On Thu, Aug 04, 2011 at 11:23:44PM +0200, Alexander Bluhm wrote:
> On Thu, Aug 04, 2011 at 05:06:24PM +0200, Mike Belopuhov wrote:
> > I'm not sure it's a desired behavior and afaik it's not possible
> > to achieve this with IPv4 sockets without the need to be a root.
> > Do we want to change that?
The lex Makefile says:
"To bootstrap lex, cp initscan.c to scan.c and run make."
On amd64-current this doesn't seem to build:
[/usr/src/usr.bin/lex] cp initscan.c scan.c
[/usr/src/usr.bin/lex] make
yacc -d parse.y
mv y.tab.c parse.c
mv y.tab.h parse.h
cc -O2 -pi
On Thu, Aug 4, 2011 at 11:23 PM, Alexander Bluhm
wrote:
> On Thu, Aug 04, 2011 at 05:06:24PM +0200, Mike Belopuhov wrote:
>> I'm not sure it's a desired behavior and afaik it's not possible
>> to achieve this with IPv4 sockets without the need to be a root.
>> Do we want to change that?
>
> Yes.
i saw what kame did. be my guest and try to port that.
On Thu, Aug 4, 2011 at 11:23 PM, Alexander Bluhm
wrote:
> On Thu, Aug 04, 2011 at 05:06:24PM +0200, Mike Belopuhov wrote:
>> I'm not sure it's a desired behavior and afaik it's not possible
>> to achieve this with IPv4 sockets without the ne
On Thu, Aug 04, 2011 at 05:06:24PM +0200, Mike Belopuhov wrote:
> I'm not sure it's a desired behavior and afaik it's not possible
> to achieve this with IPv4 sockets without the need to be a root.
> Do we want to change that?
Yes. KAME fixed that, too.
> The following change restricts it to the
On Thu, Aug 04, 2011 at 17:06 +0200, Mike Belopuhov wrote:
> Hi,
>
> Currently it's possible to assign *any* IPv6 source address to
> the datagram sent out by the unprivileged process by supplying
> a IPV6_PKTINFO control message to the sendmsg(2).
>
> I'm not sure it's a desired behavior and afa
Mitja requested a tcpdump diff to go with this.
Index: print-ike.c
===
RCS file: /cvs/src/usr.sbin/tcpdump/print-ike.c,v
retrieving revision 1.35
diff -u -p -r1.35 print-ike.c
--- print-ike.c 7 Jun 2010 16:20:58 - 1.35
+++ p
Hi,
Currently it's possible to assign *any* IPv6 source address to
the datagram sent out by the unprivileged process by supplying
a IPV6_PKTINFO control message to the sendmsg(2).
I'm not sure it's a desired behavior and afaik it's not possible
to achieve this with IPv4 sockets without the need t
[IMAGE]
Merhaba,
GelinDamatF}rsat}.com da yeni ve keyifli f}rsatlar olu~turarak geni~ bir
m|~teri kitlesine ula~abilirsiniz. "Keyif F}rsatlar}" ad}yla iki ki~ilik,
tan}~ma, vzel g|n, evlilipe haz}rl}k, kutlamalara igin en uygun
f}rsatlar} birlikte sunabiliriz.
T|m f}rsatlar}m}z s|rekli en az iki
This diff from hshoexer@ some time ago fixes the encapsulation mode
used in NAT-T negotiations. Mitja has been running this for ages,
I need it too, and it makes sense to have it seen by more people and
in the list archives for people who need it until it can be fixed
in tree.
Currently we always
10 matches
Mail list logo