Re: missing #includes in /usr/include headers (was RE: Generating SYN packets.)

2001-03-09 Thread Kris Kennaway
On Fri, Mar 09, 2001 at 12:08:17PM -0800, Jonathan Graehl wrote: > Specific to your problem: it seems that requires , > but does not #include it. n_long is defined in in_systm.h and used in ip_icmp.h > and ip.h (not tcp.h) I have complained without response (on freebsd-arch, maybe > not the ri

same interface Route Cache

2001-03-09 Thread Nick Rogness
Is anyone working on route caching functionality within FreeBSD? This would eliminate a lot of problems with using FreeBSD as a router...which seems to be a common role of which FreeBSD seems to fit. Especially for machine that are dual-homed. It may be implemented nicely as a sysctl var or ma

RE: generating SYN packets with /usr/ports/net/nemesis and sh

2001-03-09 Thread Jonathan Graehl
Replying to self (multiple personality disorder?): Once caveat ... if you're trying to simulate the resource-exhaustion effects of a true SYN flood (rather than simply testing the ability of your firewall / intrusion detection system to react to a flood), then you will need to prevent autogenerat

Re: missing #includes in /usr/include headers (was RE: Generating SYN packets.)

2001-03-09 Thread Dag-Erling Smorgrav
"Jonathan Graehl" <[EMAIL PROTECTED]> writes: > Specific to your problem: it seems that requires > , but does not #include it. n_long is defined in > in_systm.h and used in ip_icmp.h and ip.h (not tcp.h) I have > complained without response (on freebsd-arch, maybe not the right > place) of simila

generating SYN packets with /usr/ports/net/nemesis and sh

2001-03-09 Thread Jonathan Graehl
#!/bin/sh i=5; while [ $i -lt 50100 ]; do nemesis-tcp -S 209.68.199.246 -D 209.68.199.242 -fS -x $i -y 25; i=$(($i + 1)); done ... seems to work fine; a perl script would give a more legible for loop though ;) -- Jonathan Graehl email: [EMAIL PROTECTED] web: http://jonathan.graehl.org/

missing #includes in /usr/include headers (was RE: Generating SYN packets.)

2001-03-09 Thread Jonathan Graehl
cd /usr/ports/net/nemesis make install Nemesis (http://www.packetninja.net/nemesis/) is a command line tool that can easily generate syn packets; if you want a flood, write a script. There is also /usr/ports/net/libnet http://www.packetfactory.net/Projects/Libnet/ - it is used by nemesis and is

Re: Generating SYN packets.

2001-03-09 Thread Robert Watson
Generally speaking, the most portable way to generate IP packets is to do so using the raw IP socket interface. However, I've also successfully generated packets using IPDIVERT, BPF, and custom kernel modules :-). I found the IPDIVERT performed quite nicely and was useful for exploring firewall

advice on network plan

2001-03-09 Thread Peter Brezny
I'm reconfiguring a network I inherited and I'm looking for advice on the best way to get it done. We are connected to a single T1, that's fire walled through a bsd box. behind that, aside from a local area network, we have a wireless network that provides connections to several small companies w

Re: kernel: nd6_storelladdr failed, mbuf leak

2001-03-09 Thread Bosko Milekic
John Hay wrote: > > > > >I'll do it right now if itojun doesn't mind (to save him a task :-) ) > > >and get authorization from Jordan to commit. > > > > please go ahead, i can review the diff if you want me to. > > > > Ok, here is a patch for -current. It was taken from the kame code > with mino

Re: [itojun@iijlab.net: accept(2) behavior with tcp RST right after handshake]

2001-03-09 Thread Jonathan Lemon
On Fri, Mar 09, 2001 at 02:56:21PM +0900, [EMAIL PROTECTED] wrote: > > >From the server's point of view: > > > >+ TCP/IP handshake from client, allocate protocol control blocks > >+ receive data from client > >+ client resets connection, pcb is destroyed > > > >Exactly why the client

Re: Generating SYN packets.

2001-03-09 Thread Will Andrews
On Fri, Mar 09, 2001 at 08:03:58AM -0800, Walter Goralski wrote: > The missing piece has been DOS SYN attacks. I have the really common > "synk4.c" source that is all over the Web, but I get errors when I try to > compile it ("it's the linux includes" someone told me). Now, I last used my They're

Generating SYN packets.

2001-03-09 Thread Walter Goralski
Folks: Andreas Klemm, who ported cflowd to FreeBSD, suggested I use this vehicle to see if I could get some help. I am a course developer for Juniper Networks, and I have just written a 2-day advanced course on router firewall filters (this is one reason for the cflowd). We have participants i

Re: Netgraph is leaking node references

2001-03-09 Thread Julian Elischer
Thanks Harti. I'll look at it (again) I thought I had fixed these.. oh well maybe I broke it again.. Hooks hold a reference on the node until their own references go to 0. The node holds a reference on teh hook, but the cycle is handled in the hook removal code. Since node removal first calls

Re: Token Ring and IPX.

2001-03-09 Thread Boris Popov
On Fri, 9 Mar 2001, Matthew N. Dodd wrote: > I've got a patch against -CURRENT to get our token ring code working > against Novell 802.2 style IPX. Whee, thanks! -- Boris Popov http://www.butya.kz/~bp/ To Unsubscribe: send mail to [EMAIL PROTECTED] with "unsubscribe freebsd-net" in th

Re: kernel: nd6_storelladdr failed, mbuf leak

2001-03-09 Thread John Hay
> > >I'll do it right now if itojun doesn't mind (to save him a task :-) ) > >and get authorization from Jordan to commit. > > please go ahead, i can review the diff if you want me to. > Ok, here is a patch for -current. It was taken from the kame code with minor adjustments to fit into

Netgraph is leaking node references

2001-03-09 Thread Harti Brandt
Hi, it seems that netgraph is leaking references. One simple experiment to do is to repeat 'ngctl types' several times: 500 [root] (beagle) netgraph_atm/tests/ccatm # ngctl types There are 5 total types: Type name Number of living nodes - --

Token Ring and IPX.

2001-03-09 Thread Matthew N. Dodd
I've got a patch against -CURRENT to get our token ring code working against Novell 802.2 style IPX. This patch also may enable IPv6, however additional patches (not included) are required. I also took the time to do some code cleanups. :/ Anyhow, please find attached. My test consisted of mo

backlog of listen(2)

2001-03-09 Thread dada
Just curious: I noticed that FreeBSD and NetBSD will give you a 50% longer listen queue than what was requested with the second argument of listen(2). (You get trunc(N*3/2)+1 for backlog=N). Thus with the default SOMAXCONN of 128 (this is settable with a sysctl) we actually have a listen queue of