2009/8/20 Debian Bug Tracking System <ow...@bugs.debian.org>:
> This is an automatic notification regarding your Bug report
> which was filed against the linux-image-2.6.30-1-686 package:
>
> #542470: linux-image-2.6.30-1-686: IPv6 can not be disabled
>
> It has been closed by maximilian attems <m...@stro.at>.
>
> Their explanation is attached below along with your original report.
> If this explanation is unsatisfactory and you have not received a
> better one in a separate message then please contact maximilian attems 
> <m...@stro.at> by
> replying to this email.
>
>
> --
> 542470: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=542470
> Debian Bug Tracking System
> Contact ow...@bugs.debian.org with problems
>
>
> ---------- Mensaje reenviado ----------
> From: maximilian attems <m...@stro.at>
> To: 542470-d...@bugs.debian.org
> Date: Thu, 20 Aug 2009 15:53:52 +0200
> Subject: Re: Bug#542470: linux-image-2.6.30-1-686: IPv6 can not be disabled
> On Thu, Aug 20, 2009 at 02:25:58PM +0200, Bjørn Mork wrote:
>> advocatux <advoca...@gmail.com> writes:
>>
>> > IPv6 is enabled by default in kernel 2.6.30 and can't be disabled, at
>> > least not in an easy way.
>>
>> Sure there is.  Boot with "ipv6.disable=1" on the command line.
>>
>>
>> [...]
> thus closing.


Yep, I know I can add "ipv6.disable=1" in /boot/grub/menu.lst but this
method doesn't work always, it depends on which 2.6.30 kernel version
you're running.

>
>> Yeah, just like having IPv4 enabled by default.  Given the number of
>> attacks, I would say that IPv4 is much more dangerous and should be
>> disabled immediately by any sane administrator :-)
>
> triple *lol* ;)

Certainly that mockery doesn't fit with Debian community spirit, does
it? and for sure doesn't help to fill bug reports.

People analizing this bug in Ubuntu Bug System
(https://bugs.launchpad.net/bugs/351656) changed the status from
security vulnerability "no" to "yes", and that's because an initial
machine running other kernel, with IPv4 traffic filtered and IPv6
disabled, after install a 2.6.30 kernel ends with unfiltered ports
listening to IPv6 traffic.

Bye.



--
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to