<?xml version="1.0" encoding="utf-8" ?>

<rss version="2.0" 
   xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
   xmlns:admin="http://webns.net/mvcb/"
   xmlns:dc="http://purl.org/dc/elements/1.1/"
   xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
   xmlns:wfw="http://wellformedweb.org/CommentAPI/"
   xmlns:content="http://purl.org/rss/1.0/modules/content/"
   >
<channel>
    
    <title>blog.crox.net (Entries tagged as network)</title>
    <link>https://blog.crox.net/</link>
    <description></description>
    <dc:language>en</dc:language>
    <generator>Serendipity 2.5.0 - http://www.s9y.org/</generator>
    <pubDate>Thu, 13 Dec 2018 19:18:32 GMT</pubDate>

    <image>
    <url>https://blog.crox.net/templates/2k11/img/s9y_banner_small.png</url>
    <title>RSS: blog.crox.net - </title>
    <link>https://blog.crox.net/</link>
    <width>100</width>
    <height>21</height>
</image>

<item>
    <title>IPv6 Neighbor discovery</title>
    <link>https://blog.crox.net/archives/110-IPv6-Neighbor-discovery.html</link>
    
    <comments>https://blog.crox.net/archives/110-IPv6-Neighbor-discovery.html#comments</comments>
    <wfw:comment>https://blog.crox.net/wfwcomment.php?cid=110</wfw:comment>

    <slash:comments>0</slash:comments>
    <wfw:commentRss>https://blog.crox.net/rss.php?version=2.0&amp;type=comments&amp;cid=110</wfw:commentRss>
    

    <author>nospam@example.com (crox)</author>
    <content:encoded>
    Discover/list other hosts:&lt;pre&gt;ping6 -I eth0 ff02::1&lt;br/&gt;ip -6 neigh show&lt;/pre&gt;&lt;br /&gt;
To connect to a host using the link-local address you need to specify which interface to use (see &quot;&lt;a href=&quot;https://en.wikipedia.org/wiki/IPv6_address#Scoped_literal_IPv6_addresses&quot;&gt;zone index&lt;/a&gt;&quot;):&lt;pre&gt;ssh -6 fe80::a00:aaaa:bbbb:cccc%eth0&lt;/pre&gt; 
    </content:encoded>

    <pubDate>Wed, 11 Jul 2018 06:12:00 +0000</pubDate>
    <guid isPermaLink="false">https://blog.crox.net/archives/110-guid.html</guid>
    <category>ipv6</category>
<category>linux</category>
<category>network</category>

</item>
<item>
    <title>OSMC NFS mount</title>
    <link>https://blog.crox.net/archives/97-OSMC-NFS-mount.html</link>
    
    <comments>https://blog.crox.net/archives/97-OSMC-NFS-mount.html#comments</comments>
    <wfw:comment>https://blog.crox.net/wfwcomment.php?cid=97</wfw:comment>

    <slash:comments>0</slash:comments>
    <wfw:commentRss>https://blog.crox.net/rss.php?version=2.0&amp;type=comments&amp;cid=97</wfw:commentRss>
    

    <author>nospam@example.com (crox)</author>
    <content:encoded>
    It looks like you need some systemd &quot;magic&quot; to successfully mount an NFS share on &lt;a href=&quot;https://osmc.tv/&quot; title=&quot;OSMC&quot;&gt;OSMC&lt;/a&gt;. Adding &quot;&lt;tt&gt;x-systemd.automount,noauto&lt;/tt&gt;&quot; to the mount options in &lt;tt&gt;/etc/fstab&lt;/tt&gt; did the trick for me.&lt;br /&gt;
&lt;br /&gt;
 
    </content:encoded>

    <pubDate>Sun, 02 Aug 2015 14:19:46 +0000</pubDate>
    <guid isPermaLink="false">https://blog.crox.net/archives/97-guid.html</guid>
    <category>linux</category>
<category>network</category>
<category>nfs</category>
<category>osmc</category>
<category>raspberry pi</category>
<category>systemd</category>

</item>
<item>
    <title>Enable IPv6 on OSMC (wired and wireless)</title>
    <link>https://blog.crox.net/archives/96-Enable-IPv6-on-OSMC-wired-and-wireless.html</link>
    
    <comments>https://blog.crox.net/archives/96-Enable-IPv6-on-OSMC-wired-and-wireless.html#comments</comments>
    <wfw:comment>https://blog.crox.net/wfwcomment.php?cid=96</wfw:comment>

    <slash:comments>0</slash:comments>
    <wfw:commentRss>https://blog.crox.net/rss.php?version=2.0&amp;type=comments&amp;cid=96</wfw:commentRss>
    

    <author>nospam@example.com (crox)</author>
    <content:encoded>
    Despite having read the opposite, it looks like IPv6 is disabled by default on the latest &lt;a href=&quot;https://osmc.tv/&quot; title=&quot;OSMC&quot;&gt;OSMC&lt;/a&gt; release (2015.06-1). I&#039;ve tried adding a sysctl.d file to set /proc/sys/net/ipv6/conf/eth0/disable_ipv6 to 0, but this did not help. It worked only when I ran the command manually. By going through numerous forum posts I eventually found out that you need to use the &lt;tt&gt;connmanctl&lt;/tt&gt; CLI tool:&lt;pre&gt;root@osmc:~# connmanctl&lt;br /&gt;connmanctl&gt; services&lt;br /&gt;*AO Wired                ethernet_b827ebaabbcc_cable&lt;br /&gt;connmanctl&gt; config ethernet_b827ebaabbcc_cable --ipv6 auto preferred&lt;br /&gt;connmanctl&gt; quit&lt;br /&gt;root@osmc:~# &lt;/pre&gt;This enables IPv6 with &lt;a href=&quot;https://en.wikipedia.org/wiki/IPv6#Stateless_address_autoconfiguration_.28SLAAC.29&quot; title=&quot;SLAAC&quot;&gt;autoconfiguration&lt;/a&gt;, turns on &lt;a href=&quot;https://en.wikipedia.org/wiki/IPv6#Privacy&quot; title=&quot;IPv6 Privacy Extensions&quot;&gt;Privacy Extensions&lt;/a&gt; and prefers these ephemeral addresses over the autoconfigured ones.&lt;br /&gt;
&lt;br /&gt;
The same command works for wireless as well, you just need to select the appropriate interface (the service name will start with &lt;tt&gt;wifi_&lt;/tt&gt;).&lt;br /&gt;
&lt;br /&gt;
&quot;&lt;tt&gt;help&lt;/tt&gt;&quot; will display basic usage info.&lt;br /&gt;
&lt;br /&gt;
If for some reason you would like to disable IPv6, the command would be &quot;&lt;tt&gt;config ... --ipv6 off&lt;/tt&gt;&quot;.&lt;br /&gt;
&lt;br /&gt;
 
    </content:encoded>

    <pubDate>Sat, 01 Aug 2015 22:14:00 +0000</pubDate>
    <guid isPermaLink="false">https://blog.crox.net/archives/96-guid.html</guid>
    <category>ipv6</category>
<category>linux</category>
<category>network</category>
<category>osmc</category>
<category>raspberry pi</category>

</item>
<item>
    <title>Random MAC address generator for Arduino Ethernet Shield (static MAC generator)</title>
    <link>https://blog.crox.net/archives/91-Random-MAC-address-generator-for-Arduino-Ethernet-Shield-static-MAC-generator.html</link>
    
    <comments>https://blog.crox.net/archives/91-Random-MAC-address-generator-for-Arduino-Ethernet-Shield-static-MAC-generator.html#comments</comments>
    <wfw:comment>https://blog.crox.net/wfwcomment.php?cid=91</wfw:comment>

    <slash:comments>1</slash:comments>
    <wfw:commentRss>https://blog.crox.net/rss.php?version=2.0&amp;type=comments&amp;cid=91</wfw:commentRss>
    

    <author>nospam@example.com (crox)</author>
    <content:encoded>
    I wanted a simple random &lt;a href=&quot;https://en.wikipedia.org/wiki/MAC_address&quot; title=&quot;MAC address&quot;&gt;MAC address&lt;/a&gt; generator for &lt;a href=&quot;http://arduino.cc/en/Main/ArduinoEthernetShield&quot; title=&quot;Arduino Ethernet Shield&quot;&gt;Arduino Ethernet Shields&lt;/a&gt; that lack one. I couldn&#039;t find one, so I wrote my own, which you can find here: &lt;a href=&quot;https://ssl.crox.net/arduinomac/&quot;&gt;https://ssl.crox.net/arduinomac/&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
Inspired by &lt;a href=&quot;http://nicegear.co.nz/blog/autogenerated-random-persistent-mac-address-for-arduino-ethernet/&quot;&gt;http://nicegear.co.nz/blog/autogenerated-random-persistent-mac-address-for-arduino-ethernet/&lt;/a&gt;. The reason I&#039;m not using this approach is that in most cases I want the MAC address to be static.&lt;br /&gt;
 
    </content:encoded>

    <pubDate>Sun, 25 Jan 2015 22:42:01 +0000</pubDate>
    <guid isPermaLink="false">https://blog.crox.net/archives/91-guid.html</guid>
    <category>arduino</category>
<category>network</category>

</item>
<item>
    <title>Huawei E3276s-150 (Swisscom branded - 12d1:1597) LTE stick with Linux</title>
    <link>https://blog.crox.net/archives/90-Huawei-E3276s-150-Swisscom-branded-12d11597-LTE-stick-with-Linux.html</link>
    
    <comments>https://blog.crox.net/archives/90-Huawei-E3276s-150-Swisscom-branded-12d11597-LTE-stick-with-Linux.html#comments</comments>
    <wfw:comment>https://blog.crox.net/wfwcomment.php?cid=90</wfw:comment>

    <slash:comments>0</slash:comments>
    <wfw:commentRss>https://blog.crox.net/rss.php?version=2.0&amp;type=comments&amp;cid=90</wfw:commentRss>
    

    <author>nospam@example.com (crox)</author>
    <content:encoded>
    &lt;br /&gt;
This works for me:&lt;pre&gt;usb_modeswitch -W -c 12d1:156a -v 12d1 -p 1597&lt;/pre&gt;(after having unpacked /usr/share/usb_modeswitch/configPack.tar.gz to a temporary directory)&lt;br /&gt;
&lt;br /&gt;
Update 2016-01-19: back in 2014 I reported this to the maintainers of various &quot;modeswitch databases&quot;, and it seems it&#039;s made it&#039;s way into the Debian/Ubuntu version at least, according to the &lt;a href=&quot;https://launchpad.net/ubuntu/+source/usb-modeswitch-data/+changelog&quot;&gt;changelog&lt;/a&gt; (version 20151101-1). 
    </content:encoded>

    <pubDate>Mon, 27 Oct 2014 19:44:06 +0000</pubDate>
    <guid isPermaLink="false">https://blog.crox.net/archives/90-guid.html</guid>
    <category>huawei</category>
<category>linux</category>
<category>lte</category>
<category>network</category>

</item>
<item>
    <title>&quot;Convert&quot; NTP to DCF77 - generate a DCF77 signal on an Arduino using an NTP time source</title>
    <link>https://blog.crox.net/archives/89-Convert-NTP-to-DCF77-generate-a-DCF77-signal-on-an-Arduino-using-an-NTP-time-source.html</link>
    
    <comments>https://blog.crox.net/archives/89-Convert-NTP-to-DCF77-generate-a-DCF77-signal-on-an-Arduino-using-an-NTP-time-source.html#comments</comments>
    <wfw:comment>https://blog.crox.net/wfwcomment.php?cid=89</wfw:comment>

    <slash:comments>7</slash:comments>
    <wfw:commentRss>https://blog.crox.net/rss.php?version=2.0&amp;type=comments&amp;cid=89</wfw:commentRss>
    

    <author>nospam@example.com (crox)</author>
    <content:encoded>
    I hate having to set clocks. Most of our clocks at home get the time from Internet or from the &lt;a href=&quot;https://en.wikipedia.org/wiki/DCF77&quot;&gt;DCF77 time signal&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
The problem with the DCF77 time signal is that it is quite sensitive to environmental noise from lamps or other appliances, and the reception inside buildings can be problematic in some places.&lt;br /&gt;
&lt;br /&gt;
I recently installed a clock in such a location. Using &lt;a href=&quot;http://blog.blinkenlight.net/experiments/dcf77/dcf77-scope/&quot;&gt;Udo Klein&#039;s DCF77 analysis tool&lt;/a&gt; it was clear that it would be nearly impossible to get the clock to work properly as initially planned, so I started looking for solutions:&lt;br /&gt;
&lt;br /&gt;
- bigger antenna (eg &lt;a href=&quot;http://www.arduino-projects4u.com/dcf77/&quot;&gt;this one&lt;/a&gt;)&lt;br /&gt;
- external antenna&lt;br /&gt;
- external receiver&lt;br /&gt;
- different time source&lt;br /&gt;
&lt;br /&gt;
For different reasons, the only viable option seemed to be a different time source. But I did not want to change the clock design. While researching a solution, I came across the &lt;a href=&quot;http://unusualelectronics.co.uk/products/chronvertor/&quot;&gt;Chronvertor&lt;/a&gt;. Although this would allow to run the clock without DCF77 signal, the clock would still have to be set from time to time (due to lack of precision of the RTC, but at least twice per year for DST adjustments), so I quickly dismissed that option. However it provided inspiration for what I eventually ended up building: a NTP to DCF77 &quot;adapter&quot;.&lt;br /&gt;
&lt;br /&gt;
I had experimented previously with the TimeNTP example from the Arduino Time library, and there was plenty of information available online about the DCF77 signal, so this quickly appeared to be a viable option. This is the result: &lt;a href=&quot;https://blog.crox.net/uploads/ntp2dcf.ino&quot; title=&quot;ntp2dcf.ino&quot; target=&quot;_blank&quot;&gt;ntp2dcf.ino&lt;/a&gt;.&lt;br /&gt;
 
    </content:encoded>

    <pubDate>Sun, 31 Aug 2014 20:00:00 +0000</pubDate>
    <guid isPermaLink="false">https://blog.crox.net/archives/89-guid.html</guid>
    <category>arduino</category>
<category>clock</category>
<category>code</category>
<category>dcf77</category>
<category>network</category>
<category>ntp</category>

</item>
<item>
    <title>now with IPv6</title>
    <link>https://blog.crox.net/archives/77-now-with-IPv6.html</link>
    
    <comments>https://blog.crox.net/archives/77-now-with-IPv6.html#comments</comments>
    <wfw:comment>https://blog.crox.net/wfwcomment.php?cid=77</wfw:comment>

    <slash:comments>0</slash:comments>
    <wfw:commentRss>https://blog.crox.net/rss.php?version=2.0&amp;type=comments&amp;cid=77</wfw:commentRss>
    

    <author>nospam@example.com (crox)</author>
    <content:encoded>
    In anticipation of &lt;a href=&quot;http://www.worldipv6day.org/&quot; title=&quot;World IPv6 Launch Day&quot;&gt;World IPv6 Launch Day&lt;/a&gt; (6 June 2012), this website is now fully reachable over IPv6. 
    </content:encoded>

    <pubDate>Mon, 30 Jan 2012 19:23:26 +0000</pubDate>
    <guid isPermaLink="false">https://blog.crox.net/archives/77-guid.html</guid>
    <category>ipv6</category>
<category>network</category>

</item>
<item>
    <title>IPv6 test websites</title>
    <link>https://blog.crox.net/archives/76-IPv6-test-websites.html</link>
    
    <comments>https://blog.crox.net/archives/76-IPv6-test-websites.html#comments</comments>
    <wfw:comment>https://blog.crox.net/wfwcomment.php?cid=76</wfw:comment>

    <slash:comments>0</slash:comments>
    <wfw:commentRss>https://blog.crox.net/rss.php?version=2.0&amp;type=comments&amp;cid=76</wfw:commentRss>
    

    <author>nospam@example.com (crox)</author>
    <content:encoded>
    &lt;ul&gt;&lt;br /&gt;
&lt;li&gt;&lt;a href=&quot;http://ipv6-test.com/&quot;&gt;http://ipv6-test.com/&lt;/a&gt; (also has a speed test, &lt;a href=&quot;http://blog.crox.net/archives/75-Enabling-IPv6-Privacy-Extensions-on-all-interfaces-Ubuntu-Linux,-may-work-for-other-distros-too.html&quot;&gt;shows your MAC address when available&lt;/a&gt;)&lt;/li&gt;&lt;br /&gt;
&lt;li&gt;&lt;a href=&quot;http://test-ipv6.com/&quot;&gt;http://test-ipv6.com/&lt;/a&gt; (provides detailed technical info and &quot;readiness score&quot;)&lt;/li&gt;&lt;br /&gt;
&lt;li&gt;&lt;a href=&quot;http://whatismyv6.com/&quot;&gt;http://whatismyv6.com/&lt;/a&gt; (&lt;a href=&quot;http://ipv4.whatismyv6.com/&quot; &gt;IPv4 only&lt;/a&gt;, &lt;a href=&quot;http://ipv6.whatismyv6.com/&quot; &gt;IPv6 only&lt;/a&gt;)&lt;/li&gt;&lt;br /&gt;
&lt;li&gt;&lt;a href=&quot;http://www.whatismyipv6.net/&quot;&gt;http://www.whatismyipv6.net/&lt;/a&gt; (provides traceroute and ping, also suports IPv4)&lt;/li&gt;&lt;br /&gt;
&lt;/ul&gt; 
    </content:encoded>

    <pubDate>Sun, 22 Jan 2012 23:33:00 +0000</pubDate>
    <guid isPermaLink="false">https://blog.crox.net/archives/76-guid.html</guid>
    <category>ipv6</category>
<category>network</category>

</item>
<item>
    <title>Enabling IPv6 Privacy Extensions on all interfaces (Ubuntu Linux, may work for other distros too)</title>
    <link>https://blog.crox.net/archives/75-Enabling-IPv6-Privacy-Extensions-on-all-interfaces-Ubuntu-Linux,-may-work-for-other-distros-too.html</link>
    
    <comments>https://blog.crox.net/archives/75-Enabling-IPv6-Privacy-Extensions-on-all-interfaces-Ubuntu-Linux,-may-work-for-other-distros-too.html#comments</comments>
    <wfw:comment>https://blog.crox.net/wfwcomment.php?cid=75</wfw:comment>

    <slash:comments>0</slash:comments>
    <wfw:commentRss>https://blog.crox.net/rss.php?version=2.0&amp;type=comments&amp;cid=75</wfw:commentRss>
    

    <author>nospam@example.com (crox)</author>
    <content:encoded>
    According to the &lt;a href=&quot;http://en.wikipedia.org/wiki/IPv6&quot;  title=&quot;IPv6&quot;&gt;Wikipedia IPv6 article&lt;/a&gt;, &lt;i&gt;Privacy extensions are, except for the Windows platform and Mac OS X since 10.7 as well as iOS since version 4.3, not enabled by default&lt;/i&gt;.&lt;br /&gt;
&lt;br /&gt;
In theory, one can enable the IPv6 Privacy Extensions on all interfaces at once using sysctl like this:&lt;pre&gt;sudo sysctl net.ipv6.conf.all.use_tempaddr=2&lt;/pre&gt;&lt;br /&gt;
However, this currently doesn&#039;t work as expected, so I&#039;m using this one-liner in /etc/rc.local:&lt;pre&gt;for IF in `/bin/ls /proc/sys/net/ipv6/conf/*/use_tempaddr` ; do echo 2 &gt; $IF ; done&lt;/pre&gt;&lt;br /&gt;
This also sets &quot;use_tempaddr&quot; for &quot;default&quot;, which means it should also apply to interfaces added to the system afterwards.&lt;br /&gt;
&lt;br /&gt;
A simple check to verify that the new configuration is working: &lt;a href=&quot;http://ipv6-test.com/&quot;  title=&quot;ipv6-test.com&quot;&gt;ipv6-test.com&lt;/a&gt; will print your MAC address when available...&lt;br /&gt;
&lt;br /&gt;
See also: &lt;a href=&quot;https://bugzilla.kernel.org/show_bug.cgi?id=11655&quot; &gt;Linux Kernel Bug 11655&lt;/a&gt;&lt;br /&gt;
&lt;br/&gt; 
    </content:encoded>

    <pubDate>Sun, 22 Jan 2012 23:22:01 +0000</pubDate>
    <guid isPermaLink="false">https://blog.crox.net/archives/75-guid.html</guid>
    <category>ipv6</category>
<category>kernel</category>
<category>linux</category>
<category>network</category>
<category>ubuntu</category>

</item>
<item>
    <title>gulp - tcpdump alternative for lossless capture on Linux</title>
    <link>https://blog.crox.net/archives/72-gulp-tcpdump-alternative-for-lossless-capture-on-Linux.html</link>
    
    <comments>https://blog.crox.net/archives/72-gulp-tcpdump-alternative-for-lossless-capture-on-Linux.html#comments</comments>
    <wfw:comment>https://blog.crox.net/wfwcomment.php?cid=72</wfw:comment>

    <slash:comments>47</slash:comments>
    <wfw:commentRss>https://blog.crox.net/rss.php?version=2.0&amp;type=comments&amp;cid=72</wfw:commentRss>
    

    <author>nospam@example.com (crox)</author>
    <content:encoded>
    &lt;a href=&quot;http://www.tcpdump.org/&quot; &gt;tcpdump&lt;/a&gt; and &lt;a href=&quot;http://www.wireshark.org/&quot; &gt;wireshark&lt;/a&gt; are the tools that usually come to mind when you have to capture network traffic. But in some situations where you have to record a large amount of data and you want to avoid losing packets, tcpdump has some limitations. When I was hit myself by the tcpdump packet loss problem, I quickly found out that I was not alone and that a number of people had already researched the topic and/or provided alternatives.&amp;#42;&lt;br /&gt;
&lt;br /&gt;
In particular, I found two different tools to perform the task: Corey Satten&#039;s gulp (&lt;a href=&quot;http://corey.elsewhere.org/gulp/&quot; &gt;http://corey.elsewhere.org/gulp/&lt;/a&gt;) and lindump from HP Labs (&lt;a href=&quot;http://tesla.hpl.hp.com/opensource/&quot; &gt;http://tesla.hpl.hp.com/opensource/&lt;/a&gt;)&lt;br /&gt;
&lt;br /&gt;
I also found two interesting papers about capturing high volumes of traffic: &lt;a href=&quot;http://www.usenix.org/events/fast09/tech/full_papers/anderson/anderson_html/&quot; &gt;http://www.usenix.org/events/fast09/tech/full_papers/anderson/anderson_html/&lt;/a&gt; and &lt;a href=&quot;http://docs.di.fc.ul.pt/jspui/bitstream/10455/3299/1/thesis-nhenriqu.pdf&quot; &gt;http://docs.di.fc.ul.pt/jspui/bitstream/10455/3299/1/thesis-nhenriqu.pdf&lt;/a&gt; (the second quotes the first one among others, and also contains useful info to optimally spread the load among different cores)&lt;br /&gt;
&lt;br /&gt;
After some tests I quickly became a happy gulp user, and thanks to the software being open source I was able to add features to it that I missed from the latest tcpdump versions:&lt;br /&gt;
&lt;br /&gt;
-n - allows to change the default filename template&lt;br /&gt;
-t - allows to add a timestamp to the filename&lt;br /&gt;
-G - rotate pcap file every n seconds&lt;br /&gt;
-F - allows to skip the check for an ethernet interface&lt;br /&gt;
-Z - allows to specify a command to post-process each capture file&lt;br /&gt;
&lt;br /&gt;
I&#039;ve sent a patch to Corey Satten, who intends to setup a repository to hold the various contributions he gets for gulp. In the meanwhile, you can find my changes in the attached file (&lt;a href=&quot;https://blog.crox.net/uploads/02-gulp-ntGFZ.patch.gz&quot; title=&quot;02-gulp-ntGFZ.patch.gz&quot; target=&quot;_blank&quot;&gt;02-gulp-ntGFZ.patch.gz&lt;/a&gt;). For your convenience and for completeness, I also provide here &lt;a href=&quot;https://blog.crox.net/uploads/01-gulp-amd64.patch.gz&quot; title=&quot;01-gulp-amd64.patch.gz&quot; target=&quot;_blank&quot;&gt;the patch from Guy Harris that fixes issues on 64 bit systems&lt;/a&gt; (see &lt;a href=&quot;http://seclists.org/wireshark/2009/Oct/105&quot; &gt;http://seclists.org/wireshark/2009/Oct/105&lt;/a&gt;, apply that one first).&lt;br /&gt;
&lt;br /&gt;
Updates:&lt;br /&gt;
2012-08-22: new version of my patch to fix the issue reported by SgtMalicious&lt;br /&gt;
2017-02-03: long-standing bug fixed&lt;br /&gt;
&lt;br /&gt;
Downloads:&lt;br /&gt;
&lt;a class=&quot;opens_window&quot; href=&quot;https://blog.crox.net/uploads/01-gulp-amd64.patch.gz&quot; title=&quot;01-gulp-amd64.patch.gz&quot;&gt;01-gulp-amd64.patch.gz&lt;/a&gt;: fix issues with 64-bit systems&lt;br /&gt;
&lt;a class=&quot;opens_window&quot; href=&quot;https://blog.crox.net/uploads/02-gulp-ntGFZ.patch.gz&quot; title=&quot;02-gulp-ntGFZ.patch.gz&quot;&gt;02-gulp-ntGFZ.patch.gz&lt;/a&gt;: additional functionality as described above&lt;br /&gt;
&lt;a class=&quot;opens_window&quot; href=&quot;https://blog.crox.net/uploads/gulp-1.58-crox.tgz&quot; title=&quot;gulp-1.58-crox.tgz&quot;&gt;gulp-1.58-crox.tgz&lt;/a&gt;: source with both patches applied&lt;br /&gt;
&lt;br /&gt;
&amp;#42; other people have reported a performance drop with libpcap version 1.0 compared to previous builds, see &lt;a href=&quot;http://thread.gmane.org/gmane.network.tcpdump.devel/4629&quot; &gt;http://thread.gmane.org/gmane.network.tcpdump.devel/4629&lt;/a&gt; or &lt;a href=&quot;http://seclists.org/tcpdump/2010/q3/index.html#11&quot; &gt;http://seclists.org/tcpdump/2010/q3/index.html#11&lt;/a&gt;&lt;br /&gt;
 
    </content:encoded>

    <pubDate>Sun, 27 Feb 2011 23:37:00 +0000</pubDate>
    <guid isPermaLink="false">https://blog.crox.net/archives/72-guid.html</guid>
    <category>linux</category>
<category>network</category>

</item>
<item>
    <title>hping - [send_icmp] Unsupported icmp type</title>
    <link>https://blog.crox.net/archives/69-hping-send_icmp-Unsupported-icmp-type.html</link>
    
    <comments>https://blog.crox.net/archives/69-hping-send_icmp-Unsupported-icmp-type.html#comments</comments>
    <wfw:comment>https://blog.crox.net/wfwcomment.php?cid=69</wfw:comment>

    <slash:comments>0</slash:comments>
    <wfw:commentRss>https://blog.crox.net/rss.php?version=2.0&amp;type=comments&amp;cid=69</wfw:commentRss>
    

    <author>nospam@example.com (crox)</author>
    <content:encoded>
    When performing tests you may sometimes want to send specially crafted &lt;a href=&quot;http://en.wikipedia.org/wiki/Internet_Control_Message_Protocol&quot;  title=&quot;ICMP&quot;&gt;icmp&lt;/a&gt; packets. &lt;a href=&quot;http://www.hping.org/&quot;  title=&quot;hping&quot;&gt;hping&lt;/a&gt; is a handy tool for that.&lt;br /&gt;
&lt;br /&gt;
However, the default behavior is to refuse to send &quot;unsupported&quot; Type/Code combinations. eg&lt;pre&gt;hping3 -c 1 --icmp -C 33 -K 0 192.168.70.1&lt;br /&gt;HPING 192.168.70.1 (wlan0 192.168.70.10): icmp mode set, 28 headers + 0 data bytes&lt;br /&gt;[send_icmp] Unsupported icmp type!&lt;/pre&gt;&lt;br /&gt;
Fortunately, there is an (undocumented) --force-icmp option that you can add to bypass the check:&lt;pre&gt;hping3 -c 1 --icmp --force-icmp -C 33 -K 0 192.168.70.1&lt;br /&gt;HPING 192.168.70.1 (wlan0 192.168.70.10): icmp mode set, 28 headers + 0 data bytes&lt;br /&gt;&lt;br /&gt;--- 192.168.70.1 hping statistic ---&lt;br /&gt;1 packets transmitted, 0 packets received, 100% packet loss&lt;br /&gt;round-trip min/avg/max = 0.0/0.0/0.0 ms&lt;/pre&gt;&lt;br /&gt;
 
    </content:encoded>

    <pubDate>Fri, 17 Sep 2010 20:47:01 +0000</pubDate>
    <guid isPermaLink="false">https://blog.crox.net/archives/69-guid.html</guid>
    <category>linux</category>
<category>network</category>

</item>
<item>
    <title>pfSense dropping packets from specific hosts (outdated bogons lists)</title>
    <link>https://blog.crox.net/archives/68-pfSense-dropping-packets-from-specific-hosts-outdated-bogons-lists.html</link>
    
    <comments>https://blog.crox.net/archives/68-pfSense-dropping-packets-from-specific-hosts-outdated-bogons-lists.html#comments</comments>
    <wfw:comment>https://blog.crox.net/wfwcomment.php?cid=68</wfw:comment>

    <slash:comments>0</slash:comments>
    <wfw:commentRss>https://blog.crox.net/rss.php?version=2.0&amp;type=comments&amp;cid=68</wfw:commentRss>
    

    <author>nospam@example.com (crox)</author>
    <content:encoded>
    After a fresh &lt;a href=&quot;http://www.pfsense.org/&quot;  title=&quot;pfSense&quot;&gt;pfSense&lt;/a&gt; install, I found out that traffic from specific hosts was being dropped when it should have been allowed based on the firewall rules I defined.&lt;br /&gt;
&lt;br /&gt;
It turned out that the option &quot;block bogon networks&quot; was activated on the WAN interface, and that fresh pfSense images come with a slightly outdated &lt;a href=&quot;http://en.wikipedia.org/wiki/Bogon_filtering&quot;  title=&quot;bogon&quot;&gt;bogon&lt;/a&gt; list.&lt;br /&gt;
&lt;br /&gt;
If you are facing this problem, you have three options:&lt;br /&gt;
&lt;br /&gt;
1. disable the &quot;Block bogon networks&quot; option at the bottom of the WAN interface page&lt;br /&gt;
&lt;br /&gt;
2. after at most one week, the list will be updated automatically as long as the box is online (there is a cron entry, grep your config file for bogon)&lt;br /&gt;
&lt;br /&gt;
3. if you don&#039;t want 1. and can&#039;t wait for 2, you can trigger the update process manually by running:&lt;pre&gt;/etc/rc.update_bogons.sh 0&lt;/pre&gt;Check the output from the Status -&gt; System Logs -&gt; System page (I ran it from a serial console, but it should work fine by ssh or from the exec.php page too)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 
    </content:encoded>

    <pubDate>Thu, 16 Sep 2010 21:14:52 +0000</pubDate>
    <guid isPermaLink="false">https://blog.crox.net/archives/68-guid.html</guid>
    <category>adsl</category>
<category>network</category>
<category>pfsense</category>

</item>
<item>
    <title>Linksys WAG200G-EU stops routing UDP after a while (scripted reboot how-to)</title>
    <link>https://blog.crox.net/archives/31-Linksys-WAG200G-EU-stops-routing-UDP-after-a-while-scripted-reboot-how-to.html</link>
    
    <comments>https://blog.crox.net/archives/31-Linksys-WAG200G-EU-stops-routing-UDP-after-a-while-scripted-reboot-how-to.html#comments</comments>
    <wfw:comment>https://blog.crox.net/wfwcomment.php?cid=31</wfw:comment>

    <slash:comments>1</slash:comments>
    <wfw:commentRss>https://blog.crox.net/rss.php?version=2.0&amp;type=comments&amp;cid=31</wfw:commentRss>
    

    <author>nospam@example.com (crox)</author>
    <content:encoded>
    It seems that after having been up for a couple of days, the WAG200G starts having issues routing UDP packets properly. This particularly affects VoIP traffic (here IAX2 on port 4569). The symptoms are that &quot;regular surfing&quot; works flawlessly, but the registration with the asterisk server fails. &lt;a href=&quot;http://en.wikipedia.org/wiki/Tcpdump&quot;  title=&quot;tcpdump&quot;&gt;tcpdump&lt;/a&gt; shows no traffic on the server side. Restarting the WAG200G immediately solves the problem.&lt;br /&gt;
&lt;br /&gt;
Here is how I restarted the router from the command line:&lt;br /&gt;
&lt;pre&gt;wget --http-user=admin --http-password=pa55w0rd \&lt;br /&gt;     --post-data=&#039;reboot=1&amp;save=Enregistrer+les+param%E8tres&amp;todo=reboot&amp;h_reboot=1&amp;this_file=Reboot.htm&amp;next_file=index.htm&amp;message=&#039; \&lt;br /&gt;     http://192.168.0.1/setup.cgi&lt;/pre&gt;&lt;br /&gt;
(replace password and IP address as appropriate)&lt;br /&gt;
 
    </content:encoded>

    <pubDate>Fri, 07 Mar 2008 10:04:25 +0000</pubDate>
    <guid isPermaLink="false">https://blog.crox.net/archives/31-guid.html</guid>
    <category>adsl</category>
<category>linksys</category>
<category>network</category>
<category>wlan</category>

</item>

</channel>
</rss>
