On 1/5/22 4:09 PM, Philip Prindeville wrote:
Hi all,
Happy New Year.
Anyone out there using Freeswitch or Asterisk on their firewall as an IP-PBX?
I've not had to set one up in ages and I'm wondering what works well these days.
I have AstLinux running on an Soekris Net5501 but it's about to
Have you looked at the Traverse Geos2?
-Philip
> On Dec 4, 2021, at 1:28 AM, David Lang wrote:
>
> Are there any devices out there that support bonded DSL under openwrt?
>
> David Lang
>
> On Sat, 4 Dec 2021, Andre Heider wrote:
>
>> Hi,
>>
>> On 03/12/2021 05:28, Andrew Punch wrote:
>>> H
Hi all,
Happy New Year.
Anyone out there using Freeswitch or Asterisk on their firewall as an IP-PBX?
I've not had to set one up in ages and I'm wondering what works well these days.
I have AstLinux running on an Soekris Net5501 but it's about to die... Plus I'd
really rather just have a sing
From: Rafał Miłecki
1. Create "rootfs_data" dynamicaly
U-Boot firmware images can contain only kernel and rootfs volume
(squashfs in case of OpenWrt). There is no way to include "rootfs_data"
UBI volume or make firmware file tell U-Boot to create one.
For that reason "rootfs_data" needs to be c
They are required for container support, but are handled in Config-kernel.in.
Signed-off-by: Rui Salvaterra
---
target/linux/archs38/config-5.10 | 1 -
target/linux/generic/config-5.10 | 2 --
target/linux/layerscape/armv7/config-5.10 | 2 --
target/linux/layerscape
On Wed, Jan 05, 2022 at 03:54:56PM +, Daniel Golle wrote:
> On Wed, Jan 05, 2022 at 03:51:09PM +, Rui Salvaterra wrote:
> > We rely on procd to create/populate /dev for us. These can be safely
> > disabled.
>
> NACK. Disabling this will afaik break LXC and containers relying on it.
> We c
On Wed, Jan 05, 2022 at 03:51:09PM +, Rui Salvaterra wrote:
> We rely on procd to create/populate /dev for us. These can be safely disabled.
NACK. Disabling this will afaik break LXC and containers relying on it.
We could enable it selectively on !SMALL_FLASH instead, to safe space
on targets
We rely on procd to create/populate /dev for us. These can be safely disabled.
Signed-off-by: Rui Salvaterra
---
target/linux/archs38/config-5.10 | 1 -
target/linux/layerscape/armv7/config-5.10 | 2 --
target/linux/layerscape/armv8_64b/config-5.10 | 2 --
target/linux/mediatek/
/dev is writeable. Allowing execution inside it makes it a possible attack
vector. Kees Cook recently sent a kernel patch [1] in order to mount /dev as
noexec and nosuid for systems which rely on CONFIG_DEVTMPFS_MOUNT=y to
create/populate /dev, which isn't our case (it's procd's responsibility).
A
The sender domain has a DMARC Reject/Quarantine policy which disallows
sending mailing list messages using the original "From" header.
To mitigate this problem, the original message has been wrapped
automatically by the mailing list software.--- Begin Message ---
Nice. One small remark though.
HNY
The sender domain has a DMARC Reject/Quarantine policy which disallows
sending mailing list messages using the original "From" header.
To mitigate this problem, the original message has been wrapped
automatically by the mailing list software.--- Begin Message ---
Nice. One small remark though.
HNY
11 matches
Mail list logo