gutteridge
37dff36670
acronyms.comp: add SBI
2024-05-19 15:47:38 +00:00
ast
aa0f3360a3
. Update the ASCII art timeline for the last two years
...
. In particular, add NetBSD 8.3 to timeline
. Add respective "publication dates" of those points in time
While here, also:
. Fix white space idiosyncracies and opt for https instead of http
. Track some changes made to the FreeBSD version of this file
2024-05-16 12:04:21 +00:00
jschauma
00a3fda738
+FYSA for your situational awareness
...
+NIPR non-classified IP router (network)
+RIPR releasable IP router (network)
+SIPR secret IP router (network)
(all US military speak)
2024-04-10 20:50:18 +00:00
martin
48ac458e6d
Note NetBSD 10.0
2024-03-30 19:33:05 +00:00
jschauma
c4afa3d594
+HPKE, PKE (hybrid) public key encryption (see also: RFC9180)
2024-01-29 16:31:53 +00:00
rin
8641e70f1f
style: One more typo, NFC
2024-01-29 05:42:41 +00:00
rin
5e0085c398
style: Fix typo, NFC
...
"it it" --> "it is" (across a newline)
2024-01-24 04:00:43 +00:00
jschauma
824b2444d2
+HNDL harvest now, decrypt later
2024-01-23 15:58:17 +00:00
jschauma
ff28305c30
+IKM input keying material
2024-01-18 03:33:08 +00:00
jschauma
809c1c26f5
+EPSS Exploit Prediction Scoring System
...
+PED PIN Entry Device
2024-01-02 17:44:00 +00:00
jschauma
3b1e6dbf5b
+NVD national vulnerability database
2023-12-19 15:01:23 +00:00
jschauma
103a2ebfe9
+STEK session ticket encryption key
2023-12-07 16:03:32 +00:00
jschauma
a67bfb8837
add some virtual networking terms
...
+FRR Free Range Routing
+VNI virtual network identifier
+VTEP VXLAN tunnel endpoint
+VXLAN virtual extensible LAN
2023-12-05 19:28:40 +00:00
alnsn
bee81b247f
Add two BTB entries.
2023-11-24 21:17:49 +00:00
jschauma
6f86118736
sort
2023-11-20 21:16:41 +00:00
jschauma
52a375a636
+ML-KEM module-lattice based key-encapsulation mechanism
...
(I previously added "KEM", but now that Kyber is ML-KEM it comes up frequently
enough that 'wtf ml; 'wtf kem' doesn't help folks find the answer.)
2023-11-20 21:11:20 +00:00
jschauma
6656e7e03f
+NTA negative trust anchor
...
(DNSSEC, RFC7646)
2023-11-15 14:03:19 +00:00
jschauma
3ce7bc0e6f
+ROA route origin authorization
2023-10-27 21:28:14 +00:00
jschauma
9136d0f189
+DFZ default-free zone
2023-10-26 13:43:17 +00:00
jschauma
998e343024
well, kinda have to add CSRF now, don't we?
...
+CSRF cross-site request forgery
2023-10-11 01:21:21 +00:00
jschauma
e525aaa3c2
+SSRF server-side request forgery
2023-10-11 01:15:16 +00:00
jschauma
58d481180f
+KEK key encryption key
...
(funny, we already had DEK, those usually come in pairs)
2023-10-10 01:17:19 +00:00
jschauma
da44aa9e30
+DOH DNS over HTTPS
...
+DOQ DNS over QUIC
+DOT DNS over TLS
+DRN Discovery of Network-designated Resolvers
+QUIC Quick UDP Internet Connections
2023-10-04 22:34:23 +00:00
riastradh
5cae6dade6
acronyms.comp: SFP -- Small Form-factor Pluggable
2023-10-02 00:16:42 +00:00
riastradh
5abc41edc6
acronyms.comp: Add various CPU- and barrier-related acronyms.
...
CET, DMB, DSB, HLE, IBT, ISB, MDS, SSB, SSBB, SSBD, TAA, TSX
PR misc/57636
2023-09-30 13:26:31 +00:00
jschauma
8463add209
+VDP vulnerability disclosure policy
2023-09-29 18:56:14 +00:00
jschauma
2f6717845f
+CVSS Common Vulnerability Scoring System
2023-09-21 13:38:03 +00:00
jschauma
bb2c98cdcf
+EPP extensible provisioning protocol (RFC5730)
2023-09-20 15:22:41 +00:00
jschauma
9781eaaf8f
+CERT computer emergency response team
...
+[C]SIRT (computer) security incident response team
+SOC security operations center
2023-09-18 15:19:33 +00:00
gutteridge
50bd1065b4
acronyms.comp: add CAN & ODBC
2023-09-16 21:18:29 +00:00
jschauma
ac405b3154
+CRQC Cryptanalytically Relevant Quantum Computer
2023-09-13 14:12:21 +00:00
jschauma
e64de735dc
+RAT remoate access trojan
2023-09-11 15:07:52 +00:00
jschauma
514a75e0bc
+DAE deterministic authenticated encryption
2023-09-06 19:56:57 +00:00
jschauma
3117ed5920
+IAB - Internet Architecture Board
2023-08-28 15:50:17 +00:00
riastradh
ce8aefde95
style(5): Advise against new struct typedefs and explain why.
...
Proposed on tech-kern:
https://mail-index.netbsd.org/tech-kern/2023/07/11/msg028950.html
Positive feedback to general concept, negative feedback to specifics
and phrasing of the first iteration but no objections to latest
iteration after several weeks at:
https://mail-index.netbsd.org/tech-kern/2023/07/16/msg028994.html
2023-08-07 18:01:42 +00:00
jschauma
503ec6d006
+RAT register allocation table
2023-08-04 15:42:09 +00:00
gutteridge
ee4f5428fe
acronyms.comp: add ONCE
2023-08-04 03:59:00 +00:00
gutteridge
c12abbe8a5
acronyms.comp: add MLO, MMC, SPL
...
It takes a lot of acronyms to boot a kernel!
2023-08-03 02:32:16 +00:00
jschauma
becf7fe907
+CAC - cryptographic access control
2023-07-06 21:10:15 +00:00
jschauma
af9bcbd29f
+CNA (CVE Numbering Authority)
2023-06-15 13:11:20 +00:00
alnsn
54c8a92f80
Add DPDK.
2023-06-12 21:00:38 +00:00
dholland
c644e0a71e
+DPAA
2023-06-11 17:54:18 +00:00
jschauma
c95e8ff987
+CRDT conflict-free replicated data type
...
+UDS Unix Domain Socket
2023-05-26 03:30:57 +00:00
andvar
48564e1bf4
+LRO Large Receive Offload, +RSC Receive Segment Coalescing (win counterpart)
...
PR 57408
2023-05-15 20:54:53 +00:00
nikita
4bd1f9b56f
domains: re-gen with fix.
2023-04-30 22:33:57 +00:00
nikita
ecb9fa21bf
update-domains: replace missed html.
2023-04-30 22:32:51 +00:00
nikita
91b6e48a9b
domains: re-gen
2023-04-30 22:08:42 +00:00
nikita
218d79aa9a
fix update-domains rule.
2023-04-30 22:08:14 +00:00
rillig
5d22d06a84
style: remove mentions of ANSI C
...
The distinction between traditional C and ISO C90 or later is no longer
needed in the style guide. Any old-style code is caught by the
compilers.
https://mail-index.netbsd.org/tech-userlevel/2023/04/15/msg013768.html
https://mail-index.netbsd.org/tech-userlevel/2023/04/17/msg013776.html
2023-04-21 16:12:53 +00:00
dholland
1266f92a00
share/misc/style: Don't prescribe using "extern.h" for all prototypes.
...
That's very 80s.
No objection (or even response, amazingly enough) on tech-userlevel in
two weeks.
2023-04-17 00:37:04 +00:00