n't forget to include a matching pass rule.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.datadok.no/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.1
tially the only sane way
to go. See if that doesn't help
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.datadok.no/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[299
"Brent Jones" <[EMAIL PROTECTED]> writes:
> I for one prefer top posting, as usually I have read a particular thread
http://www.asciiartfarts.com/20011201.html
HTH, HAND
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ ht
read your auth log and count, but being
sort of a PF guy I found the PF-based solution quite attractive and flexible.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on
d be able to dig up something useful.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[
The GREY entry may live on for a while, but the existence of a WHITE
entry will ensure that the delivery will succeed on the next attempt.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to
http://www.bsdly.net/~peter/hailmary/ and the inital blog post about the
phenomenon,
http://bsdly.blogspot.com/2008/12/low-intensity-distributed-bruteforce.html
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http
Imran Imtiaz <[EMAIL PROTECTED]> writes:
> how can i make my dlink DWL-G122 wireless usb adapter work with freebsd?
IIRC it's supported by the ural driver. With that knowledge and the
wireless networking chapter in the Handbook, you should be fine.
--
Peter N. M. Hansteen, membe
old table entries, you might want to look at
the expiretable utility (http://expiretable.fnord.se/).
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all the spammers" T
andrew clarke <[EMAIL PROTECTED]> writes:
> Is it possible to configure the FreeBSD firewall to block ports on a
> per-user or per-executable basis?
If your firewall is PF, you can use authpf(8) to configure per user rule sets.
--
Peter N. M. Hansteen, member of the fi
is
list should be able to provide pointers. I suppose even people not in
your area should be able to burn you an install CD and mail it to you if
that is what you need to get started.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ ht
html
If you go down this route, you might want to use expiretable
(/usr/ports/security/expiretable) to trim the contents of the table
after a while (I tend to use 24 hours expiry).
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http:/
old
# mkdir /usr/local
#vi /etc/fstab
edit so your new disk gets mounted as /usr/local, save
# reboot
check that your system works ok, when you're certain everything's ok,
# rm -rf /usr/local.old /var/tmp/mycopyerrors
untested, from memory, adjust as needed, and if it kills y
00928:
There was a change in the passwd format. Need more information.
Any pointers appreciated.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/
"First, we kill all the spammers" The Usenet Bard, &
Lowell Gilbert <[EMAIL PROTECTED]> writes:
> I've moved password entries from 4.x to 5.x with no problem.
>
> Did you remember to rebuild the database?
er, it seems that was the problem, exactly. Thanks!
--
Peter N. M. Hansteen, member of the first RFC 1149 impl
st, make sure sure that you've backed up any important data, then use
whichever tools come with the operating system you want to set up install
that system and configure it. The exact steps depend on which operating
system you want to run instead of FreeBSD.
--
Peter N. M. Hansteen, member o
-primer/index.html
(both contain quite a number of useful references).
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all the spammers" The Usenet
ed to do
manually was the one-line ZAxisMapping magic to make the touchpad's
scroll strip (similar to mouse wheel) work. Then again that was
cut&pasteable from somewhere else. Everything else pretty much just
automagically worked.
--
Peter N. M. Hansteen, member of the first RFC
point, where you can say "I made this, and I'd like to contribute it to
the project", not a lot is going to happen.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.
een too quickly. The port also supplies nice and
straightforward instructions to add spam and virus filtering to the
delivery process. Nice for those of us serving Microsoft desktops.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.dat
ming up, unless this is the kind of challenge you were
longing for in the first place, I don't think it's worth the effort.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First,
iver
installer at least keeps copies of the .sys and the .inf file in a
directory together. After installation in a Microsoft file system that
may of course no longer be the case.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www
to adopt new,
incompatible hardware", we never saw problematic media failure rates
back then. The awful media quality started after CDs became the default
software distribution medium.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1
ecent POP3 and IMAP server?
There are several good ones in ports. imap-uw is very easy to set up.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all th
x27;s that
or not getting the machine to boot at all, well, there it is. I'd
venture a guess that whichever software came with the machine originally
is not quite 64 bit clean either.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rf
ts of people having trouble getting past
the java tools install which is needed to build the port. Unless that
challence is interesting in itself, it's probably more convenient to
download and install a binary package from somewhere in the general
direction of http://download.openoffice.org/1.
ike
they haven't gotten around to making FreeBSD 1.1.4 packages yet. Then
again, I'm not sure what got fixed between 1.1.3 and 1.1.4.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
&quo
emons, chickens
and a few other items I could tell you about if %#^
NO CARRIER
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all the spammers" The
id pf rules?
Does including the anchor in the main pf.conf file produce different results?
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all the spammers" T
et.ip.forwarding sysctl. By convention, you
would normally use rc.conf settings, ie
gateway_enable="YES" #for ipv4
ipv6_gateway_enable="YES" #for ipv6
to enable gatewaying.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ ht
f you
want to run pf, leave alone otherwise. Removing all traces of pf would
likely take a bit of effort.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all the spammers
gnett.no/~peter/pf/no/ if you prefer the Norwegian version)
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all the spammers"
64 at all, for example).
The question is, what's the next reasonable debugging step here?
(and I know you're dying to ask - we do rsync to an off-site location
twice a day)
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.n
options (eg pfctl -s info) give you counters of bytes
and packets passed or blocked. If you use labels in your pass rules,
you'll get per label counters as well.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ htt
tching
rule wins (with state instead of sate it would work), so each packet
increments the relevant counters only once.
> Perhaps you know where I can find workable example of this?
Randal Schwartz has a nice article called "Monitoring Net Traffic with
OpenBSD's Packet Filter"
aving the Windows installer wipe
out stuff it does not understand. There are several howtos out there
within search engine reach which will be helpful.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
&q
client2-out keep state
pass from any to $client2 $client2_inports label client2-in keep state
and so on. Hope this helps.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"F
he counters would keep track of all traffic for a connection, so
traffic initiated from the inside would match the pass out rule's
counters, while connections opened from the outside would count on the
pass in rules.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementati
ng out - pf@benzedrine.cx - and see if
there's an angle we haven't thought of.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all
rather
longer than I appreciate.)
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all the spammers" The Usenet Bard, "Twice-forwarded tales"
_
that day)
KDE desktop myself. An ordinary user would get along fine on a typical
desktop system in their local language, IME. On the other hand your
friendly sysadmin would likely be at a great disadvantage with little or
no English.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementat
e talking about Windows. Yes, there's been a lot of
localization related trouble there. But then we're relatively safe from
the secret brainfarts of Microsoft developers here.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ ht
away from command line options and scripting/programming language
keywords (yes, I have more than 15 years' experience in the localization
industry, I've seen quite a bit of such foolishness) and the software is
sanely written, messages are fairly straightforward and risk-free to
translate. .
Then again, this is guesswork based on very
little information.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all the spammers
or message looks like the network interface has not
been properly configured.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all the spammers&qu
omes in two flavors in 4.11 - kde
and gnome respectively - and I think tihs will also be the case for 5.n
releases from 5.4 onwards). disc2 is traditionally the live filesystem,
while miniinst is for a minimal install.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http:
uide is experience from your typical use, or for that
matter, from people who run rougly the same things you do. If you need a
different configuration for what you want to do, symptoms will show up
soon enough.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.l
requiring pf), is available at
http://undeadly.org/cgi?action=article&sid=20041231195454
Then again, at least in some cases, the people listed in the whois info
for the offending IP appreciate a politely worded notification. Quite
likely they do not want this kind of activity either.
--
Peter N.
rld. Check that any
firewalling of port 53 udp *and* tcp is turned off while you're at it.
These are at least some of the more common errors.
Good luck with the debugging!
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://ww
idence that MSexchange (IIRC) litters
messages with X-ThreadIndex and X-ThreadSubject headers, apparently
attempting to reinvent References: and other usenet features.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://
7;Reilly title now, available direct or via good book stores (online or
otherwise).
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all the s
What do I need to do?
What messages, if any, do you get? The help you get here generally
improves with the precision in reporting such things as error messages.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http
.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all the spammers" The Usenet Bard, "Twice-forwarded tales"
_
Anthony Atkielski <[EMAIL PROTECTED]> writes:
> Why are people asserting their own copyrights in the code?
Because they wrote the software in question, perhaps?
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.d
oint.
> All it takes is one copyright holder who withdraws a license and an
> entire package can become unusable.
i assume you have been told about the 'published under a license' phenomenon.
To me it sounds like you need to read up on a few things.
--
Peter N. M. Hansteen, member of
files for them and next time you need to
> retrieve an FBSD .iso file, just reinstall to get a new 30 day demo.
I may be terribly dense, but the next time you need to get a freebsd
iso, you would use freebsd tools, no?
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation t
couple of seconds of blinkenlights 'ifconfig ath0'
showa "status: associated", and finally
# dhclient ath0
should get you an IP address, again assuming a DHCP server is within reach.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http:/
pier with the second edition.
FreeBSD's PF syntax is old-style, but some other relevant network
config details changed between 2007 and 2010, and the second edition
reflects this.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http:
1-RELEASE&format=html
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all the spammers" The Usenet Bard, "Twice-forwarded tales"
20:11:56 delilah spamd[26
(max-src-conn 100, max-src-conn-rate 15/5, \
overload flush global)
for more detailed discussion see eg
http://www.bgnett.no/~peter/pf/en/bruteforce.html
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.
you to decide which OpenSSH
supported authentication methods you require before loading the rules
which actually let traffic through.
Cheers,
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
&qu
ass from $iptostarve to any port $allowedports keep state queue notalot
- you get the idea.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all the spammers" The Usenet
page could do with a
bit more text.
PS My favorite quote about spamd and greylisting at the moment is this
recent message to openbsd-misc:
http://marc.theaimsgroup.com/?l=openbsd-misc&m=116136841831550&w=2
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http:
t;
> pfspamd_flags="-v -G7:4:864 -r451"
Not related to the main problem, but I think you could probably get
away with a 2 or even 1 minute passtime without ill effects.
> All of spamd could use some documentation, but that'll happen. ;-)
Well, fwiw it's one of the things I w
"Ian Lord" <[EMAIL PROTECTED]> writes:
> It's an all in one solution that authorize wlan lan users before allowing
> them access. It also filter traffic based on their username.
you could roll your own without too much trouble using pf and authpf.
--
Peter N. M. Ha
David Schulz <[EMAIL PROTECTED]> writes:
> process with zabbix agent. The problem is, i dont use ipfw, but pf,
> and i dont know how a rule like that could look like using pf.
Maybe pfstat (/usr/ports/sysutils/pfstat) is worth looking into?
--
Peter N. M. Hansteen, member of t
which to uses the overload feature, see
eg http://home.nuug.no/~peter/pf/en/bruteforce.html (part of my
EuroBSDCon and other places tutorial).
See http://home.nuug.no/~peter/pf/ for a choice of formats and languages.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://
e their harvested garbage to trigger their own
descent into the spamd tarpit. Details via selected posts in my blog
(the blogspot.com ref in the signature).
Cheers,
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.datadok.no/ http://ww
d be interested in hearing what the problems were. It's worth noting
that spamd from OpenBSD 4.1 onwards differs in several important ways from
earlier versions. And also, it's important not to confuse this spamd with
the program with the same name out of spamassassin.
Cheers,
--
Pet
the river etc) so it's really
only useful if your own blacklist gets updated and pruned regularly too.
- P
[1] http://home.nuug.no/~peter/pf/ (several formats), spamd parts start at
http://home.nuug.no/~peter/pf/en/spamd.html
[2] http://www.freebsddiary.org/pf.php
--
Peter N. M
Dave Carrera <[EMAIL PROTECTED]> writes:
> Had a little nasty person trying to break my sshd on port 22.
You can head them off rather easily with a short PF rule set, see
eg http://home.nuug.no/~peter/pf/en/bruteforce.html.
They can actually be fun to watch :)
--
Peter N. M.
listing pf/spamd
in front of your mail server kills an awful lot of spam. keep
spamassassin in there by all means, but after you start greylisting
you most likely will see the load on the machine drop considerably.
it's fairly easy to implement too.
--
Peter N. M. Hansteen, member of the firs
look into running some sort of greylisting (possibly supplemented with
a tarpit for known bad senders).
The greylisting/tarpitting part is really easy to do with PF, see eg
http://home.nuug.no/~peter/pf/en/spamd.html (part of my packet
filtering for fun and profit tutorial)
--
Peter N. M. Hanstee
ard with an overload rule, see eg
http://home.nuug.no/~peter/pf/en/bruteforce.html
Cheers,
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all the spammers" The Usenet B
his can be easily done with the other
firewalls FreeBSD has on tap) with 'overload' rules, ie
http://home.nuug.no/~peter/pf/en/bruteforce.html
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.n
ned so you can see where
things went wrong if they do.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all the spammers" The Usenet Bard, "Twice-forward
ion value) try putting that exact string into
your favorite search engine.
Cheers,
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all the spammers" The Usenet
;s problem, see eg the suggestions in
my tutorial at http://home.nuug.no/~peter/pf/en/bruteforce.html
(http://home.nuug.no/~peter/pf/ for the full manuscript in a variety
of formats).
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http:
in bits per second (or k,M,G multiples of) of percentage of
available bandwidth, not number of packets. Your groups of source
addresses could be maintained as tables for easy manipulation.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/r
to set up with max-src-conn, max-src-conn-rate
overload in your pass rule. See pf.conf(5) for
details. There's probably some magic around to make this doable with
other firewalls as well.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linu
ut here at least is one that does - http://www.bgnett.no/~peter/pf/
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all the spammers" The Usenet
t up a
transparent squid at http://www.benzedrine.cx/transquid.html
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all the spammers" The U
onnection attempts per
time unit and puts the too-chatty ones in a doghouse list of addresses.
One way to do it is described at
http://home.nuug.no/~peter/pf/en/bruteforce.html
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http:
the content filtering up, you may want to look into
easing the load a bit by introducing greylisting via PF (packet
filter) plugin spamd, which can just as easily run on a separate
machine such as your gateway. There are a few in-MTA options too, of
course.
--
Peter N. M. Hansteen, m
very topic
there. That URL also takes you within clicking distance of a good number
of useful BSD sites.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all the spammers
om $int_if:network to any port $allowedports keep state
or even
pass from $int_if:network to any port $allowedports keep state
(if you can do without the extra per interface housekeeping) would make
things a bit easier.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation
rom the firewall
on the external interface, but none which let traffic in on the internal
interface.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all the spammers&quo
ftp-proxy work if i want to disable inetd, and
> switch ftpd with pure-ftpd?
You could try running ftpsesame or pftpx instead.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, w
27; perceived needs. That's where little bits of ftp
through NAT and/or firewalls magic comes in very handy.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all the spamm
n sent out as far as I can see), so you should not be surprised that
one or more iso files have not appeared where you expect them yet.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"F
ite what it should be. Delays
like these are common when either your reverse lookup isn't correct or
the name servers your domain/IP range are unavailable or slow in
answering.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ h
version which
looks to be quite functional so far). There's a bit more info available
at http://porting.openoffice.org/freebsd/ too.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"F
com/Mailing-Lists/FreeBSD/questions/2003-11/1534.html
which seems to do what you ask. Also, ntpd(8) might be of interest.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all the spa
utput is from when the program runs). Anybody else seen something like
this?
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all the spammers" The Use
ub/FreeBSD-Archive/old-releases/i386/
or thereabouts has what looks like a fairly complete collection of
FreeBSD releases. For older stuff including 386bsd and 4.4BSD-lite
there's the archive at ftp://minnie.tuhs.org/BSD/
--
Peter N. M. Hansteen, member of the first RFC 11
e table entries limits, ie
set limit table-entries 15
in your pf.conf would set the upper limit for number of entries in a
table to 150000.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
&quo
JP <[EMAIL PROTECTED]> writes:
> When running the command:
> host -t mx
>
> It returns:
> domaint.tld.domain.tld
You forgot the trailing dot.
Your zone file probably has something like
domain.tld.IN MX mail.domain.tld
which should be
domain.tld.IN MX mail.dom
bgnett.no/~peter/pf/en/bruteforce.html.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all the spammers" The Usenet Bard, "Twice-forwarded tales"
20
" entry. That could be
the source of your problem. See if it makes a difference.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all the spammers" The Usenet Bard, &
ff the parts not relevant
to your message.
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/
"First, we kill all the spammers" The Usenet Bard, "Twice-forwarded tales"
___
1 - 100 of 105 matches
Mail list logo