CentOS Errata and Security Advisory CESA-2010:0936
kernel security update for CentOS 4 i386:
https://rhn.redhat.com/errata/RHSA-2010-0936.html
The following updated file has been uploaded and is currently syncing to
the mirrors:
i386:
updates/i386/RPMS/kernel-2.6.9-89.33.1.EL.i586.rpm
CentOS Errata and Security Advisory CESA-2010:0936
kernel security update for CentOS 4 x86_64:
https://rhn.redhat.com/errata/RHSA-2010-0936.html
The following updated file has been uploaded and is currently syncing to
the mirrors:
x86_64:
updates/x86_64/RPMS/kernel-2.6.9-89.33.1.EL.x86_64.rpm
CentOS Errata and Security Advisory CESA-2010:0950
apr-util security update for CentOS 4 i386:
https://rhn.redhat.com/errata/RHSA-2010-0950.html
The following updated file has been uploaded and is currently syncing to
the mirrors:
i386:
updates/i386/RPMS/apr-util-0.9.4-22.el4_8.3.i386.rpm
CentOS Errata and Security Advisory CESA-2010:0950
apr-util security update for CentOS 4 x86_64:
https://rhn.redhat.com/errata/RHSA-2010-0950.html
The following updated file has been uploaded and is currently syncing to
the mirrors:
x86_64:
CentOS Errata and Security Advisory CESA-2010:0966
firefox security update for CentOS 4 i386:
https://rhn.redhat.com/errata/RHSA-2010-0966.html
The following updated file has been uploaded and is currently syncing to
the mirrors:
i386:
updates/i386/RPMS/firefox-3.6.13-3.el4.centos.i386.rpm
CentOS Errata and Security Advisory CESA-2010:0966
firefox security update for CentOS 4 x86_64:
https://rhn.redhat.com/errata/RHSA-2010-0966.html
The following updated file has been uploaded and is currently syncing to
the mirrors:
x86_64:
CentOS Errata and Security Advisory CESA-2010:0967
seamonkey security update for CentOS 4 i386:
https://rhn.redhat.com/errata/RHSA-2010-0967.html
The following updated file has been uploaded and is currently syncing to
the mirrors:
i386:
updates/i386/RPMS/seamonkey-1.0.9-66.el4.centos.i386.rpm
CentOS Errata and Security Advisory CESA-2010:0967
seamonkey security update for CentOS 4 x86_64:
https://rhn.redhat.com/errata/RHSA-2010-0967.html
The following updated file has been uploaded and is currently syncing to
the mirrors:
x86_64:
CentOS Errata and Security Advisory CESA-2010:0968
thunderbird security update for CentOS 4 i386:
https://rhn.redhat.com/errata/RHSA-2010-0968.html
The following updated file has been uploaded and is currently syncing to
the mirrors:
i386:
CentOS Errata and Security Advisory CESA-2010:0968
thunderbird security update for CentOS 4 x86_64:
https://rhn.redhat.com/errata/RHSA-2010-0968.html
The following updated file has been uploaded and is currently syncing to
the mirrors:
x86_64:
CentOS Errata and Security Advisory CESA-2010:0970
exim security update for CentOS 4 i386:
https://rhn.redhat.com/errata/RHSA-2010-0970.html
The following updated file has been uploaded and is currently syncing to
the mirrors:
i386:
updates/i386/RPMS/exim-4.43-1.RHEL4.5.el4_8.1.i386.rpm
CentOS Errata and Security Advisory CESA-2010:0970
exim security update for CentOS 4 x86_64:
https://rhn.redhat.com/errata/RHSA-2010-0970.html
The following updated file has been uploaded and is currently syncing to
the mirrors:
x86_64:
updates/x86_64/RPMS/exim-4.43-1.RHEL4.5.el4_8.1.x86_64.rpm
CentOS Errata and Security Advisory CESA-2010:0977
openssl security update for CentOS 4 i386:
https://rhn.redhat.com/errata/RHSA-2010-0977.html
The following updated file has been uploaded and is currently syncing to
the mirrors:
i386:
updates/i386/RPMS/openssl-0.9.7a-43.17.el4_8.6.i386.rpm
CentOS Errata and Security Advisory CESA-2010:0977
openssl security update for CentOS 4 x86_64:
https://rhn.redhat.com/errata/RHSA-2010-0977.html
The following updated file has been uploaded and is currently syncing to
the mirrors:
x86_64:
CentOS Errata and Security Advisory CESA-2010:0981
HelixPlayer removal security update for CentOS 4 i386:
https://rhn.redhat.com/errata/RHSA-2010-0981.html
The following updated file has been uploaded and is currently syncing to
the mirrors:
i386:
CentOS Errata and Security Advisory CESA-2010:0981
HelixPlayer removal security update for CentOS 4 x86_64:
https://rhn.redhat.com/errata/RHSA-2010-0981.html
The following updated file has been uploaded and is currently syncing to
the mirrors:
x86_64:
CentOS Errata and Security Advisory CESA-2010:1000
bind security update for CentOS 4 i386:
https://rhn.redhat.com/errata/RHSA-2010-1000.html
The following updated file has been uploaded and is currently syncing to
the mirrors:
i386:
updates/i386/RPMS/bind-9.2.4-30.el4_8.6.i386.rpm
CentOS Errata and Security Advisory CESA-2010:1000
bind security update for CentOS 4 x86_64:
https://rhn.redhat.com/errata/RHSA-2010-1000.html
The following updated file has been uploaded and is currently syncing to
the mirrors:
x86_64:
updates/x86_64/RPMS/bind-9.2.4-30.el4_8.6.x86_64.rpm
CentOS Errata and Security Advisory CESA-2011:0013
wireshark security update for CentOS 4 i386:
https://rhn.redhat.com/errata/RHSA-2011-0013.html
The following updated file has been uploaded and is currently syncing to
the mirrors:
i386:
updates/i386/RPMS/wireshark-1.0.15-1.el4_8.3.i386.rpm
CentOS Errata and Security Advisory CESA-2011:0013
wireshark security update for CentOS 4 x86_64:
https://rhn.redhat.com/errata/RHSA-2011-0013.html
The following updated file has been uploaded and is currently syncing to
the mirrors:
x86_64:
CentOS Errata and Security Advisory CESA-2011:0153
exim security update for CentOS 4 i386:
https://rhn.redhat.com/errata/RHSA-2011-0153.html
The following updated file has been uploaded and is currently syncing to
the mirrors:
i386:
updates/i386/RPMS/exim-4.43-1.RHEL4.5.el4_8.3.i386.rpm
Hello all,
I've been reading this thread and have a question. I would like to set up
passwordless ssh between two servers for some automated tasks but I don't
like the paswordless key's option. How can I supply a passphrase when
generating my keys but still have this process automated?
--James.
On 27/01/2011, at 9:32 PM, James Bensley wrote:
I've been reading this thread and have a question. I would like to set up
passwordless ssh between two servers for some automated tasks but I don't
like the paswordless key's option. How can I supply a passphrase when
generating my keys but
On 27/01/2011, at 8:48 PM, Nico Kadel-Garcia wrote:
And the permissions of $HOME/.ssh should be 0700.
Ah, yes. My mistake, sorry.
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos
On 27 January 2011 08:48, Cameron Kerr came...@humbledown.org wrote:
I think 'keychain' is often used for this. It's a bit like ssh-agent, in
that you unlock the key manually (eg. just after starting the system), but
it can be accessed by other programs later. I've never used it myself.
Ah
On Thu, Jan 27, 2011 at 02:39:29AM -0500, Nico Kadel-Garcia wrote:
Wrong again. Never use public key access for root accounts, it simply
compounds the security risks. Passphrase protected SSH keys can be
That is 100% backwards. *NEVER* use password authentication for root
(passwords are easier
On Thu, Jan 27, 2011 at 12:33:31PM +0530, Indunil Jayasooriya wrote:
# ssh-keygen -t rsa ( passphrase should be empty )
Don't use passphraseless keys unless you're using it for an automated
tool (eg rsync kicked off from cron). If this is for human interactive
work then learn how to use
On Thu, Jan 27, 2011 at 07:59:30AM +, John Hodrien wrote:
On Thu, 27 Jan 2011, Nico Kadel-Garcia wrote:
Wrong again. Never use public key access for root accounts, it simply
compounds the security risks. Passphrase protected SSH keys can be
Is this actually current doctrine for
On Jan 26, 2011, at 8:08 PM, John R Pierce wrote:
On 01/26/11 5:51 PM, Mitch Patenaude wrote:
On Wed, Jan 26, 2011 at 5:42 PM, Gene bran...@bellsouth.net
mailto:bran...@bellsouth.net wrote:
Can you tell us more about you cluster? Nodes? Purpose? I managed
a small 90 node
As per the Redhat Virtualisation Expo yesterday... API/ABI
compatibility is maintained within the point releases. If your stuff
is certified on 5.4 it will run on 5.5/5.6.
In addition there are compatibility libraries to get anything running
on 5.X on 6.0... and when you move to 6.0 then anything
On Thu, Jan 27, 2011 at 7:16 AM, James Hogarth james.hoga...@gmail.com wrote:
As per the Redhat Virtualisation Expo yesterday... API/ABI
compatibility is maintained within the point releases. If your stuff
is certified on 5.4 it will run on 5.5/5.6.
In addition there are compatibility
On 1/27/11 12:57 AM, Rudi Ahlers wrote:
Actually, since the original question involved access to backups, I
should have given my usual answer which is that backuppc is the thing to
use for backups and it provides a web interface for restores (you pick
the historical version you want and
If pw less access is something you prefer use a kerberos based service like
FreeIPA/RedhatIPA. No need for ssh keys, and pw aren't stored locally. You
can log in as a regular user and sudo su - to root, which can be done during
ssh login: ssh -t user@host sudo su -
David
On Jan 27, 2011,
On Thu, Jan 27, 2011 at 3:00 PM, Les Mikesell lesmikes...@gmail.com wrote:
On 1/27/11 12:57 AM, Rudi Ahlers wrote:
Actually, since the original question involved access to backups, I
should have given my usual answer which is that backuppc is the thing to
use for backups and it provides a
On Thu, 2011-01-27 at 02:48 -0500, Nico Kadel-Garcia wrote:
On 27/01/2011, at 7:45 PM, Always Learning wrote:
server /root/.ssh
id_rsa.authorized_keys -rw
But, the name of the file with a copy of your public key should be
$HOME/.ssh/authorized_keys. And the permissions of
On Thu, 2011-01-27 at 20:35 +1300, Cameron Kerr wrote:
Also, it should be named authorized_keys, not id_rsa.authorized_keys
B I N G O **
I can now log-in with just my home made command .s2
Thanks a lot.
That cured it. Brilliant.
Many thanks again.
--
With
On Thu, 2011-01-27 at 02:39 -0500, Nico Kadel-Garcia wrote:
Also, there's a stack of reasons that DSA is preferred to RSA for SSH
keys these days. When you generate your private keys, use ssh-keygen
-t dsa, not rsa.
RSA is the default if no cypher type is declared on the command line.
I've
Hello,
I have well performing iptables in centos 5.2 and 5.3 :
-A INPUT -m state --state NEW -m recent --update --seconds 60 --hitcount 1000
-p tcp --dport 25 -j LOG --log-prefix FW DROP IP Flood:
Centos 5.5, updated today:
Without -hitcount : iptables accept the line
Including -hitcount
On Thu, 2011-01-27 at 12:33 +0530, Indunil Jayasooriya wrote:
you expect Passwordless SSH. If so,
I wanted a quick effortless automated log-on.
# ssh-keygen -t rsa ( passphrase should be empty )
Yes I did exactly that but following advice from this mailing list have
changed to DSA
This... is theory. In practice, major architectural changes will break
things and need to be tested. For example, the anaconda environment
for RHEL 6 does not contain the dirname command. The environment for
RHEL 5 did. I anticipate that CentOS 6 will also lack it. Who would
know that
On Thu, 2011-01-27 at 06:40 -0500, Stephen Harris wrote:
*NEVER* use password authentication for root
(passwords are easier to brute force 'cos people choose bad passwords).
Use ssh public key access for root, with appropriate restrictions
(eg from=).
You haven't seen my long and difficult
rsync
Krishna
On Thu, Jan 27, 2011 at 7:27 AM, Steve Eisenberg
steve.eisenb...@gmail.comwrote:
Hello:
I wanted to know if anyone on the list can recommend one or more scripts to
install on a CENT OS web server that allows you to back up the entire box to
network attached storage?
Many
Rudi Ahlers wrote:
On Thu, Jan 27, 2011 at 3:00 PM, Les Mikesell lesmikes...@gmail.com
wrote:
On 1/27/11 12:57 AM, Rudi Ahlers wrote:
Actually, since the original question involved access to backups, I
should have given my usual answer which is that backuppc is the thing
snip
It currently
On Wed, 2011-01-26 at 23:05 -0800, John R Pierce wrote:
cpanel is pure crap.
It is a ghastly and frustrating nightmare. Command line, even for a
Linux beginner like me, is far superior. It is amazing that people pay
lots of money to use it.
--
With best regards,
Paul.
England,
EU.
On Thu, 2011-01-27 at 06:57 -0600, David Christensen wrote:
If pw less access is something you prefer use a kerberos based service like
FreeIPA/RedhatIPA. No need for ssh keys, and pw aren't stored locally. You
can log in as a regular user and sudo su - to root, which can be done during
Always Learning wrote:
On Thu, 2011-01-27 at 06:40 -0500, Stephen Harris wrote:
*NEVER* use password authentication for root
(passwords are easier to brute force 'cos people choose bad passwords).
Use ssh public key access for root, with appropriate restrictions
(eg from=).
You haven't
Hi all,
I am new at setting up icecastand was wondering if someone cold point me to
a guide on how to do so on cent 5.5 or give my instructions
Best
mike
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos
Always Learning wrote:
On Wed, 2011-01-26 at 23:05 -0800, John R Pierce wrote:
cpanel is pure crap.
It is a ghastly and frustrating nightmare. Command line, even for a
Linux beginner like me, is far superior. It is amazing that people pay
lots of money to use it.
It may be crap, but a) I
Hi all,
For those of you that have been using the ext4 technology preview on CentOS
5.5, how has it panned out? Does it perform as expected? How do you feel the
stability, creation of the FS and the administration of it is? Ideas and
comments welcome.
Thanks.
--
BW,
Sorin
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
is there anybody here who has access to such a machine and could test
e... 'some software' there?
Please mail me privately.
Thanks best,
Timo
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (GNU/Linux)
On Thu, 2011-01-27 at 10:01 -0500, m.r...@5-cent.us wrote:
Always Learning wrote:
You haven't seen my long and difficult (for others) password (uppercase,
lowercase, and digits). It is unlikely ever to succumb to brute
force. :-)
Ah, no. Where can you log in as root from? If it's
On Thu, 2011-01-27 at 10:05 -0500, m.r...@5-cent.us wrote:
On Wed, 2011-01-26 at 23:05 -0800, John R Pierce wrote:
cpanel is pure crap.
It may be crap, but a) I haven't seen any ISPs that offer shell access for
the better part of a decade, at least, and b) consider the enTHUsistic
Always Learning wrote:
On Thu, 2011-01-27 at 10:01 -0500, m.r...@5-cent.us wrote:
Always Learning wrote:
You haven't seen my long and difficult (for others) password
(uppercase, lowercase, and digits). It is unlikely ever to succumb to
brute
force. :-)
Ah, no. Where can you log in as
Hi,
Helmut Drodofsky wrote:
When I add the line interactive, the result is
[root@host sysconfig]# iptables -A INPUT -m state --state NEW -m recent
--update --seconds 60 --hitcount 1000 -p tcp --dport 25 -j LOG
--log-prefix FW DROP IP Flood:
iptables: Unknown error 18446744073709551615
On Thu, 2011-01-27 at 10:27 -0500, m.r...@5-cent.us wrote:
Security through obscurity doesn't work.
It certainly helps defeat most potential intruders but not the most
determined. IPtables does help too.
Are you familiar with nmap?
Yes. I used to read the bloke's circulars when I was on
On 01/27/11 5:46 AM, Always Learning wrote:
-rw--- 1 root root 404 Jan 27 03:23 id_rsa.authorized_keys
how many times do you have to be told that the filename is
authorized_keys, NOT id_rsa.authorized_keys
for someone who claims to have been in IT since the 1960s, you don't
seem to pay
On Thu, Jan 27, 2011 at 10:05:35AM -0500, m.r...@5-cent.us wrote:
It may be crap, but a) I haven't seen any ISPs that offer shell access for
the better part of a decade, at least, and b) consider the enTHUsistic
www.panix.com - Your $HOME away from home.
Of course many people who want shell
On 27 January 2011 15:06, Sorin Srbu sorin.s...@orgfarm.uu.se wrote:
Hi all,
For those of you that have been using the ext4 technology preview on CentOS
5.5, how has it panned out? Does it perform as expected? How do you feel the
stability, creation of the FS and the administration of it is?
On Thu, Jan 27, 2011 at 5:37 PM, James Hogarth james.hoga...@gmail.com wrote:
On 27 January 2011 15:06, Sorin Srbu sorin.s...@orgfarm.uu.se wrote:
Hi all,
For those of you that have been using the ext4 technology preview on CentOS
5.5, how has it panned out? Does it perform as expected? How
Always Learning wrote:
On Thu, 2011-01-27 at 10:27 -0500, m.r...@5-cent.us wrote:
Security through obscurity doesn't work.
It certainly helps defeat most potential intruders but not the most
determined. IPtables does help too.
We also run fail2ban at work. Very nice, installs (along with
Stephen Harris wrote:
On Thu, Jan 27, 2011 at 10:05:35AM -0500, m.r...@5-cent.us wrote:
It may be crap, but a) I haven't seen any ISPs that offer shell access
for
the better part of a decade, at least, and b) consider the enTHUsistic
www.panix.com - Your $HOME away from home.
Of course
Security through obscurity doesn't work.
It certainly helps defeat most potential intruders but not the most
determined. IPtables does help too.
We also run fail2ban at work. Very nice, installs (along with shorewall),
and creates a temporary blacklist, blocking an IP that's tried five, I
On 1/27/2011 7:30 AM, Rudi Ahlers wrote:
BackupPC doesn't intergrate into cPanel.
Why does it have to integrate? It runs on a different machine. Can't you
make a
remote apache authenticate the same way as a cpanel user would to access its
web
interface?
Sorry, I should have explained.
On Thu, 2011-01-27 at 07:35 -0800, John R Pierce wrote:
On 01/27/11 5:46 AM, Always Learning wrote:
-rw--- 1 root root 404 Jan 27 03:23 id_rsa.authorized_keys
how many times do you have to be told that the filename is
authorized_keys, NOT id_rsa.authorized_keys
Once. How many
On Thu, 2011-01-27 at 10:40 -0500, m.r...@5-cent.us wrote:
We also run fail2ban at work. Very nice, installs (along with shorewall),
and creates a temporary blacklist, blocking an IP that's tried five, I
think, times to break in. All configurable, btw.
Thanks. I'll add that to the list to
Michel van Deventer wrote:
Security through obscurity doesn't work.
It certainly helps defeat most potential intruders but not the most
determined. IPtables does help too.
We also run fail2ban at work. Very nice, installs (along with
shorewall), and creates a temporary blacklist, blocking
Helmut Drodofsky wrote on Thu, 27 Jan 2011 15:41:15 +0100:
The man page describes the parameter
well, did you google before asking? I'm pretty sure that this topic has
already been raised here (and probably elsewhere) a few times and as far
as I recall it there must be a bug. I don't know if
On 01/27/2011 09:00 AM, Always Learning wrote:
On Thu, 2011-01-27 at 06:57 -0600, David Christensen wrote:
If pw less access is something you prefer use a kerberos based service like
FreeIPA/RedhatIPA. No need for ssh keys, and pw aren't stored locally. You
can log in as a regular user
For those of you that have been using the ext4 technology preview on CentOS
5.5, how has it panned out? Does it perform as expected? How do you feel the
stability, creation of the FS and the administration of it is? Ideas and
comments welcome.
I've recently been using ext4 because I have servers
On 01/27/2011 01:39 AM, Nico Kadel-Garcia wrote:
Also, there's a stack of reasons that DSA is preferred to RSA for SSH
keys these days. When you generate your private keys, use ssh-keygen
-t dsa, not rsa.
Care to elaborate on that? Searching, I find mostly a stack of reasons
for preferring
Original Message
Subject: Re: [CentOS] Ext4 on CentOS 5.5 x64
From: compdoc comp...@hotrodpc.com
To: 'CentOS mailing list' centos@centos.org
Date: Thursday, January 27, 2011 10:08:46 AM
For those of you that have been using the ext4 technology preview on CentOS
5.5, how has
On 01/27/2011 07:37 AM, James Hogarth wrote:
On 27 January 2011 15:06, Sorin Srbusorin.s...@orgfarm.uu.se wrote:
Hi all,
For those of you that have been using the ext4 technology preview on CentOS
5.5, how has it panned out? Does it perform as expected? How do you feel the
stability,
I run the CreekFM streaming audio server on icecast and ices. (You can find it
at www.creekfm.com.) It runs on Centos 5. Do you have any specific questions?
On Thu, 27 Jan 2011 09:02:56 -0600
mike cutie and maia wrote:
Hi all,
I am new at setting up icecastand was wondering if someone
: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
Url :
http://lists.centos.org/pipermail/centos-announce/attachments/20110127/8235005f/attachment-0001.bin
--
Message: 2
Date: Thu, 27 Jan 2011 09:45:04 +0100
From: Tru Huynh t...@centos.org
Please do not hijack threads. If you want to send a new message to the
list then do NOT reply to a message. Also, I ask that you first try to
install icecast and *then* come to the list if you encounter problems.
This is not an all-purpose support list. Thanks.
Kai
On 01/27/2011 04:57 PM, m.r...@5-cent.us wrote:
[snip]
Here too and from my own systems those 'scriptkiddies' are exposed to the
world using http://twitter.com/fail2ban :)
So, where's most of your hits from? The most I see is China, followed by
Brazil, then Korea (not sure which), then, a lot
On Thu, Jan 27, 2011 at 10:40:14AM -0500, m.r...@5-cent.us wrote:
We also run fail2ban at work. Very nice, installs (along with shorewall),
and creates a temporary blacklist, blocking an IP that's tried five, I
think, times to break in. All configurable, btw.
There is also denyhosts, which
Hi,
On Thu, 2011-01-27 at 10:57 -0500, m.r...@5-cent.us wrote:
Here too and from my own systems those 'scriptkiddies' are exposed to the
world using http://twitter.com/fail2ban :)
So, where's most of your hits from? The most I see is China, followed by
Brazil, then Korea (not sure
Cameron Kerr cameron@... writes:
On 27/01/2011, at 7:27 AM, David G. Miller wrote:
chmod -R g+rx,o+rx Nelson/
cd
What is the result of 'cd' (a shell-internal command) in this version of tcsh?
It is the same as in sh?
As expected, cd with no directory is the same as cd ~/
Hello list members,
In CentOS-5.5 I'm trying to achieve static assignment of SCSI device
names for a bunch of RAID-60 drives on a Supermicro motherboard. The
scsi_id command identifies all drives ok.
The board has one SATA controller and three SAS/SATA controllers ...
standard on-board
On 1/27/2011 2:41 PM, Chuck Munro wrote:
Identifying drives by their ID string (which includes the drive's serial
number) and assigning names in the rules works ok. BUT, what happens
when I have to swap out a failed drive? The serial number (and possibly
model number) changes, and the udev
on 07:54 Thu 27 Jan, John Hodrien (j.h.hodr...@leeds.ac.uk) wrote:
On Wed, 26 Jan 2011, Dr. Ed Morbius wrote:
I'd suggest the automount route as well (you're only open to NFS issues
while the filesystem is mounted), but you then have to maintain
automount maps and run the risk of issues
On Thu, 2011-01-27 at 20:30 +0100, Michel van Deventer wrote:
Lots from China, Russia and some South American countries. Sometimes
even from my own country ! (Netherlands).
Attempts from Holland always, in my experience, come from Leaseweb IPs
but complaining to them produces no results.
On Thu, 27 Jan 2011 21:23:51 +
Always Learning wrote:
Attempts from Holland always, in my experience, come from Leaseweb IPs
but complaining to them produces no results.
The appropriate entries in /etc/hosts.deny does produce results
--
MELVILLE THEATRE ~ Melville Sask ~
on 10:15 Thu 27 Jan, Robert Nichols (rnicholsnos...@comcast.net) wrote:
On 01/27/2011 01:39 AM, Nico Kadel-Garcia wrote:
Also, there's a stack of reasons that DSA is preferred to RSA for SSH
keys these days. When you generate your private keys, use ssh-keygen
-t dsa, not rsa.
Care to
on 14:50 Thu 27 Jan, Always Learning (cen...@g7.u22.net) wrote:
On Thu, 2011-01-27 at 12:33 +0530, Indunil Jayasooriya wrote:
you expect Passwordless SSH. If so,
I wanted a quick effortless automated log-on.
That's what ssh-agent gives you.
If you invoke a command under ssh-agent,
on 12:41 Thu 27 Jan, Chuck Munro (chu...@seafoam.net) wrote:
Hello list members,
In CentOS-5.5 I'm trying to achieve static assignment of SCSI device
names for a bunch of RAID-60 drives on a Supermicro motherboard. The
scsi_id command identifies all drives ok.
The board has one SATA
m.r...@5-cent.us wrote:
Always Learning wrote:
...
Blush, blush access is on a non-standard port and then restricted
to a few IP addresses. I don't want my servers taken over by others.
Security through obscurity doesn't work. Are you familiar with nmap?
If port scanning is a concern,
On Thu, Jan 27, 2011 at 6:40 AM, Stephen Harris li...@spuddy.org wrote:
On Thu, Jan 27, 2011 at 02:39:29AM -0500, Nico Kadel-Garcia wrote:
Wrong again. Never use public key access for root accounts, it simply
compounds the security risks. Passphrase protected SSH keys can be
That is 100%
-Original Message-
From: centos-boun...@centos.org [mailto:centos-boun...@centos.org] On
Behalf Of compdoc
Sent: Thursday, January 27, 2011 5:09 PM
To: 'CentOS mailing list'
Subject: Re: [CentOS] Ext4 on CentOS 5.5 x64
For those of you that have been using the ext4 technology preview on
90 matches
Mail list logo