> On Apr 12, 2014, at 18:55, Volker Kuhlmann wrote:
>
>> On Fri 11 Apr 2014 18:43:18 NZST +1200, Ryan Coleman wrote:
>>
>> He gave you an option to subscribe to the list.
>
> You seem to have missed the point I was making: critical security fixes
> (the 2.1.2 release in this case, unless I am
On Fri 11 Apr 2014 18:43:18 NZST +1200, Ryan Coleman wrote:
> He gave you an option to subscribe to the list.
You seem to have missed the point I was making: critical security fixes
(the 2.1.2 release in this case, unless I am misunderstanding) were not
posted to security-announce@.
The posting
How about configuring the firewall to block everything and then then create
a rule that forwards/allows only port 80 and 443 to the reverse proxy
server. Configure the reverse proxy server to only support HTTP traffic (on
port 80 and using SSL on 443). Then you don't need to do DPI. I'd say you
don
On Fri, Apr 11, 2014 at 7:39 PM, Angus Scott-Fleming wrote:
> This was on the bugtraq list on Wednesday. It would be a
> Good Thing if we could block heartbeat queries to
> internal devices which may not be patched using something
> like this ...
That doesn't really work. It'll block some legit
On Sat, Apr 12, 2014 at 9:58 AM, Martin Fuchs wrote:
> Hi !
>
> It's very often that out CARP flaps.
>
> We have 5 Interfaces and it's about 10 times a day, but it's since the
> update, before it was ok.
>
> I have configured each CARP master with base 1, 2, 3 and so on, skew 0 and
> each CARP sla
hail,
is this new versions booting on amd64 and soekris ?
I got:
FreeBSD/x86 bootstrap loader, Revision 1.1
(root@builder-10.0-b3-amd64, Sun Apr 6 09:23:32 CDT 2014)
Loading /boot/defaults/loader.conf
/boot/kernel/kernel text=0x9d1478 data=0x657578+0x258730
syms=[0x8+0xead68+0x8+0xe0dc8]
Hit
Hi !
It's very often that out CARP flaps.
We have 5 Interfaces and it's about 10 times a day, but it's since the
update, before it was ok.
I have configured each CARP master with base 1, 2, 3 and so on, skew 0 and
each CARP slave with base 1, 2, 3 and so on, skew 100.
Is that ok, since it worke
I am trying to design a reverse proxy structure that will direct traffic to
some web servers behind. At the entry point, i want to allow just HTTP or
HTTPs traffic. I want to do this by using DPI. I couldn't figured out how
to do it via PfSense. L7 filtering only lets blocking, firewall rules
depen