[00:29:52] --- Simon Wilkinson has left [00:35:09] --- Russ has left: Disconnected [03:46:31] --- pod has left [03:54:22] --- pod has become available [04:19:43] --- sxw has become available [04:24:40] --- sxw has left [05:45:18] --- sxw has become available [05:47:30] --- sxw has left [06:54:33] --- deason has become available [07:08:51] --- reuteras has left [07:35:09] --- jaltman/FrogsLeap has left: Disconnected [07:42:45] --- jaltman/FrogsLeap has become available [07:45:06] --- jaltman/FrogsLeap has left: Replaced by new connection [07:45:06] --- jaltman/FrogsLeap has become available [07:57:49] --- sxw has become available [07:58:25] --- sxw has left [08:33:21] --- jaltman/FrogsLeap has left: Replaced by new connection [08:33:22] --- jaltman/FrogsLeap has become available [08:57:49] Marshall, can you look into this? The U.S. Department of Homeland Security issued a call for proposals this week in a $40m program to encourage research and development in a wide range of topics related to cyber security: from designing more resilient software, to alternatives to passwords and CAPTCHA technology to prevent automated attacks. DHS laid out its areas of interest in a Broad Agency Announcement (BAA) dated January 26. In it, the domestic security agency said it was soliciting papers and proposals centered on 14 different topic areas. At stake is $40m in federal funding for research and development, with individual grants ranging up to $3 million. DHS's areas of interest include software assurance, enterprise security metrics, usable security, as well as the challenges posed by insider threats." [08:58:11] See if Heimdal can get funded under this [08:58:19] Perhaps a hardware kdc [09:16:31] --- sxw has become available [09:18:05] oops, wrong window [09:18:34] --- jaltman/FrogsLeap has left: Disconnected [09:18:42] --- jaltman/FrogsLeap has become available [09:18:57] --- sxw has left [09:21:58] --- jaltman/FrogsLeap has left: Disconnected [11:29:16] --- jaltman/FrogsLeap has become available [12:50:29] --- jaltman/FrogsLeap has left: Replaced by new connection [12:50:30] --- jaltman/FrogsLeap has become available [13:36:57] --- jaltman/FrogsLeap has left: Replaced by new connection [13:36:57] --- jaltman/FrogsLeap has become available [14:55:18] --- jaltman/FrogsLeap has left: Disconnected [14:55:27] --- jaltman/FrogsLeap has become available [15:40:29] --- deason has left [17:27:04] --- rra has become available [19:30:02] --- jaltman/FrogsLeap has left: Disconnected [20:52:18] --- deason has become available [21:15:40] --- jaltman/FrogsLeap has become available [21:48:14] --- deason has left [22:10:28] Since my freebsd VM still won't boot a recent version, I'm thinking about running a buildbot slave in a jail on my dev machine. I don't really want to burn another IP address on it, but it looks like I only need to open up one port to talk to the buildbot master? If so, that could pretty easily be forwarded to the slave with a firewall rule. [22:14:55] buildbot connections are all initiated by the slave [22:27:27] --- jaltman/FrogsLeap has left: Replaced by new connection [22:27:28] --- jaltman/FrogsLeap has become available [23:17:27] --- reuteras has become available