Hi networkers,
I wonder if everyone here is cisco-minded, or if some disagree
with their patent methodology to govern the Internet.
- Forwarded message from Theo de Raadt <[EMAIL PROTECTED]> -
IETF is utterly diseased. Cisco can't help it -- this is a US
business model.
Patenting secur
I just wonder if doing the meeting in a university would
cost more or less.
On Mon, May 03, 2004 at 05:51:54PM +0200, Steven Glogger typed:
:: i think the point is just that our cool swinog team is looking each time for
:: a bigger and nicer place for our meetings.
:: more space = other locations
I did send an email to pgl@ due to the fact that somebody
in my family had to go to hospital during the night before
the event.
sorry for the cancellation procedure though.
--
Key fingerprint = C549 46E1 1B75 116E 3321 BC0A E502 9457 319E B340
RFC822: [EMAIL PROTECTED] || [EMAIL PROTECTED] <<
hi andre@,
I'm no isp ;-/ but hopefully in the way of becoming
a {free||net||open}bsd committer...but let's say "i didn't annoyed
enough developpers for diffs yet.
On Thu, Apr 08, 2004 at 03:53:38PM +0200, Martin Ebnoether typed:
:: On the Thu, Apr 08, 2004 at 11:45:51AM +0200, Andre Oppermann bl
Hopefully we will come to some cooperating
directions.
One that might be the *trust* way, where we deal with
x.509 certificate to manage a trust of mta
(sharing the policies regarding spam)
Kind of mail *peering*.
One might be the credit way, where we score mta's,
and longer they prove their goo
Hi,
Relating to the swissonline/hispeed event about the new
checks for the connecting mta to mx.hispeed.ch, I was
wondering how is handled the fact that many ISPs add PTR RR
for their adsl customers or dialup customers.
I mean, behind these connections can exist both *official*
small mta and susp
pgp scenarios are nice subjects, until it comes to user
social vulnerabilities ;-)
you get my vote.
On Mon, Feb 09, 2004 at 09:16:14AM +0100, Guentensperger, Robert typed:
:: Hi Oliver,
::
:: I guess it would be a great opportunity for the next meeting not only
:: signing keys but also to hear s
Hi,
Can anyone from bluewin.ch contact me off list please,
this is regarding a probably blacklisted domain.
Thanks.
--
Key fingerprint = C549 46E1 1B75 116E 3321 BC0A E502 9457 319E B340
RFC822: [EMAIL PROTECTED] || [EMAIL PROTECTED] << www.NetBSD.org
--
Hi,
what is the schedule as *call for participation* ?
thanks.
--
Key fingerprint = C549 46E1 1B75 116E 3321 BC0A E502 9457 319E B340
RFC822: [EMAIL PROTECTED] || [EMAIL PROTECTED] << www.NetBSD.org
--
[EMAIL PROTECTED] Maillist-Archive:
http://www.ma
hi,
just some words for saying i was very happy to be there
and it was an interesting day.
i couldn't stay for the social evening unfortunately but anyway
i thank people for coming and setting up the meeting.
see you next.
julien.
--
Key fingerprint = C549 46E1 1B75 116E 3321 BC0A E502 9457
remained with 9.2.2P1 that identifies netblock
verisign and returns NXDOMAIN.
On Fri, Oct 03, 2003 at 07:04:53PM +0200, Matthias Leisi wrote:
> G'morning,
>
> Just a quick review: which providers have already installed the
> Bind "delegation only" patch re. Verisign/Sitefinder (or similar
> for
ooops, forgot the link :
relaydbp, sorry for typo. relaydb is part of openbsd.
http://smagin.com/relaydbp
--
Key fingerprint = C549 46E1 1B75 116E 3321 BC0A E502 9457 319E B340
RFC822: [EMAIL PROTECTED] || [EMAIL PROTECTED] << www.NetBSD.org
--
[EMAIL
hi,
i dislike public blacklists and prefer build
personal one.
there is an easy way to do it by storing mails identified
as spam by a filter. then use relaydb[1] to extract suspicious
relay (ip adresses), then simply filter the ip on incoming
tcp:25 connections.
as we are full master of the list,
13 matches
Mail list logo