Alvin Oga <[EMAIL PROTECTED]> writes:
> > http://linux.bkbits.net:8080/linux-2.4/diffs/mm/[EMAIL PROTECTED]
>
> i see other code fragments that has a similar PAGE_ALIGN() problem
>
> - sounds like the macro needs to be cleaned up ?
Sorry, this comment was a little too cryptic for me. Could you
Alvin Oga <[EMAIL PROTECTED]> writes:
> > http://linux.bkbits.net:8080/linux-2.4/diffs/mm/[EMAIL PROTECTED]
>
> i see other code fragments that has a similar PAGE_ALIGN() problem
>
> - sounds like the macro needs to be cleaned up ?
Sorry, this comment was a little too cryptic for me. Could you
Hi,
>Can't be NIS. NIS will transport any password style faithfully. Of
>course the master server must support MD5 passwords if you change your
>password and the passwd command sends an MD5 password to the
>yppasswordd.
I've heard about non-Linux NIS client (for example, solaris8 and
SFU - Win
Hi,
>Can't be NIS. NIS will transport any password style faithfully. Of
>course the master server must support MD5 passwords if you change your
>password and the passwd command sends an MD5 password to the
>yppasswordd.
I've heard about non-Linux NIS client (for example, solaris8 and
SFU - Win
On Fri, 5 Dec 2003 21:45:01 +0100
Florian Weimer <[EMAIL PROTECTED]> wrote:
> The privilege separation code invokes chroot(), too.
>
> Is there a "do not create any new file descriptors" process attribute
> in grsecurity? If there is, OpenSSH should toggle instead of calling
> chroot() to an emp
On Fri, 5 Dec 2003 21:45:01 +0100
Florian Weimer <[EMAIL PROTECTED]> wrote:
> The privilege separation code invokes chroot(), too.
>
> Is there a "do not create any new file descriptors" process attribute
> in grsecurity? If there is, OpenSSH should toggle instead of calling
> chroot() to an emp
On Saturday, 2003-12-06 at 17:03:02 +0900, Hideki Yamane wrote:
> >i was talking about "i dont know why it is default to use unsecure crypt()
> >instead of md5".
> >But I can think of something like "compatibility" (to what?) :)
> to ...maybe NIS ?
> # if the reason why using crypt is NIS com
On Friday, 2003-12-05 at 20:39:16 +0100, Bernd Eckenfels wrote:
> In article <[EMAIL PROTECTED]> you wrote:
> >> Dont know why and for which debian versions it is default, I have some
> >> mixed
> >> ones.
> > Why? Because it uses DES and DES uses 56 bit keys. Eight 7 bit chars
> > give you exact
Hi,
>i was talking about "i dont know why it is default to use unsecure crypt()
>instead of md5".
>But I can think of something like "compatibility" (to what?) :)
to ...maybe NIS ?
# if the reason why using crypt is NIS compatibility, people
who uses NIS system is not so many, so I think i
On Saturday, 2003-12-06 at 17:03:02 +0900, Hideki Yamane wrote:
> >i was talking about "i dont know why it is default to use unsecure crypt() instead
> >of md5".
> >But I can think of something like "compatibility" (to what?) :)
> to ...maybe NIS ?
> # if the reason why using crypt is NIS com
On Friday, 2003-12-05 at 20:39:16 +0100, Bernd Eckenfels wrote:
> In article <[EMAIL PROTECTED]> you wrote:
> >> Dont know why and for which debian versions it is default, I have some mixed
> >> ones.
> > Why? Because it uses DES and DES uses 56 bit keys. Eight 7 bit chars
> > give you exactly 56
Hi,
>i was talking about "i dont know why it is default to use unsecure crypt() instead of
>md5".
>But I can think of something like "compatibility" (to what?) :)
to ...maybe NIS ?
# if the reason why using crypt is NIS compatibility, people
who uses NIS system is not so many, so I think i
12 matches
Mail list logo