You can subscribe to this list here.
| 2002 | Jan | Feb | Mar | Apr (24) | May (14) | Jun (29) | Jul (33) | Aug (3) | Sep (8) | Oct (18) | Nov (1) | Dec (10) |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2003 | Jan (3) | Feb (33) | Mar (7) | Apr (28) | May (30) | Jun (5) | Jul (10) | Aug (7) | Sep (32) | Oct (41) | Nov (20) | Dec (10) |
| 2004 | Jan (24) | Feb (18) | Mar (57) | Apr (40) | May (55) | Jun (48) | Jul (77) | Aug (15) | Sep (56) | Oct (80) | Nov (74) | Dec (52) |
| 2005 | Jan (38) | Feb (42) | Mar (39) | Apr (56) | May (79) | Jun (73) | Jul (16) | Aug (23) | Sep (68) | Oct (77) | Nov (52) | Dec (27) |
| 2006 | Jan (27) | Feb (18) | Mar (51) | Apr (62) | May (28) | Jun (50) | Jul (36) | Aug (33) | Sep (47) | Oct (50) | Nov (77) | Dec (13) |
| 2007 | Jan (15) | Feb (8) | Mar (14) | Apr (18) | May (25) | Jun (16) | Jul (16) | Aug (19) | Sep (32) | Oct (17) | Nov (5) | Dec (5) |
| 2008 | Jan (64) | Feb (25) | Mar (25) | Apr (6) | May (28) | Jun (20) | Jul (10) | Aug (27) | Sep (28) | Oct (59) | Nov (37) | Dec (43) |
| 2009 | Jan (40) | Feb (25) | Mar (12) | Apr (57) | May (46) | Jun (29) | Jul (39) | Aug (10) | Sep (20) | Oct (42) | Nov (50) | Dec (57) |
| 2010 | Jan (82) | Feb (165) | Mar (256) | Apr (260) | May (36) | Jun (87) | Jul (53) | Aug (89) | Sep (107) | Oct (51) | Nov (88) | Dec (117) |
| 2011 | Jan (69) | Feb (60) | Mar (113) | Apr (71) | May (67) | Jun (90) | Jul (88) | Aug (90) | Sep (48) | Oct (64) | Nov (69) | Dec (118) |
| 2012 | Jan (49) | Feb (528) | Mar (351) | Apr (190) | May (238) | Jun (193) | Jul (104) | Aug (100) | Sep (57) | Oct (41) | Nov (47) | Dec (51) |
| 2013 | Jan (94) | Feb (57) | Mar (96) | Apr (105) | May (77) | Jun (102) | Jul (27) | Aug (81) | Sep (32) | Oct (53) | Nov (127) | Dec (65) |
| 2014 | Jan (113) | Feb (59) | Mar (104) | Apr (259) | May (70) | Jun (70) | Jul (146) | Aug (45) | Sep (58) | Oct (149) | Nov (77) | Dec (83) |
| 2015 | Jan (53) | Feb (66) | Mar (86) | Apr (50) | May (135) | Jun (76) | Jul (151) | Aug (83) | Sep (97) | Oct (262) | Nov (245) | Dec (231) |
| 2016 | Jan (131) | Feb (233) | Mar (97) | Apr (138) | May (221) | Jun (254) | Jul (92) | Aug (248) | Sep (168) | Oct (275) | Nov (477) | Dec (445) |
| 2017 | Jan (218) | Feb (217) | Mar (146) | Apr (172) | May (216) | Jun (252) | Jul (164) | Aug (192) | Sep (190) | Oct (143) | Nov (255) | Dec (182) |
| 2018 | Jan (295) | Feb (164) | Mar (113) | Apr (147) | May (64) | Jun (262) | Jul (184) | Aug (90) | Sep (69) | Oct (364) | Nov (102) | Dec (101) |
| 2019 | Jan (119) | Feb (64) | Mar (64) | Apr (102) | May (57) | Jun (154) | Jul (84) | Aug (81) | Sep (76) | Oct (102) | Nov (233) | Dec (89) |
| 2020 | Jan (38) | Feb (170) | Mar (155) | Apr (172) | May (120) | Jun (223) | Jul (461) | Aug (227) | Sep (268) | Oct (113) | Nov (56) | Dec (124) |
| 2021 | Jan (121) | Feb (48) | Mar (334) | Apr (345) | May (207) | Jun (136) | Jul (71) | Aug (112) | Sep (122) | Oct (173) | Nov (184) | Dec (223) |
| 2022 | Jan (197) | Feb (206) | Mar (156) | Apr (212) | May (192) | Jun (170) | Jul (143) | Aug (380) | Sep (182) | Oct (148) | Nov (128) | Dec (269) |
| 2023 | Jan (248) | Feb (196) | Mar (264) | Apr (36) | May (123) | Jun (66) | Jul (120) | Aug (48) | Sep (157) | Oct (198) | Nov (300) | Dec (273) |
| 2024 | Jan (271) | Feb (147) | Mar (207) | Apr (78) | May (107) | Jun (168) | Jul (151) | Aug (51) | Sep (438) | Oct (221) | Nov (302) | Dec (357) |
| 2025 | Jan (451) | Feb (219) | Mar (326) | Apr (232) | May (306) | Jun (181) | Jul (452) | Aug (282) | Sep (620) | Oct (793) | Nov (682) | Dec |
| S | M | T | W | T | F | S |
|---|---|---|---|---|---|---|
| | | | 1 | 2 | 3 | 4 |
| 5 | 6 | 7 | 8 | 9 | 10 (1) | 11 (1) |
| 12 | 13 | 14 | 15 (1) | 16 | 17 | 18 |
| 19 | 20 | 21 | 22 | 23 | 24 | 25 |
| 26 | 27 | 28 | 29 | 30 | 31 | |
| From: Eric E. B. <er...@bo...> - 2003-01-15 06:30:34 |
[i'm resending this... sorry if it appears twice] Hi there, I've been experiencing kernel crashes with OpenVPN on Linux under a certain set of conditions, and wondered if anybody else (James?) can reproduce this. Here are the steps needed to cause the crash: 1. Create an OpenVPN TUN link between two hosts, Host-A and Host-B. 2. Add an iptables rule to Host-A to REJECT connections from unauthorized networks, generating an ICMP port unreachable. Typically, this would be the "default deny" rule in a firewall, for example: iptables -A reject -j REJECT --reject-with icmp-port-unreachable 3. Make a TCP connection (e.g., ssh) from Host-B to Host-A's tunnel interface, using a source address for which Host-A: (a) doesn't have a route directed across the tunnel, and (b) doesn't explicitly permit (so that the iptables rule above will apply) [The connection doesn't have to be made to Host-A's tunnel interface; it could be to any interface on Host-A that causes the connection to traverse the tunnel from Host-B to Host-A.] What I think is happening is this: when an incoming connection arrives on Host-A's TUN interface, the REJECT rule is triggered, causing an "ICMP unreachable" to be sent back. However, since there is no return route back across the tunnel, the default route is selected, which causes the ICMP packet to be <<returned on an interface that is different from the incoming interface>> (i.e., the tunnel). Since the incoming (tun) and outgoing (eth) interfaces have different link layer header sizes, the kernel is crashing in skb_push(). Software: openvpn 1.3.1.7, 1.3.2, 1.3.2.5 linux kernel 2.4.19, 2.4.20 iptables 1.2.7a iptables patch-o-matic 20020930, 20021127 I've attached the kernel oops output below. I hope I've provided sufficient information to reproduce the crash. Please let me know if you need more information, since I'm interested in helping solve this problem. Thanks, --eric =========================================================================== % kernel BUG at skbuff.c:109! invalid operand: 0000 CPU: 0 EIP: 0010:[<c01c5627>] Not tainted Using defaults from ksymoops -t elf32-i386 -a i386 EFLAGS: 00010282 eax: 00000028 ebx: 00000000 ecx: cf7d8000 edx: cc52f11c esi: cc463f00 edi: 00000800 ebp: cf77f000 esp: ce531c68 ds: 0018 es: 0018 ss: 0018 Process openvpn (pid: 3954, stackpage=ce531000) Stack: c02374a0 c01d0215 00000036 0000000e cf77f000 c01d021e cc463f00 0000000e c01d0215 ce927d80 cc463f00 cb58c0c0 cf77f000 c01cca1a cc463f00 cf77f000 00000800 cb58c0e4 00000000 00000028 cc463f00 00000000 cf77f000 00000000 Call Trace: [<c01d0215>] [<c01d021e>] [<c01d0215>] [<c01cca1a>] [<c01ddb05>] [<c01cf12e>] [<c01dd975>] [<c01dda78>] [<c01cf12e>] [<d00e3384>] [<c01dd936>] [<d00e7906>] [<d00e3835>] [<d00402e2>] [<d0042660>] [<d0042660>] [<d0042660>] [<c01da0c6>] [<d0044080>] [<d00445c0>] [<c01cee0d>] [<c01da0c6>] [<c01cf0ee>] [<c01da0c6>] [<d0044600>] [<c01d9eb5>] [<c01da0c6>] [<c01da3a9>] [<c01cf12e>] [<c01da03d>] [<c01da1fa>] [<c01c9780>] [<c01c9889>] [<c01c9983>] [<c011b6ad>] [<d00e1b4c>] [<d00e12d6>] [<c0132c2f>] [<c0108933>] Code: 0f 0b 6d 00 8b 64 23 c0 83 c4 14 c3 90 a1 28 2c 2a c0 56 03 >>EIP; c01c5627 <skb_under_panic+29/36> <===== >>ecx; cf7d8000 <_end+f513308/fd48368> >>edx; cc52f11c <_end+c26a424/fd48368> >>esi; cc463f00 <_end+c19f208/fd48368> >>ebp; cf77f000 <_end+f4ba308/fd48368> >>esp; ce531c68 <_end+e26cf70/fd48368> Trace; c01d0215 <eth_header+15d/16e> Trace; c01d021e <eth_header+166/16e> Trace; c01d0215 <eth_header+15d/16e> Trace; c01cca1a <neigh_resolve_output+a6/198> Trace; c01ddb05 <ip_finish_output2+8d/c4> Trace; c01cf12e <nf_hook_slow+a0/144> Trace; c01dd975 <ip_finish_output+3f/44> Trace; c01dda78 <ip_finish_output2+0/c4> Trace; c01cf12e <nf_hook_slow+a0/144> Trace; d00e3384 <[ipt_REJECT]send_reset+308/37e> Trace; c01dd936 <ip_finish_output+0/44> Trace; d00e7906 <[ipt_LOG].text.end+ad/1ff> Trace; d00e3835 <[ipt_REJECT]reject+5f/62> Trace; d00402e2 <[ip_tables]ipt_do_table+262/2e4> Trace; d0042660 <[ip_tables]__kstrtab_ipt_register_table+0/0> Trace; d0042660 <[ip_tables]__kstrtab_ipt_register_table+0/0> Trace; d0042660 <[ip_tables]__kstrtab_ipt_register_table+0/0> Trace; c01da0c6 <ip_local_deliver_finish+0/134> Trace; d0044080 <[iptable_filter]ipt_hook+20/24> Trace; d00445c0 <[iptable_filter]packet_filter+0/40> Trace; c01cee0d <nf_iterate+51/86> Trace; c01da0c6 <ip_local_deliver_finish+0/134> Trace; c01cf0ee <nf_hook_slow+60/144> Trace; c01da0c6 <ip_local_deliver_finish+0/134> Trace; d0044600 <[iptable_filter]ipt_ops+0/48> Trace; c01d9eb5 <ip_local_deliver+35/54> Trace; c01da0c6 <ip_local_deliver_finish+0/134> Trace; c01da3a9 <ip_rcv_finish+1af/1fa> Trace; c01cf12e <nf_hook_slow+a0/144> Trace; c01da03d <ip_rcv+169/1f2> Trace; c01da1fa <ip_rcv_finish+0/1fa> Trace; c01c9780 <netif_receive_skb+100/1a0> Trace; c01c9889 <process_backlog+69/104> Trace; c01c9983 <net_rx_action+5f/ea> Trace; c011b6ad <do_softirq+89/8c> Trace; d00e1b4c <[tun]tun_get_user+d0/13f> Trace; d00e12d6 <[tun]tun_chr_write+28/2c> Trace; c0132c2f <sys_write+85/ea> Trace; c0108933 <system_call+33/40> Code; c01c5627 <skb_under_panic+29/36> 00000000 <_EIP>: Code; c01c5627 <skb_under_panic+29/36> <===== 0: 0f 0b ud2a <===== Code; c01c5629 <skb_under_panic+2b/36> 2: 6d insl (%dx),%es:(%edi) Code; c01c562a <skb_under_panic+2c/36> 3: 00 8b 64 23 c0 83 add %cl,0x83c02364(%ebx) Code; c01c5630 <skb_under_panic+32/36> 9: c4 14 c3 les (%ebx,%eax,8),%edx Code; c01c5633 <skb_under_panic+35/36> c: 90 nop Code; c01c5634 <alloc_skb+0/1a6> d: a1 28 2c 2a c0 mov 0xc02a2c28,%eax Code; c01c5639 <alloc_skb+5/1a6> 12: 56 push %esi Code; c01c563a <alloc_skb+6/1a6> 13: 03 00 add (%eax),%eax <0>Kernel panic: Aiee, killing interrupt handler! 2 errors issued. Results may not be reliable. =========================================================================== |
| From: James Y. <ji...@yo...> - 2003-01-11 03:12:32 |
Hello Julien, julien Touche <jul...@ly...> said: > > Hi > > first greetings for openvpn which is a best of for easy VPN :) Thanks! > > i have a small list of questions i can't answer myself: > > - at which stage is the win32 port ? always looking for tun driver ? > i give a glimpse to cipe driver which seems "simple unix2win" NDIS > driver but 1-cannot compile (need ndis.h part of windows DDK which is > not free download) 2-lot bigger compare to unix tun code (from vtun > site) even if it does more 3- there is no /dev in win so what's best ? > pipe i believe ? I've received email from people in the past who were going to go off and write a tun or tap driver for win32, but none were ever heard from again :( > - is there any way to connect someone which is not-root ? for example, > i'm at work with a desktop computer without root access (maybe even not > sure to have tun/tap driver) but i have only two or three apps i need to > connect to my home vpn (ssh, ftp, ...). i can modify them in order to > send data not on a socket but a pipe (or anything else) which send data > to a modified openvpn and send it on my home vpn. > is it possible or i'm completely dreaming ? It might be possible to run as non-root if you can get read/write access to the TUN/TAP device node. > > another solution is: having a list of port tunneled local (8080, 2222, > ...) to local (9991, 9992, ...) (by stunnel for example) and the latter > list of port i send to vpn by openvpn/nonroot > (of course, we need to define for each local port the distant port AND > host, but if we can change on fly, it will be ok; or maybe someone know > a way for common user to forward all data address to a port to another > host ?) > > the tun/tap driver is only required if want a complete real network > interface, right ? (which is necessary if we want to work with > unmodified apps) There's not much you can do with OpenVPN if you lack a tun/tap driver. James > > > Regards > > > PS: please cc. > > > > ------------------------------------------------------- > This SF.NET email is sponsored by: > SourceForge Enterprise Edition + IBM + LinuxWorld = Something 2 See! > http://www.vasoftware.com > _______________________________________________ > Openvpn-devel mailing list > Ope...@li... > https://lists.sourceforge.net/lists/listinfo/openvpn-devel > -- |
| From: julien T. <jul...@ly...> - 2003-01-10 18:48:55 |
Hi first greetings for openvpn which is a best of for easy VPN :) i have a small list of questions i can't answer myself: - at which stage is the win32 port ? always looking for tun driver ? i give a glimpse to cipe driver which seems "simple unix2win" NDIS driver but 1-cannot compile (need ndis.h part of windows DDK which is not free download) 2-lot bigger compare to unix tun code (from vtun site) even if it does more 3- there is no /dev in win so what's best ? pipe i believe ? - is there any way to connect someone which is not-root ? for example, i'm at work with a desktop computer without root access (maybe even not sure to have tun/tap driver) but i have only two or three apps i need to connect to my home vpn (ssh, ftp, ...). i can modify them in order to send data not on a socket but a pipe (or anything else) which send data to a modified openvpn and send it on my home vpn. is it possible or i'm completely dreaming ? another solution is: having a list of port tunneled local (8080, 2222, ...) to local (9991, 9992, ...) (by stunnel for example) and the latter list of port i send to vpn by openvpn/nonroot (of course, we need to define for each local port the distant port AND host, but if we can change on fly, it will be ok; or maybe someone know a way for common user to forward all data address to a port to another host ?) the tun/tap driver is only required if want a complete real network interface, right ? (which is necessary if we want to work with unmodified apps) Regards PS: please cc. |