From owner-freebsd-net@FreeBSD.ORG Sun May 3 00:30:02 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id F20AE106566C for ; Sun, 3 May 2009 00:30:02 +0000 (UTC) (envelope-from onemda@gmail.com) Received: from mail-fx0-f162.google.com (mail-fx0-f162.google.com [209.85.220.162]) by mx1.freebsd.org (Postfix) with ESMTP id 599448FC0A for ; Sun, 3 May 2009 00:30:01 +0000 (UTC) (envelope-from onemda@gmail.com) Received: by fxm6 with SMTP id 6so2925983fxm.43 for ; Sat, 02 May 2009 17:30:01 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:cc:content-type :content-transfer-encoding; bh=WDXxBOdIdEuLJ5GjIPx9O75p6V6x009UWmEUARyfDp0=; b=HuuL3gYe0MLKMEFlQyqmCPcvrJIiEii6MA/XR0KT5jjPAs2A45BxJ+dIQlFZDld5+p L+zEXJEAzaIDa4E/uLvZ7Ptg6STXvf0I+ngdL9KYOOftrcu+9NQIYJIisy9zp/3K9FW1 g/XKIFUkB7qSVrwt00tWixbT3aQsRcwXuB5tI= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; b=fA+1wvs0hAHcApBVJLZCJvTn/CVPfA/UQcifNMBcnAETRnowAGe4tWT2LxCWKwmzbN 3/WGKEavaCbBUunVoUuk1g3FfsP1jdjx2EwhP/flVGO6PN0b0YENylCEEwh+4anEbHis GVCvLAmTGMzZLBT+Ma8Muj/8o/ITDDTL1QwN8= MIME-Version: 1.0 Received: by 10.239.152.193 with SMTP id w1mr235910hbb.41.1241310601120; Sat, 02 May 2009 17:30:01 -0700 (PDT) In-Reply-To: <200807131711.m6DHB0ni082660@freefall.freebsd.org> References: <200807131711.m6DHB0ni082660@freefall.freebsd.org> Date: Sun, 3 May 2009 02:30:01 +0200 Message-ID: <3a142e750905021730ha9b6771p5a0e2ef0a8d6d50e@mail.gmail.com> From: "Paul B. Mahol" To: gavin@freebsd.org Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Cc: freebsd-net@freebsd.org Subject: Re: kern/125181: [ndis] [patch] with wep enters kdb.enter.unknown, panics X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 03 May 2009 00:30:03 -0000 On 7/13/08, gavin@freebsd.org wrote: > Old Synopsis: [ndis] with wep enters kdb.enter.unknown, panics > New Synopsis: [ndis] [patch] with wep enters kdb.enter.unknown, panics > > State-Changed-From-To: feedback->open > State-Changed-By: gavin > State-Changed-When: Sun Jul 13 17:06:03 UTC 2008 > State-Changed-Why: > Over to maintainers for evaluation > > > Responsible-Changed-From-To: gavin->freebsd-net > Responsible-Changed-By: gavin > Responsible-Changed-When: Sun Jul 13 17:06:03 UTC 2008 > Responsible-Changed-Why: > Submitter reports my patch fixes things for him > > http://www.freebsd.org/cgi/query-pr.cgi?pr=125181 > As of recent CURRENT(r191746), this issue have been fixed. -- Paul From owner-freebsd-net@FreeBSD.ORG Sun May 3 00:37:51 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id ED271106566B for ; Sun, 3 May 2009 00:37:51 +0000 (UTC) (envelope-from invite+ke5r5rmn@facebookmail.com) Received: from mx-out.facebook.com (outmail006.snc1.tfbnw.net [69.63.178.165]) by mx1.freebsd.org (Postfix) with ESMTP id CAE748FC18 for ; Sun, 3 May 2009 00:37:51 +0000 (UTC) (envelope-from invite+ke5r5rmn@facebookmail.com) DKIM-Signature: v=1; a=rsa-sha1; d=facebookmail.com; s=q1-2009b; c=relaxed/relaxed; q=dns/txt; i=@facebookmail.com; t=1241310157; h=From:Subject:Date:To:MIME-Version:Content-Type; bh=jYwIPVvyfasvpAvKcnwzaTEQmSA=; b=G1qoPsU2Eyutp2aJJTX1gBF+pOHOO4jcyUcV7juHHdCKaz/XewaMI9Op48Q7gxdr 4XMFiou+dT3MCpbjPFv7cA==; Received: from [10.18.255.178] ([10.18.255.178:6207] helo=localhost.localdomain) by mta005.snc1.facebook.com (envelope-from ) (ecelerity 2.2.2.37 r(28805/28844)) with ESMTP id 12/C9-18605-DC3ECF94; Sat, 02 May 2009 17:22:37 -0700 X-Facebook: from zuckmail ([]) by localhost.localdomain with local (ZuckMail); Date: Sat, 2 May 2009 17:22:37 -0700 To: Freebsd-net From: Alex Santiago Message-ID: <1740538534d76b534b558aaf95b88e0f@localhost.localdomain> X-Priority: 3 X-Mailer: ZuckMail [version 1.00] X-Facebook-Notify: general_invite; mailid=66e0fbG42c1069eG0G8 Errors-To: invite+ke5r5rmn@facebookmail.com X-FACEBOOK-PRIORITY: 1 MIME-Version: 1.0 Content-Type: text/plain; charset = "UTF-8" Content-Transfer-Encoding: quoted-printable X-Content-Filtered-By: Mailman/MimeDel 2.1.5 Subject: Check out my photos on Facebook X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: Alex Santiago List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 03 May 2009 00:37:52 -0000 Hi Freebsd-net, I set up a Facebook profile where I can post my pictures, videos and events and I want to add you as a friend so you can see it. First, you need to join Facebook! Once you join, you can also create your own profile. Thanks, Alex To sign up for Facebook, follow the link below: http://www.facebook.com/p.php?i=3D841695471&k=3D32DYP2TXT5XM5CEIXFY6X3&r freebsd-net@freebsd.org was invited to join Facebook by Alex Santiago. If you do not wish to receive this type of email from Facebook in the future, please click on the link below to unsubscribe. http://www.facebook.com/o.php?k=3Dcbecc8&u=3D1119946398&mid=3D66e0fbG42c1069eG0G8 Facebook's offices are located at 156 University Ave., Palo Alto, CA 94301. From owner-freebsd-net@FreeBSD.ORG Sun May 3 04:13:54 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 0BF16106564A for ; Sun, 3 May 2009 04:13:54 +0000 (UTC) (envelope-from sam@ip6.com.au) Received: from mail01.ip6.com.au (ns1.ip6.com.au [125.255.112.202]) by mx1.freebsd.org (Postfix) with ESMTP id C342D8FC14 for ; Sun, 3 May 2009 04:13:53 +0000 (UTC) (envelope-from sam@ip6.com.au) Received: from mail01.ip6.com.au (localhost [127.0.0.1]) by mail01.ip6.com.au (Postfix) with ESMTP id 8F595287EB for ; Sun, 3 May 2009 14:13:50 +1000 (EST) Received: from secure.ip6.com.au (localhost [127.0.0.1]) by mail01.ip6.com.au (Postfix) with ESMTP id 49D9828643 for ; Sun, 3 May 2009 14:13:50 +1000 (EST) Received: from 220.233.42.226 (SquirrelMail authenticated user sam) by secure.ip6.com.au with HTTP; Sun, 3 May 2009 14:13:50 +1000 (EST) Message-ID: <24472.220.233.42.226.1241324030.squirrel@secure.ip6.com.au> Date: Sun, 3 May 2009 14:13:50 +1000 (EST) From: "Sam Wan" To: freebsd-net@freebsd.org User-Agent: SquirrelMail/1.4.10a MIME-Version: 1.0 Content-Type: text/plain;charset=iso-8859-1 Content-Transfer-Encoding: 8bit X-Priority: 3 (Normal) Importance: Normal X-Virus-Scanned: ClamAV using ClamSMTP Subject: How to complie keepliaved from Port. X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 03 May 2009 04:13:54 -0000 Hi, Is there anyone knows how to compile keepalived from the port? Its patch only available up to version 7.0. When I followed its instruction to patch 4 files, 1 or 2 of those have been *rej*, and when I ignored and continue to build it, kernel compilation caused error. Is there a new keepalived patch for freebsd 7.1 and 7.2? Thanks From owner-freebsd-net@FreeBSD.ORG Sun May 3 07:49:52 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 7C780106564A for ; Sun, 3 May 2009 07:49:52 +0000 (UTC) (envelope-from sam@ip6.com.au) Received: from mail01.ip6.com.au (ns1.ip6.com.au [125.255.112.202]) by mx1.freebsd.org (Postfix) with ESMTP id 2A0068FC0C for ; Sun, 3 May 2009 07:49:51 +0000 (UTC) (envelope-from sam@ip6.com.au) Received: from mail01.ip6.com.au (localhost [127.0.0.1]) by mail01.ip6.com.au (Postfix) with ESMTP id D5B342864D; Sun, 3 May 2009 17:49:48 +1000 (EST) Received: from secure.ip6.com.au (localhost [127.0.0.1]) by mail01.ip6.com.au (Postfix) with ESMTP id 9FDAA2864A; Sun, 3 May 2009 17:49:48 +1000 (EST) Received: from 220.233.42.226 (SquirrelMail authenticated user sam) by secure.ip6.com.au with HTTP; Sun, 3 May 2009 17:49:48 +1000 (EST) Message-ID: <25839.220.233.42.226.1241336988.squirrel@secure.ip6.com.au> In-Reply-To: <24472.220.233.42.226.1241324030.squirrel@secure.ip6.com.au> References: <24472.220.233.42.226.1241324030.squirrel@secure.ip6.com.au> Date: Sun, 3 May 2009 17:49:48 +1000 (EST) From: "Sam Wan" To: "Sam Wan" User-Agent: SquirrelMail/1.4.10a MIME-Version: 1.0 Content-Type: text/plain;charset=iso-8859-1 Content-Transfer-Encoding: 8bit X-Priority: 3 (Normal) Importance: Normal X-Virus-Scanned: ClamAV using ClamSMTP Cc: freebsd-net@freebsd.org Subject: Re: How to complie keepliaved from Port. X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 03 May 2009 07:49:52 -0000 > > Hi, > > Is there anyone knows how to compile keepalived from the port? > > Its patch only available up to version 7.0. > When I followed its instruction to patch 4 files, 1 or 2 of those have > been *rej*, and when I ignored and continue to build it, kernel > compilation caused error. > > Is there a new keepalived patch for freebsd 7.1 and 7.2? > > Thanks > > Hi, this is what I encountered during make keepalived: ASTest72RC2# make ===> Vulnerability check disabled, database not found => keepalived-FreeBSD-1.1.11.tar.gz doesn't seem to exist in /usr/ports/distfiles/. => Attempting to fetch from http://www.cultdeadsheep.org/~clement/FreeBSD/ipvs/. keepalived-FreeBSD-1.1.11.tar.gz 100% of 208 kB 136 kBps ===> Extracting for keepalived-1.1.11_1 => MD5 Checksum OK for keepalived-FreeBSD-1.1.11.tar.gz. => SHA256 Checksum OK for keepalived-FreeBSD-1.1.11.tar.gz. ===> Patching for keepalived-1.1.11_1 ===> Applying FreeBSD patches for keepalived-1.1.11_1 ===> keepalived-1.1.11_1 depends on file: /usr/local/lib/libipvs.a - not found ===> Verifying install for /usr/local/lib/libipvs.a in /usr/ports/net/ipvs LVS on FreeBSD works only with 5.3-RELEASE and 5.4-RELEASE. However it may work on 5-STABLE. If you are running FreeBSD 5.4-STABLE, define TRY_STABLE and check if patches apply correctly to your src tree To build ipvs, I strongly encourage you to follow these instructions 1. checkout supported src tree 2. run "make patch-system" 3. configure and build your kernel. (you need support of NetFilter sockopt, add "options NF_SOCKOPT") 4. Install your freshly compiled kernel 5. install the port 6. reboot your system ===> Vulnerability check disabled, database not found => ipvs-0.4.0_2.tar.gz doesn't seem to exist in /usr/ports/distfiles/. => Attempting to fetch from http://www.cultdeadsheep.org/~clement/FreeBSD/ipvs/. ipvs-0.4.0_2.tar.gz 100% of 74 kB 51 kBps ===> Extracting for ipvs-0.4.0_2 => MD5 Checksum OK for ipvs-0.4.0_2.tar.gz. => SHA256 Checksum OK for ipvs-0.4.0_2.tar.gz. ===> Patching for ipvs-0.4.0_2 ===> Configuring for ipvs-0.4.0_2 ===> Building for ipvs-0.4.0_2 ===> ipvs Warning: Object directory not changed from original /usr/ports/net/ipvs/work/ipvs-0.4.0_2/ipvs @ -> /usr/src/sys machine -> /usr/src/sys/i386/include cc -O2 -fno-strict-aliasing -pipe -D_KERNEL -DKLD_MODULE -std=c99 -nostdinc -I. -I@ -I@/contrib/altq -finline-limit=8000 --param inline-unit-growth=100 --param large-function-growth=1000 -fno-common -mno-align-long-strings -mpreferred-stack-boundary=2 -mno-mmx -mno-3dnow -mno-sse -mno-sse2 -mno-sse3 -ffreestanding -Wall -Wredundant-decls -Wnested-externs -Wstrict-prototypes -Wmissing-prototypes -Wpointer-arith -Winline -Wcast-qual -Wundef -Wno-pointer-sign -fformat-extensions -c ip_vs_core.c cc -O2 -fno-strict-aliasing -pipe -D_KERNEL -DKLD_MODULE -std=c99 -nostdinc -I. -I@ -I@/contrib/altq -finline-limit=8000 --param inline-unit-growth=100 --param large-function-growth=1000 -fno-common -mno-align-long-strings -mpreferred-stack-boundary=2 -mno-mmx -mno-3dnow -mno-sse -mno-sse2 -mno-sse3 -ffreestanding -Wall -Wredundant-decls -Wnested-externs -Wstrict-prototypes -Wmissing-prototypes -Wpointer-arith -Winline -Wcast-qual -Wundef -Wno-pointer-sign -fformat-extensions -c ip_vs_conn.c cc -O2 -fno-strict-aliasing -pipe -D_KERNEL -DKLD_MODULE -std=c99 -nostdinc -I. -I@ -I@/contrib/altq -finline-limit=8000 --param inline-unit-growth=100 --param large-function-growth=1000 -fno-common -mno-align-long-strings -mpreferred-stack-boundary=2 -mno-mmx -mno-3dnow -mno-sse -mno-sse2 -mno-sse3 -ffreestanding -Wall -Wredundant-decls -Wnested-externs -Wstrict-prototypes -Wmissing-prototypes -Wpointer-arith -Winline -Wcast-qual -Wundef -Wno-pointer-sign -fformat-extensions -c ip_vs_sched.c cc -O2 -fno-strict-aliasing -pipe -D_KERNEL -DKLD_MODULE -std=c99 -nostdinc -I. -I@ -I@/contrib/altq -finline-limit=8000 --param inline-unit-growth=100 --param large-function-growth=1000 -fno-common -mno-align-long-strings -mpreferred-stack-boundary=2 -mno-mmx -mno-3dnow -mno-sse -mno-sse2 -mno-sse3 -ffreestanding -Wall -Wredundant-decls -Wnested-externs -Wstrict-prototypes -Wmissing-prototypes -Wpointer-arith -Winline -Wcast-qual -Wundef -Wno-pointer-sign -fformat-extensions -c ip_vs_ctl.c ip_vs_ctl.c: In function 'do_ip_vs_set_ctl': ip_vs_ctl.c:1257: warning: implicit declaration of function 'suser' ip_vs_ctl.c:1257: warning: nested extern declaration of 'suser' ip_vs_ctl.c: At top level: ip_vs_ctl.c:1627: error: variable 'ip_vs_sockopts' has initializer but incomplete type ip_vs_ctl.c:1628: error: extra brace group at end of initializer ip_vs_ctl.c:1628: error: (near initialization for 'ip_vs_sockopts') ip_vs_ctl.c:1628: warning: excess elements in struct initializer ip_vs_ctl.c:1628: warning: (near initialization for 'ip_vs_sockopts') ip_vs_ctl.c:1628: warning: excess elements in struct initializer ip_vs_ctl.c:1628: warning: (near initialization for 'ip_vs_sockopts') ip_vs_ctl.c:1629: warning: excess elements in struct initializer ip_vs_ctl.c:1629: warning: (near initialization for 'ip_vs_sockopts') ip_vs_ctl.c:1629: warning: excess elements in struct initializer ip_vs_ctl.c:1629: warning: (near initialization for 'ip_vs_sockopts') ip_vs_ctl.c:1629: warning: excess elements in struct initializer ip_vs_ctl.c:1629: warning: (near initialization for 'ip_vs_sockopts') ip_vs_ctl.c:1630: warning: excess elements in struct initializer ip_vs_ctl.c:1630: warning: (near initialization for 'ip_vs_sockopts') ip_vs_ctl.c:1630: warning: excess elements in struct initializer ip_vs_ctl.c:1630: warning: (near initialization for 'ip_vs_sockopts') ip_vs_ctl.c:1631: warning: excess elements in struct initializer ip_vs_ctl.c:1631: warning: (near initialization for 'ip_vs_sockopts') ip_vs_ctl.c: In function 'ip_vs_control_init': ip_vs_ctl.c:1645: warning: implicit declaration of function 'nf_register_sockopt' ip_vs_ctl.c:1645: warning: nested extern declaration of 'nf_register_sockopt' ip_vs_ctl.c: In function 'ip_vs_control_cleanup': ip_vs_ctl.c:1675: warning: implicit declaration of function 'nf_unregister_sockopt' ip_vs_ctl.c:1675: warning: nested extern declaration of 'nf_unregister_sockopt' *** Error code 1 Stop in /usr/ports/net/ipvs/work/ipvs-0.4.0_2/ipvs. *** Error code 1 Stop in /usr/ports/net/ipvs/work/ipvs-0.4.0_2. *** Error code 1 Stop in /usr/ports/net/ipvs. *** Error code 1 Stop in /usr/ports/net/keepalived. Thanks From owner-freebsd-net@FreeBSD.ORG Sun May 3 09:09:46 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id DBC63106566B for ; Sun, 3 May 2009 09:09:46 +0000 (UTC) (envelope-from sam@ip6.com.au) Received: from mail01.ip6.com.au (ns1.ip6.com.au [125.255.112.202]) by mx1.freebsd.org (Postfix) with ESMTP id 6735B8FC14 for ; Sun, 3 May 2009 09:09:44 +0000 (UTC) (envelope-from sam@ip6.com.au) Received: from mail01.ip6.com.au (localhost [127.0.0.1]) by mail01.ip6.com.au (Postfix) with ESMTP id 599EE287EB; Sun, 3 May 2009 19:09:41 +1000 (EST) Received: from secure.ip6.com.au (localhost [127.0.0.1]) by mail01.ip6.com.au (Postfix) with ESMTP id 1673C287B4; Sun, 3 May 2009 19:09:41 +1000 (EST) Received: from 220.233.42.226 (SquirrelMail authenticated user sam) by secure.ip6.com.au with HTTP; Sun, 3 May 2009 19:09:41 +1000 (EST) Message-ID: <26848.220.233.42.226.1241341781.squirrel@secure.ip6.com.au> In-Reply-To: <25839.220.233.42.226.1241336988.squirrel@secure.ip6.com.au> References: <24472.220.233.42.226.1241324030.squirrel@secure.ip6.com.au> <25839.220.233.42.226.1241336988.squirrel@secure.ip6.com.au> Date: Sun, 3 May 2009 19:09:41 +1000 (EST) From: "Sam Wan" To: "Sam Wan" User-Agent: SquirrelMail/1.4.10a MIME-Version: 1.0 Content-Type: text/plain;charset=iso-8859-1 Content-Transfer-Encoding: 8bit X-Priority: 3 (Normal) Importance: Normal X-Virus-Scanned: ClamAV using ClamSMTP Cc: freebsd-net@freebsd.org, Sam Wan Subject: Re: How to complie keepliaved from Port. X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 03 May 2009 09:09:47 -0000 I have patched the following files, with some errors. Please provide suggestion about what I should do. Very appreciate for any suggestion. Thanks ASTest72RC2# patch -p0 < uipc_socket.c.patch Hmm... Looks like a unified diff to me... The text leading up to this was: -------------------------- |--- sys/kern/uipc_socket.c.orig Mon Aug 15 13:09:33 2005 |+++ sys/kern/uipc_socket.c Sun Aug 21 10:51:47 2005 -------------------------- Patching file sys/kern/uipc_socket.c using Plan A... Hunk #1 failed at 37. Hunk #2 succeeded at 1374 with fuzz 2 (offset 1309 lines). Hunk #3 succeeded at 1514 with fuzz 2 (offset -6 lines). patch: **** misordered hunks! output would be garbled ASTest72RC2# patch -p0 < ip_input.c.patch Hmm... Looks like a unified diff to me... The text leading up to this was: -------------------------- |--- sys/netinet/ip_input.c.orig Mon Aug 15 13:09:45 2005 |+++ sys/netinet/ip_input.c Sun Aug 21 10:49:56 2005 -------------------------- Patching file sys/netinet/ip_input.c using Plan A... Hunk #1 succeeded at 38 (offset 2 lines). Hunk #2 succeeded at 266 with fuzz 1 (offset -31 lines). done ASTest72RC2# patch -p0 < socketvar.h.patch Hmm... Looks like a unified diff to me... The text leading up to this was: -------------------------- |--- sys/sys/socketvar.h.orig Sat Jul 9 12:24:40 2005 |+++ sys/sys/socketvar.h Sun Aug 21 10:51:13 2005 -------------------------- Patching file sys/sys/socketvar.h using Plan A... Hunk #1 failed at 37. Hunk #2 succeeded at 367 (offset -197 lines). 1 out of 2 hunks failed--saving rejects to sys/sys/socketvar.h.rej done ASTest72RC2# patch -p0 < sys_conf_options.patch Hmm... Looks like a unified diff to me... The text leading up to this was: -------------------------- |--- sys/conf/options.orig Mon Aug 15 13:08:59 2005 |+++ sys/conf/options Sun Aug 21 10:52:38 2005 -------------------------- Patching file sys/conf/options using Plan A... Hunk #1 succeeded at 751 (offset 49 lines). done ASTest72RC2# patch -p0 < sys_i386_conf_GENERIC.patch sys_i386_conf_GENERIC.patch: No such file or directory. ASTest72RC2# >> >> Hi, >> >> Is there anyone knows how to compile keepalived from the port? >> >> Its patch only available up to version 7.0. >> When I followed its instruction to patch 4 files, 1 or 2 of those have >> been *rej*, and when I ignored and continue to build it, kernel >> compilation caused error. >> >> Is there a new keepalived patch for freebsd 7.1 and 7.2? >> >> Thanks >> >> > > Hi, this is what I encountered during make keepalived: > > ASTest72RC2# make > ===> Vulnerability check disabled, database not found > => keepalived-FreeBSD-1.1.11.tar.gz doesn't seem to exist in > /usr/ports/distfiles/. > => Attempting to fetch from > http://www.cultdeadsheep.org/~clement/FreeBSD/ipvs/. > keepalived-FreeBSD-1.1.11.tar.gz 100% of 208 kB 136 kBps > ===> Extracting for keepalived-1.1.11_1 > => MD5 Checksum OK for keepalived-FreeBSD-1.1.11.tar.gz. > => SHA256 Checksum OK for keepalived-FreeBSD-1.1.11.tar.gz. > ===> Patching for keepalived-1.1.11_1 > ===> Applying FreeBSD patches for keepalived-1.1.11_1 > ===> keepalived-1.1.11_1 depends on file: /usr/local/lib/libipvs.a - not > found > ===> Verifying install for /usr/local/lib/libipvs.a in > /usr/ports/net/ipvs > LVS on FreeBSD works only with 5.3-RELEASE and 5.4-RELEASE. > However it may work on 5-STABLE. If you are running FreeBSD 5.4-STABLE, > define > TRY_STABLE and check if patches apply correctly to your src tree > To build ipvs, I strongly encourage you to follow these instructions > 1. checkout supported src tree > 2. run "make patch-system" > 3. configure and build your kernel. (you need support of NetFilter > sockopt, add "options NF_SOCKOPT") > 4. Install your freshly compiled kernel > 5. install the port > 6. reboot your system > ===> Vulnerability check disabled, database not found > => ipvs-0.4.0_2.tar.gz doesn't seem to exist in /usr/ports/distfiles/. > => Attempting to fetch from > http://www.cultdeadsheep.org/~clement/FreeBSD/ipvs/. > ipvs-0.4.0_2.tar.gz 100% of 74 kB 51 kBps > ===> Extracting for ipvs-0.4.0_2 > => MD5 Checksum OK for ipvs-0.4.0_2.tar.gz. > => SHA256 Checksum OK for ipvs-0.4.0_2.tar.gz. > ===> Patching for ipvs-0.4.0_2 > ===> Configuring for ipvs-0.4.0_2 > ===> Building for ipvs-0.4.0_2 > ===> ipvs > Warning: Object directory not changed from original > /usr/ports/net/ipvs/work/ipvs-0.4.0_2/ipvs > @ -> /usr/src/sys > machine -> /usr/src/sys/i386/include > cc -O2 -fno-strict-aliasing -pipe -D_KERNEL -DKLD_MODULE -std=c99 > -nostdinc -I. -I@ -I@/contrib/altq -finline-limit=8000 --param > inline-unit-growth=100 --param large-function-growth=1000 -fno-common > -mno-align-long-strings -mpreferred-stack-boundary=2 -mno-mmx -mno-3dnow > -mno-sse -mno-sse2 -mno-sse3 -ffreestanding -Wall -Wredundant-decls > -Wnested-externs -Wstrict-prototypes -Wmissing-prototypes -Wpointer-arith > -Winline -Wcast-qual -Wundef -Wno-pointer-sign -fformat-extensions -c > ip_vs_core.c > cc -O2 -fno-strict-aliasing -pipe -D_KERNEL -DKLD_MODULE -std=c99 > -nostdinc -I. -I@ -I@/contrib/altq -finline-limit=8000 --param > inline-unit-growth=100 --param large-function-growth=1000 -fno-common > -mno-align-long-strings -mpreferred-stack-boundary=2 -mno-mmx -mno-3dnow > -mno-sse -mno-sse2 -mno-sse3 -ffreestanding -Wall -Wredundant-decls > -Wnested-externs -Wstrict-prototypes -Wmissing-prototypes -Wpointer-arith > -Winline -Wcast-qual -Wundef -Wno-pointer-sign -fformat-extensions -c > ip_vs_conn.c > cc -O2 -fno-strict-aliasing -pipe -D_KERNEL -DKLD_MODULE -std=c99 > -nostdinc -I. -I@ -I@/contrib/altq -finline-limit=8000 --param > inline-unit-growth=100 --param large-function-growth=1000 -fno-common > -mno-align-long-strings -mpreferred-stack-boundary=2 -mno-mmx -mno-3dnow > -mno-sse -mno-sse2 -mno-sse3 -ffreestanding -Wall -Wredundant-decls > -Wnested-externs -Wstrict-prototypes -Wmissing-prototypes -Wpointer-arith > -Winline -Wcast-qual -Wundef -Wno-pointer-sign -fformat-extensions -c > ip_vs_sched.c > cc -O2 -fno-strict-aliasing -pipe -D_KERNEL -DKLD_MODULE -std=c99 > -nostdinc -I. -I@ -I@/contrib/altq -finline-limit=8000 --param > inline-unit-growth=100 --param large-function-growth=1000 -fno-common > -mno-align-long-strings -mpreferred-stack-boundary=2 -mno-mmx -mno-3dnow > -mno-sse -mno-sse2 -mno-sse3 -ffreestanding -Wall -Wredundant-decls > -Wnested-externs -Wstrict-prototypes -Wmissing-prototypes -Wpointer-arith > -Winline -Wcast-qual -Wundef -Wno-pointer-sign -fformat-extensions -c > ip_vs_ctl.c > ip_vs_ctl.c: In function 'do_ip_vs_set_ctl': > ip_vs_ctl.c:1257: warning: implicit declaration of function 'suser' > ip_vs_ctl.c:1257: warning: nested extern declaration of 'suser' > ip_vs_ctl.c: At top level: > ip_vs_ctl.c:1627: error: variable 'ip_vs_sockopts' has initializer but > incomplete type > ip_vs_ctl.c:1628: error: extra brace group at end of initializer > ip_vs_ctl.c:1628: error: (near initialization for 'ip_vs_sockopts') > ip_vs_ctl.c:1628: warning: excess elements in struct initializer > ip_vs_ctl.c:1628: warning: (near initialization for 'ip_vs_sockopts') > ip_vs_ctl.c:1628: warning: excess elements in struct initializer > ip_vs_ctl.c:1628: warning: (near initialization for 'ip_vs_sockopts') > ip_vs_ctl.c:1629: warning: excess elements in struct initializer > ip_vs_ctl.c:1629: warning: (near initialization for 'ip_vs_sockopts') > ip_vs_ctl.c:1629: warning: excess elements in struct initializer > ip_vs_ctl.c:1629: warning: (near initialization for 'ip_vs_sockopts') > ip_vs_ctl.c:1629: warning: excess elements in struct initializer > ip_vs_ctl.c:1629: warning: (near initialization for 'ip_vs_sockopts') > ip_vs_ctl.c:1630: warning: excess elements in struct initializer > ip_vs_ctl.c:1630: warning: (near initialization for 'ip_vs_sockopts') > ip_vs_ctl.c:1630: warning: excess elements in struct initializer > ip_vs_ctl.c:1630: warning: (near initialization for 'ip_vs_sockopts') > ip_vs_ctl.c:1631: warning: excess elements in struct initializer > ip_vs_ctl.c:1631: warning: (near initialization for 'ip_vs_sockopts') > ip_vs_ctl.c: In function 'ip_vs_control_init': > ip_vs_ctl.c:1645: warning: implicit declaration of function > 'nf_register_sockopt' > ip_vs_ctl.c:1645: warning: nested extern declaration of > 'nf_register_sockopt' > ip_vs_ctl.c: In function 'ip_vs_control_cleanup': > ip_vs_ctl.c:1675: warning: implicit declaration of function > 'nf_unregister_sockopt' > ip_vs_ctl.c:1675: warning: nested extern declaration of > 'nf_unregister_sockopt' > *** Error code 1 > > Stop in /usr/ports/net/ipvs/work/ipvs-0.4.0_2/ipvs. > *** Error code 1 > > Stop in /usr/ports/net/ipvs/work/ipvs-0.4.0_2. > *** Error code 1 > > Stop in /usr/ports/net/ipvs. > *** Error code 1 > > Stop in /usr/ports/net/keepalived. > > Thanks > > > > From owner-freebsd-net@FreeBSD.ORG Sun May 3 09:10:40 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 3C931106566C for ; Sun, 3 May 2009 09:10:40 +0000 (UTC) (envelope-from sam@ip6.com.au) Received: from mail01.ip6.com.au (ns1.ip6.com.au [125.255.112.202]) by mx1.freebsd.org (Postfix) with ESMTP id 84BAD8FC1A for ; Sun, 3 May 2009 09:10:39 +0000 (UTC) (envelope-from sam@ip6.com.au) Received: from mail01.ip6.com.au (localhost [127.0.0.1]) by mail01.ip6.com.au (Postfix) with ESMTP id 5B206287EB for ; Sun, 3 May 2009 19:10:37 +1000 (EST) Received: from secure.ip6.com.au (localhost [127.0.0.1]) by mail01.ip6.com.au (Postfix) with ESMTP id 258992864A for ; Sun, 3 May 2009 19:10:37 +1000 (EST) Received: from 220.233.42.226 (SquirrelMail authenticated user sam) by secure.ip6.com.au with HTTP; Sun, 3 May 2009 19:10:37 +1000 (EST) Message-ID: <26864.220.233.42.226.1241341837.squirrel@secure.ip6.com.au> In-Reply-To: <25839.220.233.42.226.1241336988.squirrel@secure.ip6.com.au> References: <24472.220.233.42.226.1241324030.squirrel@secure.ip6.com.au> <25839.220.233.42.226.1241336988.squirrel@secure.ip6.com.au> Date: Sun, 3 May 2009 19:10:37 +1000 (EST) From: "Sam Wan" To: freebsd-net@freebsd.org User-Agent: SquirrelMail/1.4.10a MIME-Version: 1.0 Content-Type: text/plain;charset=iso-8859-1 Content-Transfer-Encoding: 8bit X-Priority: 3 (Normal) Importance: Normal X-Virus-Scanned: ClamAV using ClamSMTP Subject: Re: How to complie keepliaved from Port. X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 03 May 2009 09:10:40 -0000 I have patched the following files, with some errors. Please provide suggestion about what I should do. Very appreciate for any suggestion. Thanks ASTest72RC2# patch -p0 < uipc_socket.c.patch Hmm... Looks like a unified diff to me... The text leading up to this was: -------------------------- |--- sys/kern/uipc_socket.c.orig Mon Aug 15 13:09:33 2005 |+++ sys/kern/uipc_socket.c Sun Aug 21 10:51:47 2005 -------------------------- Patching file sys/kern/uipc_socket.c using Plan A... Hunk #1 failed at 37. Hunk #2 succeeded at 1374 with fuzz 2 (offset 1309 lines). Hunk #3 succeeded at 1514 with fuzz 2 (offset -6 lines). patch: **** misordered hunks! output would be garbled ASTest72RC2# patch -p0 < ip_input.c.patch Hmm... Looks like a unified diff to me... The text leading up to this was: -------------------------- |--- sys/netinet/ip_input.c.orig Mon Aug 15 13:09:45 2005 |+++ sys/netinet/ip_input.c Sun Aug 21 10:49:56 2005 -------------------------- Patching file sys/netinet/ip_input.c using Plan A... Hunk #1 succeeded at 38 (offset 2 lines). Hunk #2 succeeded at 266 with fuzz 1 (offset -31 lines). done ASTest72RC2# patch -p0 < socketvar.h.patch Hmm... Looks like a unified diff to me... The text leading up to this was: -------------------------- |--- sys/sys/socketvar.h.orig Sat Jul 9 12:24:40 2005 |+++ sys/sys/socketvar.h Sun Aug 21 10:51:13 2005 -------------------------- Patching file sys/sys/socketvar.h using Plan A... Hunk #1 failed at 37. Hunk #2 succeeded at 367 (offset -197 lines). 1 out of 2 hunks failed--saving rejects to sys/sys/socketvar.h.rej done ASTest72RC2# patch -p0 < sys_conf_options.patch Hmm... Looks like a unified diff to me... The text leading up to this was: -------------------------- |--- sys/conf/options.orig Mon Aug 15 13:08:59 2005 |+++ sys/conf/options Sun Aug 21 10:52:38 2005 -------------------------- Patching file sys/conf/options using Plan A... Hunk #1 succeeded at 751 (offset 49 lines). done ASTest72RC2# patch -p0 < sys_i386_conf_GENERIC.patch sys_i386_conf_GENERIC.patch: No such file or directory. ASTest72RC2# >> >> Hi, >> >> Is there anyone knows how to compile keepalived from the port? >> >> Its patch only available up to version 7.0. >> When I followed its instruction to patch 4 files, 1 or 2 of those have >> been *rej*, and when I ignored and continue to build it, kernel >> compilation caused error. >> >> Is there a new keepalived patch for freebsd 7.1 and 7.2? >> >> Thanks >> >> > > Hi, this is what I encountered during make keepalived: > > ASTest72RC2# make > ===> Vulnerability check disabled, database not found > => keepalived-FreeBSD-1.1.11.tar.gz doesn't seem to exist in > /usr/ports/distfiles/. > => Attempting to fetch from > http://www.cultdeadsheep.org/~clement/FreeBSD/ipvs/. > keepalived-FreeBSD-1.1.11.tar.gz 100% of 208 kB 136 kBps > ===> Extracting for keepalived-1.1.11_1 > => MD5 Checksum OK for keepalived-FreeBSD-1.1.11.tar.gz. > => SHA256 Checksum OK for keepalived-FreeBSD-1.1.11.tar.gz. > ===> Patching for keepalived-1.1.11_1 > ===> Applying FreeBSD patches for keepalived-1.1.11_1 > ===> keepalived-1.1.11_1 depends on file: /usr/local/lib/libipvs.a - not > found > ===> Verifying install for /usr/local/lib/libipvs.a in > /usr/ports/net/ipvs > LVS on FreeBSD works only with 5.3-RELEASE and 5.4-RELEASE. > However it may work on 5-STABLE. If you are running FreeBSD 5.4-STABLE, > define > TRY_STABLE and check if patches apply correctly to your src tree > To build ipvs, I strongly encourage you to follow these instructions > 1. checkout supported src tree > 2. run "make patch-system" > 3. configure and build your kernel. (you need support of NetFilter > sockopt, add "options NF_SOCKOPT") > 4. Install your freshly compiled kernel > 5. install the port > 6. reboot your system > ===> Vulnerability check disabled, database not found > => ipvs-0.4.0_2.tar.gz doesn't seem to exist in /usr/ports/distfiles/. > => Attempting to fetch from > http://www.cultdeadsheep.org/~clement/FreeBSD/ipvs/. > ipvs-0.4.0_2.tar.gz 100% of 74 kB 51 kBps > ===> Extracting for ipvs-0.4.0_2 > => MD5 Checksum OK for ipvs-0.4.0_2.tar.gz. > => SHA256 Checksum OK for ipvs-0.4.0_2.tar.gz. > ===> Patching for ipvs-0.4.0_2 > ===> Configuring for ipvs-0.4.0_2 > ===> Building for ipvs-0.4.0_2 > ===> ipvs > Warning: Object directory not changed from original > /usr/ports/net/ipvs/work/ipvs-0.4.0_2/ipvs > @ -> /usr/src/sys > machine -> /usr/src/sys/i386/include > cc -O2 -fno-strict-aliasing -pipe -D_KERNEL -DKLD_MODULE -std=c99 > -nostdinc -I. -I@ -I@/contrib/altq -finline-limit=8000 --param > inline-unit-growth=100 --param large-function-growth=1000 -fno-common > -mno-align-long-strings -mpreferred-stack-boundary=2 -mno-mmx -mno-3dnow > -mno-sse -mno-sse2 -mno-sse3 -ffreestanding -Wall -Wredundant-decls > -Wnested-externs -Wstrict-prototypes -Wmissing-prototypes -Wpointer-arith > -Winline -Wcast-qual -Wundef -Wno-pointer-sign -fformat-extensions -c > ip_vs_core.c > cc -O2 -fno-strict-aliasing -pipe -D_KERNEL -DKLD_MODULE -std=c99 > -nostdinc -I. -I@ -I@/contrib/altq -finline-limit=8000 --param > inline-unit-growth=100 --param large-function-growth=1000 -fno-common > -mno-align-long-strings -mpreferred-stack-boundary=2 -mno-mmx -mno-3dnow > -mno-sse -mno-sse2 -mno-sse3 -ffreestanding -Wall -Wredundant-decls > -Wnested-externs -Wstrict-prototypes -Wmissing-prototypes -Wpointer-arith > -Winline -Wcast-qual -Wundef -Wno-pointer-sign -fformat-extensions -c > ip_vs_conn.c > cc -O2 -fno-strict-aliasing -pipe -D_KERNEL -DKLD_MODULE -std=c99 > -nostdinc -I. -I@ -I@/contrib/altq -finline-limit=8000 --param > inline-unit-growth=100 --param large-function-growth=1000 -fno-common > -mno-align-long-strings -mpreferred-stack-boundary=2 -mno-mmx -mno-3dnow > -mno-sse -mno-sse2 -mno-sse3 -ffreestanding -Wall -Wredundant-decls > -Wnested-externs -Wstrict-prototypes -Wmissing-prototypes -Wpointer-arith > -Winline -Wcast-qual -Wundef -Wno-pointer-sign -fformat-extensions -c > ip_vs_sched.c > cc -O2 -fno-strict-aliasing -pipe -D_KERNEL -DKLD_MODULE -std=c99 > -nostdinc -I. -I@ -I@/contrib/altq -finline-limit=8000 --param > inline-unit-growth=100 --param large-function-growth=1000 -fno-common > -mno-align-long-strings -mpreferred-stack-boundary=2 -mno-mmx -mno-3dnow > -mno-sse -mno-sse2 -mno-sse3 -ffreestanding -Wall -Wredundant-decls > -Wnested-externs -Wstrict-prototypes -Wmissing-prototypes -Wpointer-arith > -Winline -Wcast-qual -Wundef -Wno-pointer-sign -fformat-extensions -c > ip_vs_ctl.c > ip_vs_ctl.c: In function 'do_ip_vs_set_ctl': > ip_vs_ctl.c:1257: warning: implicit declaration of function 'suser' > ip_vs_ctl.c:1257: warning: nested extern declaration of 'suser' > ip_vs_ctl.c: At top level: > ip_vs_ctl.c:1627: error: variable 'ip_vs_sockopts' has initializer but > incomplete type > ip_vs_ctl.c:1628: error: extra brace group at end of initializer > ip_vs_ctl.c:1628: error: (near initialization for 'ip_vs_sockopts') > ip_vs_ctl.c:1628: warning: excess elements in struct initializer > ip_vs_ctl.c:1628: warning: (near initialization for 'ip_vs_sockopts') > ip_vs_ctl.c:1628: warning: excess elements in struct initializer > ip_vs_ctl.c:1628: warning: (near initialization for 'ip_vs_sockopts') > ip_vs_ctl.c:1629: warning: excess elements in struct initializer > ip_vs_ctl.c:1629: warning: (near initialization for 'ip_vs_sockopts') > ip_vs_ctl.c:1629: warning: excess elements in struct initializer > ip_vs_ctl.c:1629: warning: (near initialization for 'ip_vs_sockopts') > ip_vs_ctl.c:1629: warning: excess elements in struct initializer > ip_vs_ctl.c:1629: warning: (near initialization for 'ip_vs_sockopts') > ip_vs_ctl.c:1630: warning: excess elements in struct initializer > ip_vs_ctl.c:1630: warning: (near initialization for 'ip_vs_sockopts') > ip_vs_ctl.c:1630: warning: excess elements in struct initializer > ip_vs_ctl.c:1630: warning: (near initialization for 'ip_vs_sockopts') > ip_vs_ctl.c:1631: warning: excess elements in struct initializer > ip_vs_ctl.c:1631: warning: (near initialization for 'ip_vs_sockopts') > ip_vs_ctl.c: In function 'ip_vs_control_init': > ip_vs_ctl.c:1645: warning: implicit declaration of function > 'nf_register_sockopt' > ip_vs_ctl.c:1645: warning: nested extern declaration of > 'nf_register_sockopt' > ip_vs_ctl.c: In function 'ip_vs_control_cleanup': > ip_vs_ctl.c:1675: warning: implicit declaration of function > 'nf_unregister_sockopt' > ip_vs_ctl.c:1675: warning: nested extern declaration of > 'nf_unregister_sockopt' > *** Error code 1 > > Stop in /usr/ports/net/ipvs/work/ipvs-0.4.0_2/ipvs. > *** Error code 1 > > Stop in /usr/ports/net/ipvs/work/ipvs-0.4.0_2. > *** Error code 1 > > Stop in /usr/ports/net/ipvs. > *** Error code 1 > > Stop in /usr/ports/net/keepalived. > > Thanks > > > > From owner-freebsd-net@FreeBSD.ORG Sun May 3 09:22:23 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 5BD4C106566B for ; Sun, 3 May 2009 09:22:23 +0000 (UTC) (envelope-from gperez@entel.upc.edu) Received: from violet.upc.es (violet.upc.es [147.83.2.51]) by mx1.freebsd.org (Postfix) with ESMTP id BC4BA8FC18 for ; Sun, 3 May 2009 09:22:22 +0000 (UTC) (envelope-from gperez@entel.upc.edu) Received: from hamilton.upcnetadm.upcnet.es (hamilton.upcnetadm.upcnet.es [147.83.2.240]) by violet.upc.es (8.14.1/8.13.1) with ESMTP id n439MBeW010478; Sun, 3 May 2009 11:22:12 +0200 Received: from [192.168.100.184] ([88.15.98.27]) by hamilton.upcnetadm.upcnet.es (Lotus Domino Release 5.0.12) with ESMTP id 2009050311221952:164452 ; Sun, 3 May 2009 11:22:19 +0200 Message-ID: <49FD61DD.7070903@entel.upc.edu> Date: Sun, 03 May 2009 11:20:29 +0200 From: =?ISO-8859-1?Q?Gustau_P=E9rez?= User-Agent: Thunderbird 2.0.0.21 (X11/20090409) MIME-Version: 1.0 To: "Paul B. Mahol" References: <49FA2E3F.9050108@entel.upc.edu> <3a142e750905010655i5e56282eu240e13f2a03dfb02@mail.gmail.com> <49FB55A3.605@entel.upc.edu> <3a142e750905011716g39ea55f0kd081bfdd55709b37@mail.gmail.com> <49FBF9B5.40800@entel.upc.edu> <3a142e750905020617y40f62463ma91b46a015b2b2ab@mail.gmail.com> In-Reply-To: <3a142e750905020617y40f62463ma91b46a015b2b2ab@mail.gmail.com> X-MIMETrack: Itemize by SMTP Server on hamilton/UPC(Release 5.0.12 |February 13, 2003) at 03/05/2009 11:22:19, Serialize by Router on hamilton/UPC(Release 5.0.12 |February 13, 2003) at 03/05/2009 11:22:21, Serialize complete at 03/05/2009 11:22:21 Content-Transfer-Encoding: 7bit Content-Type: text/plain; charset=ISO-8859-1; format=flowed X-Mail-Scanned: Criba 2.0 + Clamd X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-3.0 (violet.upc.es [147.83.2.51]); Sun, 03 May 2009 11:22:12 +0200 (CEST) Cc: freebsd-net@freebsd.org Subject: Re: Signal sensitivity problem with if_rum X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 03 May 2009 09:22:23 -0000 > That information is misleading, I remmember reading somewhere that linux rt73 > had similar problems like rum but it got fixed, and is not present in > new kernels. > I think that problem originated for linux from now obsolete drivers. > > On what linux version and what drivers version do you experience > similar problems > with signal sensitivity like with rum? > > Hi, I'm seeing this in ubuntu 9.04 (kernel 2.6.28). It shows more or less the same figures we have in FBSD. In linux, Bbp17 can be changed from userpace making iwconfig ${dev} bbp 17=0. But it automatically restores its previous value. Autotuning seems to be enable and I don't know how to disable it (the post I sent a few days ago about this is wrong or doesn't apply). Gus From owner-freebsd-net@FreeBSD.ORG Sun May 3 11:08:25 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 8365A1065670 for ; Sun, 3 May 2009 11:08:25 +0000 (UTC) (envelope-from sam@ip6.com.au) Received: from mail01.ip6.com.au (ns1.ip6.com.au [125.255.112.202]) by mx1.freebsd.org (Postfix) with ESMTP id 209DB8FC14 for ; Sun, 3 May 2009 11:08:23 +0000 (UTC) (envelope-from sam@ip6.com.au) Received: from mail01.ip6.com.au (localhost [127.0.0.1]) by mail01.ip6.com.au (Postfix) with ESMTP id E17FA287EB; Sun, 3 May 2009 21:08:19 +1000 (EST) Received: from secure.ip6.com.au (localhost [127.0.0.1]) by mail01.ip6.com.au (Postfix) with ESMTP id 9FF19287B4; Sun, 3 May 2009 21:08:19 +1000 (EST) Received: from 220.233.42.226 (SquirrelMail authenticated user sam) by secure.ip6.com.au with HTTP; Sun, 3 May 2009 21:08:19 +1000 (EST) Message-ID: <28239.220.233.42.226.1241348899.squirrel@secure.ip6.com.au> In-Reply-To: <26864.220.233.42.226.1241341837.squirrel@secure.ip6.com.au> References: <24472.220.233.42.226.1241324030.squirrel@secure.ip6.com.au> <25839.220.233.42.226.1241336988.squirrel@secure.ip6.com.au> <26864.220.233.42.226.1241341837.squirrel@secure.ip6.com.au> Date: Sun, 3 May 2009 21:08:19 +1000 (EST) From: "Sam Wan" To: "Sam Wan" User-Agent: SquirrelMail/1.4.10a MIME-Version: 1.0 Content-Type: text/plain;charset=iso-8859-1 Content-Transfer-Encoding: 8bit X-Priority: 3 (Normal) Importance: Normal X-Virus-Scanned: ClamAV using ClamSMTP Cc: freebsd-net@freebsd.org Subject: Re: How to complie keepliaved from Port. X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 03 May 2009 11:08:25 -0000 Hi, After switched over to FreeBSD 6.4, its compilation failed with a different error: ... linking kernel.debug ip_input.o(.text+0x200): In function `ip_init': ../../../netinet/ip_input.c:312: undefined reference to `nf_sockopt_init' *** Error code 1 ... This is what I have done before "make": ASTest64# patch -p0 < uipc_socket.c.patch Hmm... Looks like a unified diff to me... The text leading up to this was: -------------------------- |--- sys/kern/uipc_socket.c.orig Mon Aug 15 13:09:33 2005 |+++ sys/kern/uipc_socket.c Sun Aug 21 10:51:47 2005 -------------------------- Patching file sys/kern/uipc_socket.c using Plan A... Hunk #1 failed at 37. Hunk #2 succeeded at 966 with fuzz 2 (offset 901 lines). Hunk #3 succeeded at 638 (offset -882 lines). Hunk #4 succeeded at 2579 (offset 901 lines). Hunk #5 succeeded at 1015 (offset -870 lines). 1 out of 5 hunks failed--saving rejects to sys/kern/uipc_socket.c.rej done ASTest64# patch -p0 < ip_input.c.patch Hmm... Looks like a unified diff to me... The text leading up to this was: -------------------------- |--- sys/netinet/ip_input.c.orig Mon Aug 15 13:09:45 2005 |+++ sys/netinet/ip_input.c Sun Aug 21 10:49:56 2005 -------------------------- Patching file sys/netinet/ip_input.c using Plan A... Hunk #1 succeeded at 36. Hunk #2 succeeded at 308 (offset 11 lines). done ASTest64# patch -p0 < socketvar.h.patch Hmm... Looks like a unified diff to me... The text leading up to this was: -------------------------- |--- sys/sys/socketvar.h.orig Sat Jul 9 12:24:40 2005 |+++ sys/sys/socketvar.h Sun Aug 21 10:51:13 2005 -------------------------- Patching file sys/sys/socketvar.h using Plan A... Hunk #1 succeeded at 37. Hunk #2 succeeded at 562 (offset -2 lines). done ASTest64# patch -p0 < sys_conf_options.patch Hmm... Looks like a unified diff to me... The text leading up to this was: -------------------------- |--- sys/conf/options.orig Tue Aug 16 01:31:55 2005 |+++ sys/conf/options Sun Aug 21 11:18:06 2005 -------------------------- Patching file sys/conf/options using Plan A... Hunk #1 succeeded at 718 (offset 17 lines). done ASTest64# Added options NF_SOCKOPT in ASTEST64 kernel config file. This file just copied from GENERIC file. then start compile: cd /usr/src/sys/arch/i386/conf; config GENERIC; cd ../compile/GENERIC; make depend; make; Your suggestion is highly appreciated. > > > I have patched the following files, with some errors. > Please provide suggestion about what I should do. > > Very appreciate for any suggestion. > > Thanks > > ASTest72RC2# patch -p0 < uipc_socket.c.patch > Hmm... Looks like a unified diff to me... > The text leading up to this was: > -------------------------- > |--- sys/kern/uipc_socket.c.orig Mon Aug 15 13:09:33 2005 > |+++ sys/kern/uipc_socket.c Sun Aug 21 10:51:47 2005 > -------------------------- > Patching file sys/kern/uipc_socket.c using Plan A... > Hunk #1 failed at 37. > Hunk #2 succeeded at 1374 with fuzz 2 (offset 1309 lines). > Hunk #3 succeeded at 1514 with fuzz 2 (offset -6 lines). > patch: **** misordered hunks! output would be garbled > ASTest72RC2# patch -p0 < ip_input.c.patch > Hmm... Looks like a unified diff to me... > The text leading up to this was: > -------------------------- > |--- sys/netinet/ip_input.c.orig Mon Aug 15 13:09:45 2005 > |+++ sys/netinet/ip_input.c Sun Aug 21 10:49:56 2005 > -------------------------- > Patching file sys/netinet/ip_input.c using Plan A... > Hunk #1 succeeded at 38 (offset 2 lines). > Hunk #2 succeeded at 266 with fuzz 1 (offset -31 lines). > done > ASTest72RC2# patch -p0 < socketvar.h.patch > Hmm... Looks like a unified diff to me... > The text leading up to this was: > -------------------------- > |--- sys/sys/socketvar.h.orig Sat Jul 9 12:24:40 2005 > |+++ sys/sys/socketvar.h Sun Aug 21 10:51:13 2005 > -------------------------- > Patching file sys/sys/socketvar.h using Plan A... > Hunk #1 failed at 37. > Hunk #2 succeeded at 367 (offset -197 lines). > 1 out of 2 hunks failed--saving rejects to sys/sys/socketvar.h.rej > done > ASTest72RC2# patch -p0 < sys_conf_options.patch > Hmm... Looks like a unified diff to me... > The text leading up to this was: > -------------------------- > |--- sys/conf/options.orig Mon Aug 15 13:08:59 2005 > |+++ sys/conf/options Sun Aug 21 10:52:38 2005 > -------------------------- > Patching file sys/conf/options using Plan A... > Hunk #1 succeeded at 751 (offset 49 lines). > done > ASTest72RC2# patch -p0 < sys_i386_conf_GENERIC.patch > sys_i386_conf_GENERIC.patch: No such file or directory. > ASTest72RC2# > >>> >>> Hi, >>> >>> Is there anyone knows how to compile keepalived from the port? >>> >>> Its patch only available up to version 7.0. >>> When I followed its instruction to patch 4 files, 1 or 2 of those have >>> been *rej*, and when I ignored and continue to build it, kernel >>> compilation caused error. >>> >>> Is there a new keepalived patch for freebsd 7.1 and 7.2? >>> >>> Thanks >>> >>> >> >> Hi, this is what I encountered during make keepalived: >> >> ASTest72RC2# make >> ===> Vulnerability check disabled, database not found >> => keepalived-FreeBSD-1.1.11.tar.gz doesn't seem to exist in >> /usr/ports/distfiles/. >> => Attempting to fetch from >> http://www.cultdeadsheep.org/~clement/FreeBSD/ipvs/. >> keepalived-FreeBSD-1.1.11.tar.gz 100% of 208 kB 136 kBps >> ===> Extracting for keepalived-1.1.11_1 >> => MD5 Checksum OK for keepalived-FreeBSD-1.1.11.tar.gz. >> => SHA256 Checksum OK for keepalived-FreeBSD-1.1.11.tar.gz. >> ===> Patching for keepalived-1.1.11_1 >> ===> Applying FreeBSD patches for keepalived-1.1.11_1 >> ===> keepalived-1.1.11_1 depends on file: /usr/local/lib/libipvs.a - >> not >> found >> ===> Verifying install for /usr/local/lib/libipvs.a in >> /usr/ports/net/ipvs >> LVS on FreeBSD works only with 5.3-RELEASE and 5.4-RELEASE. >> However it may work on 5-STABLE. If you are running FreeBSD 5.4-STABLE, >> define >> TRY_STABLE and check if patches apply correctly to your src tree >> To build ipvs, I strongly encourage you to follow these instructions >> 1. checkout supported src tree >> 2. run "make patch-system" >> 3. configure and build your kernel. (you need support of NetFilter >> sockopt, add "options NF_SOCKOPT") >> 4. Install your freshly compiled kernel >> 5. install the port >> 6. reboot your system >> ===> Vulnerability check disabled, database not found >> => ipvs-0.4.0_2.tar.gz doesn't seem to exist in /usr/ports/distfiles/. >> => Attempting to fetch from >> http://www.cultdeadsheep.org/~clement/FreeBSD/ipvs/. >> ipvs-0.4.0_2.tar.gz 100% of 74 kB 51 kBps >> ===> Extracting for ipvs-0.4.0_2 >> => MD5 Checksum OK for ipvs-0.4.0_2.tar.gz. >> => SHA256 Checksum OK for ipvs-0.4.0_2.tar.gz. >> ===> Patching for ipvs-0.4.0_2 >> ===> Configuring for ipvs-0.4.0_2 >> ===> Building for ipvs-0.4.0_2 >> ===> ipvs >> Warning: Object directory not changed from original >> /usr/ports/net/ipvs/work/ipvs-0.4.0_2/ipvs >> @ -> /usr/src/sys >> machine -> /usr/src/sys/i386/include >> cc -O2 -fno-strict-aliasing -pipe -D_KERNEL -DKLD_MODULE -std=c99 >> -nostdinc -I. -I@ -I@/contrib/altq -finline-limit=8000 --param >> inline-unit-growth=100 --param large-function-growth=1000 -fno-common >> -mno-align-long-strings -mpreferred-stack-boundary=2 -mno-mmx >> -mno-3dnow >> -mno-sse -mno-sse2 -mno-sse3 -ffreestanding -Wall -Wredundant-decls >> -Wnested-externs -Wstrict-prototypes -Wmissing-prototypes >> -Wpointer-arith >> -Winline -Wcast-qual -Wundef -Wno-pointer-sign -fformat-extensions -c >> ip_vs_core.c >> cc -O2 -fno-strict-aliasing -pipe -D_KERNEL -DKLD_MODULE -std=c99 >> -nostdinc -I. -I@ -I@/contrib/altq -finline-limit=8000 --param >> inline-unit-growth=100 --param large-function-growth=1000 -fno-common >> -mno-align-long-strings -mpreferred-stack-boundary=2 -mno-mmx >> -mno-3dnow >> -mno-sse -mno-sse2 -mno-sse3 -ffreestanding -Wall -Wredundant-decls >> -Wnested-externs -Wstrict-prototypes -Wmissing-prototypes >> -Wpointer-arith >> -Winline -Wcast-qual -Wundef -Wno-pointer-sign -fformat-extensions -c >> ip_vs_conn.c >> cc -O2 -fno-strict-aliasing -pipe -D_KERNEL -DKLD_MODULE -std=c99 >> -nostdinc -I. -I@ -I@/contrib/altq -finline-limit=8000 --param >> inline-unit-growth=100 --param large-function-growth=1000 -fno-common >> -mno-align-long-strings -mpreferred-stack-boundary=2 -mno-mmx >> -mno-3dnow >> -mno-sse -mno-sse2 -mno-sse3 -ffreestanding -Wall -Wredundant-decls >> -Wnested-externs -Wstrict-prototypes -Wmissing-prototypes >> -Wpointer-arith >> -Winline -Wcast-qual -Wundef -Wno-pointer-sign -fformat-extensions -c >> ip_vs_sched.c >> cc -O2 -fno-strict-aliasing -pipe -D_KERNEL -DKLD_MODULE -std=c99 >> -nostdinc -I. -I@ -I@/contrib/altq -finline-limit=8000 --param >> inline-unit-growth=100 --param large-function-growth=1000 -fno-common >> -mno-align-long-strings -mpreferred-stack-boundary=2 -mno-mmx >> -mno-3dnow >> -mno-sse -mno-sse2 -mno-sse3 -ffreestanding -Wall -Wredundant-decls >> -Wnested-externs -Wstrict-prototypes -Wmissing-prototypes >> -Wpointer-arith >> -Winline -Wcast-qual -Wundef -Wno-pointer-sign -fformat-extensions -c >> ip_vs_ctl.c >> ip_vs_ctl.c: In function 'do_ip_vs_set_ctl': >> ip_vs_ctl.c:1257: warning: implicit declaration of function 'suser' >> ip_vs_ctl.c:1257: warning: nested extern declaration of 'suser' >> ip_vs_ctl.c: At top level: >> ip_vs_ctl.c:1627: error: variable 'ip_vs_sockopts' has initializer but >> incomplete type >> ip_vs_ctl.c:1628: error: extra brace group at end of initializer >> ip_vs_ctl.c:1628: error: (near initialization for 'ip_vs_sockopts') >> ip_vs_ctl.c:1628: warning: excess elements in struct initializer >> ip_vs_ctl.c:1628: warning: (near initialization for 'ip_vs_sockopts') >> ip_vs_ctl.c:1628: warning: excess elements in struct initializer >> ip_vs_ctl.c:1628: warning: (near initialization for 'ip_vs_sockopts') >> ip_vs_ctl.c:1629: warning: excess elements in struct initializer >> ip_vs_ctl.c:1629: warning: (near initialization for 'ip_vs_sockopts') >> ip_vs_ctl.c:1629: warning: excess elements in struct initializer >> ip_vs_ctl.c:1629: warning: (near initialization for 'ip_vs_sockopts') >> ip_vs_ctl.c:1629: warning: excess elements in struct initializer >> ip_vs_ctl.c:1629: warning: (near initialization for 'ip_vs_sockopts') >> ip_vs_ctl.c:1630: warning: excess elements in struct initializer >> ip_vs_ctl.c:1630: warning: (near initialization for 'ip_vs_sockopts') >> ip_vs_ctl.c:1630: warning: excess elements in struct initializer >> ip_vs_ctl.c:1630: warning: (near initialization for 'ip_vs_sockopts') >> ip_vs_ctl.c:1631: warning: excess elements in struct initializer >> ip_vs_ctl.c:1631: warning: (near initialization for 'ip_vs_sockopts') >> ip_vs_ctl.c: In function 'ip_vs_control_init': >> ip_vs_ctl.c:1645: warning: implicit declaration of function >> 'nf_register_sockopt' >> ip_vs_ctl.c:1645: warning: nested extern declaration of >> 'nf_register_sockopt' >> ip_vs_ctl.c: In function 'ip_vs_control_cleanup': >> ip_vs_ctl.c:1675: warning: implicit declaration of function >> 'nf_unregister_sockopt' >> ip_vs_ctl.c:1675: warning: nested extern declaration of >> 'nf_unregister_sockopt' >> *** Error code 1 >> >> Stop in /usr/ports/net/ipvs/work/ipvs-0.4.0_2/ipvs. >> *** Error code 1 >> >> Stop in /usr/ports/net/ipvs/work/ipvs-0.4.0_2. >> *** Error code 1 >> >> Stop in /usr/ports/net/ipvs. >> *** Error code 1 >> >> Stop in /usr/ports/net/keepalived. >> >> Thanks >> >> >> >> > > > _______________________________________________ > freebsd-net@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-net > To unsubscribe, send any mail to "freebsd-net-unsubscribe@freebsd.org" > > From owner-freebsd-net@FreeBSD.ORG Sun May 3 12:35:15 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id CDB57106564A for ; Sun, 3 May 2009 12:35:15 +0000 (UTC) (envelope-from onemda@gmail.com) Received: from mail-fx0-f162.google.com (mail-fx0-f162.google.com [209.85.220.162]) by mx1.freebsd.org (Postfix) with ESMTP id 2ACE58FC0A for ; Sun, 3 May 2009 12:35:14 +0000 (UTC) (envelope-from onemda@gmail.com) Received: by fxm6 with SMTP id 6so3107024fxm.43 for ; Sun, 03 May 2009 05:35:14 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:cc:content-type :content-transfer-encoding; bh=dDDOMCLJCOW3wvWzq/APR2xd3p3syJeCdGg8Nn9tA2k=; b=SEQuIEry0oXFcHYlvzOaoelSHtXnV3TltroQuxFYQpoZzIbgcEy+4/XLiw1HhPUNv4 77Zu8l9pMEYZ35r+XVb9shEZux/RHpI4bp/Gqp10FQwhQHrZvJPtEqbfos4Sar6oyJLR TwUlCSzZPOPz5j86TBHnTfZUmFg1Z+9x/Lxfk= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; b=hmIrxGomg6jnANe7LLlSlTeaqi+fryOg9/sx3XJxnF95sHp+B+g7dnjPPY9IrX9m4J oZpb97Inal2I42M/ui73jgAGcQ9fv2/JdCiomualNfqHkYqyAs3GXMne45oaS8G+jHMQ LGFlWep5Xyqs/tgBvHMaOX3tl9jOhUyCnvTLs= MIME-Version: 1.0 Received: by 10.239.172.73 with SMTP id z9mr255186hbe.30.1241354114090; Sun, 03 May 2009 05:35:14 -0700 (PDT) In-Reply-To: <49FD61DD.7070903@entel.upc.edu> References: <49FA2E3F.9050108@entel.upc.edu> <3a142e750905010655i5e56282eu240e13f2a03dfb02@mail.gmail.com> <49FB55A3.605@entel.upc.edu> <3a142e750905011716g39ea55f0kd081bfdd55709b37@mail.gmail.com> <49FBF9B5.40800@entel.upc.edu> <3a142e750905020617y40f62463ma91b46a015b2b2ab@mail.gmail.com> <49FD61DD.7070903@entel.upc.edu> Date: Sun, 3 May 2009 14:35:14 +0200 Message-ID: <3a142e750905030535v4cfe0103r1d8a17e828f6da9b@mail.gmail.com> From: "Paul B. Mahol" To: Gustau Perez Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Cc: freebsd-net@freebsd.org Subject: Re: Signal sensitivity problem with if_rum X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 03 May 2009 12:35:16 -0000 On 5/3/09, Gustau Perez wrote: > >> That information is misleading, I remmember reading somewhere that linux >> rt73 >> had similar problems like rum but it got fixed, and is not present in >> new kernels. >> I think that problem originated for linux from now obsolete drivers. >> >> On what linux version and what drivers version do you experience >> similar problems >> with signal sensitivity like with rum? >> >> > Hi, > > I'm seeing this in ubuntu 9.04 (kernel 2.6.28). It shows more or less > the same figures we have in FBSD. Try older versions, 8.X perhaps. Linux folks tends to break various things all the time ... > In linux, Bbp17 can be changed from userpace making iwconfig ${dev} > bbp 17=0. But it automatically restores its previous value. Autotuning > seems to be enable and I don't know how to disable it (the post I sent a > few days ago about this is wrong or doesn't apply). I dont belive that things are so much simple that changing only one bbp all the time will fix signal sensitivity. -- Paul From owner-freebsd-net@FreeBSD.ORG Sun May 3 12:43:29 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 2DF1B1065670 for ; Sun, 3 May 2009 12:43:29 +0000 (UTC) (envelope-from sam@ip6.com.au) Received: from mail01.ip6.com.au (ns1.ip6.com.au [125.255.112.202]) by mx1.freebsd.org (Postfix) with ESMTP id E69718FC0C for ; Sun, 3 May 2009 12:43:28 +0000 (UTC) (envelope-from sam@ip6.com.au) Received: from mail01.ip6.com.au (localhost [127.0.0.1]) by mail01.ip6.com.au (Postfix) with ESMTP id 8BAA32864D for ; Sun, 3 May 2009 22:43:25 +1000 (EST) Received: from secure.ip6.com.au (localhost [127.0.0.1]) by mail01.ip6.com.au (Postfix) with ESMTP id 4594528643 for ; Sun, 3 May 2009 22:43:25 +1000 (EST) Received: from 220.233.42.226 (SquirrelMail authenticated user sam) by secure.ip6.com.au with HTTP; Sun, 3 May 2009 22:43:25 +1000 (EST) Message-ID: <10229.220.233.42.226.1241354605.squirrel@secure.ip6.com.au> Date: Sun, 3 May 2009 22:43:25 +1000 (EST) From: "Sam Wan" To: freebsd-net@freebsd.org User-Agent: SquirrelMail/1.4.10a MIME-Version: 1.0 Content-Type: text/plain;charset=iso-8859-1 Content-Transfer-Encoding: 8bit X-Priority: 3 (Normal) Importance: Normal X-Virus-Scanned: ClamAV using ClamSMTP Subject: Download 5.4 ISO file? X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 03 May 2009 12:43:29 -0000 Hi, I want to download iso file of freebsd 5.4 release. Can anyone tell me a link? I want build a ipvs box in freebsd. Thanks From owner-freebsd-net@FreeBSD.ORG Sun May 3 12:47:56 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 676C81065672 for ; Sun, 3 May 2009 12:47:56 +0000 (UTC) (envelope-from erikt@midgard.homeip.net) Received: from ch-smtp01.sth.basefarm.net (ch-smtp01.sth.basefarm.net [80.76.149.212]) by mx1.freebsd.org (Postfix) with ESMTP id 2342D8FC15 for ; Sun, 3 May 2009 12:47:56 +0000 (UTC) (envelope-from erikt@midgard.homeip.net) Received: from c83-255-48-78.bredband.comhem.se ([83.255.48.78]:51463 helo=falcon.midgard.homeip.net) by ch-smtp01.sth.basefarm.net with esmtp (Exim 4.69) (envelope-from ) id 1M0b6k-0007d8-5a for freebsd-net@freebsd.org; Sun, 03 May 2009 14:47:52 +0200 Received: (qmail 36389 invoked from network); 3 May 2009 14:47:48 +0200 Received: from owl.midgard.homeip.net (10.1.5.7) by falcon.midgard.homeip.net with ESMTP; 3 May 2009 14:47:48 +0200 Received: (qmail 24206 invoked by uid 1001); 3 May 2009 14:47:48 +0200 Date: Sun, 3 May 2009 14:47:48 +0200 From: Erik Trulsson To: Sam Wan Message-ID: <20090503124748.GA24180@owl.midgard.homeip.net> References: <10229.220.233.42.226.1241354605.squirrel@secure.ip6.com.au> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <10229.220.233.42.226.1241354605.squirrel@secure.ip6.com.au> User-Agent: Mutt/1.5.19 (2009-01-05) X-Originating-IP: 83.255.48.78 X-Scan-Result: No virus found in message 1M0b6k-0007d8-5a. X-Scan-Signature: ch-smtp01.sth.basefarm.net 1M0b6k-0007d8-5a 323d020df7f261f7471b1043b90f7a2f Cc: freebsd-net@freebsd.org Subject: Re: Download 5.4 ISO file? X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 03 May 2009 12:47:56 -0000 On Sun, May 03, 2009 at 10:43:25PM +1000, Sam Wan wrote: > > Hi, > > I want to download iso file of freebsd 5.4 release. > Can anyone tell me a link? > > I want build a ipvs box in freebsd. > > Thanks > ftp://ftp-archive.freebsd.org/pub/FreeBSD-Archive/old-releases/ -- Erik Trulsson ertr1013@student.uu.se From owner-freebsd-net@FreeBSD.ORG Sun May 3 13:05:41 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id EC070106564A for ; Sun, 3 May 2009 13:05:41 +0000 (UTC) (envelope-from Dieter.Brozio@t-online.de) Received: from mailout10.t-online.de (mailout10.t-online.de [194.25.134.21]) by mx1.freebsd.org (Postfix) with ESMTP id AC21B8FC0A for ; Sun, 3 May 2009 13:05:41 +0000 (UTC) (envelope-from Dieter.Brozio@t-online.de) Received: from fwd06.aul.t-online.de by mailout10.sul.t-online.de with smtp id 1M0b7A-0004Nm-0B; Sun, 03 May 2009 14:48:16 +0200 Received: from [192.168.2.102] (GtMqJaZAZhi+CtOfQ9YT6DMZrV4TdwFUztxQHdbY61T5RJF-K0FxBhz4gptwih-Qnq@[80.139.102.248]) by fwd06.t-online.de with esmtp id 1M0b78-0lgsts0; Sun, 3 May 2009 14:48:14 +0200 Message-ID: <49FD928D.4020504@t-online.de> Date: Sun, 03 May 2009 14:48:13 +0200 From: Dieter Brozio User-Agent: Thunderbird 2.0.0.21 (X11/20090501) MIME-Version: 1.0 To: freebsd-net@FreeBSD.org Content-Type: text/plain; charset=ISO-8859-15; format=flowed Content-Transfer-Encoding: 7bit X-ID: GtMqJaZAZhi+CtOfQ9YT6DMZrV4TdwFUztxQHdbY61T5RJF-K0FxBhz4gptwih-Qnq X-TOI-MSGID: f5f23c65-a438-42b1-8e29-7f22ddb832ce Cc: Subject: New INTEL firmware v3.1 for device iwi (IPW 2200BG) X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 03 May 2009 13:05:42 -0000 Hi there, sorry for writing to the complete FBSD mailing list, but I don't know who is responsible for the WLAN iwi device firmware. To whom it may concern: INTEL released in March 2009 a new version 3.1 of its firmware version for the WLAN iwi device (Pro/Wireless 2200BG). http://ipw2200.sourceforge.net/firmware.php http://ipw2200.sourceforge.net/firmware.php?fid=8 On my 7.2.RC2 desktop PC (without WLAN) I noticed that in /usr/src/sys/contrib/dev/iwi/ipw2200_bss.fw.uu /usr/src/sys/contrib/dev/iwi/ipw2200_ibss.fw.uu /usr/src/sys/contrib/dev/iwi/ipw2200_sniffer.fw.uu is still the old v3.0 iwi firmware inside. This fw generates after some hours of operation error messages like "iwi0:scan stuck" and finally the network connection will be disconnected. I've tested fw v3.1 this week on my FBSD6.4 laptop: No problems, no "scan stuck", no side-effects. Brilliant. I think you should update FBSD 7.2 with fw v3.1 because maybe you can fix at least one of these bugs: http://www.freebsd.org/cgi/query-pr.cgi?pr=kern/122597 http://www.freebsd.org/cgi/query-pr.cgi?pr=kern/123559 http://www.freebsd.org/cgi/query-pr.cgi?pr=kern/131153 I'm sorry that I'm unable to test iwi firmware v3.1 with FBSD 7.2 on my WLAN laptop, but at the moment I need the installed FBSD 6.4 on this PC. Anybody of you who can test iwi v3.1? Regards Dieter From owner-freebsd-net@FreeBSD.ORG Sun May 3 15:57:52 2009 Return-Path: Delivered-To: freebsd-net@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 6FE711065676 for ; Sun, 3 May 2009 15:57:52 +0000 (UTC) (envelope-from thompsa@FreeBSD.org) Received: from pele.citylink.co.nz (pele.citylink.co.nz [202.8.44.226]) by mx1.freebsd.org (Postfix) with ESMTP id 2F35A8FC19 for ; Sun, 3 May 2009 15:57:51 +0000 (UTC) (envelope-from thompsa@FreeBSD.org) Received: from localhost (localhost [127.0.0.1]) by pele.citylink.co.nz (Postfix) with ESMTP id 57954FF3C; Mon, 4 May 2009 03:57:51 +1200 (NZST) X-Virus-Scanned: Debian amavisd-new at citylink.co.nz Received: from pele.citylink.co.nz ([127.0.0.1]) by localhost (pele.citylink.co.nz [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lsAtrEfWGMl1; Mon, 4 May 2009 03:57:46 +1200 (NZST) Received: from citylink.fud.org.nz (unknown [202.8.44.45]) by pele.citylink.co.nz (Postfix) with ESMTP; Mon, 4 May 2009 03:57:46 +1200 (NZST) Received: by citylink.fud.org.nz (Postfix, from userid 1001) id 4546E11432; Mon, 4 May 2009 03:57:46 +1200 (NZST) Date: Sun, 3 May 2009 08:57:46 -0700 From: Andrew Thompson To: Dieter Brozio Message-ID: <20090503155746.GB11965@citylink.fud.org.nz> References: <49FD928D.4020504@t-online.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <49FD928D.4020504@t-online.de> User-Agent: Mutt/1.5.17 (2007-11-01) Cc: freebsd-net@FreeBSD.org Subject: Re: New INTEL firmware v3.1 for device iwi (IPW 2200BG) X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 03 May 2009 15:57:52 -0000 On Sun, May 03, 2009 at 02:48:13PM +0200, Dieter Brozio wrote: > Hi there, > > To whom it may concern: > > INTEL released in March 2009 a new version 3.1 of its firmware version for > the WLAN iwi device (Pro/Wireless 2200BG). > > http://ipw2200.sourceforge.net/firmware.php > http://ipw2200.sourceforge.net/firmware.php?fid=8 > > On my 7.2.RC2 desktop PC (without WLAN) I noticed that in > > /usr/src/sys/contrib/dev/iwi/ipw2200_bss.fw.uu > /usr/src/sys/contrib/dev/iwi/ipw2200_ibss.fw.uu > /usr/src/sys/contrib/dev/iwi/ipw2200_sniffer.fw.uu > > is still the old v3.0 iwi firmware inside. > > This fw generates after some hours of operation error messages like > "iwi0:scan stuck" and finally the network connection will be disconnected. > I've tested fw v3.1 this week on my FBSD6.4 laptop: No problems, no "scan > stuck", no side-effects. Brilliant. Great. If anyone can also confirm it works on current then I will commit. > I think you should update FBSD 7.2 with fw v3.1 because maybe you can fix > at least one of these bugs: The 7.2 images have been made so its too late, it can be merged to 7-stable and 7.3. Andrew From owner-freebsd-net@FreeBSD.ORG Sun May 3 20:50:03 2009 Return-Path: Delivered-To: freebsd-net@hub.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 6E413106566C for ; Sun, 3 May 2009 20:50:03 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:4f8:fff6::28]) by mx1.freebsd.org (Postfix) with ESMTP id 41B9C8FC08 for ; Sun, 3 May 2009 20:50:03 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (gnats@localhost [127.0.0.1]) by freefall.freebsd.org (8.14.3/8.14.3) with ESMTP id n43Ko3WK033258 for ; Sun, 3 May 2009 20:50:03 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.14.3/8.14.3/Submit) id n43Ko3fd033251; Sun, 3 May 2009 20:50:03 GMT (envelope-from gnats) Date: Sun, 3 May 2009 20:50:03 GMT Message-Id: <200905032050.n43Ko3fd033251@freefall.freebsd.org> To: freebsd-net@FreeBSD.org From: "Philip Drapeau" Cc: Subject: Re: kern/133218: [carp] [hang] use of carp(4) causes system to freeze X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: Philip Drapeau List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 03 May 2009 20:50:03 -0000 The following reply was made to PR kern/133218; it has been noted by GNATS. From: "Philip Drapeau" To: , Cc: Subject: Re: kern/133218: [carp] [hang] use of carp(4) causes system to freeze Date: Sun, 3 May 2009 14:21:40 -0600 This is a multipart message in MIME format. ------=_NextPart_000_0001_01C9CBFA.7A4FEA50 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Good Afternoon, I have noted this bug has been sitting here in the open state for quite some time without any response. If this is due to any additional information being required from me I would be happy to provide it. ------=_NextPart_000_0001_01C9CBFA.7A4FEA50 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

Good Afternoon,

 

I have noted this bug has been sitting here in the = open state for quite some time without any response. If this is due to any = additional information being required from me I would be happy to provide = it.

------=_NextPart_000_0001_01C9CBFA.7A4FEA50-- From owner-freebsd-net@FreeBSD.ORG Mon May 4 00:22:48 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id AE3091065694 for ; Mon, 4 May 2009 00:22:48 +0000 (UTC) (envelope-from rslaranjo@gmail.com) Received: from qw-out-2122.google.com (qw-out-2122.google.com [74.125.92.24]) by mx1.freebsd.org (Postfix) with ESMTP id 666B88FC1D for ; Mon, 4 May 2009 00:22:48 +0000 (UTC) (envelope-from rslaranjo@gmail.com) Received: by qw-out-2122.google.com with SMTP id 3so2661493qwe.7 for ; Sun, 03 May 2009 17:22:47 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:cc:content-type :content-transfer-encoding; bh=hiANVi8h5eooCtU/upqsagTYn+ycY+/yqAOIgp6nHfo=; b=S0vSRVRpZ/FGw+EUhCw9O4fjwZ/J3k7I9gWc4Lm5qSnx0mrUXLVIlQaAF+slEKaapk hi8ARSGvKD7V5YTig4bKymodZbap7A0dGuIXaLE11u0h3AM22gFtCEX1nSpNGuLELY55 3/fEkVYf354JA/gSICERWkToq5Q/2pQscOv/Y= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; b=x1pA0QITjq143J1EQarZvnlC+SOHTGtFiKnB67WATTBxLJlQ/4gOcH4ieVU0Y7vgtP qtk/gIJv7wjh/VZGn6o2CVhXK9Dazito1rxo/LpE393m2eBTZc3LUkwRDZ3hBxVTw5Z0 sRQSqHHW77QPPToJOn+o3s1cnUxBmm9YDaFMw= MIME-Version: 1.0 Received: by 10.220.97.213 with SMTP id m21mr8447225vcn.27.1241396567442; Sun, 03 May 2009 17:22:47 -0700 (PDT) In-Reply-To: <52471.86.212.66.201.1241304184.squirrel@webmail.esigetel.fr> References: <52471.86.212.66.201.1241304184.squirrel@webmail.esigetel.fr> Date: Mon, 4 May 2009 08:22:47 +0800 Message-ID: From: Rommel Laranjo To: JASSAL Aman Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable Cc: freebsd-net@freebsd.org Subject: Re: Freebsd failed to create routing prefix X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 04 May 2009 00:22:49 -0000 Hello Jassal, Yes you are right, the problem will not occur if you put the ipv6 address at rc.conf and reboot. But, the problem I describe will occur only when if you change from Stateless IPv6 autoconfiguration to Static, without rebooting the machine. On Sun, May 3, 2009 at 6:43 AM, JASSAL Aman wrote= : > Hello M.Laranjo > > The Kame stack for IPv6 should be working fine, whether you use stateless > autoconfiguration or static configuration. > > Since you want to use static configuration, my suggestion would be to > modify the /etc/rc.conf file so that your static configuration is loaded > everytime at boot. That way, you don't have to suppress the autoconfigure= d > address to reconfigure your static address afterwards. > > The lines you will need are : > > ipv6_enable=3D"YES" > ipv6_network_interface=3D"em0" > ipv6_ifconfig_em0=3D"2001:db8:1234:abcd:20c:27ff:fe3d:63dd prefixlen 64" > ipv6_defaultrouter=3D"2001:db8:1234:abcd::1" > > This should work. Please try to ping6 your router to see if everything is > working as it's supposed to. About your last question, I'm not 100% sure, > but I don't think FreeBSD will autoconfigure a route if you just add a > static ipv6 address on your interface... Unless you use a routing daemon > like routed. > > Kind regards > > > Aman Jassal > > > Le Sam 2 mai 2009 21:59, Rommel Laranjo a =E9crit : >> Hello everyone, >> >> >> I need help. My box(Machine1) by default will perform IPv6 stateless >> autoconfiguration and I need to change this autoconfigured address to >> static manually without restarting. Here are the steps I follow but I su= re >> I missed something cause I was >> unsuccessful of doing it. >> >> 1. I disabled sysctl knob to stop receiving rtadv >> # sysctl -w net.inet6.ip6.accept_rtadv=3D0 >> >> >> 2. I then removed the autoconfigured ipv6 address from the interface >> # ifconfig em0 inet6 2001:db8:1234:abcd:20c:27ff:fe3d:63dd delete >> >> >> 3. I removed the default ipv6 route since I will replace with another >> route # route delete -inet6 default >> >> >> 4. I then added the autoconfigured ipv6 address back to the interface to >> make it static # ifconfig em0 inet6 2001:db8:1234:abcd:20c:27ff:fe3d:63d= d >> prefixlen 64 up >> >> 5. I added the new default ipv6 route >> # route add -inet6 default 2001:db8:1234:abcd::1 >> >> >> At this point I pinged 2001:db8:1234:abcd:20c:27ff:fe3d:63dd from anothe= r >> =A0IPv6 box (Machine2) with IPv6 address of the same prefix >> (2001:db8:1234:abcd:215:d3ff:fe4f:acaf) but with no success. But if I >> ping6 from Machine2 to my router 2001:db8:1234:abcd::1 I am successfull. >> >> I tried to check IPv6 route information from Machine1 thru netstat -rnf >> inet6 but have not found this entry: >> >> 2001:db8:1234:abcd::/64 =A0 =A0 =A0 =A0 =A0 link#1 =A0 =A0 =A0 =A0 =A0 = =A0 =A0 =A0 =A0 =A0 =A0 =A0UC >> em0 >> >> I hope someone could shed light on how to put this route into my ipv6 >> routing table. Is this a bug in FreeBSD not to automatically add a routi= ng >> prefix after changing from IPv6 stateless autoconfiguration to static IP= v6 >> address ? >> >> Thanks, >> >> >> Romskie >> _______________________________________________ >> freebsd-net@freebsd.org mailing list >> http://lists.freebsd.org/mailman/listinfo/freebsd-net >> To unsubscribe, send any mail to "freebsd-net-unsubscribe@freebsd.org" >> >> > > > From owner-freebsd-net@FreeBSD.ORG Mon May 4 00:31:22 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id BDCB9106566B for ; Mon, 4 May 2009 00:31:22 +0000 (UTC) (envelope-from rslaranjo@gmail.com) Received: from mail-qy0-f105.google.com (mail-qy0-f105.google.com [209.85.221.105]) by mx1.freebsd.org (Postfix) with ESMTP id 6220D8FC0A for ; Mon, 4 May 2009 00:31:22 +0000 (UTC) (envelope-from rslaranjo@gmail.com) Received: by qyk3 with SMTP id 3so6860288qyk.3 for ; Sun, 03 May 2009 17:31:21 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:cc:content-type :content-transfer-encoding; bh=FKbomiejc9bL0mo8UFFNZTmDm3rg7nswBbAgMghjUKA=; b=IXDwivFpX5WNof0FgoZiTxToi4vKw5Ys6LywoDkkR1m5eBlqm2Mr8qSn9uuyA4pipA y+AtEWbbYZZbZR0WcVOZQuep1hQuTWQuNzvoehPbuux/Vx1wu/E6Br07LxoZ27bVLq5i v5pPkqNBSdsipsxGK6/P9qEkYA6KuzSapx24Y= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; b=FUPfPIxstyQhVBk7ZAnEEAXKyJImk/Ml8D94kw1QwQIB0J36SaYHhaeMo6r2c9j7ss mGDnvZ0BGpqYaE6b0Q20Ra4wIEaPSJvzUvJd2yKjm3rVTqPqbLo4Jt577iduxO4Uef3a aYw8Um13kCvJNvt/pzOoR7Cj0+PC02H5ccxSA= MIME-Version: 1.0 Received: by 10.220.73.134 with SMTP id q6mr8420221vcj.51.1241397081404; Sun, 03 May 2009 17:31:21 -0700 (PDT) In-Reply-To: <20090503.081617.15105360.hrs@allbsd.org> References: <20090503.081617.15105360.hrs@allbsd.org> Date: Mon, 4 May 2009 08:31:21 +0800 Message-ID: From: Rommel Laranjo To: Hiroki Sato Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable Cc: freebsd-net@freebsd.org Subject: Re: Freebsd failed to create routing prefix X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 04 May 2009 00:31:23 -0000 Hello Hiroki, Yes, my box has two NICs and I have these lines at my rc.conf. ipv6_enable=3D"YES" ipv6_network_interfaces=3D"AUTO" On Sun, May 3, 2009 at 7:16 AM, Hiroki Sato wrote: > Rommel Laranjo wrote > =A0in : > > rs> I hope someone could shed light on how to put this route into my ipv6 > rs> routing table. > rs> Is this a bug in FreeBSD not to automatically add a routing prefix > rs> after changing from IPv6 stateless autoconfiguration to > rs> static IPv6 address ? > > =A0It looks odd because that link should be added automatically at 4 in > =A0your procedure regardless of whether you use the stateless autoconf. > =A0BTW, does your system have multiple NICs? > > -- > | Hiroki SATO > From owner-freebsd-net@FreeBSD.ORG Mon May 4 01:38:52 2009 Return-Path: Delivered-To: freebsd-net@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id A94DC1065673 for ; Mon, 4 May 2009 01:38:52 +0000 (UTC) (envelope-from hrs@FreeBSD.org) Received: from mail.allbsd.org (unknown [IPv6:2001:2f0:104:e001::32]) by mx1.freebsd.org (Postfix) with ESMTP id 3449F8FC14 for ; Mon, 4 May 2009 01:38:52 +0000 (UTC) (envelope-from hrs@FreeBSD.org) Received: from delta.allbsd.org (p3138-ipbf904funabasi.chiba.ocn.ne.jp [122.26.38.138]) (authenticated bits=128) by mail.allbsd.org (8.14.3/8.14.2) with ESMTP id n441ccQS024099; Mon, 4 May 2009 10:38:49 +0900 (JST) (envelope-from hrs@FreeBSD.org) Received: from localhost (alph.allbsd.org [192.168.0.10]) (authenticated bits=0) by delta.allbsd.org (8.13.4/8.13.4) with ESMTP id n441cNQh086145; Mon, 4 May 2009 10:38:25 +0900 (JST) (envelope-from hrs@FreeBSD.org) Date: Mon, 04 May 2009 10:37:43 +0900 (JST) Message-Id: <20090504.103743.232652487.hrs@allbsd.org> To: rslaranjo@gmail.com From: Hiroki Sato In-Reply-To: References: <20090503.081617.15105360.hrs@allbsd.org> X-PGPkey-fingerprint: BDB3 443F A5DD B3D0 A530 FFD7 4F2C D3D8 2793 CF2D X-Mailer: Mew version 6.2 on Emacs 22.3 / Mule 5.0 (SAKAKI) Mime-Version: 1.0 Content-Type: Multipart/Signed; protocol="application/pgp-signature"; micalg=pgp-sha1; boundary="--Security_Multipart(Mon_May__4_10_37_43_2009_925)--" Content-Transfer-Encoding: 7bit X-Virus-Scanned: ClamAV version 0.93.3, clamav-milter version 0.93.3 on gatekeeper.allbsd.org X-Virus-Status: Clean X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.0 (mail.allbsd.org [133.31.130.32]); Mon, 04 May 2009 10:38:49 +0900 (JST) Cc: freebsd-net@FreeBSD.org Subject: Re: Freebsd failed to create routing prefix X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 04 May 2009 01:38:52 -0000 ----Security_Multipart(Mon_May__4_10_37_43_2009_925)-- Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit Rommel Laranjo wrote in : rs> Yes, my box has two NICs and I have these lines at my rc.conf. rs> rs> ipv6_enable="YES" rs> ipv6_network_interfaces="AUTO" Ah, from 7.1R there seems a regression of handling IPv6 link-level route on a system with multiple NICs and receiving RAs. When one NIC received an RA, another NIC's link-level route (i.e. marked as UC flag in netstat -r) is removed for some reason and it does not work even if the route is manually added after the removal (btw, you can add the route by using "route add -inet6 2001:db8:1234:abcd:20c:27ff:fe3d:63dd/64 -interface em0 -cloning -nostatic"). Your procedure looks correct to me and it should work on 7.0R, but on both 7.1R and 7.2R it does not work at least. While I still have no idea about a workaround to this symptom at this moment, I think it will be fixed soon in the source tree. -- | Hiroki SATO ----Security_Multipart(Mon_May__4_10_37_43_2009_925)-- Content-Type: application/pgp-signature Content-Transfer-Encoding: 7bit -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (FreeBSD) iEYEABECAAYFAkn+RucACgkQTyzT2CeTzy0PjQCfeRyhYKVPCItP0J6VHbgb83lu PUwAnit8GKSPHKJqZB9Yc/23xtbJYLmU =cuyO -----END PGP SIGNATURE----- ----Security_Multipart(Mon_May__4_10_37_43_2009_925)---- From owner-freebsd-net@FreeBSD.ORG Mon May 4 02:40:03 2009 Return-Path: Delivered-To: freebsd-net@hub.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id B57C6106564A for ; Mon, 4 May 2009 02:40:03 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:4f8:fff6::28]) by mx1.freebsd.org (Postfix) with ESMTP id 896E88FC15 for ; Mon, 4 May 2009 02:40:03 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (gnats@localhost [127.0.0.1]) by freefall.freebsd.org (8.14.3/8.14.3) with ESMTP id n442e3Gh002728 for ; Mon, 4 May 2009 02:40:03 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.14.3/8.14.3/Submit) id n442e3ZB002727; Mon, 4 May 2009 02:40:03 GMT (envelope-from gnats) Date: Mon, 4 May 2009 02:40:03 GMT Message-Id: <200905040240.n442e3ZB002727@freefall.freebsd.org> To: freebsd-net@FreeBSD.org From: "Philip Drapeau" Cc: Subject: Re: kern/133218: [carp] [hang] use of carp(4) causes system to freeze X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: Philip Drapeau List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 04 May 2009 02:40:04 -0000 The following reply was made to PR kern/133218; it has been noted by GNATS. From: "Philip Drapeau" To: , Cc: Subject: Re: kern/133218: [carp] [hang] use of carp(4) causes system to freeze Date: Sun, 3 May 2009 20:09:16 -0600 I might also point out that any attempts to break into the kernel debugger at the console failed in each case where this happened. From owner-freebsd-net@FreeBSD.ORG Mon May 4 02:47:35 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 1F3F4106566C; Mon, 4 May 2009 02:47:35 +0000 (UTC) (envelope-from rslaranjo@gmail.com) Received: from mail-qy0-f105.google.com (mail-qy0-f105.google.com [209.85.221.105]) by mx1.freebsd.org (Postfix) with ESMTP id 9C1A88FC08; Mon, 4 May 2009 02:47:34 +0000 (UTC) (envelope-from rslaranjo@gmail.com) Received: by qyk3 with SMTP id 3so6946275qyk.3 for ; Sun, 03 May 2009 19:47:33 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:cc:content-type :content-transfer-encoding; bh=5uLrm+zeuviOnzVSuF2cPpgPwr0kxIwMpaq08ydijK4=; b=lepvFbE+7ppXJOt+g/WW1puhk1lpCFUIlqV4Cws48M1/rY5EKMW0kvUqhf28Po8TUL +hCNnuV2SNcpYUDcIuAEt/0YAzjNzTDUxG/WkuLqd0K2xe83zxao1Cr3u18YSWeui9jI Z3RfYmzRu0kVh5B9W84b9dSTcrAyEaJMKUFUw= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; b=WG5zoYpM9VSqAWRyZDPdDrxswYXrcYG6x59XeUpSNwUG1mgT58ZkhoPHspJAaaYPfM VcucBgvvjtN9am1tWAxH9WLNCvI1bnFZd/AbRZlBzp9daqg8wukZbKiGOh7JCrxvu+Jt Uh49DpeRcxKbYt/4tlCyWzdl6Nk8JjVvu7QEI= MIME-Version: 1.0 Received: by 10.220.97.129 with SMTP id l1mr8531595vcn.9.1241405253558; Sun, 03 May 2009 19:47:33 -0700 (PDT) In-Reply-To: <20090504.103743.232652487.hrs@allbsd.org> References: <20090503.081617.15105360.hrs@allbsd.org> <20090504.103743.232652487.hrs@allbsd.org> Date: Mon, 4 May 2009 10:47:33 +0800 Message-ID: From: Rommel Laranjo To: Hiroki Sato Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable Cc: freebsd-net@freebsd.org Subject: Re: Freebsd failed to create routing prefix X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 04 May 2009 02:47:35 -0000 Hello Hiroki-san, The box I am using is FreeBSD 7.0-Release: # uname -a FreeBSD freebsd7.example.com 7.0-RELEASE FreeBSD 7.0-RELEASE #0: Sun Feb 24 19:59:52 UTC 2008 root@logan.cse.buffalo.edu:/usr/obj/usr/src/sys/GENERIC i386 On Mon, May 4, 2009 at 9:37 AM, Hiroki Sato wrote: > Rommel Laranjo wrote > =A0in : > > rs> Yes, my box has two NICs and I have these lines at my rc.conf. > rs> > rs> ipv6_enable=3D"YES" > rs> ipv6_network_interfaces=3D"AUTO" > > =A0Ah, from 7.1R there seems a regression of handling IPv6 link-level > =A0route on a system with multiple NICs and receiving RAs. =A0When one NI= C > =A0received an RA, another NIC's link-level route (i.e. marked as UC > =A0flag in netstat -r) is removed for some reason and it does not work > =A0even if the route is manually added after the removal (btw, you can > =A0add the route by using "route add -inet6 > =A02001:db8:1234:abcd:20c:27ff:fe3d:63dd/64 -interface em0 -cloning > =A0-nostatic"). I tried this, and it add the expected route for the prefix: 2001:db8:1234:abcd::/64 link#1 UC = em0 But when I pinged the router, I still got no success: # ping6 2001:db8:1234:abcd::fff2 PING6(56=3D40+8+8 bytes) 2001:db8:1234:abcd:20c:27ff:fe3d:63dd --> 2001:db8:1234:abcd::fff2 ping6: sendmsg: Invalid argument ping6: wrote 2001:db8:1234:abcd::fff2 16 chars, ret=3D-1 ping6: sendmsg: Invalid argument ping6: wrote 2001:db8:1234:abcd::fff2 16 chars, ret=3D-1 ^C --- 2001:db8:1234:abcd::fff2 ping6 statistics --- 2 packets transmitted, 0 packets received, 100.0% packet loss I also got this logged at the console: nd6_storelladdr: sdl_alen =3D=3D 0 > > =A0Your procedure looks correct to me and it should work on 7.0R, but on > =A0both 7.1R and 7.2R it does not work at least. =A0While I still have no > =A0idea about a workaround to this symptom at this moment, I think it > =A0will be fixed soon in the source tree. Thanks alot, Romskie From owner-freebsd-net@FreeBSD.ORG Mon May 4 04:03:07 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 65AF81065677; Mon, 4 May 2009 04:03:07 +0000 (UTC) (envelope-from will@firepipe.net) Received: from mail-gx0-f162.google.com (mail-gx0-f162.google.com [209.85.217.162]) by mx1.freebsd.org (Postfix) with ESMTP id 17D3D8FC1A; Mon, 4 May 2009 04:03:06 +0000 (UTC) (envelope-from will@firepipe.net) Received: by gxk6 with SMTP id 6so629373gxk.19 for ; Sun, 03 May 2009 21:03:06 -0700 (PDT) MIME-Version: 1.0 Received: by 10.151.122.7 with SMTP id z7mr11190162ybm.140.1241409786438; Sun, 03 May 2009 21:03:06 -0700 (PDT) In-Reply-To: <49EF11E8.508@FreeBSD.org> References: <2aada3410904212216o128e1fdfx8c299b3531adc694@mail.gmail.com> <49EF11E8.508@FreeBSD.org> Date: Sun, 3 May 2009 22:03:06 -0600 Message-ID: <2aada3410905032103g734e7025nad7f7b13137572ed@mail.gmail.com> From: Will Andrews To: "Bruce M. Simpson" Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable Cc: freebsd-net@freebsd.org Subject: Re: CARP as a module; followup thoughts X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 04 May 2009 04:03:07 -0000 On Wed, Apr 22, 2009 at 6:47 AM, Bruce M. Simpson wrote: > Hi, > > Will Andrews wrote: >> >> Hello, >> >> I've written a patch (against 8.0-CURRENT as of r191369) which makes >> it possible to build, load, run, & unload CARP as a module, using the >> GENERIC kernel. =A0It can be obtained from: >> >> http://firepipe.net/patches/carp-as-module-20090421.diff >> > > There's no need to implement the in*_proto_register() stuff in that patch= , > you should just be able to re-use the encap_attach_func() functions. Look= at > how PIM is implemented in ip_mroute.c for an example. > > Other than that it looks like a good start... but would hold off on > committing as-is. the more general case of registering a MAC address on a= n > interface should be considered. Thank you very much for your feedback. I have implemented your suggestion as follows: http://firepipe.net/patches/carp-as-module-20090503-2.diff This version doesn't reinvent the wheel as far as registering the protocol goes. Personally, I think that notwithstanding your other objection, this should get committed, since it is a step in the right direction (perhaps minus the netinet6/in6_proto.c change that adds spacers). One step at a time! carp_encapcheck() is simplistic, but probably suffices (maybe also check to see if the vh MAC matches). This patch does work fine with my test setup, one system using GENERIC+if_carp and the other using a static build without the patch. I also found a "memory leak" in the original code, where it calls free(cif, M_IFADDR), which is wrong, it should be free(cif, M_CARP), since the original malloc uses M_CARP -- this fix is also included in the patch above. I've looked at the general case of registering a MAC address. I was going to try to include that change in this patch, but after reading the interface code for a while, I realized there isn't a general way to do that that seems settled. So it appears there needs to be a discussion on how to accomplish this. So, in struct ifnet, there is a field called if_addrhead which is a list of struct ifaddr's. This appears to be used for the general case of all addresses registered to a particular interface (AF_LINK aka lladdr's, plus AF_INET, AF_INET6, etc.). Now, we could use this with TAILQ_INSERT()'s for each virtual AF_LINK, and replace the applicable checks for "IF_LLADDR(ifp)" with a function that searches ifnet.if_addrhead for all AF_LINK entries and comparing the addresses to determine a match. Problem is, that's more O(n) than O(1), which is probably not acceptable. Perhaps a better way would be to replace ifnet.if_addrhead with a hash table for O(log n) search complexity, and possibly having separate hash tables for AF_LINK vs. other address families? Or maybe even one for each address family. That's probably overkill. There does seem to be a need to distinguish physical AF_LINKs from virtual though, since each physical interface driver uses IF_LLADDR(ifp) to refer to its physical address. Possibly ifaddr.ifa_flags could be used to make this distinction (though it seems to be used mainly for routing flags), but probably leave ifnet.if_addr as is for that purpose. Another way would be to have a separate list/hash table for virtual lladdr's (ifnet.ifvirt_lladdrhead?). I considered that but it seems better and more general to simply upgrade ifnet.if_addrhead. Regards, --Will. From owner-freebsd-net@FreeBSD.ORG Mon May 4 06:01:56 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id A50D4106566B for ; Mon, 4 May 2009 06:01:56 +0000 (UTC) (envelope-from gperez@entel.upc.edu) Received: from violet.upc.es (violet.upc.es [147.83.2.51]) by mx1.freebsd.org (Postfix) with ESMTP id 2AF3A8FC15 for ; Mon, 4 May 2009 06:01:55 +0000 (UTC) (envelope-from gperez@entel.upc.edu) Received: from entelserver.upc.edu (entelserver.upc.es [147.83.39.4]) by violet.upc.es (8.14.1/8.13.1) with ESMTP id n4461jRQ007889; Mon, 4 May 2009 08:01:45 +0200 Received: from webmail.entel.upc.edu (webmail.entel.upc.es [147.83.39.6]) by entelserver.upc.edu (Postfix) with ESMTP id 616D82CBD08; Mon, 4 May 2009 08:01:49 +0200 (CEST) Received: from 147.83.40.234 by webmail.entel.upc.edu with HTTP; Mon, 4 May 2009 08:01:49 +0200 (CEST) Message-ID: <57348.147.83.40.234.1241416909.squirrel@webmail.entel.upc.edu> In-Reply-To: <3a142e750905030535v4cfe0103r1d8a17e828f6da9b@mail.gmail.com> References: <49FA2E3F.9050108@entel.upc.edu> <3a142e750905010655i5e56282eu240e13f2a03dfb02@mail.gmail.com> <49FB55A3.605@entel.upc.edu> <3a142e750905011716g39ea55f0kd081bfdd55709b37@mail.gmail.com> <49FBF9B5.40800@entel.upc.edu> <3a142e750905020617y40f62463ma91b46a015b2b2ab@mail.gmail.com> <49FD61DD.7070903@entel.upc.edu> <3a142e750905030535v4cfe0103r1d8a17e828f6da9b@mail.gmail.com> Date: Mon, 4 May 2009 08:01:49 +0200 (CEST) From: "Gustavo Perez Querol" To: "Paul B. Mahol" User-Agent: SquirrelMail/1.4.10a-1.fc6 MIME-Version: 1.0 Content-Type: text/plain;charset=utf-8 Content-Transfer-Encoding: 8bit X-Priority: 3 (Normal) Importance: Normal X-Mail-Scanned: Criba 2.0 + Clamd X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-3.0 (violet.upc.es [147.83.2.51]); Mon, 04 May 2009 08:01:45 +0200 (CEST) Cc: freebsd-net@freebsd.org Subject: Re: Signal sensitivity problem with if_rum X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 04 May 2009 06:01:56 -0000 >> Hi, >> >> I'm seeing this in ubuntu 9.04 (kernel 2.6.28). It shows more or less >> the same figures we have in FBSD. > > Try older versions, 8.X perhaps. > Hi, I-m writing from a live ubuntu 8.04 right now. At work I have a Cisco Aironet 1200 (nice AP) and moving my dell latitude D630 laptop beside it shows the same figures. Signal quality of around 50 % in the best case. Here is what I get with direct view of the AP : Cell 02 - Address: 00:0E:D7:78:C3:60 ESSID:"eduroam-web" Mode:Master Channel:6 Frequency:2.437 GHz (Channel 6) Quality=50/100 Signal level=-58 dBm Encryption key:off Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 6 Mb/s; 9 Mb/s 11 Mb/s; 12 Mb/s; 18 Mb/s; 24 Mb/s; 36 Mb/s 48 Mb/s; 54 Mb/s Extra:tsf=000004116b6646b0 > Linux folks tends to break various things all the time ... Yes. That's why I don't like linux at all. > I dont belive that things are so much simple that changing only one bbp > all the time will fix signal sensitivity. > I do believe the same too. But I get lost because I'm not very used to wireless stuff. From owner-freebsd-net@FreeBSD.ORG Mon May 4 08:30:07 2009 Return-Path: Delivered-To: freebsd-net@hub.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 2675F106567A for ; Mon, 4 May 2009 08:30:07 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:4f8:fff6::28]) by mx1.freebsd.org (Postfix) with ESMTP id EE9EE8FC1B for ; Mon, 4 May 2009 08:30:06 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (gnats@localhost [127.0.0.1]) by freefall.freebsd.org (8.14.3/8.14.3) with ESMTP id n448U65p013838 for ; Mon, 4 May 2009 08:30:06 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.14.3/8.14.3/Submit) id n448U6uX013821; Mon, 4 May 2009 08:30:06 GMT (envelope-from gnats) Date: Mon, 4 May 2009 08:30:06 GMT Message-Id: <200905040830.n448U6uX013821@freefall.freebsd.org> To: freebsd-net@FreeBSD.org From: Oleg Bulyzhin Cc: Subject: kern/134157: [dummynet] dummynet loads cpu for 100% and make a system frozen and unstable [regression] X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: Oleg Bulyzhin List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 04 May 2009 08:30:07 -0000 The following reply was made to PR kern/134157; it has been noted by GNATS. From: Oleg Bulyzhin To: bug-followup@freebsd.org Cc: sid@ft.cv.ua Subject: kern/134157: [dummynet] dummynet loads cpu for 100% and make a system frozen and unstable [regression] Date: Mon, 4 May 2009 12:05:19 +0400 Please show sysctl net.inet.ip.dummynet output, your ipfw ruleset and pipe configs. -- Oleg. ================================================================ === Oleg Bulyzhin -- OBUL-RIPN -- OBUL-RIPE -- oleg@rinet.ru === ================================================================ From owner-freebsd-net@FreeBSD.ORG Mon May 4 11:07:58 2009 Return-Path: Delivered-To: freebsd-net@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id DC9AD106564A for ; Mon, 4 May 2009 11:07:58 +0000 (UTC) (envelope-from owner-bugmaster@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:4f8:fff6::28]) by mx1.freebsd.org (Postfix) with ESMTP id C89798FC14 for ; Mon, 4 May 2009 11:07:58 +0000 (UTC) (envelope-from owner-bugmaster@FreeBSD.org) Received: from freefall.freebsd.org (gnats@localhost [127.0.0.1]) by freefall.freebsd.org (8.14.3/8.14.3) with ESMTP id n44B7wYM098750 for ; Mon, 4 May 2009 11:07:58 GMT (envelope-from owner-bugmaster@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.14.3/8.14.3/Submit) id n44B7vav098727 for freebsd-net@FreeBSD.org; Mon, 4 May 2009 11:07:57 GMT (envelope-from owner-bugmaster@FreeBSD.org) Date: Mon, 4 May 2009 11:07:57 GMT Message-Id: <200905041107.n44B7vav098727@freefall.freebsd.org> X-Authentication-Warning: freefall.freebsd.org: gnats set sender to owner-bugmaster@FreeBSD.org using -f From: FreeBSD bugmaster To: freebsd-net@FreeBSD.org Cc: Subject: Current problem reports assigned to freebsd-net@FreeBSD.org X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 04 May 2009 11:07:59 -0000 Note: to view an individual PR, use: http://www.freebsd.org/cgi/query-pr.cgi?pr=(number). The following is a listing of current problems submitted by FreeBSD users. These represent problem reports covering all versions including experimental development code and obsolete releases. S Tracker Resp. Description -------------------------------------------------------------------------------- o kern/134168 net [ral] ral driver problem on RT2525 2.4GHz transceiver o kern/134157 net [dummynet] dummynet loads cpu for 100% and make a syst o kern/134079 net [em] "em0: Invalid MAC address" in FreeBSD-Current ( 8 o kern/133969 net [dummynet] [panic] Fatal trap 12: page fault while in o kern/133968 net [dummynet] [panic] dummynet kernel panic o kern/133902 net [tun] Killing tun0 iface ssh tunnel causes Panic Strin o kern/133736 net [udp] ip_id not protected ... o kern/133613 net [wpi] [panic] kernel panic in wpi(4) o kern/133595 net [panic] Kernel Panic at pcpu.h:195 o kern/133572 net [ppp] [hang] incoming PPTP connection hangs the system o kern/133490 net [bpf] [panic] 'kmem_map too small' panic on Dell r900 o kern/133328 net [bge] [panic] Kernel panics with Windows7 client o kern/133235 net [netinet] [patch] Process SIOCDLIFADDR command incorre o kern/133218 net [carp] [hang] use of carp(4) causes system to freeze o kern/133204 net [msk] msk driver timeouts o kern/133060 net [ipsec] [pfsync] [panic] Kernel panic with ipsec + pfs o kern/132991 net [bge] if_bge low performance problem o kern/132984 net [netgraph] swi1: net 100% cpu usage f bin/132911 net ip6fw(8): argument type of fill_icmptypes is wrong and o kern/132889 net [ndis] [panic] NDIS kernel crash on load BCM4321 AGN d o kern/132885 net [wlan] 802.1x broken after SVN rev 189592 o conf/132851 net [fib] [patch] allow to setup fib for service running f o kern/132832 net [netinet] [patch] tcp_output() might generate invalid o bin/132798 net [patch] ggatec(8): ggated/ggatec connection slowdown p o kern/132734 net [ifmib] [panic] panic in net/if_mib.c o kern/132722 net [ath] Wifi ath0 associates fine with AP, but DHCP or I o kern/132715 net [lagg] [panic] Panic when creating vlan's on lagg inte o kern/132705 net [libwrap] [patch] libwrap - infinite loop if hosts.all o kern/132672 net [ndis] [panic] ndis with rt2860.sys causes kernel pani o kern/132669 net [xl] 3c905-TX send DUP! in reply on ping (sometime) o kern/132625 net [iwn] iwn drivers don't support setting country o kern/132554 net [ipl] There is no ippool start script/ipfilter magic t o kern/132354 net [nat] Getting some packages to ipnat(8) causes crash o kern/132285 net [carp] alias gives incorrect hash in dmesg o kern/132277 net [crypto] [ipsec] poor performance using cryptodevice f o conf/132179 net [patch] /etc/network.subr: ipv6 rtsol on incorrect wla o kern/132107 net [carp] carp(4) advskew setting ignored when carp IP us o kern/131781 net [ndis] ndis keeps dropping the link o kern/131776 net [wi] driver fails to init o kern/131753 net [altq] [panic] kernel panic in hfsc_dequeue o bin/131567 net [socket] [patch] Update for regression/sockets/unix_cm o kern/131549 net ifconfig(8) can't clear 'monitor' mode on the wireless o kern/131536 net [netinet] [patch] kernel does allow manipulation of su o bin/131365 net route(8): route add changes interpretation of network o kern/131162 net [ath] Atheros driver bugginess and kernel crashes o kern/131153 net [iwi] iwi doesn't see a wireless network f kern/131087 net [ipw] [panic] ipw / iwi - no sent/received packets; iw f kern/130820 net [ndis] wpa_supplicant(8) returns 'no space on device' o kern/130628 net [nfs] NFS / rpc.lockd deadlock on 7.1-R o conf/130555 net [rc.d] [patch] No good way to set ipfilter variables a o kern/130525 net [ndis] [panic] 64 bit ar5008 ndisgen-erated driver cau o kern/130311 net [wlan_xauth] [panic] hostapd restart causing kernel pa o kern/130109 net [ipfw] Can not set fib for packets originated from loc f kern/130059 net [panic] Leaking 50k mbufs/hour o kern/129750 net [ath] Atheros AR5006 exits on "cannot map register spa f kern/129719 net [nfs] [panic] Panic during shutdown, tcp_ctloutput: in o kern/129580 net [ndis] Netgear WG311v3 (ndis) causes kenel trap at boo o kern/129517 net [ipsec] [panic] double fault / stack overflow o kern/129508 net [carp] [panic] Kernel panic with EtherIP (may be relat o kern/129352 net [xl] [patch] xl0 watchdog timeout o kern/129219 net [ppp] Kernel panic when using kernel mode ppp o kern/129197 net [panic] 7.0 IP stack related panic o kern/129135 net [vge] vge driver on a VIA mini-ITX not working o bin/128954 net ifconfig(8) deletes valid routes o kern/128917 net [wpi] [panic] if_wpi and wpa+tkip causing kernel panic o kern/128884 net [msk] if_msk page fault while in kernel mode o kern/128840 net [igb] page fault under load with igb/LRO o bin/128602 net [an] wpa_supplicant(8) crashes with an(4) o kern/128598 net [bluetooth] WARNING: attempt to net_add_domain(bluetoo o kern/128448 net [nfs] 6.4-RC1 Boot Fails if NFS Hostname cannot be res o conf/128334 net [request] use wpa_cli in the "WPA DHCP" situation o bin/128295 net [patch] ifconfig(8) does not print TOE4 or TOE6 capabi o bin/128001 net wpa_supplicant(8), wlan(4), and wi(4) issues o kern/127928 net [tcp] [patch] TCP bandwidth gets squeezed every time t o kern/127834 net [ixgbe] [patch] wrong error counting o kern/127826 net [iwi] iwi0 driver has reduced performance and connecti o kern/127815 net [gif] [patch] if_gif does not set vlan attributes from o kern/127724 net [rtalloc] rtfree: 0xc5a8f870 has 1 refs f bin/127719 net [arp] arp: Segmentation fault (core dumped) s kern/127587 net [bge] [request] if_bge(4) doesn't support BCM576X fami f kern/127528 net [icmp]: icmp socket receives icmp replies not owned by o bin/127192 net routed(8) removes the secondary alias IP of interface f kern/127145 net [wi]: prism (wi) driver crash at bigger traffic o kern/127102 net [wpi] Intel 3945ABG low throughput o kern/127057 net [udp] Unable to send UDP packet via IPv6 socket to IPv o kern/127050 net [carp] ipv6 does not work on carp interfaces [regressi o kern/126945 net [carp] CARP interface destruction with ifconfig destro o kern/126924 net [an] [patch] printf -> device_printf and simplify prob o kern/126895 net [patch] [ral] Add antenna selection (marked as TBD) o kern/126874 net [vlan]: Zebra problem if ifconfig vlanX destroy o bin/126822 net wpa_supplicant(8): WPA PSK does not work in adhoc mode o kern/126714 net [carp] CARP interface renaming makes system no longer o kern/126695 net rtfree messages and network disruption upon use of if_ o kern/126688 net [ixgbe] [patch] 1.4.7 ixgbe driver panic with 4GB and o kern/126475 net [ath] [panic] ath pcmcia card inevitably panics under o kern/126339 net [ipw] ipw driver drops the connection o kern/126214 net [ath] txpower problem with Atheros wifi card o kern/126075 net [inet] [patch] internet control accesses beyond end of o bin/125922 net [patch] Deadlock in arp(8) o kern/125920 net [arp] Kernel Routing Table loses Ethernet Link status o kern/125845 net [netinet] [patch] tcp_lro_rx() should make use of hard o kern/125816 net [carp] [if_bridge] carp stuck in init when using bridg f kern/125502 net [ral] ifconfig ral0 scan produces no output unless in o kern/125258 net [socket] socket's SO_REUSEADDR option does not work o kern/125239 net [gre] kernel crash when using gre o kern/125195 net [fxp] fxp(4) driver failed to initialize device Intel o kern/124904 net [fxp] EEPROM corruption with Compaq NC3163 NIC o kern/124767 net [iwi] Wireless connection using iwi0 driver (Intel 220 o kern/124753 net [ieee80211] net80211 discards power-save queue packets o kern/124341 net [ral] promiscuous mode for wireless device ral0 looses o kern/124160 net [libc] connect(2) function loops indefinitely o kern/124127 net [msk] watchdog timeout (missed Tx interrupts) -- recov o kern/124021 net [ip6] [panic] page fault in nd6_output() o kern/123968 net [rum] [panic] rum driver causes kernel panic with WPA. p kern/123961 net [vr] [patch] Allow vr interface to handle vlans o kern/123892 net [tap] [patch] No buffer space available o kern/123890 net [ppp] [panic] crash & reboot on work with PPP low-spee o kern/123858 net [stf] [patch] stf not usable behind a NAT o kern/123796 net [ipf] FreeBSD 6.1+VPN+ipnat+ipf: port mapping does not o bin/123633 net ifconfig(8) doesn't set inet and ether address in one f kern/123617 net [tcp] breaking connection when client downloading file o kern/123603 net [tcp] tcp_do_segment and Received duplicate SYN o kern/123559 net [iwi] iwi periodically disassociates/associates [regre o bin/123465 net [ip6] route(8): route add -inet6 -interfac o kern/123463 net [ipsec] [panic] repeatable crash related to ipsec-tool o kern/123429 net [nfe] [hang] "ifconfig nfe up" causes a hard system lo o kern/123347 net [bge] bge1: watchdog timeout -- linkstate changed to D o conf/123330 net [nsswitch.conf] Enabling samba wins in nsswitch.conf c o kern/123256 net [wpi] panic: blockable sleep lock with wpi(4) f kern/123172 net [bce] Watchdog timeout problems with if_bce o kern/123160 net [ip] Panic and reboot at sysctl kern.polling.enable=0 o kern/122989 net [swi] [panic] 6.3 kernel panic in swi1: net o kern/122954 net [lagg] IPv6 EUI64 incorrectly chosen for lagg devices o kern/122928 net [em] interface watchdog timeouts and stops receiving p f kern/122839 net [multicast] FreeBSD 7 multicast routing problem p kern/122794 net [lagg] Kernel panic after brings lagg(8) up if NICs ar o kern/122780 net [lagg] tcpdump on lagg interface during high pps wedge o kern/122772 net [em] em0 taskq panic, tcp reassembly bug causes radix o kern/122743 net [mbuf] [panic] vm_page_unwire: invalid wire count: 0 o kern/122697 net [ath] Atheros card is not well supported o kern/122685 net It is not visible passing packets in tcpdump(1) o kern/122551 net [bge] Broadcom 5715S no carrier on HP BL460c blade usi o kern/122319 net [wi] imposible to enable ad-hoc demo mode with Orinoco o kern/122290 net [netgraph] [panic] Netgraph related "kmem_map too smal f kern/122252 net [ipmi] [bge] IPMI problem with BCM5704 (does not work o kern/122195 net [ed] Alignment problems in if_ed o kern/122058 net [em] [panic] Panic on em1: taskq o kern/122033 net [ral] [lor] Lock order reversal in ral0 at bootup [reg o kern/121983 net [fxp] fxp0 MBUF and PAE o bin/121895 net [patch] rtsol(8)/rtsold(8) doesn't handle managed netw o kern/121872 net [wpi] driver fails to attach on a fujitsu-siemens s711 s kern/121774 net [swi] [panic] 6.3 kernel panic in swi1: net o kern/121706 net [netinet] [patch] "rtfree: 0xc4383870 has 1 refs" emit o kern/121624 net [em] [regression] Intel em WOL fails after upgrade to o kern/121555 net [panic] Fatal trap 12: current process = 12 (swi1: net o kern/121443 net [gif] [lor] icmp6_input/nd6_lookup o kern/121437 net [vlan] Routing to layer-2 address does not work on VLA o bin/121359 net [patch] ppp(8): fix local stack overflow in ppp o kern/121298 net [em] [panic] Fatal trap 12: page fault while in kernel o kern/121257 net [tcp] TSO + natd -> slow outgoing tcp traffic o kern/121181 net [panic] Fatal trap 3: breakpoint instruction fault whi o kern/121080 net [bge] IPv6 NUD problem on multi address config on bge0 o kern/120966 net [rum] kernel panic with if_rum and WPA encryption p docs/120945 net [patch] ip6(4) man page lacks documentation for TCLASS o kern/120566 net [request]: ifconfig(8) make order of arguments more fr o kern/120304 net [netgraph] [patch] netgraph source assumes 32-bit time o kern/120266 net [udp] [panic] gnugk causes kernel panic when closing U o kern/120232 net [nfe] [patch] Bring in nfe(4) to RELENG_6 o kern/120130 net [carp] [panic] carp causes kernel panics in any conste o bin/120060 net routed(8) deletes link-level routes in the presence of o kern/119945 net [rum] [panic] rum device in hostap mode, cause kernel o kern/119791 net [nfs] UDP NFS mount of aliased IP addresses from a Sol o kern/119617 net [nfs] nfs error on wpa network when reseting/shutdown f kern/119516 net [ip6] [panic] _mtx_lock_sleep: recursed on non-recursi o kern/119432 net [arp] route add -host -iface causes arp e o kern/119225 net [wi] 7.0-RC1 no carrier with Prism 2.5 wifi card [regr a bin/118987 net ifconfig(8): ifconfig -l (address_family) does not wor o sparc/118932 net [panic] 7.0-BETA4/sparc-64 kernel panic in rip_output a kern/118879 net [bge] [patch] bge has checksum problems on the 5703 ch o kern/118727 net [netgraph] [patch] [request] add new ng_pf module s kern/117717 net [panic] Kernel panic with Bittorrent client. o kern/117448 net [carp] 6.2 kernel crash [regression] o kern/117423 net [vlan] Duplicate IP on different interfaces o bin/117339 net [patch] route(8): loading routing management commands o kern/117271 net [tap] OpenVPN TAP uses 99% CPU on releng_6 when if_tap o kern/117043 net [em] Intel PWLA8492MT Dual-Port Network adapter EEPROM o kern/116837 net [tun] [panic] [patch] ifconfig tunX destroy: panic o kern/116747 net [ndis] FreeBSD 7.0-CURRENT crash with Dell TrueMobile o bin/116643 net [patch] [request] fstat(1): add INET/INET6 socket deta o kern/116328 net [bge]: Solid hang with bge interface o kern/116185 net [iwi] if_iwi driver leads system to reboot o kern/115239 net [ipnat] panic with 'kmem_map too small' using ipnat o kern/115019 net [netgraph] ng_ether upper hook packet flow stops on ad o kern/115002 net [wi] if_wi timeout. failed allocation (busy bit). ifco o kern/114915 net [patch] [pcn] pcn (sys/pci/if_pcn.c) ethernet driver f o kern/114839 net [fxp] fxp looses ability to speak with traffic o kern/113895 net [xl] xl0 fails on 6.2-RELEASE but worked fine on 5.5-R o kern/112722 net [ipsec] [udp] IP v4 udp fragmented packet reject o kern/112686 net [patm] patm driver freezes System (FreeBSD 6.2-p4) i38 o kern/112570 net [bge] packet loss with bge driver on BCM5704 chipset o bin/112557 net [patch] ppp(8) lock file should not use symlink name o kern/112528 net [nfs] NFS over TCP under load hangs with "impossible p o kern/111457 net [ral] ral(4) freeze o kern/110140 net [ipw] ipw fails under load o kern/109733 net [bge] bge link state issues [regression] o kern/109470 net [wi] Orinoco Classic Gold PC Card Can't Channel Hop o kern/109308 net [pppd] [panic] Multiple panics kernel ppp suspected [r o kern/109251 net [re] [patch] if_re cardbus card won't attach o bin/108895 net pppd(8): PPPoE dead connections on 6.2 [regression] o kern/108542 net [bce] Huge network latencies with 6.2-RELEASE / STABLE o kern/107944 net [wi] [patch] Forget to unlock mutex-locks o kern/107850 net [bce] bce driver link negotiation is faulty o conf/107035 net [patch] bridge(8): bridge interface given in rc.conf n o kern/106438 net [ipf] ipfilter: keep state does not seem to allow repl o kern/106316 net [dummynet] dummynet with multipass ipfw drops packets o kern/106243 net [nve] double fault panic in if_nve.c on high loads o kern/105945 net Address can disappear from network interface s kern/105943 net Network stack may modify read-only mbuf chain copies o bin/105925 net problems with ifconfig(8) and vlan(4) [regression] o kern/105348 net [ath] ath device stopps TX o kern/104851 net [inet6] [patch] On link routes not configured when usi o kern/104751 net [netgraph] kernel panic, when getting info about my tr o kern/104485 net [bge] Broadcom BCM5704C: Intermittent on newer chip ve o kern/103191 net Unpredictable reboot o kern/103135 net [ipsec] ipsec with ipfw divert (not NAT) encodes a pac o conf/102502 net [netgraph] [patch] ifconfig name does't rename netgrap o kern/102035 net [plip] plip networking disables parallel port printing o kern/101948 net [ipf] [panic] Kernel Panic Trap No 12 Page Fault - cau o kern/100709 net [libc] getaddrinfo(3) should return TTL info o kern/100519 net [netisr] suggestion to fix suboptimal network polling o kern/98978 net [ipf] [patch] ipfilter drops OOW packets under 6.1-Rel o kern/98597 net [inet6] Bug in FreeBSD 6.1 IPv6 link-local DAD procedu o bin/98218 net wpa_supplicant(8) blacklist not working f bin/97392 net ppp(8) hangs instead terminating o kern/97306 net [netgraph] NG_L2TP locks after connection with failed f kern/96268 net [socket] TCP socket performance drops by 3000% if pack o kern/96030 net [bfe] [patch] Install hangs with Broadcomm 440x NIC in o kern/95519 net [ral] ral0 could not map mbuf o kern/95288 net [pppd] [tty] [panic] if_ppp panic in sys/kern/tty_subr o kern/95277 net [netinet] [patch] IP Encapsulation mask_match() return o kern/95267 net packet drops periodically appear s kern/94863 net [bge] [patch] hack to get bge(4) working on IBM e326m o kern/94162 net [bge] 6.x kenel stale with bge(4) o kern/93886 net [ath] Atheros/D-Link DWL-G650 long delay to associate f kern/93378 net [tcp] Slow data transfer in Postfix and Cyrus IMAP (wo o kern/93019 net [ppp] ppp and tunX problems: no traffic after restarti o kern/92880 net [libc] [patch] almost rewritten inet_network(3) functi f kern/92552 net A serious bug in most network drivers from 5.X to 6.X s kern/92279 net [dc] Core faults everytime I reboot, possible NIC issu o kern/92090 net [bge] bge0: watchdog timeout -- resetting o kern/91859 net [ndis] if_ndis does not work with Asus WL-138 s kern/91777 net [ipf] [patch] wrong behaviour with skip rule inside an o kern/91594 net [em] FreeBSD > 5.4 w/ACPI fails to detect Intel Pro/10 o kern/91364 net [ral] [wep] WF-511 RT2500 Card PCI and WEP o kern/91311 net [aue] aue interface hanging o kern/90890 net [vr] Problems with network: vr0: tx shutdown timeout s kern/90086 net [hang] 5.4p8 on supermicro P8SCT hangs during boot if f kern/88082 net [ath] [panic] cts protection for ath0 causes panic o kern/87521 net [ipf] [panic] using ipfilter "auth" keyword leads to k o kern/87506 net [vr] [patch] Fix alias support on vr interfaces o kern/87194 net [fxp] fxp(4) promiscuous mode seems to corrupt hw-csum s kern/86920 net [ndis] ifconfig: SIOCS80211: Invalid argument [regress o kern/86103 net [ipf] Illegal NAT Traversal in IPFilter o kern/85780 net 'panic: bogus refcnt 0' in routing/ipv6 o bin/85445 net ifconfig(8): deprecated keyword to ifconfig inoperativ o kern/85266 net [xe] [patch] xe(4) driver does not recognise Xircom XE o kern/84202 net [ed] [patch] Holtek HT80232 PCI NIC recognition on Fre o bin/82975 net route change does not parse classfull network as given o kern/82497 net [vge] vge(4) on AMD64 only works when loaded late, not f kern/81644 net [vge] vge(4) does not work properly when loaded as a K s kern/81147 net [net] [patch] em0 reinitialization while adding aliase o kern/80853 net [ed] [patch] add support for Compex RL2000/ISA in PnP o kern/79895 net [ipf] 5.4-RC2 breaks ipfilter NAT when using netgraph f kern/79262 net [dc] Adaptec ANA-6922 not fully supported o bin/79228 net [patch] extend arp(8) to be able to create blackhole r o kern/78090 net [ipf] ipf filtering on bridged packets doesn't work if p kern/77913 net [wi] [patch] Add the APDL-325 WLAN pccard to wi(4) o kern/77341 net [ip6] problems with IPV6 implementation o kern/77273 net [ipf] ipfilter breaks ipv6 statefull filtering on 5.3 s kern/77195 net [ipf] [patch] ipfilter ioctl SIOCGNATL does not match o kern/75873 net Usability problem with non-RFC-compliant IP spoof prot s kern/75407 net [an] an(4): no carrier after short time f kern/73538 net [bge] problem with the Broadcom BCM5788 Gigabit Ethern o kern/71469 net default route to internet magically disappears with mu o kern/70904 net [ipf] ipfilter ipnat problem with h323 proxy support o kern/64556 net [sis] if_sis short cable fix problems with NetGear FA3 s kern/60293 net [patch] FreeBSD arp poison patch o kern/54383 net [nfs] [patch] NFS root configurations without dynamic f i386/45773 net [bge] Softboot causes autoconf failure on Broadcom 570 s bin/41647 net ifconfig(8) doesn't accept lladdr along with inet addr s kern/39937 net ipstealth issue a kern/38554 net [patch] changing interface ipaddress doesn't seem to w o kern/35442 net [sis] [patch] Problem transmitting runts in if_sis dri o kern/34665 net [ipf] [hang] ipfilter rcmd proxy "hangs". o kern/31647 net [libc] socket calls can return undocumented EINVAL o kern/30186 net [libc] getaddrinfo(3) does not handle incorrect servna o kern/27474 net [ipf] [ppp] Interactive use of user PPP and ipfilter c o conf/23063 net [arp] [patch] for static ARP tables in rc.network 298 problems total. From owner-freebsd-net@FreeBSD.ORG Mon May 4 11:10:46 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 8DAF210656EC for ; Mon, 4 May 2009 11:10:46 +0000 (UTC) (envelope-from antonio.tommasi@unile.it) Received: from ilenic.unile.it (ilenic.unile.it [212.189.128.34]) by mx1.freebsd.org (Postfix) with ESMTP id 4058B8FC17 for ; Mon, 4 May 2009 11:10:46 +0000 (UTC) (envelope-from antonio.tommasi@unile.it) Received: from localhost (localhost [127.0.0.1]) by ilenic.unile.it (Postfix) with ESMTP id 10EE5B52395 for ; Mon, 4 May 2009 12:51:00 +0200 (CEST) Received: from ilenic.unile.it ([127.0.0.1]) by localhost (ilenic.unile.it [127.0.0.1]) (virus/spam checker, port 10024) with ESMTP id mGuke7iDvZy6 for ; Mon, 4 May 2009 12:50:59 +0200 (CEST) Received: from titto.unile.it (titto.unile.it [212.189.128.38]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ilenic.unile.it (Postfix) with ESMTPSA id 89B53B52091 for ; Mon, 4 May 2009 12:50:59 +0200 (CEST) Message-ID: <49FEC893.8030305@unile.it> Date: Mon, 04 May 2009 12:50:59 +0200 From: Antonio Tommasi User-Agent: Thunderbird 2.0.0.21 (Macintosh/20090302) MIME-Version: 1.0 To: freebsd-net@freebsd.org References: <49FA2E3F.9050108@entel.upc.edu> <3a142e750905010655i5e56282eu240e13f2a03dfb02@mail.gmail.com> <49FB55A3.605@entel.upc.edu> <3a142e750905011716g39ea55f0kd081bfdd55709b37@mail.gmail.com> <49FBF9B5.40800@entel.upc.edu> <3a142e750905020617y40f62463ma91b46a015b2b2ab@mail.gmail.com> <49FD61DD.7070903@entel.upc.edu> <3a142e750905030535v4cfe0103r1d8a17e828f6da9b@mail.gmail.com> <57348.147.83.40.234.1241416909.squirrel@webmail.entel.upc.edu> In-Reply-To: <57348.147.83.40.234.1241416909.squirrel@webmail.entel.upc.edu> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Subject: Filesystem and bigger files X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 04 May 2009 11:10:49 -0000 Hi to all, i've freebsd 7.0 in production and i've this hard-drive Filesystem Size Used Avail Capacity Mounted on /dev/aacd0s1a 64G 15G 44G 26% / In a directory (spamassassin) i've one file (auto-whitelist) with dimension 4.0 TB and one file (bayes_learn) with dimension 1.0TB How is it possible? How this file are managed? thanks Antonio From owner-freebsd-net@FreeBSD.ORG Mon May 4 13:10:46 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 9E05D1065677; Mon, 4 May 2009 13:10:46 +0000 (UTC) (envelope-from rea-fbsd@codelabs.ru) Received: from 0.mx.codelabs.ru (0.mx.codelabs.ru [144.206.177.45]) by mx1.freebsd.org (Postfix) with ESMTP id 46E1F8FC1F; Mon, 4 May 2009 13:10:46 +0000 (UTC) (envelope-from rea-fbsd@codelabs.ru) DomainKey-Signature: a=rsa-sha1; q=dns; c=simple; s=one; d=codelabs.ru; h=Received:Date:From:To:Cc:Subject:Message-ID:Reply-To:References:MIME-Version:Content-Type:Content-Disposition:Content-Transfer-Encoding:In-Reply-To:Sender; b=PE9JDDEuZar2mk6ngoJRX/I30Cwdoriez4YcR2oDWP5GaR/0ghl+NhxymH5ZUmOHN1cFNnFZiv9aReX+R8IBDVBpoO8igx/M27+x1DsHTrs9SaDZ1Ki+KpMGE1Z7aww+XuddSpXcPZXP9PHFfLn4r+p5VhlrOhGBi4O8heundKE=; Received: from amnesiac.at.no.dns (ppp85-141-64-167.pppoe.mtu-net.ru [85.141.64.167]) by 0.mx.codelabs.ru with esmtpsa (TLSv1:AES256-SHA:256) id 1M0xmc-00087u-F3; Mon, 04 May 2009 17:00:34 +0400 Date: Mon, 4 May 2009 17:00:32 +0400 From: Eygene Ryabinkin To: Antonio Tommasi Message-ID: References: <49FA2E3F.9050108@entel.upc.edu> <3a142e750905010655i5e56282eu240e13f2a03dfb02@mail.gmail.com> <49FB55A3.605@entel.upc.edu> <3a142e750905011716g39ea55f0kd081bfdd55709b37@mail.gmail.com> <49FBF9B5.40800@entel.upc.edu> <3a142e750905020617y40f62463ma91b46a015b2b2ab@mail.gmail.com> <49FD61DD.7070903@entel.upc.edu> <3a142e750905030535v4cfe0103r1d8a17e828f6da9b@mail.gmail.com> <57348.147.83.40.234.1241416909.squirrel@webmail.entel.upc.edu> <49FEC893.8030305@unile.it> MIME-Version: 1.0 Content-Type: text/plain; charset=koi8-r Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <49FEC893.8030305@unile.it> Sender: rea-fbsd@codelabs.ru X-Mailman-Approved-At: Mon, 04 May 2009 13:20:36 +0000 Cc: freebsd-questions@freebsd.org Subject: Re: Filesystem and bigger files X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: rea-fbsd@codelabs.ru List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 04 May 2009 13:10:47 -0000 Antonio, good day. Mon, May 04, 2009 at 12:50:59PM +0200, Antonio Tommasi wrote: > i've freebsd 7.0 in production and i've this hard-drive > > Filesystem Size Used Avail Capacity Mounted on > /dev/aacd0s1a 64G 15G 44G 26% / > > In a directory (spamassassin) i've one file (auto-whitelist) with > dimension 4.0 TB and one file (bayes_learn) with dimension 1.0TB > > How is it possible? How this file are managed? First, this isn't a proper question for the freebsd-net mailing list, so I am redirecting it to freebsd-questions. To answer your question: most likely, your filesystem is damaged and should be fsck'ed. Reboot in a single-user mode and run 'fsck -p /dev/aacd0s1a' on your filesystem. If it will correct the things -- it's good. If not, run 'fsck /dev/aacd0s1a'. It is always good to have backups ;)) And the possible filesystem corruption is one of the reasons why people prefer multiple partitions on the system, rather then having one big and fat '/' partition. Another possibility is that these files are sparse: they have "holes" that aren't yet filled in. Tb sizes are insane, but may be you directed SA to do it. Here is the illustration of sparse file creation and its impact on the filesystem size: ----- Filesystem 1K-blocks Used Avail Capacity Mounted on /dev/ad4s2f 24808094 14819988 8003460 65% /0 $ dd if=/dev/zero of=test.bin bs=1K count=1 seek=10M 1+0 records in 1+0 records out 1024 bytes transferred in 0.000049 secs (20951060 bytes/sec) $ ls -l test.bin -rw-r--r-- 1 usr usr 10737419264 4 16:54 test.bin $ df . Filesystem 1K-blocks Used Avail Capacity Mounted on /dev/ad4s2f 24808094 14820046 8003402 65% /0 ----- -- Eygene _ ___ _.--. # \`.|\..----...-'` `-._.-'_.-'` # Remember that it is hard / ' ` , __.--' # to read the on-line manual )/' _/ \ `-_, / # while single-stepping the kernel. `-'" `"\_ ,_.-;_.-\_ ', fsc/as # _.-'_./ {_.' ; / # -- FreeBSD Developers handbook {_.-``-' {_/ # From owner-freebsd-net@FreeBSD.ORG Mon May 4 14:30:03 2009 Return-Path: Delivered-To: freebsd-net@hub.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id AD1011065680 for ; Mon, 4 May 2009 14:30:03 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:4f8:fff6::28]) by mx1.freebsd.org (Postfix) with ESMTP id 975AC8FC0A for ; Mon, 4 May 2009 14:30:03 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (gnats@localhost [127.0.0.1]) by freefall.freebsd.org (8.14.3/8.14.3) with ESMTP id n44EU3SL074234 for ; Mon, 4 May 2009 14:30:03 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.14.3/8.14.3/Submit) id n44EU3B2074229; Mon, 4 May 2009 14:30:03 GMT (envelope-from gnats) Date: Mon, 4 May 2009 14:30:03 GMT Message-Id: <200905041430.n44EU3B2074229@freefall.freebsd.org> To: freebsd-net@FreeBSD.org From: Andrey Golenischev Cc: Subject: Re: kern/134157: [dummynet] dummynet loads cpu for 100% and make a system frozen and unstable [regression] X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: Andrey Golenischev List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 04 May 2009 14:30:03 -0000 The following reply was made to PR kern/134157; it has been noted by GNATS. From: Andrey Golenischev To: Oleg Bulyzhin Cc: bug-followup@freebsd.org Subject: Re: kern/134157: [dummynet] dummynet loads cpu for 100% and make a system frozen and unstable [regression] Date: Mon, 4 May 2009 17:01:30 +0300 --0016364c758e62805c04691699de Content-Type: text/plain; charset=KOI8-R Content-Transfer-Encoding: quoted-printable net.inet.ip.dummynet.debug: 0 net.inet.ip.dummynet.pipe_byte_limit: 1048576 net.inet.ip.dummynet.pipe_slot_limit: 100 net.inet.ip.dummynet.io_pkt_drop: 138100 net.inet.ip.dummynet.io_pkt_fast: 327270 net.inet.ip.dummynet.io_pkt: 19438906 net.inet.ip.dummynet.io_fast: 0 net.inet.ip.dummynet.tick_lost: 0 net.inet.ip.dummynet.tick_diff: 21083 net.inet.ip.dummynet.tick_adjustment: 13986 net.inet.ip.dummynet.tick_delta_sum: 148 net.inet.ip.dummynet.tick_delta: 1 net.inet.ip.dummynet.red_max_pkt_size: 1500 net.inet.ip.dummynet.red_avg_pkt_size: 512 net.inet.ip.dummynet.red_lookup_depth: 256 net.inet.ip.dummynet.max_chain_len: 1024 net.inet.ip.dummynet.expire: 1 net.inet.ip.dummynet.search_steps: 0 net.inet.ip.dummynet.searches: 0 net.inet.ip.dummynet.extract_heap: 0 net.inet.ip.dummynet.ready_heap: 64 net.inet.ip.dummynet.curr_time: 3873537 net.inet.ip.dummynet.hash_size: 64 00010 pipe 1 ip from any to 10.3.1.6 out 00011 pipe 2 ip from 10.3.1.6 to any in 03008 pipe 3008 ip from any to any via ng4 in 03009 pipe 3009 ip from any to any via ng4 out 03020 pipe 3020 ip from any to any via ng10 in 03021 pipe 3021 ip from any to any via ng10 out 03030 pipe 3030 ip from any to any via ng15 in 03031 pipe 3031 ip from any to any via ng15 out 03032 pipe 3032 ip from any to any via ng16 in 03033 pipe 3033 ip from any to any via ng16 out 03034 pipe 3034 ip from any to any via ng17 in 03035 pipe 3035 ip from any to any via ng17 out 03036 pipe 3036 ip from any to any via ng18 in 03037 pipe 3037 ip from any to any via ng18 out 03038 pipe 3038 ip from any to any via ng19 in 03039 pipe 3039 ip from any to any via ng19 out 03040 pipe 3040 ip from any to any via ng20 in 03041 pipe 3041 ip from any to any via ng20 out 03042 pipe 3042 ip from any to any via ng21 in 03043 pipe 3043 ip from any to any via ng21 out 03044 pipe 3044 ip from any to any via ng22 in 03045 pipe 3045 ip from any to any via ng22 out 03046 pipe 3046 ip from any to any via ng23 in 03047 pipe 3047 ip from any to any via ng23 out 03048 pipe 3048 ip from any to any via ng24 in 03049 pipe 3049 ip from any to any via ng24 out 03050 pipe 3050 ip from any to any via ng25 in 03051 pipe 3051 ip from any to any via ng25 out 03052 pipe 3052 ip from any to any via ng26 in 03053 pipe 3053 ip from any to any via ng26 out 03054 pipe 3054 ip from any to any via ng27 in 03055 pipe 3055 ip from any to any via ng27 out 03056 pipe 3056 ip from any to any via ng28 in 03057 pipe 3057 ip from any to any via ng28 out 03058 pipe 3058 ip from any to any via ng29 in 03059 pipe 3059 ip from any to any via ng29 out 03060 pipe 3060 ip from any to any via ng30 in 03061 pipe 3061 ip from any to any via ng30 out 03062 pipe 3062 ip from any to any via ng31 in 03063 pipe 3063 ip from any to any via ng31 out 03064 pipe 3064 ip from any to any via ng32 in 03065 pipe 3065 ip from any to any via ng32 out 03066 pipe 3066 ip from any to any via ng33 in 03067 pipe 3067 ip from any to any via ng33 out 03068 pipe 3068 ip from any to any via ng34 in 03069 pipe 3069 ip from any to any via ng34 out 03070 pipe 3070 ip from any to any via ng35 in 03071 pipe 3071 ip from any to any via ng35 out 03072 pipe 3072 ip from any to any via ng36 in 03073 pipe 3073 ip from any to any via ng36 out 03074 pipe 3074 ip from any to any via ng37 in 03075 pipe 3075 ip from any to any via ng37 out 03078 pipe 3078 ip from any to any via ng39 in 03079 pipe 3079 ip from any to any via ng39 out 03080 pipe 3080 ip from any to any via ng40 in 03081 pipe 3081 ip from any to any via ng40 out 03082 pipe 3082 ip from any to any via ng41 in 03083 pipe 3083 ip from any to any via ng41 out 03084 pipe 3084 ip from any to any via ng42 in 03085 pipe 3085 ip from any to any via ng42 out 03086 pipe 3086 ip from any to any via ng43 in 03087 pipe 3087 ip from any to any via ng43 out 03088 pipe 3088 ip from any to any via ng44 in 03089 pipe 3089 ip from any to any via ng44 out 03090 pipe 3090 ip from any to any via ng45 in 03091 pipe 3091 ip from any to any via ng45 out 03092 pipe 3092 ip from any to any via ng46 in 03093 pipe 3093 ip from any to any via ng46 out 03094 pipe 3094 ip from any to any via ng47 in 03095 pipe 3095 ip from any to any via ng47 out 03096 pipe 3096 ip from any to any via ng48 in 03097 pipe 3097 ip from any to any via ng48 out 03098 pipe 3098 ip from any to any via ng49 in 03099 pipe 3099 ip from any to any via ng49 out 03100 pipe 3100 ip from any to any via ng50 in 03101 pipe 3101 ip from any to any via ng50 out 03102 pipe 3102 ip from any to any via ng51 in 03103 pipe 3103 ip from any to any via ng51 out 03104 pipe 3104 ip from any to any via ng52 in 03105 pipe 3105 ip from any to any via ng52 out 03106 pipe 3106 ip from any to any via ng53 in 03107 pipe 3107 ip from any to any via ng53 out 03108 pipe 3108 ip from any to any via ng54 in 03109 pipe 3109 ip from any to any via ng54 out 03110 pipe 3110 ip from any to any via ng55 in 03111 pipe 3111 ip from any to any via ng55 out 03112 pipe 3112 ip from any to any via ng56 in 03113 pipe 3113 ip from any to any via ng56 out 03114 pipe 3114 ip from any to any via ng57 in 03115 pipe 3115 ip from any to any via ng57 out 03118 pipe 3118 ip from any to any via ng59 in 03119 pipe 3119 ip from any to any via ng59 out 03120 pipe 3120 ip from any to any via ng60 in 03121 pipe 3121 ip from any to any via ng60 out 03122 pipe 3122 ip from any to any via ng61 in 03123 pipe 3123 ip from any to any via ng61 out 03124 pipe 3124 ip from any to any via ng62 in 03125 pipe 3125 ip from any to any via ng62 out 03126 pipe 3126 ip from any to any via ng63 in 03127 pipe 3127 ip from any to any via ng63 out 03128 pipe 3128 ip from any to any via ng64 in 03129 pipe 3129 ip from any to any via ng64 out 03130 pipe 3130 ip from any to any via ng65 in 03131 pipe 3131 ip from any to any via ng65 out 03134 pipe 3134 ip from any to any via ng67 in 03135 pipe 3135 ip from any to any via ng67 out 03136 pipe 3136 ip from any to any via ng68 in 03137 pipe 3137 ip from any to any via ng68 out 03138 pipe 3138 ip from any to any via ng69 in 03139 pipe 3139 ip from any to any via ng69 out 03140 pipe 3140 ip from any to any via ng70 in 03141 pipe 3141 ip from any to any via ng70 out 03142 pipe 3142 ip from any to any via ng71 in 03143 pipe 3143 ip from any to any via ng71 out 03144 pipe 3144 ip from any to any via ng72 in 03145 pipe 3145 ip from any to any via ng72 out 03146 pipe 3146 ip from any to any via ng73 in 03147 pipe 3147 ip from any to any via ng73 out 03148 pipe 3148 ip from any to any via ng74 in 03149 pipe 3149 ip from any to any via ng74 out 03150 pipe 3150 ip from any to any via ng75 in 03151 pipe 3151 ip from any to any via ng75 out 03152 pipe 3152 ip from any to any via ng76 in 03153 pipe 3153 ip from any to any via ng76 out 03154 pipe 3154 ip from any to any via ng77 in 03155 pipe 3155 ip from any to any via ng77 out 03156 pipe 3156 ip from any to any via ng78 in 03157 pipe 3157 ip from any to any via ng78 out 03158 pipe 3158 ip from any to any via ng79 in 03159 pipe 3159 ip from any to any via ng79 out 03162 pipe 3162 ip from any to any via ng81 in 03163 pipe 3163 ip from any to any via ng81 out 03600 pipe 3600 ip from any to any via ng300 in 03601 pipe 3601 ip from any to any via ng300 out 03604 pipe 3604 ip from any to any via ng302 in 03605 pipe 3605 ip from any to any via ng302 out 03606 pipe 3606 ip from any to any via ng303 in 03607 pipe 3607 ip from any to any via ng303 out 03610 pipe 3610 ip from any to any via ng305 in 03611 pipe 3611 ip from any to any via ng305 out 03612 pipe 3612 ip from any to any via ng306 in 03613 pipe 3613 ip from any to any via ng306 out 03614 pipe 3614 ip from any to any via ng307 in 03615 pipe 3615 ip from any to any via ng307 out 03628 pipe 3628 ip from any to any via ng314 in 03629 pipe 3629 ip from any to any via ng314 out 03630 pipe 3630 ip from any to any via ng315 in 03631 pipe 3631 ip from any to any via ng315 out 03632 pipe 3632 ip from any to any via ng316 in 03633 pipe 3633 ip from any to any via ng316 out 03634 pipe 3634 ip from any to any via ng317 in 03635 pipe 3635 ip from any to any via ng317 out 03636 pipe 3636 ip from any to any via ng318 in 03637 pipe 3637 ip from any to any via ng318 out 04000 pipe 4000 ip from any to any via ng500 in 04001 pipe 4001 ip from any to any via ng500 out 04002 pipe 4002 ip from any to any via ng501 in 04003 pipe 4003 ip from any to any via ng501 out 04004 pipe 4004 ip from any to any via ng502 in 04005 pipe 4005 ip from any to any via ng502 out 04006 pipe 4006 ip from any to any via ng503 in 04007 pipe 4007 ip from any to any via ng503 out 04008 pipe 4008 ip from any to any via ng504 in 04009 pipe 4009 ip from any to any via ng504 out 04010 pipe 4010 ip from any to any via ng505 in 04011 pipe 4011 ip from any to any via ng505 out 04012 pipe 4012 ip from any to any via ng506 in 04013 pipe 4013 ip from any to any via ng506 out 04014 pipe 4014 ip from any to any via ng507 in 04015 pipe 4015 ip from any to any via ng507 out 04016 pipe 4016 ip from any to any via ng508 in 04017 pipe 4017 ip from any to any via ng508 out 04018 pipe 4018 ip from any to any via ng509 in 04019 pipe 4019 ip from any to any via ng509 out 04020 pipe 4020 ip from any to any via ng510 in 04021 pipe 4021 ip from any to any via ng510 out 04022 pipe 4022 ip from any to any via ng511 in 04023 pipe 4023 ip from any to any via ng511 out 04024 pipe 4024 ip from any to any via ng512 in 04025 pipe 4025 ip from any to any via ng512 out 04026 pipe 4026 ip from any to any via ng513 in 04027 pipe 4027 ip from any to any via ng513 out 04028 pipe 4028 ip from any to any via ng514 in 04029 pipe 4029 ip from any to any via ng514 out 04400 pipe 4400 ip from any to any via ng700 in 04401 pipe 4401 ip from any to any via ng700 out 04402 pipe 4402 ip from any to any via ng701 in 04403 pipe 4403 ip from any to any via ng701 out 04404 pipe 4404 ip from any to any via ng702 in 04405 pipe 4405 ip from any to any via ng702 out 04406 pipe 4406 ip from any to any via ng703 in 04407 pipe 4407 ip from any to any via ng703 out 04408 pipe 4408 ip from any to any via ng704 in 04409 pipe 4409 ip from any to any via ng704 out 04410 pipe 4410 ip from any to any via ng705 in 04411 pipe 4411 ip from any to any via ng705 out 04600 pipe 4600 ip from any to any via ng800 in 04601 pipe 4601 ip from any to any via ng800 out 04602 pipe 4602 ip from any to any via ng801 in 04603 pipe 4603 ip from any to any via ng801 out 04604 pipe 4604 ip from any to any via ng802 in 04605 pipe 4605 ip from any to any via ng802 out 04606 pipe 4606 ip from any to any via ng803 in 04607 pipe 4607 ip from any to any via ng803 out 04608 pipe 4608 ip from any to any via ng804 in 04609 pipe 4609 ip from any to any via ng804 out 04610 pipe 4610 ip from any to any via ng805 in 04611 pipe 4611 ip from any to any via ng805 out 04612 pipe 4612 ip from any to any via ng806 in 04613 pipe 4613 ip from any to any via ng806 out 04614 pipe 4614 ip from any to any via ng807 in 04615 pipe 4615 ip from any to any via ng807 out 04616 pipe 4616 ip from any to any via ng808 in 04617 pipe 4617 ip from any to any via ng808 out 04618 pipe 4618 ip from any to any via ng809 in 04619 pipe 4619 ip from any to any via ng809 out 04620 pipe 4620 ip from any to any via ng810 in 04621 pipe 4621 ip from any to any via ng810 out 04622 pipe 4622 ip from any to any via ng811 in 04623 pipe 4623 ip from any to any via ng811 out 04624 pipe 4624 ip from any to any via ng812 in 04625 pipe 4625 ip from any to any via ng812 out 04626 pipe 4626 ip from any to any via ng813 in 04627 pipe 4627 ip from any to any via ng813 out 03161: 2.048 Mbit/s 0 ms 50 sl. 0 queues (1 buckets) droptail 04627: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 91.205.206.19/53 10.0.94.199/57696 1813 1297917 0 0 0 03628: 64.000 Kbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.100.18/68 255.255.255.255/67 2521 325226 0 0 0 03144: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 192.168.7.25/35259 192.168.15.3/6667 5180 269334 0 0 0 03135: 2.048 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 89.235.217.170/80 91.207.211.19/1156 80162 109010961 34 47155 8 04020: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 192.168.3.253/1046 91.122.4.219/443 188291 59501208 6 2937 0 03615: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 84.28.145.58/53692 10.0.97.203/4001 512 170122 0 0 0 03118: 384.000 Kbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 192.168.1.63/3296 195.170.253.18/31853 98014 94761482 5 6756 0 03101: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 194.67.52.35/80 10.0.96.101/3362 76999 33851654 0 0 0 03084: 2.048 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.100.51/137 255.255.255.255/137 214071 10104235 0 0 0 04610: 2.048 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.100.40/53576 192.168.1.5/53 739652 330523998 1 40 0 03060: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.95.157/137 255.255.255.255/137 21618 1232767 0 0 29 04606: 2.048 Mbit/s 0 ms 50 sl. 0 queues (1 buckets) droptail 04005: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 212.118.48.188/443 10.0.95.202/1413 12074 2183657 0 0 0 03045: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 77.120.100.50/80 10.0.97.98/63941 87652 109170411 0 0 0 04402: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.94.183/59747 60.162.216.56/10805 307600 36434569 0 0 0 03030: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.95.137/137 255.255.255.255/137 37952 2269182 0 0 0 03160: 2.048 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.100.222/1041 239.255.255.250/1900 3 353 0 0 0 04626: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 169.254.221.222/137 174.133.30.162/137 1736 239785 0 0 0 03629: 64.000 Kbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 icmp 212.1.105.107/0 10.0.100.18/0 2863 1668450 0 0 276 03145: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 91.205.206.19/53 10.0.94.161/1026 4452 1152669 0 0 0 03134: 2.048 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 91.207.211.19/1156 89.235.217.170/80 42765 2429680 0 0 0 04021: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 91.205.206.19/53 10.0.94.13/1025 220509 234149378 45 44584 18190 03614: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 10.0.97.203/4000 79.71.101.249/443 813 70082 0 0 0 03119: 384.000 Kbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 195.170.253.18/80 10.0.99.47/3317 73231 32945401 2 1324 81 03100: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 192.168.7.122/3343 77.87.152.7/53706 104443 82970883 0 0 19 03085: 2.048 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 194.67.52.35/80 10.0.100.51/4616 318435 436637048 0 0 493 04611: 2.048 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 77.222.146.3/53 10.0.100.40/53576 916157 956110349 32 31221 34794 03061: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 194.67.52.35/80 10.0.95.157/1508 22714 3355506 0 0 2 04607: 2.048 Mbit/s 0 ms 50 sl. 0 queues (1 buckets) droptail 04004: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 10.0.95.202/1413 212.118.48.188/443 12504 584050 0 0 0 03044: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 192.168.0.101/63963 212.96.115.246/80 63891 4286942 0 0 0 04403: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 174.100.46.117/24750 10.0.94.183/59747 422594 524327547 36 42846 19464 03031: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 87.248.113.14/80 10.0.95.137/1064 49903 47094947 0 0 31 00001: 1.024 Mbit/s 0 ms 50 sl. 0 queues (1 buckets) droptail 03116: 2.048 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.99.59/137 255.255.255.255/137 246 31643 0 0 0 03163: 2.048 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 95.52.104.220/12268 10.0.99.111/51005 94962 115646351 18 24249 0 03630: 128.000 Kbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.100.21/62538 224.0.0.252/5355 6185 609654 0 0 0 04625: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 91.205.206.19/53 10.0.97.32/63378 26461 26207214 0 0 36 03146: 64.000 Kbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.100.131/137 255.255.255.255/137 1004 88804 0 0 0 04022: 384.000 Kbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.99.229/59907 224.0.0.252/5355 29899 1564786 0 0 0 03613: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 192.168.1.5/53 10.0.95.122/53807 6745 2758909 0 0 16 03103: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 91.205.206.19/51410 10.0.97.13/1100 293362 333305449 27 36960 4205 03086: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 192.168.7.135/2458 218.160.180.19/80 307236 21753758 0 0 0 04608: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.97.140/68 255.255.255.255/67 99719 5703556 0 0 0 03062: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 192.168.3.153/2856 87.105.184.222/443 74620 4206977 0 0 14 04007: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 91.205.206.19/53 10.0.96.107/61058 3456 2181918 0 0 0 03047: 384.000 Kbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 91.205.206.19/53 10.0.99.49/1030 6038 4316435 0 0 0 04604: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.95.72/49830 224.0.0.252/5355 78 11878 0 0 0 04400: 2.048 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 icmp 10.0.99.160/0 192.168.1.5/0 566008 34519452 0 0 23 00002: 1.024 Mbit/s 0 ms 50 sl. 0 queues (1 buckets) droptail 03117: 2.048 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 188.98.234.1/58185 10.0.99.59/1181 203 65199 0 0 0 03162: 2.048 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.99.111/137 255.255.255.255/137 66614 24282436 0 0 0 03631: 128.000 Kbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 91.205.206.19/53 10.0.100.21/56825 8900 1655969 0 0 8 04624: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.97.32/63378 91.205.206.19/53 22016 7483789 1 1400 0 03147: 64.000 Kbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 72.14.221.99/80 10.0.100.131/3892 1907 500083 0 0 0 04023: 384.000 Kbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 91.205.206.19/53 10.0.99.229/57016 50204 72650659 30 4393= 7 456 03612: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.95.122/68 255.255.255.255/67 9401 840774 0 0 0 03102: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.97.13/137 255.255.255.255/137 196904 16029679 0 0 12 03087: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 72.20.5.58/80 10.0.97.56/2470 408715 465108360 46 49275 7684 04609: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 91.205.206.19/53 10.0.97.140/1046 111226 68734762 0 0 0 03063: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 209.85.129.102/80 10.0.96.39/2868 125501 165958671 0 0 1 04006: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.96.107/61058 91.205.206.19/53 3593 576429 0 0 0 03046: 384.000 Kbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.99.49/137 255.255.255.255/137 5707 978831 0 0 0 04605: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 91.205.206.19/53 10.0.95.72/52871 12 4873 0 0 0 04401: 2.048 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 icmp 192.168.1.5/0 10.0.99.160/0 757375 210298025 0 0 1795 03611: 384.000 Kbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 221.1.204.243/80 10.0.99.79/1041 34394 41662588 46 6593= 5 1044 03148: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.97.188/137 255.255.255.255/137 8621 6018296 0 0 0 03131: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 93.184.71.27/80 10.0.94.88/3565 11093 6775973 0 0 0 03114: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.97.67/137 255.255.255.255/137 207018 132317142 0 0 0 04614: 2.048 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 168.192.7.36/3560 89.74.9.73/443 10529 3331840 0 0 0 04016: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.94.185/2376 239.255.255.250/1900 123010 36074549 5 3100 0 03097: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 91.189.80.96/2710 10.0.97.169/1095 32783 1673544 0 0 0 04602: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.97.216/1044 92.112.107.205/38661 209085 179308298 0 0 60 03080: 384.000 Kbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.99.58/137 255.255.255.255/137 36699 2592903 0 0 0 04406: 2.048 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.100.98/56642 239.255.255.250/3702 5097 921260 0 0 0 03056: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.94.81/137 255.255.255.255/137 3679 737163 0 0 0 03041: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 91.205.206.19/53 10.0.95.1/1027 13238 1335805 0 0 0 04001: 2.048 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 91.205.206.19/53 10.0.100.35/54218 590902 773549213 28 41440 8627 03610: 384.000 Kbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.99.79/68 255.255.255.255/67 23222 2296047 0 0 0 03149: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 94.100.178.25/110 10.0.97.188/1766 4842 3697358 0 0 0 03130: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.94.88/137 255.255.255.255/137 10342 1105429 0 0 0 03115: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 188.16.87.85/59039 10.0.97.67/61423 218223 196119227 1 1396 12 04615: 2.048 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 81.142.101.241/32693 10.0.100.170/3570 11983 7379671 0 0 25 04017: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 91.205.206.19/53 10.0.94.185/64211 149094 165068195 0 0 0 03096: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.97.169/137 255.255.255.255/137 54272 59507302 0 0 0 04603: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 92.112.107.205/38661 10.0.97.216/1044 147925 8737976 0 0 0 03081: 384.000 Kbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 91.205.206.19/53 10.0.99.58/1047 52588 66769217 0 0 93 04407: 2.048 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 192.168.1.5/53 10.0.100.98/56311 5528 3825662 0 0 11 03057: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 80.190.154.74/80 10.0.94.81/7104 4397 3992559 0 0 0 03040: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.95.1/137 255.255.255.255/137 17713 1097320 0 0 0 04000: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 192.168.3.89/1451 212.40.34.149/80 358270 22623280 0 0 0 03129: 2.048 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 91.205.206.19/53 10.0.99.118/1033 7827 8013549 0 0 371 03150: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.95.7/1575 239.255.255.250/1900 54861 4481144 0 0 0 03099: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 213.236.208.95/80 10.0.96.117/1136 731 263656 0 0 0 03112: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.95.65/137 255.255.255.255/137 11064 12934789 0 0 0 03009: 384.000 Kbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 91.205.206.19/53 10.0.99.136/52784 2864 1547945 0 0 0 04612: 384.000 Kbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 192.168.7.136/1031 65.55.52.148/443 23009 4110173 0 0 0 03082: 384.000 Kbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.100.245/4042 91.205.206.19/53 30838 2656816 0 0 0 03058: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 192.168.3.122/3454 213.196.229.88/12962 19447 3080195 0 0 0 03043: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 213.242.239.35/25121 10.0.97.8/10554 153121 18009070 0 0 0 04003: 64.000 Kbit/s 0 ms 50 sl. 0 queues (1 buckets) droptail 04404: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.95.55/2049 91.205.206.19/53 4 270 0 0 0 04600: 2.048 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 192.168.1.14/9744 94.100.179.197/80 39895 4776343 0 0 0 03128: 2.048 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.99.118/1033 91.205.206.19/53 6524 677490 0 0 0 03151: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 192.168.1.3/53 10.0.95.7/1073 63501 79134462 0 0 9 03098: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 10.0.96.117/1136 213.236.208.95/80 788 139986 0 0 0 03113: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 89.188.115.202/80 10.0.95.65/3731 7111 360152 0 0 0 03008: 384.000 Kbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.99.136/52784 91.205.206.19/53 3541 649094 0 0 0 04613: 384.000 Kbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 91.205.206.19/53 10.0.99.195/63503 26198 22520467 0 0 94 03083: 384.000 Kbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 91.205.206.19/53 10.0.100.245/4042 29215 32894579 0 0 462 03059: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 72.14.221.103/80 10.0.96.132/3485 22047 20116818 0 0 2 03042: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.97.8/137 255.255.255.255/137 237648 286877975 19 22100 3 04002: 64.000 Kbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 igmp 10.0.100.233/0 239.255.255.250/0 2 56 0 0 0 04405: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 91.205.206.19/53 10.0.95.55/2049 4 394 0 0 0 04601: 2.048 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 94.100.179.197/80 10.0.100.199/9753 57248 63420309 0 0 302 04028: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.96.32/49646 224.0.0.252/5355 5483 344235 0 0 0 03153: 1.024 Mbit/s 0 ms 50 sl. 0 queues (1 buckets) droptail 03637: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 207.68.183.124/80 10.0.97.172/49158 23266 33355420 3 4440 39 03068: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.95.96/63293 192.168.1.3/53 4903 649933 0 0 0 03136: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.97.64/137 255.255.255.255/137 7704 399169 0 0 0 03127: 384.000 Kbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 91.207.4.106/80 10.0.99.200/3400 74878 6559522 0 0 0 04618: 2.048 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 192.168.7.54/4656 92.237.100.124/31174 1336 168941 0 0 0 03110: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.96.186/68 255.255.255.255/67 254036 33466647 0 0 0 03093: 2.048 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 91.205.206.19/53 10.0.100.60/58256 8862 2545480 0 0 0 04410: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.96.247/68 255.255.255.255/67 1173 267691 0 0 0 04013: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 77.37.171.86/443 10.0.96.162/3903 17249 4216575 0 0 0 03607: 1.024 Mbit/s 0 ms 50 sl. 0 queues (1 buckets) droptail 03053: 2.048 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 icmp 10.0.100.119/0 10.0.100.119/0 8498 6791402 0 0 22 03038: 384.000 Kbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.99.55/137 255.255.255.255/137 25363 2011427 0 0 0 04029: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 91.205.206.19/53 10.0.96.32/55346 9056 12569836 45 61365 63 03152: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.94.59/137 255.255.255.255/137 24 3033 0 0 0 03636: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.97.172/55022 91.205.206.19/53 13201 771385 0 0 0 03069: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 192.168.1.3/53 10.0.95.96/63293 5868 4343191 0 0 140 03137: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 95.211.81.129/2106 10.0.97.64/1039 7615 1836016 0 0 0 03126: 384.000 Kbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.99.200/137 255.255.255.255/137 76248 10281497 0 0 0 04619: 2.048 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 92.237.100.124/80 10.0.100.115/4667 1011 129754 0 0 0 03111: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 87.244.129.24/23097 10.0.96.186/4602 319846 394907876 33 43918 851 03092: 2.048 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 192.168.3.115/64521 81.31.42.131/53 9356 1277032 0 0 0 04411: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 91.205.206.19/53 10.0.96.247/62013 1151 774200 0 0 0 04012: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.96.162/2522 55.52.141.173/23671 21380 3652757 0 0 0 03606: 1.024 Mbit/s 0 ms 50 sl. 0 queues (1 buckets) droptail 03052: 2.048 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 icmp 10.0.100.119/0 10.0.100.119/0 6190 888434 0 0 0 03039: 384.000 Kbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 212.53.35.4/11024 10.0.99.55/4366 42306 54363062 0 0 69 03021: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 89.204.94.251/33225 10.0.97.209/63879 21942 12944771 0 0 143 03155: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 91.205.206.19/53 10.0.97.150/52174 5235 4799257 0 0 52 04616: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 192.168.7.94/1417 149.20.56.32/80 179642 75276327 4 5920 0 03138: 2.048 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 91.207.211.16/2050 91.205.206.19/53 42 2568 0 0 0 03108: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.94.243/137 255.255.255.255/137 135607 8833682 0 0 0 03095: 2.048 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 91.205.206.19/53 10.0.100.38/1464 7458 6478667 0 0 0 04015: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 24.60.95.205/17967 10.0.95.237/1613 50787 67125061 0 0 0 03078: 384.000 Kbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.99.138/137 255.255.255.255/137 90264 17269075 0 0 0 04408: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.94.10/1035 195.5.62.1/53 5808 1299286 0 0 0 03070: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.94.215/4424 239.255.255.250/1900 461364 296593091 8 3032 710 03055: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 129.215.14.66/1337 10.0.95.53/1327 29518 15040958 0 0 0 03036: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.96.51/68 255.255.255.255/67 531625 498693954 39 36881 11716 03605: 2.048 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 icmp 192.168.1.5/0 10.0.100.137/0 4408 335920 0 0 0 03020: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 10.0.97.209/63879 89.204.94.251/33225 25239 12601570 0 0 0 03154: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 192.168.1.215/123 207.46.232.182/123 4506 749457 0 0 0 04617: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 91.205.206.19/53 10.0.96.125/1025 189949 174842357 22 24640 3339 03139: 2.048 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 91.205.206.19/53 91.207.211.16/2050 25 1843 0 0 0 03109: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 192.168.1.3/53 10.0.94.243/64420 177066 215506499 0 0 127 03094: 2.048 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.100.38/137 255.255.255.255/137 6347 1018291 0 0 0 04014: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 192.168.3.138/1602 216.188.226.88/80 41923 2811603 0 0 0 03079: 384.000 Kbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 207.46.232.182/123 10.0.99.138/123 122776 132736784 27 30916 387 04409: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 195.5.62.1/53 10.0.96.20/1036 6375 4026404 0 0 0 03071: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 79.97.185.5/51241 10.0.94.215/4429 505504 471866311 21 16332 4265 03054: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.95.53/137 255.255.255.255/137 26973 1461841 0 0 30 03037: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 91.205.206.19/53 10.0.96.51/3617 441673 243708662 0 0 0 03604: 2.048 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 icmp 10.0.100.137/0 192.168.1.5/0 21470 23683560 0 0 0 03072: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 91.207.211.21/137 255.255.255.255/137 142 20957 0 0 0 04024: 384.000 Kbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 192.168.3.42/1047 91.10.234.83/443 353 40528 0 0 0 03633: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 85.127.231.33/3949 10.0.94.221/30229 88444 66439658 4 4480 0 03157: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 90.183.101.15/80 10.0.96.58/1963 21521 29543410 0 0 0 04622: 384.000 Kbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.100.101/64548 91.205.206.19/53 1812 232046 0 0 0 03140: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.96.11/137 255.255.255.255/137 15526 1341768 0 0 0 03123: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 192.168.1.3/53 10.0.95.177/1026 1263 177955 0 0 0 03106: 2.048 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.99.82/137 255.255.255.255/137 10617 569156 0 0 0 03089: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 91.205.206.19/53 10.0.96.88/53236 81710 5542587 0 0 0 03064: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.97.66/137 255.255.255.255/137 23865 14264507 0 0 0 04009: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 212.120.229.183/52503 10.0.95.108/1799 435608 498744333 2 2960 15122 03049: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 64.12.200.89/5190 10.0.95.158/1064 125421 168876197 0 0 52 03034: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.97.252/68 255.255.255.255/67 428878 491880835 13 16792 2359 03073: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 icmp 91.207.204.83/0 91.207.211.21/0 138 81462 0 0 0 04025: 384.000 Kbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 91.205.206.19/53 10.0.100.79/1025 288 61473 0 0 0 03632: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.94.221/30229 85.127.231.33/3949 93060 52350948 0 0 0 03156: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.96.58/137 255.255.255.255/137 12934 596496 0 0 0 04623: 384.000 Kbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 91.205.206.19/53 10.0.100.101/64548 1709 728817 0 0 0 03141: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 icmp 208.43.153.2/0 10.0.96.11/0 24218 30083348 0 0 35 03122: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 192.168.3.231/1055 24.63.176.41/3175 2128 156036 0 0 0 03107: 2.048 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 92.244.134.36/48944 10.0.99.82/62084 12975 1992339 0 0 0 03088: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.96.88/68 255.255.255.255/67 83770 4435548 0 0 116 03065: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 91.205.206.19/53 10.0.97.66/58153 15313 5100844 0 0 0 04008: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 10.0.95.108/1799 212.120.229.183/52503 338241 49051642 0 0 0 03048: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.95.158/68 255.255.255.255/67 69278 3764647 0 0 0 03035: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 62.205.236.20/13263 10.0.97.252/64601 285381 90591637 0 0 1 03017: 384.000 Kbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 99.249.82.105/80 10.0.100.211/2564 81 12108 0 0 0 04026: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 10.0.95.218/4921 153.102.113.117/19840 15007 6136216 0 0 0 03635: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 icmp 212.1.105.107/0 10.0.97.73/0 535 193208 0 0 0 03159: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 163.19.218.28/36728 10.0.97.234/49485 7088 3482791 0 0 0 03142: 384.000 Kbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.100.147/1099 239.255.255.250/1900 26907 2005706 0 0 0 03121: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 93.66.71.252/39894 10.0.96.5/35042 256955 274439627 6 7346 758 04620: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.97.51/63370 91.205.206.19/53 18985 1605280 0 0 0 03104: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 icmp 10.0.96.187/0 192.168.40.147/0 97755 4599119 0 0 0 03091: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 193.108.170.1/110 10.0.96.178/2058 13762 12454883 0 0 0 04011: 10.240 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 91.205.206.19/53 10.0.100.174/53562 5904 5863896 0 0 19 03074: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.96.44/137 255.255.255.255/137 20606 2593867 0 0 6 03066: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.95.213/68 255.255.255.255/67 54989 16102076 0 0 0 03051: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 91.205.206.19/53 91.207.211.17/1025 93 6024 0 0 0 03032: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.95.247/40298 95.57.153.37/64237 282373 174869068 2 1152 0 03601: 2.048 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 74.125.87.18/80 10.0.100.134/2576 673714 636433379 19 22784 1965 03016: 384.000 Kbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.100.211/137 255.255.255.255/137 118 18691 0 0 0 04027: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 98.1.75.163/19248 10.0.95.218/4922 14275 10751781 0 0 0 03634: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.97.73/1035 239.255.255.250/1900 597 91268 0 0 0 03158: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.97.234/137 255.255.255.255/137 6922 390084 0 0 0 03143: 384.000 Kbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 81.19.70.1/80 10.0.100.147/1104 38528 43549114 20 24581 54 03120: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.96.5/35042 82.0.123.197/41656 169096 27322663 0 0 0 04621: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 91.205.206.19/53 10.0.97.51/63370 27900 23917035 0 0 36 03105: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 91.205.206.19/53 10.0.96.187/5136 159096 220368420 0 0 0 03090: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.96.178/68 255.255.255.255/67 12004 1747483 0 0 0 04010: 10.240 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.100.174/57618 224.0.0.252/5355 4810 581234 0 0 0 03075: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 131.111.33.242/63891 10.0.96.44/1079 23002 6952666 0 0 59 03067: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 74.125.77.147/80 10.0.95.213/1106 44306 28967429 0 0 39 03050: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 91.207.211.17/137 255.255.255.255/137 143 16614 0 0 0 03033: 1.024 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 tcp 91.205.206.19/61617 10.0.95.247/27881 144076 9954725 0 0 0 03600: 2.048 Mbit/s 0 ms 50 sl. 1 queues (1 buckets) droptail mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000 BKT Prot ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp 0 udp 10.0.100.134/2572 239.255.255.250/1900 533990 377537021 2 1520 0 and so on. More online users, more ipfw rules and more pipes... On Mon, May 4, 2009 at 11:05 AM, Oleg Bulyzhin wrote: > > Please show sysctl net.inet.ip.dummynet output, your ipfw ruleset and > pipe configs. > > -- > Oleg. > > =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D > =3D=3D=3D Oleg Bulyzhin -- OBUL-RIPN -- OBUL-RIPE -- oleg@rinet.ru =3D=3D= =3D > =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D > > --=20 ---- =F3 =D5=D7=C1=D6=C5=CE=C9=C5=CD, =E1=CE=C4=D2=C5=CA --0016364c758e62805c04691699de Content-Type: text/html; charset=KOI8-R Content-Transfer-Encoding: quoted-printable
net.inet.ip.dummynet.debug: 0
net.inet.ip.dummynet.p= ipe_byte_limit:=20 1048576
net.inet.ip.dummynet.pipe_slot_limit:=20 100
net.inet.ip.dummynet.io_pkt_drop:=20 138100
net.inet.ip.dummynet.io_pkt_fast:=20 327270
net.inet.ip.dummynet.io_pkt: 19438906
net.inet.ip.dummynet.io_= fast:=20 0
net.inet.ip.dummynet.tick_lost: 0
net.inet.ip.dummynet.tick_diff:= =20 21083
net.inet.ip.dummynet.tick_adjustment:=20 13986
net.inet.ip.dummynet.tick_delta_sum:=20 148
net.inet.ip.dummynet.tick_delta:=20 1
net.inet.ip.dummynet.red_max_pkt_size:=20 1500
net.inet.ip.dummynet.red_avg_pkt_size:=20 512
net.inet.ip.dummynet.red_lookup_depth:=20 256
net.inet.ip.dummynet.max_chain_len: 1024
net.inet.ip.dummynet.exp= ire:=20 1
net.inet.ip.dummynet.search_steps: 0
net.inet.ip.dummynet.searches:= =20 0
net.inet.ip.dummynet.extract_heap: 0
net.inet.ip.dummynet.ready_hea= p:=20 64
net.inet.ip.dummynet.curr_time: 3873537
net.inet.ip.dummynet.hash_= size:=20 64


00010 pipe 1 ip from any to 1= 0.3.1.6 out
00011 pipe 2=20 ip from 10.3.1.6 to any in
03008 pipe 3008 ip from any to any via ng4=20 in
03009 pipe 3009 ip from any to any via ng4 out
03020 pipe 3020 ip = from=20 any to any via ng10 in
03021 pipe 3021 ip from any to any via ng10=20 out
03030 pipe 3030 ip from any to any via ng15 in
03031 pipe 3031 ip= from=20 any to any via ng15 out
03032 pipe 3032 ip from any to any via ng16=20 in
03033 pipe 3033 ip from any to any via ng16 out
03034 pipe 3034 ip= from=20 any to any via ng17 in
03035 pipe 3035 ip from any to any via ng17=20 out
03036 pipe 3036 ip from any to any via ng18 in
03037 pipe 3037 ip= from=20 any to any via ng18 out
03038 pipe 3038 ip from any to any via ng19=20 in
03039 pipe 3039 ip from any to any via ng19 out
03040 pipe 3040 ip= from=20 any to any via ng20 in
03041 pipe 3041 ip from any to any via ng20=20 out
03042 pipe 3042 ip from any to any via ng21 in
03043 pipe 3043 ip= from=20 any to any via ng21 out
03044 pipe 3044 ip from any to any via ng22=20 in
03045 pipe 3045 ip from any to any via ng22 out
03046 pipe 3046 ip= from=20 any to any via ng23 in
03047 pipe 3047 ip from any to any via ng23=20 out
03048 pipe 3048 ip from any to any via ng24 in
03049 pipe 3049 ip= from=20 any to any via ng24 out
03050 pipe 3050 ip from any to any via ng25=20 in
03051 pipe 3051 ip from any to any via ng25 out
03052 pipe 3052 ip= from=20 any to any via ng26 in
03053 pipe 3053 ip from any to any via ng26=20 out
03054 pipe 3054 ip from any to any via ng27 in
03055 pipe 3055 ip= from=20 any to any via ng27 out
03056 pipe 3056 ip from any to any via ng28=20 in
03057 pipe 3057 ip from any to any via ng28 out
03058 pipe 3058 ip= from=20 any to any via ng29 in
03059 pipe 3059 ip from any to any via ng29=20 out
03060 pipe 3060 ip from any to any via ng30 in
03061 pipe 3061 ip= from=20 any to any via ng30 out
03062 pipe 3062 ip from any to any via ng31=20 in
03063 pipe 3063 ip from any to any via ng31 out
03064 pipe 3064 ip= from=20 any to any via ng32 in
03065 pipe 3065 ip from any to any via ng32=20 out
03066 pipe 3066 ip from any to any via ng33 in
03067 pipe 3067 ip= from=20 any to any via ng33 out
03068 pipe 3068 ip from any to any via ng34=20 in
03069 pipe 3069 ip from any to any via ng34 out
03070 pipe 3070 ip= from=20 any to any via ng35 in
03071 pipe 3071 ip from any to any via ng35=20 out
03072 pipe 3072 ip from any to any via ng36 in
03073 pipe 3073 ip= from=20 any to any via ng36 out
03074 pipe 3074 ip from any to any via ng37=20 in
03075 pipe 3075 ip from any to any via ng37 out
03078 pipe 3078 ip= from=20 any to any via ng39 in
03079 pipe 3079 ip from any to any via ng39=20 out
03080 pipe 3080 ip from any to any via ng40 in
03081 pipe 3081 ip= from=20 any to any via ng40 out
03082 pipe 3082 ip from any to any via ng41=20 in
03083 pipe 3083 ip from any to any via ng41 out
03084 pipe 3084 ip= from=20 any to any via ng42 in
03085 pipe 3085 ip from any to any via ng42=20 out
03086 pipe 3086 ip from any to any via ng43 in
03087 pipe 3087 ip= from=20 any to any via ng43 out
03088 pipe 3088 ip from any to any via ng44=20 in
03089 pipe 3089 ip from any to any via ng44 out
03090 pipe 3090 ip= from=20 any to any via ng45 in
03091 pipe 3091 ip from any to any via ng45=20 out
03092 pipe 3092 ip from any to any via ng46 in
03093 pipe 3093 ip= from=20 any to any via ng46 out
03094 pipe 3094 ip from any to any via ng47=20 in
03095 pipe 3095 ip from any to any via ng47 out
03096 pipe 3096 ip= from=20 any to any via ng48 in
03097 pipe 3097 ip from any to any via ng48=20 out
03098 pipe 3098 ip from any to any via ng49 in
03099 pipe 3099 ip= from=20 any to any via ng49 out
03100 pipe 3100 ip from any to any via ng50=20 in
03101 pipe 3101 ip from any to any via ng50 out
03102 pipe 3102 ip= from=20 any to any via ng51 in
03103 pipe 3103 ip from any to any via ng51=20 out
03104 pipe 3104 ip from any to any via ng52 in
03105 pipe 3105 ip= from=20 any to any via ng52 out
03106 pipe 3106 ip from any to any via ng53=20 in
03107 pipe 3107 ip from any to any via ng53 out
03108 pipe 3108 ip= from=20 any to any via ng54 in
03109 pipe 3109 ip from any to any via ng54=20 out
03110 pipe 3110 ip from any to any via ng55 in
03111 pipe 3111 ip= from=20 any to any via ng55 out
03112 pipe 3112 ip from any to any via ng56=20 in
03113 pipe 3113 ip from any to any via ng56 out
03114 pipe 3114 ip= from=20 any to any via ng57 in
03115 pipe 3115 ip from any to any via ng57=20 out
03118 pipe 3118 ip from any to any via ng59 in
03119 pipe 3119 ip= from=20 any to any via ng59 out
03120 pipe 3120 ip from any to any via ng60=20 in
03121 pipe 3121 ip from any to any via ng60 out
03122 pipe 3122 ip= from=20 any to any via ng61 in
03123 pipe 3123 ip from any to any via ng61=20 out
03124 pipe 3124 ip from any to any via ng62 in
03125 pipe 3125 ip= from=20 any to any via ng62 out
03126 pipe 3126 ip from any to any via ng63=20 in
03127 pipe 3127 ip from any to any via ng63 out
03128 pipe 3128 ip= from=20 any to any via ng64 in
03129 pipe 3129 ip from any to any via ng64=20 out
03130 pipe 3130 ip from any to any via ng65 in
03131 pipe 3131 ip= from=20 any to any via ng65 out
03134 pipe 3134 ip from any to any via ng67=20 in
03135 pipe 3135 ip from any to any via ng67 out
03136 pipe 3136 ip= from=20 any to any via ng68 in
03137 pipe 3137 ip from any to any via ng68=20 out
03138 pipe 3138 ip from any to any via ng69 in
03139 pipe 3139 ip= from=20 any to any via ng69 out
03140 pipe 3140 ip from any to any via ng70=20 in
03141 pipe 3141 ip from any to any via ng70 out
03142 pipe 3142 ip= from=20 any to any via ng71 in
03143 pipe 3143 ip from any to any via ng71=20 out
03144 pipe 3144 ip from any to any via ng72 in
03145 pipe 3145 ip= from=20 any to any via ng72 out
03146 pipe 3146 ip from any to any via ng73=20 in
03147 pipe 3147 ip from any to any via ng73 out
03148 pipe 3148 ip= from=20 any to any via ng74 in
03149 pipe 3149 ip from any to any via ng74=20 out
03150 pipe 3150 ip from any to any via ng75 in
03151 pipe 3151 ip= from=20 any to any via ng75 out
03152 pipe 3152 ip from any to any via ng76=20 in
03153 pipe 3153 ip from any to any via ng76 out
03154 pipe 3154 ip= from=20 any to any via ng77 in
03155 pipe 3155 ip from any to any via ng77=20 out
03156 pipe 3156 ip from any to any via ng78 in
03157 pipe 3157 ip= from=20 any to any via ng78 out
03158 pipe 3158 ip from any to any via ng79=20 in
03159 pipe 3159 ip from any to any via ng79 out
03162 pipe 3162 ip= from=20 any to any via ng81 in
03163 pipe 3163 ip from any to any via ng81=20 out
03600 pipe 3600 ip from any to any via ng300 in
03601 pipe 3601 i= p=20 from any to any via ng300 out
03604 pipe 3604 ip from any to any via ng3= 02=20 in
03605 pipe 3605 ip from any to any via ng302 out
03606 pipe 3606 i= p=20 from any to any via ng303 in
03607 pipe 3607 ip from any to any via ng30= 3=20 out
03610 pipe 3610 ip from any to any via ng305 in
03611 pipe 3611 i= p=20 from any to any via ng305 out
03612 pipe 3612 ip from any to any via ng3= 06=20 in
03613 pipe 3613 ip from any to any via ng306 out
03614 pipe 3614 i= p=20 from any to any via ng307 in
03615 pipe 3615 ip from any to any via ng30= 7=20 out
03628 pipe 3628 ip from any to any via ng314 in
03629 pipe 3629 i= p=20 from any to any via ng314 out
03630 pipe 3630 ip from any to any via ng3= 15=20 in
03631 pipe 3631 ip from any to any via ng315 out
03632 pipe 3632 i= p=20 from any to any via ng316 in
03633 pipe 3633 ip from any to any via ng31= 6=20 out
03634 pipe 3634 ip from any to any via ng317 in
03635 pipe 3635 i= p=20 from any to any via ng317 out
03636 pipe 3636 ip from any to any via ng3= 18=20 in
03637 pipe 3637 ip from any to any via ng318 out
04000 pipe 4000 i= p=20 from any to any via ng500 in
04001 pipe 4001 ip from any to any via ng50= 0=20 out
04002 pipe 4002 ip from any to any via ng501 in
04003 pipe 4003 i= p=20 from any to any via ng501 out
04004 pipe 4004 ip from any to any via ng5= 02=20 in
04005 pipe 4005 ip from any to any via ng502 out
04006 pipe 4006 i= p=20 from any to any via ng503 in
04007 pipe 4007 ip from any to any via ng50= 3=20 out
04008 pipe 4008 ip from any to any via ng504 in
04009 pipe 4009 i= p=20 from any to any via ng504 out
04010 pipe 4010 ip from any to any via ng5= 05=20 in
04011 pipe 4011 ip from any to any via ng505 out
04012 pipe 4012 i= p=20 from any to any via ng506 in
04013 pipe 4013 ip from any to any via ng50= 6=20 out
04014 pipe 4014 ip from any to any via ng507 in
04015 pipe 4015 i= p=20 from any to any via ng507 out
04016 pipe 4016 ip from any to any via ng5= 08=20 in
04017 pipe 4017 ip from any to any via ng508 out
04018 pipe 4018 i= p=20 from any to any via ng509 in
04019 pipe 4019 ip from any to any via ng50= 9=20 out
04020 pipe 4020 ip from any to any via ng510 in
04021 pipe 4021 i= p=20 from any to any via ng510 out
04022 pipe 4022 ip from any to any via ng5= 11=20 in
04023 pipe 4023 ip from any to any via ng511 out
04024 pipe 4024 i= p=20 from any to any via ng512 in
04025 pipe 4025 ip from any to any via ng51= 2=20 out
04026 pipe 4026 ip from any to any via ng513 in
04027 pipe 4027 i= p=20 from any to any via ng513 out
04028 pipe 4028 ip from any to any via ng5= 14=20 in
04029 pipe 4029 ip from any to any via ng514 out
04400 pipe 4400 i= p=20 from any to any via ng700 in
04401 pipe 4401 ip from any to any via ng70= 0=20 out
04402 pipe 4402 ip from any to any via ng701 in
04403 pipe 4403 i= p=20 from any to any via ng701 out
04404 pipe 4404 ip from any to any via ng7= 02=20 in
04405 pipe 4405 ip from any to any via ng702 out
04406 pipe 4406 i= p=20 from any to any via ng703 in
04407 pipe 4407 ip from any to any via ng70= 3=20 out
04408 pipe 4408 ip from any to any via ng704 in
04409 pipe 4409 i= p=20 from any to any via ng704 out
04410 pipe 4410 ip from any to any via ng7= 05=20 in
04411 pipe 4411 ip from any to any via ng705 out
04600 pipe 4600 i= p=20 from any to any via ng800 in
04601 pipe 4601 ip from any to any via ng80= 0=20 out
04602 pipe 4602 ip from any to any via ng801 in
04603 pipe 4603 i= p=20 from any to any via ng801 out
04604 pipe 4604 ip from any to any via ng8= 02=20 in
04605 pipe 4605 ip from any to any via ng802 out
04606 pipe 4606 i= p=20 from any to any via ng803 in
04607 pipe 4607 ip from any to any via ng80= 3=20 out
04608 pipe 4608 ip from any to any via ng804 in
04609 pipe 4609 i= p=20 from any to any via ng804 out
04610 pipe 4610 ip from any to any via ng8= 05=20 in
04611 pipe 4611 ip from any to any via ng805 out
04612 pipe 4612 i= p=20 from any to any via ng806 in
04613 pipe 4613 ip from any to any via ng80= 6=20 out
04614 pipe 4614 ip from any to any via ng807 in
04615 pipe 4615 i= p=20 from any to any via ng807 out
04616 pipe 4616 ip from any to any via ng8= 08=20 in
04617 pipe 4617 ip from any to any via ng808 out
04618 pipe 4618 i= p=20 from any to any via ng809 in
04619 pipe 4619 ip from any to any via ng80= 9=20 out
04620 pipe 4620 ip from any to any via ng810 in
04621 pipe 4621 i= p=20 from any to any via ng810 out
04622 pipe 4622 ip from any to any via ng8= 11=20 in
04623 pipe 4623 ip from any to any via ng811 out
04624 pipe 4624 i= p=20 from any to any via ng812 in
04625 pipe 4625 ip from any to any via ng81= 2=20 out
04626 pipe 4626 ip from any to any via ng813 in
04627 pipe 4627 i= p=20 from any to any via ng813 out


03161:=9A=9A 2.048 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 s= l. 0 queues (1=20 buckets) droptail
04627:=9A=9A 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1= queues (1 buckets)=20 droptail
=9A=9A=9A mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000<= br>BKT Prot=20 ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
= =9A 0=20 udp=9A=9A=9A 91.205.206.19/53=9A=9A= =9A=9A=9A=9A=9A 10.0.94.199/57696 = 1813=9A 1297917=9A 0=9A=9A=9A 0=9A=9A=20 0
03628:=9A 64.000 Kbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets= ) droptail
=9A=9A=9A=20 mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source= =20 IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp= =9A=9A=9A=9A=9A=20 10.0.100.18/68=9A=9A=9A 255.255.255.255/67=9A=9A=9A 2521=9A=9A 325226= =9A 0=9A=9A=9A 0=9A=9A 0
03144:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =20 192.168.7.25/35259=9A=9A=9A 192.168.15.3/6667=9A 5180=9A=9A 269334= =9A 0=9A=9A=9A 0=9A=9A 0
03135:=9A=9A=20 2.048 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp=9A=9A=20 89.235.217.170/80=9A=9A=9A=9A=9A <= a href=3D"http://91.207.211.19/1156">91.207.211.19/1156=9A 80162 109010= 961 34 47155=9A=9A=20 8
04020:=9A=9A 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 bucke= ts) droptail
=9A=9A=9A=20 mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source= =20 IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp= =9A=9A=9A=20 192.168.3.253/1046=9A=9A=9A=9A 91.122.4.219/443=9A=9A 188291 5950120= 8=9A 6 2937=9A=9A=20 0
03615:=9A=9A 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 bucke= ts) droptail
=9A=9A=9A=20 mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source= =20 IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp= =9A=9A=9A=9A=20 84.28.145.58/53692=9A=9A=9A=9A 10.0.97.203/4001=9A=9A 512=9A=9A 1701= 22=9A 0=9A=9A=9A 0=9A=9A 0
03118:=20 384.000 Kbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp=9A=9A=9A=9A= =20 192.168.1.63/3296=9A=9A 195.170.253.18/31853 98014 94761482=9A 5 = 6756=9A=9A 0
03101:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp=9A=9A=9A=9A= =20 194.67.52.35/80=9A=9A=9A=9A=9A=9A=9A= 10.0.96.101/3362=9A 76999 33851654= =9A 0=9A=9A=9A 0=9A=9A 0
03084:=9A=9A=20 2.048 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=20 10.0.100.51/137=9A=9A 255.255.255.255/137=9A=9A 214071 10104235=9A 0= =9A=9A=9A 0=9A=9A 0
04610:=9A=9A=20 2.048 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=20 10.0.100.40/53576=9A=9A=9A=9A 192.168.1.5/53=9A=9A=9A 739652 330523998= =9A 1=9A=9A 40=9A=9A 0
03060:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=20 10.0.95.157/137=9A=9A 255.255.255.255/137=9A=9A 21618=9A 1232767=9A = 0=9A=9A=9A 0=9A 29
04606:=9A=9A=20 2.048 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 0 queues (1 buckets) droptail
04= 005:=9A=9A 1.024=20 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
=9A=9A= =9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp=9A=9A=20 212.118.48.188/443=9A=9A=9A=9A=9A= =9A 10.0.95.202/1413=9A 12074=9A 21= 83657=9A 0=9A=9A=9A 0=9A=9A=20 0
03045:=9A=9A 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 bucke= ts) droptail
=9A=9A=9A=20 mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source= =20 IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp= =9A=9A=9A=20 77.120.100.50/80=9A=9A=9A=9A=9A=9A= =9A=9A 10.0.97.98/63941 87652 10917= 0411=9A 0=9A=9A=9A 0=9A=9A=20 0
04402:=9A=9A 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 bucke= ts) droptail
=9A=9A=9A=20 mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source= =20 IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp= =9A=9A=9A=9A=9A=20 10.0.94.183/59747=9A=9A 60.162.216.56/10805 307600 36434569=9A 0= =9A=9A=9A 0=9A=9A 0
03030:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=20 10.0.95.137/137=9A=9A 255.255.255.255/137=9A=9A 37952=9A 2269182=9A = 0=9A=9A=9A 0=9A=9A 0
03160:=9A=9A=20 2.048 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =20 10.0.100.222/1041=9A 239.255.255.250/1900=9A=9A=9A=9A 3=9A=9A=9A= =9A=9A 353=9A 0=9A=9A=9A 0=9A=9A 0
04626:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=20 169.254.221.222/137=9A=9A=9A 174.133.30.162/137=9A=9A 1736=9A=9A = 239785=9A 0=9A=9A=9A 0=9A=9A 0
03629:=9A=20 64.000 Kbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 icmp=9A=9A=20 212.1.105.107/0=9A=9A=9A=9A=9A=9A=9A= =9A 10.0.100.18/0=9A=9A=9A=9A 2863=9A = 1668450=9A 0=9A=9A=9A 0 276
03145:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=20 91.205.206.19/53=9A=9A=9A=9A=9A=9A= =9A 10.0.94.161/1026=9A 4452=9A 115= 2669=9A 0=9A=9A=9A 0=9A=9A 0
03134:=9A=9A=20 2.048 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp=9A=9A=9A=20 91.207.211.19/1156=9A=9A 89.235.217.170/80=9A=9A=9A 42765=9A 24296= 80=9A 0=9A=9A=9A 0=9A=9A 0
04021:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=20 91.205.206.19/53=9A=9A=9A=9A=9A=9A= =9A=9A 10.0.94.13/1025=9A 220509 234= 149378 45 44584=20 18190
03614:=9A=9A 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 b= uckets)=20 droptail
=9A=9A=9A mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000<= br>BKT Prot=20 ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
= =9A 0=20 tcp=9A=9A=9A=9A=9A 10.0.97.203/4000= =9A=9A=9A 79.71.101.249/443=9A=9A= =9A 813=9A=9A=9A 70082=9A 0=9A=9A=9A 0=9A=9A=20 0
03119: 384.000 Kbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) = droptail
=9A=9A=9A=20 mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source= =20 IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp= =9A=9A=20 195.170.253.18/80=9A=9A=9A=9A=9A= =9A=9A=9A 10.0.99.47/3317=9A 73231 3= 2945401=9A 2 1324=9A=20 81
03100:=9A=9A 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buck= ets)=20 droptail
=9A=9A=9A mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000<= br>BKT Prot=20 ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
= =9A 0=20 tcp=9A=9A=9A 192.168.7.122/3343= =9A=9A=9A=9A=9A 77.87.152.7/53706 = 104443 82970883=9A 0=9A=9A=9A 0=9A=20 19
03085:=9A=9A 2.048 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buck= ets)=20 droptail
=9A=9A=9A mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000<= br>BKT Prot=20 ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
= =9A 0=20 tcp=9A=9A=9A=9A 194.67.52.35/80=9A= =9A=9A=9A=9A=9A=9A 10.0.100.51/4616= =9A 318435 436637048=9A 0=9A=9A=9A 0=20 493
04611:=9A=9A 2.048 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buc= kets)=20 droptail
=9A=9A=9A mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000<= br>BKT Prot=20 ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
= =9A 0=20 udp=9A=9A=9A=9A 77.222.146.3/53=9A= =9A=9A=9A=9A=9A=9A 10.0.100.40/53576 916157 956110349 32 31221=20 34794
03061:=9A=9A 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 b= uckets)=20 droptail
=9A=9A=9A mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000<= br>BKT Prot=20 ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
= =9A 0=20 tcp=9A=9A=9A=9A
194.67.52.35/80=9A= =9A=9A=9A=9A=9A=9A 10.0.95.157/1508= =9A 22714=9A 3355506=9A 0=9A=9A=9A 0=9A=9A=20 2
04607:=9A=9A 2.048 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 0 queues (1 bucke= ts)=20 droptail
04004:=9A=9A 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (= 1 buckets)=20 droptail
=9A=9A=9A mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000<= br>BKT Prot=20 ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
= =9A 0=20 tcp=9A=9A=9A=9A=9A 10.0.95.202/1413= =9A=9A 212.118.48.188/443=9A=9A 1= 2504=9A=9A 584050=9A 0=9A=9A=9A 0=9A=9A=20 0
03044:=9A=9A 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 bucke= ts) droptail
=9A=9A=9A=20 mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source= =20 IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp= =9A=9A=9A=20 192.168.0.101/63963=9A 212.96.115.246/80=9A=9A=9A 63891=9A 42869= 42=9A 0=9A=9A=9A 0=9A=9A 0
04403:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=20 174.100.46.117/24750=9A=9A=9A= =9A 10.0.94.183/59747 422594 52432= 7547 36 42846=20 19464
03031:=9A=9A 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 b= uckets)=20 droptail
=9A=9A=9A mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000<= br>BKT Prot=20 ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
= =9A 0=20 tcp=9A=9A=9A 87.248.113.14/80=9A=9A= =9A=9A=9A=9A=9A 10.0.95.137/1064=9A= 49903 47094947=9A 0=9A=9A=9A 0=9A=20 31
00001:=9A=9A 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 0 queues (1 buck= ets)=20 droptail
03116:=9A=9A 2.048 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (= 1 buckets)=20 droptail
=9A=9A=9A mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000<= br>BKT Prot=20 ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
= =9A 0=20 udp=9A=9A=9A=9A=9A=9A 10.0.99.59/137= =9A=9A 255.255.255.255/137=9A=9A= =9A 246=9A=9A=9A 31643=9A 0=9A=9A=9A 0=9A=9A=20 0
03163:=9A=9A 2.048 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 bucke= ts) droptail
=9A=9A=9A=20 mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source= =20 IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp= =9A=9A=9A=20 95.52.104.220/12268=9A=9A=9A=9A = 10.0.99.111/51005 94962 115646351 = 18 24249=9A=9A 0
03630:=20 128.000 Kbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=20 10.0.100.21/62538=9A=9A=9A=9A 224.0.0.252/5355=9A 6185=9A=9A 609654= =9A 0=9A=9A=9A 0=9A=9A 0
04625:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=20 91.205.206.19/53=9A=9A=9A=9A=9A=9A= =9A=9A 10.0.97.32/63378 26461 26207= 214=9A 0=9A=9A=9A 0=9A 36
03146:=9A=20 64.000 Kbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =20 10.0.100.131/137=9A=9A 255.255.255.255/137=9A=9A 1004=9A=9A=9A 8880= 4=9A 0=9A=9A=9A 0=9A=9A 0
04022:=20 384.000 Kbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=20 10.0.99.229/59907=9A=9A=9A=9A 224.0.0.252/5355=9A 29899=9A 1564786=9A= 0=9A=9A=9A 0=9A=9A 0
03613:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=20 192.168.1.5/53=9A=9A=9A=9A=9A=9A=9A <= a href=3D"http://10.0.95.122/53807">10.0.95.122/53807 6745=9A 2758909= =9A 0=9A=9A=9A 0=9A 16
03103:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp=9A=9A=9A=20 91.205.206.19/51410=9A=9A=9A=9A= =9A 10.0.97.13/1100=9A 293362 333305= 449 27 36960=20 4205
03086:=9A=9A 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 bu= ckets)=20 droptail
=9A=9A=9A mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000<= br>BKT Prot=20 ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
= =9A 0=20 tcp=9A=9A=9A 192.168.7.135/2458= =9A=9A 218.160.180.19/80=9A=9A=9A = 307236 21753758=9A 0=9A=9A=9A 0=9A=9A=20 0
04608:=9A=9A 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 bucke= ts) droptail
=9A=9A=9A=20 mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source= =20 IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp= =9A=9A=9A=9A=9A=20 10.0.97.140/68=9A=9A=9A 255.255.255.255/67=9A=9A=9A 99719=9A 5703556= =9A 0=9A=9A=9A 0=9A=9A 0
03062:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp=9A=9A=9A=20 192.168.3.153/2856=9A=9A 87.105.184.222/443=9A=9A 74620=9A 420697= 7=9A 0=9A=9A=9A 0=9A 14
04007:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=20 91.205.206.19/53=9A=9A=9A=9A=9A=9A= =9A 10.0.96.107/61058 3456=9A 2181= 918=9A 0=9A=9A=9A 0=9A=9A 0
03047:=20 384.000 Kbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=20 91.205.206.19/53=9A=9A=9A=9A=9A=9A= =9A=9A 10.0.99.49/1030=9A 6038=9A 43= 16435=9A 0=9A=9A=9A 0=9A=9A 0
04604:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=9A=20 10.0.95.72/49830=9A=9A=9A=9A 224.0.0.252/5355=9A=9A=9A 78=9A=9A=9A 118= 78=9A 0=9A=9A=9A 0=9A=9A 0
04400:=9A=9A=20 2.048 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 icmp=9A=9A=9A=9A= =20 10.0.99.160/0=9A=9A=9A=9A=9A=9A=9A=9A = 192.168.1.5/0=9A=9A=9A=9A 566008 34519= 452=9A 0=9A=9A=9A 0=9A 23
00002:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 0 queues (1 buckets) droptail
03= 117:=9A=9A 2.048=20 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
=9A=9A= =9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp=9A=9A=9A=9A= =20 188.98.234.1/58185=9A=9A=9A=9A=9A= 10.0.99.59/1181=9A=9A 203=9A=9A=9A = 65199=9A 0=9A=9A=9A 0=9A=9A 0
03162:=9A=9A=20 2.048 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=20 10.0.99.111/137=9A=9A 255.255.255.255/137=9A=9A 66614 24282436=9A 0= =9A=9A=9A 0=9A=9A 0
03631:=20 128.000 Kbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=20 91.205.206.19/53=9A=9A=9A=9A=9A=9A= =9A 10.0.100.21/56825 8900=9A 1655= 969=9A 0=9A=9A=9A 0=9A=9A 8
04624:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=9A=20 10.0.97.32/63378=9A=9A 91.205.206.19/53=9A=9A=9A 22016=9A 7483789=9A 1= 1400=9A=9A 0
03147:=9A=20 64.000 Kbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp=9A=9A=9A=9A= =20 72.14.221.99/80=9A=9A=9A=9A=9A=9A 10.0.100.131/3892=9A 1907=9A=9A 5000= 83=9A 0=9A=9A=9A 0=9A=9A 0
04023:=20 384.000 Kbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=20 91.205.206.19/53=9A=9A=9A=9A=9A=9A= =9A 10.0.99.229/57016 50204 726506= 59 30 43937=20 456
03612:=9A=9A 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buc= kets)=20 droptail
=9A=9A=9A mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000<= br>BKT Prot=20 ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
= =9A 0=20 udp=9A=9A=9A=9A=9A 10.0.95.122/68=9A= =9A=9A 255.255.255.255/67=9A=9A= =9A 9401=9A=9A 840774=9A 0=9A=9A=9A 0=9A=9A=20 0
03102:=9A=9A 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 bucke= ts) droptail
=9A=9A=9A=20 mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source= =20 IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp= =9A=9A=9A=9A=9A=9A=20 10.0.97.13/137=9A=9A 255.255.255.255/137=9A=9A 196904 16029679=9A 0= =9A=9A=9A 0=9A 12
03087:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp=9A=9A=9A=9A= =9A=9A=20 72.20.5.58/80=9A=9A=9A=9A=9A=9A=9A=9A = 10.0.97.56/2470=9A 408715 465108360 = 46 49275=20 7684
04609:=9A=9A 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 bu= ckets)=20 droptail
=9A=9A=9A mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000<= br>BKT Prot=20 ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
= =9A 0=20 udp=9A=9A=9A 91.205.206.19/53=9A=9A= =9A=9A=9A=9A=9A 10.0.97.140/1046=9A= 111226 68734762=9A 0=9A=9A=9A 0=9A=9A=20 0
03063:=9A=9A 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 bucke= ts) droptail
=9A=9A=9A=20 mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source= =20 IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp= =9A=9A=20 209.85.129.102/80=9A=9A=9A=9A=9A= =9A=9A=9A 10.0.96.39/2868=9A 125501 = 165958671=9A 0=9A=9A=9A 0=9A=9A=20 1
04006:=9A=9A 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 bucke= ts) droptail
=9A=9A=9A=20 mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source= =20 IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp= =9A=9A=9A=9A=9A=20 10.0.96.107/61058=9A=9A 91.205.206.19/53=9A=9A=9A 3593=9A=9A 576429= =9A 0=9A=9A=9A 0=9A=9A 0
03046:=20 384.000 Kbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=9A=20 10.0.99.49/137=9A=9A 255.255.255.255/137=9A=9A 5707=9A=9A 978831=9A 0= =9A=9A=9A 0=9A=9A 0
04605:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=20 91.205.206.19/53=9A=9A=9A=9A=9A=9A= =9A=9A 10.0.95.72/52871=9A=9A 12=9A= =9A=9A=9A 4873=9A 0=9A=9A=9A 0=9A=9A 0
04401:=9A=9A=20 2.048 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 icmp=9A=9A=9A=9A= =20 192.168.1.5/0=9A=9A=9A=9A=9A=9A=9A=9A = 10.0.99.160/0=9A=9A=9A=9A 757375 21029= 8025=9A 0=9A=9A=9A 0 1795
03611:=20 384.000 Kbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp=9A=9A=9A=20 221.1.204.243/80=9A=9A=9A=9A=9A=9A= =9A=9A 10.0.99.79/1041=9A 34394 4166= 2588 46 65935=20 1044
03148:=9A=9A 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 bu= ckets)=20 droptail
=9A=9A=9A mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000<= br>BKT Prot=20 ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
= =9A 0=20 udp=9A=9A=9A=9A=9A 10.0.97.188/137= =9A=9A 255.255.255.255/137=9A=9A= 8621=9A 6018296=9A 0=9A=9A=9A 0=9A=9A=20 0
03131:=9A=9A 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 bucke= ts) droptail
=9A=9A=9A=20 mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source= =20 IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp= =9A=9A=9A=9A=20 93.184.71.27/80=9A=9A=9A=9A=9A=9A=9A= =9A 10.0.94.88/3565=9A 11093=9A 6775= 973=9A 0=9A=9A=9A 0=9A=9A 0
03114:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=9A=20 10.0.97.67/137=9A=9A 255.255.255.255/137=9A=9A 207018 132317142=9A 0= =9A=9A=9A 0=9A=9A 0
04614:=9A=9A=20 2.048 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp=9A=9A=9A=9A= =20 168.192.7.36/3560=9A=9A=9A=9A=9A= =9A 89.74.9.73/443=9A=9A 10529=9A 333= 1840=9A 0=9A=9A=9A 0=9A=9A 0
04016:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=20 10.0.94.185/2376=9A 239.255.255.250/1900=9A 123010 36074549=9A 5 3= 100=9A=9A 0
03097:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp=9A=9A=9A=9A= =20 91.189.80.96/2710=9A=9A=9A=9A=9A <= a href=3D"http://10.0.97.169/1095">10.0.97.169/1095=9A 32783=9A 1673544= =9A 0=9A=9A=9A 0=9A=9A 0
04602:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=20 10.0.97.216/1044=9A=9A 92.112.107.205/38661 209085 179308298=9A 0= =9A=9A=9A 0=9A 60
03080:=20 384.000 Kbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=9A=20 10.0.99.58/137=9A=9A 255.255.255.255/137=9A=9A 36699=9A 2592903=9A 0= =9A=9A=9A 0=9A=9A 0
04406:=9A=9A=20 2.048 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=20 10.0.100.98/56642 239.255.255.250/3702=9A 5097=9A=9A 921260=9A 0= =9A=9A=9A 0=9A=9A 0
03056:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=9A=20 10.0.94.81/137=9A=9A 255.255.255.255/137=9A=9A 3679=9A=9A 737163=9A 0= =9A=9A=9A 0=9A=9A 0
03041:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=20 91.205.206.19/53=9A=9A=9A=9A=9A=9A= =9A=9A=9A 10.0.95.1/1027=9A 13238=9A = 1335805=9A 0=9A=9A=9A 0=9A=9A 0
04001:=9A=9A=20 2.048 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=20 91.205.206.19/53=9A=9A=9A=9A=9A=9A= =9A 10.0.100.35/54218 590902 77354= 9213 28 41440=20 8627
03610: 384.000 Kbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 bucket= s)=20 droptail
=9A=9A=9A mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000<= br>BKT Prot=20 ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
= =9A 0=20 udp=9A=9A=9A=9A=9A=9A 10.0.99.79/68=9A= =9A=9A 255.255.255.255/67=9A=9A= =9A 23222=9A 2296047=9A 0=9A=9A=9A 0=9A=9A=20 0
03149:=9A=9A 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 bucke= ts) droptail
=9A=9A=9A=20 mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source= =20 IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp= =9A=9A=9A=20 94.100.178.25/110=9A=9A=9A=9A=9A= =9A 10.0.97.188/1766=9A 4842=9A 369= 7358=9A 0=9A=9A=9A 0=9A=9A 0
03130:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=9A=20 10.0.94.88/137=9A=9A 255.255.255.255/137=9A=9A 10342=9A 1105429=9A 0= =9A=9A=9A 0=9A=9A 0
03115:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp=9A=9A=9A=9A= =20 188.16.87.85/59039=9A=9A=9A=9A=9A= 10.0.97.67/61423 218223 196119227= =9A 1 1396=9A=20 12
04615:=9A=9A 2.048 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buck= ets)=20 droptail
=9A=9A=9A mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000<= br>BKT Prot=20 ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
= =9A 0=20 tcp=9A=9A 81.142.101.241/32693= =9A=9A=9A 10.0.100.170/3570=9A 119= 83=9A 7379671=9A 0=9A=9A=9A 0=9A=20 25
04017:=9A=9A 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buck= ets)=20 droptail
=9A=9A=9A mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000<= br>BKT Prot=20 ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
= =9A 0=20 udp=9A=9A=9A 91.205.206.19/53=9A=9A= =9A=9A=9A=9A=9A 10.0.94.185/64211 = 149094 165068195=9A 0=9A=9A=9A 0=9A=9A=20 0
03096:=9A=9A 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 bucke= ts) droptail
=9A=9A=9A=20 mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source= =20 IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp= =9A=9A=9A=9A=9A=20 10.0.97.169/137=9A=9A 255.255.255.255/137=9A=9A 54272 59507302=9A 0= =9A=9A=9A 0=9A=9A 0
04603:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=20 92.112.107.205/38661=9A=9A=9A= =9A 10.0.97.216/1044=9A 147925=9A 8= 737976=9A 0=9A=9A=9A 0=9A=9A 0
03081:=20 384.000 Kbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=20 91.205.206.19/53=9A=9A=9A=9A=9A=9A= =9A=9A 10.0.99.58/1047=9A 52588 6676= 9217=9A 0=9A=9A=9A 0=9A 93
04407:=9A=9A=20 2.048 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=20 192.168.1.5/53=9A=9A=9A=9A=9A=9A=9A <= a href=3D"http://10.0.100.98/56311">10.0.100.98/56311 5528=9A 3825662= =9A 0=9A=9A=9A 0=9A 11
03057:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp=9A=9A=9A=20 80.190.154.74/80=9A=9A=9A=9A=9A=9A= =9A=9A 10.0.94.81/7104=9A 4397=9A 39= 92559=9A 0=9A=9A=9A 0=9A=9A 0
03040:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=9A=9A=20 10.0.95.1/137=9A=9A 255.255.255.255/137=9A=9A 17713=9A 1097320=9A 0=9A= =9A=9A 0=9A=9A 0
04000:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp=9A=9A=9A=9A= =20 192.168.3.89/1451=9A=9A=9A 212.40.34.149/80=9A=9A=9A 358270 22623280= =9A 0=9A=9A=9A 0=9A=9A 0
03129:=9A=9A=20 2.048 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=20 91.205.206.19/53=9A=9A=9A=9A=9A=9A= =9A 10.0.99.118/1033=9A 7827=9A 801= 3549=9A 0=9A=9A=9A 0 371
03150:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=9A=9A=20 10.0.95.7/1575=9A 239.255.255.250/1900=9A 54861=9A 4481144=9A 0=9A= =9A=9A 0=9A=9A 0
03099:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp=9A=9A=20 213.236.208.95/80=9A=9A=9A=9A=9A= =9A=9A 10.0.96.117/1136=9A=9A 731= =9A=9A 263656=9A 0=9A=9A=9A 0=9A=9A 0
03112:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=9A=20 10.0.95.65/137=9A=9A 255.255.255.255/137=9A=9A 11064 12934789=9A 0=9A= =9A=9A 0=9A=9A 0
03009:=20 384.000 Kbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=20 91.205.206.19/53=9A=9A=9A=9A=9A=9A= =9A 10.0.99.136/52784 2864=9A 1547= 945=9A 0=9A=9A=9A 0=9A=9A 0
04612:=20 384.000 Kbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp=9A=9A=9A=20 192.168.7.136/1031=9A=9A=9A=9A 65.55.52.148/443=9A=9A 23009=9A 41101= 73=9A 0=9A=9A=9A 0=9A=9A 0
03082:=20 384.000 Kbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =20 10.0.100.245/4042=9A=9A=9A 91.205.206.19/53=9A=9A=9A 30838=9A 2656816= =9A 0=9A=9A=9A 0=9A=9A 0
03058:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp=9A=9A=9A=20 192.168.3.122/3454=9A=9A 213.196.229.88/12962 19447=9A 3080195= =9A 0=9A=9A=9A 0=9A=9A 0
03043:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=20 213.242.239.35/25121=9A=9A=9A= =9A=9A=9A 10.0.97.8/10554 153121 180= 09070=9A 0=9A=9A=9A 0=9A=9A=20 0
04003:=9A 64.000 Kbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 0 queues (1 buckets= )=20 droptail
04404:=9A=9A 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (= 1 buckets)=20 droptail
=9A=9A=9A mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000<= br>BKT Prot=20 ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
= =9A 0=20 udp=9A=9A=9A=9A=9A=9A 10.0.95.55/2049
=9A=9A=9A 91.205.206.19/53=9A=9A= =9A=9A=9A=9A 4=9A=9A=9A=9A=9A 270=9A 0=9A=9A=9A 0=9A=9A=20 0
04600:=9A=9A 2.048 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 bucke= ts) droptail
=9A=9A=9A=20 mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source= =20 IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp= =9A=9A=9A=9A=20 192.168.1.14/9744=9A=9A 94.100.179.197/80=9A=9A=9A 39895=9A 4776343= =9A 0=9A=9A=9A 0=9A=9A 0
03128:=9A=9A=20 2.048 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=20 10.0.99.118/1033=9A=9A=9A 91.205.206.19/53=9A=9A=9A 6524=9A=9A 67749= 0=9A 0=9A=9A=9A 0=9A=9A 0
03151:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=20 192.168.1.3/53=9A=9A=9A=9A=9A=9A=9A= =9A=9A 10.0.95.7/1073=9A 63501 791344= 62=9A 0=9A=9A=9A 0=9A=9A 9
03098:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp=9A=9A=9A=9A= =9A=20 10.0.96.117/1136=9A=9A 213.236.208.95/80=9A=9A=9A=9A 788=9A=9A 139986= =9A 0=9A=9A=9A 0=9A=9A 0
03113:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp=9A=9A=20 89.188.115.202/80=9A=9A=9A=9A=9A= =9A=9A=9A 10.0.95.65/3731=9A 7111=9A= =9A 360152=9A 0=9A=9A=9A 0=9A=9A 0
03008:=20 384.000 Kbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=20 10.0.99.136/52784=9A=9A 91.205.206.19/53=9A=9A=9A 3541=9A=9A 649094= =9A 0=9A=9A=9A 0=9A=9A 0
04613:=20 384.000 Kbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=20 91.205.206.19/53=9A=9A=9A=9A=9A=9A= =9A 10.0.99.195/63503 26198 225204= 67=9A 0=9A=9A=9A 0=9A 94
03083:=20 384.000 Kbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=20 91.205.206.19/53=9A=9A=9A=9A=9A=9A = 10.0.100.245/4042=9A 29215 3289457= 9=9A 0=9A=9A=9A 0 462
03059:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp=9A=9A=9A=20 72.14.221.103/80=9A=9A=9A=9A=9A=9A= =9A 10.0.96.132/3485=9A 22047 20116= 818=9A 0=9A=9A=9A 0=9A=9A 2
03042:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=9A=9A=20 10.0.97.8/137=9A=9A 255.255.255.255/137=9A=9A 237648 286877975 19 2210= 0=9A=9A 3
04002:=9A=20 64.000 Kbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 igmp=9A=9A=9A=20 10.0.100.233/0=9A=9A=9A=9A 239.255.255.250/0=9A=9A=9A=9A=9A=9A=9A 2=9A= =9A=9A=9A=9A=9A 56=9A 0=9A=9A=9A 0=9A=9A 0
04405:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=20 91.205.206.19/53=9A=9A=9A=9A=9A=9A= =9A=9A 10.0.95.55/2049=9A=9A=9A=9A 4= =9A=9A=9A=9A=9A 394=9A 0=9A=9A=9A 0=9A=9A 0
04601:=9A=9A=20 2.048 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp=9A=9A=20 94.100.179.197/80=9A=9A=9A=9A=9A= =9A 10.0.100.199/9753=9A 57248 634= 20309=9A 0=9A=9A=9A 0=20 302
04028:=9A=9A 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buc= kets)=20 droptail
=9A=9A=9A mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000<= br>BKT Prot=20 ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
= =9A 0=20 udp=9A=9A=9A=9A=9A=9A 10.0.96.32/49646<= /a>=9A=9A=9A=9A 224.0.0.252/5355=9A= 5483=9A=9A 344235=9A 0=9A=9A=9A 0=9A=9A=20 0
03153:=9A=9A 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 0 queues (1 bucke= ts)=20 droptail
03637:=9A=9A 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (= 1 buckets)=20 droptail
=9A=9A=9A mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000<= br>BKT Prot=20 ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
= =9A 0=20 tcp=9A=9A 207.68.183.124/80=9A=9A= =9A=9A=9A=9A=9A 10.0.97.172/49158 = 23266 33355420=9A 3 4440=9A=20 39
03068:=9A=9A 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buck= ets)=20 droptail
=9A=9A=9A mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000<= br>BKT Prot=20 ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
= =9A 0=20 udp=9A=9A=9A=9A=9A=9A 10.0.95.96/63293<= /a>=9A=9A=9A=9A 192.168.1.3/53=9A=9A= =9A 4903=9A=9A 649933=9A 0=9A=9A=9A 0=9A=9A=20 0
03136:=9A=9A 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 bucke= ts) droptail
=9A=9A=9A=20 mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source= =20 IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp= =9A=9A=9A=9A=9A=9A=20 10.0.97.64/137=9A=9A 255.255.255.255/137=9A=9A 7704=9A=9A 399169=9A 0= =9A=9A=9A 0=9A=9A 0
03127:=20 384.000 Kbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp=9A=9A=9A=9A= =20 91.207.4.106/80=9A=9A=9A=9A=9A=9A=9A= 10.0.99.200/3400=9A 74878=9A 65595= 22=9A 0=9A=9A=9A 0=9A=9A 0
04618:=9A=9A=20 2.048 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp=9A=9A=9A=9A= =20 192.168.7.54/4656=9A=9A 92.237.100.124/31174 1336=9A=9A 168941=9A= 0=9A=9A=9A 0=9A=9A 0
03110:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=20 10.0.96.186/68=9A=9A=9A 255.255.255.255/67=9A=9A=9A 254036 33466647=9A= 0=9A=9A=9A 0=9A=9A 0
03093:=9A=9A=20 2.048 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=20 91.205.206.19/53=9A=9A=9A=9A=9A=9A= =9A 10.0.100.60/58256 8862=9A 2545= 480=9A 0=9A=9A=9A 0=9A=9A 0
04410:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=20 10.0.96.247/68=9A=9A=9A 255.255.255.255/67=9A=9A=9A 1173=9A=9A 267691= =9A 0=9A=9A=9A 0=9A=9A 0
04013:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp=9A=9A=9A=9A= =20 77.37.171.86/443=9A=9A=9A=9A=9A=9A = 10.0.96.162/3903=9A 17249=9A 421657= 5=9A 0=9A=9A=9A 0=9A=9A 0
03607:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 0 queues (1 buckets) droptail
03= 053:=9A=9A 2.048=20 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
=9A=9A= =9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 icmp=9A=9A=9A=20 10.0.100.119/0=9A=9A=9A=9A=9A=9A=9A <= a href=3D"http://10.0.100.119/0">10.0.100.119/0=9A=9A=9A=9A 8498=9A 679= 1402=9A 0=9A=9A=9A 0=9A 22
03038:=20 384.000 Kbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=9A=20 10.0.99.55/137=9A=9A 255.255.255.255/137=9A=9A 25363=9A 2011427=9A 0= =9A=9A=9A 0=9A=9A 0
04029:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=20 91.205.206.19/53=9A=9A=9A=9A=9A=9A= =9A=9A 10.0.96.32/55346 9056 125698= 36 45 61365=9A 63
03152:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=9A=20 10.0.94.59/137=9A=9A 255.255.255.255/137=9A=9A=9A=9A 24=9A=9A=9A=9A 3= 033=9A 0=9A=9A=9A 0=9A=9A 0
03636:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=20 10.0.97.172/55022=9A=9A 91.205.206.19/53=9A=9A=9A 13201=9A=9A 771385= =9A 0=9A=9A=9A 0=9A=9A 0
03069:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=20 192.168.1.3/53=9A=9A=9A=9A=9A=9A=9A= =9A 10.0.95.96/63293 5868=9A 434319= 1=9A 0=9A=9A=9A 0 140
03137:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp=9A=9A=9A=20 95.211.81.129/2106=9A=9A=9A=9A=9A= =9A 10.0.97.64/1039=9A 7615=9A 18360= 16=9A 0=9A=9A=9A 0=9A=9A 0
03126:=20 384.000 Kbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=20 10.0.99.200/137=9A=9A 255.255.255.255/137=9A=9A 76248 10281497=9A 0= =9A=9A=9A 0=9A=9A 0
04619:=9A=9A=20 2.048 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp=9A=9A=20 92.237.100.124/80=9A=9A=9A=9A=9A= =9A 10.0.100.115/4667=9A 1011=9A= =9A 129754=9A 0=9A=9A=9A 0=9A=9A 0
03111:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp=9A=9A=9A=20 87.244.129.24/23097=9A=9A=9A=9A = 10.0.96.186/4602=9A 319846 39490787= 6 33 43918=20 851
03092:=9A=9A 2.048 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buc= kets)=20 droptail
=9A=9A=9A mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000<= br>BKT Prot=20 ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
= =9A 0=20 udp=9A=9A=9A 192.168.3.115/64521= =9A=9A=9A 81.31.42.131/53=9A=9A=9A 9= 356=9A 1277032=9A 0=9A=9A=9A 0=9A=9A=20 0
04411:=9A=9A 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 bucke= ts) droptail
=9A=9A=9A=20 mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source= =20 IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp= =9A=9A=9A=20 91.205.206.19/53=9A=9A=9A=9A=9A=9A= =9A 10.0.96.247/62013 1151=9A=9A 7= 74200=9A 0=9A=9A=9A 0=9A=9A 0
04012:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=20 10.0.96.162/2522=9A=9A=9A 55.52.141.173/23671 21380=9A 3652757=9A= 0=9A=9A=9A 0=9A=9A 0
03606:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 0 queues (1 buckets) droptail
03= 052:=9A=9A 2.048=20 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
=9A=9A= =9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 icmp=9A=9A=9A=20 10.0.100.119/0=9A=9A=9A=9A=9A=9A=9A <= a href=3D"http://10.0.100.119/0">10.0.100.119/0=9A=9A=9A=9A 6190=9A=9A = 888434=9A 0=9A=9A=9A 0=9A=9A 0
03039:=20 384.000 Kbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp=9A=9A=9A=9A= =9A=20 212.53.35.4/11024=9A=9A=9A=9A=9A <= a href=3D"http://10.0.99.55/4366">10.0.99.55/4366=9A 42306 54363062=9A = 0=9A=9A=9A 0=9A 69
03021:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp=9A=9A=9A=20 89.204.94.251/33225=9A=9A=9A=9A = 10.0.97.209/63879 21942 12944771= =9A 0=9A=9A=9A 0 143
03155:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=20 91.205.206.19/53=9A=9A=9A=9A=9A=9A= =9A 10.0.97.150/52174 5235=9A 4799= 257=9A 0=9A=9A=9A 0=9A 52
04616:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp=9A=9A=9A=9A= =20 192.168.7.94/1417=9A=9A=9A=9A 149.20.56.32/80=9A=9A=9A 179642 75276327= =9A 4 5920=9A=9A 0
03138:=9A=9A=20 2.048 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=20 91.207.211.16/2050=9A=9A=9A 91.205.206.19/53=9A=9A=9A=9A=9A 42=9A=9A= =9A=9A 2568=9A 0=9A=9A=9A 0=9A=9A 0
03108:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=20 10.0.94.243/137=9A=9A 255.255.255.255/137=9A=9A 135607=9A 8833682=9A= 0=9A=9A=9A 0=9A=9A 0
03095:=9A=9A=20 2.048 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=20 91.205.206.19/53=9A=9A=9A=9A=9A=9A= =9A 10.0.100.38/1464=9A 7458=9A 647= 8667=9A 0=9A=9A=9A 0=9A=9A 0
04015:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp=9A=9A=9A=9A= =20 24.60.95.205/17967=9A=9A=9A=9A 10.0.95.237/1613=9A 50787 67125061=9A= 0=9A=9A=9A 0=9A=9A 0
03078:=20 384.000 Kbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=20 10.0.99.138/137=9A=9A 255.255.255.255/137=9A=9A 90264 17269075=9A 0= =9A=9A=9A 0=9A=9A 0
04408:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=9A=20 10.0.94.10/1035=9A=9A=9A=9A=9A=9A 195.5.62.1/53=9A=9A=9A 5808=9A 1299286= =9A 0=9A=9A=9A 0=9A=9A 0
03070:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=20 10.0.94.215/4424=9A 239.255.255.250/1900=9A 461364 296593091=9A 8 = 3032 710
03055:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp=9A=9A=9A=20 129.215.14.66/1337=9A=9A=9A=9A=9A= =9A 10.0.95.53/1327=9A 29518 1504095= 8=9A 0=9A=9A=9A 0=9A=9A 0
03036:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=9A=20 10.0.96.51/68=9A=9A=9A 255.255.255.255/67=9A=9A=9A 531625 498693954 39 = 36881=20 11716
03605:=9A=9A 2.048 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 b= uckets)=20 droptail
=9A=9A=9A mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000<= br>BKT Prot=20 ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
= =9A 0=20 icmp=9A=9A=9A=9A 192.168.1.5/0=9A=9A= =9A=9A=9A=9A=9A 10.0.100.137/0=9A=9A= =9A=9A 4408=9A=9A 335920=9A 0=9A=9A=9A 0=9A=9A=20 0
03020:=9A=9A 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 bucke= ts) droptail
=9A=9A=9A=20 mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source= =20 IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp= =9A=9A=9A=9A=9A=20 10.0.97.209/63879=9A=9A 89.204.94.251/33225 25239 12601570=9A 0=9A= =9A=9A 0=9A=9A 0
03154:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=20 192.168.1.215/123=9A=9A=9A 207.46.232.182/123=9A=9A 4506=9A=9A 7494= 57=9A 0=9A=9A=9A 0=9A=9A 0
04617:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=20 91.205.206.19/53=9A=9A=9A=9A=9A=9A= =9A 10.0.96.125/1025=9A 189949 1748= 42357 22 24640=20 3339
03139:=9A=9A 2.048 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 bu= ckets)=20 droptail
=9A=9A=9A mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000<= br>BKT Prot=20 ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
= =9A 0=20 udp=9A=9A=9A 91.205.206.19/53=9A=9A= =9A=9A=9A 91.207.211.16/2050=9A= =9A=9A 25=9A=9A=9A=9A 1843=9A 0=9A=9A=9A 0=9A=9A=20 0
03109:=9A=9A 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 bucke= ts) droptail
=9A=9A=9A=20 mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source= =20 IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp= =9A=9A=9A=9A=9A=20 192.168.1.3/53=9A=9A=9A=9A=9A=9A=9A <= a href=3D"http://10.0.94.243/64420">10.0.94.243/64420 177066 215506499= =9A 0=9A=9A=9A 0 127
03094:=9A=9A=20 2.048 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=20 10.0.100.38/137=9A=9A 255.255.255.255/137=9A=9A 6347=9A 1018291=9A 0= =9A=9A=9A 0=9A=9A 0
04014:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp=9A=9A=9A=20 192.168.3.138/1602=9A=9A 216.188.226.88/80=9A=9A=9A 41923=9A 28116= 03=9A 0=9A=9A=9A 0=9A=9A 0
03079:=20 384.000 Kbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=20 207.46.232.182/123=9A=9A=9A=9A=9A= =9A 10.0.99.138/123=9A=9A 122776 132= 736784 27 30916=20 387
04409:=9A=9A 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buc= kets)=20 droptail
=9A=9A=9A mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000<= br>BKT Prot=20 ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
= =9A 0=20 udp=9A=9A=9A=9A=9A=9A 195.5.62.1/53=9A= =9A=9A=9A=9A=9A=9A=9A 10.0.96.20/1036
=9A 6375=9A 4026404=9A 0=9A=9A=9A 0=9A=9A=20 0
03071:=9A=9A 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 bucke= ts) droptail
=9A=9A=9A=20 mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source= =20 IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp= =9A=9A=9A=9A=9A=20
79.97.185.5/51241=9A=9A=9A=9A 10.0.94.215/4429=9A 505504 471866311 21= 16332=20 4265
03054:=9A=9A 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 bu= ckets)=20 droptail
=9A=9A=9A mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000<= br>BKT Prot=20 ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
= =9A 0=20 udp=9A=9A=9A=9A=9A=9A 10.0.95.53/137= =9A=9A 255.255.255.255/137=9A=9A= 26973=9A 1461841=9A 0=9A=9A=9A 0=9A=20 30
03037:=9A=9A 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buck= ets)=20 droptail
=9A=9A=9A mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000<= br>BKT Prot=20 ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
= =9A 0=20 udp=9A=9A=9A 91.205.206.19/53=9A=9A= =9A=9A=9A=9A=9A=9A 10.0.96.51/3617= =9A 441673 243708662=9A 0=9A=9A=9A 0=9A=9A=20 0
03604:=9A=9A 2.048 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 bucke= ts) droptail
=9A=9A=9A=20 mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source= =20 IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 icmp= =9A=9A=9A=20 10.0.100.137/0=9A=9A=9A=9A=9A=9A=9A= =9A 192.168.1.5/0=9A=9A=9A=9A 21470 23= 683560=9A 0=9A=9A=9A 0=9A=9A 0
03072:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=20 91.207.211.21/137=9A=9A 255.255.255.255/137=9A=9A=9A 142=9A=9A=9A = 20957=9A 0=9A=9A=9A 0=9A=9A 0
04024:=20 384.000 Kbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp=9A=9A=9A=9A= =20 192.168.3.42/1047=9A=9A=9A=9A 91.10.234.83/443=9A=9A=9A 353=9A=9A=9A = 40528=9A 0=9A=9A=9A 0=9A=9A 0
03633:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=20 85.127.231.33/3949=9A=9A=9A=9A=9A= 10.0.94.221/30229 88444 66439658= =9A 4 4480=9A=9A 0
03157:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp=9A=9A=9A=20 90.183.101.15/80=9A=9A=9A=9A=9A=9A= =9A=9A 10.0.96.58/1963=9A 21521 2954= 3410=9A 0=9A=9A=9A 0=9A=9A 0
04622:=20 384.000 Kbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =20 10.0.100.101/64548=9A=9A 91.205.206.19/53=9A=9A=9A 1812=9A=9A 23204= 6=9A 0=9A=9A=9A 0=9A=9A 0
03140:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=9A=20 10.0.96.11/137=9A=9A 255.255.255.255/137=9A=9A 15526=9A 1341768=9A 0= =9A=9A=9A 0=9A=9A 0
03123:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=20 192.168.1.3/53=9A=9A=9A=9A=9A=9A=9A <= a href=3D"http://10.0.95.177/1026">10.0.95.177/1026=9A 1263=9A=9A 17795= 5=9A 0=9A=9A=9A 0=9A=9A 0
03106:=9A=9A=20 2.048 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=9A=20 10.0.99.82/137=9A=9A 255.255.255.255/137=9A=9A 10617=9A=9A 569156=9A = 0=9A=9A=9A 0=9A=9A 0
03089:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=20 91.205.206.19/53=9A=9A=9A=9A=9A=9A= =9A=9A 10.0.96.88/53236 81710=9A 55= 42587=9A 0=9A=9A=9A 0=9A=9A 0
03064:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=9A=20 10.0.97.66/137=9A=9A 255.255.255.255/137=9A=9A 23865 14264507=9A 0=9A= =9A=9A 0=9A=9A 0
04009:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp=9A=20 212.120.229.183/52503=9A=9A=9A= =9A 10.0.95.108/1799=9A 435608 4987= 44333=9A 2 2960=20 15122
03049:=9A=9A 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 b= uckets)=20 droptail
=9A=9A=9A mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000<= br>BKT Prot=20 ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
= =9A 0=20 tcp=9A=9A=9A=9A 64.12.200.89/5190= =9A=9A=9A=9A=9A 10.0.95.158/1064=9A= 125421 168876197=9A 0=9A=9A=9A 0=9A=20 52
03034:=9A=9A 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buck= ets)=20 droptail
=9A=9A=9A mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000<= br>BKT Prot=20 ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
= =9A 0=20 udp=9A=9A=9A=9A=9A 10.0.97.252/68=9A= =9A=9A 255.255.255.255/67=9A=9A= =9A 428878 491880835 13 16792=20 2359
03073:=9A=9A 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 bu= ckets)=20 droptail
=9A=9A=9A mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000<= br>BKT Prot=20 ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
= =9A 0=20 icmp=9A=9A 91.207.204.83/0=9A=9A=9A= =9A=9A=9A 91.207.211.21/0=9A=9A=9A= =9A=9A 138=9A=9A=9A 81462=9A 0=9A=9A=9A 0=9A=9A=20 0
04025: 384.000 Kbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) = droptail
=9A=9A=9A=20 mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source= =20 IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp= =9A=9A=9A=20 91.205.206.19/53=9A=9A=9A=9A=9A=9A= =9A 10.0.100.79/1025=9A=9A 288=9A= =9A=9A 61473=9A 0=9A=9A=9A 0=9A=9A 0
03632:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=20 10.0.94.221/30229=9A=9A 85.127.231.33/3949=9A 93060 52350948=9A 0= =9A=9A=9A 0=9A=9A 0
03156:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=9A=20 10.0.96.58/137=9A=9A 255.255.255.255/137=9A=9A 12934=9A=9A 596496=9A = 0=9A=9A=9A 0=9A=9A 0
04623:=20 384.000 Kbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=20 91.205.206.19/53=9A=9A=9A=9A=9A=9A = 10.0.100.101/64548 1709=9A=9A 728= 817=9A 0=9A=9A=9A 0=9A=9A 0
03141:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 icmp=9A=9A=9A=20 208.43.153.2/0=9A=9A=9A=9A=9A=9A=9A= =9A=9A 10.0.96.11/0=9A=9A=9A=9A 24218 3= 0083348=9A 0=9A=9A=9A 0=9A 35
03122:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp=9A=9A=9A=20 192.168.3.231/1055=9A=9A=9A=9A 24.63.176.41/3175=9A 2128=9A=9A 1560= 36=9A 0=9A=9A=9A 0=9A=9A 0
03107:=9A=9A=20 2.048 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp=9A=9A=9A=20 92.244.134.36/48944=9A=9A=9A=9A= =9A 10.0.99.82/62084 12975=9A 19923= 39=9A 0=9A=9A=9A 0=9A=9A 0
03088:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=9A=20 10.0.96.88/68=9A=9A=9A 255.255.255.255/67=9A=9A=9A 83770=9A 4435548=9A = 0=9A=9A=9A 0 116
03065:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=20 91.205.206.19/53=9A=9A=9A=9A=9A=9A= =9A=9A 10.0.97.66/58153 15313=9A 51= 00844=9A 0=9A=9A=9A 0=9A=9A 0
04008:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp=9A=9A=9A=9A= =9A=20 10.0.95.108/1799=9A 212.120.229.183/52503 338241 49051642=9A 0=9A= =9A=9A 0=9A=9A 0
03048:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=20 10.0.95.158/68=9A=9A=9A 255.255.255.255/67=9A=9A=9A 69278=9A 3764647= =9A 0=9A=9A=9A 0=9A=9A 0
03035:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=20 62.205.236.20/13263=9A=9A=9A=9A = 10.0.97.252/64601 285381 90591637= =9A 0=9A=9A=9A 0=9A=9A 1
03017:=20 384.000 Kbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp=9A=9A=9A=20 99.249.82.105/80=9A=9A=9A=9A=9A=9A = 10.0.100.211/2564=9A=9A=9A 81=9A= =9A=9A 12108=9A 0=9A=9A=9A 0=9A=9A 0
04026:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp=9A=9A=9A=9A= =9A=20 10.0.95.218/4921=9A 153.102.113.117/19840 15007=9A 6136216=9A 0= =9A=9A=9A 0=9A=9A 0
03635:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 icmp=9A=9A=20 212.1.105.107/0=9A=9A=9A=9A=9A=9A=9A= =9A=9A 10.0.97.73/0=9A=9A=9A=9A=9A 535= =9A=9A 193208=9A 0=9A=9A=9A 0=9A=9A 0
03159:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp=9A=9A=9A=20 163.19.218.28/36728=9A=9A=9A=9A = 10.0.97.234/49485 7088=9A 3482791= =9A 0=9A=9A=9A 0=9A=9A 0
03142:=20 384.000 Kbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =20 10.0.100.147/1099=9A 239.255.255.250/1900=9A 26907=9A 2005706=9A = 0=9A=9A=9A 0=9A=9A 0
03121:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =20 93.66.71.252/39894=9A=9A=9A=9A=9A= =9A 10.0.96.5/35042 256955 274439627= =9A 6 7346=20 758
04620:=9A=9A 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buc= kets)=20 droptail
=9A=9A=9A mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000<= br>BKT Prot=20 ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
= =9A 0=20 udp=9A=9A=9A=9A=9A=9A 10.0.97.51/63370<= /a>=9A=9A 91.205.206.19/53=9A=9A=9A= 18985=9A 1605280=9A 0=9A=9A=9A 0=9A=9A=20 0
03104:=9A=9A 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 bucke= ts) droptail
=9A=9A=9A=20 mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source= =20 IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 icmp= =9A=9A=9A=9A=20 10.0.96.187/0=9A=9A=9A=9A=9A 192.168.40.147/0=9A=9A=9A=9A 97755=9A 4599= 119=9A 0=9A=9A=9A 0=9A=9A 0
03091:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp=9A=9A=9A=20 193.108.170.1/110=9A=9A=9A=9A=9A= =9A 10.0.96.178/2058=9A 13762 12454= 883=9A 0=9A=9A=9A 0=9A=9A 0
04011:=9A=20 10.240 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=20 91.205.206.19/53=9A=9A=9A=9A=9A=9A = 10.0.100.174/53562 5904=9A 586389= 6=9A 0=9A=9A=9A 0=9A 19
03074:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=9A=20 10.0.96.44/137=9A=9A 255.255.255.255/137=9A=9A 20606=9A 2593867=9A 0= =9A=9A=9A 0=9A=9A 6
03066:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=20 10.0.95.213/68=9A=9A=9A 255.255.255.255/67=9A=9A=9A 54989 16102076=9A = 0=9A=9A=9A 0=9A=9A 0
03051:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=20 91.205.206.19/53=9A=9A=9A=9A=9A 91.207.211.17/1025=9A=9A=9A 93=9A=9A= =9A=9A 6024=9A 0=9A=9A=9A 0=9A=9A 0
03032:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=20 10.0.95.247/40298=9A=9A=9A 95.57.153.37/64237 282373 174869068=9A 2= 1152=9A=9A 0
03601:=9A=9A=20 2.048 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp=9A=9A=9A=9A= =20 74.125.87.18/80=9A=9A=9A=9A=9A=9A 10.0.100.134/2576=9A 673714 63643337= 9 19 22784=20 1965
03016: 384.000 Kbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 bucket= s)=20 droptail
=9A=9A=9A mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000<= br>BKT Prot=20 ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
= =9A 0=20 udp=9A=9A=9A=9A 10.0.100.211/137=9A= =9A 255.255.255.255/137=9A=9A=9A= 118=9A=9A=9A 18691=9A 0=9A=9A=9A 0=9A=9A=20 0
04027:=9A=9A 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 bucke= ts) droptail
=9A=9A=9A=20 mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source= =20 IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp= =9A=9A=9A=9A=9A=20 98.1.75.163/19248=9A=9A=9A=9A 10.0.95.218/4922=9A 14275 10751781=9A 0= =9A=9A=9A 0=9A=9A 0
03634:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=9A=20 10.0.97.73/1035=9A 239.255.255.250/1900=9A=9A 597=9A=9A=9A 91268=9A= 0=9A=9A=9A 0=9A=9A 0
03158:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=20 10.0.97.234/137=9A=9A 255.255.255.255/137=9A=9A 6922=9A=9A 390084=9A= 0=9A=9A=9A 0=9A=9A 0
03143:=20 384.000 Kbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp=9A=9A=9A=9A= =9A=9A=20 81.19.70.1/80=9A=9A=9A=9A=9A=9A 10.0.100.147/1104=9A 38528 43549114 20 2= 4581=9A 54
03120:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =9A=9A=9A=20 10.0.96.5/35042=9A=9A=9A 82.0.123.197/41656 169096 27322663=9A 0=9A= =9A=9A 0=9A=9A 0
04621:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=20 91.205.206.19/53=9A=9A=9A=9A=9A=9A= =9A=9A 10.0.97.51/63370 27900 23917= 035=9A 0=9A=9A=9A 0=9A 36
03105:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=20 91.205.206.19/53=9A=9A=9A=9A=9A=9A= =9A 10.0.96.187/5136=9A 159096 2203= 68420=9A 0=9A=9A=9A 0=9A=9A=20 0
03090:=9A=9A 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 bucke= ts) droptail
=9A=9A=9A=20 mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source= =20 IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp= =9A=9A=9A=9A=9A=20 10.0.96.178/68=9A=9A=9A 255.255.255.255/67=9A=9A=9A 12004=9A 1747483= =9A 0=9A=9A=9A 0=9A=9A 0
04010:=9A=20 10.240 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp=9A=9A=9A=9A= =20 10.0.100.174/57618=9A=9A=9A=9A 224.0.0.252/5355=9A 4810=9A=9A 581234= =9A 0=9A=9A=9A 0=9A=9A 0
03075:=9A=9A=20 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buckets) droptail
= =9A=9A=9A mask: 0x00=20 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source IP/port____= =20 ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp=9A=9A=20 131.111.33.242/63891=9A=9A=9A= =9A=9A 10.0.96.44/1079=9A 23002=9A 6= 952666=9A 0=9A=9A=9A 0=9A=20 59
03067:=9A=9A 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buck= ets)=20 droptail
=9A=9A=9A mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000<= br>BKT Prot=20 ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
= =9A 0=20 tcp=9A=9A=9A 74.125.77.147/80=9A=9A= =9A=9A=9A=9A=9A 10.0.95.213/1106=9A= 44306 28967429=9A 0=9A=9A=9A 0=9A=20 39
03050:=9A=9A 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 buck= ets)=20 droptail
=9A=9A=9A mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000<= br>BKT Prot=20 ___Source IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
= =9A 0=20 udp=9A=9A=9A 91.207.211.17/137=9A= =9A 255.255.255.255/137=9A=9A=9A= 143=9A=9A=9A 16614=9A 0=9A=9A=9A 0=9A=9A=20 0
03033:=9A=9A 1.024 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 bucke= ts) droptail
=9A=9A=9A=20 mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source= =20 IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 tcp= =9A=9A=9A=20 91.205.206.19/61617=9A=9A=9A=9A = 10.0.95.247/27881 144076=9A 995472= 5=9A 0=9A=9A=9A 0=9A=9A=20 0
03600:=9A=9A 2.048 Mbit/s=9A=9A=9A 0 ms=9A=9A 50 sl. 1 queues (1 bucke= ts) droptail
=9A=9A=9A=20 mask: 0x00 0x00000000/0x0000 -> 0x00000000/0x0000
BKT Prot ___Source= =20 IP/port____ ____Dest. IP/port____ Tot_pkt/bytes Pkt/Byte Drp
=9A 0 udp= =9A=9A=9A=9A=20 10.0.100.134/2572=9A 239.255.255.250/1900=9A 533990 377537021=9A = 2 1520=9A=9A=20 0

and so on. More online users, more ipfw rules and mor= e pipes...


On Mon, May 4, 2009 = at 11:05 AM, Oleg Bulyzhin <oleg@freebsd.org> wrote:

Please show sysctl net.inet.ip.dummynet output, your ipfw ruleset and
pipe configs.

--
Oleg.

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
=3D=3D=3D Oleg Bulyzhin -- OBUL-RIPN -- OBUL-RIPE -- oleg@rinet.ru =3D=3D=3D
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D




--
----
=F3 =D5= =D7=C1=D6=C5=CE=C9=C5=CD, =E1=CE=C4=D2=C5=CA
--0016364c758e62805c04691699de-- From owner-freebsd-net@FreeBSD.ORG Mon May 4 15:10:03 2009 Return-Path: Delivered-To: freebsd-net@hub.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 0CBCC106564A for ; Mon, 4 May 2009 15:10:03 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:4f8:fff6::28]) by mx1.freebsd.org (Postfix) with ESMTP id EE9128FC13 for ; Mon, 4 May 2009 15:10:02 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (gnats@localhost [127.0.0.1]) by freefall.freebsd.org (8.14.3/8.14.3) with ESMTP id n44FA2Uj027845 for ; Mon, 4 May 2009 15:10:02 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.14.3/8.14.3/Submit) id n44FA2iU027836; Mon, 4 May 2009 15:10:02 GMT (envelope-from gnats) Date: Mon, 4 May 2009 15:10:02 GMT Message-Id: <200905041510.n44FA2iU027836@freefall.freebsd.org> To: freebsd-net@FreeBSD.org From: Oleg Bulyzhin Cc: Subject: Re: kern/134157: [dummynet] dummynet loads cpu for 100% and make a system frozen and unstable [regression] X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: Oleg Bulyzhin List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 04 May 2009 15:10:03 -0000 The following reply was made to PR kern/134157; it has been noted by GNATS. From: Oleg Bulyzhin To: Andrey Golenischev Cc: bug-followup@freebsd.org Subject: Re: kern/134157: [dummynet] dummynet loads cpu for 100% and make a system frozen and unstable [regression] Date: Mon, 4 May 2009 19:09:50 +0400 Few more questions: 1) Are you using mpd? Did you upgrade it along with system? Have you tried to use mpd4? (if you have problem with mpd5) 2) please show me values of following sysctl: net.inet.ip.fw.one_pass net.isr.direct -- Oleg. ================================================================ === Oleg Bulyzhin -- OBUL-RIPN -- OBUL-RIPE -- oleg@rinet.ru === ================================================================ From owner-freebsd-net@FreeBSD.ORG Mon May 4 16:04:13 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id DB765106566B; Mon, 4 May 2009 16:04:13 +0000 (UTC) (envelope-from bms@incunabulum.net) Received: from out1.smtp.messagingengine.com (out1.smtp.messagingengine.com [66.111.4.25]) by mx1.freebsd.org (Postfix) with ESMTP id ADCA48FC18; Mon, 4 May 2009 16:04:13 +0000 (UTC) (envelope-from bms@incunabulum.net) Received: from compute2.internal (compute2.internal [10.202.2.42]) by out1.messagingengine.com (Postfix) with ESMTP id 1F46D339F93; Mon, 4 May 2009 12:04:13 -0400 (EDT) Received: from heartbeat2.messagingengine.com ([10.202.2.161]) by compute2.internal (MEProxy); Mon, 04 May 2009 12:04:13 -0400 X-Sasl-enc: LLIfzfuvjoU2klz0KREzTg1S3m0tIDkCLtO7kC12t5Lr 1241453052 Received: from [192.168.123.18] (82-35-112-254.cable.ubr07.dals.blueyonder.co.uk [82.35.112.254]) by mail.messagingengine.com (Postfix) with ESMTPSA id C7D5D2B42F; Mon, 4 May 2009 12:04:10 -0400 (EDT) Message-ID: <49FF11F7.6090108@incunabulum.net> Date: Mon, 04 May 2009 17:04:07 +0100 From: Bruce Simpson User-Agent: Thunderbird 2.0.0.21 (Windows/20090302) MIME-Version: 1.0 To: Will Andrews References: <2aada3410904212216o128e1fdfx8c299b3531adc694@mail.gmail.com> <49EF11E8.508@FreeBSD.org> <2aada3410905032103g734e7025nad7f7b13137572ed@mail.gmail.com> In-Reply-To: <2aada3410905032103g734e7025nad7f7b13137572ed@mail.gmail.com> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Cc: freebsd-net@freebsd.org, "Bruce M. Simpson" Subject: Re: CARP as a module; followup thoughts X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 04 May 2009 16:04:14 -0000 Will Andrews wrote: > Thank you very much for your feedback. I have implemented your > suggestion as follows: > > http://firepipe.net/patches/carp-as-module-20090503-2.diff > Great stuff. Overall this does make things that much cleaner. > This version doesn't reinvent the wheel as far as registering the > protocol goes. Personally, I think that notwithstanding your other > objection, this should get committed, since it is a step in the right > direction (perhaps minus the netinet6/in6_proto.c change that adds > spacers). One step at a time! > Yeah, I wouldn't worry about it too much for now. It is something which would be nice to have -- some NICs will perfect hash in hardware on more than one MAC address -- but I believe we've got other issues in this area to do with per-AF locking, which would probably be touched by exactly the issues you raise in the last part of your post... well spotted... > carp_encapcheck() is simplistic, but probably suffices (maybe also > check to see if the vh MAC matches). This patch does work fine with > my test setup, one system using GENERIC+if_carp and the other using a > static build without the patch. > I'll have to take your word for that as I'm not using CARP just at the moment. I had to touch the mcast setup for the IPv6 SSM implementation. All compiles OK, but I haven't tested the code other than loading it. Only IPv6 multicast group setup should be affected. Does your patch apply against these revisions OK? > I also found a "memory leak" in the original code, where it calls > free(cif, M_IFADDR), which is wrong, it should be free(cif, M_CARP), > since the original malloc uses M_CARP -- this fix is also included in > the patch above. > Great stuff. Can this bug fix be merged separately, i.e. before other code is committed? That way it can get merged back to -STABLE more quickly, once RELENG_7 is unfrozen. > ... > > Another way would be to have a separate list/hash table for virtual > lladdr's (ifnet.ifvirt_lladdrhead?). I considered that but it seems > better and more general to simply upgrade ifnet.if_addrhead. > It would be good to have a more general code path for stuff like this to benefit from using the perfect hash filters in modern NICs, the main thing is that everything continues to work with no regressions :-) Thanks for the effort you've put into this, it will certainly help a lot of folk to be able to ship a CARP-capable GENERIC kernel. cheers, BMS From owner-freebsd-net@FreeBSD.ORG Mon May 4 16:17:30 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 470D4106566C; Mon, 4 May 2009 16:17:30 +0000 (UTC) (envelope-from gnn@neville-neil.com) Received: from proxy.meer.net (proxy.meer.net [64.13.141.13]) by mx1.freebsd.org (Postfix) with ESMTP id 23FB28FC08; Mon, 4 May 2009 16:17:29 +0000 (UTC) (envelope-from gnn@neville-neil.com) Received: from mail.meer.net (mail.meer.net [64.13.141.3]) by proxy.meer.net (8.14.3/8.14.3) with ESMTP id n44FllhT032699; Mon, 4 May 2009 08:48:01 -0700 (PDT) (envelope-from gnn@neville-neil.com) Received: from mail2.meer.net (mail2.meer.net [64.13.141.16]) by mail.meer.net (8.13.3/8.13.3/meer) with ESMTP id n44FlaDf075856; Mon, 4 May 2009 08:47:37 -0700 (PDT) (envelope-from gnn@neville-neil.com) Received: from gnnmac.hudson-trading.com (209.249.190.8.available.above.net [209.249.190.8] (may be forged)) (authenticated bits=0) by mail2.meer.net (8.14.1/8.14.3) with ESMTP id n44FlTgR043692 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Mon, 4 May 2009 08:47:30 -0700 (PDT) (envelope-from gnn@neville-neil.com) Message-Id: <070BE192-6D18-4DB9-87AE-49233996CCA4@neville-neil.com> From: George Neville-Neil To: Lawrence Stewart In-Reply-To: <49FC3984.8050609@freebsd.org> Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes Content-Transfer-Encoding: 7bit Mime-Version: 1.0 (Apple Message framework v930.3) Date: Mon, 4 May 2009 11:47:28 -0400 References: <00C19FCC-837A-44B8-A0C9-C56E3D02F8EF@dragondata.com> <49FC3984.8050609@freebsd.org> X-Mailer: Apple Mail (2.930.3) X-Spam-Score: undef - spam scanning disabled X-CanIt-Geo: ip=64.13.141.3; country=US; region=CA; city=Mountain View; latitude=37.3974; longitude=-122.0732; metrocode=807; areacode=650; http://maps.google.com/maps?q=37.3974,-122.0732&z=6 X-CanItPRO-Stream: default X-Canit-Stats-ID: Bayes signature not available X-Scanned-By: CanIt (www . roaringpenguin . com) on 64.13.141.13 Cc: freebsd-net@freebsd.org Subject: Re: Slow local TCP transfers on -CURRENT X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 04 May 2009 16:17:30 -0000 On May 2, 2009, at 08:16 , Lawrence Stewart wrote: > Kevin Day wrote: >> I've been seeing this for a few months now on -CURRENT. TCP >> transfers to local IP addresses (but not 127.0.0.1) are incredibly >> slow. >> Transfer from localhost: >> # scp "root@127.0.0.1:/boot/kernel/kernel" . >> kernel >> 100 >> % 11MB 11.1MB/s 00:00 >> Appropriately fast. >> Transfer from an IP on a local interface: >> # scp "root@216.14.96.4:/boot/kernel/kernel" . >> kernel >> 0 >> % 16KB 13.0KB/s 14:37 ETA >> The routes seem normal: >> # route get 127.0.0.1 >> route to: localhost >> destination: localhost >> interface: lo0 >> flags: >> recvpipe sendpipe ssthresh rtt,msec mtu weight expire >> 0 0 0 0 16384 1 0 >> # route -n get 216.14.96.4 >> route to: 216.14.96.4 >> destination: 216.14.96.0 >> mask: 255.255.255.128 >> interface: nfe0 >> flags: >> recvpipe sendpipe ssthresh rtt,msec mtu weight expire >> 0 0 0 0 1500 1 0 >> nfe0: flags=8843 metric 0 >> mtu 1500 >> >> options=19b >> ether 00:30:48:c6:dd:9c >> inet 216.14.96.4 netmask 0xffffff80 broadcast 216.14.96.127 >> Takes 10-60 minutes to copy, stalling frequently during the >> transfer. It's not limited to just scp either, all TCP transfers >> seem to stall this way. >> I don't believe I'm doing anything unusual, has anyone seen >> anything like this? > > Known fallout from the ARPv2 work I believe. As a workaround until > it gets fixed: > > route add -host (if-ip) -iface lo0 (note I haven't tested this myself) > > (see the Jan 2009 freebsd-net@ thread "Bacula: VERY SLOW on SAME > host" for some details). > Anyone know if there is a fix in the offing? Best, George From owner-freebsd-net@FreeBSD.ORG Mon May 4 16:24:19 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 65370106566B for ; Mon, 4 May 2009 16:24:19 +0000 (UTC) (envelope-from lstewart@freebsd.org) Received: from lauren.room52.net (lauren.room52.net [210.50.193.198]) by mx1.freebsd.org (Postfix) with ESMTP id CCC628FC0C for ; Mon, 4 May 2009 16:24:18 +0000 (UTC) (envelope-from lstewart@freebsd.org) Received: from lstewart-laptop.caia.swin.edu.au (adsl-99-189-212-101.dsl.emhril.sbcglobal.net [99.189.212.101]) (authenticated bits=0) by lauren.room52.net (8.14.3/8.14.3) with ESMTP id n44GO1Qt013113 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 02:24:04 +1000 (EST) (envelope-from lstewart@freebsd.org) Message-ID: <49FF169A.9040708@freebsd.org> Date: Mon, 04 May 2009 11:23:54 -0500 From: Lawrence Stewart User-Agent: Thunderbird 2.0.0.21 (X11/20090407) MIME-Version: 1.0 To: George Neville-Neil References: <00C19FCC-837A-44B8-A0C9-C56E3D02F8EF@dragondata.com> <49FC3984.8050609@freebsd.org> <070BE192-6D18-4DB9-87AE-49233996CCA4@neville-neil.com> In-Reply-To: <070BE192-6D18-4DB9-87AE-49233996CCA4@neville-neil.com> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,RDNS_DYNAMIC, SPF_SOFTFAIL autolearn=disabled version=3.2.5 X-Spam-Checker-Version: SpamAssassin 3.2.5 (2008-06-10) on lauren.room52.net Cc: freebsd-net@freebsd.org, qingli@freebsd.org Subject: Re: Slow local TCP transfers on -CURRENT X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 04 May 2009 16:24:20 -0000 George Neville-Neil wrote: > > On May 2, 2009, at 08:16 , Lawrence Stewart wrote: > >> Kevin Day wrote: >>> I've been seeing this for a few months now on -CURRENT. TCP transfers >>> to local IP addresses (but not 127.0.0.1) are incredibly slow. >>> Transfer from localhost: >>> # scp "root@127.0.0.1:/boot/kernel/kernel" . >>> kernel >>> 100% 11MB 11.1MB/s 00:00 >>> Appropriately fast. >>> Transfer from an IP on a local interface: >>> # scp "root@216.14.96.4:/boot/kernel/kernel" . >>> kernel >>> 0% 16KB 13.0KB/s 14:37 ETA >>> The routes seem normal: >>> # route get 127.0.0.1 >>> route to: localhost >>> destination: localhost >>> interface: lo0 >>> flags: >>> recvpipe sendpipe ssthresh rtt,msec mtu weight expire >>> 0 0 0 0 16384 1 0 >>> # route -n get 216.14.96.4 >>> route to: 216.14.96.4 >>> destination: 216.14.96.0 >>> mask: 255.255.255.128 >>> interface: nfe0 >>> flags: >>> recvpipe sendpipe ssthresh rtt,msec mtu weight expire >>> 0 0 0 0 1500 1 0 >>> nfe0: flags=8843 metric 0 mtu >>> 1500 >>> >>> options=19b >>> ether 00:30:48:c6:dd:9c >>> inet 216.14.96.4 netmask 0xffffff80 broadcast 216.14.96.127 >>> Takes 10-60 minutes to copy, stalling frequently during the transfer. >>> It's not limited to just scp either, all TCP transfers seem to stall >>> this way. >>> I don't believe I'm doing anything unusual, has anyone seen anything >>> like this? >> >> Known fallout from the ARPv2 work I believe. As a workaround until it >> gets fixed: >> >> route add -host (if-ip) -iface lo0 (note I haven't tested this myself) >> >> (see the Jan 2009 freebsd-net@ thread "Bacula: VERY SLOW on SAME host" >> for some details). >> > > Anyone know if there is a fix in the offing? Qing (added to CC) is aware of the problem. Not sure how far off the fix is. Cheers, Lawrence From owner-freebsd-net@FreeBSD.ORG Mon May 4 16:30:04 2009 Return-Path: Delivered-To: freebsd-net@hub.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 20404106564A for ; Mon, 4 May 2009 16:30:04 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:4f8:fff6::28]) by mx1.freebsd.org (Postfix) with ESMTP id 0EF178FC08 for ; Mon, 4 May 2009 16:30:04 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (gnats@localhost [127.0.0.1]) by freefall.freebsd.org (8.14.3/8.14.3) with ESMTP id n44GU39f035715 for ; Mon, 4 May 2009 16:30:03 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.14.3/8.14.3/Submit) id n44GU3sj035710; Mon, 4 May 2009 16:30:03 GMT (envelope-from gnats) Date: Mon, 4 May 2009 16:30:03 GMT Message-Id: <200905041630.n44GU3sj035710@freefall.freebsd.org> To: freebsd-net@FreeBSD.org From: Alexey Illarionov Cc: Subject: Re: kern/132734: panic in net/if_mib.c X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: Alexey Illarionov List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 04 May 2009 16:30:04 -0000 The following reply was made to PR kern/132734; it has been noted by GNATS. From: Alexey Illarionov To: Mikolaj Golub Cc: bug-followup@FreeBSD.org, Robert Watson Subject: Re: kern/132734: panic in net/if_mib.c Date: Mon, 04 May 2009 20:00:17 +0400 Hi Mikolaj Golub wrote: > So, Alexey, can you try upgrading to the latest stable/7 or releng/7.2 or > apply attached patch to see if this tweak at least eliminates the instant > panic? With this patch this panic does not repeat any more. There are some error messages in log files: snmpd: sysctl linkmib estimate (ng1): No such file or directory. But kernel does not panics. Thanks. From owner-freebsd-net@FreeBSD.ORG Mon May 4 19:50:03 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 20A25106566B; Mon, 4 May 2009 19:50:03 +0000 (UTC) (envelope-from lastewart@swin.edu.au) Received: from lauren.room52.net (lauren.room52.net [210.50.193.198]) by mx1.freebsd.org (Postfix) with ESMTP id A3CFF8FC13; Mon, 4 May 2009 19:50:02 +0000 (UTC) (envelope-from lastewart@swin.edu.au) Received: from lstewart-laptop.caia.swin.edu.au (adsl-99-189-212-101.dsl.emhril.sbcglobal.net [99.189.212.101]) (authenticated bits=0) by lauren.room52.net (8.14.3/8.14.3) with ESMTP id n44JKvJ0018786 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 05:21:04 +1000 (EST) (envelope-from lastewart@swin.edu.au) Message-ID: <49FF4013.9000206@swin.edu.au> Date: Mon, 04 May 2009 14:20:51 -0500 From: Lawrence Stewart User-Agent: Thunderbird 2.0.0.21 (X11/20090407) MIME-Version: 1.0 To: iccrg@cs.ucl.ac.uk, tmrg-interest@ICSI.Berkeley.EDU, freebsd-net@freebsd.org, end2end-interest@postel.org Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-2.5 required=5.0 tests=BAYES_00,RDNS_DYNAMIC autolearn=disabled version=3.2.5 X-Spam-Checker-Version: SpamAssassin 3.2.5 (2008-06-10) on lauren.room52.net Cc: Subject: TCP analysis, research and debugging tools: SIFTR v1.2.1 released X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 04 May 2009 19:50:03 -0000 Hi All, I'm very pleased to announce the release of a significantly improved version of our SIFTR (Statistical Information For TCP Research) tool for FreeBSD. It can be obtained from [1], along with other papers, patches and software useful for protocol analysis, debugging and experimental research. SIFTR is a loadable kernel module supporting FreeBSD 6.2+ that logs a range of statistics on active TCP connections to a log file. It provides the ability to make highly granular, event-driven measurements of TCP connection state. More details are available in the readme and changelog available at [1]. Work on SIFTR v1.2.0 and v1.2.1 has been sponsored by the FreeBSD Foundation [2] as part of the "Enhancing the FreeBSD TCP Implementation" project [3]. SIFTR development prior to v1.2.0 was supported in part by a grant from the Cisco University Research Program Fund at Community Foundation Silicon Valley. SIFTR's functionality will be merged into the FreeBSD base system in one of the next steps in this project, and will hopefully ship with FreeBSD 8.0. Cheers, Lawrence http://caia.swin.edu.au [1] http://caia.swin.edu.au/urp/newtcp/tools.html [2] http://www.freebsdfoundation.org/ [3] http://caia.swin.edu.au/freebsd/etcp09/ From owner-freebsd-net@FreeBSD.ORG Mon May 4 19:51:45 2009 Return-Path: Delivered-To: freebsd-net@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 5B5A21065678 for ; Mon, 4 May 2009 19:51:45 +0000 (UTC) (envelope-from hrs@FreeBSD.org) Received: from mail.allbsd.org (unknown [IPv6:2001:2f0:104:e001::32]) by mx1.freebsd.org (Postfix) with ESMTP id D72B08FC17 for ; Mon, 4 May 2009 19:51:44 +0000 (UTC) (envelope-from hrs@FreeBSD.org) Received: from delta.allbsd.org (p3138-ipbf904funabasi.chiba.ocn.ne.jp [122.26.38.138]) (authenticated bits=128) by mail.allbsd.org (8.14.3/8.14.2) with ESMTP id n44JpXJH013835; Tue, 5 May 2009 04:51:43 +0900 (JST) (envelope-from hrs@FreeBSD.org) Received: from localhost (alph.allbsd.org [192.168.0.10]) (authenticated bits=0) by delta.allbsd.org (8.13.4/8.13.4) with ESMTP id n44JpJ7x087772; Tue, 5 May 2009 04:51:21 +0900 (JST) (envelope-from hrs@FreeBSD.org) Date: Tue, 05 May 2009 04:50:53 +0900 (JST) Message-Id: <20090505.045053.96672057.hrs@allbsd.org> To: rslaranjo@gmail.com From: Hiroki Sato In-Reply-To: References: <20090504.103743.232652487.hrs@allbsd.org> X-PGPkey-fingerprint: BDB3 443F A5DD B3D0 A530 FFD7 4F2C D3D8 2793 CF2D X-Mailer: Mew version 6.2 on Emacs 22.3 / Mule 5.0 (SAKAKI) Mime-Version: 1.0 Content-Type: Multipart/Signed; protocol="application/pgp-signature"; micalg=pgp-sha1; boundary="--Security_Multipart(Tue_May__5_04_50_53_2009_967)--" Content-Transfer-Encoding: 7bit X-Virus-Scanned: ClamAV version 0.93.3, clamav-milter version 0.93.3 on gatekeeper.allbsd.org X-Virus-Status: Clean X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.0 (mail.allbsd.org [133.31.130.32]); Tue, 05 May 2009 04:51:44 +0900 (JST) Cc: freebsd-net@FreeBSD.org Subject: Re: Freebsd failed to create routing prefix X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 04 May 2009 19:51:45 -0000 ----Security_Multipart(Tue_May__5_04_50_53_2009_967)-- Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit Rommel Laranjo wrote in : rs> Hello Hiroki-san, rs> rs> The box I am using is FreeBSD 7.0-Release: rs> rs> # uname -a rs> FreeBSD freebsd7.example.com 7.0-RELEASE FreeBSD 7.0-RELEASE #0: Sun rs> Feb 24 19:59:52 UTC 2008 rs> root@logan.cse.buffalo.edu:/usr/obj/usr/src/sys/GENERIC i386 Oh, really? So maybe 7.0R has the same problem. I will try to reproduce the symptom on my box. -- | Hiroki SATO ----Security_Multipart(Tue_May__5_04_50_53_2009_967)-- Content-Type: application/pgp-signature Content-Transfer-Encoding: 7bit -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (FreeBSD) iEYEABECAAYFAkn/Rx0ACgkQTyzT2CeTzy0jnACeLyOn4cnIH1EPuoqVIACLYf3T hdAAoKiBOSLDFu5os7lXKPofFbtCz9GQ =RC9Z -----END PGP SIGNATURE----- ----Security_Multipart(Tue_May__5_04_50_53_2009_967)---- From owner-freebsd-net@FreeBSD.ORG Mon May 4 20:39:36 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id B5E59106566B for ; Mon, 4 May 2009 20:39:36 +0000 (UTC) (envelope-from andrew@modulus.org) Received: from email.octopus.com.au (email.octopus.com.au [122.100.2.232]) by mx1.freebsd.org (Postfix) with ESMTP id 708CC8FC21 for ; Mon, 4 May 2009 20:39:36 +0000 (UTC) (envelope-from andrew@modulus.org) Received: by email.octopus.com.au (Postfix, from userid 1002) id 5AE4317E54; Tue, 5 May 2009 06:39:53 +1000 (EST) X-Spam-Checker-Version: SpamAssassin 3.2.3 (2007-08-08) on email.octopus.com.au X-Spam-Level: X-Spam-Status: No, score=-1.4 required=10.0 tests=ALL_TRUSTED autolearn=failed version=3.2.3 Received: from [10.1.50.60] (ppp121-44-33-156.lns10.syd7.internode.on.net [121.44.33.156]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) (Authenticated sender: admin@email.octopus.com.au) by email.octopus.com.au (Postfix) with ESMTP id 92A7E17E45; Tue, 5 May 2009 06:39:48 +1000 (EST) Message-ID: <49FF5267.6090005@modulus.org> Date: Tue, 05 May 2009 06:39:03 +1000 From: Andrew Snow User-Agent: Thunderbird 2.0.0.14 (X11/20080523) MIME-Version: 1.0 To: Antonio Tommasi , "freebsd-net >> FreeBSD Net" References: <49FA2E3F.9050108@entel.upc.edu> <3a142e750905010655i5e56282eu240e13f2a03dfb02@mail.gmail.com> <49FB55A3.605@entel.upc.edu> <3a142e750905011716g39ea55f0kd081bfdd55709b37@mail.gmail.com> <49FBF9B5.40800@entel.upc.edu> <3a142e750905020617y40f62463ma91b46a015b2b2ab@mail.gmail.com> <49FD61DD.7070903@entel.upc.edu> <3a142e750905030535v4cfe0103r1d8a17e828f6da9b@mail.gmail.com> <57348.147.83.40.234.1241416909.squirrel@webmail.entel.upc.edu> <49FEC893.8030305@unile.it> In-Reply-To: <49FEC893.8030305@unile.it> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Cc: Subject: Re: Filesystem and bigger files X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 04 May 2009 20:39:37 -0000 Antonio Tommasi wrote: > Filesystem Size Used Avail Capacity Mounted on > /dev/aacd0s1a 64G 15G 44G 26% / > In a directory (spamassassin) i've one file (auto-whitelist) with > dimension 4.0 TB and one file (bayes_learn) with dimension 1.0TB > > How is it possible? How this file are managed? Spamassassin uses sparse files. http://en.wikipedia.org/wiki/Sparse_file Try running "du" on the files instead of "ls -l". - Andrew From owner-freebsd-net@FreeBSD.ORG Mon May 4 21:10:03 2009 Return-Path: Delivered-To: freebsd-net@hub.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 380D310656CD for ; Mon, 4 May 2009 21:10:03 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:4f8:fff6::28]) by mx1.freebsd.org (Postfix) with ESMTP id 2079A8FC12 for ; Mon, 4 May 2009 21:10:03 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (gnats@localhost [127.0.0.1]) by freefall.freebsd.org (8.14.3/8.14.3) with ESMTP id n44LA2Fb011856 for ; Mon, 4 May 2009 21:10:02 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.14.3/8.14.3/Submit) id n44LA2KP011855; Mon, 4 May 2009 21:10:02 GMT (envelope-from gnats) Date: Mon, 4 May 2009 21:10:02 GMT Message-Id: <200905042110.n44LA2KP011855@freefall.freebsd.org> To: freebsd-net@FreeBSD.org From: Andrey Golenischev Cc: Subject: Re: kern/134157: [dummynet] dummynet loads cpu for 100% and make a system frozen and unstable [regression] X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: Andrey Golenischev List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 04 May 2009 21:10:04 -0000 The following reply was made to PR kern/134157; it has been noted by GNATS. From: Andrey Golenischev To: Oleg Bulyzhin Cc: bug-followup@freebsd.org Subject: Re: kern/134157: [dummynet] dummynet loads cpu for 100% and make a system frozen and unstable [regression] Date: Tue, 5 May 2009 00:02:44 +0300 --0016e6dbe6dcd8bd0d04691c7b92 Content-Type: text/plain; charset=KOI8-R Content-Transfer-Encoding: base64 WWVzIGknbSB1c2luZyBtcGQgKHRyaWVkIHdpdGggbXBkNCBhbmQgbXBkNS4gVHJpZWQgdGhpcyBv biBzZXZlcmFsIFBDJ3MgLQp0aGUgc2FtZSBwcm9ibGVtIDooIElmIGkgaGF2ZSAzMC01MCBvbmxp bmUgdXNlcnMgLSBpdCBpcyBvay4gMTAwKyAtIGR1bW15bmV0CjEwMCUgbG9hZHMgYW5kIHNlcnZl ciBiZWNvbWUgdW5zdGFibGUvZnJlZXppbmcuCgpuZXQuaW5ldC5pcC5mdy5vbmVfcGFzczogMQpu ZXQuaXNyLmRpcmVjdDogMQoKCk9uIE1vbiwgTWF5IDQsIDIwMDkgYXQgNjowOSBQTSwgT2xlZyBC dWx5emhpbiA8b2xlZ0BmcmVlYnNkLm9yZz4gd3JvdGU6Cgo+Cj4gRmV3IG1vcmUgcXVlc3Rpb25z Ogo+IDEpIEFyZSB5b3UgdXNpbmcgbXBkPyBEaWQgeW91IHVwZ3JhZGUgaXQgYWxvbmcgd2l0aCBz eXN0ZW0/IEhhdmUgeW91IHRyaWVkCj4gdG8gdXNlIG1wZDQ/IChpZiB5b3UgaGF2ZSBwcm9ibGVt IHdpdGggbXBkNSkKPiAyKSBwbGVhc2Ugc2hvdyBtZSB2YWx1ZXMgb2YgZm9sbG93aW5nIHN5c2N0 bDoKPiBuZXQuaW5ldC5pcC5mdy5vbmVfcGFzcwo+IG5ldC5pc3IuZGlyZWN0Cj4KPiAtLQo+IE9s ZWcuCj4KPiA9PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09 PT09PT09PT09PT09PT09Cj4gPT09IE9sZWcgQnVseXpoaW4gLS0gT0JVTC1SSVBOIC0tIE9CVUwt UklQRSAtLSBvbGVnQHJpbmV0LnJ1ID09PQo+ID09PT09PT09PT09PT09PT09PT09PT09PT09PT09 PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT0KPgo+CgoKLS0gCi0tLS0K8yDV18HW xc7Jxc0sIOHOxNLFygo= --0016e6dbe6dcd8bd0d04691c7b92 Content-Type: text/html; charset=KOI8-R Content-Transfer-Encoding: quoted-printable Yes i'm using mpd (tried with mpd4 and mpd5. Tried this on several PC&#= 39;s - the same problem :( If i have 30-50 online users - it is ok. 100+ - = dummynet 100% loads and server become unstable/freezing.

net.inet.ip= .fw.one_pass: 1
net.isr.direct: 1


On Mon, May 4, 2009= at 6:09 PM, Oleg Bulyzhin <oleg@freebsd.org> wrote:

Few more questions:
1) Are you using mpd? Did you upgrade it along with system? Have you tried<= br> to use mpd4? (if you have problem with mpd5)
2) please show me values of following sysctl:
net.inet.ip.fw.one_pass
net.isr.direct

--
Oleg.

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
=3D=3D=3D Oleg Bulyzhin -- OBUL-RIPN -- OBUL-RIPE -- oleg@rinet.ru =3D=3D=3D
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D




--
----
=F3= =D5=D7=C1=D6=C5=CE=C9=C5=CD, =E1=CE=C4=D2=C5=CA
--0016e6dbe6dcd8bd0d04691c7b92-- From owner-freebsd-net@FreeBSD.ORG Mon May 4 21:48:10 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id E7CE4106566B; Mon, 4 May 2009 21:48:10 +0000 (UTC) (envelope-from will@firepipe.net) Received: from mail-gx0-f210.google.com (mail-gx0-f210.google.com [209.85.217.210]) by mx1.freebsd.org (Postfix) with ESMTP id 937018FC0A; Mon, 4 May 2009 21:48:10 +0000 (UTC) (envelope-from will@firepipe.net) Received: by gxk6 with SMTP id 6so1593266gxk.19 for ; Mon, 04 May 2009 14:48:09 -0700 (PDT) MIME-Version: 1.0 Received: by 10.151.131.4 with SMTP id i4mr12903169ybn.136.1241473689162; Mon, 04 May 2009 14:48:09 -0700 (PDT) In-Reply-To: <49FF11F7.6090108@incunabulum.net> References: <2aada3410904212216o128e1fdfx8c299b3531adc694@mail.gmail.com> <49EF11E8.508@FreeBSD.org> <2aada3410905032103g734e7025nad7f7b13137572ed@mail.gmail.com> <49FF11F7.6090108@incunabulum.net> Date: Mon, 4 May 2009 15:48:09 -0600 Message-ID: <2aada3410905041448o18722207m9f9d124573b39d54@mail.gmail.com> From: Will Andrews To: Bruce Simpson Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Cc: freebsd-net@freebsd.org, "Bruce M. Simpson" Subject: Re: CARP as a module; followup thoughts X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 04 May 2009 21:48:11 -0000 On Mon, May 4, 2009 at 10:04 AM, Bruce Simpson wrote: > I'll have to take your word for that as I'm not using CARP just at the > moment. I had to touch the mcast setup for the IPv6 SSM implementation. All > compiles OK, but I haven't tested the code other than loading it. Only IPv6 > multicast group setup should be affected. > > Does your patch apply against these revisions OK? It should. I am using git to develop these patches. I just did another sync (to r191794) and the diff from svn to my local git branch is the same as the patch I posted last night, so I presume it will apply to a fresh svn checkout of -current as of that revision. > Great stuff. > Can this bug fix be merged separately, i.e. before other code is committed? > That way it can get merged back to -STABLE more quickly, once RELENG_7 is > unfrozen. Yes, I can generate a separate patch for that one. If I were able to commit it myself, I'd certainly be doing it the way you suggest. I'd also suggest a more aggressive MFC timing for the free() bug fix than for the module feature (perhaps 3 days vs. 1-2 months, as 7.2R is now out). I am going to backport this patch to RELENG_7. Because of the way it is implemented, I believe it should be safe to MFC. > It would be good to have a more general code path for stuff like this to > benefit from using the perfect hash filters in modern NICs, the main thing > is that everything continues to work with no regressions :-) > > Thanks for the effort you've put into this, it will certainly help a lot of > folk to be able to ship a CARP-capable GENERIC kernel. Indeed, regressions will be difficult to prevent. I'm planning to work on virtual lladdrs for a bit to see if I can find a suitable solution for the problem. If nothing else, I think it provides a reasonable method for getting rid of carp_forus(), and possibly for implementing carpdev. Thanks, --Will. From owner-freebsd-net@FreeBSD.ORG Mon May 4 23:05:28 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id E2C8C1065672 for ; Mon, 4 May 2009 23:05:28 +0000 (UTC) (envelope-from ol@csa.ru) Received: from ol.homeunix.org (home.obaranov.spb.ru [93.100.48.130]) by mx1.freebsd.org (Postfix) with ESMTP id 14BD28FC0A for ; Mon, 4 May 2009 23:05:26 +0000 (UTC) (envelope-from ol@csa.ru) Received: from [192.168.1.49] (ti0016a380-1069.bb.online.no [80.212.156.47]) by ol.homeunix.org (Postfix) with ESMTPSA id 1A7C415340F; Tue, 5 May 2009 02:47:15 +0400 (MSD) Message-ID: <49FF706F.1050209@csa.ru> Date: Tue, 05 May 2009 00:47:11 +0200 From: Oleg Baranov User-Agent: Thunderbird 2.0.0.21 (X11/20090318) MIME-Version: 1.0 To: freebsd-net@freebsd.org Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Subject: Awful forwarding rate [7.2-Release, igb] X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 04 May 2009 23:05:29 -0000 Hello! I have extremely low forwarding speed on 7.2-Release box with dual Intel 82575. Box "B" with dual 82575 nic is connected between A and C using gigabit swithes A <---> B <----> C iperf run from A to C shows: $ iperf -w 128k -c 192.168.111.3 ------------------------------------------------------------ Client connecting to 192.168.111.3, TCP port 5001 TCP window size: 129 KByte (WARNING: requested 128 KByte) ------------------------------------------------------------ [ 3] local 192.168.1.15 port 51077 connected with 192.168.111.3 port 5001 [ ID] Interval Transfer Bandwidth [ 3] 0.0-11.2 sec 160 KBytes 117 Kbits/sec the same run from A to B shows: ]$ iperf -w 128k -c 192.168.1.153 ------------------------------------------------------------ Client connecting to 192.168.1.153, TCP port 5001 TCP window size: 129 KByte (WARNING: requested 128 KByte) ------------------------------------------------------------ [ 3] local 192.168.1.15 port 60907 connected with 192.168.1.153 port 5001 [ ID] Interval Transfer Bandwidth [ 3] 0.0-10.0 sec 1.09 GBytes 933 Mbits/sec and from B to C shows: $ iperf -w 128k -c 192.168.111.3 ------------------------------------------------------------ Client connecting to 192.168.111.3, TCP port 5001 TCP window size: 129 KByte (WARNING: requested 128 KByte) ------------------------------------------------------------ [ 3] local 192.168.111.254 port 64290 connected with 192.168.111.3 port 5001 [ ID] Interval Transfer Bandwidth [ 3] 0.0-10.0 sec 1.08 GBytes 930 Mbits/sec Boxes B and C are both dual quad-core e5420 CPUs on Supermicro X7DWN+ motherboard. As A I tried several machines including dual quad-core Phenom system as well as some portable PCs and workstations residing in the same LAN. Here is ifconfig from B $ ifconfig igb0: flags=8843 metric 0 mtu 1500 options=19b ether 00:30:48:c8:19:66 inet 192.168.1.153 netmask 0xffffff00 broadcast 192.168.1.255 media: Ethernet autoselect (1000baseTX ) status: active igb1: flags=8843 metric 0 mtu 1500 options=19b ether 00:30:48:c8:19:67 media: Ethernet autoselect (1000baseTX ) status: active lagg: laggdev lagg0 lo0: flags=8049 metric 0 mtu 16384 inet6 fe80::1%lo0 prefixlen 64 scopeid 0x3 inet6 ::1 prefixlen 128 inet 127.0.0.1 netmask 0xff000000 lagg0: flags=8843 metric 0 mtu 1500 options=19b ether 00:30:48:c8:19:67 inet 192.168.111.254 netmask 0xffffff00 broadcast 192.168.111.255 media: Ethernet autoselect status: active laggproto lacp laggport: igb1 flags=1c gif0: flags=8051 metric 0 mtu 1280 tunnel inet 192.168.1.153 --> 192.168.1.156 inet 192.168.111.254 --> 192.168.112.254 netmask 0xffffffff I tried to remove lagg & gif interfaces, boot GENERIC kernel and even set up same net config from LiveFS cd - nothing helps. Forwarding speed sometimes goes up to 1-2 Mbit/sec while local speeds are always above 900Mbit. System load is less 1%, logs contain nothing interesting... Any clues and ideas would be appreciated!!!! From owner-freebsd-net@FreeBSD.ORG Mon May 4 23:23:42 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 1EBF21065677 for ; Mon, 4 May 2009 23:23:42 +0000 (UTC) (envelope-from jfvogel@gmail.com) Received: from rv-out-0506.google.com (rv-out-0506.google.com [209.85.198.235]) by mx1.freebsd.org (Postfix) with ESMTP id E52CF8FC08 for ; Mon, 4 May 2009 23:23:41 +0000 (UTC) (envelope-from jfvogel@gmail.com) Received: by rv-out-0506.google.com with SMTP id l9so2069630rvb.3 for ; Mon, 04 May 2009 16:23:41 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:cc:content-type; bh=d8fNLDF9fKSkFuv1x7afE0GKfgIRA0KCNFbJe6DK54I=; b=RgSvwJVScHpw+qd6S5KbEKwNV42TddNr7Cf1OVT9+Pwin6TnjHDNPSHQx27zmTzgib g7jdmBY9RKUOYI6bWYMlDpzzMdbyAu7BOFa3Ip9qQmH0SeyL2AZt8AXp8ipiUdA2d/ri UhQp0kEnYaaUjUezgQjUrg6O7dRdSqZhoTx7Y= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=uaJMWD8paMCvGW13VoKBAqzAk8L1EIkxkDyQNPwAMx3iDjQloGDTmQyGihuJZCUn06 9dRsbcduRGDU77rofmktdX8n7omVaoJprm+YWOWJqxrlyOai0vUtJnd554/PZI16dmwr cEeXF/DX0/Ua38/ReuV5Dvt/pha95ur2ZkqFk= MIME-Version: 1.0 Received: by 10.142.76.15 with SMTP id y15mr2319674wfa.263.1241479421503; Mon, 04 May 2009 16:23:41 -0700 (PDT) In-Reply-To: <49FF706F.1050209@csa.ru> References: <49FF706F.1050209@csa.ru> Date: Mon, 4 May 2009 16:23:41 -0700 Message-ID: <2a41acea0905041623s1b7793d5s16c0375ce1b5e606@mail.gmail.com> From: Jack Vogel To: Oleg Baranov Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit X-Content-Filtered-By: Mailman/MimeDel 2.1.5 Cc: freebsd-net@freebsd.org Subject: Re: Awful forwarding rate [7.2-Release, igb] X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 04 May 2009 23:23:42 -0000 Turn off LRO, its on by default, you can do it with sysctl, be sure to down and up the interface. In FreeBSD 8 this will be automagic but for 7.2 its manual. Jack On Mon, May 4, 2009 at 3:47 PM, Oleg Baranov wrote: > Hello! > > I have extremely low forwarding speed on 7.2-Release box with dual Intel > 82575. > > Box "B" with dual 82575 nic is connected between A and C using gigabit > swithes > A <---> B <----> C > > > iperf run from A to C shows: > > $ iperf -w 128k -c 192.168.111.3 > ------------------------------------------------------------ > Client connecting to 192.168.111.3, TCP port 5001 > TCP window size: 129 KByte (WARNING: requested 128 KByte) > ------------------------------------------------------------ > [ 3] local 192.168.1.15 port 51077 connected with 192.168.111.3 port 5001 > [ ID] Interval Transfer Bandwidth > [ 3] 0.0-11.2 sec 160 KBytes 117 Kbits/sec > > > > the same run from A to B shows: > > ]$ iperf -w 128k -c 192.168.1.153 > ------------------------------------------------------------ > Client connecting to 192.168.1.153, TCP port 5001 > TCP window size: 129 KByte (WARNING: requested 128 KByte) > ------------------------------------------------------------ > [ 3] local 192.168.1.15 port 60907 connected with 192.168.1.153 port 5001 > [ ID] Interval Transfer Bandwidth > [ 3] 0.0-10.0 sec 1.09 GBytes 933 Mbits/sec > > > and from B to C shows: > > $ iperf -w 128k -c 192.168.111.3 > ------------------------------------------------------------ > Client connecting to 192.168.111.3, TCP port 5001 > TCP window size: 129 KByte (WARNING: requested 128 KByte) > ------------------------------------------------------------ > [ 3] local 192.168.111.254 port 64290 connected with 192.168.111.3 port > 5001 > [ ID] Interval Transfer Bandwidth > [ 3] 0.0-10.0 sec 1.08 GBytes 930 Mbits/sec > > > Boxes B and C are both dual quad-core e5420 CPUs on Supermicro X7DWN+ > motherboard. > As A I tried several machines including dual quad-core Phenom system as > well as some portable PCs and workstations residing in the same LAN. > > Here is ifconfig from B > > $ ifconfig > igb0: flags=8843 metric 0 mtu 1500 > options=19b > ether 00:30:48:c8:19:66 > inet 192.168.1.153 netmask 0xffffff00 broadcast 192.168.1.255 > media: Ethernet autoselect (1000baseTX ) > status: active > igb1: flags=8843 metric 0 mtu 1500 > options=19b > ether 00:30:48:c8:19:67 > media: Ethernet autoselect (1000baseTX ) > status: active > lagg: laggdev lagg0 > lo0: flags=8049 metric 0 mtu 16384 > inet6 fe80::1%lo0 prefixlen 64 scopeid 0x3 > inet6 ::1 prefixlen 128 > inet 127.0.0.1 netmask 0xff000000 > lagg0: flags=8843 metric 0 mtu 1500 > options=19b > ether 00:30:48:c8:19:67 > inet 192.168.111.254 netmask 0xffffff00 broadcast 192.168.111.255 > media: Ethernet autoselect > status: active > laggproto lacp > laggport: igb1 flags=1c > gif0: flags=8051 metric 0 mtu 1280 > tunnel inet 192.168.1.153 --> 192.168.1.156 > inet 192.168.111.254 --> 192.168.112.254 netmask 0xffffffff > > > I tried to remove lagg & gif interfaces, boot GENERIC kernel and even set > up same net config from LiveFS cd - nothing helps. Forwarding speed > sometimes goes up to 1-2 Mbit/sec while local speeds are always above > 900Mbit. > System load is less 1%, logs contain nothing interesting... > > Any clues and ideas would be appreciated!!!! > > > > _______________________________________________ > freebsd-net@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-net > To unsubscribe, send any mail to "freebsd-net-unsubscribe@freebsd.org" > From owner-freebsd-net@FreeBSD.ORG Tue May 5 07:20:02 2009 Return-Path: Delivered-To: freebsd-net@hub.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id ACCF2106564A for ; Tue, 5 May 2009 07:20:02 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:4f8:fff6::28]) by mx1.freebsd.org (Postfix) with ESMTP id 9B4A68FC15 for ; Tue, 5 May 2009 07:20:02 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (gnats@localhost [127.0.0.1]) by freefall.freebsd.org (8.14.3/8.14.3) with ESMTP id n457K2na042230 for ; Tue, 5 May 2009 07:20:02 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.14.3/8.14.3/Submit) id n457K2nR042229; Tue, 5 May 2009 07:20:02 GMT (envelope-from gnats) Date: Tue, 5 May 2009 07:20:02 GMT Message-Id: <200905050720.n457K2nR042229@freefall.freebsd.org> To: freebsd-net@FreeBSD.org From: Oleg Bulyzhin Cc: Subject: Re: kern/134157: [dummynet] dummynet loads cpu for 100% and make a system frozen and unstable [regression] X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: Oleg Bulyzhin List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 05 May 2009 07:20:02 -0000 The following reply was made to PR kern/134157; it has been noted by GNATS. From: Oleg Bulyzhin To: Andrey Golenischev Cc: bug-followup@freebsd.org Subject: Re: kern/134157: [dummynet] dummynet loads cpu for 100% and make a system frozen and unstable [regression] Date: Tue, 5 May 2009 11:19:18 +0400 On Tue, May 05, 2009 at 12:02:44AM +0300, Andrey Golenischev wrote: > Yes i'm using mpd (tried with mpd4 and mpd5. Tried this on several PC's - > the same problem :( If i have 30-50 online users - it is ok. 100+ - dummynet > 100% loads and server become unstable/freezing. > > net.inet.ip.fw.one_pass: 1 > net.isr.direct: 1 > Could you try with net.isr.direct=0? Let me know if something will change. -- Oleg. ================================================================ === Oleg Bulyzhin -- OBUL-RIPN -- OBUL-RIPE -- oleg@rinet.ru === ================================================================ From owner-freebsd-net@FreeBSD.ORG Tue May 5 12:21:51 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 1767C1065670 for ; Tue, 5 May 2009 12:21:51 +0000 (UTC) (envelope-from bms@incunabulum.net) Received: from out1.smtp.messagingengine.com (out1.smtp.messagingengine.com [66.111.4.25]) by mx1.freebsd.org (Postfix) with ESMTP id E02278FC0C for ; Tue, 5 May 2009 12:21:50 +0000 (UTC) (envelope-from bms@incunabulum.net) Received: from compute1.internal (compute1.internal [10.202.2.41]) by out1.messagingengine.com (Postfix) with ESMTP id 3C1DE33BAE1; Tue, 5 May 2009 08:21:50 -0400 (EDT) Received: from heartbeat2.messagingengine.com ([10.202.2.161]) by compute1.internal (MEProxy); Tue, 05 May 2009 08:21:50 -0400 X-Sasl-enc: jUC2xjJQVEUA1McTWZVxGgFyUejb7UGyuTklDsWWZvY5 1241526109 Received: from [192.168.123.18] (82-35-112-254.cable.ubr07.dals.blueyonder.co.uk [82.35.112.254]) by mail.messagingengine.com (Postfix) with ESMTPSA id 90EF8362EE; Tue, 5 May 2009 08:21:49 -0400 (EDT) Message-ID: <4A002F59.1000000@incunabulum.net> Date: Tue, 05 May 2009 13:21:45 +0100 From: Bruce Simpson User-Agent: Thunderbird 2.0.0.21 (Windows/20090302) MIME-Version: 1.0 To: =?UTF-8?B?SklOTUVJIFRhdHV5YSAvIOelnuaYjumBlOWTiQ==?= References: <49FB327E.3010504@incunabulum.net> In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit Cc: freebsd-net Subject: Re: Request feedback on IPv6 multicast listen on :: X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 05 May 2009 12:21:51 -0000 JINMEI Tatuya / wrote: > I believe you can safely remove it. The KAME repository version of > that code was already deprecated long time ago. Thanks for clearing this up. I couldn't find anything which referenced the code, and as you pointed out its implementation was not complete, so I will leave it out. regards, BMS From owner-freebsd-net@FreeBSD.ORG Tue May 5 16:01:45 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id AC01A106564A for ; Tue, 5 May 2009 16:01:45 +0000 (UTC) (envelope-from qingli@speakeasy.net) Received: from mail3.sea5.speakeasy.net (mail3.sea5.speakeasy.net [69.17.117.5]) by mx1.freebsd.org (Postfix) with ESMTP id 8C8A08FC0C for ; Tue, 5 May 2009 16:01:45 +0000 (UTC) (envelope-from qingli@speakeasy.net) Received: (qmail 3383 invoked from network); 5 May 2009 15:35:05 -0000 Received: from dsl081-051-194.sfo1.dsl.speakeasy.net (HELO qm8nwm5acsx) ([64.81.51.194]) (envelope-sender ) by mail3.sea5.speakeasy.net (qmail-ldap-1.03) with SMTP for ; 5 May 2009 15:35:05 -0000 From: "Qing Li" To: "'Lawrence Stewart'" , "'George Neville-Neil'" Date: Tue, 5 May 2009 08:35:01 -0700 MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit X-Mailer: Microsoft Office Outlook, Build 11.0.5510 X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2900.5579 In-Reply-To: <49FF169A.9040708@freebsd.org> Thread-Index: AcnM2GQHpvlzjKSYTweRZu1qSGSGTwAvodIg Message-Id: <20090505160145.8C8A08FC0C@mx1.freebsd.org> Cc: freebsd-net@freebsd.org, qingli@freebsd.org Subject: RE: Slow local TCP transfers on -CURRENT X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 05 May 2009 16:01:45 -0000 > > Qing (added to CC) is aware of the problem. Not sure how far > off the fix is. > I am resuming the work on it, hoping to get it verified and finalized in a day or so. Sorry about the delay. -- Qing From owner-freebsd-net@FreeBSD.ORG Tue May 5 18:40:15 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 17154106566B for ; Tue, 5 May 2009 18:40:15 +0000 (UTC) (envelope-from bob@veznat.com) Received: from mail.ttora.com (mail.ttora.com [208.75.243.236]) by mx1.freebsd.org (Postfix) with ESMTP id CB91E8FC08 for ; Tue, 5 May 2009 18:40:14 +0000 (UTC) (envelope-from bob@veznat.com) DomainKey-Signature: s=two; d=veznat.com; c=nofws; q=dns; h=X-MID:X-IronPort-AV:X-IronPort-AV:Received:User-Agent: Date:Subject:From:To:Message-ID:Thread-Topic:Thread-Index: Mime-version:Content-type:Content-transfer-encoding; b=hld6PGvqg8ciEDL0uSOPKe4K7tif9A6I2sN2/Dk5AVXQmvh+hmFcSAwa LkS7ncWptQnJ0Ux3yO4pzv6szdck5xmneiqIncUKF8fT7+OTcvEwplN44 +rk6eIS9OdStchDxMDOoH/AWSbDR6pfSmbFIBfbQPEA+3FwGfTpH/3aLA c=; DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=veznat.com; i=bob@veznat.com; q=dns/txt; s=one; t=1241548814; x=1273084814; h=from:sender:reply-to:subject:date:message-id:to:cc: mime-version:content-transfer-encoding:content-id: content-description:resent-date:resent-from:resent-sender: resent-to:resent-cc:resent-message-id:in-reply-to: references:list-id:list-help:list-unsubscribe: list-subscribe:list-post:list-owner:list-archive; z=From:=20Bob=20Van=20Zant=20|Subject:=20I Pv6=20duplicate=20address=20detection|Date:=20Tue,=2005 =20May=202009=2011:40:12=20-0700|Message-ID:=20|To:=20"freebsd-net@freebsd.org"=20< freebsd-net@freebsd.org>|Mime-version:=201.0 |Content-transfer-encoding:=207bit; bh=0tHAGD/DRfwjaro2NMA/mNiRb2wzmF2dkmwQOAfMm8Q=; b=KxztPg09F+RXLZ9TMJ8iiIxeH3t5fcp9P9gqu2/Ar83CFYSHyAxgOsOG GBIHez6ISUU2pCp3ETpvYuJZGMxlwzDQYh6Qo5Ys9CnoDh40g8rcz2Cl9 58Ug+U9Nmd4UK1rzj8beuVHtWc8OcIzjM6H9k1tcoIcrv7lbZH5tmqaeI s=; X-MID: 996206 X-IronPort-AV: E=McAfee;i="5300,2777,5606"; a="996206" X-IronPort-AV: E=Sophos;i="4.40,298,1239001200"; d="scan'208";a="996206" Received: from nat.ironport.com (HELO [173.37.10.6]) ([63.251.108.100]) by mail.ttora.com with ESMTP/TLS/DES-CBC3-SHA; 05 May 2009 11:40:12 -0700 User-Agent: Microsoft-Entourage/12.12.0.080729 Date: Tue, 05 May 2009 11:40:12 -0700 From: Bob Van Zant To: "freebsd-net@freebsd.org" Message-ID: Thread-Topic: IPv6 duplicate address detection Thread-Index: AcnNsOxZqVYYjQ4OVEeimi434NkgBg== Mime-version: 1.0 Content-type: text/plain; charset="US-ASCII" Content-transfer-encoding: 7bit Subject: IPv6 duplicate address detection X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 05 May 2009 18:40:15 -0000 I'm working on a piece of software that, among other things, allows an administrator to easily configure IPv6 interfaces on a FreeBSD host. I've run into a problem where whenever I reconfigure an interface with an IPv6 address FreeBSD marks the new address as being a duplicate. The problem is that I'm following RFC 2461 [1] in that I send an unsolicited neighbor advertisement to ff02::1 immediately after configuring the interface. This unsolicited neighbor advertisement is interpreted by FreeBSD as being a response to the neighbor solicitation it sends around the same time as part of duplicate address detection (DAD). This leads FreeBSD to think that the address is already in use, it doesn't notice that it is the one already using it. I want this to mean that there's a bug in the IPv6 implementation in that it shouldn't trigger a DAD failure if it sees an unsolicited NA from itself when sent from the same physical interface. An alternative view on this is that I shouldn't be sending out any packets, especially unsolicited NAs, using or referencing a tentative address. I'm writing to freebsd-net to ask what others think. If people agree that the address shouldn't be marked as a duplicate then I have a python script that reproduces the problem and a patch to nd6_nbr.c to attach to a problem report that I'll file. -Bob [1] RFC 2461 section 7.2.6 paragraph 1: In some cases a node may be able to determine that its link-layer address has changed (e.g., hot-swap of an interface card) and may wish to inform its neighbors of the new link-layer address quickly. From owner-freebsd-net@FreeBSD.ORG Tue May 5 22:32:17 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id D065B106567C for ; Tue, 5 May 2009 22:32:17 +0000 (UTC) (envelope-from auryn@zirakzigil.org) Received: from mail.giulioferro.it (mail.giulioferro.it [85.18.102.52]) by mx1.freebsd.org (Postfix) with ESMTP id 8DFEE8FC15 for ; Tue, 5 May 2009 22:32:17 +0000 (UTC) (envelope-from auryn@zirakzigil.org) Received: from localhost (localhost [127.0.0.1]) by mail.giulioferro.it (Postfix) with ESMTP id 2DE3233CB6 for ; Wed, 6 May 2009 00:34:25 +0200 (CEST) X-Virus-Scanned: amavisd-new at giulioferro.it Received: from mail.giulioferro.it ([127.0.0.1]) by localhost (aurynwork1sv1.giulioferro.it [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MJBX+eMD333g for ; Wed, 6 May 2009 00:34:22 +0200 (CEST) Received: from [192.168.229.16] (localhost [127.0.0.1]) (Authenticated sender: gferro@giulioferro.it) by mail.giulioferro.it (Postfix) with ESMTP id 7DC8733CB3 for ; Wed, 6 May 2009 00:34:22 +0200 (CEST) Message-ID: <4A00BE6C.5030800@zirakzigil.org> Date: Wed, 06 May 2009 00:32:12 +0200 From: Giulio Ferro User-Agent: Thunderbird 2.0.0.21 (X11/20090318) MIME-Version: 1.0 To: freebsd-net@freebsd.org Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Subject: Configure networking outside rc.conf X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 05 May 2009 22:32:18 -0000 I was wondering if there was a way to cleanly configure networking without using rc.conf but only ifconfig and other utilities This is what I mean: let's suppose that I have a complex network configuration to launch on my machine, for example: - many physical nics (with different speed, mtu, duplex...) - many aliases on them - many vlans - many carped interfaces - ng_fec - ... What I ask is: can I, set up networking in a way that is equivalent to creating the configuration in /etc/rc.conf and then using "/etc/rc.d/netif restart" ? I know how to set up the example configuration above, what I don't know is if I can do that cleanly, that is, cleaning the state of all interfaces, truncating vlans, etc., and then creating them again with ifconfig, ngctl, etc. Thanks in advance. From owner-freebsd-net@FreeBSD.ORG Tue May 5 22:54:25 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 6D2561065670 for ; Tue, 5 May 2009 22:54:25 +0000 (UTC) (envelope-from ccowart@rescomp.berkeley.edu) Received: from hal.rescomp.berkeley.edu (hal.Rescomp.Berkeley.EDU [169.229.70.150]) by mx1.freebsd.org (Postfix) with ESMTP id 566CA8FC08 for ; Tue, 5 May 2009 22:54:25 +0000 (UTC) (envelope-from ccowart@rescomp.berkeley.edu) Received: by hal.rescomp.berkeley.edu (Postfix, from userid 1225) id 1D4C53C05E6; Tue, 5 May 2009 15:54:25 -0700 (PDT) Date: Tue, 5 May 2009 15:54:25 -0700 From: Chris Cowart To: Giulio Ferro Message-ID: <20090505225425.GA49013@hal.rescomp.berkeley.edu> Mail-Followup-To: Giulio Ferro , freebsd-net@freebsd.org References: <4A00BE6C.5030800@zirakzigil.org> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-ripemd160; protocol="application/pgp-signature"; boundary="PEIAKu/WMn1b1Hv9" Content-Disposition: inline In-Reply-To: <4A00BE6C.5030800@zirakzigil.org> Organization: RSSP-IT, UC Berkeley User-Agent: Mutt/1.5.18 (2008-05-17) Cc: freebsd-net@freebsd.org Subject: Re: Configure networking outside rc.conf X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 05 May 2009 22:54:25 -0000 --PEIAKu/WMn1b1Hv9 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Giulio Ferro wrote: > I was wondering if there was a way to cleanly configure networking > without using rc.conf but only ifconfig and other utilities >=20 > This is what I mean: let's suppose that I have a complex network > configuration to launch on my machine, for example: > - many physical nics (with different speed, mtu, duplex...) > - many aliases on them > - many vlans > - many carped interfaces > - ng_fec > - ... >=20 > What I ask is: can I, set up networking in a way that is equivalent to > creating the configuration in /etc/rc.conf and then using > "/etc/rc.d/netif restart" ? >=20 > I know how to set up the example configuration above, what I > don't know is if I can do that cleanly, that is, cleaning the state of > all interfaces, truncating vlans, etc., and then creating them again > with ifconfig, ngctl, etc. Assuming the NICs are displayed by ifconfig -a or inserted into cloned_interfaces in /etc/rc.conf, you can create the following scripts: /etc/start_if.vlan100 /etc/stop_if.vlan100 Where start_if.vlan100 is sourced by the netif start and stop_if.vlan100 is sourced by the netif stop. For example: | ccowart dev-aux etc $ cat /etc/start_if.vlan81 | ifconfig vlan81 vlan 81 vlandev em0 | ifconfig vlan81 inet 10.81.1.1/16 I don't know that two files per interface is any cleaner than a really long /etc/rc.conf (I usually prefer the latter, but I generally am not dealing with more than 20-40 lines at most). --=20 Chris Cowart Network Technical Lead Network & Infrastructure Services, RSSP-IT UC Berkeley --PEIAKu/WMn1b1Hv9 Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.10 (FreeBSD) iQIcBAEBAwAGBQJKAMOgAAoJEIGh6j3cHUNPygQQAK2uqpQnSulGtFFi0O95J/eT qkV2yF1k6RLucmx2+bmYQWh7D95eAW5NUMP4klAzLh+X8+tYAKCStwY1+qB1PCeo 1AkOqvDpjHz+CEjEQlKKZ6ukamM1BCtcc3Alg3D1TSFQO4KS1jXEdnR+/rg769bc DjY7p6W2t/bagUrenxfCRGew2JvMh0X4G/oPpHuSjYC2DkNceJsGq0lEI0+/bc4t rWrXUKSdJsx3naJxUWZcfNN5sgUNd4AQHSQR6NTM4iqkUaTzNx4bt+PrzMz5m2I9 3X53Am1V+cAY5cdPbld4/f4wge8lFrVctjv6feyWDMNbI0RPjX3JjCwVNxpjt86z FsuWPTdfqvtIcwzC/zHxfdJID3+rky+6CbSOhABqcSAWSsb2+u7wTCRmY9lkHe8m nB6s3M1+pJJ3au0OzKXG5JxzRBpIbgPDLXkpTzEPPKTcSOghx1ZuwHeJNcFY/aSB cEcq/2iADEF2Bhwarja2FWsV9m36f5cw5NHdqWWSd7sqNZ29wx6wa48m1yKQRuy5 Esm5Sq66YBfq3nNUYmc8DKnWdOPiv3BZzsN+FiOh2haEnfL4g4BiCQ4sxHjjhckO yFHTxrReW1R+zW0KgRlkXdBiJYmuLFJknSaq5K9VXWWmZ1spy+V1S5iZyhLXhXgS Pf85NH1WLyrOAf/HisXT =kMQW -----END PGP SIGNATURE----- --PEIAKu/WMn1b1Hv9-- From owner-freebsd-net@FreeBSD.ORG Wed May 6 05:04:20 2009 Return-Path: Delivered-To: freebsd-net@hub.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 15285106566C; Wed, 6 May 2009 05:04:20 +0000 (UTC) (envelope-from remko@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:4f8:fff6::28]) by mx1.freebsd.org (Postfix) with ESMTP id DFFA58FC13; Wed, 6 May 2009 05:04:19 +0000 (UTC) (envelope-from remko@FreeBSD.org) Received: from freefall.freebsd.org (remko@localhost [127.0.0.1]) by freefall.freebsd.org (8.14.3/8.14.3) with ESMTP id n4654JDv038400; Wed, 6 May 2009 05:04:19 GMT (envelope-from remko@freefall.freebsd.org) Received: (from remko@localhost) by freefall.freebsd.org (8.14.3/8.14.3/Submit) id n4654J04038396; Wed, 6 May 2009 05:04:19 GMT (envelope-from remko) Date: Wed, 6 May 2009 05:04:19 GMT Message-Id: <200905060504.n4654J04038396@freefall.freebsd.org> To: remko@FreeBSD.org, freebsd-bugs@FreeBSD.org, freebsd-net@FreeBSD.org From: remko@FreeBSD.org Cc: Subject: Re: kern/134251: skype-2.0.0.72 broke with recent kernel changes in 7.2: all skype-out calls disconnect after 1 minute X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 06 May 2009 05:04:20 -0000 Synopsis: skype-2.0.0.72 broke with recent kernel changes in 7.2: all skype-out calls disconnect after 1 minute Responsible-Changed-From-To: freebsd-bugs->freebsd-net Responsible-Changed-By: remko Responsible-Changed-When: Wed May 6 05:04:06 UTC 2009 Responsible-Changed-Why: Seems like something networking http://www.freebsd.org/cgi/query-pr.cgi?pr=134251 From owner-freebsd-net@FreeBSD.ORG Wed May 6 05:40:04 2009 Return-Path: Delivered-To: freebsd-net@hub.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 63465106566C for ; Wed, 6 May 2009 05:40:04 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:4f8:fff6::28]) by mx1.freebsd.org (Postfix) with ESMTP id 36C8C8FC1A for ; Wed, 6 May 2009 05:40:04 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (gnats@localhost [127.0.0.1]) by freefall.freebsd.org (8.14.3/8.14.3) with ESMTP id n465e4aI080155 for ; Wed, 6 May 2009 05:40:04 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.14.3/8.14.3/Submit) id n465e4JK080154; Wed, 6 May 2009 05:40:04 GMT (envelope-from gnats) Date: Wed, 6 May 2009 05:40:04 GMT Message-Id: <200905060540.n465e4JK080154@freefall.freebsd.org> To: freebsd-net@FreeBSD.org From: Chagin Dmitry Cc: Subject: Re: kern/134251: skype-2.0.0.72 broke with recent kernel changes in 7.2: all skype-out calls disconnect after 1 minute X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: Chagin Dmitry List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 06 May 2009 05:40:04 -0000 The following reply was made to PR kern/134251; it has been noted by GNATS. From: Chagin Dmitry To: Yuri Cc: freebsd-gnats-submit@freebsd.org Subject: Re: kern/134251: skype-2.0.0.72 broke with recent kernel changes in 7.2: all skype-out calls disconnect after 1 minute Date: Wed, 6 May 2009 09:00:32 +0400 --W/nzBZO5zC0uMSeA Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Wed, May 06, 2009 at 12:49:19AM +0000, Yuri wrote: >=20 > >Number: 134251 > >Category: kern > >Synopsis: skype-2.0.0.72 broke with recent kernel changes in 7.2: = all skype-out calls disconnect after 1 minute > >Confidential: no > >Severity: serious > >Priority: high > >Responsible: freebsd-bugs > >State: open > >Quarter: =20 > >Keywords: =20 > >Date-Required: > >Class: sw-bug > >Submitter-Id: current-users > >Arrival-Date: Wed May 06 00:50:02 UTC 2009 > >Closed-Date: > >Last-Modified: > >Originator: Yuri > >Release: 7.2-PRERELEASE > >Organization: > n/a > >Environment: > >Description: > Looks like outgoing skype calls are broken by some kernel change between = Feb 25, 2009 and Arp 25, 2009. >=20 > Symptom is that time counter of the call counts seconds with much lower t= han 1Hz frequency and all outgoing calls disconnect after 1 minute. >=20 > On Feb 25 it was 7.1-STABLE. On Apr 25 it's 7.2-PRERELEASE. >=20 > This is a very serious usability issue and should be fixed before 7.2 is = made STABLE. >=20 > It may cause other adverse effects in other Linux apps. >=20 Try kern.hz=3D100 (in /boot/loader.conf) and report any resalts. --=20 Have fun! chd --W/nzBZO5zC0uMSeA Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.10 (FreeBSD) iEYEARECAAYFAkoBGW8ACgkQ0t2Tb3OO/O22UQCfUXT/NePexqXzR2nGKFdV1D6x 5f0AoK+S8qNNjrIDHAyUpp9ehyqdpY57 =iJ/Z -----END PGP SIGNATURE----- --W/nzBZO5zC0uMSeA-- From owner-freebsd-net@FreeBSD.ORG Wed May 6 05:47:48 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 58439106566B for ; Wed, 6 May 2009 05:47:48 +0000 (UTC) (envelope-from swun2010@gmail.com) Received: from mail-gx0-f211.google.com (mail-gx0-f211.google.com [209.85.217.211]) by mx1.freebsd.org (Postfix) with ESMTP id 1A2AD8FC0C for ; Wed, 6 May 2009 05:47:47 +0000 (UTC) (envelope-from swun2010@gmail.com) Received: by gxk7 with SMTP id 7so356989gxk.19 for ; Tue, 05 May 2009 22:47:47 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:date:message-id:subject :from:to:content-type:content-transfer-encoding; bh=IbYY5I3zLygY9l/R2WKaJCLYxNcN9B/fBBbB9eG7SSg=; b=Tygv7FJ0OtZ5on7GDz7O6vZgDN9baURGInltoNrgNd/SacqsmXPQDVgrT2Z51lq7Lz yZwEFueOp0Bhp/8wgzneu4M6zGB9zicH5XUFKEFr/1Ev1fXsEJVbg4YODYwaRV1Hc2Sw LyyvBKPJSzRO0qLEmcl9VUFSWSqxh31m2+vDA= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:date:message-id:subject:from:to:content-type :content-transfer-encoding; b=VTsFCkeUV2xKkDpQbFm8yaM+2mTh034IF6CckUenJcf9PR3NWP037/I3dlTLpDpnbd BUnmb+VkmWsOmxmkEtXfMUfKl5tc4odxEZTcSYXNWM3xYTMGkTICd4kPKVnmF1wymD5B 05OpXSrpbLB+ozKj3hN5xg4/HMV0vKZe+y0qs= MIME-Version: 1.0 Received: by 10.151.72.11 with SMTP id z11mr1750699ybk.3.1241588867552; Tue, 05 May 2009 22:47:47 -0700 (PDT) Date: Wed, 6 May 2009 15:47:47 +1000 Message-ID: <736c47cb0905052247q238bb68en285c47d64cdaf6cf@mail.gmail.com> From: Sam Wun To: freebsd-net@freebsd.org Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Subject: Installworld failed with net options are added in kernel config X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 06 May 2009 05:47:48 -0000 Hi, With 7.2, I have added the following options in the kernel config file then compiled... ################ MY STUFF ############################################# ##options IPDIVERT #divert sockets device pf #PF OpenBSD packet-filter firewall device pflog #logging support interface for PF device pfsync #synchronization interface for PF device carp #Common Address Redundancy Protocol device enc #IPSec interface (needs FAST_IPSEC) options ALTQ options ALTQ_CBQ options ALTQ_RED options ALTQ_RIO options ALTQ_HFSC options ALTQ_CDNR options ALTQ_PRIQ options ALTQ_NOPCC options NETGRAPH #netgraph(4) system options NETGRAPH_ASYNC options NETGRAPH_BPF options NETGRAPH_CISCO options NETGRAPH_ECHO options NETGRAPH_ETHER options NETGRAPH_FRAME_RELAY options NETGRAPH_HOLE options NETGRAPH_IFACE options NETGRAPH_KSOCKET options NETGRAPH_LMI # MPPC compression requires proprietary files (not included) #options NETGRAPH_MPPC_COMPRESSION options NETGRAPH_MPPC_ENCRYPTION options NETGRAPH_ONE2MANY options NETGRAPH_PPP options NETGRAPH_PPPOE options NETGRAPH_PPTPGRE options NETGRAPH_RFC1490 options NETGRAPH_SOCKET options NETGRAPH_TEE options NETGRAPH_TTY options NETGRAPH_UI options NETGRAPH_VJC #stuff for squid options MSGMNB=16384 # max # of bytes in a queue options MSGMNI=128 # number of message queue identifiers options MSGSEG=4096 # number of message segments per queue options MSGSSZ=256 # size of a message segment options MSGTQL=16384 # max messages in system options SHMSEG=64 # max shared mem id's per process options SHMMNI=128 # max shared mem id's per system options SHMMAX=8388608 # max shared memory segment size (bytes) options SHMALL=8192 # max amount of shared memory (pages) #stuff for postgresql options SHMMAXPGS=131072 options SEMMNI=64 options SEMMNS=240 options SEMUME=40 options SEMMNU=120 However, when it comes to installworld, it failed with the following errors: cat /usr/src/lib/ncurses/ncurses/../../../contrib/ncurses/man/key_defined.3x > key_defined.3 cat /usr/src/lib/ncurses/ncurses/../../../contrib/ncurses/man/keybound.3x > keybound.3 cat /usr/src/lib/ncurses/ncurses/../../../contrib/ncurses/man/keyok.3x > keyok.3 cat /usr/src/lib/ncurses/ncurses/../../../contrib/ncurses/man/legacy_coding.3x > legacy_coding.3 cat /usr/src/lib/ncurses/ncurses/../../../contrib/ncurses/man/ncurses.3x > ncurses.3 cat /usr/src/lib/ncurses/ncurses/../../../contrib/ncurses/man/resizeterm.3x > resizeterm.3 cat /usr/src/lib/ncurses/ncurses/../../../contrib/ncurses/man/wresize.3x > wresize.3 sh /usr/src/lib/ncurses/ncurses/../../../contrib/ncurses/man/MKterminfo.sh /usr/src/lib/ncurses/ncurses/../../../contrib/ncurses/man/terminfo.head /usr/src/lib/ncurses/ncurses/../../../contrib/ncurses/include/Caps /usr/src/lib/ncurses/ncurses/../../../contrib/ncurses/man/terminfo.tail >terminfo.5 tr: not found /usr/src/lib/ncurses/ncurses/../../../contrib/ncurses/man/MKterminfo.sh: cannot open unsorted61466: No such file or directory *** Error code 2 Stop in /usr/src/lib/ncurses/ncurses. *** Error code 1 Stop in /usr/src/lib/ncurses. *** Error code 1 Stop in /usr/src/lib. *** Error code 1 Stop in /usr/src. *** Error code 1 Stop in /usr/src. *** Error code 1 What is wrong with it? Your suggestion is highly appreciated. Thanks From owner-freebsd-net@FreeBSD.ORG Wed May 6 05:54:34 2009 Return-Path: Delivered-To: freebsd-net@hub.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id E020E1065670; Wed, 6 May 2009 05:54:34 +0000 (UTC) (envelope-from dchagin@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:4f8:fff6::28]) by mx1.freebsd.org (Postfix) with ESMTP id B55E48FC14; Wed, 6 May 2009 05:54:34 +0000 (UTC) (envelope-from dchagin@FreeBSD.org) Received: from freefall.freebsd.org (dchagin@localhost [127.0.0.1]) by freefall.freebsd.org (8.14.3/8.14.3) with ESMTP id n465sY08005959; Wed, 6 May 2009 05:54:34 GMT (envelope-from dchagin@freefall.freebsd.org) Received: (from dchagin@localhost) by freefall.freebsd.org (8.14.3/8.14.3/Submit) id n465sYV8005955; Wed, 6 May 2009 05:54:34 GMT (envelope-from dchagin) Date: Wed, 6 May 2009 05:54:34 GMT Message-Id: <200905060554.n465sYV8005955@freefall.freebsd.org> To: dchagin@FreeBSD.org, freebsd-net@FreeBSD.org, dchagin@FreeBSD.org From: dchagin@FreeBSD.org Cc: Subject: Re: kern/134251: skype-2.0.0.72 broke with recent kernel changes in 7.2: all skype-out calls disconnect after 1 minute X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 06 May 2009 05:54:35 -0000 Synopsis: skype-2.0.0.72 broke with recent kernel changes in 7.2: all skype-out calls disconnect after 1 minute Responsible-Changed-From-To: freebsd-net->dchagin Responsible-Changed-By: dchagin Responsible-Changed-When: Wed May 6 05:51:58 UTC 2009 Responsible-Changed-Why: Grab it, bug in Linux emulation layer. linux_times() should use kern.hz instead of own constant. I will fix this soon. http://www.freebsd.org/cgi/query-pr.cgi?pr=134251 From owner-freebsd-net@FreeBSD.ORG Wed May 6 13:09:35 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 5B7DE106564A for ; Wed, 6 May 2009 13:09:35 +0000 (UTC) (envelope-from nrml@att.net) Received: from web83806.mail.sp1.yahoo.com (web83806.mail.sp1.yahoo.com [69.147.85.75]) by mx1.freebsd.org (Postfix) with SMTP id 26EED8FC15 for ; Wed, 6 May 2009 13:09:35 +0000 (UTC) (envelope-from nrml@att.net) Received: (qmail 92888 invoked by uid 60001); 6 May 2009 12:42:55 -0000 Message-ID: <287772.92179.qm@web83806.mail.sp1.yahoo.com> X-YMail-OSG: fTZEJ34VM1kLlFqkCpyWPbXbcecUiUGYvaSDXnpdVgOqRlv7NvSYAjHAOkQBH.uEeIdg7NYCh1VYybpuETIqF6a5JMv4X.P9p52xeuK0SYkJVS47DWHKH37XQCqAFwtSkoRSlKsMPfZd0GDhSrW4IpUxsfzGXMyZskWROtdJWx13ZxPqaHQPfYPrwHuoUQD9GWw0XLbXUVXNgxgpLBA.HbOBl2ULnRprjqmLlUfzvKFFMiPNmSgWPKbcBIsLv.6ZhECyMxHCG9WMydChKlnACw2twCBA_soEUxvsH2Dxw.vbIVB6OgVKmdS2zHo54Jn6KgY_Hfl1 Received: from [69.43.143.59] by web83806.mail.sp1.yahoo.com via HTTP; Wed, 06 May 2009 05:42:54 PDT X-Mailer: YahooMailWebService/0.7.289.1 Date: Wed, 6 May 2009 05:42:54 -0700 (PDT) From: Gabe To: "Bjoern A. Zeeb" , Scott Ullrich In-Reply-To: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: freebsd-net@freebsd.org, VANHULLEBUS Yvan Subject: Re: IPSEC NAT traversal X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: nrml@att.net List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 06 May 2009 13:09:35 -0000 --- On Tue, 4/28/09, Scott Ullrich wrote: > From: Scott Ullrich > Subject: Re: IPSEC NAT traversal > To: "Bjoern A. Zeeb" > Cc: freebsd-net@freebsd.org, "VANHULLEBUS Yvan" > Date: Tuesday, April 28, 2009, 11:39 AM > On Tue, Apr 28, 2009 at 1:28 PM, Bjoern A. Zeeb > wrote: > > On Tue, 28 Apr 2009, Scott Ullrich wrote: > [snip] > > I have NAT-T on top of that. And I am currently doing > the whatever > > you'll call it 'final pass', will send it > back to Yvan once I am done > > with the last 2 items and last 400 lines of key.c . > After that I > > assume someone will commit it. > > As I am pretty sure you'll want to test it before > it goes into the > > tree so you'll get a copy as well; thanks for > volunteering;-p > > Hey that is great news. I will be ready to test the patch > as soon as > you are all ready. > > Thanks for the update > > Scott > _______________________________________________ So how is it coming along? Is the goal to standardize this and commit it to become a permanent part of freebsd? I've got a total of three machines with this patch and would reeeeally like it if it were. From owner-freebsd-net@FreeBSD.ORG Wed May 6 13:44:38 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 1CD171065676 for ; Wed, 6 May 2009 13:44:38 +0000 (UTC) (envelope-from auryn@zirakzigil.org) Received: from mail.giulioferro.it (mail.giulioferro.it [85.18.102.52]) by mx1.freebsd.org (Postfix) with ESMTP id C8B6C8FC1A for ; Wed, 6 May 2009 13:44:37 +0000 (UTC) (envelope-from auryn@zirakzigil.org) Received: from localhost (localhost [127.0.0.1]) by mail.giulioferro.it (Postfix) with ESMTP id 156BC33C17; Wed, 6 May 2009 15:46:46 +0200 (CEST) X-Virus-Scanned: amavisd-new at giulioferro.it Received: from mail.giulioferro.it ([127.0.0.1]) by localhost (aurynwork1sv1.giulioferro.it [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id r28sy+cWEAG8; Wed, 6 May 2009 15:46:42 +0200 (CEST) Received: from aurynmob2.giulioferro.it (localhost [127.0.0.1]) (Authenticated sender: gferro@giulioferro.it) by mail.giulioferro.it (Postfix) with ESMTP id 8668833C11; Wed, 6 May 2009 15:46:42 +0200 (CEST) Message-ID: <4A01943F.6000400@zirakzigil.org> Date: Wed, 06 May 2009 15:44:31 +0200 From: Giulio Ferro User-Agent: Thunderbird 2.0.0.21 (X11/20090323) MIME-Version: 1.0 To: Chris Cowart , freebsd-net@freebsd.org References: <4A00BE6C.5030800@zirakzigil.org> <20090505225425.GA49013@hal.rescomp.berkeley.edu> In-Reply-To: <20090505225425.GA49013@hal.rescomp.berkeley.edu> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Cc: Subject: Re: Configure networking outside rc.conf X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 06 May 2009 13:44:40 -0000 Chris Cowart wrote: > Assuming the NICs are displayed by ifconfig -a or inserted into > cloned_interfaces in /etc/rc.conf, you can create the following scripts: > > /etc/start_if.vlan100 > /etc/stop_if.vlan100 > > Where start_if.vlan100 is sourced by the netif start and stop_if.vlan100 > is sourced by the netif stop. > > For example: > > | ccowart dev-aux etc $ cat /etc/start_if.vlan81 > | ifconfig vlan81 vlan 81 vlandev em0 > | ifconfig vlan81 inet 10.81.1.1/16 > > I don't know that two files per interface is any cleaner than a really > long /etc/rc.conf (I usually prefer the latter, but I generally am not > dealing with more than 20-40 lines at most). > > Thanks for the reply. What should be normally put in the stop_if. file? Do the "stop" files make sense? Anyway I'll try to make it fit with what I need. From owner-freebsd-net@FreeBSD.ORG Wed May 6 14:05:07 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id BAEA71065670; Wed, 6 May 2009 14:05:07 +0000 (UTC) (envelope-from bzeeb-lists@lists.zabbadoz.net) Received: from mail.cksoft.de (mail.cksoft.de [195.88.108.3]) by mx1.freebsd.org (Postfix) with ESMTP id 728958FC29; Wed, 6 May 2009 14:05:07 +0000 (UTC) (envelope-from bzeeb-lists@lists.zabbadoz.net) Received: from localhost (amavis.fra.cksoft.de [192.168.74.71]) by mail.cksoft.de (Postfix) with ESMTP id E68AB41C751; Wed, 6 May 2009 16:05:05 +0200 (CEST) X-Virus-Scanned: amavisd-new at cksoft.de Received: from mail.cksoft.de ([195.88.108.3]) by localhost (amavis.fra.cksoft.de [192.168.74.71]) (amavisd-new, port 10024) with ESMTP id 4PwFrxqC2-Of; Wed, 6 May 2009 16:05:05 +0200 (CEST) Received: by mail.cksoft.de (Postfix, from userid 66) id 9006A41C750; Wed, 6 May 2009 16:05:05 +0200 (CEST) Received: from maildrop.int.zabbadoz.net (maildrop.int.zabbadoz.net [10.111.66.10]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.int.zabbadoz.net (Postfix) with ESMTP id 831B44448EC; Wed, 6 May 2009 14:04:50 +0000 (UTC) Date: Wed, 6 May 2009 14:04:49 +0000 (UTC) From: "Bjoern A. Zeeb" X-X-Sender: bz@maildrop.int.zabbadoz.net To: Gabe In-Reply-To: <287772.92179.qm@web83806.mail.sp1.yahoo.com> Message-ID: <20090506135851.R72053@maildrop.int.zabbadoz.net> References: <287772.92179.qm@web83806.mail.sp1.yahoo.com> X-OpenPGP-Key: 0x14003F198FEFA3E77207EE8D2B58B8F83CCF1842 MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII; format=flowed Cc: freebsd-net@freebsd.org, VANHULLEBUS Yvan , Scott Ullrich Subject: Re: IPSEC NAT traversal X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 06 May 2009 14:05:08 -0000 On Wed, 6 May 2009, Gabe wrote: Hi, I had been travelling yesterday, ... here is the summary for today: > So how is it coming along? It's compiling; it's on might notebook since last night as well. It hasn't crashed yet. I haven't tested IPsec yet either though;) That'll probably happen the next days. Need to build a custom ipsec-tools port first. > Is the goal to standardize this and commit it to become a permanent > part of freebsd? I've got a total of three machines with this patch > and would reeeeally like it if it were. Stadardize as in between everyone is not going to work. Different people have already adopted different APIs but trying to be as compatible with netbsd/linux sounds like a plan. OS X is different, unfortunately. Having it in FreeBSD 8.x is definitively on the schedule. /bz -- Bjoern A. Zeeb The greatest risk is not taking one. From owner-freebsd-net@FreeBSD.ORG Wed May 6 14:27:18 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 4D2361065709 for ; Wed, 6 May 2009 14:27:18 +0000 (UTC) (envelope-from bms@incunabulum.net) Received: from out2.smtp.messagingengine.com (out2.smtp.messagingengine.com [66.111.4.26]) by mx1.freebsd.org (Postfix) with ESMTP id 09F558FC12 for ; Wed, 6 May 2009 14:27:17 +0000 (UTC) (envelope-from bms@incunabulum.net) Received: from compute2.internal (compute2.internal [10.202.2.42]) by out1.messagingengine.com (Postfix) with ESMTP id 0818C33E4F8; Wed, 6 May 2009 10:27:17 -0400 (EDT) Received: from heartbeat1.messagingengine.com ([10.202.2.160]) by compute2.internal (MEProxy); Wed, 06 May 2009 10:27:17 -0400 X-Sasl-enc: zFycSp61tQQ9kPUhEOOUvWNf/A8yF+TUI948RZLcXMYl 1241620036 Received: from [192.168.123.18] (82-35-112-254.cable.ubr07.dals.blueyonder.co.uk [82.35.112.254]) by mail.messagingengine.com (Postfix) with ESMTPSA id 4EDAC2E34E; Wed, 6 May 2009 10:27:16 -0400 (EDT) Message-ID: <4A019E40.1030606@incunabulum.net> Date: Wed, 06 May 2009 15:27:12 +0100 From: Bruce Simpson User-Agent: Thunderbird 2.0.0.21 (Windows/20090302) MIME-Version: 1.0 To: Bob Van Zant References: In-Reply-To: Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Cc: "freebsd-net@freebsd.org" Subject: Re: IPv6 duplicate address detection X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 06 May 2009 14:27:18 -0000 Bob Van Zant wrote: > I'm working on a piece of software that, among other things, allows an > administrator to easily configure IPv6 interfaces on a FreeBSD host. I've > run into a problem where whenever I reconfigure an interface with an IPv6 > address FreeBSD marks the new address as being a duplicate. > > The problem is that I'm following RFC 2461 [1] in that I send an unsolicited > neighbor advertisement to ff02::1 immediately after configuring the > interface. > How are you doing this? Do you do this from the kernel or from your own userland code? Normally the kernel does DAD for you when a new IPv6 address is configured, and you shouldn't need to do it manually. However, I would agree that there should probably be more run-time, user-space controls over how the IPv6 stack behaves. > This unsolicited neighbor advertisement is interpreted by FreeBSD as being a > response to the neighbor solicitation it sends around the same time as part > of duplicate address detection (DAD). This leads FreeBSD to think that the > address is already in use, it doesn't notice that it is the one already > using it. > It sounds like what you are trying to do is useful (a bit like gratuitous ARP) but I wonder exactly what conditions it's triggering in nd6_nbr.c which would cause it to interpret what you send in this way. One problem with trying to ape what the kernel does is in userland is that unless there's a unique ID in the datagram(s) thus sent that you can key off, it's difficult to catch it in the act and figure out what to do; there's also scheduler jitter to contend with. > I want this to mean that there's a bug in the IPv6 implementation in that it > shouldn't trigger a DAD failure if it sees an unsolicited NA from itself > when sent from the same physical interface. > This seems like a bug. Have you looked in the KAME repo to see if it got fixed there? Perhaps NetBSD have already fixed it in their import of KAME? > An alternative view on this is that I shouldn't be sending out any packets, > especially unsolicited NAs, using or referencing a tentative address. > That can be tricky to implement. There is a function in6ifa_ifpforlinklocal() which takes various flags. It is told to skip tentative addresses or duplicates by passing IN6_IFF_NOTREADY. Normally this will return the ifa pointer to the link-local address which was auto-configured on the inerface. Currently the MLDv2 code in HEAD will use the unspecified address (::) as a source address if the IFA match returned by this function is NULL, this is allowed by the MLDv2 spec. > I'm writing to freebsd-net to ask what others think. > > If people agree that the address shouldn't be marked as a duplicate then I > have a python script that reproduces the problem and a patch to nd6_nbr.c to > attach to a problem report that I'll file. > Can you try HEAD sources and disable IPv6 multicast loopback by default (net.inet6.ip6.mcast.loop, off the top of my head) ? It is possible that your ff02::1 packet is being looped back and somehow the NA/NS code is interpreting it as on-wire traffic. 7.x will loop back by default. You could even try just setting IPV6_MULTICAST_LOOP to 0 in your userland DAD code. That should help establish how the NA/NS code is seeing your locally originated control traffic... cheers, BMS From owner-freebsd-net@FreeBSD.ORG Wed May 6 15:36:30 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id AB84E106564A for ; Wed, 6 May 2009 15:36:30 +0000 (UTC) (envelope-from petri@helenius.fi) Received: from silver.he.iki.fi (mx.helenius.fi [IPv6:2001:1bc8:1018::42]) by mx1.freebsd.org (Postfix) with ESMTP id 13D8D8FC13 for ; Wed, 6 May 2009 15:36:29 +0000 (UTC) (envelope-from petri@helenius.fi) Received: from localhost (localhost [127.0.0.1]) by silver.he.iki.fi (Postfix) with ESMTP id E0C60BC50 for ; Wed, 6 May 2009 18:36:26 +0300 (EEST) Received: from silver.he.iki.fi ([127.0.0.1]) by localhost (silver.he.iki.fi [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2Fw2EmdxC0QP for ; Wed, 6 May 2009 18:36:20 +0300 (EEST) Received: from [83.150.107.196] (d196.helenius.fi [83.150.107.196]) by silver.he.iki.fi (Postfix) with ESMTP for ; Wed, 6 May 2009 18:36:19 +0300 (EEST) Message-ID: <4A01AE67.5090101@helenius.fi> Date: Wed, 06 May 2009 18:36:07 +0300 From: Petri Helenius User-Agent: Thunderbird 2.0.0.21 (Windows/20090302) MIME-Version: 1.0 To: freebsd-net@freebsd.org Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Subject: Signalling out of accept X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 06 May 2009 15:36:31 -0000 Hi, What is the preferred way of getting out of an accept in an multithreaded application? On linux it works that the in-kernel filedescriptor is closed from the signal handler but that does not seem to do the trick in FreeBSD 7.1 or 7.2. Is using poll the only option or preferred anyway? Pete From owner-freebsd-net@FreeBSD.ORG Wed May 6 21:55:07 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id AE09D1065697 for ; Wed, 6 May 2009 21:55:07 +0000 (UTC) (envelope-from bob@veznat.com) Received: from mail.ttora.com (mail.ttora.com [208.75.243.236]) by mx1.freebsd.org (Postfix) with ESMTP id 6AC828FC16 for ; Wed, 6 May 2009 21:55:07 +0000 (UTC) (envelope-from bob@veznat.com) DomainKey-Signature: s=two; d=veznat.com; c=nofws; q=dns; h=X-MID:X-IronPort-AV:X-IronPort-AV:Received:User-Agent: Date:Subject:From:To:CC:Message-ID:Thread-Topic: Thread-Index:In-Reply-To:Mime-version:Content-type: Content-transfer-encoding; b=n6OFqOSSIzxvdDo7r0zDxdRD58kQd71hV0uMYni0x0P3bACifURahQqx RayUCn9cuasw26UMGQ4+MuANvu8xJKxkjm1kIXxKNnFwTkXCrcCXYHx1+ 3ySWP2QBRhl3ZXuMtUyE1FvoWtFML/0vC1xaGdDSRLCKYeaCfb+seSPRz E=; DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=veznat.com; i=bob@veznat.com; q=dns/txt; s=one; t=1241646907; x=1273182907; h=from:sender:reply-to:subject:date:message-id:to:cc: mime-version:content-transfer-encoding:content-id: content-description:resent-date:resent-from:resent-sender: resent-to:resent-cc:resent-message-id:in-reply-to: references:list-id:list-help:list-unsubscribe: list-subscribe:list-post:list-owner:list-archive; z=From:=20Bob=20Van=20Zant=20|Subject:=20R e:=20IPv6=20duplicate=20address=20detection|Date:=20Wed, =2006=20May=202009=2014:55:02=20-0700|Message-ID:=20|To:=20Bruce=20Simpson=20|CC:=20"freebsd-net@freebsd.org"=20|Mime-version:=201.0 |Content-transfer-encoding:=207bit|In-Reply-To:=20<4A019E 40.1030606@incunabulum.net>; bh=FtqtOFYKbT4GrMohylxRUGsbaW6ToYSRxl4LL6s4O9U=; b=se01HTAH5Ak0hfeSvpCyIiH6BVZbamEgr2/57vF9rjTUMCUiyfyorISv oosPNapv5O6TRSIiLVydMYcce8Goc6AGa7pKQEd78h74eSgybwibFQx+y hTGxhPBN7aSnLoFgmzQkA2s1nVhBB0iRrfSC+70kyp/iRsQUpli3TX/Z8 M=; X-MID: 1015280 X-IronPort-AV: E=McAfee;i="5300,2777,5607"; a="1015280" X-IronPort-AV: E=Sophos;i="4.40,305,1239001200"; d="scan'208";a="1015280" Received: from nat.ironport.com (HELO [173.37.10.6]) ([63.251.108.100]) by mail.ttora.com with ESMTP/TLS/DES-CBC3-SHA; 06 May 2009 14:55:06 -0700 User-Agent: Microsoft-Entourage/12.12.0.080729 Date: Wed, 06 May 2009 14:55:02 -0700 From: Bob Van Zant To: Bruce Simpson Message-ID: Thread-Topic: IPv6 duplicate address detection Thread-Index: AcnOlU6LT0LSdsQVtUeiI5w1rMxdkQ== In-Reply-To: <4A019E40.1030606@incunabulum.net> Mime-version: 1.0 Content-type: text/plain; charset="US-ASCII" Content-transfer-encoding: 7bit Cc: "freebsd-net@freebsd.org" Subject: Re: IPv6 duplicate address detection X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 06 May 2009 21:55:08 -0000 On 5/6/09 7:27 AM, "Bruce Simpson" wrote: >> The problem is that I'm following RFC 2461 [1] in that I send an unsolicited >> neighbor advertisement to ff02::1 immediately after configuring the >> interface. >> > > How are you doing this? Do you do this from the kernel or from your own > userland code? Userland code. SOCK_RAW and IPPROTO_ICMPV6. > > Normally the kernel does DAD for you when a new IPv6 address is > configured, and you shouldn't need to do it manually. Just to be clear, I'm not trying to do DAD. You mention later that this sounds like gratuitous ARP and that's the best analogy for what I'm doing. I fire off a single packet into the wild and hope that my neighbors see my new link-layer address (we do NIC failover). > It sounds like what you are trying to do is useful (a bit like > gratuitous ARP) but I wonder exactly what conditions it's triggering in > nd6_nbr.c which would cause it to interpret what you send in this way. There's not really anything in nd6_nbr.c to prevent this behavior. I have a patch that changes this. I don't know if it's making an invalid assumption or not. In my basic tests it avoids the behavior where my IP gets marked as a duplicate but still allows DAD to work when the address really is a dup. --- nd6_nbr.c.backup Mon May 4 10:12:20 2009 +++ sys/netinet6/nd6_nbr.c Mon May 4 14:19:30 2009 @@ -618,8 +618,16 @@ lladdr = (char *)(ndopts.nd_opts_tgt_lladdr + 1); lladdrlen = ndopts.nd_opts_tgt_lladdr->nd_opt_len << 3; } + /* Is the source address of this packet one of my + * addresses on this same interface? If so this packet was sent by me + * and should not trigger a DAD failure. + */ + ifa = (struct ifaddr *)in6ifa_ifpwithaddr(ifp, &(ip6->ip6_src)); + if (ifa) + goto freeit; + > This seems like a bug. > Have you looked in the KAME repo to see if it got fixed there? > Perhaps NetBSD have already fixed it in their import of KAME? I took a look through head of the kame cvsweb sources and don't see any differences from 6.3 sources I have. They have some MIP6 code in place but that's the only difference I see. > >> An alternative view on this is that I shouldn't be sending out any packets, >> especially unsolicited NAs, using or referencing a tentative address. >> > > That can be tricky to implement. There is a function > in6ifa_ifpforlinklocal() which takes various flags. It is told to skip > tentative addresses or duplicates by passing IN6_IFF_NOTREADY. Normally > this will return the ifa pointer to the link-local address which was > auto-configured on the inerface. Being in userland I don't think I can call this. However, I discovered the SIOCGIFAFLAG_IN6 ioctl which gives me back the flags for an tuple. In this way I can poll for whether or not this IP is tentative or not. Similarly I can tell whether DAD failed. > > Can you try HEAD sources and disable IPv6 multicast loopback by default > (net.inet6.ip6.mcast.loop, off the top of my head) ? > > It is possible that your ff02::1 packet is being looped back and somehow > the NA/NS code is interpreting it as on-wire traffic. > 7.x will loop back by default. You could even try just setting > IPV6_MULTICAST_LOOP to 0 in your userland DAD code. I don't have a HEAD kernel handy. However, this socket option was a nice pointer, thank you. Setting this to 0 does prevent the behavior I was seeing. I guess this makes it extra clear that the multicast packet I'm sending is simply being looped back in. I'm guessing that the next step is for me to file a PR with this information? Or what do you suggest? -Bob From owner-freebsd-net@FreeBSD.ORG Wed May 6 22:06:49 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id C6B881065672 for ; Wed, 6 May 2009 22:06:49 +0000 (UTC) (envelope-from Jinmei_Tatuya@isc.org) Received: from mon.jinmei.org (mon.jinmei.org [IPv6:2001:4f8:3:36::162]) by mx1.freebsd.org (Postfix) with ESMTP id B51968FC1B for ; Wed, 6 May 2009 22:06:49 +0000 (UTC) (envelope-from Jinmei_Tatuya@isc.org) Received: from jmb.jinmei.org (unknown [IPv6:2001:4f8:3:bb:217:f2ff:fee0:a91f]) by mon.jinmei.org (Postfix) with ESMTP id CDDFA33C2E; Wed, 6 May 2009 15:06:48 -0700 (PDT) Date: Wed, 06 May 2009 15:06:48 -0700 Message-ID: From: JINMEI Tatuya / =?ISO-2022-JP?B?GyRCP0BMQEMjOkgbKEI=?= To: Bob Van Zant In-Reply-To: References: User-Agent: Wanderlust/2.14.0 (Africa) Emacs/22.1 Mule/5.0 (SAKAKI) MIME-Version: 1.0 (generated by SEMI 1.14.6 - "Maruoka") Content-Type: text/plain; charset=US-ASCII Cc: "freebsd-net@freebsd.org" Subject: Re: IPv6 duplicate address detection X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 06 May 2009 22:06:50 -0000 At Tue, 05 May 2009 11:40:12 -0700, Bob Van Zant wrote: > > I'm working on a piece of software that, among other things, allows an > administrator to easily configure IPv6 interfaces on a FreeBSD host. I've > run into a problem where whenever I reconfigure an interface with an IPv6 > address FreeBSD marks the new address as being a duplicate. > > The problem is that I'm following RFC 2461 [1] in that I send an unsolicited > neighbor advertisement to ff02::1 immediately after configuring the > interface. I'm afraid we need clarification first...what do you mean by "reconfigure an interface with an IPv6 address"? Do you mean adding a new IPv6 address to an interface? If so, I'm not sure why you referred to the following part of RFC2461 (btw the RFC was updated by RFC4861): > [1] RFC 2461 section 7.2.6 paragraph 1: > > In some cases a node may be able to determine that its link-layer > address has changed (e.g., hot-swap of an interface card) and may > wish to inform its neighbors of the new link-layer address quickly. this example talks about the case where the link-layer address changes for an existing address, not where a new address is configured. Could you elaborate? --- JINMEI, Tatuya Internet Systems Consortium, Inc. From owner-freebsd-net@FreeBSD.ORG Wed May 6 22:49:51 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id C0D281065672 for ; Wed, 6 May 2009 22:49:51 +0000 (UTC) (envelope-from bob@veznat.com) Received: from mail.ttora.com (mail.ttora.com [208.75.243.236]) by mx1.freebsd.org (Postfix) with ESMTP id 7BC928FC0A for ; Wed, 6 May 2009 22:49:51 +0000 (UTC) (envelope-from bob@veznat.com) DomainKey-Signature: s=two; d=veznat.com; c=nofws; q=dns; h=X-MID:X-IronPort-AV:X-IronPort-AV:Received:User-Agent: Date:Subject:From:To:CC:Message-ID:Thread-Topic: Thread-Index:In-Reply-To:Mime-version:Content-type: Content-transfer-encoding; b=L1iKW49wvmh3kzjtSjR5g4KO6s58yv+H15HS43IH1KpSKZNk6+VK0RZk GA90fYOaxjHEFlGkbpoJ8ecyWQWbJdXC7pnnf0DIeRItPHWvsFO4SWoFy 3eTCZRITP9xa2NgKMREqyvytOfaegoUwvgKo0dcVYmcH9p6YyC6uNcE9H Q=; DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=veznat.com; i=bob@veznat.com; q=dns/txt; s=one; t=1241650191; x=1273186191; h=from:sender:reply-to:subject:date:message-id:to:cc: mime-version:content-transfer-encoding:content-id: content-description:resent-date:resent-from:resent-sender: resent-to:resent-cc:resent-message-id:in-reply-to: references:list-id:list-help:list-unsubscribe: list-subscribe:list-post:list-owner:list-archive; z=From:=20Bob=20Van=20Zant=20|Subject:=20R e:=20IPv6=20duplicate=20address=20detection|Date:=20Wed, =2006=20May=202009=2015:49:45=20-0700|Message-ID:=20|To:=20=20JINMEI=20Tatuya=20/ =20=3D?ISO-2022-JP?B?GyRCP0BMQEMjOkgbKEI=3D?=3D=0D=0A=20< Jinmei_Tatuya@isc.org>|CC:=20"freebsd-net@freebsd.org"=20 |Mime-version:=201.0 |Content-transfer-encoding:=207bit|In-Reply-To:=20; bh=4a2u6dVxFGvE+Z+78u/rO7EwziHF/haZthMumwVB+bg=; b=UnLR4jjgIDn0F0Qx93Szi8PyzhHL5WZkF1qPGufQg2H3xLHHHJ6b98YG EIW7lUiAYJqniii5Uqa72u1UGJSO3JexEx3qhfaladbaYTZ0goFgCIG+/ /whBmFCXP5AuAcfLSrJMiDkIqwlirpiJRVqXqFWZ6yQKuIMzm+CFteicS o=; X-MID: 1016190 X-IronPort-AV: E=McAfee;i="5300,2777,5607"; a="1016190" X-IronPort-AV: E=Sophos;i="4.40,305,1239001200"; d="scan'208";a="1016190" Received: from nat.ironport.com (HELO [173.37.10.6]) ([63.251.108.100]) by mail.ttora.com with ESMTP/TLS/DES-CBC3-SHA; 06 May 2009 15:49:49 -0700 User-Agent: Microsoft-Entourage/12.12.0.080729 Date: Wed, 06 May 2009 15:49:45 -0700 From: Bob Van Zant To: JINMEI Tatuya / =?ISO-2022-JP?B?GyRCP0BMQEMjOkgbKEI=?= Message-ID: Thread-Topic: IPv6 duplicate address detection Thread-Index: AcnOnPNdQBRY1ktUrkWYPE80CEXaSA== In-Reply-To: Mime-version: 1.0 Content-type: text/plain; charset="ISO-2022-JP" Content-transfer-encoding: 7bit Cc: "freebsd-net@freebsd.org" Subject: Re: IPv6 duplicate address detection X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 06 May 2009 22:49:52 -0000 On 5/6/09 3:06 PM, "JINMEI Tatuya / 神明達哉" wrote: > I'm afraid we need clarification first...what do you mean by > "reconfigure an interface with an IPv6 address"? Do you mean adding a > new IPv6 address to an interface? If so, I'm not sure why you > referred to the following part of RFC2461 (btw the RFC was updated by > RFC4861): We have a crude form of NIC pairing in our software. We allow someone to logically pair two interfaces together. This is implemented by `ifconfig down` both interfaces, configure them both the same, then `ifconfig up` the primary interface. We then monitor the link state of the primary interface. If the state goes to down, we `ifconfig down` the primary NIC and then `ifconfig up` the secondary NIC. This has the effect of changing the link layer address associated with a given IPv6 address. After we do this we send out the unsolicited NA to update whatever switch we're plugged into. We do this today with IPv4 and ARP and it works fine. >> [1] RFC 2461 section 7.2.6 paragraph 1: >> >> In some cases a node may be able to determine that its link-layer >> address has changed (e.g., hot-swap of an interface card) and may >> wish to inform its neighbors of the new link-layer address quickly. > > this example talks about the case where the link-layer address changes > for an existing address, not where a new address is configured. I hope the example I gave above helps to clarify that I am trying to handle a case where the link-layer address has changed. However, I'll admit that I had been planning on sending the unsolicited NA after any ifconfig commands were executed. So long as I'm not flooding the network it doesn't seem harmful and potentially seems useful to avoid a few seconds of downtime while the network figures things out. -Bob From owner-freebsd-net@FreeBSD.ORG Wed May 6 23:55:53 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 0AC641065670 for ; Wed, 6 May 2009 23:55:53 +0000 (UTC) (envelope-from Jinmei_Tatuya@isc.org) Received: from mon.jinmei.org (mon.jinmei.org [IPv6:2001:4f8:3:36::162]) by mx1.freebsd.org (Postfix) with ESMTP id CEE598FC23 for ; Wed, 6 May 2009 23:55:51 +0000 (UTC) (envelope-from Jinmei_Tatuya@isc.org) Received: from jmb.jinmei.org (unknown [IPv6:2001:4f8:3:bb:217:f2ff:fee0:a91f]) by mon.jinmei.org (Postfix) with ESMTP id A80E233C5B; Wed, 6 May 2009 16:55:51 -0700 (PDT) Date: Wed, 06 May 2009 16:55:51 -0700 Message-ID: From: JINMEI Tatuya / =?ISO-2022-JP?B?GyRCP0BMQEMjOkgbKEI=?= To: Bob Van Zant In-Reply-To: References: User-Agent: Wanderlust/2.14.0 (Africa) Emacs/22.1 Mule/5.0 (SAKAKI) MIME-Version: 1.0 (generated by SEMI 1.14.6 - "Maruoka") Content-Type: text/plain; charset=US-ASCII Cc: "freebsd-net@freebsd.org" Subject: Re: IPv6 duplicate address detection X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 06 May 2009 23:55:54 -0000 At Wed, 06 May 2009 15:49:45 -0700, Bob Van Zant wrote: > > I'm afraid we need clarification first...what do you mean by > > "reconfigure an interface with an IPv6 address"? Do you mean adding a > > new IPv6 address to an interface? If so, I'm not sure why you > > referred to the following part of RFC2461 (btw the RFC was updated by > > RFC4861): > We have a crude form of NIC pairing in our software. We allow someone to > logically pair two interfaces together. This is implemented by `ifconfig > down` both interfaces, configure them both the same, then `ifconfig up` the > primary interface. We then monitor the link state of the primary interface. > If the state goes to down, we `ifconfig down` the primary NIC and then > `ifconfig up` the secondary NIC. This has the effect of changing the link > layer address associated with a given IPv6 address. After we do this we send > out the unsolicited NA to update whatever switch we're plugged into. Okay, thanks for the explanation. But I still don't understand one thing: why is DAD triggered for the address on the secondary NIC? Unless someone has changed the code recently, the FreeBSD (KAME-derived) IPv6 stack shouldn't trigger DAD for an existing address simply because the interface becomes 'up' (this behavior may be debatable per se, but that's a different question). Did you perhaps make the address "tentative" by hand after configuring the address? --- JINMEI, Tatuya Internet Systems Consortium, Inc. From owner-freebsd-net@FreeBSD.ORG Thu May 7 00:18:02 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 1D9801065673 for ; Thu, 7 May 2009 00:18:02 +0000 (UTC) (envelope-from bob@veznat.com) Received: from mail.ttora.com (mail.ttora.com [208.75.243.236]) by mx1.freebsd.org (Postfix) with ESMTP id C7C0B8FC0C for ; Thu, 7 May 2009 00:18:01 +0000 (UTC) (envelope-from bob@veznat.com) DomainKey-Signature: s=two; d=veznat.com; c=nofws; q=dns; h=X-MID:X-IronPort-AV:X-IronPort-AV:Received:User-Agent: Date:Subject:From:To:CC:Message-ID:Thread-Topic: Thread-Index:In-Reply-To:Mime-version:Content-type: Content-transfer-encoding; b=Xpwmvkqj0ug3HmC+B1OGuK3MLfM/Iom7XUVpqNx5JT+ThThl+HjPbu3c 4xRH4sr6DCEaSTMph8oXJQ8/pYBgb4b+OrNY4deIjYK1FE4fU02GkI7n6 6firoHSf2nGmqiq45Sz0+LtKK4FJEpDOk6D3+xeR6Jx4QKJze5VlhfALq 8=; DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=veznat.com; i=bob@veznat.com; q=dns/txt; s=one; t=1241655482; x=1273191482; h=from:sender:reply-to:subject:date:message-id:to:cc: mime-version:content-transfer-encoding:content-id: content-description:resent-date:resent-from:resent-sender: resent-to:resent-cc:resent-message-id:in-reply-to: references:list-id:list-help:list-unsubscribe: list-subscribe:list-post:list-owner:list-archive; z=From:=20Bob=20Van=20Zant=20|Subject:=20R e:=20IPv6=20duplicate=20address=20detection|Date:=20Wed, =2006=20May=202009=2017:17:52=20-0700|Message-ID:=20|To:=20=20JINMEI=20Tatuya=20/ =20=3D?ISO-2022-JP?B?GyRCP0BMQEMjOkgbKEI=3D?=3D=0D=0A=20< Jinmei_Tatuya@isc.org>|CC:=20"freebsd-net@freebsd.org"=20 |Mime-version:=201.0 |Content-transfer-encoding:=207bit|In-Reply-To:=20; bh=xvHCEu4ir8SNO2hQmSK2olYLxy3AJGQdGXLM1dyQw4M=; b=j0HmI0rhnQFrGs1DWMTJdEmNAlSWYlleag3yzhXSb/gmGtV0frY7ge/f fJJ0q5RvpoXBzc1l1osNLURc8u3yHFGlkpTkZddvbKWEoCRZ7aRKW6Vys qdFQujB5GZ41O7SGQggAHp/s+BQYdUhj4amI0q/FUQt2qjKjEO/M0e8JH s=; X-MID: 1017051 X-IronPort-AV: E=McAfee;i="5300,2777,5607"; a="1017051" X-IronPort-AV: E=Sophos;i="4.40,305,1239001200"; d="scan'208";a="1017051" Received: from nat.ironport.com (HELO [173.37.10.6]) ([63.251.108.100]) by mail.ttora.com with ESMTP/TLS/DES-CBC3-SHA; 06 May 2009 17:17:56 -0700 User-Agent: Microsoft-Entourage/12.12.0.080729 Date: Wed, 06 May 2009 17:17:52 -0700 From: Bob Van Zant To: JINMEI Tatuya / =?ISO-2022-JP?B?GyRCP0BMQEMjOkgbKEI=?= Message-ID: Thread-Topic: IPv6 duplicate address detection Thread-Index: AcnOqUKpin67QKJAakqfrjpw4WmQmw== In-Reply-To: Mime-version: 1.0 Content-type: text/plain; charset="ISO-2022-JP" Content-transfer-encoding: 7bit Cc: "freebsd-net@freebsd.org" Subject: Re: IPv6 duplicate address detection X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 07 May 2009 00:18:02 -0000 I never actually tested the NIC pairing scenario and was only testing the naive "add a new IP, fire off an unsolicited NA for that IP." I did just test the NIC pairing and you are right, if the interface is down when it is configured we don't run DAD. Which does seem weird but that would be a different thread. I guess that changes my question quite a bit. If you randomly fire off an unsolicited NA right after configuring an interface should that cause a DAD failure? -Bob On 5/6/09 4:55 PM, "JINMEI Tatuya / 神明達哉" wrote: > At Wed, 06 May 2009 15:49:45 -0700, > Bob Van Zant wrote: > >>> I'm afraid we need clarification first...what do you mean by >>> "reconfigure an interface with an IPv6 address"? Do you mean adding a >>> new IPv6 address to an interface? If so, I'm not sure why you >>> referred to the following part of RFC2461 (btw the RFC was updated by >>> RFC4861): > >> We have a crude form of NIC pairing in our software. We allow someone to >> logically pair two interfaces together. This is implemented by `ifconfig >> down` both interfaces, configure them both the same, then `ifconfig up` the >> primary interface. We then monitor the link state of the primary interface. >> If the state goes to down, we `ifconfig down` the primary NIC and then >> `ifconfig up` the secondary NIC. This has the effect of changing the link >> layer address associated with a given IPv6 address. After we do this we send >> out the unsolicited NA to update whatever switch we're plugged into. > > Okay, thanks for the explanation. But I still don't understand one > thing: why is DAD triggered for the address on the secondary NIC? > Unless someone has changed the code recently, the FreeBSD > (KAME-derived) IPv6 stack shouldn't trigger DAD for an existing > address simply because the interface becomes 'up' (this behavior may > be debatable per se, but that's a different question). Did you > perhaps make the address "tentative" by hand after configuring the > address? > > --- > JINMEI, Tatuya > Internet Systems Consortium, Inc. From owner-freebsd-net@FreeBSD.ORG Thu May 7 05:47:41 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 13E97106566C for ; Thu, 7 May 2009 05:47:41 +0000 (UTC) (envelope-from Jinmei_Tatuya@isc.org) Received: from mon.jinmei.org (mon.jinmei.org [IPv6:2001:4f8:3:36::162]) by mx1.freebsd.org (Postfix) with ESMTP id 0271A8FC1A for ; Thu, 7 May 2009 05:47:41 +0000 (UTC) (envelope-from Jinmei_Tatuya@isc.org) Received: from jmb.jinmei.org (user-64-9-233-161.googlewifi.com [64.9.233.161]) by mon.jinmei.org (Postfix) with ESMTP id 76D5333C2E; Wed, 6 May 2009 22:47:37 -0700 (PDT) Date: Wed, 06 May 2009 22:47:35 -0700 Message-ID: From: JINMEI Tatuya / =?ISO-2022-JP?B?GyRCP0BMQEMjOkgbKEI=?= To: Bob Van Zant In-Reply-To: References: User-Agent: Wanderlust/2.14.0 (Africa) Emacs/22.1 Mule/5.0 (SAKAKI) MIME-Version: 1.0 (generated by SEMI 1.14.6 - "Maruoka") Content-Type: text/plain; charset=US-ASCII Cc: "freebsd-net@freebsd.org" Subject: Re: IPv6 duplicate address detection X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 07 May 2009 05:47:41 -0000 At Wed, 06 May 2009 17:17:52 -0700, Bob Van Zant wrote: > I guess that changes my question quite a bit. If you randomly fire off an > unsolicited NA right after configuring an interface should that cause a DAD > failure? Actually, in that case you shouldn't send out the NA in the first place because you're in the middle of DAD, trying to confirming the uniqueness of the target address. If you want to send an unsolicited NA for an address on which DAD is performed for any reason, you should wait until DAD is completed. --- JINMEI, Tatuya Internet Systems Consortium, Inc. From owner-freebsd-net@FreeBSD.ORG Thu May 7 06:00:25 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id DF7A4106566C for ; Thu, 7 May 2009 06:00:25 +0000 (UTC) (envelope-from bob@veznat.com) Received: from mail.ttora.com (mail.ttora.com [208.75.243.236]) by mx1.freebsd.org (Postfix) with ESMTP id 9C6D78FC19 for ; Thu, 7 May 2009 06:00:25 +0000 (UTC) (envelope-from bob@veznat.com) DomainKey-Signature: s=two; d=veznat.com; c=nofws; q=dns; h=X-MID:X-IronPort-AV:X-IronPort-AV:Received:User-Agent: Date:Subject:From:To:CC:Message-ID:Thread-Topic: Thread-Index:In-Reply-To:Mime-version:Content-type: Content-transfer-encoding; b=r497wiEwfvcctY4vc4osD6D97pFwnArihQiMP84ZBGv4DSgNI9FNXB4e K0ShgX04chxMXBe+Z9F2Z32OiHCPVrRdIN9w9kl33VMlSRmETnkZiYTgP sgfFoXoCKYOI92gWf7Mta62Cs+xLZCsjxPS57OU5H60+6Hld7o+Ncfi00 0=; DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=veznat.com; i=bob@veznat.com; q=dns/txt; s=one; t=1241676025; x=1273212025; h=from:sender:reply-to:subject:date:message-id:to:cc: mime-version:content-transfer-encoding:content-id: content-description:resent-date:resent-from:resent-sender: resent-to:resent-cc:resent-message-id:in-reply-to: references:list-id:list-help:list-unsubscribe: list-subscribe:list-post:list-owner:list-archive; z=From:=20Bob=20Van=20Zant=20|Subject:=20R e:=20IPv6=20duplicate=20address=20detection|Date:=20Wed, =2006=20May=202009=2023:00:19=20-0700|Message-ID:=20|To:=20=20JINMEI=20Tatuya=20/ =20=3D?ISO-2022-JP?B?GyRCP0BMQEMjOkgbKEI=3D?=3D=20=0D=0A =20|CC:=20"freebsd-net@freebsd.org "=20|Mime-version:=201.0 |Content-transfer-encoding:=207bit|In-Reply-To:=20; bh=B9+fN9uAsE0wzz9uN+49ZUWzpYYP+/e1quYfbsVAqKs=; b=LTpEMTG9Wak1j8rzcdgpvHXZo5O4dlEa4OHed4pJqnaPD3ox33ZQ1wMl M+d7s78na3l0SBetvqlFsbAfhVgnD1nBemx1Hb2quMtFQ7W/VxuRhq4qV HBPy3ymktQ4Ks1CwbiOUFMmlvmtjhJ/YpWlKcSyoDYgFlKp3gQEn+PF9z A=; X-MID: 1019703 X-IronPort-AV: E=McAfee;i="5300,2777,5607"; a="1019703" X-IronPort-AV: E=Sophos;i="4.40,307,1239001200"; d="scan'208";a="1019703" Received: from c-24-5-4-92.hsd1.ca.comcast.net (HELO [192.168.1.172]) ([24.5.4.92]) by mail.ttora.com with ESMTP/TLS/DES-CBC3-SHA; 06 May 2009 23:00:23 -0700 User-Agent: Microsoft-Entourage/12.15.0.081119 Date: Wed, 06 May 2009 23:00:19 -0700 From: Bob Van Zant To: JINMEI Tatuya / =?ISO-2022-JP?B?GyRCP0BMQEMjOkgbKEI=?= Message-ID: Thread-Topic: IPv6 duplicate address detection Thread-Index: AcnO2Rmhd1iSmPAaeEGIJXkB4NI3yg== In-Reply-To: Mime-version: 1.0 Content-type: text/plain; charset="ISO-2022-JP" Content-transfer-encoding: 7bit Cc: "freebsd-net@freebsd.org" Subject: Re: IPv6 duplicate address detection X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 07 May 2009 06:00:26 -0000 Well that goes all the way back to my first email :-) "An alternative view on this is that I shouldn't be sending out any packets, especially unsolicited NAs, using or referencing a tentative address." This makes sense. I'll stop doing bad things now :-) Thanks for your input and clearing this up for me. -Bob On 5/6/09 10:47 PM, "JINMEI Tatuya / 神明達哉" wrote: > At Wed, 06 May 2009 17:17:52 -0700, > Bob Van Zant wrote: > >> I guess that changes my question quite a bit. If you randomly fire off an >> unsolicited NA right after configuring an interface should that cause a DAD >> failure? > > Actually, in that case you shouldn't send out the NA in the first > place because you're in the middle of DAD, trying to confirming the > uniqueness of the target address. If you want to send an unsolicited > NA for an address on which DAD is performed for any reason, you should > wait until DAD is completed. > > --- > JINMEI, Tatuya > Internet Systems Consortium, Inc. > _______________________________________________ > freebsd-net@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-net > To unsubscribe, send any mail to "freebsd-net-unsubscribe@freebsd.org" From owner-freebsd-net@FreeBSD.ORG Thu May 7 08:22:12 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 06E4E1065677 for ; Thu, 7 May 2009 08:22:12 +0000 (UTC) (envelope-from nrml@att.net) Received: from web83809.mail.sp1.yahoo.com (web83809.mail.sp1.yahoo.com [69.147.85.81]) by mx1.freebsd.org (Postfix) with SMTP id CBEC78FC14 for ; Thu, 7 May 2009 08:22:11 +0000 (UTC) (envelope-from nrml@att.net) Received: (qmail 52110 invoked by uid 60001); 7 May 2009 08:22:11 -0000 Message-ID: <481652.51363.qm@web83809.mail.sp1.yahoo.com> X-YMail-OSG: xw57q2YVM1lSYX0s6zLrU3pFwKexcxtbQfTNt4z7VGONDK8Fgq1QCh_Jpa4IGJyAZH.oNeNrswv_8I9rtKjsmbi8KOPGtB3RMWtCEuNPFnwadIPSowT08JqgXEMc2Er7QkCQ5GaaAzwUSYCveZcejnMj1DWKqTUmwEJECc4VDU8tXxF877DavNBN9m8ym4sxoPjjnrTumICAZHpadApAmzOTDCBNDd85QmYjoj3EaHLF0R9hbmtPuSXdXH6rSohYAHtPuFxgDsjEf9PiQKPoK.VE873vDCYxJYWZF91VxhVEs7Zlv6oNYpPpRyJfU_nXGIP1obtUcKh4cZXQoIXsxgsPT64QGXv6OWpqjifiS8OyNA-- Received: from [69.43.143.67] by web83809.mail.sp1.yahoo.com via HTTP; Thu, 07 May 2009 01:22:10 PDT X-Mailer: YahooMailWebService/0.7.289.1 Date: Thu, 7 May 2009 01:22:10 -0700 (PDT) From: Gabe To: "Bjoern A. Zeeb" In-Reply-To: <20090506135851.R72053@maildrop.int.zabbadoz.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: freebsd-net@freebsd.org, VANHULLEBUS Yvan , Scott Ullrich Subject: Re: IPSEC NAT traversal X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: nrml@att.net List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 07 May 2009 08:22:12 -0000 --- On Wed, 5/6/09, Bjoern A. Zeeb wrote: > On Wed, 6 May 2009, Gabe wrote: > > Hi, > > I had been travelling yesterday, ... here is the summary > for today: > > > So how is it coming along? > > It's compiling; it's on might notebook since last > night as well. It > hasn't crashed yet. I haven't tested IPsec yet > either though;) > That'll probably happen the next days. Need to build a > custom > ipsec-tools port first. > Ahh, please do let us know how your IPSec testing comes along when you get to it. > > Is the goal to standardize this and commit it to > become a permanent > > part of freebsd? I've got a total of three > machines with this patch > > and would reeeeally like it if it were. > > Stadardize as in between everyone is not going to work. > Different > people have already adopted different APIs but trying to be > as > compatible with netbsd/linux sounds like a plan. OS X is > different, > unfortunately. > I see. > Having it in FreeBSD 8.x is definitively on the schedule. > Awesome, looking forward to that. > /bz > > -- Bjoern A. Zeeb The greatest risk is > not taking one. Thanks for the reply! From owner-freebsd-net@FreeBSD.ORG Thu May 7 13:35:26 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id BBA9C106566B for ; Thu, 7 May 2009 13:35:26 +0000 (UTC) (envelope-from ericx@ericx.net) Received: from vineyard.net (k1.vineyard.net [204.17.195.90]) by mx1.freebsd.org (Postfix) with ESMTP id 8C9F48FC24 for ; Thu, 7 May 2009 13:35:26 +0000 (UTC) (envelope-from ericx@ericx.net) Received: from localhost (loopback [127.0.0.1]) by vineyard.net (Postfix) with ESMTP id 6C92291526; Thu, 7 May 2009 09:16:42 -0400 (EDT) X-Virus-Scanned: by AMaViS-king1 at Vineyard.NET Received: from vineyard.net ([127.0.0.1]) by localhost (king1.vineyard.net [127.0.0.1]) (amavisd-new, port 10024) with LMTP id O+MjX8mvDoCN; Thu, 7 May 2009 09:16:42 -0400 (EDT) Received: from [204.17.195.104] (fortiva.vineyard.net [204.17.195.104]) by vineyard.net (Postfix) with ESMTPA id 2384491520; Thu, 7 May 2009 09:16:42 -0400 (EDT) Message-ID: <4A02DF39.7040902@ericx.net> Date: Thu, 07 May 2009 09:16:41 -0400 From: "Eric W. Bates" User-Agent: Thunderbird 2.0.0.21 (Windows/20090302) MIME-Version: 1.0 To: Giulio Ferro , freebsd-net@freebsd.org References: <4A00BE6C.5030800@zirakzigil.org> <20090505225425.GA49013@hal.rescomp.berkeley.edu> <4A01943F.6000400@zirakzigil.org> In-Reply-To: <4A01943F.6000400@zirakzigil.org> Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Cc: Subject: Re: Configure networking outside rc.conf X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: eric@educompmv.com List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 07 May 2009 13:35:27 -0000 Giulio Ferro wrote: > Chris Cowart wrote: >> Assuming the NICs are displayed by ifconfig -a or inserted into >> cloned_interfaces in /etc/rc.conf, you can create the following scripts: >> >> /etc/start_if.vlan100 >> /etc/stop_if.vlan100 >> >> Where start_if.vlan100 is sourced by the netif start and stop_if.vlan100 >> is sourced by the netif stop. >> >> For example: >> >> | ccowart dev-aux etc $ cat /etc/start_if.vlan81 >> | ifconfig vlan81 vlan 81 vlandev em0 >> | ifconfig vlan81 inet 10.81.1.1/16 >> >> I don't know that two files per interface is any cleaner than a really >> long /etc/rc.conf (I usually prefer the latter, but I generally am not >> dealing with more than 20-40 lines at most). >> >> > Thanks for the reply. > What should be normally put in the stop_if. file? Do the "stop" > files make sense? You might, for example, have a dhcp server dedicated to that interface which you wanted to start/stop as the interface goes up/down. > Anyway I'll try to make it fit with what I need. > > _______________________________________________ > freebsd-net@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-net > To unsubscribe, send any mail to "freebsd-net-unsubscribe@freebsd.org" -- Eric W. Bates ericx@vineyard.net From owner-freebsd-net@FreeBSD.ORG Thu May 7 14:41:26 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 0EB73106566B for ; Thu, 7 May 2009 14:41:26 +0000 (UTC) (envelope-from bms@incunabulum.net) Received: from out4.smtp.messagingengine.com (out4.smtp.messagingengine.com [66.111.4.28]) by mx1.freebsd.org (Postfix) with ESMTP id D7D398FC1B for ; Thu, 7 May 2009 14:41:25 +0000 (UTC) (envelope-from bms@incunabulum.net) Received: from compute1.internal (compute1.internal [10.202.2.41]) by out1.messagingengine.com (Postfix) with ESMTP id 20329341376; Thu, 7 May 2009 10:41:25 -0400 (EDT) Received: from heartbeat1.messagingengine.com ([10.202.2.160]) by compute1.internal (MEProxy); Thu, 07 May 2009 10:41:25 -0400 X-Sasl-enc: JdWSRSwRcEvkhwUJQmB4/AwDPsafsm0PbApgTwHpNvmL 1241707284 Received: from [192.168.123.18] (82-35-112-254.cable.ubr07.dals.blueyonder.co.uk [82.35.112.254]) by mail.messagingengine.com (Postfix) with ESMTPSA id 626C9DCB1; Thu, 7 May 2009 10:41:24 -0400 (EDT) Message-ID: <4A02F30F.5030704@incunabulum.net> Date: Thu, 07 May 2009 15:41:19 +0100 From: Bruce Simpson User-Agent: Thunderbird 2.0.0.21 (Windows/20090302) MIME-Version: 1.0 To: Bob Van Zant References: In-Reply-To: Content-Type: text/plain; charset=ISO-2022-JP Content-Transfer-Encoding: 7bit Cc: =?ISO-2022-JP?B?SklOTUVJIFRhdHV5YSAvIBskQj9ATEBDIzpIGyhC?= , "freebsd-net@freebsd.org" Subject: Re: IPv6 duplicate address detection X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 07 May 2009 14:41:26 -0000 Bob Van Zant wrote: > Well that goes all the way back to my first email :-) > > "An alternative view on this is that I shouldn't be sending out any packets, > especially unsolicited NAs, using or referencing a tentative address." > > This makes sense. I'll stop doing bad things now :-) Thanks for your input > and clearing this up for me. > OK, I'm very glad Jinmei-san has chewed over the specifics of how this might break DAD as specified. All the same, you did find a condition in the kernel where locally-originated traffic is being interpreted as being on-wire. Ok, SOCK_RAW is going to raise the bar on malefeasant use of this behaviour, but all the same, this is an input checking issue :-) It would be great if you could go ahead and raise a PR about this condition -- the MLDv2 code in HEAD will also be affected by this, as it does an IPv6 group membership check on the icmp6 input path. Strictly speaking it should come from ip6_mloopback(), but right now I can't remember if that will set any mbuf flags; I do believe it sets m->m_pkthdr.recvif to loif and that might be the only coherent way to detect the looped back traffic w/o doing an address lookup. cheers, BMS From owner-freebsd-net@FreeBSD.ORG Thu May 7 20:23:01 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 69CBB106564A; Thu, 7 May 2009 20:23:01 +0000 (UTC) (envelope-from raffaele.delorenzo@libero.it) Received: from cp-out7.libero.it (cp-out7.libero.it [212.52.84.107]) by mx1.freebsd.org (Postfix) with ESMTP id C60D48FC16; Thu, 7 May 2009 20:22:59 +0000 (UTC) (envelope-from raffaele.delorenzo@libero.it) Received: from [10.0.0.1] (151.49.36.1) by cp-out7.libero.it (8.5.107) id 49F9A039012E6FFE; Thu, 7 May 2009 22:11:32 +0200 Message-Id: <3233DB7C-06E8-4AFE-9704-0F900925DAE3@libero.it> From: Raffaele De Lorenzo To: Steve Bertrand , Kevin Oberman , freebsd-ipfw@freebsd.org, freebsd-net@freebsd.org Content-Type: multipart/mixed; boundary=Apple-Mail-83--720617087 Mime-Version: 1.0 (Apple Message framework v930.3) Date: Thu, 7 May 2009 22:11:11 +0200 X-Mailer: Apple Mail (2.930.3) X-Content-Filtered-By: Mailman/MimeDel 2.1.5 Cc: Luigi Rizzo Subject: [ipfw patch - add ipv6 support for table mechanism] request for testing/commit X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 07 May 2009 20:23:01 -0000 --Apple-Mail-83--720617087 Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes Content-Transfer-Encoding: 7bit Hi all, I extended the ipfw table mechanism to IPv6 protocol and now i need some people for testing and next commit it. The code is stable but you must be careful about possible ambiguous parser semantics. Now you must insert IPv6 addresses inside a table: ipfw table 1 add fe80::1 And you can create IPv6 rules about this table: ipfw add deny tcp from table6(1) to any dst-port 22 ipfw add deny icmp6 from any to table6(1) The "table6" semantic tell the difference betwen the IPv4 semantic ("table"). The following changes are made on the ipfw2 sources: KERNEL SPACE: ip_fw.h 1) Added 2 new OPCODES: O_IP6_SRC_LOOKUP, O_IP6_DST_LOOKUP 2) Added the follow fields in "ipfw_table_entry" structure: struct in6_addr addr6, mask6; uint8_t proto; ip_fw2.c --Apple-Mail-83--720617087 Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes Content-Transfer-Encoding: 7bit 1) Added the follow fields in "struct table_entry" structure: struct sockaddr_in6 addr6, mask6; uint8_t proto; 2) Some changes inside the "add_table_entry" function. 3) Some changes inside the "del_table_entry" function. 4) Some changes inside the "flush_table_entry" function. 5) Some changes inside the "lookup_table" function. 6) Some changes inside the "dump_table_entry" function. 7) Added a new function named "set_proto_table". 8) Added the two new OPCODES inside the "ipfw_check()" function. 9) Added the two new OPCODES inside the "check_ipfw_struct" function. USER SPACE: ipfw2.c 1) Added some changes on "table_handler" function 2) Added some changes on "show_ipfw" function 3) Added some changes on "print_ip6" function 4) Added some changes on "fill_ip6" function 5) Added some changes on "add_dstip6" function 6) Added some changes on "add_srcip6" function 7) Added some changes on "add_src" function 8) Added some changes on "add_dst" function I updated the man pages. INSTALLATION INSTRUCTIONS: Put the "ip_fw2.c" and "ip_fw.h" files inside the "/sys/netinet/ directory" Put the "ipfw2.c" file inside the /src/sbin/ipfw/ directory Rebuild the ipfw kernel module or rebuild you kernel Rebuild the ipfw bin or the entire SBIN. The Sources was tested on FreeBSD 7.2 Release. Let me know any troubles Ciao Raffaele --Apple-Mail-83--720617087-- From owner-freebsd-net@FreeBSD.ORG Fri May 8 02:16:59 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 09F8C106564A for ; Fri, 8 May 2009 02:16:59 +0000 (UTC) (envelope-from sam@ip6.com.au) Received: from mail01.ip6.com.au (ns1.ip6.com.au [125.255.112.202]) by mx1.freebsd.org (Postfix) with ESMTP id C1ECA8FC08 for ; Fri, 8 May 2009 02:16:58 +0000 (UTC) (envelope-from sam@ip6.com.au) Received: from mail01.ip6.com.au (localhost [127.0.0.1]) by mail01.ip6.com.au (Postfix) with ESMTP id 5A7F428804 for ; Fri, 8 May 2009 12:16:48 +1000 (EST) Received: from secure.ip6.com.au (localhost [127.0.0.1]) by mail01.ip6.com.au (Postfix) with ESMTP id 1887D287FD for ; Fri, 8 May 2009 12:16:48 +1000 (EST) Received: from 220.233.42.226 (SquirrelMail authenticated user sam) by secure.ip6.com.au with HTTP; Fri, 8 May 2009 12:16:48 +1000 (EST) Message-ID: <15484.220.233.42.226.1241749008.squirrel@secure.ip6.com.au> Date: Fri, 8 May 2009 12:16:48 +1000 (EST) From: "Sam Wan" To: freebsd-net@freebsd.org User-Agent: SquirrelMail/1.4.10a MIME-Version: 1.0 Content-Type: text/plain;charset=iso-8859-1 Content-Transfer-Encoding: 8bit X-Priority: 3 (Normal) Importance: Normal X-Virus-Scanned: ClamAV using ClamSMTP Subject: nf_sockopt_init in uipc_socket.c X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 08 May 2009 02:16:59 -0000 Hi, With 7.2, is ok to add the following function to the uipc_socket.c file? void nf_sockopt_init(void) { LIST_INIT(&nf_sockopts); mtx_init(&nf_sockopt_mutex,"linux netfilter lock",NULL,MTX_DEF); } Thanks From owner-freebsd-net@FreeBSD.ORG Fri May 8 12:52:44 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 09AC61065672; Fri, 8 May 2009 12:52:44 +0000 (UTC) (envelope-from swun2010@gmail.com) Received: from rv-out-0506.google.com (rv-out-0506.google.com [209.85.198.225]) by mx1.freebsd.org (Postfix) with ESMTP id CFB4B8FC16; Fri, 8 May 2009 12:52:38 +0000 (UTC) (envelope-from swun2010@gmail.com) Received: by rv-out-0506.google.com with SMTP id k40so1179851rvb.43 for ; Fri, 08 May 2009 05:52:38 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:date:message-id:subject :from:to:cc:content-type:content-transfer-encoding; bh=njbKUVuoTzGI/VkqhhWqZBAr15OJfuPI3x6oBIyFNn8=; b=A3eopLh4TlTHWLIVrM9693wMHd8QN23K2ja6W6MpRItfFtBr9MbilBECOYXj+2aHOg 4oSYjeWIhjXJ1LRSY+T5e2txFDMHyj0GsYCxS2P97ek7KnN8c2K0E2xaf4e4GEbOs9+g Zh9m125ghocuiBXWd+h4hxjGbV+I3h4UAf3OM= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:date:message-id:subject:from:to:cc:content-type :content-transfer-encoding; b=To6CcBmoAvxjAYcmeYNM91Sq3tWRrciehGnDDDjaHRpWn/o1V4+lzbZqfcVMuRhe+3 2gA2z9OFVYVotNwDW2xQiXA/67K/0ZhiKN6GXIWDYtLPD+4q17C8MkYIYjKSJ5/McKwG QO2gl+mdjgL3XgBrxWtdZC+9+LhrWcFmuiSz0= MIME-Version: 1.0 Received: by 10.142.133.19 with SMTP id g19mr1660550wfd.126.1241787158567; Fri, 08 May 2009 05:52:38 -0700 (PDT) Date: Fri, 8 May 2009 22:52:38 +1000 Message-ID: <736c47cb0905080552r70f45368va5dfa5af24720c1c@mail.gmail.com> From: Sam Wun To: freebsd-net@freebsd.org Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Cc: freebsd-pf@freebsd.org Subject: Can pfsync be used over router or WAN? X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 08 May 2009 12:52:44 -0000 Hi, Have anyone tried pfsync over router or WAN? I have read setup guide of CARP+pfsync, the pfsync interface is connected through a crossover cable. Can I connect 2 pfsync interfaces through a router or WAN? Thanks From owner-freebsd-net@FreeBSD.ORG Fri May 8 17:06:28 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 8663C106566B; Fri, 8 May 2009 17:06:28 +0000 (UTC) (envelope-from ddesimone@verio.net) Received: from relay1-bcrtfl2.verio.net (relay1-bcrtfl2.verio.net [131.103.218.142]) by mx1.freebsd.org (Postfix) with ESMTP id 33B258FC12; Fri, 8 May 2009 17:06:28 +0000 (UTC) (envelope-from ddesimone@verio.net) Received: from iad-wprd-xchw01.corp.verio.net (unknown [198.87.7.164]) by relay1-bcrtfl2.verio.net (Postfix) with ESMTP id B3E51B0380BB; Fri, 8 May 2009 12:44:34 -0400 (EDT) thread-index: AcnP/ER2T47ExsyCTsmlWT64j+Gnhw== Received: from dllstx1-8sst9f1.corp.verio.net ([10.144.0.1]) by iad-wprd-xchw01.corp.verio.net over TLS secured channel with Microsoft SMTPSVC(6.0.3790.1830); Fri, 8 May 2009 12:44:33 -0400 Received: by dllstx1-8sst9f1.corp.verio.net (sSMTP sendmail emulation); Fri, 08 May 2009 11:44:32 +0000 Date: Fri, 8 May 2009 11:44:32 -0500 From: "David DeSimone" Content-Transfer-Encoding: 7bit To: Importance: normal Priority: normal Content-Class: urn:content-classes:message Message-ID: <20090508164432.GW2160@verio.net> X-MimeOLE: Produced By Microsoft MimeOLE V6.00.3790.3168 Mail-Followup-To: freebsd-pf@freebsd.org, freebsd-net@freebsd.org References: <736c47cb0905080552r70f45368va5dfa5af24720c1c@mail.gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Disposition: inline In-Reply-To: <736c47cb0905080552r70f45368va5dfa5af24720c1c@mail.gmail.com> Precedence: bulk User-Agent: Mutt/1.5.18 (2008-05-17) X-OriginalArrivalTime: 08 May 2009 16:44:33.0207 (UTC) FILETIME=[43BF0470:01C9CFFC] Cc: freebsd-net@freebsd.org Subject: Re: Can pfsync be used over router or WAN? X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 08 May 2009 17:06:28 -0000 Sam Wun wrote: > > Have anyone tried pfsync over router or WAN? > I have read setup guide of CARP+pfsync, the pfsync interface is > connected through a crossover cable. Can I connect 2 pfsync > interfaces through a router or WAN? pfsync(4) talks about this: NETWORK SYNCHRONISATION States can be synchronised between two or more firewalls using this interface, by specifying a synchronisation interface using ifconfig(8). For example, the following command sets fxp0 as the synchronisation interface: # ifconfig pfsync0 syncdev fxp0 It is important that the underlying synchronisation interface is up and has an IP address assigned. By default, state change messages are sent out on the synchronisation interface using IP multicast packets. The protocol is IP protocol 240, PFSYNC, and the multicast group used is 224.0.0.240. When a peer address is specified using the syncpeer keyword, the peer address is used as a destination for the pfsync traffic, and the traffic can then be protected using ipsec(4). In such a configuration, the syncdev should be set to the enc(4) interface, as this is where the traffic arrives when it is decapsulated, e.g.: # ifconfig pfsync0 syncpeer 10.0.0.2 syncdev enc0 It is important that the pfsync traffic be well secured as there is no authentication on the protocol and it would be trivial to spoof packets which create states, bypassing the pf ruleset. Either run the pfsync protocol on a trusted network - ideally a network dedicated to pfsync messages such as a crossover cable between two firewalls, or specify a peer address and protect the traffic with ipsec(4). For pfsync to start its operation automatically at the system boot time, pfsync_enable and pfsync_syncdev variables should be used in rc.conf(5). It is not advisable to set up pfsync with common network interface configuration variables of rc.conf(5) because pfsync must start after its syncdev, which cannot be always ensured in the latter case. Syncing over a WAN doesn't seem like it would make sense, offhand. Normally you psync between devices that will be able to provide routing for a firewalled connection. A device far across a WAN doesn't seem like it would be able to provide redundant service. But that's up to your design, I suppose. Syncing across a LAN could make sense, but you will want to take steps to secure the traffic. -- David DeSimone == Network Admin == fox@verio.net "I don't like spinach, and I'm glad I don't, because if I liked it I'd eat it, and I just hate it." -- Clarence Darrow This email message is intended for the use of the person to whom it has been sent, and may contain information that is confidential or legally protected. If you are not the intended recipient or have received this message in error, you are not authorized to copy, distribute, or otherwise use this message or its attachments. Please notify the sender immediately by return e-mail and permanently delete this message and any attachments. Verio, Inc. makes no warranty that this email is error or virus free. Thank you. From owner-freebsd-net@FreeBSD.ORG Fri May 8 18:06:11 2009 Return-Path: Delivered-To: freebsd-net@hub.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 3B873106566B; Fri, 8 May 2009 18:06:11 +0000 (UTC) (envelope-from linimon@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:4f8:fff6::28]) by mx1.freebsd.org (Postfix) with ESMTP id 107268FC0C; Fri, 8 May 2009 18:06:11 +0000 (UTC) (envelope-from linimon@FreeBSD.org) Received: from freefall.freebsd.org (linimon@localhost [127.0.0.1]) by freefall.freebsd.org (8.14.3/8.14.3) with ESMTP id n48I6AXN062546; Fri, 8 May 2009 18:06:10 GMT (envelope-from linimon@freefall.freebsd.org) Received: (from linimon@localhost) by freefall.freebsd.org (8.14.3/8.14.3/Submit) id n48I6AgH062542; Fri, 8 May 2009 18:06:10 GMT (envelope-from linimon) Date: Fri, 8 May 2009 18:06:10 GMT Message-Id: <200905081806.n48I6AgH062542@freefall.freebsd.org> To: linimon@FreeBSD.org, freebsd-bugs@FreeBSD.org, freebsd-net@FreeBSD.org From: linimon@FreeBSD.org Cc: Subject: Re: kern/134369: [route] [ip6] IPV6 in Head broken for routing table updates X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 08 May 2009 18:06:11 -0000 Old Synopsis: IPV6 in Head broken for routing table updates New Synopsis: [route] [ip6] IPV6 in Head broken for routing table updates Responsible-Changed-From-To: freebsd-bugs->freebsd-net Responsible-Changed-By: linimon Responsible-Changed-When: Fri May 8 18:05:39 UTC 2009 Responsible-Changed-Why: Over to maintainer(s). http://www.freebsd.org/cgi/query-pr.cgi?pr=134369 From owner-freebsd-net@FreeBSD.ORG Fri May 8 18:39:33 2009 Return-Path: Delivered-To: freebsd-net@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 2E33D106566C; Fri, 8 May 2009 18:39:33 +0000 (UTC) (envelope-from mbsd@pacbell.net) Received: from nlpi029.prodigy.net (nlpi029.sbcis.sbc.com [207.115.36.58]) by mx1.freebsd.org (Postfix) with ESMTP id E789B8FC14; Fri, 8 May 2009 18:39:32 +0000 (UTC) (envelope-from mbsd@pacbell.net) Received: from antec (adsl-99-27-132-43.dsl.pltn13.sbcglobal.net [99.27.132.43]) (authenticated bits=0) by nlpi029.prodigy.net (8.13.8 smtpauth/dk/8.13.8) with ESMTP id n48IKdAk014811; Fri, 8 May 2009 13:21:22 -0500 Date: Fri, 8 May 2009 11:20:40 -0700 (PDT) From: =?ISO-8859-1?Q?Mikko_Ty=F6l=E4j=E4rvi?= To: Andrew Thompson In-Reply-To: <20090503155746.GB11965@citylink.fud.org.nz> Message-ID: <20090508111747.Y5904@antec.home> References: <49FD928D.4020504@t-online.de> <20090503155746.GB11965@citylink.fud.org.nz> MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII; format=flowed Cc: freebsd-net@FreeBSD.org, Dieter Brozio Subject: Re: New INTEL firmware v3.1 for device iwi (IPW 2200BG) X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 08 May 2009 18:39:33 -0000 On Sun, 3 May 2009, Andrew Thompson wrote: > On Sun, May 03, 2009 at 02:48:13PM +0200, Dieter Brozio wrote: >> Hi there, >> >> To whom it may concern: >> >> INTEL released in March 2009 a new version 3.1 of its firmware version for >> the WLAN iwi device (Pro/Wireless 2200BG). >> >> http://ipw2200.sourceforge.net/firmware.php >> http://ipw2200.sourceforge.net/firmware.php?fid=8 >> >> On my 7.2.RC2 desktop PC (without WLAN) I noticed that in >> >> /usr/src/sys/contrib/dev/iwi/ipw2200_bss.fw.uu >> /usr/src/sys/contrib/dev/iwi/ipw2200_ibss.fw.uu >> /usr/src/sys/contrib/dev/iwi/ipw2200_sniffer.fw.uu >> >> is still the old v3.0 iwi firmware inside. >> >> This fw generates after some hours of operation error messages like >> "iwi0:scan stuck" and finally the network connection will be disconnected. >> I've tested fw v3.1 this week on my FBSD6.4 laptop: No problems, no "scan >> stuck", no side-effects. Brilliant. > > Great. If anyone can also confirm it works on current then I will > commit. I have been using the new firmware for a couple of days on current with this device: iwi0@pci0:2:1:0: class=0x028000 card=0x27218086 chip=0x42208086 rev=0x05 hdr=0x00 vendor = 'Intel Corporation' device = 'MPCI3B driverIntel PRO/Wireless 2200BG' class = network No problems observed. $.02, /Mikko From owner-freebsd-net@FreeBSD.ORG Sat May 9 00:54:25 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 8035B106566C; Sat, 9 May 2009 00:54:25 +0000 (UTC) (envelope-from swun2010@gmail.com) Received: from mail-ew0-f159.google.com (mail-ew0-f159.google.com [209.85.219.159]) by mx1.freebsd.org (Postfix) with ESMTP id D557A8FC15; Sat, 9 May 2009 00:54:24 +0000 (UTC) (envelope-from swun2010@gmail.com) Received: by ewy3 with SMTP id 3so2211111ewy.43 for ; Fri, 08 May 2009 17:54:24 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:content-type :content-transfer-encoding; bh=1EOsYG2m8/uABxfPR6KEweluIblFFmAemm5P2nLgJvw=; b=u/VhqVfOLiadQLl+rk698m0Kg5k7HwtFv6f9g1AnND1Yp4ZEFYIHe6kJyHjamb2pQr mWsLu54uniGim1NiVDSOIzlXVqu06oeEnwnJT1MNb4UPaUXF3abnpvXuewJLI1puNyED reQGfgbloEn3U+uddgn33CzLT1HnzfOHKhVEU= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type:content-transfer-encoding; b=ZDk+jHBTHJGQH9pojgtjjX5qdxqcGdUoRJBh8OhTBHuYw7fuwA0AdNj+yC2BKyO9Ai NaOyyMM4o2aKVdArKOQyVwlHfrEv+28TLSPXkv3+rwv2ZddOm2Wn5wETdWy5+nuYhdh9 qVuL9tZKA1Vr0bfXeeBAr7K5Qhf4W9kUUKvV0= MIME-Version: 1.0 Received: by 10.210.88.3 with SMTP id l3mr1579109ebb.55.1241830463968; Fri, 08 May 2009 17:54:23 -0700 (PDT) In-Reply-To: <20090508164432.GW2160@verio.net> References: <736c47cb0905080552r70f45368va5dfa5af24720c1c@mail.gmail.com> <20090508164432.GW2160@verio.net> Date: Sat, 9 May 2009 10:54:23 +1000 Message-ID: <736c47cb0905081754s32d9414fhe89f1920c8675869@mail.gmail.com> From: Sam Wun To: freebsd-pf@freebsd.org, freebsd-net@freebsd.org Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable Cc: Subject: Re: Can pfsync be used over router or WAN? X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 09 May 2009 00:54:26 -0000 Establish a IPSEC bewteen this 2 pfsync points is a way to go. On Sat, May 9, 2009 at 2:44 AM, David DeSimone wrote: > Sam Wun wrote: >> >> Have anyone tried pfsync over router or WAN? >> I have read setup guide of CARP+pfsync, the pfsync interface is >> connected through a crossover cable. =A0Can I connect 2 pfsync >> interfaces through a router or WAN? > > pfsync(4) talks about this: > > =A0 =A0NETWORK SYNCHRONISATION > =A0 =A0 =A0 =A0 States can be synchronised between two or more firewalls = using > =A0 =A0 =A0 =A0 this interface, by specifying a synchronisation interface= using > =A0 =A0 =A0 =A0 ifconfig(8). =A0For example, the following command sets f= xp0 as > =A0 =A0 =A0 =A0 the synchronisation interface: > > =A0 =A0 =A0 =A0 =A0 # ifconfig pfsync0 syncdev fxp0 > > =A0 =A0 =A0 =A0 It is important that the underlying synchronisation inter= face > =A0 =A0 =A0 =A0 is up and has an IP address assigned. > > =A0 =A0 =A0 =A0 By default, state change messages are sent out on the > =A0 =A0 =A0 =A0 synchronisation interface using IP multicast packets. =A0= The > =A0 =A0 =A0 =A0 protocol is IP protocol 240, PFSYNC, and the multicast gr= oup > =A0 =A0 =A0 =A0 used is 224.0.0.240. =A0When a peer address is specified = using > =A0 =A0 =A0 =A0 the syncpeer keyword, the peer address is used as a desti= nation > =A0 =A0 =A0 =A0 for the pfsync traffic, and the traffic can then be prote= cted > =A0 =A0 =A0 =A0 using ipsec(4). =A0In such a configuration, the syncdev s= hould > =A0 =A0 =A0 =A0 be set to the enc(4) interface, as this is where the traf= fic > =A0 =A0 =A0 =A0 arrives when it is decapsulated, e.g.: > > =A0 =A0 =A0 =A0 =A0 # ifconfig pfsync0 syncpeer 10.0.0.2 syncdev enc0 > > =A0 =A0 =A0 =A0 It is important that the pfsync traffic be well secured a= s > =A0 =A0 =A0 =A0 there is no authentication on the protocol and it would b= e > =A0 =A0 =A0 =A0 trivial to spoof packets which create states, bypassing t= he > =A0 =A0 =A0 =A0 pf ruleset. =A0Either run the pfsync protocol on a truste= d > =A0 =A0 =A0 =A0 network - ideally a network dedicated to pfsync messages = such > =A0 =A0 =A0 =A0 as a crossover cable between two firewalls, or specify a = peer > =A0 =A0 =A0 =A0 address and protect the traffic with ipsec(4). > > =A0 =A0 =A0 =A0 For pfsync to start its operation automatically at the sy= stem > =A0 =A0 =A0 =A0 boot time, pfsync_enable and pfsync_syncdev variables sho= uld be > =A0 =A0 =A0 =A0 used in rc.conf(5). =A0It is not advisable to set up pfsy= nc with > =A0 =A0 =A0 =A0 common network interface configuration variables of rc.co= nf(5) > =A0 =A0 =A0 =A0 because pfsync must start after its syncdev, which cannot= be > =A0 =A0 =A0 =A0 always ensured in the latter case. > > Syncing over a WAN doesn't seem like it would make sense, offhand. > Normally you psync between devices that will be able to provide routing > for a firewalled connection. =A0A device far across a WAN doesn't seem > like it would be able to provide redundant service. =A0But that's up to > your design, I suppose. > > Syncing across a LAN could make sense, but you will want to take steps > to secure the traffic. > > -- > David DeSimone =3D=3D Network Admin =3D=3D fox@verio.net > =A0"I don't like spinach, and I'm glad I don't, because if I > =A0 liked it I'd eat it, and I just hate it." -- Clarence Darrow > > > This email message is intended for the use of the person to whom it has b= een sent, and may contain information that is confidential or legally prote= cted. If you are not the intended recipient or have received this message i= n error, you are not authorized to copy, distribute, or otherwise use this = message or its attachments. Please notify the sender immediately by return = e-mail and permanently delete this message and any attachments. Verio, Inc.= makes no warranty that this email is error or virus free. =A0Thank you. > _______________________________________________ > freebsd-pf@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-pf > To unsubscribe, send any mail to "freebsd-pf-unsubscribe@freebsd.org" > From owner-freebsd-net@FreeBSD.ORG Sat May 9 01:54:58 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 66201106564A for ; Sat, 9 May 2009 01:54:58 +0000 (UTC) (envelope-from sam@ip6.com.au) Received: from mail01.ip6.com.au (ns1.ip6.com.au [125.255.112.202]) by mx1.freebsd.org (Postfix) with ESMTP id 29F0C8FC08 for ; Sat, 9 May 2009 01:54:58 +0000 (UTC) (envelope-from sam@ip6.com.au) Received: from mail01.ip6.com.au (localhost [127.0.0.1]) by mail01.ip6.com.au (Postfix) with ESMTP id 4947028805 for ; Sat, 9 May 2009 11:54:48 +1000 (EST) Received: from secure.ip6.com.au (localhost [127.0.0.1]) by mail01.ip6.com.au (Postfix) with ESMTP id 0865D28804 for ; Sat, 9 May 2009 11:54:48 +1000 (EST) Received: from 220.233.42.226 (SquirrelMail authenticated user sam) by secure.ip6.com.au with HTTP; Sat, 9 May 2009 11:54:48 +1000 (EST) Message-ID: <11159.220.233.42.226.1241834088.squirrel@secure.ip6.com.au> Date: Sat, 9 May 2009 11:54:48 +1000 (EST) From: "Sam Wan" To: freebsd-net@freebsd.org User-Agent: SquirrelMail/1.4.10a MIME-Version: 1.0 Content-Type: text/plain;charset=iso-8859-1 Content-Transfer-Encoding: 8bit X-Priority: 3 (Normal) Importance: Normal X-Virus-Scanned: ClamAV using ClamSMTP Subject: CARP on FreeBSD 7,2 X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 09 May 2009 01:54:58 -0000 Hi, I tried to setup CARP in FreeBSD 7.2, but seems not able to assign IP to the carp interfaces. Here is my rc.conf file: hostname="test.ip6.com.au" ifconfig_fxp0="inet 192.168.1.248 netmask 255.255.255.0" sshd_enable="YES" pf_enable="YES" pf_rules="/etc/pf.anti-spam.conf" pf_flags="" pflog_enable="YES" pflog_logfile="/var/log/pflog" pflog_program="/sbin/pflogd" pflog_flags="" pfsync_enable="NO" pfsync_syncdev="" pfsync_ifconfig="" cloned_interfaces="carp1" ifconfig_carp1="up 24.214.165.129/25 vhid 2 pass privatepassword" test:~ # ifconfig fxp0: flags=8843 metric 0 mtu 1500 options=8 ether 00:13:20:65:ad:bd inet 192.168.1.248 netmask 0xffffff00 broadcast 192.168.1.255 media: Ethernet autoselect (100baseTX ) status: active plip0: flags=108810 metric 0 mtu 1500 lo0: flags=8049 metric 0 mtu 16384 inet6 fe80::1%lo0 prefixlen 64 scopeid 0x3 inet6 ::1 prefixlen 128 inet 127.0.0.1 netmask 0xff000000 pflog0: flags=141 metric 0 mtu 33204 pfsync0: flags=0<> metric 0 mtu 1460 syncpeer: 224.0.0.240 maxupd: 128 carp1: flags=9 metric 0 mtu 1500 carp: INIT vhid 1 advbase 1 advskew 50 What have I missed? Thanks From owner-freebsd-net@FreeBSD.ORG Sat May 9 02:09:14 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id C8579106566B for ; Sat, 9 May 2009 02:09:14 +0000 (UTC) (envelope-from sam@ip6.com.au) Received: from mail01.ip6.com.au (ns1.ip6.com.au [125.255.112.202]) by mx1.freebsd.org (Postfix) with ESMTP id 89E088FC15 for ; Sat, 9 May 2009 02:09:13 +0000 (UTC) (envelope-from sam@ip6.com.au) Received: from mail01.ip6.com.au (localhost [127.0.0.1]) by mail01.ip6.com.au (Postfix) with ESMTP id 645C328805; Sat, 9 May 2009 12:09:04 +1000 (EST) Received: from secure.ip6.com.au (localhost [127.0.0.1]) by mail01.ip6.com.au (Postfix) with ESMTP id 208FB287B6; Sat, 9 May 2009 12:09:04 +1000 (EST) Received: from 220.233.42.226 (SquirrelMail authenticated user sam) by secure.ip6.com.au with HTTP; Sat, 9 May 2009 12:09:04 +1000 (EST) Message-ID: <11212.220.233.42.226.1241834944.squirrel@secure.ip6.com.au> In-Reply-To: <11159.220.233.42.226.1241834088.squirrel@secure.ip6.com.au> References: <11159.220.233.42.226.1241834088.squirrel@secure.ip6.com.au> Date: Sat, 9 May 2009 12:09:04 +1000 (EST) From: "Sam Wan" To: "Sam Wan" User-Agent: SquirrelMail/1.4.10a MIME-Version: 1.0 Content-Type: text/plain;charset=iso-8859-1 Content-Transfer-Encoding: 8bit X-Priority: 3 (Normal) Importance: Normal X-Virus-Scanned: ClamAV using ClamSMTP Cc: freebsd-net@freebsd.org Subject: Re: CARP on FreeBSD 7,2 X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 09 May 2009 02:09:15 -0000 The following command also failed: test:~ # ifconfig carp1 vhid 1 pass password 192.168.2.144/24 up ifconfig: ioctl (SIOCAIFADDR): Can't assign requested address > > Hi, > > I tried to setup CARP in FreeBSD 7.2, but seems not able to assign IP to > the carp interfaces. > > Here is my rc.conf file: > > hostname="test.ip6.com.au" > ifconfig_fxp0="inet 192.168.1.248 netmask 255.255.255.0" > sshd_enable="YES" > > pf_enable="YES" > pf_rules="/etc/pf.anti-spam.conf" > pf_flags="" > pflog_enable="YES" > pflog_logfile="/var/log/pflog" > pflog_program="/sbin/pflogd" > pflog_flags="" > pfsync_enable="NO" > pfsync_syncdev="" > pfsync_ifconfig="" > > cloned_interfaces="carp1" > ifconfig_carp1="up 24.214.165.129/25 vhid 2 pass privatepassword" > > > test:~ # ifconfig > fxp0: flags=8843 metric 0 mtu 1500 > options=8 > ether 00:13:20:65:ad:bd > inet 192.168.1.248 netmask 0xffffff00 broadcast 192.168.1.255 > media: Ethernet autoselect (100baseTX ) > status: active > plip0: flags=108810 metric 0 mtu > 1500 > lo0: flags=8049 metric 0 mtu 16384 > inet6 fe80::1%lo0 prefixlen 64 scopeid 0x3 > inet6 ::1 prefixlen 128 > inet 127.0.0.1 netmask 0xff000000 > pflog0: flags=141 metric 0 mtu 33204 > pfsync0: flags=0<> metric 0 mtu 1460 > syncpeer: 224.0.0.240 maxupd: 128 > carp1: flags=9 metric 0 mtu 1500 > carp: INIT vhid 1 advbase 1 advskew 50 > > What have I missed? > > Thanks > > > _______________________________________________ > freebsd-net@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-net > To unsubscribe, send any mail to "freebsd-net-unsubscribe@freebsd.org" > > From owner-freebsd-net@FreeBSD.ORG Sat May 9 02:16:30 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id B8D2A106566C for ; Sat, 9 May 2009 02:16:30 +0000 (UTC) (envelope-from will@firepipe.net) Received: from yw-out-2324.google.com (yw-out-2324.google.com [74.125.46.31]) by mx1.freebsd.org (Postfix) with ESMTP id 7FCC38FC0A for ; Sat, 9 May 2009 02:16:30 +0000 (UTC) (envelope-from will@firepipe.net) Received: by yw-out-2324.google.com with SMTP id 9so1051488ywe.13 for ; Fri, 08 May 2009 19:16:30 -0700 (PDT) MIME-Version: 1.0 Received: by 10.150.204.16 with SMTP id b16mr1105685ybg.335.1241835388608; Fri, 08 May 2009 19:16:28 -0700 (PDT) In-Reply-To: <11212.220.233.42.226.1241834944.squirrel@secure.ip6.com.au> References: <11159.220.233.42.226.1241834088.squirrel@secure.ip6.com.au> <11212.220.233.42.226.1241834944.squirrel@secure.ip6.com.au> Date: Fri, 8 May 2009 22:16:28 -0400 Message-ID: <2aada3410905081916k51f75499ve867cc4be316cdcf@mail.gmail.com> From: Will Andrews To: Sam Wan Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable Cc: freebsd-net@freebsd.org Subject: Re: CARP on FreeBSD 7,2 X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 09 May 2009 02:16:31 -0000 On Fri, May 8, 2009 at 10:09 PM, Sam Wan wrote: > The following command also failed: > > test:~ # ifconfig carp1 vhid 1 pass password 192.168.2.144/24 up > ifconfig: ioctl (SIOCAIFADDR): Can't assign requested address > >> >> Hi, >> >> I tried to setup CARP in FreeBSD 7.2, but seems not able to assign IP to >> the carp interfaces. >> >> Here is my rc.conf file: >> >> hostname=3D"test.ip6.com.au" >> ifconfig_fxp0=3D"inet 192.168.1.248 =A0netmask 255.255.255.0" >> sshd_enable=3D"YES" >> >> pf_enable=3D"YES" >> pf_rules=3D"/etc/pf.anti-spam.conf" >> pf_flags=3D"" >> pflog_enable=3D"YES" >> pflog_logfile=3D"/var/log/pflog" >> pflog_program=3D"/sbin/pflogd" >> pflog_flags=3D"" >> pfsync_enable=3D"NO" >> pfsync_syncdev=3D"" >> pfsync_ifconfig=3D"" >> >> cloned_interfaces=3D"carp1" >> ifconfig_carp1=3D"up 24.214.165.129/25 vhid 2 pass privatepassword" >> >> >> test:~ # ifconfig >> fxp0: flags=3D8843 metric 0 mtu = 1500 >> =A0 =A0 =A0 =A0 options=3D8 >> =A0 =A0 =A0 =A0 ether 00:13:20:65:ad:bd >> =A0 =A0 =A0 =A0 inet 192.168.1.248 netmask 0xffffff00 broadcast 192.168.= 1.255 >> =A0 =A0 =A0 =A0 media: Ethernet autoselect (100baseTX ) >> =A0 =A0 =A0 =A0 status: active >> plip0: flags=3D108810 metric 0= mtu >> 1500 >> lo0: flags=3D8049 metric 0 mtu 16384 >> =A0 =A0 =A0 =A0 inet6 fe80::1%lo0 prefixlen 64 scopeid 0x3 >> =A0 =A0 =A0 =A0 inet6 ::1 prefixlen 128 >> =A0 =A0 =A0 =A0 inet 127.0.0.1 netmask 0xff000000 >> pflog0: flags=3D141 metric 0 mtu 33204 >> pfsync0: flags=3D0<> metric 0 mtu 1460 >> =A0 =A0 =A0 =A0 syncpeer: 224.0.0.240 maxupd: 128 >> carp1: flags=3D9 metric 0 mtu 1500 >> =A0 =A0 =A0 =A0 carp: INIT vhid 1 advbase 1 advskew 50 >> >> What have I missed? Hi, Currently, the only way to assign an IP address for CARP is to use an IP that is in the same subnet as the physical interface you intend to handle its packets. In other words, since neither 192.168.2.144/24 nor 24.215.165.129/25 are in 192.168.1.248/24, they cannot be assigned to any CARP interface. Eventually, this should be fixed by introducing carpdev, which allows explicitly associating a CARP interface with a physical interface, but it's not there yet. Regards, --Will. From owner-freebsd-net@FreeBSD.ORG Sat May 9 02:45:52 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 42E33106564A for ; Sat, 9 May 2009 02:45:52 +0000 (UTC) (envelope-from sam@ip6.com.au) Received: from mail01.ip6.com.au (ns1.ip6.com.au [125.255.112.202]) by mx1.freebsd.org (Postfix) with ESMTP id 063758FC14 for ; Sat, 9 May 2009 02:45:52 +0000 (UTC) (envelope-from sam@ip6.com.au) Received: from mail01.ip6.com.au (localhost [127.0.0.1]) by mail01.ip6.com.au (Postfix) with ESMTP id 7CF61287F0 for ; Sat, 9 May 2009 12:45:42 +1000 (EST) Received: from secure.ip6.com.au (localhost [127.0.0.1]) by mail01.ip6.com.au (Postfix) with ESMTP id 3A762287B6 for ; Sat, 9 May 2009 12:45:42 +1000 (EST) Received: from 220.233.42.226 (SquirrelMail authenticated user sam) by secure.ip6.com.au with HTTP; Sat, 9 May 2009 12:45:42 +1000 (EST) Message-ID: <11644.220.233.42.226.1241837142.squirrel@secure.ip6.com.au> Date: Sat, 9 May 2009 12:45:42 +1000 (EST) From: "Sam Wan" To: freebsd-net@freebsd.org User-Agent: SquirrelMail/1.4.10a MIME-Version: 1.0 Content-Type: text/plain;charset=iso-8859-1 Content-Transfer-Encoding: 8bit X-Priority: 3 (Normal) Importance: Normal X-Virus-Scanned: ClamAV using ClamSMTP Subject: CARP loadbalance vs. IPVS loadbalance X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 09 May 2009 02:45:52 -0000 Hi, Can anyone give comment and suggestion which loadbalancer is better for FreeBSD (7.2), CARP or IPVS? Thanks From owner-freebsd-net@FreeBSD.ORG Sat May 9 18:00:36 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 58731106564A for ; Sat, 9 May 2009 18:00:36 +0000 (UTC) (envelope-from bms@incunabulum.net) Received: from out4.smtp.messagingengine.com (out4.smtp.messagingengine.com [66.111.4.28]) by mx1.freebsd.org (Postfix) with ESMTP id 0F1818FC21 for ; Sat, 9 May 2009 18:00:35 +0000 (UTC) (envelope-from bms@incunabulum.net) Received: from compute1.internal (compute1.internal [10.202.2.41]) by out1.messagingengine.com (Postfix) with ESMTP id 3F7FB341515; Sat, 9 May 2009 14:00:35 -0400 (EDT) Received: from heartbeat1.messagingengine.com ([10.202.2.160]) by compute1.internal (MEProxy); Sat, 09 May 2009 14:00:35 -0400 X-Sasl-enc: hcPhZGpb9iA08SrTrHTTLQHiBZiZYccLB7iepx+kXUQC 1241892034 Received: from [192.168.123.18] (82-35-112-254.cable.ubr07.dals.blueyonder.co.uk [82.35.112.254]) by mail.messagingengine.com (Postfix) with ESMTPSA id F251224695; Sat, 9 May 2009 14:00:33 -0400 (EDT) Message-ID: <4A05C4BA.2090506@incunabulum.net> Date: Sat, 09 May 2009 19:00:26 +0100 From: Bruce Simpson User-Agent: Thunderbird 2.0.0.21 (Windows/20090302) MIME-Version: 1.0 To: Sam Wun References: <736c47cb0905080552r70f45368va5dfa5af24720c1c@mail.gmail.com> <20090508164432.GW2160@verio.net> <736c47cb0905081754s32d9414fhe89f1920c8675869@mail.gmail.com> In-Reply-To: <736c47cb0905081754s32d9414fhe89f1920c8675869@mail.gmail.com> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Cc: freebsd-net@freebsd.org, freebsd-pf@freebsd.org Subject: Re: Can pfsync be used over router or WAN? X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 09 May 2009 18:00:36 -0000 Sam Wun wrote: > Establish a IPSEC bewteen this 2 pfsync points is a way to go. > Yup. The key observation about pfsync is that you can configure the peer(s) for synchronization in the 'syncdev' mode or the 'syncpeer' mode. Unlike CARP, pfsync(4) has no authentication built-in. With syncdev, you are telling pfsync to periodically send out state updates to a link-scope IPv4 multicast group. Obviously, this only works if all the peer(s) are on-link (i.e. the same LAN), and any Layer 2 switches in the middle are configured to forward the multicast traffic. The IGMP code will send a membership report for the 224.0.0.240 address, unless it's configured explicitly to not do so for 224.0.0.0/24 link-scope groups via sysctl, which should appease snooping switches. Note that it defaults to IGMPv3 in HEAD, it should downgrade to v2 or v1 if it sees a v2 Query. This mechanism operates wholly independently of CARP. You can IPSEC encapsulate multicast traffic, but of course that gives rise to 'interesting' key distribution problems. With syncpeer, you are telling pfsync to periodically send out state updates to a *single* peer, not a list, and all such traffic is unicasted. As far as I know, you can't specify multiple peers, so you are limited to 1 other member (unless the peer address is a CARP address, or anycasted by some other mechanism). This should work just fine with IPSEC, provided your key distribution is taken care of. If your WAN link can carry multicast traffic without additional encapsulation (most can, even if they're not link-layer multicast-capable), then using 'syncdev' should work fine, although the IGMP and MLD code in HEAD will suppress sending membership reports on interfaces without the IFF_MULTICAST flag. This doesn't disallow the stack from sending multicast traffic, though. [This should perhaps be revisited, because I can think of situations where the WAN link may not have a native link-layer multicast capability, but it's still desirable for the IGMP/MLD reports to go upstream, i.e. DSL in ATM native mode. Userland PPP via tun(4) needs to be told to enable IFF_MULTICAST with the TUNSIFMODE ioctl]. For those who are interested in experiments: pfsync(4) could in theory be enhanced to use Source-Specific Multicast (SSM) for pushing pf state to multiple border firewalls inside an AS boundary -- but it would require knowing all the addresses of the peer(s), and you'd be dependent on a multicast routing protocol like PIM at a minimum for distributing the traffic throughout your AS, as well as needing a unicast routing IGP for the traffic to pass the uRPF checks. It would be desirable to use a different address for this than 224.0.0.240. You could probably get away with Any-Source Multicast (ASM) for distributing the pfsync updates, but I'd advise against that, as ASM is a little bit harder to secure -- you don't/can't control the endpoints without explicit firewall rules, and of course that introduces recursion (you're having to firewall your firewall updates...) For kernel hacking: The KPIs involved require that kernel consumers do their own SSM housekeeping, though -- splicing of consumer layer memberships is only done for sockets, and you'd have to craft your own RB-trees, although the multicast code takes care of knitting together the right state-change reports to send upstream, doing filter matches etc -- that's a different matter. It's for this reason that SSM apps are generally best written in userland. Doing SSM in-kernel is possible, sure, but the whole point of using a socket for it is that a load of stuff gets taken care of for you, and using a socket in-kernel is still irksome. Obviously the more mechanisms you introduce to push out the updates, the wider the range of possible points of failure you introduce. pfsync is cool because it's a tightly integrated solution to a common problem in its space, but it may not be the right choice for all folks in its present state. ... By the way, does anyone out there have patches to get pfsync(4) to work over IPv6? cheers, BMS