On Fri, Nov 25, 2016, at 01:24 PM, trondd wrote:
> On Fri, November 25, 2016 2:01 pm, Dave Cohen wrote:
> > I'm new to `chroot`. Trying to make sandbox where I can build and run
> > untrusted code without affecting the base system.
> >
> > Following instructions from
> > https://www.ibm.com/develo
Hello,
I noticed some days ago the new package for opendkim emerged into -current
repo.
Is there any way to run it on 6.0 stable?
What files/libraries/dependencies would I have to manually add?
Thanks
Hello everyone,
Is there a way to detect on the fly spam attacks like the pasted below
(maillog)? It seems pf max-src-conn-rate takes in care only the
"connected" event.
I obscured the recipients. Basically sorted addresses of the same target
Chinese host.
Nov 26 05:59:42 server smtpd[55880]:
On Sat, Nov 26, 2016, Walter Alejandro Iglesias wrote:
> Is there a way to detect on the fly spam attacks like the pasted below
> (maillog)? It seems pf max-src-conn-rate takes in care only the
Check the docs for your MTA.
> Nov 26 05:59:46 server smtpd[55880]: 3bcc430eee258cd7 smtp
> event=fa
On Sat, Nov 26, 2016 at 12:08:37PM +0100, Walter Alejandro Iglesias wrote:
> Hello everyone,
>
> Is there a way to detect on the fly spam attacks like the pasted below
> (maillog)? It seems pf max-src-conn-rate takes in care only the
> "connected" event.
>
There's not much you can do besides ad
On 11/26/16 12:08, Walter Alejandro Iglesias wrote:
> Is there a way to detect on the fly spam attacks like the pasted below
> (maillog)? It seems pf max-src-conn-rate takes in care only the
> "connected" event.
>
> I obscured the recipients. Basically sorted addresses of the same target
> Chin
On 11/26/16 04:57, R0me0 *** wrote:
> As I did see any mention around here, I was boosted to post this great
> presentation by Peter N . M. Hansteen.
>
> https://home.nuug.no/~peter/blug2016/
It's nice to hear you like it!
The meeting where I presented this was a lot less well attended than I
ha
On Sat, Nov 26, 2016 at 12:18:23PM +0100, Gilles Chehade wrote:
> There's not much you can do besides adding the offending addresses in a
> pf blacklist.
Yeah, that's what I thought (at least using opensmtpd, I guess what
Claus quoted is from actual sendmail man page).
Thanks to all for answerin
I am (almost) total newbie in respect with networks. Currently in process
of building my own firewall/gateway for home network (based on APU 2C4),
I've decided to take the right (and difficult, at least for me) way of
doing so by using OpenBSD's pf.
Peter's excellent book is my main help and knowle
That is my exact setup. Works really really well. Thank you OpenBSD
developers!
On Sat, Nov 26, 2016 at 10:49 AM Jan Betlach wrote:
> I am (almost) total newbie in respect with networks. Currently in process
> of building my own firewall/gateway for home network (based on APU 2C4),
> I've decide
he is obsolute (20 years old).
Hi guys,
I need to configure my Virtual Host [OpenBSD 6.0 amd64]
in the way [bottom: Linux example]:
auto eth0
iface eth0 inet static
address 5.6.77.8
netmask 255.255.255.255
broadcast 5.6.77.8
post-up route add 123.4.5.254 dev eth0
post-up route add default
On Sat, Nov 26, 2016 at 3:03 PM, Max Power wrote:
> Hi guys,
> I need to configure my Virtual Host [OpenBSD 6.0 amd64]
> in the way [bottom: Linux example]:
>
> auto eth0
> iface eth0 inet static
> address 5.6.77.8
> netmask 255.255.255.255
> broadcast 5.6.77.8
> p
"Max Power" writes:
> Hi guys,
> I need to configure my Virtual Host [OpenBSD 6.0 amd64]
> in the way [bottom: Linux example]:
>
> auto eth0
> iface eth0 inet static
> address 5.6.77.8
> netmask 255.255.255.255
> broadcast 5.6.77.8
> post-up route add 123.4.5.254 dev eth0
On 11/24/16 15:15, Tito Mari Francis H. Escaño wrote:
> Hi everyone,
> Can somebody please recommend me a firewall appliance that can run OpenBSD
and
> pf, and can be upgradeable to the latest version? It would be a great plus
if
> the appliance can also be configured as part of CARP firewall group
Hi guys,
Forgive me, but I am not very expert of OpenBSD.
Guide, about Virtual Host, show examples for all
Operating System but not for OpenBSD. Stupid OVH!
This is the FreeBSD 8.0 way:
Contents of the file : /etc/rc.conf
ifconfig_em0="inet IP.FAIL.OVER netmask 255.255.255.255 broadcast
IP.FAIL.OV
16 matches
Mail list logo