search for: tightens

Displaying 20 results from an estimated 350 matches for "tightens".

Did you mean: tighten
2018 Sep 08
1
Re: [PATCH nbdkit v2 2/6] main: Tighten up characters permitted in config keys.
On 09/08/2018 03:15 AM, Richard W.M. Jones wrote: > Previously key=value on the command line allowed the key to be pretty > much anything that didn't contain an '=' character. Even empty > strings were permitted. > > This tightens up the permitted keys so they must contain only ASCII > alphanumeric, period, underscore or dash characters, and must not be > an empty string. Do we want to further restrict things to start with a letter or underscore (and not a dot, digit, or dash)? > --- > docs/nbdkit-plugin.pod...
2018 Sep 10
1
Re: [PATCH nbdkit v3 2/6] main: Tighten up characters permitted in config keys.
On 9/10/18 10:27 AM, Richard W.M. Jones wrote: > Previously key=value on the command line allowed the key to be pretty > much anything that didn't contain an '=' character. Even empty > strings were permitted. > > This tightens up the permitted keys so they must contain only ASCII > alphanumeric, period, underscore or dash characters; must not be an > empty string; and must start with an ASCII alphabetic character. > --- > docs/nbdkit-plugin.pod | 24 +++++++++++++++--------- > src/main.c | 3...
2006 Sep 25
4
Tightening the rules for literal `[` and `]` chars in link ids
So here's an interesting bug I just discovered: [Like this][d]: [here][h]. [d]: foo [h]: bar The output here should be: <a href="foo">Like this</a>: <a href="bar">here</a>. But instead the output is completely empty. I see this bug in both Markdown.pl and PHP Markdown. The problem is that all three lines are being
2018 Sep 08
0
[PATCH nbdkit v2 2/6] main: Tighten up characters permitted in config keys.
Previously key=value on the command line allowed the key to be pretty much anything that didn't contain an '=' character. Even empty strings were permitted. This tightens up the permitted keys so they must contain only ASCII alphanumeric, period, underscore or dash characters, and must not be an empty string. --- docs/nbdkit-plugin.pod | 18 ++++++++++-------- src/main.c | 32 +++++++++++++++++++++++++++++++- 2 files changed, 41 insertions(+), 9 deletio...
2007 Feb 11
2
tighten up class?
The following works fine but is there some way to make it more succinct? Thanks, Kent class obsd_etc_static { file { "/etc/mygate": owner => root, group => wheel, mode => 644, backup => main, source => "puppet://example.com/obsd_static/mygate" } file { "/etc/rc.conf": owner => root, group => wheel,
2018 Sep 10
0
[PATCH nbdkit v3 2/6] main: Tighten up characters permitted in config keys.
Previously key=value on the command line allowed the key to be pretty much anything that didn't contain an '=' character. Even empty strings were permitted. This tightens up the permitted keys so they must contain only ASCII alphanumeric, period, underscore or dash characters; must not be an empty string; and must start with an ASCII alphabetic character. --- docs/nbdkit-plugin.pod | 24 +++++++++++++++--------- src/main.c | 36 +++++++++++++++++++++++++...
2019 Jun 26
0
Re: [libnbd PATCH 0/2] Tighten URI parser
On Tue, Jun 25, 2019 at 09:09:58PM -0500, Eric Blake wrote: >I'm not sure whether we want to go with just the first patch (reject >nbd:unix:/path but still accept nbd:/path), or squash the two in order >to go with the second (reject both abbreviated forms, and require >scheme://...). Either way, though, nbdkit -U - --run '$nbd' will now >error out rather than
2018 Apr 25
0
[OFF-TOPIC] Reminder to tighten ALL types of security
This posting is off-topic because it is not about Centos. Please refrain from replying to the list as that will generate further off-topic traffic inevitably irritating subscribers. On the balance of probabilities, I think everyone will benefit from reading at least the first 6 pages of a 19 pages English criminal sentencing statement about a child, in England, successfully breaking into the home
2023 Jul 17
1
[libnbd PATCH 1/2] api: Tighten rules on completion.callback
On Sun, Jul 16, 2023 at 04:39:18PM +0000, Tage Johansson wrote: > > @@ -194,7 +198,10 @@ calls. The cookie is unique (per libnbd handle) and E<ge> 1. > > > > You may register a function which is called when the command > > completes, see L</Completion callbacks> below. In this case we have > > -specified a null completion callback. > >
2000 Mar 01
1
"is.qr" definition (PR#465)
Might it be possible to tighten the definition of "is.qr". I noticed that after I mistakenly typed example(lm) # make lm object named lm.D9 qr.Q(lm.D9) which exhausted the heap memory and produced two warning messages. As an object of class "lm" has a "qr" component, "is.qr" failed to detect that "lm.D9" was not a "qr" object. The
2007 Jul 27
2
Patch to tighten down the permissions and ownership in configuration.rb
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Attached is a patch which attempts to enforce ''proper'' permissions of all files controlled directly by the puppet processes. All owners and groups are explicitly set as are all permissions. The idea is that the Puppet process configuration files should be relatively tamper resistant and at least throw a warning that the
2006 Feb 11
1
Bug#352337: please tighten permissions on /etc/logcheck
Package: logcheck Severity: wishlist I see no reason why /etc/logcheck should have any more permissions than 0750. Please consider removing access rights from 'other'. -- System Information: Debian Release: testing/unstable APT prefers stable APT policy: (700, 'stable'), (600, 'testing'), (98, 'unstable'), (1, 'experimental') Architecture: i386 (i686)
2019 Jun 26
1
Re: [libnbd PATCH 0/2] Tighten URI parser
On 6/26/19 4:05 AM, Martin Kletzander wrote: > On Tue, Jun 25, 2019 at 09:09:58PM -0500, Eric Blake wrote: >> I'm not sure whether we want to go with just the first patch (reject >> nbd:unix:/path but still accept nbd:/path), or squash the two in order >> to go with the second (reject both abbreviated forms, and require >> scheme://...).  Either way, though, nbdkit
2009 Nov 17
2
src/dst TIDs static @ 69 ?
At times our tftp servers are quite busy. Our network folk are rebuilding, and are anxious to tighten security. They hope to only allow tftp traffic on port 69, coming and going. This would bypass the RFC1350 client TID=ephemeral and server ACK TID=!69. Is there any chance tftpd-hpa would do this with "-R 69:69", or would this require tftpd-hpa to threaded, with a hairier connection
2005 Apr 01
10
postfix tightening
I am used to sendmail and am using Postfix now and am uncertain of some features. I typically would comment out the line in sendmail.mc that went something like 'accept unresolvable domains' I tried using smtpd_sender_restrictions = reject_unverified_sender reject_unverified_smtp and this seems a bit too restrictive and got some bounces on legitimate senders so I'm
2012 Oct 03
1
[LLVMdev] [PROPOSAL] Adding support for -fstack-protector-strong
David Chisnall wrote: >On 2 Oct 2012, at 03:26, Magee, Josh wrote: > >> 1) An address of a local variable is taken in such a way as to expose the >> address of a stack location. >> - Example: the address of a local on the RHS of an assignment, the >> address of a local passed into function. > > It also sounds like it would be triggered for a
2012 Apr 15
0
[LLVMdev] Representing -ffast-math at the IR level
Hi, > I would love to see such detailed models if we have real use cases and people > interested in implementing them. > > However, today we have a feature in moderately widespread use, '-ffast-math'. > It's semantics may not be the ideal way to enable restricted, predictable > optimizations of floating point operations, but they are effective for a wide > range
2023 Jul 16
1
[libnbd PATCH 1/2] api: Tighten rules on completion.callback
On 7/14/2023 4:13 PM, Eric Blake wrote: > On Fri, Jul 14, 2023 at 09:13:42AM +0200, Laszlo Ersek wrote: >> On 7/13/23 21:29, Eric Blake wrote: >>> The documentation has claimed since commit 6f4dcdab that any >>> completion callback will be called exactly once; but this is not >>> consistent with the code: if nbd_aio_* itself returns an error, then >>>
2005 Aug 02
5
TFTP Secondary Ports
I'm publishing tftp through my firewall to support external Cisco 7960 sip phones. I know that the primary port is 69 for tftp. However, tftp also uses secondary ports ranging from 1,0XX to 30,XXX. ( A broad range) In an effort to limit the secondary ports that are opened, some Windows based tftp server such as the winagents product allows you to limit the range of secondary ports that are
2008 Sep 12
2
SCCP port numbers used for audio stram?
I have a 7921 wireless phone working with Asterisk, and I want to tighten the wide open port range of my IPTABLES now. I tried allowing only SCCP port (2000) in/out and found that my audio was gone. A quick look at my iptables message shows source port 15886 and dest port 25968 used: FORWARD - Drop: IN=eth1 OUT=eth2 SRC=172.31.253.4 DST=172.31.254.102 LEN=200 TOS=0x18 PREC=0xA0 TTL=63 ID=0