MOL 0.9.65 released

Bill Fink mol-general@lists.maconlinux.org
Sat, 7 Sep 2002 17:19:44 -0400


On Thu, 5 Sep 2002, Samuel wrote:

> MOL 0.9.65 is now (finally) available for download. The major new feature 
> in this release is the MacOS X support. Both 10.1 and 10.2 (Jaguar) 
> are supported.
> 
> To boot MacOS X, specify the OS X boot disk in /etc/mol/molrc.osx
> and start mol with the --osx switch.
> 
> The 0.9.65 release also contains improved support for remote X connections.
> In particular, colors will now be correctly displayed on little endian
> displays.

Hi Samuel,

I just tried out the new MacOS X support in MOL 0.9.65 and it's really
great (the happy penguin hugging the apple on boot is a nice touch)!!!

I'm having a problem however with the networking.  I don't use the
tun interface since I use a unique static IP address (different than
the Linux side) for MacOS.  I therefore specify:

	netdev:	eth0 -sheep

in the /etc/mol/molrc.net file (and commented out the tun netdev line).
Actually, I changed the section:

ifeq ${boot_type} newworld oldworld {	# Configure for MacOS only
	netdev:	eth0 -sheep
}

to:

ifeq ${boot_type} newworld oldworld osx {	# Configure for MacOS only
	netdev:	eth0 -sheep
}

To start with, everything works fine with MacOS 9.  But with MacOS X,
when I tried to use Internet Explorer, it wouldn't load any web pages.
I started up a terminal window and discovered that i was able to ping
everywhere just fine.  The problem came in when I tried to ping with
a larger packet size.  The largest ping size that would work was 160
bytes, which was an IP payload of 168 bytes, an IP datagram size of
188 bytes, and an Ethernet packet size of 202 bytes.  Increasing the
ping size to 161 bytes would fail.

I then got on another system, and did a tcpdump to collect the ping
packets from the MOL/MacOS-X system.  Here is the good packet trace
from the ping with a size of 160 bytes:

16:26:45.548279 0:30:65:eb:32:4a 0:60:8:32:ef:ff 0800 202: 192.168.7.21 > 192.168.7.1: icmp: echo request (ttl 255, id 488)
			 4500 00bc 01e8 0000 ff01 29f2 c0a8 0715
			 c0a8 0701 0800 1541 015a 0000 3d7a 6104
			 000c 85d1 0809 0a0b 0c0d 0e0f 1011 1213
			 1415 1617 1819 1a1b 1c1d 1e1f 2021 2223
			 2425 2627 2829 2a2b 2c2d 2e2f 3031 3233
			 3435 3637 3839 3a3b 3c3d 3e3f 4041 4243
			 4445 4647 4849 4a4b 4c4d 4e4f 5051 5253
			 5455 5657 5859 5a5b 5c5d 5e5f 6061 6263
			 6465 6667 6869 6a6b 6c6d 6e6f 7071 7273
			 7475 7677 7879 7a7b 7c7d 7e7f 8081 8283
			 8485 8687 8889 8a8b 8c8d 8e8f 9091 9293
			 9495 9697 9899 9a9b 9c9d 9e9f
16:26:45.548716 0:60:8:32:ef:ff 0:30:65:eb:32:4a 0800 202: 192.168.7.1 > 192.168.7.21: icmp: echo reply (ttl 255, id 13602)
			 4500 00bc 3522 0000 ff01 f6b7 c0a8 0701
			 c0a8 0715 0000 1d41 015a 0000 3d7a 6104
			 000c 85d1 0809 0a0b 0c0d 0e0f 1011 1213
			 1415 1617 1819 1a1b 1c1d 1e1f 2021 2223
			 2425 2627 2829 2a2b 2c2d 2e2f 3031 3233
			 3435 3637 3839 3a3b 3c3d 3e3f 4041 4243
			 4445 4647 4849 4a4b 4c4d 4e4f 5051 5253
			 5455 5657 5859 5a5b 5c5d 5e5f 6061 6263
			 6465 6667 6869 6a6b 6c6d 6e6f 7071 7273
			 7475 7677 7879 7a7b 7c7d 7e7f 8081 8283
			 8485 8687 8889 8a8b 8c8d 8e8f 9091 9293
			 9495 9697 9899 9a9b 9c9d 9e9f

But here is the packet trace from the failed ping (using a size of
161 bytes):

16:28:17.953765 0:30:65:eb:32:4a 0:60:8:32:ef:ff 0800 60: truncated-ip - 21799 bytes missing!85.85.85.85 > 85.85.85.85: (frag 21845:21825@43688) [tos 0x55] (ttl 85, bad cksum 5555!)
			 5555 5555 5555 5555 5555 5555 5555 5555
			 5555 5555 5555 5555 5555 5555 5555 5555
			 5555 5555 5555 5555 5555 5555 5555
16:28:17.953797 0:30:65:eb:32:4a 45:0:0:bd:1:ec c0a8 189: 
			 0715 c0a8 0701 0800 eb07 015b 0000 3d7a
			 6161 000c 0fac 0809 0a0b 0c0d 0e0f 1011
			 1213 1415 1617 1819 1a1b 1c1d 1e1f 2021
			 2223 2425 2627 2829 2a2b 2c2d 2e2f 3031
			 3233 3435 3637 3839 3a3b 3c3d 3e3f 4041
			 4243 4445 4647 4849 4a4b 4c4d 4e4f 5051
			 5253 5455 5657 5859 5a5b 5c5d 5e5f 6061
			 6263 6465 6667 6869 6a6b 6c6d 6e6f 7071
			 7273 7475 7677 7879 7a7b 7c7d 7e7f 8081
			 8283 8485 8687 8889 8a8b 8c8d 8e8f 9091
			 9293 9495 9697 9899 9a9b 9c9d 9e9f a0

As you can see, there's first a bogus 60 byte packet of all 5's.  This
is followed with what looks like basically the correct packet, but with
the first 14 bytes stripped off (which happens to be the size of the
Ethernet header).  Of course the receiving system doesn't know what
to make of this and will just drop it as a bogus packet.

Any ideas what might be wrong?  I'm hoping it's something easy to fix.

						-Thanks

						-Bill