Am 19.08.2014 12:57, schrieb Julian Kirsch:
Following up on this: I've updated the online version of the patch [0]
and also verified run-time functionality with CONFIG_TCP_MD5SIG
disabled. The logic of the code changed a bit but it's cleaner (and
smaller) now. No need to apply the updated version of the patch to your
kernels if you didn't encounter problems during compiling, though.

Thanks again for pointing me towards this issue, Alexander.

Thanks a lot for the feature itself and updating the patch.

I've just tested tcp_stealth using my version of the patch and quickly patched versions of openvpn and openssh. Worked like a charm. ;)

In regard to TCP_MD5SIG, I have it enabled on some machines too (Likely
because of some projects where BGP was involved, but who knows). So one of the two boxes I've used for the test had it enabled, the other didn't. The #ifdefs from patch seem to have been ok. But as already said, it was more or less a quick & dirty solution (I'm sometimes lazy) and I assume your changes are better.

Btw., I would like if your patch would end up in the kernel. I've just
found and read the thread from december. I will post a reply to the thread.

Regards,

Alexander Holler

_______________________________________________
GNUnet-developers mailing list
[email protected]
https://lists.gnu.org/mailman/listinfo/gnunet-developers

Reply via email to