Hi all, is this still true for Ryu or is it fixed now: Incorrect message length: passed (work is not affected by malformed messages, ignores the messages without closing the connection)
Invalid OpenFlow version: passed (closes the connection with the switch upon receiving a message with invalid protocol version) Incorrect OpenFlow message type: passed (ignores these messages) Malformed PacketIn message: not passed (the controller tries to parse the message and closes the connection) Ryu includes a firewall that can be controlled via the REST API Are there any security benefits with Ryu? Best regards, Hakan ------------------------------------------------------------------------------ _______________________________________________ Ryu-devel mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/ryu-devel
