Re: How are people dealing with the Intel AMT BIOS vulnerability/backdoor?

2017-05-14 Thread Theodoros
- Disable and try to exploit (best way to know really) - If necessary file a bug report with the vendor - Block perspective ports on your network. On 14 May 2017 at 21:33, wrote: > Hi, > > Just checked my router today and found out that the AMT vuln is on there and > active/provisioning, probab

Re: Preventing screen capturing in Xenocara?

2018-03-06 Thread Theodoros
Is there any point on doing so, when most environments are hoarded by mobile phones? Nice to have, but too little of an "audience" imho. ​​ ‐‐‐ Original Message ‐‐‐ On March 7, 2018 5:34 AM, Jyri Hovila \[iki\] wrote: > ​​ > > Dear everyone, > > the possibility to grab the content

Re: Preventing screen capturing in Xenocara?

2018-03-06 Thread Theodoros
Excuse me; quick read bites back. My mind went directly to the human factor. That process limitation would be nice to have +1 ​​ ‐‐‐ Original Message ‐‐‐ On March 7, 2018 5:34 AM, Jyri Hovila \[iki\] wrote: > ​​ > > Dear everyone, > > the possibility to grab the contents of the scre

Canada and Software Backdoors

2016-12-05 Thread Theodoros
Hello misc, I would like your comments on how could the below affect OpenBSD; if at all. link: http://www.tomshardware.com/news/canada-software-encryption-backdoors-feedback,33131.html Best greetings, Theodore

Re: browser trouble with latest snapshot

2016-05-29 Thread Theodoros
W^X is now mandatory. Please follow the following: "W^X violating programs can be permitted on a ffs/nfs filesystem-basis, using the "wxallowed" mount option. One day far in the future upstream software developers will understand that W^X violations are a tremendously risky practice and that sty

Re: /usr/ and wxallowed

2016-06-09 Thread Theodoros
Anybody who had used automatic disk allocation, it would have taken care of this: http://man.openbsd.org/disklabel#AUTOMATIC_DISK_ALLOCATION /usr/local 10% of disk. 2G – 10G On 9 June 2016 at 15:53, Kapetanakis Giannis wrote: > On 08/06/16 22:02, Mihai Popescu wrote: >>> >>> Sorry, no, I sho

Re: Booting encrypted drive from another device

2016-06-21 Thread Theodoros
Could someone trust a bootloader by e.g. having an aide-like system on boot, confirming its' authenticity as part of the boot process? Please share your thoughts. On 20 June 2016 at 14:36, Ivan Markin wrote: > Bodie: >> What is that security reason worth of not using default full disk >> encry

Re: Booting encrypted drive from another device

2016-06-21 Thread Theodoros
at 10:19:21 +0300 (+0300), Theodoros wrote: > :Could someone trust a bootloader by e.g. having an aide-like system on > :boot, confirming its' authenticity as part of the boot process? > : > :Please share your thoughts. > : > : > : > :On 20 June 2016 at 14:36, Ivan Mark

Re: Booting encrypted drive from another device

2016-06-21 Thread Theodoros
Fair point! It would make it more complicated for an adversary, but not impossible. On 21 June 2016 at 10:36, ludovic coues wrote: > 2016-06-21 9:27 GMT+02:00 Theodoros : >> Well TPM is a closed hardware-bound system that does this before boot >> (as far as I know). I was ask

Re: Booting encrypted drive from another device

2016-06-22 Thread Theodoros
em if check is OK 3) repeat 2 until check is NOT OK, make copy of failed /boot volume and examine. 4) win. On 22 June 2016 at 19:52, Ted Unangst wrote: > Theodoros wrote: >> Fair point! >> It would make it more complicated for an adversary, but not impossible. > > If an adversar

Re: choosing OpenBSD for fileserver instead of FreeBSD + ZFS

2016-07-20 Thread Theodoros
+1, zfs and hammer are great filesystems for such a use. Looking forward to RAID10 support on softraid (!). On 20 July 2016 at 15:08, Kamil Cholewiński wrote: > On Wed, 20 Jul 2016, Miles Keaton wrote: >> So I figure if I use OpenBSD + softraid RAID 5 (across 4 disks) and then >> write my own