Displaying 3 results from an estimated 3 matches for "passki".
2007 Dec 21
0
freebsd-update-server
...ld true for 6.2-R or 6.3-RCX? I
would be cross-building from amd64 to i386...
--) Is the USAGE document up-to-date? ;-)
[1] http://www.freebsd.org/cgi/cvsweb.cgi/projects/freebsd-update-server
[2] http://www.freebsd.org/cgi/cvsweb.cgi/projects/freebsd-update-server/USAGE?rev=1.1
--
Cheers,
Jon Passki, Partner
The Hursk Group, LLC
"Obvia conspicimus, nubem pellente Mathesi."
e: jon.passki@hursk.com
ph: 651/222.3020
cal: http://www.google.com/calendar/hosted/hursk.com/embed?src=jon.passki%40hursk.com
pgp: 1BB0 A946 927B 93C3 ED6A 0466 6692 6C2C 84BE 4122
2003 Sep 08
0
Base pam_krb5 on recent -STABLE and credential cache storage
...error_msg) \
if (debug) \
syslog(LOG_DEBUG, "pam_krb5: pam_sm_setcred(%s %s): %s: %s", \
service, name, error_func, error_msg)
Any ideas why I don't see a cached credential file in the usual
location? Any other information I can provide to help out?
Take care,
Jon Passki
[1] uname -a
FreeBSD dominique 4.9-PRERELEASE FreeBSD 4.9-PRERELEASE #13: Sat
Sep 6 16:56:34 CDT 2003
root@dominique:/usr/obj/usr/src/sys/DOMINIQUE i386
__________________________________
Do you Yahoo!?
Yahoo! SiteBuilder - Free, easy-to-use web site design software
http://sitebuilder.yahoo.c...
2009 Sep 15
4
Protecting against kernel NULL-pointer derefs
All,
Given the amount of NULL-pointer dereference vulnerabilities in the
FreeBSD kernel that have been discovered of late, I've started looking
at a way to generically protect against the code execution possibilities
of such bugs.
By disallowing userland to map pages at address 0x0 (and a bit beyond),
it is possible to make such NULL-pointer deref bugs mere DoS'es instead
of code