Re: Can it really be this quiet?

2022-01-03 Thread Brian Reichert
On Mon, Jan 03, 2022 at 02:46:59PM -0500, Allen McKinley Kitchen (gmail) wrote:
> Or has NANOG also succumbed to a signed-integer date problem?
> 
> Waiting to see what I get back..

Don't jinx it...

> ..Allen

-- 
Brian Reichert  
BSD admin/developer at large


Re: replaying captured traffic

2019-11-26 Thread Brian Reichert
On Tue, Nov 26, 2019 at 01:07:56PM -0500, harbor235 wrote:
> I am hoping someone can provide wisdom regarding the dos and don'ts
> replaying captured traffic?

Googling 'pcap replay' yields many hits.

> Is open source tools sufficient?
> 
> Can PCAPs be replayed?

This is an easy answer:

  https://tcpreplay.appneta.com/
  https://github.com/appneta/tcpreplay

etc...

I've tried none of them.

> How is this accomplished? partial rewriting IP headers
> 
> Recommended tools?
> 
> Mike

-- 
Brian Reichert  
BSD admin/developer at large


Re: Art and Tech is madness

2019-09-06 Thread Brian Reichert
On Thu, Sep 05, 2019 at 11:04:30PM -0500, Chris Boyd wrote:
> There???s also this gem from 2005 or 2007 days. I???ve heard Cisco staff was 
> involved in its creation.
> 
> http://www.mattzrelak.com/mp3/t1down.htm

If this is keeping on topic:

  https://www.youtube.com/watch?v=CyvQ5Pu_k1o

> 
> ???Chris

-- 
Brian Reichert  
BSD admin/developer at large


Re: Wi-Fi Analyzer

2017-12-29 Thread Brian Reichert
On Fri, Dec 29, 2017 at 09:17:26AM -0600, Bryan Holloway wrote:
> Curious if the community has any recommendations and/or positive 
> experiences to share for a handheld Wi-Fi (802.11a/b/g/n/ac) analyzer.
> 
> Software/laptop-based solutions can be unwieldy in certain environments. 
> However, given rave reviews, I'm open to the idea as long as it's 
> Mac-compatible.
> 
> Should be able to show detailed spectra, help locate sources of 
> interference, have mapping capabilities, etc.

Depending on what problem you're trying to solve, on my Android
phone I use a free app called 'Wifi Analyzer':

  http://wifianalyzer.mobi

Shows me what station IDs are on what channels, handles 2.4g and 5G
connections, etc.

Doesn't provide mapping, just shows "from where I am right know, what
channels have which stations as what strengths?"

For a house, it's easy to walk around, to passively get a feel for Wifi
placement/config.


> Thanks!

-- 
Brian Reichert  
BSD admin/developer at large


T-Mobile's Binge On violates net neutrality, says Stanford report

2016-01-29 Thread Brian Reichert
Presumably, this is getting some eyes:

  
http://www.tmonews.com/2016/01/t-mobiles-binge-on-violates-net-neutrality-says-stanford-report/

  T-Mobile's Binge On violates net neutrality, says Stanford report

  In a new report published today - and filed to the FCC, as well
  - van Schewick says that Binge on "violates key net neutrality
  principles" and "is likely to violate the FCC's general conduct
  rule."

-- 
Brian Reichert  
BSD admin/developer at large


Re: Whois.net down?

2015-09-03 Thread Brian Reichert
On Thu, Sep 03, 2015 at 07:57:55PM +, Marcin Cieslak wrote:
> whois.net is some site operated by NTT/Verio, 
> this domain tech contact seems to be:
> 
> Tech Name: Verio Hostmaster
> Tech Organization:
> Tech Street: 8005 S. Chester Street Suite 200
> Tech City: Englewood
> Tech State/Province: CO
> Tech Postal Code: 80112
> Tech Country: US
> Tech Phone: +1.2142908620
> Tech Phone Ext:
> Tech Fax: +1.2147451877
> Tech Fax Ext:
> Tech Email: hostmas...@verio.net
> 
> although you might have better chance via Twitter
> https://twitter.com/WhoisNet :(

Thanks for the suggestion. :)

> ~Marcin

-- 
Brian Reichert  
BSD admin/developer at large


Re: Whois.net down?

2015-09-03 Thread Brian Reichert
On Thu, Sep 03, 2015 at 09:59:02PM +0700, David S. wrote:
> Hi Brian,
> 
> I'm able to access https://whois.net, have you check the nameserver of
> numachi.com?
> Is the other domain use same authoritative DNS?

I can access the web page.  When I use the page for certain domains,
sometimes, I successfully get results.

Other domains, such as NUMACHI.COM, I get the error I reported.

CLI-based versions of whois work just fine for all domains I'm
concerned about; it's that web-baed version that is selectively
failing.

> Best regards,
> David S.

-- 
Brian Reichert  
BSD admin/developer at large


Whois.net down?

2015-09-03 Thread Brian Reichert
I'm trying to use https://www.whois.net/ to resolve info about
several domains, including my own (NUMACHI.COM).

For several domains (but not all, I get 'Error extracting data. No
data available'.  There's a 'please read' tag, but no text associated
with it.

Anyone know if they're having issues there?

-- 
Brian Reichert  
BSD admin/developer at large


Re: huawei (oscilloscopes and frequency analysis)

2013-06-18 Thread Brian Reichert
On Tue, Jun 18, 2013 at 02:31:37PM -0600, Phil Fagan wrote:
> now THAT would be a cool project!

(I missed the beginnig of this thread; sorry if this is a repeat.)

There was the fellow demonstrating a spoofed 2G GSM tower at DefCon
recently:

  
http://www.forbes.com/sites/firewall/2010/07/31/despite-fcc-scare-tactics-researcher-demos-att-eavesdropping/

And the YouTube video was pretty cool to watch, for technical depth.

  https://www.youtube.com/watch?v=rXVHPNhsOzo

Part of his talk described how he could (up a point) block 3G, to
cause phones to fail over to 2G, where he could get them.

4G is a whole different thing, but the talk was educational, nonetheless...


> -- 
> Phil Fagan
> Denver, CO
> 970-480-7618

-- 
Brian Reichert  
BSD admin/developer at large



Re: Should host/domain names travel over the internet with a trailing dot?

2013-02-25 Thread Brian Reichert
On Tue, Feb 26, 2013 at 09:07:24AM +1100, Mark Andrews wrote:
> 
> In message <15455394.7034.1361803759023.javamail.r...@benjamin.baylink.com>, 
> Ja
> y Ashworth writes:
> > More formally: "is a host/domain name with a trailing dot *actually a 
> > legal host name?
> 
> No.  See RFC 952

In the case of URIs, RFC 2396 (circa 1998) seems to allow for it,
if I read the ABNF for 'hostname' right in section 3.2.2.

But that's the only place I see it.

> -- 
> Mark Andrews, ISC
> 1 Seymour St., Dundas Valley, NSW 2117, Australia
> PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org

-- 
Brian Reichert  
BSD admin/developer at large



Re: looking for terminology recommendations concerning non-rooted FQDNs

2013-02-25 Thread Brian Reichert
On Mon, Feb 25, 2013 at 10:10:55AM -0800, Doug Barton wrote:
> Brian,
> 
> This may be a silly question, but what's your goal here? Your OP was 
> about terminology, but the thread has gone down several different 
> off-topic ratholes.

That was indeed by original goal, and there have been a couple of
useful suggestions, and I thank this forum for all of the suggestions
and feedback.

I later mentioned why I was pursuing the terminology (use case
surrounding entries in a SAN), and there's some effort to consider
whether or not my issue is really a non-issue.

Which it might be.

> Doug

-- 
Brian Reichert  
BSD admin/developer at large



Re: looking for terminology recommendations concerning non-rooted FQDNs

2013-02-25 Thread Brian Reichert
On Mon, Feb 25, 2013 at 12:18:00PM -0500, Jay Ashworth wrote:
> If I understood Brian correctly, his problem is that people/programs
> are trying to retrieve things from, eg:
> 
> https://my.host.name./this/is/a/path
> 
> and the SSL library fails the certificate match if the cert doesn't contain
> the absolute domain name as an altName -- because *the browser* (or whatever)
> does not normalize before calling the library.

I'd argue that if you have an absolute domain name, then that _is_
the 'normalized' form of the domain name; it's an unambigious
representation of the domain name. (Here, I'm treating the string
as a serialized data structure.)

Choosing to remove the notion of "this is rooted", and then asking
any (all?) other layers to handle the introduced ambiguity sounds
like setting yourself up for the issues that RFC 1535 was drawing
attention to.

> Cheers,
> -- jra
> -- 
> Jay R. Ashworth  Baylink   
> j...@baylink.com
> Designer The Things I Think   RFC 2100
> Ashworth & Associates http://baylink.pitas.com 2000 Land Rover DII
> St Petersburg FL USA   #natog  +1 727 647 1274

-- 
Brian Reichert  
BSD admin/developer at large



Re: Should host/domain names travel over the internet with a trailing dot?

2013-02-25 Thread Brian Reichert
On Mon, Feb 25, 2013 at 11:26:47AM -0500, Jay Ashworth wrote:
> > The upshot (assuming I'm not totally off base here), is that other
> > than getaddrinfo(), nothing is acting on the semantics of the
> > supplied hostname (or IP address). They are 'just strings', and
> > are (essentially) compared as such.
> 
> Right.  And I'm asserting that that's wrong: the client side libraries
> Really Ought To normalize that name before trying to compare it against
> the retrieved certificate to see if it matches, which would relieve you
> of having to have the altName with the trailing dot in such a cert.

I know for internal testing, I've had to introduce unqualified
hostnames in the CSR as well (e.g. 'testhost', instead of
'testhost.example.com'), to handle the case of the client not using
domain names at all (when framing queries).  This illustrates that
there's not even an effort to synthesize a FQDN.

Who should implement the normalization logic?  Not the SSL library,
certainly.  That sounds like the bailiwick of the resolver library...

> The controlling standard *appears* to be RFC 2246, TLS v1.0.  I'm doing
> some work this morning, but that's up in a tab for coffee breaks; I'll 
> try to figure out what I think Dierks and Allen thought about this topic,
> if anything, during the day.

I look forward to the fruits of your research. :)

> Cheers,
> -- jra
> -- 
> Jay R. Ashworth  Baylink   
> j...@baylink.com
> Designer The Things I Think   RFC 2100
> Ashworth & Associates     http://baylink.pitas.com 2000 Land Rover DII
> St Petersburg FL USA   #natog  +1 727 647 1274

-- 
Brian Reichert  
BSD admin/developer at large



Re: Should host/domain names travel over the internet with a trailing dot?

2013-02-25 Thread Brian Reichert
On Mon, Feb 25, 2013 at 09:49:19AM -0500, Jay Ashworth wrote:
> - Original Message -
> > From: "Brian Reichert" 
> 
> > On Sun, Feb 24, 2013 at 12:10:20AM +1100, Mark Andrews wrote:
> [I believe this is Brian, then Mark: ]
> > > > When I did my initial development with OpenSSL, I observed:
> > > >
> > > > - If I did not have the rooted domain name in the SAN, then any SSL
> > > >   client stack would fail the verification if a rooted domain name
> > > >   was used to connect to the SSL server.
> > >
> > > Well you have a broken SSL client app. If it is accepting non legal
> > > hostnames it should be normalising them before passing them to the
> > > ssl layer.
> > 
> > From what little research I've done (only OpenSSL), the SSL client
> > is relying on getaddrinfo(3) to do name resolution. In turn, I
> > haven't found an implementation of getaddrinfo(3) that rejects
> > rooted domain names as non-legal.
> 
> Yes, but that's not the question, Brian, assuming I understand the problem
> as well as I think I do.  The question is not how the client does the
> name resolution on the client machine -- it's what it does with the domain
> name it's looking up before doing the SSL interaction with the server side,
> a process with which I'm not familiar enough to know if the client actually
> send the host/domain name to the server end.  Assuming it does -- and I
> am -- the question is: should it take the dot off.

My understanding is this:

Unless you're doing client certificate verification (wherein the
server is making decisions about which clients attempting a
connection), all validation/verification is done by the client.

The SSL client retrieves the server's certificate, and the set of
values in the Subject and the Subject Alternative Name is compared
against the hostname/IP address used to initiate the process.  This
comparison is (to my understanding) straight-forward (modulo UTF8
encodings, etc.).

The upshot (assuming I'm not totally off base here), is that other
than getaddrinfo(), nothing is acting on the semantics of the
supplied hostname (or IP address).  They are 'just strings', and
are (essentially) compared as such.

> Cheers,
> -- jr 'yeah, I know, it's Monday' a
> -- 
> Jay R. Ashworth  Baylink   
> j...@baylink.com
> Designer The Things I Think   RFC 2100
> Ashworth & Associates http://baylink.pitas.com 2000 Land Rover DII
> St Petersburg FL USA   #natog  +1 727 647 1274

-- 
Brian Reichert  
BSD admin/developer at large



Re: looking for terminology recommendations concerning non-rooted FQDNs

2013-02-25 Thread Brian Reichert
On Sun, Feb 24, 2013 at 12:10:20AM +1100, Mark Andrews wrote:
> > When I did my initial development with OpenSSL, I observed:
> > 
> > - If I did not have the rooted domain name in the SAN, then any SSL
> >   client stack would fail the verification if a rooted domain name
> >   was used to connect to the SSL server.
> 
> Well you have a broken SSL client app.  If it is accepting non legal
> hostnames it should be normalising them before passing them to the ssl
> layer.

>From what little research I've done (only OpenSSL), the SSL client
is relying on getaddrinfo(3) to do name resolution.  In turn, I
haven't found an implementation of getaddrinfo(3) that rejects
rooted domain names as non-legal.

Looking for couter-examples...

> -- 
> Mark Andrews, ISC
> 1 Seymour St., Dundas Valley, NSW 2117, Australia
> PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org

-- 
Brian Reichert  
BSD admin/developer at large



Re: looking for terminology recommendations concerning non-rooted FQDNs

2013-02-22 Thread Brian Reichert
On Fri, Feb 22, 2013 at 03:30:57PM -0800, Geoffrey Keating wrote:
> This is clarified in RFC 3280:
> 
>When the subjectAltName extension contains a domain name system
>label, the domain name MUST be stored in the dNSName (an IA5String).
>The name MUST be in the "preferred name syntax," as specified by RFC
>1034 [RFC 1034].

I agree on what that spec says.  My concern that that a rooted
domain name is (will be?) valid in practice, and is supported by
client software seemingly everywhere.

The spec for a URL also calls out what constitutes a hostname, and
I've yet to see a HTTP client that trips over a rooted domain name.

(Yes, I'm aware an alternate bit of terminology has been proposed,
but I'm trying to be consistent for the duration of this thread.)

Still, I'm not arguing about what should be allowed; I'm trying to
come up with the words to explain to end-users.

-- 
Brian Reichert  
BSD admin/developer at large



Re: looking for terminology recommendations concerning non-rooted FQDNs

2013-02-22 Thread Brian Reichert
On Fri, Feb 22, 2013 at 05:46:27PM -0500, Jay Ashworth wrote:
> So, should browsers send absolute host names in http/1.1 requests, and 
> shouldn't servers strip the trailing dot if they get one?
> 
> I vote No and Yes, resp.

The first question is tough, only because of the depth of the
exatblished convention.  I think I would argue 'Yes', as to remove
ambiguity, but that naively makes a lot of legacy software trip in
unexpected ways.

As for the second question, I generally disapprove of throwing away
information, so I say No.

Clearly I like to make trouble for myself. :)

-- 
Brian Reichert  
BSD admin/developer at large



Re: looking for terminology recommendations concerning non-rooted FQDNs

2013-02-22 Thread Brian Reichert
On Fri, Feb 22, 2013 at 05:21:02PM -0500, Jay Ashworth wrote:
> In short, "yes, Jay, I do".  Got it.  :-)

:)

> You saw Joe's second reply?

Apparently, I lost track of that while writing this up. :)

-- 
Brian Reichert  
BSD admin/developer at large



Re: looking for terminology recommendations concerning non-rooted FQDNs

2013-02-22 Thread Brian Reichert
On Fri, Feb 22, 2013 at 12:41:33PM -0500, Jay Ashworth wrote:
> My snap reaction is to say that nothing should ever be *trying* to
> compare a rooted F.Q.D.N. against a certificate; it is, as has been
> noted, merely command line/entry field shorthand to tell the local
> resolver where to quit; applications should all be stripping that 
> trailing dot.
> 
> Do you have evidence that the extra AltName with the trailing dot
> is operationally necessary?

'Necessary' is what's hard to ascertain here.

If, under a UNIX-like operating system, you request a PTR with some
command-line tool such as 'dig', you'll get a rooted domain name:
  
  $ dig -x 8.8.8.8 +short
  google-public-dns-a.google.com.

And you can use this rooted domain name get an A record:

  $ dig a google-public-dns-a.google.com. +short
  8.8.8.8

As a matter of example, if you had automation that was internally
testing your network for trusted certificates, and generated a set
of hostnames based on reverse DNS, then your SSL client will now
be using rooted domain names.

When I did my initial development with OpenSSL, I observed:

- If I did not have the rooted domain name in the SAN, then any SSL
  client stack would fail the verification if a rooted domain name
  was used to connect to the SSL server.

- I could generate a CSR with both formats of hostnames.

- My OpenSSL-based CA (and our internal MS-based CA) would sign
  said certificate request, preserving all of the hostnames in the SAN.

- and now using a roted domain name was successful.

And I figured, if both OpenSSL and Microsoft's Certificate Services,
(and their respective SSL clients) behaved the same way, I just
coded my automated generation of the CSR to include the rooted
domain names, just to cover my bases.

I did not expect that misc commercial entities would punish people
under these circumstances...

Now, I expect in this specific customer's case, I'm reasonably
certain that they won't have a tool chain / work flow / whatever,
that would introduce a rooted domain name.

But, I don't know if I can guarantee that for all of our current
and future clients.  I don't know if the practices suggested by RFC
1535 will come into effect, but I wanted to future-proof our product
in this regard...

> 
> Cheers,
> -- jra
> -- 
> Jay R. Ashworth  Baylink   
> j...@baylink.com
> Designer The Things I Think   RFC 2100
> Ashworth & Associates http://baylink.pitas.com     2000 Land Rover DII
> St Petersburg FL USA   #natog  +1 727 647 1274
> 

-- 
Brian Reichert  
BSD admin/developer at large



Re: looking for terminology recommendations concerning non-rooted FQDNs

2013-02-22 Thread Brian Reichert
On Fri, Feb 22, 2013 at 05:19:03PM +1100, Karl Auer wrote:
> It's a convention common enough and useful enough that I can see why
> people would want a handy term for it.

The core issue I'm trying to resolve surrounds the generation of a
CSR.  We're trying automate this process for a network appliance
my employer sells.

When our appliance generates a CSR for itself, among the steps is
to get a PTR record; by convention (or otherwise) these are rooted
domain names.

When we generate a CSR, we're choosing to include the rooted domain
name, as well as the other form (for now, I guess it should be
called a FQDN, the version without the trailing dot).

The resulting issued certificate has both forms in the SubjectAltName
field, and this allows both hostname forms to be used to establish
an SSL connection to our server.  They are considered distinct for
the Subject verification phase.

It's come to my attention that some commercial certificate vendors
think that having multiple hostnames in the SAN list costs more
money; go figure.  Our customers then have to go through some
soul-searching to pare down the list of hostnames in the SAN in the
CSR.

There's some understandable questions about why we include both
forms, and whether or not they are necessary.

We need to document our policies and recommendations, and I'm trying
to establish the vocabulary.

Hence my original question.  Irrespective of the state of RFCs,
there are competing conventions, and ambiguous terminology.  And I
was seeking guidance. :)

I do appreciate the feedback provided thus far.

> Regards, K.
> 
> -- 
> ~~~
> Karl Auer (ka...@biplane.com.au)
> http://www.biplane.com.au/kauer
> http://www.biplane.com.au/blog

-- 
Brian Reichert  
BSD admin/developer at large



looking for terminology recommendations concerning non-rooted FQDNs

2013-02-21 Thread Brian Reichert
I'm trying to nail down some terminology for doc purposes.

The issue: most resources on the net freely describe a fully-qualified
domian name ('FQDN') as to exclude the root domain; i.e, they exclude
the trailing dot as mandated by some RFCs such as RFC 1535:

  http://www.ietf.org/rfc/rfc1535.txt

An absolute "rooted" FQDN is of the format {name}{.} A non
"rooted" domain name is of the format {name}

I'm trying to come up with some human-facing terminology that names
these two forms:

"a.b.c."
"a.b.c"

Many resources on the net use the term 'rooted domain name' for the
former, but they're collectively ambigious about what the other
form should be called.

Does anyone here have any solid advice, or can point me to a resource
that would call out useful conventions?

This was all fueled by Microsoft's client code apparently stripping
the root domain from PTR record results; I'm separately trying to
track down why that's occuring...

-- 
Brian Reichert  
BSD admin/developer at large



Re: Telus mail server admin

2011-10-08 Thread Brian Reichert
On Sat, Oct 08, 2011 at 04:58:09AM -, John Levine wrote:
> >That's nice for you, but some of us are stuck with a corporate policy 
> >that requires us to use such disclaimers, or face disciplinary actions.  
> 
> Not to seem unsympathetic or anything, but it's not my problem if your
> management are idiots.

I, for one, never use a corporate account to access mailing lists.

My career has spanned many jobs, and I prefer to have a contiguous
footprint that _I_ control...

> R's,
> John

-- 
Brian Reichert  
BSD admin/developer at large



seeking pointers on the topic of 'name server registration'

2011-08-15 Thread Brian Reichert
I posted this request in another forum, but didn't get as much info as I'd
hoped:

  
http://article.gmane.org/gmane.org.operators.internet-access/5568/match=nameserver+registration

To reprise in _this_ forum:

I apologize for the noise; I hope this is an appropriate forum.

I've been hosting DNS for years for several domains.  Recently, I
have had to rename/renumber my primary servers, and need to update
various registrars of these changes.

Most registrars seem fine with me just supplying the names of the
new nameservers; they chase the A records, and generate the glue
records, and off I go.

One of these registrars (NetSol) introduces a topic I've never been
aware of before, this concept of 'name server registration'.

Web searching shows me several hits along the lines of 'how to
register namesevers with registrar X', but I can't find a treatment
of:

- Is this anything more than generating glue records?

- Why is this explicit step neccessary for some registrars, but not
  others?

I'd appreciate any advice...

--
Brian Reichert  
BSD admin/developer at large



Re: non operational question related to IP

2010-11-22 Thread Brian Reichert
On Mon, Nov 22, 2010 at 12:56:00PM -0700, Matlock, Kenneth L wrote:
> 'Octal' (Base-8) :)
> 
> The leading '0' is telling the box to interpret it as octal instead of
> decimal or hex.

My guess you're seeing an interface that uses inet_addr() instead
of inet_pton(); the latter is used more nowadays at it supports
both IPv4 and IPv6 addressing schemes.

Whereas I've seen this behavior with a lot of vendors, I'm tempted
to call it a bug:

  The Open Group Base Specifications Issue 6
  IEEE Std 1003.1, 2004 Edition

  http://www.opengroup.org/onlinepubs/009695399/functions/inet_ntop.html

  inet_pton():

  If the af argument of inet_pton() is AF_INET, the src string shall be in
  the standard IPv4 dotted-decimal form:

  ddd.ddd.ddd.ddd

  where "ddd" is a one to three digit decimal number between 0 and 255 (see
  inet_addr()).

No mention of dotted quad being anything other than 'decimal', much
less getting cute about guessing the radix.

The *BSD manpages for inet_pton() call out a similar constraint:

  
http://www.freebsd.org/cgi/man.cgi?query=inet_aton&apropos=0&sektion=0&manpath=FreeBSD+8.1-RELEASE&format=html

  STANDARDS
 The inet_ntop() and inet_pton() functions conform to X/Open
 Networking Services Issue 5.2 (``XNS5.2'').  Note that inet_pton()
 does not accept 1-, 2-, or 3-part dotted addresses; all four
 parts must be specified and are interpreted only as decimal
 values.  This is a narrower input set than that accepted by
 inet_aton().

As does Linux():

  http://www.kernel.org/doc/man-pages/online/pages/man3/inet_pton.3.html

  AF_INET
  src points to a character string containing an IPv4 network
  address in dotted-decimal format, "ddd.ddd.ddd.ddd", ...

RFC 2553 also calls out the non-decimal interpretation as being
'non-standard':

  http://www.ietf.org/rfc/rfc2553.txt

  If the af argument is AF_INET, the function accepts a string in
  the standard IPv4 dotted-decimal form:

  ddd.ddd.ddd.ddd

   where ddd is a one to three digit decimal number between 0 and 255.
   Note that many implementations of the existing inet_addr() and
   inet_aton() functions accept nonstandard input: octal numbers,
   hexadecimal numbers, and fewer than four numbers.  inet_pton() does
   not accept these formats.

Etc.

I've never been happy with inconsistencies in serializing data structures...

> Ken Matlock
> Network Analyst
> Exempla Healthcare
> (303) 467-4671
> matlo...@exempla.org

-- 
Brian Reichert  
55 Crystal Ave. #286
Derry NH 03038-1725 USA BSD admin/developer at large



Re: Wireless STM-1 link

2009-09-10 Thread Brian Reichert
On Thu, Sep 10, 2009 at 11:55:40AM +0200, Rens wrote:
> All the interfaces are forced to 1Gbps and full duplex.

I thought that with 1000T, you need to keep autonegotiation in place:

  
http://etherealmind.com/2008/07/15/ethernet-autonegotiation-works-why-how-standard-should-be-set/

"A major problem is that many people are also hard setting
Gigabit Ethernet , and this is causing major problems. Gigabit
Ethernet must have auto-negotiation ENABLED to allow negotiation
of master / slave PHY relationship for clocking at the physical
layer.  Without negotiation the line clock will not establish
correctly and physical layers problems can result."

Further:

  http://en.wikipedia.org/wiki/Autonegotiation

"The debatable portions of the autonegotiation specifications were
eliminated by the 1998 version of IEEE 802.3. In 1999, the negotiation
protocol was significantly extended by IEEE 802.3ab, which specified the
protocol for gigabit Ethernet, making autonegotiation mandatory for
1000BASE-T gigabit Ethernet over copper."

Note the 'mandatory'...

-- 
Brian Reichert  
55 Crystal Ave. #286Daytime number: (603) 434-6842
Derry NH 03038-1725 USA BSD admin/developer at large