negative reactions. I'll give you this much better list for
free, with a total of 25083 adresses: http://www.bsdly.net/~peter/sortlist
Please make sure any future mailings of yours are sent to those
addresses first.
Yours sincerely
Peter N. M. Hansteen
--
Peter N. M. Hansteen, member of the first RFC
-might-be-a-spook.html
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
delilah spamd[29949]: 85.152.224.147: disconnected after 42673
about the implementation and some work that will hopefully hit the tree
soonish.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
delilah spamd
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.
and read the various
followups as well as several notes in http://www.openbsd.org/faq/current.html.
My favorite here is http://marc.info/?l=openbsd-cvsm=137162163212109w=2
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http
(Program committee member and speaker)
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
delilah spamd[29949]: 85.152.224.147: disconnected after 42673
reporting a bug would be in order,
if you have sufficient logging going on at least.
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
delilah
This has been asked and answered numerous times, with generous helpings of
shitheadery that serves to mask any real information offered. Check the archives
for the obvious keywords. There's nothing to add since the last iteration.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149
/spamd.key
-rw-r--r-- 1 root wheel 2048 Nov 1 2009 /etc/mail/spamd.key
(much on par with the rest of the files in that directory).
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember
remember whether they've made it available to the
general public.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
delilah spamd[29949
;)
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.
ready, unfortunately.
http://bsdly.blogspot.ca/2011/07/anticipating-post-altq-world.html gives some
background,
diffs are being tested by various people now, and the commit of the new
queueing system
*must* be moving closer by the minute. But no definite ETA just yet.
- P
--
Peter N. M
A bit late to the party, but here's my take on the situation -
http://bsdly.blogspot.ca/2013/05/the-term-hackathon-has-been-trademarked.html
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no
are generally considered useful.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
delilah spamd[29949]: 85.152.224.147: disconnected after
. pkg_add nfsen and reading
the package message should get you alle the way there inside a few
minutes.
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network
with the idea on
twitter, but ICBW).
The again, just a thought, after all these good people *were* willing to
spend the cash on our good cause.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember
.
see systat queue; run it as root.
What Stuart said. systat(8) rocks.
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
delilah spamd[29949
decision.
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.
(note: that
endorsement comes from the book's tech editor).
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
delilah spamd[29949
;)).
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.
the man pages.
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.
would change 'nwkey' to 'wpakey' and get sensible defaults.
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
delilah spamd[29949
there's a TRIM
deficiency that would hurt SSD users, I'm sure patches that solve the
problem will be welcomed by the developers.
- Peter
[1] http://manpages.ubuntu.com/manpages/oneiric/en/man8/fstrim.8.html
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.
elsewhere) will give
you what others have implemented interface renaming for.
- Peter (whose current pet hate is Solaris11's 'vanity names' for interfaces)
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no
probably
will be OK, and if your new card is a different make, all you need to do is some
minor editing of config files and maybe a mv or two of hostname.* files.
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http
data can be restored from a verified backup, right?
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
delilah spamd[29949]: 85.152.224.147
either the max-src-conn or the
max-src-conn-rate setting to see which one trips up the mobiles.
Possibly relevant question: do all clients receive the same content, or
is there a separate version you serve to mobile clients?
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation
automatic traffic graphs with a web interface to a reasonable subset of
useful traffic analysis features.
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious
N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.
no DHCP available.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
delilah spamd[29949]: 85.152.224.147: disconnected after 42673
or territories
have odd postal or customs services, for example.
for my own part, any delays in deliveries from .ca to .no have been just
that kind, but fortunately most of the time delivery has been quite speedy.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http
is required in ieee80211(9) before
those features can be supported.
which means you will need to stick to a, b or g modes for now.
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set
pppoe
pppoe (4) - PPP Over Ethernet protocol network interface
pppoe (8) - PPP Over Ethernet translator
Also, http://www.openbsd.org/cgi-bin/man.cgi
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no
', but then in
text-only communication there is I suppose scope for interpretation.
I'm a bit surprised if the apropos command is not general knowledge. I
think it's been available in some form on all unixishes I can remember,
but I could have suppressed memories of some. ;)
- P
--
Peter N. M
don't know. I assume Nick would
have a word or two to say about this.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
delilah spamd[29949
.
Did you search the mailing lists?
In almost all cases, 'search the mailing lists' is a friendly attempt to
provide a pointer to good information.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember
.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.
a number of tasks quite well.
I recently made the mistake of rebuilding openssl on a Pentium3 box,
cutting seriously into my beer time, but the day to day tasks it's been
assigned all those years the machine performs admirably.
- P
--
Peter N. M. Hansteen, member of the first RFC 1149
of the cases
they will recover semi-gracefully by themselves (as in, ssh sessions may
very well survive, others more hit and miss).
It's possible 'ifconfig rsu0 debug' will produce output that will be
useful in diagnosing what happens at the time of those drops.
--
Peter N. M. Hansteen, member of the first
search on the obvious keywords will show, whenever the
question has been raised earlier, the response from developers has been
less than enthusiastic.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no
get better hardware for free or the
price of a bus ticket.
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
delilah spamd[29949
are
free to add a copyright notice of your own, in addition to simliar
notices from previous contributors.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network
the offending IP address
to make sure you don't make any noise yourself by sending replies (pfctl
-k and adding to a table you block drop are optional extras).
- P
[1] http://bsdly.blogspot.ca/2012/12/ddos-bots-are-people-or-manned-by-some.html
--
Peter N. M. Hansteen, member of the first RFC
nothing.
The packages installed via pkg_add are a separate issue, but the
packages do depend on the base system (which is what you get,
essentially, from the install iso).
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http
of tar included, you have CVS, with even a web
frontend, see eg
http://www.openbsd.org/cgi-bin/cvsweb/src/bin/pax/tar.c
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit
prompts you, among other things, to
create at least one regular user. It's very useful to take advantage of
that opportunity.
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil
refined criteria, the query string you generate by point and
click is displayed so you get a useful starting point. (I've been
meaning to write a netflow/pflow/nfsen article for a while, but real
life including a few incidents where nfsen came in handy have kept
interfering).
- P
--
Peter N. M
the /pub/OpenBSD/5.2/packages/i386 directory does not exist).
Try another mirror or check whether that mirror either has an incomplete
packages
collection or an unexpected directory structure.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http
) is still reasonably fresh, datelined last July at
http://bsdly.blogspot.ca/2012/07/keeping-your-openbsd-system-in-trim.html
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set
block should really be discarded in favor of the second one, a true
brainfart if there ever was one), with some further field notes to be
found over at my blag.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http
cause of the problem.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
delilah spamd[29949]: 85.152.224.147: disconnected after 42673
IPv6
while they also have significant amounts of equipment that needs to be
kept running for a hard to determine number of years more even though it
is old enough that the manufacturers have declined to offer upgrades
that would enable the devices to support IPv6.
- Peter
--
Peter N. M. Hansteen
content.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.
in quick on iwn0 all flags S/SA
pass out log quick on re0 all flags S/SA
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
delilah spamd
happen. also try downloading the file or files from a different mirror
and
check for differences.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious
-system-in-trim.html
(a works for me guide).
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
delilah spamd[29949]: 85.152.224.147
updates from your
shell, but using some kind of remote administration software for
example.
Yes. That functionality would be relevant to the OP. I'd managed to
forget all about it, probably because the old .profile trick works so
well in other contexts.
- P
--
Peter N. M. Hansteen, member
be a useful place to start.
For those of us on even slimmer budgets, building infrastructure by dumpster
diving works too.
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit
FFS2 in OpenBSD support
extended attributes?
This commit message has a summary of why this was removed, along with
and a few related programs:
http://marc.info/?l=openbsd-cvsm=111904373614666w=2
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com
to differ. spamd(8) in any configuration is a lot more lightweight than
content filtering. You most likely will need content filtering in addition
to greylisting+greytrapping, but stopping them earlier is a real plus.
See eg http://undeadly.org/cgi?action=articlesid=20120604050025
--
Peter N. M
in the
defaults.
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.
book is update is 15/05/2012, the site web update is 19/05/2012.
it would be interesting to hear what book and web site you're referring
to here.
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no
, but for some reason mentions Dru Lavigne. Fact checking? Some of
us may have heard about it.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
to a hardware problem, either the card itself, the cables
involved or the switch port.
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
delilah spamd
to deal with this one.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.
improvement over what appeared to be the status only a
few years back. I still don't quite see why they left the crucial parts
of RFC5321 as ambigous as they had been in the predecessor, but a
greylisting RFC on the standards track is a very welcome development.
- Peter
--
Peter N. M. Hansteen, member
. That
did however not stop people from claiming otherwise, and it was a bit
disappointing back in 2008 to find that the update did not provide even
clearer language. All water under the bridge soonish now, it seems.
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http
shifting to a few minutes past the hour and
see if that helps.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
delilah spamd[29949
, but just a simple misconfiguration),
another thing you need to do is make sure the secondaries have the same
or equivalent level of spam and malware protection. That's where things
like spamd's syncronization options come in handy.
- P
--
Peter N. M. Hansteen, member of the first RFC 1149
In response to various tidbits that popped up in this thread, I put
together some notes on setting up a sane email system, in a works for
me article:
http://bsdly.blogspot.com/2012/05/in-name-of-sane-email-setting-up-spamd.html
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation
smtp traffic from the
members of the spamd-white table (and nospamd if you're using that) plus
the one that passes smtp traffic from your real mail server to
elsewhere. See the spamd and spamlogd man pages, it's explained there.
But why are you synproxying for spamd?
- P
--
Peter N. M. Hansteen
on options just because they're available.
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
delilah spamd[29949]: 85.152.224.147
to infer that from the error
message, though ;)
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
delilah spamd[29949]: 85.152.224.147
to somewhere in that tree. Here's hoping this produced
at least some CD sales and perhaps the odd book sale.
- Peter
PS Do get your EuroBSDCon submission in, tomorrow's the deadline
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http
pass out log on egress proto tcp to port smtp
it's possible you will find my tutorial and slides over at
http://home.nuug.no/~peter/pf/ helpful, and you'll find some
spamd-related field notes via the blogspot link in my .signature
- P
--
Peter N. M. Hansteen, member of the first RFC 1149
reach as packages. Do remember to read the supplied documentation and
config file comments properly, and you'll get there.
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.
0xAAA 0x...@online.de writes:
My suggestion: We create a new list, eg. trolling or smalltalk where
other
users can discuss about senseless questions.
Wouldn't it be even better if we headed them off with a web forum or
even a facebook group?
- P
--
Peter N. M. Hansteen, member
On Fri, Mar 09, 2012 at 08:28:37AM +0100, Fredrik Staxeng wrote:
Do you want users at all? Or was Linus right?
well, we *do* prefer those who come with a sense of humor.
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http
and their packages
around release-cutting time about half a year ago too. I'd expect snapshot
updates to resume soonish, but I have no firm dates or actual officialish info.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http
for the
various
multiboot options.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
delilah spamd[29949]: 85.152.224.147: disconnected after
usable system. But
then I tend to want OpenBSD as the main or only system.
Multiboot setups like the one the OP wanted requires a bit of paying
attention and is risky in general.
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http
EuroBSDcon 2012
===
EuroBSDcon is the European technical conference for users and
developers on BSD-based systems. The EuroBSDcon 2012 conference
will be held in Warsaw, Poland from Thursday 18 October 2012
to Sunday 21 October 2012, with tutorials on Thursday and Friday
and talks on
friend,
in this case specifically part 15 - http://www.openbsd.org/faq/faq15.html
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
(except the compNN.tgz set, which shrunk to
sixtyish megs compressed by weedning out irrelevancies soon after)
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all
of max connections and connections per seconds, that solved the
problem.
When dbg occurs, I cannot do a trace because it completely hangs.
Others have offered as useful input as can be had on those.
Good luck with the upgrade!
All the best,
Peter
--
Peter N. M. Hansteen, member of the first RFC
://www.openbsd.org/ should
be treated with caution, one of the things to look out for is some basic
familiarity with OpenBSD such as the points (possibly minor) I pointed
out earlier.
Cheers,
Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com
and the
man pages. OpenBSD documentation is both accessible and useful, and if
you're still stuck some of us have written supplementary docs that are
not that hard to find. Or come back here, reasonable questions usually
generate somewhat useful answers.
--
Peter N. M. Hansteen, member
pe...@bsdly.net (Peter N. M. Hansteen) writes:
for a simple dhcp setup, or for a fixed address and a specific link
speed something like (lifted from man hostname.if)
inet 10.0.0.1 255.255.255.0 10.0.0.255 description Bob's uplink
actually that does not specify a line speed, but the man pages
errors. This
sounds like the result of some fairly basic mistake, like trying to
install -current packages on -stable.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all
with, but you could possibly achieve what
you want
by putting your rules inside anchors and then do whatever manipulations you
want to
rules in the anchors from the command line. man pf.conf and man pfctl are your
friends.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http
. You may want to browse
the PF faq, with http://home.nuug.no/~peter/pf/en/ or the book it spawned
(http://www.nostarch.com/pf2.htm) as a useful supplement.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no
are written to be viewed via tcpdump, and it's a fairly trivial
excercise to
produce text output that will be acceptable for tools designed for syslog-like
formats. It's a common topic in my tutorials, variations have been mentioned
various places on-line (and it's in a certain book).
--
Peter N. M
?
This is what it looks like when your link goes down, then comes back
again. I'd check with the upstream if they know of any specific incident
that matches your disruption.
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http
to any - $NAT1
all of these would be in the new syntax something like
pass on $ext_if from $theonething nat-to $NATtheother
or you could rewrite to use match rules.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net
and netgraph are 'kernel-level', with some userland tools
attached to make the admin's life easier.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network
that.
If it's the altq syntax you object to, I'm slightly sympathetic, but a
whole new queueing system is being gradually introduced (the new prio
keyword is the first part), and from early access the new syntax will be
a lot easier to deal with.
--
Peter N. M. Hansteen, member of the first RFC
of traffic by quees 'systat queues' may be what you're
looking for. The other non-intrusive way to check (ie without editing
in tagging etc) would be 'pfctl -vvsr' -- if traffic matches rules that
do queue assignment, you'll see the counters.
--
Peter N. M. Hansteen, member of the first RFC 1149
to.
For single packet authorization, I'm not aware of any tool in base with
that capability, but a quick web search on OpenBSD single packet
authorization turns up evidence that others have been at least
considering the combination (and written some code).
--
Peter N. M. Hansteen, member
401 - 500 of 938 matches
Mail list logo