Date: Tue, 19 Dec 2017 20:33:13 +0700 From: Eugene Grosbein <eugen@grosbein.net> To: wishmaster <artemrts@ukr.net>, freebsd-net@freebsd.org Subject: Re: ng_patch and swap_pager_getswapspace error Message-ID: <5A391519.8040707@grosbein.net> In-Reply-To: <1513663683.700534911.voagagit@frv52.fwdcdn.com>
index | next in thread | previous in thread | raw e-mail
On 19.12.2017 13:15, wishmaster wrote:
> Hi,
>
> after I have applied ng_patch for setting TTL for outgoing packets with below rules
>
> kldload ng_ipfw 2>/dev/null
> kldload ng_patch 2>/dev/null
>
> /usr/sbin/ngctl -f- <<-SEQ
> mkpeer ipfw: patch 100 in
> name ipfw:100 ttl_set
> msg ttl_set: setconfig { count=1 csum_flags=1 ops=[ \
> { mode=1 value=128 length=1 offset=8 } ] }
> SEQ
>
> /sbin/ipfw add 15002 netgraph 100 ip from me to not me recv "*"
Why do you have incoming ip packets sourced from your IP?
This generally means source was spoofed and such incoming packets
should be silently dropped.
> What is this?
"After" does not mean "because of". Your processes ate all memory and swap
and ng_patch cannot be responsible for that.
home |
help
Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?5A391519.8040707>
