#
c24b749d |
| 06-Mar-2005 |
matt <matt@NetBSD.org> |
Fix typo. Opposite of >= is <, not ==.
|
#
9337b701 |
| 06-Mar-2005 |
matt <matt@NetBSD.org> |
Replace some gotos with a do while (0) and breaks. No functional change.
|
#
8e04817c |
| 06-Mar-2005 |
matt <matt@NetBSD.org> |
Add IPv4/TCP hooks for TCP Segment Offload on transmit.
|
#
c9f058f6 |
| 02-Mar-2005 |
mycroft <mycroft@NetBSD.org> |
Copyright maintenance.
|
#
4ae1f36d |
| 28-Feb-2005 |
jonathan <jonathan@NetBSD.org> |
Commit TCP SACK patches from Kentaro A. Karahone's patch at: http://www.sigusr1.org/~kurahone/tcp-sack-netbsd-02152005.diff.gz
Fixes in that patch for pre-existing TCP pcb initializations were al
Commit TCP SACK patches from Kentaro A. Karahone's patch at: http://www.sigusr1.org/~kurahone/tcp-sack-netbsd-02152005.diff.gz
Fixes in that patch for pre-existing TCP pcb initializations were already committed to NetBSD-current, so are not included in this commit.
The SACK patch has been observed to correctly negotiate and respond, to SACKs in wide-area traffic.
There are two indepenently-observed, as-yet-unresolved anomalies: First, seeing unexplained delays between in fast retransmission (potentially explainable by an 0.2sec RTT between adjacent ethernet/wifi NICs); and second, peculiar and unepxlained TCP retransmits observed over an ath0 card.
After discussion with several interested developers, I'm committing this now, as-is, for more eyes to use and look over. Current hypothesis is that the anomalies above may in fact be due to link/level (hardware, driver, HAL, firmware) abberations in the test setup, affecting both Kentaro's wired-Ethernet NIC and in my two (different) WiFi NICs.
show more ...
|
#
f07677dd |
| 26-Feb-2005 |
perry <perry@NetBSD.org> |
nuke trailing whitespace
|
#
870f2067 |
| 03-Feb-2005 |
perry <perry@NetBSD.org> |
ANSIfy function declarations
|
#
7994b6f9 |
| 15-Dec-2004 |
thorpej <thorpej@NetBSD.org> |
Don't perform checksums on loopback interfaces. They can be reenabled with the net.inet.*.do_loopback_cksum sysctl.
Approved by: groo
|
#
c8c7a6db |
| 20-May-2004 |
jonathan <jonathan@NetBSD.org> |
With FAST_IPSEC, include <netipsec/key.h>, as Itojun's recent changes now require KEY_FREESAV() to be in scope.
|
#
4ebcfcf2 |
| 18-May-2004 |
itojun <itojun@NetBSD.org> |
fix MD5 signature support to actually validate inbound signature, and drop packet if fails.
|
#
bd3ff85f |
| 08-May-2004 |
chs <chs@NetBSD.org> |
work around an LP64 problem where we report an excessively large window due to incorrect mixing of types.
|
#
e0395ac8 |
| 26-Apr-2004 |
itojun <itojun@NetBSD.org> |
make TCP MD5 signature work with KAME IPSEC (#define IPSEC).
support IPv6 if KAME IPSEC (RFC is not explicit about how we make data stream for checksum with IPv6, but i'm pretty sure using normal ps
make TCP MD5 signature work with KAME IPSEC (#define IPSEC).
support IPv6 if KAME IPSEC (RFC is not explicit about how we make data stream for checksum with IPv6, but i'm pretty sure using normal pseudo-header is the right thing).
XXX current TCP MD5 signature code has giant flaw: it does not validate signature on input (can't believe it! what is the point?)
show more ...
|
#
887b782b |
| 25-Apr-2004 |
jonathan <jonathan@NetBSD.org> |
Initial commit of a port of the FreeBSD implementation of RFC 2385 (MD5 signatures for TCP, as used with BGP). Credit for original FreeBSD code goes to Bruce M. Simpson, with FreeBSD sponsorship cre
Initial commit of a port of the FreeBSD implementation of RFC 2385 (MD5 signatures for TCP, as used with BGP). Credit for original FreeBSD code goes to Bruce M. Simpson, with FreeBSD sponsorship credited to sentex.net. Shortening of the setsockopt() name attributed to Vincent Jardin.
This commit is a minimal, working version of the FreeBSD code, as MFC'ed to FreeBSD-4. It has received minimal testing with a ttcp modified to set the TCP-MD5 option; BMS's additions to tcpdump-current (tcpdump -M) confirm that the MD5 signatures are correct. Committed as-is for further testing between a NetBSD BGP speaker (e.g., quagga) and industry-standard BGP speakers (e.g., Cisco, Juniper).
NOTE: This version has two potential flaws. First, I do see any code that verifies recieved TCP-MD5 signatures. Second, the TCP-MD5 options are internally padded and assumed to be 32-bit aligned. A more space-efficient scheme is to pack all TCP options densely (and possibly unaligned) into the TCP header ; then do one final padding to a 4-byte boundary. Pre-existing comments note that accounting for TCP-option space when we add SACK is yet to be done. For now, I'm punting on that; we can solve it properly, in a way that will handle SACK blocks, as a separate exercise.
In case a pullup to NetBSD-2 is requested, this adds sys/netipsec/xform_tcp.c ,and modifies:
sys/net/pfkeyv2.h,v 1.15 sys/netinet/files.netinet,v 1.5 sys/netinet/ip.h,v 1.25 sys/netinet/tcp.h,v 1.15 sys/netinet/tcp_input.c,v 1.200 sys/netinet/tcp_output.c,v 1.109 sys/netinet/tcp_subr.c,v 1.165 sys/netinet/tcp_usrreq.c,v 1.89 sys/netinet/tcp_var.h,v 1.109 sys/netipsec/files.netipsec,v 1.3 sys/netipsec/ipsec.c,v 1.11 sys/netipsec/ipsec.h,v 1.7 sys/netipsec/key.c,v 1.11 share/man/man4/tcp.4,v 1.16 lib/libipsec/pfkey.c,v 1.20 lib/libipsec/pfkey_dump.c,v 1.17 lib/libipsec/policy_token.l,v 1.8 sbin/setkey/parse.y,v 1.14 sbin/setkey/setkey.8,v 1.27 sbin/setkey/token.l,v 1.15
Note that the preceding two revisions to tcp.4 will be required to cleanly apply this diff.
show more ...
|
#
dc937846 |
| 30-Mar-2004 |
christos <christos@NetBSD.org> |
Make sure we disarm the persist timer before we arm the rexmit timer, otherwise there is a tiny window where both timers are active, and this is not correct according to the comments in the code. I b
Make sure we disarm the persist timer before we arm the rexmit timer, otherwise there is a tiny window where both timers are active, and this is not correct according to the comments in the code. I believe that this is the cause of the to_ticks <= 0 assertion failure in callout_schedule() that I've been getting.
show more ...
|
#
8387ab32 |
| 03-Mar-2004 |
thorpej <thorpej@NetBSD.org> |
Use IPSEC_PCB_SKIP_IPSEC() to short-circuit calls to ipsec{4,6}_hdrsiz_tcp().
|
#
d334411b |
| 04-Feb-2004 |
itojun <itojun@NetBSD.org> |
deal with IPv6 path MTU < 1280 (RFC2460 section 5 last paragraph). check if there really is room for TCP data.
|
#
4a9b211e |
| 12-Nov-2003 |
ragge <ragge@NetBSD.org> |
Remove the FAST_MBSEARCH ifdef, send packet prediction is now default.
|
#
da20a11a |
| 24-Oct-2003 |
ragge <ragge@NetBSD.org> |
Fix the bug in the tcp transmit prediction code. During testing the prediction counters show a hit-rate on about 85% for packets sent on a local LAN, and better than 99% for intercontinental high-spe
Fix the bug in the tcp transmit prediction code. During testing the prediction counters show a hit-rate on about 85% for packets sent on a local LAN, and better than 99% for intercontinental high-speed bulk traffic (!).
show more ...
|
#
935b3c7a |
| 24-Oct-2003 |
enami <enami@NetBSD.org> |
Make this file compile again when TCP_OUTPUT_COUNTERS defined.
|
#
e8a98ee6 |
| 23-Oct-2003 |
thorpej <thorpej@NetBSD.org> |
Oops, FAST_MBSEARCH counters were swapped; fix it. Pointed out by yamt@.
|
#
861856ca |
| 21-Oct-2003 |
thorpej <thorpej@NetBSD.org> |
Add event counters that measure FAST_MBSEARCH.
|
#
11ede1ed |
| 22-Aug-2003 |
itojun <itojun@NetBSD.org> |
remove ipsec_set/getsocket. now we explicitly pass socket * to ip{,6}_output.
|
#
82eb4ce9 |
| 22-Aug-2003 |
itojun <itojun@NetBSD.org> |
change the additional arg to be passed to ip{,6}_output to struct socket *.
this fixes KAME policy lookup which was broken by the previous commit.
|
#
90266995 |
| 22-Aug-2003 |
jonathan <jonathan@NetBSD.org> |
Replace the set_socket() method of passing an extra struct socket* argument to ip6_output() with a new explicit struct in6pcb* argument. (The underlying socket can be obtained via in6pcb->inp6_socket
Replace the set_socket() method of passing an extra struct socket* argument to ip6_output() with a new explicit struct in6pcb* argument. (The underlying socket can be obtained via in6pcb->inp6_socket.)
In preparation for fast-ipsec. Reviewed by itojun.
show more ...
|
#
28b5f5df |
| 15-Aug-2003 |
jonathan <jonathan@NetBSD.org> |
(fast-ipsec): Add hooks to pass IPv4 IPsec traffic into fast-ipsec, if configured with ``options FAST_IPSEC''. Kernels with KAME IPsec or with no IPsec should work as before.
All calls to ip_output
(fast-ipsec): Add hooks to pass IPv4 IPsec traffic into fast-ipsec, if configured with ``options FAST_IPSEC''. Kernels with KAME IPsec or with no IPsec should work as before.
All calls to ip_output() now always pass an additional compulsory argument: the inpcb associated with the packet being sent, or 0 if no inpcb is available.
Fast-ipsec tested with ICMP or UDP over ESP. TCP doesn't work, yet.
show more ...
|