> there have only been 8 hosts sending broadcast destination packets
Maybe some have turned this off (easy to do) because they are considered errors now.
> I don't know if it would be worth the effort to decode them into a text
> file since they are already available for download.
> What information is in them that might be of general interest?
Well, as also suggested by Lynwood, these packets (and others) can be used
to maintain a table of software in use, and can be helpful when there is some
problem that appears to affect part of the gateways, but it is not immediately
clear what they have in common.
Rob
The following message is being queued for email delivery to
everyone registered on the portal as operating a gateway.
- Brian
--------------------------------------------------------------------
From: Brian Kantor <Brian(a)UCSD.Edu>
To: AMPRNet Gateway Operators:;
Subject: AMPRNet - Important notice regarding your gateway system
Hello. You are receiving this email because you are registered with
portal.ampr.org as operating an IPIP encapsulating gateway, and there
are changes coming that will affect the operation of your gateway.
We are replacing the equipment at the UCSD Internet-AMPRNet gateway
with a newer, more capable device. In the process, the new equipment
will be assigned a NEW IP ADDRESS. You will have to make changes in
YOUR gateway configuration for your gateway to continue functioning.
The new equipment is already in service as amprgw.ucsd.edu and is on
IP address 169.228.34.84. This replaces the old equipment, known as
amprgw.sysnet.ucsd.edu, on IP address 169.228.66.251.
What you have to do to maintain the operability of your gateway:
1. You must change the outgoing destination address of your gateway
from 169.228.66.251 to 169.228.34.84. You may do this immediately;
the new equipment at UCSD is already operational.
2. You must allow packets from the new address, 169.228.34.84, into
your gateway router software configuration. If you are running with
a firewall, you must open a new path through it to your equipment.
Packets (RIP44 transmissions) are already being sent to you from
this address.
3. You must continue to accept packets from the old address,
169.228.66.251, for a period of a few weeks as the changeover is being
made. After a few weeks, packets will stop coming from that address
and you may remove permission for them to enter your firewall, if you
have one.
These are simple changes, involving editing a few configuration
parameters, but because there are so many different types of gateway in
operation on AMPRNet, how to make these changes cannot be detailed here.
You may find more information regarding your particular configuration
on https://wiki.ampr.org/ or on the 44net(a)hamradio.ucsd.edu discussion
mailing list, which you should join if you are not already a subscriber.
Best wishes and 73,
- Brian
Hello everyone,
Due to an cut instead of copy /paste error, there was a wrong tunnel
interface index detection (it always got the last interface in the system).
So here the a correted version of ampr-ripd (2.1.1) with the fix.
Changelog:
- Fixed a tunnel interface detection error
- No functional changes
Download:
http://www.yo2loj.ro/hamprojects/ampr-ripd-2.1.1.tgzhttp://yo2tm.ampr.org/hamprojects/ampr-ripd-2.1.1.tgz
Have fun,
Marius, YO2LOJ
As regards preparing a jnos system:
http://kf8kk.com/packet/jnos-linux/linux-jnos-setup-1.htm
gives a 404
What port will the new gateway ip nee? Still 520 udp?
Thanks,
jerome - ve7ass
> On May 28, 2017, at 20:56, Brian Kantor <Brian(a)UCSD.Edu> wrote:
>
> Hello. You are receiving this email because you are registered with
> portal.ampr.org as operating an IPIP encapsulating gateway, and there
> are changes coming that will affect the operation of your gateway.
>
> We are replacing the equipment at the UCSD Internet-AMPRNet gateway
> with a newer, more capable device. In the process, the new equipment
> will be assigned a NEW IP ADDRESS. You will have to make changes in
> YOUR gateway configuration for your gateway to continue functioning.
>
> The new equipment is already in service as amprgw.ucsd.edu and is on
> IP address 169.228.34.84. This replaces the old equipment, known as
> amprgw.sysnet.ucsd.edu, on IP address 169.228.66.251.
>
> What you have to do to maintain the operability of your gateway:
>
> 1. You must change the outgoing destination address of your gateway
> from 169.228.66.251 to 169.228.34.84. You may do this immediately;
> the new equipment at UCSD is already operational.
>
> 2. You must allow packets from the new address, 169.228.34.84, into
> your gateway router software configuration. If you are running with
> a firewall, you must open a new path through it to your equipment.
> Packets (RIP44 transmissions) are already being sent to you from
> this address.
>
> 3. You must continue to accept packets from the old address,
> 169.228.66.251, for a period of a few weeks as the changeover is being
> made. After a few weeks, packets will stop coming from that address
> and you may remove permission for them to enter your firewall, if you
> have one.
>
> These are simple changes, involving editing a few configuration
> parameters, but because there are so many different types of gateway in
> operation on AMPRNet, how to make these changes cannot be detailed here.
> You may find more information regarding your particular configuration
> on https://wiki.ampr.org/ or on the 44net(a)hamradio.ucsd.edu discussion
> mailing list, which you should join if you are not already a subscriber.
>
> Best wishes and 73,
> - Brian
> .
Hello everyone,
I released a new version of ampr-ripd (2.1) with fixes and additions.
Changelog:
- Fixed a segfault when using the -F option
- Added the possibility to use interface names for the -g option
- Interface used for raw RIP forwarding restarts on interface error
Download:
http://www.yo2loj.ro/hamprojects/ampr-ripd-2.1.tgzhttp://yo2tm.ampr.org/hamprojects/ampr-ripd-2.1.tgz
Have fun,
Marius, YO2LOJ
Im experimenting two net cameras on the AMPRNET
One is http streaming the other is RTSP streaming
The http uses tcp port 80
the rtsp uses udp (dont remember the port now )
The http replace photo every 250 MS (i assume after it get ACK and then send the next image) ( i see about 4 frames per second) and make a traffic of about 1000 kbit/sec
the RTSP send photos in about 10 frames per second and produce traffic of about 500-800 Kbit sec
all this over the amprNet
May someone explain this ? how come that the RTSP photo is like movie and the http is 4 frames per second (of course that if i view the http camera direct on the net i see the 10 frames per second i set the camera for)
And why i tell you all of this ?
Because i wonder how a DMR repeater connection will work on the amprNet ...
If i can see in RTSP video without problems or frame loss should a VOIP (or more exact) data stream of the DMR work ? after all it is less data ....
Is there anyone that can light my eyes on the subject ?
Regards
Ronen - 4Z4ZQ
I'm experimenting with a new technique in the routing daemon on amprgw:
if during a send to a gateway, the router gets certain ICMP UNREACHABLE
packets from the gateway it's sending to, it drops the host or gateway
from the routing table for a time.
This has the effect that if a gateway tells us that they don't want
packets from us by means of sending us a HOST or NET unreachable ICMP
response, we'll stop sending to them for a while.
Specifically, PORT UNREACHABLE is ignored. We don't route based on ports.
Any of the various HOST UNREACHABLE packets will defer just the one
destination host that was being sent to from the routing table; any of the
NET UNREACHABLE or PROTOCOL UNREACHABLE packets will defer the subnet from
the routing table. The deferral period is currently set to 15 minutes.
Watching this happen, one can observe that every 15 minutes, there are a
number of hosts and a subnet or two deferred out of the table as packets
are sent to them and rejected by the gateways. The number added to the
deferral list drops in rate as time goes on.
When a gateway changes its address, it is immediately removed from the
deferral list.
As with the ICMP response suppressing sending RIP transmissions, the
purpose of this is to not bombard gateways with packets they don't want
and aren't going to deliver anywhere. This is especially important with
the number of dynamic gateways we have, where a change in the gateway
address may wind up sending IPIP packets to an innocent host that has
inherited the gateway's old address.
Packets to unreachable destinations are dropped; we don't send
UNREACHABLES ourselves. (With all the backscatter and probes, we'd be
sending a LOT of them.)
We're trying to be good net neighbors.
- Brian
This is what the log entries look like:
May 28 03:54:33 <local0.info> amprgw ipipd[59063]: ICMP rec'd from 188.230.236.122: host 44.150.1.104 deferred
May 28 03:54:33 <local0.info> amprgw ipipd[59063]: ICMP rec'd from 188.230.236.122: host 44.150.1.236 deferred
May 28 03:54:33 <local0.info> amprgw ipipd[59063]: ICMP rec'd from 188.230.236.122: host 44.150.1.4 deferred
May 28 03:54:37 <local0.info> amprgw ipipd[59063]: ICMP rec'd from 97.84.0.85: subnet 44.102.132.0/24 deferred
May 28 03:54:38 <local0.info> amprgw ipipd[59063]: ICMP rec'd from 188.230.236.122: host 44.150.1.153 deferred
May 28 03:54:38 <local0.info> amprgw ipipd[59063]: ICMP rec'd from 188.230.236.122: host 44.150.1.210 deferred
May 28 03:54:38 <local0.info> amprgw ipipd[59063]: ICMP rec'd from 188.230.236.122: host 44.150.1.210 deferred
May 28 03:54:42 <local0.info> amprgw ipipd[59063]: ICMP rec'd from 40.143.112.188: subnet 44.88.8.32/28 deferred
May 28 03:54:43 <local0.info> amprgw ipipd[59063]: ICMP rec'd from 216.161.250.190: host 44.22.128.10 deferred
May 28 03:54:44 <local0.info> amprgw ipipd[59063]: ICMP rec'd from 188.230.236.122: host 44.150.1.102 deferred
May 28 03:54:45 <local0.info> amprgw ipipd[59063]: ICMP rec'd from 78.226.112.146: host 44.151.67.67 deferred
On Fri, May 26, 2017 at 04:04:24PM -0700, David Ranch wrote:
> Hey Brian,
> What about configuring an ICMP direct on the old IP to point to the new IP?
> --David
> KI6ZHD
Well, after thinking about it a bit and reading the relevant RFCs, I
thought I'd give it a try and wrote some code in the router daemon to
do this.
Unfortunately, the FreeBSD kernel prohibits a user-space process
from sending ICMP Redirects - you get 'Permission denied' errors
when you attempt to write one to the outgoing ICMP socket.
Too bad, it would have been an interesting experiment.
Maybe there's some way to fiddle the routing table so that the
kernel itself sends them. I'll look into it, but a quick peek
into the kernel source suggests it's not doable.
- Brian
After Marius continued efforts [TNX] see the results
of the new feature *raw AMPR-RIPD forwarding* at:
http://44.134.32.240/www/tun0.html
ampr-ripd traffic slowed down from 5.3 kb/s to
1.6 kb/s maintaining/obtaining the same effect.
The blue peaks (outgoing traffic) denote the
various kinda attacks on the structure.
--
73 and ciao, gus i0ojj
A proud member of linux team
Non multa, sed multum
Has anyone else had an issue where even though you use the -s option,
you don't have a /var/lib/ampr-ripd/encap.txt file?
I know this was working for me in prior versions.