Hi,
i'm not an ssl hacker at all, but while debugging openssl -starttls
issues against an xmpp server, i stumbled upon
https://rt.openssl.org/Ticket/Display.html?id=2860user=guestpass=guest
which fixes some issue with -starttls xmpp and adds the possibility to
use -xmpphost in case there's some
My recent change in this area weren't quite right. As a result
non-kms pci video drivers might not have been working properly on
various platforms. I just committed a fix for an issue where on
i386/amd64 a write combining mapping would be requested even if it
shouldn't.
Another issue is that
Simple conversion to getaddrinfo. Noticed while debugging a comsat
issue.
- todd
Index: libexec/mail.local/mail.local.c
===
RCS file: /cvs/src/libexec/mail.local/mail.local.c,v
retrieving revision 1.33
diff -u -p -u -r1.33
sven falempin (2015-07-06 22:00 +0200):
On Mon, Jul 6, 2015 at 2:24 PM, Tim van der Molen tb...@xs4all.nl wrote:
Ping.
Tim van der Molen (2015-05-17 11:42 +0200):
nsd.conf may contain keys, so store its checksum only. Also update the
path to unbound's root.key.
Index:
Ping.
Tim van der Molen (2015-05-17 11:42 +0200):
nsd.conf may contain keys, so store its checksum only. Also update the
path to unbound's root.key.
Index: changelist
===
RCS file: /cvs/src/etc/changelist,v
retrieving
On Mon, Jul 06, 2015 at 03:14:23PM +0200, Mark Kettenis wrote:
My recent change in this area weren't quite right. As a result
non-kms pci video drivers might not have been working properly on
various platforms. I just committed a fix for an issue where on
i386/amd64 a write combining mapping
On Sun, Jul 05, 2015 at 05:52:54PM -0600, Theo de Raadt wrote:
Why is sudo being removed from base? It is pretty useful. I imagine many
use sudo
Sorry, we are making room in the tree so that lynx can come back.
An actual serious answer would make sense at this point, you know...
On Sun, Jul 05, 2015 at 05:52:54PM -0600, Theo de Raadt wrote:
Why is sudo being removed from base? It is pretty useful. I imagine many
use sudo
Sorry, we are making room in the tree so that lynx can come back.
An actual serious answer would make sense at this point, you know...
Hi,
This diff allows to send messages over TCP to syslogd.
ok?
bluhm
Index: usr.sbin/syslogd/privsep.c
===
RCS file: /data/mirror/openbsd/cvs/src/usr.sbin/syslogd/privsep.c,v
retrieving revision 1.53
diff -u -p -r1.53 privsep.c
It is discouraged but possible to run pkg_add(1) with -n or -s as a user
other than root. However, if pkg_add(1) does not have write permission to
$PKG_CACHE, then unclear error messages are produced. For example:
$ ls -ld $PKG_CACHE
drwxr-xr-x 2 root wheel 3072 Jul 2 12:13 /var/pkg_cache
You're right, this most probably needs a fix.
However, if pkg_add(1) does not have write permission to
$PKG_CACHE, then unclear error messages are produced.
So, there is an error which makes you think.
You notice and consider something is not that right, then go to address
the issue.
In the
On Tue, 7 Jul 2015, li...@wrant.com wrote:
One solution is for pkg_add(1) to silently omit the attempt to copy
the package to an unwritable $PKG_CACHE.
The end result with the change proposed would be to hide the problem you
have with permissions for $PKG_CACHE. In the end you will not
On Mon, 6 Jul 2015, Dale Lindskog wrote:
I confirmed also that Perl's '-w' returns true on a directory even when
write permission is completely removed from that directory.
I should have said:
I confirmed also that, *when the Perl program is run by root*, Perl's '-w'
returns true on a
On Mon, 6 Jul 2015, Chris Bennett wrote:
If you don't have root access, should you really be installing packages?
It is impossible to install packages when you are not root. pkg_add won't
let you.
This isn't about installing packages without root access. This is about
the -n and -s
On Mon, Jul 06, 2015 at 07:15:06PM -0600, Dale Lindskog wrote:
It is discouraged but possible to run pkg_add(1) with -n or -s as a user
other than root. However, if pkg_add(1) does not have write permission to
$PKG_CACHE, then unclear error messages are produced. For example:
$ ls -ld
There's no need to send a NUL byte to comsat, it NUL-terminates the
buffer itself.
- todd
Index: libexec/mail.local/mail.local.c
===
RCS file: /cvs/src/libexec/mail.local/mail.local.c,v
retrieving revision 1.34
diff -u -p -u -r1.34
The message sent by mail.local ends in a newline so we need to trim
it before calling strtonum(). Also adds some debugging syslogs
that were useful along the way (disabled by default).
- todd
Index: libexec/comsat/comsat.c
===
RCS
17 matches
Mail list logo