lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4A9D04A2.60307@trash.net>
Date:	Tue, 01 Sep 2009 13:25:22 +0200
From:	Patrick McHardy <kaber@...sh.net>
To:	Mark Brown <broonie@...nsource.wolfsonmicro.com>
CC:	Andreas Jaggi <aj@...n.ch>,
	Jing Min Zhao <zhaojingmin@...rs.sourceforge.net>,
	netdev@...r.kernel.org
Subject: Re: H.245v10+ support in nf_conntrack_h323?

Mark Brown wrote:
> On Tue, Sep 01, 2009 at 11:29:10AM +0200, Andreas Jaggi wrote:
> 
>> The videoconferencing devices use version 10 of the H.245 protocol,
>> but nf_conntrack_h323 supports version 7 (according to the comments in
>> include/linux/nf_conntrack_h323.h).
> 
>> Are there any plans to include support for version 10 (or higher) of
>> H.245 in nf_conntrack_h323?

AFAIK Jing Min isn't able to do further development of the H.323 helper.

> I'd be surprised if the H.245 version were the source of your problems
> here - the new protocol versions are backwards compatible and I don't
> remember any changes in any of the stuff that's relevant for firewall
> transit.

Good point. The helper should also log packets dropped due to parsing
errors. If you don't get any messages, I'd suggest to use the iptables
TRACE target to figure out where the packets are dropped exactly.
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ