Adolf Belka 12fbbc61e5 wio.pl: Fix bug 12799 - Remove code scanning for all potential IP's on RED interface
- The lines to scan the red interface were introduced at the time of a patch to remove
   the IPFire start/stop function from wio. These lines are not related to that change
   but were included in the patch with no commit message. The same lines were also added
   into wio.cgi in the same patch set but in that case the lines were all commented out.
- These lines look like they were most likely added to the code for investigation or
   debugging purposes. Looking at the lines in wio.pl the results obtained are not
   used elsewhere in wio for obtaining info on the status of the red interface. Deleting
   the lines did not affect anything related to the scanning, setup or monitoring of
   systems by wio.
- The lines were wasting space but generally not creating a huge impact on pertformance.
   On my production system it scans my red and comes up with a list of 1022 IP's because
   of the subnet my ISP uses - xxx.yy.216.0/20
- Scanning those 1022 IP's and sorting them takes my system about 3 seconds. Without
   sorting it is around the same level.
- In Bug#12799 the originator has an ISP that is using a private network that has a
   defined subnet of 10.0.0.0/8 This is 16,777,214 IP's to be scanned. Even without sorting
   my system would end up taking around 13 hours to do that. The bug originator found that
   on certain machines that he had IPFire on wio just never stopped scanning.
- As these lines just seem to collect a large amount of IP's on red that are not related
   to the actual running red IP, as there was no commit message related to their
   introduction and as removing the lines on vm's running dhcp and static red interfaces
   and also on my running production system for 4 weeks has shown no impact on the
   monitoring capability this patch is being submitted to remove these lines from wio

Fixes: Bug#12799
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
2022-04-18 21:12:21 +00:00
2022-04-18 21:11:32 +00:00
2022-03-21 13:47:58 +00:00
2022-04-18 21:11:32 +00:00
2022-04-08 00:32:40 +02:00
2021-03-10 14:42:37 +00:00
2022-04-10 10:13:28 +00:00
2022-03-21 13:47:58 +00:00

IPFire 2.x - The Open Source Firewall

What is IPFire?

IPFire is a hardened, versatile, state-of-the-art Open Source firewall based on Linux. Its ease of use, high performance in any scenario and extensibility make it usable for everyone. For a full list of features have a look here.

This repository contains the source code of IPFire 2.x which is used to build the whole distribution from scratch, since IPFire is not based on any other distribution.

Where can I get IPFire?

Just head over to https://www.ipfire.org/download

How do I use this software?

We have a long and detailed wiki located here which should answers most of your questions.

But I have some questions left. Where can I get support?

You can ask your question at our community located here. A complete list of our support channels can be found here.

How can I contribute?

We have another document for this. Please look here.

Description
No description provided
Readme 101 MiB
Languages
Perl 70.4%
Shell 23%
C 4%
Python 0.6%
Makefile 0.5%
Other 1.4%