April 2004 Archives by date
      
      Starting: Sat Apr  3 07:34:38 PDT 2004
         Ending: Thu Apr 29 14:56:43 PDT 2004
         Messages: 193
     
- Security branch lifetime changes
 
Jacques A. Vidrine
 - Security branch lifetime changes
 
Gregory Kuhn
 - IPSec Racoon and Port Forwarding
 
Stephen Rozzo
 - Q: Controlling access at the Ethernet level
 
Andrew Riabtsev
 - Controlling access at the Ethernet level
 
Dan Ros
 - Q: Controlling access at the Ethernet level
 
Adrian Penisoara
 - Q: Controlling access at the Ethernet level
 
Frankye - ML
 - Controlling access at the Ethernet level
 
Sten Daniel Sørsdal
 - Q: Controlling access at the Ethernet level
 
Richy Kim
 - Q: Controlling access at the Ethernet level
 
Clifton Royston
 - Controlling access at the Ethernet level
 
Christopher Rued
 - Controlling access at the Ethernet level
 
Hernan Nuñez
 - SYN attacks
 
Spades
 - SYN attacks
 
Mark Picone
 - SYN attacks (correction)
 
Mark Picone
 - SYN attacks (correction)
 
David
 - Possible security hole in racoon verified on FreeBSD using
	racoon-20030711
 
Ralf Spenneberg
 - Possible security hole in racoon verified on FreeBSD using
	racoon-20030711
 
Devon H. O'Dell
 - Possible security hole in racoon verified on FreeBSD using
	racoon-20030711
 
Michael Nottebrock
 - Possible security hole in racoon verified on FreeBSD using
	racoon-20030711
 
Devon H. O'Dell
 - Note to Racoon users (IKE/ISAKMP daemon)
 
Jacques A. Vidrine
 - Changing `security@freebsd.org' alias
 
Jacques A. Vidrine
 - Changing `security@freebsd.org' alias
 
Matthew George
 - Changing `security@freebsd.org' alias
 
Peter Pentchev
 - Changing `security@freebsd.org' alias
 
David
 - Changing `security@freebsd.org' alias
 
Kevin D. Kinsey, DaleCo, S.P.
 - Changing `security@freebsd.org' alias
 
Brooks Davis
 - Changing `security@freebsd.org' alias 
 
Mark Andrews
 - Changing `security@freebsd.org' alias
 
Avleen Vig
 - Changing `security@freebsd.org' alias
 
Kevin D. Kinsey, DaleCo, S.P.
 - recommended SSL-friendly crypto accelerator
 
Michael W. Lucas
 - recommended SSL-friendly crypto accelerator 
 
Poul-Henning Kamp
 - recommended SSL-friendly crypto accelerator 
 
Mike Tancsa
 - recommended SSL-friendly crypto accelerator 
 
Poul-Henning Kamp
 - recommended SSL-friendly crypto accelerator
 
Rumen Telbizov
 - recommended SSL-friendly crypto accelerator 
 
Mike Tancsa
 - recommended SSL-friendly crypto accelerator
 
Michael W. Lucas
 - recommended SSL-friendly crypto accelerator
 
Jim Zajkowski
 - recommended SSL-friendly crypto accelerator 
 
Poul-Henning Kamp
 - recommended SSL-friendly crypto accelerator 
 
Mike Tancsa
 - recommended SSL-friendly crypto accelerator
 
Michael Reifenberger
 - recommended SSL-friendly crypto accelerator
 
Charles Swiger
 - recommended SSL-friendly crypto accelerator
 
Ulf Zimmermann
 - SYN attacks
 
slimmy baddog
 - recommended SSL-friendly crypto accelerator
 
andy at lewman.com
 - recommended SSL-friendly crypto accelerator
 
Rumen Telbizov
 - recommended SSL-friendly crypto accelerator
 
Lev Walkin
 - recommended SSL-friendly crypto accelerator
 
Rumen Telbizov
 - recommended SSL-friendly crypto accelerator
 
Lev Walkin
 - Q: Controlling access at the Ethernet level
 
Borja Marcos
 - IPSec debug
 
Nikolay Petrov
 - IPSec debug
 
Bjoern A. Zeeb
 - IPSec debug
 
Nikolay Petrov
 - Changing `security@freebsd.org' alias
 
Jamie L. Penman-Smithson
 - fwd: mail server recommendations?
 
Miroslav Lachman
 - recommended SSL-friendly crypto accelerator
 
Michael W. Lucas
 - recommended SSL-friendly crypto accelerator
 
Mike Tancsa
 - recommended SSL-friendly crypto accelerator
 
Mike Tancsa
 - FYI re: "FreeBSD ECE flag ipfw protection bypass"
 
Colin Percival
 - recommended SSL-friendly crypto accelerator
 
andy at lewman.com
 - recommended SSL-friendly crypto accelerator
 
Mike Tancsa
 - recommended SSL-friendly crypto accelerator
 
andy at lewman.com
 - recommended SSL-friendly crypto accelerator
 
Mike Tancsa
 - Testing redirection of security@FreeBSD.org
 
Jacques A. Vidrine
 - recommended SSL-friendly crypto accelerator
 
andy at lewman.com
 - recommended SSL-friendly crypto accelerator
 
andy at lewman.com
 - FreeBSD Security Advisory FreeBSD-SA-04:07.cvs
 
FreeBSD Security Advisories
 - Policy routing with IPFW
 
Stephen Gill
 - Policy routing with IPFW
 
David G. Andersen
 - Policy routing with IPFW
 
Stephen Gill
 - HEADS UP  Re: Changing `security@freebsd.org' alias
 
Jacques A. Vidrine
 - Policy routing with IPFW
 
Crist J. Clark
 - recommended SSL-friendly crypto accelerator
 
Jason Stone
 - recommended SSL-friendly crypto accelerator
 
randall ehren
 - recommended SSL-friendly crypto accelerator
 
Jason Stone
 - Is log_in_vain really good or really bad?
 
Jesper Wallin
 - Is log_in_vain really good or really bad?
 
z3l3zt at hackunite.net
 - Is log_in_vain really good or really bad?
 
D J Hawkey Jr
 - Is log_in_vain really good or really bad?
 
Chuck Swiger
 - Is log_in_vain really good or really bad?
 
Roger Marquis
 - Is log_in_vain really good or really bad?
 
Dag-Erling Smørgrav
 - Is log_in_vain really good or really bad?
 
Crist J. Clark
 - Is log_in_vain really good or really bad?
 
Jason DiCioccio
 - Is log_in_vain really good or really bad?
 
Jesper Wallin
 - Is log_in_vain really good or really bad?
 
Eugene Grosbein
 - Is log_in_vain really good or really bad?
 
Jesper Wallin
 - Is log_in_vain really good or really bad?
 
Devon H. O'Dell
 - Is log_in_vain really good or really bad?
 
Devon H. O'Dell
 - Is log_in_vain really good or really bad?
 
Jesper Wallin
 - VuXML and FreeBSD
 
Jacques A. Vidrine
 - Is log_in_vain really good or really bad?
 
Roger Marquis
 - [patch] Raw sockets in jails
 
Christian S.J. Peron
 - [patch] Raw sockets in jails 
 
Poul-Henning Kamp
 - TCP RST attack
 
Mike Tancsa
 - TCP RST attack
 
Dag-Erling Smørgrav
 - TCP RST attack
 
Dragos Ruiu
 - TCP RST attack
 
Dag-Erling Smørgrav
 - TCP RST attack
 
Mike Tancsa
 - [patch] Raw sockets in jails
 
Christian S.J. Peron
 - TCP RST attack
 
masta
 - TCP RST attack
 
Crist J. Clark
 - [patch] Raw sockets in jails 
 
Poul-Henning Kamp
 - TCP RST attack
 
Charles Swiger
 - TCP RST attack
 
Dragos Ruiu
 - TCP RST attack
 
Matthew Dillon
 - TCP RST attack
 
Mark Johnston
 - TCP RST attack
 
Dragos Ruiu
 - TCP RST attack
 
Charles Swiger
 - TCP RST attack
 
Dag-Erling Smørgrav
 - TCP RST attack
 
Mike Tancsa
 - TCP RST attack
 
Bruce M Simpson
 - TCP RST attack
 
Bruce M Simpson
 - TCP RST attack
 
Mike Tancsa
 - TCP RST attack
 
Bill Fumerola
 - [Full-Disclosure] IETF Draft - Fix for TCP vulnerability (fwd)
 
Darren Reed
 - [Full-Disclosure] IETF Draft - Fix for TCP vulnerability (fwd)
 
Don Lewis
 - [Full-Disclosure] IETF Draft - Fix for TCP vulnerability (fwd)
 
Don Lewis
 - [Full-Disclosure] IETF Draft - Fix for TCP vulnerability (fwd)
 
Mike Silbersack
 - [Full-Disclosure] IETF Draft - Fix for TCP vulnerability (fwd) 
 
Poul-Henning Kamp
 - [Full-Disclosure] IETF Draft - Fix for TCP vulnerability (fwd)
 
Don Lewis
 - TCP RST attack
 
Jacques A. Vidrine
 - TCP RST attack
 
Jacques A. Vidrine
 - [Full-Disclosure] IETF Draft - Fix for TCP vulnerability (fwd)
 
Jacques A. Vidrine
 - TCP RST attack
 
Jacques A. Vidrine
 - TCP RST attack
 
Jacques A. Vidrine
 - [Full-Disclosure] IETF Draft - Fix for TCP vulnerability (fwd)
 
Randall Stewart (cisco)
 - TCP RST attack
 
Tadaaki Nagao
 - 
 Other possible protection against RST/SYN attacks (was Re: TCP
  RST attack
 
Mike Tancsa
 - Other possible protection against RST/SYN attacks (was Re: TCP
	RST attack
 
Jacques A. Vidrine
 - Other possible protection against RST/SYN attacks (was Re:
 TCP RST attack
 
Mike Tancsa
 - [Full-Disclosure] IETF Draft - Fix for TCP vulnerability (fwd)
 
Mike Silbersack
 - Other possible protection against RST/SYN attacks (was Re: TCP
	RST attack
 
Borja Marcos
 - Other possible protection against RST/SYN attacks (was Re:
 TCP RST attack
 
Mike Tancsa
 - Other possible protection against RST/SYN attacks (was Re: TCP
	RST attack
 
Borja Marcos
 - Other possible protection against RST/SYN attacks (was Re: TCP
	RST attack
 
Laurent Frigault
 - Other possible protection against RST/SYN attacks (was Re: TCP
	RST attack
 
Charles Swiger
 - Other possible protection against RST/SYN attacks (was Re:
 TCP RST attack
 
Mike Tancsa
 - Other possible protection against RST/SYN attacks (was Re: TCP
 RST attack
 
Dag-Erling Smørgrav
 - Other possible protection against RST/SYN attacks (was Re: TCP
 RST attack
 
Kevin Stevens
 - Other possible protection against RST/SYN attacks (was Re: TCP
 RST attack
 
Gary Corcoran
 - [Full-Disclosure] IETF Draft - Fix for TCP vulnerability (fwd)
 
Don Lewis
 - Other possible protection against RST/SYN attacks (was Re: TCP
	RST attack
 
Mike Benjamin
 - Other possible protection against RST/SYN attacks (was Re: TCP
	RST attack
 
Tillman Hodgson
 - Other possible protection against RST/SYN attacks (was Re:  TCP
	RST attack
 
Charles Swiger
 - Other possible protection against RST/SYN attacks (was Re: TCP
 RST attack
 
Gary Corcoran
 - Other possible protection against RST/SYN attacks (was Re: TCP
 RST attack
 
E.B. Dreger
 - Other possible protection against RST/SYN attacks (was Re: TCP
 RST attack
 
E.B. Dreger
 - Other possible protection against RST/SYN attacks (was Re: TCP
 RST attack
 
Gary Corcoran
 - Other possible protection against RST/SYN attacks (was Re: TCP
	RST attack
 
Bill Fumerola
 - [Full-Disclosure] IETF Draft - Fix for TCP vulnerability (fwd)
 
Mike Silbersack
 - [Full-Disclosure] IETF Draft - Fix for TCP vulnerability (fwd)
 
Don Lewis
 - Other possible protection against RST/SYN attacks (was Re:
 TCP RST attack
 
Mike Tancsa
 - [Full-Disclosure] IETF Draft - Fix for TCP vulnerability (fwd)
 
Mike Silbersack
 - [Full-Disclosure] IETF Draft - Fix for TCP vulnerability (fwd)
 
Darren Reed
 - Other possible protection against RST/SYN attacks (was Re: TCP
	RST attack
 
Rumen Telbizov
 - Other possible protection against RST/SYN attacks
 
Neo-Vortex
 - [Full-Disclosure] IETF Draft - Fix for TCP vulnerability (fwd)
 
Mike Silbersack
 - [Full-Disclosure] IETF Draft - Fix for TCP vulnerability (fwd)
 
Darren Reed
 - [Full-Disclosure] IETF Draft - Fix for TCP vulnerability (fwd)
 
Mike Silbersack
 - [patch] Raw sockets in jails
 
Devon H. O'Dell
 - [patch] Raw sockets in jails
 
Pawel Jakub Dawidek
 - Fw: [bugtraq] NetBSD Security Advisory 2004-006: TCP protocol and
 implementation vulnerability
 
Frankye - ML
 - Fw: [bugtraq] NetBSD Security Advisory 2004-006: TCP protocol
	and implementation vulnerability
 
Jacques A. Vidrine
 - Fw: [bugtraq] NetBSD Security Advisory 2004-006: TCP protocol
	and implementation vulnerability
 
Jacques A. Vidrine
 - [Full-Disclosure] IETF Draft - Fix for TCP vulnerability (fwd)
 
jayanth
 - [patch] Raw sockets in jails
 
Christian S.J. Peron
 - ipfilter/ipfw + bridge + out checking
 
Aristeu Gil Alves Jr
 - IPsec - got ESP going, but not AH
 
Dan Langille
 - [Full-Disclosure] IETF Draft - Fix for TCP vulnerability (fwd)
 
Mike Silbersack
 - [Full-Disclosure] IETF Draft - Fix for TCP vulnerability (fwd)
 
Don Lewis
 - IPsec - got ESP going, but not AH
 
Greg Troxel
 - use keep state(strict) to mitigate tcp issues?
 
Mipam
 - IPsec - got ESP going, but not AH
 
Dan Langille
 - use keep state(strict) to mitigate tcp issues?
 
Peter Pentchev
 - use keep state(strict) to mitigate tcp issues?
 
Darren Reed
 - [Full-Disclosure] IETF Draft - Fix for TCP vulnerability (fwd)
 
Mike Silbersack
 - [Full-Disclosure] IETF Draft - Fix for TCP vulnerability (fwd)
 
jayanth
 - [Full-Disclosure] IETF Draft - Fix for TCP vulnerability (fwd)
 
Mike Silbersack
 - [Full-Disclosure] IETF Draft - Fix for TCP vulnerability (fwd)
 
Chuck Swiger
 - Proposed RST patch
 
Mike Silbersack
 - Proposed RST patch
 
Don Lewis
 - Proposed RST patch
 
Mike Silbersack
 - use keep state(strict) to mitigate tcp issues?
 
Mipam
 - use keep state(strict) to mitigate tcp issues?
 
Peter Jeremy
 - IPsec - got ESP going, but not AH
 
Crist J. Clark
 - IPsec works, but racoon/IKE does not
 
Dan Langille
 - IPsec works, but racoon/IKE does not
 
Bjoern A. Zeeb
 - IPsec works, but racoon/IKE does not
 
Dan Langille
 - IPsec - got ESP going, but not AH 
 
Greg Troxel
 - Sendmail issues; possible exploit?
 
Nick Golder
 - Sendmail issues; possible exploit?
 
Charles Swiger
 - Sendmail issues; possible exploit?
 
Alex V Eustrop
 - Sendmail issues; possible exploit?
 
Nick Golder
	
 
    
      Last message date: 
       Thu Apr 29 14:56:43 PDT 2004
    Archived on: Tue May  4 03:30:20 PDT 2004
    
   
     
     
     This archive was generated by
     Pipermail 0.09 (Mailman edition).