Re: [pfSense] not all backdoors are NSA backdoors

2013-10-15 Thread Rainer Duffner
Am Tue, 15 Oct 2013 12:24:42 +0100 schrieb Vincent Hoffman : > pkgng allows signed binary packages on FreeBSD and poudriere makes > maintaining a repo stupidly simple if that helps. > https://glenbarber.us/2012/06/11/Maintaining-Your-Own-pkgng-Repository.html AFAIK, it's not an X509 certificate,

Re: [pfSense] not all backdoors are NSA backdoors

2013-10-15 Thread Vincent Hoffman
pkgng allows signed binary packages on FreeBSD and poudriere makes maintaining a repo stupidly simple if that helps. https://glenbarber.us/2012/06/11/Maintaining-Your-Own-pkgng-Repository.html Vince On 15/10/2013 11:08, Jim Thompson wrote: > Once upon a time I was the CTO of Wayport. > > We put

Re: [pfSense] not all backdoors are NSA backdoors

2013-10-15 Thread Jim Thompson
Once upon a time I was the CTO of Wayport. We put a few ten thousand Debian machines in the world, all remote, acting as access controllers. Some of the other people involved now also work at Netgate. Let's just say: 1) We are more than familiar 2) there are severe security issues with th

Re: [pfSense] not all backdoors are NSA backdoors

2013-10-15 Thread Chris Buechler
On Sun, Oct 13, 2013 at 12:03 PM, Jim Thompson wrote: > > But first, on the tail of the recent thread that erupted here, consider this > backdoor that someone (?) recently (?) discovered > (?) in the firmware for > certain D-link routers: > http://www.devttys0.com/2013/10/reverse-engineering-a

Re: [pfSense] not all backdoors are NSA backdoors

2013-10-14 Thread Adrian Zaugg
On 10/13/13 7:03 PM, Jim Thompson wrote: > One possible solution: signed packages, and there was a bit of > infrastructure put in-place just prior to the 2.1 release. > We’ve yet to accomplish the rest of this, but.. it’s coming. > > As always, if you have ideas(*), bring them forward. I alrea

[pfSense] not all backdoors are NSA backdoors

2013-10-13 Thread Jim Thompson
It occurs to me that being more ‘conversational’ with the community might be a good thing. Describing what is happening with pfSense, and why, and engaging the pfsense community in the process could be a good thing. My first attempt is included herein. But first, on the tail of the recent