Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1888082.3VsfAaAtOV@fcf>
Date: Sat, 16 May 2026 19:15:07 +0200
From: Agostino Sarubbo <ago@...too.org>
To: oss-security@...ts.openwall.com
Cc: Hanno Böck <hanno@...eck.de>
Subject: Re: Recent Kernel exploits, attack surface reduction,
 example IPSEC

On sabato 16 maggio 2026 15:05:45 Ora legale dell’Europa centrale Hanno 
Böck wrote:
> To pick the example of IPSEC, i wonder if it wouldn't be better to
> have, e.g., a separate "linux-modules-ipsec" package that isn't
> installed by default. People who use and need IPSEC will likely know
> that they need it, and can install it separately.

Hello Hanno,

I understand your rationale. To reduce the "complexity" of your proposal, 
those modules can be configured as modules (I mean CONFIG_[snip]=m) 
and blacklisted by default in /etc/modprobe.d/
What do you think?

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.