lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 19 Mar 2007 17:02:25 +0100
From: Patrick McHardy <kaber@...sh.net>
To: Martin Schiller <mschiller@....de>
CC: netdev@...r.kernel.org,
'Netfilter Development Mailinglist'
<netfilter-devel@...ts.netfilter.org>
Subject: Re: [PATCH] NAT and requests to unrouted targets
Martin Schiller wrote:
> To be more exactly, it's the examination of
> "ct->tuplehash[dir].tuple.dst.u.all != ct->tuplehash[!dir].tuple.src.u.all"
> which is only be done if XFRM is configured. Since I don't need this anyway,
> I deactivated XFRM now and my "ping -I" is working now.
Could you try this patch (against current -git) with CONFIG_XFRM
enabled please?
View attachment "x" of type "text/plain" (1706 bytes)
Powered by blists - more mailing lists