Hello everyone. It is my first post on this mailinglist.
As we know in FreeBSD there is the pseudo random
number generator (PRNG) for random IP fragmentation ID.
It is available when "net.inet.ip.random_id" sysctl variable is
set to 1 (default 0). I would like to know, which algorithm (X2,
X3 or A
r you have a chance to review.
> Cheers!
>
> If you no longer wish to receive emails, please unsubscribe
>
> 866-288-1880
> 5150 yarmouth ave, Encino, CA 91316
> On Sat, 3 Sep 2011 19:32:37 +0200, ian ivy wrote:
>
___
freebsd-security@free
Hello!
Since, Fabian has taken steps to resolve the problem of spam
(He sent detailed e-mail to the admins), let say, that this problem
is "solved".
Can we get back to the question about 'IP fragmentation ID'? Thanks.
Best regards! Fabian, thanks for the commitment.
Ian.
2011/9/6, Fabian Wenk :
Hi, is there any chance (if yes, how to do this?) to use the xf86
driver which "provides access to the memory and I/O ports of a
VGA board and to the PCI configuration registers for use by
the X servers when running with a kernel security level greater
than 0" in FreeBSD*?
Then it will be possible
Thanks Jason. Of course opening (or doing whatever with) mem, kmem etc.
is a security flaw. A fatal flaw. I thought that OpenBSD team has done nice
work to achieve a compromise between security and the use of X and
it could be done with FreeBSD.
I already have implemented some of MAC's policies (e
Hello,
By default FreeBSD uses MD5 to encrypt passwords. MD5 is believed to be
more secure than e.g. DES but less than e.g. SHA512. Currently several
major Linux distributions, uses a SHA512 mechanism. Suse Linux also offers
a blowfish.
Some Debian based distributions use MD5-based algorithm comp
Hi Max,
Thanks for the link. I did not notice, that it was
already discussed.
Best regards!
___
freebsd-security@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-security-unsub