lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Mon, 15 Oct 2012 09:43:32 +0200
From:	Eric Dumazet <eric.dumazet@...il.com>
To:	Joe Perches <joe@...ches.com>
Cc:	Jan Hinnerk Stosch <janhinnerk.stosch@...il.com>,
	netdev@...r.kernel.org
Subject: Re: regression when connecting to ipv6 localhost

On Mon, 2012-10-15 at 09:39 +0200, Eric Dumazet wrote:

> So if you want to help, grab ntpd sources, reproduce the problem, make a
> bisection so that we have a clue of the kernel change that trigger the
> problem, and so on...
> 
> That would be really awesome, given Jan is not a kernel developer, we
> cannot really ask him to do this himself.
> 

And before you ask, on my machine, ntpd does listen to ::1, so I dont
have the problem. If I cant reproduce it, I probably wont fix the
problem.

...

ntpd    2964  ntp   16u     IPv4              17966      0t0     UDP *:ntp 
ntpd    2964  ntp   17u     IPv6              17967      0t0     UDP *:ntp 
ntpd    2964  ntp   18u     IPv4              17973      0t0     UDP 127.0.0.1:ntp 
ntpd    2964  ntp   19u     IPv4              17974      0t0     UDP 172.30.42.8:ntp 
ntpd    2964  ntp   20u     IPv6              17975      0t0     UDP [::1]:ntp 
ntpd    2964  ntp   21u     IPv6              17976      0t0     UDP [fe80::222:15ff:fe87:3ff6]:ntp 
ntpd    2964  ntp   22u  netlink                         0t0   17977 ROUTE


--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ