[6571] in bugtraq
Re: Linux 2.0.33 vulnerability: oversized packets
daemon@ATHENA.MIT.EDU (Krzysztof G. Baranowski)
Wed Apr 22 04:23:35 1998
Date: Tue, 21 Apr 1998 18:07:09 +0200
Reply-To: "Krzysztof G. Baranowski" <kgb@MANJAK.KNM.ORG.PL>
From: "Krzysztof G. Baranowski" <kgb@MANJAK.KNM.ORG.PL>
X-To: Jon Lewis <jlewis@inorganic5.fdt.net>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To: <Pine.LNX.3.95.980421012129.1098P-100000@tarkin.fdt.net>
While testing the million monkey theory, Jon Lewis wrote:
>Rather than use NETDEBUG to totally disable the printk, I think it might
>be more useful to put in some code to limit frequency of reporting...sort
>of like Solar Designer's secure-linux patch's security_alert() function
>does.
You might want to backport net_ratelimit() from 2.1.x kernel and
use it to guard all those pesky printk()s in ip_fragment.c, icmp.c
and yadda yadda...
Regards,
Kris
--
Krzysztof G. Baranowski - President of the Harmless Manyacs' Club
"Smith & Wesson - The original point and click interface..."
http://www.knm.org.pl/ <prezes@manjak.knm.org.pl>