[Bug 226144] lagg(4): Upping a lagg interrface should automatically up its children

2018-02-27 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=226144 Eugene Grosbein changed: What|Removed |Added CC||eu...@freebsd.org --- Comment #2

[Bug 226217] if_qlxgb (QLogic cLOM8214) not working for me when configured via netif

2018-02-27 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=226217 Mark Linimon changed: What|Removed |Added Assignee|freebsd-b...@freebsd.org|freebsd-net@FreeBSD.org -- You are

[Bug 193953] vlan(4) on LACP lagg(4) do not update if_baudrate value and thus SNMP daemons do not provide high capacity counters

2018-02-27 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=193953 Mark Linimon changed: What|Removed |Added Keywords||patch -- You are receiving this ma

[Bug 226144] lagg(4): Upping a lagg interrface should automatically up its children

2018-02-27 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=226144 Mark Linimon changed: What|Removed |Added Assignee|freebsd-b...@freebsd.org|freebsd-net@FreeBSD.org K

[Bug 223835] BGP session not established with md5 password via FRRouting

2018-02-27 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=223835 --- Comment #33 from Felipe N. Oliva --- (In reply to Andrey V. Elsukov from comment #32) pfSense with problem too. https://redmine.pfsense.org/issues/7969 -- You are receiving this mail because: You are on the CC list for the bug. __

[Bug 223835] BGP session not established with md5 password via FRRouting

2018-02-27 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=223835 --- Comment #32 from Andrey V. Elsukov --- (In reply to Felipe N. Oliva from comment #31) > (In reply to Andrey V. Elsukov from comment #30) > I will try with TSO/LRO. > Interface: ix (intel 10g) > Doesn't work with ipv4 and ipv6. > > nets

[Bug 223835] BGP session not established with md5 password via FRRouting

2018-02-27 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=223835 --- Comment #31 from Felipe N. Oliva --- (In reply to Andrey V. Elsukov from comment #30) I will try with TSO/LRO. Interface: ix (intel 10g) Doesn't work with ipv4 and ipv6. netstat -sp tcp | grep sig 0 packets with matching signat

[Bug 223835] BGP session not established with md5 password via FRRouting

2018-02-27 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=223835 --- Comment #30 from Andrey V. Elsukov --- (In reply to Felipe N. Oliva from comment #29) > (In reply to Andrey V. Elsukov from comment #28) > Yes, here is 11.1-STABLE r329758. > > interface: > vlan1977: flags=8843 metric 0 mtu > 1500 >

Re: if_ipsec(4) and IKEv1 [security/ipsec-tools, racoon.conf]

2018-02-27 Thread Andrey V. Elsukov
On 27.02.2018 14:20, Harry Schmalzbauer wrote: > Thank you very much for your explanation! > > Unfortunately, I couldn't get the P2P idea behind if_ipsec(4) and I > tought I'd just need a few minutes to switch from policy based tunnels > to route based – local brain contraints seem to require me m

[Bug 223835] BGP session not established with md5 password via FRRouting

2018-02-27 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=223835 --- Comment #29 from Felipe N. Oliva --- (In reply to Andrey V. Elsukov from comment #28) Yes, here is 11.1-STABLE r329758. interface: vlan1977: flags=8843 metric 0 mtu 1500 options=600703 kernel: options IPSEC options TCP_SIGNATU

Re: if_ipsec(4) and IKEv1 [security/ipsec-tools, racoon.conf]

2018-02-27 Thread Harry Schmalzbauer
Bezüglich Andrey V. Elsukov's Nachricht vom 27.02.2018 11:50 (localtime): > On 27.02.2018 12:56, Harry Schmalzbauer wrote: >> Hello, >> >> I'm out of ideas how to quick-start with if_ipsec(4) and IKEv1. >> >> I'm familar with security/ipsec-tools, but I couldn't find out how >> racoon(8) would int

Re: if_ipsec(4) and IKEv1 [security/ipsec-tools, racoon.conf]

2018-02-27 Thread Andrey V. Elsukov
On 27.02.2018 12:56, Harry Schmalzbauer wrote: > Hello, > > I'm out of ideas how to quick-start with if_ipsec(4) and IKEv1. > > I'm familar with security/ipsec-tools, but I couldn't find out how > racoon(8) would interact with cloned if_ipsec(4) interfaces yet. You need to manually configure if

Re: if_ipsec(4) and IKEv1 [security/ipsec-tools, racoon.conf]

2018-02-27 Thread Harry Schmalzbauer
Bezüglich Harry Schmalzbauer's Nachricht vom 27.02.2018 10:56 (localtime): > Hello, > > I'm out of ideas how to quick-start with if_ipsec(4) and IKEv1. > > I'm familar with security/ipsec-tools, but I couldn't find out how > racoon(8) would interact with cloned if_ipsec(4) interfaces yet. > > Als

if_ipsec(4) and IKEv1 [security/ipsec-tools, racoon.conf]

2018-02-27 Thread Harry Schmalzbauer
Hello, I'm out of ideas how to quick-start with if_ipsec(4) and IKEv1. I'm familar with security/ipsec-tools, but I couldn't find out how racoon(8) would interact with cloned if_ipsec(4) interfaces yet. Also, how to tell racoon(8) to generate such tunnel interfaces, hence policies? I guess the