I had the same problem. This kind of initiative by the package
shouldn't be so passive. It should be corrected, or one might find
themselves frustrated.
On Thu, 2002-10-10 at 23:51, Olaf Meeuwissen wrote:
Jussi Ekholm [EMAIL PROTECTED] writes:
J.H.M. Dassen (Ray) [EMAIL PROTECTED] wrote:
Specifically, port 16001 is ESD (ESound) IIRC..
On Tue, 2002-10-15 at 10:55, Giacomo Mulas wrote:
On Tue, 15 Oct 2002, Jussi Ekholm wrote:
So, what would try to connect to my system's port 16001 and 111 from
within my own system? Should I be concerned? Should I expect the worst?
port
I don't know if it's the catch on your problem, but it'll be interesting
reading noless;
http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0037.html
On Wed, 2002-10-16 at 12:19, Simon Langhof wrote:
Hi
I noticed some (40 until now) strange entries in my Apache access.log. They
started
would do the trick
-Daniel Lysfjord-
,
klisa) packages, will start appearing on kde.org roughly Thursday
evening AEST (UTC+10). I've got exams until Thursday, so no sooner.
-d
--
Daniel Stone [EMAIL PROTECTED] [EMAIL PROTECTED]
Developer - http://kopete.kde.org, http://www.kde.org
pgpIQyPbrgw9G.pgp
Description
, of their own
choosing.
--
Daniel Stone [EMAIL PROTECTED]
Developer, Trinity College, University of Melbourne
pgpOlJxB0EEok.pgp
Description: PGP signature
in the bounce saying that this address has never existed, and
is being abused by spammers? If yes, _how_ should I do it?
I hope this is the right forum to ask...
Cheers,
Kjetil
--
Daniel J. Rychlik
Java/Perl Developer
http://daniel.rychlik.ws
listed there and bug them :)
There is always an iptables blacklist you can set up and block the
entire 24 (or 16, ouch) bit network if the admins do not take care of
the undesireables.
Regards,
--
Daniel J. Rychlik
Java/Perl Developer
http://daniel.rychlik.ws
this for an
IDE cd burner?
I apologize in advance, I know this is a security mailing list...
--
Daniel J. Rychlik
cannot
be compromised via the network:-)
http://www.samag.com/documents/s=1824/sam0201d/0201d.htm
Halted firewalls?
/Daniel
--
File not found. Should I fake it (y/n)?
It seems like FileZilla[1] supports ftp-ssl..
[1]: http://sourceforge.net/projects/filezilla
Quoting Cristian Ionescu-Idbohrn [EMAIL PROTECTED]:
On Thu, 19 Dec 2002, Daniel Lysfjord wrote:
It seems like FileZilla[1] supports ftp-ssl..
[1]: http://sourceforge.net/projects/filezilla
What about lftp?
Depends: ..., libssl0.9.6, ...
From man lftp(1) :
lftp can handle
No, and it seems they've fixed their problem on their end.
I think it hurt them a lot worse (on bandwidth) than it hurt you :)
On Wed, 8 Jan 2003 19:21:45 +0100 (CET)
Cristian Ionescu-Idbohrn [EMAIL PROTECTED] wrote:
http://www.raycomm.com/techwhirl/magazine/technical/linux.html
Thats absolutely ridiculous.
I would file one at once, that should definitely not go unchecked, at least. I
can appreciate the motivation, but for my own sanity I'm too paranoid to a)
accept strange unknown files/connections or b) send out requests for such data.
Especially considering since
a script like the one described above or
maybe knows an allready existing application which could perform this
task? Thanks.
Hi Ivo,
Not a full solutiont, but try dsh maybe: Dancer Shell or Distributed
Shell, which can replicate commands via ssh on groups of
nodes/servers/etc...
HTH,
Daniel
access on
with the noexec switch, so they can only use binaries installed (and
allowed to them) on the system.
3. Kindly ask the users not to run '/lib/ld.so.1 /usr/bin/ssh' (or any
executable they upload to /home, /tmp, or wherever).
Daniel.
Hi, does anyone know if its possible to setup
this:
Clients - NAT - Internet - NAT- Clients with
iptelephony without opening your NAT servers to the world.
Any software suggestions / tricks /
ideas?
--
Daniel
Hi, does anyone know if its possible to setup this:
Clients - NAT - Internet - NAT - Clients with iptelephony without opening
your NAT servers to the world.
Any software suggestions / tricks / ideas?
(sorry about that, just reinstalled and forgot that outlook uses HTML as
default)
--
Daniel
Pptp-linux is about all there is unfortunatly, you'll also need to get a
patched version of ppp and do some kernel modifications to support mppe.
-Daniel
-Original Message-
From: Craig [mailto:[EMAIL PROTECTED]
Sent: Thursday, 15 May 2003 3:06 PM
To: Debian-Security; Debian-ISP
Subject
Hi!
I have found a nice HOSTS list for windows (similar to the /etc/hosts file
in linux) which matches some bad sites to localhost, so your pc won't access
them! With windows this works very nice, but how can I do this with Debian?
I already thought about just using it just like the usual hosts
unsubscribe
, and
they told me that it _might_ work when running freeswan on top of l2tp.
Didn't get me much further, though. If someone else manages to figure it
out, please let me know. :)
Regards,
Daniel.
FileZilla ( http://sourceforge.net/projects/filezilla/ ) is a great FTP client
for Windows that support SSL..
Quoting [EMAIL PROTECTED]:
From:[EMAIL PROTECTED]
To: Dariush Pietrzak [EMAIL PROTECTED]
Subject: Re: recommendations for FTP server
Date:Sat, 21 Jun 2003 01:09:45
| A lightweight, efficient FTP server written from the ground up with
| security in mind.
Ahem.
I'm working on it.
Something is wrong with the PAM config...
--
Daniel Jacobowitz
MontaVista Software Debian GNU/Linux Developer
_unstable_.
--
Daniel Jacobowitz
MontaVista Software Debian GNU/Linux Developer
then it probably doesn't use PAM. This is
a bug in the Debian PAM configuration.
--
Daniel Jacobowitz
MontaVista Software Debian GNU/Linux Developer
information's integrity.
Preventing successful denial-of-service attackes preserves the availability
or your information.
So how are those definitions invalid?
Daniel
--
Daniel Barclay
[EMAIL PROTECTED]
Matt Zimmerman wrote:
On Sat, Oct 18, 2003 at 11:34:06PM -0400, Daniel B. wrote:
Matt Zimmerman wrote:
Information Security - As defined by ISO-17799, information security is
characterized as the preservation of:
[...]
* Availability - ensuring that authorized users have
Quoting Tom White [EMAIL PROTECTED]:
Dear List,
I'm looking for a decent, secure, web based password changer for
user accounts. Something that I can install on a debian box with a
minimum amount of tweaking, and that isn't really any less secure than
a shell user changing their password
urgency between the version in testing and the version in
unstable.
Daniel.
are
mentioned in the URLs at the end of the advisory. So the libxml1 package
on your system ought to be updated as well. Simply running apt-get
upgrade will likely do the right thing for you, by the way.
Regards,
Daniel.
of dealing with
module loading issues, especially at boot time.
Daniel
--
Confidence comes not from always being right but from not fearing to be wrong.
-- Peter T. Mcintyre
how many spamc instances
there can be at once.
Regards,
Daniel
--
If you ever reach total enlightenment while you're drinking a beer,
I bet it makes beer shoot out your nose.
-- Jack Handy
a
significant change in performance between amavisd-new and the directly
invoke spamc/sendmail configuration that I posted.
It seems to me that the shell interpreter and script overhead is a huge
part of the cost of processing spam with Postfix using the simple filter
model.
Daniel
--
Now
On Tue, 27 Apr 2004, Dan Christensen wrote:
Daniel Pittman [EMAIL PROTECTED] writes:
On Mon, 26 Apr 2004, George Georgalis wrote:
On Mon, Apr 26, 2004 at 06:44:35PM +0200, LeVA wrote:
So when I'm getting a large amount of messages there is approx.
15-20 spamc/spamd running. I want to limit
.
For example, the firebird admin tool you were thinking of making suid -
does that allow running shell commands? If so, making it suid is the
equivalent of granting all users shell access as the firebird user.
Daniel
--
A drug is neither moral nor immoral--it's a chemical compound
other than identifying unusual
behaviour, or having an intrusion detection system in place before the
break-in.
Better to ask where the risks are, remove them, then rebuild the server
from scratch if you are not sure you are safe.
Regards,
Daniel
--
Regard all art critics as useless
be ideal...
Daniel
--
... Far down the vault a man was screaming. His fists were tightly clenched
and he was screaming out imprecations against the humming computers. There
was a hopeless rage in his eyes - rage and bitter, savage defiance.
-- Frank Bellknap, _It Was The Day
used; it would be interesting to see
if it actually managed to take off. :)
Daniel
--
Organization and method mean much, but contagious human characters mean more
in a university, where a few undisciplinables ... may be infinitely more
precious than a faculty full of orderly routinists
Ich werde ab 20.08.2004 nicht im Büro sein. Ich kehre zurück am
05.09.2004.
Ich werde Ihre Nachricht nach meiner Rückkehr bearbeiten.
:
] sed -si.orig -e '...' `find . -name '...'`
More safely, but with more forks:
] find . -name '...' -print0 | xargs -0 sed -si.orig -e '...'
Wrapping your own shell script around that should be trivial.
Daniel
--
Men love to wonder, and that is the seed of our science
by using an existing firewall helper like 'firehol', or something,
than re-doing the work that went into the existing tools?
Of course, if your aim is to learn iptables rather than just get it
working, that loses. ;)
Daniel
--
A cathedral, a wave of a storm, a dancer's leap,
never turn
On 3 Jul 2005, KC wrote:
Daniel Pittman wrote:
On 3 Jul 2005, KC wrote:
I need help understanding what goes wrong in this script. I cannot ping
anyone and cannot resolve as well. In fact I believe the only thing I can
get is an ip address from my isp's dhcp server.
[...]
I can't spot
On 3 Jul 2005, Jakub Sporek wrote:
On Sun, 03 Jul 2005 05:07:02 +0200, Daniel Pittman [EMAIL PROTECTED]
wrote:
I found that 'firehol' was quite a surprise to me -- not only didn't it
suck, it actually improved my hand-written firewall somewhat.
Unlike everything else, it doesn't tell you
On 4 Jul 2005, Paul Gear wrote:
Daniel Pittman wrote:
...
Shorewall, like many firewall packages, gives you[1] a whole bunch of
configuration options, which turn on or off features in the pre-packaged
firewall you have.
This tends to make it hard to do strange things like playing with DSCP
one way or the other, though, and don't
want to test on my live systems. Maybe you can try varying that?
Daniel
--
I never watch television because it's an ugly piece of furniture, gives off a
hideous light, and, besides, I'm against free entertainment.
-- John Waters
On 4 Jul 2005, Paul Gear wrote:
Daniel Pittman wrote:
...
Am i right in understanding that you consider accepting
RELATED/ESTABLISHED packets a bad thing?
No. Accepting *any* RELATED/ESTABLISHED packets is, though, if someone
finds an attack to generate entries in the conntrack table
On 5 Jul 2005, Eloi Granado wrote:
On Sunday, 3 de July de 2005 23:24, Paul Gear wrote:
Daniel Pittman wrote:
It also tends to encourage shortcuts in the firewall, like accepting
any RELATED/ESTABLISHED packets,
Am i right in understanding that you consider accepting
RELATED/ESTABLISHED
On 5 Jul 2005, Paul Gear wrote:
Daniel Pittman wrote:
...
So, probably, the best way to go is allowing the R/E packets alongside their
new state counterparts. It also clarifies where the packets are accepted
and WHY. Also, iptables -v should be a lot more useful than before.
That was my
On 5 Jul 2005, Michael Stone wrote:
On Tue, Jul 05, 2005 at 10:00:53PM +1000, Daniel Pittman wrote:
/sbin/iptables -t filter -A in_world_http_s1 -p tcp --sport 1024:65535
--dport 80 -m state --state NEW,ESTABLISHED -j ACCEPT /sbin/iptables
-t filter -A out_world_http_s1 -p tcp --sport 80
with a small shell script. ;-)
/Daniel
--
File not found. Should I fake it (y/n)?
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
version numbers that may be relevant to the task at hand.
Regards,
Daniel
--
The past is a foreign country: they do things differently there.
-- L P Hartley, _The Go-Between_
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL
Hi Luigi,
On Tue, Jul 26, 2005 at 09:11:31AM +0200, Luigi Gangitano wrote:
this surely helps. Can you please tell me what DNS daemon is at work in
this case (eg. bind, pdnsd, etc.)?
it is an dnscache (djbdns) running on the same host.
- Daniel
--
To UNSUBSCRIBE, email to [EMAIL
Keeping Debian stable by not changing things is great.
Except maybe its not so great when you're trying to maintain a complicated,
buggy, high profile program that handles sensitive user data and untrusted
input.
Debian stable cannot stay stable without changing, sometimes drastically.
Firefox
the proxy) the problem does not occur.
It starts to fail when the dstdom_regex acl is activated.
While playing with gdb i found an reverse query about the ip (from the
url requested).
A patch to the default config follows.
Thanks for your efforts.
- Daniel
--- squid.conf Tue Aug 23 02:25:12
On Tue, Aug 23, 2005 at 02:48:21AM +0200, Daniel Hess wrote:
It starts to fail when the dstdom_regex acl is activated.
I've made my way through to the actual problem (the change which
triggers the assert in line 410 lib/rfc1035.c).
Before the update (without squid-2.4.STABLE7-dns_query-4.patch
On Tue, Aug 23, 2005 at 05:14:31PM +0200, Peter Blancke wrote:
Daniel Hess [EMAIL PROTECTED] dixit:
It starts to fail when the dstdom_regex acl is activated.
This could be. But -- I think -- also dstdomain.
Yes, the problem is the ptr dns-query (get the hostname to the ip).
When you use
Sorry for once more replaying to my own mail, ... :)
On Tue, Aug 23, 2005 at 05:00:12AM +0200, Daniel Hess wrote:
Before the update (without squid-2.4.STABLE7-dns_query-4.patch)
RR-rdlength, which gets added to off, was not passed from
rfc1035RRUnpack to rfc1035NameUnpack. Now it gets passed
Martin Schulze wrote:
--
Debian Security Advisory DSA 887-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
November 7th, 2005
are assumed, stupid admins
are another thing all together.
~Daniel
The package maintainer has a point that an mDNS daemon would be pretty
pointless if it only bound to lo. I think it is more the
responsibility of the administrator to know what is going on his
system. If you are so worried about security, then why not check out
those NINE new Avahi packages when
Interesting, indeed. Looks like multicast is available on some networks:
http://www.multicasttech.com/status/mbgp.sum
But the best place to ask this type of question might be the
debian-admin or debian-mirrors mailing list.
[EMAIL PROTECTED] wrote:
Has this concept been considered?
Instead of
CONFIG_NFSD_V2_ACL=y
CONFIG_NFSD_V3_ACL=y
CONFIG_NFS_ACL_SUPPORT=m
To enable ACLs, you just need to add the acl option in your fstab for
that partition.
Hope that helps!
Daniel
On 2/26/06, Sels, Roger [EMAIL PROTECTED] wrote:
Olivier,
How is that going to solve the problem?
His user doesn't have
Sels, Roger wrote:
The files in your /var/www should strictly speaking only be accessible to
your webserver ; for apache usually www-data or apache or httpd accounts
should have rwx permissions.
You usually dont want to give the apache user write access to the site.
When Apache is
Jan Luehr wrote:
topology before granting access to your secure server. (If you're server is
stolen and connected to the internet, you probably hop across different
routers to get there) - however, this requires some effort monitoring your
ISPs routes.
Checking the ip/net that the request
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hello,
Martin Schulze wrote:
For the unstable distribution (sid) this problem will be fixed soon.
Isn't it fixed since FF 1.5.dfsg+1.5.0.3-1?
http://lists.debian.org/debian-devel-changes/2006/05/msg00197.html
Bye and thanks for patching Debian
,
Daniel
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
/debian-role-keys.gpg
--list-keys
does not list the 2006er archive key.
Regards, Daniel
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Lupe Christoph wrote:
On Monday, 2006-10-09 at 09:57:10 +0200, Evgeni Golov wrote:
On Mon, 9 Oct 2006 09:42:14 +0200 Lupe Christoph wrote:
This morning I found a number of complaints from freshclam in my
mailbox, culminating in the one below. Checking http://www.clamav.net/
revealed that
or comment,
when we can expect a fixed package or why this bug-severity can be downgraded
or the situation will become really annoying.
CCing debian-security
Regards, Daniel
- -- System Information:
Debian Release: 4.0
APT prefers unstable
APT policy: (850, 'unstable'), (700, 'testing'), (550
Am Mittwoch, den 28.02.2007, 19:45 -0800 schrieb Russ Allbery:
Daniel Leidert [EMAIL PROTECTED] writes:
Package: apache
Followup-For: Bug #357561
Why isn't anybody of the official maintainers reacting or commenting on
this bug? There are 3(!) completely undocumented downgrades
this I recommend the debian-user lists.
Second, your problem seems to be that your hard drive does not respond
properly. Your disk is most likely broken. :-(
/Daniel
--
Ever noticed something?
Unix comes with compilers.
Windows comes with solitaire.
--
To UNSUBSCRIBE, email to [EMAIL
Sehr geehrte Geschäftspartnerin, sehr geehrter Geschäftspartner,
Ich werde ab 28.11.2007 nicht im Büro sein. Ich kehre zurück am
10.12.2007.
Ich werde Ihre Nachricht nach meiner Rückkehr beantworten.
Package Compromise
Regards, Daniel
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
password protected) service on a non-standard port than on a
standard port?
Regards, Daniel
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Am Dienstag, den 13.05.2008, 16:02 +0200 schrieb Daniel Leidert:
Am Dienstag, den 13.05.2008, 15:27 +0200 schrieb Philipp Kern:
On Tue, May 13, 2008 at 02:06:39PM +0200, Florian Weimer wrote:
A detector for known weak key material will be published at:
http://security.debian.org
/extra/dowkd/dowkd.pl.gz.asc
(OpenPGP signature)
On stable I get close is not a valid DB_File macro at
/home/pkern/dowkd.pl line 51.
$ ./dowkd.pl help
close is not a valid DB_File macro at ./dowkd.pl line 51
Well, something is broken (sid here).
Regards, Daniel
--
To UNSUBSCRIBE, email
Since the security team hasn't released a fix or an advisory yet for
the Ruby vulnerabilites discovered yesterday, I've rolled my own as a
stopgap. See http://dfranke.us/rubyfix.txt
--
Daniel Franke [EMAIL PROTECTED] http://www.dfranke.us
regarding this study, so I hereby start this thread).
Regards, Daniel
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
://bugs.g10code.com/gnupg/issue931 (for example)
Regards, Daniel
--
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Does anyone have a good checklist or script to harden a vanilla debian
box after installation?
Dan
--
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive:
Thanks guys.
I've received quite a massive response it seems. All the information I
was looking for.
Thanks again,
Dan
On Wed, Nov 24, 2010 at 10:48 AM, Daniel Hood dsmh...@gmail.com wrote:
Does anyone have a good checklist or script to harden a vanilla debian
box after installation?
Dan
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi Moritz
Please test/report, whether the packages located at
http://people.debian.org/~jmm/ fix the problem for you.
Could you please publish the source package as well?
And is this going to go into squeeze-updates eventually?
Cheers
Daniel
Hi,
I would like to inform about a new stack-based buffer overflow
vulnerability for MySQL. The following CVEs have been assigned
to track this MySQL vulnerability:
CVE-2012-5611 MySQL (Linux) Stack based buffer overrun PoC Zeroday
CVE-2012-5612 MySQL (Linux) Heap Based Overrun PoC Zeroday
Hi,
Thank You, I should look there first (Security Tracker). But I see,
that two of three CVE's are marked as 'vulnerable' for all branches;
stable, testing and unstable. Frankly, only first CVE is Fixed for Squeeze.
It is normal?
Regards!
Hi Thijs! Okay now everything is clear. Regards!
(...) so a good umask may be set there for init.
Hi, and a good setting for umask is? I know that it depends
on many things, but what do you think?
Cheers
Hi,
Kernel 3.7 is officially out. This Linux release includes many improvements
practically in every aspect. Many changes also concerns security. Very
interesting are: Cryptographically-signed kernel modules and - long awaited
-
symlink and hardlink restrictions (already in Linux 3.6), but it
Hi Mr Cyril,
Thank you for pointing out this website. I completely forgot
about it and definitely, I should look there first, before writing
a message here.
I did not look over this web site (Changlelog for 3.2.X) for a long
time, because for now, I am still using a linux-2.6 on all of my
Hi
Whether the Iceweasel 10.0.11 ESR package can be updated a little faster due
to several security issues? On January 8 Mozilla published about 20
Security Advisories[1]. Many distributions already have updated Firefox to
the
latest 18 and 10.0.12 ESR versions[2]. According to the website for
Hi Mr Mestnik
I'm just curious why Debian does not publish updated versions
of the packages as soon as possible. Especially, when it comes
to the security updates. Other distributions are doing it much faster.
Personally, I do not like to use the applications that I know, it is
vulnerable.
As I
Hi Mr Erwan
So, everything is okay? Even these strange logs
mentioned earlier? I'm still curious about this rule;
*SYN,RST, ACK,FIN, PSH,URG, SYN,RST,ACK,
FIN,PSH,URG*
What do you mean by writing, that I should not contact servers?
Best regards!
Hi Mr Erwan
Let's summarize: these logs are normal and are not
something... *bad*. Even if there are many IP's connections
(*INVALID*) probes.
I understand, that I should have not contact with the servers.
Okay, but if those servers are providing e.g. a website, which
I visit? How to avoid them?
Hi Mr Edwin
Yes, I have this rule and is responsible for the
established/related connections. This rule is almost
at the very end of the INPUT chain.
* (...) before the rule that logs/drops your packets?*
Do you mean those strange packages mentioned in the first
mail, right? Frankly, not; This
Hi
As we know iptables INVALID state means, that
the packet is associated with no known connection,
right? So, if I have a lot of INVALID entries in my
log files, does it means, that something is wrong?
Hidden process etc.?
An example of logged entries;
t4 kernel: [18776.221378] [INVALID in]
Hi andika.
Another INVALID packet description. I read a lot of
information and I don't know what is the truth. Frankly,
the first time I see a description, which concerns RAM memory.
So, I have a 1 GB of RAM memory. Just for example; free -m
command result;
used: 640, free: 230
and top command;
, at 11:34 AM, Daniel Curtis sidetripp...@gmail.com wrote:
Hi Mr Rolf
Okay, I will check these values; /proc/net/ip_conntrack etc.
Generally it is normal, that there are INVALID connections, right?
Yes, I'm seeing this syslog tag. Should I remove it from my iptables
script (e.g. -j LOG
Hi Rolf.
*The information about connections is stored in
*
* /proc/net/ip_conntrack. The maximum connections
*
* (...) in /proc/sys/net/ipv4/netfilter/ip_conntrack_max*
I checked these values and it looks this way;
# cat /proc/sys/net/ipv4/netfilter/ip_conntrack_max
55740
# cat
I was reading this [1] article and it brought a question do my mind: How
hard would it be for the FBI or the NSA or the CIA to have a couple of
agents infiltrated as package mantainers and seeding compromised packages
to the official repositories?
Could they submit an uncompromised source and
201 - 300 of 415 matches
Mail list logo