lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <db81a9a20911270111j2ddaf967od3d7467e0295ba36@mail.gmail.com>
Date:	Fri, 27 Nov 2009 10:11:47 +0100
From:	Andreas Schultz <aschultz@...p10.net>
To:	KOVACS Krisztian <hidden@...abit.hu>
Cc:	tproxy@...ts.balabit.hu, netdev@...r.kernel.org,
	jamal <hadi@...erus.ca>
Subject: Re: [tproxy,regression] tproxy broken in 2.6.32

Hi,

On Fri, Nov 27, 2009 at 9:26 AM, KOVACS Krisztian <hidden@...abit.hu> wrote:
> Hi,
>
> On Thu, 2009-11-26 at 18:19 +0100, Andreas Schultz wrote:
>> Hi,
>>
>> git bisect shows that TPROXY has been broken by commit
>> f7c6fd2465d8e6f4f89c5d1262da10b4a6d499d0, [PATCH] net: Fix RPF to work
>> with policy routing
>>
>> I had a look at the patch, and it seems logical that this would break TPROXY.
>
> Indeed, that's a good catch. If this is indeed the problem you should be
> able to work it around by disabling rpfilter on the ingress interface.
> Does it work that way?

That was my first guess also. I disabled rp_filter on all interfaces
and it had no impact. So far, only reverting that patch has solved the
problem.

Andreas
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ