Hello,
http://news.softpedia.com/news/researchers-bypass-aslr-protection-on-intel-ha
swell-cpu-509460.shtml
paper:
http://www.cs.ucr.edu/~nael/pubs/micro16.pdf[http://www.cs.ucr.edu/~nael/pubs
/micro16.pdf]
could we somehow prevent this attack on OpenBSD?
"Christian Weisgerber"
To: misc@openbsd.org
Subject: Re: SSHowDowN
On 2016-10-18, "Peter Janos" wrote:
> so having AllowTcpForwarding=NO would help.
>
> Why is it yes by default? someone requested it to be yes? does anybody
know?
It has always been like this. OpenSS
nbsd.org
Subject: Re: SSHowDowN
On 10/18/2016 10:56 AM, Peter Janos wrote:
> sometimes I send mails in HTML format, sorry for that, mail.com has this by
> default..
>
> so the PDF also states that the "admin" user had /sbin/nologin for shell
>
> --
> http:/
default? someone requested it to be yes? does anybody know?
Thanks.
Sent: Tuesday, October 18, 2016 at 10:46 AM
From: "Christian Gruhl"
To: misc@openbsd.org
Subject: Re: SSHowDowN
On 10/18/2016 10:41 AM, Sol��ne Rapenne wrote:
> Le 2016-10-18 10:35, Peter Janos a ��crit :
>> sh
shouldn't the default be "no" for the AllowTcpForwarding? Why is an
insecure option "yes" by default?
https://www.akamai.com/us/en/multimedia/documents/state-of-the-internet/sshowdown-exploitation-of-iot-devices-for-launching-mass-scale-attack-campaigns.pdf
Thanks.
Otto Moerbeek"
To: "Peter Janos"
Cc: "openbsd misc"
Subject: Re: What are the security features in OpenBSD 6.0 that are by
default disabled?
On Fri, Oct 14, 2016 at 09:21:24AM +0200, Peter Janos wrote:
> Hello,
>
> I know some features that can give additional
if anyone interested, correction for the pax topic Sent: Tuesday, October
11, 2016 at 3:57 PM
From: "W. Dean Freeman"
To: "'Peter Janos'"
Subject: RE: RE: OpenBSD PaX Test questionIncreasing the stack gap size
isn't necessarily bad or good. Basically,
you'
remote supervisor/console solutions are still turned on while the server
is off, so simply powering off the OS isn't enough.there were/will be
many bugs for these remote console solutions too Sent: Friday, October
14, 2016 at 9:48 PM
From: "Raul Miller"
To: "thrph.i...@gmail.com"
Cc: "OpenBSD gen
Hello,
I know some features that can give additional security isn't turned on due to
because of the bad quality of the code in ports and some also decreases
performance (or disables a feature, ex.: screenlock doesn't work if nosuid
set, but if feature not used, nousid can be used).
I only know ab
Hello gods,
http://seclists.org/fulldisclosure/2016/Oct/62
->
https://github.com/guidovranken/openssl-x509-vulnerabilities
a little bit old, but LibreSSL got this?
The original X509_NAME decode free code was buggy: this
could result in double free or leaks if a malloc failure
occurred.
Simpli
bits (guessed) "to 20
quality bits". Thanks! Sent: Sunday, October 02, 2016 at 12:12 PM
From: "Peter Janos"
To: misc@openbsd.org
Subject: Fix paxtest output on OpenBSD 6.0?Fix paxtest output on OpenBSD
6.0?
Hallo :)
Also I included a few other OS.
Mirror for the post is her
Fix paxtest output on OpenBSD 6.0?
Hallo :)
Also I included a few other OS.
Mirror for the post is here:
https://pastebin.com/raw/y9qHwZxi
Tests are after a default/fresh install (not livecd), using
https://www.grsecurity.net/~spender/paxtest-0.9.15.tar.gz
All OS were installed/
Hallo :)
Also I included a few other OS. Mirror for the post:
https://pastebin.com/raw/y9qHwZxi
Tests are after a default/fresh install (not livecd), using
https://www.grsecurity.net/~spender/paxtest-0.9.15.tar.gz
All OS were installed/tested in VirtualBox-5.1.6_110634_el7-1.x86_64 on a R
13 matches
Mail list logo