use a well mantained daemon instead of using my own script.
Thank you for your time.
Best regards,
Pedro Caetano
On Sat, Nov 16, 2024 at 10:51 PM Will wrote:
>
>
> On Nov 16, 2024, at 12:41, Stuart Henderson wrote:
>
> What do you mean by "refresh the connection”?
>
>
>
The hardware is good.
After an AC incident, I've had some of those cavium nics melt the cpu
thermal paste, dripping all over the mainboard. (this nics are inserted
into a riser card, facing down the mainboard)
The machine kept running!
A quarta, 24/06/2020, 21:12, Pierre Emeriaud
escreveu:
Hi misc@ happy new year!
While running snapshot #584 on amd64 I noticed setting addresses using
ifconfig is not consistent for ipv4 and ipv6.
Is this expected behavior? I wasn't able to find anything in the FAQ.
Many thanks,
Pedro Caetano
pcaetano@rtr $ > doas ifconfig vether10
Hi,
This is no longer an issue with latest snapshot.
Best regards,
Pedro Caetano
A sexta, 13/12/2019, 14:05, Pedro Caetano
escreveu:
> Hi David, thank you for your reply
>
> I will test that and report back.
>
>
> Best regards,
> Pedro Caetano
>
> On Fri, Dec 13, 2
Hi David, thank you for your reply
I will test that and report back.
Best regards,
Pedro Caetano
On Fri, Dec 13, 2019 at 1:27 PM David Gwynne wrote:
> aggr(4) didn't exist in OpenBSD 6.6, so maybe that's the difference. Does
> the problem go away if you use trunk(4) i
ely I cannot tell precisely when this behavior started, but I
guess this was not an issue on 6.5.
Please let me know if any more information is needed.
Best regards,
Pedro Caetano
2019/12/03/ifconfig_vl3800.jpg
https://picpaste.me/images/2019/12/03/ifconfig_aggr0.jpg
Best regards,
Pedro Caetano
On Tue, Dec 3, 2019 at 12:35 PM Hrvoje Popovski wrote:
> On 3.12.2019. 13:15, Pedro Caetano wrote:
> > Hi Hrvoje, thank you for the fast reply,
> >
> > Unfortu
tion is working on -current with em(4) nics.
Best regards,
Pedro Caetano
A terça, 3/12/2019, 12:01, Hrvoje Popovski escreveu:
> On 3.12.2019. 12:21, Pedro Caetano wrote:
> > Hi misc@
> >
> > I'm running openbsd 6.6 with latest patches running on a pair of hp dl
>
ion works on my lab which is a -current box with em(4) nics
and an old catyst 2960 switch.
Thank you for your time,
Pedro Caetano
Hi,
It looks like a usecase for binat.
http://man.openbsd.org/pf.conf#binat-to
BR,
Pedro Caetano
A segunda, 25/11/2019, 15:40, Henry Jensen escreveu:
> Hi,
>
> my ISP provides me with a /29 subnet, including 5 usable public IPv4
> addresses.
>
> Until now my router use
what additional information is needed in order to debug
this.
Ping (from a workstation) has a strange behaviour when the router is
affected.
(for brevity sake duplicated host unreachable and network unreachable have
been redacted)
Thank you for any help
vant interfaces.
(vmx0, etherip0, bridge0, em0)
On router B, using tcpdump traffic arrives at the vmx0 interface, but never
reaches bridge0, etherip0 or em0.
For the sake of simplicity pf is disabled on both routers.
Thank you for any help.
Best regards,
Pedro Caetano
Sorry, sloppy fingers' fault. It is sd0.
On Thu, Feb 2, 2017 at 10:11 PM, Jiri B wrote:
> On Thu, Feb 02, 2017 at 09:28:14PM +0000, Pedro Caetano wrote:
> > Hi misc@
> >
> > Today while upgrading a few vms i noticed an error while auto_upgrade was
> > runni
ch file or directory
/dev/sd0a (17f9850d83e601df.a) on /mnt type ffs (rw, local, wxallowed)
Cheers,
Pedro Caetano
I was missing the anchor argument in pf when listing tables.
Thank you for your insight,
Pedro Caetano
On Thu, Nov 10, 2016 at 6:16 AM, Jan Kalkus wrote:
>
> > On Nov 9, 2016, at 10:37 PM, Jan Kalkus wrote:
> >
> >> Hi,
> >>
> >> How does one use
t from (self) to any tag GOOD
pass out inet from $int_networks to any nat-to (egress) tag GOOD
match out inet from $int_networks to any nat-to (egress) tag GOOD
pass out inet6 from em2:network to any tag GOOD
pass out inet6 proto udp from em2:network to $v6resolver port 53 tag
GOOD
block quick inet ! tagged GOOD
}
# > pfctl -f /etc/pf.conf
pfctl: warning: namespace collision with global table.
Thank you for your help,
Pedro Caetano
s this the expected behaviour?
Thank you for any clarifications.
Best regards,
Pedro Caetano
CDs just arrived in Lisbon, Portugal.
Thank you for the tireless effort to get this release out!
BR,
Pedro Caetano
Hi Christian,
Thank you clarifying that point.
BR,
Pedro Caetano
On Sat, Jan 23, 2016 at 8:56 PM, Christian Weisgerber
wrote:
> On 2016-01-23, Pedro Caetano wrote:
>
> > The checksum errors are visible in tcpdump.
> >
> > pcaetano@soekris $ > doas tcpdump -nnvv
[bad tcp cksum
e80c! -> a0f1] 76:76(0) ack 400 win 2048 (DF) (ttl 64, id 40799, len 52)
Please let me know if/how further testing is required.
Thank you for your help,
Pedro Caetano
pf.conf
icmp_types = "{ echoreq, unreach }"
icmp6_types = "{ echoreq unreach timex paramprob }&q
Hi,
I guess one could use pf's divert-to and dnsfilter.
http://marc.info/?l=openbsd-misc&m=134187877220567&w=2
Regards,
Pedro Caetano
On Mon, Nov 9, 2015 at 9:45 PM, sven falempin
wrote:
> For the first time ever i did something with iptable
> that i dont know how to do
Fixed it for me, thank you.
BR,
Pedro Caetano
On Wed, Apr 15, 2015 at 10:34 AM, Martin Pieuchot wrote:
> On 14/04/15(Tue) 19:50, Edgar Pettijohn III wrote:
> > On Apr 14, 2015, at 5:08 PM, Dimitris Papastamos wrote:
> >
> > > On Tue, Apr 14, 2015 at 07:48:55PM +0
Hi,
After establishing a openvpn tunnel, the system frezzes completely when
traffic is pushed trough the tunnel.
Impossible to change x console or interact with the system.
Openvpn 2.3.6 installed from packages.
Best regards,
Pedro Caetano
OpenBSD 5.7-current (GENERIC.MP) #795: Fri Apr 10 12
g this specific nic?
Thanks in advance,
Pedro Caetano
24 matches
Mail list logo