lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20070221171748.9b113f75.akpm@linux-foundation.org>
Date:	Wed, 21 Feb 2007 17:17:48 -0800
From:	Andrew Morton <akpm@...ux-foundation.org>
To:	netdev@...r.kernel.org
Cc:	"John W. Linville" <linville@...driver.com>,
	"bugme-daemon@...nel-bugs.osdl.org" 
	<bugme-daemon@...zilla.kernel.org>, ast@...dv.de, stable@...nel.org
Subject: Re: [Bugme-new] [Bug 8053] New:
 net/ieee80211/ieee80211_crypt_tkip.c spams kernel message buffer

On Wed, 21 Feb 2007 16:57:59 -0800
bugme-daemon@...zilla.kernel.org wrote:

> http://bugzilla.kernel.org/show_bug.cgi?id=8053
> 
>            Summary: net/ieee80211/ieee80211_crypt_tkip.c spams kernel
>                     message buffer
>     Kernel Version: 2.6.20.1
>             Status: NEW
>           Severity: high
>              Owner: networking_wireless@...nel-bugs.osdl.org
>          Submitter: ast@...dv.de
> 
> 
> As sent to lkml and netdev on 2007/02/07 without any reply:
> 
> net/ieee80211/ieee80211_crypt_tkip.c outputs tons of these which didn't
> happen with 2.6.18.2 (only one or two of these after enabling the
> ipw2200 with the kill switch):
> 
> TKIP: replay detected: STA=00:0e:2e:94:84:c3 previous TSC 020000000000
> received TSC 00000002e560
> printk: 19 messages suppressed.
> TKIP: replay detected: STA=00:0e:2e:94:84:c3 previous TSC 020000000000
> received TSC 00000002e574
> printk: 19 messages suppressed.
> TKIP: replay detected: STA=00:0e:2e:94:84:c3 previous TSC 020000000000
> received TSC 00000002e588
> printk: 18 messages suppressed.
> TKIP: replay detected: STA=00:0e:2e:94:84:c3 previous TSC 020000000000
> received TSC 00000002e59b
> printk: 19 messages suppressed.
> TKIP: replay detected: STA=00:0e:2e:94:84:c3 previous TSC 020000000000
> received TSC 00000002e5af
> printk: 19 messages suppressed.
> TKIP: replay detected: STA=00:0e:2e:94:84:c3 previous TSC 020000000000
> received TSC 00000002e5c3
> printk: 19 messages suppressed.
> TKIP: replay detected: STA=00:0e:2e:94:84:c3 previous TSC 020000000000
> received TSC 00000002e5d7
> printk: 19 messages suppressed.
> TKIP: replay detected: STA=00:0e:2e:94:84:c3 previous TSC 020000000000
> received TSC 00000002e5eb
> printk: 19 messages suppressed.
> TKIP: replay detected: STA=00:0e:2e:94:84:c3 previous TSC 020000000000
> received TSC 00000002e5ff
> printk: 16 messages suppressed.
> TKIP: replay detected: STA=00:0e:2e:94:84:c3 previous TSC 020000000000
> received TSC 00000002e612
> printk: 17 messages suppressed.
> TKIP: replay detected: STA=00:0e:2e:94:84:c3 previous TSC 020000000000
> received TSC 00000002e626
> 
> Note that the AP in question is a LCS-WA5-40 running in WPA/WPA2 mixed mode and
> that the client in uses:
> 
> proto=RSN
> pairwise=CCMP
> group=TKIP
> 

How rude.  Can we please get that message killed in both 2.6.21 and
2.6.20.x?

-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ