1. 06 11月, 2006 9 次提交
  2. 02 11月, 2006 4 次提交
  3. 01 11月, 2006 1 次提交
  4. 31 10月, 2006 19 次提交
  5. 26 10月, 2006 3 次提交
  6. 25 10月, 2006 4 次提交
    • P
      [CRYPTO] users: Select ECB/CBC where needed · bcbaecbb
      Patrick McHardy 提交于
      CRYPTO_MANAGER is selected automatically by CONFIG_ECB and CONFIG_CBC.
      
      config CRYPTO_ECB
              tristate "ECB support"
              select CRYPTO_BLKCIPHER
              select CRYPTO_MANAGER
      
      
      I've added CONFIG_ECB to the ones you mentioned and CONFIG_CBC to
      gssapi.
      Signed-off-by: NPatrick McHardy <kaber@trash.net>
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      bcbaecbb
    • G
      [DCCP]: Update documentation references. · 0e64e94e
      Gerrit Renker 提交于
      Updates the references to spec documents throughout the code, taking into
      account that
      
      * the DCCP, CCID 2, and CCID 3 drafts all became RFCs in March this year
      
      * RFC 1063 was obsoleted by RFC 1191
      
      * draft-ietf-tcpimpl-pmtud-0x.txt was published as an Informational
        RFC, RFC 2923 on 2000-09-22.
      
      All references verified.
      Signed-off-by: NGerrit Renker <gerrit@erg.abdn.ac.uk>
      Signed-off-by: NArnaldo Carvalho de Melo <acme@mandriva.com>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      0e64e94e
    • P
      [NETFILTER]: Fix ip6_tables extension header bypass bug · 6d381634
      Patrick McHardy 提交于
      As reported by Mark Dowd <Mark_Dowd@McAfee.com>, ip6_tables is susceptible
      to a fragmentation attack causing false negatives on extension header matches.
      
      When extension headers occur in the non-first fragment after the fragment
      header (possibly with an incorrect nexthdr value in the fragment header)
      a rule looking for this extension header will never match.
      
      Drop fragments that are at offset 0 and don't contain the final protocol
      header regardless of the ruleset, since this should not happen normally.
      Since all extension headers are before the protocol header this makes sure
      an extension header is either not present or in the first fragment, where
      we can properly parse it.
      
      With help from Yasuyuki KOZAKAI <yasuyuki.kozakai@toshiba.co.jp>.
      Signed-off-by: NPatrick McHardy <kaber@trash.net>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      6d381634
    • P
      [NETFILTER]: Fix ip6_tables protocol bypass bug · 51d8b1a6
      Patrick McHardy 提交于
      As reported by Mark Dowd <Mark_Dowd@McAfee.com>, ip6_tables is susceptible
      to a fragmentation attack causing false negatives on protocol matches.
      
      When the protocol header doesn't follow the fragment header immediately,
      the fragment header contains the protocol number of the next extension
      header. When the extension header and the protocol header are sent in
      a second fragment a rule like "ip6tables .. -p udp -j DROP" will never
      match.
      
      Drop fragments that are at offset 0 and don't contain the final protocol
      header regardless of the ruleset, since this should not happen normally.
      
      With help from Yasuyuki KOZAKAI <yasuyuki.kozakai@toshiba.co.jp>.
      Signed-off-by: NPatrick McHardy <kaber@trash.net>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      51d8b1a6