?
Cheers,
Nick
--
Nick Phillips / +64 3 479 4195 / [EMAIL PROTECTED]
# these statements are my own, not those of the University of Otago
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
does similarly
As to whether or not I'll have time to help with such a coordinated effort,
I'm really not sure. Depends on how the job thing goes in the next couple
of months.
Cheers,
Nick
--
Nick Phillips -- [EMAIL PROTECTED]
Future looks spotty. You will spill soup in late evening
Anyone having an Idea?
Can't see that you got a response to this... you probably need the PAM
stuff in the chroot (most likely just /etc/pam.d/ssh, but maybe /etc/pam.conf
or other stuff in pam.d).
Cheers,
Nick
--
Nick Phillips -- [EMAIL PROTECTED]
You will wish you hadn't.
On Tue, Jul 10, 2001 at 05:29:32AM -0800, Ethan Benson wrote:
nice to know pam_pwdfile gained md5 support, iirc it only did the
anchient crappy crypt before..
now there just needs to be a passwd command to work with this...
htpasswd
--
Nick Phillips -- [EMAIL PROTECTED]
Don't feed
On Tue, Jul 10, 2001 at 05:29:32AM -0800, Ethan Benson wrote:
nice to know pam_pwdfile gained md5 support, iirc it only did the
anchient crappy crypt before..
now there just needs to be a passwd command to work with this...
htpasswd
--
Nick Phillips -- [EMAIL PROTECTED]
Don't feed
, as they don't properly
verify that you are who you say you are anyway.
--
Nick Phillips -- [EMAIL PROTECTED]
People are beginning to notice you. Try dressing before you leave the house.
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
, as they don't properly
verify that you are who you say you are anyway.
--
Nick Phillips -- [EMAIL PROTECTED]
People are beginning to notice you. Try dressing before you leave the house.
, art. 7 -- available at www.phrack.org.
Anyone using perl for anything vaguely secure should read this NOW if
they haven't already.
And think about all the other possibilities, too...
--
Nick Phillips -- [EMAIL PROTECTED]
It's lucky you're going so slowly, because you're going in the wrong
BlurgenStein wrote:
Hello,
I can't find a Debian package of the Firewall Toolkit, isn't there somewhere a
Debian package around of the fwtk? Or should I compile it myself then?
a) The license forbids packaging it;
b) It seems to be buggy.
I'd suggest having a look at the SUSE proxy
BlurgenStein wrote:
Hello,
I can't find a Debian package of the Firewall Toolkit, isn't there somewhere
a Debian package around of the fwtk? Or should I compile it myself then?
a) The license forbids packaging it;
b) It seems to be buggy.
I'd suggest having a look at the SUSE proxy
Kevin van Haaren wrote:
Postfix question
I have a laptop user that travels around and I'd like to let them
send mail through postfix using authenticated smtp from anywhere on
the internet (I like this better than the pop authentication == smtp
authentication, as it seems more
Petr Cech wrote:
On Mon, Nov 06, 2000 at 09:29:01AM +0100 , Rolf Kutz wrote:
Hi,
I have a Problem with inetd and exim. Exim is
triggert, although it is not listed in hosts.allow
and hosts.deny is All: All or All: All EXCEPT
LOCAL.
do you run exim via tcpd? Exim itself is not
Petr Cech wrote:
Is this really a good idea? Since the exim install does a fair bit of
what is a not a good idea? Leaving it as it always was?
Leaving tcpwrapper support out...
As for default config, probably just exim: ALL: severity mail.info:
allow or
some such. There seem to be far too
Wichert Akkerman wrote:
Previously Nick Phillips wrote:
So, now that we're clear(er), where do security updates for
non-US packages go???
Same location as security updates for all other packages.
There doesn't appear to be the directory structure for this
on security.debian.org - what
Wichert Akkerman wrote:
Previously Nick Phillips wrote:
There doesn't appear to be the directory structure for this
on security.debian.org - what am I missing?
Nothing, security.debian.org is in a non-US locatoin and mirroring
is not encouraged, so we don't need a seperate non-US
Daniel Jacobowitz wrote:
http://security.debian.org potato/updates main contrib non-free
So, now that we're clear(er), where do security updates for
non-US packages go???
Cheers,
Nick
Wichert Akkerman wrote:
Previously Nick Phillips wrote:
So, now that we're clear(er), where do security updates for
non-US packages go???
Same location as security updates for all other packages.
There doesn't appear to be the directory structure for this
on security.debian.org - what
Wichert Akkerman wrote:
Previously Nick Phillips wrote:
There doesn't appear to be the directory structure for this
on security.debian.org - what am I missing?
Nothing, security.debian.org is in a non-US locatoin and mirroring
is not encouraged, so we don't need a seperate non-US
Apologies in advance for the fact that the only type of security
this post has anything do do with is the security of my sanity.
Paul Klinkenberg wrote:
That would be great, i always wanted to remove random people from the list
when i was bored. ;)
Paul.
On Wed, Jul 05, 2000 at
Michael Stone wrote:
And I still think this is a stupid reason for us to be allowing a
security problem to sit around--how many people run dns servers on
machines with dynamic addresses?
Loads. How many people use IP masq to let their bunch of
Win98 clients share their net connection? How
Peter Cordes wrote:
that has the same hash as the file you're trying to spoof. (you don't get
the advantage of the birthday paradox (29 people in a room - 50% chance
at least one pair has the same birthday) because the other member of the
pair is already picked: it is the md5 hash of the
Tim Haynes wrote:
Yup, that's the bunny. New incoming connections are characterised exactly by
having the SYN flag set, continuations of already-established connections
don't have it, so something like
ipchains -I input -p tcp ! -y -j ACCEPT
should do the trick. You might feel
22 matches
Mail list logo