lling to a removable storage
device
and possibly dd'ing the result of that operation to a file that can be
downloaded
and dd'ed to a similar device for testing. All doable with operations similar to
what the FAQ describes.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation te
, the most likely scenario is that the hardware is in fact
well supported and the install and use will be utterly frictionless.
All the best,
Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
https://bsdly.blogspot.com/ https://www.bsdly.net/ https://www.nuug.no
no/~peter/recent-and-not-so-recent_changes_in_openbsd_that_make_life_better.html
but with "classic" formatting)
All the best,
Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
https://bsdly.blogspot.com/ https://www.bsdly.net/ https://www.nuug.no/
"Remember to set the evil bit on all mali
oked like the most straightforward one, but that may have changed in the
meantime. I would anyway recommend reading Michael Lucas' book which is
referenced in the article.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
https://bsdly.blogspot.com/ https://www.bsdl
ations not strictly according
to national borders.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
https://bsdly.blogspot.com/ https://www.bsdly.net/ https://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]
On Sun, Oct 10, 2021 at 02:48:04PM +0300, Barbaros Bilek wrote:
> Hello Peter,
>
> I think you suggest me some work around like max-src-conn-rate, right?
I would think both the rate and the number of simultaneous connections could be
relevant here, yes.
- Peter
--
Peter N. M.
was said except a couple of questions
at the very end.
Slides: https://home.nuug.no/~peter/openbsd_moments/ (which also has a link to
the article
ihttps://bsdly.blogspot.com/2021/08/recent-and-not-so-recent-changes-in.html)
- P
--
Peter N. M. Hansteen, member of the first RFC 1149
021/08/recent-and-not-so-recent-changes-in.html
Slides: https://home.nuug.no/~peter/openbsd_moments/
Thanks again to Jonathan Drews and the rest of SEMI_bug for inviting me!
All the best,
Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ h
bouts and up to around 1500 NOKs. That variation is a bit odd
but I'd think it's worth checking for relatively local sources.
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember
conclusion would be that you have a dead battery.
Fortunately a simple web search seems to indicate that spares are available
at a price level that is not totally horrible.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.n
/blog_wild_wild_world_of_windows.html)
Cheers,
Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconne
/home.nuug.no/~peter/pftutorial/#102 and following with links
therein).
Both of these approaches will get you the data, with potential for
further fun (see eg
https://bsdly.blogspot.com/2014/02/yes-you-too-can-be-evil-network.html)
All the best,
Peter
--
Peter N. M. Hansteen, member of the fir
eter/pf/newest/simplest-secure.html)
Cheers,
Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.
sing
firefox runs, so it's not fatal. I suspect it's a misclassified
dependency in the package (build vs runtime).
All the best,
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil b
"
You should be able to find useful references for this on the tshirts page
https://www.openbsd.org/tshirts.html (specifically
https://www.openbsd.org/tshirts.html#5)
Cheers,
Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/
simple
permit :wheel
(one line!) would work to have any user in the wheel group perform
privileged commands subject to entering their password correctly.
Then again, if you break things really badly, you can always reinstall ;P
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 imp
All the best,
Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.
erribly surprised to find that video exists out
there somewhere too)
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
deli
could be remedied with a bit of renaming of mount points and shuffling things
around under your new /home. Or starting from scratch, of course.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
ve noticed that FreeBSD's PF does not have match rules.
I hope you find a workable solution for what you need to do.
All the best,
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set
o
the pass rule and remove the match rule if that fits your needs better.
All the best,
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.
xt, then forward to
syslog.
The example from the old PF tutorial
https://home.nuug.no/~peter/pf/newest/log2syslog.html
should still work.
All the best,
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
&q
hat seem to indicate that quite likely the
combination
would work.
I haven't tried the thing myself, but you should be able to find the same stuff
I did
on the web. Then you could probably find a way to test with an OpenBSD setup in
a way
that does not break things too horribly in case anything
f upgrade.
> pkg_info may be suitable command for such feature.
would 'pkg_add -un' be suitable?
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all maliciou
On Tue, Mar 03, 2020 at 10:15:31AM -, Stuart Henderson wrote:
> On 2020-03-02, Peter N. M. Hansteen wrote:
> > I was thinking of the probably quite unlikely event that somebody who wants
> > this
> > comes up with an actually reproducible way that could be turned i
otherwise
unremarkable make target.
The mention of a "BSD specialist" certification had me thinking that possibly
somebody aiming for that status would have been able to think along those lines
with proper encouragement, if nothing else to automate away an otherwise tedious
task.
--
Pete
he code back to the project would be appreciated.
All the best,
Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic&quo
the installnn.fs image will have the file sets in there already. No need to
copy.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network t
ting point such as a default to
block, then
add pass rules that allow traffic initiated by the sonos box or others in the
local net.
I'm almost certain you do not need to explicitly allow anything initiated from
the outside.
All the best,
Peter
--
Peter N. M. Hansteen, member of
on the Sonos battle
> ?
It does look like the Sonos devices use a number of services out there -
https://support.sonos.com/s/article/688?language=en_US
No hands on experience with that one myself (we ended up using a Bluesound
Vault2 for our home music needs)
Cheers,
Peter
--
Peter N. M. Ha
ptions.
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.
shirts and mugs.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.
at least you don't need to mess with strings.
There may be smarter ways, I'm all ears.
-- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious n
in your IP reputation
data could
conceivably add or remove table entries based on those changes immediately
after receiving
the changes. It would take a bit of coding, but grabbing the relevant bits from
existing
daemons should get you at least part of the way there.
Failing that, the dump-to-file
ast amount of extra work for everyone
involved.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147:
ks just fine:
> https://marc.info/?l=openbsd-misc=136500465604928=2
yes, it definitely works. I do think it's somewhat at a remove from what
the original poster had in mind though :)
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ ht
roject wants to support as fully as possible.
> When will be created a great desktop experience for OpenBSD?
All the bits you need are there already. It's mainly a matter of a few
pkg_add commands.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http:
configuring apmd (which runs with -aA).
What are the most useful steps to diagnosing here?
dmesg attached as a starting point.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember t
e.
I hope some of this stream of semi-random items is of some use.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah sp
e I think from
the bsd.rd
installer image), try escaping to the shell from the installer, possibly fdisk
-e and
keep the man page handy. I *think* what I did back then was set the all parts
to size
zero, except the OpenBSD part which I set to the largest the program would let
me.
- Peter
--
e should I be looking?
I would say what you are probably looking for is mandoc (man mandoc or
http://man.openbsd.org/mandoc), which supports a variety of output formats.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.ne
e)
[5] https://man.openbsd.org/ftp-proxy (the ftp-proxy(8) man page, if you really
need to)
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious networ
ou might consider inserting somewhere in the basic setup for your
application that you set up an anchor in the system's pf.conf where
it can do just that.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no
hemselves, you get to control how things work from the sane OpenBSD
environment.
Examples closely matching this are in the tutorials and the book they
reference :)
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/
that your unit does not have
wifi onboard, you could probably find a cheap USB wifi thing that recent OpenBSD
versions support.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to
ve on TCP. It's
possible your ssh rate limiting rule is very close to what you need.
You might take a peek at
https://bsdly.blogspot.com/2017/04/forcing-password-gropers-through.html
for inspirations if not exact instructions. You'll get the idea :)
All the best,
Peter
--
Peter N. M. Hansteen, member o
t AFAIK code changes to
passwd
are not necessary just to accommodate that as long as you can live with a max
length
of 128 characters (which is the current limit if I read
http://man.openbsd.org/passwd
correctly).
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
unt of /, other than
of course doing the surgery on /etc/rc (which you then get to maintain
as a local change from now on).
If that's what you need and you consider it worth the trouble, that's
approximately what you need to do.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementat
ation of the retry
requirement to specify 'retry from the same IP address', which would
have made greylisting *a lot* easier, but unfortunately that did not
happen (cf
https://bsdly.blogspot.com/2008/10/ietf-failed-to-account-for-greylisting.html).
Cheers,
Peter
--
Peter N. M. Hansteen, membe
://bsdly.blogspot.com/2018/11/goodness-enumerated-by-robots-or.html
- TL;DR: don't download *my* nospamd, use smtpctl to generate your own :)
All the best,
Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no
On 10/30/18 8:46 PM, Chris Narkiewicz wrote:
> W dniu 30/10/2018 o 19:31, Peter N. M. Hansteen pisze:
>> yes, a well-known problem, and it's what nospamd (hinted at in the spamd
>> man pages) is for.
>>
>> To some extent it helps to whitelist IP addresses and ne
On 10/30/18 8:46 PM, Chris Narkiewicz wrote:
> W dniu 30/10/2018 o 19:31, Peter N. M. Hansteen pisze:
>> yes, a well-known problem, and it's what nospamd (hinted at in the spamd
>> man pages) is for.
>>
>> To some extent it helps to whitelist IP addresses and ne
to
fetch my hand maintained one at https://home.nuug.no/~peter/nospamd
(later parts generated by echo $domain | smtpctl spf walk, older parts
by host -ttxt $domain).
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsd
if that doesn't turn up the entries you were looking for.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.
example at https://home.nuug.no/~peter/pftutorial/#33 did not show up in
your search.
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network tra
. The most likely explanation is
that b...@example.com is either an explicit spamtrap or fails to match
the allowed suffixes in /etc/mail/spamd.alloweddomains
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.n
course over the same 20+ years we've
seen developments in mail that aren't easily ignored such as SPF+DKIM+DMARC
but the motivation for running your own mail service most likely includes some
genuine interest in the topic for its own sake so you will need to take those
in stride.
- Peter
--
oking, right?
man smtpd and references therein. There are also pointers in this thread
to running a full featured mail server on OpenBSD with smtpd from base.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no
o than read Aaron Poffenberger's SMTPd mail server tutorial slides and
some related materials
(https://www.bsdcan.org/2016/schedule/events/691.en.html and links therein).
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdl
ars was a HP Microserver G8, which with a few
PCI slots, dual bge(4)s built in and IIRC 4GB memory. Ran like a charm,
and was dirt cheap for a new system at the time.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http:/
s most of the oddities that I have
found irritating in Windows over the years, and it comes well tuned to
Apple's hardware.
But that's me and I'm well aware that I'm weird. If you find Windows
tolerable and that's where the specific software runs best, that sounds
like the obvious choice.
- Peter
ce is supported, my best advice is to get one of the cheapo USB
wifi dongles.
With any luck, a random part from the bargain bin at your friendly computer
thingies outlet will
be a supported device such as urtwn(4) or similar.
Good luck!
- Peter
--
Peter N. M. Hansteen, member of the first RFC
http://www.openbsd.org/anoncvs.html
with adjustments to use the most-local mirror (for me thats the eu one).
And of course for most ports or packages, pkg_add -u is probably all you need.
If you suspect your package information could be off in some way, pkg_check
is useful too.
- Peter
--
Pete
a subsequent
sysmerge.
- Peter
[1]
https://bsdly.blogspot.com/2012/07/keeping-your-openbsd-system-in-trim.html
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all
i-recent article about that (and the laptop I'm typing this
on) is at https://bsdly.blogspot.com/2017/07/openbsd-and-modern-laptop.html
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to s
learer.
Off the top of my head I can't think of anywhere more appropriate,
really, as long as it's OpenBSD's PF, not the out of date FreeBSD version.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
&quo
as come in handy when dealing with other Unix variants.
Long time misc'ers will probably forgive me pointing to my 'OpenBSD and
you' presentation (https://home.nuug.no/~peter/openbsd_and_you/) for
some further facts and some opinions of mine on the matter. Do click the
links to the references.
-
connect has a traditional serial port or is able to fake one
via something like a USB-to-serial adapter.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicio
of your 1500 EUR.
- Peter
[1] https://bsdly.blogspot.com/2017/07/openbsd-and-modern-laptop.html
[2]
https://www.multicom.no/multicom-talisa-u831-black-133/cat-p/c100559/p10642670
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www
oo-can-be-evil-network.html
- but do note that once you have 'keep state' or similar with specific
options on a rule, remember to append pflow to the list of options.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ ht
a pattern where the traffic
originated. It could be down to some common misconfiguration, maybe even
too many naive followers of a slightly misguidedly written HOWTO somewhere.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http
rade process. Hard to tell which without more information about
your environment and hardware (dmesg much appreciated when supplied).
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remem
policy is 'floating' (as in
not tied to an interface) but you can set it to be if-bound if you like.
But for the use case you describe, tagging on ingress and filtering on
tagged later is certainly a potentially useful approach.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implemen
https://bsdly.blogspot.no/2017/04/forcing-password-gropers-through.html
and
http://bsdly.blogspot.com/2013/10/the-hail-mary-cloud-and-lessons-learned.html
(with references)
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.
in OpenBSD spamd(8) will check here
occasionally.
All the best,
Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah s
to get you anywhere.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.
pflow unfortunately isn't going to get you anywhere. Exploring the other
options might.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic&quo
d, please consult there before letting
resentment stew for years next time, huh?
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
g a snapshot. It's in the pkg_add man page, but
easy to miss I guess.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traff
k it is awesome ...
pmacct is in ports - http://openports.se/net/pmacct so likely
straightforward to get started
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malic
s should still apply.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.
code is quite different in most respects.
> As of today current, it seem to be still present. Any plans to upgrade this
> in the (near) future ?
I'm a bit curious as to how you reached this conclusion. You're hitting
one or more limits in your environment, but how do you identify which one?
--
a brief glance on the specifications for the models you mention do not raise
any obvious red flags here.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malic
ntroller, hopefully
there is a SATA option.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.
one of the better N
modes would fit the symptoms you describe. But so would quite a few
other things.
You really need to supply more information if you want useful help in
troubleshooting.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ h
TEM->=0.10.38:devel/gettext devel/gettext-tools devel/gmake
textproc/gsed
R-deps: STEM->=0.10.38:devel/gettext
Archs: any
which might fit the scenario.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.
any help at all, *please* get hold of a still-supported release
(6.1 or 6.2, or even a -current snapshot) and see what happens when you
expose your hardware to that.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.
my OpenBSD/amd64 dmesg:
urtwn0 at uhub1 port 2 "Realtek 802.11n WLAN Adapter" rev 2.00/2.00 addr 7
urtwn0: MAC/BB RTL8188CUS, RF 6052 1T1R, address 04:a1:51:6a:0e:3e
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bs
a wireless network card - there has been some work on athn(4)
recently, but I don't have any of the hardware to hand so I'm guessing.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Rememb
On 02/06/18 14:12, Mohammad BadieZadegan wrote:
> Hi everybody,
> How can I boot OpenBSD with root autologin?
If you have to ask, the you definitely should not try.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net
enced in Theo's message would serve to convince most sane
people that a a significant effort was put in to ensure that the tree has no
improperly licensed material.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.n
's probably wise to check beforehand by email or somesuch just how current
the information is.
But if the hardware is actually available, it would be quite interesting to
play with something very not-intel.
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http:/
any cases out there where some abandoned document is so
out of date that it's actively harmful or at least very confusing to a
newcomer. In these cases it would have been a lot more useful if the
material was simply deleted.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
h
at either end. Newer ssh versions have
incrementally dropped or disabled by default the unsafe ones, but
increasing the message verbosity will point you in the right direction.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.ne
x840300
pcppi0 at isa0 port 0x61
spkr0 at pcppi0
vmm0 at mainbus0: VMX/EPT
efifb at mainbus0 not configured
uvideo0 at uhub0 port 4 configuration 1 interface 0 "SuYin SuYin USB2.0
RGBIR Camera" rev 2.00/0.11 addr 2
video0 at uvideo0
ugen0 at uhub0 port 5 "Intel Bluetooth" rev
still reasonably useful, I hear ;)
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.
it for the next snapshot.
And indeed, the next snapshot (bsd.rd dated 14-Dec-2017 20:32) has my
laptop running in its usual soft purring mode :)
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
&
year's session at BSDCan can be found here:
https://home.nuug.no/~peter/pftutorial/ - we're basically looking
for ways to make those sessions more useful (the last one wasn't
awful we hear, but there's always room for improvement).
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149
I'll be looking forward to a
clean upgrade hopefully within some hours.
Keep up the good work!
All the best,
Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on a
bit others and is
being addressed already)?
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147:
101 - 200 of 938 matches
Mail list logo