On Tue, 25 Sep 2012, Marcin Cieslak wrote:

> On Mon, 24 Sep 2012, Jon Trulson wrote:
>
>> If I read this right, the connection will only be rejected if a
>> request come in over IP6 - which should not be able to happen with
>> current CDE, right?
>
> Depending on your operating system + libc combination you may
> send an IPv4 connection to (x)inetd from the ToolTalk client
> and yet the daemon will receive a dualstack socket, because
> (x)inetd supports both. In FreeBSD's /etc/inetd.conf you can
> say "rpc/udp4" or something like that:
>
>     The protocol must be a valid protocol or ``unix''.  Examples are ``tcp''
>     or ``udp'', both of which imply IPv4 for backward compatibility.  The
>     names ``tcp4'' and ``udp4'' specify IPv4 only.  The names ``tcp6'' and
>     ``udp6'' specify IPv6 only.  The names ``tcp46'' and ``udp46'' specify
>     that the entry accepts both IPv4 and IPv6 connections via a wildcard
>     AF_INET6 socket.  Rpc based services are specified with the ``rpc/tcp''
>     or ``rpc/udp'' service type.  One can use specify IPv4 and/or IPv6 with
>     the 4, 6 or 46 suffix, for example ``rpc/tcp6'' or ``rpc/udp46''.  TCPMUX
>     services must use ``tcp'', ``tcp4'', ``tcp6'' or ``tcp46''.
>
> I guess that xinetd can do exactly the same. There is some
> heavy discussion about dual stack socket in the community,
> OpenBSD doesn't have them enabled (at least be default),
> FreeBSD can have them switched off using kernel tuning parameter (they
> are on by default).
>

According to what you posted above:

"Examples are ``tcp'' or ``udp'', both of which imply IPv4 for
  backward compatibility."

Since that is what is already there (udp and tcp), I think it is
fine the way it is.


-- 
Jon Trulson

The Higgs Field is what make atoms matter.
                 -- Tom L.



------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
cdesktopenv-devel mailing list
cdesktopenv-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/cdesktopenv-devel

Reply via email to