Re: TCP MD5 Verification - 2.6.35.14

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, Jan 10, 2012 at 6:40 PM, Nitin Sharma <nitinics@xxxxxxxxx> wrote:
> Thanks.
>
> I have my kernel compiled with TCP_MD5SIG.
>
> [root@quagga2 ~]# uname -a
> Linux quagga2 2.6.35.14-106.49.amzn1.x86_64 #1 SMP Fri Dec 2 18:19:57 UTC
> 2011 x86_64 x86_64 x86_64 GNU/Linux
> [root@quagga2 ~]# grep MD5 /boot/config-2.6.35.14-106.49.amzn1.x86_64
> CONFIG_TCP_MD5SIG=y
> # CONFIG_SCTP_HMAC_MD5 is not set
> CONFIG_CRYPTO_MD5=y
>
> however, I get the following on tcpdump output.
>
> 17:32:35.031248 IP (tos 0xc0, ttl 255, id 4621, offset 0, flags [DF], proto
> TCP (6), length 72)
>     xxxxxxxxxx.37989 > xxxxxxxxxx.bgp: Flags [S], cksum 0x8cb0 (correct),
> seq 1652793081, win 5840, options [nop,nop,md5shared secret not supplied
> with -M, can't check - 34c5e4259ac630f773714efcd62cf420,mss
> 1460,nop,nop,sackOK,nop,wscale 6], length 0
>
> I wonder if i can disable tcp signature verification using sysctl or
> something alike, without recompiling?
>

Hmm, AFAIK there is a tcp sockopt to do this.

-- 
Thanks,
//richard

_______________________________________________
Kernelnewbies mailing list
Kernelnewbies@xxxxxxxxxxxxxxxxx
http://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies



[Index of Archives]     [Newbies FAQ]     [Linux Kernel Mentors]     [Linux Kernel Development]     [IETF Annouce]     [Git]     [Networking]     [Security]     [Bugtraq]     [Yosemite]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux SCSI]     [Linux ACPI]
  Powered by Linux