A burst from NewReno when a partial ACK is received

2005-06-23 Thread Noritoshi Demizu
I'm using FreeBSD current for my experiences. I observed bursts sent by NewReno when a partial ACK is received. I have two packet traces of such bursts. One of such bursts is analyzed at http://www.demizu.org/~noritosi/memo/2005/0623/ . I think tcp_newreno_partial_ack() in tcp_input.c rev 1.275 h

Re: Looking for networking solution.

2005-06-23 Thread Jeff Meegan
> Hi guys. > > Thanks for the help and good advices. > I just received source code from guys at MITRE in McLean, VA for FreeBSD and will do some testing on it. > "The code is an open implementation of ISO International Standards and it's yours for the asking; there is no licensing." > > I was t

Re: www user than root

2005-06-23 Thread Jeremie Le Hen
> Yes it might be a good idea, but again, it depends on your security > requirements : any user is able to bind port 8000, so if you have > other users on the system, this may not be something to avoid. s/not// -- Jeremie Le Hen < jeremie at le-hen dot org >< ttz at chchile dot org > __

Re: www user than root

2005-06-23 Thread Jeremie Le Hen
Hi Khaled, > Is it a good idea to run daemons on non privileged ports as a normal > user (eg. www) then have natd or a firewall redirect the traffic > targetting the privileged port. > > For example: > > A web server running as user www on port 8000. > IPFW, IPNAT, PF or NATD redirecting port 80

Re: www user than root

2005-06-23 Thread Maxim Konovalov
[...] > You could do something like this in FreeBSD 5-STABLE by hacking the > in_pcbbind_setup() function in src/sys/netinet/in_pcb.c to not just > call suser_cred(), but to instead perform a group check, by calling > groupmember(some_privileged_socket_group, cred). mac_portacl(4) -- Maxim Konov

Re: www user than root

2005-06-23 Thread Abu Khaled
On 6/23/05, Jeremie Le Hen <[EMAIL PROTECTED]> wrote: > > Most daemons that bind to "priveleged" ports and run as a non-root uid, > > start as root, then change the effective UID after binding to the port. > > Yes. Secure programs like Postfix (smtp), OpenSSH, vsftpd and Dovecot > (imap) use priv

Re: www user than root

2005-06-23 Thread Jeremie Le Hen
> Most daemons that bind to "priveleged" ports and run as a non-root uid, > start as root, then change the effective UID after binding to the port. Yes. Secure programs like Postfix (smtp), OpenSSH, vsftpd and Dovecot (imap) use privilege separation. For instance if you need to open the TCP port

Re: Policy routing idea (Was: ipfw: Would it be possible to continue processing rest of rules after match ?)

2005-06-23 Thread Ari Suutari
Hi, Luigi Rizzo wrote: Seen the patch, looks good. It's always nice to see how easy it is to add new options to ipfw2 :) Yes. And what is really nice was the fact that this will solve my real-world problem also very easily (would be great if this patch could find it's way to RELENG_5 eventuall

Re: Policy routing idea (Was: ipfw: Would it be possible to continue processing rest of rules after match ?)

2005-06-23 Thread Luigi Rizzo
On Thu, Jun 23, 2005 at 01:19:12PM +0300, Ari Suutari wrote: > Hi, > > Luigi Rizzo wrote: > > > > BTW for the 'setnexthop', the port number does not really make > > much sense... though it can be useful as a degenerate 'nexthop' case > > to forward to a local port. > > Didn't remember to comment

Re: Looking for networking solution.

2005-06-23 Thread Marcin Jessa
Hi guys. Thanks for the help and good advices. I just received source code from guys at MITRE in McLean, VA for FreeBSD and will do some testing on it. "The code is an open implementation of ISO International Standards and it's yours for the asking; there is no licensing." I was thinking, maybe

Re: Policy routing idea (Was: ipfw: Would it be possible to continue processing rest of rules after match ?)

2005-06-23 Thread Ari Suutari
Hi, Luigi Rizzo wrote: BTW for the 'setnexthop', the port number does not really make much sense... though it can be useful as a degenerate 'nexthop' case to forward to a local port. Didn't remember to comment on this. I left the port number possibility there although it is really questionabl

Re: Policy routing idea (Was: ipfw: Would it be possible to continue processing rest of rules after match ?)

2005-06-23 Thread Ari Suutari
Hi, Luigi Rizzo wrote: for the chunk at --- 2951,2987 i think it would be better to reuse the 'case TOK_FORWARD', by changing the opcode and messages according to the actual command. Changed. here too i would reuse the existing code more, e.g. in ipfw_log() put 'case O_SETNEXTHO

Re: Policy routing idea (Was: ipfw: Would it be possible to continue processing rest of rules after match ?)

2005-06-23 Thread Luigi Rizzo
On Thu, Jun 23, 2005 at 10:52:02AM +0300, Ari Suutari wrote: > Hi, > > The patches which implement both > "ipfw setnexthop" and "ipfw defaultroute" are at: look reasonable, but i would like to reuse the existing 'forward' code a lot more, to avoid duplication and inconsistencies should we ap

Re: Policy routing idea (Was: ipfw: Would it be possible to continue processing rest of rules after match ?)

2005-06-23 Thread Ari Suutari
Hi, The patches which implement both "ipfw setnexthop" and "ipfw defaultroute" are at: http://www.suutari.iki.fi/freebsd/ipfw-nexthop.patch http://www.suutari.iki.fi/freebsd/netinet-nexthop.patch These are against 5.4-RELEASE - if that causes too much trouble I can try to generate them aga