Age | Commit message (Collapse) | Author |
|
|
|
that the ncpaddr code doesn't create default routes with non-zero
masks, everything works as it should.
|
|
up in the same way that we expect them to be when we read them.
This is a no-op on i386 and probably on alphas, as we currently
only support AF_INET and AF_INET6.
|
|
of 0.0.0.0.
The OpenBSD PF_ROUTE/NET_RT_DUMP sysctl is sending back routes with
RTAX_NETMASK set, but the corresponding sockaddr being 4 zero bytes
(with an address family of zero). ppp was getting confused by this
and ending up interpreting it as a 0.0.0.0/32 routing table
destination and subsequently failing to do anything with the route.
Specifically, after this fix, ppp under OpenBSD can successfully
change and delete the default route again !
|
|
|
|
ncprange structure.
Don't write() the netmask for IPv6 sockaddrs to the routing socket if
the prefixlen is 128.
It seems that messages written to the routing socket with the scopeid
set for link local addresses are not understood. Instead, we have to
put the scopeid in the 5th and 6th bytes of the address (see
adjust_linklocal() in ncpaddr.c). I think this may be a bug in the
KAME implementation - it should really understand both forms.
|
|
Add the UPTIME variable
CCP protocol ``0xffffffff'' -> ``none''
Don't leak memory when expanding command arguments and not exec()ing
Make some functions static
Add the ``log'' command for manual logging
Fix some log text bogons
|
|
too big).
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
POSIX counterparts.
|
|
|
|
Mostly submitted by: kamath@cesa.opbu.xerox.com
|
|
dictionaries are out of sync.
This avoids the complications that happen when our original reset
request gets lost in transit (quite likely in hind sight, given a
lossy link) when we end up ignoring the peer for the next (up to)
256 packets.
|
|
Don't bring the interface up immediately
Don't complain about unrecognised interface flags in ``show iface''.
|
|
|
|
matches any existing destination addresses on the interface. This
unbreaks ``enable iface-alias''.
|
|
|
|
|
|
|
|
o) we don't like .Nd without argument, except next line starts with a new
tag;
millert@ ok
|
|
the gateway and mask to the routing socket, otherwise the update fails.
The code here was broken for FreeBSD when IPv6 support was added, but
worked for OpenBSD. OpenBSD expects the gateway and mask to be
supplied and fails the update otherwise.
|
|
IPV6CP support is crude for now, and hasn't been tested against
any other implementations. RADIUS and IPv6 are independent of
eachother for now. ppp.linkup/ppp.linkdown aren't currently used
by IPV6CP
Understand all protocols(5) in filter rules rather than only a select
few.
Allow a mask specification for the ``delete'' command. It's now
possible to specifically delete one of two conflicting routes.
When creating and deleting proxy arp entries, do it for all IPv4
interface addresses rather than doing it just for the ``current''
peer address.
When iface-alias isn't in effect, don't blow away manually (via ``iface
add'') added interface addresses.
When listening on a tcp server (diagnostic) socket, bind so that a
tcp46 socket is created -- allowing both IPv4 and IPv6 connections.
When displaying ICMP traffic, don't display the icmp type twice.
When display traffic, display at least some information about unrecognised
traffic.
Bump version
|
|
|
|
|
|
|
|
|
|
o) "start sentence on new line" issues;
o) minimal -mdoc improvements;
millert@ ok
|
|
to the routing socket.
Submitted by: Russell T Hunt <alaric@MIT.EDU>
|
|
Ok'd by: Gabor Kincses <gabor@acm.org>
|
|
|
|
from todd@
|
|
|
|
|
|
|
|
|
|
When encryption (MPPE) is enabled, WindowsME and Windows98 both
fail because of the extra byte, suggesting that they autheticated
successfully in their log and then dropping the connection, telling
the user that the peer doesn't support compatible encryption
options.
|
|
static proxy arp entry is deleted.
Rename a function (for consistency) and remove some whitespace
(for readability).
|
|
byte of the packet to contain '\0'.
Windows 98 gets this wrong, dropping garbage into the last byte and
failing authentication.
Now, we notice this and whinge to our log file that we're compensating
for the corrupt data.
|
|
doing PPPoE and the default MRU is therefore too big.
|
|
once. If they repeat the request (again without the IPADDR option)
ACK it.
|
|
|