lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 12 Nov 2007 14:54:35 -0800 From: "Kok, Auke" <auke-jan.h.kok@...el.com> To: Chris Friesen <cfriesen@...tel.com> CC: David Miller <davem@...emloft.net>, kaber@...sh.net, joonwpark81@...il.com, netdev@...r.kernel.org, djohnson+linux-kernel@...starentnetworks.com, linux-kernel@...r.kernel.org, e1000-devel@...ts.sourceforge.net Subject: Re: [PATCH 2/2] [e1000 VLAN] Disable vlan hw accel when promiscuous mode Chris Friesen wrote: > David Miller wrote: > >> When you select VLAN, you by definition are asking for non-VLAN >> traffic to be elided. It is like plugging the ethernet cable >> into one switch or another. > > For max functionality it seems like the raw eth device should show > everything on the wire in promiscuous mode. > > If we want to sniff only the traffic for a specific vlan, we can sniff > the vlan device. actually the impact can be quite negative, imagine doing a tcpdump on a 10gig interface with vlan's enabled - all of a sudden you might accidentally flood the system with a 100-fold increase in traffic and force the stack to dump all those packets for you. I'm still very reluctant about this patch, I think the current situation is OK for everyone and offers everyone the possibility to do what they need, without hidden consequences. Auke - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists