Displaying 20 results from an estimated 320 matches for "ephemereal".
Did you mean:
ephemeral
2011 Apr 01
3
repeated local ephemeral to 80
On my CentOS box that I use mainly as a web server, I have iptables
set to log and reject anything that I don't expect. So lately,
I have getting things like this:
Mar 29 17:27:20 mbrc20 kernel: IPT-DROP IN= OUT=lo SRC=192.168.9.20
DST=192.168.9.20 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=46910 DF PROTO=TCP
SPT=56624 DPT=80 WINDOW=32792 RES=0x00 SYN URGP=0 OPT
2012 Dec 02
0
[LLVMdev] [RFC] Intrinsic for declaring invariants
Hello again,
In discussing my proposed patches for supporting alignment assumptions (for supporting __builtin_assume_aligned; see http://lists.cs.uiuc.edu/pipermail/llvm-commits/Week-of-Mon-20121126/157659.html), Chandler and I have started discussing an infrastructure for declaring invariants in the IR for use by the optimizer.
The basic idea is to introduce a new intrinsic:
void
2016 May 04
2
ImageMagick security alert
On Wed, 4 May 2016, Nux! wrote:
> Direct links
>
> https://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=29588#p132726
> https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-3714
>
> Mitigation:
>
> As a workaround the /etc/ImageMagick/policy.xml file can be edited to disable
> processing of MVG, HTTPS, EPHEMERAL and MSL commands within image files,
2017 May 24
0
local ephemeral ports usage and distribution / inet_csk_get_port()
Hello
I'm using CentOS Linux release 7.3.1611 (Core) with
kernel 3.10.0-514.16.1.el7.x86_64
Using iperf for bond benchmarking, and opening several sockets, I noticed a
strange behavior.
My Centos using iperf as a client to connect to an iperf server (running
either CentOS or Debian) requesting N parallel TCP connections.
I notice that the local ephemeral ports used are not consecutive and
2016 May 03
2
ImageMagick security alert
https://imagetragick.com/
As CentOS is often used for web servers, I thought this should be posted
here.
Bug in ImageMagick allows remote exploit.
AFAIK no patch exists yet but defense against the exploit is detailed at
the link.
CVE-2016?3714
2016 Oct 05
2
Ast 13.10 to 13.11 stop working webrtc
>From this change (res_rtp_asterisk): ast 13.10 to 13.11 webrtc JSSIP stop
working, failing with
chan_sip.c:4083 retrans_pkt: Hanging up call
7238b48c11581d4166b899bf747a05f7 at 130.211.62.184:0 - no reply to our
critical packet (see
https://wiki.asterisk.org/wiki/display/AST/SIP+Retransmissions).
is there any way to configure to have the previous behaviour?
Im trying to set
2013 Nov 08
0
[LLVMdev] Proposal for safe-to-execute meta-data for heap accesses
On Thu, Nov 7, 2013 at 9:39 PM, Filip Pizlo <fpizlo at apple.com> wrote:
> NEW PROPOSAL
>
> The solution is to introduce meta-data that is explicit about how the
> safe-to-execute condition ought to be evaluated. Instead of an SSA use, we
> can have meta-data that says:
>
> %v = load %p !notrap !{ @f, <args> }
>
> where @f is a function in the
2020 Mar 27
2
Create VM w/ cache=none on tmpfs
Hi,
I've seen that in the past, libvirt couldn't start VMs when the disk
image was stored on a file system that doesn't support direct I/O
having the 'cache=none' configuration [0].
On the KubeVirt project, we have some storage tests on a particular
provider which does just that - try to create / start a VM whose disk
is on tmpfs and whose definition features
2002 May 09
1
[Bug 238] New: sshd.pid file written AFTER key generation causes race condition
http://bugzilla.mindrot.org/show_bug.cgi?id=238
Summary: sshd.pid file written AFTER key generation causes race
condition
Product: Portable OpenSSH
Version: 3.1p1
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P5
Component: sshd
AssignedTo:
2017 Dec 09
2
Problems with dnscrypt's package from EPEL
On Sat, Dec 09, 2017 at 03:03:52PM -0500, Stephen John Smoogen wrote:
> On 9 December 2017 at 14:04, C. L. Martinez <carlopmart at gmail.com> wrote:
> > Hi all,
> >
> > I have installed dnscrypt's rpm package from EPEL repo under a CentOS 7.4 and using unbound as a resolver. But, I see constant timeouts and responses are very slow ... Using same config in a Debian 9
2013 Nov 08
0
[LLVMdev] Proposal for safe-to-execute meta-data for heap accesses
----- Original Message -----
>
>
>
>
>
> On Nov 8, 2013, at 1:13 AM, Chandler Carruth < chandlerc at google.com >
> wrote:
>
>
>
>
>
>
>
>
> On Thu, Nov 7, 2013 at 9:39 PM, Filip Pizlo < fpizlo at apple.com >
> wrote:
>
>
>
> NEW PROPOSAL
>
> The solution is to introduce meta-data that is explicit
2015 Jan 15
10
Socket behavior change from 6.5 to 6.6
I will try to explain this as best I can. I have two computers; one a
Supermicro X10SAE running CentOS 6, the other a very old DOS box.[*] The DOS
box runs a CCD camera, sending images via Ethernet to the X10SAE. Thus, the
X10SAE runs a Python server on port 5700 (a socket which binds to 5700 and
listens, and then accepts a connection from the DOS box; nothing fancy).[**]
The DOS box connects to
2013 Nov 08
5
[LLVMdev] Proposal for safe-to-execute meta-data for heap accesses
> On Nov 8, 2013, at 1:13 AM, Chandler Carruth <chandlerc at google.com> wrote:
>
>
>> On Thu, Nov 7, 2013 at 9:39 PM, Filip Pizlo <fpizlo at apple.com> wrote:
>> NEW PROPOSAL
>>
>> The solution is to introduce meta-data that is explicit about how the safe-to-execute condition ought to be evaluated. Instead of an SSA use, we can have meta-data that
2017 Dec 10
2
Problems with dnscrypt's package from EPEL
Not sure if this is a factor yet, but your forwardzone is looking for
3 ports but only 2 ports are configured in the systemd startup.. so
are 1/3 of all lookups going to fail? Or is the 6355 a 'given' (aka it
will be set up whether 6353 and 6354 are setup?)
On 9 December 2017 at 16:45, C. L. Martinez <carlopmart at gmail.com> wrote:
> On Sat, Dec 09, 2017 at 10:25:41PM +0100, C.
2016 May 07
0
ImageMagick security alert
On 05/04/2016 08:15 AM, John Hodrien wrote:
> On Wed, 4 May 2016, Nux! wrote:
>
>> Direct links
>>
>> https://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=29588#p132726
>>
>> https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-3714
>>
>> Mitigation:
>>
>> As a workaround the /etc/ImageMagick/policy.xml file can be edited
2003 May 15
1
[Bug 440] Protocol 1 server key generated at start up even when P1 not used
http://bugzilla.mindrot.org/show_bug.cgi?id=440
djm at mindrot.org changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution| |FIXED
------- Additional Comments From djm at mindrot.org 2003-05-15 21:16
2013 Nov 08
2
[LLVMdev] Proposal for safe-to-execute meta-data for heap accesses
Hi!
Previously in the "Add a 'notrap' function attribute?” thread we had discussed a way to use meta-data to specify that a load does not trap under certain conditions. Andy and Hal and I talked about this more in private and I just wanted to summarize what I think we arrived at. First I’ll summarize the original !notrap meta-data, then I’ll just mention why it’s hard to get it
2014 Aug 11
2
[PATCH] p2v: check results of strndup and sscanf
---
p2v/ssh.c | 11 ++++++++++-
1 file changed, 10 insertions(+), 1 deletion(-)
diff --git a/p2v/ssh.c b/p2v/ssh.c
index 1e9b05c..ff906df 100644
--- a/p2v/ssh.c
+++ b/p2v/ssh.c
@@ -505,7 +505,16 @@ open_data_connection (struct config *config, int *local_port, int *remote_port)
}, ovector, ovecsize)) {
case 100: /* Ephemeral port. */
port_str =
2015 Nov 17
4
firewalld being stupid
On Mon, November 16, 2015 16:39, Nick Bright wrote:
> On 11/6/2015 3:58 PM, James Hogarth wrote:
>> I have a couple of relevant articles you may be interested in ...
>>
>> On assigning the zone via NM:
>> https://www.hogarthuk.com/?q=node/8
>>
>> Look down to the "Specifying a particular firewall zone" bit ...
>> remember that if you edit the
2014 Jul 17
3
[LLVMdev] [RFC] Invariants in LLVM
On Thu, Jul 17, 2014 at 5:31 PM, Philip Reames <listmail at philipreames.com>
wrote:
> 3. An "llvm.invariant" has zero code generation cost. Given that, a lot
> of pattern matching and profitability heuristics will need adjusted to
> ignore them.
>
FWIW, this has been the fundamental point of contention in the entire
design. I've discussed this several times with