Hi all,

is this still true for Ryu or is it fixed now:
  Incorrect message length: passed (work is not affected by malformed 
messages, ignores the messages without closing the connection)

Invalid OpenFlow version: passed (closes the connection with the switch 
upon receiving a message with invalid protocol version)

Incorrect OpenFlow message type: passed (ignores these messages)

Malformed PacketIn message: not passed (the controller tries to parse 
the message and closes the connection)

Ryu includes a firewall that can be controlled via the REST API

Are there any security benefits with Ryu?

Best regards,
Hakan


------------------------------------------------------------------------------
_______________________________________________
Ryu-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/ryu-devel

Reply via email to