From mboxrd@z Thu Jan 1 00:00:00 1970 From: Stephen Hemminger Subject: Re: [RFC] bridge: STP timer management range checking Date: Sun, 31 Aug 2008 16:29:30 -0700 Message-ID: <48BB295A.6050200@vyatta.com> References: <48975BD3.6040709@shaw.ca> <20080807185802.GA16327@electric-eye.fr.zoreil.com> <20080831100537.6929c51e@extreme> <20080831104309.780cc01f@extreme> <20080831230247.76b5a193@lxorguk.ukuu.org.uk> Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Cc: Stephen Hemminger , David Miller , Dushan Tcholich , Francois Romieu , Robert Hancock , netdev@vger.kernel.org, LKML , bridge@lists.linux-foundation.org To: Alan Cox Return-path: Received: from mail.vyatta.com ([216.93.170.194]:41229 "EHLO mail.vyatta.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751773AbYHaX3Y (ORCPT ); Sun, 31 Aug 2008 19:29:24 -0400 In-Reply-To: <20080831230247.76b5a193@lxorguk.ukuu.org.uk> Sender: netdev-owner@vger.kernel.org List-ID: Alan Cox wrote: > On Sun, 31 Aug 2008 10:43:09 -0700 > Stephen Hemminger wrote: > > >> The Spanning Tree Protocol timers need to be set within certain boundaries >> to keep the internal protocol engine working, and to be interoperable. >> This patch restricts changes to those timers to the values defined in IEEE 802.1D >> specification. >> > > Why do we care ? You have to be the network administrator to set values, > there are cases you may want to be out of the spec and you are > privileged. The kernel does need to stop things being done which are > fatal but running around restricting privileged administrators who have > the ability to bring the network down anyway isn't its job. > > Seems bogus extra code to me - stops things working that should be > allowed too. > The timer configuration is propagated in network protocol, so misconfigured Linux box could survive but effect other devices on the network that are less robust. Maybe the small values would cause some other bridge to crash, go infinite loop, ... More likely robust devices might ignore our packets (because values out of range), leading to routing loops and other disasters. The kernel does need to stop administrative settings from taking out a network. If someone has a custom device or other non-standard usage, they can always rebuild the kernel and remove the range check.