From mboxrd@z Thu Jan 1 00:00:00 1970 From: Patrick McHardy Subject: Re: Passive OS fingerprint xtables match. Date: Fri, 05 Jun 2009 15:30:13 +0200 Message-ID: <4A291DE5.9040802@trash.net> References: <20090604162212.GA24661@ioremap.net> <4A290767.6080202@trash.net> Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Cc: Evgeniy Polyakov , netdev@vger.kernel.org, David Miller , "Paul E. McKenney" , Netfilter Development Mailinglist To: Jan Engelhardt Return-path: Received: from stinky.trash.net ([213.144.137.162]:57970 "EHLO stinky.trash.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751088AbZFENaP (ORCPT ); Fri, 5 Jun 2009 09:30:15 -0400 In-Reply-To: Sender: netfilter-devel-owner@vger.kernel.org List-ID: Jan Engelhardt wrote: > On Friday 2009-06-05 13:54, Patrick McHardy wrote: > >>> + >>> + if (optsize > sizeof(opts)) >>> + optsize = sizeof(opts); >>> >> How can this happen? The doff field can only represent up to 40 >> bytes of option length. >> > > Forged packets? How would that increase the size of the doff field? :) >>> + printk(KERN_INFO "Started passive OS fingerprint matching module.\n"); >>> >> Please no messages on successful module load. Or at least >> not when statically built, but preferrably not at all. >> > > By that logic should not the messages-on-load for netfilter be removed? ;-) > I wouldn't care, but there's a difference between the main module printing a message and extensions printing a message.