> > Can't SSH run in chroot ?
> sorry, I made a mistake... I've meant that it allows shell login while I
> wanted to disable it.
Well... if you don't want shell logins you can't use hacks like scp/sftp,
but you can use restricted shell like scponly.
I'd recommend proftpd with tls, but it does no
On Tue, Oct 14, 2003 at 01:09:49PM -0400, Michael Stone wrote:
> That's fairly useless as a security measure; I would *not* recommend
> this. It is not difficult for a script kiddie these days to use tools
> that will make this method ineffective for removal (giving you a false
> sense of security)
Dariush Pietrzak wrote:
>> > Can't SSH run in chroot ?
>> sorry, I made a mistake... I've meant that it allows shell login while I
>> wanted to disable it.
> Well... if you don't want shell logins you can't use hacks like scp/sftp,
> but you can use restricted shell like scponly.
> I'd recommend
Jean Christophe ANDR? <[EMAIL PROTECTED]> wrote:
>
> Here is my problem:
> # echo "add 10.0.0.254 10.0.0.100 esp 200102 -E des-cbc 0x
> ;" | setkey -c
> The result of line 1: No buffer space available.
Make sure that esp.o is loaded.
--
Debian GNU/Linux 3.0 is out! ( http://ww
Herbert Xu écrivait :
> Jean Christophe ANDR? <[EMAIL PROTECTED]> wrote:
> > Here is my problem:
> > # echo "add 10.0.0.254 10.0.0.100 esp 200102 -E des-cbc 0x
> > ;" | setkey -c
> > The result of line 1: No buffer space available.
> Make sure that esp.o is loaded.
It was not lo
On Thursday, 02 October 2003, at 17:37:17 +1000,
Mark Devin wrote:
> --
> And here is the errors setkey produces:
> --
> # setkey -f /etc/ipsec.conf
> The result of line 6: Invalid argument.
> The result of line 9: Invalid argument.
> ---
Jean Christophe ANDR? <[EMAIL PROTECTED]> wrote:
>
>> Make sure that esp.o is loaded.
>
> It was not loaded. I did load it, tryied again, but result was the same.
> BTW, shouldn't theses modules be loaded automagically by modprobe?!
Actually make that esp4.o.
Yes they should be loaded automatica
Hi Herbert,
Herbert Xu écrivait :
> Actually make that esp4.o.
That's ok for SAD with esp4. Now I get the same problem as Martin for SPD,
so I will try rebuilding ipsec-tools with my actual kernel headers.
I'm using the "standard" Sid kernel: kernel-image-2.4.22-1-686.
> Yes they should
On Tue, Oct 14, 2003 at 01:09:49PM -0400, Michael Stone wrote:
> That's fairly useless as a security measure; I would *not* recommend
> this. It is not difficult for a script kiddie these days to use tools
> that will make this method ineffective for removal (giving you a false
> sense of security)
Dariush Pietrzak wrote:
>> > Can't SSH run in chroot ?
>> sorry, I made a mistake... I've meant that it allows shell login while I
>> wanted to disable it.
> Well... if you don't want shell logins you can't use hacks like scp/sftp,
> but you can use restricted shell like scponly.
> I'd recommend
Jean Christophe ANDR? <[EMAIL PROTECTED]> wrote:
>
> Here is my problem:
> # echo "add 10.0.0.254 10.0.0.100 esp 200102 -E des-cbc 0x ;" |
> setkey -c
> The result of line 1: No buffer space available.
Make sure that esp.o is loaded.
--
Debian GNU/Linux 3.0 is out! ( http://ww
Herbert Xu écrivait :
> Jean Christophe ANDR? <[EMAIL PROTECTED]> wrote:
> > Here is my problem:
> > # echo "add 10.0.0.254 10.0.0.100 esp 200102 -E des-cbc 0x ;" |
> > setkey -c
> > The result of line 1: No buffer space available.
> Make sure that esp.o is loaded.
It was not lo
On Thursday, 02 October 2003, at 17:37:17 +1000,
Mark Devin wrote:
> --
> And here is the errors setkey produces:
> --
> # setkey -f /etc/ipsec.conf
> The result of line 6: Invalid argument.
> The result of line 9: Invalid argument.
> ---
Jean Christophe ANDR? <[EMAIL PROTECTED]> wrote:
>
>> Make sure that esp.o is loaded.
>
> It was not loaded. I did load it, tryied again, but result was the same.
> BTW, shouldn't theses modules be loaded automagically by modprobe?!
Actually make that esp4.o.
Yes they should be loaded automatica
Hi Herbert,
Herbert Xu écrivait :
> Actually make that esp4.o.
That's ok for SAD with esp4. Now I get the same problem as Martin for SPD,
so I will try rebuilding ipsec-tools with my actual kernel headers.
I'm using the "standard" Sid kernel: kernel-image-2.4.22-1-686.
> Yes they should
15 matches
Mail list logo