search for: wiretap

Displaying 18 results from an estimated 18 matches for "wiretap".

2004 Jun 17
1
VOIP wiretapping article
Of course, big brother wants his say in the matter. http://www.wired.com/news/politics/0,1283,63884,00.html?tw=wn_2polihead
2005 Aug 08
1
FCC to require wiretaps from VoIP providers
Scary. http://www.eff.org/news/archives/2005_08.php#003876 -- PGP/GPG: 5C9F F366 C9CF 2145 E770 B1B8 EFB1 462D A146 C380
2001 Mar 07
2
password authenticaton secure ?
My question is regarding the possibility of someone wiretapping the communication and repeat the action. What if an intruder notice that there's a secure session starting (by guessing at the dst IP address and unintelligible payload) and then start capturing all the packets on this session for the purpose of repeating the whole session again? The secure...
2000 Mar 04
1
Where is the tarball for Solaris
I'm trying to install openssh-1.2.2 on a Solaris 7 box. I've downloaded the file openssh-1.2.2.tar.gz from ftp://thermo.stat.ncsu.edu/pub/openssh/files/ and http://the.wiretapped.net/security/cryptography/ssh/OpenSSH/files/. neither of theses tar's include the configure program as referenced in the INSTALL file. Where can I obtain the full distribution that will build on a Soalris 7 box ??
2007 Aug 30
1
FYI
http://www.wired.com/print/politics/security/news/2007/08/wiretap
2000 May 01
3
Status of SSH 2.0 protocol support?
Just to bring everyone up to date, could we get a report on the status of support for the 2.x protocol? The home page says "next major release" - is that 1.3 or 2.0? And is there any feel for when it'll be generally available? -- John Hardin Internal Systems Administrator Apropos Retail Management Systems, Inc. <johnh at aproposretail.com>
2008 Feb 05
1
is encrypted iax safe and secure?
Hello, I'm doing some research concerning iax encryption, I haven't find any clients (softphones or hardphones) which implement so I have not tested it yet. There was also this message on asterisk-security mailing list http://archives.free.net.ph/message/20070507.101933.222987b2.en.html which got no answers and this makes me think that this iax encryption is not much interesting for the
2017 Mar 07
1
LDAP logins failing after installing Samba 4.4.5
>> Hi all, >> >>   >> I had an LDAP application (mailserver) running on Samba 4.1.3 which >> wrked flawlessly. Also using an LDAP browser with a simple bind >> worked OK. >> >> I than replaced the Samba installation with version 4.5 and the LDAP >> functionality broke. I first thought it had to do with a non-SSL or >> non -TLS and
2000 Feb 08
0
Bug report and PATCH in ssh-agent in openssh 1.2.2
Dear folks, system: RH 6.1 Linux on a PIII software: installed binaries resulting from rpm --rebuild openssh-1.2.2-1.src.rpm, downloaded from http://the.wiretapped.net/security/cryptography/ssh/OpenSSH/files/openssh-1.2.2-1.src.rpm problem program: ssh-agent problem description: When execute ssh-agent startx -- -bpp 32 ssh-agent does not pass the -bpp 32 to startx. Why problem exists: getopt() reorders args by default, but we don't want the ssh-age...
2007 Jul 12
0
No subject
in clear over network, therefore wiretapping the connection is not enough to steal iax2 credentials. Media traffic will be encrypted when someone will implement it on client side, however even then, Called and Callee will be in clear. Best Regards, Claudio Internet Email Confidentiality Footer -----------------------------------------...
2004 Apr 05
4
Spring VON Wrap Up
...nse. Voice really _is_ just one of many modes of communication, and a long way away from the original VoIP service. 5. Regulatory Concerns. Several of the presenters brought up social an legal issues related to VoIP, and the associated government regulations that follow. E911 service and CALEA (wiretapping) were both the big concerns, as was inter-carrier compensation and taxation. Dr. Pepper indicated that he was pleased with the direction that the VoIP market is going, in terms of the voluntary compliance with the relevant rules from the existing PSTN regs. He indicated that the FCC was, for...
2000 Nov 01
0
FreeBSD Security Advisory: FreeBSD-SA-00:62.top
...= FreeBSD-SA-00:62 Security Advisory FreeBSD, Inc. Topic: top allows reading of kernel memory Category: core Module: top Announced: 2000-11-01 Credits: vort@wiretapped.net via OpenBSD Affects: FreeBSD 3.x (all releases), FreeBSD 4.x (all releases prior to 4.2), FreeBSD 3.5.1-STABLE and 4.1.1-STABLE prior to the correction date. Corrected: 2000/10/04 (FreeBSD 4.1.1-STABLE) 2000/10/04 (FreeBSD 3.5.1-STA...
2002 Aug 03
0
Quick Note: Obtaining Public Info on YOU!
...BORS, or BOSS! - Discover EMPLOYMENT opportunities from AROUND THE WORLD! - Locate transcripts and COURT ORDERS from all 50 states. - CLOAK your EMAIL so your true address can't be discovered. - Find out how much ALIMONY your neighbor is paying. - Discover how to check your phones for WIRETAPS. WARNING: You may be shocked or overwhelmed by the results of what you find!!! iDetect 2002 is simple to install and use and will work on any PC or Macintosh that has an internet connection. To order iDetect 2002, send in the order form below. - - - - - - - - - - - - - - - - - -...
2006 Dec 11
3
VPN As SIP Tunneling?
Hi All Could a VPN be used to help with SIP Tunneling and QoS issues. State 1: Two IP Networks Connected via the Public Internet transmitting VoIP Traffic Say a VoIP User and VoIP Termination Provider. Each side can put QoS onto their part, but if QoS does NOT exist between them then call quality will be bad anyhow. State 2: Same as above except a VPN tunnel is setup between each side. Thus
2003 Jul 28
10
IPSec
Hi All, I need to configure a VPN between a FreeBSD-4.8 box and a Linux (FreeS/WAN) box. In the Linux side, the network administrator installed FreeS/WAN with RSA authentication without IKE support. Does anybody knows if is possible to make my FreeBSD box connect a VPN with the Linux box? If so, could point me to a documentation about how to install IPSec with RSA authentication and how to make
2010 Dec 15
5
Allegations regarding OpenBSD IPSEC
Some of you probably already read this: http://marc.info/?l=openbsd-tech&m=129236621626462&w=2 Interesting...I wonder what is the impact of all this on FreeBSD code. We may very well suppose that any government or corporation funded code can theoretically have some kind of backdoor inside. --Andy
1998 May 19
7
Bind Overrun Bug and Linux
...with CERT and other external parties and is actively investigating this issue. Additional information, is expected shortly. When more Silicon Graphics information (including patch information) is available for release, that information will be released via the SGI security mailing list, wiretap. For subscribing to the wiretap mailing list and other SGI security related information, please refer to the Silicon Graphics Security Headquarters website located at: http://www.sgi.com/Support/security Sun Microsystems, Inc. - ---------------------- Topic 1: Patches will be...
2002 Mar 13
3
zlib compression, the exploit, and OpenSSH
...es as exploitable and take appropriate steps according to local site security policies and requirements. As further information becomes available, additional advisories will be issued via the normal SGI security information distribution methods including the wiretap mailing list on http://www.sgi.com/support/security/. XFree86 XFree86 versions 4.0 through 4.2.0 include zlib version 1.0.8. XFree86 3.x includes zlib version 1.0.4. The zlib code included with XFree86 is only used on some platforms. This is determined by the setting of Has...