Re: [gentoo-hardened] Meeting 2012-08-22 20:00UTC

2012-08-20 Thread Francisco Blas Izquierdo Riera (klondike)
El 20/08/12 16:44, Magnus Granberg escribió: > Hi > Time for meeting. > > Agenda > 1.0 Project leads > 2.0 Toolchain > 3.0 Kernel > 4.0 Selinux > 5.0 Grsec/PaX > 6.0 Profile > 7.0 System interity > 8.0 Doc > 9.0 Media > 10.0 Open floor > > /Magnus > > Here is the ICS for tomorrow meeting for those

Re: [gentoo-hardened] PaX kills Tor due to overflow

2012-08-20 Thread Pavel Labushev
On Mon, 20 Aug 2012 16:16:27 +0100 Karl-Johan Karlsson wrote: > My Tor node gets killed once every day or two with the following message in > dmesg: > >PAX: size overflow detected in function tcp_recvmsg net/ipv4/tcp.c:1696 That's a size_overflow false positive. Try some of the recent grse

Re: [gentoo-hardened] PaX kills Tor due to overflow

2012-08-20 Thread Tóth Attila
It's because of the size_overflow plugin. Take a look at this bug: https://bugs.gentoo.org/show_bug.cgi?id=430906 It is promised to get fixed soon. Regards: Dw. -- dr Tóth Attila, Radiológus, 06-20-825-8057 Attila Toth MD, Radiologist, +36-20-825-8057 2012.Augusztus 20.(H) 17:43 időpontban Karl

Re: [gentoo-hardened] PaX kills Tor due to overflow

2012-08-20 Thread Karl-Johan Karlsson
On Monday 20 August 2012 11.26.15 Matthew Finkel wrote: > Are you running Tor as a relay or is is only used as a client? It's a relay. It's usually a client as well, but nobody is using that functionality at the moment. It is not an exit node. > Also, > what version of Tor and what version of th

Re: [gentoo-hardened] PaX kills Tor due to overflow

2012-08-20 Thread Matthew Finkel
On Mon, Aug 20, 2012 at 11:16 AM, Karl-Johan Karlsson wrote: > My Tor node gets killed once every day or two with the following message in > dmesg: > >PAX: size overflow detected in function tcp_recvmsg net/ipv4/tcp.c:1696 >Pid: 28327, comm: tor Not tainted 3.4.4-hardened-r1 #1 >Call T

[gentoo-hardened] PaX kills Tor due to overflow

2012-08-20 Thread Karl-Johan Karlsson
My Tor node gets killed once every day or two with the following message in dmesg: PAX: size overflow detected in function tcp_recvmsg net/ipv4/tcp.c:1696 Pid: 28327, comm: tor Not tainted 3.4.4-hardened-r1 #1 Call Trace: [] report_size_overflow+0x34/0x3e [] tcp_recvmsg+0x5fa/0x8

[gentoo-hardened] Meeting 2012-08-22 20:00UTC

2012-08-20 Thread Magnus Granberg
Hi Time for meeting. Agenda 1.0 Project leads 2.0 Toolchain 3.0 Kernel 4.0 Selinux 5.0 Grsec/PaX 6.0 Profile 7.0 System interity 8.0 Doc 9.0 Media 10.0 Open floor /Magnus