Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id ; Wed, 19 Feb 2003 19:47:26 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id ; Wed, 19 Feb 2003 19:47:26 -0500 Received: from tapu.f00f.org ([202.49.232.129]:56208 "EHLO tapu.f00f.org") by vger.kernel.org with ESMTP id ; Wed, 19 Feb 2003 19:47:25 -0500 Date: Wed, 19 Feb 2003 16:57:29 -0800 From: Chris Wedgwood To: "David S. Miller" Cc: Tom Lendacky , "Alexey N. Kuznetsov" , linux-kernel@vger.kernel.org Subject: Re: [PATCH] IPSec protocol application order Message-ID: <20030220005729.GA22880@f00f.org> References: <1045704729.14999.2.camel@rth.ninka.net> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1045704729.14999.2.camel@rth.ninka.net> User-Agent: Mutt/1.3.28i X-No-Archive: Yes Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 661 Lines: 16 On Wed, Feb 19, 2003 at 05:32:09PM -0800, David S. Miller wrote: > ... Do you suggest that the kernel or some other part of the system > should verify the packets sent through the RAW socket interface? > That is exactly what you are telling us that setkey should be doing. someone could patch setkey to warn if it's told to do something bogus, with optional command line switch to silence this or whatever --cw - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/