ess by means of fraud and
deceit, just so long as they break no legally binding agreement.
And everyone else DOES have the right to dance a happy jig and flip the bird
in the general direction of RSA Data Security, Inc. when t
esn't do it for you, there's always something else to try.
Even with features like FreeBSD's security levels, once someone has
compromised root on your server, you should pretty much assume you've
also lost any private keys in active us
ense of
security (as well as added inconvenience).
-Michael Robinson
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manag
d5-96 akey=[STRING1] dest=[HOST2]
>sa ipah spi=1000 auth=hmac-md5-96 akey=[STRING2]
>if /dev/tun0 local_spi=1000 remote_spi=1000
>-- HOST 1 --
>-- HOST 2 --
>sa ipah spi=1000 auth=hmac-md5-96 akey=[STRING1] dest=[HOST1]
>sa ipah spi=1000 auth=hmac-md5-96 a
>Where can one find some info on pipesecd? Did not find anything
>on freebsd.org
http://www.freebsd.org/cgi/ports.cgi?query=pipsecd&stype=all
-Michael Robinson
__
OpenSSL Project
y want to do, then, is use something like pipsecd to create
a VPN between your firewalls. It works great for me.
-Michael Robinson
__
OpenSSL Project http://www.openssl.org
User Su
nded) by a
representative standards body. It just came to pass by oligarchic fiat.
No taxation without representation.
-Michael Robinson
__
OpenSSL Project http://w