Old Synopsis: Certain hardware produces "Network is unreachable" errors for
scanning tools
New Synopsis: [tcp] Certain hardware produces "Network is unreachable" errors
for scanning tools
Responsible-Changed-From-To: freebsd-bugs->freebsd-net
Responsible-Changed-By: linimon
Responsible-Changed-W
Bonjour Freebsd-net,
J'ai créé mon profil Facebook sur lequel je peux publier mes photos, mes vidéos
et des événements. Je souhaite vous ajouter à mes amis pour que vous puissiez y
accéder. Pour cela, vous devez d'abord vous inscrire à Facebook ! Vous pourrez
ensuite créer votre propre profil.
Thanks to Pawel Jakub Dawidek, I found the empty "arp -an" output
bug. The bug was introduced in my last commit that attempted at
providing some level of binary compatibility.
Please sync file ./src/sys/net/rtsock.c to svn r187328
Thanks,
-- Qing
-Original Message-
From: Larry Rosenm
Is there any command identical to:
iptables -A INPUT -p tcp -m tcp -dport 80 -j TARPIT
If no, does anyone ever tried to implement this feature?
___
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To uns
what does TARPIT do ?
On Fri, Jan 16, 2009 at 11:20 AM, Alexey Ivanov wrote:
> Is there any command identical to:
>iptables -A INPUT -p tcp -m tcp -dport 80 -j TARPIT
>
> If no, does anyone ever tried to implement this feature?
>
> ___
> freebsd
Hi.
The netipsec.c patch should not have been present, it has probably
been generated either by a manipulation error from myself or by some
race condition between a svn up and a svn diff to produce the patch.
Please test the following patch:
http://people.freebsd.org/~vanhu/NAT-T/patch-natt-test-
This particular iptables module keeps the incoming connection up and
running, but it sends ACKs advertising a window size of 0 bytes, so
that the remote end can't send any data until the local process has
decided it's ok to do so. Basically it's used to slow down spammers
and worms.
On Fri, Jan 16
see spamd for mail and you may use the don't peer list of sbl .
2009/1/16 Vlad GALU
> This particular iptables module keeps the incoming connection up and
> running, but it sends ACKs advertising a window size of 0 bytes, so
> that the remote end can't send any data until the local process has
>
see spamd for mail and you may use the don't peer list of sbl .
2009/1/16 Vlad GALU
> This particular iptables module keeps the incoming connection up and
> running, but it sends ACKs advertising a window size of 0 bytes, so
> that the remote end can't send any data until the local process has
>
On Fri, Jan 16, 2009 at 12:20:21PM +0300, Alexey Ivanov wrote:
> Is there any command identical to:
> iptables -A INPUT -p tcp -m tcp -dport 80 -j TARPIT
>
> If no, does anyone ever tried to implement this feature?
I'm thinking on implementing it in ipfw but it'll be a week or two later,
Hello,
I am trying the new FIB stuff on -STABLE with IPFW, I made many tests
and it did not work as I expected.
Quick testing:
# lynx -dump http://www.whatismyip.org
200.165.75.10
# setfib -1 lynx -dump http://www.whatismyip.org
189.52.141.2
# setfib -2 lynx -dump http://www.whatismyip.org
201
The following reply was made to PR kern/128917; it has been noted by GNATS.
From: Marc Peters
To: bug-follo...@freebsd.org, kita...@epicsol.org
Cc:
Subject: Re: kern/128917: [wpi] [panic] if_wpi and wpa+tkip causing kernel
panic
Date: Fri, 16 Jan 2009 13:34:29 +0100
-BEGIN PGP SIGNED MES
Hello,
I am trying the new FIB stuff on -STABLE with IPFW, I made many tests
and it did not work as I expected.
Quick testing:
# lynx -dump http://www.whatismyip.org
200.165.75.10
# setfib -1 lynx -dump http://www.whatismyip.org
189.52.141.2
# setfib -2 lynx -dump http://www.whatismyip.org
20
Eduardo Meyer wrote:
Hello,
I am trying the new FIB stuff on -STABLE with IPFW, I made many tests
and it did not work as I expected.
Quick testing:
# lynx -dump http://www.whatismyip.org
200.165.75.10
# setfib -1 lynx -dump http://www.whatismyip.org
189.52.141.2
# setfib -2 lynx -dump http:/
Synopsis: NFS / rpc.lockd deadlock on 7.1-R
Responsible-Changed-From-To: freebsd-bugs->freebsd-net
Responsible-Changed-By: gavin
Responsible-Changed-When: Fri Jan 16 19:55:38 UTC 2009
Responsible-Changed-Why:
Over to maintainer(s). Looks like there should be pretty much
all the info here necessa
verified to fix the arp problem!
Thanks, Qing!
--
Larry Rosenman http://www.lerctr.org/~ler
Phone: +1 512-248-2683E-Mail: l...@lerctr.org
US Mail: 430 Valona Loop, Round Rock, TX 78681-3893
-Original Message-
From: owner-freebsd-curr...@freebsd.org
[m
On Jan 16, 2009, at 3:50 AM, Eugene Perevyazko wrote:
On Fri, Jan 16, 2009 at 12:20:21PM +0300, Alexey Ivanov wrote:
Is there any command identical to:
iptables -A INPUT -p tcp -m tcp -dport 80 -j TARPIT
If no, does anyone ever tried to implement this feature?
I'm thinking on implement
Old Synopsis: [patch] No good way to set ipfilter variables at boot time
New Synopsis: [rc.d] [patch] No good way to set ipfilter variables at boot time
Responsible-Changed-From-To: freebsd-bugs->freebsd-net
Responsible-Changed-By: linimon
Responsible-Changed-When: Fri Jan 16 22:44:56 UTC 2009
Res
I narrowed this bug down to the following patch to djb's ucspi-tcp
(adds ipv6 functionality):
http://www.fefe.de/ucspi/
I don't think that userland processes should be able to wreak that
much havoc on the network stack. Another thing of note is that even
if I kill the processes causing the proble
The following reply was made to PR kern/130059; it has been noted by GNATS.
From: "Jason DiCioccio"
To: bug-follo...@freebsd.org
Cc:
Subject: Re: kern/130059: [panic] Leaking 50k mbufs/hour
Date: Fri, 16 Jan 2009 16:51:47 -0800
I narrowed this bug down to the following patch to djb's ucspi-tc
20 matches
Mail list logo