2012/8/23 Claudio Jeker cje...@diehard.n-r-g.com
On Thu, Aug 23, 2012 at 12:17:04AM +0600, ??? wrote:
Hello!
we are running high load https server on OpenBSD, so there are questions
on
performance:
since we already had to increase kern.maxclusters value, I guess default
On Sun, 12 Aug 2012 13:29:57 -0400
Nico Kadel-Garcia nka...@gmail.com wrote:
Such certificates have already been stolen. They're dependent on the
security of the intermediate key owners, and the are demonstrably
unsecure: Check this URL for more details on the release of rogue SSL
signing
RENTAMOS SALONES PARA; CAPACITACIONES, CONGRESOS, EXPOS, CONFERENCIAS,
CASTINGS, RECLUTAMIENTO Y SELECCION, RUEDAS DE PRENSA, PRESENTACIONES DE
LIBROS, PRESENTACIONES DE DISCOS, JUNTAS ESTRATEGICAS.
TAMBIEN PUEDES HACER EVENTOS PRIVADOS; FAMILIARES (XV AÑOS, DESPEDIDAS DE
SOLTERAS, GRADUACIONES,
Xin chà o,
Le Duc Toan Äã gá»i má»t tin nhắn cho bạn
Nháºn thÆ° từ Le Duc Toan!:
http://myzamana.net/l?secret=360975382_a6b25eeb78b30523
Chúc vui vẻ!
Äá»i ngÅ© myZamana
Bạn Äã nháºn Äược email nà y vì má»t thà nh viên myZamana Äã
gá»i má»t tin nhắn cho
Hi Misc@,
When I tried to build userland on i386 -current, the following error occur;
/usr/src/kerberosV/usr.bin/klist/../../src/kuser/klist.c: In function
'display_tokens':
/usr/src/kerberosV/usr.bin/klist/../../src/kuser/klist.c:496: error:
'VIOCGETTOK' undeclared (first use in this
Welcome to myZamana!
Your account has been setup. Now, follow these tips to get started:
Add photos of yourself!
http://myzamana.net/account?i=361671669h=813737fcee79f2b9
The more photos you add, the more people will see you!
Edit your profile
Insan Praja SW insan.pr...@gmail.com wrote:
/usr/src/kerberosV/usr.bin/klist/../../src/kuser/klist.c:496: error:
'VIOCGETTOK' undeclared (first use in this function)
Any hints how to fix this?
This might be enough. My build is still running...
Index: kerberosV/src/lib/kafs/kafs.h
On Thu, Aug 23, 2012 at 01:37, Justin N. Lindberg wrote:
So why isn't there a good way for an end user to strictly limit trust
in, for example, a Google Internet Authority to those domains that
are actually owned by Google, and conversely, not to trust any other
authority to sign certs for
On Thu, Aug 23, 2012 at 12:08 PM, Ted Unangst t...@tedunangst.com wrote:
people designing the protocol never got that far.
Anyway the workaround du jour is certificate pinning. Your browser is
supposed to remember the cert used for the previous connection and
warn if it changes, which reduces
On Thu, Aug 23, 2012 at 13:12, Ryan Kirk wrote:
One thing I've never understood is that if you're MITM'd, what good is
a cert revocation going to do? The proxying individual can easily
block access to the revocation lists, and your browser be none the
wiser.
hahaha, I've seen exactly one
On 08/23/12 20:05, Ted Unangst wrote:
On Thu, Aug 23, 2012 at 13:12, Ryan Kirk wrote:
One thing I've never understood is that if you're MITM'd, what good is
a cert revocation going to do? The proxying individual can easily
block access to the revocation lists, and your browser be none the
11 matches
Mail list logo