[leaf-user] Bering-uClibc 2.1.3 Stops after Several Hours Part #2

2004-07-12 Thread mcartter
I built a new LRP yesterday with a newer motherboard, two PCI cards, and
128  megabytes of RAM.  Bering-uClibc_2.1.3 ran fine for several hours,
but stopped  sometime overnight.  The problem does not appear to be with
the old ISA NICs.

The system is back and running with Dashstein.  After 7 hours, I have the
following  firewall status message You have 1092 denied or rejected
packets in your recent  packet logs.  This is not an unusual number for
my system but Dashstein continued  to run and I did not worry about it. 
Perhaps I should have.  Does Bering-uClibc 2.1.3  handle denied or
rejected packets in a way that will cause Shorewall to stop?

Thanks in advance for your help.

--- Forwarded message follows ---
From:   mcartter at pol dot net
To: [EMAIL PROTECTED]
Date sent:  Sat, 10 Jul 2004 17:27:02 -0400
Subject:Bering-uClibc_2.1.3 stops after several hours
Priority:   normal


Problem:  Bering-uClibc_2.1.3 stops after several hours.

I have been using the Dachstein_contributed pppoe version by Kenneth
Hadley on a home network for the past two years without any problems. The
LRP is connected to three PCs running Windows XP professional via a
switch.  The LRP runs on a 486 with two ISA cards: eth0 uses 8390.o and
ne.o; eth1 uses 3c509.o.

I decided to upgrade to Bering-uClibc_2.1.3.  I have been able to get the
system up and running with no error messages.  I am able to monitor the
status via Mozilla browser and weblet.  After several hours, the firewall
status turns to error (more than 50 denied packets).  Not long after, I
lose the connection to the Internet on one or more PCs, and the connection
to the internal network is down on all three PCs.  This afternoon, I had
one PC still connected to the Internet, but was unable to see the other
two PCs on the network.

When I restart using the Dashstein disk, the system works fine.

I have searched the old mail lists and found a report by one user that was
somewhat similar and may have been due to a driver problem using the old
3Com ISA card (there was no follow up to that message.

Before I start pulling cards, I would appreciate any insight that the
users of this list have into this problem.  I have pasted the various
messages below:

* the exact name of the LEAF distribution and version you are running.

Bering-uClibc_2.1.3

* the exact kernel version you are running

ash# uname -a

Linux firewall 2.4.24 #3 Sun Feb 22 19:25:40 CET 2004 i486 unknown


cp /var/log/messages /mnt/messages.txt

Jul 10 10:52:07 firewall syslogd 1.4.1: restart.
Jul 10 10:52:07 firewall kernel: klogd 1.4.1, log source = /proc/kmsg
started.
Jul 10 10:52:07 firewall kernel: No module symbols loaded.
Jul 10 10:52:07 firewall kernel: BIOS-provided physical RAM map:
Jul 10 10:52:07 firewall kernel: 16MB LOWMEM available.
Jul 10 10:52:07 firewall kernel: DMI not present.
Jul 10 10:52:07 firewall kernel: Initializing CPU#0
Jul 10 10:52:07 firewall kernel: Memory: 14252k/16672k available (995k
kernel code, 2032k reserved, 99k data, 80k init, 0k highmem)
Jul 10 10:52:07 firewall kernel: Dentry cache hash table entries: 4096
(order: 3, 32768 bytes)
Jul 10 10:52:07 firewall kernel: Inode cache hash table entries: 2048
(order: 2, 16384 bytes)
Jul 10 10:52:07 firewall kernel: Mount cache hash table entries: 512
(order: 0, 4096 bytes)
Jul 10 10:52:07 firewall kernel: Buffer cache hash table entries: 1024
(order: 0, 4096 bytes)
Jul 10 10:52:07 firewall kernel: Checking 'hlt' instruction... OK.
Jul 10 10:52:07 firewall kernel: Linux NET4.0 for Linux 2.4
Jul 10 10:52:07 firewall kernel: Based upon Swansea University Computer
Society NET3.039
Jul 10 10:52:07 firewall kernel: Serial driver version 5.05c (2001-07-08)
with MANY_PORTS SHARE_IRQ DETECT_IRQ SERIAL_PCI enabled
Jul 10 10:52:07 firewall kernel: ttyS00 at 0x03f8 (irq = 4) is a 16550A
Jul 10 10:52:07 firewall kernel: ttyS01 at 0x02f8 (irq = 3) is a 16550A
Jul 10 10:52:07 firewall kernel: Real Time Clock Driver v1.10e
Jul 10 10:52:07 firewall kernel: Floppy drive(s): fd0 is 2.88M
Jul 10 10:52:07 firewall kernel: FDC 0 is a National Semiconductor PC87306
Jul 10 10:52:07 firewall kernel: Initializing Cryptographic API
Jul 10 10:52:07 firewall kernel: NET4: Linux TCP/IP 1.0 for NET4.0
Jul 10 10:52:07 firewall kernel: IP Protocols: ICMP, UDP, TCP, IGMP
Jul 10 10:52:07 firewall kernel: IP: routing cache hash table of 512
buckets, 4Kbytes
Jul 10 10:52:07 firewall kernel: TCP: Hash tables configured (established
1024 bind 1024)
Jul 10 10:52:07 firewall kernel: NET4: Unix domain sockets 1.0/SMP for
Linux NET4.0.
Jul 10 10:52:07 firewall kernel: RAMDISK: Compressed image found at block 0
Jul 10 10:52:07 firewall kernel: Freeing initrd memory: 284k freed
Jul 10 10:52:07 firewall kernel: Freeing unused kernel memory: 80k freed
Jul 10 10:52:08 firewall kernel: ne.c:v1.10 9/23/94 Donald Becker
([EMAIL PROTECTED])
Jul 10 10:52:08 firewall kernel: Last modified Nov 1, 2000 

[leaf-user] ANN: ML Outage

2004-07-12 Thread Mike Noyes
Everyone,
It seems we just had a global mailing list issue. If you posted a
message in the last couple of days, please check to see if it actually
posted to our mailing lists. Thanks.

Check the archive for your post.
http://sourceforge.net/mail/?group_id=13751

-- 
Mike Noyes mhnoyes at users.sourceforge.net
http://sourceforge.net/users/mhnoyes/
SF.net Projects: ffl, leaf, phpwebsite, phpwebsite-comm, sitedocs



---
This SF.Net email sponsored by Black Hat Briefings  Training.
Attend Black Hat Briefings  Training, Las Vegas July 24-29 - 
digital self defense, top technical experts, no vendor pitches, 
unmatched networking opportunities. Visit www.blackhat.com

leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html


Re: [leaf-user] Weird Proxy Arp Setup

2004-07-12 Thread Ryan Rich
Ok,

First I want to thanks everyone for their responses so far!  I will stop
being ambigious, since it seems to make things more complicated and I
think where i work probably has the whole 138.23.0.0/16 block anyways so
that secret is already out...  My address are on the 138.23.75.0 and
138.23.76.0 subnets.

I have been trying to narrow down the problem with the machine that was
unreachable in the dmz, so I removed the multiple addresses from the eth0
interface on the leaf box and currently only have 1 machine in the dmz. 
Currently for testing I am using the following setup...

LEAF eth0=138.23.75.52 mask 255.255.255.0
LEAF eth1=192.168.1.1
Machine in dmz=138.23.75.60 mask 255.255.255.0

The leaf box is able to ping the machine in the dmz and the machine in the
dmz can ping the leaf box.  So everything between these two machines seems
great.  Route shows up for 138.23.75.60 via eth1.  However, when I try to
ping the machine in the dmz from another machine, there is no luck
(shorewall has been set to allow pings and there is nothing in the log). 
Also the machine in the dmz can ping nothing outside of the leaf box.

Now, if I give the same machine in the dmz the address I used for the
machine that did work before (138.23.76.112 mask 255.255.255.0) everything
works beautifully!  The 138.23.76.112 address in the dmz works if the LEAF
eth0 interface is assigned an address in the 138.23.75 or the 138.23.76
subnet too, so I guess that is not an issue after all.

So right now I am baffled.  If I plug the machine in the dmz directly into
the network with the 138.23.75.60 address it works fine.  Am I going mad,
or is there something that would cause this behavior?

Many Thanks,
Ryan

 At 04:52 PM 7/10/2004 -0700, Ryan Rich wrote:
Hello,

I have a question regarding the setup of proxy arp...  I think my
situation is a little strange so let me explain, I do not consider myself
a network expert so fogive me if I am a little off with my
terminology...  We have a physical network that contains 2 logical
subnets, 138.23.aa/24 and 138.23.bb/24 (i.e. I can assign a machine
address 138.23.aa.xx (mask 255.255.255.0) or 138.23.bb.xx (mask
255.255.255.0) and plug them into the same jack and they will both
work).  I have a few servers I would like to firewall using proxy arp.
Some of the machines have an address on the 138.23.aa network and some on
the 138.23.bb.

Now this works fine if I assign the LEAF machine an IP address in the
138.23.aa network (eth0) and the server's address in my dmz (eth1) is
 also
in the same subnet (138.23.aa)... but when I try to add a server with an
address from the 138.23.bb network to my dmz, it is unreachable (even
though if I were to plug this machine into the very same physical
connection with that address it would work).  Now after doing a little
reading about proxy arp it looks like this would be normal behavior...
So I do have an extra address in the 138.23.bb network so I tried adding
it as an alias to the eth0 interface (eth0:0) in hopes that I would then
be able to proxy arp to my servers with both the 138.23.aa and 138.23.bb
addresses.  I have had no luck as of yet though, the aliased address on
the leaf box interface is pingable and reachable, but it still won't
 proxy
arp to the machine in the dmz with the 138.23.bb address.  I have tried
changing the broadcast in the shorewall config from detect to
138.23.aa.255,138.23.bb.255 but no dice.

I have gone through the shorewall documentation and read about aliasing,
but I don't see anything that is similiar to my situation.
Does anyone have any suggestions on how to go about making this work or
 is
it just too wierd to have a network like this?

 First, a blue sky thought here. I mention it only because you emphasized
 that you are not a networking expert. (Also, your i.e. is ambiguous in a
 way that is exactly relevant to this possibility, and your comment about
 changing the broadcast address also suggests it.)

 Is it possible that aa and bb are sequential values (for example, 20 and
 21) of a sort (even-odd, not odd-even) that would let you use the
 representation 138.23.aa.0/23 for the network?  If so, you can probably
 modify the LEAF router's settings to treat everything as a single network.
 And then 138.23.bb.255 is the correct  broadcast address.

 If that approach can't be used ... Tom already answered about the
 1-external address situation. But it remains unclear why you can't proxy
 arp if both networks appear on the external interface. Did you verify that
 you set this part up correctly ... for example, does the LEAF router's
 routing table have entries for both 138.23.aa.0/24 and 138.23.bb.0/24? Do
 the DMZ hosts on 138.23.bb.0/24 and the LEAF router themselves communicate
 properly?





 ---
 This SF.Net email sponsored by Black Hat Briefings  Training.
 Attend Black Hat Briefings  Training, Las Vegas July 24-29 -
 digital self defense, top technical experts, no 

Re: [leaf-user] Weird Proxy Arp Setup

2004-07-12 Thread Charles Steinkuehler
Ryan Rich wrote:
Ok,
First I want to thanks everyone for their responses so far!  I will stop
being ambigious, since it seems to make things more complicated and I
think where i work probably has the whole 138.23.0.0/16 block anyways so
that secret is already out...  My address are on the 138.23.75.0 and
138.23.76.0 subnets.
I have been trying to narrow down the problem with the machine that was
unreachable in the dmz, so I removed the multiple addresses from the eth0
interface on the leaf box and currently only have 1 machine in the dmz. 
Currently for testing I am using the following setup...

LEAF eth0=138.23.75.52 mask 255.255.255.0
LEAF eth1=192.168.1.1
Machine in dmz=138.23.75.60 mask 255.255.255.0
The leaf box is able to ping the machine in the dmz and the machine in the
dmz can ping the leaf box.  So everything between these two machines seems
great.  Route shows up for 138.23.75.60 via eth1.  However, when I try to
ping the machine in the dmz from another machine, there is no luck
(shorewall has been set to allow pings and there is nothing in the log). 
Also the machine in the dmz can ping nothing outside of the leaf box.

Now, if I give the same machine in the dmz the address I used for the
machine that did work before (138.23.76.112 mask 255.255.255.0) everything
works beautifully!  The 138.23.76.112 address in the dmz works if the LEAF
eth0 interface is assigned an address in the 138.23.75 or the 138.23.76
subnet too, so I guess that is not an issue after all.
So right now I am baffled.  If I plug the machine in the dmz directly into
the network with the 138.23.75.60 address it works fine.  Am I going mad,
or is there something that would cause this behavior?
You might be going mad (hard to tell from a couple of e-mails!), but 
there's almost certainly something causing the observed behavior.

I can't tell you exactly what given the nearly complete lack of 
diagnostic information, but I'll try to get you headed in the right 
direction.  First, let's get some details out of the way:

- It sounds like you only have an upstream (eth0) and dmz (eth1) 
interface on your Bering box...is that correct?

- You have two subnets connected to the upstream interface of your 
firewall: 138.23.75.0/24 and 138.23.76.0/24, correct?

- You want to put externally visible IP's from both subnet ranges on a 
proxy-arp DMZ connected to eth1 of your firewall, correct?

OK, assuming all of the above is accurate, you need to setup the following:
- eth0 should be configured with:
  * An IP address on both subnets
  * A local route to each subnet
  * A default route to your upstream gateway
  * Proxy-arp enabled
- eth1 should be configured with:
  * An IP address on both subnets (different IP's than used for eth0)
  * A host route for each public IP to make visible upstream
  * Proxy-arp enabled
You can verify this setup (and report diagnostics to the list) with the 
following commands:

  ip addr list
  ip route list
  for i in /proc/sys/net/ipv4/conf/*/proxy_arp ; do
echo $i: ; cat $i ; done
Once this is setup correctly, and you have no firewall rules in place 
(either totally disable firewalling, or allow any-to-any in shorewall), 
you should be able to communicate between DMZ systems and the internet 
(or the network on the upstream side of the firewall).

NOTES:
- You can setup eth0 and eth1 manually, using /etc/network/interfaces, 
or whatever suits your fancy.  It's probably easiest to test by setting 
up manually, but make sure you dump the config (using the above 
diagnostic commands) once you get everything working, so you can then 
add extentions to ifup/ifdown to match.

- DMZ systems can use either the IP of the DMZ interface of your 
firewall, or the same default gateway as the firewall itself.

--
Charles Steinkuehler
[EMAIL PROTECTED]
---
This SF.Net email sponsored by Black Hat Briefings  Training.
Attend Black Hat Briefings  Training, Las Vegas July 24-29 - 
digital self defense, top technical experts, no vendor pitches, 
unmatched networking opportunities. Visit www.blackhat.com

leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html


Re: [leaf-user] Bering 1.2 CD won't load daemontl.lrp

2004-07-12 Thread Eric Wolzak
Hello Richard 

Are you sure that dnscache is really running over daemontools.
You should set up the /service directory as stated in the cr.yp.to page.
so multilog can use the settings there. 
didn't try it myself on  bering, ( only in debian)
you should have processes with supervise .log 
and the running process.

Regards
eric Wolzak
member of the Bering Crew




 I am attempting to boot *everything* from Bering 1.2 CD, rather than
 using CD plus helper floppy. This is to teach a class in the fall using
 Bering and distribute only CDs to the students. I am including so many
 lrps -- ipsec, daemontl, etc -- that I am over the 254 char line limit
 on syslinux.cfg. So, I transition to using leaf.cfg to load the extra
 modules i.e. changed the LEAFCFG as follows in syslinux.cfg:
 
 display syslinux.dpy
 timeout 0
 default linux initrd=initrd.lrp init=/linuxrc rw root=/dev/ram0
 LEAFCFG=/dev/cdrom:iso9660 PKGPATH=/dev/fd0:msdos,/dev/cdrom:iso9660
 syst_size=12M log_size=4M
 LRP=root,etc,local,modules,iptables,pump,keyboard,shorwall,ulogd,dnscach
 e,ipsec,mawk,dhcpd
 
 I have the above syslinux.cfg and following leaf.cfg files injected into
 bootdisk.bin using winimage. I save the bootdisk.bin file with winimage,
 and burn a CD. 
 
 The CD boots fine, and all other functions from the syslinux.cfg LRP=
 load, plus weblet from leaf.cfg. But I get no daemontl to log dns.
 (/etc/dnscache/env/QUERYLOG is set to YES) The verbose flag in leaf.cfg
 seems to put no additional lines in any file in /var/log...
 
 Curiouly, (but harmlessly) no initrd in the packages menu of lrcfg,
 although I can see initrd loading when the machine boots up.
 
 What could be wrong?
 
 TIA
 Rick.
 
 # This file is parsed as a shell script
 # Kernel command line paramters are avaialble as KCMD_variable # ie:
 KCMD_LRP contains the LRP= portion of the kernel command line # NOTE:
 For kernel command line settings that do not include an equals # sign
 (ie: rw or similar), the variable is set to itself, allwoing # for easy
 testing (ie: KCMD_rw=rw).
 
 # LRP and PKGPATH variables now support whitespace (space, tab, newline)
 # as well as commas for seperators.
 
 # Uncomment for more verbose execution.
 VERBOSE=1
 
 # Other variables you might want to set in this file include:
 # LRP Packages to load
 # PKGPATH Device(s) to load packages from
 # syst_size   Size of root ramdisk
 # tmp_sizeSize of /tmp ramdisk
 # log_sizeSize of /var/log ramdisk
 
 # Example:
 LRP=$KCMD_LRP rsync
 LRP=$KCMD_LRP daemontl
 LRP=$KCMD_LRP weblet
 
 
 ---
 This SF.Net email sponsored by Black Hat Briefings  Training.
 Attend Black Hat Briefings  Training, Las Vegas July 24-29 - 
 digital self defense, top technical experts, no vendor pitches, 
 unmatched networking opportunities. Visit www.blackhat.com
 
 leaf-user mailing list: [EMAIL PROTECTED]
 https://lists.sourceforge.net/lists/listinfo/leaf-user
 SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html




---
This SF.Net email sponsored by Black Hat Briefings  Training.
Attend Black Hat Briefings  Training, Las Vegas July 24-29 - 
digital self defense, top technical experts, no vendor pitches, 
unmatched networking opportunities. Visit www.blackhat.com

leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html


[leaf-user] Upgrading uClibC 2.1.0 to 2.2.0b4 with HDD boot.

2004-07-12 Thread Geoff Nordli
Hi Everyone.

I have an existing 2.1.0 system in place that boots from an HDD.  I am
trying to upgrade to 2.2.0b4. I created a new initrd.lrp package with the
modules for 2.4.26 kernel and copied it to the HDD.  I copied the linux
kernel from the 2.2.0b4 floppy to the HDD.

I get this error:  VFS:  Can't find a Minix, or Minix V2 filesystem on
device 03:01

It does find the HDD during the boot sequence.

What does work?

I can boot the initrd.lrp plus linux kernel off floppy and manually mount
the HDD.

Other things I have tried:

I tried to use the floppy and change the syslinux.cfg to PKGPATH=/dev/hda1
to load the packages, but that doesn't work.

Any ideas on how to solve this?

Thanks,

Geoff



---
This SF.Net email sponsored by Black Hat Briefings  Training.
Attend Black Hat Briefings  Training, Las Vegas July 24-29 - 
digital self defense, top technical experts, no vendor pitches, 
unmatched networking opportunities. Visit www.blackhat.com

leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html


Re: [leaf-user] Weird Proxy Arp Setup

2004-07-12 Thread Tom Eastep
Ryan Rich wrote:
So right now I am baffled.  If I plug the machine in the dmz directly into
the network with the 138.23.75.60 address it works fine.  Am I going mad,
or is there something that would cause this behavior?
Look at the routing table in the system that you are pinging from and 
the IP configuration. I'm betting that it has an address in 138.23.76.0/24.

And if the system you are pinging from doesn't have an address in that 
network then I'm betting that the last hop router before the LEAF box 
has an address in that network.

-Tom
--
Tom Eastep\ Nothing is foolproof to a sufficiently talented fool
Shoreline, \ http://shorewall.net
Washington USA  \ [EMAIL PROTECTED]
---
This SF.Net email sponsored by Black Hat Briefings  Training.
Attend Black Hat Briefings  Training, Las Vegas July 24-29 - 
digital self defense, top technical experts, no vendor pitches, 
unmatched networking opportunities. Visit www.blackhat.com

leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html


Re: [leaf-user] Weird Proxy Arp Setup

2004-07-12 Thread Ray Olszewski
If you haven't read Charles' reply, please read it first. He covers the 
basics of what you should be looking at on the LEAF router (and reporting 
to us). I try to go beyond that, without duplicating his effort, in my 
comemnts interspersed below.

At 11:52 AM 7/12/2004 -0700, Ryan Rich wrote:
Ok,
First I want to thanks everyone for their responses so far!  I will stop
being ambigious, since it seems to make things more complicated and I
think where i work probably has the whole 138.23.0.0/16 block anyways so
that secret is already out...  My address are on the 138.23.75.0 and
138.23.76.0 subnets.
You are correct in all of these guesses (According to the ARIN database). 
This suggests a different approach to solving your problem: talk to the 
sysadmin in charge of whatever system is the gateway for these two 
networks. Ask him or her to set its routing table to make (for example) 
138.23.75.254 (the external address of the LEAF router) its default route 
to 138.23.76.0/24. This might not work ... after all, someone was silly 
enough to select a set of address ranges that do not combine to a /23 ... 
but it might be a solution to your problem.


I have been trying to narrow down the problem with the machine that was
unreachable in the dmz, so I removed the multiple addresses from the eth0
interface on the leaf box and currently only have 1 machine in the dmz.
Currently for testing I am using the following setup...
LEAF eth0=138.23.75.52 mask 255.255.255.0
LEAF eth1=192.168.1.1
Machine in dmz=138.23.75.60 mask 255.255.255.0
Just to emphasize what you've done: this test setup eliminates all use of 
the 138.23.76.0/24 network. So *complicated* proxy-arp issues are now out 
the door.

The leaf box is able to ping the machine in the dmz and the machine in the
dmz can ping the leaf box.  So everything between these two machines seems
great.  Route shows up for 138.23.75.60 via eth1.
Please report this exactly, not via a paraphrase. (That is, quote the 
complete output of ip route show or netstat -nr.)

  However, when I try to
ping the machine in the dmz from another machine, there is no luck
(shorewall has been set to allow pings and there is nothing in the log).
Also the machine in the dmz can ping nothing outside of the leaf box.
Please describe the failure mode exactly, not with vague phrases like no 
luck.

I am bit confused about you use of the term DMZ here. Usually, it refers 
to a subset of hosts on a separate *physical* network, for example here on 
an eth2 interface. But you say your route to it is on eth1, which is 
usually the internal interface ... the one that handles NAT'ing of a 
private-address-range LAN and that you say is assigned 192.168.1.1, an 
address consistent with that custoary use.

So, two things come to mind.
1. Does the DMZ host (which you say is 138.23.75.60 mask 255.255.255.0) 
have a proper routing table? Specifically, does it know that its route to 
the Internet is 192.168.1.1? Since this eth1 interface does not have a 
138.23.75.0/24 address, it cannot proxy-arp the LEAF router's default 
gateway (which I assume is some 138.23.75.d address ... but maybe next time 
you better fill in this blank too).

2. Do you have proxy arp enabled properly on the LEAF router? You check 
this by checking the values of

 /proc/sys/net/ipv4/conf/eth0/proxy_arp
 /proc/sys/net/ipv4/conf/eth1/proxy_arp
 /proc/sys/net/ipv4/conf/all/proxy_arp
 /proc/sys/net/ipv4/conf/default/proxy_arp
(your system may not have the last one) to make sure suitable ones contain 
1 values. (I believe a 1 for all or default overrides a 0 for eth0 or eth1.)

Another way to test directly for whether proxy arp is working isto use a 
host on the LEAF router's external network. (If you have access to the 
gateway host, that would be a good choice.) Run these two commands:

ping 138.23.75.52
ping 138.23.75.60
No matter how the pings themselves turn out, now check the arp table on the 
host you've ping'ed from. How you do this is OS specific; in Linux. you'd 
cat /proc/net/arp. If both Ip addresses are present and show the same 
associated MAC address, then proxy arp is working as it should.

Now, if I give the same machine in the dmz the address I used for the
machine that did work before (138.23.76.112 mask 255.255.255.0) everything
works beautifully!  The 138.23.76.112 address in the dmz works if the LEAF
eth0 interface is assigned an address in the 138.23.75 or the 138.23.76
subnet too, so I guess that is not an issue after all.
Just to be clear ... do you mean that in this case, an off-LAN host can 
ping the on-LAN 138.23.76.112 host and get a response? Are you sure the 
response is coming from that host (does it come via the LEAF router's MAC 
address?)?

I also can't tell what actual tests your last sentence refers to ... surely 
you didn't try all possible combinations of addresses.

So right now I am baffled.  If I plug the machine in the dmz directly into
the network 

Re: [leaf-user] Arp replacement

2004-07-12 Thread Charles Steinkuehler
Ray Olszewski wrote:
No matter how the pings themselves turn out, now check the arp table on the 
host you've ping'ed from. How you do this is OS specific; in Linux. you'd 
cat /proc/net/arp. If both Ip addresses are present and show the same 
associated MAC address, then proxy arp is working as it should.
Or using iproute2 (I like sticking to the ip command, and to the man 
with a hammer...):

  ip neighbor show
--
Charles Steinkuehler
[EMAIL PROTECTED]
---
This SF.Net email sponsored by Black Hat Briefings  Training.
Attend Black Hat Briefings  Training, Las Vegas July 24-29 - 
digital self defense, top technical experts, no vendor pitches, 
unmatched networking opportunities. Visit www.blackhat.com

leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html


Re: [leaf-user] Arp replacement

2004-07-12 Thread Ray Olszewski
At 07:35 PM 7/12/2004 -0500, Charles Steinkuehler wrote:
Ray Olszewski wrote:
No matter how the pings themselves turn out, now check the arp table on 
the host you've ping'ed from. How you do this is OS specific; in Linux. 
you'd cat /proc/net/arp. If both Ip addresses are present and show the 
same associated MAC address, then proxy arp is working as it should.
Or using iproute2 (I like sticking to the ip command, and to the man with 
a hammer...):

  ip neighbor show
Wimp.
I once saw Linus doing a presentation about the early days of Linux. He 
said something like: Well, at that point we had a kernel, a shell, and a 
compiler working. And that's all we really needed. Someone asked, What 
about an editor? He responded, Real men use cat.

OK,  to be serious ... although iproute2 (ip) is standard on current LEAF 
systems, it isn't standard on all Linux distros. A stock Debian 
installation, for example, still doen't include it in the base config (it's 
an optional package). The only reliable procedure I know of for checking 
the arp table on *any* Linux system is to cat (or more) the relevant 
pseudofile directly.

He could also use arping, which will return the MAC address as part of the 
ping response itself.



---
This SF.Net email sponsored by Black Hat Briefings  Training.
Attend Black Hat Briefings  Training, Las Vegas July 24-29 - 
digital self defense, top technical experts, no vendor pitches, 
unmatched networking opportunities. Visit www.blackhat.com

leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html


[leaf-user] Bering-uClibc 2.1.x - OpenVPNZ

2004-07-12 Thread Chris Lee
Hi,

Can anyone kindly to send an old version of OpenVPNZ package, as the one on
the web seems broken.

Many Thanks in advance.

Regards,
Chris Lee



---
This SF.Net email sponsored by Black Hat Briefings  Training.
Attend Black Hat Briefings  Training, Las Vegas July 24-29 - 
digital self defense, top technical experts, no vendor pitches, 
unmatched networking opportunities. Visit www.blackhat.com

leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html


Re: [leaf-user] Weird Proxy Arp Setup

2004-07-12 Thread Ryan Rich
Ok, I really appreciate the help here, I've tried to modify the setup for
now by taking shorewall out of the mix by doing a shorewall stop;
shorewall clear and then have everything setup manually.  I think I have
followed your instructions correctly except for the addresses for the eth1
interface as I noted below with my responses...

 I can't tell you exactly what given the nearly complete lack of
 diagnostic information, but I'll try to get you headed in the right
 direction.  First, let's get some details out of the way:

 - It sounds like you only have an upstream (eth0) and dmz (eth1)
 interface on your Bering box...is that correct?

Correct.

 - You have two subnets connected to the upstream interface of your
 firewall: 138.23.75.0/24 and 138.23.76.0/24, correct?

Correct.

 - You want to put externally visible IP's from both subnet ranges on a
 proxy-arp DMZ connected to eth1 of your firewall, correct?

Correct.

 OK, assuming all of the above is accurate, you need to setup the
 following:

 - eth0 should be configured with:
* An IP address on both subnets
* A local route to each subnet
* A default route to your upstream gateway
* Proxy-arp enabled

 - eth1 should be configured with:
* An IP address on both subnets (different IP's than used for eth0)
* A host route for each public IP to make visible upstream
* Proxy-arp enabled

I was under the impression that the IP address(es) assigned to the
interface connected to the dmz network were irrelevant when using proxy
arp after reading the shorewall docs...  Please correct me if I am
wrong...  It will take me a little while to scrape together a couple of
extra available IPs from both nets if I really do need them...  For now I
have just assigned eth1 on the leaf box 192.168.1.1 with a mask of
255.255.255.255 and broadcast of 0.0.0.0.


 You can verify this setup (and report diagnostics to the list) with the
 following commands:

ip addr list
ip route list
for i in /proc/sys/net/ipv4/conf/*/proxy_arp ; do
  echo $i: ; cat $i ; done


(started with a shorewall stop ; shorewall clear)
begin diagnostics

firewall# ip addr list
1: lo: LOOPBACK,UP mtu 16436 qdisc noqueue
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
2: dummy0: BROADCAST,NOARP mtu 1500 qdisc noop
link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff
3: eth0: BROADCAST,MULTICAST,UP mtu 1500 qdisc pfifo_fast qlen 1000
link/ether 00:10:4b:9e:82:d6 brd ff:ff:ff:ff:ff:ff
inet 138.23.75.52/24 brd 138.23.75.255 scope global eth0
inet 138.23.76.127/24 brd 138.23.76.255 scope global eth0:0
4: eth1: BROADCAST,MULTICAST,UP mtu 1500 qdisc pfifo_fast qlen 1000
link/ether 00:10:4b:6a:83:ee brd ff:ff:ff:ff:ff:ff
inet 192.168.1.1/32 scope global eth1


firewall# ip route list
138.23.76.112 dev eth1  scope link
138.23.75.60 dev eth1  scope link
138.23.75.0/24 dev eth0  proto kernel  scope link  src 138.23.75.52
138.23.76.0/24 dev eth0  proto kernel  scope link  src 138.23.76.127
default via 138.23.75.1 dev eth0


firewall# for i in /proc/sys/net/ipv4/conf/*/proxy_arp ; do
 echo $i: ; cat $i ; done
/proc/sys/net/ipv4/conf/all/proxy_arp:
0
/proc/sys/net/ipv4/conf/default/proxy_arp:
0
/proc/sys/net/ipv4/conf/eth0/proxy_arp:
1
/proc/sys/net/ipv4/conf/eth1/proxy_arp:
1
/proc/sys/net/ipv4/conf/lo/proxy_arp:
0


end diagnostics

Everything seems to work the same as it did when I set this up through
shorewall.  All traffic to and from 138.23.76.112 works fine, but
138.23.75.60 is unaccessable except via the leaf box or the 138.23.76.112
machine in the dmz.  Also the 138.23.75.60 machine is able to ping both
external interfaces on the leaf box, but nothing beyond that.




---
This SF.Net email sponsored by Black Hat Briefings  Training.
Attend Black Hat Briefings  Training, Las Vegas July 24-29 - 
digital self defense, top technical experts, no vendor pitches, 
unmatched networking opportunities. Visit www.blackhat.com

leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html


Re: [leaf-user] Weird Proxy Arp Setup

2004-07-12 Thread Tom Eastep
Ryan Rich wrote:
Ryan Rich wrote:

So right now I am baffled.  If I plug the machine in the dmz directly
into
the network with the 138.23.75.60 address it works fine.  Am I going
mad,
or is there something that would cause this behavior?
Look at the routing table in the system that you are pinging from and
the IP configuration. I'm betting that it has an address in
138.23.76.0/24.
And if the system you are pinging from doesn't have an address in that
network then I'm betting that the last hop router before the LEAF box
has an address in that network.

This is true as to how I tested today, but this machine has been plugged
into this same network with that address prior to my leaf experiments and
I have been able to access it from my home network without any problem as
well.

I don't understand your network topology well enough to comment. But I
have a very firm grasp of how ARP works. The whole purpose of Proxy ARP
is so that a router will respond to ARP who-has requests for IP
addresses owned by hosts on the opposite side of the router -- as far as
I can tell, you are beating your head against the wall trying to get
your router to respond to ARP requests that aren't being sent. If you
don't believe me, install tcpdump on the LEAF box and watch the ARP traffic:
tcpdump -ni eth0 arp
-Tom
--
Tom Eastep\ Nothing is foolproof to a sufficiently talented fool
Shoreline, \ http://shorewall.net
Washington USA  \ [EMAIL PROTECTED]

---
This SF.Net email sponsored by Black Hat Briefings  Training.
Attend Black Hat Briefings  Training, Las Vegas July 24-29 - 
digital self defense, top technical experts, no vendor pitches, 
unmatched networking opportunities. Visit www.blackhat.com

leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html