pany to sue them for royalties.
Intel has been on record as stating that patent issues are now a
significant problem for them.
-wolfgang
--
Wolfgang S. Rupprechthttp://www.wsrcc.com/wolfgang/
Is there any way to run a my gps pps (pulse per second) clock off of
obsd-current with Mills' ntpd? So far the gps is hooked up to a
machine running nbsd, but I'd like to consolidate things.
-wolfgang
--
Wolfgang S. Rupprechthttp://www.wsrcc.com/wolfgang/
"Dan Farrell" <[EMAIL PROTECTED]> writes:
> Correct me if I'm wrong (and I usually am) but I thought DNS (and named
> specifically) only used tcp connections for zone transfers.
Last time I looked named used TCP any time a packet needed to be
fragmented due to size. It is highly unlikely that th
ream and pretend that nothing out of the ordinary
were going on.
Personally I don't see how a hardware chip maker can prove that the
chip doesn't have a trojan without providing masks for inspection and
a way to prove that those masks and only those masks were used to make
the chip. Open sour
> So what if one of the driver writers for one of the open source operating
> systems were to design a set of open standards for a hardware/software
> interface for chipsets in this class.
I guess the part I don't understand is why are open source folks so
wary of running black-box *.o binaries f
I wrote:
> A GENERIC amd64 kernel compiled from today's sources is causing my
> Asus k8v-se-d to run fast by approximately 3 seconds per minute.
> (Obviously that was with ntpd not running.) This has never been a
> problem before. Is anyone else seeing this?
Turns out this was caused by the most
A GENERIC amd64 kernel compiled from today's sources is causing my
Asus k8v-se-d to run fast by approximately 3 seconds per minute.
(Obviously that was with ntpd not running.) This has never been a
problem before. Is anyone else seeing this?
Upon booting I also get quite a bit of hex-dump output
> I don;t have telnet open on my home network, but i was considering opening
> it up on the OpenbD firewall, and using some sort of one time password
> scheme.
>
> Would this be a sane thing to do? and f so, where cold find some software
> to support the one time password functionality?
Once you
"Spruell, Darren-Perot" <[EMAIL PROTECTED]> writes:
> From: Wolfgang S. Rupprecht
>> 2) Forging the source IP in a TCP packet and succeeding in negotiating
>>the 3-way handshake isn't all that simple any more. I wouldn't
>>worry about it.
<[EMAIL PROTECTED]> writes:
> My only question is what if I traceroute to you, find out the IP number of
> your upstream router? Then I make a bunch of connection attempts to your IP
> but forge the packets to make them look like they came from your upstream.
> Don't *you* end up blacklisting
Martin SchrC6der <[EMAIL PROTECTED]> writes:
> On 2005-09-23 00:05:14 -0700, Wolfgang S. Rupprecht wrote:
>> appreciable added risk. The only loose end is that sshd doesn't
>> currently log the RSA/DSA key that is used to gain access. Ideally it
>
> Hu? Try
&
he RSA/DSA key that is used to gain access. Ideally it
would record the comment field from ~/ssh/authorized_keys into
/var/log/authlog. That way, as long as everyone had their own key,
you could always tell who logged in as root, same as the case of
trampoline logins via a normal use account.
-w
Han Boetes <[EMAIL PROTECTED]> writes:
> That's why you should always use the latest snapshot. (:
I'm not sure it would have helped here. mountd() did work for many
people so it probably would have found its way into a snapshot.
One of the other OS distributions I'm testing is relatively
source-
Otto Moerbeek writes:
> As a workaround, revert to version 1.63 of sbin/mountd.c
1.63 does indeed fix it.
> Could you run mountd -d, mount a filesystem, run ls and and send the
> output, both when runnign 1.63 and 1.64?
Here you go:
===
with mountd.c 1.63
[EMAIL PR
Otto Moerbeek writes:
> If I see things correctly you are mounting a fs that is served by
> the same host. Could you try a different client? It makes the logs a
> bit easier to read.
Will do. I need to wait till a build on an exported fs finishes.
> Also, coud you send the /etc/exports file and
of the "cvs update")
The same behavior is seen when trying to NFS mount the openbsd
filesystem from a remote host.
I noticed that nobody else on either *.misc or *.tech posted about
this. Am I the only one seeing it???
-wolfgang
--
Wolfgang S. Rupprechthttp://www
16 matches
Mail list logo