Hi, newbie here so please be gentle :-)
Here's a patch adding FCC unlocking as well as setting up IP addresses and
routes. It eliminates the need of that "horrible python thing". Is anyone
still working on the driver or can I go ahead and try and port the ASN1
thing to the kernel?
On Sat, Jul
ping
> Hi,
>
> While running systat(1)'s iostat view in cumulative mode (activated by
> pressing
> 'b') I noticed that it divides the results by the refresh interval. This is
> because the cumulative mode is implemented by setting last = 0, and then it
> does
> (current - last) / etime,
According to wsconctl(8), I re-map my Caps Lock key to be a Control:
keyboard.map+='keysym Caps_Lock = Control_L'
After I suspend my machine I lose my modified keyboard layout and it
reverts to the default layout of the chosen encoding.
Looking for a solution I came across a discussion
Hi,
sorry for the afterthought, i just noticed that the Subject: line
is misleading. This patch has nothing to do with -j. If -j is not
specified, this patch changes the value passed to adjtime(2) or
settimeofday(2), which arguably matters even more than something
merely printed on stdout.
Claudio Jeker(cje...@diehard.n-r-g.com) on 2021.08.04 17:55:45 +0200:
> On Fri, Jul 30, 2021 at 12:02:12PM +0200, Claudio Jeker wrote:
> > This diff implements the bit to support the receive side of
> > RFC7911 - Advertisement of Multiple Paths in BGP.
> >
> > I did some basic tests and it works
Hi Gerhard and Bryan,
Gerhard Roth wrote on Mon, Aug 02, 2021 at 10:36:05AM +0200:
> Bryan Vyhmeister found a strange behavior in date(1):
>
> # date -f %s -j 1627519989
> Thu Jul 29 01:53:09 PDT 2021
> # date -u -f %s -j 1627519989
> Thu Jul 29 00:53:09 UTC 2021
>
>
OK deraadt
Ingo Schwarze wrote:
> Hi,
>
> after quite some head-scratching, i consider the following bug report
> legitimate:
>
> user wrote on Thu, Aug 05, 2021 at 12:43:21AM -0500:
> > On Thu, Aug 05, 2021 at 12:37:00AM -0500, user wrote:
> >> On Fri, Jul 23, 2021 at 11:15:59AM -0500, user
> Any developer willing to provide an OK?
ok tb
On Fri, Aug 06, 2021 at 12:06:04PM +0200, Patrick Wildt wrote:
> On Fri, Aug 06, 2021 at 11:05:53AM +0200, Patrick Wildt wrote:
> > Am Thu, Aug 05, 2021 at 02:33:01PM +0200 schrieb Jan Klemkow:
> > > Hi,
> > >
> > > The following diff removes useless code from the driver. As discussed
> > > here
Hi,
after quite some head-scratching, i consider the following bug report
legitimate:
user wrote on Thu, Aug 05, 2021 at 12:43:21AM -0500:
> On Thu, Aug 05, 2021 at 12:37:00AM -0500, user wrote:
>> On Fri, Jul 23, 2021 at 11:15:59AM -0500, user wrote:
>>> Less contains a hack to force files of
Damien Miller:
> Just a head-up: snaps currently contain a set of changes[1] to
> make scp(1) use the SFTP protocol by default.
> Please report any incompatibilities or bugs that you encounter here
> (tech@), to bugs@ or to openssh@.
An obvious cosmetic difference is that relative paths are
Hello,
On Fri, Aug 06, 2021 at 12:26:10AM +0200, Alexander Bluhm wrote:
> Hi,
>
> I have seen some stalling TCP connections while doing unidirectional
> throughput tests. The sending machine is doing zero window probes,
> but is not sending more data although the other machine announced
> that
Patrick Wildt wrote:
> On Fri, Aug 06, 2021 at 11:05:53AM +0200, Patrick Wildt wrote:
> > Am Thu, Aug 05, 2021 at 02:33:01PM +0200 schrieb Jan Klemkow:
> > > Hi,
> > >
> > > The following diff removes useless code from the driver. As discussed
> > > here [1] and committed there [2], the
Martijn van Duren wrote:
> What about something like the phrasing below? It puts a heavy emphasis
> on not relying on the defaults (currently the auth and enc keyword
> aren't marked as optional in the syntax anyway), but keeps the current
> defaults as a strong hint on what is adviced. I also
Theo Buehler wrote:
> > hmac-md5 might not be vulnerable, but snmp doesn't use pure hmac-*; in
> > the case of md5 and sha1 it strips the result back to 12 bytes (for
> > sha256 it's 24 bytes). I'm not saying that is insecure because of it; I
> > haven't seen any research on the truncation of
> hmac-md5 might not be vulnerable, but snmp doesn't use pure hmac-*; in
> the case of md5 and sha1 it strips the result back to 12 bytes (for
> sha256 it's 24 bytes). I'm not saying that is insecure because of it; I
> haven't seen any research on the truncation of HMAC, but when combined
> with
On Thu, 2021-08-05 at 09:32 +0100, Stuart Henderson wrote:
> On 2021/08/03 23:46, Martijn van Duren wrote:
> > On Tue, 2021-08-03 at 21:58 +0100, Stuart Henderson wrote:
> > > On 2021/08/03 22:07, Martijn van Duren wrote:
> > > > On Tue, 2021-08-03 at 18:24 +0100, Stuart Henderson wrote:
> > > > >
On Fri, Aug 06, 2021 at 11:05:53AM +0200, Patrick Wildt wrote:
> Am Thu, Aug 05, 2021 at 02:33:01PM +0200 schrieb Jan Klemkow:
> > Hi,
> >
> > The following diff removes useless code from the driver. As discussed
> > here [1] and committed there [2], the hypervisor doesn't do anything
> > with
Am Thu, Aug 05, 2021 at 02:33:01PM +0200 schrieb Jan Klemkow:
> Hi,
>
> The following diff removes useless code from the driver. As discussed
> here [1] and committed there [2], the hypervisor doesn't do anything
> with the data structures. We even just set NULL to the pointer since
> the
19 matches
Mail list logo