Package: kernel-patch-mppe
Version: 2.4.2+20040216-4
Followup-For: Bug #304990


Your trouble with mppe is quite foreseeable, as the implementation
of some cryptographic algorithms that ships with the mppe patches
is broken in a dangerous way. This fact - and patches to cure the problem - 
has been reported to the pptpclient-devel mailing list numerous
times. Bear with me that I refer to my own posting from Oct. 2003
here:

http://sourceforge.net/mailarchive/forum.php?thread_id=3324727&forum_id=773

Please note that the patch I was giving there is by no means the
best solution you can find in the mailing list archive (just search for
the keyword sha1). The best way to go is IMHO the patch to use 2.6 kernel's
crypto API implementation of these algorithms (a patch was also postet
about half a year ago).

My own patch has the only advantage that it did work for me the
last 18 months under kernel 2.4 - for my very specific set-up.

As a note to the package maintainer: As long as this patch is not fixed,
I would suggest to remove it from all 64bit architectures as it's bound to
cause kernel heap corruption there.


-- System Information:
Debian Release: 3.1
  APT prefers testing
  APT policy: (990, 'testing')
Architecture: alpha
Kernel: Linux 2.6.11.8pelzi-1
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15)

Versions of packages kernel-patch-mppe depends on:
ii  bash                          2.05b-26   The GNU Bourne Again SHell
ii  grep-dctrl                    2.1.10     Grep Debian package information
ii  gzip                          1.3.5-9    The GNU compression utility
ii  patch                         2.5.9-2    Apply a diff file to an original

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to