PPPD crashes (SEGV) when the 'dump' or 'dryrun' options are specified and
an option defined internally as o_special with an option flag of
OPT_A2STRVAL is used. The crash occurs because the option value is not
saved when the parameter is processed, but is then referenced when printed.
Change list:
* Remove button info on GPIO12, there is no button there.
* Remove nvram mtd partition, as it's not used for anything, saves 64k for
user data.
Tested building for carambola2 target.
Signed-off-by: Mantas Pucka man...@8devices.com
---
Le mardi 15 juillet 2014 à 17:43 -0400, Justin Vallon a écrit :
I don't think turning off the firewall is a sane default.
I don't advise to turn it off for everything. I am trying to find a good
compromise.
Your
arguments based on global addressability are false because IPv4 can be
globally
On Tue, Jul 15, 2014 at 11:45:27AM -0400, Aaron Z wrote:
As I understand it, if a device on the inside of the network initiates
the connection to a device on the outside (say from a VOIP phone to a
VOIP server), return connections from the server are allowed.
Yes, this is exactly the role of a
+1 to all benjamin arguments,
default openwrt ipv4 firewall basically does:
* deny all unsolicited traffic coming from WAN to the router (i.e. it's
own host)
* masquerade the LAN hosts behind a single, scarce, ipv4 address, on
outgoing traffic.
* allow *any possible traffic* that involves LAN
adding more wood to baptiste fire... :)
On 16/07/14 06:15, Baptiste Jonglez wrote:
2/ Allow inbound traffic in the home gateway's firewall. In an
ideal world, this is the best solution, since it leaves all the
intelligence to end nodes (in accordance with the end-to-end
principle). In
Hi,
On Wed, Jul 16, 2014 at 08:41:50AM -0300, Gui Iribarren wrote:
then, what happens when those devices are deployed in a myriad of
real-world scenarios? hackers rejoice!
This actually is a somewhat moot arguments. Devices travel today, and
while your home network and office network might be
Le mercredi 16 juillet 2014 à 10:53 +0200, Benjamin Cama a écrit :
Well, if you didn't want them to be accessible, you have many
possibilities: bind it on some non-global address (LL, ULA), restrict it
locally (/etc/hosts.deny when appropriate, custom configuration that
limit access to some
On 14-07-16 08:09 AM, Gert Doering wrote:
Hi,
This actually is a somewhat moot arguments. Devices travel today, and
while your home network and office network might be behind a firewall,
the hotspot you're using while waiting for your train might not be.
So with todays devices, every device
On 16/07/14 12:09, Gert Doering wrote:
Hi,
On Wed, Jul 16, 2014 at 08:41:50AM -0300, Gui Iribarren wrote:
then, what happens when those devices are deployed in a myriad of
real-world scenarios? hackers rejoice!
This actually is a somewhat moot arguments. Devices travel today, and
while
my feedreader was used to fetch
https://dev.openwrt.org/log/trunk?limit=100mode=stop_on_copyformat=rss
but this stopped working around 13. july 13:00
why? what should i use now?
bastian
___
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
Hi Gui,
On Jul 16, 2014, at 20:10 , Gui Iribarren g...@altermundi.net wrote:
On 16/07/14 12:09, Gert Doering wrote:
Hi,
On Wed, Jul 16, 2014 at 08:41:50AM -0300, Gui Iribarren wrote:
then, what happens when those devices are deployed in a myriad of
real-world scenarios? hackers rejoice!
- Original Message -
On Wednesday, July 16, 2014 2:10:53 PM Gui Iribarren g...@altermundi.net
wrote:
Benjamin is giving some great examples of real-world scenarios where
an
default-open firewall simplifies administration,
and where a default-closed firewall would be not only
I'd like to chime in to this thread as someone who has spent a fair bit
of time supporting end users (primarily home and small office users)
setting up and using consumer grade routers.
All these routers today, of course, necessarily come NATted, meaning no
ports are open to the Internet.
Sorry for the earlier email, apparently I accidentally hit send rather than
save...
- Original Message -
On Wednesday, July 16, 2014 2:10:53 PM Gui Iribarren g...@altermundi.net
wrote:
Benjamin is giving some great examples of real-world scenarios where
an
default-open firewall
- Original Message -
On Wednesday, July 16, 2014 2:10:53 PM Gui Iribarren g...@altermundi.net
wrote:
Benjamin is giving some great examples of real-world scenarios where
an
default-open firewall simplifies administration,
and where a default-closed firewall would be not only
On 11 July 2014 10:04, Jo-Philipp Wich j...@openwrt.org wrote:
Thats due to the varnish cache, it strips all incoming cookies for
non-authenticated users.
Is there some chance to fix this, please?
--
Rafał
___
openwrt-devel mailing list
I created several new gstreamer module packages (v4l2 for example),
they update makefiles and add some patches.
But now I confused with paths, after update gstreamer was moved to
the oldpackages directory. Which path patch should contain ?
[...]
gstreamer is not available in github
A WARN_ON_ONCE() dump was triggered on a MT7620A based device with
following config. Ticket #17032 can be closed with this patch.
config wifi-iface
option device radio0
option network lan
option mode ap
option ssid
Hi,
On 14 July 2014 07:39, Yousong Zhou yszhou4t...@gmail.com wrote:
A WARN_ON_ONCE() dump was triggered on a MT7620A based device with
following config. Ticket #17032 can be closed with this patch.
There are other flaws I'd like to report here. With the same config,
station can see the SSID
20 matches
Mail list logo