Whenever a connected UDP socket is connected to another peer, any previous
state should be cleared in PF so that only datagrams from the newly connected
peer are deliverd to the socket.
Without this patch the following scenario can occur on machines with PF
enabled using keep state on matching rul
> Nor do you bring up the traffic to the IP addresses offered by
> pool.ntp.org. That traffic has a pattern easily distinguished as
> "system startup".
>
> What's the difference? There isn't. Yet you brought up only google.
I can understand why someone would be ok with sending some packets
to
Today I finally got to try unveil(2) and retrofit it into one of
my applications. I really like it.
But there was one thing that tripped me up for a bit.
When trying to move a file from one directory into a subdirectory
I kept getting an ENOENT when trying to accomplish this with
renameat(2). Att
Ian McWilliam wrote:
> Isn't Unix a trademark of the Open Group? Hence the usage of Unix-like or
> Un*x..
That trademark is UNIX, all caps.
According to [APUEv3]:
"The Open Group owns the UNIX trademark and uses the Single UNIX Specification
to define the interfaces an implementation must suppo
Found out about htobe64(3) after grepping through the source.
-Tim
Index: htonl.3
===
RCS file: /cvs/src/lib/libc/net/htonl.3,v
retrieving revision 1.4
diff -u -p -u -r1.4 htonl.3
--- htonl.3 10 Mar 2016 08:42:26 - 1.4
+
On Tue, Feb 05, 2019 at 01:50:25PM +1000, David Gwynne wrote:
On 4 Feb 2019, at 22:00, Tim Kuijsten wrote:
On Mon, Feb 04, 2019 at 12:07:22PM +1000, David Gwynne wrote:
Currently you can change a tun interface from being point to point to
being a broadcast interface. Why?
I'm
On Mon, Feb 04, 2019 at 12:07:22PM +1000, David Gwynne wrote:
Currently you can change a tun interface from being point to point to
being a broadcast interface. Why?
I'm using broadcast mode in my own wireguard implementation because
there can be more than one peer on the network:
https://git
Hi,
When the "a" designated sender mechanism is used in an spf txt record,
both v4 and v6 addresses are matched according to [1], so let `smtpctl
spf walk` resolve both A and records.
Current output:
$ echo netsend.nl | smtpctl spf walk
80.127.135.115
80.127.98.234
Expected output:
$ ec
On Tue, Dec 05, 2017 at 01:33:23PM -0700, Theo de Raadt wrote:
>That was also the initial design with substantial priv seperation.
>It shouldn't be designed to tap another process potentially running
>with a different uid.
Not wanting to touch processes that run with different user ids, is that
That was also the initial design with substantial priv seperation.
It shouldn't be designed to tap another process potentially running
with a different uid.
Not wanting to touch processes that run with different user ids, is that
in order to fully eliminate any influence from the other process/
8
+#define ACME_OPT_LISTEN0x0016
struct acme_conf {
int opts;
Index: servproc.c
=======
RCS file: servproc.c
diff -N servproc.c
--- /dev/null 1 Jan 1970 00:00:00 -
+++ servproc.c 5 Dec
{
#define ACME_OPT_NEWACCT 0x0002
#define ACME_OPT_NEWDKEY 0x0004
#define ACME_OPT_CHECK 0x0008
+#define ACME_OPT_LISTEN0x0016
struct acme_conf {
int opts;
Index: servproc.c
=======
Plug a memory leak in btree_close.
From
https://github.com/OrangeTide/btree/commit/e186331494b213286934bcc03a1d8c4650836e3b
Index: btree.c
===
RCS file: /cvs/src/usr.sbin/ldapd/btree.c,v
retrieving revision 1.36
diff -u -p -r1.36
Hi tech@
This makes the tear down of ssh control masters better play with shell
scripts that are run by cron. If nothing unexpected happens and in quiet
mode, then don't echo back the command that is being requested.
-Tim
Index: mux.c
14 matches
Mail list logo