[IMAGE]
Pms Capacitacisn Efectiva de Mixico presenta:
Actualizacisn Nacional de Adquisiciones, Manual de Aplicacisn y su
Reglamento
20-21 de Junio, Mixico D.F.
Nos acompaqan 2 Expertos en la materia: Mtro. Gerardo Coronado y Mtro.
Alberto Ledesma
Empresa Registrada ante la STPS Reg. COLG640205
On 2011-05-25, MArtin Grados Marquina wrote:
> In the past, i configure a virtual machine with "firewall PF" in FreeBSD 8.1
Wrong mailing list.
This list is for OpenBSD.
On 2011-05-24, Chris Wopat wrote:
> On Tue, May 24, 2011 at 3:11 PM, Claudio Jeker
> wrote:
>>
>> Are you running 4.9 or -current? Up until the code generating the LSA
>> update packets (and sending them) did not change between 4.8 and 4.9.
>> In -current this code got rewritten to fix a issue.
Hello Misc,
Some months ago I upgraded my firewall to 4.8 -stable form 4.5.
Everything went well except my spamd setup. I run it in blacklist mode only.
It is running according to logs, netstat, ps ax and top. The table spamd
in pf.conf gets populated by spamd-setup but nothing gets to the spamd.
Oliver Rompcik rompcik.de> writes:
>
> Hi guys,
>
> i got a problem with pkg_add and pkg_delete after release upgrade from 4.8
> to 4.9. This is the first problem afer a release upgrade since years (the
> machine started with 3.8 in 2005).
>
> pkg_info:
> bash-4.1.7p0GNU Bourne Again S
Hello
Greetings of the day!!!
We are a Noida (India) based and leading web services company well reputable
in the market from the last three years, with main proficiency in SMO
(Social Media Optimization), working as an outsourced vendor for many
reputed SEO agency based in USA, UK, Canada
> p5-Digest-SHA1-2.12 module to calculate SHA1 digests
I think that one shouldn't be there anymore since OpenBSD 4.5:
http://openbsd.org/faq/upgrade45.html#Pkgup
Tas.
> I think that one shouldn't be there anymore since OpenBSD 4.5:
> http://openbsd.org/faq/upgrade45.html#Pkgup
On the other hand, I might be wrong... p5-Digest-SHA1, not p5-Digest-SHA.
Sorry for the noise.
Tas.
On 2011-05-25, Steve Currie wrote:
> This installs into /usr/libdata/perl5/i386-openbsd/5.12.2/auto/Digest/SHA but
> that didn't solve the problem yet because the key was the next step. Since I
> don't understand Perl I don't know why this is but it keeps a cache of
> binaries
> in /usr/local so
On 2011-05-25, Ivo Chutkin wrote:
> Hello Misc,
> Some months ago I upgraded my firewall to 4.8 -stable form 4.5.
> Everything went well except my spamd setup. I run it in blacklist mode only.
> It is running according to logs, netstat, ps ax and top. The table spamd
> in pf.conf gets populated b
* Ivo Chutkin (open...@bgone.net) wrote:
> from pf.conf:
>
> pass in log on $ext300 proto tcp from to any port smtp
> rdr-to 127.0.0.1 port spamd
>
> pass in log on $ext300 proto tcp from to any port smtp
> rdr-to 127.0.0.1 port spamd
Hard to tell as you only show parts of the config. It cou
Hello,
I wonder how to check what traffic falls into default queue?
best regards,
RLW
Hi,
On Wed, 25 May 2011 18:09:30 +0700, RLW wrote:
Hello,
I wonder how to check what traffic falls into default queue?
I did this by creating an anchor and put all rules with default queue or
without it (which automagically falls to default queue).
best regards,
RLW
Thanks,
Insan
On 25.5.2011 P3. 15:25 Q., Joakim Aronius wrote:
* Ivo Chutkin (open...@bgone.net) wrote:
from pf.conf:
pass in log on $ext300 proto tcp from to any port smtp
rdr-to 127.0.0.1 port spamd
pass in log on $ext300 proto tcp from to any port smtp
rdr-to 127.0.0.1 port spamd
Hard to tell as
On 25.5.2011 P3. 15:32 Q., Stuart Henderson wrote:
On 2011-05-25, Ivo Chutkin wrote:
Hello Misc,
Some months ago I upgraded my firewall to 4.8 -stable form 4.5.
Everything went well except my spamd setup. I run it in blacklist mode only.
It is running according to logs, netstat, ps ax and top.
[demime 1.01d removed an attachment of type application/octetstream which had a
name of CASA ANNONCES NUMERO 845.pdf]
[demime 1.01d removed an attachment of type application/octetstream which had a
name of FORMULAIRE DEMANDE INFORMATIONS CASA ANNONCES.pdf]
Op Wed, 25 May 2011 15:46:01 +0200 schreef Ivo Chutkin :
On 25.5.2011 P3. 15:32 Q%07., Stuart Henderson wrote:
On 2011-05-25, Ivo Chutkin wrote:
Hello Misc,
Some months ago I upgraded my firewall to 4.8 -stable form 4.5.
Everything went well except my spamd setup. I run it in blacklist mode
On 05/24/11 01:52, Artur Grabowski wrote:
There is no such thing as a "bad frame pointer crash". That's a
diagnostic message from ddb that it can't find anything further up the
stack trace, which is correct, since the function sched_sync is on top
of the stack.
Now, what the kernel tells you is
Hi,
I discovered the following oddity in cwm HEAD:
% xterm -g 80x160 # assuming 160 lines is more than your screen height
(or use urxvt, or xeyes)
Now enter, e.g. "find /" in the terminal, and you will see the text only
goes to the bottom of the screen, not the bottom of the terminal window.
Li
On Wed, May 25, 2011 at 10:51:14AM +1200, Paul M wrote:
[--snip--]
> I have supplied d...@do-that.com with the dump for the K52F. I would
Thanks for feeding the spambots!
> > There is no such thing as a "bad frame pointer crash". That's a
> > diagnostic message from ddb that it can't find anything further up the
> > stack trace, which is correct, since the function sched_sync is on top
> > of the stack.
> >
> > Now, what the kernel tells you is that your kernel did
CURSO TALLER
Tecnicas Especializadas en los Procesos de Credito y Cobranza
Duracion: (1 dma) 8 hrs.
Inversion: $4,150 pesos mas IVA
BENEFICIOS:
Reconozca y cimente los principios y metodos que puede aplicar en el
otorgamiento de CREDITO, LA PREVENCION y RECUPERACION de la CARTERA por
CREDITOS
It looks like Brynet's patch to support SB800+ SMbus in piixpm is in
snapshots now, which is cool, because I'm now seeing sdtemp and spdmem in
my dmesg:
sdtemp0 at iic0 addr 0x18: mcp98242
sdtemp1 at iic0 addr 0x19: mcp98242
iic0: addr 0x1a 00=00 01=00 02=00 03=00 04=00 05=c2 06=00 07=21 08=01
09=
Stuart Henderson wrote:
> If this is related to sending huge LS updates, I don't think many
> people currently running ospfd would hit it (you'd need to be announcing
> quite a lot of networks into ospf), so you probably wouldn't have read
> about it on the lists.
I was able to do some sniffing an
>> You have a confirmed issue now, so -current isn't likely to make things
>> worse. (With daemons like this I'm usually happier running -current in
>> production than older code).
>
> This seems to imply that -current typically consists of bugfixes vs
> new features/enhancements?
all bugfixes go
On Wed, 25 May 2011 14:26:08 -0500, Amit Kulkarni
wrote:
all bugfixes go in current and only serious bugfixes or outright
security breaches are backported to the current release and current
release-1 branches, this is in the FAQ
Is there a reason why an OSPF update larger than 1500 bytes w
Hi,
> > The following diff was just committed to -current which should fix
> > this.
>
> thanks. I will test it in a few days and report.
>
finally I got some time to test it. It works. Below is the full dmesg
and the ifconfig output.
Thanks!
Jochen Fabricius
dmesg:
OpenBSD 4.9-current
>On Wed, 25 May 2011 14:26:08 -0500, Amit Kulkarni
>wrote:
>
>> all bugfixes go in current and only serious bugfixes or outright
>> security breaches are backported to the current release and current
>> release-1 branches, this is in the FAQ
>
>
>Is there a reason why an OSPF update larger than
On 05/25/11 05:12, MArtin Grados Marquina wrote:
> In the past, i configure a virtual machine with "firewall PF" in FreeBSD 8.1
> with three network interface (in pf.conf)
1. As sthen@ pointed out, try a FreeBSD list for questions regarding
FreeBSD's PF.
2. You posted my private reply to a mailin
Theo, come on man... I really don't understand the hostility here. My goal
here is not to get people worked up. I understand you get harassed a lot
and people constantly beg for this and that, but I just wanted
clarification as I have seen no strict guidelines on what actually becomes
"Erra
>Theo, come on man... I really don't understand the hostility here. My goal
>here is not to get people worked up. I understand you get harassed a lot
>and people constantly beg for this and that, but I just wanted
>clarification as I have seen no strict guidelines on what actually becomes
>
A while back someone mentioned they needed certificates like Cisco etc.
had to get OpenBSD used by their organisation. Well they're certainly
certified now, lunatics that is.
I didn't have a great opinion of Cisco but this went from funny to more
than a joke.
A big thankyou to OpenBSDs no shit at
> Honestly, the thought that this can easily affect other people with lots of
> network statements in OSPF is pretty scary, and the thought of running
> -current is equally scary. Most admins prefer not to live out on the edge
> and I understand the project's strict guidelines should ensure safe an
On Mon, May 23, 2011 at 09:59:53AM -0500, Chris Wopat wrote:
> Had a strange issue overnight. In short I had two OpenBSD boxes acting
> as routers denial of service my network with OSPFv3 multicast packets.
>
> The setup is as follows:
>
> Two OpenBSD 4.9 amd64 boxes running ospfd and ospf6d. Eac
Dear misc,
This is Darwin So from Zetta Systems Limited.
We are a manufacturer specializing in mini monitoring camcorder:
www.zetta.com.hk
Our best sellers currently are:
Z11 - 8-hour battery recording, 96-hour circular recording mini DVR
Z11EX - 24-hour battery reco
I have to agree with Theo and I was honestly shocked at your initial email.
You don't bite the hand that is trying to help nor do you bite the hand that
is giving you something for free.
Sent: Wednesday, May 25, 2011 3:22 PM
Subject: Re: ospfd/ospf6d causing denial of service(?)
Theo, come on
> > You have a confirmed issue now, so -current isn't likely to make things
> > worse. (With daemons like this I'm usually happier running -current in
> > production than older code).
>
> This seems to imply that -current typically consists of bugfixes vs
> new features/enhancements?
-current is
Hola misc, si no podes visualizar este correo, podes hacerlo clickeando
en este enlace.
MASTER SECURITY Y TECNICOS EN PC 2011
Un Pack en DVDs con las ultimas novedades en programas para
Hacking Seguridad de Sistemas y Tecnicos en PC. Envio SIN CARGO a todo el
Pais !!!
Los mismos no tienen limitac
38 matches
Mail list logo