lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1348831592.5093.2251.camel@edumazet-glaptop>
Date:	Fri, 28 Sep 2012 13:26:32 +0200
From:	Eric Dumazet <eric.dumazet@...il.com>
To:	Chris Clayton <chris2553@...glemail.com>
Cc:	David Miller <davem@...emloft.net>, netdev@...r.kernel.org,
	gpiez@....de
Subject: Re: Possible networking regression in 3.6.0

On Fri, 2012-09-28 at 10:22 +0100, Chris Clayton wrote:

> No, the WinXP guest is configured with a fixed IP address 
> (192.168.200.1). Subnet mask is 255.255.255.0, and default gateway is 
> 192.168.200.254. DNS is 192.168.0.1.
> 

I have no problem with such a setup, with a linux guest.

Could you send again a tcpdump, but including link-level header ?
(option -e)

Ideally, you could send two traces, one taken on tap0, and another taken
on eth0.



--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ