On Sunday 18 April 2004 17:26, Whit Blauvelt wrote:
> Hi,
>
> That a lot of spam has been coming through this list is one thing. That the
> list daemon threatens to cut people from the list whose systems refuse to
> accept some of the spam is another.
>
> Might I suggest a simple category of stuff
On Friday 26 March 2004 10:54, Vitaly Fertman wrote:
> do you see anything related in the syslog?
> what does reiserfsck --check say?
It told him to run rebuild-tree, which apparently worked. I'm going to ssh in
once the nameserver is back up (separate problem).
phma
--
li fi'u vu'u fi'u fi'u
A few months ago I set up a mail server for my ISP and put the maildirs on a
separate disk formatted in reiserfs. I just got a call saying that he's
getting "permission denied" errors doing "ls" on the directory:
[EMAIL PROTECTED] mail]# vdir
[EMAIL PROTECTED]: Permission denied
[EMAIL PROTECTED
On Saturday 14 June 2003 14:38, Joachim Zobel wrote:
> Hi.
>
> Are there any plans to add undo capabilities to reiserfs? Most modern
> desktops have a trash can. Am I the only one who has idea that this is a
> crappy workaround for something that should be in the filesystem.
>
> I am aware that thi
On Friday 04 April 2003 13:45, Hans Reiser wrote:
> Edward Shushkin wrote:
> > On the
> >other hand, on the last seminar we made a conclusion to check key
> > validness in oredr to avoid a possible security hole when read() first
> > looks for uptodate (decrypted!) pages in memory before reading en
On Friday 04 April 2003 09:47, [EMAIL PROTECTED] wrote:
> Properly applied, you can even leverage it further - for instance, if your
> backup process doesn't have the key tokens, you can safely let it have
> access to all the files - it can read the 127 meg of data to back it up in
> a bitwise mann
On Friday 04 April 2003 09:01, [EMAIL PROTECTED] wrote:
> On Thu, 03 Apr 2003 18:22:11 EST, Pierre Abbat <[EMAIL PROTECTED]> said:
> > What's LSM? This sounds like it can do what I want with rsync. Is it
> > possible
> >
> > to add a new key token to init
On Tuesday 01 April 2003 11:21, Hans Reiser wrote:
> I think it is essential to the task that apps not be aware of keys.
Indeed. The reiser4-specific syscall should insert or delete a key into the
database; to open a file you use the generic open() syscall, which passes the
filename to reiser4,
On Sunday 30 March 2003 05:12, Hendrik Visage wrote:
> In this whole discussion I'm still missing some references to research
> papers on this technique, as it still sounds to me like security by
> obscurity.
I didn't find this in research papers. I thought of it in the bathtub. The
credential co
On Saturday 29 March 2003 13:17, Edward Shushkin wrote:
> Any collision can be used by attacker for access to remained decrypted data
> in memory, so you should assign the *whole* output of any crypto-stable
> hash function (20 bytes for SHA1). If you use 19 bytes for ID, there is no
> any guarante
On Saturday 29 March 2003 13:17, Edward Shushkin wrote:
> Any collision can be used by attacker for access to remained decrypted data
> in memory, so you should assign the *whole* output of any crypto-stable
> hash function (20 bytes for SHA1). If you use 19 bytes for ID, there is no
> any guarante
On Wednesday 26 March 2003 15:35, Hubert Chan wrote:
> A related, but different question, which may have already been answered
> by Edward's document: can a directory be encrypted, so that only a user
> with the password can list its contents?
The way that's done in CFS is that the filenames are s
On Tuesday 25 March 2003 14:52, Edward Shushkin wrote:
> When user creates a crypto-file, the file system asks for a secret
> key and calculates its id (128-bit word) which supposed to be stored
> in file's stat-data on disk.
> When user opens crypto-file, the file system asks for a secret key,
On Friday 14 March 2003 21:29, Manuel Krause wrote:
> If you already did a --rebuild-tree with that _old_ (~2years!!!)
> reiserfsck I pray you have a backup somewhere.
If I couldn't cat a single file without the cat hanging, how could I make a
backup?
> Try the latest -pre-release
> ftp://ftp.na
Will it be possible to have several directories in a filesystem, each with its
own encryption key, and access each of those directories unencrypted only
while a certain process is running? A friend of mine would like to provide a
backup service and with that sort of encryption they can trust us
Wednesday evening, my computer started giving weird errors. ls in a busy
directory showed lots of garbled filenames. Within an hour it was unbootable.
I called a friend and we went and swapped drives around; the computer
wouldn't recognize either drive, and he suspected a motherboard problem.
T
16 matches
Mail list logo