Displaying 19 results from an estimated 19 matches for "fondl".
Did you mean:
fond
2003 Oct 27
3
How to disable XFree86 and wdm listening ports
Hello,
what is the right way to disable XFree86 and wdm listening
ports tcp 6000 and tcp 1024.
I read in man XFree86 about the -nolisten tcp option
and tried to set in /usr/X11R6/lib/X11/xdm
:0 local /usr/X11R6/bin/X -nolisten tcp
but it was not successful.
What is the right way to close the ports without use of IPFW?
Your help would be appreciated.
Thank?s
Wolfgang
2007 May 16
5
postfix
Hi,
Can someone point me to a step by step tutorial to install a postfix
toaster?
Thanks
2003 Jul 28
1
ssh and X11Forwarding
What has to be installed on a host for it to do X11Forwarding in SSH?
My (FreeBSD) workstation at home is behind NAT. From home, I can SSH to
a FreeBSD firewall at work, and from there I can get to other hosts
around the internal network there, some of which run X clients.
Does X have to be installed *on the firewall* for me to forward X11
connections from the X clients back to my workstation
2006 Apr 20
1
CentOS Folding@home team breaks through
Congratulations to all members of the team for contributing towards breaking
through the 2,000 place barrier. In the overall team rankings we are now in
position 1885! Considering how 'young' the team is in terms of how long its
been going thats a stupendous achievement! Well done all!
From now on we can watch our teams ranking on
2004 Jul 09
3
bash as a login shell (was Root users shell == no existant shell /bin/bash)
On 9 Jul 2004 at 13:11, Daniel Brown wrote:
> On the other hand, I've run across a sysadmin who always enables his
> toor accounts -- and changes its shell to bash. As a result, not only
> is there an alternate root account (good in case 'root' trampled on by
> accident or purpose), but you can get root bash as a login shell while
> leaving the real root to its normal
2004 May 10
5
rate limiting sshd connections ?
Does anyone know of a way to rate limit ssh connections from an IP address
? We are starting to see more and more brute force attempts to guess
simple passwords "/usr/sbin/inetd -wWl -C 10" is nice for slowing down
attempts to services launched via inetd. Is there an equiv method for
doing this to sshd? Running from inetd has some issues supposedly.
---Mike
2003 Jun 08
4
Removable media security in FreeBSD
I'm working with a FreeBSD user -- a teacher -- who's running KDE on a system
on which she neither has nor wants root privileges. She wants to be able to
mount and unmount floppies and ZIP cartridges from within KDE, using the
standard KwikDisk utility (which, by the way, generates mount and unmount
command that don't conform to FreeBSD syntax; however, it appears possible
to fix this
2004 Sep 24
1
sharing /etc/passwd
How 'bout PAM? /usr/ports/security/pam_ldap. If you have machines that
can't do PAM, perhaps NIS is the way to go (assuming, of course, you're
behind a firewall). You can store login information in LDAP like you want,
then use a home-grown script to extract the information to a NIS map. Or,
if you have a Solaris 8 machine lying around, you can cut out the middle
step and use
2004 Jan 06
5
Logging user activities
Hello,
What do you recommend for keeping track of user
activities? For preserving bash histories I followed
these recommendations:
http://www.defcon1.org/secure-command.html
They include using 'chflags sappnd .bash_history',
enabling process accounting, and the like.
My goal is to "watch the watchers," i.e. watch for
abuse of power by SOC people with the ability to view
2003 Sep 16
5
boot -s - can i detect intruder
Hi list
Several people have physical access to my FreeBSD box and I have the feeling
that somebody try to get access with boot -s options . Can I log activity
after boot -s option (change user password, install software and etc.).
I use boot -s and change user password, but after reboot i can't find this
atcivity in log files.
The BSD box is shutdown and run again many time at day.
Best
2003 Dec 10
4
s/key authentication for Apache on FreeBSD?
I'm constructing a Web server which may require restricted areas
of the site to be used from public places where a password might
be sniffed. The damage that could be done by taking snapshots of
the content from one session with a spy program is minimal. What
the owner of the server does NOT want, though, is to allow unauthorized
parties to gain unfettered access by stealing the password via
2003 Oct 21
2
hardware crypto and SSL?
Is anyone successfully using some sort of hardware crypto solution to
combat the overhead of SSL in http transactions? I'd love to hear
anything good or bad about this.
-Bill
--
-=| Bill Swingle - <unfurl@(dub.net|freebsd.org)>
-=| Every message PGP signed
-=| PGP Fingerprint: C1E3 49D1 EFC9 3EE0 EA6E 6414 5200 1C95 8E09 0223
-=| "Computers are useless. They can only give you
2003 Aug 06
2
statically compiled files left over after a 'make world'
Hello,
I recently did a 'make world' to update my base system due to the realpath
bug. After that finished, I noticed that I still had the following
statically compiled binaries laying around that did not get updated during
a 'make world'. I track 4-STABLE.
/usr/bin/miniperl
/sbin/mount_kernfs
/sbin/mount_devfs
/sbin/modunload
/sbin/modload
/sbin/ft
/stand/boot_crunch
/stand/find
2004 Apr 08
4
recommended SSL-friendly crypto accelerator
Hi,
I'm pondering building my own SSL accelerator out of a multi-CPU
FreeBSD system and a crypto accelerator.
What's the recommended hardware crypto accelerator card these
days?
Thanks,
==ml
--
Michael Lucas mwlucas@FreeBSD.org, mwlucas@BlackHelicopters.org
Today's chance of throwing it all away to start a goat farm: 49.1%
http://www.BlackHelicopters.org/~mwlucas/
2003 Sep 24
4
unified authentication
Howdy list,
Sorry if this is a frequently discussed topic,
or an off-topic question, but I couldn't find much
info about my question by performing quick searches
in the archives, and my question is pretty tightly
related to security...
Background:
===========
I have a number of FreeBSD machines. Most are 4.x,
but a few are 5.x (mainly the testing/devel machines).
I also have a single Red
2004 Aug 10
3
[PATCH] Tighten /etc/crontab permissions
Hi folks,
While investigating OpenBSD's cron implementation, I found that they set
the systemwide crontab (a.k.a. /etc/crontab) to be readable by the
superuser only. The attached patch will bring this to FreeBSD by moving
crontab out from BIN1 group and install it along with master.passwd.
This change should not affect the current cron(1) behavior.
Cheers,
--
Xin LI <delphij frontfree
2003 Oct 26
3
Best way to filter "Nachi pings"?
We're being ping-flooded by the Nachi worm, which probes subnets for
systems to attack by sending 92-byte ping packets. Unfortunately,
IPFW doesn't seem to have the ability to filter packets by length.
Assuming that I stick with IPFW, what's the best way to stem the
tide?
--Brett Glass
2003 Aug 11
5
realpath(3) et al
First, I hope that this message is not considered flame bait. As someone
who has used FreeBSD for for 5+ years now, I have a genuine interest in
the integrity of our source code.
Second, I hope that this message is not taken as any form of insult or
finger pointing. Software without bugs does not exist, and I think we all
know that. Acknowledging that point and working to mitigate the risks
2003 Sep 16
9
FreeBSD Security Advisory FreeBSD-SA-03:12.openssh
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-03:12 Security Advisory
FreeBSD, Inc.
Topic: OpenSSH buffer management error
Category: core, ports
Module: openssh, ports_openssh,