Re: eth_send of ARP packet returned -1 rather than expected 42

2019-01-08 Thread Marco Berizzi
> Not sure it's the same issue, but can you test with commit 6b8d95f1795c > ("packet: validate address length if non-zero")? It's in mainline > already and queued for -stable. > > See similar report here: > https://www.spinics.net/lists/netdev/msg541807.html Hi, Thanks for the quick response. Ye

eth_send of ARP packet returned -1 rather than expected 42

2019-01-07 Thread Marco Berizzi
Hi Folks, I'm getting this message when I run nmap 7.70 with linux 4.20 Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-07 16:15 CET Initiating ARP Ping Scan at 16:15 Scanning 10.81.104.82 [1 port] WARNING: eth_send of ARP packet returned -1 rather than expected 42 (errno=22: Invalid argument

Re: [PATCH net] net: sched: Remove TCA_OPTIONS from policy

2018-10-31 Thread Marco Berizzi
> Il 26 ottobre 2018 alle 20.19 Cong Wang ha scritto: > > On Fri, Oct 26, 2018 at 4:35 AM Marco Berizzi wrote: > > > Apologies for bothering you again. > > I applied your patch to 4.19, but after issuing this > > command: > > > > root@Calimero:~#

Re: [PATCH net] net: sched: Remove TCA_OPTIONS from policy

2018-10-26 Thread Marco Berizzi
> Il 24 ottobre 2018 alle 17.32 David Ahern ha scritto: > net/sched/sch_api.c | 1 - > 1 file changed, 1 deletion(-) > > diff --git a/net/sched/sch_api.c b/net/sched/sch_api.c > index 3dc0acf54245..be7cd140b2a3 100644 > --- a/net/sched/sch_api.c > +++ b/net/sched/sch_api.c > @@ -1309,7 +1309,6 @

Attribute failed policy validation

2018-10-24 Thread Marco Berizzi
Hi Folks, I'm getting this message after the upgrade from linux 4.18 to 4.19 root@Calimero:~# tc qdisc add dev eth0 root handle 1:0 hfsc default 1 Error: Attribute failed policy validation. root@Calimero:~# lsmod | grep hfsc sch_hfsc 24576 0 root@Calimero:~# tc -V tc utility,

icmp redirect sent when an active ipsec child_sa exist

2018-10-09 Thread Marco Berizzi
Hi Folks, I'm running strongSwan on Slackware with linux 4.18 This is the output from 'ip route show': default via isp_router dev eth0 metric 1 10.0.0.0/8 via 10.68.63.3 dev eth1 10.68.63.0/26 dev eth1 proto kernel scope link src 10.68.63.62 127.0.0.0/8 dev lo scope link 172.16.0.0/12 via 10.

Re: WARNING: CPU: 3 PID: 0 at net/sched/sch_hfsc.c:1388 hfsc_dequeue+0x319/0x350 [sch_hfsc]

2018-06-22 Thread Marco Berizzi
> Il 21 giugno 2018 alle 1.00 Cong Wang ha scritto: > Please also test HFSC_RSC ("rt") if possible. Hi Cong, sorry for the delayed response. I have tested this hfsc rt setup: tc class add dev eth2 parent 1:2 classid 1:16 hfsc rt m2 500kbit and tc class add dev eth2 parent 1:2 classid 1:16 hfsc

Re: WARNING: CPU: 3 PID: 0 at net/sched/sch_hfsc.c:1388 hfsc_dequeue+0x319/0x350 [sch_hfsc]

2018-06-20 Thread Marco Berizzi
> Il 19 giugno 2018 alle 13.42 Marco Berizzi ha scritto: > > > Il 18 giugno 2018 alle 21.28 Cong Wang ha > > scritto: > > Can you test the attached patch? > > > > It almost certainly fixes the warning, but I am not sure if > > it papers out any oth

Re: WARNING: CPU: 3 PID: 0 at net/sched/sch_hfsc.c:1388 hfsc_dequeue+0x319/0x350 [sch_hfsc]

2018-06-19 Thread Marco Berizzi
> Il 18 giugno 2018 alle 21.28 Cong Wang ha scritto: > Can you test the attached patch? > > It almost certainly fixes the warning, but I am not sure if > it papers out any other real problem. Please make sure > hfsc still works as expected. :) Hi Cong, Thanks a lot for the patch. I'm building 4

Re: WARNING: CPU: 3 PID: 0 at net/sched/sch_hfsc.c:1388 hfsc_dequeue+0x319/0x350 [sch_hfsc]

2018-06-04 Thread Marco Berizzi
> Il 8 marzo 2018 alle 17.02 Marco Berizzi ha scritto: > > > Marco Berizzi wrote: > > > > Hello everyone, > > > > Yesterday I got this error on a slackware linux 4.16-rc4 system > > running as a traffic shaping gateway and netfilter nat. > &g

Re: WARNING: CPU: 3 PID: 0 at net/sched/sch_hfsc.c:1388 hfsc_dequeue+0x319/0x350 [sch_hfsc]

2018-04-06 Thread Marco Berizzi
> Il 19 marzo 2018 alle 11.07 Jamal Hadi Salim ha scritto: > > On 18-03-15 08:48 PM, Cong Wang wrote: > > > On Wed, Mar 14, 2018 at 1:10 AM, Marco Berizzi wrote: > > > > > > Il 9 marzo 2018 alle 0.14 Cong Wang ha > > > > scritt

Re: WARNING: CPU: 3 PID: 0 at net/sched/sch_hfsc.c:1388 hfsc_dequeue+0x319/0x350 [sch_hfsc]

2018-03-22 Thread Marco Berizzi
Il 19 marzo 2018 alle 11.07 Jamal Hadi Salim ha scritto: > > On 18-03-15 08:48 PM, Cong Wang wrote: > > > On Wed, Mar 14, 2018 at 1:10 AM, Marco Berizzi wrote: > > > > > > Il 9 marzo 2018 alle 0.14 Cong Wang ha > > > > scritto: > > > &g

Re: NETDEV WATCHDOG: eth2 (e1000e): transmit queue 0 timed out

2018-03-19 Thread Marco Berizzi
> Marco Berizzi wrote: > I'm getting the same error messages, after hardware > replacement and kernel upgrade to 4.16-rc5. for completeness, same error with 4.16-rc6 [0.00] Linux version 4.16.0-rc6 (root@Pleiadi) (gcc version 5.5.0 (GCC)) #1 SMP Mon Mar 19 12:

Re: NETDEV WATCHDOG: eth2 (e1000e): transmit queue 0 timed out

2018-03-19 Thread Marco Berizzi
> Marco Berizzi wrote: > > > Hello everyone, > > After upgrading to linux 4.15.3 (4.15.2 was the last version > with no error), I'm getting this error message. > This a Slackware 14.2 64bit ipsec gateway running strongswan. > > Any response are welcome. &

Re: WARNING: CPU: 3 PID: 0 at net/sched/sch_hfsc.c:1388 hfsc_dequeue+0x319/0x350 [sch_hfsc]

2018-03-14 Thread Marco Berizzi
> Il 9 marzo 2018 alle 0.14 Cong Wang ha scritto: > > > On Thu, Mar 8, 2018 at 8:02 AM, Marco Berizzi wrote: > >> Marco Berizzi wrote: > >> > >> > >> Hello everyone, > >> > >> Yesterday I got this error on a slackware l

Re: WARNING: CPU: 3 PID: 0 at net/sched/sch_hfsc.c:1388 hfsc_dequeue+0x319/0x350 [sch_hfsc]

2018-03-08 Thread Marco Berizzi
> Marco Berizzi wrote: > > > Hello everyone, > > Yesterday I got this error on a slackware linux 4.16-rc4 system > running as a traffic shaping gateway and netfilter nat. > The error has been arisen after a partial ISP network outage, > so unfortunately it will not

WARNING: CPU: 3 PID: 0 at net/sched/sch_hfsc.c:1388 hfsc_dequeue+0x319/0x350 [sch_hfsc]

2018-03-07 Thread Marco Berizzi
Any response are welcome. TIA Marco Berizzi Mar 5 19:06:34 Trappist kernel: klogd 1.5.1, log source = /proc/kmsg started. Mar 5 19:06:34 Trappist kernel: Linux version 4.16.0-rc4 (root@Trappist) (gcc version 5.5.0 (GCC)) #1 SMP Mon Mar 5 18:31:06 CET 2018 Mar 5 19:06:34 Trappist kernel

NETDEV WATCHDOG: eth2 (e1000e): transmit queue 0 timed out

2018-02-19 Thread Marco Berizzi
Hello everyone, After upgrading to linux 4.15.3 (4.15.2 was the last version with no error), I'm getting this error message. This a Slackware 14.2 64bit ipsec gateway running strongswan. Any response are welcome. TIA [241395.181389] [ cut here ] [241395.181396] NETDEV WA

Re: esp spi incorrectly reported by ip -s x p

2018-01-25 Thread Marco Berizzi
ec), hard 4800(sec) > expire use: soft 0(sec), hard 0(sec) > lifetime current: > 11180(bytes), 215(packets) > add 2018-01-19 17:43:50 use 2018-01-19 17:43:50 > stats: > replay-window 0 replay 0 failed 0 > > Kindly, I would like to ask if this is the expected behaviour. > > Thanks in advance > > Marco Berizzi

esp spi incorrectly reported by ip -s x p

2018-01-22 Thread Marco Berizzi
k if this is the expected behaviour. Thanks in advance Marco Berizzi

u32 match ip src

2017-10-30 Thread Marco Berizzi
Hi Folks, Sorry for writing to you, but I'm dealing with a very weird problem. I'm monitoring a network wan link traffic with a linux box with two NIC: one nic is for regular ipv4 network connectivity (eth0), and the other nic (eth1) is for sniffing all packets coming from an HPE 5510 switch: here

Re: software interrupts close to 100 with 9000 tc filter entries

2017-09-19 Thread Marco Berizzi
> Eric Dumazet wrote: > > On Tue, 2017-09-19 at 15:28 +0200, Marco Berizzi wrote: > > > Hi Folks, > > > > I'm running linux 4.12.10 x86_64 on a Slackware 14.2 64bit > > as a simple 4 NIC router. Network throughput processed by > > this machine is l

software interrupts close to 100 with 9000 tc filter entries

2017-09-19 Thread Marco Berizzi
Hi Folks, I'm running linux 4.12.10 x86_64 on a Slackware 14.2 64bit as a simple 4 NIC router. Network throughput processed by this machine is less than 200Mbit/s The cpu model is Intel(R) Xeon(R) CPU 5160 @ 3.00GHz with 2GB ram. I need to blacklist about 9000 single ip addresses. This is the re

Re: ipcomp regression in 2.6.24

2008-02-08 Thread Marco Berizzi
David Miller wrote: > From: Herbert Xu <[EMAIL PROTECTED]> > Date: Wed, 30 Jan 2008 14:15:33 +1100 > > > Marco Berizzi <[EMAIL PROTECTED]> wrote: > > > > > >> > With 2.6.24 IPSEC/ESP tunnels to older kernels establish fine, data > > &g

Re: ipcomp regression in 2.6.24

2008-01-31 Thread Marco Berizzi
Herbert Xu wrote: > On Wed, Jan 30, 2008 at 10:14:46AM +0100, Marco Berizzi wrote: > > > > Sorry for bother you again. > > I have applied to 2.6.24, but ipcomp doesn't work anyway. > > I have patched a clean 2.6.24 tree and I did a complete > > rebuild. >

Re: ipcomp regression in 2.6.24

2008-01-30 Thread Marco Berizzi
Herbert Xu wrote: > Marco Berizzi <[EMAIL PROTECTED]> wrote: > > > >> > With 2.6.24 IPSEC/ESP tunnels to older kernels establish fine, data > >> > flows in both directions, but no data comes out of the tunnel. > >> > Needed to disable ipcomp

Re: ipcomp regression in 2.6.24

2008-01-29 Thread Marco Berizzi
Beschorner Daniel wrote: > Has someone an idea which patch could have damaged ipcomp? > > Daniel > > > With 2.6.24 IPSEC/ESP tunnels to older kernels establish fine, data > > flows in both directions, but no data comes out of the tunnel. > > Needed to disable ipcomp. Same problem here: linux 2.6.

arp queries and ipsec policy

2008-01-23 Thread Marco Berizzi
Hello everybody. I'm using openswan 2.4.x to drive the linux 2.4.23.14 ipsec native stack (netkey). Openswan by default insert a static route when an ipsec SA is established: this is needed by the klips stack as it is routing based. For example when a roadwarrior establish an ipsec SA with the linu

rp_filter and ip rule break ipsec policy

2008-01-11 Thread Marco Berizzi
Hello everybody. AFAIK ipsec policy aren't related to routing tables: if there is an ipsec policy to deliver traffic, for example, from 192.168.0.0/16 to 10.0.0.0/8, xfrm will eat the packets ignoring the routing table. Here is the ipsec gateway schema: [-] cisco ISP router default gateway

Re: missing dir in and dir fwd policy on 2.6.23

2007-12-19 Thread Marco Berizzi
Herbert Xu wrote: > Marco Berizzi <[EMAIL PROTECTED]> wrote: > > Hello everybody. > > I'm experimenting a pretty strange ipsec problem with 2.6.23.x > > and openswan 2.4.11 > > Here is the output from 'ip -s x p': > > It's a bug in open

missing dir in and dir fwd policy on 2.6.23

2007-12-18 Thread Marco Berizzi
Hello everybody. I'm experimenting a pretty strange ipsec problem with 2.6.23.x and openswan 2.4.11 Here is the output from 'ip -s x p': src 172.16.0.0/23 dst 192.168.15.2/32 uid 0 dir out action allow index 529 priority 2368 ptype main share any flag 0x00 00 lifetime config:

Re: routing policy based on u32 classifier

2007-12-11 Thread Marco Berizzi
Brian S Julin wrote: > Marco wrote: > >> Brian S Julin wrote: >>> Almost clear... why can you not just add "src >> IP>" to the fwmark >>> route to set the default source address for locally >>> originating >>> packets? >> >> IIRC, it doesn't work because netfilter isn't called in >> ip source addr

Re: routing policy based on u32 classifier

2007-12-10 Thread Marco Berizzi
Brian S Julin wrote: > Almost clear... why can you not just add "src " to > the fwmark route to set the default source address for locally > originating packets? IIRC, it doesn't work because netfilter isn't called in ip source address selection. -- To unsubscribe from this list: send the line

Re: routing policy based on u32 classifier

2007-12-10 Thread Marco Berizzi
Brian S Julin wrote: Marco wrote: > > Hello everybody. > > Kindly, I would like to know if the is any plan to add this feature to a > > future kernel release. > > I know that fwmark is able to do this, but there is the limitation in > > source ip address selection. > Could you explain the limita

routing policy based on u32 classifier

2007-12-10 Thread Marco Berizzi
Hello everybody. Kindly, I would like to know if the is any plan to add this feature to a future kernel release. I know that fwmark is able to do this, but there is the limitation in source ip address selection. TIA -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body

Re: wrong arp query with policy routing

2007-09-21 Thread Marco Berizzi
Marco Berizzi wrote: > inet 1.1.1.1/32 scope global eth0 ^^ Sorry, my fault. Apologies for all the noise. - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vg

Re: wrong arp query with policy routing

2007-09-21 Thread Marco Berizzi
jamal wrote: > On Fri, 2007-21-09 at 11:08 +0200, Marco Berizzi wrote: > > > thanks for the reply. > > I have tried to 'echo 1 > /proc/sys/net/ipv4/conf/eth0', > > but the 'arp whos-has' behaviour doesn't change. > > Other hints? > >

Re: wrong arp query with policy routing

2007-09-21 Thread Marco Berizzi
Chuck Ebbert wrote: > > Is there a way to force linux to make an arp > > probe with the source ip belonging to the > > same subnet requesting ip? > > Umm, arp_filter? Hello Chuck, thanks for the reply. I have tried to 'echo 1 > /proc/sys/net/ipv4/conf/eth0', but the 'arp whos-has' behaviour does

Re: wrong arp query with policy routing

2007-09-19 Thread Marco Berizzi
Marco Berizzi wrote: > HDSL.225 dev eth0 scope link > ADSL.129 dev eth0 scope link src ADSL.134 > ADSL.128/29 dev eth1 proto kernel scope link src ADSL.134 > HDSL.224/27 dev eth1 proto kernel scope link src HDSL.254 > 127.0.0.0/8 dev lo scope link > default via HDSL.22

wrong arp query with policy routing

2007-09-18 Thread Marco Berizzi
1234567890123456789012345678901234567890123456789012345678901234567890 1 2 3 4 5 6 7 Hello everybody. I have a pretty strange problem with linux 2.6.22.6 This is my 'ip ru sh', 'ip a s', 'ip r s' and 'iptables -t mangle -nvxL' output: 0: fr

Re: pmtu discovery on sa esp

2007-06-13 Thread Marco Berizzi
Patrick McHardy wrote: > Marco Berizzi wrote: > > Patrick McHardy wrote: > > > >>We have some MTU opimiztations in 2.6.22-rc that might be related. > >>Please check with tcpdump what exactly is happening and whether > >>the 2.6.22-rc box is sending to

Re: pmtu discovery on sa esp

2007-06-13 Thread Marco Berizzi
Patrick McHardy wrote: > Marco Berizzi wrote: > > Hello everybody. > > I have just upgraded from 2.6.21.3 to > > 2.6.22-rc4 and I get a ton of > > pmtu discovery on sa esp/blablab/blabla > > messages (this box is running openswan). > > Is this an exp

pmtu discovery on sa esp

2007-06-12 Thread Marco Berizzi
Hello everybody. I have just upgraded from 2.6.21.3 to 2.6.22-rc4 and I get a ton of pmtu discovery on sa esp/blablab/blabla messages (this box is running openswan). Is this an expected behaviour? TIA - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to

Re: XFRM does not rate limit messages from the kernel to userspace

2007-01-23 Thread Marco Berizzi
Herbert Xu wrote: > Marco Berizzi <[EMAIL PROTECTED]> wrote: > > > > AFAIK it was applied to osw 2.4.2 > > Also changelog confirm this: > > > > v2.4.2 > > Indeed. Somehow I couldn't find the patch in the git tree that > I had here. It wasn&#x

Re: XFRM does not rate limit messages from the kernel to userspace

2007-01-23 Thread Marco Berizzi
Herbert Xu wrote: > Marco Berizzi <[EMAIL PROTECTED]> wrote: > > I'm experimenting the problem described in this > > bug report http://bugs.xelerance.com/view.php?id=726 > > It's actually a bug in openswan. I even sent them a patch for > it back in

XFRM does not rate limit messages from the kernel to userspace

2007-01-23 Thread Marco Berizzi
Hello everybody. I'm experimenting the problem described in this bug report http://bugs.xelerance.com/view.php?id=726 The system is running vanilla 2.6.19.2 on Slackware 10.1 (gcc 3.3.5, glibc 2.3.5) I'm available for any kind of test. TIA PS: I see a lot kernel memory allocation: [EMAIL PROTECT

Re: passthrough openswan connection not working with 2.6.19.2

2007-01-17 Thread Marco Berizzi
Herbert Xu wrote: > Marco Berizzi <[EMAIL PROTECTED]> wrote: > > Yesterday I have updated to linux 2.6.19.2 > > (from 2.6.19.1) and passthrough openswan > > connection aren't working anymore. > > This is the 'ip -s x s' output: > > I presume

passthrough openswan connection not working with 2.6.19.2

2007-01-16 Thread Marco Berizzi
Hi. Yesterday I have updated to linux 2.6.19.2 (from 2.6.19.1) and passthrough openswan connection aren't working anymore. This is the 'ip -s x s' output: src 10.180.0.0/16 dst 172.16.0.0/23 uid 0 dir in action allow index 208 priority 2384 ptype main share any flag 0x lifetime config:

pci_set_power_state(): 0000:00:0a.0: state=3, current state=5

2006-12-01 Thread Marco Berizzi
Hi everybody, I'm running linux 2.6.19 (on a pretty old system), and everytime I run 'mii-tool' I get a ton of: pci_set_power_state(): :00:0a.0: state=3, current state=5 Here is dmesg: PCI: setting IRQ 10 as level-triggered PCI: Found IRQ 10 for device :00:0a.0 :00:0a.0: 3Com PCI 3c

ipsec policy with netfilter mark value

2006-09-14 Thread Marco Berizzi
Hello everybody. I would like to know if is it possible to create an ipsec policy based on the mark value inizialized by netfilter. This is my problem: I need to route VoIP packets from hosts connected to the private networks (A & B) to the QoS routers, without encrypting them. 'Normal' packets a

icmp echo reply and DF

2006-09-01 Thread Marco Berizzi
I kindly would like to know why linux reply to ICMP echo request packets with the DF bit set always to 0. I have googled the internet but I have only found this pretty old message: http://www.ussg.iu.edu/hypermail/linux/kernel/9804.2/0334.html I also have found these messages that document this

RE: [NET]: Fix ___pskb_trim when entire frag_list needs dropping

2006-08-02 Thread Marco Berizzi
Herbert Xu wrote: On Thu, Jul 13, 2006 at 07:03:41PM +1000, herbert wrote: > > This needs to go into stable as well. In fact, there is another unrelated > bug with exactly the same symptoms which was inadvertently fixed by the > GSO patches. So I'll send a simpler fix for that to stable. > >

Re: ipsec tunnel policy vs routing table

2006-07-27 Thread Marco Berizzi
Andy Gay wrote: As Herbert said, the right= address doesn't matter. Search for 10.180. If it doesn't matter, who told to linux to send packets for 10.180.0.0/16 to 172.16.1.253? BTW - in your erlier mail you had "rightsubnet=10.180.0./16". Looks like a typo there. yes it was a typo. - To

Re: ipsec tunnel policy vs routing table

2006-07-27 Thread Marco Berizzi
Andy Gay wrote: It's a function of the IPsec SADB. The passthrough conn added a more specific policy that will match before the tunnel policy. You can run 'ip xfrm p' and 'ip xfrm s' to view the policies & state info. I did, but no results: ip x p | grep '172.16.1.253' nor ip x s | grep '17

Re: ipsec tunnel policy vs routing table

2006-07-27 Thread Marco Berizzi
Herbert Xu wrote: Marco Berizzi <[EMAIL PROTECTED]> wrote: > > 172.16.0.0/23 dev eth2 proto kernel scope link src 172.16.1.1 > 10.180.0.0/16 via 172.16.1.253 dev eth2 > 10.0.0.0/8 via pub_ip dev eth0 > 127.0.0.0/8 dev lo scope link > > I have noticed that packet

ipsec tunnel policy vs routing table

2006-07-27 Thread Marco Berizzi
Hello everybody. I'm running linux 2.6.16.27 on my firewall/ipsec gateway with openswan 2.4.5 This is my firewall/network schema: | | /--eth0 (connected to ISP router) |/ +--+--+ | | | +--eth1 (DMZ) | | +--+--+ |\ | \--eth2 (internal network 172.16.0.0/23) | +-+ | | <--r

RE: IPsec and netfilter needs INPUT rule for protocol 4?

2006-07-11 Thread Marco Berizzi
Andy Gay wrote: Since 2.6.16 it's been necessary to add an ACCEPT rule for IPIP (protocol 4) in the INPUT chain, otherwise IPsec tunnel mode packets get dropped (if your INPUT policy is DROP). I was wondering if that's the intended behavior. No it isn't the desired behaviour. It is a know iss

Re: ipsec tunnel asymmetrical mtu

2006-07-11 Thread Marco Berizzi
Running this on mimosa 'mitigates' the problem: ip addr add 172.29.128.1/28 dev eth2 Connections are pretty slow but they aren't reseted anymore. - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vge

Re: ipsec tunnel asymmetrical mtu

2006-07-11 Thread Marco Berizzi
Another tricky behaviour: [EMAIL PROTECTED]:/tmp# telnet 10.49.59.23 3218 Trying 10.49.59.23... Connected to 10.49.59.23. Escape character is '^]'. Connection closed by foreign host. [EMAIL PROTECTED]:/tmp# tcpdump -p -n -v ip host 10.49.59.23 > HERBERT-20060711 & [1] 4797 [EMAIL PROTECTED]:/tm

Re: ipsec tunnel asymmetrical mtu

2006-07-11 Thread Marco Berizzi
Marco Berizzi wrote: Herbert Xu wrote: On Mon, May 08, 2006 at 08:28:32AM +, Marco Berizzi wrote: > > [EMAIL PROTECTED]:~# ping 10.49.59.23 > PING 10.49.59.23 (10.49.59.23) 56(84) bytes of data. > 64 bytes from 10.49.59.23: icmp_seq=1 ttl=247 time=91.9 ms > 64 bytes f

Re: ipsec tunnel asymmetrical mtu

2006-07-11 Thread Marco Berizzi
Herbert Xu wrote: We can say these things for certain: 1) The path between mimosa and pleiadi has a packet loss problem. A small burst of 10 or so fragments is enough to cause at least half of them to be lost. This problem may be specific to IPsec traffic (ISPs often discriminate aga

Re: ipsec tunnel asymmetrical mtu

2006-07-11 Thread Marco Berizzi
Herbert Xu wrote: On Mon, May 08, 2006 at 08:28:32AM +, Marco Berizzi wrote: > > [EMAIL PROTECTED]:~# ping 10.49.59.23 > PING 10.49.59.23 (10.49.59.23) 56(84) bytes of data. > 64 bytes from 10.49.59.23: icmp_seq=1 ttl=247 time=91.9 ms > 64 bytes from 10.49.59.23: icmp_seq

Re: ipsec tunnel asymmetrical mtu

2006-07-11 Thread Marco Berizzi
Herbert Xu wrote: Hi Marco: Hi Herbert, I'm very happy hearing you. On Mon, Apr 24, 2006 at 09:23:00AM +0000, Marco Berizzi wrote: > > What should I do? Mangling MSS with iptables --set-mss ? > Altering MSS to 1440 did the trick. See: > http://marc.theaimsgroup.com/

Re: ipsec tunnel asymmetrical mtu

2006-06-26 Thread Marco Berizzi
Herbert Xu wrote: However, the fact that the tcpdump causes more chunky packets to make it through could be an indication that there is a bug somewhere in our NAT/IPsec code or at least a suboptimal memory allocation strategy that's somehow avoided when AF_PACKET pins the skb down. JFYI: sam

Re: NETDEV WATCHDOG: eth2: transmit timed out with 3c905C-TX

2006-06-16 Thread Marco Berizzi
Steffen Klassert wrote: On Tue, Jun 06, 2006 at 11:12:45AM +0200, Marco Berizzi wrote: > > I have moved this damn pc from the remote to my site and I have > placed it in production environment with 2.6.17-rc5 > No problem after 24 hours (on the remote side the problem was >

Re: ipsec tunnel asymmetrical mtu

2006-06-09 Thread Marco Berizzi
Marco Berizzi wrote: Marco Berizzi wrote: Herbert Xu wrote: However, the fact that the tcpdump causes more chunky packets to make it through could be an indication that there is a bug somewhere in our NAT/IPsec code or at least a suboptimal memory allocation strategy that's somehow av

Re: NETDEV WATCHDOG: eth2: transmit timed out with 3c905C-TX

2006-06-06 Thread Marco Berizzi
Steffen Klassert wrote: On Tue, May 23, 2006 at 03:36:35PM +0200, Marco Berizzi wrote: > Steffen Klassert wrote: > > >On Wed, Apr 05, 2006 at 06:33:18PM +0200, Marco Berizzi wrote: > >> Hello everybody. > >> I'm getting these errors (with packet/connectivity

Re: NETDEV WATCHDOG: eth2: transmit timed out with 3c905C-TX

2006-05-23 Thread Marco Berizzi
Steffen Klassert wrote: On Wed, Apr 05, 2006 at 06:33:18PM +0200, Marco Berizzi wrote: > Hello everybody. > I'm getting these errors (with packet/connectivity loss) on > our firewall after I have plugged in a 3c905C nic. Linux is > Slackware 10.2 with vanilla 2.6.16.1. > >

Re: ipsec tunnel asymmetrical mtu

2006-05-18 Thread Marco Berizzi
Marco Berizzi wrote: Herbert Xu wrote: However, the fact that the tcpdump causes more chunky packets to make it through could be an indication that there is a bug somewhere in our NAT/IPsec code or at least a suboptimal memory allocation strategy that's somehow avoided when AF_PACKET pin

Re: ipsec tunnel asymmetrical mtu

2006-05-08 Thread Marco Berizzi
Herbert Xu wrote: However, the fact that the tcpdump causes more chunky packets to make it through could be an indication that there is a bug somewhere in our NAT/IPsec code or at least a suboptimal memory allocation strategy that's somehow avoided when AF_PACKET pins the skb down. Ciao Herber

Re: ipsec tunnel asymmetrical mtu

2006-04-26 Thread Marco Berizzi
Herbert Xu wrote: On Mon, Apr 24, 2006 at 09:23:00AM +, Marco Berizzi wrote: > > What should I do? Mangling MSS with iptables --set-mss ? > Altering MSS to 1440 did the trick. See: > http://marc.theaimsgroup.com/?l=linux-netdev&m=114373067423528&w=2 --clamp-mss-to-pmt

Re: ipsec tunnel asymmetrical mtu

2006-04-24 Thread Marco Berizzi
m I have forgotten to tell you that both mimosa & pleiadi are running 2.6.16.9 driven by openswan 2.4.5 - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html

RE: Fw: Openswan, iptables (fiaif) and 2.6.16 kernel

2006-04-15 Thread Marco Berizzi
Andrew Morton wrote: Begin forwarded message: Date: Fri, 14 Apr 2006 14:32:39 +0200 From: Laurent CARON <[EMAIL PROTECTED]> To: linux-kernel@vger.kernel.org Subject: Openswan, iptables (fiaif) and 2.6.16 kernel Hi, I'm running an openswan gateway for quite a long time now. I have used 2.4.X

Re: ipsec tunnel asymmetrical mtu

2006-04-10 Thread Marco Berizzi
Marco Berizzi wrote: Herbert Xu wrote: Marco Berizzi <[EMAIL PROTECTED]> wrote: > > Running 'tcpdump -p -n -v ip net 10.16.24.117' on mimosa > resolves the problem: sapgui clients can connect to sap > servers while tcpdump is running on mimosa. > Is this a

NETDEV WATCHDOG: eth2: transmit timed out with 3c905C-TX

2006-04-05 Thread Marco Berizzi
Hello everybody. I'm getting these errors (with packet/connectivity loss) on our firewall after I have plugged in a 3c905C nic. Linux is Slackware 10.2 with vanilla 2.6.16.1. Hints? PS: I have temporary resolved the problem running 'ifconfig eth2 down' and 'ifconfig eth2 up' Apr 5 17:47:07 Tet

Re: ipsec tunnel asymmetrical mtu

2006-04-04 Thread Marco Berizzi
Herbert Xu wrote: Marco Berizzi <[EMAIL PROTECTED]> wrote: > > Running 'tcpdump -p -n -v ip net 10.16.24.117' on mimosa > resolves the problem: sapgui clients can connect to sap > servers while tcpdump is running on mimosa. > Is this a bug? Very strange. Could

Re: ipsec tunnel asymmetrical mtu

2006-04-03 Thread Marco Berizzi
Marco Berizzi wrote: Herbert Xu wrote: Marco Berizzi <[EMAIL PROTECTED]> wrote: > > Thanks a lot for the reply Herbert. > Is there a way to tell netkey to frag packets like klips > ignoring the DF bit? Thinking about this again, there is actually a bug in our

Re: ipsec tunnel asymmetrical mtu

2006-04-03 Thread Marco Berizzi
John Heffner wrote: Marco Berizzi wrote: Herbert Xu wrote: Marco Berizzi <[EMAIL PROTECTED]> wrote: > > If I run 'ping 172.16.1.52 -M do -s 1472' from a 172.25.5.0 > host I got this result: > > PING 172.16.1.52 (172.16.1.52) 1472(1500) bytes of data. > 1480

Re: ipsec tunnel asymmetrical mtu

2006-04-03 Thread Marco Berizzi
Herbert Xu wrote: Marco Berizzi <[EMAIL PROTECTED]> wrote: > > Thanks a lot for the reply Herbert. > Is there a way to tell netkey to frag packets like klips > ignoring the DF bit? Thinking about this again, there is actually a bug in our various tunneling implementations whe

Re: ipsec tunnel asymmetrical mtu

2006-04-01 Thread Marco Berizzi
Herbert Xu wrote: Marco Berizzi <[EMAIL PROTECTED]> wrote: > > If I run 'ping 172.16.1.52 -M do -s 1472' from a 172.25.5.0 > host I got this result: > > PING 172.16.1.52 (172.16.1.52) 1472(1500) bytes of data. > 1480 bytes from 172.16.1.52: icmp_seq=1 ttl

ipsec tunnel asymmetrical mtu

2006-03-31 Thread Marco Berizzi
I have done a little test to try to understand how ipsec and mtu play together. Here is my simple network schema: net 172.16.0.0--|2.6.16 box|--internet--|2.4-KLIPS|--net 172.25.5.0 +---ipsec tunnel--+ When I run 'ping 172.25.5.30 -M do -s 1472 -c 3' from a 172.16.

ipsec tunnel MTU issue [was: ipsec double lookup]

2006-03-31 Thread Marco Berizzi
Me again. I think I have found where the issue is. I have updated the network schema: customer private network 10.0.0.0/8 | | +ipsec customer gateway (nokia/checkpoint) |==MTU=1444 | | |---ipsec tunnel 10.0.0.0/8<->172.29.128.0/28 (3DES/MD5) | | |+---ipsec gateway (pleiadi)---priv net (172.16

ipsec double lookup

2006-03-30 Thread Marco Berizzi
Hello everybody. I have a problem with a sapgui<->sapserver connection after I have migrated an ipsec gateway, from linux 2.4.29/KLIPS FreeS/SWAN 2.05 to linux 2.6.16.1/NETKEY Openswan 2.4.5rc6 Here is my network schema (I hope it is clear): customer private network 10.0.0.0/8 | | +ipsec customer

via_rhine modules error on 2.6.16 with mii-tool

2006-03-24 Thread Marco Berizzi
Hello evebody. I get this error on linux vanilla 2.6.16 with via_rhine module loaded when I run mii-tool: cheduling while atomic: mii-tool/0x0001/923 [] schedule+0x632/0x640 [] schedule_timeout+0x57/0xb0 [] process_timeout+0x0/0x10 [] msleep+0x28/0x30 [] rhine_disable_linkmon+0xab/0x130 [via

Re: dhcp over ipsec with linux 2.6

2006-01-26 Thread Marco Berizzi
Patrick McHardy wrote: Marco Berizzi wrote: > I would like to deploy dhcp over ipsec with openswan > 2.4.x running on linux 2.6.15.1. To achieve this > solution I need dhcp relay agent running on the ipsec > gateway box (there will be also the dhcp server on the > same box)

dhcp over ipsec with linux 2.6

2006-01-26 Thread Marco Berizzi
I would like to deploy dhcp over ipsec with openswan 2.4.x running on linux 2.6.15.1. To achieve this solution I need dhcp relay agent running on the ipsec gateway box (there will be also the dhcp server on the same box). I'm using the native linux 2.6 ipsec (no KLIPS) so there is no virtual devic

double packet

2005-12-17 Thread Marco Berizzi
[Sorry for posting on this list, but I didn't have any response on linux-net] Hello. I have a pretty strange problem with routing and iptables mark. My firewall has a classic 3 NIC config: one nic connected to the ISP routers, one network for DMZ and the third network for my private network. Her

Re: [PATCH 00/10]: Netfilter IPsec support

2005-11-15 Thread Marco Berizzi
How are handled NAT-T packets (udp/4500) with these patches? Patrick McHardy wrote: On Fri, 11 Nov 2005, Gerd v. Egidy wrote: Hi, This is the latest set patches for netfilter IPsec support. The use of netif_rx for the innermost SA if it used transport mode has been replaced by explicit NF_