Hi Benjamin,
Le 20/10/2017 à 04:14, Benjamin Kaduk a écrit :
Alas, it is left that way all too often. Since we're on the topic, I'll link
http://web.mit.edu/kerberos/krb5-latest/doc/admin/install.html
and note that that is quite different from the Heimdal included in the
FreeBSD base system.
On Thu, Oct 19, 2017 at 03:07:57PM +0200, WhiteWinterWolf (Simon) wrote:
> Hi Benjamin,
>
> Le 19/10/2017 à 00:43, Benjamin Kaduk a écrit :
> >> NFS has no built-in encryption, it may be possible to tunnel it but this
> >> is out-of-scope here (using a VPN and tunnel everything would be easier
>
Hi Benjamin,
Le 19/10/2017 à 00:43, Benjamin Kaduk a écrit :
NFS has no built-in encryption, it may be possible to tunnel it but this
is out-of-scope here (using a VPN and tunnel everything would be easier
than nitpicking and tunnel only the NFS data flow).
This statement is either false or
On Wed, Oct 18, 2017 at 05:43:44PM -0500, Benjamin Kaduk wrote:
> I fear I must wade into this thread, despite it being thick with FUD.
>
> On Wed, Oct 18, 2017 at 07:27:42PM +0200, WhiteWinterWolf (Simon) wrote:
> > Hi Ronald,
> >
> > Le 18/10/2017 ? 06:00, Ronald F. Guilmette a ?crit :
> > >
I fear I must wade into this thread, despite it being thick with FUD.
On Wed, Oct 18, 2017 at 07:27:42PM +0200, WhiteWinterWolf (Simon) wrote:
> Hi Ronald,
>
> Le 18/10/2017 à 06:00, Ronald F. Guilmette a écrit :
> >
> > In message <49252eda-3d48-f7bc-95e7-db716db4e...@whitewinterwolf.com>,
>
Hi Ronald,
Le 18/10/2017 à 06:00, Ronald F. Guilmette a écrit :
>
> In message <49252eda-3d48-f7bc-95e7-db716db4e...@whitewinterwolf.com>,
> "WhiteWinterWolf (Simon)" wrote:
>
>> Ideally, you would use a specific protection for each of these layers,
>> so that
In message <49252eda-3d48-f7bc-95e7-db716db4e...@whitewinterwolf.com>,
"WhiteWinterWolf (Simon)" wrote:
>Ideally, you would use a specific protection for each of these layers,
>so that an vulnerability affecting one layer would be compensated by
>other
Hi Ronald,
I have yet to investigate this WPA2 thing on my side, too much
contradictory informations depending on the sources yet.
Let me however add my two cents regarding your issue:
A network can be divided in several logical layers: the data link layer
(here WiFi), the networking layer
In message ,
Karl Denninger wrote:
>Please understand that if you can get an AP to hand you a zero'd key
>(with an intentionally "weak" client) THEN THAT PERSON JUST BECAME ABLE
>TO ATTACH TO YOUR NETWORK AS AN AUTHORIZED
On 10/16/2017 21:14, Ronald F. Guilmette wrote:
> In message <20171016230525.ga94...@funkthat.com>,
> John-Mark Gurney wrote:
>
>>> In light of the recent WPA2 disclosures, it has occured to me that
>>> as of today it may be a Bad Idea for me to be exporting all of this
>>>
In message <20171016230525.ga94...@funkthat.com>,
John-Mark Gurney wrote:
>> In light of the recent WPA2 disclosures, it has occured to me that
>> as of today it may be a Bad Idea for me to be exporting all of this
>> stuff, read/write, to all of 192.168.1.0/24.
>
>Doesn't
Ronald F. Guilmette wrote this message on Mon, Oct 16, 2017 at 15:13 -0700:
> Just like everybody else on this list, I guess, I'm rather less than
> happy about the WPA2 story that has emerged within the past 24 hours.
>
> Due to the announcement that WPA2 is, apparently, badly broken, I'm
>
Just like everybody else on this list, I guess, I'm rather less than
happy about the WPA2 story that has emerged within the past 24 hours.
Due to the announcement that WPA2 is, apparently, badly broken, I'm
trying now to figure out how to lock down my home network a little
better... as, I
13 matches
Mail list logo