similar to: Another Fedora decision

Displaying 20 results from an estimated 10000 matches similar to: "Another Fedora decision"

2015 Feb 04
2
Another Fedora decision
On Wed, Feb 04, 2015 at 08:18:23AM -0800, Keith Keller wrote: > On 2015-02-04, James B. Byrne <byrnejb at harte-lyne.ca> wrote: > > > > One might question why *nix distributions insist on providing a known > > point of attack to begin with. Why does user 0 have to be called > > root? Why not beatlebailey, cinnamon or pasdecharge? > > That is more or less
2015 Feb 04
3
Another Fedora decision
On Wed, February 4, 2015 10:18 am, Keith Keller wrote: > On 2015-02-04, James B. Byrne <byrnejb at harte-lyne.ca> wrote: >> One might question why *nix distributions insist on providing a known point of attack to begin with. Why does user 0 have to be called root? Why not beatlebailey, cinnamon or pasdecharge? > > That is more or less what OS X does. User 0 still exists,
2015 Feb 04
0
Another Fedora decision
On Wed, February 4, 2015 10:35 am, Scott Robbins wrote: > On Wed, Feb 04, 2015 at 08:18:23AM -0800, Keith Keller wrote: >> On 2015-02-04, James B. Byrne <byrnejb at harte-lyne.ca> wrote: >> > >> > One might question why *nix distributions insist on providing a known >> > point of attack to begin with. Why does user 0 have to be called >> > root?
2015 Oct 09
2
CentOS-6 SSHD chroot SELinux problem
I run a sshd host solely to allow employees to tunnel secure connections to our internal hosts. Some of which do not support encrypted protocols. These connections are chroot'ed via the following in /etc/ssh/sshd_config Match Group !wheel,!xxxxxx,yyyyy AllowTcpForwarding yes ChrootDirectory /home/yyyyy X11Forwarding yes Where external users belong to group yyyyy (primary). We
2015 Feb 03
3
Another Fedora decision
I think it well to recall that the change which instigated this tempest was not to the network operations of a RHEL based system but to the 'INSTALLER' process, Anaconda. Now, I might be off base on this but really, ask yourself: Who exactly uses an installer program? And what is the threat model being addressed by requiring that the installer set a suitably strong password for root?
2016 May 27
1
dnf replacing yum?
On Thu, May 26, 2016 10:51, Juan Bernhard wrote: > > El 26/05/2016 a las 11:39 a.m., Valeri Galtsev escribi?: >> I guess, it is just me in general unhappy about all Linuxes >> getting much less "UNIX"y lately. > > I feel you Valerei, im switching new server instalations to FreeBSD. > Im tired to spend useful time learning new ways (systemd, firewalld, > dnf,
2015 Jul 24
5
rsyslog.conf
On Thu, July 23, 2015 13:19, m.roth at 5-cent.us wrote: > Physically dragging the thread back on topic... > > I really am going crazy, trying to deal with the hourly logs from the > loghost. We've got 170+ servers and workstations... but a *very* large > percentage of what's showing up is from his bloody new fedora 22, with > its idiot systemd logging of *ever* selinux
2016 Jun 18
2
https and self signed
On Fri, 2016-06-17 at 15:56 +0100, Michael H wrote: > On 17/06/16 15:46, James B. Byrne wrote: > > > > We operate a private CA for our domain and have since 2005. We > > maintain a public CRL strictly in accordance with our CPS and have our > > own OID assigned. Our CPS and CRL together with our active, expired > > and revoked certificate inventory is
2016 Jun 17
1
[Fwd: Re: https and self signed]
On Fri, June 17, 2016 12:31, Valeri Galtsev wrote: > > On Fri, June 17, 2016 10:19 am, James B. Byrne wrote: > >> Keys issued to individuals certainly should have short time limits >> on them. In the same way that user accounts on systems should >> always have a near term expiry date set. People are careless. >> And their motivations are subject to change. >
2015 Feb 04
0
Another Fedora decision
On 2015-02-04, James B. Byrne <byrnejb at harte-lyne.ca> wrote: > > One might question why *nix distributions insist on providing a known > point of attack to begin with. Why does user 0 have to be called > root? Why not beatlebailey, cinnamon or pasdecharge? That is more or less what OS X does. User 0 still exists, and it's labelled as "root", but there is no
2015 May 08
4
Q: respecting .ssh/id_rsa
While attempting to debug something else I ran across this: ssh -vvv somehost . . . debug1: Connection established. debug1: permanently_set_uid: 0/0 debug1: identity file /root/.ssh/identity type -1 debug1: identity file /root/.ssh/identity-cert type -1 debug3: Not a RSA1 key file /root/.ssh/id_rsa. debug2: key_type_from_name: unknown key type '-----BEGIN' debug3: key_read: missing
2016 Jun 17
4
https and self signed
On Thu, June 16, 2016 13:53, Walter H. wrote: > On 15.06.2016 16:17, Warren Young wrote: >> but it also affects the other public CAs: you can???t get a >> publicly-trusted cert for a machine without a publicly-recognized >> and -visible domain name. For that, you still need to use >> self-signed certs or certs signed by a private CA. >> > A private CA is the
2017 Mar 10
2
CentOS-6.8 fsck report Maximal Count
On Fri, March 10, 2017 9:52 am, Warren Young wrote: > On Mar 10, 2017, at 6:32 AM, James B. Byrne <byrnejb at harte-lyne.ca> wrote: >> >> On Thu, March 9, 2017 09:46, John Hodrien wrote: >>> >>> fsck's not good at finding disk errors, it finds filesystem errors. >> >> If not fsck then what? > > badblocks(8). And I definitely will
2015 Jan 11
5
Design changes are done in Fedora
On Fri, January 9, 2015 17:36, John R Pierce wrote: > On 1/9/2015 2:32 PM, Always Learning wrote: >> Enterprise, in the RHEL context, suggests stability or have I >> misunderstood the USA definition of "Enterprise" ? > > > Enterprise to me implies large business Enterprise literally means 'undertaking'. It has been used euphemistically since the later
2016 Mar 26
1
Centos in the Browser string ?
On Thu, March 24, 2016 11:56, g wrote: > > > On 03/24/16 09:29, Richard wrote: >>> Date: Thursday, March 24, 2016 14:10:41 +0000 >>> From: Always Learning <centos at u64.u22.net> >>> On Wed, 2016-03-23 at 22:29 -0700, Alice Wonder wrote: >>> >>>> What purpose does it serve? I don't object to it being there >>>> but I
2020 Jul 07
3
Can someone explain why host reports no SOA record for domain on DC?
[root at smb4-1 ~ (master)]# samba-tool dns query localhost brockley.harte-lyne.ca brockley.harte-lyne.ca ALL -U administrator Password for [BROCKLEY\administrator]: Name=, Records=4, Children=0 SOA: serial=3, refresh=900, retry=600, expire=86400, minttl=3600, ns=SMB4-1.brockley.harte-lyne.ca., email=hostmaster.brockley.harte-lyne.ca. (flags=600000f0, serial=110, ttl=3600) NS:
2007 Nov 24
5
rspec.opts
Where can I find a list of the options and their usage and meanings for the contents of this file? Regards, -- *** E-Mail is NOT a SECURE channel *** James B. Byrne mailto:ByrneJB at Harte-Lyne.ca Harte & Lyne Limited http://www.harte-lyne.ca 9 Brockley Drive vox: +1 905 561 1241 Hamilton, Ontario fax: +1 905 561 0757 Canada
2017 Mar 10
3
CentOS-6.8 fsck report Maximal Count
On Thu, March 9, 2017 09:46, John Hodrien wrote: > On Thu, 9 Mar 2017, James B. Byrne wrote: > >> This indicated that a bad sector on the underlying disk system might >> be the source of the problem. The guests were all shutdown, a >> /forcefsck file was created on the host system, and the host system >> remotely restarted. > > fsck's not good at finding
2015 Jan 31
4
Another Fedora decision
On Sat, January 31, 2015 05:14, Johnny Hughes wrote: > On 01/30/2015 06:09 PM, Scott Robbins wrote: >> On Fri, Jan 30, 2015 at 11:27:55PM +0000, Marko Vojinovic wrote: >>> On Fri, 30 Jan 2015 14:15:05 -0800 >>> Akemi Yagi <amyagi at gmail.com> wrote: >>>> On Fri, Jan 30, 2015 at 2:04 PM, Scott Robbins >>>> <scottro at nyc.rr.com>
2015 Mar 03
6
TLS, SRTP, Asterisk11 and Snom870s
CentOS-6.5 (FreePBX-2.6) Asterisk-11.14.2 (FreePBX) snom870-SIP 8.7.3.25.5 I am having a very difficult time attempting to get TLS and SRTP working with Asterisk and anything else. At the moment I am trying to get TLS functioning with our Snom870 desk-sets. And I am not having much luck. Since this is an extraordinarily (to me) Byzantine environemnt I am going to ask if any of you have gotten