processed by
bonding, causing various havoc.
Just wanted to report that this patch solves a kernel oops on 2.6.17.11
while trying to change name of a VLAN device created on top of a bonding
one.
Thanks,
--
Pawel Foremski
[EMAIL PROTECTED]
--
VGER BF report: U 0.687767
-
To unsubscribe from
changes ... etc.
I'll only add to what Dawid has said that ccrypt has been designed for
direct P2P links, with single path (and no such switches on it's way).
Later it turned out to be applicable for eg. small (simple) LANs or
wireless ad-hoc networks.
Thanks for your remarks!
Bye,
--
Pawel Foremski
Stephen J. Bevan wrote:
Pawel Foremski writes:
Secondly, IPsec won't decrease MSS in TCP encapsulated in PPPoE
traffic, for example.
Various, commercial, IPsec products decrease the MSS for TCP
encapsulated in PPPoE. I've not checked the Linux 2.6 IPsec code to
see if it does
be encrypted and
some not. As I mentioned, we cannot influence the ISP in topic.
More generally, I wanted to present an example of a layer-2 encapsulation
that Linux does not know or (as in this case) can't modify the data in it,
thus it cannot fix the TCP MSS value.
--
Pawel Foremski
[EMAIL
ccrypt,
BTW.
--
Pawel Foremski
[EMAIL PROTECTED]
-
To unsubscribe from this list: send the line unsubscribe netdev in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html