On Mon, 2022-01-10 at 10:41 +1100, Mathew McBride wrote:
> On Mon, Jan 10, 2022, at 10:14 AM, David Woodhouse wrote:
> > On Wed, 2022-01-05 at 18:05 -0700, Philip Prindeville wrote:
> > > Have you looked at the Traverse Geos2?
> >
> > That's kind of dated now (ADSL2+ only) but Traverse seem
On Mon, Jan 10, 2022, at 10:14 AM, David Woodhouse wrote:
> On Wed, 2022-01-05 at 18:05 -0700, Philip Prindeville wrote:
> > Have you looked at the Traverse Geos2?
>
> That's kind of dated now (ADSL2+ only) but Traverse seem to have a
> new toy now:
>
>
The default mode is already 600, no need to specify it. Access times are also
irrelevant.
Signed-off-by: Rui Salvaterra
---
initd/early.c | 2 +-
plug/coldplug.c | 2 +-
2 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/initd/early.c b/initd/early.c
index 87fee65..4b7e61c 100644
Fix a potential security issue in the way /dev is mounted. Clean up the /dev/pts
mounts while at it.
Rui Salvaterra (2):
procd: mount /dev with noexec
procd: clean up /dev/pts mounts
initd/early.c | 4 ++--
plug/coldplug.c | 4 ++--
2 files changed, 4 insertions(+), 4 deletions(-)
--
/dev is writable. Allowing execution inside it makes it a possible attack
vector. Kees Cook recently sent a kernel patch [1] in order to mount /dev as
noexec and nosuid for systems which rely on CONFIG_DEVTMPFS_MOUNT=y to
create/populate /dev, which isn't our case (it's procd's responsibility).
On Wed, 2022-01-05 at 18:05 -0700, Philip Prindeville wrote:
> Have you looked at the Traverse Geos2?
That's kind of dated now (ADSL2+ only) but Traverse seem to have a
new toy now:
https://traverse.com.au/products/ten64-networking-platform/
And it has an external VDSL board:
On Wed, 5 Jan 2022 at 15:24, Rui Salvaterra wrote:
>
> /dev is writeable. Allowing execution inside it makes it a possible attack
Bah. I just noticed a typo in the commit message. I also have a
/dev/pts mount cleanup queued, so I'll resend as a series of two
patches.
On 1/7/22 10:34, Paul Spooren wrote:
Hi all,
Back at the Hamburg meeting in 2019 and a succeeding vote we decided to migrate
over to a self-hosted GitLab instance. Some years passed and nothing really
happened so I’d like to give this another go.
None of the OpenWrt project members is
The sender domain has a DMARC Reject/Quarantine policy which disallows
sending mailing list messages using the original "From" header.
To mitigate this problem, the original message has been wrapped
automatically by the mailing list software.--- Begin Message ---
Branch: refs/heads/master
Hi Hauke,
On 1/9/22 17:55, Hauke Mehrtens wrote:
The criteria from gnu.org are irrelevant to me and I agree with Rosen and Bjørn
on that topic.
I would prefer a vote like this, this is just an example not the official vote:
-
Migrate bug reporting from bugs.openwrt.org to
On 1/7/22 10:34, Paul Spooren wrote:
Hi all,
Back at the Hamburg meeting in 2019 and a succeeding vote we decided to migrate
over to a self-hosted GitLab instance. Some years passed and nothing really
happened so I’d like to give this another go.
None of the OpenWrt project members is
>> You must be
>> a) human,
>> b) age 13 or older, and
>> c) obey US law.
>>
>> So who exactly can have a SourceHut account but not a Github account?
>At least anyone who:
>- doesn't run proprietary JavaScript; or
>- boycotts PRISM participants (e.g. Microsoft); or
>- boycotts GitHub or Microsoft
Am Dienstag, 21. Dezember 2021, 08:45:59 CET schrieb Oskari Lemmela:
> Make soft_config writable in all cases. Performing soft_config commit
> will fail if mtd partition is not writable.
>
> Signed-off-by: Oskari Lemmela
> ---
> .../drivers/platform/mikrotik/rb_softconfig.c | 17
It's been eight years, we can safely assume iptables is recent enough.
Signed-off-by: Rui Salvaterra
---
This has obviously been build/run-tested without any issues whatsoever. Even
though firewall3 isn't a priority, this is a nice cleanup in itself.
iptables.c| 13 +--
14 matches
Mail list logo