Thanks for the reply.
I'm looking to determine if the cause of intermittent subnet "collisions" that necessitate power cycle of numerous networks hosts is the result of OpenBSD security configurations
Please note the openbsd host is reachable via SSH however ICMP form the host and from other hosts on the subnet fail and DNS lookups on the Puffy machine fail following the network failure.
In addition wifi appears related as 802.11 is constantly active and may be requesting configuration change during channel/frequency update.
Essentially If security configurations that disable for example broadcast echo & address mask query can lead to unexpected results.
For example MTU size & TCP window scaling options requiring the results of a broadcast ICMP echo.
Or if unintended result of the stateless UDP traffic never reaching it's destination due to security config can result in ICMP UDP MTU errors.
Regards
Patrick
> On Dec 30, 2017, at 5:55 PM, Philip Guenther <guenther@gmail.com> wrote:
>
> On Sat, 30 Dec 2017, Patrick Dohman wrote:
>> At this point it appears that openbsd security configurations may result
>> in a los of UDP ICMP traffic to all hosts on a segment. If possible
>> please clarify if any of the following are required foe the proper
>> operation of NTP/CAPWAP on a broadcast/multicast segment.
>
> Do you just want to hope that someone on this list has already deployed
> "CAPWAP" with OpenBSD and wait for them to answer, or are you interested
> in trying to debug it?
>
> If the latter, then you should take it down a level and describe what you
> tried to do, what you expected to see "on the wire/in the air", and what
> you _actually_ saw there?
>
>
> (Reading at least one 120+ page standard written by Cisco just to
> understand the background to someone else's problem is a high barrier to
> assistance by others who are familiar with networking but not with CAPWAP
> and/or LWAPP.)
>
>
> Philip Guenther
No comments:
Post a Comment