In freebsd-questions Digest, Vol 483, Issue 2, Message: 1
On Mon, 2 Sep 2013 10:41:44 -0400 Jerry wrote:
> I usually check the US Cert listing every week to see if anything
> interesting is listed. <https://www.us-cert.gov/ncas/bulletins/SB13-245>
>
> I discovered
Jerry writes:
> I usually check the US Cert listing every week to see if anything
> interesting is listed. <https://www.us-cert.gov/ncas/bulletins/SB13-245>
>
> I discovered that there are two listings for FreeBSD:
>
> 1) http://web.nvd.nist.gov/view/vuln/detail?vulnId=C
These are the sctp vulnerabilitiese from a week or two back.
Anyone following the Security Advisories can safely ignore these; they
were issued after the relevant advisories and patches, and consist of
nothing but pointers to the previous information.
__
I usually check the US Cert listing every week to see if anything
interesting is listed. <https://www.us-cert.gov/ncas/bulletins/SB13-245>
I discovered that there are two listings for FreeBSD:
1) http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-3077
2) http://web.nvd.nist.gov/vie
28, 2010 at 1:49 PM, bluethundr wrote:
> Hi Eric,
>
> Sorry I am clear on that now. I have tried the -h value that matches
> the one in the cert, but I get the same result, unfortunately:
>
> [r...@vircent03:~]#ldapsearch -h LBSD2.summitnjhome.com -b
> "dc=summitnjhome,dc
Hi Eric,
Sorry I am clear on that now. I have tried the -h value that matches
the one in the cert, but I get the same result, unfortunately:
[r...@vircent03:~]#ldapsearch -h LBSD2.summitnjhome.com -b
"dc=summitnjhome,dc=com" -Z -D "cn=Manager,dc=summitnjhome,dc=com"
"(
On 28/11/10 18.51, bluethundr wrote:
Yes the hostname is in the CN of the cert file. So I agree that -h is
not the issue. :)
[r...@vircent03:~]#ldapsearch -h ldap -b "dc=summitnjhome,dc=com" -Z
-D "cn=Manager,dc=summitnjhome,dc=com" "(objectclass=sudoRole)" -W
Ma
e CentOS client:
passwd: files ldap
shadow: files ldap
group: files ldap
sudoers:ldap
I have revised the location of the cert files on the server noted in
slapd.conf in order to separate out the certs from the cacerts. This
is just to organize things a little more neatly.
Don't know if this applies, but I had to install the intermediate cert to get
the godaddy Certs to work. You can download it from the gd website.
-- John
Sent from my iPhone, so may be a bit brief.
On Nov 25, 2010, at 11:26, bluethundr wrote:
> Hey list,
>
> I was having
.summitnjhome.com.crt
TLSCertificateKeyFile /usr/local/etc/openldap/cacerts/slapd.pem
TLSCACertificateFile /usr/local/etc/openldap/cacerts/sf_issuing.crt
I have tried each of the following certs with no luck in getting my
cert to talk to it's CA:
-rw-r--r-- 1 root bluethundr 2604 Nov 25
Hey list,
I was having a similar SSL/openLDAP problem to this last week. I had
a chance to look at this again today and it still appears to not be
working. I called godaddy and had the last cert cancelled and reissued
as I had mis-typed the name of the CN on the last one.
I am trying to setup
I seems that US-Cert has issued a 'High Vulnerability' warning regarding
FreeBSD. This is the URL:
http://www.us-cert.gov/cas/bulletins/SB08-091.html
A snippet of the warning:
Multiple integer overflows in libc in NetBSD 4.x, FreeBSD 6.x and 7.x,
and probably other BSD and Ap
Worked like a charm!
Thanks!
(the self-signed thing is OK.. but there was no way I was going to show it
to the VP with the 'Domain Name Mismatch' error.)
From: Tommy Scheunemann <[EMAIL PROTECTED]>
To: brad davison <[EMAIL PROTECTED]>
Subject: Re: imap-uw / cclient
I had installed imap-uw port
# cd /usr/ports/mail/imap-uw
# make -DWITH_SSL_AND_PLAINTEXT install
then i create a certificate with
# make cert
Generating a 1024 bit RSA private key
++
++
writing new private key to '/usr/local/certs/imapd.pem'
-
You
u encountered any reason you can't just create the
> directory yourself?
It seems creating the dir, copying the cert file into there, and
creating a hash symlink, as advised in the OpenSSL Howto, has no
effect.
___
freebsd-questions@freebsd.org maili
Tobias Roth writes:
> I'd like to add a certificate to OpenSSL. The OpenSSL HOWTO mentions
> OPENSSLDIR, which is /etc/ssl on FreeBSD (for OpenSSL from base). To
> have OpenSSL recognize a new certificate, it has to be put into
> OPENSSLDIR/certs/, but this does not exist on FreeBSD. The
> o
Hi
I'd like to add a certificate to OpenSSL. The OpenSSL HOWTO mentions
OPENSSLDIR, which is /etc/ssl on FreeBSD (for OpenSSL from base). To
have OpenSSL recognize a new certificate, it has to be put into
OPENSSLDIR/certs/, but this does not exist on FreeBSD. The
only certs/ dir I could find is /u
> include it in their browsers as if you just make your own certs.
> >
> > Not quite. If they include the CA-Cert root certificate, they only have
> > to do that once for all of your CA-Cert signed certificates.
>
> Good point.
Not only that, but the more people using
On Thursday 25 March 2004 01:15, Luís Vitório Cargnini wrote:
> Here in Brasil exist some companies offering this kind of Certification how
> could be this so ?
Perhaps because they just give trainings in FreeBSD and they'll hand out
certificates if you pass it. It is graded by the company th
Here in Brasil exist some companies offering this kind of Certification how could be
this so ?
On Thu, 25 Mar 2004 15:32:38 +0100 (CET)
"Jorn Argelo" <[EMAIL PROTECTED]> wrote:
>
> The FreeBSD Project is, as it name implies, an project of volunteers who
> dedicate their time to bring us an p
>
> On Wed, Mar 24, 2004 at 10:05:46AM -0500, Jerry McAllister wrote:
>
> > By the way, any more FreeBSD-cons coming up, does anyone know?
> >
> > jerry
> >
>
> Dan Langille's got FreeBSDCan ... I think next month in
> Toronto. Check Google
Yes. I saw that one. Unfortunately I ha
On Wed, Mar 24, 2004 at 10:05:46AM -0500, Jerry McAllister wrote:
> By the way, any more FreeBSD-cons coming up, does anyone know?
>
> jerry
>
Dan Langille's got FreeBSDCan ... I think next month in
Toronto. Check Google
Kevin Kinsey
___
[
> >
> > Cheers,
> >
> > Jorn
> > On 3/25/2004, "ariel" <[EMAIL PROTECTED]> wrote:
> >
> > >is there a certification program for fbsd? like how you can be redhat certified?
> > >-a
http://www.pugetsoundtechnology.com/training/workshops/
sounds like they have the type of thing you're looking f
> The FreeBSD Project is, as it name implies, an project of volunteers who
> dedicate their time to bring us an powerful Unix OS. It is not a company
> as Red Hat or Mandrake, therefor there won't be any official
> certificates for it. As Matthew said, there can be some universities or
> colleges w
The FreeBSD Project is, as it name implies, an project of volunteers who
dedicate their time to bring us an powerful Unix OS. It is not a company
as Red Hat or Mandrake, therefor there won't be any official
certificates for it. As Matthew said, there can be some universities or
colleges who give F
On Tue, Mar 23, 2004 at 11:46:10PM -0700, ariel wrote:
> is there a certification program for fbsd? like how you can be redhat certified?
Not that I've ever heard of. Generally you need some sort of
reasonably large entity behind such a scheme: for software and system
administration, that genera
is there a certification program for fbsd? like how you can be redhat certified?
-a
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"
The other day i thought i saw something mentioned about an recent exploit
in mysql. Is this the case ?? or was it something else ?
thanx
--
Brent Bailey CCNA
Bmyster LLC
Computer Networking and Webhosting
Network Engineer, Webmaster, President
http://www.bmyster.com
[EMAIL PROTECTED]
207-247-833
FWIW, on the advisory itself, an OpenSSH author states,
"From my testing it seems that the current version of OpenSSH (3.5)
is not vulnerable to these problems, and some limited testing shows
that no version of OpenSSH is vulnerable."
--
Regards,
Doug
Stacey Roberts said:
> This just landed in m
This just landed in my Inbox.
Figured the list might like to be aware of this:
Multiple vendors' SSH transport layer protocol implementations contain
vulnerabilities in key exchange and initialization
http://www.kb.cert.org/vuls/id/389665
Regards,
Stacey
--
Stacey Roberts
B.Sc (HONS) Computer
30 matches
Mail list logo