rfc2385 support
Mathias at TeleCity.com
Mathias at TeleCity.com
Wed Jun 1 06:59:11 PDT 2005
Hi Lee,
Running on FreeBSD 5.4 with latest ports collection.
How can i remove some compile options? The error is on OSPF btu I don't
need it. BGP is not reporting any errors.
I am getting the following errors:
root at rs1# make install clean
=============================================================
You can build quagga with the following options:
WITH_SNMP_4 Force net-snmp 4.x to be used
ENABLE_USER Specify user to run Quagga suite as
ENABLE_GROUP Specify group to run Quagga suite as
ENABLE_VTY_GROUP Specify group for vty socket ownership
SYSCONF_DIR Specify directory for Quagga configuration files
LOCALSTATE_DIR Specify directory for Quagga runtime files
The following options may be configured interactively:
WITH_PAM PAM authentication for vtysh
WITH_OSPF_NSSA NSSA support (RFC1587)
WITH_OSPF_OPAQUE_LSA OSPF Opaque-LSA with OSPFAPI support (RFC2370)
WITH_RTADV IPv6 Router Advertisements
WITH_SNMP SNMP support
WITH_TCPSOCKETS Use TCP/IP sockets for protocol daemons
WITH_TCPMD5 Use experimental MD5 patch for BGP
===> Vulnerability check disabled, database not found
===> Found saved configuration for quagga-0.98.3_2
===> Extracting for quagga-0.98.3_2
=> Checksum OK for quagga-0.98.3.tar.gz.
===> quagga-0.98.3_2 depends on file: /usr/local/bin/perl5.8.6 - found
===> Patching for quagga-0.98.3_2
===> quagga-0.98.3_2 depends on file: /usr/local/bin/perl5.8.6 - found
===> Applying extra patch
/usr/ports/net/quagga/files/extra-tcpmd5-patch-bgpd::bgp_network.c
===> Applying extra patch
/usr/ports/net/quagga/files/extra-tcpmd5-patch-bgpd::bgp_vty.c
===> Applying extra patch
/usr/ports/net/quagga/files/extra-tcpmd5-patch-bgpd::bgpd.c
===> Applying extra patch
/usr/ports/net/quagga/files/extra-tcpmd5-patch-bgpd::bgpd.h
===> Applying extra patch
/usr/ports/net/quagga/files/extra-tcpmd5-patch-configure.ac
===> Applying extra patch
/usr/ports/net/quagga/files/extra-tcpmd5-patch-lib::sockopt.c
===> Applying extra patch
/usr/ports/net/quagga/files/extra-tcpmd5-patch-lib::sockopt.h
===> Applying FreeBSD patches for quagga-0.98.3_2
1 out of 2 hunks failed--saving rejects to ospfd/ospf_lsa.c.rej
=> Patch patch-ospfd::ospf_lsa.c failed to apply cleanly.
=> Patch(es) patch-configure.ac applied cleanly.
*** Error code 1
Stop in /usr/ports/net/quagga.
________________________________
From: Lee Johnston [mailto:lee at wildcard.net.uk]
Sent: Sunday, May 29, 2005 12:50 PM
To: Mathias Kenfack-Tabakem (LON); freebsd-net at freebsd.org
Subject: Re: rfc2385 support
Hi Mathias,
I've managed to get Quagga + FreeBSD 4.x/5.x to establish BGP sessions
with Cisco routers with MD5 password authentication.
You'll need to ensure you build Quagga with MD5 support (the current
port gives you the option during build), compile your kernel with
relevant TCP_SIGNATURE and crypto support (options vary depending on if
your using 4.x/5.x), use setkey, and add the usual neighbor x.x.x.x
password yyyy to Quagga.
Let me know if you need any more info/help..
Regards,
Lee.
At 11:20 29/05/2005, Mathias at TeleCity.com wrote:
Hi guys,
I'm trying to find out if any release of FreeBSD supports MD5 as
per
rfc2385. I will be using it with quagga on BGP session
authentication.
Regards
Mathias,
______________________________________________________________________
DISCLAIMER
This e-mail is intended only for the use of the addressees named
above and may be confidential. If you are not an addressee you must not
use any information contained in nor copy it nor inform any person other
than TeleCity or the addressees of its existence or contents. If you
have received this e-mail in error, please contact the TeleCity IT
department on +44 (0) 161 232 3220 or by email at
techsupport at telecity.com. Internet communications cannot be guaranteed
100% secure, you should therefore take this potential lack of security
into consideration when emailing us as we do not accept legal
responsibility for the security of the contents of this or other emails.
Whilst TeleCity take measures to prevent any virus contamination of our
computer systems, recipients of emails should always ensure that they
take their own precautions to avoid virus contamination.
______________________________________________________________________
_______________________________________________
freebsd-net at freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to
"freebsd-net-unsubscribe at freebsd.org"
--
Lee @ Wildcard Internet
t: (0845) 165 1510
f: (0845) 165 1511
m: (07795) 423 617
e: lee at wildcard.net.uk
Web Development - Domains - Hosting - Co-location - Dedicated Servers
______________________________________________________________________
This footer denotes the email has been inbound scanned for Virus.
______________________________________________________________________
______________________________________________________________________
DISCLAIMER
This e-mail is intended only for the use of the addressees named above and may be confidential. If you are not an addressee you must not use any information contained in nor copy it nor inform any person other than TeleCity or the addressees of its existence or contents. If you have received this e-mail in error, please contact the TeleCity IT department on +44 (0) 161 232 3220 or by email at techsupport at telecity.com. Internet communications cannot be guaranteed 100% secure, you should therefore take this potential lack of security into consideration when emailing us as we do not accept legal responsibility for the security of the contents of this or other emails. Whilst TeleCity take measures to prevent any virus contamination of our computer systems, recipients of emails should always ensure that they take their own precautions to avoid virus contamination.
______________________________________________________________________
More information about the freebsd-net
mailing list