Re: NATT patch and FreeBSD's setkey
On Tue, Feb 17, 2009 at 02:41:41PM +, Bjoern A. Zeeb wrote: [...] > I am not going to find my posting from a few years back but the > solution is to keep the kernel and libipsec (and setkey) in base in > sync and not install libipsec and setkey from the ipsec-tools port. > Done. There are two drawbacks with this solution: - It will take some regular effort to sync those version, unless we do have "some automated way to do it" (something like the mechanism used for /usr/ports ?). - if we just have a copy of sources in FreeBSD's tree, someone may commit something, then someone else (or a script) may just overwrite the changes, as it is supposed to be "just a copy". But if we can deal with those issues, of course, having the up to date versions directly shipped with FreeBSD is better ! [] > We have about 3 months left to get that patch in for 8; ideally 6 > weeks. Can you update the nat-t patch in a way as discussed here > before so that the extra address is in etc. and we can move forward? Done, new version is available here: http://people.freebsd.org/~vanhu/NAT-T/experimental/patch-FreeBSD-TRUNK-NATT-pfkey-clean-2009-02-26.diff > I basically do not care if racoon from ipsec-tools is not going to > work for two weeks of HEAD or four as someone will quickly add a > conditional patch to the port for a __FreeBSD_version > 8x and > that can be removed once ipsec-tools properly detect the state of the > system. Things will continue working as soon as people compile without NAT-T. When compiling with NAT-T, we will need to have "old FreeBSD+patch and old ipsec-tools" or "FreeBSd with new NAT-T code and up to date (actually even not in HEAD) racoon". For people who may ask the question, when NAT-T+pfkey cleanup code will be no more experimental, I'll backport a patchset at least for FreeBSD 7.x. Yvan. ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"
Re: FreeBSD Router Problem
Sorry I meant to say FreeBSD 7.0 :) > Hi Guys, > > Here's a weird one... I set up FreeBSD 5.2 to act as a router. I used > the pf.conf script shown at: > http://www.openbsd.org/faq/pf/pools.html#outgoing > > Everything works just fine. Traffic is appropriately load balanced and > things work as expected. > > Strangely after a few hours something just stops routing traffic. I can't > ping the remote gateways either. Both external interfaces still show the > correct IP addresses. Rebooting the BSD box solves the problem. Nothing > else gets rebooted. > > Any suggestions would be appreciated. > > Shawn > ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"
Re: FreeBSD Router Problem
Hi, On Fri, Feb 27, 2009 at 1:06 AM, Shawn Everett wrote: > Sorry I meant to say FreeBSD 7.0 :) > > > Hi Guys, > > > > Here's a weird one... I set up FreeBSD 5.2 to act as a router. I used > > the pf.conf script shown at: > > http://www.openbsd.org/faq/pf/pools.html#outgoing > > > > Everything works just fine. Traffic is appropriately load balanced and > > things work as expected. > > > > Strangely after a few hours something just stops routing traffic. I > can't > > ping the remote gateways either. Both external interfaces still show the > > correct IP addresses. Rebooting the BSD box solves the problem. Nothing > > else gets rebooted. Any error messages in dmesg output ? Significant changes in "netstat -m" output before and after ? The same for "pfctl -s all" output... > > > > > Any suggestions would be appreciated. Try tcpdump'ing on the router's interfaces an on the source machine and compare the packet flows -- do the packets reach the router ? Do they attempt to pass to the outside ? Regards, Adrian. ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"
FreeBSD Router Problem
Hi Guys, Here's a weird one... I set up FreeBSD 5.2 to act as a router. I used the pf.conf script shown at: http://www.openbsd.org/faq/pf/pools.html#outgoing Everything works just fine. Traffic is appropriately load balanced and things work as expected. Strangely after a few hours something just stops routing traffic. I can't ping the remote gateways either. Both external interfaces still show the correct IP addresses. Rebooting the BSD box solves the problem. Nothing else gets rebooted. Any suggestions would be appreciated. Shawn ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"
Re: FreeBSD Router Problem
On Feb 26, 2009, at 3:43 PM, Shawn Everett wrote: Here's a weird one... I set up FreeBSD 5.2 to act as a router. [ ... ] Any suggestions would be appreciated. Try upgrading to a supported version of the OS, first, then work on debugging any deadlocks if they still reoccur. Early 5.x versions were a little rocky. I seem to recall that 5.2 would experience deadlocks against ATA harddrives that would cause a system lockup, and that a errata release (5.2.1) was quickly put out to help fix those issues. 6.4 is much more stable by comparison... Regards, -- -Chuck ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"
Re: kern/129508: [panic] Kernel panic with EtherIP (may be related to SVN commit 178025)
The following reply was made to PR kern/129508; it has been noted by GNATS. From: Boris Kochergin To: bug-follo...@freebsd.org Cc: Subject: Re: kern/129508: [panic] Kernel panic with EtherIP (may be related to SVN commit 178025) Date: Thu, 26 Feb 2009 23:34:06 -0500 For anyone who was unenthusiastic about this due to the infrequency of the problem, this has become less of a debugging nightmare. Due to increased network load, the panic occurs about once a day, on average, now with 7.1-RELEASE-p2. ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"
Re: Questions on processing smaller frame size
Hello Ivan, >> Try reducing the number of CPUs, it might help by reducing contention. > > Ok, I'll try. > I have tested reducing the number of CPUs but it was helpless because it causes my system to hang. Regards, Siquijor ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"
Recommended additions to ipfw command: increment and verbosity limit
Everyone: Reviewing the latest man page for ipfw(8), I see that the only way to change the automatic increment for rules is still to set a sysctl variable (net.inet.ip.fw.autoinc_step). This was once also the case for "one pass" behavior (net.inet.ip.fw.one_pass) as well as verbose logging, debugging messages, and the global enable bit for the entire firewall. However various "ipfw enable" and "ipfw disable" subcommands were added over time to eliminate the need to set arcane sysctl variables. The only two commonly used parameters that are still not settable from the ipfw(8) command seem to be autoinc_step and verbose_limit. (autoinc_step has to be in the range 1..1000, while verbose_limit seems to be able to take any unsigned integer value.) I'd like to recommend that subcommands be added to set them, not only for the sake of consistency but to make it unnecessary to circumvent the ipfw command to configure one's firewall. The sysctl variables could remain to provide backward compatibility and to satisfy the Principle of Least Astonishment. Comments? Should I submit code? (Anyone qualified to be a committer should be able to make the changes by copying an editing a few lines, but...) --Brett Glass ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"
Re: Questions on processing smaller frame size
On Wed, Feb 25, 2009 at 6:48 PM, Ivan Voras wrote: > > There is a very experimental patch to the em driver, not endorsed by the > em driver author (for unknown reasons) that some users claim helps with > SMP performance. See > http://lists.freebsd.org/pipermail/freebsd-net/2008-December/020441.html > What's the interrupt rate of the above driver if you do: netperf -H remote-ip -t UDP_STREAM -l 60 -- -m 1472 Anyone has tried it? Best Regards, sephe -- Live Free or Die ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"
Re: FreeBSD Router Problem
> Any error messages in dmesg output ? > Significant changes in "netstat -m" output before and after ? > The same for "pfctl -s all" output... The box has been up for about 12 hours now. As a point of discussion here is the output from netstat and pfctl in case anything obvious jumps out. 385/905/1290 mbufs in use (current/cache/total) 384/484/868/25600 mbuf clusters in use (current/cache/total/max) 256/384 mbuf+clusters out of packet secondary zone in use (current/cache) 0/44/44/12800 4k (page size) jumbo clusters in use (current/cache/total/max) 0/0/0/6400 9k jumbo clusters in use (current/cache/total/max) 0/0/0/3200 16k jumbo clusters in use (current/cache/total/max) 864K/1370K/2234K bytes allocated to network (current/cache/total) 0/0/0 requests for mbufs denied (mbufs/clusters/mbuf+clusters) 0/0/0 requests for jumbo clusters denied (4k/9k/16k) 0/5/6656 sfbufs in use (current/peak/max) 0 requests for sfbufs denied 0 requests for sfbufs delayed 0 requests for I/O initiated by sendfile 0 calls to protocol drain routines # pfctl -s all No ALTQ support in kernel ALTQ related functions disabled TRANSLATION RULES: nat on ste0 inet from 172.16.3.0/24 to any -> (ste0) round-robin nat on ste1 inet from 172.16.3.0/24 to any -> (ste1) round-robin FILTER RULES: pass out on em0 inet from any to 172.16.3.0/24 flags S/SA keep state pass in quick on em0 inet from 172.16.3.0/24 to 172.16.3.253 flags S/SA keep state pass in on em0 route-to { (ste0 204.244.159.254), (ste1 204.244.159.254) } round-robin inet proto tcp from 172.16.3.0/24 to any flags S/SA modulate state pass in on em0 route-to { (ste0 204.244.159.254), (ste1 204.244.159.254) } round-robin inet proto udp from 172.16.3.0/24 to any keep state pass in on em0 route-to { (ste0 204.244.159.254), (ste1 204.244.159.254) } round-robin inet proto icmp from 172.16.3.0/24 to any keep state pass out on ste0 proto tcp all flags S/SA modulate state pass out on ste0 proto udp all keep state pass out on ste0 proto icmp all keep state pass out on ste1 proto tcp all flags S/SA modulate state pass out on ste1 proto udp all keep state pass out on ste1 proto icmp all keep state pass out on ste0 route-to (ste1 204.244.159.254) inet from 204.244.159.55 to any flags S/SA keep state pass out on ste1 route-to (ste0 204.244.159.254) inet from 204.244.159.68 to any flags S/SA keep state STATES: all udp 172.16.3.255:137 <- 172.16.3.17:137 NO_TRAFFIC:SINGLE all udp 172.16.3.17:137 -> 204.244.159.68:57827 -> 172.16.3.255:137 SINGLE:NO_TRAFFIC all tcp 10.170.54.1:81 <- 172.16.3.71:3064 CLOSED:SYN_SENT all tcp 172.16.3.71:3064 -> 204.244.159.55:56563 -> 10.170.54.1:81 SYN_SENT:CLOSED all tcp 10.170.54.1:81 <- 172.16.3.30:2021 CLOSED:SYN_SENT all tcp 172.16.3.30:2021 -> 204.244.159.68:54557 -> 10.170.54.1:81 SYN_SENT:CLOSED all tcp 10.170.54.1:81 <- 172.16.3.72:1414 CLOSED:SYN_SENT all tcp 172.16.3.72:1414 -> 204.244.159.55:52567 -> 10.170.54.1:81 SYN_SENT:CLOSED all tcp 10.170.54.1:81 <- 172.16.3.31:2865 CLOSED:SYN_SENT all tcp 172.16.3.31:2865 -> 204.244.159.68:59429 -> 10.170.54.1:81 SYN_SENT:CLOSED all tcp 10.170.54.1:81 <- 172.16.3.72:1415 CLOSED:SYN_SENT all tcp 172.16.3.72:1415 -> 204.244.159.55:61425 -> 10.170.54.1:81 SYN_SENT:CLOSED all tcp 10.170.54.1:81 <- 172.16.3.49:1914 CLOSED:SYN_SENT all tcp 172.16.3.49:1914 -> 204.244.159.68:58532 -> 10.170.54.1:81 SYN_SENT:CLOSED all udp 172.16.3.255:138 <- 172.16.3.39:138 NO_TRAFFIC:SINGLE all udp 172.16.3.39:138 -> 204.244.159.68:62224 -> 172.16.3.255:138 SINGLE:NO_TRAFFIC all tcp 64.56.145.72:110 <- 172.16.3.48:1494 FIN_WAIT_2:FIN_WAIT_2 all tcp 172.16.3.48:1494 -> 204.244.159.55:62928 -> 64.56.145.72:110 FIN_WAIT_2:FIN_WAIT_2 all udp 172.16.3.255:137 <- 172.16.3.49:137 NO_TRAFFIC:SINGLE all udp 172.16.3.49:137 -> 204.244.159.55:61053 -> 172.16.3.255:137 SINGLE:NO_TRAFFIC all tcp 10.170.54.1:81 <- 172.16.3.37:1508 CLOSED:SYN_SENT all tcp 172.16.3.37:1508 -> 204.244.159.68:54656 -> 10.170.54.1:81 SYN_SENT:CLOSED all tcp 10.170.54.1:81 <- 172.16.3.74:3126 CLOSED:SYN_SENT all tcp 172.16.3.74:3126 -> 204.244.159.55:61282 -> 10.170.54.1:81 SYN_SENT:CLOSED all tcp 10.170.54.1:81 <- 172.16.3.18:2446 CLOSED:SYN_SENT all tcp 172.16.3.18:2446 -> 204.244.159.68:58385 -> 10.170.54.1:81 SYN_SENT:CLOSED all tcp 10.170.54.1:81 <- 172.16.3.73:2057 CLOSED:SYN_SENT all tcp 172.16.3.73:2057 -> 204.244.159.55:61692 -> 10.170.54.1:81 SYN_SENT:CLOSED all udp 198.208.22.27:53 <- 172.16.3.74:58071 SINGLE:MULTIPLE all udp 172.16.3.74:58071 -> 204.244.159.68:54669 -> 198.208.22.27:53 MULTIPLE:SINGLE all udp 198.208.22.27:53 <- 172.16.3.74:57503 SINGLE:MULTIPLE all udp 172.16.3.74:57503 -> 204.244.159.55:64923 -> 198.208.22.27:53 MULTIPLE:SINGLE all udp 198.208.22.27:53 <- 172.16.3.74:51153 SINGLE:MULTIPLE all udp 172.16.3.74:51153 ->
Re: FreeBSD Router Problem
Hi, On Fri, Feb 27, 2009 at 8:41 AM, Shawn Everett wrote: > > Any error messages in dmesg output ? > > Significant changes in "netstat -m" output before and after ? > > The same for "pfctl -s all" output... > > The box has been up for about 12 hours now. As a point of discussion here > is the output from netstat and pfctl in case anything obvious jumps out. > > 385/905/1290 mbufs in use (current/cache/total) > 384/484/868/25600 mbuf clusters in use (current/cache/total/max) > 256/384 mbuf+clusters out of packet secondary zone in use (current/cache) > 0/44/44/12800 4k (page size) jumbo clusters in use > (current/cache/total/max) > 0/0/0/6400 9k jumbo clusters in use (current/cache/total/max) > 0/0/0/3200 16k jumbo clusters in use (current/cache/total/max) > 864K/1370K/2234K bytes allocated to network (current/cache/total) > 0/0/0 requests for mbufs denied (mbufs/clusters/mbuf+clusters) > 0/0/0 requests for jumbo clusters denied (4k/9k/16k) > 0/5/6656 sfbufs in use (current/peak/max) > 0 requests for sfbufs denied > 0 requests for sfbufs delayed > 0 requests for I/O initiated by sendfile > 0 calls to protocol drain routines > This looks OK to me... > > > # pfctl -s all > No ALTQ support in kernel > ALTQ related functions disabled > TRANSLATION RULES: > nat on ste0 inet from 172.16.3.0/24 to any -> (ste0) round-robin > nat on ste1 inet from 172.16.3.0/24 to any -> (ste1) round-robin > > FILTER RULES: > pass out on em0 inet from any to 172.16.3.0/24 flags S/SA keep state > pass in quick on em0 inet from 172.16.3.0/24 to 172.16.3.253 flags S/SA > keep state > pass in on em0 route-to { (ste0 204.244.159.254), (ste1 204.244.159.254) } > round-robin inet proto tcp from 172.16.3.0/24 to any flags S/SA modulate > state > pass in on em0 route-to { (ste0 204.244.159.254), (ste1 204.244.159.254) } > round-robin inet proto udp from 172.16.3.0/24 to any keep state > pass in on em0 route-to { (ste0 204.244.159.254), (ste1 204.244.159.254) } > round-robin inet proto icmp from 172.16.3.0/24 to any keep state > pass out on ste0 proto tcp all flags S/SA modulate state > pass out on ste0 proto udp all keep state > pass out on ste0 proto icmp all keep state > pass out on ste1 proto tcp all flags S/SA modulate state > pass out on ste1 proto udp all keep state > pass out on ste1 proto icmp all keep state > pass out on ste0 route-to (ste1 204.244.159.254) inet from 204.244.159.55 > to any flags S/SA keep state > pass out on ste1 route-to (ste0 204.244.159.254) inet from 204.244.159.68 > to any flags S/SA keep state > Quite an evolved route forwarding setup ;)... > > STATES: > all udp 172.16.3.255:137 <- 172.16.3.17:137 NO_TRAFFIC:SINGLE > all udp 172.16.3.17:137 -> 204.244.159.68:57827 -> 172.16.3.255:137 > SINGLE:NO_TRAFFIC > all tcp 10.170.54.1:81 <- 172.16.3.71:3064 CLOSED:SYN_SENT > all tcp 172.16.3.71:3064 -> 204.244.159.55:56563 -> 10.170.54.1:81 > SYN_SENT:CLOSED > all tcp 10.170.54.1:81 <- 172.16.3.30:2021 CLOSED:SYN_SENT > all tcp 172.16.3.30:2021 -> 204.244.159.68:54557 -> 10.170.54.1:81 > SYN_SENT:CLOSED > all tcp 10.170.54.1:81 <- 172.16.3.72:1414 CLOSED:SYN_SENT > all tcp 172.16.3.72:1414 -> 204.244.159.55:52567 -> 10.170.54.1:81 > SYN_SENT:CLOSED > all tcp 10.170.54.1:81 <- 172.16.3.31:2865 CLOSED:SYN_SENT > all tcp 172.16.3.31:2865 -> 204.244.159.68:59429 -> 10.170.54.1:81 > SYN_SENT:CLOSED > all tcp 10.170.54.1:81 <- 172.16.3.72:1415 CLOSED:SYN_SENT > all tcp 172.16.3.72:1415 -> 204.244.159.55:61425 -> 10.170.54.1:81 > SYN_SENT:CLOSED > all tcp 10.170.54.1:81 <- 172.16.3.49:1914 CLOSED:SYN_SENT > all tcp 172.16.3.49:1914 -> 204.244.159.68:58532 -> 10.170.54.1:81 > SYN_SENT:CLOSED > all udp 172.16.3.255:138 <- 172.16.3.39:138 NO_TRAFFIC:SINGLE > all udp 172.16.3.39:138 -> 204.244.159.68:62224 -> 172.16.3.255:138 > SINGLE:NO_TRAFFIC > all tcp 64.56.145.72:110 <- 172.16.3.48:1494 FIN_WAIT_2:FIN_WAIT_2 > all tcp 172.16.3.48:1494 -> 204.244.159.55:62928 -> 64.56.145.72:110 > FIN_WAIT_2:FIN_WAIT_2 > all udp 172.16.3.255:137 <- 172.16.3.49:137 NO_TRAFFIC:SINGLE > all udp 172.16.3.49:137 -> 204.244.159.55:61053 -> 172.16.3.255:137 > SINGLE:NO_TRAFFIC > all tcp 10.170.54.1:81 <- 172.16.3.37:1508 CLOSED:SYN_SENT > all tcp 172.16.3.37:1508 -> 204.244.159.68:54656 -> 10.170.54.1:81 > SYN_SENT:CLOSED > all tcp 10.170.54.1:81 <- 172.16.3.74:3126 CLOSED:SYN_SENT > all tcp 172.16.3.74:3126 -> 204.244.159.55:61282 -> 10.170.54.1:81 > SYN_SENT:CLOSED > all tcp 10.170.54.1:81 <- 172.16.3.18:2446 CLOSED:SYN_SENT > all tcp 172.16.3.18:2446 -> 204.244.159.68:58385 -> 10.170.54.1:81 > SYN_SENT:CLOSED > all tcp 10.170.54.1:81 <- 172.16.3.73:2057 CLOSED:SYN_SENT > all tcp 172.16.3.73:2057 -> 204.244.159.55:61692 -> 10.170.54.1:81 > SYN_SENT:CLOSED > all udp 198.208.22.27:53 <- 172.16.3.74:58071 SINGLE:MULTIPLE > all udp 172.16.3.74:58071 -> 204.244.159.68:54669 -> 198.208.22.27:53 > MULTIPLE:SINGLE > all udp 198.208.22.27:53 <- 172.16.3.7