On 05.04.19 02:54, David Gwynne wrote:
> you have em(4) with sfp?
yepp, e.g. in the following appliances :
http://www.lannerinc.com/network-appliances/x86-rackmount-network-appliances/?option=com_content&view=article&id=1683:nca-4210&catid=25:rackmount
There are 2 SFP slots onboard and we are
Hi David, yeah intel Pro 1000 chipsets with SFP were common enough
back in the day... (probably still common)
Thanks
Tom Smyth
On Fri, 5 Apr 2019 at 02:00, David Gwynne wrote:
>
> you have em(4) with sfp?
>
> > On 4 Apr 2019, at 18:55, Marco Prause wrote:
> >
> > I second that +1 for ix, but e
you have em(4) with sfp?
> On 4 Apr 2019, at 18:55, Marco Prause wrote:
>
> I second that +1 for ix, but em would also be nice ;-)
>
>
> On 03.04.19 00:40, Tom Smyth wrote:
>> +1 for me also :) ix :)
>>
>> On Tue, 2 Apr 2019 at 23:38, Stuart Henderson wrote:
>>
>>> :-)
>>>
>
Hi Ted,
On 6/2/18 12:26 PM, Theodore Wynnychenko wrote:
Hello
Last year (before about 3/27/2017 when "Add support for RFC4754 (ECDSA) and
RFC7427 authentication" diff was committed to current), I had set up and had
been able to connect iOS devices (iphone/ipad) to OpenBSD's iked, and have ikev2
try to restart over and then
security/aide
take the db offline and check again that db every time and then
use another OS to check that db (i.e. FreeBSD on an RaspberryPi, if you
have, ask a friend to download for you the img off your daily "garden")
LC
On 2019-04-03 11:30, Stuart Henderson wrote:
On 2019-04-03, =?utf-8?B?RnVuZw==?= wrote:
apache support somthing like
Order Allow,Deny
Allow from all
Deny from 1.2.3.4
How to achieve in OpenBSD's httpd?
We are using OpenBSD 6.4.
There is no built-in simple way.
It can be done by having h
On Thu, 4 Apr 2019 at 20:18, Alex Naumov wrote:
> it seems some links on the goals page [1] are broken.
> Please check links to:
> * RSA
> * DSA
> * HD
Looks like the man pages have been restructured since those links were
created. I've pointed them at the existing man pages for the existing
fun
Hey,
it seems some links on the goals page [1] are broken.
Please check links to:
* RSA
* DSA
* HD
Cheers,
Alex
[1] https://www.openssh.com/goals.html
On 2019-04-04, Oliv wrote:
> Hello,
>
> on internet i found these OpenBSD products :
>
> https://www.redbubble.com/people/rimek/works/25325956-openbsd-crypto?p=t-shirt&rbs=8aa640f6-9ca5-4a0e-a162-1cbd71d04780&size=extra_large&style=mhoodie
>
> I did not find them on the tshirt page of OpenBSD :
>
On Thu, Apr 04, 2019 at 02:23:59PM +0200, Oliv wrote:
> Hello,
>
> on internet i found these OpenBSD products :
>
> https://www.redbubble.com/people/rimek/works/25325956-openbsd-crypto?p=t-shirt&rbs=8aa640f6-9ca5-4a0e-a162-1cbd71d04780&size=extra_large&style=mhoodie
>
> I did not find them on t
Sent with ProtonMail Secure Email.
‐‐‐ Original Message ‐‐‐
On Thursday, April 4, 2019 2:23 PM, Solene Rapenne wrote:
> On Thu, Apr 04, 2019 at 11:42:15AM +, Cord wrote:
>
> > Sent with ProtonMail Secure Email.
> > ‐‐‐ Original Message ‐‐‐
> > On Thursday, April 4, 2019 1
On Thursday, April 4, 2019 1:58 PM, Kevin Chadwick wrote:
> On 4/4/19 10:57 AM, Cord wrote:
>
> > Hi, my english seems very bad because my problem is not to make secure the
> > ssh key. My problem is how do not be hacked.
> > I have talked about the ssh key stealing to show signs that my pc was
Hello,
on internet i found these OpenBSD products :
https://www.redbubble.com/people/rimek/works/25325956-openbsd-crypto?p=t-shirt&rbs=8aa640f6-9ca5-4a0e-a162-1cbd71d04780&size=extra_large&style=mhoodie
I did not find them on the tshirt page of OpenBSD :
https://www.openbsd.org/tshirts.html
On Thu, Apr 04, 2019 at 11:42:15AM +, Cord wrote:
>
>
>
> Sent with ProtonMail Secure Email.
>
> ‐‐‐ Original Message ‐‐‐
> On Thursday, April 4, 2019 12:27 PM, Normen Wohner wrote:
>
> > Seeing that OpenBSD comes secure out of the Box the most likely
> > thing is that you yoursel
‐‐‐ Original Message ‐‐‐
On Thursday, April 4, 2019 1:41 PM, Peter N. M. Hansteen
wrote:
> On Wed, Apr 03, 2019 at 06:56:39PM +, Cord wrote:
>
Please read my last email to misc, I tried to explain again.
> If you see ssh sessions that shouldn't be there, kill those sessions.
On Thu, Apr 04, 2019 at 11:42:15AM +, Cord wrote:
>=20
>=20
>=20
> Sent with ProtonMail Secure Email.
>=20
> ? Original Message ?
> On Thursday, April 4, 2019 12:27 PM, Normen Wohner wro=
te:
>=20
> > Seeing that OpenBSD comes secure out of the Box the m
On 4/4/19 10:57 AM, Cord wrote:
> Hi, my english seems very bad because my problem is not to make secure the
> ssh key. My problem is how do not be hacked.
> I have talked about the ssh key stealing to show signs that my pc was been
> compromised.
> I can for sure make secure my ssh key but how t
Sent with ProtonMail Secure Email.
‐‐‐ Original Message ‐‐‐
On Thursday, April 4, 2019 12:27 PM, Normen Wohner wrote:
> Seeing that OpenBSD comes secure out of the Box the most likely
> thing is that you yourself compromised your System through 3rd
> party software. If it even is the
On Wed, Apr 03, 2019 at 06:56:39PM +, Cord wrote:
> I have some heavy suspect that my openbsd box was been hacked for the second
> time in few weeks. The first time was been some weeks ago, I have got some
> suspects and after few checks I have found that someone was been connected to
> my v
Hi!
So, I know there is a high level API in wscons which provides KS_*
constants found in , but how can I actually
get those constants?
While here: does wscons provide keyboard layouts? If yes, why I can't
type russian symbols in console?
Seeing that OpenBSD comes secure out of the Box the most likely
thing is that you yourself compromised your System through 3rd
party software. If it even is the case. I think the best course of
action would be to go for a forensic approach. Google how to log ssh
traffic and where to find the logs.
Setup snort or verbose logging to find out whats wrong
On April 3, 2019 8:56:39 PM GMT+02:00, Cord wrote:
>Hi,
>I have some heavy suspect that my openbsd box was been hacked for the
>second time in few weeks. The first time was been some weeks ago, I
>have got some suspects and after few checks I
Hi, my english seems very bad because my problem is not to make secure the ssh
key. My problem is how do not be hacked.
I have talked about the ssh key stealing to show signs that my pc was been
compromised.
I can for sure make secure my ssh key but how to make secure my the pc ?
If I have a root
I second that +1 for ix, but em would also be nice ;-)
On 03.04.19 00:40, Tom Smyth wrote:
> +1 for me also :) ix :)
>
> On Tue, 2 Apr 2019 at 23:38, Stuart Henderson wrote:
>
>> :-)
>>
Hi,
Difficult to make any recommendations based on this information, but once
you've recovered, enforce ssh key-based logins only.
Given that your client might be compromised, you probably want to look into
that as well.
To limit the possibilities that someone gets access to your
ssh private ke
25 matches
Mail list logo