1. 06 Feb, 2014 1 commit
    • Ondřej Zajíček's avatar
      Many changes in I/O and OSPF sockets and packet handling. · 48e5f32d
      Ondřej Zajíček authored
      I/O:
       - BSD: specify src addr on IP sockets by IP_HDRINCL
       - BSD: specify src addr on UDP sockets by IP_SENDSRCADDR
       - Linux: specify src addr on IP/UDP sockets by IP_PKTINFO
       - IPv6: specify src addr on IP/UDP sockets by IPV6_PKTINFO
       - Alternative SKF_BIND flag for binding to IP address
       - Allows IP/UDP sockets without tx_hook, on these
         sockets a packet is discarded when TX queue is full
       - Use consistently SOL_ for socket layer values.
      
      OSPF:
       - Packet src addr is always explicitly set
       - Support for secondary addresses in BSD
       - Dynamic RX/TX buffers
       - Fixes some minor buffer overruns
       - Interface option 'tx length'
       - Names for vlink pseudoifaces (vlinkX)
       - Vlinks use separate socket for TX
       - Vlinks do not use fixed associated iface
       - Fixes TTL for direct unicast packets
       - Fixes DONTROUTE for OSPF sockets
       - Use ifa->ifname instead of ifa->iface->name
      48e5f32d
  2. 22 Nov, 2013 1 commit
  3. 19 Nov, 2013 1 commit
  4. 26 Sep, 2013 1 commit
  5. 25 Jun, 2013 1 commit
  6. 24 Jun, 2013 1 commit
  7. 11 Jun, 2013 1 commit
  8. 17 Apr, 2013 1 commit
    • Ondřej Zajíček's avatar
      Fixes a compatibility issue in OSPFv2 PtP links. · 8df02847
      Ondřej Zajíček authored
      BIRD used zero netmask in hello packets on all PtP links, not just on
      unnumbered ones. This patch fixes it and adds option 'ptp netmask'
      for overriding the default behavior.
      
      Thanks to Alexander V. Chernikov for the original patch.
      8df02847
  9. 16 Apr, 2013 1 commit
  10. 10 Feb, 2013 1 commit
  11. 29 Oct, 2012 1 commit
  12. 14 May, 2012 2 commits
  13. 22 Mar, 2012 1 commit
  14. 16 Mar, 2012 2 commits
  15. 24 Jan, 2012 1 commit
  16. 07 Nov, 2011 1 commit
    • Ondřej Zajíček's avatar
      Implements protocol templates. · a7f23f58
      Ondřej Zajíček authored
      Based on the patch from Alexander V. Chernikov.
      Extended to support almost all protocols.
      Uses 'protocol bgp NAME from TEMPLATE { ... }' syntax.
      a7f23f58
  17. 03 Sep, 2011 1 commit
  18. 08 Aug, 2011 1 commit
  19. 22 Jul, 2011 1 commit
  20. 20 Jul, 2011 1 commit
  21. 17 Mar, 2011 1 commit
  22. 24 Dec, 2010 1 commit
  23. 07 Dec, 2010 1 commit
  24. 19 Nov, 2010 1 commit
  25. 13 Nov, 2010 1 commit
  26. 24 Apr, 2010 1 commit
    • Ondřej Zajíček's avatar
      Fixes and enhancements in 'show ospf state' command. · 0ea8fb4a
      Ondřej Zajíček authored
      Now it shows a distance, option to change showing reachable/all network
      nodes and better handling of AS-external LSAs in multiple areas. The
      command 'show ospf topology' was changed to not show stubnets in both
      OSPFv2 and OSPFv3 (previously it displayed stubnets in OSPFv2).
      0ea8fb4a
  27. 21 Apr, 2010 1 commit
  28. 29 Mar, 2010 1 commit
  29. 08 Feb, 2010 1 commit
  30. 29 Nov, 2009 1 commit
  31. 15 Oct, 2009 1 commit
  32. 21 Aug, 2009 1 commit
  33. 16 Aug, 2009 1 commit
  34. 30 Jul, 2009 1 commit
  35. 18 Jun, 2009 1 commit
  36. 11 Jun, 2009 1 commit
  37. 06 May, 2009 1 commit
    • Ondřej Zajíček's avatar
      A change in OSPF and RIP interface patterns. · 20e94fb8
      Ondřej Zajíček authored
      Allows to add more interface patterns to one common 'options'
      section like:
      
      interface "eth3", "eth4" { options common to eth3 and eth4 };
      
      Also removes undocumented and unnecessary ability to specify
      more interface patterns with different 'options' sections:
      
      interface "eth3" { options ... }, "eth4" { options ... };
      20e94fb8
  38. 08 Apr, 2009 1 commit
    • Ondřej Zajíček's avatar
      Fixes broken cryptographic authentication in OSPF · 024c310b
      Ondřej Zajíček authored
      Cryptographic authentication in OSPF is defective by
      design - there might be several packets independently
      sent to the network (for example HELLO, LSUPD and LSACK)
      where they might be reordered and that causes crypt.
      sequence number error.
      
      That can be workarounded by not incresing sequence number
      too often. Now we update it only when last packet was sent
      before at least one second. This can constitute a risk of
      replay attacks, but RFC supposes something similar (like time
      in seconds used as CSN).
      024c310b