On Wed, Oct 15, 2014 at 8:51 PM, Antoine Jacoutot ajacou...@bsdfrog.org wrote:
On Wed, Oct 15, 2014 at 11:48:20AM -0700, xSAPPYx wrote:
Is a recent rcctl post the 5.6 freeze or will this work with the next
release?
Extract from 'man rcctl':
rcctl first appeared in OpenBSD 5.7.
By
On Wed, 15 Oct 2014 20:22:56 -0400
Ian Grant wrote:
Moved to misc.
Yes, you missed something: the point :-)
The idea is that the existence of this entire 'ultranet' is
undetectable by even someone snooping all national traffic. So a TCP
port 80 connection looks to the snooper _exactly_
2014-10-16 13:16 GMT+02:00 Kevin Chadwick ma1l1i...@yahoo.co.uk:
I still don't see the benefit though but do see added complexity or
more code to audit.
Reducing DDOS against a visible SSH service maybe? Reduce password
attempts on your logs allowing them to go after targets that might
Hello together,
what is the best way, to disable SSLv3 support in LibreSSL 2.1.0
portable (f.e. using on Mac OSX)?
Thank you.
/Heiko
On Thu, Oct 16, 2014 at 03:10:24PM +0200, Heiko Zimmermann wrote:
Hello together,
what is the best way, to disable SSLv3 support in LibreSSL 2.1.0
portable (f.e. using on Mac OSX)?
Thank you.
/Heiko
Update to LibreSSL 2.1.1.
Now are the updates on the mirror.
Thx.
Am 16.10.2014 um 15:27 schrieb Stefan Sperling
Update to LibreSSL 2.1.1.
On 10/15/2014 03:43 PM, Fede wrote:
I've removed defer from /etc/hostname.pfsync0, and I also added some
bpf device (one for every carp I have) with MAKEDEV, as you suggested.
Then, I've added no-sync to pf, so the running pf.conf is:
set skip on lo0
pass quick on em0 proto pfsync keep state
7 matches
Mail list logo