Subject: Unidentified subject!
why listprocessor does not reject these mails (mails without body)?
An even more so, mails without a subject. I do not think we really
need those ant more than bodyless mails, do we? Listmaster: is this
feasible?
--
.
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact
?
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
--
To UNSUBSCRIBE, email to [EMAIL
.
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL
What might be the URL/apt-get sources.list line for security fixes of
the non-US packages?
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja
pages might want to
add that non-US security fix URL to the pages. Currently it is not
mentioned there.
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja
-in?
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
--
To UNSUBSCRIBE, email to [EMAIL
the aide.db.new to aide.db. Besides this started right after
installation - before installing anything new.
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja
) as changed, but these files seem
totally random! After this, I reran 'aide --check' and got a segfault.
Repeat as many times as I would, all get segfaulted... Aide broken?
Aide version is sid's: 0.7-10.
--
---
| Juha Jäykkä
Does anyone happen to know which versions are vulnerable besides the
one DSA mentioned? I have a woody which would need slrn removed if
woody's newest version (that is, 0.9.7.2-4) is vulnerable.
--
---
| Juha Jäykkä
doubt my little scheme would be the weakest link in security. The only
problem I can see is in 1. and 2. - could the DSA key be abused to
automatically root all the machines?
Ideas?
--
---
| Juha Jäykkä, [EMAIL
programs now though crashing
a program which only runs another should be impossible (unless the init
routines can be crashed).
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http
)
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED
IPSec. No more stealing, I
would think.
There may be other options as well, but that would end all kinds of
network sniffing inside your network.
--
---
| Juha Jäykkä, [EMAIL PROTECTED
are not very fast - IPSec encrypts
absolutely everything so it really takes some CPU.
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja
root anyway, there should
be no need for exim to: the port is already bound when exim starts and
exim will not be able to bind to it anyway. Just wondering if I should
do some dpkg-statoverrides.
--
---
| Juha Jäykkä, [EMAIL
your favourite username here.
Now another question: are there?
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja
_format_ of their version numbers??? 2.9 is lacking one minor version
specifier as compared to 2.9.9, which has two.
TIA.
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http
for it?
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
for it.
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
?
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
.)
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
.
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
.
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
windows stuff. This does not preclude the
possibility of a backdoor/trojan, though: a wise backdoor would listen
on a port which would be open anyway thus concealing (partly) its
presence.
--
---
| Juha Jäykkä, [EMAIL
?
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
...
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
perhaps now.
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
.
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
.
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
What might be the URL/apt-get sources.list line for security fixes of
the non-US packages?
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
pages might want to
add that non-US security fix URL to the pages. Currently it is not
mentioned there.
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
-in?
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
the aide.db.new to aide.db. Besides this started right after
installation - before installing anything new.
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
) as changed, but these files seem
totally random! After this, I reran 'aide --check' and got a segfault.
Repeat as many times as I would, all get segfaulted... Aide broken?
Aide version is sid's: 0.7-10.
--
---
| Juha Jäykkä
Does anyone happen to know which versions are vulnerable besides the
one DSA mentioned? I have a woody which would need slrn removed if
woody's newest version (that is, 0.9.7.2-4) is vulnerable.
--
---
| Juha Jäykkä
doubt my little scheme would be the weakest link in security. The only
problem I can see is in 1. and 2. - could the DSA key be abused to
automatically root all the machines?
Ideas?
--
---
| Juha Jäykkä, [EMAIL
programs now though crashing
a program which only runs another should be impossible (unless the init
routines can be crashed).
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http
)
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
IPSec. No more stealing, I
would think.
There may be other options as well, but that would end all kinds of
network sniffing inside your network.
--
---
| Juha Jäykkä, [EMAIL PROTECTED
are not very fast - IPSec encrypts
absolutely everything so it really takes some CPU.
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
anyway, there should
be no need for exim to: the port is already bound when exim starts and
exim will not be able to bind to it anyway. Just wondering if I should
do some dpkg-statoverrides.
--
---
| Juha Jäykkä, [EMAIL
favourite username here.
Now another question: are there?
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
_format_ of their version numbers??? 2.9 is lacking one minor version
specifier as compared to 2.9.9, which has two.
TIA.
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http
for it?
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
three machines, using ftp.fi.debian.org-mirror. How is this
possible?
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja
for 4b... then. :)
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja
)? Are there any other relevant configuration
items?
--
---
| Juha Jäykkä, [EMAIL PROTECTED], Assistant |
| Laboratory of Theoretical Physics |
| Department of Physics, University
Hi all!
I was wondering how bad this actually is and it looks extremely horrible. In
practice, all data transmitter over the wire for the last two years and be
snooped upon (if someone has captured it - and the paranoid must assume
someone has).
Trusting on the security of ssh, we have, for
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
signature.asc
Description: This is a digitally signed
50 matches
Mail list logo