search for: entrust

Displaying 18 results from an estimated 18 matches for "entrust".

2019 May 31
0
Problem SSL entrust certificate
Hi I have compiled dovecot 2.3.6 on RH 8, and I copied the configuration from dovecot 2.0.9 however, when I try to connect the new machine the certificate is not recognized The same certificate is working with apache CONNECTED(00000004) depth=0 ... verify error:num=20:unable to get local issuer certificate verify return:1 depth=0 ... verify error:num=21:unable to verify the first certificate
2010 Mar 26
3
R, S, S-Plus, whence comes thy name?
I appeal to those entrusted with the keeping of the R flame, the S flame, and the S-Plus flame to relate a bit of history. How did S, S-Plus, and R get their names? Going from S to S-Plus appears clear, a commercial company purchased rights to S, developed a product that they wanted to indicate was related to S, but was mor...
2006 Aug 17
3
Problem with Domain SID
...e in our network ! Also other users we tried were only able to lo in at their own machine (probably because the password and other information is cached there). Putting on some logs in Win XP, we found out that the error produced was related to a well-known problem: the PDC SID was changed and the entrustment between the Windows machines and the PDC is broken. The only solution presented in the FAQ is to remove the machine from the domain and reassign it. This means a complete loss of profile data for the user. The problem is: the whole samba environment was not changed at all. So why did the SID...
2004 Oct 18
2
[Jackit-devel] Re: ices-kh dropping jack ports unexpectedly
...d user after the > realtime scheduler is selected. Running as root after that is not > required. That does not solve the problem at all. If you run jackd as root, you must run *all* JACK clients as root. They are not all coded that way, and some cannot be. Neither they nor jackd should be entrusted with God-like superuser powers. -- joq
2010 Oct 25
2
GlusterFS 3.1 on Amazon EC2 Challenge
Another GlusterFS 3.1 question on my blog (http://cloudarchitect.posterous.com). Any help/ideas will be appreciated. Thanks Joshua ---- Here's my challenge: I have several 1 tb ebs volumes now that are un-replicated and reaching capacity. I'm trying to suss out the most efficient way to get each one of these into its own replicated 4 tb gluster fs. My hope was that I could snapshot
2004 Oct 18
0
[Jackit-devel] Re: ices-kh dropping jack ports unexpectedly
...ltime scheduler is selected. Running as root after that is not > > required. > > That does not solve the problem at all. If you run jackd as root, you > must run *all* JACK clients as root. They are not all coded that way, > and some cannot be. Neither they nor jackd should be entrusted with > God-like superuser powers. I can't really comment on jackd itself, as I haven't looked that much into it. If running jackd as root requires client apps to also run as root then that is a pretty bad issue. I would of thought that running jackd as a realtime process (whether roo...
2004 Oct 18
2
[Jackit-devel] Re: ices-kh dropping jack ports unexpectedly
Karl Heyes <karl@xiph.org> writes: > Are you running with realtime privileges, for this you need to start as > root if you want that. Even with realtime privileges there may be odd > cases where the scheduling latency is a bit too high, it all depends on > the drivers and kernel version but the current state is not that bad and > getting better. There are several ways to
2005 Nov 24
1
Ruby-based Gmail killer?
Hi - I have a similar question -- I really like using gmail.com, but I''m growing distrustful of entrusting any more of my personal information with Google. I''ve searched the rail list archives that I have (here in my gmail acct, ironic, eh?) but haven''t seen a mention of a web-based Rails powered email solution. Is there one available or in the works, or should I add it to my to d...
2004 Feb 23
2
PKI and SSH
Due to unpleasant (but arguably valid) policy changes at work, any SSH server within the work firewall must accept only PKI authentication. Unless we can convince the higher-ups otherwise, we will also have to use the commercial SSH server within the firewall. Of course, I should be able to use whatever client I like. Unfortunately, it is not clear that I can get OpenSSH to use PKI authentication.
2014 Dec 04
0
Firefox fails to authenticate .mil sites with New DoD CAC
...t; Watch out that opensc that *doesn't* come with pcscd isn't loaded. Oh, > also, new card - do you have a new CA chain? Is that installed? > <snip> > > mark, who has a new card a few weeks ago, and had to deal with the > CA change from Verizon to Entrust.... Yes, I learned to avoid opensc years ago when we first setup the CACs. A missing CA cert turned out to be the problem. I checked after Jason Pyeron was kind enough to mention "MAIL CA-32" listed on my CAC cert lookup. Sure enough, it was missing in the Firefox CA store but present i...
2020 Nov 13
0
Updates to NUT project leadership
...vement in the NUT project (we hope he would still be able to help on occasion, time permitting). He asked the members of the core team to take over, and it seems I am the one most available for this role. Great thanks and kudos to Arno for giving his 15+ years to the free community service, and for entrusting me the keys and reins! I suppose this is a good moment to introduce myself :) I am Jim Klimov, involved in numerous open source projects ( https://github.com/jimklimov?tab=repositories&type=source) since the last millennium. Notably, I was a NUT user since Russell Kroll was in charge,...
2020 Nov 13
0
Updates to NUT project leadership
...vement in the NUT project (we hope he would still be able to help on occasion, time permitting). He asked the members of the core team to take over, and it seems I am the one most available for this role. Great thanks and kudos to Arno for giving his 15+ years to the free community service, and for entrusting me the keys and reins! I suppose this is a good moment to introduce myself :) I am Jim Klimov, involved in numerous open source projects ( https://github.com/jimklimov?tab=repositories&type=source) since the last millennium. Notably, I was a NUT user since Russell Kroll was in charge,...
2002 Sep 14
0
GREETINGS
...account for security and safety reasons. This is why I am anxiously and humbly seeking for your genuine assistance in transfering this money into an account without the knowledge of my government who are bent on taking everything my master left. You have to understand that this decision taken by me entrusts so much to you. If you accept to assist me, all I want you to do for me, is to make an arrangements with the security company to clear the box containing the money from their office here in the GHANA, or at the corresponding office in HOLLAND and then we will transfer the money into an account. Y...
2016 May 09
3
Resuming the discussion of establishing an LLVM code of conduct
On 9 May 2016 at 03:07, C Bergström <llvm-dev at lists.llvm.org> wrote: > As activity on the thread dies down and I guess it has been socialized > to the point of annoyance (myself and probably others based on private > emails).. I'll assume the current draft is mostly stable, but to > confirm, Chandler are you done playing with your CoC? I personally think the code is fine
2016 Jun 21
0
https and self signed
...ake particular care with my PKI. I rebuild all the moduli for ssh on all of our servers for SSH. Because I trust no-one with my security. And that includes RedHat and any other external organisation, volunteer or commercial, open-source or proprietary. Automating your certificate replacement and entrusting it to an outside provider is begging to have some state actor or other financially powerful group subvert it. Look at what the NSA pulled off with RSA. That was for just money. What about patriotism? What would a true believer do if asked by his state and they were in a position to act? Thin...
2019 Nov 25
3
[RFC] LLVM Security Group and Process
On Tue, Nov 19, 2019 at 10:46 AM JF Bastien <jfbastien at apple.com> wrote: > And I do agree that if someone were to come in and put in the significant > amounts of work to make LLVM directly usable in security-sensitive places, > then we could support that. But none of that should have anything to do > with the security group or its membership. All of that work and discussion,
1998 Oct 13
5
compare / contrast of linux fw and others
Hi, I was wondering how a linux box configured as a firewall stacked up against some of the commercial products like checkpoint-1 and gauntlet. Can someone direct me to a good book or online doc that compares linux to some other firewall methods? Mind you, I''m not talking about a firewall in the classical sense, ie ip forwarding turned off and used as a proxy, but the typical Linux box
2007 Oct 24
182
Yager on ZFS
Not sure if it''s been posted yet, my email is currently down... http://weblog.infoworld.com/yager/archives/2007/10/suns_zfs_is_clo.html Interesting piece. This is the second post from Yager that shows solaris in a pretty good light. I particularly like his closing comment: "If you haven''t checked out ZFS yet, do, because it will eventually become ubiquitously implemented