Re: ARP out the wrong interface

2001-02-22 Thread Matthew Kirkwood

On Wed, 21 Feb 2001, dean gaudet wrote:

> > 2.2.18 and 2.4 apparently have a patch called "arpfilter"
> > integrated which should allow you to:
> >
> > # sysctl -w net.ipv4.conf.all.arpfilter=1
> >
> > to get much stricter behaviour regarding ARP replies.
> 
> hmm, so i'm working with a 2.4.1-ac20-TUX-P5 kernel and i can't find
> "arpfilter" or "arp.*filter" in any of the files, so it doesn't appear
> to have made it into 2.4.  i've been using the patch attached below
> and it's solving the problem for me for now.  (it could be entirely
> wrong, but it's letting me at least get some other work done :)

Thanks.

Below is what Andi Kleen sent me last time this came up.

Matthew.


>From [EMAIL PROTECTED] Thu Feb 22 15:19:51 2001
Date: Mon, 4 Sep 2000 12:06:02 +0200
From: Andi Kleen <[EMAIL PROTECTED]>
To: Matthew Kirkwood <[EMAIL PROTECTED]>
Cc: Alan Cox <[EMAIL PROTECTED]>,
 David Luyer <[EMAIL PROTECTED]>, [EMAIL PROTECTED]
Subject: Re: Linux 2.2 - BSD/OS 4.1 ARP incompatibility

On Mon, Sep 04, 2000 at 10:57:44AM +0100, Matthew Kirkwood wrote:
> > > With both interfaces up, it's impossible to apply anti-martian
> > > rules to the interfaces, since it's hard to predict which card
> > > will answer an ARP request.
> >
> > /proc/sys/net/ipv4/.../hidden
> 
> So when lightning fries the primary ethcard in the machine,
> I have to know the hw address of the second card to get in?
> 
> Also, it can be used to scan through a dual-homed host to
> determine the address range in use on the other side, which
> I'd rather wasn't possible.
> 
> /proc/sys/net/ipv4/\"correct\"_arp_reply_interface_selection
> maybe?

It is called arpfilter. Here is the old 2.2.16 version (applies to 2.4 with
minor changes)

It is useful for various things, one of them being automatic load balancing
for incoming connections using multipath routes.

-Andi


--- linux/include/linux/inetdevice.h.ARPFILTER  Tue Jan  4 19:12:24 2000
+++ linux/include/linux/inetdevice.hSat Jun 24 14:02:07 2000
@@ -17,6 +17,7 @@
int forwarding;
int mc_forwarding;
int hidden;
+   int arp_filter; 
void*sysctl;
 };
 
@@ -51,6 +52,9 @@
  (ipv4_devconf.accept_redirects && (in_dev)->cnf.accept_redirects)) \
 || (!IN_DEV_FORWARD(in_dev) && \
  (ipv4_devconf.accept_redirects || (in_dev)->cnf.accept_redirects)))
+
+#define IN_DEV_ARPFILTER(in_dev)   (ipv4_devconf.arp_filter || \
+(in_dev)->cnf.arp_filter)
 
 struct in_ifaddr
 {
--- linux/include/linux/sysctl.h.ARPFILTER  Fri Jun 23 17:47:22 2000
+++ linux/include/linux/sysctl.hSat Jun 24 14:02:07 2000
@@ -272,7 +272,8 @@
NET_IPV4_CONF_ACCEPT_SOURCE_ROUTE=9,
NET_IPV4_CONF_BOOTP_RELAY=10,
NET_IPV4_CONF_LOG_MARTIANS=11,
-   NET_IPV4_CONF_HIDDEN=12
+   NET_IPV4_CONF_HIDDEN=12,
+   NET_IPV4_CONF_ARPFILTER=13
 };
 
 /* /proc/sys/net/ipv6 */
--- linux/include/net/snmp.h.ARPFILTER  Fri Jun 23 17:47:05 2000
+++ linux/include/net/snmp.hSat Jun 24 14:04:19 2000
@@ -179,6 +179,7 @@
unsigned long   OutOfWindowIcmps; 
unsigned long   LockDroppedIcmps; 
unsigned long   SockMallocOOM; 
+   unsigned long   ArpFilter;
 };

 #endif
--- linux/net/ipv4/proc.c.ARPFILTER Fri Jun 23 17:47:06 2000
+++ linux/net/ipv4/proc.c   Sat Jun 24 14:03:48 2000
@@ -371,6 +371,10 @@
  net_statistics.OutOfWindowIcmps,
  net_statistics.LockDroppedIcmps,
  net_statistics.SockMallocOOM);
+   len += sprintf(buffer + len, 
+   "IpExt: ArpFilter\n"
+   "IpExt: %lu\n",
+ net_statistics.ArpFilter);
 
if (offset >= len)
{
--- linux/net/ipv4/arp.c.ARPFILTER  Fri Jun 23 12:19:11 2000
+++ linux/net/ipv4/arp.cSat Jun 24 14:02:07 2000
@@ -339,6 +339,22 @@
 dst_ha, dev->dev_addr, NULL);
 }
 
+static int arp_filter(__u32 sip, __u32 tip, struct device *dev)
+{
+   struct rtable *rt;
+   int flag = 0; 
+   //unsigned long now; 
+
+   if (ip_route_output(, sip, tip, 0, 0) < 0) 
+   return 1;
+   if (rt->u.dst.dev != dev) { 
+   net_statistics.ArpFilter++; 
+   flag = 1; 
+   } 
+   ip_rt_put(rt); 
+   return flag; 
+} 
+
 /* OBSOLETE FUNCTIONS */
 
 /*
@@ -689,6 +705,7 @@
if (addr_type == RTN_LOCAL) {
n = neigh_event_ns(_tbl, sha, , dev);
if (n) {
+   int dont_send = 0; 
if (ipv4_devconf.hidden &&
skb->pkt_type != PACKET_HOST) {
struct device *dev2;
@@ -698,12 +715,14 @@
dev2 != dev &&
(in_dev2 = 

Re: ARP out the wrong interface

2001-02-22 Thread Matthew Kirkwood

On Wed, 21 Feb 2001, dean gaudet wrote:

  2.2.18 and 2.4 apparently have a patch called "arpfilter"
  integrated which should allow you to:
 
  # sysctl -w net.ipv4.conf.all.arpfilter=1
 
  to get much stricter behaviour regarding ARP replies.
 
 hmm, so i'm working with a 2.4.1-ac20-TUX-P5 kernel and i can't find
 "arpfilter" or "arp.*filter" in any of the files, so it doesn't appear
 to have made it into 2.4.  i've been using the patch attached below
 and it's solving the problem for me for now.  (it could be entirely
 wrong, but it's letting me at least get some other work done :)

Thanks.

Below is what Andi Kleen sent me last time this came up.

Matthew.


From [EMAIL PROTECTED] Thu Feb 22 15:19:51 2001
Date: Mon, 4 Sep 2000 12:06:02 +0200
From: Andi Kleen [EMAIL PROTECTED]
To: Matthew Kirkwood [EMAIL PROTECTED]
Cc: Alan Cox [EMAIL PROTECTED],
 David Luyer [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: Re: Linux 2.2 - BSD/OS 4.1 ARP incompatibility

On Mon, Sep 04, 2000 at 10:57:44AM +0100, Matthew Kirkwood wrote:
   With both interfaces up, it's impossible to apply anti-martian
   rules to the interfaces, since it's hard to predict which card
   will answer an ARP request.
 
  /proc/sys/net/ipv4/.../hidden
 
 So when lightning fries the primary ethcard in the machine,
 I have to know the hw address of the second card to get in?
 
 Also, it can be used to scan through a dual-homed host to
 determine the address range in use on the other side, which
 I'd rather wasn't possible.
 
 /proc/sys/net/ipv4/\"correct\"_arp_reply_interface_selection
 maybe?

It is called arpfilter. Here is the old 2.2.16 version (applies to 2.4 with
minor changes)

It is useful for various things, one of them being automatic load balancing
for incoming connections using multipath routes.

-Andi


--- linux/include/linux/inetdevice.h.ARPFILTER  Tue Jan  4 19:12:24 2000
+++ linux/include/linux/inetdevice.hSat Jun 24 14:02:07 2000
@@ -17,6 +17,7 @@
int forwarding;
int mc_forwarding;
int hidden;
+   int arp_filter; 
void*sysctl;
 };
 
@@ -51,6 +52,9 @@
  (ipv4_devconf.accept_redirects  (in_dev)-cnf.accept_redirects)) \
 || (!IN_DEV_FORWARD(in_dev)  \
  (ipv4_devconf.accept_redirects || (in_dev)-cnf.accept_redirects)))
+
+#define IN_DEV_ARPFILTER(in_dev)   (ipv4_devconf.arp_filter || \
+(in_dev)-cnf.arp_filter)
 
 struct in_ifaddr
 {
--- linux/include/linux/sysctl.h.ARPFILTER  Fri Jun 23 17:47:22 2000
+++ linux/include/linux/sysctl.hSat Jun 24 14:02:07 2000
@@ -272,7 +272,8 @@
NET_IPV4_CONF_ACCEPT_SOURCE_ROUTE=9,
NET_IPV4_CONF_BOOTP_RELAY=10,
NET_IPV4_CONF_LOG_MARTIANS=11,
-   NET_IPV4_CONF_HIDDEN=12
+   NET_IPV4_CONF_HIDDEN=12,
+   NET_IPV4_CONF_ARPFILTER=13
 };
 
 /* /proc/sys/net/ipv6 */
--- linux/include/net/snmp.h.ARPFILTER  Fri Jun 23 17:47:05 2000
+++ linux/include/net/snmp.hSat Jun 24 14:04:19 2000
@@ -179,6 +179,7 @@
unsigned long   OutOfWindowIcmps; 
unsigned long   LockDroppedIcmps; 
unsigned long   SockMallocOOM; 
+   unsigned long   ArpFilter;
 };

 #endif
--- linux/net/ipv4/proc.c.ARPFILTER Fri Jun 23 17:47:06 2000
+++ linux/net/ipv4/proc.c   Sat Jun 24 14:03:48 2000
@@ -371,6 +371,10 @@
  net_statistics.OutOfWindowIcmps,
  net_statistics.LockDroppedIcmps,
  net_statistics.SockMallocOOM);
+   len += sprintf(buffer + len, 
+   "IpExt: ArpFilter\n"
+   "IpExt: %lu\n",
+ net_statistics.ArpFilter);
 
if (offset = len)
{
--- linux/net/ipv4/arp.c.ARPFILTER  Fri Jun 23 12:19:11 2000
+++ linux/net/ipv4/arp.cSat Jun 24 14:02:07 2000
@@ -339,6 +339,22 @@
 dst_ha, dev-dev_addr, NULL);
 }
 
+static int arp_filter(__u32 sip, __u32 tip, struct device *dev)
+{
+   struct rtable *rt;
+   int flag = 0; 
+   //unsigned long now; 
+
+   if (ip_route_output(rt, sip, tip, 0, 0)  0) 
+   return 1;
+   if (rt-u.dst.dev != dev) { 
+   net_statistics.ArpFilter++; 
+   flag = 1; 
+   } 
+   ip_rt_put(rt); 
+   return flag; 
+} 
+
 /* OBSOLETE FUNCTIONS */
 
 /*
@@ -689,6 +705,7 @@
if (addr_type == RTN_LOCAL) {
n = neigh_event_ns(arp_tbl, sha, sip, dev);
if (n) {
+   int dont_send = 0; 
if (ipv4_devconf.hidden 
skb-pkt_type != PACKET_HOST) {
struct device *dev2;
@@ -698,12 +715,14 @@
dev2 != dev 
(in_dev2 = dev2-ip_ptr) != NULL 

Re: ARP out the wrong interface

2001-02-21 Thread dean gaudet

On Fri, 9 Feb 2001, Matthew Kirkwood wrote:

> On Thu, 8 Feb 2001, dean gaudet wrote:
>
> > responses come back from both eth0 and eth1, listing each of their
> > respective MAC addresses...  it's essentially a race condition at this
> > point as to whether i'll get the right MAC address.  ("right" means
> > the MAC for server:eth1).
>
> 2.2.18 and 2.4 apparently have a patch called "arpfilter"
> integrated which should allow you to:
>
> # sysctl -w net.ipv4.conf.all.arpfilter=1
>
> to get much stricter behaviour regarding ARP replies.

hmm, so i'm working with a 2.4.1-ac20-TUX-P5 kernel and i can't find
"arpfilter" or "arp.*filter" in any of the files, so it doesn't appear to
have made it into 2.4.  i've been using the patch attached below and it's
solving the problem for me for now.  (it could be entirely wrong, but it's
letting me at least get some other work done :)

-dean

--- linux/net/ipv4/arp.c.badproxy   Mon Feb 12 17:28:48 2001
+++ linux/net/ipv4/arp.cTue Feb 13 20:06:37 2001
@@ -737,10 +737,12 @@
addr_type = rt->rt_type;

if (addr_type == RTN_LOCAL) {
+   if ((rt->rt_flags_DIRECTSRC) || IN_DEV_PROXY_ARP(in_dev)) 
+{
n = neigh_event_ns(_tbl, sha, , dev);
if (n) {

arp_send(ARPOP_REPLY,ETH_P_ARP,sip,dev,tip,sha,dev->dev_addr,sha);
neigh_release(n);
+   }
}
goto out;
} else if (IN_DEV_FORWARD(in_dev)) {

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/



Re: ARP out the wrong interface

2001-02-21 Thread dean gaudet

On Fri, 9 Feb 2001, Matthew Kirkwood wrote:

 On Thu, 8 Feb 2001, dean gaudet wrote:

  responses come back from both eth0 and eth1, listing each of their
  respective MAC addresses...  it's essentially a race condition at this
  point as to whether i'll get the right MAC address.  ("right" means
  the MAC for server:eth1).

 2.2.18 and 2.4 apparently have a patch called "arpfilter"
 integrated which should allow you to:

 # sysctl -w net.ipv4.conf.all.arpfilter=1

 to get much stricter behaviour regarding ARP replies.

hmm, so i'm working with a 2.4.1-ac20-TUX-P5 kernel and i can't find
"arpfilter" or "arp.*filter" in any of the files, so it doesn't appear to
have made it into 2.4.  i've been using the patch attached below and it's
solving the problem for me for now.  (it could be entirely wrong, but it's
letting me at least get some other work done :)

-dean

--- linux/net/ipv4/arp.c.badproxy   Mon Feb 12 17:28:48 2001
+++ linux/net/ipv4/arp.cTue Feb 13 20:06:37 2001
@@ -737,10 +737,12 @@
addr_type = rt-rt_type;

if (addr_type == RTN_LOCAL) {
+   if ((rt-rt_flagsRTCF_DIRECTSRC) || IN_DEV_PROXY_ARP(in_dev)) 
+{
n = neigh_event_ns(arp_tbl, sha, sip, dev);
if (n) {

arp_send(ARPOP_REPLY,ETH_P_ARP,sip,dev,tip,sha,dev-dev_addr,sha);
neigh_release(n);
+   }
}
goto out;
} else if (IN_DEV_FORWARD(in_dev)) {

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/



Re: ARP out the wrong interface

2001-02-09 Thread Matthew Kirkwood

On Thu, 8 Feb 2001, dean gaudet wrote:

> responses come back from both eth0 and eth1, listing each of their
> respective MAC addresses...  it's essentially a race condition at this
> point as to whether i'll get the right MAC address.  ("right" means
> the MAC for server:eth1).

2.2.18 and 2.4 apparently have a patch called "arpfilter"
integrated which should allow you to:

# sysctl -w net.ipv4.conf.all.arpfilter=1

to get much stricter behaviour regarding ARP replies.

Matthew.

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



Re: ARP out the wrong interface

2001-02-09 Thread Matthew Kirkwood

On Thu, 8 Feb 2001, dean gaudet wrote:

 responses come back from both eth0 and eth1, listing each of their
 respective MAC addresses...  it's essentially a race condition at this
 point as to whether i'll get the right MAC address.  ("right" means
 the MAC for server:eth1).

2.2.18 and 2.4 apparently have a patch called "arpfilter"
integrated which should allow you to:

# sysctl -w net.ipv4.conf.all.arpfilter=1

to get much stricter behaviour regarding ARP replies.

Matthew.

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



Re: ARP out the wrong interface

2001-02-08 Thread Stephen Degler

Hi,

What you describe below is having the client mis-addressed to have
the same IP as the server.  Is this what you meant?

skd


On Thu, Feb 08, 2001 at 09:09:49PM -0800, dean gaudet wrote:
> this appears to occur with both 2.2.16 and 2.4.1.
> 
> server:
> 
> eth0 is 192.168.250.11 netmask 255.255.255.0
> eth1 is 192.168.251.11 netmask 255.255.255.0
> 
> they're both connected to the same switch.
> 
> client:
> 
> eth0 is 192.168.251.11 netmask 255.255.255.0
> 
> connected to the same switch as both of server's eth.
> 
> on client i try "ping 192.168.251.11".
> 
> responses come back from both eth0 and eth1, listing each of their
> respective MAC addresses...  it's essentially a race condition at this
> point as to whether i'll get the right MAC address.  ("right" means the
> MAC for server:eth1).
> 
> client# tcpdump -n arp
> Kernel filter, protocol ALL, datagram packet socket
> tcpdump: listening on all devices
> 21:03:05.695089 eth0 > arp who-has 192.168.251.11 tell 192.168.251.25 
>(0:3:47:0:25:80)
> 21:03:05.695405 eth0 < arp reply 192.168.251.11 is-at 0:d0:b7:be:3e:aa 
>(0:3:47:0:25:80)
> 21:03:05.695523 eth0 < arp reply 192.168.251.11 is-at 0:d0:b7:1f:ea:35 
>(0:3:47:0:25:80)
> 
> 
> server# cat /proc/sys/net/ipv4/ip_forward
> 0
> server# cat /proc/sys/net/ipv4/conf/*/proxy_arp
> 0
> 0
> 0
> 0
> 0
> 0
> 0
> 
> is this expected?  it seems broken.
> 
> thanks
> -dean
> 
> -
> To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
> the body of a message to [EMAIL PROTECTED]
> Please read the FAQ at http://www.tux.org/lkml/
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



Re: ARP out the wrong interface

2001-02-08 Thread dean gaudet

oops typo.

On Thu, 8 Feb 2001, dean gaudet wrote:

> this appears to occur with both 2.2.16 and 2.4.1.
>
> server:
>
> eth0 is 192.168.250.11 netmask 255.255.255.0
> eth1 is 192.168.251.11 netmask 255.255.255.0
>
> they're both connected to the same switch.
>
> client:
>
> eth0 is 192.168.251.11 netmask 255.255.255.0

er, i meant to say the client is 192.168.251.25 there.

> connected to the same switch as both of server's eth.
>
> on client i try "ping 192.168.251.11".
>
> responses come back from both eth0 and eth1, listing each of their
> respective MAC addresses...  it's essentially a race condition at this
> point as to whether i'll get the right MAC address.  ("right" means the
> MAC for server:eth1).
>
> client# tcpdump -n arp
> Kernel filter, protocol ALL, datagram packet socket
> tcpdump: listening on all devices
> 21:03:05.695089 eth0 > arp who-has 192.168.251.11 tell 192.168.251.25 
>(0:3:47:0:25:80)
> 21:03:05.695405 eth0 < arp reply 192.168.251.11 is-at 0:d0:b7:be:3e:aa 
>(0:3:47:0:25:80)
> 21:03:05.695523 eth0 < arp reply 192.168.251.11 is-at 0:d0:b7:1f:ea:35 
>(0:3:47:0:25:80)
>
>
> server# cat /proc/sys/net/ipv4/ip_forward
> 0
> server# cat /proc/sys/net/ipv4/conf/*/proxy_arp
> 0
> 0
> 0
> 0
> 0
> 0
> 0
>
> is this expected?  it seems broken.
>
> thanks
> -dean
>
> -
> To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
> the body of a message to [EMAIL PROTECTED]
> Please read the FAQ at http://www.tux.org/lkml/
>

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



Re: ARP out the wrong interface

2001-02-08 Thread dean gaudet

oops typo.

On Thu, 8 Feb 2001, dean gaudet wrote:

 this appears to occur with both 2.2.16 and 2.4.1.

 server:

 eth0 is 192.168.250.11 netmask 255.255.255.0
 eth1 is 192.168.251.11 netmask 255.255.255.0

 they're both connected to the same switch.

 client:

 eth0 is 192.168.251.11 netmask 255.255.255.0

er, i meant to say the client is 192.168.251.25 there.

 connected to the same switch as both of server's eth.

 on client i try "ping 192.168.251.11".

 responses come back from both eth0 and eth1, listing each of their
 respective MAC addresses...  it's essentially a race condition at this
 point as to whether i'll get the right MAC address.  ("right" means the
 MAC for server:eth1).

 client# tcpdump -n arp
 Kernel filter, protocol ALL, datagram packet socket
 tcpdump: listening on all devices
 21:03:05.695089 eth0  arp who-has 192.168.251.11 tell 192.168.251.25 
(0:3:47:0:25:80)
 21:03:05.695405 eth0  arp reply 192.168.251.11 is-at 0:d0:b7:be:3e:aa 
(0:3:47:0:25:80)
 21:03:05.695523 eth0  arp reply 192.168.251.11 is-at 0:d0:b7:1f:ea:35 
(0:3:47:0:25:80)


 server# cat /proc/sys/net/ipv4/ip_forward
 0
 server# cat /proc/sys/net/ipv4/conf/*/proxy_arp
 0
 0
 0
 0
 0
 0
 0

 is this expected?  it seems broken.

 thanks
 -dean

 -
 To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
 the body of a message to [EMAIL PROTECTED]
 Please read the FAQ at http://www.tux.org/lkml/


-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



Re: ARP out the wrong interface

2001-02-08 Thread Stephen Degler

Hi,

What you describe below is having the client mis-addressed to have
the same IP as the server.  Is this what you meant?

skd


On Thu, Feb 08, 2001 at 09:09:49PM -0800, dean gaudet wrote:
 this appears to occur with both 2.2.16 and 2.4.1.
 
 server:
 
 eth0 is 192.168.250.11 netmask 255.255.255.0
 eth1 is 192.168.251.11 netmask 255.255.255.0
 
 they're both connected to the same switch.
 
 client:
 
 eth0 is 192.168.251.11 netmask 255.255.255.0
 
 connected to the same switch as both of server's eth.
 
 on client i try "ping 192.168.251.11".
 
 responses come back from both eth0 and eth1, listing each of their
 respective MAC addresses...  it's essentially a race condition at this
 point as to whether i'll get the right MAC address.  ("right" means the
 MAC for server:eth1).
 
 client# tcpdump -n arp
 Kernel filter, protocol ALL, datagram packet socket
 tcpdump: listening on all devices
 21:03:05.695089 eth0  arp who-has 192.168.251.11 tell 192.168.251.25 
(0:3:47:0:25:80)
 21:03:05.695405 eth0  arp reply 192.168.251.11 is-at 0:d0:b7:be:3e:aa 
(0:3:47:0:25:80)
 21:03:05.695523 eth0  arp reply 192.168.251.11 is-at 0:d0:b7:1f:ea:35 
(0:3:47:0:25:80)
 
 
 server# cat /proc/sys/net/ipv4/ip_forward
 0
 server# cat /proc/sys/net/ipv4/conf/*/proxy_arp
 0
 0
 0
 0
 0
 0
 0
 
 is this expected?  it seems broken.
 
 thanks
 -dean
 
 -
 To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
 the body of a message to [EMAIL PROTECTED]
 Please read the FAQ at http://www.tux.org/lkml/
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/