ospfd not resyncing

2008-03-02 Thread Paul Civati
I have a fairly simple set-up, where I have ospfd announcing
a few routes to a Juniper router.

Twice now, when the Juniper has been unreachable and has then
come back on-line, the ospf routes have not reconverged on
the Juniper end.

It has taken a restart of the OSPF on the Juniper to resync
the routes..  I've not tried restarting the ospfd's on the
OpenBSD end but I presume that would also solve the issue.

I suppose it's plausible this is a JunOS bug, and I'll look 
into that, but wondered if this is a known issue?

OpenBSD/ospfd 4.2 RELEASE.

-Paul-



ospfd and new interfaces

2007-05-01 Thread Paul Civati
With ospfd running I create new vlan and carp interfaces and assign
IP addresses.

Currently, unless I restart ospfd these are not picked up.

(This is on 4.0 release).

My requirement is for a scripted/automated set-up to create new
interfaces as required, obviously it would be much nicer not to
have to completely restart ospfd when I do this.

Is it feasible that ospfd could be made to pick up these new
interfaces dynamically, or be able to signal one of the 
processes to look for interface changes?

-Paul-



Re: ospfd and new interfaces

2007-05-01 Thread Paul Civati
In article <[EMAIL PROTECTED]>,
[EMAIL PROTECTED] (Paul Civati) writes:

> With ospfd running I create new vlan and carp interfaces and assign
> IP addresses.
> Currently, unless I restart ospfd these are not picked up.
> (This is on 4.0 release).

Of course, as soon as I mail this, I read the 4.1 announcement
and note the ospfctl reload option that has been added.  Which
I'm guessing may solve the above?

-Paul-



Re: ospfd and new interfaces

2007-05-02 Thread Paul Civati
In article <[EMAIL PROTECTED]>,
[EMAIL PROTECTED] (Stuart Henderson) writes:

> 4.1 has ospfctl reload which does this for vlan, I am not convinced
> it works for carp* yet but haven't had chance to investigate (I only
> noticed today).

Just tested but it doesn't work for vlan with me on 4.1 release.

-Paul-



Re: ospfd not resyncing

2008-04-09 Thread Paul Civati
In article <[EMAIL PROTECTED]>,
[EMAIL PROTECTED] (Claudio Jeker) writes:

> Please send some more infos. What version are you useing (did you test
> -current). Please show the config and necessary ospfctl output. The last
> time I have issues like this was some time ago with point-to-point links
> and that got fixed some time ago. There seems something in common with
> your setups that others usually don't have.

4.2-RELEASE - not tried -current because this is for a production
system.

Next time it happens I will try and grab copies of the database.

Our config is really simple..  note that em3 has lots of vlan
and carp interfaces associated with it.

This ospfd talks to the loopback interface on a JunOS box.

auth-type crypt
auth-md n "xxx"
auth-md-keyid n

redistribute connected set metric 50

area 0.0.0.0 {
interface em2
interface em3 { passive }
interface em1 { passive }
}

-Paul-



Re: ospfd not resyncing

2008-04-09 Thread Paul Civati
Linden Varley <[EMAIL PROTECTED]> wrote:

> Bringing up an old-topic here, but just letting everyone know
> I have the exact same problem. It occurs quite often.

Surely we can't be the only two people seeing this issue?

It's quite fundamental to ospfd working properly..

-Paul-



Re: ospfd not resyncing

2008-04-09 Thread Paul Civati
In article <[EMAIL PROTECTED]>,
[EMAIL PROTECTED] (Paul Civati) writes:

> This ospfd talks to the loopback interface on a JunOS box.

For sake of clarity, over a normal ethernet interface, no PtP.

-Paul-



Re: ipsec vpn

2006-11-02 Thread Paul Civati
In article <[EMAIL PROTECTED]>,
[EMAIL PROTECTED] ("Bryan Irvine") writes:


> Also[1], there may be the need for an occasional connection from users
> just using the windows vpn client.  Anybody doing this?  I rarely even
> see windows so I'm not sure what to look for there.
> Do I need to import a key of some sort, or set authentication somehow?


My understanding is, if you want to support the simple connection
of Windows clients, using the built-in VPN connector (eg. control 
panel -> network -> make new connection -> VPN -> L2TP), the 
server side needs:


1. IPSec VPN transport mode, most likely with dynamic IP endpoint
2. L2TP tunneling daemon
3. PPP daemon


You will also need NAT traversal in the server and client IPSec 
implementation, if the client is connecting from behind a NAT
firewall/device.


2000 and XP will support NAT traversal with the right service
packs, OpenBSD 4.0, according to my checking of man pages this
evening, should support NAT-T too.


2000 and XP will support authentication using X.509 (ie. SSL
like) certificates, only XP will support PSK (pre-shared-key).


This is from my recent research of trying to get this working
with Debian, but I gave up because the server versions of s/w 
I was using didn't support NAT-T, AFAICS.  I've not tried it 
with OpenBSD, yet.


All AIUI, some of that could be wrong as I've not had it
working yet.


-Paul-



Re: ipsec vpn

2006-11-07 Thread Paul Civati
In article <[EMAIL PROTECTED]>,
[EMAIL PROTECTED] (Reyk Floeter) writes:

>> 2000 and XP will support authentication using X.509 (ie. SSL
>> like) certificates, only XP will support PSK (pre-shared-key).
> 
> i won't necessarily defeat windows, but 2000 and xp do support
> kerberos 5, x.509 _and_ pre-shared key authentication by default.

Please don't quoute out of context, I was talking about the
"stupid wizard" VPN connector not straight IPSec.

-Paul-



Re: ipsec vpn

2006-11-07 Thread Paul Civati
In article <[EMAIL PROTECTED]>,
[EMAIL PROTECTED] (Reyk Floeter) writes:

>> My understanding is, if you want to support the simple connection
>> of Windows clients, using the built-in VPN connector (eg. control 
>> panel -> network -> make new connection -> VPN -> L2TP), the 
>> server side needs:
>> 
>> 1. IPSec VPN transport mode, most likely with dynamic IP endpoint
>> 2. L2TP tunneling daemon
>> 3. PPP daemon
> 
> no. you don't need l2tp + ppp. you're not talking about the built-in
> ipsec support, you're talking about a stupid wizard...

Correct, I wasn't talking about plain IPSec, I was talking about 
"the simple connection of Windows clients, using the built-in VPN 
connector" exactly as I wrote.

Can we drop the condescending "everyone without an openbsd.org mail
address is an idiot" attitude please.

I didn't say there was no other possible way to use IPSec on Windows,
and my post was quite clear about the method I was talking about.

> starting with windows 2000, it is possible to use the built-in ipsec
> support. it is a bit hidden and the configuration is painful, but it
> actually works... you can configure it from the system management
> console or by executing "system32\secpol.msc".

Exactly, this is not simple, the "stupid wizard" you refer to is
what average joe without in depth IP stack knowledge will want
to use, and what some people who have to support client VPN  
connections may want to use, because it will greatly reduce
their support headache - providing server side works smoothly
of course.

-Paul-



Re: Motherboard recommendations? Pentium IV, 2GB+ RAM?

2005-11-19 Thread Paul Civati
In article <[EMAIL PROTECTED]>,
[EMAIL PROTECTED] ("C. Bensend") writes:


> Needed:
> 
> * 1+ PCI-X slot, 64-bit 133MHz (one required)
> * Intel Pentium IV, don't care what socket
> * Minimum 2GB RAM capacity
> * PC3200 RAM, if possible (already have 1GB stick just sitting around)


Supermicro P4SCi (S478) - really designed for Supermicro chassis though.


PCI-X 64bit (only 66MHz I'm afraid) and PC3200 capable.


> Wanted:
> 
> * Decent gigabit NIC built in, if possible (ie, not %&[EMAIL PROTECTED] 
> Broadcom)
> * 4GB RAM capacity would be nice


Dual Intel gige on-board and 4 slots for up to 4GB RAM.


-Paul-



Re: Motherboard recommendations? Pentium IV, 2GB+ RAM?

2005-11-19 Thread Paul Civati
In article <[EMAIL PROTECTED]>,
[EMAIL PROTECTED] (Chris Cappuccio) writes:


>> I haven't had good luck with AMD64 so far.  The server I built not
>> a year ago has had more kernel panics and funky-ass behavior than
> 
> Be careful about what kind of motherboard and RAM you buy in the future...
> 
> Motherboard chipset compatibility is also an issue with newer AMD64 stuff


People need to understand what they are buying into.


You have desktop boards and server class boards.


Athlon64 is a desktop processor, Opteron is a server processor,
and thus the boards likewise.


Generally the server class board will cost twice as much as the desktop 
board, but have decent manufacturer (Intel or AMD) chipset and the right 
buses (PCI-X) connected in a sensible manner.


If you are buying cheap desktop boards with poorly designed chipsets 
then they are never going to be good server boards, and you will
experience the problems described.


-Paul-