Re: Discarding inbound ICMP REDIRECT by default

2024-06-14 Thread Ed Maste
On Fri, 14 Jun 2024 at 11:13, Rodney W. Grimes wrote: > > That section is about how the router responds to an ICMP redirect > set to IT, not one that is going THROUGH it. Sorry I wasn't explicit, in all cases I'm talking about ICMP REDIRECTs destined for the machine (as a host or as a router). Th

Re: Discarding inbound ICMP REDIRECT by default

2024-06-14 Thread Ed Maste
On Fri, 14 Jun 2024 at 09:57, Rodney W. Grimes wrote: > > I am not sure that it would "hang" the port, but by ignoring the > rediect your going to place additional burden on the router that > is trying to redirect you as all packets would have to be forwarded > by that router. I suppose it could

Re: Discarding inbound ICMP REDIRECT by default

2024-06-14 Thread Ed Maste
On Fri, 14 Jun 2024 at 09:52, Rodney W. Grimes wrote: > > > > I would argue that having IP forwarding enabled (i.e. > > net.inet.ip.forwarding for IPv4) is what establishes FreeBSD as a > > router, and ICMP REDIRECT messages are already dropped in kernel in > > that case. > > Yet another mistake b

Re: Discarding inbound ICMP REDIRECT by default

2024-06-14 Thread Ed Maste
On Wed, 12 Jun 2024 at 18:05, Chris wrote: > > As Rodeney already effectively explains; dropping packets makes routing, > and discovery exceedingly difficult. Which is NOT what the average user > wants, This is on end hosts only, not routers (which already drop ICMP REDIRECT). > or expects. I us

Re: Discarding inbound ICMP REDIRECT by default

2024-06-14 Thread Ed Maste
> > > Discarding ICMP redirects on a internet host is non-conformant with > > > STD-3 via rfc-1122. Processing of ICMP rediects is a MUST for hosts. > > > > In that case our default of "auto" is non-conformant if you have a > > routing daemon. > > NO, because then your not subject to rfc-1122 as y

Re: Discarding inbound ICMP REDIRECT by default

2024-06-13 Thread Ed Maste
On Thu, 13 Jun 2024 at 09:39, Rodney W. Grimes wrote: > > Discarding ICMP redirects on a internet host is non-conformant with > STD-3 via rfc-1122. Processing of ICMP rediects is a MUST for hosts. In that case our default of "auto" is non-conformant if you have a routing daemon.

Importing dhcpcd(8) into FreeBSD base

2024-06-05 Thread Ed Maste
On Sun, 7 Aug 2022 at 01:32, Ben Woods wrote: > > Hi freebsd-net, > > I would like to propose dhcpcd is imported into FreeBSD base. I've started to revisit this during the Kitchener-Waterloo Hackathon. I've discussed briefly with Ben in private mail. For context, have a look at the previous thre

Re: Discarding inbound ICMP REDIRECT by default

2024-05-08 Thread Ed Maste
On Tue, 7 May 2024 at 14:35, Marek Zarychta wrote: > > But what about IPv6 ? We have "net.inet6.icmp6.rediraccept" knob which > defaults to 1. Can ICMPv6 redirects be fixed along with the change > proposed for the legacy IP protocol? It may make sense to apply the same default change for IPv6, bu

Discarding inbound ICMP REDIRECT by default

2024-05-07 Thread Ed Maste
I propose that we start dropping inbound ICMP REDIRECTs by default, by setting the net.inet.icmp.drop_redirect sysctl to 1 by default (and changing the associated rc.conf machinery). I've opened a Phabricator review at https://reviews.freebsd.org/D45102. ICMP REDIRECTs served a useful purpose in e

Re: removing RIP/RIPng (routed/route6d)

2024-04-16 Thread Ed Maste
On Mon, 15 Apr 2024 at 16:49, Lexi Winter wrote: > > currently FreeBSD ships routed(8) and route6d(8) which implement the RIP > resp. RIPng routing protocols. > ... > i'd like to submit a patch to remove both of these daemons from src. if > there's some concern that people still want to use the B

[Differential] D33717: route: remove write-only struct hostent from getaddr()

2022-01-05 Thread emaste (Ed Maste)
emaste removed a subscriber: freebsd-net-list. CHANGES SINCE LAST ACTION https://reviews.freebsd.org/D33717/new/ REVISION DETAIL https://reviews.freebsd.org/D33717 EMAIL PREFERENCES https://reviews.freebsd.org/settings/panel/emailpreferences/ To: emaste, melifaro, imp, hrs Cc: brooks, fre

[Differential] D33717: route: remove write-only struct hostent from getaddr()

2022-01-05 Thread emaste (Ed Maste)
emaste added a subscriber: brooks. CHANGES SINCE LAST ACTION https://reviews.freebsd.org/D33717/new/ REVISION DETAIL https://reviews.freebsd.org/D33717 EMAIL PREFERENCES https://reviews.freebsd.org/settings/panel/emailpreferences/ To: emaste, melifaro, imp, hrs Cc: brooks, freebsd-net-lis

[Differential] D33717: route: remove write-only struct hostent from getaddr()

2022-01-05 Thread emaste (Ed Maste)
emaste added a comment. As @melifaro pointed out to prompt this change hp was passed to three getaddr() calls in newroute(), and was not otherwise used, and getaddr() does not use the passed-in value. CHANGES SINCE LAST ACTION https://reviews.freebsd.org/D33717/new/ REVISION DETAIL http

[Differential] D33717: route: remove write-only struct hostent from getaddr()

2022-01-05 Thread emaste (Ed Maste)
emaste updated this revision to Diff 100973. emaste added a comment. remove now-unused variable CHANGES SINCE LAST UPDATE https://reviews.freebsd.org/D33717?vs=100815&id=100973 CHANGES SINCE LAST ACTION https://reviews.freebsd.org/D33717/new/ REVISION DETAIL https://reviews.freebsd.org

[Differential] D33717: route: remove write-only struct hostent from getaddr()

2022-01-01 Thread emaste (Ed Maste)
emaste added reviewers: imp, hrs. CHANGES SINCE LAST ACTION https://reviews.freebsd.org/D33717/new/ REVISION DETAIL https://reviews.freebsd.org/D33717 EMAIL PREFERENCES https://reviews.freebsd.org/settings/panel/emailpreferences/ To: emaste, melifaro, imp, hrs Cc: freebsd-net-list

[Differential] D33717: route: remove write-only struct hostent from getaddr()

2022-01-01 Thread emaste (Ed Maste)
emaste removed reviewers: imp, hrs. CHANGES SINCE LAST ACTION https://reviews.freebsd.org/D33717/new/ REVISION DETAIL https://reviews.freebsd.org/D33717 EMAIL PREFERENCES https://reviews.freebsd.org/settings/panel/emailpreferences/ To: emaste, melifaro, imp, hrs Cc: freebsd-net-list

[Differential] D33717: route: remove write-only struct hostent from getaddr()

2022-01-01 Thread emaste (Ed Maste)
emaste updated this revision to Diff 100815. emaste added reviewers: melifaro, imp, hrs. emaste added a subscriber: freebsd-net-list. CHANGES SINCE LAST UPDATE https://reviews.freebsd.org/D33717?vs=100814&id=100815 CHANGES SINCE LAST ACTION https://reviews.freebsd.org/D33717/new/ REVISION DE

[Differential] [Changed Subscribers] D1986: Teach lagg(4) to change MTU

2015-03-01 Thread emaste (Ed Maste)
emaste added a subscriber: emaste. REVISION DETAIL https://reviews.freebsd.org/D1986 To: rpokala-panasas.com, rstone Cc: emaste, ae, freebsd-net ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscr

[Differential] [Changed Subscribers] D1869: Tests of basic nvlist add functions

2015-02-19 Thread emaste (Ed Maste)
emaste added a subscriber: emaste. REVISION DETAIL https://reviews.freebsd.org/D1869 To: rstone, jfvogel Cc: emaste, pjd, freebsd-net ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscribe, send a

[Differential] [Changed Subscribers] D1881: Allow Illumos code to co-exist with nv(9)

2015-02-18 Thread emaste (Ed Maste)
emaste added a subscriber: emaste. REVISION DETAIL https://reviews.freebsd.org/D1881 To: rstone, jfvogel Cc: emaste, pjd, freebsd-net ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscribe, send a

[Differential] [Changed Subscribers] D1805: [sockbuf] Don't access fields directly, use accessor functions

2015-02-08 Thread emaste (Ed Maste)
emaste added a subscriber: emaste. REVISION DETAIL https://reviews.freebsd.org/D1805 To: davide, kmacy, np, lstewart, rrs, rwatson Cc: emaste, freebsd-net ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net T

[Differential] [Commented On] D1711: Changes to the callout code to restore active semantics and also add a test-framework and test to validate thecallout code (and potentially for use by other tests)

2015-02-03 Thread emaste (Ed Maste)
emaste added inline comments. INLINE COMMENTS kern/kern_timeout.c:1159 Yeah, something like @imp's suggestion makes it more clear to me. REVISION DETAIL https://reviews.freebsd.org/D1711 To: rrs, gnn, rwatson, sbruno, lstewart, jhb, kostikbel, hselasky, adrian, imp Cc: jhb, kostikbel, emast

[Differential] [Commented On] D1711: Changes to the callout code to restore active semantics and also add a test-framework and test to validate thecallout code (and potentially for use by other tests)

2015-02-02 Thread emaste (Ed Maste)
emaste added a comment. For future diffs, please generate with full context, e.g. -U99 INLINE COMMENTS sys/kern/kern_timeout.c:789 added EOL whitespace? sys/kern/kern_timeout.c:1067-1069 I'm a bit confused by this sentence. REVISION DETAIL https://reviews.freebsd.org/D1711 To: rrs, gn

[Differential] [Changed Subscribers] D1711: Changes to the callout code to restore active semantics and also add a test-framework and test to validate thecallout code (and potentially for use by other

2015-01-28 Thread emaste (Ed Maste)
emaste added a subscriber: emaste. REVISION DETAIL https://reviews.freebsd.org/D1711 To: rrs, gnn, rwatson, adrian, sbruno, lstewart, hselasky, imp Cc: emaste, delphij, neel, erj, freebsd-net ___ freebsd-net@freebsd.org mailing list http://lists.freeb

[Differential] [Changed Subscribers] D1309: VIMAGE PF fixes #1

2015-01-06 Thread emaste (Ed Maste)
emaste added a subscriber: emaste. REVISION DETAIL https://reviews.freebsd.org/D1309 To: rodrigc, glebius, trociny, zec, np, melifaro, hrs, wollman, bryanv, rpaulo, adrian, bz, gnn, hiren, rwatson Cc: emaste, freebsd-virtualization, freebsd-pf, freebsd-net _

Re: Default route changes unexpectedly

2013-04-24 Thread Ed Maste
On 24 April 2013 14:57, Adrian Chadd wrote: > Is this an issue on -7 and -6? I believe so, and it should get merged there as well. ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscribe, send any ma

Re: [PATCH] Handle PACKET_TAG_IPFORWARD and TIMEWAIT state

2013-03-01 Thread Ed Maste
On 1 March 2013 10:53, Andrey V. Elsukov wrote: > On 01.03.2013 01:06, Ed Maste wrote: >> On 28 February 2013 14:10, Ed Maste wrote: >>> The attached patch keeps the fwd_tag >>> around until finished with pcb lookup. >> >> There's a small bug in tha

Re: [PATCH] Handle PACKET_TAG_IPFORWARD and TIMEWAIT state

2013-02-28 Thread Ed Maste
On 28 February 2013 14:10, Ed Maste wrote: > The attached patch keeps the fwd_tag > around until finished with pcb lookup. There's a small bug in that patch - a corrected version, which handles a NULL return from m_tag_find, can be found at: http://people.freebsd.org/~ema

[PATCH] Handle PACKET_TAG_IPFORWARD and TIMEWAIT state

2013-02-28 Thread Ed Maste
SVN rev 244157 introduced a fix for a crash in tcp_input() which would occur in the case of a packet with a PACKET_TAG_IPFORWARD m_tag arriving for a flow in TIMEWAIT. Such packets resulted in a goto findpcb an a double free of the m_tag. Unfortunately the fix causes the fwd_tag to be lost for an

Re: Syncookies break with Windows 8

2013-02-01 Thread Ed Maste
On 1 February 2013 16:21, Kevin Day wrote: > We've got a large cluster of HTTP servers, each server handling > >10,000req/sec. Occasionally, and during periods of heavy load, we'd get > complaints from some users that downloads were working but going EXTREMELY > slowly. After a whole lot of deb

kern/138620 [patch] Sysctl for direct BPF writes to lagg child ports

2012-05-01 Thread Ed Maste
The following reply was made to PR kern/138620; it has been noted by GNATS. From: Ed Maste To: , Cc: Subject: kern/138620 [patch] Sysctl for direct BPF writes to lagg child ports Date: Tue, 1 May 2012 13:08:01 -0400 --jRHKVT23PllUwdXP Content-Type: text/plain; charset="us-ascii"

Re: lagg(4) MAC address selection proposal

2012-04-17 Thread Ed Maste
On Wed, Apr 18, 2012 at 12:53:43PM +1200, Andrew Thompson wrote: > What we also need is a event trigger for > various pseudo interfaces when the mac or primary interface changes, > this would allow arp/nd6 to rebroadcast. Yes, we're working something like this specifically for lagg but it should

lagg(4) MAC address selection proposal

2012-04-17 Thread Ed Maste
When a new lagg(4) interface is created the link layer address from the first port in the group is assigned to the lagg and to all other lagg port members. This means the address assigned to the lagg is different if specified as, for example, "laggport em0 laggport em1" vs "laggport em1 laggport e

Re: Lagg failover does not announce the failover to switch

2012-03-09 Thread Ed Maste
dation instead to help support the FreeBSD project in general. Regards, Ed Maste ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"

Re: openbgpds not talking each other since 8.2-STABLE upgrade

2012-01-06 Thread Ed Maste
On Thu, Jan 05, 2012 at 08:18:39PM -0500, J David wrote: > To help understand what's going on and test some of this stuff, I > hacked up a TCP-MD5-aware echo server and tried various things. Hi J David, Thank you very much for this extensive testing and analysis. Would you care to post your bas

Re: openbgpds not talking each other since 8.2-STABLE upgrade

2012-01-03 Thread Ed Maste
On Tue, Jan 03, 2012 at 09:07:56AM +0200, Nikolay Denev wrote: > Since I've had similar problem with Quagga after updating to 8.2-STABLE I'd > suggest > you to try setting "net.inet.tcp.signature_verify_input=0" and see if that > would help. > > Here is another thread about the similar (if not

Re: Polling slows down bandwidth

2010-10-30 Thread Ed Maste
On Sat, Oct 30, 2010 at 12:32:19PM +0100, Paul Thornton wrote: > I've been doing testing with FreeBSD 8 and em interfaces recently, and > my experience agrees with Chuck's statement - that polling makes things > worse when you use new (anything in the last 2 or 3 years) hardware with > good qualit

Re: [PATCH] Netdump for review and testing -- preliminary version

2010-10-13 Thread Ed Maste
On Wed, Oct 13, 2010 at 01:04:54PM +0200, Attilio Rao wrote: > 2010/10/9 Robert Watson : > > (1) Did you consider using tftp as the network dump protocol, rather than a > > custom protocol? ??It's also a simple UDP-based, ACKed file transfer > > protocol, with the advantage that it's widely suppo

Re: [PATCH] Netdump for review and testing -- preliminary version

2010-10-10 Thread Ed Maste
On Sat, Oct 09, 2010 at 02:15:39AM +0100, Robert Watson wrote: > Network dumps would be a great addition to the FreeBSD debugging suite! > [...] It seems that at EuroBSDCon there was a discussion of Contiki[1] and the uIPv6 stack[2] that it contains, and I think something like this could be a gre

Re: Is this a race in mbuf's refcounting?

2009-09-21 Thread Ed Maste
On Mon, Sep 21, 2009 at 01:43:33PM +0100, Andrew Brampton wrote: > I've been reading the FreeBSD source code to understand how mbufs are > reference counted. However, there are a few bits of code that I'm > wondering if they would fail under the exactly right timing. Take for > example in uipc_mbu

Re: kern/122780: [lagg] tcpdump on lagg interface during high pps wedges netcode

2009-08-17 Thread Ed Maste
The following reply was made to PR kern/122780; it has been noted by GNATS. From: Ed Maste To: bug-follo...@freebsd.org, p...@gtcomm.net Cc: Subject: Re: kern/122780: [lagg] tcpdump on lagg interface during high pps wedges netcode Date: Mon, 17 Aug 2009 16:14:13 -0400 Can you retest on

Re: Interrupts + Polling mode (similar to Linux's NAPI)

2009-04-24 Thread Ed Maste
On Fri, Apr 24, 2009 at 08:03:52AM -0700, Barney Cordoba wrote: > Actually, the "advantage of using interrupts" is to have a per > NIC control without having all of the extra code to implement > polling. Using variable interrupt moderation is much more desirable > and efficient, so polling is only

Re: Interrupts + Polling mode (similar to Linux's NAPI)

2009-04-23 Thread Ed Maste
On Fri, Mar 27, 2009 at 11:05:00AM +, Andrew Brampton wrote: > 2009/3/27 Luigi Rizzo : > > The load of polling is pretty low (within 1% or so) even with > > polling. The advantage of having interrupts is faster response > > to incoming traffic, not CPU load. > > oh, I was under the impression

Re: panic: _mtx_lock_sleep: recursed on non-recursive mutex if_addr_mtx

2008-04-28 Thread Ed Maste
On Tue, Mar 25, 2008 at 04:00:33PM -0400, Ed Maste wrote: > GENERIC CURRENT as of this morning. > > panic: _mtx_lock_sleep: recursed on non-recursive mutex if_addr_mtx @ > /d2/emaste/HEAD/src/sys/netinet6/ip6_output.c:719 > ... > panic() at panic+0x176 > _mtx_lock_sleep

Re: FreeBSD as a gigabit router

2007-10-10 Thread Ed Maste
On Thu, Oct 04, 2007 at 12:02:56PM -0700, Michael DeMan wrote: > Also, we've noticed at least on FBSD 6.x that there seem to be very > few advantages in using polling on network interfaces. We still run > it, so that we have responsive SSH/BGP/OSPF processes on the > machines, but my testin

inet_pton and oddly-formatted addresses

2007-01-20 Thread Ed Maste
It turns out an application at work is passing an IP address to inet_pton that is formatted slightly strangely; it ends up being something of the form 1.002.3.4. In 4.x inet_pton reports this as valid and returns 1.2.3.4. (I also checked that it's just ignoring the leading zeros, not parsing the

m_dup oddity -- creates mbuf chains with cluster containing 208 bytes of data

2005-12-14 Thread Ed Maste
ags & M_EXT) == 0) + nsize = MHLEN; } n->m_len = 0; -- Ed Maste, Sandvine Incorporated ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net To u

BIOCSSEESENT ioctl not honoured for single-mbuf packets

2005-08-31 Thread Ed Maste
that includes the flag, and make bpf_tap call it (for any third party drivers using bpf_tap)? -- Ed Maste Sandvine Incorporated ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Re: Multicast locking LOR

2005-08-09 Thread Ed Maste
On Mon, Aug 08, 2005 at 10:34:53PM +0100, Robert Watson wrote: > Could you add a hard-coded entry to WITNESS to place the udpinp lock > before the in_multi_mtx in the lock order, and let me know which path > resulted in the opposite order from this one? I hard-coded the correct order, but am now

[PATCH] Minor cleanup of inline declaration for netgraph.h

2005-08-08 Thread Ed Maste
We build one of our netgraph modules with -W, which causes GCC to emit "warning: `inline' is not at beginning of declaration" for netgraph.h. It's pretty trivial, but the attached patch cleans this up so it's consistent across all of the functions in netgraph.

Multicast locking LOR

2005-08-08 Thread Ed Maste
(685a003b,804003b,9fbf003b,821c400,f6) at 0xa06c75b3 = syscall+0x25b Xint0x80_syscall() at 0xa06b4ccf = Xint0x80_syscall+0x1f --- syscall (4, FreeBSD ELF32, write), eip = 0x681e31af, esp = 0x9f9ff9fc, ebp = 0x9f9ffa18 --- -- Ed Maste, Sandvine Incorporated

Re: what to replace splnet in FreeBSD 5.x?

2005-08-02 Thread Ed Maste
. I haven't yet looked over the whole patch to understand the specifics. I'll post again once I do if I have any ideas. -- Ed Maste, Sandvine Incorporated. ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Re: what to replace splnet in FreeBSD 5.x?

2005-07-12 Thread Ed Maste
e problem but have had no success yet. -- Ed Maste, Sandvine Incorporated ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Re: what to replace splnet in FreeBSD 5.x?

2005-07-12 Thread Ed Maste
ts (in_multihead) on 5.x, and it turns out in_addmulti still has splnet() "protecting" the list. I'm not sure how many of the splnet()s are actually false positives (i.e. no longer relevant, locked in another way, etc.) but they're probably all good indicators of places th

RE: [PATCH] Add ioctl to disable bpf timestamping

2004-09-08 Thread Ed Maste
>From Bruce's patch: + if (d->bd_tstamp == BPF_TSTAMP_MICROTIME) + microtime(&hp->bh_tstamp); + else if (d->bd_tstamp == BPF_TSTAMP_GETMICROTIME) + getmicrotime(&hp->bh_tstamp); Perhaps set the timestamp to zero in the else

RE: [PATCH] Add ioctl to disable bpf timestamping

2004-09-08 Thread Ed Maste
would. One way to allow the user to control this behaviour on a per- application basis would be to have libpcap check an env var in order to decide if the ioctl should be set. Ed Maste Sandvine Inc. ___ [EMAIL PROTECTED] mailing list http://lists.freebs

RE: TCP socket shutdown race condition

2003-08-20 Thread Ed Maste
>Well, I guess the spl() fix is probably going to be the quickest here >then, please send it to me once you've pounded on it, Ed. So my spl() fix seems to eliminate the problem for me but while I'm looking at this stuff I want to make sure there aren't any related cases left in. My current patch i

RE: TCP socket shutdown race condition

2003-08-14 Thread Ed Maste
Mike "Silby" Silbersack wrote: >Well, as ui_ref is the best bet, redoing your tests with it expanded to >ui_int is where we need to start before looking further. :) > >I believe that a uidinfo->ui_ref over/underflow could cause random memory >corruption, so maybe the panic you're seeing comes abou