Hello!
On Sun, Mar 30, 2003 at 11:49:57PM -0800, Robin H. Johnson wrote:
> > Can you please make a metadata dump for us?
> > "debugreiserfs -p /dev/hdb1 | bzip2 -9c >metadata.bz2" and make this file
> > available for us to download.
> Stderr output of debugreiserfs here:
> http://www.orbis-terraru
On Mon, Mar 31, 2003 at 11:34:46AM +0400, Oleg Drokin wrote:
> Hello!
>
> On Sun, Mar 30, 2003 at 11:22:50PM -0800, Robin H. Johnson wrote:
> > The drive still refused to mount.
> > I dug in fsck.reiserfs --help, and saw '--scan-whole-partition'. Tried
> > --rebuild-tree with that on. It showed a
Hello!
On Sun, Mar 30, 2003 at 11:22:50PM -0800, Robin H. Johnson wrote:
> The system refused to mount it originally, so I ran just plain
> --fix-fixable. It showed nothing wrong at all. By a fluke of terminals,
> I have a copy of this first output
> [http://www.orbis-terrarum.net/~robbat2/reiserf
Start SpamAssassin results
11.00 points, 8 required;
* 0.9 -- From: ends in numbers
* 0.6 -- Subject GUARANTEED
* 3.0 -- X-Mailer contains malformed Outlook Express version
* 0.3 -- Message-Id has no @ sign
* 2.0 -- BODY: Nigerian scam key phrase (million dollars)
* 1.0 -- BODY: Nigerian
Greetings,
A server of mine suddenly started acting very wonky and spontaneously
rebooting. I've been pulling my hair out trying to narrow down what the
problem was.
Today after one of the reboots, it showed a lot of damage to several of
the data partitions (not the system ones luckily), so I ran
Start SpamAssassin results
20.40 points, 8 required;
* 0.9 -- From: ends in numbers
* 1.0 -- BODY: Talks about a bigger drive for sex
* 0.2 -- BODY: Tells you how to stop further spam
* 1.7 -- BODY: Information on getting a larger penis or breasts (2)
* 1.0 -- BODY: Stop with the offers,
Start SpamAssassin results
10.10 points, 8 required;
* 0.9 -- From: ends in numbers
* 0.3 -- Message-Id has no @ sign
* 0.9 -- Missing Date: header
* 1.0 -- Received contains 'CacheFlowServer' IDENT name
* 4.0 -- BODY: Written in an undesired language
* 1.0 -- BODY: Message is 50% to 60%
Start SpamAssassin results
11.80 points, 8 required;
* 0.3 -- Message-Id has no @ sign
* 0.9 -- Missing Date: header
* 1.0 -- BODY: Body includes 8 consecutive 8-bit characters
* 1.4 -- BODY: Incorporates a tracking ID number
* 2.8 -- BODY: Urges you to call now
* 0.3 -- BODY: HTML font
On Sunday 30 March 2003 05:12, Hendrik Visage wrote:
> In this whole discussion I'm still missing some references to research
> papers on this technique, as it still sounds to me like security by
> obscurity.
I didn't find this in research papers. I thought of it in the bathtub. The
credential co
On Saturday 29 March 2003 13:17, Edward Shushkin wrote:
> Any collision can be used by attacker for access to remained decrypted data
> in memory, so you should assign the *whole* output of any crypto-stable
> hash function (20 bytes for SHA1). If you use 19 bytes for ID, there is no
> any guarante
Hello!
> See the patch below.
> It should not break anything.
>
I just tried to cause the problems again, but without any success. I simply
don't get the messages today. I tried to call /usr/bin/uptime from all
clients as endless loop, rebooted the server -- no success. Then I stopped
the nfs-
On Sat, Mar 29, 2003 at 03:49:07PM -0500, Pierre Abbat wrote:
> On Saturday 29 March 2003 13:17, Edward Shushkin wrote:
> > Any collision can be used by attacker for access to remained decrypted data
> > in memory, so you should assign the *whole* output of any crypto-stable
> > hash function (20 b
12 matches
Mail list logo