Commit Graph

1072 Commits

Author SHA1 Message Date
gutteridge 37dff36670 acronyms.comp: add SBI 2024-05-19 15:47:38 +00:00
ast aa0f3360a3 . Update the ASCII art timeline for the last two years
. In particular, add NetBSD 8.3 to timeline
. Add respective "publication dates" of those points in time
While here, also:
. Fix white space idiosyncracies and opt for https instead of http
. Track some changes made to the FreeBSD version of this file
2024-05-16 12:04:21 +00:00
jschauma 00a3fda738 +FYSA for your situational awareness
+NIPR	non-classified IP router (network)
+RIPR	releasable IP router (network)
+SIPR	secret IP router (network)

(all US military speak)
2024-04-10 20:50:18 +00:00
martin 48ac458e6d Note NetBSD 10.0 2024-03-30 19:33:05 +00:00
jschauma c4afa3d594 +HPKE, PKE (hybrid) public key encryption (see also: RFC9180) 2024-01-29 16:31:53 +00:00
rin 8641e70f1f style: One more typo, NFC 2024-01-29 05:42:41 +00:00
rin 5e0085c398 style: Fix typo, NFC
"it it" --> "it is" (across a newline)
2024-01-24 04:00:43 +00:00
jschauma 824b2444d2 +HNDL harvest now, decrypt later 2024-01-23 15:58:17 +00:00
jschauma ff28305c30 +IKM input keying material 2024-01-18 03:33:08 +00:00
jschauma 809c1c26f5 +EPSS Exploit Prediction Scoring System
+PED    PIN Entry Device
2024-01-02 17:44:00 +00:00
jschauma 3b1e6dbf5b +NVD national vulnerability database 2023-12-19 15:01:23 +00:00
jschauma 103a2ebfe9 +STEK session ticket encryption key 2023-12-07 16:03:32 +00:00
jschauma a67bfb8837 add some virtual networking terms
+FRR	Free Range Routing
+VNI	virtual network identifier
+VTEP	VXLAN tunnel endpoint
+VXLAN	virtual extensible LAN
2023-12-05 19:28:40 +00:00
alnsn bee81b247f Add two BTB entries. 2023-11-24 21:17:49 +00:00
jschauma 6f86118736 sort 2023-11-20 21:16:41 +00:00
jschauma 52a375a636 +ML-KEM module-lattice based key-encapsulation mechanism
(I previously added "KEM", but now that Kyber is ML-KEM it comes up frequently
enough that 'wtf ml; 'wtf kem' doesn't help folks find the answer.)
2023-11-20 21:11:20 +00:00
jschauma 6656e7e03f +NTA negative trust anchor
(DNSSEC, RFC7646)
2023-11-15 14:03:19 +00:00
jschauma 3ce7bc0e6f +ROA route origin authorization 2023-10-27 21:28:14 +00:00
jschauma 9136d0f189 +DFZ default-free zone 2023-10-26 13:43:17 +00:00
jschauma 998e343024 well, kinda have to add CSRF now, don't we?
+CSRF  cross-site request forgery
2023-10-11 01:21:21 +00:00
jschauma e525aaa3c2 +SSRF server-side request forgery 2023-10-11 01:15:16 +00:00
jschauma 58d481180f +KEK key encryption key
(funny, we already had DEK, those usually come in pairs)
2023-10-10 01:17:19 +00:00
jschauma da44aa9e30 +DOH DNS over HTTPS
+DOQ	DNS over QUIC
+DOT	DNS over TLS
+DRN	Discovery of Network-designated Resolvers
+QUIC	Quick UDP Internet Connections
2023-10-04 22:34:23 +00:00
riastradh 5cae6dade6 acronyms.comp: SFP -- Small Form-factor Pluggable 2023-10-02 00:16:42 +00:00
riastradh 5abc41edc6 acronyms.comp: Add various CPU- and barrier-related acronyms.
CET, DMB, DSB, HLE, IBT, ISB, MDS, SSB, SSBB, SSBD, TAA, TSX

PR misc/57636
2023-09-30 13:26:31 +00:00
jschauma 8463add209 +VDP vulnerability disclosure policy 2023-09-29 18:56:14 +00:00
jschauma 2f6717845f +CVSS Common Vulnerability Scoring System 2023-09-21 13:38:03 +00:00
jschauma bb2c98cdcf +EPP extensible provisioning protocol (RFC5730) 2023-09-20 15:22:41 +00:00
jschauma 9781eaaf8f +CERT computer emergency response team
+[C]SIRT (computer) security incident response team
+SOC security operations center
2023-09-18 15:19:33 +00:00
gutteridge 50bd1065b4 acronyms.comp: add CAN & ODBC 2023-09-16 21:18:29 +00:00
jschauma ac405b3154 +CRQC Cryptanalytically Relevant Quantum Computer 2023-09-13 14:12:21 +00:00
jschauma e64de735dc +RAT remoate access trojan 2023-09-11 15:07:52 +00:00
jschauma 514a75e0bc +DAE deterministic authenticated encryption 2023-09-06 19:56:57 +00:00
jschauma 3117ed5920 +IAB - Internet Architecture Board 2023-08-28 15:50:17 +00:00
riastradh ce8aefde95 style(5): Advise against new struct typedefs and explain why.
Proposed on tech-kern:
https://mail-index.netbsd.org/tech-kern/2023/07/11/msg028950.html

Positive feedback to general concept, negative feedback to specifics
and phrasing of the first iteration but no objections to latest
iteration after several weeks at:
https://mail-index.netbsd.org/tech-kern/2023/07/16/msg028994.html
2023-08-07 18:01:42 +00:00
jschauma 503ec6d006 +RAT register allocation table 2023-08-04 15:42:09 +00:00
gutteridge ee4f5428fe acronyms.comp: add ONCE 2023-08-04 03:59:00 +00:00
gutteridge c12abbe8a5 acronyms.comp: add MLO, MMC, SPL
It takes a lot of acronyms to boot a kernel!
2023-08-03 02:32:16 +00:00
jschauma becf7fe907 +CAC - cryptographic access control 2023-07-06 21:10:15 +00:00
jschauma af9bcbd29f +CNA (CVE Numbering Authority) 2023-06-15 13:11:20 +00:00
alnsn 54c8a92f80 Add DPDK. 2023-06-12 21:00:38 +00:00
dholland c644e0a71e +DPAA 2023-06-11 17:54:18 +00:00
jschauma c95e8ff987 +CRDT conflict-free replicated data type
+UDS    Unix Domain Socket
2023-05-26 03:30:57 +00:00
andvar 48564e1bf4 +LRO Large Receive Offload, +RSC Receive Segment Coalescing (win counterpart)
PR 57408
2023-05-15 20:54:53 +00:00
nikita 4bd1f9b56f domains: re-gen with fix. 2023-04-30 22:33:57 +00:00
nikita ecb9fa21bf update-domains: replace missed html. 2023-04-30 22:32:51 +00:00
nikita 91b6e48a9b domains: re-gen 2023-04-30 22:08:42 +00:00
nikita 218d79aa9a fix update-domains rule. 2023-04-30 22:08:14 +00:00
rillig 5d22d06a84 style: remove mentions of ANSI C
The distinction between traditional C and ISO C90 or later is no longer
needed in the style guide. Any old-style code is caught by the
compilers.

https://mail-index.netbsd.org/tech-userlevel/2023/04/15/msg013768.html
https://mail-index.netbsd.org/tech-userlevel/2023/04/17/msg013776.html
2023-04-21 16:12:53 +00:00
dholland 1266f92a00 share/misc/style: Don't prescribe using "extern.h" for all prototypes.
That's very 80s.

No objection (or even response, amazingly enough) on tech-userlevel in
two weeks.
2023-04-17 00:37:04 +00:00