On Sat, 2013-09-14 at 16:03 +0200, Dag-Erling Smørgrav wrote:
> Ian Lepore writes:
> > I just ran into a build error related to this:
> > [...]
> > I find that the attached patch fixes it for me.
> > [...]
> > @@ -1468,7 +1468,7 @@ lib/libcxxrt__L: gnu/lib/libgcc__L
> > lib/libradius l
On Wed, 2013-09-11 at 17:00 +0200, Dag-Erling Smørgrav wrote:
> OpenSSH in FreeBSD 10 is now built with DNSSEC support, unless you
> disable LDNS in src.conf. If DNSSEC is enabled, the default setting for
> VerifyHostKeyDNS is "yes". This means that OpenSSH will silently trust
> DNSSEC-signed SSH
Ian Lepore writes:
> I just ran into a build error related to this:
> [...]
> I find that the attached patch fixes it for me.
> [...]
> @@ -1468,7 +1468,7 @@ lib/libcxxrt__L: gnu/lib/libgcc__L
> lib/libradius lib/libsbuf lib/libtacplus \
> ${_cddl_lib_libumem} ${_cddl_l
On 2013-09-14 14:01, David Wolfskill wrote:
Sep 13 12:43:24 albert sshd[43949]: fatal: Read from socket failed: Connection
reset by peer [preauth]
I see plentyu of these, if only because I test the sshd availablity with
nagios without actually going thru the full login...
I just abort once I
David Wolfskill writes:
> Sep 13 12:43:24 albert sshd[43949]: fatal: Read from socket failed:
> Connection reset by peer [preauth]
Probably a banner scan. I wouldn't worry about it. I see millions of
these every day.
DES
--
Dag-Erling Smørgrav - d...@des.no
__
My (tiny) networks at home are sitting behind a multi-homed FreeBSD
machine using IPFW & natd, with an externally-visible static /32 --
nothing particularly obscure or exotic, certainly.
The packet-filter box is configured to forward incoming ssh (22/tcp) to
my primary internal machine; in turn, t
Hello, Brett.
You wrote 13 сентября 2013 г., 15:47:13:
>>Juniper's FreeBSD has been verified (whatever it mean in such particular
>>case) as installed inside such router - e.g. version, patch level,
>>kernel compilation options, loaded kernel modules, ...
>>
>>In short, results of security audit