Hello tech,
I noticed the event(3) manual pages don't mention the
bufferevent_setwatermark(3) function and glosses over the details of
watermarks, even though there's a few programs in userland that set both
read and write watermarks. Looks like there was an effort in 2017
to add some documentatio
Claudio Jeker(cje...@diehard.n-r-g.com) on 2018.09.21 22:30:17 +0200:
> > In my setup I get these numbers:
> > 5895 invalid prefixes
> > 67478 valid prefixes
> > 638299 unknown prefixes
> > This is from a single IPv4 only full feed.
> >
> > Disclaimer: works for me but I did not test i
On Fri, Sep 21, 2018 at 05:29:24PM +0200, Claudio Jeker wrote:
> This diff adds the rest needed to do ROA validation.
>
> It does:
> - add the filter logic for roa validation check
>deny from any roa-set RPKI invalid
>match from any roa-set RPKI valid set community local-as:42
> - makes th
This diff adds the rest needed to do ROA validation.
It does:
- add the filter logic for roa validation check
deny from any roa-set RPKI invalid
match from any roa-set RPKI valid set community local-as:42
- makes the RDE do the roa validation check whenever a prefix is added to
the RIB (bo
On Fri, Sep 21, 2018 at 10:07:54PM +0800, Nan Xiao wrote:
> Hi Jason,
>
> Thanks very much for your response!
>
> I check the ping & traceroute code, For ping:
>
> if (options & F_TTL) {
> if (IN_MULTICAST(ntohl(dst4.sin_addr.s_addr)))
> moptions |= MULTICAST_TTL;
> else
>
This is a requirement to get the bridge input/output path out of the
KERNEL_LOCK().
The diff is simple, use the non-locked version of SRP lists, as it is
already done in other paths in carp(4).
Ok?
Index: netinet/ip_carp.c
===
RCS f
ping tech@,
Very sorry for interrupting again! Anyone can give comment on this
issue? Thanks!
On 9/18/2018 6:37 PM, Nan Xiao wrote:
> Hi tech@,
>
> Assume I use netcat with UNIX-domain socket, and there is no
> temp_socket. Launch the server:
>
> # ./nc -U -l temp_socket
>
> It works normally.
Hi Jason,
Thanks very much for your response!
I check the ping & traceroute code, For ping:
if (options & F_TTL) {
if (IN_MULTICAST(ntohl(dst4.sin_addr.s_addr)))
moptions |= MULTICAST_TTL;
else
options |= F_HDRINCL;
}
For traceroute:
void
check_tos(struct ip *ip, int *la
On Wed, Sep 19 2018, Solene Rapenne wrote:
> Solene Rapenne wrote:
>> This diff explains a little more about the send commands.
>> send pauses the VM and send its memory + the start parameters.
>>
>
> new diff with some changes, also thx bentley@ for telling me sentences should
> start on a newl
That syntax makes sense to be and I didn't notice any problems in
the diff. OK millert@
- todd
There is currently no way to force TLS on a relay rule in general, and
force certificate checking. Typical use case: a secondary MX needing
to relay safely to lower preference MXs.
This diff below allows the "tls" option to be used alone, including on
non-smarthost relay rules, to specify that th
On Fri, Sep 21, 2018 at 08:47:31AM +0200, Denis Fondras wrote:
> On Fri, Sep 21, 2018 at 07:20:24AM +0200, Claudio Jeker wrote:
> > Similar to AS_TRANS (23456) AS 0 should not be allowed.
> > This adds this restriction for asnumbers which are used on AS, remote-as
> > and local-as tokens in the con
On Thu, Sep 20, 2018 at 09:44:09PM +0200, Frederic Cambus wrote:
> Hi tech@,
>
> Here is a diff to add "Spleen 5x8" to wsfont, a font targetted at small
> OLED displays to be used with devices handled by ssdfb(4). It contains
> all printable ASCII characters (96 glyphes).
>
> The font is 2-Clause
13 matches
Mail list logo