search for: myhre

Displaying 16 results from an estimated 16 matches for "myhre".

Did you mean: myhr
2005 Feb 25
2
"click to dial extension number" functionality ?
...ndant" functionality. Hence: 1. surf to the specific web-site 2. enter the extension digits in a web-interface 3. get connected - with in- and out-sound through the web-browser Do anyone know what would be the simplest / best way to implement this functionality ? Br, Terje Myhre -------------- next part -------------- An HTML attachment was scrubbed... URL: http://lists.digium.com/pipermail/asterisk-users/attachments/20050225/447692c9/attachment.htm
2005 Feb 25
1
r2 signalling in east europe
...rds for eastern european r2 signalling. However, we would like to have a few references on the possibility to realise the signaling. Please, can anyone tell me whether they have had any success in this, and if there are any special "hook-ups" to look out for ? Br, Terje Myhre -------------- next part -------------- An HTML attachment was scrubbed... URL: http://lists.digium.com/pipermail/asterisk-users/attachments/20050225/3fafe9cd/attachment.htm
2019 Nov 24
4
Warning: old key(s) found and disabled.
Well, I goofed and entered the wrong network name while trying to set up keys for a new network: # tincd -n existing_net -K Generating 2048 bits keys: ............................................+++++ p ..................................................................+++++ q Done. Please enter a file to save private RSA key to [/etc/tinc/existing_net/rsa_key.priv]: Warning: old key(s) found
2018 Apr 14
10
[Bug 1243] New: Wildcard can only include <16 files
https://bugzilla.netfilter.org/show_bug.cgi?id=1243 Bug ID: 1243 Summary: Wildcard can only include <16 files Product: nftables Version: unspecified Hardware: x86_64 OS: All Status: NEW Severity: normal Priority: P5 Component: nft Assignee: pablo at netfilter.org
2020 Feb 03
7
[Bug 1404] New: Problems with dynamically managing interval sets with auto-merge
https://bugzilla.netfilter.org/show_bug.cgi?id=1404 Bug ID: 1404 Summary: Problems with dynamically managing interval sets with auto-merge Product: nftables Version: unspecified Hardware: All OS: Debian GNU/Linux Status: NEW Severity: blocker Priority: P5 Component:
2017 Sep 22
13
[Bug 1185] New: counter flag proposal for sets and maps
https://bugzilla.netfilter.org/show_bug.cgi?id=1185 Bug ID: 1185 Summary: counter flag proposal for sets and maps Product: nftables Version: unspecified Hardware: x86_64 OS: All Status: NEW Severity: enhancement Priority: P5 Component: nft Assignee: pablo at netfilter.org
2016 Sep 20
0
Re: How to set QEMU qcow2 l2-cache-size using libvirt xml?
On Mon, Sep 19, 2016 at 11:32:26AM -0400, Frank Myhr wrote: >QEMU's default qcow2 L2 cache size is too small for large images (and small cluster sizes), resulting in very bad performance. > >https://blogs.igalia.com/berto/2015/12/17/improving-disk-io-performance-in-qemu-2-5-with-the-qcow2-l2-cache/ >shows huge performance hit for a 20GB qcow2 with default 64kB cluster size: >
2018 Sep 01
1
IndirectData
Hi list, I'm hoping someone can help me understand when to use IndirectData. Quoting the manual: IndirectData = <yes|no> (no) This option specifies whether other tinc daemons besides the one you specified with ConnectTo can make a direct connection to you. This is especially useful if you are behind a firewall and it is impossible to make a connection from the outside to your tinc
2019 Nov 24
0
Warning: old key(s) found and disabled.
On 2019/11/24 16:52, Frank Myhr wrote: > When tinc says it "disabled" the old key, did it it in fact *delete* it? > I haven't found it anywhere on the system. Crisis averted. Turns out I have another local host whose public key is known by my remote hosts. So I can use this 2nd local host to update host_on_existing_net's public key on the remote hosts and all should be
2019 Nov 25
0
Warning: old key(s) found and disabled.
On Sun, Nov 24, 2019 at 04:52:41PM -0500, Frank Myhr wrote: > Well, I goofed and entered the wrong network name while trying to set up > keys for a new network: > > # tincd -n existing_net -K > Generating 2048 bits keys: > ............................................+++++ p > ..................................................................+++++ q > Done. > Please
2014 May 07
1
[Bug 925] New: icmp: ICMPv4 types are not supported
https://bugzilla.netfilter.org/show_bug.cgi?id=925 Summary: icmp: ICMPv4 types are not supported Product: nftables Version: unspecified Platform: x86_64 OS/Version: Debian GNU/Linux Status: NEW Severity: normal Priority: P5 Component: nft AssignedTo: pablo at netfilter.org ReportedBy:
2016 Sep 19
2
How to set QEMU qcow2 l2-cache-size using libvirt xml?
QEMU's default qcow2 L2 cache size is too small for large images (and small cluster sizes), resulting in very bad performance. https://blogs.igalia.com/berto/2015/12/17/improving-disk-io-performance-in-qemu-2-5-with-the-qcow2-l2-cache/ shows huge performance hit for a 20GB qcow2 with default 64kB cluster size: L2 Cache, MiB Average IOPS 1 (default) 5100 1.5
2018 Oct 02
2
Per host key authentication
Definitely considered that. Running different VPNs and even running different instances of the daemon on different ports. But, as you rightly pointed out: *additional complexity*. It basically comes down to: what if you have a bad actor who needs credentials revoked immediately? We have a way of doing this already, but it can take up to 5 minutes to cycle through every machine on the network -
2018 Oct 02
4
Per host key authentication
*Problem I want to solve:* We have 3 sites: A, B, and C. Network admins should have access to all three. (this works as-is). Desktop support should only have access to their site. (Tech A to site A, Tech B to site B, Tech C to site C). *How I think I can do it:* Working with keys? Admin's public key will be on all the client machines, and thus, the client machines will always
2018 Oct 02
0
Per host key authentication
On 02/10/2018 17:02, Michael Munger wrote: > there might be another way to skin that cat. Additional complexity, but you could set up *four* tinc VPNs: 1) admin VPN 2) site A VPN 3) site B VPN 4) site C VPN Each of your client machines would then participate in 2 VPNs: the admin VPN and the appropriate site VPN. Each site VPN is NOT a subnet of the admin VPN, but its own separate network.
2019 Nov 24
0
Encryption when forwarding between indirectly-connected hosts
Hi, If host B is not directly reachable from host A so that tinc packets flow: A -> (C) -> B where C is a 3rd host that both A and B can reach, which public key does A use when sending these packets to B? C's public key, or B's public key? In other words, are these packets encrypted hop-by-hop, or end-to-end? Does it make a difference whether legacy or SPTPS protocol is being