On Mon, 20 Jun 2005 00:07:13 -0500, Dave Feustel wrote:
On Sunday 19 June 2005 08:51 pm, Nick Holland wrote:
Dave Feustel wrote:
http://bs.somewhere.real.not
This has nothing to do with OpenBSD.
It isn't new.
It isn't unique.
In effect, you just spammed the list, advertising someone's
You can't sell that bridge - I own it... :)
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf
Of Rod.. Whitworth
Sent: Monday, 20 June 2005 4:26 PM
To: Dave Feustel; [EMAIL PROTECTED]; Nick Holland
Cc: misc
Subject: Re: OT: Hardware keyloggers embedded in new
On Mon, 20 Jun 2005 16:36:28 +1000, Timothy A. Napthali wrote:
You can't sell that bridge - I own it... :)
Given your office address I'd bet you are keeping a close watch to see
if I sell it again, too!
~|^
=
From the land down under: Australia.
Do we look umop apisdn from up over?
Do NOT
This maillist is english-speaking and it would help if you just didn't
assume that every one understands your language.
On 6/20/05, Andre Siqueira de Cordova [EMAIL PROTECTED] wrote:
Alguim sabe como solucionar a Vulnerabilidade encontrada no protocolo ESP do
IPSec ?
Andri
In message [EMAIL PROTECTED], Chris Zakelj writes:
That is, how
does one figure out what needs to be changed in order to make OpenNTPD
work on Linux?
If you know what is available on Linux and what is used on the code, you can
do this manually, but usually it involves trying to compile it on
Dave Feustel wrote:
On Sunday 19 June 2005 08:51 pm, Nick Holland wrote:
Dave Feustel wrote:
http://www.amecisco.com/faq_hardwarekeylogger.htm#Q1
This has nothing to do with OpenBSD.
It isn't new.
It isn't unique.
In effect, you just spammed the list, advertising someone's product.
If
On Mon, Jun 20, 2005 at 12:07:13AM -0500, Dave Feustel wrote:
On Sunday 19 June 2005 08:51 pm, Nick Holland wrote:
Dave Feustel wrote:
http://www.amecisco.com/faq_hardwarekeylogger.htm#Q1
This has nothing to do with OpenBSD.
It isn't new.
It isn't unique.
In effect, you just
On Monday 20 June 2005 12:52 am, Brett Lymn wrote:
On Mon, Jun 20, 2005 at 12:06:02AM -0500, Dave Feustel wrote:
So far I see no defense against this spying
technique of password capture.
Regardless of whether they are built in or not - one possible way to
get around keyloggers
On Monday 20 June 2005 12:43 am, Chris Zakelj wrote:
Dave Feustel wrote:
The device is obviously not new. What *is* new is that it is being installed
as oem equipment inside of keyboards for HP and Dell systems and also inside
of 'used keyboards which can be unobtrusively switched in for
On Mon, Jun 20, 2005 at 07:08:18AM -0500, Dave Feustel wrote:
If one-time passwords capability is built into OpenBSD, where can I read about
how to use them?
RTFM comes to mind.
apropos otp
gives you valid pointers.
After that, I think you're a big boy, you can figure it out yourself...
On Monday 20 June 2005 12:23 am, Timothy A. Napthali wrote:
I'm fairly sure this is a hoax. I have seen this referenced several
times over the past few weeks and I have seen no evidence to indicate
and truth to the matter.
Here is a relevant link:
Dave Feustel wrote:
If you read the FAQ carefully you would note that the keylogger chip is
now being installed in oem equipment for the company marketing the keyboard.
Buying a unit off the shelf does not guarantee that there is no keylogger chip
installed in the keyboard.
No, but it does
Dave Feustel wrote:
You are making fact out of fiction and also dealing with the wrong scenario.
If everyone's keystrokes are monitored by a builtin keylogger in each computer,
then the computer of any 'person of interest' is an open book to any 3-letter
agency that decides to find out what
On Monday 20 June 2005 01:32 am, Ben Hooper wrote:
|I thought you had more insight. All of OpenBSD's security is
|at risk with
|this technology.
|
|The security features of an OS will not stop a physical attack, no
|matter how well designed. This is no different than the admin leaving
...on Mon, Jun 20, 2005 at 07:08:18AM -0500, Dave Feustel wrote:
If one-time passwords capability is built into OpenBSD, where can I read
about
how to use them?
skey(1) will start you off.
Alex.
On Mon, 20 Jun 2005 07:08:18 -0500, Dave Feustel wrote:
On Monday 20 June 2005 06:36 am, Marc Espie wrote:
On Mon, Jun 20, 2005 at 12:07:13AM -0500, Dave Feustel wrote:
On Sunday 19 June 2005 08:51 pm, Nick Holland wrote:
Dave Feustel wrote:
...on Mon, Jun 20, 2005 at 07:32:09AM -0500, Dave Feustel wrote:
One Time Passwords such as skey(1) are also good for insecure environments.
I just read the man page for skey, but I still don't quite understand
how it works. Would I use a calculator to generate a response that I
type in
On Monday 20 June 2005 07:14 am, Chris Zakelj wrote:
Dave Feustel wrote:
If you read the FAQ carefully you would note that the keylogger chip is
now being installed in oem equipment for the company marketing the keyboard.
Buying a unit off the shelf does not guarantee that there is no
On Mon, 20 Jun 2005, Dave Feustel wrote:
One Time Passwords such as skey(1) are also good for insecure environments.
Ben.
I just read the man page for skey, but I still don't quite understand
how it works. Would I use a calculator to generate a response that I
type in response to a
...on Mon, Jun 20, 2005 at 07:24:16AM -0500, Dave Feustel wrote:
Here is a relevant link:
http://www.rumormillnews.com/cgi-bin/forum.cgi?read=73190
That's just the same thing all over.
We may get to find out - see the above link which is apparently the source
material for the snopes
On Mon, 20 Jun 2005 07:32:09 -0500, Dave Feustel wrote:
On Monday 20 June 2005 01:32 am, Ben Hooper wrote:
|I thought you had more insight. All of OpenBSD's security is
|at risk with
|this technology.
|
|The security features of an OS will not stop a physical attack, no
|matter how well
Hello Group,
I've been playing around with authpf and got things working pretty well
with it. Now I've got a request to make things work even better and
that's where I got stuck. My setup is that I authenticate users on our
gateway before allowing an incoming Remote Desktop connection from
them.
On Monday, June 20, [EMAIL PROTECTED] wrote:
Somebody could write a shellscript wich includes the Checksums for a
compiled (and patched) binary for each architecture.
Sure, my company could do that. The rate I've quoted you before. Or
you could do it yourself... only to findout that the
http://mail-index.netbsd.org/current-users/2001/01/20/0010.html
http://mail-index.netbsd.org/port-i386/2001/04/16/0001.html
is this the same as the netbsd bug from 2001, or do I have a bad disk?
There are no smart errors.
# dd if=/dev/rwd0c of=/dev/rwd1c bs=1m
dd: /dev/rwd0c: Input/output error
On Monday, June 20, Dave Feustel wrote:
I thought you had more insight. All of OpenBSD's security is at risk with
this technology.
Nope, he has lots of insight. You on the other hand are the security
risk here... well, you were, and maybe, just maybe, if you smarten up
and realize what you
like to be able to log in to their machine. I've tried setting up
specific rules that rdr to their machines to no avail. Here are some
things I've tried:
I'm not quite sure why you are using the rdr rule? I've got the
same requirements as you have described above but no need for rdr.
I am
Dave Feustel [EMAIL PROTECTED] writes:
On Monday 20 June 2005 12:33 am, Chris Zakelj wrote:
Dave Feustel wrote:
I thought you had more insight. All of OpenBSD's security is at risk with
this technology.
The security features of an OS will not stop a physical attack, no
matter
Mark Uemura wrote:
like to be able to log in to their machine. I've tried setting up
specific rules that rdr to their machines to no avail. Here are some
things I've tried:
I'm not quite sure why you are using the rdr rule? I've got the
same requirements as you have described above but
On Mon, Jun 20, 2005 at 07:49:47AM -0500, Dave Feustel wrote:
I *would* like to see some pictures of a keylogger chip installed in a
keyboard.
also might be a good idea to find some pictures of the
underside of a keyboard.
phillips head screws and all...
for me, it's time to edit
On Monday 20 June 2005 08:14 am, Otto Moerbeek wrote:
On Mon, 20 Jun 2005, Dave Feustel wrote:
One Time Passwords such as skey(1) are also good for insecure
environments.
Ben.
I just read the man page for skey, but I still don't quite understand
how it works. Would I use
On Mon, 20 Jun 2005 17:45:53 +0200, Dimitry Andric
[EMAIL PROTECTED] wrote:
On 2005-06-20 at 17:00:57 Artur Grabowski wrote:
the data, nothing prevents them from installing a keylogger (surprise)
or a camera that will film the keyboard or a microphone that will
record the keyboard clicks so
On Jun 20, 2005, at 9:11 AM, Marco Peereboom wrote:
nazis
Invalid invocation! It must be a genuine, spontaneous reference.
Now you damn us to dozens more messages in this thread because we all
are now aware of the risk.
EZ
;-)
On Monday 20 June 2005 08:05 am, Alexander Bochmann wrote:
...on Mon, Jun 20, 2005 at 07:24:16AM -0500, Dave Feustel wrote:
Here is a relevant link:
http://www.rumormillnews.com/cgi-bin/forum.cgi?read=73190
That's just the same thing all over.
We may get to find out - see the
On 6/19/05, Timothy A. Napthali [EMAIL PROTECTED] wrote:
I'm fairly sure this is a hoax. I have seen this referenced several
times over the past few weeks and I have seen no evidence to indicate
and truth to the matter.
Apart from the obvious legal implications outside of the US how long do
I can't seem to get ftp-proxy working. I've looked at quite a few
websites and mailing list messages and I think I'm really close. But
something isn't right. When a lan computer tries to ftp, it connects but
when it does ls or dir it says 200 PORT command successful - not
using PASV, eh?
Replace this:
pass in on $ext_if inet proto tcp from any port 20 to ($ext_if) \
port 55000 57000 user proxy flags S/SA keep state
By this:
pass in on $ext_if inet proto tcp from any to $ext_if \
user proxy keep state
-Oorspronkelijk bericht-
Van: [EMAIL
On Monday 20 June 2005 10:43 am, Tobias Weingartner wrote:
On Monday, June 20, Dave Feustel wrote:
I just read the man page for skey, but I still don't quite understand
how it works. Would I use a calculator to generate a response that I
type in response to a challenge, or what?
Or
Setting up GPG and I thought I enabled encrypted swap with sysctl -w
vm.swapencrypt.enable=1 it threw a message telling me that it was changing it.
I also uncommented it in /etc/sysctl.conf but have not booted since doing
that. Looking thorugh the archives and the faq I thought that should make
Clint M. Sand [EMAIL PROTECTED] wrote:
| On Sun, Jun 19, 2005 at 03:17:48PM +0200, mess-mate wrote:
| Hi,
| i've installed snort and created the user/group snort.
| Since snort runs as a daemon a homdir is not necessary, isn't ?
| How can i remove / setup the user snort without a homedir (
|
On 6/20/05, Ray Percival [EMAIL PROTECTED] wrote:
Setting up GPG and I thought I enabled encrypted swap with sysctl -w
vm.swapencrypt.enable=1
You're already there; only GPG doesn't know about that. I suspect you
misread the instructions. GPG will whine about insecure memory so long
as it does
On Mon, Jun 20, 2005 at 09:17:55PM +0200, Rogier Krieger wrote:
On 6/20/05, Ray Percival [EMAIL PROTECTED] wrote:
Setting up GPG and I thought I enabled encrypted swap with sysctl -w
vm.swapencrypt.enable=1
You're already there; only GPG doesn't know about that. I suspect you
misread the
What's wrong (besides the stupidity of using a floppy...):
Insert an empty floppy
# cd /tmp
# mkdir foo
# echo aap foo/aa-test-1.xml
# mcopy -s foo a:
# mount -t msdos -o -l /dev/fd0c /mnt
# mkdir bar
# cp -R /mnt/foo bar
cp: /mnt/foo/aa-test-1.xml: No such file or directory
Or for
3ware raid controllers don't have an audible speaker when a drive fails.
What SATA raid card (2 drives) is the easiest to deal with under errors?
I hear the intel and ami(lsi) cards are recommended, but is it 6 of
one and a half dozen of the other?
Is there anyway in openbsd 3.7 to tell when a
Almost all HP lasers you can find nowadays will do PCL 4 or better, don't go
for the PS rendering it's often done in the printer driver.
On 6/20/05, Ryan Corder [EMAIL PROTECTED] wrote:
On Sat, 2005-06-18 at 11:58 -0700, Brian wrote:
I would be looking for laser printer under $300.
Any
Hello,
I can't use man pages for some reason after I installed bash and login
using bash. I typed 'man dump' and it says that it can't find a manual
page for that.
I looked at some help on the web and there's a MANPATH but I'm not sure
what to set it to. I also looked at the /etc/man.conf
Greetings all,
I need to build an OpenBSD box completely stripped down, so I don't want
any kind of C compiler.
If one cannot use pkg_add in a custom installation script then how does
one push customised applications onto clients?
Does a method exist for OpenBSD which is analogous to
Did you look at http://openbsd.org/faq/faq4.html#site
Stephan
Nevermind. I installed man37.tgz and now everything works.
Timothy Horie wrote:
Hello,
I can't use man pages for some reason after I installed bash and login
using bash. I typed 'man dump' and it says that it can't find a manual
page for that.
I looked at some help on the web and there's
* Rob Foster [EMAIL PROTECTED] [050620 17:06]:
3ware raid controllers don't have an audible speaker when a drive fails.
What SATA raid card (2 drives) is the easiest to deal with under errors?
I hear the intel and ami(lsi) cards are recommended, but is it 6 of
one and a half dozen of the
On Monday 20 June 2005 07:29 am, Jeremy Bowen wrote:
On Monday 20 June 2005 11:55 pm, Dave Feustel wrote:
If you read the FAQ carefully you would note that the keylogger chip is
now being installed in oem equipment for the company marketing the
keyboard. Buying a unit off the shelf does not
Frederic BRET wrote:
Hi all,
This is my first post to this list. I'm trying to understand why our
OpenBSD PF router is not able to cope correctly with needed gigabit
speeds
On our gigabit firewall, I've found that it's able to forward traffic at
~920 Mb/s (69.2% interrupt,
--On 20 June 2005 16:23 -0700, Michael Favinsky wrote:
I was reading through the pf documentation and found the following
example of NATing several internal IP addresses to two external IP
addresses:
nat on $ext_if inet from any to any - 192.0.2.4/31 source-hash
Let's say the external IP
On Mon, Jun 20, 2005 at 04:23:51PM -0700, Michael Favinsky wrote:
I was reading through the pf documentation and found the following example
of NATing several internal IP addresses to two external IP addresses:
nat on $ext_if inet from any to any - 192.0.2.4/31 source-hash
Let's say the
Check /etc/man.conf
from fresh 3.7 install (with bash and a few others installed)
?? Did you install the man pages ??
bash-3.00$ cat /etc/man.conf
# $OpenBSD: man.conf,v 1.8 2001/04/05 19:05:49 millert Exp $
# Sheer, raging paranoia...
_versionBSD.2
# The whatis/apropos database.
I have a nforce mobo with built in sound. Dmesg shows
auich0 at pci0 dev 6 function 0 Nvidia nForce AC-97 Audio rev 0xc2: irq 5,
nForce AC97
audio0 at auich0
So I'm pretty sure the drivers are loaded and the card is supported.
I think the problem is that /dev/sound is
lrwx-- 1 root wheel
On Tue, 21 Jun 2005, Jeremy Bowen wrote:
Why else would anyone incorporate it in there, when a cheap Korean
manufacturer could save $5 by leaving such a device out. (Or are you
suggesting the NSA are in the business of subsidising keyboard sales :-)
Of course, at this point, I'd
Stuart Henderson wrote:
On 2005/06/18 14:41:10, John Draper wrote:
Quickest way is probably 'pkill syslogd' (or 'kill `cat
/var/run/syslogd.pid`'
if you don't have pkill).
...or just login as a user other than root, and use sudo to execute the
commands...
Ok, if I do that,
With the upgrade to OpenBSD 3.7, I decided it was time to upgrade from
802.11b to 802.11g. I went out and bought a linksys card (Ralink
RT2560 based).
I pulled out my old wi0 card and put in the ral0 card, updated my pf
rules and hostname.if file, and tried to connect, but KisMAC and
iStumbler
On Mon, Jun 20, 2005 at 11:21:41PM +0200, Peter Huncar wrote:
Hi
I know that the chipset isn't supported yet, but one funny thing:
When I boot my MSI MB with ATi XPRESS chipset using the floppy, it runs very
well ;) Networking works, even installing the system from some sources
(tried ftp
I set up the ports tree and did a make and make
install in the /usr/ports/x11/gatos-bin directory. Is
there something special I have to do to get my hookup
to work?
Tired of spam? Yahoo! Mail has the best spam protection around
http://mail.yahoo.com
Changes have been commited to the example syslog.conf in -current
to address this, mainly, stop spewing useless crap to root and the
console.
-Bob
* John Draper [EMAIL PROTECTED] [2005-06-20 19:47]:
Stuart Henderson wrote:
On 2005/06/18 14:41:10, John Draper wrote:
On Mon, 2005-06-20 at 22:20 -0500, Jeff Bachtel wrote:
You know, I've often been accused of being unable to read, but to my
eyes it appears Raymond was positing that the GPL was not needed, and
that software should be released under a BSD license.
Actually, he said GPL is based on the belief
In message [EMAIL PROTECTED]
so spake Steffen Kluge (kluge):
Is it recommendable to fetch and install 1.6.8p9 straight away?
No, you should grab the OpenBSD patch, as announced on the
security-announce list.
ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.6/common/018_sudo.patch
No, you should grab the OpenBSD patch, as announced on the
security-announce list.
ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.6/common/018_sudo.patch
ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.7/common/003_sudo.patch
ftp.openbsd.org is having problems at the moment but the patch
64 matches
Mail list logo