Re: Missing LIST_PREV() ?

2007-05-06 Thread Mark Murray
Hans Petter Selasky writes:
 Hi,
 
 Why should LISTs only be forward traversable? The following piece of
 code make lists backward traversable:

No objection to the concept.

But...

 /sys/sys/queue.h:
 
 +#define LIST_PREV(head,elm,field) \
 +  (((elm) == LIST_FIRST(head)) ? ((__typeof(elm))0) : \
 +   ((__typeof(elm))(((uint8_t *)((elm)-field.le_prev)) - \
 +   ((uint8_t *)LIST_NEXT((__typeof(elm))0,field)

Please don't use typeof; it is a GCCism. Do you really mean NULL?

M
--
Mark R V Murray - Cert APS(Open) Dip Phys(Open) BSc Open(Open)


___
freebsd-hackers@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: ProPolice: best way to fill canary

2005-07-09 Thread Mark Murray
Sam Leffler writes:
I asked a certain person to add the obsd sysctl long ago but it never 
happened.

That would be me.

And it wouldn't be the first time a ball got dropped. I'll get to 
it. :-]

M
--
Mark R V Murray
What is the most interesting question you have asked?
What, if any, was the answer?


___
freebsd-hackers@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: Protection from the dreaded rm -fr /

2004-10-04 Thread Mark Murray
Thomas David Rivers writes:
   If I'm remembering correctly - the historical way to
  do this is to alias the rm command to something that
  else that checks the arguments and complains appropriately
  (and then executes /bin/rm.)   Typically with just a shell
  alias.  That keeps you from accidently doing something. 

Yeah.

$ alias rm=rm -i

and you get the annoying  confirm all deletes behaviour.

   Just thinking that putting extra smarts into a utility
  isn't the typical UNIXy way to do this.  Let each tool
  do the one thing it does really well.. 'rm' removes; let
  it remove.

Right. There are SO many special cases here that rm cannot possibly
catch them all:

# cd / ; rm -rf foo/ *
^
This space is a typo.

   I think, in the old UNIX Review magazine (what - almost
  15+ years ago now?)  There was a couple of examples of this.

Many others as well.

Windows' job is to prevent you from shooting yourself in the foot. With
UNIX, the idea is to make damn sure that there is a hole in your foot with
the greatest possible efficiency. (Paraphrased)

I've typed rm -rf * in the wrong place. ONCE. I learned Unix-fu from that
experience. Now, if I type rm anything, I wake up.

M
--
Mark Murray
iumop ap!sdn w,I idlaH
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: How to build lint libraries, e.g. llib-lc.ln?

2004-06-14 Thread Mark Murray
Alexander Mueller writes:
 when writing C applications I'd like to check them using lint.
 Unfortunately FreeBSD comes with only llib-lposix.ln and
 llib-lstdc.ln in /usr/libdata/lint. Is there an easy, i.e.
 automated, way to create lint libraries (e.g. llib-lc.ln) for
 all the libs in /usr/src/lib?

yes.

In current use
WANT_LINT= yes
in /etc/make.conf. This won't work in STABLE; I haven't MFCed it.

M
--
Mark Murray
iumop ap!sdn w,I idlaH
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: freebsd-hackers Digest, Vol 42, Issue 6

2004-01-09 Thread Mark Murray
YACINE GHANJAOUI writes:
 Anyone help me how to untar a file with this extention file.tar.bz2 ?
 Thanks,

This is really questions@ material, but...

$ tar -y

M
--
Mark Murray
iumop ap!sdn w,I idlaH
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: Where is FreeBSD going?

2004-01-07 Thread Mark Murray
Paul Robinson writes:
 In short, you can put all the effort you want in, but -core and many 
 with a commit bit will resent you for it, because you're just a user.
 
 4. In private I've already apologised for that particualr comment as I 
 realise now it was very Daily Mail of me to make it (for those of you 
 without access to the Daily Mail, congratualations), and it's only fair 
 as it spilled out onto the public lists, that I apologise here too. Mark 
 also apologised for swearing at me.

I consider hands to have been shaken over this. :-).

 And for those of you who normally shout Submit a patch - well, I'm 
 thinking about it. :-)

I've been thinking of your objection to the submit a patch reply,
and I offer this as a proto-thought on how it can be applied to
non-coders:

As FreeBSD is a volunteer project, I suspect part of the problem
is getting said volunteers to do things that they would otherwise
not do. Submit a patch can be easily(?) extendted to cover a much
wider area of volunteer-organised work than simply code. Under
specifically _patches_, there are code, documentation and web page
patches, but there is also a need for organizational skills. The
PR database frequently gets blitzed by keen folks who get lots of
PRs closed, follwed by burnout.  We are doing rather well with our
release-engineering team (Go Scott L!), and our currently active
admin@ crowd are doing a great job, but we could still use skills,
and these are not necessarily of the coding kind.

SO - instead of submit a patch perhaps if we were to go submit
something tangible and useful?

This can be anything that will forward the progress of FreeBSD. It
could be something lofty like paying the salary of a developer who
will then work primarily on projects useful to yourself. It could
be commissioned work for a particular project you would like to see
done. It could be a financial or equipment donation. It could be a
donation of your time in a way that would be useful (please help
here by finding something that needs doing and offering to do it,
rather than expecting us geeks to find it for you!).  It could be
_anything_ that forwards the aims of the project and that you can
do, and it preferably needs to be something that can be done
autonomously (or as autonomously as possible). You will not get
paid, you may not get thanked, but you will have the satisfaction
of actually getting something done, and if you like FreeBSD as much
as I do, that is an end in itself!

M
--
Mark Murray
iumop ap!sdn w,I idlaH
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: SVBUG what happened tonight (12-04-2003)

2003-12-05 Thread Mark Murray
Hi

Could you please discuss spam issues on a spam list. Your mail
has nothing to do with FreeBSD.

I'm sorry about your car accident, but that is also not hackers@
material. It is, however OK for [EMAIL PROTECTED]

Thanks!

M

[EMAIL PROTECTED] writes:
 Announcement for 2003-12-04
 Topic: What happened to me tonight.
 
 The reflections of a night can at times be beyond one's control.
 
 To make it short, I got in a car accident tonight. I am okay,
 nothing wrong; just a shaken realization. As the CHP officer said, 
 your still alive. And I am glad of that.
 
 My vehicle is totaled and replacement will not be easy. At least
 not as easy as when I worked in the tech sector. My decision
 has been and always will be to stay in computers.  However, it's
 a pity that my life decisions are not as good a my technical.
 (some might argue otherwise).
 
 To surmise I'm a bit melancholy, but what's important to you
 is this:
 
 Jon Syrstad of Ampex has confirmed that my findings that
 using a white list is the key to avoiding spam.  He estimates
 that within a month his job of reviewing the daily SPAM from
 8 times a day for legitamite email to once.
 
 Jon uses a full set of tools and is personally charged by
 the CEO to reduce SPAM. He has both commercial and open
 source tools. None have been or will every be as effective
 as a white list, consisting of family, friends, business
 associates and people you really want to talk to.
 
 So, as a local company selling cell phone service likes to say,
 get off 'their' clock, permission to speak freely.
 
 
   Thank You
   Jessem.
 
 ___
 [EMAIL PROTECTED] mailing list
 http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
 To unsubscribe, send any mail to [EMAIL PROTECTED]
--
Mark Murray
iumop ap!sdn w,I idlaH
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: Size-independent byte order swapping functions.

2003-11-25 Thread Mark Murray
David Schultz writes:
  I'm not sure if dedicated epanic() is the best way to implement out-of-rang
 e
  errors prevention - the more handy solution should cause compile error.
 
 See CTASSERT.

There is an extremely limited number of sizes that are possible here,
even with weird/theoretical architectures like 256-bit machines. Doesn't
it make sense just to presume that out-of-range is impossible, and recode
for default if (sizeof(x) == 1) return x; (ignore syntax) ?

M
--
Mark Murray
iumop ap!sdn w,I idlaH
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: User asks: can we decouple device vendor IDs from drivers?

2003-11-01 Thread Mark Murray
M. Warner Losh writes:
 The problem with decoupling things entirely from the drivers is that
 many drivers will say if I have this revision of that card, do this
 workaround. or if I'm this or newer, I have this feature both of
 which are broken by the kernel forcing the driver to service a given
 hunk of hardware.

Hmm. Careful design may sort this out, methinks. If the file (which
sounds analagous to /boot/device.hints to me) turned devid's into
generic griver requrements (DEVID(0x04589045) == driver(foo) revision(bar)
flags(baz, qux)) would that not be usable? (/me wonders if he has the time
to do this - he's certainly interested)

The other down side is that when you bork the alias
 file on solaris, you are so hozed.

... like most of the files in /boot/...

 However, it would make the dynamic loading of drivers easier.  

I really like to concept of configuring things with vi(1), instead of
with gcc :-)

M
--
Mark Murray
iumop ap!sdn w,I idlaH
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: no subject

2003-10-22 Thread Mark Murray
maya Haddad writes:
 would you help me in writing network LKM under linux kernel 2.4, small examol
 e would be good.

You sent this to a FreeBSD list, you need to find a Linux list instead.

M
--
Mark Murray
iumop ap!sdn w,I idlaH
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: building sshd

2003-10-18 Thread Mark Murray
Adil Katchi writes:
 I'm trying to build sshd from src/crypto/openssh and I'm having problems.
 I've only modified auth2.c.  I've followed the FREEBSD-upgrade instructions.
 So, this is what I've done:
 
 1.  autoconf // to generate the configure file
 2.  autoheader // got a bunch of warnings but no errors
 3.  ./configure --with-pam --with-s-key// PAM was configured, but S/Key
 wasn't.. dunno why yet
 4.  make sshd // below are the errors I got after a bunch of warnings

No.

That is NOT how its built.

Look at src/secure/*/*ssh*/Makefile

M
--
Mark Murray
iumop ap!sdn w,I idlaH
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: replacing sendmail with qmail

2003-06-26 Thread Mark Murray
Alin-Adrian Anton writes:
 Hi guys,
 
 As sendmail showed to be so vulnerable in the past, and even in the 
 recent past, I was wondering to propose removing it from the default 
 install on freebsd. Currently, sendmail comes with the system sources, 
 and runs as root. I think this is bad, and it could be replaced with 
 qmail, for example. Or, something else, if you think something else is 
 more secure. Please let me know if this is possible, or why if not, and 
 to whom shall I address this idea (I wonder why it didn't happen yet).

Please look for this topic in the archives. It has been discussed
VERY many times.

M
--
Mark Murray
iumop ap!sdn w,I idlaH
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: Forged subscriptions and the troll.

2003-06-03 Thread Mark Murray
Pawel Jakub Dawidek writes:
 On Sun, Jun 01, 2003 at 04:46:10PM +0100, Mark Murray wrote:
 + We are currently being attacked by an individual who is attempting
 + to mass-subscribe our lists to other mailing lists.
 +=20
 + PLEASE DO NOT RESPOND TO ANY OF THIS MAIL! I am taking care of it.
 +=20
 + Thank you for your co-operation. :-)
 
 Maybe is time to disallow posting for non-members on selected lists?

As I said, I'm taking care of things.

M
--
Mark Murray
iumop ap!sdn w,I idlaH
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to [EMAIL PROTECTED]


Forged subscriptions and the troll.

2003-06-02 Thread Mark Murray
Hi

We are currently being attacked by an individual who is attempting
to mass-subscribe our lists to other mailing lists.

PLEASE DO NOT RESPOND TO ANY OF THIS MAIL! I am taking care of it.

Thank you for your co-operation. :-)

M
--
Mark Murray
iumop ap!sdn w,I idlaH
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: The Trolls identity (was: Re: matthew dillon)

2003-02-09 Thread Mark Murray
Rahul Siddharthan writes:
 (I assume I'm replying to the real PHK here)
 [EMAIL PROTECTED] wrote:
  We know that the lamer behind the Troll is Bill Huey aka billh.
 
 Is there any evidence for it?  If so, you should share it and if not,
 you shouldn't make such accusations.

He admitted to it.

M
--
Mark Murray
iumop ap!sdn w,I idlaH

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-hackers in the body of the message



Re: sendmail: how to get the named of FreeBSD4.7 standards compliant ?

2003-01-13 Thread Mark Murray
 Roman Neuhauser wrote:
  No, that's not the reason. I just don't like getting cc's.
 
 That's easily fixed: I recommend /usr/ports/mail/procmail. 
 
 You can't expect people on a mailing list to tailor their MUA
 configuration to suit your choices.  It's up to you to set up your own
 MUA and filters to cater to your own pickiness.

Amen!

Can we get back on topic now, please? :-)

M
--
Mark Murray
iumop ap!sdn w,I idlaH

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-hackers in the body of the message



Re: Can dhclient rely on /dev/random?

2002-12-29 Thread Mark Murray
 Policy Question: is a fast, high-quality
 /dev/random a gauranteed feature starting with 5.0?
 
 yes.

More like Yes, effectively. It is a module, and its conceivable under
the right (Wrong?) circumstances that this module is not loaded. This
would not be the default case, and it breaks Much(tm) if you don't
include it. The kernel-building individual would have had to have made
a decision to not include the RNG, and as such is assumed to know what
she is doing.

M
--
Mark Murray
iumop ap!sdn w,I idlaH

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-hackers in the body of the message



Re: Linux compatibility and /dev/null

2002-10-17 Thread Mark Murray

 What gives?  ls -l /dev/null says:
 
   crw-rw-rw-  1 root  wheel2,   2 Oct  9 12:45 /dev/null

As it should.

 That's groovy.  But what about /compat/linux/dev/null?
 
   -rw-r--r--  1 root  wheel  0 Oct  2 17:59 /compat/linux/dev/null

Huh??! A _file_??! It should be a device!

 Hmm???  Doing chmod 666 /compat/linux/dev/null fixes the problem.

Temporarily only. A better workaround is rm /compat/linux/dev/null;
mknod /compat/linux/dev/null c 2 2 root:wheel. With your solution,
that file may fill up with unwanted junk.

 This looks like a bug in the linux-base port.  I'll file a PR.

Indeed. Good move.

M
-- 
o   Mark Murray
\_
O.\_Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-hackers in the body of the message



Re: PRNG not seeded - error in non-root ssh inside 4.6.2 jails...

2002-10-11 Thread Mark Murray

 
 Do you mean recompile SSL using urandom instead of random ?

Yes.

 Would it be the exact same effect if I simply changed my /dev/random to 
 major/minor 2,4 instead of 2,3 ?

Yes. That would work.

 It seems like that would be much easier...

Indeed!

M

   Ok, I am not sure how I can do that though - I cannot successfully run
   `rndcontrol -s X` inside a jail.
  
   On the other hand, I already have:
  
   rand_irqs=9 10 11 13 14
  
   In my rc.conf on the underlying host machine, and have done several 
 boots
   with that in place.  So presumably I should be seeded just fine, but if 
 I am
   not, I cannot change that in the jail because it seems I cannot set that 
 (I
   assume it is a sysctl issue).
  
   Willing to try whatever you can think of next :)
 
 Hokay. Can you grovel around inside OpenSSL (src/crypto/openssl/...) and
 find where the random device is read? If it is /dev/random, then change
 that to /dev/urandom.
 
 See how that works.
 
 M
 
 I can't seed it by banging on the keyboard - it is a headless server 
 in
   a
 rack thousands of miles from me :)

 Perhaps there is another way to do it ?
   
   Yes.
   
   You need to find sources of entropy in interrupts. Look at a
   dmesg, and note which IRQ's your network device(s) and mass
   storage controller(s) (both SCSI and ATA). Use any other
   irq's that aren't too busy and may be somewhat random.
   Staring at a 'systat 2 -vmstat' screen (right hand side)
   may give some clues.
   
   Then use rndcontrol(8) to set up the seeding. There is a knob
   in rc.conf to make this setting survive the next reboot.
   
   M
   
 Date: Thu, 03 Oct 2002 21:54:30 +0100
 
   Sorry, here is the rest:
  
   Here is the output of the `dd` command using urandom:
  
   dd if=/dev/urandom of=/dev/stdout bs=512 count=1 | hexdump -C
   1+0 records in
   1+0 records out
     a0 69 1a 7c 8f 32 e5 21  ae 7a 33 14 68 0b 8e a6
   |.i.|.2.!.z3.h...|
 
 ... etc. Looking good.
 
   $ ls -l /dev/*rand*
   crw-r--r--  1 root  wheel2,   3 Sep  3 21:46 /dev/random
   crw-r--r--  1 root  wheel2,   4 Sep  3 21:46 /dev/urandom
 
 Also good.
 
 So then, as root I ran: `chmod 0666 /dev/stdout` and then I 
 ran
   your
   `dd`
 command and got:

 $ dd if=/dev/random of=/dev/stdout bs=512 count=1 | hexdump 
 -C
 0+0 records in
 0+0 records out
 0 bytes transferred in 0.36 secs (0 bytes/sec)
 
 Can you try a few of these while furiously abusing your keyboard?
 I'm trying to see if /dev/random can be persuaded to give _any_
 aoutput at all.
 
 Maybe do it on a vty instead of in X.
 
 M
 --
 o   Mark Murray
 \_
 O.\_Warning: this .sig is umop ap!sdn




 _
 Chat with friends online, try MSN Messenger: 
 http://messenger.msn.com

   --
   o   Mark Murray
   \_
   O.\_Warning: this .sig is umop ap!sdn
  
  
  
  
   _
   Send and receive Hotmail on your mobile device: http://mobile.msn.com
  
  
   To Unsubscribe: send mail to [EMAIL PROTECTED]
   with unsubscribe freebsd-hackers in the body of the message
 --
 o   Mark Murray
 \_
 O.\_Warning: this .sig is umop ap!sdn
 
 
 
 
 _
 Send and receive Hotmail on your mobile device: http://mobile.msn.com
 
-- 
o   Mark Murray
\_
O.\_Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-hackers in the body of the message



Re: PRNG not seeded - error in non-root ssh inside 4.6.2 jails...

2002-10-11 Thread Mark Murray

 Ok, I did this, and got the exact same results - first it says that PRNG is 
 not seeded, and then I chmod 0666 /dev/urandom and then it tells me host 
 key verification failed.

I hope you mean /dev/random?

M

 
 So, just in case I also did the opposite - I left random alone and set 
 urandom to 2,3 so it behaves like random ... and this was interesting, when 
 I did this, it told me PRNG not seeded no matter what I set the permissions 
 to - so at no point did I progress to host key verification failed.
 
 Hope this helps - I hate to think that the single most used userland 
 application does not function inside of jail (which is the case, it seems, 
 at least in 4.6.2)
 
 
  
   Do you mean recompile SSL using urandom instead of random ?
 
 Yes.
 
   Would it be the exact same effect if I simply changed my /dev/random to
   major/minor 2,4 instead of 2,3 ?
 
 Yes. That would work.
 
   It seems like that would be much easier...
 
 Indeed!
 
 M
 
 Ok, I am not sure how I can do that though - I cannot successfully 
 run
 `rndcontrol -s X` inside a jail.

 On the other hand, I already have:

 rand_irqs=9 10 11 13 14

 In my rc.conf on the underlying host machine, and have done several
   boots
 with that in place.  So presumably I should be seeded just fine, but 
 if
   I am
 not, I cannot change that in the jail because it seems I cannot set 
 that
   (I
 assume it is a sysctl issue).

 Willing to try whatever you can think of next :)
   
   Hokay. Can you grovel around inside OpenSSL (src/crypto/openssl/...) 
 and
   find where the random device is read? If it is /dev/random, then change
   that to /dev/urandom.
   
   See how that works.
   
   M
   
   I can't seed it by banging on the keyboard - it is a headless 
 server
   in
 a
   rack thousands of miles from me :)
  
   Perhaps there is another way to do it ?
 
 Yes.
 
 You need to find sources of entropy in interrupts. Look at a
 dmesg, and note which IRQ's your network device(s) and mass
 storage controller(s) (both SCSI and ATA). Use any other
 irq's that aren't too busy and may be somewhat random.
 Staring at a 'systat 2 -vmstat' screen (right hand side)
 may give some clues.
 
 Then use rndcontrol(8) to set up the seeding. There is a knob
 in rc.conf to make this setting survive the next reboot.
 
 M
 
   Date: Thu, 03 Oct 2002 21:54:30 +0100
   
 Sorry, here is the rest:

 Here is the output of the `dd` command using urandom:

 dd if=/dev/urandom of=/dev/stdout bs=512 count=1 | hexdump 
 -C
 1+0 records in
 1+0 records out
   a0 69 1a 7c 8f 32 e5 21  ae 7a 33 14 68 0b 8e a6
 |.i.|.2.!.z3.h...|
   
   ... etc. Looking good.
   
 $ ls -l /dev/*rand*
 crw-r--r--  1 root  wheel2,   3 Sep  3 21:46 /dev/random
 crw-r--r--  1 root  wheel2,   4 Sep  3 21:46 
 /dev/urandom
   
   Also good.
   
   So then, as root I ran: `chmod 0666 /dev/stdout` and 
 then I
   ran
 your
 `dd`
   command and got:
  
   $ dd if=/dev/random of=/dev/stdout bs=512 count=1 | 
 hexdump
   -C
   0+0 records in
   0+0 records out
   0 bytes transferred in 0.36 secs (0 bytes/sec)
   
   Can you try a few of these while furiously abusing your 
 keyboard?
   I'm trying to see if /dev/random can be persuaded to give _any_
   aoutput at all.
   
   Maybe do it on a vty instead of in X.
   
   M
   --
   o   Mark Murray
   \_
   O.\_Warning: this .sig is umop ap!sdn
  
  
  
  
   
 _
   Chat with friends online, try MSN Messenger:
   http://messenger.msn.com
  
 --
 o   Mark Murray
 \_
 O.\_Warning: this .sig is umop ap!sdn




 _
 Send and receive Hotmail on your mobile device: 
 http://mobile.msn.com


 To Unsubscribe: send mail to [EMAIL PROTECTED]
 with unsubscribe freebsd-hackers in the body of the message
   --
   o   Mark Murray
   \_
   O.\_Warning: this .sig is umop ap!sdn
  
  
  
  
   _
   Send and receive Hotmail on your mobile device: http://mobile.msn.com
  
 --
 o   Mark Murray
 \_
 O.\_Warning: this .sig is umop ap!sdn
 
 

 
 _
 MSN Photos is the easiest way to share and print your photos: 
 http://photos.msn.com/support/worldwide.aspx
 
 
 To Unsubscribe: send mail to [EMAIL PROTECTED]
 with unsubscribe freebsd-hackers in the body of the message
-- 
o   Mark Murray
\_
O.\_Warning: this .sig

Re: PRNG not seeded - error in non-root ssh inside 4.6.2 jails...

2002-10-11 Thread Mark Murray
 --
 o   Mark Murray
 \_
 O.\_Warning: this .sig is umop ap!sdn





   _
 Chat with friends online, try MSN Messenger:
 http://messenger.msn.com

   --
   o   Mark Murray
   \_
   O.\_Warning: this .sig is umop ap!sdn
  
  
  
  
   
 _
   Send and receive Hotmail on your mobile device:
   http://mobile.msn.com
  
  
   To Unsubscribe: send mail to [EMAIL PROTECTED]
   with unsubscribe freebsd-hackers in the body of the message
 --
 o   Mark Murray
 \_
 O.\_Warning: this .sig is umop ap!sdn




 _
 Send and receive Hotmail on your mobile device: 
 http://mobile.msn.com

   --
   o   Mark Murray
   \_
   O.\_Warning: this .sig is umop ap!sdn
  
  
 
  
   _
   MSN Photos is the easiest way to share and print your photos:
   http://photos.msn.com/support/worldwide.aspx
  
  
   To Unsubscribe: send mail to [EMAIL PROTECTED]
   with unsubscribe freebsd-hackers in the body of the message
 --
 o   Mark Murray
 \_
 O.\_Warning: this .sig is umop ap!sdn
 
 
 
 
 _
 MSN Photos is the easiest way to share and print your photos: 
 http://photos.msn.com/support/worldwide.aspx
 
-- 
o   Mark Murray
\_
O.\_Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-hackers in the body of the message



Re: PRNG not seeded - error in non-root ssh inside 4.6.2 jails...

2002-10-06 Thread Mark Murray

 Ok, I am not sure how I can do that though - I cannot successfully run 
 `rndcontrol -s X` inside a jail.
 
 On the other hand, I already have:
 
 rand_irqs=9 10 11 13 14
 
 In my rc.conf on the underlying host machine, and have done several boots 
 with that in place.  So presumably I should be seeded just fine, but if I am 
 not, I cannot change that in the jail because it seems I cannot set that (I 
 assume it is a sysctl issue).
 
 Willing to try whatever you can think of next :)

Hokay. Can you grovel around inside OpenSSL (src/crypto/openssl/...) and
find where the random device is read? If it is /dev/random, then change
that to /dev/urandom.

See how that works.

M

   I can't seed it by banging on the keyboard - it is a headless server in 
 a
   rack thousands of miles from me :)
  
   Perhaps there is another way to do it ?
 
 Yes.
 
 You need to find sources of entropy in interrupts. Look at a
 dmesg, and note which IRQ's your network device(s) and mass
 storage controller(s) (both SCSI and ATA). Use any other
 irq's that aren't too busy and may be somewhat random.
 Staring at a 'systat 2 -vmstat' screen (right hand side)
 may give some clues.
 
 Then use rndcontrol(8) to set up the seeding. There is a knob
 in rc.conf to make this setting survive the next reboot.
 
 M
 
   Date: Thu, 03 Oct 2002 21:54:30 +0100
   
 Sorry, here is the rest:

 Here is the output of the `dd` command using urandom:

 dd if=/dev/urandom of=/dev/stdout bs=512 count=1 | hexdump -C
 1+0 records in
 1+0 records out
   a0 69 1a 7c 8f 32 e5 21  ae 7a 33 14 68 0b 8e a6
 |.i.|.2.!.z3.h...|
   
   ... etc. Looking good.
   
 $ ls -l /dev/*rand*
 crw-r--r--  1 root  wheel2,   3 Sep  3 21:46 /dev/random
 crw-r--r--  1 root  wheel2,   4 Sep  3 21:46 /dev/urandom
   
   Also good.
   
   So then, as root I ran: `chmod 0666 /dev/stdout` and then I ran 
 your
 `dd`
   command and got:
  
   $ dd if=/dev/random of=/dev/stdout bs=512 count=1 | hexdump -C
   0+0 records in
   0+0 records out
   0 bytes transferred in 0.36 secs (0 bytes/sec)
   
   Can you try a few of these while furiously abusing your keyboard?
   I'm trying to see if /dev/random can be persuaded to give _any_
   aoutput at all.
   
   Maybe do it on a vty instead of in X.
   
   M
   --
   o   Mark Murray
   \_
   O.\_Warning: this .sig is umop ap!sdn
  
  
  
  
   _
   Chat with friends online, try MSN Messenger: http://messenger.msn.com
  
 --
 o   Mark Murray
 \_
 O.\_Warning: this .sig is umop ap!sdn
 
 
 
 
 _
 Send and receive Hotmail on your mobile device: http://mobile.msn.com
 
 
 To Unsubscribe: send mail to [EMAIL PROTECTED]
 with unsubscribe freebsd-hackers in the body of the message
-- 
o   Mark Murray
\_
O.\_Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-hackers in the body of the message



Re: PRNG not seeded - error in non-root ssh inside 4.6.2 jails...

2002-10-03 Thread Mark Murray

 I have found that if you create a jail in FreeBSD 4.6.2, and then log into 
 that jail ... if you are root you can scp and ssh just fine.  However if you 
 are not root and you attempt to ssh or scp, you get this error:
 
 PRNG is not seeded

Hmmm.

 A few details - first, I created my jail by simply using the dump command to 
 dump my / filesystem, and then restoring that inside the jail.  Not elegant, 
 but it works - so the jail in question has a full /dev and everything.
 
 Second, I used the exact same method in 4.6.1 and did not have problems.
 
 I saw a usenet post that recommended solving the problem with this:
 
 chmod a+r /dev/*rand*

You seem to be on the right track in assuming it is a /dev/[u]random
problem.

Can you confirm this by (as a pleb user) dumping some random output?

$ dd if=/dev/random of=/dev/stdout bs=512 count=1 | hexdump -C

(and same for /dev/urandom).

Please also give a ls -l /dev/*random.

 however I tried that, and now when I try to ssh or scp from a non root user 
 inside the jail, I get:
 
 Host key verification failed
 
 Does anyone know why this happens, why it didn't happen prior to 4.6.2, and 
 how I can fix it ?

The random device has not changed, but the OpenSSL code has. Maybe OpenSSL's
internal PRNG is doing something naughty.

M
-- 
o   Mark Murray
\_
O.\_Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-hackers in the body of the message



Re: PRNG not seeded - error in non-root ssh inside 4.6.2 jails...

2002-10-03 Thread Mark Murray

Hi

You only sent me a third of what I asked for :-) 

M

 
 Ok, here you are - as a normal user (non root) inside the jail, I have run:
 
 $ dd if=/dev/random of=/dev/stdout bs=512 count=1 | hexdump -C
 dd: /dev/stdout: Permission denied
 
 $ ls -asl /dev/stdout
 0 crw---  1 root  wheel   22,   1 Sep  3 21:46 /dev/stdout
 
 All of this was _after_ I ran the `chmod a+r /dev/*rand*` command.
 
 So then, as root I ran: `chmod 0666 /dev/stdout` and then I ran your `dd` 
 command and got:
 
 $ dd if=/dev/random of=/dev/stdout bs=512 count=1 | hexdump -C
 0+0 records in
 0+0 records out
 0 bytes transferred in 0.36 secs (0 bytes/sec)
 
 I hope this is useful, and thank you for your help.
 
 
 
 
 
   I have found that if you create a jail in FreeBSD 4.6.2, and then log 
 into
   that jail ... if you are root you can scp and ssh just fine.  However if 
 you
   are not root and you attempt to ssh or scp, you get this error:
  
   PRNG is not seeded
 
 Hmmm.
 
   A few details - first, I created my jail by simply using the dump 
 command to
   dump my / filesystem, and then restoring that inside the jail.  Not 
 elegant,
   but it works - so the jail in question has a full /dev and everything.
  
   Second, I used the exact same method in 4.6.1 and did not have problems.
  
   I saw a usenet post that recommended solving the problem with this:
  
   chmod a+r /dev/*rand*
 
 You seem to be on the right track in assuming it is a /dev/[u]random
 problem.
 
 Can you confirm this by (as a pleb user) dumping some random output?
 
 $ dd if=/dev/random of=/dev/stdout bs=512 count=1 | hexdump -C
 
 (and same for /dev/urandom).
 
 Please also give a ls -l /dev/*random.
 
   however I tried that, and now when I try to ssh or scp from a non root 
 user
   inside the jail, I get:
  
   Host key verification failed
  
   Does anyone know why this happens, why it didn't happen prior to 4.6.2, 
 and
   how I can fix it ?
 
 The random device has not changed, but the OpenSSL code has. Maybe 
 OpenSSL's
 internal PRNG is doing something naughty.
 
 M
 --
 o   Mark Murray
 \_
 O.\_Warning: this .sig is umop ap!sdn
 
 
 
 
 _
 Chat with friends online, try MSN Messenger: http://messenger.msn.com
 
-- 
o   Mark Murray
\_
O.\_Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-hackers in the body of the message



Re: PRNG not seeded - error in non-root ssh inside 4.6.2 jails...

2002-10-03 Thread Mark Murray

 Sorry, here is the rest:
 
 Here is the output of the `dd` command using urandom:
 
 dd if=/dev/urandom of=/dev/stdout bs=512 count=1 | hexdump -C
 1+0 records in
 1+0 records out
   a0 69 1a 7c 8f 32 e5 21  ae 7a 33 14 68 0b 8e a6  
 |.i.|.2.!.z3.h...|

... etc. Looking good.

 $ ls -l /dev/*rand*
 crw-r--r--  1 root  wheel2,   3 Sep  3 21:46 /dev/random
 crw-r--r--  1 root  wheel2,   4 Sep  3 21:46 /dev/urandom

Also good.

   So then, as root I ran: `chmod 0666 /dev/stdout` and then I ran your 
 `dd`
   command and got:
  
   $ dd if=/dev/random of=/dev/stdout bs=512 count=1 | hexdump -C
   0+0 records in
   0+0 records out
   0 bytes transferred in 0.36 secs (0 bytes/sec)

Can you try a few of these while furiously abusing your keyboard?
I'm trying to see if /dev/random can be persuaded to give _any_
aoutput at all.

Maybe do it on a vty instead of in X.

M
-- 
o   Mark Murray
\_
O.\_Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-hackers in the body of the message



Re: PRNG not seeded - error in non-root ssh inside 4.6.2 jails...

2002-10-03 Thread Mark Murray

 I can't seed it by banging on the keyboard - it is a headless server in a 
 rack thousands of miles from me :)
 
 Perhaps there is another way to do it ?

Yes.

You need to find sources of entropy in interrupts. Look at a
dmesg, and note which IRQ's your network device(s) and mass
storage controller(s) (both SCSI and ATA). Use any other
irq's that aren't too busy and may be somewhat random.
Staring at a 'systat 2 -vmstat' screen (right hand side)
may give some clues.

Then use rndcontrol(8) to set up the seeding. There is a knob
in rc.conf to make this setting survive the next reboot.

M

 Date: Thu, 03 Oct 2002 21:54:30 +0100
 
   Sorry, here is the rest:
  
   Here is the output of the `dd` command using urandom:
  
   dd if=/dev/urandom of=/dev/stdout bs=512 count=1 | hexdump -C
   1+0 records in
   1+0 records out
     a0 69 1a 7c 8f 32 e5 21  ae 7a 33 14 68 0b 8e a6
   |.i.|.2.!.z3.h...|
 
 ... etc. Looking good.
 
   $ ls -l /dev/*rand*
   crw-r--r--  1 root  wheel2,   3 Sep  3 21:46 /dev/random
   crw-r--r--  1 root  wheel2,   4 Sep  3 21:46 /dev/urandom
 
 Also good.
 
 So then, as root I ran: `chmod 0666 /dev/stdout` and then I ran your
   `dd`
 command and got:

 $ dd if=/dev/random of=/dev/stdout bs=512 count=1 | hexdump -C
 0+0 records in
 0+0 records out
 0 bytes transferred in 0.36 secs (0 bytes/sec)
 
 Can you try a few of these while furiously abusing your keyboard?
 I'm trying to see if /dev/random can be persuaded to give _any_
 aoutput at all.
 
 Maybe do it on a vty instead of in X.
 
 M
 --
 o   Mark Murray
 \_
 O.\_Warning: this .sig is umop ap!sdn
 
 
 
 
 _
 Chat with friends online, try MSN Messenger: http://messenger.msn.com
 
-- 
o   Mark Murray
\_
O.\_Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-hackers in the body of the message



Re: /dev/null sources

2002-09-17 Thread Mark Murray

 I'd wish to implement something like /dev/null or /dev/zero driver taking
 the original source code as a base, but I can't find the sources
 themselves, can you help?

On STABLE (4.x and below) it is in src/sys/i386/i386/mem.c and it is
a bit messy. (Look for Rathole)

On Current (5.0+) it is in src/sys/dev/null/ and is much cleaner. :-)

M
-- 
o   Mark Murray
\_
O.\_Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-hackers in the body of the message



Re: PC/104 for factor cpu boards running FreeBSD?

2002-08-18 Thread Mark Murray

 Does anyone on this forum have any experience using these sorts of
 cards with FreeBSD and could you impart some of your general knowledge
 to me?  I think the forum would be interested as well.

Mike Smith was doing this as least as long ago as 1999 with a 486/PC104
at Walnut Creek.

M
-- 
o   Mark Murray
\_
O.\_Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-hackers in the body of the message



Re: __STDC__ removal?

2002-05-27 Thread Mark Murray

I'd support this. Makes maintaining the code a lot cleaner.

M

 NetBSD is nuking almost all __STDC__ usages because it's always
 defined.  Do we want to do the same?  The exception I've seen
 is for assembler files where old style C is needed to avoid
 conflicts.
 
 mrouted/cfparse.y:#ifdef __STDC__
 mrouted/cfparse.y:#ifdef __STDC__
 mrouted/cfparse.y:#ifdef __STDC__
 mrouted/defs.h:#ifdef __STDC__
 mrouted/defs.h:#if defined(__STDC__) || defined(__GNUC__)
 mrouted/main.c:#ifdef __STDC__
 mrouted/main.c:#ifdef __STDC__
 mrouted/mapper.c:#ifdef __STDC__
 mrouted/mapper.c:#ifdef __STDC__
 mrouted/mrinfo.c:#ifdef __STDC__
 mrouted/mrinfo.c:#ifdef __STDC__
 mrouted/mtrace.c:#ifdef __STDC__
 mrouted/mtrace.c:#ifdef __STDC__
 mrouted/mtrace.c:#ifdef __STDC__
 mrouted/mtrace.h:#if defined(__STDC__) || defined(__GNUC__)
 mtree/create.c:#if __STDC__
 mtree/create.c:#if __STDC__
 mtree/create.c:#if __STDC__
 pppd/main.c:#if __STDC__
 pppd/main.c:#if __STDC__
 pppd/options.c:#if __STDC__
 pppd/pppd.h:#if __STDC__
 route6d/route6d.c:#ifdef __STDC__
 route6d/route6d.c:#ifdef __STDC__
 route6d/route6d.c:#ifdef __STDC__
 route6d/route6d.c:#ifdef __STDC__
 route6d/route6d.c:#ifdef __STDC__
 route6d/route6d.c:#ifdef __STDC__
 route6d/route6d.c:#ifdef __STDC__
 rtsold/rtsold.c:#if __STDC__
 zic/zdump.c:#ifdef __STDC__
 zic/zdump.c:#endif /* defined __STDC__ */
 zic/zdump.c:#ifndef __STDC__
 zic/zdump.c:#endif /* !defined __STDC__ */
 
 ee/ee.c:#if defined(__STDC__) || defined(__cplusplus)
 ee/ee.c:#ifndef __STDC__
 ee/ee.c:#endif /* __STDC__ */
 ee/new_curse.c:#if defined(__STDC__)
 ee/new_curse.c:#if __STDC__ || defined(__cplusplus)
 ee/new_curse.c:#endif /* __STDC__ */
 ee/new_curse.c:#ifndef __STDC__
 ee/new_curse.c:#endif /* __STDC__ */
 ee/new_curse.c:#ifndef __STDC__
 ee/new_curse.c:#else /* __STDC__ */
 ee/new_curse.c:#endif /* __STDC__ */
 ee/new_curse.c:#ifndef __STDC__
 ee/new_curse.c:#ifndef __STDC__
 ee/new_curse.c:#else /* __STDC__ */
 ee/new_curse.c:#endif /* __STDC__ */
 ee/new_curse.c:#ifdef __STDC__
 ee/new_curse.c:#endif /* __STDC__ */
 ee/new_curse.h:#if __STDC__ || defined(__cplusplus)
 find/getdate.y:#if defined (__STDC__) || defined (USG)
 find/getdate.y:#if defined (__STDC__)
 lex/NEWS:   - Changed to only use '\a' for __STDC__ compilers.
 lex/NEWS: and free() for gcc, which defines __STDC__ but (often) doesn't
 lex/NEWS:   - Generated scanner uses prototypes and const for __STDC__.
 lex/flex.skl:#if __STDC__
 lex/flex.skl:#endif /* __STDC__ */
 lex/flex.skl:#if __STDC__
 lex/flexdef.h:#ifndef __STDC__
 lex/flexdef.h:#define __STDC__ 1
 lex/flexdef.h:#if __STDC__
 lex/initscan.c:#if __STDC__
 lex/initscan.c:#endif   /* __STDC__ */
 lex/initscan.c:#if __STDC__
 lex/misc.c:#if __STDC__
 lex/misc.c:#if __STDC__
 rpcgen/rpc_hout.c:  f_print(fout, \n#if 
defined(__STDC__) || defined(__cplusplus)\n);
 rpcgen/rpc_main.c:  f_print(fout, \n#if defined(__STDC__) || 
defined(__cplusplus)\n);
 telnet/externs.h:# ifdef__STDC__
 telnet/externs.h:# if defined(__STDC__)
 telnet/ring.h:#if defined(__STDC__) || defined(LINT_ARGS)
 yacc/skeleton.c:#if defined(__cplusplus) || __STDC__,
 yacc/skeleton.c:#if defined(__cplusplus) || __STDC__,
 yacc/skeleton.c:#if defined(__cplusplus) || __STDC__,
 
 
 -- 
 -Alfred Perlstein [[EMAIL PROTECTED]]
 'Instead of asking why a piece of software is using 1970s technology,
  start asking why software is ignoring 30 years of accumulated wisdom.'
 Tax deductible donations for FreeBSD: http://www.freebsdfoundation.org/
 
 To Unsubscribe: send mail to [EMAIL PROTECTED]
 with unsubscribe freebsd-hackers in the body of the message
-- 
o   Mark Murray
\_
O.\_Warning: this .sig is umop ap!sdn
#text/plain; name=cv.doc [Mark Murray CV Plain Text] cv.doc
#application/octet-stream; name=cv.pdf [Mark Murray CV PDF] cv.pdf

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-hackers in the body of the message



Re: improved unifdef(1)

2002-04-26 Thread Mark Murray

 The unifdef in the system is not suited to heavyweight tasks like
 (say) xterm's main.c or wu-ftpd for a number of reasons:
 
  * it has a very low limit on the number of command-line arguments
that it can cope with (100) -- I've sumbitted PR#37454 about this.
 
  * it doesn't have the slightest clue about #elif
 
  * it doesn't attempt to handle #if

I am in violent agreement :-).

 Because I needed an unifdef with a bit more oomph and couldn't
 find a better one, I have done my own tune-up job on the BSD
 one, starting from the NetBSD sources (which seemed to have
 a mostly-superset of the changes made by the other BSDs).
 It's available from http://dotat.at/prog/misc/unifdef.c.
 The detailed change list is below. Note that only a very
 limited subset of #if expressions are understood, involving
 just defined(), !, , ||, and brackets.
 
 If anyone is interested I'd appreciate some testing, and it
 would be nice to get it committed eventually.

Ooooh! :-)

Yes please!

I'll look at this.

M
-- 
o   Mark Murray
\_
O.\_Warning: this .sig is umop ap!sdn
#text/plain; name=cv.doc [Mark Murray CV Plain Text] cv.doc
#application/octet-stream; name=cv.pdf [Mark Murray CV PDF] cv.pdf

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-hackers in the body of the message



Re: Intel 820 RNG

2002-03-06 Thread Mark Murray

  Again, look at current. The RNG is _really_ fast.
 
   I know.  I know.  I wish we could use it.  Unfortunately this is
 for an appliance type application and I just don't feel comfortably
 shipping -CURRENT as product.  I'm only just now making the effort to get
 up to speed on -CURRENT so that we can be ready to use it later this year.

Also - have you looked at STABLE's /dev/urandom?

M
-- 
o   Mark Murray
\_
O.\_Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-hackers in the body of the message



Re: Intel 820 RNG

2002-03-05 Thread Mark Murray

   We did make some enhancements that serve our needs, but may not be
 best for everyone.  We actually need entropy in quantity since we could be
 doing a lot of crypto operations back to back and it can easily become our
 worst bottleneck.

Have you looked at the Yarrow algorithm?

   To this end, we have an entropy buffer in kernel memory that pulls
 large blocks of entropy from the RNG if it's going to read from it at all.
 The device puts out several orders of magnitude more entropy than the
 original drivers captured, and we needed as much as we could grab.
 Ideally we would not mix the entropy into the entropy pool and just use the
 high quality entropy from the buffer, but we decided to minimize divergence
 from the original sources and not switch to 100% hardware entropy.

In CURRENT, I have implemented Yarrow to achieve just this purpose.

   The drawback to our approach is that it can spend a lot of time in
 the kernel.  To tune this behavior we added a few sysctl's.  The start/stop
 script after the diff's tweaks a few of these settings after boot up.

Again, look at current. The RNG is _really_ fast.

   I cc'd Kaj Groner, who actually did the work for us.  He's not on
 this list, so don't drop his address.  I was more involved at the higher
 levels of what we needed to get done when we rebased our appliance from
 OpenBSD to FreeBSD last Summer.

:-) You may be pleasantly surprised :-)

M

(Thanks for the sources!)
-- 
o   Mark Murray
\_
O.\_Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-hackers in the body of the message



Re: Intel 820 RNG

2002-03-04 Thread Mark Murray

   But, back to the topic.  We have taken the OpenBSD driver for the
 RNG on the i810 chipset (and some other i8x0 chipsets), and ported it to
 FreeBSD-4.4.  We made some enhancements to get more of the available random
 data bandwidth.
 
   We want to clean them up a little and submit them as a PR, but have
 not had time to.  If you're interested I can send you the patches and you
 can give them a try.

Hi.

Please send me what you have.

Thanks!

M
-- 
o   Mark Murray
\_
O.\_Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-hackers in the body of the message



Re: Should pam_ssh and xdm work?

2002-01-08 Thread Mark Murray

 I've uncommented the entries for pam_ssh in /etc/pam.conf, and am trying
 to log in via xdm on my local machine.  I can type in my SSH passphrase
 into the password box, and it authenticates me, and runs my .xsession. 
 So far, no problems.  But it's not setting up the ssh-agent properly. 

Yes this is a known bug. We need to fix it.

 Two copies of ssh-agent appear to be run, and the environment variables
 SSH_AUTH_SOCK and SSH_AGENT_PID are not passed.  They are not
 available in any xterms, and they do not appear in the environment while
 .xsession is being executed.
 
 Combinations of using sufficient and required for pam_ssh and
 pam_unix do not seem to affect things.

Nor should they :-)

M
-- 
o   Mark Murray
\_  FreeBSD Services Limited
O.\_Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-hackers in the body of the message



Re: random + large IRQ's + SMP

2001-12-11 Thread Mark Murray

 What I need to know is when this was fixed (assuming it was).  I
 tried to look through i386/i386/mem.c, per the messages to find
 the fix, but somewhere between when that message was posted and
 now random (and a few other things) were ripped out of there and
 scattered across several machine independant files.

This has not been fixed. I could look at it (I am the author of that)
and look for a solution. It may take a bit of time.

 with unsubscribe freebsd-hackers in the body of the message
-- 
o   Mark Murray
\_  FreeBSD Services Limited
O.\_Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-hackers in the body of the message



Re: pam_wheel

2001-08-08 Thread Mark Murray

 This piece obviously has at least two errors. First, if PAM_OPT_AUTH_AS_SELF
 is true, then value of user is undefined. It should probably log
 pwd-pw_name instead. Second, check for root must of course be reversed
 and become if (!pwd-pw_uid).

Fixed locally. Commit coming soon.

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-hackers in the body of the message



Re: blow fish

2001-03-11 Thread Mark Murray

 I think Mark Murray is still sitting on the patch I did for this very
 thing.  Check the -hackers mail archives.  It was about 2-3 Months
 ago, so it may not even patch cleanly anymore against -CURRENT.

I committed this today!

Apologies for the delay.

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: cvs commit: src/kerberos5/usr.bin Makefile src/kerberos5/usr.bin/k5su Makefile

2001-03-05 Thread Mark Murray

 Will we always have this dichotomy between kblah/k5blah utilities?  It is
 fairly annoying.  Anecdotally, there don't seem to be many new Kerberos
 IV installations,  Kerberos V's utilities can get/list/trash version 4
  5 tickets.

When all the K5 utils reliably double-up as K4 ones, I'll fix this.

(I think we are really close, BTW).

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message




Re: cvs commit: src/kerberos5/usr.bin Makefile src/kerberos5/usr.bin/k5su Makefile

2001-03-05 Thread Mark Murray

 "Jacques A. Vidrine" [EMAIL PROTECTED] writes:
  Will we always have this dichotomy between kblah/k5blah utilities?  It is
  fairly annoying.  Anecdotally, there don't seem to be many new Kerberos
  IV installations,  Kerberos V's utilities can get/list/trash version 4
   5 tickets.
 
 Yes.  My current plan of things to happen (in -current and after 4.3)
 is to ditch the v4 programs basically and install the v5 ones under
 the canonical names (with v4-compatibility if compiled in).  And to
 always build and install the krb5 programs/libraries, but ifdef'ing
 the support in other programs.  How does that sounds?

Wonderful!

If you need repo-copying done, I'm your man!
-- 
Mark Murray
Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: ONTOPIC - FreeBSD vs Linux, Solaris, and NT - Not a bunch of licence Jiha...

2001-01-07 Thread Mark Murray

Hi

Could you people please take this flamewar off our lists?

Thanks!

M

 
 --part1_f8.65bd20b.278a2f74_boundary
 Content-Type: text/plain; charset="US-ASCII"
 Content-Transfer-Encoding: 7bit
 
 In a message dated 1/7/2001 11:27:46 AM Pacific Standard Time, [EMAIL PROTECTED] 
 writes:
 
   [ The dict command is your friend ]
   
 1. Exempt from subjection to the will of others; not under
restraint, control, or compulsion; able to follow one's
own impulses, desires, or inclinations; determining one's
own course of action; not dependent; at liberty.
   
 2. Not under an arbitrary or despotic government; subject
only to fixed laws regularly and fairly administered, and
defended by them from encroachments upon natural or
acquired rights; enjoying political liberty.
   
   What do you think the average person would interpret "free software" as ?
   Software that's not opressed, or software that has no cost ?  Give me a
   break.
   
  We already have a term for software that just costs no money:
   "freeware".
  This is _NOT_ free software.  Shareware is not free software.  GPLed
,
 BSDed,
  X11ed, public domain, APSLed (ad infinitum) code is free software, 
 the
 kind
  that is not often written for Windows.
   
I would agree with this statement fully in the case of BSD and X11. The
other cases do not fulfill the definition of "free." GPL is not free,
although it approaches it. GPL, APSL, etc. are subject to the will of th
e
authors.
   
 You're idioticly redefining the term "free" to be software with source
   code
 and restrictions, rather than no source code and no restrictions.  You
   can't
 define the language.  Free doesn't have a damned thing to do with your
   value
 judgements on what's useful, what's "no-value", whether or not it
   includes
 source, and whether or not it travels under the restrictions of your
   "free"
 licence.  You're saying that the only "free" software is open-source
 software, and that's a pretty damned closed minded point of view.  I'v
e
   
I'm afraid you are the victim of a "pretty damned closed minded point of
view." "Free" binaries are under the restraint, control, and compulsion 
 of
the author. the user is unable to determine the course of action. If I
cannot freely change the function of a program, it is not "free". If I
must perform other actions as a result of my modifications, it is not
"free." I am being compelled to perform. This is not "free."
   
   Oh, but other "free" (open source) software has no restraints, controls, o
r
   compulsions right ?  Then what's the point of having the licence ?
   
   If I may repeat what you just said again:
   
If I must perform other actions as a result of my modifications, it is 
 not
"free." I am being compelled to perform. This is not "free."
 a.. Redistributions of source code must retain the above copyright 
 notice,
   this list of conditions and the following disclaimer.
   
b.. Redistributions in binary form must reproduce the above copyright
   notice, this list of conditions and the following disclaimer in the
   documentation and/or other materials provided with the distribution.
   
   Those sure seem to be compulsions.  They are small and simple, but they ar
e
   compulsions.  So even BSD licenced software is not truly "free software" b
y
   your foolish definitions.
   
   X11
   
   and this permission notice appear in all copies of
   the Software and that both the above copyright notice(s) and this
   permission notice appear in supporting documentation
   
   X11 has the same restrictions.  Although including the licence in future
   copies is no big thing, it's still a restriction, and by your own words: 
 "If
   I must perform other actions as a result of my modifications, it is not
   'free'".
   
   Now lets hear you rephrase your words to try to become less ambigous about
   the definition of "free" and how it interacts with the restrictions of the
   BSD and/or X11 licences.  Maybe you can tell us how they are "more free".
   That's always fun, to listen to people rant about levels of "freeness".
   
 
 
 I dunno who has it, but here's a cool little program called MultiRes... 
 it's like QuickRes, but it's for Windows 2000, and supports refresh rates and
 
 shit.  Oh, and Stox and Feldman need to, like, sit on a tack or something...
 
 --part1_f8.65bd20b.278a2f74_boundary
 Content-Type: application/octet-stream; name="multires.exe"
 Content-Transfer-Encoding: base64
 Content-Disposition: attachment; filename="multires.exe"
 
 TVpQAAIEAA8A//8AALgAQAAa
 AAEAALoQAA4ftAnNIbgBTM0hkJBUaGlzIHByb2dyYW0gbXVzdCBiZSBydW4gdW5k
 ZXIgV2luMzINCiQ3
 

Re: encrypt h/w for FreeBSD? re-post

2001-01-06 Thread Mark Murray

 Just my quarterly check to see whether there's support coming up for 
 hardware assisted IPsec, SSL, whatever?

I have a card that does this, and I'm slowly working towards making it
work.

 In addition to SSL on web servers, we'd recently have found some need 
 like to run TLS for SMTP and postfix. The mail volumes will benefit 
 from hardware crypto.  I really prefer to stay with Free, vs. Open.

Quite. :-)

Please don't ask anything more than your "quarterly query"; that way I won't
have to lie to you. :-)

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: waiting for new files in a directory

2000-12-27 Thread Mark Murray

 Any ideas on how to do this?  Any suggestions on the process?

Simple lock (like flock(3)) in the perl script. Lock some ${FILE},
and if you can't get the lock, die. The file should contain the PID
of the process that holds the lock, so that a cleanerd can kill
stuck processes, or so that the lock can be blown away if needed.

Works like a charm.

M
--
Mark Murray
Warning: this .sig is umop ap!sdn


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: waiting for new files in a directory

2000-12-27 Thread Mark Murray

   unlock the file
   
   The cleaner you mentioned: run it every 15 minutes, compare the 
   date/time on the lockfile, if more than 15 minutes old, grab the PID,  
   and kill the job, remove the lock.
  
  Correct.

Actually, you can make it a lot better:

If the lockfile exists, then kill -0 the PID to see if it is still live.
If not, blow away the lockfile. If still alive and older than N minutes,
blow away the PID and break the lock.

M
--
Mark Murray
Warning: this .sig is umop ap!sdn


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: ssh - are you nuts?!?

2000-12-27 Thread Mark Murray

 Okay, can you be specific about what you mean by
 "There was a time that we were very lax".

If there was a change of server identity, then we did not necessarily
announce what the new identity was in a way that people could trust.

These days, a member of the Security Officer team sends out an
announcement (cryptograhically signed of course) letting folks
know what identity (fingerprint) to expect.

M
--
Mark Murray
Warning: this .sig is umop ap!sdn


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: ssh - are you nuts?!?

2000-12-26 Thread Mark Murray

 Which original keys are you talking about?

SSH public server keys. (Sometimes called "server identities").

 Are you saying that the original SSH Public Keys for the servers
 were always sent in the clear, without PGP signature or anything?

David was saying that, but he's wrong. There was a time that we
were very lax about confirming the server public keys.

The last round of changes have all been confirmed by digital
signature by well-known server administrators.

M
--
Mark Murray
Warning: this .sig is umop ap!sdn


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: BSD's random.c dicey on the Alpha

2000-11-23 Thread Mark Murray

  Anyone want to have a look at this?  It's from the GNU awk maintainer.
 
 Without knowing which random.c it was, it's hard to judge :-) Also not
 knowing what the intended use is, it's hard to recommend something.

I'd guess src/lib/libc/stdlib/random.c

I'll bury it in my TODO.

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: patches for 4.x devrandom so that bind works

2000-11-14 Thread Mark Murray

  Yes, it is this simple :-).
 
 Can you get it ready for 4.2?  I'd like to see us be able to
 run bind9 in the next release.

Sure. I'll see if I can do it in the next couple of hours.

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: patches for 4.x devrandom so that bind works

2000-11-13 Thread Mark Murray

Hi

I have something similar to this, and it goes slightly further.

Yes, it is this simple :-).

M

 I was playing with bind9 and got the typical:
 
 On FreeBSD systems, the server logs error messages like "fcntl(8,
 F_SETFL, 4): Inappropriate ioctl for device". This is due to
 a bug in the FreeSBD /dev/random device. The bug has been
 reported to the FreeBSD maintainers. Versions of OpenBSD prior
 to 2.8 have a similar problem.
 
 I took a look at what OpenBSD did and it looks like they just
 no-op'd out the ioctl:
 
 http://www.openbsd.org/cgi-bin/cvsweb/src/sys/dev/rnd.c?r1=1.40r2=1.41
 
 I have a patch that seems to shut bind up, but I'm not 100% sure
 this is the right fix, as it looks like it just fakes the nonblocking
 access to the random devices.
 
 Here's my patch (I can probably generate this for alpha):
 
 Index: mem.c
 ===
 RCS file: /home/ncvs/src/sys/i386/i386/mem.c,v
 retrieving revision 1.79.2.4
 diff -u -u -r1.79.2.4 mem.c
 --- mem.c 2000/08/04 22:31:07 1.79.2.4
 +++ mem.c 2000/11/13 23:53:43
 @@ -57,6 +57,7 @@
  #include sys/proc.h
  #include sys/random.h
  #include sys/signalvar.h
 +#include sys/filio.h
  #include sys/uio.h
  
  #include machine/frame.h
 @@ -465,8 +466,20 @@
* selecting and inspecting which interrupts are used in the muck
* gathering business.
*/
 - if (cmd != MEM_SETIRQ  cmd != MEM_CLEARIRQ  cmd != MEM_RETURNIRQ)
 + switch (cmd) {
 + case FIOASYNC:
 + /* rnd has no async flag in softc so this is really a no-op. */
 + /* FALLTHROUGH */
 + case FIONBIO:
 + /* Handled in the upper FS layer. */
 + return (0);
 + case MEM_SETIRQ:
 + case MEM_CLEARIRQ:
 + case MEM_RETURNIRQ:
 + break;
 + default:
   return (ENOTTY);
 + }
  
   /*
* Even inspecting the state is privileged, since it gives a hint
 
 Did I miss part of the OpenBSD delta?  This looks too easy. :(
 
 -- 
 -Alfred Perlstein - [[EMAIL PROTECTED]|[EMAIL PROTECTED]]
 "I have the heart of a child; I keep it in a jar on my desk."
 
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Blowfish passwords

2000-10-03 Thread Mark Murray

 It patches cleanly against -STABLE and -CURRENT, and only touches
 libcrypt.  Take a look at it, feedback/patches are welcome, and if you
 like it, maybe someone can integrate it into -CURRENT.  (I don't know
 whose dept. this would be -- Mark Murray perhaps? )
 
http://www.frenchfries.net/paul/freebsd/blowfish.passwd.patch.gz

Cool! Thank you! :-)

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: perlcc in current - xs_init and boot_DynaLoader

2000-08-26 Thread Mark Murray

  If i do a perlcc test.pl i get the folllowing , in CURRENT ?
  Must i define something beforehand, or is it broken ?
 
 I'll take a look...

Looks like perl brokenness. The missing boot_DynaLoader is in DynaLoader.a,
but there is no way of linking it in.

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: perlcc in current - xs_init and boot_DynaLoader

2000-08-25 Thread Mark Murray

 If i do a perlcc test.pl i get the folllowing , in CURRENT ?
 Must i define something beforehand, or is it broken ?

I'll take a look...

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: A few device questions

2000-08-24 Thread Mark Murray

 At Thu, 24 Aug 2000 01:48:32 EDT, Louis Gerbarg wrote:

  I have been working with the OpenBSD /dev/random driver, and have
  ported it to Darwin. While I was at I wanted to also port it to
  FreeBSD, because it is more functional then current one, but I have
  a few questions:

 You should talk to Mark Murray [EMAIL PROTECTED] who has done alot of
 work with the current implementation of our random device.

I am currently rewriting FreeBSD's /dev/random device to use Schneier's
Yarrow algorithm. Some of it is in current, and a lot more is uncommitted.

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: weird error messages from __COPYRIGHT macro

2000-08-16 Thread Mark Murray

 I'm not trying to protect the way I do it, since I don't use the macro
 myself.  I just want to make sure that, if the NetBSD behaviour
 (handling embedded newlines properly) is correct, that we provide a
 compatible interface.
 
 Am I missing something here?

Maybe I am.

Did your _exact_ sample program fail on NetBSD in the same way that
it failed on FreeBSD?

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: weird error messages from __COPYRIGHT macro

2000-08-16 Thread Mark Murray

  (I just checked - it worked!)
 
 Now we just need someone with a NetBSD box handy to let us know whether
 double-escaping the newlines works alright there.  I have a feeling
 it won't, which probably means we need to see if we can fix our
 implementation of __IDSTRING().

Bah.

Only three things use __COPYRIGHT; ftp(d?), routed and make. None of them
use \n's like you do.

 I've sent private mail to Peter, who introduced this implementation of
 __IDSTRING in rev 1.26 of cdefs.h.

Compatibility measure?

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: weird error messages from __COPYRIGHT macro

2000-08-16 Thread Mark Murray

 And please don't whine about me about string concatenation -- it's legal
 in ANSI C. :-)

__COPYRIGHT is defined as

#define __COPYRIGHT(s)  __IDSTRING(copyright,s)

and __IDSTRING is

#define __IDSTRING(name,string) __asm__(".ident\t\"" string "\"")

By the time the string makes it to the assembler, the \n's have been
turned into (real) NL's so the assembler line looks like

.ident  "@(#) Copyright (c) 1983, 1988, 1993
The Regents of the University of California.  All rights reserved.
"
...and it does not like the multi-line string. You may need to
double-escape the \n's (like \\n) to get them into the .ident
line symbolically.

(I just checked - it worked!)

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: desire for ftp.internat.freebsd.org mirror

2000-04-10 Thread Mark Murray

 Why not just use cvsup? It is already installed and running on internat
 and the firewall is already configured to allow it through.

CVSUP only covers that which is already in CVS. The FTP stuff is
what this chap is looking for.

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: desire for ftp.internat.freebsd.org mirror

2000-04-08 Thread Mark Murray

  Mark Murray would know :-)
  
  I think there's a lot of stale cruft on ftp.internat.freebsd.org which
  doesn't need to be mirrored - Mark could probably tell us all which bits
  are suitable for mirroring (this should be documented somewhere for
  posterity)

Mostly packages and distfiles.

 covering_in_asbestos
 mirroring of all that stuff should be migrated to rsync(1), since this
 implicitly defines (in terms of standard archive'/distribution handling)
 a structured "package" like layout, so we would have several collections
 (freebsd-ftp/ freebsd-www/ freebsd-crypto-US/ freebsd-crypto-nonUS/ and
 so on...)
 thus, it would be easier to set up a mirror, the paths would be more
 standard, the updates would be better in sync (since rsync really does a
 good job in not just only checking if a file has a new datestamp) and
 the world would be a bit better ;-)
 /covering_in_asbestos

I could do this. What arre the setup concerns?

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Crypto in the kernel: where how?

1999-12-10 Thread Mark Murray

  ...a sys/crypt/ directory should hold their DES code. :-)
^
 Shouldn't this be crypto ? That is what I see if I look on internat
 in the /usr/local/etc/cvsup/sup directory.

So it should, and in the patch that I have, it is :-).

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Crypto in the kernel: where how?

1999-12-09 Thread Mark Murray

 What is the plan (if any) for including crypto stuff in the kernel?
 As time goes on this will be more and more needed, eg. for IPSec
 and other VPN applications.

The KAME/IPv6 guys have already brought this up; the agreement was
that...

 It would be nice if we had a /usr/src/sys/crypt directory, plus whatever
 export-controlled firewalling silliness is necessary.

...a sys/crypt/ directory should hold their DES code. :-)

 Proposal.. (to get things started)
 
   - Add /usr/src/sys/crypt directory

The CTM things aleady know about this dir.

 My ulterior motive is to checkin netgrapph/ng_mppc.c which adds
 MPPE/MPPC support for PPTP.  However it's useless without an [A]RC4
 implementation.

I'd like DES, arc4 and MD5/SHA for Yarrow.

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Release build

1999-10-06 Thread Mark Murray

 Does anybody know why ( i know that the directory /R/stage/trees/krb/
 does not exist , but the directory /R/stage/trees/krb4/ do exist ) ??

For some reason, your src/release/* area is not getting updated.

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: TCP sequence numbers

1999-09-01 Thread Mark Murray
 I'd expect Yarrow to be (perhaps quite a bit) slower than our existing
 PRNG - it's a more conservative design and uses primitives like SHA-1 (for
 yarrow-160). I don't know how much of an impact this would be for
 network performance.

I will doing Yarrow-1.0A, once the IPSec stuff is around. I expect to
be able to tweak it so that this his is not too heavy, and customisable.

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to majord...@freebsd.org
with unsubscribe freebsd-hackers in the body of the message



Re: KAME IPv6 and freebsd

1999-08-31 Thread Mark Murray

 I'll be very happy to work with you on this one.
 
   Does it make sense to make src/crypto/sys for kernel code?
   (for IPsec we need crypto code *in kernel*).

I wonder...

There was a contrib/sys (where softupdates went), and that got moved
to sys/contrib.

Perhaps something similar could be invented for src/crypto? We'd need
to make the distibution machinery understand that, but I don't see
too much a problem there.

I have no strong feelings about src/crypto/sys or src/sys/crypto.

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: KAME IPv6 and freebsd

1999-08-31 Thread Mark Murray

   FYI, There are crypto-related files in the following locations.
   I'll take a detailed look into both repositories...

Thanks! It makes the most sense to keep this exactly as it it, except
for the files in src/sys/netinet6/ which should move to src/sys/crypto/
if they have crypto in them.

Please do not import this until we (JDP!) gets the distribution channels
crypto-happy. This is not difficult.

 
 itojun
 
 
 src/sys/netinet6/esp_output.c
 src/sys/netinet6/esp_input.c
 src/sys/netinet6/esp_core.c
 src/sys/crypto/cast128/cast128.c
 src/sys/crypto/cast128/cast128.h
 src/sys/crypto/cast128/cast128_cbc.c
 src/sys/crypto/cast128/cast128_subkey.h
 src/sys/crypto/blowfish/bf_cbc.c
 src/sys/crypto/blowfish/bf_cbc_m.c
 src/sys/crypto/blowfish/bf_enc.c
 src/sys/crypto/blowfish/bf_locl.h
 src/sys/crypto/blowfish/bf_pi.h
 src/sys/crypto/blowfish/bf_skey.c
 src/sys/crypto/blowfish/blowfish.h
 src/sys/crypto/des/des_3cbc.c
 src/sys/crypto/des/des.h
 src/sys/crypto/des/des_cbc.c
 src/sys/crypto/des/des_ecb.c
 src/sys/crypto/des/des_locl.h
 src/sys/crypto/des/des_setkey.c
 src/sys/crypto/des/podd.h
 src/sys/crypto/des/sk.h
 src/sys/crypto/des/spr.h
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: KAME IPv6 and freebsd

1999-08-31 Thread Mark Murray

 Speaking of ITAR, has anybody actually every approached FreeBSD to say
 what we're doing is in violation of ITAR?

IANAL, but IIRC, ITAR is dead; Wasssenaar is the bogeyman these days
(at least outside the USA).

The DoD, DoJ, DoE, DoC and watever other Do's you guys have are all
passing the buck very fast nowadays.

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: KAME IPv6 and freebsd

1999-08-31 Thread Mark Murray
   KAME team really needs your suggestions on how to integrate crypto
   part.  In case of NetBSD/KAME integration, we did like this:
   - place IPsec core part and AH part into cvs.netbsd.org (in US)
   - place ESP part and crypto algorithms (DES, Blowfish and whatever
 in cvs.fi.netbsd.org (in finland)
   We need some tricky symbolic link, or makefile/config hack for this
   separated repository (NetBSD has makefile and config hack).

FreeBSD has the src/crypto directory for this purpose. It works in
exactly the same way as src/contrib, but contains code that may
get Americans into trouble if they export it, so I maintain a copy
in South Africa (on internat.freebsd.org).

I'll be very happy to work with you on this one.

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to majord...@freebsd.org
with unsubscribe freebsd-hackers in the body of the message



Re: KAME IPv6 and freebsd

1999-08-31 Thread Mark Murray
 I'll be very happy to work with you on this one.
 
   Does it make sense to make src/crypto/sys for kernel code?
   (for IPsec we need crypto code *in kernel*).

I wonder...

There was a contrib/sys (where softupdates went), and that got moved
to sys/contrib.

Perhaps something similar could be invented for src/crypto? We'd need
to make the distibution machinery understand that, but I don't see
too much a problem there.

I have no strong feelings about src/crypto/sys or src/sys/crypto.

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to majord...@freebsd.org
with unsubscribe freebsd-hackers in the body of the message



Re: KAME IPv6 and freebsd

1999-08-31 Thread Mark Murray
   FYI, There are crypto-related files in the following locations.
   I'll take a detailed look into both repositories...

Thanks! It makes the most sense to keep this exactly as it it, except
for the files in src/sys/netinet6/ which should move to src/sys/crypto/
if they have crypto in them.

Please do not import this until we (JDP!) gets the distribution channels
crypto-happy. This is not difficult.

 
 itojun
 
 
 src/sys/netinet6/esp_output.c
 src/sys/netinet6/esp_input.c
 src/sys/netinet6/esp_core.c
 src/sys/crypto/cast128/cast128.c
 src/sys/crypto/cast128/cast128.h
 src/sys/crypto/cast128/cast128_cbc.c
 src/sys/crypto/cast128/cast128_subkey.h
 src/sys/crypto/blowfish/bf_cbc.c
 src/sys/crypto/blowfish/bf_cbc_m.c
 src/sys/crypto/blowfish/bf_enc.c
 src/sys/crypto/blowfish/bf_locl.h
 src/sys/crypto/blowfish/bf_pi.h
 src/sys/crypto/blowfish/bf_skey.c
 src/sys/crypto/blowfish/blowfish.h
 src/sys/crypto/des/des_3cbc.c
 src/sys/crypto/des/des.h
 src/sys/crypto/des/des_cbc.c
 src/sys/crypto/des/des_ecb.c
 src/sys/crypto/des/des_locl.h
 src/sys/crypto/des/des_setkey.c
 src/sys/crypto/des/podd.h
 src/sys/crypto/des/sk.h
 src/sys/crypto/des/spr.h
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to majord...@freebsd.org
with unsubscribe freebsd-hackers in the body of the message



Re: KAME IPv6 and freebsd

1999-08-31 Thread Mark Murray
 Speaking of ITAR, has anybody actually every approached FreeBSD to say
 what we're doing is in violation of ITAR?

IANAL, but IIRC, ITAR is dead; Wasssenaar is the bogeyman these days
(at least outside the USA).

The DoD, DoJ, DoE, DoC and watever other Do's you guys have are all
passing the buck very fast nowadays.

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to majord...@freebsd.org
with unsubscribe freebsd-hackers in the body of the message



Re: Looking for good QA tests...

1999-08-26 Thread Mark Murray

 Therefore, I'm asking people to put their minds to work, and talk
 about valid tests that we could run to catch things that might slip
 through the cracks. I'm hoping that some of the long-timers can point
 out areas that have been missed before, and others to point out areas
 where they have seen local problems.

As you are a networking outfit, I would imagine that you would be interested
in two things:

1) Does the core OS still work, and
2) Does the networking still work?

1) Is usually well checkable with a "make world", and
2) could (I imagine) be well tested with a make world with
   NFS mounted disks, possibly using another FreeBSD box as
   a router for extra stress.

Is this what you are looking for?

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Looking for good QA tests...

1999-08-26 Thread Mark Murray
 Therefore, I'm asking people to put their minds to work, and talk
 about valid tests that we could run to catch things that might slip
 through the cracks. I'm hoping that some of the long-timers can point
 out areas that have been missed before, and others to point out areas
 where they have seen local problems.

As you are a networking outfit, I would imagine that you would be interested
in two things:

1) Does the core OS still work, and
2) Does the networking still work?

1) Is usually well checkable with a make world, and
2) could (I imagine) be well tested with a make world with
   NFS mounted disks, possibly using another FreeBSD box as
   a router for extra stress.

Is this what you are looking for?

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to majord...@freebsd.org
with unsubscribe freebsd-hackers in the body of the message



Re: Looking for good QA tests...

1999-08-26 Thread Mark Murray
 Mmmm... No. _I_ (read: Not Cisco as a whole) am looking for tests that will
 help locate bugs pre-release copies of the OS so that there is still time for
 others to debug the code before Jordan cuts the release. Its more of a 
 lets help the project by coordinating testing thing

A regression test to make sure that the OS is not broken before you
inflict it on your colleagues/engineers?

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to majord...@freebsd.org
with unsubscribe freebsd-hackers in the body of the message



Re: Looking for good QA tests...

1999-08-26 Thread Mark Murray
 Still too small a scope. How about A regression test to make sure
 that the OS is not broken before Jordan inflicts it on the world ?

Athough it does not actively hunt down bugs, a NFS mounted,
FreeBSD-routed build should stress enough of the system to disprove many
serious problems.

Inflicting it on standard idiots to check for install problems is a
human-engineering aproach you could also take? Impossible to automate,
though.

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to majord...@freebsd.org
with unsubscribe freebsd-hackers in the body of the message



Re: Mandatory locking?

1999-08-23 Thread Mark Murray
  Now I suppose you're going to come and say that this is bad
  programming, and advisory locking would do the job if the software is
  written right.  Correct.  You could also use the same argument to say
  that memory protection isn't necessary, because a correctly written
  program doesn't overwrite other processes address space.  It's the
  same thing: file protection belongs in the kernel.
 
 Well, I'd say advisory lock does the job if the software is written
 right, and if the software is not written right, mandatory locking
 won't help.

Folk are all skirting around a very convenient (and necessary)
loophole; in cases where there _is_ mandatory locking, there
is always some meta-user which is allowed to violate this.

In process-space, this is the kernel. In file-space, this should
be root. Processes that require mandatory locking must revoke
superuser before attempting locks.

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to majord...@freebsd.org
with unsubscribe freebsd-hackers in the body of the message



Re: from number to power of two

1999-08-22 Thread Mark Murray
 Does anyone know an inexpensive algorithm (O(1)) to go from an number to
 the next (lower or higher) power of two.
 
 1 - 1
 2,3   - 2
 4,5,6,7   - 4
 8,9,10,11,12,13,14,15 - 8
 etc.
 
 So %1101 should become either %1 or %1000.

Shift a bit until it becomes greater than (or less than) the number
in question.

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to majord...@freebsd.org
with unsubscribe freebsd-hackers in the body of the message



Re: Change to /sys/net/if.c /sys/dev/syscons/syscons.c

1999-08-21 Thread Mark Murray

 So are there any _objections_ to having the kernel match promiscuous
 "enabled" messages with "disabled" counterparts?

I strongly _request_ such a log message.

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Change to /sys/net/if.c /sys/dev/syscons/syscons.c

1999-08-21 Thread Mark Murray
 So are there any _objections_ to having the kernel match promiscuous
 enabled messages with disabled counterparts?

I strongly _request_ such a log message.

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to majord...@freebsd.org
with unsubscribe freebsd-hackers in the body of the message



Re: Kerberos 5 integration.

1999-08-17 Thread Mark Murray

 Who were the parties that were heading up the Kerberos 5 integration?
 
 I have questions.

Me.

I will be bringiong in Heimdal (when it interoperates with MIT-K5).

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Kerberos 5 integration.

1999-08-17 Thread Mark Murray

 What do you think about moving all the current '#ifdef KERBEROS' to
 '#ifdef KERBEROS4' and starting to integrate the '#ifdef KERBEROS5' bits
 in ftp, telnet, rsh, rlogin etc?  I don't see a reason to rip out the krb4
 stuff and delay on the krb5 userland integration.  Since the userland
 stuff doesn't involve actual crypto code I think we're pretty safe no?

I have a better idea; PAM-ify everything (that can be pammed). The rest
of the stuff, I intend to do as you say.

 I'd also be interested in hearing reasons for or against putting the krb4
 specific stuff (kinit, klist whatever) in /usr/krb4, and the krb5 bits in
 /usr/krb5.  This would simplify the task of leaving krb4 in the tree.

Hmm. Methinks I might name the version-specific stuff k[45]${FOO}
for FOO in init, list, destroy, etc. Telnetd and FTPD should be
PAMmable, likewise the r.*d's. The userland ftp and telnets can
have both (Isuspect), and the r-utils also.

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Kerberos 5 integration.

1999-08-17 Thread Mark Murray
 Who were the parties that were heading up the Kerberos 5 integration?
 
 I have questions.

Me.

I will be bringiong in Heimdal (when it interoperates with MIT-K5).

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to majord...@freebsd.org
with unsubscribe freebsd-hackers in the body of the message



Re: Kerberos 5 integration.

1999-08-17 Thread Mark Murray
 What do you think about moving all the current '#ifdef KERBEROS' to
 '#ifdef KERBEROS4' and starting to integrate the '#ifdef KERBEROS5' bits
 in ftp, telnet, rsh, rlogin etc?  I don't see a reason to rip out the krb4
 stuff and delay on the krb5 userland integration.  Since the userland
 stuff doesn't involve actual crypto code I think we're pretty safe no?

I have a better idea; PAM-ify everything (that can be pammed). The rest
of the stuff, I intend to do as you say.

 I'd also be interested in hearing reasons for or against putting the krb4
 specific stuff (kinit, klist whatever) in /usr/krb4, and the krb5 bits in
 /usr/krb5.  This would simplify the task of leaving krb4 in the tree.

Hmm. Methinks I might name the version-specific stuff k[45]${FOO}
for FOO in init, list, destroy, etc. Telnetd and FTPD should be
PAMmable, likewise the r.*d's. The userland ftp and telnets can
have both (Isuspect), and the r-utils also.

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to majord...@freebsd.org
with unsubscribe freebsd-hackers in the body of the message



Re: Kerberos 5 integration.

1999-08-17 Thread Mark Murray
 What is holding back the work in the userland stuff then?  Time?

No; the lack thereof ;-)

The current rush of things crypto has piqued my interest, so I am
hammering away quite hard these days.

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to majord...@freebsd.org
with unsubscribe freebsd-hackers in the body of the message



Re: Kerberos 5 integration.

1999-08-17 Thread Mark Murray
  The current rush of things crypto has piqued my interest, so I am
  hammering away quite hard these days.
 
 Well, would it be useful for me to commit the KERBEROS - KERBEROS4
 changes?

Er, no; please submit them to me as patches. :-)

Thanks!

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to majord...@freebsd.org
with unsubscribe freebsd-hackers in the body of the message



Re: SRA+IDEA Telnet

1999-08-14 Thread Mark Murray

 Couldn't you work the code so it obtains all its' encryption functions
 from an external library, such as the system's libdes? That would let you
 export the code, since it doesn't provide any encryption functions itself,
 and international people could use the international DES library (for
 other encryption algorithms, pick a freely available implmenetation such
 as the one from openssl).

This makes the most sense. Thrash it out as a port, and if that works,
we can bring it into both repositories.

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: SRA+IDEA Telnet

1999-08-14 Thread Mark Murray
 Couldn't you work the code so it obtains all its' encryption functions
 from an external library, such as the system's libdes? That would let you
 export the code, since it doesn't provide any encryption functions itself,
 and international people could use the international DES library (for
 other encryption algorithms, pick a freely available implmenetation such
 as the one from openssl).

This makes the most sense. Thrash it out as a port, and if that works,
we can bring it into both repositories.

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to majord...@freebsd.org
with unsubscribe freebsd-hackers in the body of the message



Re: [Review please] (was: Re: cvs commit: src/gnu/usr.bin/man/manpath manpath.config)

1999-08-14 Thread Mark Murray
 DES, Mark, -hackers!
 
 How about the following patch.  It adds an OPTIONAL_MANPATH directive,
 which is equivalent to the MANDATORY_MANPATH, except an absence of the
 directory is not considered an error.

Cool! Do it, I say!

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to majord...@freebsd.org
with unsubscribe freebsd-hackers in the body of the message



Re: SRA+IDEA Telnet

1999-08-14 Thread Mark Murray
 Why not just wait and bring the openssl library in? 

Er - I do't think that will happen. Not for a while.

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to majord...@freebsd.org
with unsubscribe freebsd-hackers in the body of the message



Re: So, back on the topic of enabling bpf in GENERIC...

1999-08-04 Thread Mark Murray
 This is a clear security vs functionality issue and I need to get a
 good feel for which cause is ascendent here in knowing which way to
 jump on the matter.  Can we now hear the closing arguments from the
 pro and con folks?

I am pro.

It takes a root compromise to use it anyway, and its usefulness
for DHCP and rarpd is too compelling.

Perhaps the comments in the GENERIC file could be updated.

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to majord...@freebsd.org
with unsubscribe freebsd-hackers in the body of the message



Re: file(1) Magdir candidate: wintendo

1999-07-26 Thread Mark Murray
 So I propose a new file wintendo, for all gaming file formats used on
 the MS Windows platform.

Wintendo is a bad name for anything official. Try to find MS's 
official name for the format(s).

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to majord...@freebsd.org
with unsubscribe freebsd-hackers in the body of the message



Re: file(1) Magdir candidate: wintendo

1999-07-26 Thread Mark Murray
 On Mon, 26 Jul 1999 22:17:20 +0200, Mark Murray wrote:
 
  Wintendo is a bad name for anything official. Try to find MS's 
  official name for the format(s).
 
 You're hoping for a standard name for file formats of games used on
 Microsoft platformat? There are two words in that question that one
 doesn't usually fine together in a sentence that doesn't contain the
 word bastardize. :-)

You could start with WinEXE.

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to majord...@freebsd.org
with unsubscribe freebsd-hackers in the body of the message



Re: sandbox??

1999-07-25 Thread Mark Murray

Sue Blake wrote:
 
 Nobody seems to be confident about the answer to my post to -questions.
 Below is the only public answer. It is typical of many private answers
 I received from otherwise knowledgeable people willing to make a
 partial educated guess but not willing to expose their ignorance
 publicly. They're all keen to know whatever I can find out :-)

The usual use of the term "sandbox" means "restricted environment".
A chroot(3) can be used to build this, and jail(3) is a stronger
version, although this is not a usual use for the term. The term
is popular in Java where it it implies that the (possibly hostile)
applet _cannot_ do anything dangerous, because the environment it
runs in has no API that allows this (like the applet cannot open
arb files).

The term "sandbox" in inetd.conf refers to a "su - safe_user;
chroot safe_dir; app" environment (I think) so that app cannot
do any damage even if compromised.

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: sandbox??

1999-07-25 Thread Mark Murray
Sue Blake wrote:
 
 Nobody seems to be confident about the answer to my post to -questions.
 Below is the only public answer. It is typical of many private answers
 I received from otherwise knowledgeable people willing to make a
 partial educated guess but not willing to expose their ignorance
 publicly. They're all keen to know whatever I can find out :-)

The usual use of the term sandbox means restricted environment.
A chroot(3) can be used to build this, and jail(3) is a stronger
version, although this is not a usual use for the term. The term
is popular in Java where it it implies that the (possibly hostile)
applet _cannot_ do anything dangerous, because the environment it
runs in has no API that allows this (like the applet cannot open
arb files).

The term sandbox in inetd.conf refers to a su - safe_user;
chroot safe_dir; app environment (I think) so that app cannot
do any damage even if compromised.

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to majord...@freebsd.org
with unsubscribe freebsd-hackers in the body of the message



Re: rndcontrol and SMP

1999-07-24 Thread Mark Murray

 What is needed to make this support a more sensible number of IRQs?
 
 Mainly changing the ioctl and its clients (rndcontrol only?) to supply
 more bits.

I am currently rewriting /dev/random (and rndcontrol).

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Base Kerberos 5 support?

1999-07-24 Thread Mark Murray

 I would love to see krb 5 made part of the standard distribution.  BEST
 has been using it for several years now with no problems and I believe
 that it is a whole lot easier to administrate then krb 4.

I have Heimdal commit-ready (this has been the case for a year). I am
waiting for it to be more compatible with MITK5.

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: PAM LDAP in FreeBSD

1999-07-24 Thread Mark Murray

Quoth "Keith Stevenson":
 (Mark Murray:  jump in here if I get this wrong)
 
 The way I understand it, a PAM module (pam_unix?) would need to be able to
 look at the password hash and figure out which of the crypt functions to
 call.  Ideally, the PAM configuration would be able to specify which crypt
 functions are valid for the system.

I'm sure this could be done. I'm not sure that it is PAM's job. I'll
look at it.

 That said, one of the very attractive features of specifying the crypt
 function in the login class is the ability to assign different crypt
 algorithms on a user by user basis.

...or group...

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: rndcontrol and SMP

1999-07-24 Thread Mark Murray

 When you say rewriting, do you mean syncing with the version of the code
 in Linux (1.04, instead of our 0.95) or actually rewriting? If the latter,
 I'm curious as to what your aims are.

I want to implement Bruce Schneier's Yarrow.

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: rndcontrol and SMP

1999-07-24 Thread Mark Murray
 What is needed to make this support a more sensible number of IRQs?
 
 Mainly changing the ioctl and its clients (rndcontrol only?) to supply
 more bits.

I am currently rewriting /dev/random (and rndcontrol).

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to majord...@freebsd.org
with unsubscribe freebsd-hackers in the body of the message



Re: Base Kerberos 5 support?

1999-07-24 Thread Mark Murray
 I would love to see krb 5 made part of the standard distribution.  BEST
 has been using it for several years now with no problems and I believe
 that it is a whole lot easier to administrate then krb 4.

I have Heimdal commit-ready (this has been the case for a year). I am
waiting for it to be more compatible with MITK5.

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to majord...@freebsd.org
with unsubscribe freebsd-hackers in the body of the message



Re: PAM LDAP in FreeBSD

1999-07-24 Thread Mark Murray
Quoth Keith Stevenson:
 (Mark Murray:  jump in here if I get this wrong)
 
 The way I understand it, a PAM module (pam_unix?) would need to be able to
 look at the password hash and figure out which of the crypt functions to
 call.  Ideally, the PAM configuration would be able to specify which crypt
 functions are valid for the system.

I'm sure this could be done. I'm not sure that it is PAM's job. I'll
look at it.

 That said, one of the very attractive features of specifying the crypt
 function in the login class is the ability to assign different crypt
 algorithms on a user by user basis.

...or group...

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to majord...@freebsd.org
with unsubscribe freebsd-hackers in the body of the message



Re: rndcontrol and SMP

1999-07-24 Thread Mark Murray
 When you say rewriting, do you mean syncing with the version of the code
 in Linux (1.04, instead of our 0.95) or actually rewriting? If the latter,
 I'm curious as to what your aims are.

I want to implement Bruce Schneier's Yarrow.

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to majord...@freebsd.org
with unsubscribe freebsd-hackers in the body of the message



Re: a BSD identd

1999-07-12 Thread Mark Murray
 On Sun, 11 Jul 1999 22:34:09 +0200, Mark Murray wrote:
 
  As long as the documentation is _clear_ that this is not a front-line
  security tool, but rather a thing to marginally augment logs with
  user-supplied info, then I'll buy it.
 
 This is why I put forward a motion to move pidentd out of security and
 into net / sysutils last year. The suggestion wasn't well received, but
 I still think it'd help. I'd also like for the DESCR file for the port
 to say:
 
   This service offers remote users some identity to report back
to the local admin when complaining about abuse / break-ins
originating from the local host.

This issue is way to religious. As long as folk don't do anything
blatantly stupid, and as long as the caveats are well documented, it
is probably a good idea to just let this one stand, and lean on it
gently :-)

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to majord...@freebsd.org
with unsubscribe freebsd-hackers in the body of the message



  1   2   >