2002-10-30 23:57:31

by Marc-Christian Petersen

[permalink] [raw]
Subject: [ANNOUNCE] v2.2.22-2-secure // [PATCH | PATCHSET | FULLKERNEL]

Hi there,

I am proud to announce v2.2.22-2-secure. The well known -secure tree by me.
This release is almost a bugfixing release but also with some nice new
features like HTB3, QoS Backport from 2.4 etc. - See below. :-)

Since I do this kernel we've upgraded all our servers of our customers at my
company to this tree without any major or minor problems.
The servers vary from just beeing a mailserver for 5 workstations to highend
servers for ~ 3000 users beeing proxy-, smtp-, pop3-/imap-, file-, web-,
firewall-server and ipsec gate.


-> The intended purpose is for production/servers/firewalls <-


o indicates work by me
+ indicates work by users

Changes in 2.2.22-2-secure
--------------------------
o add: ALi 5451 gameport support
o add: QoS Backport from Linux v2.4.19 to v2.2.21
o add: rbtree 2.2.21-1
o add: HTB3.7 backported from 2.4.20pre11 to DS-9 on 2.2.21
o add: skb_realloc_headroom() panics when new headroom
is smaller than existing headroom.
+ fixed: aic7xxx (new) as a module
+ fixed: DEC Tsunami I2C interface just for ALPHA arch
+ fixed: compile af_packet (CONFIG_PACKET) as a module
o fixed: compile error if some MASQ settings are not set
o fixed: compile error if ext3fs was not selected
o update: 802.1d Ethernet Bridging v1.03
o update: Firewall for the ethernet bridge, using ipchains, v1.03
o update: Stealth Networking v2.2.22
o update: Openwall v2.2.22-ow1
o update: HAP for Openwall v2.2.22-ow1
o update: "Super" FreeS/WAN 1.98b includes:
X.509 0.9.14, Notify/Delete SA,
NAT Traversal 0.3 and ALG 0.8
o update: i2c v2.6.6-cvs-2002-10-23
o update: lmsensors v2.6.6-cvs-2002-10-23
o change: Network Devices reordered near to Networking Options


Changes in v2.2.22-1-secure
---------------------------
o add: Port/Socket Pseudo ACLs v2.2.21-14
o add: VM buffer tuning
o add: Etherdivert
o add: 802.1d Ethernet Bridging v1.02
o add: Firewall for the ethernet bridge, using ipchains v1.02
o add: IPsec masquerading with IPVS
o add: Compiler optimizations for new subarches
+ add: UserIP Accounting v0.9c-rc1
o update: Openwall v2.2.21-ow2
o update: HAP for Openwall v2.2.21-ow2
o update: i2c v2.6.4
o update: lm-sensors v2.6.4
o update: Tekram DC395 SCSI Controller Driver v1.41
o update: FreeS/WAN v1.97 + x.509 v0.9.12


Changes in 2.2.21-3-secure
--------------------------
o add: i2c v2.6.3
o add: lm-sensors v2.6.3
+ re-add: ReiserFS v3.5.35
+ add: ReiserFS v3.5.35 and ext3 v0.07a Coexistence Fix


Changes in 2.2.21-2-secure
--------------------------

o add: IDE Backport from 2.4.x (IDE-Ole) v2.2.21.05202002
o add: IP Virtual Server v1.08 for 2.2 Kernels
o add: Tekram DC395 SCSI Controller Driver v1.40
o update: Openwall and HAP to its newest Version
o removed: New IDE from Andre Hedrick in favor of IDE-Ole
o removed: ReiserFS Code


Changes in 2.2.21-1-secure
--------------------------
- Initial Release

o add: Openwall v2.2.20-ow1
o add: HAP for Openwall v2.2.20-ow1
o add: Stealth Networking
o add: RAID v2.2.20-raid 4 (Autodetect, Boot support (l/s) etc.
o add: Ext3 Filesystem Support v0.07a
o add: ReiserFS v3.5.35
o add: IFF Dynamic Patch
o add: PPPoE
o add: CryptoAPI (Kerneli) v2.2.18-3
o add: CIPE (Crypto IP Encapsulation)
o add: Extended Attributes and ACL for ext2 (EA v0.8.26/ACL v0.8.27)
o add: Some NIC Drivers:
- COMPEX-RL100a / Winbond-W89c840 PCI Ethernet
- Myson MTD803 PCI Ethernet
- National Semiconductor DP8381x series PCI Ethernet
- National Semiconductor DP8382x series PCI Ethernet
- Sundance ST201 "Alta" PCI Ethernet
o add: Adaptec AIC7xxx v6.2.4 Driver
o add: Most Patches of the AA-Kernel v2.2.21pre2aa2 tree
o add: MPPE v0.9.5
o add: BIGMEM (highmem) to allocate Memory >1GB
o add: USAGI v20020513-2.2.20
o add: BadRAM / BadMEM v2.2.19B
o add: FreeS/WAN v1.97
o add: New IDE from Andre Hedrick



Release Info:
-------------
Date : October, 31th, 2002
Time : 01:00 am CET
URL : http://sf.net/projects/wolk


md5sums:
--------
05db2c6743f7f1d62a44d690933e2f82
*linux-2.2.22-1-secure-to-2.2.22-2-secure.patch.bz2
24c28e9786eb03d3b88388fb42d1cf16
*linux-2.2.22-1-secure-to-2.2.22-2-secure.patch.gz
8a8b41286ab663923c1d576b982e73ab *linux-2.2.22-2-secure-fullkernel.tar.bz2
1c6e2fb974a953904faf34e5f6fbea3e *linux-2.2.22-2-secure-fullkernel.tar.gz
3e9ef836ddb1e8638762a13e7f5c80e0 *linux-2.2.22-2-secure-patchset.tar.bz2
19469742ea059658720aa48f0d9e3b72 *linux-2.2.22-2-secure-patchset.tar.gz
48b836108b9cce6b288b01615ff100be *linux-2.2.22-2-secure.patch.bz2
3890789a9b017bde8b6e29bbaa829320 *linux-2.2.22-2-secure.patch.gz
d41d8cd98f00b204e9800998ecf8427e *md5sums-2.2.22-2-secure


URL:
----
http://prdownloads.sf.net/wolk/linux-2.2.22-1-secure-to-2.2.22-2-secure.patch.bz2?download
http://prdownloads.sf.net/wolk/linux-2.2.22-1-secure-to-2.2.22-2-secure.patch.gz?download
http://prdownloads.sf.net/wolk/linux-2.2.22-2-secure-fullkernel.tar.bz2?download
http://prdownloads.sf.net/wolk/linux-2.2.22-2-secure-fullkernel.tar.gz?download
http://prdownloads.sf.net/wolk/linux-2.2.22-2-secure-patchset.tar.bz2?download
http://prdownloads.sf.net/wolk/linux-2.2.22-2-secure-patchset.tar.gz?download
http://prdownloads.sf.net/wolk/linux-2.2.22-2-secure.patch.bz2?download
http://prdownloads.sf.net/wolk/linux-2.2.22-2-secure.patch.gz?download


Thanks goes out to all the great developers who made this possible !!

Feedback welcome :) ... Have fun!


--
Kind regards
Marc-Christian Petersen

http://sourceforge.net/projects/wolk

PGP/GnuPG Key: 1024D/569DE2E3DB441A16
Fingerprint: 3469 0CF8 CA7E 0042 7824 080A 569D E2E3 DB44 1A16
Key available at http://www.keyserver.net. Encrypted e-mail preferred.



2002-10-31 07:22:32

by Roberto Nibali

[permalink] [raw]
Subject: Re: [ANNOUNCE] v2.2.22-2-secure // [PATCH | PATCHSET | FULLKERNEL]

Hello,


> Changes in v2.2.22-1-secure
> ---------------------------
> o add: Port/Socket Pseudo ACLs v2.2.21-14
> o add: VM buffer tuning
> o add: Etherdivert
> o add: 802.1d Ethernet Bridging v1.02
> o add: Firewall for the ethernet bridge, using ipchains v1.02
> o add: IPsec masquerading with IPVS

How can you have such a code in the 2.2.x kernel when we're not even
finished with its 2.5.x implementation in LVS? If you took the code from
ipvs-1.1.0 and backported it, I would believe it, but I doubt this is
possible. Care to clarify this entry?

Best regards,
Roberto Nibali, ratz
--
echo '[q]sa[ln0=aln256%Pln256/snlbx]sb3135071790101768542287578439snlbxq'|dc

2002-10-31 08:37:23

by Marc-Christian Petersen

[permalink] [raw]
Subject: Re: [ANNOUNCE] v2.2.22-2-secure // [PATCH | PATCHSET | FULLKERNEL]

On Thursday 31 October 2002 08:23, Roberto Nibali wrote:

Hi Roberto,

> > Changes in v2.2.22-1-secure
> > ---------------------------
> > o add: Port/Socket Pseudo ACLs v2.2.21-14
> > o add: VM buffer tuning
> > o add: Etherdivert
> > o add: 802.1d Ethernet Bridging v1.02
> > o add: Firewall for the ethernet bridge, using ipchains v1.02
> > o add: IPsec masquerading with IPVS
>
> How can you have such a code in the 2.2.x kernel when we're not even
> finished with its 2.5.x implementation in LVS? If you took the code from
> ipvs-1.1.0 and backported it, I would believe it, but I doubt this is
> possible. Care to clarify this entry?
args, you are right. Awfull typo :-( ... What I meant was:

http://www.impsec.org/linux/masquerade/ip_masq_vpn.html

Thnx for pointing!

--
Kind regards
Marc-Christian Petersen

http://sourceforge.net/projects/wolk

PGP/GnuPG Key: 1024D/569DE2E3DB441A16
Fingerprint: 3469 0CF8 CA7E 0042 7824 080A 569D E2E3 DB44 1A16
Key available at http://www.keyserver.net. Encrypted e-mail preferred.

2002-10-31 09:24:20

by Roberto Nibali

[permalink] [raw]
Subject: Re: [ANNOUNCE] v2.2.22-2-secure // [PATCH | PATCHSET | FULLKERNEL]

Hello Marc,

> args, you are right. Awfull typo :-( ... What I meant was:
> http://www.impsec.org/linux/masquerade/ip_masq_vpn.html

So then you would be referring to following patch, right?
http://bmrc.berkeley.edu/people/chaffee/patches/ip_masq_vpn-2.2.10-alpha.patch.gz

After a quick piercing glance at this patch I'm inclined to believe that
this breaks other things like LVS-NAT and possibly asymmetric routing.
While all of your patches are not likely to hit the vanilla 2.2.x kernel
you might want to warn people using WOLK in conjunction with LVS-NAT and
the cited patch above. YMMV of course and testing could prove me wrong.

Best regards,
Roberto Nibali, ratz

p.s.: I still haven't sent you my patches for the 2.2.x kernel ;)
--
echo '[q]sa[ln0=aln256%Pln256/snlbx]sb3135071790101768542287578439snlbxq'|dc