d in hte two weeks between
March 22 and April 6.
Mr. Postmaster???
> On Apr 18, 2022, at 12:57 PM, Kevin Oberman wrote:
>
> As per the FreeBSD Security Information web page
> <https://www.freebsd.org/security/>, security notifications are sent to:
>
>-
>
naware of them, so I would strongly urge that they be
posted to, at least, FreeBSD-Announce and FreeBSD-Stable lists.
In passing, I will note that the same issue appears to be occurring with
posts of Errata Notices.
--
Kevin Oberman, Part time kid herder and retired Network Engineer
E-mail:
vulnerability/backdoor that the FSB is already using, but this makes it
mandatory. Putin gave the FSB 2 weeks to implement the law, which is
clearly impossible, but I suspect that there will be a huge effort to pick
all low-hanging fruit. As a result, I suspect no one outside of Russia will
touch GOST.
400 Gbps between the US and Europe as
well as within the US, so this sort of thing is quite important to them.)
--
Kevin Oberman, Part time kid herder and retired Network Engineer
E-mail: rkober...@gmail.com
PGP Fingerprint: D03FB98AFA78E3B78C1694B318AB39EF1B055683
_
popular port (ImageMagick) a few years ago, even though I marked
it as "critical", it was almost 2 weeks before the port was updated,
probably because the maintainer was just routinely updating the port as the
commit did not reference the vulnerability, at all. It was a rather gaping
hole,
What month is 2014-14-22? I assume tgat you meant 2014-12-22.
On Dec 23, 2014 3:35 PM, "FreeBSD Security Advisories" <
security-advisor...@freebsd.org> wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
>
> =
> F
Just a note that the last sentence of the first paragraph is out of conext.
It's too late to update before April 30, 2014.
Not worth correcting, but worth not repeating next time a release passes
EOL.
On May 7, 2014 1:13 PM, "Xin Li" wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
te force attempts as they will stop for a given host as soon as the
firewall is updated. I seldom see more than a handful of attack sources
over any short period.
Should you want to continue with your own tool, at least for IPv4,
consider using tables rather than a raft of rules. With tables,