X-Git-Url: http://git.samba.org/samba.git/?a=blobdiff_plain;f=README.hpux;h=6ebc58c063b9b78694755b2be519266bded67102;hb=c603589311c10347f2b0d562a21cb16a9e0b23ad;hp=211e3f57da8111b3f4dc7f6a7561d2ea4cc1a72c;hpb=76f7baeaf9c35ecc39b4924c8f78422e2fee2a39;p=obnox%2Fwireshark%2Fwip.git diff --git a/README.hpux b/README.hpux index 211e3f57da..6ebc58c063 100644 --- a/README.hpux +++ b/README.hpux @@ -1,11 +1,23 @@ +$Id: README.hpux,v 1.16 2002/03/11 02:12:41 guy Exp $ + +Contents: + +1 - Building ethereal +2 - Building GTK+/GLib with HP's C compiler +3 - nettl support +4 - libpcap on HP-UX +5 - HP-UX patches to fix packet capture problems + +1 - Building ethereal + The Software Porting And Archive Centre for HP-UX, at - http://hpux.csc.liv.ac.uk/ + http://hpux.connect.org.uk/ -(and with mirrors in various countries, listed on the Centre's home -page) has ported versions, in both source and binary form, for Ethereal, -as well as for the "libpcap", GLib, GTK+, "zlib", and CMU SNMP libraries -that it uses. +(with mirrors in various countries, listed on the Centre's home page; +you may want to choose a mirror closer to you) has ported versions, in +both source and binary form, for Ethereal, as well as for the libpcap, +GLib, GTK+, and zlib libraries that it uses. The changes they've made appear largely to be compile option changes; if you've downloaded the source to the latest version of Ethereal (the @@ -16,7 +28,284 @@ They appear to have used HP-UX's "cc" compiler, with the options "-Ae -O"; there's a comment "Add -Dhpux_9 if building under 9.X". It may also build with GCC. +They currently have libpcap 0.6.2; libpcap 0.6.2, and later versions, +include changes to properly open network devices when given the name +reported by the lanscan and ifconfig commands - earlier versions didn't +do this correctly. Therefore, we strongly suggest you use libpcap 0.6.2 +or later, not libpcap 0.5.2. + +2 - Building GTK+/GLib with HP's C compiler + +By default, HP's C compiler doesn't support "long long int" to provide +64-bit integral data types on 32-bit platforms; the "-Ae" flag must be +supplied to enable extensions such as that. + +Ethereal's "configure" script automatically includes that flag if it +detects that the native compiler is being used on HP-UX; however, the +configure scripts for GTK+ and GLib don't do so, which means that 64-bit +integer support won't be enabled. + +This may prevent some parts of Ethereal from compiling; in order to get +64-bit integer support in GTK+/GLib, edit all the Makefiles for GTK+ and +GLib, as generated by the GTK+ and GLib "configure" scripts, to add +"-Ae" to all "CFLAGS = " definitions found in those Makefiles. (If a +Makefile lacks a "CFLAGS = " definition, there's no need to add a +definition that includes "-Ae".) + +3 - nettl support + +nettl is used on HP-UX to trace various streams based subsystems. Ethereal +can read nettl files containing IP frames (NS_LS_IP subsystem) and LAPB +frames (SX25L2 subsystem). +It has been tested with files generated on HP-UX 9.04 and 10.20. + +Use the following commands to generate a trace (cf. nettl(1M)): + +# IP capture. 0x30000000 means PDU in and PDU out : +nettl -tn 0x30000000 -e NS_LS_IP -f tracefile +# X25 capture. You must specify an interface : +nettl -tn 0x30000000 -e SX25l2 -d /dev/x25_0 -f tracefile +# stop capture. subsystem is NS_LS_IP or SX25L2 : +nettl -tf -e subsystem + +One may be able to specify "-tn pduin pduout" rather than +"-tn 0x30000000"; the nettl man page for HP-UX 10.30 implies that it +should work. + +4 - libpcap on HP-UX + If you want to use Ethereal to capture packets, you will have to install -"libpcap"; the INSTALL file for "libpcap" has several comments about -HP-UX, which you should read if you're going to install and use -"libpcap" on HP-UX. +libpcap; binary distributions are, as noted above, available from the +Software Porting And Archive Centre for HP-UX, as well as source code. + +The source code is also available from the official home of libpcap and +tcpdump, at + + http://www.tcpdump.org/ + +if you want a version later than the version available from the Software +Porting And Archive Centre; however, the versions available from +tcpdump.org might not, for example, include support for building libpcap +as a shared library. + +5 - HP-UX patches to fix packet capture problems + +Note that packet-capture programs such as Ethereal/Tethereal or tcpdump +may, on HP-UX, not be able to see packets sent from the machine on which +they're running. Some articles on Deja.com discussing this are: + + http://www.deja.com/[ST_rn=ps]/getdoc.xp?AN=558092266 + +which says: + + Newsgroups: comp.sys.hp.hpux + Subject: Re: Did someone made tcpdump working on 10.20 ? + Date: 12/08/1999 + From: Lutz Jaenicke + + In article <82ks5i$5vc$1@news1.dti.ne.jp>, mtsat + wrote: + >Hello, + > + >I downloaded and compiled tcpdump3.4 a couple of week ago. I tried to use + >it, but I can only see incoming data, never outgoing. + >Someone (raj) explained me that a patch was missing, and that this patch + >must me "patched" (poked) in order to see outbound data in promiscuous mode. + >Many things to do .... So the question is : did someone has already this + >"ready to use" PHNE_**** patch ? + + Two things: + 1. You do need a late "LAN products cumulative patch" (e.g. PHNE_18173 + for s700/10.20). + 2. You must use +echo 'lanc_outbound_promisc_flag/W1' | /usr/bin/adb -w /stand/vmunix /dev/kmem + You can insert this e.g. into /sbin/init.d/lan + + Best regards, + Lutz + +and + + http://www.deja.com/[ST_rn=ps]/getdoc.xp?AN=586287166 + +which says: + + Newsgroups: comp.sys.hp.hpux + Subject: Re: tcpdump only shows incoming packets + Date: 02/15/2000 + From: Rick Jones + + Harald Skotnes wrote: + > I am running HPUX 11.0 on a C200 hanging on a 100Mb switch. I have + > compiled libpcap-0.4 an tcpdump-3.4 and it seems to work. But at a + > closer look I only get to see the incoming packets not the + > outgoing. I have tried tcpflow-0.12 which also uses libpcap and the + > same thing happens. Could someone please give me a hint on how to + > get this right? + + Search/Read the archives ?-) + + What you are seeing is expected, un-patched, behaviour for an HP-UX + system. On 11.00, you need to install the latest lancommon/DLPI + patches, and then the latest driver patch for the interface(s) in use. + At that point, a miracle happens and you should start seeing outbound + traffic. + +[That article also mentions the patch that appears below.] + +and + + http://www.deja.com/[ST_rn=ps]/getdoc.xp?AN=586494200 + +which says: + + Newsgroups: comp.sys.hp.hpux + Subject: Re: tcpdump only shows incoming packets + Date: 02/16/2000 + From: Harald Skotnes + + Rick Jones wrote: + + ... + + > What you are seeing is expected, un-patched, behaviour for an HP-UX + > system. On 11.00, you need to install the latest lancommon/DLPI + > patches, and then the latest driver patch for the interface(s) in + > use. At that point, a miracle happens and you should start seeing + > outbound traffic. + + Thanks a lot. I have this problem on several machines running HPUX + 10.20 and 11.00. The machines where patched up before y2k so did not + know what to think. Anyway I have now installed PHNE_19766, + PHNE_19826, PHNE_20008, PHNE_20735 on the C200 and now I can see the + outbound traffic too. Thanks again. + +Another posting: + + http://www.deja.com/[ST_rn=ps]/getdoc.xp?AN=457744130 + +indicates that you need to install the optional STREAMS product to do +captures on HP-UX 9.x: + + Newsgroups: comp.sys.hp.hpux + Subject: Re: tcpdump HP/UX 9.x + Date: 03/22/1999 + From: Rick Jones + + Dave Barr (barr@cis.ohio-state.edu) wrote: + : Has anyone ported tcpdump (or something similar) to HP/UX 9.x? + + I'm reasonably confident that any port of tcpdump to 9.X would require + the (then optional) STREAMS product. This would bring DLPI, which is + what one uses to access interfaces in promiscuous mode. + + I'm not sure that HP even sells the 9.X STREAMS product any longer, + since HP-UX 9.X is off the pricelist (well, maybe 9.10 for the old 68K + devices). + + Your best bet is to be up on 10.20 or better if that is at all + possible. If your hardware is supported by it, I'd go with HP-UX 11. + If you want to see the system's own outbound traffic, you'll never get + that functionality on 9.X, but it might happen at some point for 10.20 + and 11.X. + + rick jones + +(as per other messages cited here, the ability to see the system's own +outbound traffic did happen). + +An additional note, from Jost Martin, for HP-UX 10.20: + + Q: How do I get ethereral on HPUX to capture the _outgoing_ packets + of an interface + A: You need to get PHNE_20892,PHNE_20725 and PHCO_10947 (or + newer, this is as of 4.4.00) and its dependencies. Then you can + enable the feature as descibed below: + + Patch Name: PHNE_20892 + Patch Description: s700 10.20 PCI 100Base-T cumulative patch + To trace the outbound packets, please do the following + to turn on a global promiscuous switch before running + the promiscuous applications like snoop or tcpdump: + + adb -w /stand/vmunix /dev/mem + lanc_outbound_promisc_flag/W 1 + (adb will echo the result showing that the flag has + been changed) + $quit + (Thanks for this part to HP-support, Ratingen) + + The attached hack does this and some security-related stuff + (thanks to hildeb@www.stahl.bau.tu-bs.de (Ralf Hildebrandt) who + posted the security-part some time ago) + + <> + + (Don't switch IP-forwarding off, if you need it !) + Install the hack as /sbin/init.d/hacl_ip_stack (adjust + permissions !) and make a sequencing-symlink + /sbin/rc2.d/S350hack_ip_stack pointing to this script. + Now all this is done on every reboot. + +Here's the "hack_ip_stack" script: + +-----------------------------------Cut Here------------------------------------- +#!/sbin/sh +# +# nettune: hack kernel parms for safety + +OKAY=0 +ERROR=-1 + +# /usr/contrib/bin fuer nettune auf Pfad +PATH=/sbin:/usr/sbin:/usr/bin:/usr/contrib/bin +export PATH + + +########## +# main # +########## + +case $1 in + start_msg) + print "Tune IP-Stack for security" + exit $OKAY + ;; + + stop_msg) + print "This action is not applicable" + exit $OKAY + ;; + + stop) + exit $OKAY + ;; + + start) + ;; # fall through + + *) + print "USAGE: $0 {start_msg | stop_msg | start | stop}" >&2 + exit $ERROR + ;; + esac + +########### +# start # +########### + +# +# tcp-Sequence-Numbers nicht mehr inkrementieren sondern random +# Syn-Flood-Protection an +# ip_forwarding aus +# Source-Routing aus +# Ausgehende Packets an ethereal/tcpdump etc. + +/usr/contrib/bin/nettune -s tcp_random_seq 2 || exit $ERROR +/usr/contrib/bin/nettune -s hp_syn_protect 1 || exit $ERROR +/usr/contrib/bin/nettune -s ip_forwarding 0 || exit $ERROR +echo 'ip_block_source_routed/W1' | /usr/bin/adb -w /stand/vmunix /dev/kmem || exit $ERROR +echo 'lanc_outbound_promisc_flag/W 1' | adb -w /stand/vmunix /dev/mem || exit $ERROR + +exit $OKAY +-----------------------------------Cut Here-------------------------------------