Re: npf bug(?)

2017-04-02 Thread 6bone

On Sun, 2 Apr 2017, Christos Zoulas wrote:



I am trying to understand the use case here:
1. you want to have V4 DNS and 6to4 service that can generate V4 fragments
2. you want V4 fragments dropped.
3. you can't put V4 rules in your firewall to restrict traffic to only
  those services.

Is that correct?


That is not completely right. I want to filter IPv6 with npf. IPv4 should 
not be filtered. After the activation of npf the statistics shows:


Fragmentation:
1296 fragments
1104 reassembled
7160 failed reassembly

Since IPv6 is no longer reassambling, it must be IPv4 packets. I want to 
make sure that the reassembly errors do not lead to packet losses, 
especially at 6to4.



Regards
Uwe


daily CVS update output

2017-04-02 Thread NetBSD source update

Updating src tree:
P src/distrib/sets/lists/debug/mi
P src/distrib/sets/lists/tests/mi
P src/doc/3RDPARTY
P src/doc/CHANGES
P src/external/bsd/dhcpcd/Makefile
P src/external/bsd/dhcpcd/dist/Makefile
P src/external/bsd/dhcpcd/dist/configure
P src/external/bsd/dhcpcd/dist/src/bpf.c
P src/external/bsd/dhcpcd/dist/src/defs.h
P src/external/bsd/dhcpcd/dist/src/dhcp.c
P src/external/bsd/dhcpcd/dist/src/dhcp6.c
P src/external/bsd/dhcpcd/dist/src/dhcpcd.8.in
P src/external/bsd/dhcpcd/dist/src/dhcpcd.conf.5.in
P src/external/bsd/dhcpcd/dist/src/ipv4ll.h
U src/external/bsd/dhcpcd/examples/Makefile
U src/external/bsd/dhcpcd/examples/hooks/Makefile
P src/external/bsd/dhcpcd/libexec/dhcpcd-hooks/Makefile
P src/external/bsd/dhcpcd/sbin/dhcpcd/Makefile
P src/lib/libc/sys/kqueue.2
P src/share/man/man9/knote.9
P src/sys/arch/hppa/hppa/machdep.c
P src/sys/arch/zaurus/conf/GENERIC
P src/tests/lib/libc/sys/Makefile
U src/tests/lib/libc/sys/msg.h
U src/tests/lib/libc/sys/t_ptrace.c
U src/tests/lib/libc/sys/t_ptrace_amd64_wait.h
U src/tests/lib/libc/sys/t_ptrace_i386_wait.h
U src/tests/lib/libc/sys/t_ptrace_wait.c
U src/tests/lib/libc/sys/t_ptrace_wait.h
U src/tests/lib/libc/sys/t_ptrace_wait3.c
U src/tests/lib/libc/sys/t_ptrace_wait4.c
U src/tests/lib/libc/sys/t_ptrace_wait6.c
U src/tests/lib/libc/sys/t_ptrace_waitid.c
U src/tests/lib/libc/sys/t_ptrace_waitpid.c
U src/tests/lib/libc/sys/t_ptrace_x86_wait.h

Updating xsrc tree:


Killing core files:

Running the SUP scanner:
SUP Scan for current starting at Mon Apr  3 03:01:49 2017
SUP Scan for current completed at Mon Apr  3 03:02:11 2017
SUP Scan for mirror starting at Mon Apr  3 03:02:11 2017
SUP Scan for mirror completed at Mon Apr  3 03:04:49 2017



Updating release-6 src tree (netbsd-6):

Updating release-6 xsrc tree (netbsd-6):

Running the SUP scanner:
SUP Scan for release-6 starting at Mon Apr  3 03:07:25 2017
SUP Scan for release-6 completed at Mon Apr  3 03:07:34 2017



Updating release-7 src tree (netbsd-7):

Updating release-7 xsrc tree (netbsd-7):

Running the SUP scanner:
SUP Scan for release-7 starting at Mon Apr  3 03:09:55 2017
SUP Scan for release-7 completed at Mon Apr  3 03:10:01 2017




Updating file list:
-rw-rw-r--  1 srcmastr  netbsd  55233265 Apr  3 03:12 ls-lRA.gz


Automated report: NetBSD-current/i386 build success

2017-04-02 Thread NetBSD Test Fixture
The NetBSD-current/i386 build is working again.

The following commits were made between the last failed build and the
successful build:

2017.04.03.00.11.45 sevan src/sys/arch/zaurus/conf/GENERIC,v 1.73
2017.04.03.00.42.20 kamil src/external/bsd/dhcpcd/dist/src/bpf.c,v 1.2

Log files can be found at:


http://releng.NetBSD.org/b5reports/i386/commits-2017.04.html#2017.04.03.00.42.20


Re: npf bug(?)

2017-04-02 Thread Christos Zoulas
On Apr 2, 11:16am, 6b...@6bone.informatik.uni-leipzig.de 
(6b...@6bone.informatik.uni-leipzig.de) wrote:
-- Subject: Re: npf bug(?)

| On Fri, 31 Mar 2017, Christos Zoulas wrote:
| 
| > I would add some rules to block the ipv4 traffic, except when it comes from
| > your 'known hosts' to your 'known interfaces and ports'.
| >
| 
| The DNS and the 6to4 service are offered for free usage. There are no 
| restrictions on certain IP networks. I guess the reassambling in such 
| cases is problematic. That's why I would like to switch it off. There are
| also no firewall rules for IPv4.

I am trying to understand the use case here:
1. you want to have V4 DNS and 6to4 service that can generate V4 fragments
2. you want V4 fragments dropped.
3. you can't put V4 rules in your firewall to restrict traffic to only
   those services.

Is that correct?

christos


Re: npf bug(?)

2017-04-02 Thread 6bone

On Fri, 31 Mar 2017, Christos Zoulas wrote:


I would add some rules to block the ipv4 traffic, except when it comes from
your 'known hosts' to your 'known interfaces and ports'.



The DNS and the 6to4 service are offered for free usage. There are no 
restrictions on certain IP networks. I guess the reassambling in such 
cases is problematic. That's why I would like to switch it off. There are also 
no firewall rules for IPv4.



Regards
Uwe



Re: Automated report: NetBSD-current/i386 build failure

2017-04-02 Thread Andreas Gustafsson
On March 31, the NetBSD Test Fixture wrote:
> 
> /tmp/bracket/build/2017.03.31.21.07.02-i386/src/external/bsd/dhcpcd/dist/src/bpf.c:
>  In function 'bpf_arp':
> 
> /tmp/bracket/build/2017.03.31.21.07.02-i386/src/external/bsd/dhcpcd/dist/src/bpf.c:425:1:
>  error: stack protector not protecting local variables: variable length 
> buffer [-Werror=stack-protector]

The build is still failing, but now with a different error

   --- install-bsd ---
   i486--netbsdelf-install: 
/tmp/bracket/build/2017.04.02.01.49.52-i386/obj/external/bsd/dhcpcd/libexec/dhcpcd-hooks/50-ypbind:
 stat: No such file or directory

-- 
Andreas Gustafsson, g...@gson.org