Displaying 18 results from an estimated 18 matches for "wiretapping".
2004 Jun 17
1
VOIP wiretapping article
Of course, big brother wants his say in the matter.
http://www.wired.com/news/politics/0,1283,63884,00.html?tw=wn_2polihead
2005 Aug 08
1
FCC to require wiretaps from VoIP providers
Scary.
http://www.eff.org/news/archives/2005_08.php#003876
--
PGP/GPG: 5C9F F366 C9CF 2145 E770 B1B8 EFB1 462D A146 C380
2001 Mar 07
2
password authenticaton secure ?
My question is regarding the possibility of someone wiretapping the
communication and repeat the action. What if an intruder notice that there's
a secure session starting (by guessing at the dst IP address and
unintelligible payload) and then start capturing all the packets on this
session for the purpose of repeating the whole session again? The secure
use...
2000 Mar 04
1
Where is the tarball for Solaris
I'm trying to install openssh-1.2.2 on a Solaris 7 box. I've downloaded the
file
openssh-1.2.2.tar.gz from ftp://thermo.stat.ncsu.edu/pub/openssh/files/ and
http://the.wiretapped.net/security/cryptography/ssh/OpenSSH/files/.
neither of theses tar's include the configure program as referenced in the
INSTALL file.
Where can I obtain the full distribution that will build on a Soalris 7
2000 May 01
3
Status of SSH 2.0 protocol support?
Just to bring everyone up to date, could we get a report on the status
of support for the 2.x protocol? The home page says "next major release"
- is that 1.3 or 2.0? And is there any feel for when it'll be generally
available?
--
John Hardin
Internal Systems Administrator
Apropos Retail Management Systems, Inc.
<johnh at aproposretail.com>
2008 Feb 05
1
is encrypted iax safe and secure?
Hello,
I'm doing some research concerning iax encryption, I haven't find any
clients (softphones or hardphones) which implement so I have not tested
it yet.
There was also this message on asterisk-security mailing list
http://archives.free.net.ph/message/20070507.101933.222987b2.en.html
which got no answers and this makes me think that this iax encryption is
not much interesting for the
2017 Mar 07
1
LDAP logins failing after installing Samba 4.4.5
>> Hi all,
>>
>>
>> I had an LDAP application (mailserver) running on Samba 4.1.3 which
>> wrked flawlessly. Also using an LDAP browser with a simple bind
>> worked OK.
>>
>> I than replaced the Samba installation with version 4.5 and the LDAP
>> functionality broke. I first thought it had to do with a non-SSL or
>> non -TLS and
2000 Feb 08
0
Bug report and PATCH in ssh-agent in openssh 1.2.2
Dear folks,
system: RH 6.1 Linux on a PIII
software: installed binaries resulting from rpm --rebuild
openssh-1.2.2-1.src.rpm, downloaded from
http://the.wiretapped.net/security/cryptography/ssh/OpenSSH/files/openssh-1.2.2-1.src.rpm
problem program: ssh-agent
problem description:
When execute
ssh-agent startx -- -bpp 32
ssh-agent does not pass the -bpp 32 to startx.
Why problem exists:
2007 Jul 12
0
No subject
in clear over network, therefore wiretapping the connection is not
enough to steal iax2 credentials.
Media traffic will be encrypted when someone will implement it on client
side, however even then, Called and Callee will be in clear.
Best Regards,
Claudio
Internet Email Confidentiality Footer
---------------------------------------------...
2004 Apr 05
4
Spring VON Wrap Up
...nse. Voice really _is_
just one of many modes of communication, and a long way away from the
original VoIP service.
5. Regulatory Concerns. Several of the presenters brought up social an
legal issues related to VoIP, and the associated government regulations that
follow. E911 service and CALEA (wiretapping) were both the big concerns, as
was inter-carrier compensation and taxation. Dr. Pepper indicated that he
was pleased with the direction that the VoIP market is going, in terms of
the voluntary compliance with the relevant rules from the existing PSTN
regs. He indicated that the FCC was, for the...
2000 Nov 01
0
FreeBSD Security Advisory: FreeBSD-SA-00:62.top
-----BEGIN PGP SIGNED MESSAGE-----
=============================================================================
FreeBSD-SA-00:62 Security Advisory
FreeBSD, Inc.
Topic: top allows reading of kernel memory
Category: core
Module: top
Announced: 2000-11-01
Credits:
2002 Aug 03
0
Quick Note: Obtaining Public Info on YOU!
---NOTICE---
This is a Notice that an iDetect 2002 user is currently doing research on you. This is not a real Detective.
You can do a little investigating for yourself by getting iDetect 2002. You will also get
A list of people who have done Investigations on you and your family.
---Read Below---
Now you can learn EVERYTHING about your friends, neighbors,
2006 Dec 11
3
VPN As SIP Tunneling?
Hi All
Could a VPN be used to help with SIP Tunneling and QoS issues.
State 1:
Two IP Networks Connected via the Public Internet transmitting VoIP Traffic
Say a VoIP User and VoIP Termination Provider.
Each side can put QoS onto their part, but if QoS does NOT exist between
them
then call quality will be bad anyhow.
State 2:
Same as above except a VPN tunnel is setup between each side.
Thus
2003 Jul 28
10
IPSec
Hi All,
I need to configure a VPN between a FreeBSD-4.8 box and
a Linux (FreeS/WAN) box.
In the Linux side, the network administrator installed FreeS/WAN
with RSA authentication without IKE support.
Does anybody knows if is possible to make my FreeBSD box
connect a VPN with the Linux box?
If so, could point me to a documentation about how to install
IPSec with RSA authentication and how to make
2010 Dec 15
5
Allegations regarding OpenBSD IPSEC
Some of you probably already read this:
http://marc.info/?l=openbsd-tech&m=129236621626462&w=2
Interesting...I wonder what is the impact of all this on FreeBSD code.
We may very well suppose that any government or corporation funded code
can theoretically have some kind of backdoor inside.
--Andy
1998 May 19
7
Bind Overrun Bug and Linux
[mod: Just to show you that people DO get bitten after a bugwarning has
gone out on linux-security..... -- REW]
-----BEGIN PGP SIGNED MESSAGE-----
Content-Type: text/plain; charset=us-ascii
Has anyone been hit with the Bind Inverse Query Buffer Overrun on
their Linux servers? We have had 3 servers attacked using this
expoit and all of the machines had several binaries replaced with
trojan
2002 Mar 13
3
zlib compression, the exploit, and OpenSSH
Attached is a zlib advisory and a debug dump of ssh with compression
enabled. Most of the debug is superflous, so I have underlined the two
points to look at. When creating an ssh connection, compression on the
line is done *before* authentication -- This means an unauthorized
attacker could, conceivable, leverage root access by connecting with to
the ssh server requesting zlib compression and