Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 19 Dec 2017 20:33:13 +0700
From:      Eugene Grosbein <eugen@grosbein.net>
To:        wishmaster <artemrts@ukr.net>, freebsd-net@freebsd.org
Subject:   Re: ng_patch and swap_pager_getswapspace error
Message-ID:  <5A391519.8040707@grosbein.net>
In-Reply-To: <1513663683.700534911.voagagit@frv52.fwdcdn.com>
References:  <1513663683.700534911.voagagit@frv52.fwdcdn.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On 19.12.2017 13:15, wishmaster wrote:
> Hi,
> 
> after I have applied ng_patch for setting TTL for outgoing packets with below rules
> 
> kldload ng_ipfw 2>/dev/null
> kldload ng_patch 2>/dev/null
> 
> /usr/sbin/ngctl -f- <<-SEQ
>                  mkpeer ipfw: patch 100 in
>                  name ipfw:100 ttl_set
>                  msg ttl_set: setconfig { count=1 csum_flags=1 ops=[     \
>                          { mode=1 value=128 length=1 offset=8 } ] }
> SEQ
> 
> /sbin/ipfw add 15002 netgraph 100 ip from me to not me recv "*"

Why do you have incoming ip packets sourced from your IP?
This generally means source was spoofed and such incoming packets
should be silently dropped.

> What is this?

"After" does not mean "because of". Your processes ate all memory and swap
and ng_patch cannot be responsible for that.





Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?5A391519.8040707>