Markus - try this and let me know...
$ cat BMS0463-ActiveTCPSessions.patch
--- ntop/report.c 2004-02-24 22:50:39.000000000 -0600
+++ ntop/report.c 2004-02-27 07:53:34.000000000 -0600
@@ -2919,6 +2931,12 @@
return;
}
+ if((myGlobals.device[actualDeviceId].tcpSession == NULL) ||
+ (myGlobals.device[actualDeviceId].numTcpSessions == 0)) {
+ printNotAvailable("No data (yet)");
+ return;
+ }
+
/*
Due to the way sessions are handled, sessions before those to
display need to be skipped
==========================================================================
(either patch it in manually or copy the lines after the cat not including
the ===s and use patch.
------Burton
> -----Original Message-----
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf
> Of Markus Rehbach
> Sent: Tuesday, February 24, 2004 4:00 PM
> To: [EMAIL PROTECTED]
> Subject: Re: [Ntop-dev] ntop segfaults (netflow interface active,
> clicking 'local IP / Active TCP Sessions')
>
>
> Frist try with gdb, please inform me which additional information
> is needed.
>
> The system segfaulting is based on a Suse 9.0, I tried the same
> on a system
> based on as Suse 8.0 where ntop did not showed this behaviour. Both
> system have modified kernels but I changed the kernel version at the
> system segfaulting.
>
> Markus
>
> **
>
> Program received signal SIGSEGV, Segmentation fault.
> [Switching to Thread 98311 (LWP 2508)]
> 0x400460bd in printActiveTCPSessions (actualDeviceId=1, pageNum=0, el=0x0)
> at report.c:2925
> 2925
> if(myGlobals.device[myGlobals.actualReportDeviceId].tcpSession[idx
> ] != NULL)
> {
> (gdb) list
> 2920
> 2921 #ifdef CFG_MULTITHREADED
> 2922 accessMutex(&myGlobals.tcpSessionsMutex,
> "printActiveTCPSessions");
> 2923 #endif
> 2924
> 2925
> if(myGlobals.device[myGlobals.actualReportDeviceId].tcpSession[idx
> ] != NULL)
> {
> 2926 char *sport, *dport;
> 2927 Counter dataSent, dataRcvd;
> 2928 IPSession *session =
> myGlobals.device[myGlobals.actualReportDeviceId].tcpSession[idx];
> 2929
> (gdb) info stack
> #0 0x400460bd in printActiveTCPSessions (actualDeviceId=1, pageNum=0,
> el=0x0) at report.c:2925
> #1 0x40036ed9 in returnHTTPPage (pageName=0xbedff4fd "NetNetstat.html",
> postLen=-1, from=0xbedff71c, httpRequestedAt=0xbedff0b4,
> usedFork=0xbedff0b0,
> agent=0xbedff3bc "Mozilla/5.0 (compatible; Konqueror/3.1; Linux)",
> referer=0xbedff2bc "http://127.0.0.1:3000/Local.html") at http.c:2069
> #2 0x40038767 in handleHTTPrequest (from=
> {hostFamily = 10, addr = {_hostIp4Address = {s_addr = 0},
> _hostIp6Address = {in6_u = {u6_addr8 =
> "\000\000\000\000\000\000\000\000��߾
> \0 34\200:A", u6_addr16 = {0, 0, 0, 0, 64212, 48863, 32796,
> 16698}, u6_addr32 = {0, 0, 3202349780, 1094352924}}}}}) at
> http.c:3063
> #3 0x4007d0ec in handleSingleWebConnection (fdmask=0xa)
> at webInterface.c:8220
> #4 0x4007ced5 in handleWebConnections (notUsed=0x0)
> at webInterface.c:8069
> #5 0x412290f0 in pthread_start_thread () from /lib/libpthread.so.0
> #6 0x4122916f in pthread_start_thread_event () from /lib/libpthread.so.0
> #7 0x413aec77 in clone () from /lib/libc.so.6
> (gdb) print
> myGlobals.device[myGlobals.actualReportDeviceId].tcpSession[idx]
> Cannot access memory at address 0x4
> (gdb) print myGlobals.device[myGlobals.actualReportDeviceId]
> $1 = {name = 0x80c6f20 "NetFlow-device",
> humanFriendlyName = 0x80eb778 "NetFlow-device", flags = 0, addr = 0,
> ipdot = 0x0, fqdn = 0x0, network = {s_addr = 169090600}, netmask = {
> s_addr = 4294967040}, numHosts = 256, ifAddr = {s_addr = 169090600},
> v6Addrs = 0x0, started = 0, firstpkt = 0, lastpkt = 0, pcapPtr = 0x0,
> pcapDumper = 0x0, pcapErrDumper = 0x0, pcapOtherDumper = 0x0,
> virtualDevice = 0 '\0', activeDevice = 1 '\001',
> dummyDevice = 1 '\001', deviceSpeed = 0, snaplen = 0, datalink = 1,
> mtuSize = 0, headerSize = 0, filter = 0x0, fd = 0, receivedPkts = {
> value = 0, modified = 0 '\0'}, droppedPkts = {value = 0,
> modified = 0 '\0'}, ethernetPkts = {value = 0, modified = 0 '\0'},
> broadcastPkts = {value = 0, modified = 0 '\0'}, multicastPkts = {
> value = 0, modified = 0 '\0'}, ipPkts = {value = 0,
> modified = 0 '\0'}, fcPkts = {value = 0, modified = 0 '\0'},
> fcEofaPkts = {value = 0, modified = 0 '\0'}, fcEofAbnormalPkts = {
> value = 0, modified = 0 '\0'}, fcAbnormalPkts = {value = 0,
> modified = 0 '\0'}, fcBroadcastPkts = {value = 0, modified = 0 '\0'},
> ethernetBytes = {value = 0, modified = 0 '\0'}, ipBytes = {value = 0,
> modified = 0 '\0'}, fragmentedIpBytes = {value = 0,
> modified = 0 '\0'}, tcpBytes = {value = 0, modified = 0 '\0'},
> udpBytes = {value = 0, modified = 0 '\0'}, otherIpBytes = {value = 0,
> modified = 0 '\0'}, icmpBytes = {value = 0, modified = 0 '\0'},
> dlcBytes = {value = 0, modified = 0 '\0'}, ipxBytes = {value = 0,
> modified = 0 '\0'}, stpBytes = {value = 0, modified = 0 '\0'},
> decnetBytes = {value = 0, modified = 0 '\0'}, netbiosBytes = {
> value = 0, modified = 0 '\0'}, arpRarpBytes = {value = 0,
> modified = 0 '\0'}, atalkBytes = {value = 0, modified = 0 '\0'},
> egpBytes = {value = 0, modified = 0 '\0'}, osiBytes = {value = 0,
> modified = 0 '\0'}, ipv6Bytes = {value = 0, modified = 0 '\0'},
> icmp6Bytes = {value = 0, modified = 0 '\0'}, otherBytes = {value = 0,
> modified = 0 '\0'}, ipProtosList = 0x80e9268, fcBytes = {value = 0,
> modified = 0 '\0'}, fragmentedFcBytes = {value = 0,
> modified = 0 '\0'}, fcFcpBytes = {value = 0, modified = 0 '\0'},
> fcFiconBytes = {value = 0, modified = 0 '\0'}, fcIpfcBytes = {
> value = 0, modified = 0 '\0'}, fcSwilsBytes = {value = 0,
> modified = 0 '\0'}, fcDnsBytes = {value = 0, modified = 0 '\0'},
> fcElsBytes = {value = 0, modified = 0 '\0'}, otherFcBytes = {value = 0,
> modified = 0 '\0'}, fcBroadcastBytes = {value = 0,
> modified = 0 '\0'}, class2Bytes = {value = 0, modified = 0 '\0'},
> class3Bytes = {value = 0, modified = 0 '\0'}, classFBytes = {value = 0,
> modified = 0 '\0'}, ipPorts = {0x0 <repeats 65534 times>},
> lastMinEthernetBytes = {value = 0, modified = 0 '\0'},
> lastFiveMinsEthernetBytes = {value = 0, modified = 0 '\0'},
> lastMinEthernetPkts = {value = 0, modified = 0 '\0'},
> lastFiveMinsEthernetPkts = {value = 0, modified = 0 '\0'},
> lastNumEthernetPkts = {value = 0, modified = 0 '\0'},
> lastEthernetPkts = {value = 0, modified = 0 '\0'}, lastTotalPkts = {
> value = 0, modified = 0 '\0'}, lastBroadcastPkts = {value = 0,
> modified = 0 '\0'}, lastMulticastPkts = {value = 0,
> modified = 0 '\0'}, lastEthernetBytes = {value = 0,
> modified = 0 '\0'}, lastIpBytes = {value = 0, modified = 0 '\0'},
> ---Type <return> to continue, or q <return> to quit---
> lastNonIpBytes = {value = 0, modified = 0 '\0'}, rcvdPktStats = {
> upTo64 = {value = 0, modified = 0 '\0'}, upTo128 = {value = 0,
> modified = 0 '\0'}, upTo256 = {value = 0, modified = 0 '\0'},
> upTo512 = {value = 0, modified = 0 '\0'}, upTo1024 = {value = 0,
> modified = 0 '\0'}, upTo1518 = {value = 0, modified = 0 '\0'},
> above1518 = {value = 0, modified = 0 '\0'}, shortest = {value = 0,
> modified = 0 '\0'}, longest = {value = 0, modified = 0 '\0'},
> badChecksum = {value = 0, modified = 0 '\0'}, tooLong = {value = 0,
> modified = 0 '\0'}}, rcvdFcPktStats = {upTo36 = {value = 0,
> modified = 0 '\0'}, upTo48 = {value = 0, modified = 0 '\0'},
> upTo52 = {value = 0, modified = 0 '\0'}, upTo68 = {value = 0,
> modified = 0 '\0'}, upTo104 = {value = 0, modified = 0 '\0'},
> upTo548 = {value = 0, modified = 0 '\0'}, upTo1060 = {value = 0,
> modified = 0 '\0'}, upTo2136 = {value = 0, modified = 0 '\0'},
> above2136 = {value = 0, modified = 0 '\0'}, shortest = {value = 0,
> modified = 0 '\0'}, longest = {value = 0, modified = 0 '\0'},
> badCRC = {value = 0, modified = 0 '\0'}, tooLong = {value = 0,
> modified = 0 '\0'}}, rcvdPktTTLStats = {upTo32 = {value = 0,
> modified = 0 '\0'}, upTo64 = {value = 0, modified = 0 '\0'},
> upTo96 = {value = 0, modified = 0 '\0'}, upTo128 = {value = 0,
> modified = 0 '\0'}, upTo160 = {value = 0, modified = 0 '\0'},
> upTo192 = {value = 0, modified = 0 '\0'}, upTo224 = {value = 0,
> modified = 0 '\0'}, upTo255 = {value = 0, modified = 0 '\0'}},
> peakThroughput = 0, actualThpt = 0, lastMinThpt = 0,
> lastFiveMinsThpt = 0, peakPacketThroughput = 0, actualPktsThpt = 0,
> lastMinPktsThpt = 0, lastFiveMinsPktsThpt = 0,
> lastThptUpdate = 1077608005, lastMinThptUpdate = 1077608005,
> lastHourThptUpdate = 1077608005, lastFiveMinsThptUpdate = 1077608005,
> throughput = 0, packetThroughput = 0, numThptSamples = 0,
> last60MinutesThpt = {{trafficValue = 0, topHostSentSerial = {
> serialType = 0 '\0', value = {
> ethAddress = "\000\000\000\000\000", ipAddress = {
> hostFamily = 0, addr = {_hostIp4Address = {s_addr = 0},
> _hostIp6Address = {in6_u = {
> u6_addr8 = '\0' <repeats 15 times>, u6_addr16 = {0, 0,
> 0, 0, 0, 0, 0, 0}, u6_addr32 = {0, 0, 0, 0}}}}},
> fcSerial = {fcAddress = {domain = 0 '\0', area = 0 '\0',
> port = 0 '\0'}, vsanId = 0}}}, secondHostSentSerial = {
> serialType = 0 '\0', value = {
> ethAddress = "\000\000\000\000\000", ipAddress = {
> hostFamily = 0, addr = {_hostIp4Address = {s_addr = 0},
> _hostIp6Address = {in6_u = {
> u6_addr8 = '\0' <repeats 15 times>, u6_addr16 = {0, 0,
> 0, 0, 0, 0, 0, 0}, u6_addr32 = {0, 0, 0, 0}}}}},
> fcSerial = {fcAddress = {domain = 0 '\0', area = 0 '\0',
> port = 0 '\0'}, vsanId = 0}}}, thirdHostSentSerial = {
> serialType = 0 '\0', value = {
> ethAddress = "\000\000\000\000\000", ipAddress = {
> hostFamily = 0, addr = {_hostIp4Address = {s_addr = 0},
> _hostIp6Address = {in6_u = {
> u6_addr8 = '\0' <repeats 15 times>, u6_addr16 = {0, 0,
> ---Type <return> to continue, or q <return> to quit---
> 0, 0, 0, 0, 0, 0}, u6_addr32 = {0, 0, 0, 0}}}}},
> fcSerial = {fcAddress = {domain = 0 '\0', area = 0 '\0',
> port = 0 '\0'}, vsanId = 0}}}, topSentTraffic = {value = 0,
> modified = 0 '\0'}, secondSentTraffic = {value = 0,
> modified = 0 '\0'}, thirdSentTraffic = {value = 0,
> modified = 0 '\0'}, topHostRcvdSerial = {serialType = 0 '\0',
> value = {ethAddress = "\000\000\000\000\000", ipAddress = {
> hostFamily = 0, addr = {_hostIp4Address = {s_addr = 0},
> _hostIp6Address = {in6_u = {
> u6_addr8 = '\0' <repeats 15 times>, u6_addr16 = {0, 0,
> 0, 0, 0, 0, 0, 0}, u6_addr32 = {0, 0, 0, 0}}}}},
> fcSerial = {fcAddress = {domain = 0 '\0', area = 0 '\0',
> port = 0 '\0'}, vsanId = 0}}}, secondHostRcvdSerial = {
> serialType = 0 '\0', value = {
> ethAddress = "\000\000\000\000\000", ipAddress = {
> hostFamily = 0, addr = {_hostIp4Address = {s_addr = 0},
> _hostIp6Address = {in6_u = {
> u6_addr8 = '\0' <repeats 15 times>, u6_addr16 = {0, 0,
> 0, 0, 0, 0, 0, 0}, u6_addr32 = {0, 0, 0, 0}}}}},
> fcSerial = {fcAddress = {domain = 0 '\0', area = 0 '\0',
> port = 0 '\0'}, vsanId = 0}}}, thirdHostRcvdSerial = {
> serialType = 0 '\0', value = {
> ethAddress = "\000\000\000\000\000", ipAddress = {
> hostFamily = 0, addr = {_hostIp4Address = {s_addr = 0},
> _hostIp6Address = {in6_u = {
> u6_addr8 = '\0' <repeats 15 times>, u6_addr16 = {0, 0,
> 0, 0, 0, 0, 0, 0}, u6_addr32 = {0, 0, 0, 0}}}}},
> fcSerial = {fcAddress = {domain = 0 '\0', area = 0 '\0',
> port = 0 '\0'}, vsanId = 0}}}, topRcvdTraffic = {value = 0,
> modified = 0 '\0'}, secondRcvdTraffic = {value = 0,
> modified = 0 '\0'}, thirdRcvdTraffic = {value = 0,
> modified = 0 '\0'}} <repeats 60 times>}, last24HoursThpt = {{
> trafficValue = 0, topHostSentSerial = {serialType = 0 '\0',
> value = {ethAddress = "\000\000\000\000\000", ipAddress = {
> hostFamily = 0, addr = {_hostIp4Address = {s_addr = 0},
> _hostIp6Address = {in6_u = {
> u6_addr8 = '\0' <repeats 15 times>, u6_addr16 = {0, 0,
> 0, 0, 0, 0, 0, 0}, u6_addr32 = {0, 0, 0, 0}}}}},
> fcSerial = {fcAddress = {domain = 0 '\0', area = 0 '\0',
> port = 0 '\0'}, vsanId = 0}}}, secondHostSentSerial = {
> serialType = 0 '\0', value = {
> ethAddress = "\000\000\000\000\000", ipAddress = {
> hostFamily = 0, addr = {_hostIp4Address = {s_addr = 0},
> _hostIp6Address = {in6_u = {
> u6_addr8 = '\0' <repeats 15 times>, u6_addr16 = {0, 0,
> 0, 0, 0, 0, 0, 0}, u6_addr32 = {0, 0, 0, 0}}}}},
> fcSerial = {fcAddress = {domain = 0 '\0', area = 0 '\0',
> port = 0 '\0'}, vsanId = 0}}}, thirdHostSentSerial = {
> serialType = 0 '\0', value = {
> ethAddress = "\000\000\000\000\000", ipAddress = {
> hostFamily = 0, addr = {_hostIp4Address = {s_addr = 0},
> ---Type <return> to continue, or q <return> to quit---
> _hostIp6Address = {in6_u = {
> u6_addr8 = '\0' <repeats 15 times>, u6_addr16 = {0, 0,
> 0, 0, 0, 0, 0, 0}, u6_addr32 = {0, 0, 0, 0}}}}},
> fcSerial = {fcAddress = {domain = 0 '\0', area = 0 '\0',
> port = 0 '\0'}, vsanId = 0}}}, topSentTraffic = {value = 0,
> modified = 0 '\0'}, secondSentTraffic = {value = 0,
> modified = 0 '\0'}, thirdSentTraffic = {value = 0,
> modified = 0 '\0'}, topHostRcvdSerial = {serialType = 0 '\0',
> value = {ethAddress = "\000\000\000\000\000", ipAddress = {
> hostFamily = 0, addr = {_hostIp4Address = {s_addr = 0},
> _hostIp6Address = {in6_u = {
> u6_addr8 = '\0' <repeats 15 times>, u6_addr16 = {0, 0,
> 0, 0, 0, 0, 0, 0}, u6_addr32 = {0, 0, 0, 0}}}}},
> fcSerial = {fcAddress = {domain = 0 '\0', area = 0 '\0',
> port = 0 '\0'}, vsanId = 0}}}, secondHostRcvdSerial = {
> serialType = 0 '\0', value = {
> ethAddress = "\000\000\000\000\000", ipAddress = {
> hostFamily = 0, addr = {_hostIp4Address = {s_addr = 0},
> _hostIp6Address = {in6_u = {
> u6_addr8 = '\0' <repeats 15 times>, u6_addr16 = {0, 0,
> 0, 0, 0, 0, 0, 0}, u6_addr32 = {0, 0, 0, 0}}}}},
> fcSerial = {fcAddress = {domain = 0 '\0', area = 0 '\0',
> port = 0 '\0'}, vsanId = 0}}}, thirdHostRcvdSerial = {
> serialType = 0 '\0', value = {
> ethAddress = "\000\000\000\000\000", ipAddress = {
> hostFamily = 0, addr = {_hostIp4Address = {s_addr = 0},
> _hostIp6Address = {in6_u = {
> u6_addr8 = '\0' <repeats 15 times>, u6_addr16 = {0, 0,
> 0, 0, 0, 0, 0, 0}, u6_addr32 = {0, 0, 0, 0}}}}},
> fcSerial = {fcAddress = {domain = 0 '\0', area = 0 '\0',
> port = 0 '\0'}, vsanId = 0}}}, topRcvdTraffic = {value = 0,
> modified = 0 '\0'}, secondRcvdTraffic = {value = 0,
> modified = 0 '\0'}, thirdRcvdTraffic = {value = 0,
> modified = 0 '\0'}} <repeats 24 times>}, last30daysThpt = {
> 0 <repeats 30 times>}, last60MinutesThptIdx = 0,
> last24HoursThptIdx = 0, last30daysThptIdx = 0, tcpGlobalTrafficStats = {
> local = {value = 0, modified = 0 '\0'}, local2remote = {value = 0,
> modified = 0 '\0'}, remote = {value = 0, modified = 0 '\0'},
> remote2local = {value = 0, modified = 0 '\0'}, lastLocal = {
> value = 0, modified = 0 '\0'}, lastLocal2remote = {value = 0,
> modified = 0 '\0'}, lastRem = {value = 0, modified = 0 '\0'},
> lastRem2local = {value = 0, modified = 0 '\0'}},
> udpGlobalTrafficStats = {local = {value = 0, modified = 0 '\0'},
> local2remote = {value = 0, modified = 0 '\0'}, remote = {value = 0,
> modified = 0 '\0'}, remote2local = {value = 0, modified = 0 '\0'},
> lastLocal = {value = 0, modified = 0 '\0'}, lastLocal2remote = {
> value = 0, modified = 0 '\0'}, lastRem = {value = 0,
> modified = 0 '\0'}, lastRem2local = {value = 0,
> modified = 0 '\0'}}, icmpGlobalTrafficStats = {local = {value = 0,
> modified = 0 '\0'}, local2remote = {value = 0, modified = 0 '\0'},
> remote = {value = 0, modified = 0 '\0'}, remote2local = {value = 0,
> ---Type <return> to continue, or q <return> to quit---
> modified = 0 '\0'}, lastLocal = {value = 0, modified = 0 '\0'},
> lastLocal2remote = {value = 0, modified = 0 '\0'}, lastRem = {
> value = 0, modified = 0 '\0'}, lastRem2local = {value = 0,
> modified = 0 '\0'}}, ipProtoStats = 0x85de3b8, securityPkts = {
> synPkts = {value = 0, modified = 0 '\0'}, rstPkts = {value = 0,
> modified = 0 '\0'}, rstAckPkts = {value = 0, modified = 0 '\0'},
> synFinPkts = {value = 0, modified = 0 '\0'}, finPushUrgPkts = {
> value = 0, modified = 0 '\0'}, nullPkts = {value = 0,
> modified = 0 '\0'}, rejectedTCPConn = {value = 0,
> modified = 0 '\0'}, establishedTCPConn = {value = 0,
> modified = 0 '\0'}, terminatedTCPConn = {value = 0,
> modified = 0 '\0'}, ackXmasFinSynNullScan = {value = 0,
> modified = 0 '\0'}, udpToClosedPort = {value = 0,
> modified = 0 '\0'}, udpToDiagnosticPort = {value = 0,
> modified = 0 '\0'}, tcpToDiagnosticPort = {value = 0,
> modified = 0 '\0'}, tinyFragment = {value = 0, modified = 0 '\0'},
> icmpFragment = {value = 0, modified = 0 '\0'}, overlappingFragment = {
> value = 0, modified = 0 '\0'}, closedEmptyTCPConn = {value = 0,
> modified = 0 '\0'}, malformedPkts = {value = 0, modified = 0 '\0'},
> icmpPortUnreach = {value = 0, modified = 0 '\0'},
> icmpHostNetUnreach = {value = 0, modified = 0 '\0'},
> icmpProtocolUnreach = {value = 0, modified = 0 '\0'},
> icmpAdminProhibited = {value = 0, modified = 0 '\0'}},
> numEstablishedTCPConnections = {value = 0, modified = 0 '\0'},
> pcapDispatchThreadId = 0, hostsno = 1, actualHashSize = 16384,
> hash_hostTraffic = 0x88325c0, hashListMaxLookups = 0, vsanHash = 0x0,
> fragmentList = 0x0, tcpSession = 0x0, numTcpSessions = 0,
> maxNumTcpSessions = 0, ipTrafficMatrix = 0x417d8008,
> ipTrafficMatrixHosts = 0x85dea80, ipTrafficMatrixPromiscHosts = {
> __fds_bits = {0 <repeats 32 times>}}, fcSession = 0x0,
> numFcSessions = 0, maxNumFcSessions = 0, fcTrafficMatrix = 0x0,
> fcTrafficMatrixHosts = 0x0, exportNetFlow = 0 '\0'}
> (gdb)
>
>
>
>
> On Monday 23 February 2004 21:24, Burton M. Strauss III wrote:
> > Don't think any of my recent changes should have altered that
> behavior, so
> > yes, please do collect the gdb data.
> >
> > -----Burton
> >
> > > -----Original Message-----
> > > From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf
> > Of Markus Rehbach
> > Sent: Monday, February 23, 2004 11:50 AM
> > To: [EMAIL PROTECTED]
> > Subject: [Ntop-dev] ntop segfaults (netflow interface active, clicking
> > 'local IP / Active TCP Sessions')
> >
> >
> > Hi all,
> >
> > the 'local IP, Active TCP Sessions' is working with eth0, but not
> > with the
> > Netflow device, where ntop segfaults. But it is questionable whether
this
> > function makes sense on the netflow device......
> >
> > If necessary I could try to send a gdb output.
> >
> > Cheers
> >
> > Markus
> >
> > _______________________________________________
> > Ntop-dev mailing list
> > [EMAIL PROTECTED]
> > http://listgateway.unipi.it/mailman/listinfo/ntop-dev
>
> _______________________________________________
> Ntop-dev mailing list
> [EMAIL PROTECTED]
> http://listgateway.unipi.it/mailman/listinfo/ntop-dev
_______________________________________________
Ntop-dev mailing list
[EMAIL PROTECTED]
http://listgateway.unipi.it/mailman/listinfo/ntop-dev
_______________________________________________
Ntop-dev mailing list
[EMAIL PROTECTED]
http://listgateway.unipi.it/mailman/listinfo/ntop-dev