Dear Ryu Developers,
During preliminary tests of the software security we discovered the
following findings reported by source code analyzers. Could you confirm
that these issues have been already fixed or will be resolved in any
coming versions.
1. TCP-MD5 usage
(https://github.com/faucetsdn/ryu/
Hi all,
is this still true for Ryu or is it fixed now:
Incorrect message length: passed (work is not affected by malformed
messages, ignores the messages without closing the connection)
Invalid OpenFlow version: passed (closes the connection with the switch
upon receiving a message with inval