xVM with Marvell Yukon Ethernet Driver

I have days problem with enabling my Marvell Yukon Ethernet Driver (in may case, I’m using 88E8056) working with Sun xVM VirtualBox and xVM in either Solaris 10 or Nevada B80/B93. I used driver comes from Marvell, I have test 2 versions of drivers, but no luck. All version, when I issued dladm show-dev command. it always indicate that the status is UNKNOWN.

After searching around just realize that xVM needs GLD v3 network drivers that is not provided by Marvell, this link is very useful for me, so I replicated from that site become newer version:

  • Obtain ON source here and extract it
  • Obtain driver source here (in this case I’m using version 2.6.1, or you can get newer version) and extract it
  • Make sure that skge (from Solaris/OpenSolaris Installer) or yukonx (from Marvell) were removed
  • Do this thing:

$ gzcat myk-2.6.1.tar.gz | tar xf -
$ cd myk-2.6.1
$ rm Makefile.config
$ ln -s Makefile.config_gld3 Makefile.config
$ vi Makefile.config

Edit the line like this (appropriate with your ON source extracted location):
ONUTSDIR = /root/Download/opensolaris/usr/src/uts

  • Build and install the driver (in this case I’m using GCC)

$ export PATH=$PATH:/usr/sfw/bin
$ gmake
$ su
# gmake install
# ./adddrv.sh
# dladm show-link
LINK CLASS MTU STATE OVER
myk0 phys 1500 up --

Now you can start your Sun xVM VirtualBox and xVM network bridge is working fine…

Me, OSUG in Jurnal Indonesia

Last week, suddenly I contacted by a girl that finally introduced her self as reporter from Jurnal Indonesia. It’s a nice conversation though. You can look at the news here:

http://jurnalnasional.com/?med=tambahan&sec=PROFIT&rbrk=&id=57860&detail=PROFIT

The lady’s name was reminding me to the Indonesia’s President’s doughter in law 🙂

Improving your Firefox Performance with HTTP/1.1 pipelining

There is a way to improve your Firefox browser performance with enabling HTTP/1.1 pipelining. Please refer to Firefox’s FAQ for further information about that. Please keep in mind that not all web servers are capable with this particular feature.

Here are step-by-step enabling http pipelining in your Firefox browser:

  • type about:config in your address bar
  • set network.http.pipelining become true
  • set network.http.proxy.pipelining become true (if you use proxy server)
  • set the valid integer number of network.http.pipelining.maxrequests, the value range is 1-8, the default value is 4.

Middle Mouse button in Firefox and Swiftweasel as “Paste”

Long time ago, back to 1980’s, X11 define that middle mouse button is paste, you can read the detail in here. As opposed to Microsoft standard uses middle mouse button as navigation key.

Firefox/Swiftweasel in Unix/Linux implemented the same nature of X11. If you have problem with this nature, you can simply disable the feature.

  • From your browser, put about:config in address bar
  • Search middlemouse.paste and change the value to false

Java Plugins for Browser in Hardy 64-bit

This link is very usefull to solve the issue:

http://ubuntuforums.org/showthread.php?t=202537&highlight=java

Sun Secure Global Desktop – Firewall Friendly

By default there are 4 ports that used by Sun Secure Global Desktop (SSGD) to communicate with clients.

  • 80 – SSGD web server
  • 443 – SSGD web server with SSL
  • 3144 – SSGD Server to SGD Client Device
  • 5307 – SSGD Server to SGD Client Device encrypted

Most all of firewalls configuration, only allow a few ports, and generally ports number 80 (http) and 443 (https) are usually opened.

We can configure SSGD that can only communicate using those 2 ports (80 and 443).

This blog entry is based on fatbloke’s blog entries.

I just wrap up both entres into single page 🙂

  1. Need an X.509 certificate, you can buy it from Certificate Authority (CA) or using self signed certificate for demo and test purpose
    # /opt/tarantella/bin/tarantella security certrequest \\
      --country US --state CA --orgname "Acme Widgets Ltd"
    # /opt/tarantella/bin/tarantella security selfsign
  2. Start SSGD in security mode:
    # /opt/tarantella/bin/tarantella security start
  3. Edit /opt/tarantella/webserver/apache/*/conf/httpd.conf
    Change this line:

    Listen 443

    to:

    Listen 127.0.0.1:443
  4. Set up SSGD to listen to port 443:
    # /opt/tarantella/bin/tarantella config edit \\
      --array-port-encrypted 443
  5. Tell SSGD where to send non-AIP traffic
    # /opt/tarantella/bin/tarantella config edit \\
      --security-firewallurl https://127.0.0.1:443
  6. Restart SSGD webserver in ssl mode
    # /opt/tarantella/bin/tarantella webserver \\
      restart --ssl
  7. Restart SSGD
    # /opt/tarantella/bin/tarantella restart