On Sat, Nov 14, 2020 at 02:26:47AM +0200, Mihai Popescu wrote:
> Hello,
>
> My computer has 2 x 4GB memory, as one can see in dmesg. A part of it is
> used by the video card, I'm not sure how much, maybe around 256MB or less I
> want to know if I will hit the swap space when I will let it run on
On 11/13/20 2:06 PM, Harald Dunkel wrote:
Hi folks,
if it is allowed to ask a question about packet filter here?
Found it, please ignore.
Harri
Hello,
My computer has 2 x 4GB memory, as one can see in dmesg. A part of it is
used by the video card, I'm not sure how much, maybe around 256MB or less I
want to know if I will hit the swap space when I will let it run on 1 x 4GB
memory, but I'm not sure how to interpret some of the following ou
Thanks. I have enabled system accounting.
acct(5) seems to be limited by the fact that it is triggered on process
exit, doesn't contain the process ID or parent process ID and can only
store 10 characters for the command name.
ktrace could work but it's far too slow without limiting syscalls
rec
On 20/11/13 11:26, Berkay Tuncel wrote:
> Hi all,
>
>
>
> We need an advice for our e-mail traffic with openbsd.org
>
>
> When I sent an e-mail to openbsd.org which is rhs, from 160.75.0.0/16, I
> got a TLS handshake error. On the other hand, when I tried from another
> subnet, there was no problem
Recently a machine running OpenBSD 6.8 had its configuration changed and I
believe it to have been subject to a malicious attack.
This change is completely unexplainable, compromised security, and would
have required root access.
The log files reveal nothing out of the ordinary except for wtmp
So you want to ktrace your entire system, with a limited set of
monitors.
I've played with this before, to identify specific behaviours
when developing pledge. It required a large number of hacks,
and the performance was dismal.
Based upon my experience, I predict it will not work for your usage
man accton
James wrote:
> Recently a machine running OpenBSD 6.8 had its configuration changed and I
> believe it to have been subject to a malicious attack.
>
> This change is completely unexplainable, compromised security, and would
> have required root access.
>
> The log files reveal noth
Hi folks,
if it is allowed to ask a question about packet filter here?
Please take a look at the attached pf.conf file. Problem is
that incoming traffic from a host in (internal:network) to an
external host port is passed in rule 86 (thats one of the
debproxy lines)
pass $log0 quick pro
Hi Tom,
Firstly thanks for your response.
I am sending it from itu.edu.tr
Yes, we have spf records and also other smtp precautions such as dkim and
so on.
We use sendmail, so we have sendmail conf and macro. Also, we have cipher
restrictions.
Nevertheless, the cipher which has successful commu
Do u have an spf record for your domain and what domain are you sending
from?
What is your opensmtpd.conf
Do u have restrictions onciphers supported by your mta
On Friday, 13 November 2020, Berkay Tuncel wrote:
> Hi all,
>
>
>
> We need an advice for our e-mail traffic with openbsd.org
>
>
> Wh
On Thu, Nov 12, 2020 at 08:24:51PM +0100, Paul de Weerd wrote:
> | > > uvn_flush: obj=0x0, offset=0x7c2. error during pageout.
> | > > uvn_flush: WARNING: changes to page may be lost!
> From the reply Mark sent me on June 9th[1]:
>
> > What you're seeing is what happens when
Hi all,
We need an advice for our e-mail traffic with openbsd.org
When I sent an e-mail to openbsd.org which is rhs, from 160.75.0.0/16, I
got a TLS handshake error. On the other hand, when I tried from another
subnet, there was no problem.
Nevertheless, our mta has not a problem like this w
13 matches
Mail list logo