:1263:a14:: (no address associated with name)
Using the default sshd_config, ssh is only listening on IPv4 addresses.
Eric Johnson
On Mon, 8 May 2017, Sterling Archer wrote:
> On Mon, May 8, 2017 at 1:58 AM, Eric Johnson
> wrote:
>
>
> Has anyone else had problems with sshd and IPv6 after applying the
> latest
> patches? It seems to me that the patches disabled the use of
On Sat, 10 Jun 2017, G wrote:
> I would say it depends.
>
> 1. What are your requirements
>
> -Do you need to propriety programs like Skype?
> Skype don't run on openbsd
It looks like Skype can be used from Chrome as an extension added from the
web store. I haven't tried it.
Telegram works on
On Sun, 11 Jun 2017, Rupert Gallagher wrote:
> I spent yesterday and today installing 6.1 from scratch on a Dell
> Optiplex gx620. The machine has a pentium 4 @3.0GHz with 4GB non ECC
> RAM, returning a passmark of 354*. The aim is to replace the
> accountant's windows 10 pro tomorrow morning, mo
I'm at a small ISP. One thing we do is provide free Internet to the kids
at the city park. We start it at 8 am in the morning and shut it off
around dark.
My approach was just to add the park access point's IP address to the
shutoff table (for people who need to come pay their bills) every nigh
On Wed, 12 Jul 2017, Mihai Popescu wrote:
> Hello,
>
> I preffer to keep it calm, but some people on the list are using
> protonmail and their mails are impossible to read directly on the
> list. I think they are destroying the list, maybe they should turn
> that feature off. Here is what I see r
ny advantage to using one over the other?
I kind of like the idea of not using sticky-address at all and letting it
choose a fresh address for every connection, but I'm concerned that it
could lead to some problems.
Eric Johnson
rewall must be
seeing the incoming packets and translating the IP address and port.
Instead, my 3:30 am try was just using the MAC address since it was all on
layer 2. The SSH server was seeing the reported IP address but not using
it at all.
So what I saw early this morning now makes sense.
Eric Johnson
On Wed, 26 Jul 2017, Sebastian Benoit wrote:
> Eric Johnson(eri...@colossus.gruver.net) on 2017.07.26 03:48:16 -0500:
> >
> > Yesterday I switched from using a single address for NAT to an address
> > pool. I used the round-robin for the address pool with sticky-addre
On Sun, 6 Aug 2017, Jesper Wallin wrote:
> On Sun, Aug 06, 2017 at 05:29:04PM +0200, Walter Alejandro Iglesias wrote:
> Like Martijn pointed out, you're sending mail from a IP which is not
> intended for mail-servers. Most ISPs block outgoing traffic on port 25
> to prevent their customers sendi
I'm at a small Wireless ISP in a small town and have only a Class C block
of addresses. A couple of years, one local store sold to a new buyer and
they wanted an Internet connection which I happily supplied with a single
IPv4 address fro the store.
A couple of weeks ago, the outside company that
On Fri, 6 Oct 2017, Mihai Popescu wrote:
> > I'm at a small Wireless ISP in a small town and have only a Class C block
> > of addresses.
>
> > [...]
>
> > [...]
>
> Very romantic, indeed, but it has nothing to do with OpenBSD.
> Are you serious?
Since the primary firewall and the DHCP server (
Apparently, it has already been patched on OpenBSD.
>From https://www.krackattacks.com/
When did you first notify vendors about the vulnerability?
We sent out notifications to vendors whose products we tested ourselves
around 14 July 2017. After communicating with these vendors, we realiz
Raid Mirror? I assume you mean Raid-1.
One of my brothers used to be a big fan of mirrors. He somehow thought it was
some kind of substitute for backing up his data. Guess what? He was wrong.
It is generally far better to put the effort into producing and maintaining
proper backups.
Ask yo
--- Original Message ---
On Tuesday, March 7th, 2023 at 03:50, Peter N. M. Hansteen
wrote:
> For whatever reason, Microsoft's Outlook or possibly earlier Microsoft mail
> client products dragged in a convention of quoting the whole thread (even
> though
> those early clients did not in
On Mon, 16 Sep 2013, James Griffin wrote:
> I need to install a Dektop Environment for my partner.
>
> I thought about KDE or xfce, i've tried neither on OpenBSD before. Which
> of the 3 main main DE's (gnome, KDE, XFCE) do you feel work best on
> OpenBSD.
>
> I would need things like removabl
On Tue, 17 Sep 2013, Raimo Niskanen wrote:
> Suppose you are limited to length 1 strings of [a-z], then you have
> 29 possible strings.
>
> Still. If you select one of those strings and calculates its SHA-1
> hash value. When you try any of the other 28 strings (or any other
> string of any lengh
On Fri, 20 Sep 2013, Janne Johansson wrote:
> 2013/9/20
>
> > Janne Johansson wrote:
> >
> > > In practical terms, if I rsync a file from X to Y, and rsync says it is
> > > complete, how to verify the 4G files actually are equal?
> > > Given that rsync only knows that hash(A) was equal to hash(
On Thu, 19 Sep 2013, Peter N. M. Hansteen wrote:
> I remain unconvinced that it's possible to formally verify non-trivial
> code to be bug free. You remain free to convince me otherwise or point
> me to available verified non-trivial software roughly on par with a
> complete operating system.
Pre
On Thu, 19 Sep 2013, josef.win...@email.de wrote:
> Does OpenBSD plan to varify its (main) components, to reach the level of
> zero-bug software?
Just out of curiousity, how much verifying would it take to reach the
level of "zero-bug software"?
How would that affect the development cycle?
>
On Wed, 25 Sep 2013, Dmitrij D. Czarkoff wrote:
> Mayuresh Kathe said:
> > hi, how do mailx users currently handle mime?
>
> They don't. They install mutt, s-nail or whatever.
pine/alpine
Eric
t.
Disclaimer: I've never tried using ssh certificates so you might want
something from someone who knows more about them.
Eric Johnson
On Thu, 3 Oct 2013, Alex Holst wrote:
> This is bare 80x25 text-mode console. Yes, yes. I know. I'm a freak.
Freak?
I do my best work on an inexpensive VT-100 compatible I bought on eBay for
$60 a few years ago. It was brand new out of the box, but put in the box
something like ten years prio
On Sat, 19 Oct 2013, Stefan Wollny wrote:
> Hi there,
>
> having a personal dislike of Facebook (and the MeeToo-systems alike)
> for their impertinent sniffing for private data I tried on my laptop to
> block facebook.com via hosts-file. Interestingly this failed: Calling
> "http://www.facebook.c
On Thu, 24 Oct 2013, Constantine A. Murenin wrote:
> BTW, if you start adding DNS servers in far away places around the
> world, and with bad connectivity from your target audience, then the
> time it takes to resolve your domain for your target audience will
> suffer overall, not improve.
>
> Ye
On Fri, 22 Nov 2013, J. Lewis Muir wrote:
> On 11/22/13 11:17 AM, Giancarlo Razzolini wrote:
> > If it's offensive for you, compile your own spamd man page with
> > the diff you so happily provided, and live the rest of your life
> > happy. Remember to always take this pill again on 1st of May, an
On Thu, 5 Dec 2013, obsd, cgi wrote:
> So I know the rule.. only remember a few very very long passwords (ex.:
> based on several words and a few special chars), and keep the rest of the
> passwords in a password manager (those aren't remembered and extreme long).
I'm not at all convinced that ad
to change?
Thanks,
Eric Johnson
[demime 1.01d removed an attachment of type application/pgp-signature]
On Tue, 29 Jan 2008 01:47:32 -0600
Denny White <[EMAIL PROTECTED]> wrote:
> AFAIK, there are 3 files it says that need to be updated when
> changing hostname. /etc/hosts, /etc/myname & /etc/hostname.interface.
> The last one on my system is hostname.fxp0 and, since you didn't
> mention changing yo
penBSD mailing
lists, has made it through since I started doing this.
Thanks,
Eric Johnson
-
off-list replies: [EMAIL PROTECTED]
[demime 1.01d removed an attachment of type application/pgp-signature]
Does anyone know of a method of using skey for scp transfers (apart from port
forwarding through an ssh tunnel)?
I've tried:
scp username:[EMAIL PROTECTED]:/home/username/foo.bar .
and
scp "username:skey"@host.example.com:/home/username/foo.bar .
Any other suggestions?
Thanks
On Wed, 16 May 2007 10:14:43 +1000
Darren Tucker <[EMAIL PROTECTED]> wrote:
> On Tue, May 15, 2007 at 04:36:15PM -0500, Eric Johnson wrote:
> > Does anyone know of a method of using skey for scp transfers (apart
> > from port forwarding through an ssh tunnel)?
> >
at
since most attacks traversed directories on the same hard drive, they
wouldn't be able to get into any system programs by that method. I
never did try it, though.
Eric Johnson
e, we need to make
sure that any security holes in the code are fixed.
(Note. In the above cases, the FQDN was replaced with a nonrouteable
IP address.)
Eric Johnson
n re-mount
> back ro. Does nothing really.
Of course, they could just "chflags schg *". That way, an attacker
couldn't just remove the schg flags from the files he wants to modify.
The big advantage to using a CD or DVD is that one could create the
CD/DVD from a more secure site while leaving the live site running.
When ready to upgrade, just change the CD or DVD and reboot.
Eric Johnson
On Mon, 24 Sep 2007 22:55:16 +0200
Ed <[EMAIL PROTECTED]> wrote:
> http://2006.opencon.org/
Just out of curiousity (since I can't make it), is there a newer page
on this?
Eric Johnson
presumably) to
the same recipient but with a different from address for each attempt.
Eric Johnson
re the keys.
If you are compiling a program and need errno.h, just look in
/usr/include and there it is.
Eric Johnson
Which web mail package is easiest to install and use on
OpenBSD? Are there any gaping security holes?
Eric Johnson
ption through bsdmall
for some time. That way, I don't have to remember to order the CDs,
they just arrive and my credit card gets billed automagically.
But they can be slow as molasses. If it takes until mid June against
this year, I'm planning on cancelling that subscription and ordering
directly starting with the next release.
Eric Johnson
are you sure you really want to let them have
that kind of access at all?
You might try subversion instead.
Eric Johnson
tition of 10 GB. It is
currently about 40% full.
We don't restrict mailbox size for our users, but if a mailbox is
getting too full, we back it up, remove it, and notify the user how he
can get a backup copy. So far, noone has ever asked for a backup copy.
Eric Johnson
onth deletes the spam-lastmonth file from the directory, renames
spam to spam-lastmonth, and creates a new spam file for them.
To the best of my knowledge, we have never had a false positive on this
check.
Eric Johnson
ally wowed by the first 1G drives.
> Or the first 20M drives... We get our staggering amount of storage
> units confused easily. :)
I was really impressed when we got two 150 MB drives for the old
PDP-11/70. $15,000 each and $15,000 for the disk controller.
We had so much space we didn't know what to do with it all.
Eric Johnson
r the first attempt fails. I haven't seen
them try again after two or three attempts.
Has anyone else tried greylisting and noticed this behavior? Has anyone
noticed this behavior without greylisting? Are my interpretations
correct?
Eric Johnson
d find a ssh daemon for windows, you could use that to
allow the server to use scp to transfer files back and forth.
Eric Johnson
d find a ssh daemon for windows, you could use that to
allow the server to use scp to transfer files back and forth.
Eric Johnson
&
users
would ever wonder about that, much less try to see what was in the "fs"
directory and so they'd never discover they didn't have access. And if
they didn't have access, they'd think it was like that out of the box.
> And, honestly, I did not know that windows even has daemons. I thought
> that was a Unix concept.
On windows, they call it services with yet another programming interface
to use them.
Eric Johnson
48 matches
Mail list logo