Basically, I got on the plane with a bomb. Basically, I tried to ignite it. Basically, yeah, I intended to damage the plane.

2002-10-06 Thread Assirian Movement

WESTERN PEOPLE, WESTERN GOVERNMENT, DO NOT HELP SADDAM BEING SOFT!
IF YOU GO ON WITH YOUR SICK/SOFT UN POLICY YOU WILL FIND THE BOMBERS
INSIDE YOUR BUS. 

WESTERN GOVERNMENT YOUR ELECTORS WILL PUNISH YOU IF YOU HELP SADDAM.

SADDAM = WAR TODAY = 100 WARS TOMORROW


Basically, I got on the plane with a bomb. Basically, I tried to ignite
it. Basically, yeah, I intended to damage the plane. 
RICHARD REID 

Four in U.S. Charged in Post-9/11 Plan to Join Al Qaeda
Federal officials said they had broken up a terrorist cell in Portland,
Ore., arresting four native-born citizens accused of plotting to join with
Al Qaeda and Taliban fighters. 



Association of assirian countrymen Bat-Nac  
Aims and Tasks of organization:  Active contribution to the revival,
preservation, development of assirian culture, propaganda among population
of historical heritage of assirian people of Iraq and Saudi Arabia.
Leader of organization:  Bat-Nac 
Phone:  113 27 27  
Date of registration:  05.03.79  

This is nor Spam write back to us for removal.
Write to [EMAIL PROTECTED] with 'REMOVE ME PLEASE AS A SUBJECT'



Study assirian,Be Proud of being!
http://www.acl.edu.au/choose_lang_ass.html

Our assirian page went on top of all the searchs consulting the Traffic
Security Experts:
http://www.msn.com/ +  Security Traffic Expert

http://search.msn.com/results.asp?q=security+traffic+expertorigq=traffic+ex
pertRS=CHECKEDFORM=SMCRTv=1cfg=SMCINITIALnosp=0thr=submitbutton.x=32
submitbutton.y=16



WESTERN GOVERNMENT: YOUR ELECTORS WILL PUNISH YOU IF YOU HELP SADDAM.

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-hackers in the body of the message



Re: PRNG not seeded - error in non-root ssh inside 4.6.2 jails...

2002-10-06 Thread Mark Murray

 Ok, I am not sure how I can do that though - I cannot successfully run 
 `rndcontrol -s X` inside a jail.
 
 On the other hand, I already have:
 
 rand_irqs=9 10 11 13 14
 
 In my rc.conf on the underlying host machine, and have done several boots 
 with that in place.  So presumably I should be seeded just fine, but if I am 
 not, I cannot change that in the jail because it seems I cannot set that (I 
 assume it is a sysctl issue).
 
 Willing to try whatever you can think of next :)

Hokay. Can you grovel around inside OpenSSL (src/crypto/openssl/...) and
find where the random device is read? If it is /dev/random, then change
that to /dev/urandom.

See how that works.

M

   I can't seed it by banging on the keyboard - it is a headless server in 
 a
   rack thousands of miles from me :)
  
   Perhaps there is another way to do it ?
 
 Yes.
 
 You need to find sources of entropy in interrupts. Look at a
 dmesg, and note which IRQ's your network device(s) and mass
 storage controller(s) (both SCSI and ATA). Use any other
 irq's that aren't too busy and may be somewhat random.
 Staring at a 'systat 2 -vmstat' screen (right hand side)
 may give some clues.
 
 Then use rndcontrol(8) to set up the seeding. There is a knob
 in rc.conf to make this setting survive the next reboot.
 
 M
 
   Date: Thu, 03 Oct 2002 21:54:30 +0100
   
 Sorry, here is the rest:

 Here is the output of the `dd` command using urandom:

 dd if=/dev/urandom of=/dev/stdout bs=512 count=1 | hexdump -C
 1+0 records in
 1+0 records out
   a0 69 1a 7c 8f 32 e5 21  ae 7a 33 14 68 0b 8e a6
 |.i.|.2.!.z3.h...|
   
   ... etc. Looking good.
   
 $ ls -l /dev/*rand*
 crw-r--r--  1 root  wheel2,   3 Sep  3 21:46 /dev/random
 crw-r--r--  1 root  wheel2,   4 Sep  3 21:46 /dev/urandom
   
   Also good.
   
   So then, as root I ran: `chmod 0666 /dev/stdout` and then I ran 
 your
 `dd`
   command and got:
  
   $ dd if=/dev/random of=/dev/stdout bs=512 count=1 | hexdump -C
   0+0 records in
   0+0 records out
   0 bytes transferred in 0.36 secs (0 bytes/sec)
   
   Can you try a few of these while furiously abusing your keyboard?
   I'm trying to see if /dev/random can be persuaded to give _any_
   aoutput at all.
   
   Maybe do it on a vty instead of in X.
   
   M
   --
   o   Mark Murray
   \_
   O.\_Warning: this .sig is umop ap!sdn
  
  
  
  
   _
   Chat with friends online, try MSN Messenger: http://messenger.msn.com
  
 --
 o   Mark Murray
 \_
 O.\_Warning: this .sig is umop ap!sdn
 
 
 
 
 _
 Send and receive Hotmail on your mobile device: http://mobile.msn.com
 
 
 To Unsubscribe: send mail to [EMAIL PROTECTED]
 with unsubscribe freebsd-hackers in the body of the message
-- 
o   Mark Murray
\_
O.\_Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-hackers in the body of the message



Re: FreeBSD Developer Status Report: July 2002 - August 2002

2002-10-06 Thread Jacques A. Vidrine

On Thu, Oct 03, 2002 at 01:28:51PM -0700, Gregory Sutter wrote:
 On 2002-10-03 15:38 -0400, Robert Watson [EMAIL PROTECTED] wrote:
  
  July - August 2002 Status Report
  
   --
  
  FreeBSD Security Officer Team
  
 URL: http://www.freebsd.org/security/
  
 Contact: Jacques Vidrine [EMAIL PROTECTED]
  
 In September, the FreeBSD Security Officer published a new PGP key (ID
 0xCA6CDFB2, found on the FTP site and in the Handbook). This aligned the
 set of those who possess the corresponding private key with the membership
 of the security-officer alias published on the FreeBSD Security web site.
 It also worked around an issue with the deprecated PGP key being found
 corrupted on some public key servers.
 
 The key in the published handbook remains:
 
 pub  1024R/73D288A5 1996-04-22 FreeBSD Security Officer 
[EMAIL PROTECTED]
 
 This was verified from the www copy of the handbook as well as the
 FTP site.  The key is also unavailable from pgpkeys.mit.edu.
 
 Where can I get this new key?

Sorry for the confusion.  The new key was expected to be published,
but there remain some minor unresolved issues with regard to key
signatures.  There was a comment in the submitted report, but I don't
think it was read.  I shouldn't have counted on that :-)

Cheers,
-- 
Jacques A. Vidrine [EMAIL PROTECTED]  http://www.celabo.org/
NTT/Verio SME  . FreeBSD UNIX .   Heimdal Kerberos
[EMAIL PROTECTED] .  [EMAIL PROTECTED]  .  [EMAIL PROTECTED]

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-hackers in the body of the message



Re: [hackers] Writing a PCI ADSL Driver

2002-10-06 Thread Taavi Talvik

On Sun, 6 Oct 2002, David Gilbert wrote:
 Neal Hi there.  I'm thinking of writing a device driver for a
 Neal Traverse Pulsar PCI ADSL card and I was looking for some ideas
 Neal before I committed myself. I've been offered hardware and
 Neal support by the makers (http://www.traverse.com.au/) but I want
 Neal to make sure that I can actually do the job before accepting.

 Neal I was wondering what kind of device driver I would need to
 Neal create. I use ADSL at home but I only know how to use it, I
 Neal don't know how it really works. Would I be able to create a
 Neal character device and just pretend it was a modem or would I need
 Neal to create a network device so that it can talk PPPoE over it? My
 Neal main concern is how to get ppp to talk to the device.

 I would expect that the most sensible class for the driver would be
 somewhat like an ethernet device.  Most commonly they're used with
 PPPoE or bridged ethernet.  This may irk some ... the underlying
 implementation is almost always ATM, but they try very hard to behave
 like ethernet devices.

Problem with ADSL is that there are actually too many link layer
encapsualtions in use - PPPoE, PPPoA, plain rfc1348 (if i remember
rfc number correctly) etc.

Due to above, most sensible is to take netgraph approach. Afterwards it's
easy to adapt to different encapsulations. Actually it should be possible
to autodetect all of this and connect appropriate netgraph hooks.

best regards,
taavi


To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-hackers in the body of the message