Hi,
please inform me back if you fixed this issue or need some more samples.
I then can rerun tests and look if some more issues exists - now to much tests
failed (234/456)
And i do not dig more until fix.
PS. Will be some materials about "Firebird Big Databases seminar" -
I could not be at th
Hi All,
2.5 and 3.0 Linux builds have time stamp 2015-10-24.
Gabor
--
Presto, an open source distributed SQL query engine for big data, initially
developed by Facebook, enables you to easily query your data on Hadoop in
15.11.2015 17:40, Alex Peshkoff wrote:
>> Ok, but you said that every reload of databases.conf will lead to
>> creating of a new
>> >config object instance, right? Why?
> Certainly it's implementation detail, but I've wrote that code and for
> me it's the easiest way to support per-DB configu
On 11/15/2015 07:23 PM, Dimitry Sibiryakov wrote:
> 15.11.2015 16:53, Alex Peshkoff wrote:
>> On 11/15/2015 06:25 PM, Dimitry Sibiryakov wrote:
15.11.2015 14:22, Alex Peshkoff wrote:
>> Use of permanent
>> interface is not an option here - configuration for module may change
>>
15.11.2015 16:53, Alex Peshkoff wrote:
> On 11/15/2015 06:25 PM, Dimitry Sibiryakov wrote:
>> >15.11.2015 14:22, Alex Peshkoff wrote:
>>> >>Use of permanent
>>> >>interface is not an option here - configuration for module may change
>>> >>during server lifetime, and creating new and new permane
Jim Starkey wrote:
> When you get down to essentials, that's basically the same technology that
I'm suggesting for a key server, the only difference is the certificate says
a trust third party vouches for me as opposed to the key server already
knowing the IPs. And, not incidentally, the key serv
On 11/15/2015 06:22 PM, Jim Starkey wrote:
> On 11/15/2015 7:55 AM, Alex Peshkoff wrote:
>> Presence of one surely known plain-text and corresponding encrypted
>> text will be of great help to the potential attackers in such a case.
> Really? Why do you think it would be a "great help." What usef
On 11/15/2015 06:25 PM, Dimitry Sibiryakov wrote:
> 15.11.2015 14:22, Alex Peshkoff wrote:
>>Use of permanent
>> interface is not an option here - configuration for module may change
>> during server lifetime, and creating new and new permanent instances
>> means memory leak.
> Here you imp
On 11/14/2015 7:03 PM, Leyne, Sean wrote:
> Doesn't the need for a key server make the problem more complicated
> that required?
More complicated? Certainly. More complicated that required? Don't
know yet.
> Although I think it should be supported, via engine/config. I was
> referring to a m
15.11.2015 16:26, Jim Starkey wrote:
> Do remember that we're talking about unattended startup.
Oops, I really forgot that, sorry.
--
WBR, SD.
--
Firebird-Devel mailing list, web interface at
https://lists.source
On 11/14/2015 6:21 PM, Wols Lists wrote:
> On 14/11/15 22:16, Jim Starkey wrote:
>> While's it possible to fake the originator IP address with UDP, I don't
>> think it's possible with TCP.
> The attacker simply uses the same IP address as a valid client ???
>
> If the valid client is offline, that'
On 11/14/2015 5:54 PM, Dimitry Sibiryakov wrote:
> 14.11.2015 23:16, Jim Starkey wrote:
>> So here's a simple scheme. The basic idea of a redundant set of
>> lightweight key servers running at various points in the network. When a
>> database wants to start up, it runs through a list of key server
15.11.2015 14:22, Alex Peshkoff wrote:
> Use of permanent
> interface is not an option here - configuration for module may change
> during server lifetime, and creating new and new permanent instances
> means memory leak.
Here you imply that plugin must see configuration files in state they w
On 11/15/2015 7:55 AM, Alex Peshkoff wrote:
> Presence of one surely known plain-text and corresponding encrypted
> text will be of great help to the potential attackers in such a case.
Really? Why do you think it would be a "great help." What useful
information is leaked? And how would a mi
On 11/14/2015 05:47 AM, Claudio Valderrama C. wrote:
>> -Original Message-
>> From: Alex Peshkoff [mailto:[email protected]]
>> Sent: Viernes, 13 de Noviembre de 2015 7:25
>>
>> On 11/13/2015 01:17 PM, Vlad Khorsun wrote:
>>> interface LoadedModuleInfo : Versioned
>>> {
>>> const string
On 11/14/2015 06:29 PM, Jim Starkey wrote:
> On 11/14/2015 9:48 AM, Dimitry Sibiryakov wrote:
>> 10.11.2015 10:13, Alex Peshkoff wrote:
>>> Does anybody see problems with suggested approach?
>>> If not - I will add a ticket to the tracker for myself.
>> After a good sleeping on it, I'm sure th
Interrupt of aux connection during TCP setup phase causes server exit due to
unhandled exception
Key: CORE-5017
URL: http://tracker.firebirdsql.org/browse/CORE-5017
15.11.2015 3:05, Steve Friedl wrote:
>> The attacker simply uses the same IP address as a valid client ???
> No, not at all.
>
> The spoofer will never receive a reply from the target to complete the
> three-way handshake, and since getting this right involves knowing the
> target's next TCP sequen
18 matches
Mail list logo