On Wed, Oct 18, 2017 at 05:43:44PM -0500, Benjamin Kaduk wrote:
> I fear I must wade into this thread, despite it being thick with FUD.
>
> On Wed, Oct 18, 2017 at 07:27:42PM +0200, WhiteWinterWolf (Simon) wrote:
> > Hi Ronald,
> >
> > Le 18/10/2017 ? 06:00, Ronald F. Guilmette a ?crit :
> > >
>
On Mon, Oct 26, 2015 at 02:11:02PM -0400, Derek Schrock wrote:
> On Mon, Oct 26, 2015 at 01:52:12PM EDT, Christopher Schulte wrote:
> > > On Oct 26, 2015, at 12:23 PM, Matthew Seaman wrote:
> > >
> > > I'm seeing a SEGV on startup of ntpd on 10.2-RELEASE-p6:
> > >
> > > Oct 26 17:14:33 vhost-2 k
Hi,
Anyone else done the update on FreeBSD 9.3? After rebuilding the world
I'm getting an error when running ntpdc or ntpq
% ntpdc -np
/usr/src/usr.sbin/ntp/libntp/../../../contrib/ntp/lib/isc/unix/net.c:221: fatal
error: RUNTIME_CHECK(((pthread_once((&once), (initialize_action)) == 0) ? 0 :
On Wed, Feb 25, 2015 at 04:04:59PM -0400, Joseph Mingrone wrote:
> Jung-uk Kim writes:
>
> > On 02/25/2015 14:41, Joseph Mingrone wrote:
> >> This morning when I arrived at work I had this email from my
> >> university's IT department (via email.it) informing me that my host
> >> was infected an
On Mon, Feb 02, 2015 at 07:07:11AM -0800, Roger Marquis wrote:
> Before pkgng it was easy to list a system's port dependencies by
> (starting with):
>
>grep glib /var/db/pkg/*/*
>
> Is there an equivalent (single) command for pkgng?
pkg query %ro glib
Regards,
Gary
On Fri, Jan 30, 2015 at 01:20:56AM +1100, Ian Smith wrote:
> On Wed, 28 Jan 2015 17:01:50 -0800, jungle Boogie wrote:
> > Hi Nick,
> > On Jan 28, 2015 4:56 PM, "Nick Frampton" wrote:
> > >
> > > On 29/01/15 08:46, Joe Holden wrote:
> > >>
> > >> Really, how many SCTP users are there om the w
On Wed, Apr 23, 2014 at 04:36:05PM -0700, Charles Swiger wrote:
> On Apr 23, 2014, at 1:21 PM, Erik Cederstrand
> wrote:
> [ ... ]
> >> Not only are both of these shorter and they pass clang's static analyzer
> >> without a warning, I'd argue that the second version is noticeably cleaner.
> >
>
On Wed, Apr 09, 2014 at 04:21:36PM +0200, Zoran Kolic wrote:
> Advisory claims 10.0 only to be affected. Patches to
> branch 9 are not of importance on the same level?
The version of OpenSSL shipped in the base FreeBSD code prior to 10.0
is not vulnerable to the Heartbeat attack, however there is
On Fri, Mar 21, 2014 at 06:13:10PM -0600, Brett Glass wrote:
> At 03:28 PM 3/21/2014, Remko Lodder wrote:
>
> >Ofcourse the software should be well protected as well, and secteam@ did his
> >best to offer the best solution possible. Though as mentioned by Brett for
> >example we just cannot force
On Thu, Sep 12, 2013 at 09:33:34AM -1000, Jonathon Wright wrote:
> I agree, really, I do. This is very frustrating to me. Unfortunately, the
> team has left and gone to another project. They indicated to our management
> that we had 90 days to address the issue with our plan. Its a bit harder to
>
On Tue, Nov 20, 2012 at 11:26:42AM -0500, Eitan Adler wrote:
> On 20 November 2012 04:54, xenophon\+freebsd
> wrote:
> >> As of now:
> >>
> >> - SVN is *the* source of truth.
> >
> > Would it be possible to publish FreeBSD's Subversion repository using
> > HTTPS, instead of HTTP?
>
> %svn ls http
On Tue, Nov 20, 2012 at 10:49:13AM +, John Bayly wrote:
> Regarding the 2012 compromise, I'm a little confused as to what was and
> wasn't affected:
>
> >From the release:
> > or of any ports compiled from trees obtained via any means other than
> > through svn.freebsd.org or one of its mirror
On Tue, Nov 20, 2012 at 04:54:59AM -0500, xenophon\+freebsd wrote:
> > As of now:
> >
> > - SVN is *the* source of truth.
>
> Would it be possible to publish FreeBSD's Subversion repository using
> HTTPS, instead of HTTP?
I don't know how often they update, but the mirrors listed at
http://www
On Sun, Nov 18, 2012 at 06:26:14PM +, Chris Rees wrote:
> On 18 November 2012 18:17, Gary Palmer wrote:
> > On Sat, Nov 17, 2012 at 03:14:00PM +, Chris Rees wrote:
> >> On 17 Nov 2012 15:06, "Gary Palmer" wrote:
> >> >
> >> > Hi,
On Sat, Nov 17, 2012 at 03:14:00PM +, Chris Rees wrote:
> On 17 Nov 2012 15:06, "Gary Palmer" wrote:
> >
> > Hi,
> >
> > Can someone explain why the cvsup/csup infrastructure is considered
> insecure
> > if the person had access to the *package* b
On Sat, Nov 17, 2012 at 05:07:16PM +0100, M. Schulte wrote:
> Hi,
>
> > Can someone explain why the cvsup/csup infrastructure is considered
> > insecure [...]
>
> Speaking of cvsup security -- correct me if I'm wrong, but as far as I
> know cvsup is generally vulnerable to man-in-the-attacks[0].
Hi,
Can someone explain why the cvsup/csup infrastructure is considered insecure
if the person had access to the *package* building cluster? Is it because
the leaked key also had access to something in the chain that goes to cvsup,
or is it because the project is not auditing the cvsup system an
On Wed, May 02, 2012 at 11:45:27PM +0100, Matt Dawson wrote:
> On Wednesday 02 May 2012 23:14:41 Mark Felder wrote:
> > Why go out of your way and use mod_gnutls?
>
> Because it supports TLSv1.[1|2], which was the PP's question, whereas
> OpenSSL doesn't and doesn't show any signs of doing so in
On Thu, Feb 16, 2012 at 02:01:24PM -0500, Glen Barber wrote:
> On Thu, Feb 16, 2012 at 06:59:54PM +0100, Miroslav Lachman wrote:
> > Glen Barber wrote:
> > > On Thu, Feb 16, 2012 at 06:04:34PM +0100, Miroslav Lachman wrote:
> > >> Hi,
> > >>
> > >> I see it many times before, but never take a time
On Tue, Sep 20, 2011 at 03:13:32PM -0400, Mike Tancsa wrote:
> On 9/19/2011 2:00 PM, Mike Tancsa wrote:
> > On 9/16/2011 3:10 PM, Corey Smith wrote:
> >> On 09/16/2011 11:05 AM, Dag-Erling Sm?rgrav wrote:
> >>> My question is: which ones?
> >>
> >> security/pam_ssh_agent_auth
> >>
> >> It is BSD l
On Thu, Apr 21, 2011 at 03:34:47PM +0300, Peter Pentchev wrote:
> On Thu, Apr 21, 2011 at 12:41:34AM -0400, Paul Blazejowski wrote:
> > doesn't mailman unsubscribe an email automatically after a couple of
> > bounces? unless freebsd list is not configured to do so...
>
> That's only if the bounce
On Wed, Apr 20, 2011 at 05:10:41PM -0400, Robert Simmons wrote:
> Every time I send a message to this list, I get a bounced email reply
> from some Russian exchange server for email address xl...@bvpress.ru.
> Is there an admin or a moderator for this list that can remove that
> email address from
On Thu, Dec 13, 2007 at 01:44:46AM -0600, W. D. wrote:
> Hi peeps,
>
> After compiling ipfw into the new 6.2 kernel, and typing "ipfw list",
> all I get is:
>
> "65535 deny ip from any to any"
>
> From reading the docs, this might indicate that this is the
> default rule. (I am certainly prot
On Mon, Jul 17, 2006 at 08:22:53AM +1200, Andrew Thompson wrote:
> But.. pf runs before any userland daemons are loaded so how does it
> matter if there is a short window between netif and pf if nothing is
> listening?
That is one use case for PF, where you are protecting the local system.
What if
24 matches
Mail list logo