* [nft PATCH] ct: add support for setting ct mark
@ 2014-03-12 18:03 Arturo Borrero Gonzalez
2014-03-12 21:36 ` Kristian Evensen
2014-03-13 13:17 ` Pablo Neira Ayuso
0 siblings, 2 replies; 3+ messages in thread
From: Arturo Borrero Gonzalez @ 2014-03-12 18:03 UTC (permalink / raw)
To: netfilter-devel; +Cc: pablo
This patch adds the possibility to set ct keys using nft. Currently, the
connection mark is supported. This functionality enables creating rules
performing the same action as iptables -j CONNMARK --save-mark. For example:
table ip filter {
chain postrouting {
type filter hook postrouting priority 0;
ip protocol icmp ip daddr 8.8.8.8 ct mark set meta mark
}
}
My patch is based on the original http://patchwork.ozlabs.org/patch/307677/
by Kristian Evensen <kristian.evensen@gmail.com>.
I simply did a rebase and some testing. To test, I added rules like these:
counter meta mark set 1 counter
counter ct mark set mark counter
counter ct mark 1 counter
The last matching worked as expected, which means the second rule is also
working as expected.
Signed-off-by: Arturo Borrero Gonzalez <arturo.borrero.glez@gmail.com>
---
include/statement.h | 14 ++++++++++++++
src/ct.c | 25 +++++++++++++++++++++++++
src/evaluate.c | 11 +++++++++++
src/netlink_delinearize.c | 38 +++++++++++++++++++++++++++++++++++---
src/netlink_linearize.c | 18 ++++++++++++++++++
src/parser.y | 9 +++++++++
6 files changed, 112 insertions(+), 3 deletions(-)
diff --git a/include/statement.h b/include/statement.h
index 14a66df..896b972 100644
--- a/include/statement.h
+++ b/include/statement.h
@@ -67,6 +67,17 @@ struct queue_stmt {
extern struct stmt *queue_stmt_alloc(const struct location *loc);
+#include <ct.h>
+struct ct_stmt {
+ enum nft_ct_keys key;
+ const struct ct_template *tmpl;
+ struct expr *expr;
+};
+
+extern struct stmt *ct_stmt_alloc(const struct location *loc,
+ enum nft_ct_keys key,
+ struct expr *expr);
+
/**
* enum stmt_types - statement types
*
@@ -80,6 +91,7 @@ extern struct stmt *queue_stmt_alloc(const struct location *loc);
* @STMT_REJECT: REJECT statement
* @STMT_NAT: NAT statement
* @STMT_QUEUE: QUEUE statement
+ * @STMT_CT: conntrack statement
*/
enum stmt_types {
STMT_INVALID,
@@ -92,6 +104,7 @@ enum stmt_types {
STMT_REJECT,
STMT_NAT,
STMT_QUEUE,
+ STMT_CT,
};
/**
@@ -138,6 +151,7 @@ struct stmt {
struct reject_stmt reject;
struct nat_stmt nat;
struct queue_stmt queue;
+ struct ct_stmt ct;
};
};
diff --git a/src/ct.c b/src/ct.c
index a27621e..30639b2 100644
--- a/src/ct.c
+++ b/src/ct.c
@@ -27,6 +27,7 @@
#include <ct.h>
#include <gmputil.h>
#include <utils.h>
+#include <statement.h>
static const struct symbol_table ct_state_tbl = {
.symbols = {
@@ -290,6 +291,30 @@ void ct_expr_update_type(struct proto_ctx *ctx, struct expr *expr)
}
}
+static void ct_stmt_print(const struct stmt *stmt)
+{
+ printf("ct %s set ", ct_templates[stmt->ct.key].token);
+ expr_print(stmt->ct.expr);
+}
+
+static const struct stmt_ops ct_stmt_ops = {
+ .type = STMT_CT,
+ .name = "ct",
+ .print = ct_stmt_print,
+};
+
+struct stmt *ct_stmt_alloc(const struct location *loc, enum nft_ct_keys key,
+ struct expr *expr)
+{
+ struct stmt *stmt;
+
+ stmt = stmt_alloc(loc, &ct_stmt_ops);
+ stmt->ct.key = key;
+ stmt->ct.tmpl = &ct_templates[key];
+ stmt->ct.expr = expr;
+ return stmt;
+}
+
static void __init ct_init(void)
{
datatype_register(&ct_state_type);
diff --git a/src/evaluate.c b/src/evaluate.c
index fff8fef..dc4406c 100644
--- a/src/evaluate.c
+++ b/src/evaluate.c
@@ -1170,6 +1170,15 @@ static int stmt_evaluate_nat(struct eval_ctx *ctx, struct stmt *stmt)
return 0;
}
+static int stmt_evaluate_ct(struct eval_ctx *ctx, struct stmt *stmt)
+{
+ expr_set_context(&ctx->ectx, stmt->ct.tmpl->dtype,
+ stmt->ct.tmpl->len);
+ if (expr_evaluate(ctx, &stmt->ct.expr) < 0)
+ return -1;
+ return 0;
+}
+
static int stmt_evaluate(struct eval_ctx *ctx, struct stmt *stmt)
{
#ifdef DEBUG
@@ -1197,6 +1206,8 @@ static int stmt_evaluate(struct eval_ctx *ctx, struct stmt *stmt)
return stmt_evaluate_nat(ctx, stmt);
case STMT_QUEUE:
return 0;
+ case STMT_CT:
+ return stmt_evaluate_ct(ctx, stmt);
default:
BUG("unknown statement type %s\n", stmt->ops->name);
}
diff --git a/src/netlink_delinearize.c b/src/netlink_delinearize.c
index ca72091..62cbf0e 100644
--- a/src/netlink_delinearize.c
+++ b/src/netlink_delinearize.c
@@ -365,9 +365,27 @@ static void netlink_parse_meta(struct netlink_parse_ctx *ctx,
netlink_parse_meta_sreg(ctx, loc, nle);
}
-static void netlink_parse_ct(struct netlink_parse_ctx *ctx,
- const struct location *loc,
- const struct nft_rule_expr *nle)
+static void netlink_parse_ct_sreg(struct netlink_parse_ctx *ctx,
+ const struct location *loc,
+ const struct nft_rule_expr *nle)
+{
+ struct stmt *stmt;
+ struct expr *expr;
+
+ expr = netlink_get_register(ctx, loc,
+ nft_rule_expr_get_u32(nle,
+ NFT_EXPR_CT_SREG));
+ stmt = ct_stmt_alloc(loc,
+ nft_rule_expr_get_u32(nle, NFT_EXPR_CT_KEY),
+ expr);
+ expr_set_type(expr, stmt->ct.tmpl->dtype, stmt->ct.tmpl->byteorder);
+
+ list_add_tail(&stmt->list, &ctx->rule->stmts);
+}
+
+static void netlink_parse_ct_dreg(struct netlink_parse_ctx *ctx,
+ const struct location *loc,
+ const struct nft_rule_expr *nle)
{
struct expr *expr;
@@ -377,6 +395,16 @@ static void netlink_parse_ct(struct netlink_parse_ctx *ctx,
expr);
}
+static void netlink_parse_ct(struct netlink_parse_ctx *ctx,
+ const struct location *loc,
+ const struct nft_rule_expr *nle)
+{
+ if (nft_rule_expr_is_set(nle, NFT_EXPR_CT_DREG))
+ netlink_parse_ct_dreg(ctx, loc, nle);
+ else
+ netlink_parse_ct_sreg(ctx, loc, nle);
+}
+
static void netlink_parse_counter(struct netlink_parse_ctx *ctx,
const struct location *loc,
const struct nft_rule_expr *nle)
@@ -858,6 +886,10 @@ static void rule_parse_postprocess(struct netlink_parse_ctx *ctx, struct rule *r
if (stmt->meta.expr != NULL)
expr_postprocess(&rctx, stmt, &stmt->meta.expr);
break;
+ case STMT_CT:
+ if (stmt->ct.expr != NULL)
+ expr_postprocess(&rctx, stmt, &stmt->ct.expr);
+ break;
case STMT_NAT:
if (stmt->nat.addr != NULL)
expr_postprocess(&rctx, stmt, &stmt->nat.addr);
diff --git a/src/netlink_linearize.c b/src/netlink_linearize.c
index 9d59374..e80646b 100644
--- a/src/netlink_linearize.c
+++ b/src/netlink_linearize.c
@@ -662,6 +662,22 @@ static void netlink_gen_queue_stmt(struct netlink_linearize_ctx *ctx,
nft_rule_add_expr(ctx->nlr, nle);
}
+static void netlink_gen_ct_stmt(struct netlink_linearize_ctx *ctx,
+ const struct stmt *stmt)
+{
+ struct nft_rule_expr *nle;
+ enum nft_registers sreg;
+
+ sreg = get_register(ctx);
+ netlink_gen_expr(ctx, stmt->ct.expr, sreg);
+ release_register(ctx);
+
+ nle = alloc_nft_expr("ct");
+ nft_rule_expr_set_u32(nle, NFT_EXPR_CT_SREG, sreg);
+ nft_rule_expr_set_u32(nle, NFT_EXPR_CT_KEY, stmt->ct.key);
+ nft_rule_add_expr(ctx->nlr, nle);
+}
+
static void netlink_gen_stmt(struct netlink_linearize_ctx *ctx,
const struct stmt *stmt)
{
@@ -684,6 +700,8 @@ static void netlink_gen_stmt(struct netlink_linearize_ctx *ctx,
return netlink_gen_nat_stmt(ctx, stmt);
case STMT_QUEUE:
return netlink_gen_queue_stmt(ctx, stmt);
+ case STMT_CT:
+ return netlink_gen_ct_stmt(ctx, stmt);
default:
BUG("unknown statement type %s\n", stmt->ops->name);
}
diff --git a/src/parser.y b/src/parser.y
index 0d97ae9..db6f493 100644
--- a/src/parser.y
+++ b/src/parser.y
@@ -392,6 +392,8 @@ static void location_update(struct location *loc, struct location *rhs, int n)
%destructor { stmt_free($$); } stmt match_stmt verdict_stmt
%type <stmt> counter_stmt counter_stmt_alloc
%destructor { stmt_free($$); } counter_stmt counter_stmt_alloc
+%type <stmt> ct_stmt
+%destructor { stmt_free($$); } ct_stmt
%type <stmt> meta_stmt
%destructor { stmt_free($$); } meta_stmt
%type <stmt> log_stmt log_stmt_alloc
@@ -1069,6 +1071,7 @@ stmt : verdict_stmt
| reject_stmt
| nat_stmt
| queue_stmt
+ | ct_stmt
;
verdict_stmt : verdict_expr
@@ -1593,6 +1596,12 @@ ct_key : STATE { $$ = NFT_CT_STATE; }
| LABEL { $$ = NFT_CT_LABEL; }
;
+ct_stmt : CT ct_key SET expr
+ {
+ $$ = ct_stmt_alloc(&@$, $2, $4);
+ }
+ ;
+
payload_expr : payload_raw_expr
| eth_hdr_expr
| vlan_hdr_expr
^ permalink raw reply related [flat|nested] 3+ messages in thread
* Re: [nft PATCH] ct: add support for setting ct mark
2014-03-12 18:03 [nft PATCH] ct: add support for setting ct mark Arturo Borrero Gonzalez
@ 2014-03-12 21:36 ` Kristian Evensen
2014-03-13 13:17 ` Pablo Neira Ayuso
1 sibling, 0 replies; 3+ messages in thread
From: Kristian Evensen @ 2014-03-12 21:36 UTC (permalink / raw)
To: Arturo Borrero Gonzalez
Cc: Netfilter Development Mailing list, Pablo Neira Ayuso
Hi Arturo,
Thanks for taking the time to implement this!
Acked-by: Kristian Evensen <kristian.evensen@gmail.com>
On Wed, Mar 12, 2014 at 7:03 PM, Arturo Borrero Gonzalez
<arturo.borrero.glez@gmail.com> wrote:
> This patch adds the possibility to set ct keys using nft. Currently, the
> connection mark is supported. This functionality enables creating rules
> performing the same action as iptables -j CONNMARK --save-mark. For example:
>
> table ip filter {
> chain postrouting {
> type filter hook postrouting priority 0;
> ip protocol icmp ip daddr 8.8.8.8 ct mark set meta mark
> }
> }
>
> My patch is based on the original http://patchwork.ozlabs.org/patch/307677/
> by Kristian Evensen <kristian.evensen@gmail.com>.
>
> I simply did a rebase and some testing. To test, I added rules like these:
> counter meta mark set 1 counter
> counter ct mark set mark counter
> counter ct mark 1 counter
>
> The last matching worked as expected, which means the second rule is also
> working as expected.
>
> Signed-off-by: Arturo Borrero Gonzalez <arturo.borrero.glez@gmail.com>
> ---
> include/statement.h | 14 ++++++++++++++
> src/ct.c | 25 +++++++++++++++++++++++++
> src/evaluate.c | 11 +++++++++++
> src/netlink_delinearize.c | 38 +++++++++++++++++++++++++++++++++++---
> src/netlink_linearize.c | 18 ++++++++++++++++++
> src/parser.y | 9 +++++++++
> 6 files changed, 112 insertions(+), 3 deletions(-)
>
> diff --git a/include/statement.h b/include/statement.h
> index 14a66df..896b972 100644
> --- a/include/statement.h
> +++ b/include/statement.h
> @@ -67,6 +67,17 @@ struct queue_stmt {
>
> extern struct stmt *queue_stmt_alloc(const struct location *loc);
>
> +#include <ct.h>
> +struct ct_stmt {
> + enum nft_ct_keys key;
> + const struct ct_template *tmpl;
> + struct expr *expr;
> +};
> +
> +extern struct stmt *ct_stmt_alloc(const struct location *loc,
> + enum nft_ct_keys key,
> + struct expr *expr);
> +
> /**
> * enum stmt_types - statement types
> *
> @@ -80,6 +91,7 @@ extern struct stmt *queue_stmt_alloc(const struct location *loc);
> * @STMT_REJECT: REJECT statement
> * @STMT_NAT: NAT statement
> * @STMT_QUEUE: QUEUE statement
> + * @STMT_CT: conntrack statement
> */
> enum stmt_types {
> STMT_INVALID,
> @@ -92,6 +104,7 @@ enum stmt_types {
> STMT_REJECT,
> STMT_NAT,
> STMT_QUEUE,
> + STMT_CT,
> };
>
> /**
> @@ -138,6 +151,7 @@ struct stmt {
> struct reject_stmt reject;
> struct nat_stmt nat;
> struct queue_stmt queue;
> + struct ct_stmt ct;
> };
> };
>
> diff --git a/src/ct.c b/src/ct.c
> index a27621e..30639b2 100644
> --- a/src/ct.c
> +++ b/src/ct.c
> @@ -27,6 +27,7 @@
> #include <ct.h>
> #include <gmputil.h>
> #include <utils.h>
> +#include <statement.h>
>
> static const struct symbol_table ct_state_tbl = {
> .symbols = {
> @@ -290,6 +291,30 @@ void ct_expr_update_type(struct proto_ctx *ctx, struct expr *expr)
> }
> }
>
> +static void ct_stmt_print(const struct stmt *stmt)
> +{
> + printf("ct %s set ", ct_templates[stmt->ct.key].token);
> + expr_print(stmt->ct.expr);
> +}
> +
> +static const struct stmt_ops ct_stmt_ops = {
> + .type = STMT_CT,
> + .name = "ct",
> + .print = ct_stmt_print,
> +};
> +
> +struct stmt *ct_stmt_alloc(const struct location *loc, enum nft_ct_keys key,
> + struct expr *expr)
> +{
> + struct stmt *stmt;
> +
> + stmt = stmt_alloc(loc, &ct_stmt_ops);
> + stmt->ct.key = key;
> + stmt->ct.tmpl = &ct_templates[key];
> + stmt->ct.expr = expr;
> + return stmt;
> +}
> +
> static void __init ct_init(void)
> {
> datatype_register(&ct_state_type);
> diff --git a/src/evaluate.c b/src/evaluate.c
> index fff8fef..dc4406c 100644
> --- a/src/evaluate.c
> +++ b/src/evaluate.c
> @@ -1170,6 +1170,15 @@ static int stmt_evaluate_nat(struct eval_ctx *ctx, struct stmt *stmt)
> return 0;
> }
>
> +static int stmt_evaluate_ct(struct eval_ctx *ctx, struct stmt *stmt)
> +{
> + expr_set_context(&ctx->ectx, stmt->ct.tmpl->dtype,
> + stmt->ct.tmpl->len);
> + if (expr_evaluate(ctx, &stmt->ct.expr) < 0)
> + return -1;
> + return 0;
> +}
> +
> static int stmt_evaluate(struct eval_ctx *ctx, struct stmt *stmt)
> {
> #ifdef DEBUG
> @@ -1197,6 +1206,8 @@ static int stmt_evaluate(struct eval_ctx *ctx, struct stmt *stmt)
> return stmt_evaluate_nat(ctx, stmt);
> case STMT_QUEUE:
> return 0;
> + case STMT_CT:
> + return stmt_evaluate_ct(ctx, stmt);
> default:
> BUG("unknown statement type %s\n", stmt->ops->name);
> }
> diff --git a/src/netlink_delinearize.c b/src/netlink_delinearize.c
> index ca72091..62cbf0e 100644
> --- a/src/netlink_delinearize.c
> +++ b/src/netlink_delinearize.c
> @@ -365,9 +365,27 @@ static void netlink_parse_meta(struct netlink_parse_ctx *ctx,
> netlink_parse_meta_sreg(ctx, loc, nle);
> }
>
> -static void netlink_parse_ct(struct netlink_parse_ctx *ctx,
> - const struct location *loc,
> - const struct nft_rule_expr *nle)
> +static void netlink_parse_ct_sreg(struct netlink_parse_ctx *ctx,
> + const struct location *loc,
> + const struct nft_rule_expr *nle)
> +{
> + struct stmt *stmt;
> + struct expr *expr;
> +
> + expr = netlink_get_register(ctx, loc,
> + nft_rule_expr_get_u32(nle,
> + NFT_EXPR_CT_SREG));
> + stmt = ct_stmt_alloc(loc,
> + nft_rule_expr_get_u32(nle, NFT_EXPR_CT_KEY),
> + expr);
> + expr_set_type(expr, stmt->ct.tmpl->dtype, stmt->ct.tmpl->byteorder);
> +
> + list_add_tail(&stmt->list, &ctx->rule->stmts);
> +}
> +
> +static void netlink_parse_ct_dreg(struct netlink_parse_ctx *ctx,
> + const struct location *loc,
> + const struct nft_rule_expr *nle)
> {
> struct expr *expr;
>
> @@ -377,6 +395,16 @@ static void netlink_parse_ct(struct netlink_parse_ctx *ctx,
> expr);
> }
>
> +static void netlink_parse_ct(struct netlink_parse_ctx *ctx,
> + const struct location *loc,
> + const struct nft_rule_expr *nle)
> +{
> + if (nft_rule_expr_is_set(nle, NFT_EXPR_CT_DREG))
> + netlink_parse_ct_dreg(ctx, loc, nle);
> + else
> + netlink_parse_ct_sreg(ctx, loc, nle);
> +}
> +
> static void netlink_parse_counter(struct netlink_parse_ctx *ctx,
> const struct location *loc,
> const struct nft_rule_expr *nle)
> @@ -858,6 +886,10 @@ static void rule_parse_postprocess(struct netlink_parse_ctx *ctx, struct rule *r
> if (stmt->meta.expr != NULL)
> expr_postprocess(&rctx, stmt, &stmt->meta.expr);
> break;
> + case STMT_CT:
> + if (stmt->ct.expr != NULL)
> + expr_postprocess(&rctx, stmt, &stmt->ct.expr);
> + break;
> case STMT_NAT:
> if (stmt->nat.addr != NULL)
> expr_postprocess(&rctx, stmt, &stmt->nat.addr);
> diff --git a/src/netlink_linearize.c b/src/netlink_linearize.c
> index 9d59374..e80646b 100644
> --- a/src/netlink_linearize.c
> +++ b/src/netlink_linearize.c
> @@ -662,6 +662,22 @@ static void netlink_gen_queue_stmt(struct netlink_linearize_ctx *ctx,
> nft_rule_add_expr(ctx->nlr, nle);
> }
>
> +static void netlink_gen_ct_stmt(struct netlink_linearize_ctx *ctx,
> + const struct stmt *stmt)
> +{
> + struct nft_rule_expr *nle;
> + enum nft_registers sreg;
> +
> + sreg = get_register(ctx);
> + netlink_gen_expr(ctx, stmt->ct.expr, sreg);
> + release_register(ctx);
> +
> + nle = alloc_nft_expr("ct");
> + nft_rule_expr_set_u32(nle, NFT_EXPR_CT_SREG, sreg);
> + nft_rule_expr_set_u32(nle, NFT_EXPR_CT_KEY, stmt->ct.key);
> + nft_rule_add_expr(ctx->nlr, nle);
> +}
> +
> static void netlink_gen_stmt(struct netlink_linearize_ctx *ctx,
> const struct stmt *stmt)
> {
> @@ -684,6 +700,8 @@ static void netlink_gen_stmt(struct netlink_linearize_ctx *ctx,
> return netlink_gen_nat_stmt(ctx, stmt);
> case STMT_QUEUE:
> return netlink_gen_queue_stmt(ctx, stmt);
> + case STMT_CT:
> + return netlink_gen_ct_stmt(ctx, stmt);
> default:
> BUG("unknown statement type %s\n", stmt->ops->name);
> }
> diff --git a/src/parser.y b/src/parser.y
> index 0d97ae9..db6f493 100644
> --- a/src/parser.y
> +++ b/src/parser.y
> @@ -392,6 +392,8 @@ static void location_update(struct location *loc, struct location *rhs, int n)
> %destructor { stmt_free($$); } stmt match_stmt verdict_stmt
> %type <stmt> counter_stmt counter_stmt_alloc
> %destructor { stmt_free($$); } counter_stmt counter_stmt_alloc
> +%type <stmt> ct_stmt
> +%destructor { stmt_free($$); } ct_stmt
> %type <stmt> meta_stmt
> %destructor { stmt_free($$); } meta_stmt
> %type <stmt> log_stmt log_stmt_alloc
> @@ -1069,6 +1071,7 @@ stmt : verdict_stmt
> | reject_stmt
> | nat_stmt
> | queue_stmt
> + | ct_stmt
> ;
>
> verdict_stmt : verdict_expr
> @@ -1593,6 +1596,12 @@ ct_key : STATE { $$ = NFT_CT_STATE; }
> | LABEL { $$ = NFT_CT_LABEL; }
> ;
>
> +ct_stmt : CT ct_key SET expr
> + {
> + $$ = ct_stmt_alloc(&@$, $2, $4);
> + }
> + ;
> +
> payload_expr : payload_raw_expr
> | eth_hdr_expr
> | vlan_hdr_expr
>
> --
> To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at http://vger.kernel.org/majordomo-info.html
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: [nft PATCH] ct: add support for setting ct mark
2014-03-12 18:03 [nft PATCH] ct: add support for setting ct mark Arturo Borrero Gonzalez
2014-03-12 21:36 ` Kristian Evensen
@ 2014-03-13 13:17 ` Pablo Neira Ayuso
1 sibling, 0 replies; 3+ messages in thread
From: Pablo Neira Ayuso @ 2014-03-13 13:17 UTC (permalink / raw)
To: Arturo Borrero Gonzalez; +Cc: netfilter-devel
On Wed, Mar 12, 2014 at 07:03:19PM +0100, Arturo Borrero Gonzalez wrote:
> This patch adds the possibility to set ct keys using nft. Currently, the
> connection mark is supported. This functionality enables creating rules
> performing the same action as iptables -j CONNMARK --save-mark. For example:
>
> table ip filter {
> chain postrouting {
> type filter hook postrouting priority 0;
> ip protocol icmp ip daddr 8.8.8.8 ct mark set meta mark
> }
> }
>
> My patch is based on the original http://patchwork.ozlabs.org/patch/307677/
> by Kristian Evensen <kristian.evensen@gmail.com>.
>
> I simply did a rebase and some testing. To test, I added rules like these:
> counter meta mark set 1 counter
> counter ct mark set mark counter
> counter ct mark 1 counter
>
> The last matching worked as expected, which means the second rule is also
> working as expected.
Applied, thanks for recovering this patch Arturo!
^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2014-03-13 13:17 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2014-03-12 18:03 [nft PATCH] ct: add support for setting ct mark Arturo Borrero Gonzalez
2014-03-12 21:36 ` Kristian Evensen
2014-03-13 13:17 ` Pablo Neira Ayuso
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).