OpenBSD Project Announces OpenBGPD 241
44BSD writes "As noted at undeadly, the OpenBSD Project has announced an BSD-licensed implementation of the Border Gateway Protocol, BGP. Project details, design goals, documentation, and more are at the project web site. BGP is documented in RFC 1771.
Lucky for Cisco, BSD is dying..."
BSD License (Score:5, Insightful)
Re:BSD License (Score:5, Insightful)
A default username/password pair is present in all releases of the Wireless LAN Solution Engine (WLSE) and Hosting Solution Engine (HSE) software. A user who logs in using this username has complete control of the device. This username cannot be disabled. There is no workaround.
Golly, if you had the source, you might be able to do something like... hmmm... I dunno... disable the default password, maybe?
Re:BSD License (Score:2, Insightful)
At least Cisco does not change the definition of "security hole" each time one is found on their routers.
Re:BSD License (Score:5, Informative)
This is not how OpenBSD works. There's only one place for official errata [openbsd.org], and these patches are published only after carefull scrutiny.
While you may be right for some Open Source projects, the OpenBSD team applies sound engineering techniques.
Re:BSD License (Score:5, Interesting)
Re:BSD License (Score:2, Informative)
You need to stop thinking in the low-quality terms that Linux has taught you. The BSDs are actually Open Source _and_ high quality.
Re:BSD License (Score:2, Informative)
On top of that, BGPd is far from being your average daemon, it only needs to talk to predefined peers with which you need to have a relationship (often in the form of a written contrat).
OpenBGPd has some stuff in place that allows for easy implementation of the crypto enabled BGP sessions. So if you implement authentified peering you could only be crashed by one of your peers, who usually have better things to d
Re:BSD License (Score:2)
THe fact that a service is only available to selected peers is in no way a guarantee that you are going to have less trouble with it security wise.
Re:BSD License (Score:5, Informative)
Of course, provided they learn to give proper credits. [feyrer.de]
Re:BSD License (Score:2, Insightful)
Like a comment on this board [freshmeat.net] pointed out, "Hubert's page [feyrer.de] shows portions of the scripts that are _character for character_ identical between g4u and g4l". And indeed, everybody can judge for themselves: I don't think the illicit ripoff can even be considered a debatable point.
What's particularly vile is the fact that the "author" of g4l (the ripo
Re:BSD License (Score:3, Interesting)
Well, OK, but I'd bet your life ;-)
Sorry, it's that time of year and I've got NMBC on my mind...
Throughput, Expansion Slots, Network Size, Market (Score:5, Insightful)
And, of course, you don't need to be running BGP on small networks--it's only when you've got a number of large networks joined together, at a chokepoint, where you need to use BGP to properly route traffic. So there's no point to it for small businesses with who might be trying to save money over a Cisco router--they don't need BRP.
I wonder, then: where is the market for this....?
Re:Throughput, Expansion Slots, Network Size, Mark (Score:5, Insightful)
This project could give a boost to manufacturers of competing kit by having a code base that it doesn't have to start from scratch and can be run on a minimal BSD distribution.
There's nothing to stop A.N.Other manufacturer creating their own arcitecture and running this ontop.
Re:Throughput, Expansion Slots, Network Size, Mark (Score:4, Insightful)
Re:Throughput, Expansion Slots, Network Size, Mark (Score:5, Insightful)
Re:Throughput, Expansion Slots, Network Size, Mark (Score:5, Insightful)
Perhaps when hackers start using the vulnerabilities in the BGP protocol to attack the Internet and those vulnerabilities are not found to be present or are fixed faster in the open BSD code, that'll justify the project's existence.
I mean we've already seen that open-source has fewer vulnerabilites than closed-source in general (Think I.I.S. vs Apache), so this will just become another way to secure the Internet.
Re:Throughput, Expansion Slots, Network Size, Mark (Score:4, Informative)
BGP by itself is meaningless. You need at least OSPF for a small network and ISIS for a large one to be able to use it and you need them in a form where the BGP knows everything about an OSPF or ISIS route.
Re:Throughput, Expansion Slots, Network Size, Mark (Score:2, Informative)
Not that it's *necessarily* a good idea, mind you. But it does make *some* things way easier.
Re:Throughput, Expansion Slots, Network Size, Mark (Score:2)
In btw, exchange points and load balancing are still more then enough to make a living off. And hopefully someone will at get an OSPF daemon working or get a good API to use this BGP daemon with a foreign OSPF implementation which lacks in terms of BGP.
Re:Throughput, Expansion Slots, Network Size, Mark (Score:5, Interesting)
Right now, you're absolutely right: doing this in a PC would cost as much as or more than a dedicated solution, especially when you factor in the infamous TCO. And as you say later, small networks have no need for this sort of thing. But again, in a few years it may be affordable to do this on commodity hardware. Once the enormous cost of big iron from Cisco et al. comes down, I think a lot of those small networks might just find needs. Especially if we get into the much-touted Internet of the Future where everything has an IP address.
Re:Throughput, Expansion Slots, Network Size, Mark (Score:3, Interesting)
That's the stupidest argument ever (Score:5, Insightful)
Yes, and a Boeing 747 can carry a hell of a lot more passengers than a Citroen CX. Guess which one is most cost-effective and works best for a 40-mile commute?
Re:That's the stupidest argument ever (Score:2)
Re:Throughput, Expansion Slots, Network Size, Mark (Score:4, Interesting)
Now small networks need BGP as well. It's the best way to have multiple redundant links to providers while running servers beyond mail. I have a small pile of clients some as small as a couple T1's running BGP between two providers.
Re:Throughput, Expansion Slots, Network Size, Mark (Score:2, Informative)
Re:Throughput, Expansion Slots, Network Size, Mark (Score:2, Informative)
Yes, a higher-end Cisco probably out performs my laptop running Open
Re:Throughput, Expansion Slots, Network Size, Mark (Score:5, Interesting)
Well, I believe that core Internet routers are about 1% of global router market, the rest of them rarely sees more than 100Mbit combined throughput on all WAN ports.
So, several good managed switches and couple of redundant routers on OpenBGPD would serve well over 90% of the market.
Robert
Re:Throughput, Expansion Slots, Network Size, Mark (Score:2, Informative)
Re:Throughput, Expansion Slots, Network Size, Mark (Score:2, Interesting)
Re:Throughput, Expansion Slots, Network Size, Mark (Score:4, Informative)
Re:Throughput, Expansion Slots, Network Size, Mark (Score:2)
How about a 32 lane PCI-E implementation with no lames or blinks devoted to Doom III? 40Gbps backplane, bidirectional.
http://arstechnica.com/articles/paedia/hardware
PCIe's bandwidth gains over PCI are considerable. A single lane is capable of transmitting 2.5Gbps in each direction, simultaneously.
Re:Throughput, Expansion Slots, Network Size, Mark (Score:2)
-matthew
No more Intel (Score:2, Informative)
FYI, buying from Intel is discouraged [theaimsgroup.com]
Re:No more Intel (Score:2)
Re:No more Intel (Score:2)
It's not based upon opinion, it based upon them not giving free access to things like firmware, which are necessary to operate the hardware.
Yes, and you are free to walk across picket lines too. You are free to buy from companies that run sweatshops. You are free to do many things, but that doesn't mean you should.
You're giving this guy an awful lot of crap, when the only thin
nice (Score:5, Interesting)
Doesn't compile on Linux (Score:3, Informative)
Re:Doesn't compile on Linux (Score:4, Funny)
Re:Doesn't compile on Linux (Score:4, Funny)
I'm running FreeBSD on the desktop, and I've only had trouble getting the following binaries to compile and run: GTK, Qt, Firefox, Java 1, Java 2, Java 5, gaim, xchat, evolution, mozilla, thunderbird, open office, koffice, gedit....garsh, I don't know what the parent poster is talking about, sheesh
.....at least xterm works! w00t!
Re:Doesn't compile on Linux (Score:2)
At home, I have a FreeBSD web/mail/DNS server that I use for personal domains and other lightweight purposes. I also had a Debian desktop that I used on the rare occasion that the wife and kids would let me play with it. Over the weekend, I decided that it made far more sense to consolidate the two than to maintain and power two similar underused computers.
It would've been a complete nightmare to move all the services over to Debian (since there w
Re:Doesn't compile on Linux (Score:2)
You think slavery is fun, huh? Which maintainers are you hiding exactly? I will report you!
Re:I feel your pain. Any suggestions... (Score:4, Insightful)
Another thing to be mindful of are Linuxisms, like /bin/sh being a link to /bin/bash; and, for that matter, all programs being in either /bin or /usr/bin. Everyone except Linux, more or less, puts stuff in /usr/local or /opt or God knows where else. So when writing scripts, set the interpreter as the actual interpreter: if you're using bashisms in your script, don't set the interpreter as /bin/sh. Don't put in any paths at all to the interpreter, either. Do #!/usr/bin/env bash instead, which will invoke the first bash on the caller's command line. That way you don't have to care if bash is in /bin/bash, /usr/bin/bash, /usr/local/bin/bash, or /opt/bin/bash. Or, in the case of qmail, /var/bash/bin/bash.
Re:I feel your pain. Any suggestions... (Score:4, Insightful)
It's not much better that people say "The X for Linux" (e.g. MPlayer) when it works just as well, sometimes better, on many other platforms, the BSDs being the closest but not only. Tip for devs: just because you wrote it on Linux doesn't mean it's FOR Linux. Linux is not the only platform that benefits from more software being written, and this should be credited. If it'll only work on POSIX-like platforms, "The X for POSIX" may sound less hype-worthy but at least it's accurate. Even so, it's better just to have "Another X" or "Yet Another X" (yacc, anyone?), since this is even more true these days, as most things people want have already been written at least once.
Open Source should be about sharing between its different platforms, not just with Linux then porting things to other systems as an afterthought. This is disgusting. Think of the quality products other systems have brought (just in this thread, for instance!) that are made properly portable because that's the Right thing to do, not out of sympathy for "those poor X users who don't have our superior layout and system calls" as Linux devs seem to take it very often.
(When I say 'X' I don't mean X11 or anything, I mean a general wildcard for any system/software name).
Re:I feel your pain. Any suggestions... (Score:2)
Thanks for the tipoff, and kudos to MPlayer devs. I love the software and now I can love the politics.
Re:I feel your pain. Any suggestions... (Score:2)
Re:Doesn't compile on Linux (Score:5, Informative)
Re:Doesn't compile on Linux (Score:3, Informative)
Re:Doesn't compile on Linux (Score:4, Insightful)
Re:Doesn't compile on Linux (Score:5, Informative)
Moreover, seeing BGP as a pure userland task ist far off reality. While that is technically speaking mostly true, you need a lot of kernel support. In fact, we did modify our kernel routing table structures to linder kvm pressure and thus fit a full-mesh table (> 140000 enties) into an GENERIC kernel. You need network stack modifications for tcp md5. The ipsec integration required changes to the IPsec kernel implementation as well as isakmpd - and there's more...
So, while strictly speaking bgpd is a userland thing, you need more than that for a BGP router. OpenBSD and OpenBGPD offer this.
That said, I am in no way opposed to a portable version. Just like for OpenNTPD I won't do it tho
henning
Re:Doesn't compile on Linux (Score:2, Insightful)
Re:Doesn't compile on Linux (Score:2)
Yes, and you really need your Pinnacle PCTV tuner to run on your BGPd router... Because you get your routing tables from channel 3, right?
I would say (Free)BSD is beating the tar out of Linux when it comes to network card support, being able to use NDIS drivers, supporting just about every network card on the planet almost immediately, and those drivers just plain being more stable. That's not even mentioning things like network (card)
Re:Doesn't compile on Linux (Score:4, Interesting)
But yeah, something like this does sound like a kernel task as much as user. But if Linux users now endorse udev, anything can happen. Personally I think it's a terrible idea but that's just me. Thank root Linux devs don't engineer security.
OpenBSD always seem to work out the Right Way for these things, they haven't failed at a project yet. Don't anybody bring up those flawed scalability benches, who really cares? If you want scalability, you know where to find it. OpenBSD brings practically flawless security and quality where they step, and they have pioneered a lot of development in security that has made modern unices what they are renowned for.
And yet, I've never run OpenBSD
Re:Doesn't compile on Linux (Score:5, Insightful)
I think it is a good choice for the OpenBSD cases. It allows development to be done at better development speed and with cleaner code than something trying to be completely portable. This makes it easier to track security and work with the code.
I'll also note that most software that is "portable" today is written using GNU autotools, which makes it, on average, less portable than software was before autoconf. Either it works at once (this happens reasonable often), or there is a significant amount of pain to make it work. Ten to fifteen years ago, there was usually some work involved, but the average was less, and it was spread out.
Separating the porting part from the initial clean codebase means that it is possible to debug them separately, and when autotools fails, it is easier to go around them.
Eivind.
Re:Doesn't compile on Linux (Score:2)
Whenever I read the occasional flamewar about the GNU autoconf/automake/libtool suite, some people will claim that portability ten to fifteen years ago was awful and the these tools are a god-send, even though my own experience differs. I still don't understand the modern need for these tools, when a solid POSIX makefile and well-conceived header files are easier to get working on various platf
Re:Doesn't compile on Linux (Score:3, Insightful)
When this is properly out of the oven, it'll be portable (or rather will have a gluey version) and it will be great. Every project OpenBSD devs un
OpenBSD projects (Score:5, Informative)
OpenSSH [openssh.org], who's box doesn't have this?
OpenNTPD [openntpd.org], a network time protocol daemon and server, recently released.
OpenBGPD [openbgpd.org], the border gateway protocol daemon.
They were pioneers in the use of stack protection software on the i386 platform (kernel and compiler), as well as privilage seperated daemons (it's in your sshd now), and randomized library linking locations.
(i think i'm missing a few, anyone care to fill them in?)
they have implemented (a far better implementation over the old one that they didn't write) their i.p. filter, PF (which has now made it into netbsd, freebsd, and hopefully linux soon enough). this includes INSANE [openbsd.org] amounts of configurability options, with integrated routing and traffic shaping.
many people grumble about how the project is run and its priorities. but we all benefit from their efforts. i think i'm going to buy a cd [openbsd.org] even though i am not an openbsd user. these sales help keep these projects going.
Re:OpenBSD projects (Score:3, Interesting)
From what I can gather from various NTP mailing lists, this is an SNTP-implementation, not an NTP-implementation. SNTP is just a subset of NTP, and not a fully functional NTP daemon.
If I'm not entirely mistaken, you're not allowed to join into the pool.ntp.org -pool if you're running OpenNTPD
Hope the OpenNTPD developers will address this and make the service fully compliant.
care to elaborate? (Score:2)
Re:care to elaborate? (Score:2, Interesting)
http://bradknowles.typepad.com/considered_harmful
And yes, I consider it nonsense, but rather than name calling, I'll happily share it and let you decide how not matching every feature of another program is "harmful". If you agree, don't run OpenNTPD. That simple.
Re:care to elaborate? (Score:3, Informative)
http://www.pool.ntp.org/#news [ntp.org]
see the "2004-09-07" entry.
Re:care to elaborate? (Score:4, Insightful)
Also I think the criticism about portability is not warranted. At the time that article was written OpenNTPD already supported Solaris (it was the 2nd target I did) and HP-UX support has since been added. I don't think it's valid to criticise a project that's only existed for a couple of months for "only" running on Linuxes, 4 *BSD's including OSX, and Solaris which covers the 3 main *nix families in use today (Linux, BSD, SysV). The split between OpenBSD and Portable is quite clean and the differences in the common code are small (~50 lines, the diff is in the Portable tarball).
The comment about clock disciplining is a fair point. Right now OpenBSD doesn't permit changing of tickadj at the default securelevel so another mechanism is needed in the kernel. In the mean time I've been experimenting with clock disciplining via Linux's adjtimex syscall [zip.com.au] (implemented with *zero* changes to the common code).
The comment about crypto depends on what your threat profile is. Relying on large crypto libraries means that you're less vulnerable to active attacks of the "make your clock wrong" type, possibly at the expense of being more vulnerable to attacks of the "0wnd ur b0x" type. Admittedly, in some cases (time sensitive authentications like Kerberos) the former may lead to the latter, but in many cases it can't.
Anyway, decide for yourself. You now have another option (which is why I embarked on -Portable in the first place).
Re:OpenBSD projects (Score:2, Informative)
If it is to run an app with the maximal buzzword compliance, ok, fine, go run ntp.org's ntpd, and enjoy it. No one is attempting to take it away from you.
If your goal is to have a clock set within any meaningful accuracies for normal people, openntpd is great. Most computers now are not running any kind of time sync program, and probably wander several seconds (or minutes) a day, assuming they were ever set within a minute or two in the first place.
WHY IN THE WORLD should OpenNTPD be b
Re:OpenBSD projects (Score:2)
ALWAYS buy the CD when on projects (Score:2, Insightful)
Hell, even if you spark up a mailserver in a pinch using downloaded ISOs, always go back and buy the damned box set later on. Make it a line item on your bill, include it in the budget, do whatever you have to do.
I have purchaced a fair amount of packaged CD sets from
Re:ALWAYS buy the CD when on projects (Score:2)
Personally if I like what I see of OpenBSD when I try it, I'll buy it anyway, my money or not. It's the kind of thing that is so great you feel good having the real set of, as opposed to Windows where you feel even having a 'free' (cough) CD provided by Dell or whoever is a waste of money manufacturing. Not that I'm bashing Windows per se, it has its uses, but the license of one key per 'owner'
Re:OpenBSD projects (Score:2)
I think interoperability flaws will have a more direct effect than those in openntp, so acceptance will be affected by any interopability flaws. With openntp (see the excellent stuff written by Brad) it basically boils down to 'your clock looks right, but there are flaws'. If you take an openbgpd router to talk on an internet exchange and it disagrees with other routers on exact bgp details, the effect can easily be 'all traffic' or 'no traffic'. Both
Go OpenBSD! (Score:5, Insightful)
Re:Go OpenBSD! (Score:2)
Just because I don't want to drive an 18-wheeler, doesn't mean I don't rely on their existence.
Cisco routers use PCI bus (Score:5, Informative)
The Cisco 3600 series *does* use PCI for its bus. Those two or four or six slots on a 36xx series are good ol' PCI, they're just in a Cisco form factor, not the Wintel PCI form factor you're used to seeing. I do believe this means every NM form factor slot is a PCI - 26xx, 28xx, 36xx, 37xx, 38xx, and some other stuff all use it.
Cisco uses PCI because its a fast, competent bus, with lots of inexpensive parts due to PC volume driving chipset costs. They get more out of an 80MHz MIPS processor in a 3620 than you get out of a 1GHz Athlon because the hardware is tuned to do nothing but move packets from point A to point B.
Re:Cisco routers use PCI bus (Score:2)
2. 72xxx is also PCI, once again with a different card form factor.
3. The performance has nothing to do with tuning. It has to do with offloading heavily to cards various functions like checksumming and a lot of layer2 work.
Re:Cisco routers use PCI bus (Score:3, Insightful)
a 1ghz athlon can forward >150k 64byte packets/sec. an opteron can do >550k/sec. this is commodity pc hardware, cheap and easy to come by.
i am quite certain a 3620 cannot do that.
also, if a part in your 3620 dies (power supply, etc) you are totally screwed unless you have a spare on-hand.
inexpensive parts huh. thats why an intel gigabit pci card costs $50 while a cisco NM-1FE-TX costs $1100? is the cisco card really 22 times better than the intel card?
not to mention you're fucked i
Re:Cisco routers use PCI bus (Score:2)
Cisco EOL is not an issue.
http://www.optimumdata.com
http://www.nhri.com
http://www.whirled-routers.com
http://www.quadr
and on and on and on and on
and
http://ebay.com
Re:Cisco routers use PCI bus (Score:2)
However EOL most certainly is an issue if a new sploit or bug is discovered. IOS for EOL'd ciscos wont be updated. This is already an issue for many Cisco models. You are well and truly fucked if you are stuck with one. Only option -- upgrade to a newer model. Suddenly, Cisco isnt so cost effective anymore.
nhri.com? quadrasource.com? you're quite sure about those URLs, are you?
Re:Cisco routers use PCI bus (Score:2)
Re:Cisco routers use PCI bus (Score:2)
PCs with free software are worlds of freedom. Embedded or otherwise 'specialty' hardware usually has less freedom and costs a ton more. Personally I don't want a router even though they're cheap and effective, because I like having complete control over my gateway (and being able to use it as an emergency internet client
But I think you're exaggerating the 'danger' of CISCO kits. Are they really going to tell you to go f*ck yourself if you ask for part replacement
Re:Cisco routers use PCI bus (Score:2)
Re:Cisco routers use PCI bus (Score:2)
Re:And no children need respond ... (Score:2)
I misspoke and I apologize. I said 'child' when I meant 'querulous binary Linux distribution fanboy'.
BSD might be dying, but not in this century, and it's kernel will be a much prettier corpse than anything to come out of kernel.org
Re:How about the 6500 series? (Score:2)
The 6500 has a 32 gig backplane and each slot is 32 gig. You used to add a switch fabric module to turn the backblane into a nonblocking crossbar switch with 256 gig of capacity. I think they now integrate that crossbar stuff in the newer engines, but its been a while since I touched one.
Yes, the PIX series is Wintel based. The older ones actually had an ATX mainboard you could upgrade, or you could convert the whole thing to a rackmount PC if you didn't mind drilling a keyboard hole in the case.
Why not work on a current project, I dont get it (Score:2, Troll)
Improving the architecture of say Quagga will be more beneficial and probably welcome than forking out your own. It would also keep the code portable while supporting rip, ospf isis etc. I'd love to see a secure version of Quagga for OpenBSD, sounds much better than an all OpenBSD suite.
Re:Why not work on a current project, I dont get i (Score:3, Informative)
There was a discussion on the misc@ list, and it basically came down to completely different priorities plus lots of OpenBSD specific hooks.
Re:Why not work on a current project, I dont get i (Score:5, Insightful)
They're unstable, incompatible, bloated, insecure, and quite importantly, virally bound to the GPL, which is most definately contrary to the BSD philosophy. PF was created (mainly) because the license was not acceptable.
To fix inherent problems, you almost always have to fork because of the incompatibilities. Plus, what advantage would it provide over starting from scratch? They're already screwed in the license department, since it's GPL'd.
What would you rather do... Build a house from the ground up, or take someone's completely trashed and poorly built house, and try to repair the entire thing? Often times, starting from scratch is the better option.
To you, but you aren't among the developers, so you get no say. They wanted something for BSD, just like they did with OpenSSH, just like they did with OpenNTPD, and PF.
If someone wants to put the effort into porting it, they can. If you want to import much of the code into Quagga, go right ahead. They see no benefit from doing that, though plenty of drawbacks for them, so they didn't do things that way.
<LICENSE_RANT>
I'd like to remind people that nothing has ever become a standard, with a GPL license attached to it. Things like TCP/IP, NFS, FTP, SMTP, DNS, all BSD (or even less restrictive) licensed, so others could actually use it, without having to sign the restrictive license that is the GPL. If nothing else, being BSD-licensed may give OpenBGPd a big audience of companies looking to integrate it.
Re:Why not work on a current project, I dont get i (Score:3, Interesting)
Look at the BSD tools versus GNU tools. They do fundamentally the same things, but GNU tools are usually tens of times larger because they do lots of things only one or two people alive would want. This means those one or two people find GNU tools more convenient, while the rest of us like being able to compile the whole *BSD world in 1 hour on a slow machine, wher
Reports of Cisco's Death... (Score:3, Interesting)
I case you really are stuck in 1987, Cisco does a couple more things than routing these days.
Why just a few weeks ago, I setup a multi-site network using Cisco switches and multiple VLAN's and I typed in the appropriate commands (yes, cryptic until you bother to learn) and it worked. No fuss, no troubleshooting, free documentation - this is why people buy Cisco..
Yes, they're market-dominant, yes, they're expensive (hint: buy refurb) and yes, they're into certifications and the like, but that doesn't make them Microsoft. Imagine if Microsoft made rock-solid products and wasn't always trying to screw the rest of the world.
Now, start setting up VOIP networks, dynamic VLAN's and fully-meshed WAN networks, stuff a dozen or more pieces in a rack, and you'll start to see that a PC with a FOSS OS isn't always the right answer.
Re:Reports of Cisco's Death... (Score:2)
What I would love would be an IOS or IOS clone that ran on common x86 hardware, becuase, as you note, Cisco HW is expensive, even if you do buy used/refurb.
I like HP better for access switches (Score:4, Interesting)
1) Cost. We could buy NEW HP layer 2 switches for the price of refurb/used Cisco l2 switches. And the HP kit comes with a product lifetime warranty.
2) Support cost. We're planning to replace our Cisco 12000 GSRs with Foundry or Juniper stuff. The maintenance contract cost alone justifies trashing the old equipment and buying new. WTF?
3) IOS/CatOS variety Ever read a nightmarish vulnerability alert and had to figure out if it applied to you? And if so, what you need to upgrade to? There are THOUSANDS of versions, most of which are described generically. And at least once I've been told that a fix was backported, so the version number didn't increment.
4) Usability - HP kicks their asses at the access switch level. It is much easier to set up a bunch of inter-tied VLANS. The syntax is clearer and cleaner. I think every config I've tried to do is easier on the HP family. We updated a bunch of equipment all at once, mostly one model (HP2524, with a few HP4108gl's). It may be that other members of the product line are lame.
I will grant that Cisco tech support is good, and their stuff is good. But there are definitely elements of "We're No. 1, so open your wallet"
Re:I like HP better for access switches (Score:2)
I agree with all of your points but this one is perplexing. I'm running 802.1Q VLAN trunking and the configuration is 2 lines on each of the trunked ports and 2, maybe 3 lines on each member port. How does HP improve?
I'm glad to hear there's good competition as my 3 biggest complaints with Cisco are Price, Price, Price. I already recommend other solutions where frequent updates/cont
Re:I like HP better for access switches (Score:5, Interesting)
on the HP, the command line to set ports 1,13, 22-24 for vlan 200 is:
config t (same as cisco)
vlan 200
untagged 1,13,22-24
All done. Imagine your joy setting this for 172 ports on a fairly typical HP4108gl, vs your misery doing it one port at a time on a cisco 3548. Probably should exit config mode and save, but that's not unique to HP. "Tag" is literally what vlan config does. If you are cisco-trunking (more than one vlan across a single physical link), the ethernet datagram gets a vlan tag to separate it from the 'native' vlan of the link. HP doesn't obfuscate that the way Cisco commands do.
switchport access native vlan foo
switchport trunk allowed vlan foo, bar
switchport trunk encapsulation dot1q
switchport trunk mode trunk
Plus pruning!
To make port 25 what cisco calls a trunk, and pass traffic for vlan 200 and 300 on it, vlan 200 native:
int vlan 200
untagged 25
int vlan 300
tagged 25
done. I've had some real problems getting the right config for a cisco switch to interoperate with the HP, but not vice-versa.
You can also use a text-based menu, and toggle the vlan state (untagged, no, forbid, tagged) for each port. You see them all side by side, and that helps make sure you got the config correct.
The cisco stuff just seemed crankier and less intuitive- on the cat2924, anyway, and to a lesser extent the 3548. I have two 3548s that will silently fail any vlan config commands - it accepts them, but no port behavior changes. Pending a catos update, they are basically netgears with a price tag.
I grant that it is a feature to offer vlan types besides dot1q, but not one I welcome.
Finally, on the higher end, we are burdened with VTP. I may be a luddite; I'm willing to grant that possibility for the sake of argument. But I hate automagic stuff like vtp. This just does not seem like the sort of thing we should trust our net infrastructure to work out as its whim dictates. This kind of thing just doesn't save enough sysadmin time to make up for the weird errors and such. And it's hard to turn vtp off.
This post took on a lecturing tone - sorry about that. I don't presume to have greater knowledge of cisco and vlan tech.
Oh - Snort rocks!
Microsoft soon to follow! (Score:2)
So I guess this now means Longhorn will support BGP.
Hopefully. (Score:2)
Short answer: hopefully. ;)
Longer answers: here [slashdot.org] and here [slashdot.org]
(..i'm starting to think that a bot could come in handy
--
Being able to read *other people's* source code is a nice thing, not a 'fundamental freedom'.
Re:Hopefully. (Score:2)
As Theo himself said, their security is our security, since every compromised machine on the net is yet another drone
Re:For a broader knowledge see also this (Score:3, Informative)
I ask out of curiosity more than anything else - Debian unstable and testing use Quagga instead of Zebra...
Re:For a broader knowledge see also this (Score:3, Interesting)
But since nobody is mentioning it... I thought GateD was a BGP routing thingie too, but I am not sure of that....
Re:luckily (Score:2, Insightful)
Re:luckily (Score:2)
Re:luckily (Score:2)
Nearly 2 Million Active Sites running FreeBSD (June 2003) [netcraft.com]
"[FreeBSD] is the only other operating system [besides Windows and Linux] that is gaining, rather than losing share of the active sites found by the Web Server Survey."
And these are the oh so wise things you uttered:
Re:luckily (Score:2)
Re:"BSD is dyning" (Score:5, Interesting)
The truth is, Linux and BSD are meant to coexist, but not for the same purposes. BSDs are meant as code bases that serve purposes really very well, cleanly and with dedication. They won't just accept "any patch that compiles" as has happened in Linux a lot. They're mostly there for the developers' ideas and needs, and usually users end up with the same needs.
On the other hand, Linux is meant to be the kernel for everyone, and this seems to be the case. It runs on just about everything (even if not in the mainline kernel) and it runs pretty well for the most part. The code base is not clean, but it is functional, which is what matters scientifically. It gets contribution from unspeakable numbers of developers and research and this shows - it has something it does much better than every other system (but yes, every other system has at least one thing it does much better than Linux).
Right now I run NetBSD because I wanted production machines I could stake my life on (still living). I use Linux on my laptop mostly because it has an NVidia card for which NetBSD drivers don't exist (or at least aren't easily downloadable
Matter of opinion though. These things change. Hell I dropped FreeBSD (see tag) after a long time of worshipping it, just because 5.3 has too many regressions to appeal to me.
Re:BDS (Score:2)
I'm guessing that the combination of OpenBGPD, OpenVPN, OpenSSH and Asterisk (running on BSD) are going to be a real ch
Re:BSD dying ??? (Score:2)