Displaying 8 results from an estimated 8 matches for "bsdcon".
Did you mean:
bodcon
2001 Jul 16
0
BSDCon 2002 - Call for Papers
BSDCon 2002
February 11-14, 2002
Cathedral Hill Hotel
San Francisco, CA. USA
http://www.usenix.org/events/bsdcon02/
The premier conference for the BSD community!
The Berkeley Software Distributions (BSDs) represent one of the
oldest and most vigorous streams of Open Source Development.
Together, OpenB...
2003 Feb 03
0
BSDCon 2003 - Call for Papers
The BSDCon 2003 Program Committee invites you to contribute original
and innovative papers on topics related to BSD-derived systems and
the Open Source world. Topics of interest include but are not limited
to:
* Embedded BSD application development and deployment
* Real world experiences usin...
2003 Sep 08
0
@BSDcon: FreeBSD Security Officer BoF
Hello,
I have scheduled a birds-of-a-feather (BoF) meeting at BSDcon to
discuss the FreeBSD Security Officer role. Details such as time,
location, and topics are posted on the BSDcon unofficial Wiki
<URL: http://bsdcon.kwiki.org/index.cgi?FreeBSDSecurityOfficerBoF >.
Please attend if you are interested in what the SO team does currently
and in participating...
2011 Sep 02
1
pkcs and host keys
Hi Damien,
I see in your asia bsdcon presentation you mentioned the possibility
of storing host keys in PKCS #11. I'm interested in using a usb rsa
fob for host keys and am interested in this feature. What's the
current status? As you said: root compromise != persistent hostkey
theft.
THanks much,
Ben
2003 Sep 17
4
ftp.freebsd.org out of date? (WRT security advisories)
It seems (at least for me) the patches on ftp.freebsd.org are out of
date for the 03:12 security advisory (openssh). ftp2.freebsd.org has
them fine.
I'm wondering if this is a mirror issue or perhaps round-robin DNS problem?
What compounds the issue is that right now the old openssh 3.7 patches
are there (on ftp.freebsd.org), but not the 3.7.1 patches (which can be
found on
2003 Sep 25
6
FreeBSD Patch question
I administer a remote server and want to apply some of the security patches. (I assume this is the best way to go since I can't go into single-user mode to use CVsup).
I have a couple of questions. First, I have installed one of the pgp ports to verify the patches. When I run it, I get this message:
> File 'buffer46.patch.asc' has signature, but with no text.
> Text is
2003 Oct 10
0
Mar 2003 - Sep 2003 FreeBSD Status Report
...s support AES encryption. Support for public key operations for
the SafeNet devices was recently done for OpenBSD and will be
backported. Public key support for the Hifn parts is planned.
A paper about the performance work done on the cryptographic subsystem
was presented at the Usenix BSDCon 2003 conference and received the
best paper award.
NetBSD recently imported the cryptographic subsystem.
_________________________________________________________________
Device_t locking
Contact: Warner Losh <imp@FreeBSD.org>
A number of races have been identified in loc...
2005 Oct 02
11
Repeated attacks via SSH
Everyone:
We're starting to see a rash of password guessing attacks via SSH
on all of our exposed BSD servers which are running an SSH daemon.
They're coming from multiple addresses, which makes us suspect that
they're being carried out by a network of "bots" rather than a single attacker.
But wait... there's more. The interesting thing about these attacks
is that