.
What is your opinion ?
could be a MITM from my router and a kernel 0day on the tcp/ip stack
implementation ?
could be MITMed pkg_add ?
the encryption algorithm (AES_128_GCM) behind https is really secure ?
Can some code be injected in an encrypted stream ?
Thank you.
Cord.
ideos
on youtube. Please do not comment this because I know it's very subjective.
As I said previously in my opinion there is 0day on how is implemented the
tcp/ip stack in the kernel.
And the vulnerability can be exploited by a mitm attack from the home router.
Thank you Cord.
You are free to believe or not to believe, but you are not free to insult me.
Is that clear ?
Sent with ProtonMail Secure Email.
‐‐‐ Original Message ‐‐‐
On Thursday 2 April 2020 03:01, Anders Andersson wrote:
> On Wed, Apr 1, 2020 at 10:29 PM Cord openbs...@protonmail.com wr
n youtube. Please do not comment this because I know it's very
> > subjective.
>
> Same as before. Tinfoil hat paranoia yet you still use YouTube?
>
What is tinfoil ? and what's wrong in youtube ?
> > As I said previously in my opinion there is 0day on how is implemented th
> Cord openbs...@protonmail.com wrote:
>
> > You are free to believe or not to believe, but you are not free to insult
> > me.
> > Is that clear ?
>
> Or what.. you'll throw your tinfoil hat at them?
of course, my hat is deadly!
>
> "Theo de Raadt" dera...@openbsd.org wrote:
>
> > Cord openbs...@protonmail.com wrote:
> >
> > > You are free to believe or not to believe, but you are not free to insult
> > > me.
> > > Is that clear ?
> >
> > Or
> security, like OpenBSD works on. Anyone that says anything can be hacked
> without
> qualification, loses any respect from me, atleast for that moment. Even
> browsers
"qualification" is very relative word... there are perfect unknown around
internet
that are high qualified guys.
>
> To the
> "Cord" claims, that people with great resources are out there to get his boxes
> hacked. Obviously I can not verify his claim.
>
yes exactly, I know who is the attacker and he has really great of resources
and power.
Most probably he is responsible of the death of a guy
> > change target. Then a victim that describe a situation outside of this
> > schema most
> > probably will be classified as a paranoid or a troll.
>
> Do you have reason to believe, that this evil person has control over your
> hardware
> deliveries? Do you have some procurement process in pl
Hi,
what security technology can I implement to securify for example script that
connect to any website ?
Is there any howto for chroot ?
Thank you.
Cord
I am sorry but I am not a developer, i don't need library or syscall to
securify my software. I am a user that just want security curl or python or ksh
because some guys have hacked my openbsd desktop.
Thank you.
Cord.
‐‐‐ Original Message ‐‐‐
On Tuesday, March 26, 2019 1:
check the kernel integrity ?
thank you.
Cord
Sent with ProtonMail Secure Email.
oaded. Ofcourse I have pf enable and
few service.
I also use a vpn and I visit very few web site with chrome.. maybe 20 or 25
website just to read news. Sometimes I search things about openbsd.
Anyone could help me ?
Cord.
ey's keyphrase, store it off-client -- for example using your
> mobile phone (e.g. Kryptonite -- https://krypt.co; do read caveat regarding
> Android crypto).
>
> Good luck.
>
> On Wed, Apr 03, 2019 at 06:56:39PM +, Cord wrote:
>
> > Hi,
> > I have some heav
this mailing list how to use pkg_check from a live environment
on the infected system but none has answered.
https://marc.info/?l=openbsd-misc&m=155404594328762&w=2
An other way could be an openbsd mirror compromise.. I don't think so but I
don't know.
Cord
‐‐‐ Original Message ‐‐‐
On Thursday, April 4, 2019 1:41 PM, Peter N. M. Hansteen
wrote:
> On Wed, Apr 03, 2019 at 06:56:39PM +0000, Cord wrote:
>
Please read my last email to misc, I tried to explain again.
> If you see ssh sessions that shouldn't be there, kill
On Thursday, April 4, 2019 1:58 PM, Kevin Chadwick wrote:
> On 4/4/19 10:57 AM, Cord wrote:
>
> > Hi, my english seems very bad because my problem is not to make secure the
> > ssh key. My problem is how do not be hacked.
> > I have talked about the ssh key stealing to s
Sent with ProtonMail Secure Email.
‐‐‐ Original Message ‐‐‐
On Thursday, April 4, 2019 2:23 PM, Solene Rapenne wrote:
> On Thu, Apr 04, 2019 at 11:42:15AM +0000, Cord wrote:
>
> > Sent with ProtonMail Secure Email.
> > ‐‐‐ Original Message ‐‐‐
> > On
On Saturday, April 6, 2019 3:30 PM, Marc Espie wrote:
> On Sun, Mar 31, 2019 at 03:24:58PM +0000, Cord wrote:
>
> > Hi,
> > I'd like to run pkg_check but from a live usb stick. This because I want to
> > run a trusted kernel.
> > Maybe I just need to mount t
Hi,
I have found the following errors on the log:
/bsd: chrome[18585]: pledge "", syscall 289
they appear everytime I start chrome.. they are about 4 or 5, what means?
It's the first time, yesterday and in the past there aren't any.
thx cord
,
how to check its integrity ?
- Are there forensics tools for openbsd ?
- Could be usefull memory forensics frameworks like rekall and volatility in
openbsd ? Is planned to build something like that ?
Thank you.
Cord
I
lose all the connections I have with box. I mean lan and serial connections.
I don't know if the box is stucked or it's just the connection. But I find very
strange that I lose the serial connection. Obviously the box is headless. It's
just a simple
raspberry.
FCS stand for "Frame Check Sequence" and it seems a kind of ppp checksum.
Maybe I'm in a spot where the signal is weak. I'll try to move the dongle.
Cord
Hello,
I have a stable openbsd69 installed on a raspberry 3b+. It freezes often
especially when I'm connected to internet through a 4g usb modem.
I'm connected to the rpi from linux by serial and ethernet ssh.
There is not any log, kernel panic or message in console.
thanks
cord
23 matches
Mail list logo