lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20140225191602.GD9965@breakpoint.cc>
Date:	Tue, 25 Feb 2014 20:16:02 +0100
From:	Florian Westphal <fw@...len.de>
To:	Ben Hutchings <ben@...adent.org.uk>
Cc:	Fan Du <fan.du@...driver.com>,
	Steffen Klassert <steffen.klassert@...unet.com>,
	davem@...emloft.net, netdev@...r.kernel.org
Subject: Re: [PATCH net-next] xfrm: Correctly parse netlink msg from 32bits
 ip command on 64bits host

Ben Hutchings <ben@...adent.org.uk> wrote:
> > On 2014年02月20日 17:59, Steffen Klassert wrote:
> > > For now I think we should just refuse to do anything if someone tries
> > > to configure ipsec with 32 bit tools on a 64 bit machine.
> > 
> > I'm fine with your point, and it would be a good choice to inform user about
> > this behavior other than just creating non-working SA and SP for user.

It might be better to try to revive
http://thread.gmane.org/gmane.linux.network/157118/focus=157122

which adds full compat support.
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ