http://www.bsdly.net/~peter/hailmary/ and the inital blog post about the
phenomenon,
http://bsdly.blogspot.com/2008/12/low-intensity-distributed-bruteforce.html
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http
pier with the second edition.
FreeBSD's PF syntax is old-style, but some other relevant network
config details changed between 2007 and 2010, and the second edition
reflects this.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http:
ub/FreeBSD-Archive/old-releases/i386/
or thereabouts has what looks like a fairly complete collection of
FreeBSD releases. For older stuff including 386bsd and 4.4BSD-lite
there's the archive at ftp://minnie.tuhs.org/BSD/
--
Peter N. M. Hansteen, member of the first RFC 11
d be able to dig up something useful.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[
read your auth log and count, but being
sort of a PF guy I found the PF-based solution quite attractive and flexible.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on
/pf/>,
with the direct link to the part about state tracking and bruteforcers
at <http://home.nuug.no/~peter/pf/en/bruteforce.html>.
(and of course there's the book, nudge, nudge)
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.co
the opportunity to do
greytrapping for added bonus)
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.2
The GREY entry may live on for a while, but the existence of a WHITE
entry will ensure that the delivery will succeed on the next attempt.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to
"Brent Jones" <[EMAIL PROTECTED]> writes:
> I for one prefer top posting, as usually I have read a particular thread
http://www.asciiartfarts.com/20011201.html
HTH, HAND
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ ht
tially the only sane way
to go. See if that doesn't help
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.datadok.no/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[299
n't forget to include a matching pass rule.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.datadok.no/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.1
the river etc) so it's really
only useful if your own blacklist gets updated and pruned regularly too.
- P
[1] http://home.nuug.no/~peter/pf/ (several formats), spamd parts start at
http://home.nuug.no/~peter/pf/en/spamd.html
[2] http://www.freebsddiary.org/pf.php
--
Peter N. M
d be interested in hearing what the problems were. It's worth noting
that spamd from OpenBSD 4.1 onwards differs in several important ways from
earlier versions. And also, it's important not to confuse this spamd with
the program with the same name out of spamassassin.
Cheers,
--
Pet
e their harvested garbage to trigger their own
descent into the spamd tarpit. Details via selected posts in my blog
(the blogspot.com ref in the signature).
Cheers,
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.datadok.no/ http://ww
the content filtering up, you may want to look into
easing the load a bit by introducing greylisting via PF (packet
filter) plugin spamd, which can just as easily run on a separate
machine such as your gateway. There are a few in-MTA options too, of
course.
--
Peter N. M. Hansteen, m
onnection attempts per
time unit and puts the too-chatty ones in a doghouse list of addresses.
One way to do it is described at
http://home.nuug.no/~peter/pf/en/bruteforce.html
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http:
listing pf/spamd
in front of your mail server kills an awful lot of spam. keep
spamassassin in there by all means, but after you start greylisting
you most likely will see the load on the machine drop considerably.
it's fairly easy to implement too.
--
Peter N. M. Hansteen, member of the firs
Dave Carrera <[EMAIL PROTECTED]> writes:
> Had a little nasty person trying to break my sshd on port 22.
You can head them off rather easily with a short PF rule set, see
eg http://home.nuug.no/~peter/pf/en/bruteforce.html.
They can actually be fun to watch :)
--
Peter N. M.
in bits per second (or k,M,G multiples of) of percentage of
available bandwidth, not number of packets. Your groups of source
addresses could be maintained as tables for easy manipulation.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/r
;s problem, see eg the suggestions in
my tutorial at http://home.nuug.no/~peter/pf/en/bruteforce.html
(http://home.nuug.no/~peter/pf/ for the full manuscript in a variety
of formats).
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http:
ion value) try putting that exact string into
your favorite search engine.
Cheers,
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all the spammers" The Usenet
ned so you can see where
things went wrong if they do.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all the spammers" The Usenet Bard, "Twice-forward
his can be easily done with the other
firewalls FreeBSD has on tap) with 'overload' rules, ie
http://home.nuug.no/~peter/pf/en/bruteforce.html
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.n
ard with an overload rule, see eg
http://home.nuug.no/~peter/pf/en/bruteforce.html
Cheers,
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all the spammers" The Usenet B
look into running some sort of greylisting (possibly supplemented with
a tarpit for known bad senders).
The greylisting/tarpitting part is really easy to do with PF, see eg
http://home.nuug.no/~peter/pf/en/spamd.html (part of my packet
filtering for fun and profit tutorial)
--
Peter N. M. Hanstee
which to uses the overload feature, see
eg http://home.nuug.no/~peter/pf/en/bruteforce.html (part of my
EuroBSDCon and other places tutorial).
See http://home.nuug.no/~peter/pf/ for a choice of formats and languages.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://
David Schulz <[EMAIL PROTECTED]> writes:
> process with zabbix agent. The problem is, i dont use ipfw, but pf,
> and i dont know how a rule like that could look like using pf.
Maybe pfstat (/usr/ports/sysutils/pfstat) is worth looking into?
--
Peter N. M. Hansteen, member of t
"Ian Lord" <[EMAIL PROTECTED]> writes:
> It's an all in one solution that authorize wlan lan users before allowing
> them access. It also filter traffic based on their username.
you could roll your own without too much trouble using pf and authpf.
--
Peter N. M. Ha
t;
> pfspamd_flags="-v -G7:4:864 -r451"
Not related to the main problem, but I think you could probably get
away with a 2 or even 1 minute passtime without ill effects.
> All of spamd could use some documentation, but that'll happen. ;-)
Well, fwiw it's one of the things I w
page could do with a
bit more text.
PS My favorite quote about spamd and greylisting at the moment is this
recent message to openbsd-misc:
http://marc.theaimsgroup.com/?l=openbsd-misc&m=116136841831550&w=2
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http:
ass from $iptostarve to any port $allowedports keep state queue notalot
- you get the idea.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all the spammers" The Usenet
you to decide which OpenSSH
supported authentication methods you require before loading the rules
which actually let traffic through.
Cheers,
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
&qu
(max-src-conn 100, max-src-conn-rate 15/5, \
overload flush global)
for more detailed discussion see eg
http://www.bgnett.no/~peter/pf/en/bruteforce.html
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.
1-RELEASE&format=html
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all the spammers" The Usenet Bard, "Twice-forwarded tales"
20:11:56 delilah spamd[26
lishment on this (untested, may contain nuts) is
possible, and you could probably do worse than spend a few moments
browsing the PF docs or for that matter my rather basic PF tutorial at
http://www.bgnett.no/~peter/pf/ to familiarize yourself with the
system.
--
Peter N. M. Hansteen, membe
" entry. That could be
the source of your problem. See if it makes a difference.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all the spammers" The Usenet Bard, &
bgnett.no/~peter/pf/en/bruteforce.html.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all the spammers" The Usenet Bard, "Twice-forwarded tales"
20
JP <[EMAIL PROTECTED]> writes:
> When running the command:
> host -t mx
>
> It returns:
> domaint.tld.domain.tld
You forgot the trailing dot.
Your zone file probably has something like
domain.tld.IN MX mail.domain.tld
which should be
domain.tld.IN MX mail.dom
e table entries limits, ie
set limit table-entries 15
in your pf.conf would set the upper limit for number of entries in a
table to 150000.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
&quo
html
If you go down this route, you might want to use expiretable
(/usr/ports/security/expiretable) to trim the contents of the table
after a while (I tend to use 24 hours expiry).
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http:/
is
list should be able to provide pointers. I suppose even people not in
your area should be able to burn you an install CD and mail it to you if
that is what you need to get started.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ ht
andrew clarke <[EMAIL PROTECTED]> writes:
> Is it possible to configure the FreeBSD firewall to block ports on a
> per-user or per-executable basis?
If your firewall is PF, you can use authpf(8) to configure per user rule sets.
--
Peter N. M. Hansteen, member of the fi
old table entries, you might want to look at
the expiretable utility (http://expiretable.fnord.se/).
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all the spammers" T
Imran Imtiaz <[EMAIL PROTECTED]> writes:
> how can i make my dlink DWL-G122 wireless usb adapter work with freebsd?
IIRC it's supported by the ural driver. With that knowledge and the
wireless networking chapter in the Handbook, you should be fine.
--
Peter N. M. Hansteen, membe
couple of seconds of blinkenlights 'ifconfig ath0'
showa "status: associated", and finally
# dhclient ath0
should get you an IP address, again assuming a DHCP server is within reach.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http:/
t up a
transparent squid at http://www.benzedrine.cx/transquid.html
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all the spammers" The U
ut here at least is one that does - http://www.bgnett.no/~peter/pf/
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all the spammers" The Usenet
to set up with max-src-conn, max-src-conn-rate
overload in your pass rule. See pf.conf(5) for
details. There's probably some magic around to make this doable with
other firewalls as well.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linu
ite what it should be. Delays
like these are common when either your reverse lookup isn't correct or
the name servers your domain/IP range are unavailable or slow in
answering.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ h
n sent out as far as I can see), so you should not be surprised that
one or more iso files have not appeared where you expect them yet.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"F
27; perceived needs. That's where little bits of ftp
through NAT and/or firewalls magic comes in very handy.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all the spamm
ftp-proxy work if i want to disable inetd, and
> switch ftpd with pure-ftpd?
You could try running ftpsesame or pftpx instead.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, w
rom the firewall
on the external interface, but none which let traffic in on the internal
interface.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all the spammers&quo
om $int_if:network to any port $allowedports keep state
or even
pass from $int_if:network to any port $allowedports keep state
(if you can do without the extra per interface housekeeping) would make
things a bit easier.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation
very topic
there. That URL also takes you within clicking distance of a good number
of useful BSD sites.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all the spammers
omes in two flavors in 4.11 - kde
and gnome respectively - and I think tihs will also be the case for 5.n
releases from 5.4 onwards). disc2 is traditionally the live filesystem,
while miniinst is for a minimal install.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http:
or message looks like the network interface has not
been properly configured.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all the spammers&qu
Then again, this is guesswork based on very
little information.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all the spammers
away from command line options and scripting/programming language
keywords (yes, I have more than 15 years' experience in the localization
industry, I've seen quite a bit of such foolishness) and the software is
sanely written, messages are fairly straightforward and risk-free to
translate. .
e talking about Windows. Yes, there's been a lot of
localization related trouble there. But then we're relatively safe from
the secret brainfarts of Microsoft developers here.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ ht
that day)
KDE desktop myself. An ordinary user would get along fine on a typical
desktop system in their local language, IME. On the other hand your
friendly sysadmin would likely be at a great disadvantage with little or
no English.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementat
rather
longer than I appreciate.)
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all the spammers" The Usenet Bard, "Twice-forwarded tales"
_
ng out - pf@benzedrine.cx - and see if
there's an angle we haven't thought of.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all
he counters would keep track of all traffic for a connection, so
traffic initiated from the inside would match the pass out rule's
counters, while connections opened from the outside would count on the
pass in rules.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementati
client2-out keep state
pass from any to $client2 $client2_inports label client2-in keep state
and so on. Hope this helps.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"F
aving the Windows installer wipe
out stuff it does not understand. There are several howtos out there
within search engine reach which will be helpful.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
&q
tching
rule wins (with state instead of sate it would work), so each packet
increments the relevant counters only once.
> Perhaps you know where I can find workable example of this?
Randal Schwartz has a nice article called "Monitoring Net Traffic with
OpenBSD's Packet Filter"
options (eg pfctl -s info) give you counters of bytes
and packets passed or blocked. If you use labels in your pass rules,
you'll get per label counters as well.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ htt
64 at all, for example).
The question is, what's the next reasonable debugging step here?
(and I know you're dying to ask - we do rsync to an off-site location
twice a day)
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.n
gnett.no/~peter/pf/no/ if you prefer the Norwegian version)
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all the spammers"
f you
want to run pf, leave alone otherwise. Removing all traces of pf would
likely take a bit of effort.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all the spammers
et.ip.forwarding sysctl. By convention, you
would normally use rc.conf settings, ie
gateway_enable="YES" #for ipv4
ipv6_gateway_enable="YES" #for ipv6
to enable gatewaying.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ ht
id pf rules?
Does including the anchor in the main pf.conf file produce different results?
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all the spammers" T
oint.
> All it takes is one copyright holder who withdraws a license and an
> entire package can become unusable.
i assume you have been told about the 'published under a license' phenomenon.
To me it sounds like you need to read up on a few things.
--
Peter N. M. Hansteen, member of
Anthony Atkielski <[EMAIL PROTECTED]> writes:
> Why are people asserting their own copyrights in the code?
Because they wrote the software in question, perhaps?
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.d
.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all the spammers" The Usenet Bard, "Twice-forwarded tales"
_
What do I need to do?
What messages, if any, do you get? The help you get here generally
improves with the precision in reporting such things as error messages.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http
7;Reilly title now, available direct or via good book stores (online or
otherwise).
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all the s
idence that MSexchange (IIRC) litters
messages with X-ThreadIndex and X-ThreadSubject headers, apparently
attempting to reinvent References: and other usenet features.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://
rld. Check that any
firewalling of port 53 udp *and* tcp is turned off while you're at it.
These are at least some of the more common errors.
Good luck with the debugging!
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://ww
requiring pf), is available at
http://undeadly.org/cgi?action=article&sid=20041231195454
Then again, at least in some cases, the people listed in the whois info
for the offending IP appreciate a politely worded notification. Quite
likely they do not want this kind of activity either.
--
Peter N.
uide is experience from your typical use, or for that
matter, from people who run rougly the same things you do. If you need a
different configuration for what you want to do, symptoms will show up
soon enough.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.l
emons, chickens
and a few other items I could tell you about if %#^
NO CARRIER
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all the spammers" The
ike
they haven't gotten around to making FreeBSD 1.1.4 packages yet. Then
again, I'm not sure what got fixed between 1.1.3 and 1.1.4.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
&quo
ts of people having trouble getting past
the java tools install which is needed to build the port. Unless that
challence is interesting in itself, it's probably more convenient to
download and install a binary package from somewhere in the general
direction of http://download.openoffice.org/1.
x27;s that
or not getting the machine to boot at all, well, there it is. I'd
venture a guess that whichever software came with the machine originally
is not quite 64 bit clean either.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rf
ecent POP3 and IMAP server?
There are several good ones in ports. imap-uw is very easy to set up.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all th
to adopt new,
incompatible hardware", we never saw problematic media failure rates
back then. The awful media quality started after CDs became the default
software distribution medium.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1
iver
installer at least keeps copies of the .sys and the .inf file in a
directory together. After installation in a Microsoft file system that
may of course no longer be the case.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www
ming up, unless this is the kind of challenge you were
longing for in the first place, I don't think it's worth the effort.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First,
een too quickly. The port also supplies nice and
straightforward instructions to add spam and virus filtering to the
delivery process. Nice for those of us serving Microsoft desktops.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.dat
point, where you can say "I made this, and I'd like to contribute it to
the project", not a lot is going to happen.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.
ed to do
manually was the one-line ZAxisMapping magic to make the touchpad's
scroll strip (similar to mouse wheel) work. Then again that was
cut&pasteable from somewhere else. Everything else pretty much just
automagically worked.
--
Peter N. M. Hansteen, member of the first RFC
st, make sure sure that you've backed up any important data, then use
whichever tools come with the operating system you want to set up install
that system and configure it. The exact steps depend on which operating
system you want to run instead of FreeBSD.
--
Peter N. M. Hansteen, member o
utput is from when the program runs). Anybody else seen something like
this?
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all the spammers" The Use
com/Mailing-Lists/FreeBSD/questions/2003-11/1534.html
which seems to do what you ask. Also, ntpd(8) might be of interest.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all the spa
version which
looks to be quite functional so far). There's a bit more info available
at http://porting.openoffice.org/freebsd/ too.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"F
-primer/index.html
(both contain quite a number of useful references).
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all the spammers" The Usenet
Lowell Gilbert <[EMAIL PROTECTED]> writes:
> I've moved password entries from 4.x to 5.x with no problem.
>
> Did you remember to rebuild the database?
er, it seems that was the problem, exactly. Thanks!
--
Peter N. M. Hansteen, member of the first RFC 1149 impl
00928:
There was a change in the passwd format. Need more information.
Any pointers appreciated.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/
"First, we kill all the spammers" The Usenet Bard, &
1 - 100 of 105 matches
Mail list logo