1. 23 2月, 2013 1 次提交
  2. 19 2月, 2013 3 次提交
  3. 13 2月, 2013 2 次提交
  4. 06 2月, 2013 1 次提交
    • D
      ipvs: sctp: fix checksumming on snat and dnat handlers · 4b47bc9a
      Daniel Borkmann 提交于
      In our test lab, we have a simple SCTP client connecting to a SCTP
      server via an IPVS load balancer. On some machines, load balancing
      works, but on others the initial handshake just fails, thus no
      SCTP connection whatsoever can be established!
      
      We observed that the SCTP INIT-ACK handshake reply from the IPVS
      machine to the client had a correct IP checksum, but corrupt SCTP
      checksum when forwarded, thus on the client-side the packet was
      dropped and an intial handshake retriggered until all attempts
      run into the void.
      
      To fix this issue, this patch i) adds a missing CHECKSUM_UNNECESSARY
      after the full checksum (re-)calculation (as done in IPVS TCP and UDP
      code as well), ii) calculates the checksum in little-endian format
      (as fixed with the SCTP code in commit 4458f04c: sctp: Clean up sctp
      checksumming code) and iii) refactors duplicate checksum code into a
      common function. Tested by myself.
      Signed-off-by: NDaniel Borkmann <dborkman@redhat.com>
      Acked-by: NJulian Anastasov <ja@ssi.bg>
      Signed-off-by: NSimon Horman <horms@verge.net.au>
      4b47bc9a
  5. 05 2月, 2013 6 次提交
  6. 30 1月, 2013 1 次提交
  7. 28 1月, 2013 1 次提交
  8. 23 1月, 2013 12 次提交
  9. 21 1月, 2013 1 次提交
  10. 18 1月, 2013 5 次提交
  11. 13 1月, 2013 1 次提交
    • J
      netfilter: x_tables: print correct hook names for ARP · 5b76c494
      Jan Engelhardt 提交于
      arptables 0.0.4 (released on 10th Jan 2013) supports calling the
      CLASSIFY target, but on adding a rule to the wrong chain, the
      diagnostic is as follows:
      
      	# arptables -A INPUT -j CLASSIFY --set-class 0:0
      	arptables: Invalid argument
      	# dmesg | tail -n1
      	x_tables: arp_tables: CLASSIFY target: used from hooks
      	PREROUTING, but only usable from INPUT/FORWARD
      
      This is incorrect, since xt_CLASSIFY.c does specify
      (1 << NF_ARP_OUT) | (1 << NF_ARP_FORWARD).
      
      This patch corrects the x_tables diagnostic message to print the
      proper hook names for the NFPROTO_ARP case.
      
      Affects all kernels down to and including v2.6.31.
      Signed-off-by: NJan Engelhardt <jengelh@inai.de>
      Signed-off-by: NPablo Neira Ayuso <pablo@netfilter.org>
      5b76c494
  12. 12 1月, 2013 2 次提交
  13. 10 1月, 2013 1 次提交
  14. 05 1月, 2013 2 次提交
  15. 27 12月, 2012 1 次提交