lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 18 Jul 2007 12:16:56 +0300 (EEST) From: "Ilpo Järvinen" <ilpo.jarvinen@...sinki.fi> To: Sami Farin <safari-kernel@...ari.iki.fi> cc: Linux Networking Mailing List <netdev@...r.kernel.org>, Pasi Sarolahti <pasi.sarolahti@...ia.com> Subject: Re: Linux 2.6.22: Leak r=1 1 On Wed, 11 Jul 2007, Sami Farin wrote: > That's right, so descriptive is the new Linux kernel 2.6.22. > > Linux safari.finland.fbi 2.6.22-cfs-v19 #3 SMP Tue Jul 10 00:22:25 EEST 2007 i686 i686 i386 GNU/Linux > > [root@...ari /proc/sys/net/ipv4]# grep . * ...snip... > tcp_frto:1 ...This is fully unrelated to the issue but I'm a bit curious who enabled frto on your machine (since it's disabled by default), did you do it by yourself or the distribution perhaps? This is interesting because frto to be useful in large scale, sender must have it enabled and therefore it's usually not under control of the host that is attached to the wireless access link. ...In case some distribution (yours) is already enabling it, the deployment is somewhat proceeding already :-)... ...And we also get incremental testing of the code too... -- i. - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists