Return-Path: Subject: Re: [Bluez-devel] RFCOMM service level security testing From: Marcel Holtmann To: Stephen Crane Cc: BlueZ Mailing List In-Reply-To: <1099495689.3265.44.camel@baroque.rococosoft.com> References: <1099151759.16247.18.camel@pegasus> <1099433039.7125.13.camel@pegasus> <1099495689.3265.44.camel@baroque.rococosoft.com> Content-Type: text/plain Message-Id: <1099496238.6330.2.camel@notepaq> Mime-Version: 1.0 Sender: bluez-devel-admin@lists.sourceforge.net Errors-To: bluez-devel-admin@lists.sourceforge.net List-Unsubscribe: , List-Id: List-Post: List-Help: List-Subscribe: , List-Archive: Date: Wed, 03 Nov 2004 16:37:18 +0100 Hi Steve, > I've run our basic RFComm server-side security tests against 2.6.9-mh3 > and they all seem to pass (previously they'd all failed of course). Nice > work! thanks for testing and what do you think, should I put this feature into the next stable kernel? Another question is what should we do when the encryption on a link with RFCOMM_ENCRYPT is switched off? At the moment L2CAP keeps works, but in the RFCOMM layer I drop the connection by sending DM. Regards Marcel ------------------------------------------------------- This SF.Net email is sponsored by: Sybase ASE Linux Express Edition - download now for FREE LinuxWorld Reader's Choice Award Winner for best database on Linux. http://ads.osdn.com/?ad_id=5588&alloc_id=12065&op=click _______________________________________________ Bluez-devel mailing list Bluez-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/bluez-devel