Date: Thu, 24 Jul 2008 12:07:20 +0200 From: Dominik Meister <dm-lists@meisternet.ch> To: freebsd-stable@freebsd.org Subject: Re: FreeBSD 7.1 and BIND exploit Message-ID: <20080724100720.GA44545@mercury.meisternet.ch> In-Reply-To: <20080723021146.GO76659@elvis.mu.org> References: <200807212219.QAA01486@lariat.net> <200807221552.m6MFqgpm009488@lurza.secnetix.de> <20080722162024.GA1279@lava.net> <48860CBA.6010903@FreeBSD.org> <488615F5.80405@infracaninophile.co.uk> <4886188E.6090805@FreeBSD.org> <34182EE347F910EA2A64DF03@utd65257.utdallas.edu> <20080723015855.GA36829@eos.sc1.parodius.com> <20080723021146.GO76659@elvis.mu.org>
next in thread | previous in thread | raw e-mail | index | archive | help
--9jxsPFA5p3P2qPhR Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Alfred Perlstein [Tue, Jul 22, 2008 at 07:11:46PM -0700]: > Back in 2003 I tried to set up a "shared key" IPSEC dhcp > at home, basically I'd just make a key and sneaker-net it > to the hosts that wanted to connect, after about 6 hours > I just gave up and used "wep". Completely off-topic (sorry for that) but you should have used OpenVPN. I'm using it for a VPN-over-Wireless and its dead simple. Dominik --=20 Dominik Meister My public GnuPG key is available at http://www.meisternet.ch/gpg.txt --9jxsPFA5p3P2qPhR Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (FreeBSD) iEYEARECAAYFAkiIVFgACgkQVD1CCgD/XK3rkQCfdbvNyBuXSFJ0lkLLMj+UvsD6 C0MAnjkjMrS+YTAjQdl2jjoqpNuccOnb =n1ZG -----END PGP SIGNATURE----- --9jxsPFA5p3P2qPhR--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20080724100720.GA44545>