MPLS and Google SoC

2008-02-14 Thread Ermal . LUCI

Please check even NetBSD tech mailing list since there has been posted an
updated patch of ayame implementation for netbsd.
This might help you since it fixed some bugs on ayame and has some more
discussions on the remainings one.

Regards


Ermal Luçi
IT Projects & Development

Raiffeisen Bank of Albania
"Dëshmorët e 4 Shkurtit" Street, Tirana

Tel: +355 4 233 396 Ext: 1316
E-mail: [EMAIL PROTECTED]
Web: www.raiffeisen.al


   
 [EMAIL PROTECTED] 
 nkey.com  
 Sent by:   To
 owner-freebsd-net freebsd-net@freebsd.org 
 @freebsd.org   cc
   
   Subject
 02/14/2008 11:16  MPLS and Google SoC 
 AM
   
   
   
   
   




Hi All,

My name is Ryan French. I am a uni student at Waikato University in New
Zealand. This year I will be porting the Ayame project (an
implementation of the MPLS networking stack) to FreeBSD as part of my
course. I was wondering if there was anyone out there wanting to be a
mentor for me with this project for the google summer of code. I'm not
quite sure if this is the right way to try and find someone.

Thanks for any help,

Ryan French.
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "[EMAIL PROTECTED]"
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Re: MPLS and Google SoC

2008-02-14 Thread Andre Oppermann

Ryan French wrote:

Hi All,

My name is Ryan French. I am a uni student at Waikato University in New 
Zealand. This year I will be porting the Ayame project (an 
implementation of the MPLS networking stack) to FreeBSD as part of my 
course. I was wondering if there was anyone out there wanting to be a 
mentor for me with this project for the google summer of code. I'm not 
quite sure if this is the right way to try and find someone.


This way is OK.  Once this years SoC starts and your project application
shows up in the mentor extranet I can pick it up.  We'll discuss internally
who exactly will mentor each project and determine the ranking among the
projects.  We don't know in advance how many students we will get sponsored
by Google.  Please make sure you provide very a comprehensive project
description and fill in all fields with a reasonable level of verbosity.

--
Andre

___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: ospf cost and route selection (openospfd)

2008-02-14 Thread Eygene Ryabinkin
Thu, Feb 14, 2008 at 07:49:34AM +0300, Eygene Ryabinkin wrote:
> > I have replaced patch-ospfd_packet.c with the new one,
> > and OSPF packets can find their way through again now. Unfortunately,
> > the behavior is the same as with openospfd 4.0; it converges with
> > right costs etc., but with the wrong interface.
> > Everything is exactly the same.
> 
> OK, I will up my gifX interfaces and will try to simulate your problem.

OK, problem recreated.  Will try to understand and fix the issue.
Will drop a mail, once the situation will be more clear.

Thinking, 20%... ;))
-- 
Eygene
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


PF firewall NAT and Windows IPSEC tunnel

2008-02-14 Thread Nerius Landys
Howdy folks.  I have several computers behind a FreeBSD router (NAT
192.168.0.x using OpenBSD's PF) .  One of those computers is a Windows
machine which is using software called "Cisco Systems VPN Client" to connect
to some other computers outside of our internal network.  Our FreeBSD
router's connection to the outside world is DHCP via cable modem.  I can
connect the Windows machine directly to the cable modem, bypassing the
FreeBSD router entirely; the VPN works fine in this case.  However, when I
try going through the FreeBSD router I get dropped VPN connections after
four to eight minutes; the VPN works fine only when it first connects and
for five minutes thereafter.

  Secure VPN Connection terminated locally by the client.
  Reason 412: The remote peer is no longer responding.

We contacted the administrator on the other side and he said to do the
following:

  The following ports should be allowed through the local firewall:
  UDP port 500, port 1
  ESP all ports
  AH all ports


I'm not quite sure what this means.

My original /etc/pf.conf:

  ext_if="fxp0"
  int_if="fxp3"
  internal_net="192.168.0.0/24
  nat on $ext_if from $internal_net to any -> ($ext_if)

and I added these three lines in trying to follow the administrator's
instructions (the Windows machine is 192.168.0.3):

  rdr on $ext_if proto udp from any to ($ext_if) port {500,1} ->
192.168.0.3
  rdr on $ext_if proto esp from any to ($ext_if) -> 192.168.0.3
  rdr on $ext_if proto ah from any to ($ext_if) -> 192.168.0.3

But the VPN connections still get dropped after five minutes.  Any ideas?

I'm also running a bridge between several network interfaces.
My /etc/sysctl.conf looks like this:

  net.link.ether.bridge.enable=1
  net.link.ether.bridge.config=em0,em1,fxp1,fxp2,fxp3

The interesting lines from /etc/rc.conf are:

  ifconfig_fxp0="DHCP"
  ifconfig_fxp3="inet 192.168.0.254 netmask 255.255.255.0"
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: PF firewall NAT and Windows IPSEC tunnel

2008-02-14 Thread Chuck Swiger

Hi--

On Feb 14, 2008, at 9:59 AM, Nerius Landys wrote:

Howdy folks.  I have several computers behind a FreeBSD router (NAT
192.168.0.x using OpenBSD's PF) .  One of those computers is a Windows
machine which is using software called "Cisco Systems VPN Client" to  
connect

to some other computers outside of our internal network.

[ ... ]

The following ports should be allowed through the local firewall:
UDP port 500, port 1
ESP all ports
AH all ports



When I was dealing with the Cisco VPN client, I was doing so with IPFW 
+natd and not PF, but you need 500/udp, 4500/udp, 62515/udp, 1723/tcp,  
1/tcp, and the GRE protocol.  In my case, /etc/natd.conf contained:


punch_fw 1:100
redirect_proto gre 10.1.1.247
redirect_port udp 10.1.1.247:500 500
redirect_port udp 10.1.1.247:4500 4500
redirect_port udp 10.1.1.247:62515 62515
redirect_port tcp 10.1.1.247:1 1
redirect_port tcp 10.1.1.247:pptp pptp

...to send the traffic to a VPN endpoint located at IP 10.1.1.247.

--
-Chuck

___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


RE: PF firewall NAT and Windows IPSEC tunnel

2008-02-14 Thread Peter Blok
I'm using this combination for a long time. Since the VPN client
initiates the VPN connection I have only provided NAT directives going
out.

nat pass on $ext_if proto { tcp, udp } from any to  port { isakmp }
-> ($ext_if:0) static-port
nat pass on $ext_if proto { udp } from any to  port { 1 } ->
($ext_if:0) static-port
nat pass on $ext_if proto { tcp } from any to  port { 4005 } ->
($ext_if:0)
nat pass on $ext_if proto { esp } from any to  -> ($ext_if:0)

I think the static-port was doing he trick in my case.

BTW I think the nat pass will only work in FreeBSD-7. For FreeBSD-6 you
have to split this up in two lines, one nat and one pass.

Peter


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Nerius Landys
Sent: Thursday, February 14, 2008 7:00 PM
To: freebsd-net@freebsd.org
Subject: PF firewall NAT and Windows IPSEC tunnel

Howdy folks.  I have several computers behind a FreeBSD router (NAT
192.168.0.x using OpenBSD's PF) .  One of those computers is a Windows
machine which is using software called "Cisco Systems VPN Client" to
connect
to some other computers outside of our internal network.  Our FreeBSD
router's connection to the outside world is DHCP via cable modem.  I can
connect the Windows machine directly to the cable modem, bypassing the
FreeBSD router entirely; the VPN works fine in this case.  However, when
I
try going through the FreeBSD router I get dropped VPN connections after
four to eight minutes; the VPN works fine only when it first connects
and
for five minutes thereafter.

  Secure VPN Connection terminated locally by the client.
  Reason 412: The remote peer is no longer responding.

We contacted the administrator on the other side and he said to do the
following:

  The following ports should be allowed through the local firewall:
  UDP port 500, port 1
  ESP all ports
  AH all ports


I'm not quite sure what this means.

My original /etc/pf.conf:

  ext_if="fxp0"
  int_if="fxp3"
  internal_net="192.168.0.0/24
  nat on $ext_if from $internal_net to any -> ($ext_if)

and I added these three lines in trying to follow the administrator's
instructions (the Windows machine is 192.168.0.3):

  rdr on $ext_if proto udp from any to ($ext_if) port {500,1} ->
192.168.0.3
  rdr on $ext_if proto esp from any to ($ext_if) -> 192.168.0.3
  rdr on $ext_if proto ah from any to ($ext_if) -> 192.168.0.3

But the VPN connections still get dropped after five minutes.  Any
ideas?

I'm also running a bridge between several network interfaces.
My /etc/sysctl.conf looks like this:

  net.link.ether.bridge.enable=1
  net.link.ether.bridge.config=em0,em1,fxp1,fxp2,fxp3

The interesting lines from /etc/rc.conf are:

  ifconfig_fxp0="DHCP"
  ifconfig_fxp3="inet 192.168.0.254 netmask 255.255.255.0"
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "[EMAIL PROTECTED]"
 

__ Information from ESET NOD32 Antivirus, version of virus
signature database 2876 (20080214) __

The message was checked by ESET NOD32 Antivirus.

http://www.eset.com
 
 

__ Information from ESET NOD32 Antivirus, version of virus
signature database 2876 (20080214) __

The message was checked by ESET NOD32 Antivirus.

http://www.eset.com
 
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


KAME IPsec spd_delete2 bug ...

2008-02-14 Thread Matthew Grooms

All,

There is a bug in /usr/src/sys/netipsec/key.c in FreeBSD KAME IPsec 
sources. If an spd_delete2 message is submitted for an invalid policy 
id, the kernel crashes. Can someone please commit this trivial patch? 
I'm afraid its against 6.2 sources but its also only one line.


Thanks,

-Matthew
--- key.c   Fri Feb 15 02:18:16 2008
+++ key.c.fixed Fri Feb 15 02:18:35 2008
@@ -2125,7 +2125,7 @@
/* Is there SP in SPD ? */
if ((sp = key_getspbyid(id)) == NULL) {
ipseclog((LOG_DEBUG, "%s: no SP found id:%u.\n", __func__, id));
-   key_senderror(so, m, EINVAL);
+   return key_senderror(so, m, EINVAL);
}
 
sp->state = IPSEC_SPSTATE_DEAD;
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "[EMAIL PROTECTED]"

RE: PF firewall NAT and Windows IPSEC tunnel

2008-02-14 Thread Matthew Grooms

Nerius,

This sounds like a DPD timeout. The Cisco VPN client or Cisco gateway is 
probably not configured to use NAT-T or you are blocking UDP port 4500. 
Using the static-port trick will help in some instances where a client 
doesn't support NAT-T, but it also prevents multiple clients behind the 
pf firewall from communicating with the same gateway simultaneously. If 
thats not the case then no big deal. If so, its best to just NAT UDP 
port 4500 outbound normally for Cisco clients unless the Cisco gateway 
has NAT-T disabled.


In legacy IPsec fashion, the client will establish its IKE session on 
the standard UDP port 500 and then pass ESP transport packets. With 
NAT-T enabled, the client will initiate IKE on port 500 and then switch 
to port 4500 if NAT is detected. ESP packets will be encapsulated in UDP 
and passed on port 4500 as well which is easier for NAT firewalls to 
deal with. The client should also issue keep-alive packets to prevent 
firewall state from being culled. Without this, no traffic would be sent 
while the client is idle and pf would drop state after 60secs by default.


udp.first60s
udp.single   30s
udp.multiple 60s
other.first  60s
other.single 30s
other.multiple   60s

If you don't see traffic on port 4500 but you do see ESP traffic, the 
other thing to try would be to increase the state lifetime for UDP port 
500 and ESP traffic. Assuming DPD is enabled on the Cisco gateway, this 
would help avoid state timeout so that the client has more time between 
sending or receiving notifications. ESP shouldn't be too troublesome as 
there are no ports to translate ... unless you have multiple clients 
behind the same firewall trying to talk to the same gateway. But thats 
what NAT-T is for.


Hope this helps,

-Matthew
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "[EMAIL PROTECTED]"