On Fri, 2003-01-10 at 08:08, andrea.glorioso@binary-only.com wrote:
> The paper presented by Olaf Arkin (amongst other) points to some parts
> of the linux code where this "vulnerability" exists. I think Alan Cox
> is working on some patches for his tree. I wonder whether it's better
> to null-pad ethernet packets or to fill them with random values
> (possibly an overkill, but more resiliant against fingerprinting).
Most of them will pad with zero. We have a couple of drivers that already
pad with something along the lines of "NetBSD is a cool OS too.."
The -ac tree should have the problem fixed for all the drivers I know have
the problem or may do.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
This archive was generated by hypermail 2b29 : Wed Jan 15 2003 - 22:00:32 EST