on
a piece of paper and hide behind the bookshelf.
(probably i should crosspost to debian-legal. the
whole non-US issue has been left untouched)
what do YOU think?
shell debian be the first(?) privacy enhanced distro?
clemens
^* SAWFASP = searched archives without finding a similiar
posting
On Wed, May 30, 2001 at 10:46:19AM +0200, Jan Niehusmann wrote:
On Wed, May 30, 2001 at 01:08:21AM -0700, [EMAIL PROTECTED] wrote:
Couldn't you say something like I'm so sorry, I can't remember the pass
phrase, my mind has failed me...etc?
What about a more provable approach:
The
On Wed, May 30, 2001 at 12:17:35PM +0900, Curt Howland wrote:
[cut]
but that only works at startup. if the system is running,
having the entire disk encrypted is no different than the
fact it's all in hex already. an individual user based
encryption means all you have to do is logout, not
On Wed, May 30, 2001 at 10:46:19AM +0200, Jan Niehusmann wrote:
On Wed, May 30, 2001 at 01:08:21AM -0700, [EMAIL PROTECTED] wrote:
Couldn't you say something like I'm so sorry, I can't remember the pass
phrase, my mind has failed me...etc?
What about a more provable approach:
The
On Tue, May 29, 2001 at 08:02:50PM -0700, Paul Lowe wrote:
I like this. Would it be difficult to modify Debian, so that
upon install, it creates an encrypted root volume and starts
things off the right way?
3 things are needed to that upon installation:
- losetup -e your favourite chiper
On Wed, May 30, 2001 at 12:17:35PM +0900, Curt Howland wrote:
[cut]
but that only works at startup. if the system is running,
having the entire disk encrypted is no different than the
fact it's all in hex already. an individual user based
encryption means all you have to do is logout, not
30, 2001 at 03:01:17AM +0200, clemens wrote:
SAWFASP^*
as laws around the globe are forged to weak personal privacy,
police knocking on one's door, because of portscanning a
previously hacked website, and - i don't have to tell those
of you, which are reading slashdot - as pretty strange
Hi,
today I had a discussion with somebody about the possibility of
ip-spoofing that affects the apache. In particular we were talking about
a cgi-script he implemented. The script is sort of an
online-voting-system. To avoid that someone clicks several
times he uses the source-IP and each IP
On Fri, 2002-10-18 at 09:55, Gustavo Franco wrote:
Talking about secpack, is it non-free? I can't see in your mail(Clemens)
the url or apt-line to get the source package.
No, it's BSD. I didn't dare to put up a license for that minimal collection.
There isn't even a source package. I just dpkg
of this package, please
speak out.
Regards, Clemens
P.S.: I'm sorry that this update took me so long, but I lost interest in
using Debian because of it's release cycles. No offense.
pgp0.pgp
Description: PGP signature
Hallo Goswin,
Goswin von Brederlow schrieb:
Clemens Bier [EMAIL PROTECTED] writes:
snip
cannot open '/dev/tty' : no such device or address
Error: Password must be at least 20 characters
/snip
I think you need to redirect input from /dev/tty or /dev/console
explicitly or you need
file entries:
snip /var/log/auth.log/
Nov 7 00:48:25 zappa kdm: :0[11226]: pam_mount: (defined by globalconf)
Nov 7 00:48:25 zappa kdm: :0[11226]: pam_mount: user: clemens
Nov 7 00:48:25 zappa kdm: :0[11226]: pam_mount: server:
Nov 7 00:48:25 zappa kdm: :0[11226]: pam_mount:
volume
Hi,
today I had a discussion with somebody about the possibility of
ip-spoofing that affects the apache. In particular we were talking about
a cgi-script he implemented. The script is sort of an
online-voting-system. To avoid that someone clicks several
times he uses the source-IP and each IP has
,
please contact me. For further information on how to use cryptoloop have a
look at http://www.kerneli.org/cryptoapi/howto/
This is not yet an official CryptoAPI release.
Feedback is highly appreciated,
Clemens
pgp5PDshCYwtC.pgp
Description: PGP signature
Hi!
http://therapy.endorphin.org/secpack_0.1-1.deb implements a simple cron
based daily security update with signature checking using a modified version
of ajt's apt-check-sigs.
Feedback is appreciated. CC please, /me not on list.
Regards, Clemens
pgpVBkwjvCD5f.pgp
Description: PGP signature
On Fri, 2002-10-18 at 09:55, Gustavo Franco wrote:
Talking about secpack, is it non-free? I can't see in your mail(Clemens)
the url or apt-line to get the source package.
No, it's BSD. I didn't dare to put up a license for that minimal collection.
There isn't even a source package. I just dpkg
An update to secpack is available with the new Debian ftp archive key.
http://therapy.endorphin.org/secpack/
secpack implements updates from security.debian.org with signature
checking.
I'm no official debian developer. Does anyone want to adopt this unofficial
package?
Regards, Clemens
of this package, please
speak out.
Regards, Clemens
P.S.: I'm sorry that this update took me so long, but I lost interest in
using Debian because of it's release cycles. No offense.
pgpemWoxwyrvo.pgp
Description: PGP signature
out, the init script /etc/init.d/bootmisc.sh
sets the permissions on the tty device.
I am still a noobie to Kernel internals. Thus I am not sure where to
look for further clues.
Thanks for any tips or hints.
Have a nice day
Clemens Bier
#!/bin/sh -e
case $1 in
start)
/sbin
Hallo Goswin,
Goswin von Brederlow schrieb:
Clemens Bier [EMAIL PROTECTED] writes:
snip
cannot open '/dev/tty' : no such device or address
Error: Password must be at least 20 characters
/snip
I think you need to redirect input from /dev/tty or /dev/console
explicitly or you need
On Thu, 2004-04-29 at 00:11, Hubert Chan wrote:
Clemens == Clemens Bier [EMAIL PROTECTED] writes:
[...]
Clemens So, now we come to the point: When I integrate my script into
Clemens /etc/init.d as one of the startup scripts, I get the following
Clemens error message during boot time snip
Hi,
thanks for this information!
I just hope that this is a hoax.
What would you suggest for securing a server running openSSH?
How can I notice such an attack in my log files?
Cheers
Kontaktinformationen
clem...@csrv.at
www.cdev.at
2009/7/7 Henrique
iptables.
Regards
Kontaktinformationen
clem...@csrv.at
www.cdev.at
2009/7/7 Clemens Pfaffinger clpfaffin...@gmail.com
Hi,
this is standard for me. I always change the port of the openSSH-server.
My (current) solution is:
Portsentry listens on port 22
--
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4e3f7e6c@tugraz.at
24 matches
Mail list logo