as stating that patent issues are now a
significant problem for them.
-wolfgang
--
Wolfgang S. Rupprechthttp://www.wsrcc.com/wolfgang/
Is there any way to run a my gps pps (pulse per second) clock off of
obsd-current with Mills' ntpd? So far the gps is hooked up to a
machine running nbsd, but I'd like to consolidate things.
-wolfgang
--
Wolfgang S. Rupprechthttp://www.wsrcc.com/wolfgang/
Dan Farrell [EMAIL PROTECTED] writes:
Correct me if I'm wrong (and I usually am) but I thought DNS (and named
specifically) only used tcp connections for zone transfers.
Last time I looked named used TCP any time a packet needed to be
fragmented due to size. It is highly unlikely that the OP
don't see how a hardware chip maker can prove that the
chip doesn't have a trojan without providing masks for inspection and
a way to prove that those masks and only those masks were used to make
the chip. Open source and all that.
-wolfgang
--
Wolfgang S. Rupprechthttp
So what if one of the driver writers for one of the open source operating
systems were to design a set of open standards for a hardware/software
interface for chipsets in this class.
I guess the part I don't understand is why are open source folks so
wary of running black-box *.o binaries
I wrote:
A GENERIC amd64 kernel compiled from today's sources is causing my
Asus k8v-se-d to run fast by approximately 3 seconds per minute.
(Obviously that was with ntpd not running.) This has never been a
problem before. Is anyone else seeing this?
Turns out this was caused by the most
A GENERIC amd64 kernel compiled from today's sources is causing my
Asus k8v-se-d to run fast by approximately 3 seconds per minute.
(Obviously that was with ntpd not running.) This has never been a
problem before. Is anyone else seeing this?
Upon booting I also get quite a bit of hex-dump
I don;t have telnet open on my home network, but i was considering opening
it up on the OpenbD firewall, and using some sort of one time password
scheme.
Would this be a sane thing to do? and f so, where cold find some software
to support the one time password functionality?
Once you log
Martin SchrC6der [EMAIL PROTECTED] writes:
On 2005-09-23 00:05:14 -0700, Wolfgang S. Rupprecht wrote:
appreciable added risk. The only loose end is that sshd doesn't
currently log the RSA/DSA key that is used to gain access. Ideally it
Hu? Try
LogLevel VERBOSE
Your eloquent reply aside
[EMAIL PROTECTED] writes:
My only question is what if I traceroute to you, find out the IP number of
your upstream router? Then I make a bunch of connection attempts to your IP
but forge the packets to make them look like they came from your upstream.
Don't *you* end up blacklisting your
Spruell, Darren-Perot [EMAIL PROTECTED] writes:
From: Wolfgang S. Rupprecht
2) Forging the source IP in a TCP packet and succeeding in negotiating
the 3-way handshake isn't all that simple any more. I wouldn't
worry about it. If someone could forge that reliably, there is
much
of the cvs update)
The same behavior is seen when trying to NFS mount the openbsd
filesystem from a remote host.
I noticed that nobody else on either *.misc or *.tech posted about
this. Am I the only one seeing it???
-wolfgang
--
Wolfgang S. Rupprechthttp://www.wsrcc.com/wolfgang
Otto Moerbeek writes:
If I see things correctly you are mounting a fs that is served by
the same host. Could you try a different client? It makes the logs a
bit easier to read.
Will do. I need to wait till a build on an exported fs finishes.
Also, coud you send the /etc/exports file and
Otto Moerbeek writes:
As a workaround, revert to version 1.63 of sbin/mountd.c
1.63 does indeed fix it.
Could you run mountd -d, mount a filesystem, run ls and and send the
output, both when runnign 1.63 and 1.64?
Here you go:
===
with mountd.c 1.63
[EMAIL
Han Boetes [EMAIL PROTECTED] writes:
That's why you should always use the latest snapshot. (:
I'm not sure it would have helped here. mountd() did work for many
people so it probably would have found its way into a snapshot.
One of the other OS distributions I'm testing is relatively
15 matches
Mail list logo