Displaying 13 results from an estimated 13 matches for "preimage".
Did you mean:
reimage
2004 Dec 20
1
outcome of big rsync. Puzzling
Hi,
I just completed a really big rsync described earlier. Ie about 13,945
directories transfered about 600GB of data.
Of 13,945 directories, 13,9441 directories transfer with matching du -b sizes
of the preimage to the size of the destination machine image.
of the 4 remaining directories i found
source vs destination in bytes
---------
a) 20480 vs 34922496
b) 28672 vs 24576
c) 61718528 vs 61714432
d) 157790208 vs 157786112
each directory consists of subdirectories of me...
2006 Feb 22
2
[librsync-users] MD4 second-preimage attack
On Tue, 2006-02-21 at 14:58 -0800, rsync2eran@tromer.org wrote:
> A year ago we discussed the strength of the MD4 hash used by rsync and
> librsync, and one of the points mentioned was that only collision
> attacks are known on MD4.
Could you please forward this into the bug tracker so it's not lost?
--
Martin
-------------- next part --------------
A non-text attachment was
2007 Jan 25
4
vesamenu.c32 and cat.c32
...=ramdisk.gz ramdisk_size=65536 root=/dev/ram0
LABEL bzImage20w
MENU LABEL ^I: bzImage20w 386 build with 2.6.20 git 01-25-2007
KERNEL bzImage20w
APPEND initrd=ramdisk.gz ramdisk_size=65536 root=/dev/ram0
LABEL Images
MENU LABEL ^S: Images Help File
KERNEL cat.c32 imagesv
LABEL PreImage
MENU LABEL ^T: Pre-Image Help File
KERNEL cat.c32 preimage
LABEL Startup
MENU LABEL ^U: Start Up Help File
KERNEL cat.c32 startup
LABEL Startup
MENU LABEL ^V: Disclaimer File
KERNEL cat.c32 disclaim
TIMEOUT 600
ONTIMEOUT bzImageb
Don't know if there is a better way o...
2009 Mar 19
0
Full config file with Timeout issue
...29.git
MENU LABEL ^K: bz29.git 386 build 03-04-2009
KERNEL bz29.git
APPEND initrd=ramdisk.gz ramdisk_size=65536 root=/dev/ram0
LABEL memtest86-3.2
MENU LABEL ^M: memtest86+-1.70
KERNEL memtest86
LABEL Images
MENU LABEL ^S: Images Help File
KERNEL cat.c32 imagesv
LABEL PreImage
MENU LABEL ^T: Pre-Image Help File
KERNEL cat.c32 preimage
LABEL Startup
MENU LABEL ^U: Start Up Help File
KERNEL cat.c32 startup
LABEL Startup
MENU LABEL ^V: Disclaimer File
KERNEL cat.c32 disclaim
TIMEOUT 600
ONTIMEOUT bz28.7 initrd=ramdisk.gz ramdisk_size=65536 root=/dev...
2013 Sep 24
2
Multiple keys/methods per key exchange (e.g. multi-md5-sha1-md4@libssh.org) Re: [PATCH] curve25519-sha256@libssh.org key exchange proposal
On Tue, Sep 24, 2013 at 10:21 PM, Aris Adamantiadis <aris at 0xbadc0de.be> wrote:
[snip]
> I've worked this week on an alternative key exchange mechanism, in
> reaction to the whole NSA leaks and claims over cryptographic backdoors
> and/or cracking advances. The key exchange is in my opinion the most
> critical defense against passive eavesdropping attacks.
> I believe
2017 Feb 09
8
Checksums for git repo content?
Hi all,
Since the vault for 7.3.1611 has been cleared out last sunday (20170207)
- why is that? - I'm using git to download a "SRPM", or more accurately,
its contents.
However, using git has one major drawback: It is missing checksums for
the files.
Are there any plans to provide checksums for the files in git so I can
be sure that what I download is actually not tampered with?
2011 Jul 28
1
Support for ECDSA and SHA-2 (SHA-256) in the SSHFP record
Hi,
I was sure I sent this to openssh at openssh.com, but cannot find that email now in my Sent mailbox, so I am sending it to the developers list.
I took a liberty and wrote an I-D with accompanying patch (with contributions from Ondrej Caletka) to support ECDSA in the SSHFP DNS resource record.
The I-D is here: https://tools.ietf.org/html/draft-os-ietf-sshfp-ecdsa-sha2 (and the source XML
2017 Feb 23
1
Checksums for git repo content?
On 02/23/2017 01:03 PM, Lamar Owen wrote:
> On 02/23/2017 03:32 PM, James Hogarth wrote:
>> On 23 February 2017 at 19:55, Lamar Owen <lowen at pari.edu> wrote:
>>> Not to stir up a hornets' nest, but how does Google's announcement at
>>> https://shattered.it affect this now? (Executive summary: Google has
>>> successfully produced two different
2016 Mar 26
2
Follow up to adding EFI boot?
...config
bz4x5.0
bz4x5.0.config
cat.c32
COPYING
cpuid.c32
cpuidtest.c32
disclaim
display.c32
dmitest.c32
eltorito.sys
failsafe.cfg
hdt.c32
ldlinux.c32
libcom32.c32
libgpl.c32
libmenu.c32
libutil.c32
linux.c32
ls.c32
meminfo.c32
memtest
menu.c32
menu.lst
modules.pcimap
pci.ids
pcitest.c32
poweroff.c32
preimage
reboot.c32
startup
syslinux.cfg
syslinux.dir
test.png
vesainfo.c32
vesamenu.c32
vpdtest.c32
Added Directory
bootcd/isolinux/EFI:
BOOT
bootcd/isolinux/EFI/BOOT:
cat.c32
cpuid.c32
cpuidtest.c32
display.c32
dmi.c32
efiboot.img
hdt.c32
ldlinux.e32
libcom32.c32
libgpl.c32
libmenu.c32
libutil.c32
linu...
2009 Mar 04
1
file system, kernel or hardware raid failure?
I had a busy mailserver fail on me the other day. Below is what was
printed in dmesg. We first suspected a hardware failure (raid controller
or something else), so we moved the drives to another (identical
hardware) machine and ran fsck. Fsck complained ("short read while
reading inode") and asked if I wanted to ignore and rewrite (which I
did).
After booting up again, the problem came
2016 Jan 15
3
[Patch] TCP MD5SIG for OpenSSH
On 15 January 2016 at 08:48, Alex Bligh <alex at alex.org.uk> wrote:
> > The socket option is enabled *after* connection establishment, thus
> > doesn't protect against SYN floods. This is because server doesn't
> > know (in userspace) what the address of the peer is until they
> > connect. Again because signed addresses.
> So could they exchange a secret
2007 Dec 02
6
MD5 Collisions...
Hi everyone,
Not sure if you've read http://www.win.tue.nl/hashclash/SoftIntCodeSign/ .
should some kind of advisory be sent to advise people not to rely solely on MD5 checksums? Maybe an update to the man page is due ? :
"
MD5 has not yet (2001-09-03) been broken, but sufficient attacks have
been made that its security is in some doubt. The attacks on MD5 are in
the
2012 Jun 08
13
Default password hash
We still have MD5 as our default password hash, even though known-hash
attacks against MD5 are relatively easy these days. We've supported
SHA256 and SHA512 for many years now, so how about making SHA512 the
default instead of MD5, like on most Linux distributions?
Index: etc/login.conf
===================================================================
--- etc/login.conf (revision