[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <8f50f4e6-d815-46c3-be16-5b3c65a80b4f@arista.com>
Date: Mon, 8 Jan 2024 18:51:54 +0000
From: Dmitry Safonov <dima@...sta.com>
To: Christian Kujau <lists@...dbynature.de>
Cc: netdev@...r.kernel.org, Dmitry Safonov <0x7f454c46@...il.com>,
Francesco Ruggeri <fruggeri@...sta.com>,
Salam Noureddine <noureddine@...sta.com>, David Ahern <dsahern@...nel.org>,
linux-kernel@...r.kernel.org
Subject: Re: syslog spam: TCP segment has incorrect auth options set
On 1/7/24 19:27, Christian Kujau wrote:
> On Thu, 4 Jan 2024, Christian Kujau wrote:
>> On Thu, 4 Jan 2024, Dmitry Safonov wrote:
>>> Yeah, I guess it's possible to down the severity of these logs, but may
>>> be unexpected by admins: TCP-MD5 messages existed for long time and
>>> there may be userspace that expects them (i.e. in arista there are tests
>>> that look for these specific messages - those would be easy to fix, but
>>> there may be others outside this company).
>>
>> Understood, thanks for explaining that.
>>
>>> While thinking on the origin of your issue, it seems that the logs
>>> produced by either TCP-MD5 or TCP-AO are desired by a user when they
>>> add/use the authentication. Could you try this and see if that solves
>>> the issue for you?
>>
>> Thanks for preparing that patch so quickly, did not expect that :-)
>>
>> I've applied this on top of 6.7.0-rc8 and will report back if I see those
>> messages again in the next days.
>
> No messages so far, great!
>
> Tested-by: Christian Kujau <lists@...dbynature.de>
>
> Thanks again for fixing this so quickly,
Thank you for the report and the testing.
It's a bit late to add your tag, but on a good side the patch went in
v6.7 release, so you will not have to have any out-of-tree fix for
this :-)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4c8530dc7d7d
Thanks,
Dmitry
Powered by blists - more mailing lists