You can subscribe to this list here.
2008 |
Jan
|
Feb
|
Mar
(41) |
Apr
(35) |
May
(18) |
Jun
(5) |
Jul
(4) |
Aug
(37) |
Sep
(9) |
Oct
(20) |
Nov
(50) |
Dec
(217) |
---|---|---|---|---|---|---|---|---|---|---|---|---|
2009 |
Jan
(212) |
Feb
(76) |
Mar
(113) |
Apr
(88) |
May
(130) |
Jun
(54) |
Jul
(208) |
Aug
(223) |
Sep
(112) |
Oct
(63) |
Nov
(131) |
Dec
(103) |
2010 |
Jan
(247) |
Feb
(130) |
Mar
(43) |
Apr
(92) |
May
(40) |
Jun
(43) |
Jul
(43) |
Aug
(80) |
Sep
(44) |
Oct
(74) |
Nov
(21) |
Dec
(46) |
2011 |
Jan
(36) |
Feb
(11) |
Mar
(21) |
Apr
(33) |
May
(4) |
Jun
(12) |
Jul
(5) |
Aug
(20) |
Sep
|
Oct
(64) |
Nov
(26) |
Dec
(71) |
2012 |
Jan
(13) |
Feb
(24) |
Mar
(11) |
Apr
(2) |
May
(10) |
Jun
(5) |
Jul
(13) |
Aug
(7) |
Sep
(26) |
Oct
(22) |
Nov
(17) |
Dec
(16) |
2013 |
Jan
(6) |
Feb
(6) |
Mar
(6) |
Apr
(8) |
May
(20) |
Jun
|
Jul
(1) |
Aug
(4) |
Sep
(18) |
Oct
(3) |
Nov
(14) |
Dec
(33) |
2014 |
Jan
(26) |
Feb
(6) |
Mar
(69) |
Apr
(10) |
May
|
Jun
(8) |
Jul
(18) |
Aug
(22) |
Sep
(19) |
Oct
(17) |
Nov
|
Dec
(4) |
2015 |
Jan
(14) |
Feb
(18) |
Mar
|
Apr
|
May
(26) |
Jun
(8) |
Jul
(9) |
Aug
(10) |
Sep
(15) |
Oct
(2) |
Nov
(30) |
Dec
(33) |
2016 |
Jan
(1) |
Feb
(24) |
Mar
(19) |
Apr
(1) |
May
|
Jun
(3) |
Jul
(1) |
Aug
(1) |
Sep
(20) |
Oct
(5) |
Nov
(14) |
Dec
(4) |
2017 |
Jan
(15) |
Feb
(35) |
Mar
(10) |
Apr
(9) |
May
(14) |
Jun
(33) |
Jul
(1) |
Aug
(27) |
Sep
(7) |
Oct
|
Nov
(10) |
Dec
(15) |
2018 |
Jan
(29) |
Feb
|
Mar
(2) |
Apr
(1) |
May
(11) |
Jun
|
Jul
(1) |
Aug
(8) |
Sep
(11) |
Oct
(22) |
Nov
(9) |
Dec
(13) |
2019 |
Jan
(1) |
Feb
(7) |
Mar
(3) |
Apr
(21) |
May
(34) |
Jun
(36) |
Jul
(18) |
Aug
(17) |
Sep
(19) |
Oct
(8) |
Nov
(3) |
Dec
|
2020 |
Jan
|
Feb
(4) |
Mar
(8) |
Apr
(29) |
May
(50) |
Jun
(8) |
Jul
(2) |
Aug
(10) |
Sep
(1) |
Oct
(7) |
Nov
(9) |
Dec
(19) |
2021 |
Jan
(2) |
Feb
(9) |
Mar
(6) |
Apr
(21) |
May
(13) |
Jun
(11) |
Jul
(2) |
Aug
(1) |
Sep
(3) |
Oct
(26) |
Nov
(2) |
Dec
(16) |
2022 |
Jan
(8) |
Feb
(7) |
Mar
(1) |
Apr
(13) |
May
(1) |
Jun
(4) |
Jul
(4) |
Aug
(1) |
Sep
(1) |
Oct
|
Nov
|
Dec
(1) |
2023 |
Jan
(2) |
Feb
(3) |
Mar
(16) |
Apr
|
May
(2) |
Jun
(1) |
Jul
(4) |
Aug
(13) |
Sep
(8) |
Oct
(6) |
Nov
(4) |
Dec
|
2024 |
Jan
(3) |
Feb
(3) |
Mar
|
Apr
|
May
(1) |
Jun
|
Jul
(5) |
Aug
|
Sep
(1) |
Oct
|
Nov
(5) |
Dec
|
2025 |
Jan
(4) |
Feb
(2) |
Mar
|
Apr
(11) |
May
(1) |
Jun
(9) |
Jul
(18) |
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
S | M | T | W | T | F | S |
---|---|---|---|---|---|---|
|
|
|
|
|
1
(1) |
2
|
3
|
4
|
5
|
6
|
7
|
8
|
9
|
10
(1) |
11
(4) |
12
(3) |
13
(6) |
14
(7) |
15
(2) |
16
|
17
(1) |
18
(2) |
19
|
20
|
21
(4) |
22
|
23
(2) |
24
|
25
|
26
|
27
|
28
|
29
|
30
|
From: Lonnie A. <li...@lo...> - 2011-04-14 17:19:45
|
OK, I'll change the STUNNELSERVS delimiter from colon (:) to tilde (~) in 0.7.8 . > /Me hates that I chose : as the field separator early on. How short sighted! Don't beat yourself up. :-) Arno (from AIF) did the exact same thing until he switched to a tilde a few years ago. A common choice in the past. Lonnie On Apr 14, 2011, at 12:01 PM, Kristian Kielhofner wrote: > Very interesting indeed... > > I would completely support that configuration change! > > /Me hates that I chose : as the field separator early on. How short sighted! > > On Thu, Apr 14, 2011 at 12:59 PM, Lonnie Abelbeck > <li...@lo...> wrote: >> Kristian, >> >> Another interesting feature of stunnel is to listen on IPv6 and connect to legacy IPv4-only services. >> >> Just a couple changes to stunnel.init are needed to automatically support that. >> >> If we ever wanted to support local IPv6 "connect's" we would have to change the STUNNELSERVS delimiter from a colon to a tilde as we have done elsewhere. Or use a dns name for the local host with a AAAA record. >> >> Lonnie >> > > -- > Kristian Kielhofner > > |
From: Kristian K. <kri...@gm...> - 2011-04-14 17:07:13
|
Very interesting indeed... I would completely support that configuration change! /Me hates that I chose : as the field separator early on. How short sighted! On Thu, Apr 14, 2011 at 12:59 PM, Lonnie Abelbeck <li...@lo...> wrote: > Kristian, > > Another interesting feature of stunnel is to listen on IPv6 and connect to legacy IPv4-only services. > > Just a couple changes to stunnel.init are needed to automatically support that. > > If we ever wanted to support local IPv6 "connect's" we would have to change the STUNNELSERVS delimiter from a colon to a tilde as we have done elsewhere. Or use a dns name for the local host with a AAAA record. > > Lonnie > -- Kristian Kielhofner |
From: Lonnie A. <li...@lo...> - 2011-04-14 16:59:45
|
Kristian, Another interesting feature of stunnel is to listen on IPv6 and connect to legacy IPv4-only services. Just a couple changes to stunnel.init are needed to automatically support that. If we ever wanted to support local IPv6 "connect's" we would have to change the STUNNELSERVS delimiter from a colon to a tilde as we have done elsewhere. Or use a dns name for the local host with a AAAA record. Lonnie On Apr 13, 2011, at 4:31 PM, Kristian Kielhofner wrote: > OpenVPN is used to build SSL encrypted layer 3 or layer 2 tunnels > between two points. > > Stunnel is used to add SSL functionality to any application that uses > a TCP socket. So, for example: > > FreeSWITCH includes an XML-RPC webserver. It doesn't support SSL or TLS. > > You could configure FreeSWITCH to listen on localhost. You would then > configure stunnel to listen on a network facing TCP port (with SSL/TLS > enabled in stunnel). This port would accept TLS/SSL encrypted traffic > and transparently proxy it back to FreeSWITCH listening on localhost. > You could then access the stunnel port with a standard web browser > using HTTPS and it "just works" even though FreeSWITCH doesn't support > SSL natively. > > I use stunnel to transparently encrypt HTTP traffic from a network > security camera. I then access the AstLinux machine over the internet > with HTTPS and AstLinux/stunnel implements the SSL that my network > security camera vendor should have implemented themselves :). I can > do this from any web browser. If I was using openvpn I'd need to > install an openvpn client and build a full blown tunnel. > > On Wed, Apr 13, 2011 at 5:17 PM, Lonnie Abelbeck > <li...@lo...> wrote: >> Kristian, >> >> Thanks for your comments, but how is this different (solution wise) from using the more general OpenVPN between boxes? >> >> Do you prefer we continue supporting stunnel by default in AstLinux? A change has to be made either way. >> >> Lonnie >> >> >> On Apr 13, 2011, at 3:42 PM, Kristian Kielhofner wrote: >> >>> Stunnel is not for VPN services. It's to "bolt on" SSL to other >>> daemons, etc that don't have it. FreeSWITCH socket, Asterisk AMI, >>> come to mind. I like it. >>> >>> On Wed, Apr 13, 2011 at 4:37 PM, Lonnie Abelbeck >>> <li...@lo...> wrote: >>>> Devs, >>>> >>>> If there are no objections, let's remove stunnel support from the default image. >>>> >>>> With all our VPN choices stunnel seems superfluous for our solution. I assume no-one uses it. We will note it in the ChangeLog. >>>> >>>> The version we currently use has moved to their obsolete directory, seems like a good time to uncheck it. >>>> >>>> Lonnie >>> -- >>> Kristian Kielhofner >>> >>> >> >> > > > > -- > Kristian Kielhofner > > |
From: Lonnie A. <li...@lo...> - 2011-04-14 14:05:41
|
On Apr 14, 2011, at 4:30 AM, Michael Keuter wrote: >> Devs, >> >> We have a relatively smooth solution (CF + USB Combo Booting) with >> the upcoming runnix-0.3.3 and AstLinux 0.7.8. >> >> Given a box that can't directly boot off of USB... >> === >> 1) Raw byte transfer ('dd', physdiskwrite, etc.) an AstLinux image >> to both a USB drive and a CF card. >> >> 2) Mount the CF card on a common OS (OS X, Linux, etc.). >> A) Rename the disk from "RUNNIX" to "BOOTONLY" (or use >> dosfslabel in Linux). >> B) Delete the "os" directory. >> C) Eject the CF card, remove the card. >> >> 3) Mount the USB drive on a common OS (OS X, Linux, etc.). >> A) In the "os" directory edit the text file >> "astlinux-xxxxx.run.conf", the line beginning with KCMD=, add the >> space separated >> option rootdelay=10 after the 'astlive' value in the line. >> B) Eject the USB drive, remove the drive. >> >> 4) Finally, install both the CF card and USB drive in your box for >> the AstLinux system. Boot as a normal installation. >> All files will be stored on the USB drive. >> === >> >> Starting with AstLinux 0.7.8 upgrade-run-image from the CLI or >> upgrades via the web interface will automatically propagate the >> rootdelay=10 KCMD value on upgrades, so upgrades on a USB drive >> works just like a CF card. >> >> Note: With runnix-0.3.3 and later, advanced users will notice that >> this 'secondary' disk only requires the AstLinux "os" distribution >> directory and a dosfslabel of RUNNIX on a small (128MB) FAT16 >> partition. The remainder of the unformatted disk will be formatted >> during the AstLinux setup process. >> >> Lonnie > > Should we note this new behavior in the "ChangeLog.txt" or a Wiki page? > > Michael I was thinking a Wiki "Tips and Tricks" item. Lonnie |
From: Michael K. <li...@mk...> - 2011-04-14 09:51:50
|
>Devs, > >We have a relatively smooth solution (CF + USB Combo Booting) with >the upcoming runnix-0.3.3 and AstLinux 0.7.8. > >Given a box that can't directly boot off of USB... >=== >1) Raw byte transfer ('dd', physdiskwrite, etc.) an AstLinux image >to both a USB drive and a CF card. > >2) Mount the CF card on a common OS (OS X, Linux, etc.). > A) Rename the disk from "RUNNIX" to "BOOTONLY" (or use >dosfslabel in Linux). > B) Delete the "os" directory. > C) Eject the CF card, remove the card. > >3) Mount the USB drive on a common OS (OS X, Linux, etc.). > A) In the "os" directory edit the text file >"astlinux-xxxxx.run.conf", the line beginning with KCMD=, add the >space separated > option rootdelay=10 after the 'astlive' value in the line. > B) Eject the USB drive, remove the drive. > >4) Finally, install both the CF card and USB drive in your box for >the AstLinux system. Boot as a normal installation. > All files will be stored on the USB drive. >=== > >Starting with AstLinux 0.7.8 upgrade-run-image from the CLI or >upgrades via the web interface will automatically propagate the >rootdelay=10 KCMD value on upgrades, so upgrades on a USB drive >works just like a CF card. > >Note: With runnix-0.3.3 and later, advanced users will notice that >this 'secondary' disk only requires the AstLinux "os" distribution >directory and a dosfslabel of RUNNIX on a small (128MB) FAT16 >partition. The remainder of the unformatted disk will be formatted >during the AstLinux setup process. > >Lonnie Should we note this new behavior in the "ChangeLog.txt" or a Wiki page? Michael http://www.mksolutions.info |
From: Lonnie A. <li...@lo...> - 2011-04-14 01:42:23
|
On Apr 13, 2011, at 7:14 PM, David Kerr wrote: > > > On Wed, Apr 13, 2011 at 5:31 PM, Kristian Kielhofner <kri...@gm...> wrote: > > I use stunnel to transparently encrypt HTTP traffic from a network > security camera. I then access the AstLinux machine over the internet > with HTTPS and AstLinux/stunnel implements the SSL that my network > security camera vendor should have implemented themselves :). I can > do this from any web browser. If I was using openvpn I'd need to > install an openvpn client and build a full blown tunnel. > > > Kristian, Sounds interesting. How would I do this? I have a panasonic IP camera inside my network that listens on port X. In astlinux I just forward port X to the internal IP address of the camera using the firewall configuration page. How would I configure astlinux to listen for a HTTPS request on a port, unencrypt it, and forward it to the internal IP on port X? > > Thanks, > David David, Assume, camera on 192.168.101.13, port 80, with HTTPS listening on port 8443... Disable your Firewall NAT EXT->LAN rule Add a Firewall Pass EXT->Local to port 8443 Then add to /mnt/kd/rc.conf.d/user.conf -- STUNNELSERVS="8443:192.168.101.13:80" STUNNELUSER="root" -- $ gen-rc-conf $ service stunnel init It seems to be quite chatty to the syslog though. Lonnie |
From: David K. <da...@ke...> - 2011-04-14 00:15:20
|
On Wed, Apr 13, 2011 at 5:31 PM, Kristian Kielhofner < kri...@gm...> wrote: > > > I use stunnel to transparently encrypt HTTP traffic from a network > security camera. I then access the AstLinux machine over the internet > with HTTPS and AstLinux/stunnel implements the SSL that my network > security camera vendor should have implemented themselves :). I can > do this from any web browser. If I was using openvpn I'd need to > install an openvpn client and build a full blown tunnel. > > Kristian, Sounds interesting. How would I do this? I have a panasonic IP camera inside my network that listens on port X. In astlinux I just forward port X to the internal IP address of the camera using the firewall configuration page. How would I configure astlinux to listen for a HTTPS request on a port, unencrypt it, and forward it to the internal IP on port X? Thanks, David |