lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 7 Feb 2008 12:44:44 +0100 From: Ingo Molnar <mingo@...e.hu> To: Casey Schaufler <casey@...aufler-ca.com> Cc: David Miller <davem@...emloft.net>, linux-kernel@...r.kernel.org, netdev@...r.kernel.org, Linus Torvalds <torvalds@...ux-foundation.org> Subject: Re: [bisected] Re: [bug] networking broke, ssh: connect to port 22: Protocol error * Casey Schaufler <casey@...aufler-ca.com> wrote: > > So unlike some other security modules like SELINUX, enabling SMACK > > breaks un-aware userspace and breaks TCP networking? > > > > I dont think that's expected behavior - and i'd definitely like to > > enable SMACK in automated tests to check for regressions, etc. > > As Stephen mentions later, Smack uses CIPSO. sshd does not like any IP > options because of traceroute, and must be built with that check > disabled with the current Smack version. I have been looking at using > unlabeled packets for the "ambient" label, it appears that doing so > would make life simpler. I will get right on it. ok - feel free to send me any patches to test. Ingo -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists