Re: When will kernel-image-2.4.23 be available ?

2003-12-06 Thread Andreas Goesele
Alvin Oga <[EMAIL PROTECTED]> writes: > > http://linux.bkbits.net:8080/linux-2.4/diffs/mm/[EMAIL PROTECTED] > > i see other code fragments that has a similar PAGE_ALIGN() problem > > - sounds like the macro needs to be cleaned up ? Sorry, this comment was a little too cryptic for me. Could you

Re: When will kernel-image-2.4.23 be available ?

2003-12-06 Thread Andreas Goesele
Alvin Oga <[EMAIL PROTECTED]> writes: > > http://linux.bkbits.net:8080/linux-2.4/diffs/mm/[EMAIL PROTECTED] > > i see other code fragments that has a similar PAGE_ALIGN() problem > > - sounds like the macro needs to be cleaned up ? Sorry, this comment was a little too cryptic for me. Could you

Re: extrange passwd behaviour

2003-12-06 Thread Hideki Yamane
Hi, >Can't be NIS. NIS will transport any password style faithfully. Of >course the master server must support MD5 passwords if you change your >password and the passwd command sends an MD5 password to the >yppasswordd. I've heard about non-Linux NIS client (for example, solaris8 and SFU - Win

Re: extrange passwd behaviour

2003-12-06 Thread Hideki Yamane
Hi, >Can't be NIS. NIS will transport any password style faithfully. Of >course the master server must support MD5 passwords if you change your >password and the passwd command sends an MD5 password to the >yppasswordd. I've heard about non-Linux NIS client (for example, solaris8 and SFU - Win

Re: Grsecurity, ssh and postfix

2003-12-06 Thread Arnaud Fontaine
On Fri, 5 Dec 2003 21:45:01 +0100 Florian Weimer <[EMAIL PROTECTED]> wrote: > The privilege separation code invokes chroot(), too. > > Is there a "do not create any new file descriptors" process attribute > in grsecurity? If there is, OpenSSH should toggle instead of calling > chroot() to an emp

Re: Grsecurity, ssh and postfix

2003-12-06 Thread Arnaud Fontaine
On Fri, 5 Dec 2003 21:45:01 +0100 Florian Weimer <[EMAIL PROTECTED]> wrote: > The privilege separation code invokes chroot(), too. > > Is there a "do not create any new file descriptors" process attribute > in grsecurity? If there is, OpenSSH should toggle instead of calling > chroot() to an emp

Re: extrange passwd behaviour

2003-12-06 Thread Lupe Christoph
On Saturday, 2003-12-06 at 17:03:02 +0900, Hideki Yamane wrote: > >i was talking about "i dont know why it is default to use unsecure crypt() > >instead of md5". > >But I can think of something like "compatibility" (to what?) :) > to ...maybe NIS ? > # if the reason why using crypt is NIS com

Re: extrange passwd behaviour

2003-12-06 Thread Lupe Christoph
On Friday, 2003-12-05 at 20:39:16 +0100, Bernd Eckenfels wrote: > In article <[EMAIL PROTECTED]> you wrote: > >> Dont know why and for which debian versions it is default, I have some > >> mixed > >> ones. > > Why? Because it uses DES and DES uses 56 bit keys. Eight 7 bit chars > > give you exact

Re: extrange passwd behaviour

2003-12-06 Thread Hideki Yamane
Hi, >i was talking about "i dont know why it is default to use unsecure crypt() >instead of md5". >But I can think of something like "compatibility" (to what?) :) to ...maybe NIS ? # if the reason why using crypt is NIS compatibility, people who uses NIS system is not so many, so I think i

Re: extrange passwd behaviour

2003-12-06 Thread Lupe Christoph
On Saturday, 2003-12-06 at 17:03:02 +0900, Hideki Yamane wrote: > >i was talking about "i dont know why it is default to use unsecure crypt() instead > >of md5". > >But I can think of something like "compatibility" (to what?) :) > to ...maybe NIS ? > # if the reason why using crypt is NIS com

Re: extrange passwd behaviour

2003-12-06 Thread Lupe Christoph
On Friday, 2003-12-05 at 20:39:16 +0100, Bernd Eckenfels wrote: > In article <[EMAIL PROTECTED]> you wrote: > >> Dont know why and for which debian versions it is default, I have some mixed > >> ones. > > Why? Because it uses DES and DES uses 56 bit keys. Eight 7 bit chars > > give you exactly 56

Re: extrange passwd behaviour

2003-12-06 Thread Hideki Yamane
Hi, >i was talking about "i dont know why it is default to use unsecure crypt() instead of >md5". >But I can think of something like "compatibility" (to what?) :) to ...maybe NIS ? # if the reason why using crypt is NIS compatibility, people who uses NIS system is not so many, so I think i