nstead of the default hardware raid mode.
Haven't had a chance to try the newer versions, but I wouldn't expect
any trouble
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil
osting would help follow the discussion a lot - a rant
about that and a couple of other things can be had at[1] for those in need).
[1] https://bsdly.blogspot.com/2011/02/problem-isnt-email-its-microsoft.html
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.b
ld be possible to answer in a mailing list message.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]:
ntally more fun (fsvo) as
more of the traffic moves to IPv6.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.
ml, for
the fun parts of doing greytrapping see
https://bsdly.blogspot.no/2013/05/keep-smiling-waste-spammers-time.html
and
https://bsdly.blogspot.no/2013/04/maintaining-publicly-available.html
and of course
https://bsdly.blogspot.no/2012/05/in-name-of-sane-email-setting-up-spamd.html
might still be of
ould be to simply
reinstall with as little deviation from the defaults as possible.
I didn't get hold of a ThinkPad that I was allowed to install OpenBSD on
until about 2006, but by then the install and use experience was
straightforward.
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 imp
be a lot
less of the heavy computation tasks involved in content filtering that
need to be performed.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all mal
t;> zfs is already there: https://marc.info/?l=openbsd-
>> cvs=136482823110105=
>> <https://marc.info/?l=openbsd-cvs=136482823110105=2>
>
> Why not implement it?
There is reason to believe that a port of the hitherto linux-only CPIP
(http://www.blug.linux.no/rfc11
On 08/19/17 11:44, Andreas Thulin wrote:
> Also, yesterday's
>
> # pkg_add -u
>
> failed for me, apparently for that same reason.
Yes, that would happen. Then again, changing ftp:// to https:// in
/etc/installurl would make pkg_add -u work.
- P
--
Peter N. M. Hansteen, member o
downloading bsd.rd only and then doing an http install as
much of a hardship (the process takes only a few minutes total either
way), but if the change was intentional it would probably be a good
thing to update the relevant web pages.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149
' and 'inet6 autoconf' are
> "equivalent" as far as /etc/netstart is concerned.
>
> What's the preferred setting for SLAAC in hostname.if(5)?
"inet6 autoconf" is what you get if you choose the autoconf option
during install.
I wasn't even aware that the old style "rtsol"
s can be had lightly used at attractive prices via ebay and
similar.
For UEFI and such, for my latest I simply did not change the BIOS
defaults away from "Secure Boot" and things just worked.
-- B< ----------
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149
t that device.
[1] http://bsdly.blogspot.com/2017/07/openbsd-and-modern-laptop.html
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traff
trackpoint, but then my typical work is
not too mouse-intensive.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29
oud' providers such as Amazon, Microsoft and others
have tended to be usable and some are now even adding official support.
So the short answer applies. (In addition we hav LDOMs on SPARC64, and possibly
others I've forgotten just now)
--
Peter N. M. Hansteen, member of the first RFC 1149 implementat
Also, http://man.openbsd.org/ is very useful - go there, type
your keyword in the search field, click apropos and you get all
the man pages matching that keyword.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http:/
I can come up with suitable wording unless somebody beats me to it.
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah s
in a table
(spamd-whitelist) for performance, but performance in response towards
grey or trapped hosts is not needed or expected, so the (possibly)
slower database lookup is considered sufficient.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.
P|lorgne...@dataped.no
but exactly matching or not) what's in the database could be the problem
here.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.
And it happened again -
On 05/07/17 23:48, Stuart Henderson wrote:
> On 2017-05-06, Peter N. M. Hansteen <pe...@bsdly.net> wrote:
>> And it happened again -
>> https://home.nuug.no/~peter/soffice_vs_x_csv/fehfeh.csv triggered
>> another kaboom, producing the log f
On Wed, May 10, 2017 at 01:20:06PM +0300, Manolis Tzanidakis wrote:
> On Wed (10/05/17), Peter N. M. Hansteen wrote:
> > That was the first option that came to mind, and the one I may go for as
> > a supplemental format *if* I can find a way to generate PDFs from this
> > so
upt other things I need to get done.
The in-browser print preview method is simply not a practical option.
And reverting to the previous powerpoint clone rubbish is right out. If I do
find a workable option, I'll let you all know.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementa
And I was just reminded off-list that the remark markdown variant
(https://github.com/gnab/remark) used for this presentation requires
javascript enabled in your browser.
Sorry about that.
I'll be looking into workarounds, hopefully some can be found.
- Peter
--
Peter N. M. Hansteen, member
/~peter/openbsd_and_you/
Updates may happen occasionally.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah s
On 05/07/17 23:48, Stuart Henderson wrote:
> On 2017-05-06, Peter N. M. Hansteen <pe...@bsdly.net> wrote:
>> And it happened again -
>> https://home.nuug.no/~peter/soffice_vs_x_csv/fehfeh.csv triggered
>> another kaboom, producing the log file
>> https://home.nuug.
dissecting the core file, in the
meantime this is evidence preserved.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah s
ome useful information.
> - look at /var/crash and profit
:D
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
del
tion is, of course: How do I go about usefully debugging this?
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]:
and some fairly straightforward scripting involving host and
pfctl commands.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
del
uleset.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.
u're not showing us?
(see the GREYTRAPPING section of the man page)
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah
And apropos of the subject, quite on-topic:
https://home.nuug.no/~peter/dmarc-reject_openbsd-misc_spadm_and_spf.txt
- P (pats robot on virtual head)
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no
something"
'system architect' responses.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.
vltime 530703
That's output from my laptop just now, with autoconfigured inet6 addresses. I
believe the pltime and vltime
values are given in seconds.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
&
ated, you could do worse than head
over to http://www.openbsd.org/donations.html and donate an equivalent
(or larger!) amount via whatever option appears appropriate.
I'm sure this will make you feel even better while downloading the release.
--
Peter N. M. Hansteen, member of the first RFC 1149 imple
was actually quite simple: the installer does not select the
bsd.mp kernel automatically, but do select it. Then it will get
installed and the system will boot the correct mp kernel.
I'm sure we can supply more detail if needed.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149
s in the competing
products are, but it *is* a very useful and capable tool for enforcing
whatever policies you have in place.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the ev
ween address families, you use inet and
inet6 respectively in the criteria.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic&quo
cluded.
On the other hand there is a chance we will be able to offer a similar
session at EuroBSDCon too, but no decisions have been made yet.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Reme
o you have questions on PF and related matters, or are there specific
topics you would like to see covered?
We want to hear from you, either contact us directly at the reply-to
address use the list.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot
e (yes, that could be time consuming),
if at all possible collecting dmesg output for each variation (saving to
somewhere on the usb stick you're installing from should work fine).
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://w
ely to be time consuming (just ask the people who did just that
on the OpenBSD source and ports trees at least once), but unless they get
everyone
explicitly on board with the new license they will need to go through one.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation tea
t most
of Michael's books, btw)
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconne
n even think of several tutorials and accompanying slides that deal
with what you are looking for, available right there on the Internet.
And even a book (*cough*).
But start with the PF FAQ, go on to the pf.conf man page and then move
to the other resources if you feel the need to.
--
Pete
Also, as I keep repeating to anybody who cares to listen, just like
"verbing weirds the language", "excessiv quicks weird your PF rule set".
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://ww
r the packet.
Also as Sebastien mentioned do check for any "set skip on lo" or similar
in your ruleset. If you have that, filtering simply does not happen on
interfaces or interface groups in the "set skip" rule.
--
Peter N. M. Hansteen, member of the first RFC 1149 im
I want with log data. Also, a few links to useful resources
such as http://bgp-spamd.net/.
I hope you find this useful.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evi
ffenberger's spf_fetch
script that takes a file of domain names and extracts the SPF info for
you: https://github.com/akpoff/spf_fetch
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to
econds mark.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.
able to a classic buffer overflow.
Yes. See http://www.tedunangst.com/flak/post/who-even-calls-link-ntoa
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malic
: connecting to wsdisplay0
uhidev1 at uhub4 port 5 configuration 1 interface 1 "Microsoft Wired
Keyboard 600" rev 2.00/3.00 addr 3
uhidev1: iclass 3/0, 2 report ids
uhid0 at uhidev1 reportid 1: input=2, output=0, feature=0
uhid1 at uhidev1 reportid 2: input=1, output=0, feature=0
uhub5 at u
d it's worth keeping in mind one other option: get
the highest quality access point or 'wireless router' you can afford, configure
it as access point only (no dhcp or routing, leave that to the OpenBSD tools)
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementati
On 11/26/16 04:57, R0me0 *** wrote:
> As I did see any mention around here, I was boosted to post this great
> presentation by Peter N . M. Hansteen.
>
> https://home.nuug.no/~peter/blug2016/
It's nice to hear you like it!
The meeting where I presented this was a lot less well att
d-command address=119.141.24.19 host=119.141.24.19 command="RCPT
> TO:" result="550 Invalid recipient"
> Nov 26 06:06:57 server smtpd[55880]: 3bcc430eee258cd7 smtp event=closed
> address=119.141.24.19 host=119.141.24.19 reason=disconnect
You could try configuring spamd(
n bit OpenBSD guests more frequently than others. But
again, we don't have sufficient information to help you diagnose.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit
xt few days. I'll
report back if I notice any difference.
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]:
.10/51.27 addr 4
uhidev2: iclass 3/1
ums0 at uhidev2: 3 buttons, Z dir
wsmouse0 at ums0 mux 0
uhub5 at uhub3 port 1 configuration 1 interface 0 "Intel Rate Matching
Hub" rev 2.00/0.00 addr 2
uhub6 at uhub5 port 3 configuration 1 interface 0 "Standard Microsystems
product 0x2660" r
e 0 "Alcor Micro USB Mouse" rev
1.10/51.27 addr 5
uhidev2: iclass 3/1
ums0 at uhidev2: 3 buttons, Z dir
wsmouse0 at ums0 mux 0
uhub5 at uhub3 port 1 configuration 1 interface 0 "Intel Rate Matching Hub" rev
2.00/0.00 addr 2
uhub6 at uhub5 port 3 configuration 1 inter
C) to create the situation.
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.
On Fri, Nov 18, 2016 at 05:56:20AM +1000, Stuart Longland wrote:
> On 18/11/16 05:51, Peter N. M. Hansteen wrote:
> > This is probably a one-off (actually two, but more about that later) that
> will only ever bite me and never be heard of againg, but I have to ask:
> >
> &g
this could have happened on two systems at roughly the
same time.
If any devs are interested, I'll probably let the last box run for a few days
more before doing any major surgery (assuming nothing else weird happens).
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http
the established schedule.
In the meantime, there are worse things knowledgeable OpenBSD users can do with
their time than trying out snapshots to get the feel for how development is
progressing.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ ht
If this is what the original poster is trying to address, blocking
on an additional table sourced from a file might be useful.
[1] https://home.nuug.no/~peter/pf/en/bruteforce.html
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www
That's what ftp-proxy is for. It inserts the rules it needs in the
anchor. My hunch is that you're not actually allowing traffic initiated
by the proxy to pass.
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://w
to mind).
The packet loss could conceivable by a side effect of the number of
states going into the territory where timeouts are scaled down
(exceeding 60% of state table limit IIRC).
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://
ich claims that ASLR is indeed enabled by default in all recent Ubuntu
releases.
Well, something in this story doesn't quite fit. Until we see the actual
code, and a credible demonstration, I remain unconvinced that the paper
tells the whole truth.
--
Peter N. M. Hansteen, member of the first RFC
ttps://gist.github.com/lattera/c785e7088118442f10addf8c6017c7d0 with
a finished version due whenever he gets it done.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all
somewhat similar reaction as yours when I first read
about the binary PF logs, but in practical terms the way it's done
actually makes sense.
- P
[1] One such setup is described, with some anecdotes just because, at
http://bsdly.blogspot.com/2014/02/yes-you-too-can-be-evil-network.html
--
1
and the USB drive was recognized and mountable.
I had vaguely noticed some USB related commits recently, but hey, you
fixed things!
dmesg from today is up at
https://home.nuug.no/~peter/dmesg_elke_20160920.txt.
Thanks!
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 impl
_add -v wget
> >
> > cant find wget
See previous.
> > 4.
> >
> > cd /usr/games
> >
> > hangman
Check your PATH.
> > nothing works
Start with the FAQ. It has lots of useful information and possibly some
useful links to other resources.
--
Peter N. M.
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.
problem is fixed.
this sounds like I should perhaps worry a little less.
Thanks!
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic&q
too weak to begin with.
I suspect your problem may be overuse of the quick keyword. Remember,
once you hit a quick rule that matches, processing for that packet stops
right there.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://w
-for-you.html
[2]
https://lists.freebsd.org/pipermail/freebsd-announce/2014-May/001550.htm
l
- --
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic&quo
d strongly
recommend either getting some hardware you don't care about too much or spin up
a VM in a virtualization setup you're comfortable with.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Rem
net>, helo reliefs.herpprotcol.eu
If you see something similar, your're good for that part at least.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malic
u actually need
and
leaving behind the stuff that just made its way in by accident.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic&
ginally imagined. Then again, now that
the thing is actually silent for the most part, that may not be a bad thing.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bi
out what fail and how,
of course.
Some access points are just plain weird - in some cases I've had to play with
of all things mtu sizes (setting them to various values lower than the 1500
byte default) in order to successfully connect. Any quirks like those will
turn up as the hints tcpdump will
to twiddle here, but if there is, will you
realistically see any difference in performance (assuming this is about
shaving cycles off)?
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on a
s, ie
ifconfig athn0 up nwid foo wpakey foospresharedsecret
but there is a wpa-supplicant package available if you need it.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all m
les
(photos etc) from the device to my OpenBSD machines is to use an SFTP or
SCP client. I imagine there are several such applications available for
the ipad too.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug
the install could turn out to be very useful.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.1
l -wm jan 2016 January 2016 Mo Tu We Th Fr Sa
> Su 1 2 3 [53] 4 5 6 7 8 9 10 [ 1] 11 12 13 14 15 16 17 [ 2]
> 18 19 20 21 22 23 24 [ 3] 25 26 27 28 29 30 31 [ 4]
Ah, excellent!
cal -wm certainly covers almost all my week numbering needs :)
- --
Peter N. M. Hansteen, member
t aware of (and of course there's
the Monday vs Sunday as week start day issue).
- - P
- --
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic
f each one. It's worth noting that tcpdump with the right
options is able to display information such as the packets's ToS and
which rule in the loaded PF rule set the packet matched.
If you run those tests properly and report your findings, I'm sure it
will be appreciated.
- --
Peter N. M. Hanste
b.com/anonymous/69e047797f696c1df8eaa0c82e39e01d
As in, is that a pf.conf for the thing that tries to run curl or is it
a separate system?
- --
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember
to spend significant time studying,
experimenting, making mistakes and fixing them.
> thanks for any reply.
I'm sure replies will be more constructive if you offer up some more
information about the actual problem.
- --
Peter N. M. Hansteen, member of the first RFC 1149 implementati
CLUDE OUTPUT WHEN REPORTING THIS PANIC!"
If you had done that and reported the contents, that would have been a lot more
useful.
http://www.openbsd.org/report.html is a useful starting point. If you can get
the system
to boot somehow, sendbug(1) is your friend.
--
Peter N. M. H
anyway, but delivery would not happen immediatel
y.
The only advice I can offer is to check that your side has a
reasonable retry period (IIRC default setups for all the MTAs on
OpenBSD come with reasonable settings, but do check), and tell the
other side that for their own sake they need to fix thei
ion at sourceforge, it's possible you'd
be well served with bandwidth monitoring via symon and friends or by
setting up pflow and using one of the several netflow packages to
generate graphs and suchlike.
- --
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspo
int as the
domain
for their internal-but-occasionally-internet-visible machines comes to mind.
For a totally separate set of reasons, I was not compelled to stick around to
help them
sort out that particular mess.
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
h
If no, what is the true story of BSD developers?
Others have already supplied references to useful literature. I would suggest
you
read those things. Several other useful references are just a simple web search
away.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementati
dhcrelay: send_packet: No buffer space available
I've seen that message only when a link or interface is down but for
some reason the machine still thinks that it's OK to route packets over
it anyway.
So I'd start with checking routing vs actually available links.
--
Peter N. M. Hansteen
or more
queues approach a threshold that triggers shaping/.
If you can come up with measurements that show the mechanism is
defective, I'm sure a bug report would be appreciated.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http
a peek
at the relevant source files while preparing to measure anything).
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah s
you
could come fairly close to that regime with some state tracking and
overload tables trickery to match a finer-grained set of queues.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember t
there, possibly with more
sophisticated approaches than the ones I've mentioned here?
Good suggestions may merit a beverage of choice (within reason) at the first
possible opportunity.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http
out of packages (or ports) tends to land somewhere
under /usr/local, so the binaries you're looking for will likely be in
/usr/local/bin.
Other than that, pasting the error message (minus the hostname) into a
favorite search engine produces a number of potentially useful hints.
--
Peter N. M
the userland side, the networking configuration will be changed to
> a slightly different approach, but I kind of suspended this until the
> previous issue is solved.
for the terminally curious among us, do you have a ballpark figure for when
it comes back in GENERIC? (as in, pre- or post-5
201 - 300 of 938 matches
Mail list logo