On Fri, Nov 30, 2001 at 05:48:16PM -0800, Luigi Rizzo wrote:
> On Fri, Nov 30, 2001 at 08:39:05PM -0500, Leo Bicknell wrote:
> > Note that if we implement a 'fair share' buffering scheme we would
> > never get a failure, which would be a good thing. Unfortuantely
>
On Tue, Dec 04, 2001 at 12:48:45PM +0100, Nicolas Souchu wrote:
> Question, what is RTT? The subject seems interesting but without the
> background... :)
Round Trip Time. The time it takes for a segment to travel to the
destination, be processed, and an ack returned.
--
Leo Bi
ws when it was fixed, or could just point me to
the right file to hunt in it would be a huge help.
--
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/
Read TMBG List - [EMAIL PROTECTED], www.tmbg.org
To Unsubscribe: send mail to [EMAIL PROTE
I think this is very good stuff, and that most of the people
tracking RELENG4_4 would want it, but only if it is 210% fully
tested and helps out 99.999% of all people. So let's verify
both of those and then revisit the issue.
--
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
On Wed, Dec 05, 2001 at 03:12:29PM -0800, Crist J . Clark wrote:
> 4.5-RELEASE is only a month and a half away. By the time this "while"
> passes, we'll be there. If people have lived this long with the bugs,
> they can last until late January.
I find it hard to argue wi
tinue to be upgraded. If we want to retain the
(easy) ability to boot on a 4 meg machine we can supply a second
MICRO-GENERIC.
For some random thoughts, MAXMEM should be 256M minimum, 1G
preferably. MAXUSERS should be perhaps 128 or 256 out of the box.
I'd suggest our target should be a P-I
t. Worrying about the
hardware isn't worth your time. It will continue to grow at moores
law, making the bloat unimportant. Target what's being sold now,
as if you target last years computers by the time your OS is on
them next year they will be retired.
--
Leo Bicknell - [
king a "guess" about maxusers (and
the cascade of changes that has) based on total RAM would be a
crude but useful start.
--
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/
Read TMBG List - [EMAIL PROTECTED], www.tmbg.org
To Unsubscri
. The guy who just bought
a gig of ram because it came in a cracker jack box should be able
to click the 'use an obscene amount of memory to make everything
faster' button, without having to understand the 300+ things he
could tune in a kernel, or loader.conf, or whereever else you ca
how to do inet sockets at all.
Thus it's not a perl interface to syslog(3), it should rather be called
"Perl implementation of the syslog protocol, similar to syslog(3)."
It may be picking at nits, but when I see something called an interface
to...I assume it has the same semantic
her things I should look at? While searching
for last night's attacks this finally annoyed me enough to do
something about it.
--
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/
Read TMBG List - [EMAIL PROTECTED], www.tmbg.org
msg394
a. It really
doesn't take that much time, and teaches you so much more.
--
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/
Read TMBG List - [EMAIL PROTECTED], www.tmbg.org
pgp0.pgp
Description: PGP signature
put it in a startup script
somewhere.
--
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/
Read TMBG List - [EMAIL PROTECTED], www.tmbg.org
pgp0.pgp
Description: PGP signature
hout making anyone download
a 600M file to do so.
--
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/
Read TMBG List - [EMAIL PROTECTED], www.tmbg.org
pgp0.pgp
Description: PGP signature
In a message written on Mon, Jun 16, 2003 at 12:37:08PM -0700, Julian Elischer wrote:
> On Mon, 16 Jun 2003, Leo Bicknell wrote:
> > Some of this could be done in the current installer, if there wasn't
> > an effort to make it still fit on a floppy. Mind you, I'd like to
I checked the cvs logs for both /etc/termcap, and for tset, and see
nothing that would have changed between those releases. I even
looked briefly at csh aka tcsh, and saw nothing obvious. Anyone
have any idea why this is broken on 4.7?
--
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3
bility. Removing
> that capability is a workaround for this bug.)
> Hope this helps someone to track the problem down.
I think you've tracked down the problem, probably a tcsh parser
error with eval. I wonder if there is a tcsh guru around.
--
Leo Bicknell - [EMAIL PROTECTED] -
tant here, this passes gcc -Wall:
#include
#include
int main(int argc, char *const argv[], char *const envp[]) {
char *const execargv[] = { _PATH_BSHELL, NULL };
execve(_PATH_BSHELL,execargv,envp);
return 0;
}
--
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
PGP keys at http://
ple does not.
% cat exec.c
#include
#include
int main(int argc, char *const argv[], char *const envp[]) {
char *execargv[2];
execargv[0] = (char *)_PATH_BSHELL;
execargv[1] = (char *)NULL;
execve(_PATH_BSHELL,execargv,envp);
return 0;
}
% cc -Wwrite-strings exec.c
% cc -Wall exec
#include
#include
#include
int main(int argc, char *const argv[], char *const envp[]) {
char *const execargv[] = { strdup(_PATH_BSHELL), strdup(NULL) };
execve(_PATH_BSHELL,execargv,envp);
return 0;
}
% cc -Wwrite-strings -Wcast-qual exec.c
% cc -Wall exec.c
--
Leo Bicknell
it means you used the wrong option.
Similarly, if you do things in your program that require constants
to not be, then turning on an option to warn you about that seems
a bit backwards as well.
--
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/
Read TMBG List - [EMAIL PROTECTED], www.tmbg.org
pgp0.pgp
Description: PGP signature
ritable-strings", poof,
strings are now "char *", the cast away the cost problem goes away,
"-Wcast-qual" works fine.
It always seemed to me a lot of things included -fwritable-strings for
no good reason, maybe this is part of the reason. :)
--
Leo Bicknell - [EMAIL PR
pintr ()
#7 0xc0292631 in swi_net_next ()
#8 0xc0185d83 in sendit ()
#9 0xc0185e86 in sendto ()
#10 0xc02a0e51 in syscall2 ()
#11 0xc028e53b in Xint0x80_syscall ()
#12 0x8061d3e in ?? ()
#13 0x8061b54 in ?? ()
#14 0x80894fb in ?? ()
#15 0x8060bb3 in ?? ()
#16 0x804b54a in ?? ()
(kgdb)
--
Leo
performance concerns.
ssh -c none?
Note, you don't want to use password authentication in this case, but
public key should still be ok.
You could also set up something like kerberos and use krsh or similar...
--
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
PGP keys at h
./sparse
% ls -lag sparse-file
-r-xr- 1 bicknell bicknell 1073741834 Jul 29 11:52 sparse-file*
% du -k sparse-file
48 sparse-file
--
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/
Read TMBG List - [EMAIL PROTECTED], www.tmbg.org
pgp0.pgp
Description: PGP signature
=18k of=/dev/rfd0c if=memtest86-2.9/precomp.bin
I forget why, but 18k maximizes performance on (some?) floppies.
--
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/
Read TMBG List - [EMAIL PROTECTED], www.tmbg.org
pgp0.pgp
Description: PGP signature
media device -- rather than just the FreeBSD portion
> of it.
Thanks for the info. I figured out what worked back with 0.8 NetBSD and
have stuck with it ever since. :)
--
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/
Read TMBG List -
that
seems to introduce a performance penalty no one likes. Wrappering it in
a new malloc (sbrk?) interface to the kernel might allow the same thing
with much less penalty.
Of course, we'd need multiple platforms to make developers use it.
--
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
ckages
would be a far superior solution to using the ports tree.
--
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/
Read TMBG List - [EMAIL PROTECTED], www.tmbg.org
pgp0.pgp
Description: PGP signature
lly) should be kept, while new ones go to #2.
The only ways I know to change the outside address seem to tear down
all existing connections.
Is it possible to make this work today? Would it be hard to fix if
it doesn't work today?
--
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
pplication on the box
to bind to a.a.a.a or b.b.b.b it would use only that link) thing,
and then have NAT pick an IP on the fly. They key is when nat
switches not to dump the existing connections so it appears to
be a "seamless" switch over.
--
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/
Read TMBG List - [EMAIL PROTECTED], www.tmbg.org
pgp0.pgp
Description: PGP signature
could be quite useful.
I think I'm going to have to set up a lab box now and dig into this
at a deeper level.
--
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/
Read TMBG List - [EMAIL PROTECTED], www.tmbg.org
pgp0.pgp
Description: PGP signature
at is well supported in BSS Mode on
FreeBSD?
--
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/
Read TMBG List - [EMAIL PROTECTED], www.tmbg.org
pgp0.pgp
Description: PGP signature
ds, one running in each mode?
I get the impression if you run an AP in 802.11g mode then 802.11b
clients "just work", but it doesn't say that explicitly.
--
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/
Read TMBG List -
open(pidfile)
write(pid, pidfile)
flush(pidfile)
[go do all the server stuff, and then at shutdown]
close(pidfile)
All other apps just read it, but can't overwrite it because it's
RO.
I'm not sure how useful this sort of file system change would be in
practice, but it would solve th
ink if I can do this I should be able to tell the installer to
newfs them and do an install saving a lot of trouble over the more
manual vinum install procedure.
If this should work, how do I load the kernel module from the new
boot loader?
--
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
it seems impossible to build a
new kernel after changing just "options" statements and install it
without also rebuilding all the modules...which takes quite some
time. This seems to be because it moves the whole directory out of
the way in /boot. This seems a little subopt
as well. :)
Other than that, thanks much, I'm off to be a happy 5.x user now.
--
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/
Read TMBG List - [EMAIL PROTECTED], www.tmbg.org
pgp0.pgp
Description: PGP signature
shows no
DNS update packets of any kind coming from the machine running
dhclient.
What's the magic to get dhclient to emit a dynamic DNS update?
--
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/
Read TMBG List - [EMAIL PROTECTED], www.tmbg.org
pgp0.pgp
Description: PGP signature
al for config #2 though is boxes on the end of
cable modem or DSL lines using dhcp. In that case I don't control
the DHCP server, I just want the client to add it's address to a
nameserver I do control so there is a way to get to it remotely.
--
Leo Bicknell - [EMAIL PROTEC
lease clue me in, and
if necessary I'll still write that handbook page. :-) It would be
very nice if it was simple to make FreeBSD sendmail SSL and
authenticate against the password file.
--
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell
postfix, at this time. If I can't do it I might go
to postfix.
--
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/
Read TMBG List - [EMAIL PROTECTED], www.tmbg.org
To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message
the base distribution so this
could be made the default?
I, for one, think it would be really cool if saying "sendmail="YES""
in /etc/rc.conf gave you a sendmail that could authenticate against
the password file, and if you gave it a certificate do SSL. I think
that would get
oss
situation that TCP seems to not handle particularly well, it might
be worth using it to investigate if there is a generic TCP improvment
that could be made.
Fair enough?
--
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/
Read TMBG
out of the victim machine down to 296 bytes...
I might be assuming something here, but I want to clarify. It is
_NOT_ the case that a box with say, only a default route, would
limit _ALL_ TCP connections to the lowest returned MTU.
The MTU is on the *route*, where *route* == the cloned route,
correct
er got an MTU less than 576 we should
ignore it. Right?
--
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/
Read TMBG List - [EMAIL PROTECTED], www.tmbg.org
To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message
ysctl, however I'll also be quite insistant that
our defaults match the Internet. I'm fairly sure more FreeBSD
boxes are connected to the Internet than any other network. :-)
--
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/
n 576 octets.
Hmm, I'd swear there was a defined minimum, I may have the wrong one.
For reference, it appears Cisco IOS based devices won't allow MTU
smaller than 128 to be configured. I have no idea if that's based
on some standard.
It seems like there should be a minimum globa
mp mtu messages, anything)
2) Implement a warning if the MTU is set smaller than some minimum
value (perhaps 576 for the global internet) if admins which to
see such things.
3) Allow admins to enforce a higher minimum size for servers in
attack situations, knowing this violates the RFC.
--
;*.data" -perm 444 | xargs grep -H something
You can't do that with ls | grep, since only the filenames make it
to grep.
--
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/
Read TMBG List - [EMAIL PROTECTED], www.tmbg.org
To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message
you don't get to select that earlier
with a serial console.
Have others noticed this behavior? Does anyone know a way to
work around it? Does some init genuis know why this happens?
--
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/
Read TMBG
x27;t hangup though,
right? I like that behavior, what I don't like is the hangup on
the switch from kernel mode to {single,multi}-user mode.
--
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/
Read TMBG List - [EMAIL PROTECTED], www.tmbg.
t starts).
Even if it's a part of init, it looks like it would be relatively
simple to tell it not to send the hup the very first time, regardless
of the config which would fix my problem.
Is that an unreasonable behavior? I want to make sure I'm going down
the right road, before I
eat it too!
--
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/
Read TMBG List - [EMAIL PROTECTED], www.tmbg.org
To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message
etty is a bit, well, cryptic to someone who doesn't normally write
terminal code, is there a getty expert in the house?
--
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/
Read TMBG List - [EMAIL PROTECTED], www.tmbg.org
To Unsubscribe:
lem in this case is the termainal
server paying attention to DTR, I believe the way it's configured
now it ignores CD.
--
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/
Read TMBG List - [EMAIL PROTECTED], www.tmbg.org
To Unsubscribe: s
ked out between the kerkel and init starting
that is bothering me. Something is changing the serial port settings
at that time in a bad way.
This is a fairly minor problem, but since it works so well "out
of the box" with the default Cisco parts, it seems we should be
able to make it work
I'd like to zero in on why the software is doing this and fix it
though.
--
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/
Read TMBG List - [EMAIL PROTECTED], www.tmbg.org
To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubs
en
DTR is momentarily dropped.
I'll be darned if I can see where that happens in init though.
--
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/
Read TMBG List - [EMAIL PROTECTED], www.tmbg.org
To Unsubscribe: send mail to [EMAIL PROT
t_flags(dev, device_get_flags(dev) & ~(bit))
Wow, this kernel hacking stuff is easy. :-)
Apologies to Warner. :-)
--
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/
Read TMBG List - [EMAIL PROTECTED], www.tmbg.org
To Unsubscribe: se
FreeBSD, this is not sufficient.
FreeBSD (and BSD in general) has outlived a number of companies
and technologies, and if Perforce went down the tubes and there
was no source we could have a major problem.
Now, where did I put my SCCS copy of the tree...
--
Leo Bicknell - [EMAIL PROTECTED] - CCI
th some
generated (0's, 1's, /dev/random, whatever) should be a top priority.
--
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/
Read TMBG List - [EMAIL PROTECTED], www.tmbg.org
To Unsubscribe: send mail to [EMAIL PROTECTED]
wit
by default
sh MAKEDEV pty7 # 224-255 xterm won't recognize by default
It's fairly trival to patch xterm to look for additional letters. It
may have made it in the XFree source already. *shrug*
--
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
PGP keys at http://www.ufp.o
follows:
C does not provide a proper boolean type. As a result, FreeBSD
uses integers for a boolean type. The boolean values are 0 for
false, and all other values for true. All code using a boolean
type must not depend on "true" having any specific value.
--
Leo Bick
achieve < 1ms
accuracy can be had for < $1000, so if you really care you should
get one of those.
You might want to do some searches for NTP in google.
--
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/
Read TMBG List - [EMAIL PROTE
entation it would also be essential to
remove highly moderated comments as they are integrated into the
documentation.
At the end of the day, we need to lower the barrier to adding
documentation, while increasing the quality. Far from an easy task.
--
Leo Bicknell - [EMAIL PROTE
ut the semi-hung machine isn't a new
occurrence. :-)
--
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/
Read TMBG List - [EMAIL PROTECTED], www.tmbg.org
To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message
systems as AP's, and I'm
thinking I should pick a card with better functionality. What's
the recomendation on the best supported card to make a FreeBSD
AP?
--
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/
Read TMBG List - [EMAIL
;t
believe Microsoft was able to get around that process. So they
are playing by the same rules and guidelines as anyone else.
--
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/
Read TMBG List - [EMAIL PROTECTED], www.tmbg.org
To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message
t_aton (although it makes
some sense), it would seem to me much better if:
0xff00 was hex,
0123456701234567 was octal,
010.010.010.010 was 4 decimal parts
I was very surprised from the poster that 192.168.0.010 might actually
be 192.168.0.8.
--
Leo Bicknell - [EMAIL PROTECTED] - C
ug. :) I'd definately
call the poster's original problem a bug though, IMHO.
--
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/
Read TMBG List - [EMAIL PROTECTED], www.tmbg.org
To Unsubscribe: send mail to [EMAIL PROTECTED]
with
and then simply confirm it.
--
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/
Read TMBG List - [EMAIL PROTECTED], www.tmbg.org
To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message
slog -s, the other -a with all IP's and localhost
in the ACL. I suppose it could be a security thing but all other
apps syslog just fine so I suspect perl should work.
While probably a perl issue, FreeBSD does seem to be the only place
it's broken for me, which is why I thought I'd tr
socket, both of which should succeed
even if syslog isn't running) I don't think the security makes a
difference. I also find it odd that I can get no error out of
openlog, and when I dig into it with the perl debugger I can't tell
anything other than it's call to create the socket fails, but I
have no idea why.
--
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/
Read TMBG List - [EMAIL PROTECTED], www.tmbg.org
msg38766/pgp0.pgp
Description: PGP signature
In a message written on Thu, Dec 19, 2002 at 05:45:34PM -0600, GB Clark wrote:
> What version of Perl is this?
>
> I've used syslogging with FreeBSD 4.4/4.5. Have not tried it lately.
/usr/bin/perl as shipped on 4.4, 4.5, and 4.7.
--
Leo Bicknell - [EMAIL PROTECTE
t evidently is meaningless.
Code as you posted works, which means I can fix my script. Thanks.
--
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/
Read TMBG List - [EMAIL PROTECTED], www.tmbg.org
msg38782/pgp0.pgp
Description: PGP signature
as the default,
to do inet sockets. For anyone running any sort of "secure" syslog
this results in failure.
--
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/
Read TMBG List - [EMAIL PROTECTED], www.tmbg.org
msg38789/pgp0.pgp
Description: PGP signature
work on my FreeBSD 4.7
] system (syslogd is started with -s flag) without specifying
] setlogsock().
Perl 5.8 does not seem to be a part of 4.x, is it in 5.0 or
-CURRENT?
--
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/
Read TMBG
trade off to make
the file more easily parseable in many languages.
--
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/
Read TMBG List - [EMAIL PROTECTED], www.tmbg.org
msg38941/pgp0.pgp
Description: PGP signature
101 - 179 of 179 matches
Mail list logo