On Wednesday 29 September 2004 19:41, Thomas Graf wrote:
> * Jason Boxman <[EMAIL PROTECTED]> 2004-09-29 19:29
>
> > I reported this previously and it was verified.
> >
> > Is this a bug in netlink or what? Who should I report this to?
>
> Can you reproduce it? Can you try with latest bk snapshot?
On Wednesday 29 September 2004 19:41, Thomas Graf wrote:
> * Jason Boxman <[EMAIL PROTECTED]> 2004-09-29 19:29
>
> > I reported this previously and it was verified.
> >
> > Is this a bug in netlink or what? Who should I report this to?
>
> Can you reproduce it? Can you try with latest bk snapshot?
d> It's also possible to run apache as a different user for every virtual
d> host (apache suexec wrapper needed), so owner matching would also
d> work there.
Actually it turned out that "Non-CGI requests are still processed with
the user specified in the main User directive." so it won't work for
a
* Jason Boxman <[EMAIL PROTECTED]> 2004-09-29 19:29
> I reported this previously and it was verified.
>
> Is this a bug in netlink or what? Who should I report this to?
Can you reproduce it? Can you try with latest bk snapshot? if the
problem still exists write to [EMAIL PROTECTED]
_
I reported this previously and it was verified.
Is this a bug in netlink or what? Who should I report this to?
Original Oops report:
http://mailman.ds9a.nl/pipermail/lartc/2004q2/012614.html
Thanks.
Linux rebecca 2.6.4 #1 Mon Sep 27 15:16:48 EDT 2004 i686 GNU/Linux
Sep 27 19:02:58 rebecca ke
Hi Patrick,
Iptables is capaple of matching/marking packets based on the uid or
guid of the owner of the process that generates traffic.
It's also possible to run apache as a different user for every virtual
host (apache suexec wrapper needed), so owner matching would also
work there.
For example
Sure - what I want to do is set up a colocated webhost/shell server,
and sell people accounts. However, I only have 2000mb upstream/2000mb
downstream free bandwidth, after which I start getting charged extra.
Therefore, I want to give *each user* a bandwidth quota, which if they
go over they can ch
Success!
If you put the traffic shaping qdiscs on the physical interface and change
ONE thing on the filter statement, everything works as advertised. Just
change the "protocol ip" to "protocol 802.1q" on the filter commands and
Viola - VLAN traffic shaping... I have not tested other rules, but
On Tuesday 28 September 2004 08:57, Stephan M. Ott wrote:
> Hi folks,
>
> I'm trying to shape two clients in my LAN when accessing the internet.
> Actual situation is that EVERY traffic goes into 1:40, so the client
> which should fall into 1:30 does not get the lower uplink it should
> have, but t
Hey Patrick
I seem to have forgotten the point that you want to relate the bandwidth
usages to a user. In the perl script you posted a link for, the author
uses lsof. This sollution is ok, if the connection is still in the list,
however if you accumulate in a log from netfilter, the probability of
Hi all,
I have a network like thisĀ :
Provider 1 Provider 2
\ /
\/
\ /
eth1 \/ eth2
-
| |
| |
| |
| |
| |
| eth0|
George Alexandru Dragoi wrote:
Perhaps a tweak would be to send 0x0 marked traffic to a chain and
apply such matches there, so really few traffic will go to p2p
matching.
That's the way I'm doing it. But it's useful only if you're not blocking
the p2p traffic. If you're blocking it, the connection
Hello,
shaping seems to be a hot topic at this list. I hope nobody will be
bored with my silly routing problem.
What happens if there is a route to a network via two interfaces? From
the NAG2:
,-
|While both routes match the destination, one of the routes has a larger
|netmask than the othe
I ran across one called culprit
(http://freshmeat.net/projects/culprit.pl/), which does kinda what I
want. However, by the looks of things it doesnt look like its going to
be easy to maintain a database of user bandwidth usage using it. I
might see what I can do about modifying it, but I'm shocking
Hej Patrick
Again there might be to ways I think. You could log the traffic via
libpcap or netfilter.
Netfilter could be set up to log specific traffic and afterwords you
could parse the logfile and flush it. The collected data could then be
put into a RRD base and graphed. The parsing of the lo
Hello everyone,
I want an opinion from people who tryed different matching modules to
match diferent types of traffic, especially p2p ones.
I would like to hear which scales better as CPU usage and latency :
ipp2p, iptables-p2p or l7-filter with the p2p patterns. I want to use
one of them to bloc
16 matches
Mail list logo