Re: kern/104377: [carp] [patch] CARP interface doesn't go up on VmWare

2006-12-06 Thread Ari Suutari
Hi, If you are running VMware 5.x, then you can use the em driver (Intel Pro/1000) instead, which is far more functional than the lnc driver. To do so: 1. Shutdown the VMware system 2. Locate the *.vmx file for your virtual machine 3. Open the *.vmx file in your favourite text

Re: kern/104377: [carp] [patch] CARP interface doesn't go up on VmWare

2006-12-05 Thread Ari Suutari
Hi, A> >If interface, that went down, had reported its state then CARP A> >would had noticed that and would had lowered its priority, A> >gave up mastering, and became backup. This will be redundant. A> A>Is it impossible to add link state reporting to lnc driver ? A>I think this woul

Re: kern/104377: [carp] [patch] CARP interface doesn't go up on VmWare

2006-12-05 Thread Ari Suutari
Hi, On Tue, Dec 05, 2006 at 08:23:50AM +0200, Ari Suutari wrote: A> Hi, A> A> OK, what would then be the right fix to get things working A> under vmware ? I run a bunch of servers here and some of A> them are redundant pairs. We have some pressure to virtualize A> tho

Re: Policy routing idea (Was: ipfw: Would it be possible to continue processing rest of rules after match ?)

2005-06-28 Thread Ari Suutari
Hi, Luigi Rizzo wrote: ok. Seen the patch, looks good. It's always nice to see how easy it is to add new options to ipfw2 :) Patch has been filed as PR# 82724. I'm putting it to production machines today. Ari S. ___ freebsd-net@freebsd.org m

Re: Policy routing idea (Was: ipfw: Would it be possible to continue processing rest of rules after match ?)

2005-06-23 Thread Ari Suutari
Hi, Luigi Rizzo wrote: Seen the patch, looks good. It's always nice to see how easy it is to add new options to ipfw2 :) Yes. And what is really nice was the fact that this will solve my real-world problem also very easily (would be great if this patch could find it's way to RELENG_5 eventuall

Re: Policy routing idea (Was: ipfw: Would it be possible to continue processing rest of rules after match ?)

2005-06-23 Thread Ari Suutari
Hi, Luigi Rizzo wrote: BTW for the 'setnexthop', the port number does not really make much sense... though it can be useful as a degenerate 'nexthop' case to forward to a local port. Didn't remember to comment on this. I left the port number possibility there although it is really questionabl

Re: Policy routing idea (Was: ipfw: Would it be possible to continue processing rest of rules after match ?)

2005-06-23 Thread Ari Suutari
Hi, Luigi Rizzo wrote: for the chunk at --- 2951,2987 i think it would be better to reuse the 'case TOK_FORWARD', by changing the opcode and messages according to the actual command. Changed. here too i would reuse the existing code more, e.g. in ipfw_log() put 'case O_SETNEXTHO

Re: Policy routing idea (Was: ipfw: Would it be possible to continue processing rest of rules after match ?)

2005-06-23 Thread Ari Suutari
Hi, The patches which implement both "ipfw setnexthop" and "ipfw defaultroute" are at: http://www.suutari.iki.fi/freebsd/ipfw-nexthop.patch http://www.suutari.iki.fi/freebsd/netinet-nexthop.patch These are against 5.4-RELEASE - if that causes too much trouble I can try to generate them aga

Re: Policy routing idea (Was: ipfw: Would it be possible to continue processing rest of rules after match ?)

2005-06-22 Thread Ari Suutari
Ari Suutari wrote: ipfw setnexthop g2.g2.g2.g2 tcp from any to any defaultroute Looking at code, maybe "defaultroute" option should be named verdstreach ? Ari S. ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.o

Re: Policy routing idea (Was: ipfw: Would it be possible to continue processing rest of rules after match ?)

2005-06-22 Thread Ari Suutari
Luigi Rizzo wrote: I really believe the "setnexthop" action is the best approach. I'll start implementing this approach today if other work permits. I think I'll also add new rule option "defaultroute" which matches if packet destination has no specific route in routing table. That would make i

Re: Policy routing idea (Was: ipfw: Would it be possible to continue processing rest of rules after match ?)

2005-06-22 Thread Ari Suutari
yes i think you should reuse the tag, just add a new opcode so that the action is attach the mtag to the mbuf if not there yet (maybe override its content if you believe you could match multiple rules of this type) and then continue processing as in a 'count' action. Differences to "ipfw fwd" se

Re: Policy routing idea (Was: ipfw: Would it be possible to continue processing rest of rules after match ?)

2005-06-22 Thread Ari Suutari
Hi, Luigi Rizzo wrote: i suggest to implement a new action 'setnexthop' which stores the next hop as an MTAG with the packet (so it is preserved if the packet gets passed to dummynet). I took a quick look at how ipfw forward has been implemented. It seems to use PACKET_TAG_IPFO

Policy routing idea (Was: ipfw: Would it be possible to continue processing rest of rules after match ?)

2005-06-20 Thread Ari Suutari
Hi, I sent this to ipfw mailing list some time ago, but got no response. I would like to adjust ipfw behaviour with fwd rules to make policy routing easier (ie. make it separete from filtering rules). I would just like some input if this makes any sense (or is possible at all with current design)

Re: IPSEC traffic doesn't work realiably after upgrading from 4.11 to 5.4

2005-05-12 Thread Ari Suutari
(replying to myself again...) Ari Suutari wrote: Some more information to this one: This seems to be some kind of odd routing problem. I just recreated the setup under vmware and noticed that when the problem occurs the outgoing ESP packets are flowing on interface that has the default route (em0

Re: IPSEC traffic doesn't work realiably after upgrading from 4.11 to 5.4

2005-05-12 Thread Ari Suutari
looks correct (ie. points to tun0), but ESP packets don't seem to obey it (until setkey -F is issued). Ari S. Ari Suutari wrote: Hi, I have upgraded a vpn server from FreeBSD 4.11 to 5.4-RELEASE. The box as about 20 vpn connections to other FreeBSD machines, the physical connection is via

IPSEC traffic doesn't work realiably after upgrading from 4.11 to 5.4

2005-05-11 Thread Ari Suutari
Hi, I have upgraded a vpn server from FreeBSD 4.11 to 5.4-RELEASE. The box as about 20 vpn connections to other FreeBSD machines, the physical connection is via tun0 ... tun20 devices. Traffic flow is something like this: my internal net -> vpn server em1 -> vpn server ipsec ->

Gemtek WLAN (conexant prism) and NDISulator problems

2005-03-09 Thread Ari Suutari
Hi, I have been trying to get WLAN working on my laptop. The built-in card is Gemtek WL850, which is using (as far as I understand) using conexant prism chip. As there is no driver for this, I have been trying to use Windows XP drivers with if_ndis. I have managed to get if_ndis.ko built ok. When I

Re: (review request) ipfw and ipsec processing order foroutgoingpackets

2004-12-13 Thread Ari Suutari
Hi, All I intend to provide is a way to specify whether you want IPSEC before or after pfil_hooks. By default it will be as it is today and work exactly the same. OK, this sounds like a good step. Maybe the next step could be third choice like 'both before and after' for us who are perhaps

Re: (review request) ipfw and ipsec processing order foroutgoingpackets

2004-12-09 Thread Ari Suutari
Hi, With the changes you can chose whether you want to do firewallig before ipsec processing or after but not both. I am unsure if I get that right but that's what the ipsec flag in ipfw2 is for and it is heavily used to filter ipsec encrypted traffic and the same traffic, tagged to come from an ip

Re: (review request) ipfw and ipsec processing order foroutgoingpackets

2004-12-07 Thread Ari Suutari
Hi, But I may be missing something because I can see no way in firewall rules to distinguish between the before IPSec processing hook and the after IPSec processing one. Could you clarify this for me please ? There is a keyword "ipsec" in ipfw2, which matches if packet has emerged from ipsec

Re: ipfw and ipsec processing order for outgoing packets wrong

2004-11-01 Thread Ari Suutari
Hi, The counters for queue 1 keeps increasing when I do a ftp out even for non-ACK packets but the other counters for queue 2-4 doesn't move at all so it seems like everything is going out one queue instead of what the rules actually say. I have one pipe configured as 480Kbit/sec which is what rul

Re: ipfw and ipsec processing order for outgoing packets wrong

2004-11-01 Thread Ari Suutari
Hi, But that gives us 2 blocks of identical code to maintain. To me that doesn't seem The Right Way(tm), but I haven't yet thought of a way that is better. My pseudo-code was more trying to point out the needed functionality. I wouldn't say either that just copying and pasting the similar bl

Re: ipfw and ipsec processing order for outgoing packets wrong

2004-10-31 Thread Ari Suutari
Hi, I've been pondering the same issue and am currently running 5.3-R modified in the way you've described. (diff at http://jodocus.org/ipsec-pfil.diff I'm not an experienced kernel-hacker, so use at own risk) Great, I'll have to try this. For IPSEC this also means that the resulting ESP and A

Re: ipfw and ipsec processing order for outgoing packets wrong

2004-10-31 Thread Ari Suutari
ERGIF is set. Now, ip_output is quite central part in ip stack. I would be happy if someone who knows that part better than me could implement this (I can sure test it easily). Ari S. Cheers, Vince On Sat, 30 Oct 2004 09:27:50 +0300, Ari Suutari <[EMAIL PROTECTED]> wrote: Hi, I n

ipfw and ipsec processing order for outgoing packets wrong

2004-10-29 Thread Ari Suutari
Hi, I noticed that processing order of ipsec and ipfw (pfil_hook) is not correct for outgoing packets. Currently, ipsec processing is done first, which makes packets to go through without firewall inspection. This might be a security problem for someone, but at least it breaks stateful rule handli

Re: ipfw - natd - squid - 3 Nic's - 1 FBSD 5.1 server and routingquestion

2003-08-05 Thread Ari Suutari
Hi, On Monday 04 August 2003 17:41, [EMAIL PROTECTED] wrote: > tcp_outgoing_address 10.24.194.163 > but since the default gateway is to the telco interface, the request is > sent to the telco. Maybe something like ipfw add fwd ggg.ggg.ggg.ggg tcp from 10.24.194.163 to any

Re: patches for ipsec packet filtering support in ipfw2

2003-06-19 Thread Ari Suutari
Hi, > * Ari Suutari: > > > Here are two small patches (done on 5.1-RELEASE, but should be ok > > for -current also) which add new "ipsec" flag to ipfw2. > > i did not receive any attachments. will this functionality be > included into freebsd-5 in the fut

patches for ipsec packet filtering support in ipfw2

2003-06-19 Thread Ari Suutari
Hi, Here are two small patches (done on 5.1-RELEASE, but should be ok for -current also) which add new "ipsec" flag to ipfw2. Rules with this flag match only packets that have ipsec history (ie. came from ipsec processing). Rules with "not ipsec" match only non-ipsec packets. Without the new keywo

Enhancements for racoon

2003-06-17 Thread Ari Suutari
Hi, I have developed two enhancements for racoon. First one is simple support for 'keepalive' statement in racoon configuration file, which causes racoon to keep link up with remote end even when there is no traffic. It also does this when racoon is started, which is very nice since it also cause

Re: New natd available

2002-09-30 Thread Ari Suutari
Hi, Great to see natd maintained. As original author, I kind of miss the long command line options (ie. something like --daemon in addition to -d). The new code seems to use always a select-recvfrom combination to get the data. Someone complained to me about the old natd performance when that wa

Re: squeeze more performance out of natd?

2002-02-11 Thread Ari Suutari
Hi, On Monday 11 February 2002 16:15, Mike Silbersack wrote: > On Mon, 11 Feb 2002, Alfred Perlstein wrote: > > > another way would be to loop doing recvfrom's until EAGAIN is returned, > > I suspect this may give at least a 2 fold increase in performance and > > is trivial to accomplish. > >

Re: Filtering packets received through an ipsec tunnel

2002-01-15 Thread Ari Suutari
Hi, On Tuesday 15 January 2002 14:18, Alex Le Heux wrote: > > > Maybe one could remove this, add 'ipsec' flag to ipfw > > (which would use the above ipsec_gethist to match it) > > so the syntax would be something like this: > > > > ipfw add pass tcp from a to b ipsec setup # m

Re: Filtering packets received through an ipsec tunnel

2002-01-14 Thread Ari Suutari
Hi, On Monday 14 January 2002 19:55, Rene de Vries wrote: > Kshitij, > A good solution, from my point of view, would be, instead of passing > evering thing from an ipsec tunnel, using ip-filter (&co, but without > dummyet) on emerging packets. These packets should then have a different > inter

Re: natd and ICMP 3.4 packets

2001-07-13 Thread Ari Suutari
> > > > Doesn't sound good that IP header with private IP address > > gets sent to internet. - after all, the 195.168.3.210 host on internet knows > > nothing about 10.10.1.2... > > > We have discussed this before with Brian and Charles, and have come > up to an agreement that FIREWALL should bloc

Re: natd and ICMP 3.4 packets

2001-07-13 Thread Ari Suutari
Hi, Doesn't sound good that IP header with private IP address gets sent to internet. - after all, the 195.168.3.210 host on internet knows nothing about 10.10.1.2... Ari S. - Original Message - From: "Bohuslav Plucinsky" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Cc: <[EMAIL PROT

Re: IPFW & IPsec tunnel mode

2000-12-17 Thread Ari Suutari
t - ITSD Open Systems Group" <[EMAIL PROTECTED]> To: "Ari Suutari" <[EMAIL PROTECTED]> Cc: <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]> Sent: 16. joulukuuta 2000 13:24 Subject: Re: IPFW & IPsec tunnel mode > In message <001301c0601e$34cab880$[EMAIL PROTE