On Tue, Apr 14, 2009 at 04:24:44PM -0400, Scott Ullrich wrote:
> On Thu, Feb 26, 2009 at 10:11 AM, VANHULLEBUS Yvan wrote:
> > On Tue, Feb 17, 2009 at 02:41:41PM +, Bjoern A. Zeeb wrote:
> [snip]
> >> We have about 3 months left to get that patch in for 8; ideally 6
> >> weeks. Can you update
The following reply was made to PR kern/133572; it has been noted by GNATS.
From: Dennis Melentyev
To: Max Laier
Cc: bug-follo...@freebsd.org
Subject: Re: kern/133572: [ppp] [hang] incoming PPTP connection hangs the
system
Date: Wed, 15 Apr 2009 13:27:41 +0300
Hi Max,
It was some h
I know it's late in the 7.2 game, but does our OpenSSL maintainer know
about this?
http://sctp.fh-muenster.de/dtls-patches.html
It would be nice to have in a release, although I'm tracking branches
for anything I'm doing at the moment.
JFYI,
BMS
___
The following reply was made to PR kern/131153; it has been noted by GNATS.
From: Adam K Kirchhoff
To: bug-follo...@freebsd.org, ad...@voicenet.com
Cc:
Subject: Re: kern/131153: [iwi] iwi doesn't see a wireless network
Date: Wed, 15 Apr 2009 07:18:15 -0400
This problem persists with 7.2-PRERE
Hi. I have a problem with Subj. In mailing list quagga me say for
mailing to frebsd list.
Quote:
It is well documented that md5 'password' authentication for bgpd works,
but only for outgoing packets... there is no way for FreeBSD (to my
knowledge) to actually verify packets inbound.
...it's bet
The following reply was made to PR kern/133490; it has been noted by GNATS.
From: plethor...@aim.com
To: bug-follo...@freebsd.org
Cc:
Subject: Re: kern/133490: [bpf] [panic] 'kmem_map too small' panic on Dell r900
when
bpf_bufsize and bpf_maxbufsize are increased
Date: Wed, 15 Apr 2009 10:00:0
On Wed, 15 Apr 2009, wrote:
Hi. I have a problem with Subj. In mailing list quagga me say for
mailing to frebsd list.
Quote:
It is well documented that md5 'password' authentication for bgpd works,
but only for outgoing packets... there is no way for FreeBSD (to my
knowledge) to actually ver
If modelling ideal situation, then:
md5 password doesn`t match or empty, then peering must be closed...
Now md5 working only for outgoing packets, not for input. And peering
not closed if password miss or not match. because bsd not check
incoming packets, i think...
__
Hi,
We're having trouble virtualizing FreeBSD 7+ on ESX because of an issue
with the stack's TSO implementation: it sometimes generates TSO packets
whose payload size is actually smaller than the MSS.
The faulty logic is described, along with a patch, in PR #132832. It
has been opened for a while
On Wed, Apr 15, 2009 at 3:12 AM, VANHULLEBUS Yvan wrote:
> Actually, not, because there are no bits left in inp_flags, so we are
> actually looking for another location to put them.
Sounds good and thanks for the information. We will be happy to test
the next patch when it's ready.
Thanks for
Hi all,
I'm studying how Netgraph system works and trying to write my own
netgraph node similar to ng_bridge.
It catches packets from lower ng_ether hooks and transmits it to other
interfaces using mac address hashtable.
Packet processing in my node implemented similar to ng_bridge_rcvdata()
Interesting. That might explain a problem that Mike Silbersack is
seeing with the latest em driver on vmware.
I don't know of any NICs that actually choke on such frames.
Nonetheless, it is silly behavior. I'll try to see if we can get this
fixed before 7.2.
Thanks,
Kip
On Wed, Apr 15, 2009 at 8
Hi Bruce,
at least one member of the OpenSSL core team (Steven) has integrated
our patches regarding bug fixes in the source code.
So they will be included in the next release of OpenSSL.
Best regards
Michael
On Apr 15, 2009, at 2:36 PM, Bruce Simpson wrote:
I know it's late in the 7.2 game, b
No, the problem Mike is having is due to an issue in our new shared code
in how we get the mac address, we changed it to support alt mac addresses,
and it works find on our hardware, there is an issue in the vmware
emulation.
Nevertheless, if there's a problem in the TSO code it would be nice to g
Алексей Блинков wrote:
If modelling ideal situation, then:
md5 password doesn`t match or empty, then peering must be closed...
Now md5 working only for outgoing packets, not for input. And peering
not closed if password miss or not match. because bsd not check
incoming packets, i think...
Michael Tüxen wrote:
Hi Bruce,
at least one member of the OpenSSL core team (Steven) has integrated
our patches regarding bug fixes in the source code.
So they will be included in the next release of OpenSSL.
That's excellent news, and these fixes look good, but I was more
wondering if this
Hello Sir/Mdm
I would like to know is there any solution to problem show below, because we
use FreeBSD 7.0 in our network structure and we are meeting face to face to
this problem everyday
kern/121555: [panic] Fatal trap 12: current process = 12 (swi1: net)
From:
Alexey Sopov
Dat
17 matches
Mail list logo