On Sun, Jan 30, 2022 at 10:55:40AM +0100, Eric Faurot wrote:
> Hi.
>
> This diff makes use of the new libtls signer api to simplify tls privsep.
Updated diff after libtls signer api tweak by jsing@
Eric.
Index: ca.c
===
Hi.
This diff makes use of the new libtls signer api to simplify tls privsep.
Eric.
Index: ca.c
===
RCS file: /cvs/src/usr.sbin/smtpd/ca.c,v
retrieving revision 1.40
diff -u -p -r1.40 ca.c
--- ca.c14 Jun 2021 17:58:15 -
+1 improvement here too.
before: ~50 mbit/s
after: ~75 mbit/s
hth,
cheers,
eric.
On Tue, Oct 12, 2021 at 8:27 PM Felix Kronlage-Dammers
wrote:
>
> On Tue, Oct 12, 2021 at 04:29:47PM +0200, Hrvoje Popovski wrote:
>
> > > Please sync your source tree before attempting t
Hi.
A user reported that decoded SRS addresses are not correctly evaluated
against the ruleset. That's because the ruleset always matches against
the expanded address ("dest") and not the original address ("rcpt").
This diff should fix it.
Eri
oad
speed..
Upload: 74.45 Mbit/s
HTH,
Eric.
On Sat, Sep 11, 2021 at 12:15 PM Stefan Sperling wrote:
>
> On Fri, Sep 10, 2021 at 06:49:49PM +0200, Stefan Sperling wrote:
> > Here is another attempt at adding T
Hello,
X1 gen5 continues to work fine.
X1 gen9 x11 stopped crashing and is now usable! (Tiger lake)
Thank you!
Eric
On Thu, 8 Jul 2021 at 09:41, Jonathan Gray wrote:
>
> The latest xf86-video-amdgpu release was in 2019.
>
> xf86-video-amdgpu-19.1.0..origin/master
>
> minus
Except for specific cases, SMTP servers do not expect client
certificates for TLS sessions. The log message for missing certificate
is not very useful in practice (handshake fails before if it was
required anyway), and it is even confusing for people.
I think it can go away.
Eric.
Index
mplementation could be factorized a bit, but that's a
detail at this time. I think the close operation (is it really useful anyway?)
should use fclose() instead of kill(), and maybe wait() too?
Eric.
Hi.
Slightly updated diff, including sys/tree.h in smtpd.h.
Eric.
Index: aliases.c
===
RCS file: /cvs/src/usr.sbin/smtpd/aliases.c,v
retrieving revision 1.78
diff -u -p -r1.78 aliases.c
--- aliases.c 28 Apr 2020 21:46:43 -
On Thu, May 27, 2021 at 08:13:36AM -0600, Todd C. Miller wrote:
> On Thu, 27 May 2021 13:14:30 +0200, Eric Faurot wrote:
>
> > New diff with small tweaks.
>
> It looks like you are relying on sys/queue.h being included implicitly.
> Since smtpd.h uses the TAILQ macros,
New diff with small tweaks.
Eric.
Index: aliases.c
===
RCS file: /cvs/src/usr.sbin/smtpd/aliases.c,v
retrieving revision 1.78
diff -u -p -r1.78 aliases.c
--- aliases.c 28 Apr 2020 21:46:43 - 1.78
+++ aliases.c 26 May
Cruft has accumulated on that front. This diff cleans it up: the few
headers that are directly required for smtpd.h are included there, and
unnecessary includes are removed from the rest of the files.
Eric.
Index: aliases.c
===
RCS
() is called early in smtpctl.c, since it uses files (iobuf.c)
that uses the log api. It still logs to stderr though.
Eric.
Index: bounce.c
===
RCS file: /cvs/src/usr.sbin/smtpd/bounce.c,v
retrieving revision 1.83
diff -u -p -r1.83 bou
This diff removes more unused code.
Eric.
Index: config.c
===
RCS file: /cvs/src/usr.sbin/smtpd/config.c,v
retrieving revision 1.55
diff -u -p -r1.55 config.c
--- config.c9 Apr 2021 16:43:43 - 1.55
+++ config.c25
(undocumented) that can be recycled too
Eric.
Index: smtp.1
===
RCS file: /cvs/src/usr.sbin/smtpd/smtp.1,v
retrieving revision 1.11
diff -u -p -r1.11 smtp.1
--- smtp.1 22 May 2021 12:16:06 - 1.11
+++ smtp.1 22 May
Here is an updated diff integrating different suggestions I received.
- use -T (for TLS) instead of -O
- use getsubopt(3) which I didn't know
- manpage tweaks
Eric.
Index: smtp.1
===
RCS file: /cvs/src/usr.sbin/smtpd/smt
Hello.
This diff allows to specify protcols and ciphers in smtp(1).
I thought it was cleaner to added a generic -O option flag for this.
Eric.
Index: smtp.1
===
RCS file: /cvs/src/usr.sbin/smtpd/smtp.1,v
retrieving revision 1.9
On Wed, Apr 21, 2021 at 11:21:51AM +0200, Eric Faurot wrote:
> There is actually no reason to defer calls to tls_accept_socket() and
> tls_connect_socket() in an event callback. The code can be simplified
> by a great deal. It also eliminates the issue of keeping a reference
> to
There is actually no reason to defer calls to tls_accept_socket() and
tls_connect_socket() in an event callback. The code can be simplified
by a great deal. It also eliminates the issue of keeping a reference
to the listener tls context in the io structure.
Eric.
Index: ioev.c
On Sun, Apr 11, 2021 at 01:54:32PM +0200, Eric Faurot wrote:
> Certificate verification is done by libtls. The former code is not used
> anymore and can be unplugged.
Anyone willing to ok this?
> Eric.
>
> Inde
On Mon, Apr 12, 2021 at 07:56:57AM -0400, Dave Voutila wrote:
>
> Eric Faurot writes:
>
> > Certificate verification is done by libtls. The former code is not used
> > anymore and can be unplugged.
>
> Should cert.c be removed? I don't think it's used by sm
Certificate verification is done by libtls. The former code is not used
anymore and can be unplugged.
Eric.
Index: dispatcher.c
===
RCS file: /cvs/src/usr.sbin/smtpd/dispatcher.c,v
retrieving revision 1.2
diff -u -p -r1.2
Do not build unused files and remove related prototypes.
Also remove bogus libm dependency.
Index: smtpd.h
===
RCS file: /cvs/src/usr.sbin/smtpd/smtpd.h,v
retrieving revision 1.666
diff -u -p -r1.666 smtpd.h
--- smtpd.h 10 Apr 202
This diff removes unused code and lib depends from smtp(1).
Eric.
Index: smtpc.c
===
RCS file: /cvs/src/usr.sbin/smtpd/smtpc.c,v
retrieving revision 1.14
diff -u -p -r1.14 smtpc.c
--- smtpc.c 5 Mar 2021 12:37:32 - 1.14
Hi,
This diff allows to specify tls ciphers and protocols on listen rules,
as it's been done already for relay actions. While there, sanitize
error checking on protocols config in the mta.
Eric.
Index: config.c
===
RCS file:
If not cipher list is specified for a relay rule, fallback to
the global cipher list if defined, rather than libtls default.
This is closer to the previous behavior.
Eric.
Index: mta.c
===
RCS file: /cvs/src/usr.sbin/smtpd/mta.c,v
Any objection or ok?
On Sat, Mar 27, 2021 at 12:52:11PM +0100, Eric Faurot wrote:
> Hello.
>
> I get reports from people seeing "vfprintf %s NULL" in their logs
> recently. The problem is in a function that should be fixed,
> but that function is only expected to
uated when tracing is not set.
Eric.
Index: smtpd.h
===
RCS file: /cvs/src/usr.sbin/smtpd/smtpd.h,v
retrieving revision 1.662
diff -u -p -r1.662 smtpd.h
--- smtpd.h 5 Mar 2021 12:37:32 - 1.662
+++ smtpd.h 23 Mar 202
Hi.
This diff allows to specify the protocol versions and ciphers
to use for outgoing TLS sessions on a per relay basis.
Eric.
Index: mta.c
===
RCS file: /cvs/src/usr.sbin/smtpd/mta.c,v
retrieving revision 1.235
diff -u -p -r1.235
As spotted by krw@, the mta should use the mx hostname for sni, not
the reverse dns for the peer address.
Eric.
Index: mta_session.c
===
RCS file: /cvs/src/usr.sbin/smtpd/mta_session.c,v
retrieving revision 1.139
diff -u -p -r1.139
Hi.
The diff seems to work for the few people who tested it (thanks).
Anyone wants to ok this?
Eric.
Index: ca.c
===
RCS file: /cvs/src/usr.sbin/smtpd/ca.c,v
retrieving revision 1.37
diff -u -p -r1.37 ca.c
--- ca.c31 Dec
No much report so far.
Anybody had a chance to test this?
Here is the same diff again with manpage update this time.
Eric.
Index: ca.c
===
RCS file: /cvs/src/usr.sbin/smtpd/ca.c,v
retrieving revision 1.37
diff -u -p -r1.37 ca.c
led listener must have at least one certificate
explicitly set. The extra ones are used for SNI, and only the specified
certificates will be used for this listener. So there is no more fallback
or global lookup on configured pki names.
Tests and comments would be great
ing in place and just need to hook it up.
>
> OK?
ok eric@
> martijn@
>
> Index: smtpc.c
> ===
> RCS file: /cvs/src/usr.sbin/smtpd/smtpc.c,v
> retrieving revision 1.11
> diff -u -p -r1.11 smtpc.c
>
straight-forward and should not
change the current behaviour.
Please test and report if you are using server-side tls.
Eric.
Index: smtp_session.c
===
RCS file: /cvs/src/usr.sbin/smtpd/smtp_session.c,v
retrieving revision 1.426
diff
en "user"
expands to "catchall" because it is interpreted as "user@" (empty
domain).
The catch-all fallback mechanism is really meant for full email
addresses in virtual context, and should not happen for usernames.
The
Hi,
The current code for aliases_get() is a bit contorted I think.
This diff makes it clearer.
Eric.
Index: aliases.c
===
RCS file: /cvs/src/usr.sbin/smtpd/aliases.c,v
retrieving revision 1.77
diff -u -p -r1.77 aliases.c
is way, it is also explaining our behaviour in case
> of inet6 vs inet4 conditions.
>
> So... I think it should stay. Eric, do you have an opinion?
The doc lies because the inet6 option does not set the RES_USE_INET6
flag as stated. I think we should leave the entry in the doc but fix
th
On Tue, Apr 21, 2020 at 07:08:48AM +, gil...@poolp.org wrote:
> April 21, 2020 4:28 AM, "Todd C. Miller" wrote:
>
> > On Mon, 20 Apr 2020 15:01:31 +0200, Eric Faurot wrote:
> >
> >> There has been a discussion a while ago about the issue of trailing CR
the other envelope validation checks
that happen at envelope load time.
Eric.
Index: queue.c
===
RCS file: /cvs/src/usr.sbin/smtpd/queue.c,v
retrieving revision 1.189
diff -u -p -r1.189 queue.c
--- queue.c 30 Dec 2018 23:0
ction at the protocol level if needed.
So this diffs moves the CR stripping from io level to protocol level for
SMTP dialogs. Other uses of io_getline() are internal and expect simple LF
line ending. The current behavior should not change.
Comments?
Eric.
Index:
eld.
Note that this is a protocol change, so external filters will have
to be updated.
Eric.
Index: lka_filter.c
===
RCS file: /cvs/src/usr.sbin/smtpd/lka_filter.c,v
retrieving revision 1.60
diff -u -p -r1.60 lka_filter.c
--- lka_f
This diff makes the local enqueuer use CRLF line ending during the
SMTP dialog, as required by the protocol.
Eric.
Index: enqueue.c
===
RCS file: /cvs/src/usr.sbin/smtpd/enqueue.c,v
retrieving revision 1.117
diff -u -p -r1.117
id at the time you call the lookup function.
Another point, I don't understand how the parse_sender() function is
supposed to work. Can you give examples with cidr4 and cidr6?
Eric.
>
> Index: usr.sbin/smtpd/spfwalk.c
> ===
;m okay
> with your suggestion.
>
Here is a diff for that.
Note that it strips the '\r' on all input, not just DATA.
Eric.
Index: smtp_session.c
===
RCS file: /cvs/src/usr.sbin/smtpd/smtp_session.c,v
retrieving revisi
sure the RFC actually requires the server to reject mails with
"bare" '\r'. It just says the client must not transmit them. So maybe
we should just discard them at receive time...
To me, the only real problem with '\r' is at the end of lines. It's confusing
since you never really know whether it's part of the content or the protocol.
So I suggest that we strip all '\r' found at the end of a line,
and retain the others.
Eric.
On Tue, Sep 10, 2019 at 06:12:12PM +0100, Stuart Henderson wrote:
> > + if (!SSL_CTX_load_verify_locations(ssl_ctx, "/etc/ssl/cert.pem", NULL))
>
> shouldn't that use X509_get_default_cert_file()?
Yes, that looks better.
Updated locally.
Eric.
On Fri, Sep 06, 2019 at 08:41:21AM +0200, Eric Faurot wrote:
> Hi,
>
> This patch adds the missing bits for verifying the server certificate
> in smtp(1).
Take two: now check the name(s) of the server certificate.
I borrowed code from libtls for now. This will be cleaned up when t
Hi,
This patch adds the missing bits for verifying the server certificate
in smtp(1).
Eric.
Index: smtpc.c
===
RCS file: /cvs/src/usr.sbin/smtpd/smtpc.c,v
retrieving revision 1.8
diff -u -p -r1.8 smtpc.c
--- smtpc.c 2 Sep 2019
Hi Richard,
I'm still getting congestion using acpihpet0. Not sure about
the arp, i don't think there is that much. Older hardware
using bsd.mp on the same lan doesn't have this issue.
Thanks!
On Aug 22, 2019, at 5:57 AM, Richard Procter
wrote:
Hi Eric,
I was unfamili
using 6.6-beta. Only default daemons
and nsd are running.
Can somebody help me figure this out ?
Thanks !
Eric Camirand
===
sysctl kern.netlivelocks
kern.netlivelocks=2
===
Status: Enabled for 0 days 19:25:59 Debug: info
Hostid: 0xdc985578
Checksum: 0x5b36311462da2ab76
is not set on the lookup
directive, which feels consistent.
I have to review the resolver logic to see if a fix is needed at deeper
level. But still, this diff makes sense on its own, so ok eric@.
Eric.
On Wed, Jun 26, 2019 at 11:57:10AM +0200, Martijn van Duren wrote:
> Found this yesterda
ones).
Eric.
Index: smtpd.h
===
RCS file: /cvs/src/usr.sbin/smtpd/smtpd.h,v
retrieving revision 1.594
diff -u -p -r1.594 smtpd.h
--- smtpd.h 13 Dec 2018 17:08:10 - 1.594
+++ smtpd.h 17 Dec 2018 16:33:09 -
@@ -375,8 +
s his laptop output)
tried usb-c yubikey and usb-c harddrive, nothing happens, no new
devices, no power to the device
HTH,
Eric.
On Tue, Oct 23, 2018 at 1:11 PM Peter Hessler wrote:
>
> On 2018 Oct 22 (Mon) at 21:45:06 +0200 (+0200), Mark Kettenis wrote:
> :Diff below adds an acpipci(4) d
constistent altogether, and in practice it should not be
a problem because most smarthost configurations uses strict TLS.
Now, for the secondary MX example, the rule would look like:
action "do-backup" relay backup tls
Comments?
Eric.
Index: mta.c
==
With the recent changes in the smarthost syntax, and the removal of
the "secure" keyword, it's now possible to clarify the mta code by
changing the TLS option from a set flags to exclusive values.
This is far less confusing.
More cleanup to come in mta_session.c after that.
Eric
Hi.
Same diff with associated manpage update.
If there is no objection, I'd like to commit this quickly.
Eric.
Index: smtpd.conf.5
===
RCS file: /cvs/src/usr.sbin/smtpd/smtpd.conf.5,v
retrieving revision 1.199
diff -u -p -r
st
mails would be sent over a secure channel instead of plain text.
- an "smtp+tls://" relay would not fallback to plain text if STARTTLS fails,
and the mail will tempfail.
- in all other cases, the mail will tempfail with a warning.
Does that look fine?
Eric.
Index: to.c
the
following intended improvements:
- Use a more straightforward interface rather than the callback approach.
- Avoid unnecessary string copy.
- Stop using fixed-size string buffers, especially on the stack.
This is a step towards better handling of message line length in the daemon.
Please test an
we want to replace this with a simpler set of
IMSGs matching the standard resolver interface.
The rest of the code will be adapted little by little.
Eric.
Index: dns.c
===
RCS file: /cvs/src/usr.sbin/smtpd/dns.c,v
retrieving
ff for your proposal. It makes the
documentatino more accurate: the server certificate is always
verified, the flag is only meant to accept invalid certificates. It
also fixes build (apparently the mta.c chunk was incorrect).
Eric.
Index: mta.c
what conditions leads to rewriting the sender. As a
bonus, it also fixes a bug (actually not triggerable) in the removed
code ("!= 1" should be "== -1").
Please test, especially if you are using the "masquerade" option.
On Tue, Aug 29, 2017 at 10:26:19AM +0200, Eric Faurot wrote:
> Now that the filter code path has been short-circuited, start removing stub
> smtp_filter_*() indirections. I'm doing this one function at a time to keep
> the diffs simple, starting with smtp_filter_connect().
Actuall
Now that the filter code path has been short-circuited, start removing stub
smtp_filter_*() indirections. I'm doing this one function at a time to keep
the diffs simple, starting with smtp_filter_connect().
Eric.
Index: smtp_sess
All entries are then parsed
according to the table type. The "list" type can also be forced by using
the "@list" directive in a comment. This allows to define list of entries
containing a separator.
Existing table files should still be working as expected.
As a bonus, parse
Remove the table_static_parse() indirection for parsing the file content.
The "type" parameter is useless since the "(t->t_type & type)" test is always
true. I think this is a left-over from the old design when table parsing was
done in context of its intended use
that filter.c can be unhooked.
This is what the following diff does:
- drop filter configuration,
- drop filter events,
- simulate a positive reply for all filter queries,
- write message content directly to the file.
There should be no functionnal change.
Eric.
Index: p
as->as_ctx->ac_options & RES_USE_DNSSEC);
> + as->as_ctx->ac_options & (RES_USE_EDNS0 | RES_USE_DNSSEC));
> if (p.err) {
> DPRINT("error packing query");
> errno = EINVAL;
The current code is correct, RES_USE_EDNS0 does not imply RES_USE_DNSSEC.
The real problem is that there is no resolv.conf option for RES_USE_DNSSEC.
It can only be set in user code by tweaking _res.options.
Eric.
ume the session if the data_io path
> > hits the low water mark.
> >
> > Mr. Wolk tested this diff against smtpd on 6.1 as well as a against
> > -current version of smtpd (compiled on the same system running 6.1).
> >
>
> Nice catch, the diff reads fine to me, I'
Hi all,
I had some problems with dlna server (minidlna) and a lot of cuts and crashes
of the client when playing videos.
It seems that the default net.inet.udp.sendspace (9216 by default) variable is
not suitable. I have increased it as a result of the capacities of my network
and I no longer h
ok eric@
On Sun, Feb 26, 2017 at 10:58:07PM +0100, Jeremie Courreges-Anglas wrote:
>
> Fine with me, here's a diff to introduce as_flags only, still on top of
> the RES_USE_DNSSEC diff.
>
>
> diff -x CVS -pruN asr.1/asr.c asr/asr.c
> --- asr.1/asr.c Sat Feb
rver should set this meaning it has
> authenticated the data. I wrote a patch for DNSSEC (possibly erroneous
> by comparing it to you) and posted it to #opensmtpd in hopes that eric
> would see it. Much of that functionality is superfluous now but it does
> have an "AD_MASK" check.
>
ve postfix or exim.
>
> Since RES_USE_DNSSEC now actually adds an EDNS0 OPT record to the
> outgoing packet, one can be concerned with problems with resolvers out
> there. Windows seems to have a way to disable EDNS0, I am not aware of
> existing mechanisms elsewhere.
>
mments welcome.
>
Well, I like the as_flags cleanup part of the diff. Internal flags should
indeed be on the asr_query structure directly, so they are not confused
with query-specific parameters.
For the flags inheritance, I'm not so sure. I would rather keep the current
internal
Report the errno set by getifaddrs(3) if the setup for AI_ADDRCONFIG fails,
rather than a non-informative EAI_FAIL. Compare to -1 for error detection
while here.
Eric.
Index: asr/getaddrinfo_async.c
===
RCS file: /cvs/src/lib/libc
ature. I'm not
> suggesting that we use it by default right now, but this could be
> a desirable change.
>
> ok?
Yes, I like it a lot.
One small comment tough: better use T_OPT rather than 41 in _asr_pack_edns0().
Besides that, ok eric@
>
&g
iobuf_*
The diff is mostly mechanical.
Eric.
Index: bounce.c
===
RCS file: /cvs/src/usr.sbin/smtpd/bounce.c,v
retrieving revision 1.76
diff -u -p -r1.76 bounce.c
--- bounce.c22 Nov 2016 07:28:42 - 1.76
+++ bounce.c28
changes, it's now possible to make it a lot simpler
by triggering an event reload internally when data is queued. So the
api user does not have to worry about it.
Eric.
Index: ioev.c
===
RCS file: /cvs/src/usr.sbin/smtpd/ioe
The api user should not have to care about normalizing the io input
buffer (i.e. resetting the read/write pos in the buffer).
Do it internally when reloading the io event.
Eric.
Index: bounce.c
===
RCS file: /cvs/src/usr.sbin/smtpd
of the daemon.
Eric.
Index: ioev.c
===
RCS file: /cvs/src/usr.sbin/smtpd/ioev.c,v
retrieving revision 1.28
diff -u -p -r1.28 ioev.c
--- ioev.c 17 Nov 2016 07:33:06 - 1.28
+++ ioev.c 17 Nov 2016 14:01:28 -
This diff removes the IO_TLSVERIFIED which is not a io event, and
inlines the necessary code where the callback functions are called
for this event.
Eric.
Index: ioev.c
===
RCS file: /cvs/src/usr.sbin/smtpd/ioev.c,v
retrieving
he io structure. There
are places where the callback function is triggered outside of the io
layer. It's not desirable, and it needs to be fixed in a separate diff.
Eric.
Index: bounce.c
===
RCS file: /cvs/src/usr.sbin/smtpd/
listener(s)
to the current config list of listeners.
- make the fallback chain between interface(), host_v4() host_v6()
and host_dns() obvious when creating an if_listener.
- fix a bug where the specified family was ignored if the listener
is given as a hostname.
Comments?
Eric.
Index
sed to stop now. When doing so, they log as "debug" instead
of "info" because useless logs are useless.
This makes the shutdown sequence much saner.
Eric.
Index: ca.c
===
RCS file: /cvs/src/usr.sbin/smtpd/ca.c,v
The smtpd processes are not expected to ever leave their event loop.
So stop pretending that the *_shutdown() functions could ever be called
in this context, and just fatal() if event_dispatch() returns.
Eric.
Index: ca.c
===
RCS
On Sat, Sep 03, 2016 at 08:12:20PM +0200, Gilles Chehade wrote:
> On Sat, Sep 03, 2016 at 08:09:25PM +0200, Eric Faurot wrote:
> > Hi,
> >
> > Here is a diff to remove the "smtpctl stop" command.
> > The proper way to stop a daemon is kill(1)/pkill(1) only.
&g
Hi,
Here is a diff to remove the "smtpctl stop" command.
The proper way to stop a daemon is kill(1)/pkill(1) only.
It makes no sense to have different code path for that.
Eric.
Index: control.c
===
RCS file: /cvs/src/usr.
Can you guys try this diff?
Eric.
Index: rfc2822.c
===
RCS file: /cvs/src/usr.sbin/smtpd/rfc2822.c,v
retrieving revision 1.7
diff -u -p -r1.7 rfc2822.c
--- rfc2822.c 4 Feb 2016 22:35:17 - 1.7
+++ rfc2822.c 20 Aug 2016
-spamd.net
Below is the output from "bgpd -d".
Could this be related to recent tame changes?
BR,
Eric Ripa
startup
rereading config
route decision engine ready
session engine ready
listening on 0.0.0.0
listening on ::
SE reconfigured
neighbor 217.31.80.170: state change None -> Idle,
--- INSTALL.armv7.orig 2015-09-08 09:48:21.0 -0700
+++ INSTALL.armv7 2015-09-08 09:48:35.0 -0700
@@ -91,7 +91,7 @@ out as follows:
A miniroot filesystem to be used for
installation; Cubieboard1 version.
- miniroot-cubox-
> Neither; 100% is unrealistic. Getting '90%' on either measure exceeds
> my expectations.
The same percentage of flights would be acceptable?
I think that problem has been highlighted and we now belongs to all users to
check and submit oversights.
My 2 cents,
Regards,
--
Eric JACQUOT
that files
> >like /etc/rc.d/rwhod or /usr/bin/rwho should be removed.
>
> How much of a catastrophy is this?
>
> Question for the community: Do you want the upgrade instructions to
> be 100% useful, or 100% complete?
>
Hi,
IMHO, first useful then complete .
--
Eric JACQUOT
nbsd.cs.toronto.edu/cgi-bin/cvsweb/src/lib/libc/asr/gethostnamadr_async.c.diff?r1=1.28&r2=1.29&f=h
Eric.
On Sun, Feb 02, 2014 at 03:12:36PM +0100, IMAP List Administration wrote:
> [I forgot to send this to the list]
>
> Hi Eric,
>
> On 02/01/2014 11:43 AM, Eric Faurot wrote:
> > The following diff fixes the problems with the example IPs you gave us.
> > - subsequent
t; 173.231.138.204
>
> To summarize, gethostbyaddr() on OBSD 5.4 does not seem to be behaving
> properly
> and not as it did on 5.3.
>
> Can anyone confirm this?
>
> cheers,
>
> Rob Urban
Hi,
Thanks for your report.
The following diff
On Thu, Dec 26, 2013 at 06:28:33PM +0100, Mark Kettenis wrote:
> > Date: Thu, 26 Dec 2013 18:02:55 +0100
> > From: Eric Faurot
> >
> > +/*
> > + * This is the structure through which async_run() returns async
> > + * results to the caller.
> > + */
> &
n /usr/src/include before building.
Comments welcome.
Eric.
Index: include/Makefile
===
RCS file: /cvs/src/include/Makefile,v
retrieving revision 1.181
diff -u -p -r1.181 Makefile
--- include/Makefile8 Dec 2013 17:05:09 -
>diff -u -p -r1.166 index.html
> >--- index.html 23 Mar 2013 17:56:07 - 1.166
> >+++ index.html 2 Apr 2013 13:01:44 -
> >@@ -18,6 +18,13 @@
> > Presentations: AsiaBSDCon 2013
> >
> >
> >+https://poolp.or
change doesn't
introduce a regression. So please test and report problems you notice
to gil...@openbsd.org and e...@openbsd.org.
Thank you.
Eric.
Could I ask what your use-case is?
-E
On Fri, Aug 24, 2012 at 01:41:21PM +0200, Patrick Wildt wrote:
> the diff below adds an option to the ntpd(8), which has him provide
> time, even though he's not synced.
>
> ok?
>
> Index: ntpd.8
>
1 - 100 of 119 matches
Mail list logo