lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 20 Dec 2013 01:44:56 +0100 From: Hannes Frederic Sowa <hannes@...essinduktion.org> To: David Miller <davem@...emloft.net> Cc: johnwheffner@...il.com, netdev@...r.kernel.org, eric.dumazet@...il.com Subject: Re: [PATCH net-next] ipv4: introduce ip_dst_mtu_secure and protect forwarding path against pmtu spoofing On Thu, Dec 19, 2013 at 07:33:21PM -0500, David Miller wrote: > From: Hannes Frederic Sowa <hannes@...essinduktion.org> > Date: Fri, 20 Dec 2013 00:53:38 +0100 > > > I am fine dropping the knob and just unconditionally ignoring the > > pmtu data in the forwarding path? Is that what you wanted to > > suggest? > > Quite the contrary, I thought it was clear that I want the default to > be the current behavior. Ok, sorry for misinterpretation. I'll do so and will send the IPv6 one adopted as well, thanks! -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists