> maybe have a look at cfengine?
> or apt-cache search / freshmeat / google for other options
I was down this road just a few months ago. cfengine is nice except
that the author doesn't believe that 'administrative information' is
something that should be protected and thus has no plans to move f
> maybe have a look at cfengine?
> or apt-cache search / freshmeat / google for other options
I was down this road just a few months ago. cfengine is nice except
that the author doesn't believe that 'administrative information' is
something that should be protected and thus has no plans to move
Is the Linux syslog as sensitive to whitespace issues in syslog.conf
as the Solaris version? Perhaps you have spaces where it is looking
for TABs or the reverse?
--
---
Nathan Valentine - [EMAIL PROTECTED]
Is the Linux syslog as sensitive to whitespace issues in syslog.conf
as the Solaris version? Perhaps you have spaces where it is looking
for TABs or the reverse?
--
---
Nathan Valentine - [EMAIL PROTECTED]
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Troubl
This message could just as easily be posted in debian-firewall but I'm
no longer subscribed there. ;p
I've been wanting to poke at the ipchains ruleset in ipmasq for
sometime. It looks pretty tight to me, but one of the things I would
like to test is sneaking certain ICMP pkts from externel(Inter
This message could just as easily be posted in debian-firewall but I'm
no longer subscribed there. ;p
I've been wanting to poke at the ipchains ruleset in ipmasq for
sometime. It looks pretty tight to me, but one of the things I would
like to test is sneaking certain ICMP pkts from externel(Inte
> apt-get install any other packages on an as-needed basis. After the
> one machine is properly installed, you could clone the drive with tar,
> drive image, ghost, etc.
I usually make a Ghost image of a base install with just the absolute
necessities. Then you can take your Ghost model machine a
> apt-get install any other packages on an as-needed basis. After the
> one machine is properly installed, you could clone the drive with tar,
> drive image, ghost, etc.
I usually make a Ghost image of a base install with just the absolute
necessities. Then you can take your Ghost model machine
I was just reading about this this weekend. From my very limited
understanding you cannot have IPSec w/ AH connections that go through
a masqing firewall. There is some problem with the key exchange sequence and
also with the hashes that are generated from the src
I was just reading about this this weekend. From my very limited
understanding you cannot have IPSec w/ AH connections that go through
a masqing firewall. There is some problem with the key exchange sequence and
also with the hashes that are generated from the src
10 matches
Mail list logo