Re: kern/130605: [tcp] Certain hardware produces "Network is unreachable" errors for scanning tools

2009-01-16 Thread linimon
Old Synopsis: Certain hardware produces "Network is unreachable" errors for scanning tools New Synopsis: [tcp] Certain hardware produces "Network is unreachable" errors for scanning tools Responsible-Changed-From-To: freebsd-bugs->freebsd-net Responsible-Changed-By: linimon Responsible-Changed-W

Découvrez mon profil Facebook

2009-01-16 Thread Dima Antipov
Bonjour Freebsd-net, J'ai créé mon profil Facebook sur lequel je peux publier mes photos, mes vidéos et des événements. Je souhaite vous ajouter à mes amis pour que vous puissiez y accéder. Pour cela, vous devez d'abord vous inscrire à Facebook ! Vous pourrez ensuite créer votre propre profil.

RE: Bacula: VERY SLOW on SAME host

2009-01-16 Thread Li, Qing
Thanks to Pawel Jakub Dawidek, I found the empty "arp -an" output bug. The bug was introduced in my last commit that attempted at providing some level of binary compatibility. Please sync file ./src/sys/net/rtsock.c to svn r187328 Thanks, -- Qing -Original Message- From: Larry Rosenm

TARPIT for pf/ipfw

2009-01-16 Thread Alexey Ivanov
Is there any command identical to: iptables -A INPUT -p tcp -m tcp -dport 80 -j TARPIT If no, does anyone ever tried to implement this feature? ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net To uns

Re: TARPIT for pf/ipfw

2009-01-16 Thread Ivo Vachkov
what does TARPIT do ? On Fri, Jan 16, 2009 at 11:20 AM, Alexey Ivanov wrote: > Is there any command identical to: >iptables -A INPUT -p tcp -m tcp -dport 80 -j TARPIT > > If no, does anyone ever tried to implement this feature? > > ___ > freebsd

Re: NATT patch on current

2009-01-16 Thread VANHULLEBUS Yvan
Hi. The netipsec.c patch should not have been present, it has probably been generated either by a manipulation error from myself or by some race condition between a svn up and a svn diff to produce the patch. Please test the following patch: http://people.freebsd.org/~vanhu/NAT-T/patch-natt-test-

Re: TARPIT for pf/ipfw

2009-01-16 Thread Vlad GALU
This particular iptables module keeps the incoming connection up and running, but it sends ACKs advertising a window size of 0 bytes, so that the remote end can't send any data until the local process has decided it's ok to do so. Basically it's used to slow down spammers and worms. On Fri, Jan 16

Re: TARPIT for pf/ipfw

2009-01-16 Thread Dimitar Vasilev
see spamd for mail and you may use the don't peer list of sbl . 2009/1/16 Vlad GALU > This particular iptables module keeps the incoming connection up and > running, but it sends ACKs advertising a window size of 0 bytes, so > that the remote end can't send any data until the local process has >

Re: TARPIT for pf/ipfw

2009-01-16 Thread Dimitar Vasilev
see spamd for mail and you may use the don't peer list of sbl . 2009/1/16 Vlad GALU > This particular iptables module keeps the incoming connection up and > running, but it sends ACKs advertising a window size of 0 bytes, so > that the remote end can't send any data until the local process has >

Re: TARPIT for pf/ipfw

2009-01-16 Thread Eugene Perevyazko
On Fri, Jan 16, 2009 at 12:20:21PM +0300, Alexey Ivanov wrote: > Is there any command identical to: > iptables -A INPUT -p tcp -m tcp -dport 80 -j TARPIT > > If no, does anyone ever tried to implement this feature? I'm thinking on implementing it in ipfw but it'll be a week or two later,

Multiple Routing Tables (FIB) + IPFW problem as (I?) expected

2009-01-16 Thread Eduardo Meyer
Hello, I am trying the new FIB stuff on -STABLE with IPFW, I made many tests and it did not work as I expected. Quick testing: # lynx -dump http://www.whatismyip.org 200.165.75.10 # setfib -1 lynx -dump http://www.whatismyip.org 189.52.141.2 # setfib -2 lynx -dump http://www.whatismyip.org 201

Re: kern/128917: [wpi] [panic] if_wpi and wpa+tkip causing kernel panic

2009-01-16 Thread Marc Peters
The following reply was made to PR kern/128917; it has been noted by GNATS. From: Marc Peters To: bug-follo...@freebsd.org, kita...@epicsol.org Cc: Subject: Re: kern/128917: [wpi] [panic] if_wpi and wpa+tkip causing kernel panic Date: Fri, 16 Jan 2009 13:34:29 +0100 -BEGIN PGP SIGNED MES

Re: Multiple Routing Tables (FIB) + IPFW problem as (I?) expected

2009-01-16 Thread Luiz Otavio O Souza
Hello, I am trying the new FIB stuff on -STABLE with IPFW, I made many tests and it did not work as I expected. Quick testing: # lynx -dump http://www.whatismyip.org 200.165.75.10 # setfib -1 lynx -dump http://www.whatismyip.org 189.52.141.2 # setfib -2 lynx -dump http://www.whatismyip.org 20

Re: Multiple Routing Tables (FIB) + IPFW problem as (I?) expected

2009-01-16 Thread Julian Elischer
Eduardo Meyer wrote: Hello, I am trying the new FIB stuff on -STABLE with IPFW, I made many tests and it did not work as I expected. Quick testing: # lynx -dump http://www.whatismyip.org 200.165.75.10 # setfib -1 lynx -dump http://www.whatismyip.org 189.52.141.2 # setfib -2 lynx -dump http:/

Re: kern/130628: NFS / rpc.lockd deadlock on 7.1-R

2009-01-16 Thread gavin
Synopsis: NFS / rpc.lockd deadlock on 7.1-R Responsible-Changed-From-To: freebsd-bugs->freebsd-net Responsible-Changed-By: gavin Responsible-Changed-When: Fri Jan 16 19:55:38 UTC 2009 Responsible-Changed-Why: Over to maintainer(s). Looks like there should be pretty much all the info here necessa

RE: Bacula: VERY SLOW on SAME host

2009-01-16 Thread Larry Rosenman
verified to fix the arp problem! Thanks, Qing! -- Larry Rosenman http://www.lerctr.org/~ler Phone: +1 512-248-2683E-Mail: l...@lerctr.org US Mail: 430 Valona Loop, Round Rock, TX 78681-3893 -Original Message- From: owner-freebsd-curr...@freebsd.org [m

Re: TARPIT for pf/ipfw

2009-01-16 Thread Chuck Swiger
On Jan 16, 2009, at 3:50 AM, Eugene Perevyazko wrote: On Fri, Jan 16, 2009 at 12:20:21PM +0300, Alexey Ivanov wrote: Is there any command identical to: iptables -A INPUT -p tcp -m tcp -dport 80 -j TARPIT If no, does anyone ever tried to implement this feature? I'm thinking on implement

Re: conf/130555: [rc.d] [patch] No good way to set ipfilter variables at boot time

2009-01-16 Thread linimon
Old Synopsis: [patch] No good way to set ipfilter variables at boot time New Synopsis: [rc.d] [patch] No good way to set ipfilter variables at boot time Responsible-Changed-From-To: freebsd-bugs->freebsd-net Responsible-Changed-By: linimon Responsible-Changed-When: Fri Jan 16 22:44:56 UTC 2009 Res

Re: kern/130059: [panic] Leaking 50k mbufs/hour

2009-01-16 Thread Jason DiCioccio
I narrowed this bug down to the following patch to djb's ucspi-tcp (adds ipv6 functionality): http://www.fefe.de/ucspi/ I don't think that userland processes should be able to wreak that much havoc on the network stack. Another thing of note is that even if I kill the processes causing the proble

Re: kern/130059: [panic] Leaking 50k mbufs/hour

2009-01-16 Thread Jason DiCioccio
The following reply was made to PR kern/130059; it has been noted by GNATS. From: "Jason DiCioccio" To: bug-follo...@freebsd.org Cc: Subject: Re: kern/130059: [panic] Leaking 50k mbufs/hour Date: Fri, 16 Jan 2009 16:51:47 -0800 I narrowed this bug down to the following patch to djb's ucspi-tc