[swinog] [deraadt@cvs.openbsd.org: Cisco's Statement about IPR Claimed in draft-ietf-tcpm-tcpsecure]

2004-05-12 Thread julien mabillard
Hi networkers, I wonder if everyone here is cisco-minded, or if some disagree with their patent methodology to govern the Internet. - Forwarded message from Theo de Raadt [EMAIL PROTECTED] - IETF is utterly diseased. Cisco can't help it -- this is a US business model. Patenting

Re: [swinog] ISPs using FreeBSD

2004-04-08 Thread julien mabillard
hi andre@, I'm no isp ;-/ but hopefully in the way of becoming a {free||net||open}bsd committer...but let's say i didn't annoyed enough developpers for diffs yet. On Thu, Apr 08, 2004 at 03:53:38PM +0200, Martin Ebnoether typed: :: On the Thu, Apr 08, 2004 at 11:45:51AM +0200, Andre Oppermann

Re: [swinog] cablecom antispam strategy

2004-02-12 Thread julien mabillard
Hopefully we will come to some cooperating directions. One that might be the *trust* way, where we deal with x.509 certificate to manage a trust of mta (sharing the policies regarding spam) Kind of mail *peering*. One might be the credit way, where we score mta's, and longer they prove their

[swinog] bluewin.ch contact please

2004-02-05 Thread julien mabillard
Hi, Can anyone from bluewin.ch contact me off list please, this is regarding a probably blacklisted domain. Thanks. -- Key fingerprint = C549 46E1 1B75 116E 3321 BC0A E502 9457 319E B340 RFC822: [EMAIL PROTECTED] || [EMAIL PROTECTED] www.NetBSD.org

[swinog] closing 7th edition

2003-10-22 Thread julien mabillard
hi, just some words for saying i was very happy to be there and it was an interesting day. i couldn't stay for the social evening unfortunately but anyway i thank people for coming and setting up the meeting. see you next. julien. -- Key fingerprint = C549 46E1 1B75 116E 3321 BC0A E502 9457

Re: [swinog] e-mail blacklists / RBL etc..

2003-09-28 Thread julien mabillard
hi, i dislike public blacklists and prefer build personal one. there is an easy way to do it by storing mails identified as spam by a filter. then use relaydb[1] to extract suspicious relay (ip adresses), then simply filter the ip on incoming tcp:25 connections. as we are full master of the