From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S270858AbTGNTg3 (ORCPT ); Mon, 14 Jul 2003 15:36:29 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S270853AbTGNTf4 (ORCPT ); Mon, 14 Jul 2003 15:35:56 -0400 Received: from pc2-cwma1-4-cust86.swan.cable.ntl.com ([213.105.254.86]:61379 "EHLO lxorguk.ukuu.org.uk") by vger.kernel.org with ESMTP id S270854AbTGNTej (ORCPT ); Mon, 14 Jul 2003 15:34:39 -0400 Subject: Re: Alan Shih: "TCP IP Offloading Interface" From: Alan Cox To: David griego Cc: jgarzik@pobox.com, alan@storlinksemi.com, Linux Kernel Mailing List In-Reply-To: References: Content-Type: text/plain Content-Transfer-Encoding: 7bit Organization: Message-Id: <1058212005.554.123.camel@dhcp22.swansea.linux.org.uk> Mime-Version: 1.0 X-Mailer: Ximian Evolution 1.2.2 (1.2.2-5) Date: 14 Jul 2003 20:46:46 +0100 Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org On Llu, 2003-07-14 at 20:14, David griego wrote: > How does one measure the reliability and security of current software TCP/IP > stacks? You stick them on irc servers, porn sites and unpopular news sites and wait. Alternatively you can use the fact you have the source to do formal verifications on them looking for everything from bugs to NSA backdoors to the IPSEC. People have been doing both.