2009/8/20 Debian Bug Tracking System <ow...@bugs.debian.org>: > This is an automatic notification regarding your Bug report > which was filed against the linux-image-2.6.30-1-686 package: > > #542470: linux-image-2.6.30-1-686: IPv6 can not be disabled > > It has been closed by maximilian attems <m...@stro.at>. > > Their explanation is attached below along with your original report. > If this explanation is unsatisfactory and you have not received a > better one in a separate message then please contact maximilian attems > <m...@stro.at> by > replying to this email. > > > -- > 542470: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=542470 > Debian Bug Tracking System > Contact ow...@bugs.debian.org with problems > > > ---------- Mensaje reenviado ---------- > From: maximilian attems <m...@stro.at> > To: 542470-d...@bugs.debian.org > Date: Thu, 20 Aug 2009 15:53:52 +0200 > Subject: Re: Bug#542470: linux-image-2.6.30-1-686: IPv6 can not be disabled > On Thu, Aug 20, 2009 at 02:25:58PM +0200, Bjørn Mork wrote: >> advocatux <advoca...@gmail.com> writes: >> >> > IPv6 is enabled by default in kernel 2.6.30 and can't be disabled, at >> > least not in an easy way. >> >> Sure there is. Boot with "ipv6.disable=1" on the command line. >> >> >> [...] > thus closing.
Yep, I know I can add "ipv6.disable=1" in /boot/grub/menu.lst but this method doesn't work always, it depends on which 2.6.30 kernel version you're running. > >> Yeah, just like having IPv4 enabled by default. Given the number of >> attacks, I would say that IPv4 is much more dangerous and should be >> disabled immediately by any sane administrator :-) > > triple *lol* ;) Certainly that mockery doesn't fit with Debian community spirit, does it? and for sure doesn't help to fill bug reports. People analizing this bug in Ubuntu Bug System (https://bugs.launchpad.net/bugs/351656) changed the status from security vulnerability "no" to "yes", and that's because an initial machine running other kernel, with IPv4 traffic filtered and IPv6 disabled, after install a 2.6.30 kernel ends with unfiltered ports listening to IPv6 traffic. Bye. -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org