Hej p� er,

h�r �r mitt problem:

box1 (openbsd 2.5) ip: 192.168.1.1 netmask 255.255.255.0
box2 (slackware 4.0) ip : 192.168.1.2 netmask 255.255.255.0


box1 fungerar perfekt men det g�r inte box2, jag har satt upp alla n�t.
kortet och det fungerar. men jag kan inte ansluta fr�n box2 --> box1
den svarar inte heller p� ICMP requests, det konstiga �r att om jag k�r
windows p� box2 s� kan jag ansluta till box1. Jag har redan tagit upp
detta p� en openbsd mailing lista, men eftersom problemet ligger p�
linux burken s� �r det nog b�ttre jag tar upp det h�r:
jag skickar med lite routeing tabeller och tcpdump m.m.


BOX1 (openbsd) 

Routing tables

Internet:
Destination        Gateway            Flags     Refs     Use    Mtu  Interface
127/8              127.0.0.1          UGRS        0        0      -  lo0
127.0.0.1          127.0.0.1          UH          3       24      -  lo0
192.168.1/24       link#1             UC          0        0      -  xl0
192.168.1.1        127.0.0.1          UGHS        0        0      -  lo0
192.168.1.2        0:a0:24:87:7c:c5   UHL         0        3      -  xl0
224/4              127.0.0.1          URS         0        0      -  lo0

Encap:
Source address/netmask          Port  Destination address/netmask     Port  Proto 
SA(Address/SPI/Proto)     
Name    Mtu   Network     Address              Ipkts Ierrs    Opkts Oerrs  Coll
lo0     32768 <Link>                              24     0       24     0     0
lo0     32768 loopback    localhost               24     0       24     0     0
lo1*    32768 <Link>                               0     0        0     0     0
xl0     1500  <Link>      00:10:4b:af:01:3d       20     0        5     0     0
xl0     1500  192.168.1/2 turk                    20     0        5     0     0
ep0*    1500  <Link>      00:a0:24:87:6c:b3        0     0        0     0     0
ep1*    1500  <Link>      00:a0:24:87:6c:b3        0     0        0     0     0
sl0*    296   <Link>                               0     0        0     0     0
sl1*    296   <Link>                               0     0        0     0     0
ppp0*   1500  <Link>                               0     0        0     0     0
ppp1*   1500  <Link>                               0     0        0     0     0
tun0*   3000  <Link>                               0     0        0     0     0
tun1*   3000  <Link>                               0     0        0     0     0
enc0*   1536  none        none                     0     0        0     0     0
enc0*   1536  <Link>                               0     0        0     0     0
bridge0 1500  <Link>                               0     0        0     0     0
bridge1 1500  <Link>                               0     0        0     0     0

lo0: flags=8009<UP,LOOPBACK,MULTICAST>
        inet 127.0.0.1 netmask 0xff000000 
lo1: flags=8008<LOOPBACK,MULTICAST>
xl0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST>
        media: Ethernet 10baseT (10baseT half-duplex)
        inet 192.168.1.1 netmask 0xffffff00 broadcast 192.168.1.255
ep0: flags=8822<BROADCAST,NOTRAILERS,SIMPLEX,MULTICAST>
        media: Ethernet 10baseT
ep1: flags=8822<BROADCAST,NOTRAILERS,SIMPLEX,MULTICAST>
        media: Ethernet 10baseT
sl0: flags=c010<POINTOPOINT,LINK2,MULTICAST>
sl1: flags=c010<POINTOPOINT,LINK2,MULTICAST>
ppp0: flags=8010<POINTOPOINT,MULTICAST>
ppp1: flags=8010<POINTOPOINT,MULTICAST>
tun0: flags=10<POINTOPOINT>
tun1: flags=10<POINTOPOINT>
enc0: flags=8<LOOPBACK>
bridge0: flags=0<>
bridge1: flags=0<>




tcpdump -e -n (fr�n Openbsd boxen, n�r jag pingade med slack. burken)


19:57:47.452627 0:a0:24:87:7c:c5 ff:ff:ff:ff:ff:ff 0806 60: arp who-has 192.168.1.1 
tell 192.168.1.2
19:57:47.452688 0:10:4b:af:1:3d 0:a0:24:87:7c:c5 0806 60: arp reply 192.168.1.1 is-at 
0:10:4b:af:1:3d
19:57:48.448041 0:a0:24:87:7c:c5 ff:ff:ff:ff:ff:ff 0806 60: arp who-has 192.168.1.1 
tell 192.168.1.2
19:57:48.448089 0:10:4b:af:1:3d 0:a0:24:87:7c:c5 0806 60: arp reply 192.168.1.1 is-at 
0:10:4b:af:1:3d
19:57:49.448333 0:a0:24:87:7c:c5 ff:ff:ff:ff:ff:ff 0806 60: arp who-has 192.168.1.1 
tell 192.168.1.2
19:57:49.448380 0:10:4b:af:1:3d 0:a0:24:87:7c:c5 0806 60: arp reply 192.168.1.1 is-at 
0:10:4b:af:1:3d
19:57:50.448731 0:a0:24:87:7c:c5 ff:ff:ff:ff:ff:ff 0806 60: arp who-has 192.168.1.1 
tell 192.168.1.2
19:57:50.448778 0:10:4b:af:1:3d 0:a0:24:87:7c:c5 0806 60: arp reply 192.168.1.1 is-at 
0:10:4b:af:1:3d
19:57:51.448932 0:a0:24:87:7c:c5 ff:ff:ff:ff:ff:ff 0806 60: arp who-has 192.168.1.1 
tell 192.168.1.2
19:57:51.448978 0:10:4b:af:1:3d 0:a0:24:87:7c:c5 0806 60: arp reply 192.168.1.1 is-at 
0:10:4b:af:1:3d
19:57:52.449229 0:a0:24:87:7c:c5 ff:ff:ff:ff:ff:ff 0806 60: arp who-has 192.168.1.1 
tell 192.168.1.2
19:57:52.449275 0:10:4b:af:1:3d 0:a0:24:87:7c:c5 0806 60: arp reply 192.168.1.1 is-at 
0:10:4b:af:1:3d
19:57:53.449599 0:a0:24:87:7c:c5 ff:ff:ff:ff:ff:ff 0806 60: arp who-has 192.168.1.1 
tell 192.168.1.2
19:57:53.449642 0:10:4b:af:1:3d 0:a0:24:87:7c:c5 0806 60: arp reply 192.168.1.1 is-at 
0:10:4b:af:1:3d
19:57:54.449823 0:a0:24:87:7c:c5 ff:ff:ff:ff:ff:ff 0806 60: arp who-has 192.168.1.1 
tell 192.168.1.2
19:57:54.449867 0:10:4b:af:1:3d 0:a0:24:87:7c:c5 0806 60: arp reply 192.168.1.1 is-at 
0:10:4b:af:1:3d
19:57:55.450127 0:a0:24:87:7c:c5 ff:ff:ff:ff:ff:ff 0806 60: arp who-has 192.168.1.1 
tell 192.168.1.2
19:57:55.450170 0:10:4b:af:1:3d 0:a0:24:87:7c:c5 0806 60: arp reply 192.168.1.1 is-at 
0:10:4b:af:1:3d
19:57:56.450503 0:a0:24:87:7c:c5 ff:ff:ff:ff:ff:ff 0806 60: arp who-has 192.168.1.1 
tell 192.168.1.2
19:57:56.450546 0:10:4b:af:1:3d 0:a0:24:87:7c:c5 0806 60: arp reply 192.168.1.1 is-at 
0:10:4b:af:1:3d
19:57:57.450735 0:a0:24:87:7c:c5 ff:ff:ff:ff:ff:ff 0806 60: arp who-has 192.168.1.1 
tell 192.168.1.2
19:57:57.450787 0:10:4b:af:1:3d 0:a0:24:87:7c:c5 0806 60: arp reply 192.168.1.1 is-at 
0:10:4b:af:1:3d


[[[[[h�r �r lite statestik fr�n slackware burken :]]]]]


[ipfwadm]
IP firewall input rules, default policy: accept
type  prot source               destination          ports

IP firewall output rules, default policy: accept
type  prot source               destination          ports

IP firewall forward rules, default policy: accept
type  prot source               destination          ports

[ifconfig]
eth0      Link encap:Ethernet  HWaddr 00:A0:24:87:7C:C5  
          inet addr:192.168.1.2  Bcast:192.168.1.255  Mask:255.255.255.0
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:21 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:100 
          Interrupt:10 Base address:0x300 

lo        Link encap:Local Loopback  
          inet addr:127.0.0.1  Mask:255.0.0.0
          UP LOOPBACK RUNNING  MTU:3924  Metric:1
          RX packets:59 errors:0 dropped:0 overruns:0 frame:0
          TX packets:59 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0 

[netstat -rn]
Kernel IP routing table
Destination     Gateway         Genmask         Flags   MSS Window  irtt Iface
192.168.1.0     0.0.0.0         255.255.255.0   U         0 0          0 eth0
127.0.0.0       0.0.0.0         255.0.0.0       U         0 0          0 lo
0.0.0.0         192.168.1.1     0.0.0.0         UG        0 0          0 eth0

[netstat -i]
Kernel Interface table
Iface   MTU Met    RX-OK RX-ERR RX-DRP RX-OVR    TX-OK TX-ERR TX-DRP TX-OVR Flg
eth0   1500   0        0      0      0      0       21      0      0      0 BRU
lo     3924   0       59      0      0      0       59      0      0      0 LRU



======Annons================================================
Denna lista sponsras av 3REX AB , [EMAIL PROTECTED] , 031-158010
25376%&/$"&$&#%$!"%$73"!3  <-Ett smakprov av senaste kerneln
============================================================

Till