The only solution i found was a not anymore supported module for netfilter from Rusty Russell.
I tried to fix the compiler errors/warnings and finally it worked.
Usage:
ifconfig eth0 192.168.1.1
ifconfig eth1 192.168.2.1
arp -s 192.168.1.2 <hardware address of eth1> -i eth0
arp -s 192.168.2.2 <hardware address of eth0> -i eth1
modprobe ip_crossover dev1=eth0 dev2=eth1
Then doing ping 192.168.1.2, ICMP ping goes out eth0 and comes back in eth1.
ip_crossover.tar.bz2
for testing packets with differenz sizes i did:
for i in $(seq 0 1472); do ping -q -c1 -s$i 192.168.2.2 >/dev/null || echo fail $i; done
for i in $(seq 0 1472); do ping -q -c1 -s$i 192.168.1.2 >/dev/null || echo fail $i; done
[ view entry ] ( 1487 views ) | print article
Here is how i made the patch for inclusion:
git config --global user.name "Peter Holik"
git config --global user.email "peter AT holik.at"
check kernel out with git
git clone git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux-2.6.git
first i had to export usbnet_get_ethernet_addr from usbnet.c
and to fix cdc_ether.c
git commit -am "export get_ethernet_addr from cdc.ether.c in usbnet"
then copy my new driver int51x1.c to /usr/src/linux-2.6/drivers/net/usb/ and modify /usr/src/linux-2.6/drivers/net/usb/Kconfig and /usr/src/linux-2.6/drivers/net/usb/Makefile
git add /usr/src/linux-2.6/drivers/net/usb/int51x1.c
git commit -am "usb driver for intellon int51x1 based PLC like devolo dlan duo"
git format-patch -s origin/master
Then mail the created file to linux kernel mailinglist:
cat 0001-export-usbnet_get_ethernet_addr-from-usbnet-and-fixe.patch | \
mail linux-kernel@vger.kernel.org
cat 0002-usb-driver-for-intellon-int51x1-based-PLC-like-devol.patch | \
mail linux-kernel@vger.kernel.org
Many thanks to the guys at linux-kernel@vger.kernel.org for suggestions and improvements.
Undo last commit with git reset --soft HEAD^
My driver will be part of linux kernel 2.6.31
git quick reference
[ view entry ] ( 1119 views ) | print article
With iptables module recent you can limit the count of tcp connection attempts. In my case i allow only 3 ssh connection attempts per minute. This stops script kiddies doing ssh brute force attacs.
iptables -N synflood
iptables -A synflood -p tcp --dport ssh -m recent --set --name SSH
iptables -A synflood -p tcp --dport ssh -m recent --update \
--seconds 60 --hitcount 4 --name SSH -j DROP
iptables -A INPUT -p tcp -m state --state NEW -j synflood
iptables -A FORWARD -i $OUT -p tcp -m state --state NEW -j synflood
[ view entry ] ( 772 views ) | print article
sftp -o Ciphers=blowfish-cbc USER@HOST
[ view entry ] ( 733 views ) | print article
for i in $(seq 2 254); do ping -c 1 192.168.0.$i | grep -q rtt && echo "found 192.168.0.$i"; done
[ view entry ] ( 783 views ) | print article
<<First <Back | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | Next> Last>>