From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id 8598B138350 for ; Sat, 18 Jan 2020 17:58:22 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 85FE8E08F5; Sat, 18 Jan 2020 17:58:16 +0000 (UTC) Received: from smtp.hosts.co.uk (smtp.hosts.co.uk [85.233.160.19]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id 187E7E081B for ; Sat, 18 Jan 2020 17:58:15 +0000 (UTC) Received: from [81.135.72.163] (helo=[192.168.1.118]) by smtp.hosts.co.uk with esmtpa (Exim) (envelope-from ) id 1issMP-0007vY-5O for gentoo-user@lists.gentoo.org; Sat, 18 Jan 2020 17:58:14 +0000 Subject: Re: [gentoo-user] .tmp-unverified-download-quarantine To: gentoo-user@lists.gentoo.org References: <9c2f9c8d-6364-0c64-72f6-fccce037a85b@verizon.net> <5E230D1F.1080607@youngman.org.uk> <8e3fd898-9871-a28e-6a9a-7374a41b9804@web.de> From: Wols Lists Message-ID: <5E234734.7080209@youngman.org.uk> Date: Sat, 18 Jan 2020 17:58:12 +0000 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.7.0 Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-user@lists.gentoo.org Reply-to: gentoo-user@lists.gentoo.org X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply MIME-Version: 1.0 In-Reply-To: <8e3fd898-9871-a28e-6a9a-7374a41b9804@web.de> Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: 8bit X-Archives-Salt: 671c448b-522e-4bb0-9838-e8c83b048b8c X-Archives-Hash: 06ad192fe1e10a7510f7f7e0fdeb209b On 18/01/20 17:45, n952162 wrote: > What protocol doesn't use acknowledgements? > Why would an eavesdropper want to acknowledge ANYTHING? Isn't that the whole point? Cheers, Wol > > On 2020-01-18 14:50, Wols Lists wrote: >> On 16/01/20 21:01, james wrote: >>> On 1/13/20 3:24 AM, n952162 wrote: >>>> On 2020-01-12 16:48, james wrote: >>>>> I also install and re-install, as many of the gentoo systems get >>>>> "attacked" before I can� complete a secure install, or the hackers >>>>> just read much more than I do. >>>>> I guess I'm still popular, in very negative way. >>>> >>>> Hmmm.� Is that "attacked" to be interpreted in some sort of >>>> metaphorical >>>> way or do you mean really hacked over the internet? May I ask how, and >>>> how do you know?� What's involved in a secure install? >>> >>> Monitor your connection, with a system setup that the ethernet does not >>> responds to any sort of request. The system just collects and log. NO, >>> I'm not documenting how to do this, but various ways exist, documented >>> on the internet to make *most* ethernet interface to where they are >>> *one-direction* only. HOW you achieve this? There are a myriad of ways. >>> >>> Good Hunting and *never* tell anyone how *you* do this.... >>> >> If you're handy with an ethernet crimping tool, just cut the TX wires >> and put the interface into promiscuous mode ... >> >> Just be aware that - routers especially - can swap TX and RX so they >> could possibly get round that. >> >> Cheers, >> Wol >> >> > >