lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20121031135748.60a89df3@s6510.linuxnetplumber.net> Date: Wed, 31 Oct 2012 13:57:48 -0700 From: Stephen Hemminger <shemminger@...tta.com> To: Cong Wang <xiyou.wangcong@...il.com> Cc: netdev@...r.kernel.org Subject: Re: [PATCH net-next 3/8] bridge: implement BPDU blocking On Wed, 31 Oct 2012 02:38:46 +0000 (UTC) Cong Wang <xiyou.wangcong@...il.com> wrote: > On Tue, 30 Oct 2012 at 00:57 GMT, Stephen Hemminger <shemminger@...tta.com> wrote: > > --- a/net/bridge/br_stp_bpdu.c 2012-10-29 17:07:08.005982838 -0700 > > +++ b/net/bridge/br_stp_bpdu.c 2012-10-29 17:31:14.327457434 -0700 > > @@ -170,6 +170,13 @@ void br_stp_rcv(const struct stp_proto * > > if (!ether_addr_equal(dest, br->group_addr)) > > goto out; > > > > + if (p->flags & BR_BPDU_GUARD) { > > + br_notice(br, "BPDU received on blocked port %u(%s)\n", > > + (unsigned int) p->port_no, p->dev->name); > > net_ratelimit() ? > Not necessary since this causes port of bridge to become disabled; which blocks all further packets (including STP) until manually reset. -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists