Displaying 20 results from an estimated 30000 matches similar to: "[Keir.Fraser@cl.cam.ac.uk: Re: [RFC PATCH 34/35] Add the Xen virtual network device driver.]"
2001 Jun 05
1
11.82 bpw clarification (was Re: ssh-keygen(1) misinfo: English prose entropy 0.6 - 1.3 b/char!)
>Trolling is such fun, isn't it?
I was trying to making merriment, not to provoke emotional responses.
I am conflicted on publicly responding, but decided to clarify just in
case your confusion is shared by others with better impulse control.
Unfortunately, an unchallenged statement made in the company or
under the scrutiny of experts is often assumed true, which is really
the original
2009 Feb 20
1
misleading example or ...
I am always fascinating by good programming techniques. R contains a lot of very good examples I have been learning from.
Since I am using some functions from package "wmtsa", I though I could borrow the elegant example, in the documentation of function "wavBestBasis" to compute the entropy from the Wavelet Transform coefficients.
In the following I have pasted the excerpt,
2000 Feb 09
0
[Colin Watson <cjw44@cam.ac.uk>] Bug#49902: [PATCH] Bug#49902: ssh and pam conspire to deny logins
Hi,
Here's a helpful patch from one of our (Debian's) users.
I'd guess that the similar if/xfree a few lines above in the #if PAM
section could do with the same treatment.
Cheers, Phil.
--[[message/rfc822]]
Date: Sat, 29 Jan 2000 11:11:32 +0000
From: Colin Watson <cjw44 at cam.ac.uk>
To: 49902 at bugs.debian.org
[Bug was that when sshing one's password is denied,
2008 Jul 08
1
calculation of entropy in R???
i want to calculate shannon entropy which is
H1,H2,H3....upto H7?
if there is any function or any package in
which i can find this entropy directly. do you have any information
please share this and i will be very thankful to you.
Regards,
++++++++++++++++++++++++++++++++++++++++++++++
MUHAMMAD FAISAL Department of Statistics and Decion Support system,
University of
2009 Jul 06
8
[PATCH] Fix xentop on pv-ops domain0
Xentop encounters error in pv-ops domain0, because the VBD path in sysfs changes to "/sys/devices"
Also delete the macro in xenstat_netbsd.c, because it is not used.
Signed-off-by: Dongxiao Xu <dongxiao.xu@intel.com>
Best Regards,
-- Dongxiao
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
2008 Nov 24
5
FreeBSD Security Advisory FreeBSD-SA-08:11.arc4random
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-08.11.arc4random Security Advisory
The FreeBSD Project
Topic: arc4random(9) predictable sequence vulnerability
Category: core
Module: sys
Announced:
2008 Nov 24
5
FreeBSD Security Advisory FreeBSD-SA-08:11.arc4random
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-08.11.arc4random Security Advisory
The FreeBSD Project
Topic: arc4random(9) predictable sequence vulnerability
Category: core
Module: sys
Announced:
2001 Feb 08
0
BindView advisory: sshd remote root (bug in deattack.c)
Remote vulnerability in SSH daemon crc32 compensation attack detector
-----------------------------------------------------------------------
Issue date: 8 February 2001
Author: Michal Zalewski <lcamtuf at razor.bindview.com>
Contact: Scott Blake <blake at razor.bindview.com>
CVE: CAN-2001-0144
Topic:
Remotely exploitable vulnerability condition exists in most ssh daemon
2008 Mar 18
0
AST-2008-005: HTTP Manager ID is predictable
Asterisk Project Security Advisory - AST-2008-005
+------------------------------------------------------------------------+
| Product | Asterisk |
|----------------------+-------------------------------------------------|
| Summary | HTTP Manager ID is predictable |
2008 Mar 18
0
AST-2008-005: HTTP Manager ID is predictable
Asterisk Project Security Advisory - AST-2008-005
+------------------------------------------------------------------------+
| Product | Asterisk |
|----------------------+-------------------------------------------------|
| Summary | HTTP Manager ID is predictable |
2005 May 05
7
Fix for ''acpi=off''
I''ve checked in a patch that will hopefully fix ''acpi=off'' and
''acpi=ht'' modes for domain0. It''s been tested on just one machine so
far, so it''d be good to get some wider feedback. :-)
-- Keir
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2007 Mar 20
16
Data broken during FTP test
Hi all,
Currently we have severe problem and are struggling to investigate it.
The problem is data broken.
Reproduce pocess is following,
0. test FTP function between guest domain and FTP client(other PC).
1. put data from FTP client to guest domain.
2. get data from guest domain to FTP client.
3. compare put data and get data on FTP client.
4. repeat process from step1 to step3.
2002 Jan 22
0
bugzilla down; patch for configure.ac --with-prngd-socket
Bugzilla is reporting an internal server error right now so I thought I'd
post this here.
The current portable OpenSSH developer CVS has some non-standard shell syntax
in the --with-prngd-socket case, and the grep "-q" option is not supported
in at least Solaris 2.5.1. Here's a patch.
Alternatively, the first test could use
case "$withval" in
/*) ;;
*)
2011 May 03
0
Revised: Portable OpenSSH security advisory: portable-keysign-rand-helper.adv
OpenSSH Security Advisory: portable-keysign-rand-helper.adv
This document may be found at:
http://www.openssh.com/txt/portable-keysign-rand-helper.adv
1. Vulnerability
Portable OpenSSH's ssh-keysign utility may allow unauthorised
local access to host keys on platforms if ssh-rand-helper is
used.
2. Affected configurations
Portable OpenSSH prior to version
2003 Oct 21
7
Help on domain creation
Hi all,
I am running the current xen-unstable and had the following error message
when trying to create domain1.
# ./xenctl script -f/etc/xen-mynewdom
Domain defaults:
name XenoLinux
size 98304
vifs 1
domainImage /boot/xenolinux.gz
domainInitRD null
rootDevice /dev/hda5
rootArgs rw
usrDevice null
NWIP
2007 Mar 30
7
Some additional attacks on Cookie Session
Aside from the replay attacks discussed, there are some other attack
vectors on the cookie_session store.
I appreciate (and admire!) Jeremy''s good humor on all of this:
> Planting the seed here led to quick ripening and plenty of pesticide.
> Thanks for the fish, all.
>
> jeremy
Anyway, here''s what we came up with:
1. Brute Force
SHA512 can be computed _very_ fast.
2008 Mar 27
11
[PATCH 1/5] Add MSI support to XEN
This patch changes the pirq to be per-domain in xen tree.
Signed-off-by: Jiang Yunhong <yunhong.jiang@intel.com>
Signed-off-by: Shan Haitao <haitao.shan@intel.com>
Best Regards
Shan Haitao
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2011 May 03
1
Revised: Portable OpenSSH security advisory: portable-keysign-rand-helper.adv
OpenSSH Security Advisory: portable-keysign-rand-helper.adv
This document may be found at:
http://www.openssh.com/txt/portable-keysign-rand-helper.adv
1. Vulnerability
Portable OpenSSH's ssh-keysign utility may allow unauthorised
local access to host keys on platforms if ssh-rand-helper is
used.
2. Affected configurations
Portable OpenSSH prior to version
2008 Mar 27
21
[PATCH 0/5] Add MSI support to XEN
Hi, Keir,
These patches are rebased version of Yunhong''s original patches,
which were sent out before XEN 3.2 was released. These patches enable
MSI support and limited MSI-X support in XEN. Here is the original
description of the patches from Yunhong''s mail.
The basic idea including:
1) Keep vector global resource owned by xen, while split pirq into
per-domain
2005 Dec 30
0
RE: Guest-visible phys2mach part of Xen arch-neutral API? was: Uses of &frame_table[xfn]
>From: Keir Fraser
>Sent: 2005年12月30日 4:34
>
>On 29 Dec 2005, at 18:51, Magenheimer, Dan (HP Labs Fort Collins) wrote:
>
>> So then is p==m in dom0 (and driver domains) an unacceptable design
>> alternative for (non-x86) Xen architectures? If it is acceptable,
>> then the question remains:
>
>I think *that* is the critical question here. My feeling is that