search for: src_ip

Displaying 20 results from an estimated 43 matches for "src_ip".

Did you mean: src_id
2015 Sep 04
2
[syslinux:master] tftp: Report server IP address on debug message
...y came from the server and > is long enough for a TFTP opcode */ > - dprintf("tftp_open: got packet buflen=%d\n", buf_len); > + dprintf("tftp_open: got packet buflen=%d from server %u.%u.%u.%u(%u.%u.%u.%u)\n", > + buf_len, > + ((uint8_t *)&src_ip)[0], > + ((uint8_t *)&src_ip)[1], > + ((uint8_t *)&src_ip)[2], > + ((uint8_t *)&src_ip)[3], Most likely the TFTP server > + ((uint8_t *)&url->ip)[0], > + ((uint8_t *)&url->ip)[1], > + ((uint8_t *)&url->ip)[2], > + ((uint8_t *)&a...
2015 Sep 05
1
[syslinux:master] tftp: Report server IP address on debug message
...;> - dprintf("tftp_open: got packet buflen=%d\n", buf_len); > >> + dprintf("tftp_open: got packet buflen=%d from server > %u.%u.%u.%u(%u.%u.%u.%u)\n", > >> + buf_len, > >> + ((uint8_t *)&src_ip)[0], > >> + ((uint8_t *)&src_ip)[1], > >> + ((uint8_t *)&src_ip)[2], > >> + ((uint8_t *)&src_ip)[3], > > > > Most likely the TFTP server > > The source IP in the packet. > > &g...
2015 Sep 05
0
[syslinux:master] tftp: Report server IP address on debug message
...a TFTP opcode */ >> - dprintf("tftp_open: got packet buflen=%d\n", buf_len); >> + dprintf("tftp_open: got packet buflen=%d from server %u.%u.%u.%u(%u.%u.%u.%u)\n", >> + buf_len, >> + ((uint8_t *)&src_ip)[0], >> + ((uint8_t *)&src_ip)[1], >> + ((uint8_t *)&src_ip)[2], >> + ((uint8_t *)&src_ip)[3], > > Most likely the TFTP server The source IP in the packet. >> + ((uint8_t *)&a...
2016 Feb 28
2
[PATCH 0/1] UEFI UDP/TFTP
...39;source ' > + * @param:port, the source port number, host-byte order White space change, plus 'source ' > */ > -void core_udp_connect(struct pxe_pvt_inode *socket, uint32_t ip, > - uint16_t port) > +void core_udp_connect(struct pxe_pvt_inode *socket, uint32_t src_ip, > + uint16_t src_port) Changed 'ip' and 'port' in 'src_ip' and 'src_port'. However: 'src_ip' and 'src_port' are not in } + * @param:ip, the source ip address } + * @param:port, the source port number, host-byte order <snip/>...
2016 Feb 28
0
[PATCH 0/1] UEFI UDP/TFTP
...ine UDP_TIME_TX_TIMEOUT 1 * TICKS_PER_SECOND + 500 * TICKS_PER_MS +#define UDP_TIME_RX_TIMEOUT 1 * TICKS_PER_SECOND + 500 * TICKS_PER_MS + + +/// +/// Type defined as RX. +/// This data structure wraps receive udp parameters. +/// +typedef struct { + void* buf; + uint16_t* buf_len; + uint32_t* src_ip; + uint16_t* src_port; +}RX; + +/// +/// Type defined as UDP_IO. +/// This data structure wraps the UDP instance and configuration. +/// +typedef struct { + uint16_t known_TID; + struct efi_binding* b; + EFI_UDP4* Protocol_Udp4; + EFI_UDP4_CONFIG_DATA Config_Udp4; + EFI_UDP4_COMPLET...
2004 Sep 22
3
Strange DNAT problems with shorewall 1.4.8
...ll page. Masq and such works, but I''m having a problem with my port forwarding. It works for port 22, but it doesn''t seem to work for any other port. I''ve turned on :info, and here are the relevant tests: kernel: Shorewall:net_dnat:DNAT:IN=eth1 OUT= MAC=MAC_ADDRESS SRC=SRC_IP DST=PUBLIC_IP LEN=60 TOS=0x00 PREC=0x20 TTL=40 ID=55181 DF PROTO=TCP SPT=62684 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0 kernel: Shorewall:net_dnat:DNAT:IN=eth1 OUT= MAC=MAC_ADDRESS SRC=SRC_IP DST=PUBLIC_IP LEN=60 TOS=0x10 PREC=0x20 TTL=40 ID=21056 DF PROTO=TCP SPT=62694 DPT=22 WINDOW=5840 RES=0x00 SY...
1997 Nov 14
0
Linux IP fragment overlap bug (fwd)
...maybe 5 or 10 sometimes... Experiment. */ void usage(u_char *); u_long name_resolve(u_char *); u_short in_cksum(u_short *, int); void send_frags(int, u_long, u_long, u_short, u_short); int main(int argc, char **argv) { int one = 1, count = 0, i, rip_sock; u_long src_ip = 0, dst_ip = 0; u_short src_prt = 0, dst_prt = 0; struct in_addr addr; fprintf(stderr, "teardrop route|daemon9\n\n"); if((rip_sock = socket(AF_INET, SOCK_RAW, IPPROTO_RAW)) < 0) { perror("raw socket"); exit(1); } if (setsockopt...
2016 Feb 24
6
[PATCH 2/5] ntfs: remove unused variable and have ntfssect use char API calls
The variable 'ok' is never used and generates a warning. Remove it. Also ntfssect.c is designed to be compiled in non Unicode mode when using MSVC compilers, so remove all ambiguity about it (LPCTSTR -> LPCSTR, use of 'A' API calls) so that it doesn't break when compiled in Unicode mode, which is what Rufus uses with MSVC. -------------- next part --------------
2017 May 31
6
[PATCH 1/4] efi/udp: core_udp_connect should use SubnetMask not StationAddress for netmask
Signed-off-by: Julien Viard de Galbert <jviarddegalbert at online.net> --- efi/udp.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/efi/udp.c b/efi/udp.c index 1088f47..b0f13ad 100644 --- a/efi/udp.c +++ b/efi/udp.c @@ -163,7 +163,7 @@ void core_udp_connect(struct pxe_pvt_inode *socket, uint32_t ip, } else { udata.UseDefaultAddress = FALSE;
2006 Jan 02
1
routing- multiple net provider, tcp logging
Hi all, Is any way to logs tcp connection (not packets)? something like this: src_IP dst_Ip, srcPort, dst_port bytes_send bytes_received? Any netfilter extension? 2 issue: eth0------- connection 1 NET ---------gw (linux) eth1--------connection 2 Real bandwitch on connection 1 and connection 2 is depend on diff...
2019 Jan 19
3
[Bug 1317] New: ulogd missed flow.start.sec and flow.start.usec fields
...quot; : "192.168.1.108", "reply.ip.protocol" : 17, "reply.ip.saddr.str" : "192.168.2.100", "reply.l4.dport" : 25845, "reply.l4.sport" : 39105, "reply.raw.pktcount" : 0, "reply.raw.pktlen" : 0, "src_ip" : "192.168.1.108", "timestamp" : "2019-01-19T15:44:26" } log without those fileds: { "ct.event" : 4, "ct.id" : 1530067856, "ct.mark" : 2147483767, "dest_ip" : "192.168.2.100", "dvc" :...
2005 May 09
1
Asterisk + SER and NAT
...------------------------------------------------------------------------------------------------ # if the request is for other domain use UsrLoc # (in case, it does not work, use the following command # with proper names and addresses in it) if(uri == myself || src_ip == 192.168.0.146) { if(method == "REGISTER") { # Make sure they are a valid user on our proxy if(!www_authorize("domain", "sipfriends")) {...
2006 Jul 26
15
Rails without a primary key
I''ve been trying to use Rails on a database where the biggest datawarehouse-style table doesn''t have a primary key. It really doesn''t make sense and just adds extra unnecessary space. I do have, however, a column that I normally use to search on (IP) that returns many rows. The table also references several other tables through rails-friendly foreign keys. Simple AR
2015 Jul 09
2
[PATCH] Updated udp.c to use real client ip and subnetmask values if on local subnet
...ore_udp_sendto(socket, rrq_packet_buf, rrq_len, url->ip, url->port); /* If the WRITE call fails, we let the timeout take care of it... */ wait_pkt: for (;;) { buf_len = sizeof(reply_packet_buf); err = core_udp_recv(socket, reply_packet_buf, &buf_len, &src_ip, &src_port); if (err) { jiffies_t now = jiffies(); if (now - oldtime >= timeout) goto sendreq; } else { /* Make sure the packet actually came from the server and is long enough for a TFTP opcode */ dprintf("tftp_open: got packe...
2015 Jul 08
4
[PATCH] Updated udp.c to use real client ip and subnetmask values if on local subnet
from: Jeff Sloan <jeff_sloan at selinc.com> Based on commit: 9314e330 Setting UseDefaultAddress to TRUE uses invalid StationAddress and SubnetMask values. This is in a network with a local TFTP/MTFTP server. If the server is local, on the same subnet, UseDefaultAddress is set to false and the client ip and subnetmask are loaded, otherwise set UseDefaultAddress to TRUE. This is added to
2023 May 09
5
[Bridge] [RFC PATCH net-next 0/5] Add layer 2 miss indication and filtering
...r that matches on packets received from VTEP1 and marks them using a fwmark (firewall mark). The second, an egress filter configured on the LAG interface connected to the host that matches on the fwmark and drops the packets. Example: # tc filter add dev vxlan0 ingress pref 1 proto all flower enc_src_ip $VTEP1_IP action skbedit mark 101 # tc filter add dev bond0 egress pref 1 handle 101 fw action drop Motivation ========== For each ES, only one VTEP is elected by the control plane as the DF. The DF is responsible for forwarding decapsulated BUM traffic to the host over the ES. The non-DF VTEPs...
2023 May 18
5
[Bridge] [PATCH net-next 0/5] Add layer 2 miss indication and filtering
...r that matches on packets received from VTEP1 and marks them using a fwmark (firewall mark). The second, an egress filter configured on the LAG interface connected to the host that matches on the fwmark and drops the packets. Example: # tc filter add dev vxlan0 ingress pref 1 proto all flower enc_src_ip $VTEP1_IP action skbedit mark 101 # tc filter add dev bond0 egress pref 1 handle 101 fw action drop Motivation ========== For each ES, only one VTEP is elected by the control plane as the DF. The DF is responsible for forwarding decapsulated BUM traffic to the host over the ES. The non-DF VTEPs...
2023 Jun 11
0
Minimize sshd log clutter/spam from unauthenticated connections
.../sbin/fwknop2nftables $IP $PORT >> CMD_CYCLE_CLOSE NONE >> CMD_CYCLE_TIMER 30s > fwknop# diff fwknopd.conf.orig fwknopd.conf > 40a41 >> PCAP_INTF enp0s25 > fwknop# cat /usr/local/sbin/fwknop2nftables > #!/bin/sh > > # Syntax: $0 SRC_IP PORT > > NFT="/usr/sbin/nft" > SET="fwkn" > # Note that we are ignoring everything from the accepted fwknop > # requests except the src IP and tgt port to be allowed ... > > PREP=`$NFT list chain inet firewalld filter_IN_public_allow | grep -c "@${SET...
2006 Jun 28
1
password on radius authentication
Hi, It's kind of off-topic , but still within Asterisk. I developed an asterisk module that send an authentication to a radius server for call authorization and process its reply (limited to User-Name and Cisco or Quintum VSA h323 attribute). My question, is when it make sense to use or include the attribute Password/User-Password? Looking on PDF's of Quintum and Cisco none of it really
2006 Dec 18
1
Cisco 7940 - NAT Option
I am thinking of turning on the NAT option in our Cisco phones (and the corresponding sip.conf modification) to allow the phones to be taken outside the LAN. Can anyone think of any reason not to just always turn on the NAT enabled option? I can't think of a reason not to always operate these phones with this enabled, since it would likely allow them to be taken outside our LAN and used.