Re: Crypto File System-Problems Creating One

2005-06-14 Thread Mark Janssen
On 6/9/05, Bernd Eckenfels [EMAIL PROTECTED] wrote:
 In article [EMAIL PROTECTED] you wrote:
  losetup -e aes-256 /dev/loop0 /dev/hda10
 
 What do you have defined in modules?
 
 alias cipher-16 rijndael
 
 You also need the cryptoloop module in order to name ciphers by name. Try -E
 16 instead.

You need to do something like this:
sudo cryptsetup -c aes -y create SomeUniqueName /dev/hda10
sudo mount /dev/mapper/SomeUniqueName /mountpoint



-- 
Mark Janssen  --  maniac(at)maniac.nl  --  pgp: 0x357D2178 |   ,''`.  | 
Unix / Linux Open-Source and Internet Consultant @ Snow.nl |  : :' :  | 
Maniac.nl  MarkJanssen.nl  NerdNet.nl  Unix.nl |  `. `'   | 
Skype: markmjanssen ICQ: 129696007 irc: FooBar on undernet |`-|



Re: which pop3/imap secure method should I use?

2005-06-14 Thread LeVA
2005. jĂșnius 14. 07:57,
Radu Spineanu [EMAIL PROTECTED]
- debian-security@lists.debian.org,:
 Ian Eure wrote:
  On Monday 13 June 2005 04:41 pm, LeVA wrote:
  I don't see why it would be helpful, unless you're trying to keep

 your info

  secret from a determined/resourceful attacker. But an attacker like that
  would probably get it anyways.
 
  I use TLS  PLAIN, and encrypt/sign my messages with GPG for my business
  email, and I think that's plenty secure for my needs.

 That would maka it very easy for a sniffer running ettercap for example
 to do a MiTM attack.

 And of course the certificate is changed a little, but 80% of users
 ignore this change and click yes on whatever is shown just to read their
 emails, not knowing what this could lead to.

 Also an attacker could alter that data the server sends so that it
 doesn't advertise cram-md5 as an authentication method but this is more
 advanced.

 Doing a simple MiTM in ettercap is script kiddie friendly.

What's this MiTM attact means?

Daniel

-- 
LeVA



Re: which pop3/imap secure method should I use?

2005-06-14 Thread Demonen
 What's this MiTM attact means?

Man in The Middle is when someone between you and the remote system
modifies packets on their way to the remote system or back, IIRC

-- 
Fredrik Demonen Vold
/*
- Do not meddle in the affairs of dragons, for you are crunchy and
good with ketchup.
*/