You can subscribe to this list here.
| 2001 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
(96) |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2002 |
Jan
(367) |
Feb
(707) |
Mar
(1352) |
Apr
(1146) |
May
(978) |
Jun
(930) |
Jul
(863) |
Aug
(845) |
Sep
(702) |
Oct
(719) |
Nov
(719) |
Dec
(652) |
| 2003 |
Jan
(1163) |
Feb
(991) |
Mar
(1371) |
Apr
(993) |
May
(1476) |
Jun
(1024) |
Jul
(1093) |
Aug
(1724) |
Sep
(1603) |
Oct
(1275) |
Nov
(989) |
Dec
(746) |
| 2004 |
Jan
(998) |
Feb
(1049) |
Mar
(1045) |
Apr
(661) |
May
(692) |
Jun
(609) |
Jul
(497) |
Aug
(516) |
Sep
(749) |
Oct
(973) |
Nov
(697) |
Dec
(766) |
| 2005 |
Jan
(953) |
Feb
(903) |
Mar
(939) |
Apr
(620) |
May
(599) |
Jun
(645) |
Jul
(502) |
Aug
(522) |
Sep
(504) |
Oct
(666) |
Nov
(570) |
Dec
(551) |
| 2006 |
Jan
(641) |
Feb
(478) |
Mar
(635) |
Apr
(472) |
May
(369) |
Jun
(542) |
Jul
(343) |
Aug
(620) |
Sep
(438) |
Oct
(441) |
Nov
(403) |
Dec
(394) |
| 2007 |
Jan
(556) |
Feb
(427) |
Mar
(662) |
Apr
(549) |
May
(463) |
Jun
(405) |
Jul
(320) |
Aug
(332) |
Sep
(541) |
Oct
(433) |
Nov
(319) |
Dec
(386) |
| 2008 |
Jan
(402) |
Feb
(394) |
Mar
(328) |
Apr
(350) |
May
(262) |
Jun
(274) |
Jul
(353) |
Aug
(483) |
Sep
(277) |
Oct
(391) |
Nov
(220) |
Dec
(230) |
| 2009 |
Jan
(270) |
Feb
(166) |
Mar
(175) |
Apr
(204) |
May
(190) |
Jun
(187) |
Jul
(263) |
Aug
(119) |
Sep
(125) |
Oct
(169) |
Nov
(166) |
Dec
(84) |
| 2010 |
Jan
(108) |
Feb
(154) |
Mar
(82) |
Apr
(104) |
May
(69) |
Jun
(125) |
Jul
(70) |
Aug
(108) |
Sep
(72) |
Oct
(65) |
Nov
(85) |
Dec
(57) |
| 2011 |
Jan
(112) |
Feb
(37) |
Mar
(25) |
Apr
(76) |
May
(61) |
Jun
(42) |
Jul
(104) |
Aug
(106) |
Sep
(56) |
Oct
(118) |
Nov
(98) |
Dec
(59) |
| 2012 |
Jan
(96) |
Feb
(84) |
Mar
(66) |
Apr
(69) |
May
(83) |
Jun
(50) |
Jul
(40) |
Aug
(43) |
Sep
(65) |
Oct
(65) |
Nov
(41) |
Dec
(38) |
| 2013 |
Jan
(46) |
Feb
(60) |
Mar
(123) |
Apr
(66) |
May
(42) |
Jun
(22) |
Jul
(8) |
Aug
(11) |
Sep
(50) |
Oct
(16) |
Nov
(3) |
Dec
(20) |
| 2014 |
Jan
(40) |
Feb
(42) |
Mar
(18) |
Apr
(36) |
May
(49) |
Jun
(18) |
Jul
(33) |
Aug
(49) |
Sep
(42) |
Oct
(54) |
Nov
(16) |
Dec
(7) |
| 2015 |
Jan
(21) |
Feb
(75) |
Mar
(46) |
Apr
(11) |
May
(15) |
Jun
(14) |
Jul
(32) |
Aug
(58) |
Sep
(38) |
Oct
(30) |
Nov
(15) |
Dec
(32) |
| 2016 |
Jan
(11) |
Feb
(22) |
Mar
(14) |
Apr
(53) |
May
(17) |
Jun
(14) |
Jul
(18) |
Aug
(25) |
Sep
(4) |
Oct
(11) |
Nov
(17) |
Dec
(7) |
| 2017 |
Jan
(2) |
Feb
(25) |
Mar
(17) |
Apr
(8) |
May
(13) |
Jun
(27) |
Jul
(17) |
Aug
(8) |
Sep
(2) |
Oct
(24) |
Nov
|
Dec
(7) |
| 2018 |
Jan
(15) |
Feb
|
Mar
|
Apr
(4) |
May
(11) |
Jun
|
Jul
(14) |
Aug
(5) |
Sep
(2) |
Oct
|
Nov
|
Dec
|
| S | M | T | W | T | F | S |
|---|---|---|---|---|---|---|
|
|
|
1
|
2
|
3
|
4
|
5
(1) |
|
6
|
7
|
8
|
9
|
10
|
11
|
12
|
|
13
|
14
|
15
|
16
|
17
|
18
|
19
|
|
20
|
21
|
22
|
23
|
24
|
25
|
26
(8) |
|
27
(4) |
28
(1) |
29
|
30
|
31
|
|
|
|
From: Eric O. <eri...@gm...> - 2016-03-28 08:12:15
|
Sorry, forgot to repply to the List... Hi Darren I essence we can take any text and images, and wrap it in xml markup to create the documents, which is semi-automated,provided you have a suitable build system. I tended to drop in chunjks of text and continually rebuild the docs to catch errors as I went. Then you need admin rights to add the changes to the SVN repo, and upload the new html chunks to the IPCop website. It's a while since I worked on the documentation, and I think the box that I did it on my have been retired, so you may be in the hands of another keen volunteer. It is all documented in SVN, but it can take a while to get back up to speed :o) Eric On 27 March 2016 at 21:31, Darren Conway <dar...@xt...> wrote: > Hello > > How do I contribute to IPCop documentation. > I wrote a detailed set of instructions to PXEboot to a CF card on an > Alix sbc. > I posted these on a website that has now disappeared. > > I am currently programming a new CF and updating the list of tools. I am > writing instructions as I go that I can follow myself next time. Others > may find them useful as well. > > Regards > > Darren Conway > > > > --- > This email has been checked for viruses by Avast antivirus software. > https://www.avast.com/antivirus > > > > ------------------------------------------------------------------------------ > Transform Data into Opportunity. > Accelerate data analysis in your applications with > Intel Data Analytics Acceleration Library. > Click to learn more. > http://pubads.g.doubleclick.net/gampad/clk?id=278785351&iu=/4140 > _______________________________________________ > IPCop-user mailing list > IPC...@li... > Manage your subscription or unsubscribe > https://lists.sourceforge.net/lists/listinfo/ipcop-user > |
|
From: Darren C. <dar...@xt...> - 2016-03-27 20:45:53
|
Hello How do I contribute to IPCop documentation. I wrote a detailed set of instructions to PXEboot to a CF card on an Alix sbc. I posted these on a website that has now disappeared. I am currently programming a new CF and updating the list of tools. I am writing instructions as I go that I can follow myself next time. Others may find them useful as well. Regards Darren Conway --- This email has been checked for viruses by Avast antivirus software. https://www.avast.com/antivirus |
|
From: Chris B. <chr...@ch...> - 2016-03-27 15:36:25
|
On Sunday 27 Mar 2016 13:04:24 Andrew McGlashan wrote: > On 27/03/2016 1:44 PM, Jeffrey S. Russell wrote: > > Version 3 will use systemd. No idea currently of the release plan on > > version 3. > > No, stay away from that devil [systemd]. > > Time to use OPNSENSE I think. > > https://opnsense.org/ > > Cheers > AndrewM > Do any of these firewall systems accept IPv6? BT claim that all their UK subscribers should have IPv6 by December 2016. Chris Bell |
|
From: Andrew M. <and...@af...> - 2016-03-27 12:26:07
|
On 27/03/2016 1:44 PM, Jeffrey S. Russell wrote: > Version 3 will use systemd. No idea currently of the release plan on > version 3. No, stay away from that devil [systemd]. Time to use OPNSENSE I think. https://opnsense.org/ Cheers AndrewM |
|
From: Jeffrey S. R. <jef...@ru...> - 2016-03-27 02:44:41
|
Version 3 will use systemd. No idea currently of the release plan on version 3. -----Original Message----- From: Brad Morgan [mailto:b-m...@co...] Sent: Saturday, March 26, 2016 6:24 PM To: 'Renaud (Ron) OLGIATI' <re...@ol...>; ipc...@li... Subject: Re: [IPCop-user] GNU C Library: Multiple vulnerabilities > Does IPFire use systemd or sysvinit ? IPFire uses sysvinit ---------------------------------------------------------------------------- -- Transform Data into Opportunity. Accelerate data analysis in your applications with Intel Data Analytics Acceleration Library. Click to learn more. http://pubads.g.doubleclick.net/gampad/clk?id=278785351&iu=/4140 _______________________________________________ IPCop-user mailing list IPC...@li... Manage your subscription or unsubscribe https://lists.sourceforge.net/lists/listinfo/ipcop-user |
|
From: Renaud (R. O. <re...@ol...> - 2016-03-26 23:12:26
|
On Sat, 26 Mar 2016 16:23:39 -0600
"Brad Morgan" <b-m...@co...> wrote:
> > Does IPFire use systemd or sysvinit ?
>
> IPFire uses sysvinit
Thank $DEITY !
And thanks for the info.
Cheers,
Ron.
--
We are upping our standards ...
so up yours.
-- Pat Paulsen for President
-- http://www.olgiati-in-paraguay.org --
|
|
From: Brad M. <b-m...@co...> - 2016-03-26 22:21:18
|
> Does IPFire use systemd or sysvinit ? IPFire uses sysvinit |
|
From: Renaud (R. O. <re...@ol...> - 2016-03-26 21:45:44
|
On Sat, 26 Mar 2016 12:24:50 -0600
"Brad Morgan" <b-m...@co...> wrote:
> I was a loyal IPCop user but I've switched to IPFire
Does IPFire use systemd or sysvinit ?
Cheers,
Ron.
--
Eschew sesquipedalian circumlocutory obfuscation.
-- http://www.olgiati-in-paraguay.org --
|
|
From: Spyros T. <st...@ya...> - 2016-03-26 19:27:05
|
-------------------------------------------- On Sat, 26/3/16, Jeffrey S. Russell <jef...@ru...> wrote: Subject: Re: [IPCop-user] GNU C Library: Multiple vulnerabilities To: "'Ranbir'" <m3...@th...>, ipc...@li... Date: Saturday, 26 March, 2016, 19:59 I've been using IPFire for two years now and am quite happy with it. It has VRRP and IDS/IPS as well, which were good bonuses for my usage. The core team is really good at getting updates out, especially for security fixes. -----Original Message----- From: Ranbir [mailto:m3...@th...] Sent: Saturday, March 26, 2016 12:22 PM To: ipc...@li... Subject: Re: [IPCop-user] GNU C Library: Multiple vulnerabilities On Sat, 2016-03-26 at 11:50 +0200, Tapani Tarvainen wrote: > While I understand developers are busy volunteers, patching security > bugs fast is something I think a firewall distro should prioritize > rather high. I love IPCop and it's been the only firewall distro I've ever used (over 10 years now). But, development is slow and it shouldn't be. Thus, I've been considering switching to something else that's much more active. The only problem is I don't know what to switch to. :/ -- Ranbir ------------------------------------------------------------------------------- Don't like IpFire one bit . I currently have only three sites using IpCop v1.4.x since I had a lot of issues with blocking traffic and DMZ on v2.1.x so I was forced to downgrade back to v1.4.x. For the rest of the sites I was _saved_ by Mikrotik. It lacks some functionality that is paramount and easy to use on IpCop but it saved me on remote locations where there exist Voltagage outages and fluctuations. Not the same with ipcop. Not because of ipcop per se. More of the fact that it runs on PC hardware that is prone to faults and very sensitive to such issues. s. |
|
From: Brad M. <b-m...@co...> - 2016-03-26 18:41:15
|
> I love IPCop and it's been the only firewall distro I've ever used (over 10 years now). But, development is slow and it shouldn't be. > Thus, I've been considering switching to something else that's much more active. The only problem is I don't know what to switch to. :/ I was a loyal IPCop user but I've switched to IPFire (http://www.ipfire.org/), originally cloned from IPCop but which is significantly more active. Latest release is 2.17 - Core Update 99 released March 5, 2016. |
|
From: Jeffrey S. R. <jef...@ru...> - 2016-03-26 18:15:14
|
I've been using IPFire for two years now and am quite happy with it. It has VRRP and IDS/IPS as well, which were good bonuses for my usage. The core team is really good at getting updates out, especially for security fixes. -----Original Message----- From: Ranbir [mailto:m3...@th...] Sent: Saturday, March 26, 2016 12:22 PM To: ipc...@li... Subject: Re: [IPCop-user] GNU C Library: Multiple vulnerabilities On Sat, 2016-03-26 at 11:50 +0200, Tapani Tarvainen wrote: > While I understand developers are busy volunteers, patching security > bugs fast is something I think a firewall distro should prioritize > rather high. I love IPCop and it's been the only firewall distro I've ever used (over 10 years now). But, development is slow and it shouldn't be. Thus, I've been considering switching to something else that's much more active. The only problem is I don't know what to switch to. :/ -- Ranbir |
|
From: Ranbir <m3...@th...> - 2016-03-26 16:38:21
|
On Sat, 2016-03-26 at 11:50 +0200, Tapani Tarvainen wrote: > While I understand developers are busy volunteers, patching security > bugs fast is something I think a firewall distro should prioritize > rather high. I love IPCop and it's been the only firewall distro I've ever used (over 10 years now). But, development is slow and it shouldn't be. Thus, I've been considering switching to something else that's much more active. The only problem is I don't know what to switch to. :/ -- Ranbir |
|
From: Tapani T. <ip...@ta...> - 2016-03-26 09:50:59
|
There's still been no glibc patch for IpCop, and I just noticed there wasn't even a ticket open about this (I opened one now). This is getting a bit long in the tooth. I can't help wondering if there's something in IpCop development process that makes it difficult to do small patches quickly, or is there something in this case that makes updating just glibc complicated. While I understand developers are busy volunteers, patching security bugs fast is something I think a firewall distro should prioritize rather high. -- Tapani Tarvainen On Fri, Feb 19, 2016 at 07:44:46PM +0200, Tapani Tarvainen (ip...@ta...) wrote: > Yes it is, at least CVE-2015-7547. And it should be patched ASAP. > > As an interim band-aid, something like this in rc.firewall.local might help: > > iptables -A CUSTOMINPUT -p udp -m udp --dport 53 -m length --length 513:65535 -j DROP > iptables -A CUSTOMINPUT -p tcp -m tcp --dport 53 -m length --length 1025:65535 -j DROP > > -- > Tapani Tarvainen > > On Thu, Feb 18, 2016 at 07:21:47PM +0100, Dan Johansson (ip...@dm...) wrote: > > > Hi All, > > > > Does anyone here know if IPCop (2.1.9) is affected by these glibc > > vulnerabilities: > > > > * The Google Security Team and Red Hat discovered a stack-based buffer > > overflow in the send_dg() and send_vc() functions due to a buffer > > mismanagement when getaddrinfo() is called with AF_UNSPEC > > (CVE-2015-7547). > > * The strftime() function access invalid memory when passed > > out-of-range data, resulting in a crash (CVE-2015-8776). > > * An integer overflow was found in the __hcreate_r() function > > (CVE-2015-8778). > > * Multiple unbounded stack allocations were found in the catopen() > > function (CVE-2015-8779). > > > > Regards, > > -- > > Dan Johansson > > *************************************************** > > This message is printed on 100% recycled electrons! > > *************************************************** |
|
From: David W S. <da...@da...> - 2016-03-05 22:39:00
|
On Sat, 27 Feb 2016 16:33:38 -0300, Renaud (Ron) OLGIATI wrote: > In reply to a query about configuring Debian as a firewall, I suggested > using IPCop instead. > > This provoked the heated reply I am forwarding below. > > Would any IPCop guru care to comment ? > > Cheers, > > Ron. > > > Begin forwarded message: > > Reco <rec...@gm...> wrote: > >> > I know that is possible to build a firewall using Debian. > >> It is possible, but why go to the bother when you have dedicated >> distributions like IPCop that come ready to go, and are by design more >> secure than a specially-configured Debian will be. > > Please. "Out-of-the-box" IPCop (version 2.1.8 I just grabbed from the > Sourceforge) does have: > > 1) No meaningful DNSSEC capability. > > 2) Presence of libfontconfig.so *and* fonts for no good reason. > > 3) Bunch of questionable quality root-owner SUID binaries in > /usr/local/bin, intended to be called from Web-interface. > > 4) Lack of any pre-installed IDS. > > 5) Outdated kernel 3.4, configured *without* SELinux, Apparmor or tomoyo > support. > > > Oh, did I mention that *primary* download mirror for this distribution > is the Sourceforge? > > IPCop can be an interesting solution for a host on an internal network, > which nobody intends to poke, but suggesting putting *this* to serve as > a firewall from an Internet is a joke. > > Reco > > He lost me at SELinux and similar programs. Those are aimed at multiple users logged into a machine and controlling access as to which user can execute, read, or what to which process. SELinux, APParmour and the like have always seemed like solutions looking for a problem in the decade plus they have been here. While I swear by Debian as a server OS, as a MythTV appliance base (uses third party repos) and even as a decent laptop OS, Workstation OS etc, I prefer a dedicated, hardened, specific, non bloated tiny OS for firewall/routing that was developed to only run as a dedicated firewall appliance. He may be doing Debian a disservice with his noisy negativist rant. IDS, well, I have yet to see a decent one in Linux. When IPCop had it it was the most misunderstood and misused feature it had plus it would eat up over 100MB of ram per monitored interface, give mostly false positives caused by bogus rules and then some of those bogus rules would be removed on the next rules update, new rules added and then some of those new rules would end up being bogus and throwing false positives. This cycle runs from from here to eternity. To those considering PFsense, I recommend looking at Opnsense which forked from PFsense when Netgate bought PFsense and closed down much of the access to the code. Pfsense was a fork of Monowall. The author of Monowall endorsed Opnsense as the worthy successor and discontinued Monowall as having served it's purpose. Dave Studeman http://www.raqcop.com |