On Sun, Apr 13, 2014 at 1:43 AM, Joly MacFie wrote:
> Question:
>
> Years ago Yahoo! bought major mailing list provider egroups formerly
> onelist, eventually absorbing it into yahoo clubs and making something
> called yahoogroups.
>
> Does this break yahoogroups too? How are THEY handling it?
I
We are not using spamasassin and only major RBLs in place and seeing the same
wave of spam. Seems like a new botnot has just appeared.
-- Babak
--
Babak Farrokhi
> On Apr 13, 2014, at 8:09 AM, Randy Bush wrote:
>
> massive porn spam is making it through spamassassin. new filter oops?
>
>
Question:
Years ago Yahoo! bought major mailing list provider egroups formerly
onelist, eventually absorbing it into yahoo clubs and making something
called yahoogroups.
Does this break yahoogroups too? How are THEY handling it?
--
Hi,
g
I suspect I've been hit by the same run, looks like the RIPE database has been
harvested since I got at least one copy on an e-mail address that I've only
used for the RIPE db. I also saw a lot of peering@ and noc@ addresses in
from/to/cc fields. So far I've received about a hundred copie
massive porn spam is making it through spamassassin. new filter oops?
randy, still researching
On 4/12/2014 8:55 PM, Harry Hoffman wrote:
> Didn't Cisco already release a bunch of updates related to Anyconnect and
> heartbleed?
There were AnyConnect for iOS (little "i", not big "I") issues with
heartbleed, but everything else has been mostly phone and UCS related.
IOS XE is affected if you
On Sat, Apr 12, 2014 at 9:12 AM, Miles Fidelman
wrote:
> - Yahoo (operationally) and the DMARC authors are intentionally
> un-responsive (as are hotmail, comcast, a few others; gmail, I note is not
> bouncing mail)
>
> How do we respond as operators, beyond late-night, ad-hoc patches to list
> sof
Didn't Cisco already release a bunch of updates related to Anyconnect and
heartbleed?
Cheers,
Harry
On Apr 12, 2014, at 6:03 PM, Lamar Owen wrote:
> On 04/11/2014 07:16 AM, Glen Kent wrote:
>>> VPN, on the other hand, is a totally different world of pain for this
>>> issue.
>>>
>> What about
Divided into vertical sections, it requires a new set of hinges and doors and
lock slots front and rear, as well as solid shelves between the sections.
Think about it for a moment, or go visit your nearest colocation center and ask
to see a 1/2 or 1/3 rack. I actually have a 1/3 rack at one of
Dave Crocker wrote:
On 4/12/2014 2:38 PM, Jim Popovitch wrote:
On Sat, Apr 12, 2014 at 1:12 PM, Miles Fidelman
wrote:
someone needs to get a legal opinion wrt
the DMARC group's effort to have all mailinglists change their From:
address.
"The DMARC group" (presumably referring to the dmar
On Sat, Apr 12, 2014 at 5:56 PM, Dave Crocker wrote:
> On 4/12/2014 2:38 PM, Jim Popovitch wrote:
>>
>> On Sat, Apr 12, 2014 at 1:12 PM, Miles Fidelman
>> wrote:
>> someone needs to get a legal opinion wrt
>> the DMARC group's effort to have all mailinglists change their From:
>> address.
>
>
On 04/11/2014 07:16 AM, Glen Kent wrote:
VPN, on the other hand, is a totally different world of pain for this
issue.
What about VPNs?
SSL VPN's could possibly be vulnerable.
On 4/12/2014 2:38 PM, Jim Popovitch wrote:
On Sat, Apr 12, 2014 at 1:12 PM, Miles Fidelman
wrote:
someone needs to get a legal opinion wrt
the DMARC group's effort to have all mailinglists change their From:
address.
"The DMARC group" (presumably referring to the dmarc.org informal
conso
On Sat, Apr 12, 2014 at 1:12 PM, Miles Fidelman
wrote:
> valdis.kletni...@vt.edu wrote:
>>
>> On Sat, 12 Apr 2014 10:12:09 -0400, Miles Fidelman said:
>>
>>> It occurs to me that Yahoo's deployment of DMARC p=reject, and the
>>> choice of several big mail operators to honor that, has created a
>>>
Please don't reply to a message on the list and change the subject line.
Doing so causes your new topic to show "under" the previous one for
those using mail readers that thread properly, and may cause your
message to be missed altogether if someone has blocked that thread.
Instead, save the l
Suppose you have an existing server closet. You want to split it so that
two different organizations can have access to it. Separate doors and a
divider in the middle. Does anyone make kit for this for hosting centers?
Thanks,
Hank
On 04/12/2014 10:10 AM, Jimmy Hess wrote:
On Sat, Apr 12, 2014 at 9:17 AM, Michael Thomas wrote:
Malloc doesn't write over to-be allocated memory, calloc does. Using a
Zero'ing newly allocated memory is not the desired behavior. The
desired behavior is that a segmentation fault occurs, when
Sounds like:
https://isc.sans.edu/forums/diary/Linksys+Worm+TheMoon+Summary+What+we+know+so+far/17633
g
On Sat, 12 Apr 2014 00:32:55 -0400
Joly MacFie wrote:
> Any comments?
>
> -- Forwarded message --
> From: Dave Farber
> Date: Fri, Apr 11, 2014 at 8:13 PM
> Subject: [IP] S
valdis.kletni...@vt.edu wrote:
On Sat, 12 Apr 2014 10:12:09 -0400, Miles Fidelman said:
It occurs to me that Yahoo's deployment of DMARC p=reject, and the
choice of several big mail operators to honor that, has created a
situation not unlike a really routing table or nameserver, snafu ---
It's
William Herrin wrote:
On Sat, Apr 12, 2014 at 10:12 AM, Miles Fidelman
wrote:
What kind of responses are available? In the broader scope of things, what
kinds of responses are typical if someone publishes corrupted information
and then doesn't cooperate in fixing the situation - be that throug
On Sat, Apr 12, 2014 at 9:17 AM, Michael Thomas wrote:
> Malloc doesn't write over to-be allocated memory, calloc does. Using a
Zero'ing newly allocated memory is not the desired behavior. The
desired behavior is that a segmentation fault occurs, when an
application breaks the rules --- so the
On Sat, 12 Apr 2014 10:12:09 -0400, Miles Fidelman said:
> It occurs to me that Yahoo's deployment of DMARC p=reject, and the
> choice of several big mail operators to honor that, has created a
> situation not unlike a really routing table or nameserver, snafu ---
It's more like a peering war. T
On Sat, Apr 12, 2014 at 10:12 AM, Miles Fidelman
wrote:
> What kind of responses are available? In the broader scope of things, what
> kinds of responses are typical if someone publishes corrupted information
> and then doesn't cooperate in fixing the situation - be that through
> obliviousness,
On 04/11/2014 10:45 PM, Jimmy Hess wrote:
The vulnerability is related to re-used memory pages within the same process.
It also does not help that OpenSSL has its own wrapper around malloc()
And instead of using the standard system libraries for memory
allocation, apparently uses a high-risk m
Hi Folks,
It occurs to me that Yahoo's deployment of DMARC p=reject, and the
choice of several big mail operators to honor that, has created a
situation not unlike a really routing table or nameserver, snafu ---
someone's published information that's caused lots of things to break.
At an ope
But it doesn't really matter if you zero out freed memory. Maybe it'll
prevent you from gaining some stale session info and the like. But even if
that were the case, this would still be a serious bug - you're not going to
reread your private key before encrypting each bit of data after all -
that'd
26 matches
Mail list logo