Re: 5.5beta wierds

2014-01-22 Thread Otto Moerbeek
On Tue, Jan 21, 2014 at 11:58:44AM -0700, Todd C. Miller wrote: On Tue, 21 Jan 2014 10:44:00 +0100, Otto Moerbeek wrote: And here's the man page diff, our ctime and asctime actually do not ever return NULL, while posix allows that. Isn't it worth documenting that ctime and asctime are

Re: signed packages

2014-01-22 Thread Loganaden Velvindron
On Fri, Jan 17, 2014 at 3:26 PM, Marc Espie es...@nerim.net wrote: It's probably time to talk about it. Yes, we are now distributing signed packages. A lot of people have probably noticed because there was a key mismatch on at least one batch of signed packages. Obviously, we haven't

kill RN_DEBUG code

2014-01-22 Thread Claudio Jeker
The RN_DEBUG code is broken since rev 1.1 I see no reason to keep it any longer and removing the code makes the result easier to read. OK? -- :wq Claudio Index: net/radix.c === RCS file: /cvs/src/sys/net/radix.c,v retrieving

RTF_HOST and netmask

2014-01-22 Thread Martin Pieuchot
Diff below kills the unused RTAX_NETMASK arguments and the global variable associated of two requests where a route to host is added or deleted. ok? Index: netinet6/in6.c === RCS file: /home/ncvs/src/sys/netinet6/in6.c,v retrieving

Re: RTF_HOST and netmask

2014-01-22 Thread Claudio Jeker
On Wed, Jan 22, 2014 at 11:29:59AM +0100, Martin Pieuchot wrote: Diff below kills the unused RTAX_NETMASK arguments and the global variable associated of two requests where a route to host is added or deleted. ok? OK, setting RTF_HOST and passing a netmask is crazy talk so kill it.

if_detach() addresses cleanup

2014-01-22 Thread Martin Pieuchot
Network addresses added to the interface local list thought ifa_add() are the link-local address and the IPv4/6 ones. Since if_detach() now calls in_ifdetach(), there should be no address left on the list apart from the link-layer one at this stage. So the diff below removes it directly, there's

Re: signed packages

2014-01-22 Thread Marc Espie
On Wed, Jan 22, 2014 at 01:46:33PM +0400, Loganaden Velvindron wrote: The signing framework in pkg_add/pkg_create is much older than that, if was written for x509 a few years ago, but signify(1) will probably be more robust and ways simpler. In particular, there's no chain-of-trust, so

Re: signed packages

2014-01-22 Thread Stuart Henderson
On 2014/01/22 13:46, Loganaden Velvindron wrote: On Fri, Jan 17, 2014 at 3:26 PM, Marc Espie es...@nerim.net wrote: It's probably time to talk about it. Yes, we are now distributing signed packages. A lot of people have probably noticed because there was a key mismatch on at least one

Re: signed packages

2014-01-22 Thread Jiri B
On Wed, Jan 22, 2014 at 11:28:50AM +, Stuart Henderson wrote: The model is: only the specific keys placed in /etc/signify are trusted. The plan is to include the public keys used for signing release n+1 in release n. So once you trust a particular key, by verifying signatures on sets

Re: signed packages

2014-01-22 Thread Bob Beck
Yeah. Ok mister chicken before egg.. We should validate this thing shipped in a release using dnssec with a root of trust depending on root certs shipped with the release...Love that idea.. But maybe I'll just buy a CD. On 22 Jan 2014 05:13, Jiri B ji...@devio.us wrote: On Wed, Jan 22,

Re: signed packages

2014-01-22 Thread Bob Beck
Our lists are so full of helpful smart people who think chains of trust are magical pixie dust coming from root-provider-fairylands where the root cert faires live in castles of uncompromising fortitude that are never full of government plants and are whose certificates are magically transported

Re: signed packages

2014-01-22 Thread Bob Beck
I think I'll make sure to advertise the next OpenBSD Foundation funding campaign by suggesting that you're not actually not real people, but a helpful-suggestions-posting-bot sponsored by the NSA.. Or maybe it's that they've infiltrated our educational systems... Please get our your tinfoil

Re: signed base installs

2014-01-22 Thread Ted Unangst
On Wed, Jan 22, 2014 at 15:33, Christian Weisgerber wrote: Theo de Raadt dera...@cvs.openbsd.org wrote: There are a few raw edges still, but we would appreciate if this is tried by a few people.. please give us feedback. Well, it works for me for installs and updates on amd64 and i386.

Re: 5.5beta wierds

2014-01-22 Thread Todd C. Miller
On Wed, 22 Jan 2014 10:26:47 +0100, Otto Moerbeek wrote: yeah, I first had that and then deleted it. OK. - todd

Re: signed packages

2014-01-22 Thread Giancarlo Razzolini
Em 22-01-2014 11:00, Bob Beck escreveu: Our lists are so full of helpful smart people who think chains of trust are magical pixie dust coming from root-provider-fairylands where the root cert faires live in castles of uncompromising fortitude that are never full of government plants and are

Re: signed packages

2014-01-22 Thread Ted Unangst
On Wed, Jan 22, 2014 at 11:28, Stuart Henderson wrote: (IIRC somebody suggested printing keys on the tshirts, not sure if print resolution on fabric is really up to that without making the text so big as to be horribly ugly, posters may work though.) It's only 56 letters. 3 rows of 19 should

Re: signed packages

2014-01-22 Thread Kenneth Westerback
We did print the whole blowfish implementation on the back of a t-shirt, and I can still read mine. So a key should not be a problem. :-) . Ken On 23 January 2014 09:13, Ted Unangst t...@tedunangst.com wrote: On Wed, Jan 22, 2014 at 11:28, Stuart Henderson wrote: (IIRC somebody

Re: signed packages

2014-01-22 Thread Ian McWilliam
On 23/01/2014 12:52 AM, Bob Beck wrote: I think I'll make sure to advertise the next OpenBSD Foundation funding campaign by suggesting that you're not actually not real people, but a helpful-suggestions-posting-bot sponsored by the NSA.. Or maybe it's that they've infiltrated our educational

Re: Buggy i386 install55.iso

2014-01-22 Thread Rod Whitworth
Latest snap (2014-01-22) has same bug although I don't recall the original one rebooting after the crash as this one does. OTOH cranial memory rusty... On Wed, 22 Jan 2014 12:09:44 +1100, Rod Whitworth wrote: Date 2014-01-20 Downloaded copies from two mirrors same result. Second one from

pf_check_proto_cksum(): simplify ICMP checksum verification

2014-01-22 Thread Lawrence Teo
This diff simplifies the verification of ICMP checksums in pf_check_proto_cksum() by letting it use the same in4_cksum() call that is used for TCP and UDP checksums. As a bonus, since in4_cksum() doesn't need that m_data/m_len dance the code becomes much shorter as well. OK? Index: pf.c