search for: ephemereal

Displaying 20 results from an estimated 320 matches for "ephemereal".

Did you mean: ephemeral
2011 Apr 01
3
repeated local ephemeral to 80
On my CentOS box that I use mainly as a web server, I have iptables set to log and reject anything that I don't expect. So lately, I have getting things like this: Mar 29 17:27:20 mbrc20 kernel: IPT-DROP IN= OUT=lo SRC=192.168.9.20 DST=192.168.9.20 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=46910 DF PROTO=TCP SPT=56624 DPT=80 WINDOW=32792 RES=0x00 SYN URGP=0 OPT
2012 Dec 02
0
[LLVMdev] [RFC] Intrinsic for declaring invariants
Hello again, In discussing my proposed patches for supporting alignment assumptions (for supporting __builtin_assume_aligned; see http://lists.cs.uiuc.edu/pipermail/llvm-commits/Week-of-Mon-20121126/157659.html), Chandler and I have started discussing an infrastructure for declaring invariants in the IR for use by the optimizer. The basic idea is to introduce a new intrinsic: void
2016 May 04
2
ImageMagick security alert
On Wed, 4 May 2016, Nux! wrote: > Direct links > > https://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=29588#p132726 > https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-3714 > > Mitigation: > > As a workaround the /etc/ImageMagick/policy.xml file can be edited to disable > processing of MVG, HTTPS, EPHEMERAL and MSL commands within image files,
2017 May 24
0
local ephemeral ports usage and distribution / inet_csk_get_port()
Hello I'm using CentOS Linux release 7.3.1611 (Core) with kernel 3.10.0-514.16.1.el7.x86_64 Using iperf for bond benchmarking, and opening several sockets, I noticed a strange behavior. My Centos using iperf as a client to connect to an iperf server (running either CentOS or Debian) requesting N parallel TCP connections. I notice that the local ephemeral ports used are not consecutive and
2016 May 03
2
ImageMagick security alert
https://imagetragick.com/ As CentOS is often used for web servers, I thought this should be posted here. Bug in ImageMagick allows remote exploit. AFAIK no patch exists yet but defense against the exploit is detailed at the link. CVE-2016?3714
2016 Oct 05
2
Ast 13.10 to 13.11 stop working webrtc
>From this change (res_rtp_asterisk): ast 13.10 to 13.11 webrtc JSSIP stop working, failing with chan_sip.c:4083 retrans_pkt: Hanging up call 7238b48c11581d4166b899bf747a05f7 at 130.211.62.184:0 - no reply to our critical packet (see https://wiki.asterisk.org/wiki/display/AST/SIP+Retransmissions). is there any way to configure to have the previous behaviour? Im trying to set
2013 Nov 08
0
[LLVMdev] Proposal for safe-to-execute meta-data for heap accesses
On Thu, Nov 7, 2013 at 9:39 PM, Filip Pizlo <fpizlo at apple.com> wrote: > NEW PROPOSAL > > The solution is to introduce meta-data that is explicit about how the > safe-to-execute condition ought to be evaluated. Instead of an SSA use, we > can have meta-data that says: > > %v = load %p !notrap !{ @f, <args> } > > where @f is a function in the
2020 Mar 27
2
Create VM w/ cache=none on tmpfs
Hi, I've seen that in the past, libvirt couldn't start VMs when the disk image was stored on a file system that doesn't support direct I/O having the 'cache=none' configuration [0]. On the KubeVirt project, we have some storage tests on a particular provider which does just that - try to create / start a VM whose disk is on tmpfs and whose definition features
2002 May 09
1
[Bug 238] New: sshd.pid file written AFTER key generation causes race condition
http://bugzilla.mindrot.org/show_bug.cgi?id=238 Summary: sshd.pid file written AFTER key generation causes race condition Product: Portable OpenSSH Version: 3.1p1 Platform: All OS/Version: All Status: NEW Severity: enhancement Priority: P5 Component: sshd AssignedTo:
2017 Dec 09
2
Problems with dnscrypt's package from EPEL
On Sat, Dec 09, 2017 at 03:03:52PM -0500, Stephen John Smoogen wrote: > On 9 December 2017 at 14:04, C. L. Martinez <carlopmart at gmail.com> wrote: > > Hi all, > > > > I have installed dnscrypt's rpm package from EPEL repo under a CentOS 7.4 and using unbound as a resolver. But, I see constant timeouts and responses are very slow ... Using same config in a Debian 9
2013 Nov 08
0
[LLVMdev] Proposal for safe-to-execute meta-data for heap accesses
----- Original Message ----- > > > > > > On Nov 8, 2013, at 1:13 AM, Chandler Carruth < chandlerc at google.com > > wrote: > > > > > > > > > On Thu, Nov 7, 2013 at 9:39 PM, Filip Pizlo < fpizlo at apple.com > > wrote: > > > > NEW PROPOSAL > > The solution is to introduce meta-data that is explicit
2015 Jan 15
10
Socket behavior change from 6.5 to 6.6
I will try to explain this as best I can. I have two computers; one a Supermicro X10SAE running CentOS 6, the other a very old DOS box.[*] The DOS box runs a CCD camera, sending images via Ethernet to the X10SAE. Thus, the X10SAE runs a Python server on port 5700 (a socket which binds to 5700 and listens, and then accepts a connection from the DOS box; nothing fancy).[**] The DOS box connects to
2013 Nov 08
5
[LLVMdev] Proposal for safe-to-execute meta-data for heap accesses
> On Nov 8, 2013, at 1:13 AM, Chandler Carruth <chandlerc at google.com> wrote: > > >> On Thu, Nov 7, 2013 at 9:39 PM, Filip Pizlo <fpizlo at apple.com> wrote: >> NEW PROPOSAL >> >> The solution is to introduce meta-data that is explicit about how the safe-to-execute condition ought to be evaluated. Instead of an SSA use, we can have meta-data that
2017 Dec 10
2
Problems with dnscrypt's package from EPEL
Not sure if this is a factor yet, but your forwardzone is looking for 3 ports but only 2 ports are configured in the systemd startup.. so are 1/3 of all lookups going to fail? Or is the 6355 a 'given' (aka it will be set up whether 6353 and 6354 are setup?) On 9 December 2017 at 16:45, C. L. Martinez <carlopmart at gmail.com> wrote: > On Sat, Dec 09, 2017 at 10:25:41PM +0100, C.
2016 May 07
0
ImageMagick security alert
On 05/04/2016 08:15 AM, John Hodrien wrote: > On Wed, 4 May 2016, Nux! wrote: > >> Direct links >> >> https://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=29588#p132726 >> >> https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-3714 >> >> Mitigation: >> >> As a workaround the /etc/ImageMagick/policy.xml file can be edited
2003 May 15
1
[Bug 440] Protocol 1 server key generated at start up even when P1 not used
http://bugzilla.mindrot.org/show_bug.cgi?id=440 djm at mindrot.org changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED Resolution| |FIXED ------- Additional Comments From djm at mindrot.org 2003-05-15 21:16
2013 Nov 08
2
[LLVMdev] Proposal for safe-to-execute meta-data for heap accesses
Hi! Previously in the "Add a 'notrap' function attribute?” thread we had discussed a way to use meta-data to specify that a load does not trap under certain conditions. Andy and Hal and I talked about this more in private and I just wanted to summarize what I think we arrived at. First I’ll summarize the original !notrap meta-data, then I’ll just mention why it’s hard to get it
2014 Aug 11
2
[PATCH] p2v: check results of strndup and sscanf
--- p2v/ssh.c | 11 ++++++++++- 1 file changed, 10 insertions(+), 1 deletion(-) diff --git a/p2v/ssh.c b/p2v/ssh.c index 1e9b05c..ff906df 100644 --- a/p2v/ssh.c +++ b/p2v/ssh.c @@ -505,7 +505,16 @@ open_data_connection (struct config *config, int *local_port, int *remote_port) }, ovector, ovecsize)) { case 100: /* Ephemeral port. */ port_str =
2015 Nov 17
4
firewalld being stupid
On Mon, November 16, 2015 16:39, Nick Bright wrote: > On 11/6/2015 3:58 PM, James Hogarth wrote: >> I have a couple of relevant articles you may be interested in ... >> >> On assigning the zone via NM: >> https://www.hogarthuk.com/?q=node/8 >> >> Look down to the "Specifying a particular firewall zone" bit ... >> remember that if you edit the
2014 Jul 17
3
[LLVMdev] [RFC] Invariants in LLVM
On Thu, Jul 17, 2014 at 5:31 PM, Philip Reames <listmail at philipreames.com> wrote: > 3. An "llvm.invariant" has zero code generation cost. Given that, a lot > of pattern matching and profitability heuristics will need adjusted to > ignore them. > FWIW, this has been the fundamental point of contention in the entire design. I've discussed this several times with