Displaying 16 results from an estimated 16 matches for "myhre".
Did you mean:
myhr
2005 Feb 25
2
"click to dial extension number" functionality ?
...ndant" functionality.
Hence:
1. surf to the specific web-site
2. enter the extension digits in a web-interface
3. get connected - with in- and out-sound through the web-browser
Do anyone know what would be the simplest / best way to implement this
functionality ?
Br,
Terje Myhre
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.digium.com/pipermail/asterisk-users/attachments/20050225/447692c9/attachment.htm
2005 Feb 25
1
r2 signalling in east europe
...rds for eastern european r2 signalling.
However, we would like to have a few references on the possibility to
realise the signaling.
Please, can anyone tell me whether they have had any success in this, and if
there are any special "hook-ups" to look out for ?
Br,
Terje Myhre
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.digium.com/pipermail/asterisk-users/attachments/20050225/3fafe9cd/attachment.htm
2019 Nov 24
4
Warning: old key(s) found and disabled.
Well, I goofed and entered the wrong network name while trying to set up
keys for a new network:
# tincd -n existing_net -K
Generating 2048 bits keys:
............................................+++++ p
..................................................................+++++ q
Done.
Please enter a file to save private RSA key to
[/etc/tinc/existing_net/rsa_key.priv]:
Warning: old key(s) found
2018 Apr 14
10
[Bug 1243] New: Wildcard can only include <16 files
https://bugzilla.netfilter.org/show_bug.cgi?id=1243
Bug ID: 1243
Summary: Wildcard can only include <16 files
Product: nftables
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: normal
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
2020 Feb 03
7
[Bug 1404] New: Problems with dynamically managing interval sets with auto-merge
https://bugzilla.netfilter.org/show_bug.cgi?id=1404
Bug ID: 1404
Summary: Problems with dynamically managing interval sets with
auto-merge
Product: nftables
Version: unspecified
Hardware: All
OS: Debian GNU/Linux
Status: NEW
Severity: blocker
Priority: P5
Component:
2017 Sep 22
13
[Bug 1185] New: counter flag proposal for sets and maps
https://bugzilla.netfilter.org/show_bug.cgi?id=1185
Bug ID: 1185
Summary: counter flag proposal for sets and maps
Product: nftables
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
2016 Sep 20
0
Re: How to set QEMU qcow2 l2-cache-size using libvirt xml?
On Mon, Sep 19, 2016 at 11:32:26AM -0400, Frank Myhr wrote:
>QEMU's default qcow2 L2 cache size is too small for large images (and small cluster sizes), resulting in very bad performance.
>
>https://blogs.igalia.com/berto/2015/12/17/improving-disk-io-performance-in-qemu-2-5-with-the-qcow2-l2-cache/
>shows huge performance hit for a 20GB qcow2 with default 64kB cluster size:
>
2018 Sep 01
1
IndirectData
Hi list,
I'm hoping someone can help me understand when to use IndirectData.
Quoting the manual:
IndirectData = <yes|no> (no)
This option specifies whether other tinc daemons besides the one you
specified with ConnectTo can make a direct connection to you. This is
especially useful if you are behind a firewall and it is impossible to
make a connection from the outside to your tinc
2019 Nov 24
0
Warning: old key(s) found and disabled.
On 2019/11/24 16:52, Frank Myhr wrote:
> When tinc says it "disabled" the old key, did it it in fact *delete* it?
> I haven't found it anywhere on the system.
Crisis averted. Turns out I have another local host whose public key is
known by my remote hosts. So I can use this 2nd local host to update
host_on_existing_net's public key on the remote hosts and all should be
2019 Nov 25
0
Warning: old key(s) found and disabled.
On Sun, Nov 24, 2019 at 04:52:41PM -0500, Frank Myhr wrote:
> Well, I goofed and entered the wrong network name while trying to set up
> keys for a new network:
>
> # tincd -n existing_net -K
> Generating 2048 bits keys:
> ............................................+++++ p
> ..................................................................+++++ q
> Done.
> Please
2014 May 07
1
[Bug 925] New: icmp: ICMPv4 types are not supported
https://bugzilla.netfilter.org/show_bug.cgi?id=925
Summary: icmp: ICMPv4 types are not supported
Product: nftables
Version: unspecified
Platform: x86_64
OS/Version: Debian GNU/Linux
Status: NEW
Severity: normal
Priority: P5
Component: nft
AssignedTo: pablo at netfilter.org
ReportedBy:
2016 Sep 19
2
How to set QEMU qcow2 l2-cache-size using libvirt xml?
QEMU's default qcow2 L2 cache size is too small for large images (and small cluster sizes), resulting in very bad performance.
https://blogs.igalia.com/berto/2015/12/17/improving-disk-io-performance-in-qemu-2-5-with-the-qcow2-l2-cache/
shows huge performance hit for a 20GB qcow2 with default 64kB cluster size:
L2 Cache, MiB Average IOPS
1 (default) 5100
1.5
2018 Oct 02
2
Per host key authentication
Definitely considered that. Running different VPNs and even running
different instances of the daemon on different ports. But, as you
rightly pointed out: *additional complexity*.
It basically comes down to: what if you have a bad actor who needs
credentials revoked immediately?
We have a way of doing this already, but it can take up to 5 minutes to
cycle through every machine on the network -
2018 Oct 02
4
Per host key authentication
*Problem I want to solve:*
We have 3 sites: A, B, and C.
Network admins should have access to all three. (this works as-is).
Desktop support should only have access to their site. (Tech A to site
A, Tech B to site B, Tech C to site C).
*How I think I can do it:*
Working with keys?
Admin's public key will be on all the client machines, and thus, the
client machines will always
2018 Oct 02
0
Per host key authentication
On 02/10/2018 17:02, Michael Munger wrote:
> there might be another way to skin that cat.
Additional complexity, but you could set up *four* tinc VPNs:
1) admin VPN
2) site A VPN
3) site B VPN
4) site C VPN
Each of your client machines would then participate in 2 VPNs: the admin
VPN and the appropriate site VPN. Each site VPN is NOT a subnet of the
admin VPN, but its own separate network.
2019 Nov 24
0
Encryption when forwarding between indirectly-connected hosts
Hi,
If host B is not directly reachable from host A so that tinc packets flow:
A -> (C) -> B
where C is a 3rd host that both A and B can reach, which public key does
A use when sending these packets to B? C's public key, or B's public
key? In other words, are these packets encrypted hop-by-hop, or
end-to-end? Does it make a difference whether legacy or SPTPS protocol
is being