I don't know why this happens. Maybe it's a problem in binkd, maybe
it's a problem in a linux library...
Well, this is interesting:
ping 0.0.0.0
PING 0.0.0.0: 56 data bytes
64 bytes from 127.0.0.1: icmp_seq=0. time=0. ms
64 bytes from 192.168.1.21: icmp_seq=0. time=10. ms
64 bytes from 127.0.0.1: icmp_seq=1. time=0. ms
64 bytes from 192.168.1.21: icmp_seq=1. time=10. ms
64 bytes from 127.0.0.1: icmp_seq=2. time=0. ms
64 bytes from 192.168.1.21: icmp_seq=2. time=0. ms
My OS/2 computer has only one ip: 192.168.1.2.
192.168.1.21 is the address of my switch.
192.168.1.12 is the address of the router to the internet.
Well, this is interesting:
ping 0.0.0.0
PING 0.0.0.0: 56 data bytes
64 bytes from 127.0.0.1: icmp_seq=0. time=0. ms
64 bytes from 192.168.1.21: icmp_seq=0. time=10. ms
64 bytes from 127.0.0.1: icmp_seq=1. time=0. ms
64 bytes from 192.168.1.21: icmp_seq=1. time=10. ms
64 bytes from 127.0.0.1: icmp_seq=2. time=0. ms
64 bytes from 192.168.1.21: icmp_seq=2. time=0. ms
My OS/2 computer has only one ip: 192.168.1.2.
192.168.1.21 is the address of my switch.
192.168.1.12 is the address of the router to the internet.
ping 0.0.0.0
And I think binkd should treat it in the meaning of: "A way to
explicitly specify that the target is unavailable.", when it's
occuring for outbound connections.
And I think binkd should treat it in the meaning of: "A way to
explicitly specify that the target is unavailable.", when it's
occuring for outbound connections.
Maybe we need a blacklist option in binkd config, where the "0.0.0.0" should be entered by default...
Maybe we need a blacklist option in binkd config, where the
"0.0.0.0" should be entered by default...
A blacklist is a job for a firewall,
Maybe we need a blacklist option in binkd config, where the
"0.0.0.0" should be entered by default...
A blacklist is a job for a firewall,
Sure it is.
But how do you block outbound tcp to 0.0.0.0 ?
But how do you block outbound tcp to 0.0.0.0 ?
It would be trivial to "hard" code that into binkd...
But how do you block outbound tcp to 0.0.0.0 ?
It would be trivial to "hard" code that into binkd...
That was my first idea, but I don't like hardcodings...
But how do you block outbound tcp to 0.0.0.0 ?
It would be trivial to "hard" code that into binkd...
That was my first idea, but I don't like hardcodings...
0.0.0.0 is like a returned error code.
0.0.0.0 is like a returned error code.
Yes.
Also 127.0.0.x other than 127.0.0.1 may be a special case which shouldn't be called..
If you set a host offline at dyndns.com, it will get address 216.146.38.125. There's no binkd answering so it wont cause any harm.Maybe
some other dynamic dns provider may use 0.0.0.0 when the host is marked offline?
Anyway, a list of undialable ip's might be useful in some cases.
But you wouldn't get those from DNS, unless someone is specificly
f*cking with it...
But you wouldn't get those from DNS, unless someone is specificly
f*cking with it...
Which is exactly where this whole discussion started. ;)
Anyway, a list of undialable ip's might be useful in some cases.
I still think the firewall should take care of those!
Which is exactly where this whole discussion started. ;)
It started with 0.0.0.0. That doesn't seem to be intentional f*cking,
but maybe a documented way of saying "server unavailable"? ;)
Which is exactly where this whole discussion started. ;)
It started with 0.0.0.0. That doesn't seem to be intentional f*cking,
but maybe a documented way of saying "server unavailable"? ;)
Like what?
Like what?
*** Answering a msg posted in area 'European sysop's talks. '.
Wednesday January 13 2016 12:02, Wilfred van Velzen wrote to Benny Pedersen:
I don't know why this happens. Maybe it's a problem in binkd, maybe
it's a problem in a linux library...
Well, this is interesting:
ping 0.0.0.0
PING 0.0.0.0: 56 data bytes
64 bytes from 127.0.0.1: icmp_seq=0. time=0. ms
64 bytes from 192.168.1.21: icmp_seq=0. time=10. ms
64 bytes from 127.0.0.1: icmp_seq=1. time=0. ms
64 bytes from 192.168.1.21: icmp_seq=1. time=10. ms
64 bytes from 127.0.0.1: icmp_seq=2. time=0. ms
64 bytes from 192.168.1.21: icmp_seq=2. time=0. ms
My OS/2 computer has only one ip: 192.168.1.2.
192.168.1.21 is the address of my switch.
192.168.1.12 is the address of the router to the internet.
0.0.0.0 is the broadcast address, so every interface on the same
network segment answers, this is what should happen by design.
Maybe we need a blacklist option in binkd config, where the "0.0.0.0" should be entered by default...
A blacklist is a job for a firewall, you don't have to complicate
binkd with that...
That was my first idea, but I don't like hardcodings...
0.0.0.0 is like a returned error code. You should always hard code checks for those...
indeed, questions came from when i /etc/init.d/noip stop one whole
day, and my dynamic host returned 0.0.0.0, this should in binkd term
be signaling do not call, but all users here on my host started asking
me to solve there problem of dial broadcasting
0.0.0.0 is like a returned error code. You should always hard code
checks for those...
bravo, who will make ipv6 work ? :=)
Log message:
Auto increase patchlevel, set 1.1a-76
Check for "illegal" IP nrs 0.0.0.0 and [::] before trying to make a connection
What is wrong with IPv6, there are currently 42 systems using IPv6
and nearly all of them use Binkd.
i just wish i had it at home
and still miss qico updates :(
if binkd porting the ncurses queue manager then i can drop the qico problem
i just wish i had it at homeMove out of your little corner on Fyn.
and still miss qico updates :(
if binkd porting the ncurses queue manager then i can drop the qico
problem
If the queue managers gets its information from the files in the BSO directories, it should be possible.
Can't you just fillout the configuration file and run the queue
manager.
If the queue manager also activates qico, the you have to be
creative. ;)
I use ifstat from ifcico/ifmail and some
reformatting with sed in a timed loop by watch as a queue monitor.
qico supports protocols that binkd does not.
and0.0.0.0 is the broadcast address, so every interface on the same
network segment answers, this is what should happen by design.
indeed, questions came from when i /etc/init.d/noip stop one whole day,
my dynamic host returned 0.0.0.0,
this should in binkd term be signaling do not call, but all users here
on my host started asking me to solve there problem of dial
broadcasting
qico supports protocols that binkd does not.
if binkd would extend with emsi, then amiga is more supported :=)
on the other hands qico miss zlib bzib2
that's a fault in your dynamic host... they should have returned NXDOMAIN...
fix your dynamic host ;)
Ik think binkd was developed, because the developer did not likeand
emsi over IP, so it is not going to happen. Amiga is history just as DOS
OS/2. It is like vitage cars, there ane not going to be any new ones.
on the other hands qico miss zlib bzib2The compression is in the modem protocols it is written for.
Sysop: | digital man |
---|---|
Location: | Riverside County, California |
Users: | 1,034 |
Nodes: | 17 (0 / 17) |
Uptime: | 252:32:25 |
Calls: | 503,758 |
Calls today: | 7 |
Files: | 157,727 |
D/L today: |
2,767 files (333M bytes) |
Messages: | 443,727 |
Posted today: | 1 |