lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <f4845fc0809080303s53094205kc045e6003014cd24@mail.gmail.com>
Date:	Mon, 8 Sep 2008 12:03:04 +0200
From:	"Julius Volz" <juliusv@...gle.com>
To:	"Simon Horman" <horms@...ge.net.au>
Cc:	lvs-devel@...r.kernel.org, netdev@...r.kernel.org,
	"Siim Põder" <siim@...rad-teel.net>,
	"Julian Anastasov" <ja@....bg>,
	"Malcolm Turnbull" <malcolm@...dbalancer.org>,
	"Vince Busam" <vbusam@...gle.com>,
	"Herbert Xu" <herbert@...dor.apana.org.au>
Subject: Re: [rfc 0/3] IPVS: checksum updates

On Mon, Sep 8, 2008 at 4:04 AM, Simon Horman wrote:
> Hi,
>
> The impetus for this series of patches is Julian Anastasov noting
> that "load balance IPv4 connections from a local process" checks
> for 0 TCP checksums. Herbert Xu confirmed that this is not legal,
> even on loopback traffic, but that rather partial checksums are
> possible.
>
> The first patch in this series is a proposed solution to handle
> partial checksums for both TCP and UDP.
>
> The other two patches clean things up a bit.
>
> I have not tested this code beyond compilation yet.

After some first tests, remote connections are still working, but not
local ones from the director. The TCP handshake works and the
connection is established, but all following packets arriving at the
real server have an incorrect TCP checksum.

Btw., this happens both with and without this last series of patches,
so I can't get the local client feature working at all. Looking at it
further...

Julius

-- 
Julius Volz - Corporate Operations - SysOps

Google Switzerland GmbH - Identification No.: CH-020.4.028.116-1
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ