On Thu, Jun 30, 2005 at 07:51:43AM +0100, mohan chandra wrote:
> Hi All,
>
> I need to establish an IPSec tunnel between two
> FreeBSD systems using IPv6 addresses.The connetcion is
> host-to-host between two FreeBSD( RELEASE 4.11)
> systems with KAME IPSec implementation.
[snip]
Hi
Please rese
Hi All,
I need to establish an IPSec tunnel between two
FreeBSD systems using IPv6 addresses.The connetcion is
host-to-host between two FreeBSD( RELEASE 4.11)
systems with KAME IPSec implementation.
|->|
host1-[mohan]| |host2-[ram]
Uwe Doering wrote:
> So 'tcp_seq.h' needs to be patched, too. [...]
Or you could just follow the instructions in FreeBSD-SA-05:15.tcp. :-)
Colin Percival
___
freebsd-security@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-se
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
=
FreeBSD-SA-05:15.tcpSecurity Advisory
The FreeBSD Project
Topic: T
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
=
FreeBSD-SA-05:14.bzip2 Security Advisory
The FreeBSD Project
Topic: b
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
=
FreeBSD-SA-05:13.ipfw Security Advisory
The FreeBSD Project
Topic: i
Richard Coleman wrote:
Uwe Doering wrote:
Richard Coleman wrote:
Any information on when (or if) the following timestamp vulnerability
will be fixed for 4.X? Any information would be appreciated.
http://www.kb.cert.org/vuls/id/637934
FYI, the fix for RELENG_5 applies to RELENG_4 as is (a
On Wed, Jun 29, 2005 at 02:41:02PM -0700, Colin Percival wrote:
> Michael Scheidell wrote:
> > How safe is this your site?
>
> This doesn't matter (much), since the ports code checks MD5 hashes
> before trusting a downloaded distfile.
Well, after, but before using it :)
Kris
pgpj7Yn73QDxR.pgp
Ok, yes, there is that...
Thanks.
> -Original Message-
> From: Colin Percival [mailto:[EMAIL PROTECTED]
> Sent: Wednesday, June 29, 2005 5:41 PM
> To: Michael Scheidell
> Cc: freebsd-security@freebsd.org
> Subject: Re: Perl master site changed to tobez.org?
>
> Michael Scheidell wrote
Michael Scheidell wrote:
> How safe is this your site?
This doesn't matter (much), since the ports code checks MD5 hashes
before trusting a downloaded distfile.
Colin Percival
___
freebsd-security@freebsd.org mailing list
http://lists.freebsd.org/mailma
Tobez: no disrespect intended, obviously you saw a problem with the
master sites for perl 5.8.7 and did what you could to help, and with
your position as a maintainer, I know that the trust we have in you and
your patches is well earned, so don't take this question as anything but
my well-earned pa
Uwe Doering wrote:
Richard Coleman wrote:
Any information on when (or if) the following timestamp vulnerability
will be fixed for 4.X? Any information would be appreciated.
http://www.kb.cert.org/vuls/id/637934
FYI, the fix for RELENG_5 applies to RELENG_4 as is (apart from the CVS
versi
12 matches
Mail list logo