Re: telnetd broken in -CURRENT

2002-01-30 Thread Mark Murray

 On Wed, Jan 30, 2002 at 01:47:24PM +, Mark Murray wrote:
  No. We dont. But if Kerberos5 is asked for, then BSD telnet is linked
  against Heimdal.
  
  I'm testing the fix, and will commit in a day or two.
 
 OK, great.  I assume you'll import it on the vendor branch?

Yup!

M
-- 
o   Mark Murray
\_  FreeBSD Services Limited
O.\_Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: Step5, pam_opie OPIE auth fix for review

2002-01-21 Thread Mark Murray

This is looking good!

Please keep a close eye on style (there is at least one assignment in
an if () statement that needs to move out. :-)

M

 --=-=-=
 
 Dag-Erling Smorgrav [EMAIL PROTECTED] writes:
  Umm, you can't use opiechallenge() for that.  You're not supposed to
  call opiechallenge() without also calling opieverify() (plus, I think
  opiechallenge() consumes a challenge).  Use opielookup() instead.
 
 Even better, opie_haskey() (which is a wrapper around opielookup()).
 New patch attached.
 
 DES
 -- 
 Dag-Erling Smorgrav - [EMAIL PROTECTED]
 
 
 --=-=-=
 Content-Type: text/x-patch
 Content-Disposition: attachment; filename=pam_opieaccess.diff
 
 Index: Makefile
 ===
 RCS file: /home/ncvs/src/lib/libpam/modules/Makefile,v
 retrieving revision 1.15
 diff -u -r1.15 Makefile
 --- Makefile  5 Dec 2001 15:55:14 -   1.15
 +++ Makefile  21 Jan 2002 00:46:54 -
 @@ -34,6 +34,7 @@
  .endif
  SUBDIR+= pam_nologin
  SUBDIR+= pam_opie
 +SUBDIR+= pam_opieaccess
  SUBDIR+= pam_permit
  SUBDIR+= pam_radius
  SUBDIR+= pam_rootok
 Index: pam_opie/pam_opie.8
 ===
 RCS file: /home/ncvs/src/lib/libpam/modules/pam_opie/pam_opie.8,v
 retrieving revision 1.4
 diff -u -r1.4 pam_opie.8
 --- pam_opie/pam_opie.8   14 Jul 2001 08:38:24 -  1.4
 +++ pam_opie/pam_opie.8   21 Jan 2002 01:18:58 -
 @@ -1,5 +1,13 @@
  .\ Copyright (c) 2001 Mark R V Murray
  .\ All rights reserved.
 +.\ Copyright (c) 2002 Networks Associates Technologies, Inc.
 +.\ All rights reserved.
 +.\
 +.\ Portions of this software were developed for the FreeBSD Project by
 +.\ ThinkSec AS and NAI Labs, the Security Research Division of Network
 +.\ Associates, Inc.  under DARPA/SPAWAR contract N66001-01-C-8035
 +.\ (CBOSS), as part of the DARPA CHATS research program.
 +.\
  .\
  .\ Redistribution and use in source and binary forms, with or without
  .\ modification, are permitted provided that the following conditions
 @@ -9,6 +17,9 @@
  .\ 2. Redistributions in binary form must reproduce the above copyright
  .\notice, this list of conditions and the following disclaimer in the
  .\documentation and/or other materials provided with the distribution.
 +.\ 3. The name of the author may not be used to endorse or promote
 +.\products derived from this software without specific prior written
 +.\permission.
  .\
  .\ THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
  .\ ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 @@ -47,6 +58,13 @@
  .Dq Li auth
  feature.
  It also provides a null function for session management.
 +.Pp
 +Note that this module does not enforce
 +.Xr opieaccess 5
 +checks.
 +There is a separate module,
 +.Xr pam_opieaccess 8 ,
 +for this purpose.
  .Ss OPIE Authentication Module
  The OPIE authentication component
  provides functions to verify the identity of a user
 Index: pam_opieaccess/Makefile
 ===
 RCS file: pam_opieaccess/Makefile
 diff -N pam_opieaccess/Makefile
 --- /dev/null 1 Jan 1970 00:00:00 -
 +++ pam_opieaccess/Makefile   21 Jan 2002 00:53:49 -
 @@ -0,0 +1,10 @@
 +# $FreeBSD$
 +
 +LIB= pam_opieaccess
 +SHLIB_NAME=  ${LIB}.so
 +SRCS=${LIB}.c
 +DPADD=   ${LIBOPIE}
 +LDADD=   -lopie
 +MAN= pam_opieaccess.8
 +
 +.include bsd.lib.mk
 Index: pam_opieaccess/pam_opieaccess.8
 ===
 RCS file: pam_opieaccess/pam_opieaccess.8
 diff -N pam_opieaccess/pam_opieaccess.8
 --- /dev/null 1 Jan 1970 00:00:00 -
 +++ pam_opieaccess/pam_opieaccess.8   21 Jan 2002 13:07:06 -
 @@ -0,0 +1,116 @@
 +.\ Copyright (c) 2001 Mark R V Murray
 +.\ All rights reserved.
 +.\ Copyright (c) 2002 Networks Associates Technologies, Inc.
 +.\ All rights reserved.
 +.\
 +.\ Portions of this software were developed for the FreeBSD Project by
 +.\ ThinkSec AS and NAI Labs, the Security Research Division of Network
 +.\ Associates, Inc.  under DARPA/SPAWAR contract N66001-01-C-8035
 +.\ (CBOSS), as part of the DARPA CHATS research program.
 +.\
 +.\
 +.\ Redistribution and use in source and binary forms, with or without
 +.\ modification, are permitted provided that the following conditions
 +.\ are met:
 +.\ 1. Redistributions of source code must retain the above copyright
 +.\notice, this list of conditions and the following disclaimer.
 +.\ 2. Redistributions in binary form must reproduce the above copyright
 +.\notice, this list of conditions and the following disclaimer in the
 +.\documentation and/or other materials provided with the distribution.
 +.\ 3. The name of the author may not be used to endorse or promote
 +.\products derived from this software without specific prior written
 +.\permission

Re: Step5, pam_opie OPIE auth fix for review

2002-01-21 Thread Mark Murray

 On Mon, Jan 21, 2002 at 14:07:48 +0100, Dag-Erling Smorgrav wrote:
  Dag-Erling Smorgrav [EMAIL PROTECTED] writes:
   Umm, you can't use opiechallenge() for that.  You're not supposed to
   call opiechallenge() without also calling opieverify() (plus, I think
   opiechallenge() consumes a challenge).  Use opielookup() instead.
  
  Even better, opie_haskey() (which is a wrapper around opielookup()).
  New patch attached.
 
 Yes, this patch works as expected, but I doubt about opie_haskey() status.
 It looks like non-standard FreeBSD addition since it is in the local
 opieextra.c file and not in contrib/opie. If you care about
 machine independance, better use opielookup() directly.

No, that is OK. :-)

The FreeBSD PAM modules are all written from scratch as BSD PAM modules.

M
-- 
o   Mark Murray
\_  FreeBSD Services Limited
O.\_Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: pam_opie(8) prompt

2002-01-21 Thread Mark Murray

 Does anybody mind if I change the pam_opie(8) prompt from Password:
 to Response:?  I think users might be slightly confused when they
 enter an incorrect or empty response twice and get a new Password:
 prompt and don't realize it's the pam_unix(8) prompt.

Nope - that sounds good!

M
-- 
o   Mark Murray
\_  FreeBSD Services Limited
O.\_Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: Step6, corresponding /etc/pam.d/* fixes for review

2002-01-21 Thread Mark Murray

 On Mon, Jan 21, 2002 at 16:33:57 +0100, Dag-Erling Smorgrav wrote:
  
  1) there's no reason to have pam_opie commented out now, it won't do
 
 One reason still exist: all users (i.e. non-OPIE too) will see OTP
 responses when pam_opie will be uncommented. It may leads to confusion or
 wrong automated scripts processing.
 
 I have idea to solve it adding no_fake_prompts option to pam_opie to
 control that per admin choice.

Yes. That would be a good move. :-)

M
-- 
o   Mark Murray
\_  FreeBSD Services Limited
O.\_Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: pam_opie(8) prompt

2002-01-21 Thread Mark Murray

 Andrey A. Chernov [EMAIL PROTECTED] writes:
  Yes, I see it too now. It is definitely some bug here. When I say in 
  login I mean I test it through:
 
 The bug is quite simply that pam_opie(8) never sets the AUTHTOK item,
 so pam_unix(8) doesn't know that the user already entered a password.
 
 I believe pam_get_pass() should set PAM_AUTHTOK.  Any objections?

Not from me :-)

M
-- 
o   Mark Murray
\_  FreeBSD Services Limited
O.\_Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: Step6, corresponding /etc/pam.d/* fixes for review

2002-01-21 Thread Mark Murray

 Here are the (hopefully) final patches.  Any final objections before I
 commit the lot?

According to EyeBall Mk1, this is fine! :-)

I haven't extensively tested the code, but the methods used and the
design are very sound, I believe.

M
-- 
o   Mark Murray
\_  FreeBSD Services Limited
O.\_Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: Step2, pam_unix just expired pass fix for review

2002-01-20 Thread Mark Murray

 Bug: 
 There is possible when pam_sm_acct_mgmt() called, password is not
 expired, but due to some delay between calls (like network delays for NIS
 passwords), expired at the moment of pam_sm_authenticate() check.

It is not pam_sm_authenticate()'s job to determine such things as expiry.
This is the business of pam_sm_acct_mgmt().

 It may allow user to enter with expired password under some circumstanes 
 when he is not allowed to do it.

Do you mean that at at the very edge of password expiry, the user may
still be able log in (maybe some seconds later)? If so this is not a
credible threat.

 Fix:
 Use traditional Unix check (like found in pre-PAM ftpd.c and login.c) for 
 password expiration at the last moment, i.e. right after checking that it 
 is valid.

This fix is wrong for pam_sm_authenticate(), but valid for pam_sm_acct_mgmt().
pam_sm_acct_mgmt() already has something functionally equivalent.

M

 --- pam_unix.c.bak1   Sun Jan 20 21:42:47 2002
 +++ pam_unix.cSun Jan 20 21:58:45 2002
 @@ -152,6 +152,8 @@
  
   retval = strcmp(encrypted, pwd-pw_passwd) == 0 ?
   PAM_SUCCESS : PAM_AUTH_ERR;
 + if (pwd-pw_expire  time(NULL) = pwd-pw_expire)
 + retval = PAM_AUTH_ERR;
   }
   else {
  
 -- 
 Andrey A. Chernov
 http://ache.pp.ru/
-- 
o   Mark Murray
\_  FreeBSD Services Limited
O.\_Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: Step1, pam_unix srandomdev fix for review

2002-01-20 Thread Mark Murray

 Bug:
 srandomdev() can't be used in libraries because it touch internal RNG
 state which may be used by user program which not want true randomness but
 pseudo one.
 
 Fix:
 srandomdev() removed, random() replaced by arc4random() which initialize 
 itself from true randomness automatically.

This works, but strikes me as overkill. This is salt, not cryptographic
randomness, so 'srandom(junk)' is most likely better as a replacement
for srandomdev() (where 'junk' can be time(), pid or anything similar).

Salt's purpose is to make pre-computing a dictionary infeasable from
the pure space perspective.

M

 --- pam_unix.c.oldSat Jan 19 21:29:49 2002
 +++ pam_unix.cSun Jan 20 21:42:47 2002
 @@ -502,15 +502,14 @@
   syslog(LOG_ERR, cannot set password cipher);
   login_close(lc);
   /* Salt suitable for anything */
 - srandomdev();
   gettimeofday(tv, 0);
 - to64(salt[0], random(), 3);
 + to64(salt[0], arc4random(), 3);
   to64(salt[3], tv.tv_usec, 3);
   to64(salt[6], tv.tv_sec, 2);
 - to64(salt[8], random(), 5);
 - to64(salt[13], random(), 5);
 - to64(salt[17], random(), 5);
 - to64(salt[22], random(), 5);
 + to64(salt[8], arc4random(), 5);
 + to64(salt[13], arc4random(), 5);
 + to64(salt[17], arc4random(), 5);
 + to64(salt[22], arc4random(), 5);
   salt[27] = '\0';
  
   pwd-pw_passwd = crypt(pass, salt);
 @@ -596,15 +595,14 @@
   syslog(LOG_ERR, cannot set password cipher);
   login_close(lc);
   /* Salt suitable for anything */
 - srandomdev();
   gettimeofday(tv, 0);
 - to64(salt[0], random(), 3);
 + to64(salt[0], arc4random(), 3);
   to64(salt[3], tv.tv_usec, 3);
   to64(salt[6], tv.tv_sec, 2);
 - to64(salt[8], random(), 5);
 - to64(salt[13], random(), 5);
 - to64(salt[17], random(), 5);
 - to64(salt[22], random(), 5);
 + to64(salt[8], arc4random(), 5);
 + to64(salt[13], arc4random(), 5);
 + to64(salt[17], arc4random(), 5);
 + to64(salt[22], arc4random(), 5);
   salt[27] = '\0';
  
   if (suser_override)
 -- 
 Andrey A. Chernov
 http://ache.pp.ru/
-- 
o   Mark Murray
\_  FreeBSD Services Limited
O.\_Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: Step3, pam_opie snprintf bloat fix for review

2002-01-20 Thread Mark Murray

 Bug:
 snprintf is large and slow, increasing program size and slowing it down.
 Better way is avoid snprintf when it is not neccessary.
 
 Fix:
 Full functionality of snprintf is not needed below, so it is replaced by 
 much faster strlcpy.

This is fine!

Style - please make it 'sizeof(foo)', not 'sizeof foo'.

M

 --- pam_opie.c.bakSat Jan 19 21:29:49 2002
 +++ pam_opie.cSun Jan 20 22:23:18 2002
 @@ -125,7 +125,7 @@
   }
  
   /* We have to copy the response, because opieverify mucks with it. */
 - snprintf(resp, sizeof resp, %s, response);
 + strlcpy(resp, response, sizeof resp);
  
   /*
* Opieverify is supposed to return -1 only if an error occurs.
 -- 
 Andrey A. Chernov
 http://ache.pp.ru/
 
 To Unsubscribe: send mail to [EMAIL PROTECTED]
 with unsubscribe freebsd-current in the body of the message
-- 
o   Mark Murray
\_  FreeBSD Services Limited
O.\_Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: Step2, pam_unix just expired pass fix for review

2002-01-20 Thread Mark Murray

 On Sun, Jan 20, 2002 at 19:47:55 +, Mark Murray wrote:
  
  Do you mean that at at the very edge of password expiry, the user may
  still be able log in (maybe some seconds later)? If so this is not a
  credible threat.
 
 Yes. Few seconds can be few hours or more in case network is down or
 something like, this mainly for network passwords like NIS.

This is still not something that is pam_authenticate()'s business. If
you believe that this is a problem, then the order and time in which
these are done inside pam needs to be addressed, not by kluging 
pam modules. Perhaps the PAM-using applications need to be looked at
as well to make sure they don't do anything silly.

pam_authenticate() answers the question does the user have the correct
credentials?. pam_acct_mgmt() answers the question OK - they are who
they say they are. Are they allowed in _now_?.

M
-- 
o   Mark Murray
\_  FreeBSD Services Limited
O.\_Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: Step1, pam_unix srandomdev fix for review

2002-01-20 Thread Mark Murray

 On Sun, Jan 20, 2002 at 19:55:31 +, Mark Murray wrote:
  
  This works, but strikes me as overkill. This is salt, not cryptographic
  randomness, so 'srandom(junk)' is most likely better as a replacement
  for srandomdev() (where 'junk' can be time(), pid or anything similar).
 
 You can't call srandom() from the libraries for the same purposes as 
 srandomdev(), i.e. it damages user application current RNG state in the 
 same way.

Hmm. OK. Do you understand, though, why the salt does not need
cryptographic randomness?

Another patch of yours replaced sprintf with a faster strlcpy,
but this uses the _much_ slower arc4random() which is not
necessary IMO. How about just using pid's or something?

The original crypt(3) salt quantised the time-of-day into
4096 pieces for the salt - how about doing something like
that? UUEncode time()|pid()|getuid() might work just fine.


 I mean this:
 
 1) User call srandom(3)
 
 2) Library calls srandomdev() or srandom(123)
 
 Second step is effectively damages srandom(3) RNG state.
 
 -- 
 Andrey A. Chernov
 http://ache.pp.ru/
-- 
o   Mark Murray
\_  FreeBSD Services Limited
O.\_Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: Step1, pam_unix srandomdev fix for review

2002-01-20 Thread Mark Murray

  Second step is effectively damages srandom(3) RNG state.
 
 Since the library is a totally encapsulated usage, it makes sense
 for it to save and restore state aroun its use of the functions,
 which would effectively allow concurrent use of the generator
 with other code that uses it.
 
 Other code that cares about the state should do the same.

True but not trivial. I'd be happy to commit working patches :-)

M
-- 
o   Mark Murray
\_  FreeBSD Services Limited
O.\_Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: Step5, pam_opie OPIE auth fix for review

2002-01-20 Thread Mark Murray
requiredpam_ssh.so  no_warn try_first_pass
  auth requiredpam_unix.so no_warn try_first_pass nullok
  #authsufficient  pam_rootok.so   no_warn
 --- login.bak Sat Jan 19 21:29:49 2002
 +++ login Mon Jan 21 00:39:04 2002
 @@ -6,7 +6,7 @@
  
  # auth
  auth requiredpam_nologin.so  no_warn
 -#authsufficient  pam_opie.so no_warn
 +#auth [defalt=ignore success=done cred_insufficient=die] pam_opie.so  no_warn
  #authsufficient  pam_kerberosIV.so   no_warn try_first_pass
  #authsufficient  pam_krb5.so no_warn try_first_pass
  #authrequiredpam_ssh.so  no_warn try_first_pass
 --- ftpd.bak  Sat Jan 19 21:29:49 2002
 +++ ftpd  Mon Jan 21 00:39:04 2002
 @@ -9,10 +9,8 @@
  #authsufficient  pam_kerberosIV.so   no_warn
  #authsufficient  pam_krb5.so no_warn
  #auth   sufficient  pam_ssh.so  no_warn try_first_pass
 -# Uncomment either pam_opie or pam_unix, but not both of them.
 -# pam_unix can't be simple chained with pam_opie, ftpd provides proper fallback
 -auth requiredpam_opie.so no_warn
 -#authrequiredpam_unix.so no_warn try_first_pass
 +#auth [defalt=ignore success=done cred_insufficient=die] pam_opie.so  no_warn
 +auth requiredpam_unix.so no_warn try_first_pass
  
  # account
  #account requiredpam_kerberosIV.so
 
 -- 
 Andrey A. Chernov
 http://ache.pp.ru/
 
 To Unsubscribe: send mail to [EMAIL PROTECTED]
 with unsubscribe freebsd-current in the body of the message
-- 
o   Mark Murray
\_  FreeBSD Services Limited
O.\_Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: Step5, pam_opie OPIE auth fix for review

2002-01-20 Thread Mark Murray

 On Sun, Jan 20, 2002 at 23:14:13 +, Mark Murray wrote:
  
  The PAM OPIE may only do OPIE authentication. It is entirely up to the
  PAM stack to decide what the login policy is.
  
  (Well, the PAM stack as specified by the pam configs in /etc/pam*)
 
 Yes. And to allow PAM stack to make right decision, pam_opie pass special
 information to PAM stack. Look at the patch, pam_opie not breaks from the
 stack by yourself, it is /etc/pam* do that using information from
 pam_opie.

Sure - but you are making specialised use of the return value that
assumes that pam_opie will be followed by pam_unix. This violates
the PAM spec.

  However - the module may pass on the authentication token (the password)
  and any following modules are allowed to use this if they find it.
  (look at the try_first_pass and use_fist_pass options).
 
 I was thinking about that way but not find a good solution. That way 
 workatround is:
 
 1) In the failure case when Unix (plaintext) passwords are disabled 
 pam_opie can pass specially-generated incorrect password down to pam_unix.
 
 2) pam_unix option must be changed from try_first_pass to 
 use_first_pass, because it asks again for password if try_first_pass 
 active, i.e. allows user to enter Unix (plaintext) password again. So we 
 have the same bug, but shifted to one prompt step.

You may be able to do something with options. Example: if the sysadmin
allows a password to be passed down the stack, otherwise pass a dummy.

(like
ftpdauthrequiredpam_opie.so keep_password
or similar)

 I have doubts about 1): what specially-generated incorrect password 
 can be? It seems that any combination is legal and MAY be equal to real 
 password.

Nope. kill the password if it is not allowed. Pass a NULL.

M
-- 
o   Mark Murray
\_  FreeBSD Services Limited
O.\_Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: Step5, pam_opie OPIE auth fix for review

2002-01-20 Thread Mark Murray

 On Sun, Jan 20, 2002 at 23:44:44 +, Mark Murray wrote:
 
   Yes. And to allow PAM stack to make right decision, pam_opie pass special
   information to PAM stack. Look at the patch, pam_opie not breaks from the
   stack by yourself, it is /etc/pam* do that using information from
   pam_opie.
  
  Sure - but you are making specialised use of the return value that
  assumes that pam_opie will be followed by pam_unix. This violates
  the PAM spec.
 
 The alternative (yet one) way can be adding Unix (plaintext) password
 checking code directly to pam_opie. It makes pam_opie fully independent of
 other modules and specific position in the /etc/pam.d/* config files and
 allows us to not touch them. If you agree with that way, I'll come with
 the patch.

No. I completely disagree with that method. that is pam_unix's job.

DES's PAM_IGNORE suggestion has a lot of merit.

 About other points stated in your message, my answer depends on what you
 deside for above, because it is unneded to discuss them, if you agree to
 make pam_opie self-containing.

It must be self-contained, and it must not do stuff that is the job
of other modules. Unix password checking is not pam_opie's job.

M
-- 
o   Mark Murray
\_  FreeBSD Services Limited
O.\_Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: Step5, pam_opie OPIE auth fix for review

2002-01-20 Thread Mark Murray

 Dag-Erling Smorgrav [EMAIL PROTECTED] writes:
  In any case, if I understand what you're trying to do, it can be done
  by returning PAM_SUCCESS if OPIE authentication succeeded, PAM_IGNORE
  if it failed but Unix authentication is still allowed, and
  PAM_AUTH_ERR if OPIE failed and Unix authentication is *not* allowed.
  In that case, if you mark pam_opie sufficient, pam_unix will run
  only if OPIE authentication failed but allowed Unix authentication to
  proceed.
 
 Hmm, actually, that won't do.  I need to think this over some more.

The usual route is YES or NO, with IGNORE reserved for modules which
have no authentication (like say, pam_motd, which prints /etc/motd
during the pam_session_open() phase). IGNORE may have other uses,
but I can't remember them offhand.

M
-- 
o   Mark Murray
\_  FreeBSD Services Limited
O.\_Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: Step5, pam_opie OPIE auth fix for review

2002-01-20 Thread Mark Murray

 sufficient will not works due to IGNORE assigned to AUTH_ERR reaction.
 
 [default=ignore success=done auth_err=die] 
 
 works.
 
 Do you agree with this variant?

Eeew. It may work, but it is really a last-ditch sort of thing.

I much prefer an option that specifies the behaviour.

M
-- 
o   Mark Murray
\_  FreeBSD Services Limited
O.\_Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: Question to PAM hackers

2002-01-06 Thread Mark Murray

 Is there a way (i.e. interface function) to check if particular PAM module 
 loaded, inside application?

No. Annd nor should there be. The authentication process with PAM means
that the authentication policy (including which modules are loaded) are
none of the applications damn business :-)

M
-- 
o   Mark Murray
\_  FreeBSD Services Limited
O.\_Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: *HEADS UP!* This means you!

2001-12-10 Thread Mark Murray

 I for one will miss it.  I used libexec/telnetd extensively during ia64
 bootstrap (and still use it) before we had the crypto stuff going.  This
 was all built by hand, 'make world' still isn't an option there.  I also
 use usr.bin/telnet on other systems where SRA is constantly getting in 
 my face and annoying the !^@#%!@^#!# out of me.

All that will happen, is that the usual sources will be gone, and
a .PATH: will point to effectively the same code (with some crypto
in it, wrapped in #ifdefs that won't apply, like ENCRYPTION and
AUTHENTICATION). The code this actually compiled will not change
_at_all_.

There will be no SRA unless you install secure/ telnet.

M
-- 
o   Mark Murray
\_  FreeBSD Services Limited
O.\_Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



*HEADS UP!* This means you!

2001-12-09 Thread Mark Murray

Hi

Now that I have your attention, please listen up, this may have some
far-reaching consequences.

We currently have 2 telnet sources in the src/ tree; src/crypto/telnet
and the base telnet spread around in (src/*/*telnet*/).

The base telnet is a complete subset of src/crypto telnet, and as
a consequence of this, I want to remove the base telnet bits from
the src/ tree. (Just the source, not the build infrastructure).

This will be accomplished by removing the base sources, and building
telnet without defining the AUTHENTICATION and ENCRYPTION macros. These
macros are currently used with unifdef to make (by hand) the base
telnet stuff).

I'm not sure when I'll make the commit, but it will be soonish, with
due fanfare.

Those of you who believe that you may be in trouble with your
government by having crypto in your posession (as opposed to using
it), please let me know ASAP! This will make src/crypto mandatory
if you want telnet(d). This will _not_ make crypto _use_ mandatory.

M
-- 
o   Mark Murray
\_  FreeBSD Services Limited
O.\_Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: cu(8) completely broken

2001-12-06 Thread Mark Murray

 Well, it would seem that the cu upgrade has totally hosed cu now:
 
 # cu -l /dev/cuaa1 -s 9600
 usage: tip [-v] [-speed] [system-name]
 
 Can we get this fixed please?

Yes.

Import coming.

M
-- 
o   Mark Murray
\_  FreeBSD Services Limited
O.\_Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: building cvsup from ports

2001-11-20 Thread Mark Murray

 There is already a patch in PR ports/30899.  It is OK to commit it
 IF you can test it first on a FreeBSD 4.x system (any architecture)
 and also a -current Alpha system.

Cool! Thank you!

M

 
 John
 
 Mark Murray wrote:
  John
  
  I have a patch (courtesy of Brian Somers) that fixes M3. I believe
  he has submitted it to you.
  
  May I/We commit it?
  
  M
  
  Hello all,
 Sounds like a silly place to post this but...here goes.  I'm getting errors
  compiling cvsup from ports.  The ports tree installed is the default coming
  with the 11/12/01 snapshot.  I want would use CVS, but I don't know how (and
  yet I call my self a computer science student).  It complains about nfs/nfs.h
  not existing (I checked, it doesn't).  This is the first thing I have built
  from ports except X in -current, so all of the dependencies besides X were
  built with this port during make install.  I remeber seeing this post on
  stable a while ago, but can't find the message for the life or me.  The error
  is appended for amusment to those individuals who understand such things.
  
  regards,
  Galen Sampson
  
  # cd /usr/ports/net/cvsup
  # make install
  To build this port without X11 (and without the GUI), define WITHOUT_X11.
  ===  Extracting for cvsup-16.1e
   Checksum OK for cvsup-snap-16.1e.tar.gz.
  ===   cvsup-16.1e depends on file:
  /usr/local/lib/m3/FreeBSD4/libm3formsvbt.so.7 - not found
  ===Verifying install for /usr/local/lib/m3/FreeBSD4/libm3formsvbt.so.7 in
  /usr/ports/lang/pm3-forms
  ===  Extracting for pm3-forms-1.1.15
   No MD5 checksum file.
  ===   pm3-forms-1.1.15 depends on file:
  /usr/local/lib/m3/FreeBSD4/libm3vbtkit.so.7 - not found
  ===Verifying install for /usr/local/lib/m3/FreeBSD4/libm3vbtkit.so.7 in
  /usr/ports/lang/pm3-gui
  ===  Extracting for pm3-gui-1.1.15
   No MD5 checksum file.
  ===   pm3-gui-1.1.15 depends on file: /usr/local/lib/m3/FreeBSD4/libm3tcp.so.7
  - not found
  ===Verifying install for /usr/local/lib/m3/FreeBSD4/libm3tcp.so.7 in
 /usr/ports/lang/pm3-net
  ===  Extracting for pm3-net-1.1.15
   No MD5 checksum file.
  ===   pm3-net-1.1.15 depends on file: /usr/local/lib/m3/FreeBSD4/libm3.so.7 -
  not found
  ===Verifying install for /usr/local/lib/m3/FreeBSD4/libm3.so.7 in
  /usr/ports/lang/pm3-base
  ===  Installing for pm3-base-1.1.15
  cd boot-FreeBSD4/m3core/FreeBSD4; gmake -f make.boot CC=cc CFLAGS=-O -pipe 
  AS=as ASFLAGS= AR=ar ARFLAGS=rv RANLIB=touch EXTRALIBS=-lm
  LDFLAGS=
  gmake[1]: Entering directory
  `/usr/ports/lang/pm3-base/work/pm3-1.1.15/boot-FreeBSD4/m3core/FreeBSD4'
  cc -O -pipe-c -o RTHeapDepC.o RTHeapDepC.c
  RTHeapDepC.c:101: nfs/nfs.h: No such file or directory
  RTHeapDepC.c: In function `mount':
  RTHeapDepC.c:719: dereferencing pointer to incomplete type
  RTHeapDepC.c:719: dereferencing pointer to incomplete type
  RTHeapDepC.c:720: dereferencing pointer to incomplete type
  RTHeapDepC.c:720: dereferencing pointer to incomplete type
  RTHeapDepC.c:721: dereferencing pointer to incomplete type
  RTHeapDepC.c:721: dereferencing pointer to incomplete type
  gmake[1]: *** [RTHeapDepC.o] Error 1
  gmake[1]: Leaving directory
  `/usr/ports/lang/pm3-base/work/pm3-1.1.15/boot-FreeBSD4/m3core/FreeBSD4'
  gmake: *** [boot] Error 2
  *** Error code 2
  
  Stop in /usr/ports/lang/pm3-base.
  *** Error code 1
  
  Stop in /usr/ports/lang/pm3-base.
  *** Error code 1
  
  Stop in /usr/ports/lang/pm3-base.
  *** Error code 1
  
  Stop in /usr/ports/lang/pm3-net.
  *** Error code 1
  
  Stop in /usr/ports/lang/pm3-net.
  *** Error code 1
  
  Stop in /usr/ports/lang/pm3-net.
  *** Error code 1
  
  Stop in /usr/ports/lang/pm3-net.
  *** Error code 1
  
  Stop in /usr/ports/lang/pm3-net.
  *** Error code 1
  
  Stop in /usr/ports/lang/pm3-net.
  *** Error code 1
  
  Stop in /usr/ports/lang/pm3-net.
  *** Error code 1
  
  Stop in /usr/ports/lang/pm3-gui.
  *** Error code 1
  
  Stop in /usr/ports/lang/pm3-gui.
  *** Error code 1
  
  Stop in /usr/ports/lang/pm3-gui.
  *** Error code 1
  
  Stop in /usr/ports/lang/pm3-gui.
  *** Error code 1
  
  Stop in /usr/ports/lang/pm3-gui.
  *** Error code 1
  
  Stop in /usr/ports/lang/pm3-gui.
  *** Error code 1
  
  Stop in /usr/ports/lang/pm3-gui.
  *** Error code 1
  
  Stop in /usr/ports/lang/pm3-forms.
  *** Error code 1
  
  Stop in /usr/ports/lang/pm3-forms.
  *** Error code 1
  
  Stop in /usr/ports/lang/pm3-forms.
  *** Error code 1
  
  Stop in /usr/ports/lang/pm3-forms.
  *** Error code 1
  
  Stop in /usr/ports/lang/pm3-forms.
  *** Error code 1
  
  Stop in /usr/ports/lang/pm3-forms.
  *** Error code 1
  
  Stop in /usr/ports/lang/pm3-forms.
  *** Error code 1
  
  Stop in /usr/ports/net/cvsup.
  *** Error code 1
  
  Stop in /usr/ports/net/cvsup.
  *** Error code 1
  
  Stop in /usr/ports/net/cvsup.
  *** Error code 1
  
  Stop in /usr/ports/net/cvsup.
  *** Error code 1
  
  Stop in /usr/ports/net/cvsup.
  *** Error code 1
  
  Stop in /usr/ports/net/cvsup.
  *** Error

Re: make installworld failure in usr.bin/tip

2001-11-18 Thread Mark Murray

  Erm, it _is_ fixed in the makefile. If you have a better method, lets hear
  it. :-)
 
 Back out the entire tip commit?  This would also restore all the FreeBSD
 changes clobbered by it.  It doesn't even compile cleanly:

Entirely different problem.

M
-- 
o   Mark Murray
\_  FreeBSD Services Limited
O.\_Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: make installworld failure in usr.bin/tip

2001-11-17 Thread Mark Murray

 Mark, Poul-Henning,
 
 So, what was the concensus?  Should we fix this in Makefile,
 or just put this as an UPDATING entry and have users manually
 remove the old UUCP stuff?

Erm, it _is_ fixed in the makefile. If you have a better method, lets hear
it. :-)

M

 On Sat, Nov 03, 2001 at 05:07:01PM +0100, Poul-Henning Kamp wrote:
  
  === usr.bin/tip
  install -c -s -o root -g wheel -m 555   tip /flat/syv/usr/bin
  /flat/syv/usr/bin/cu - /flat/syv/usr/bin/tip
  ln: /flat/syv/usr/bin/cu: Operation not permitted
  *** Error code 1
  
  flat# ls -l /flat/syv/usr/bin/cu
  -r-sr-sr-x  1 uucp  dialer  124384 Oct 21 13:04 /flat/syv/usr/bin/cu
  flat# /flat/src/usr.bin/tip
  flat# cvs log Makefile | less
  [...]
  total revisions: 10;selected revisions: 10
  description:
  
  revision 1.7
  date: 2001/10/30 21:22:08;  author: markm;  state: Exp;  lines: +1 -1
  Make the dirty, rotten hack failsafe and quiet if cu(1) does not exist.
  
  
  I'm sure there is a connection somewhere...
  
  -- 
  Poul-Henning Kamp   | UNIX since Zilog Zeus 3.20
  [EMAIL PROTECTED] | TCP/IP since RFC 956
  FreeBSD committer   | BSD since 4.3-tahoe
  Never attribute to malice what can adequately be explained by incompetence.
  
  To Unsubscribe: send mail to [EMAIL PROTECTED]
  with unsubscribe freebsd-current in the body of the message
 
 -- 
 Ruslan ErmilovOracle Developer/DBA,
 [EMAIL PROTECTED] Sunbay Software AG,
 [EMAIL PROTECTED]FreeBSD committer,
 +380.652.512.251  Simferopol, Ukraine
 
 http://www.FreeBSD.orgThe Power To Serve
 http://www.oracle.com Enabling The Information Age
-- 
o   Mark Murray
\_  FreeBSD Services Limited
O.\_Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: building cvsup from ports

2001-11-17 Thread Mark Murray

John

I have a patch (courtesy of Brian Somers) that fixes M3. I believe
he has submitted it to you.

May I/We commit it?

M

 Hello all,
Sounds like a silly place to post this but...here goes.  I'm getting errors
 compiling cvsup from ports.  The ports tree installed is the default coming
 with the 11/12/01 snapshot.  I want would use CVS, but I don't know how (and
 yet I call my self a computer science student).  It complains about nfs/nfs.h
 not existing (I checked, it doesn't).  This is the first thing I have built
 from ports except X in -current, so all of the dependencies besides X were
 built with this port during make install.  I remeber seeing this post on
 stable a while ago, but can't find the message for the life or me.  The error
 is appended for amusment to those individuals who understand such things.
 
 regards,
 Galen Sampson
 
 # cd /usr/ports/net/cvsup
 # make install
 To build this port without X11 (and without the GUI), define WITHOUT_X11.
 ===  Extracting for cvsup-16.1e
  Checksum OK for cvsup-snap-16.1e.tar.gz.
 ===   cvsup-16.1e depends on file:
 /usr/local/lib/m3/FreeBSD4/libm3formsvbt.so.7 - not found
 ===Verifying install for /usr/local/lib/m3/FreeBSD4/libm3formsvbt.so.7 in
 /usr/ports/lang/pm3-forms
 ===  Extracting for pm3-forms-1.1.15
  No MD5 checksum file.
 ===   pm3-forms-1.1.15 depends on file:
 /usr/local/lib/m3/FreeBSD4/libm3vbtkit.so.7 - not found
 ===Verifying install for /usr/local/lib/m3/FreeBSD4/libm3vbtkit.so.7 in
 /usr/ports/lang/pm3-gui
 ===  Extracting for pm3-gui-1.1.15
  No MD5 checksum file.
 ===   pm3-gui-1.1.15 depends on file: /usr/local/lib/m3/FreeBSD4/libm3tcp.so.7
 - not found
 ===Verifying install for /usr/local/lib/m3/FreeBSD4/libm3tcp.so.7 in
 /usr/ports/lang/pm3-net
 ===  Extracting for pm3-net-1.1.15
  No MD5 checksum file.
 ===   pm3-net-1.1.15 depends on file: /usr/local/lib/m3/FreeBSD4/libm3.so.7 -
 not found
 ===Verifying install for /usr/local/lib/m3/FreeBSD4/libm3.so.7 in
 /usr/ports/lang/pm3-base
 ===  Installing for pm3-base-1.1.15
 cd boot-FreeBSD4/m3core/FreeBSD4; gmake -f make.boot CC=cc CFLAGS=-O -pipe 
 AS=as ASFLAGS= AR=ar ARFLAGS=rv RANLIB=touch EXTRALIBS=-lm
 LDFLAGS=
 gmake[1]: Entering directory
 `/usr/ports/lang/pm3-base/work/pm3-1.1.15/boot-FreeBSD4/m3core/FreeBSD4'
 cc -O -pipe-c -o RTHeapDepC.o RTHeapDepC.c
 RTHeapDepC.c:101: nfs/nfs.h: No such file or directory
 RTHeapDepC.c: In function `mount':
 RTHeapDepC.c:719: dereferencing pointer to incomplete type
 RTHeapDepC.c:719: dereferencing pointer to incomplete type
 RTHeapDepC.c:720: dereferencing pointer to incomplete type
 RTHeapDepC.c:720: dereferencing pointer to incomplete type
 RTHeapDepC.c:721: dereferencing pointer to incomplete type
 RTHeapDepC.c:721: dereferencing pointer to incomplete type
 gmake[1]: *** [RTHeapDepC.o] Error 1
 gmake[1]: Leaving directory
 `/usr/ports/lang/pm3-base/work/pm3-1.1.15/boot-FreeBSD4/m3core/FreeBSD4'
 gmake: *** [boot] Error 2
 *** Error code 2
 
 Stop in /usr/ports/lang/pm3-base.
 *** Error code 1
 
 Stop in /usr/ports/lang/pm3-base.
 *** Error code 1
 
 Stop in /usr/ports/lang/pm3-base.
 *** Error code 1
 
 Stop in /usr/ports/lang/pm3-net.
 *** Error code 1
 
 Stop in /usr/ports/lang/pm3-net.
 *** Error code 1
 
 Stop in /usr/ports/lang/pm3-net.
 *** Error code 1
 
 Stop in /usr/ports/lang/pm3-net.
 *** Error code 1
 
 Stop in /usr/ports/lang/pm3-net.
 *** Error code 1
 
 Stop in /usr/ports/lang/pm3-net.
 *** Error code 1
 
 Stop in /usr/ports/lang/pm3-net.
 *** Error code 1
 
 Stop in /usr/ports/lang/pm3-gui.
 *** Error code 1
 
 Stop in /usr/ports/lang/pm3-gui.
 *** Error code 1
 
 Stop in /usr/ports/lang/pm3-gui.
 *** Error code 1
 
 Stop in /usr/ports/lang/pm3-gui.
 *** Error code 1
 
 Stop in /usr/ports/lang/pm3-gui.
 *** Error code 1
 
 Stop in /usr/ports/lang/pm3-gui.
 *** Error code 1
 
 Stop in /usr/ports/lang/pm3-gui.
 *** Error code 1
 
 Stop in /usr/ports/lang/pm3-forms.
 *** Error code 1
 
 Stop in /usr/ports/lang/pm3-forms.
 *** Error code 1
 
 Stop in /usr/ports/lang/pm3-forms.
 *** Error code 1
 
 Stop in /usr/ports/lang/pm3-forms.
 *** Error code 1
 
 Stop in /usr/ports/lang/pm3-forms.
 *** Error code 1
 
 Stop in /usr/ports/lang/pm3-forms.
 *** Error code 1
 
 Stop in /usr/ports/lang/pm3-forms.
 *** Error code 1
 
 Stop in /usr/ports/net/cvsup.
 *** Error code 1
 
 Stop in /usr/ports/net/cvsup.
 *** Error code 1
 
 Stop in /usr/ports/net/cvsup.
 *** Error code 1
 
 Stop in /usr/ports/net/cvsup.
 *** Error code 1
 
 Stop in /usr/ports/net/cvsup.
 *** Error code 1
 
 Stop in /usr/ports/net/cvsup.
 *** Error code 1
 
 Stop in /usr/ports/net/cvsup.
 
 __
 Do You Yahoo!?
 Find the one for you at Yahoo! Personals
 http://personals.yahoo.com
 
 To Unsubscribe: send mail to [EMAIL PROTECTED]
 with unsubscribe freebsd-current in the body of the message
-- 
o   Mark Murray
\_  FreeBSD Services Limited
O.\_Warning: this .sig is umop ap!sdn

Re: Un-install upgrade application software

2001-10-29 Thread Mark Murray

  I have installed application software from port collection . How do I 
 make un-install ? If I want to upgrade the existing application , how do I 
 upgrade them ? Please advise 

Please ask this question on [EMAIL PROTECTED]

M
-- 
o   Mark Murray
\_  FreeBSD Services Limited
O.\_Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: Change Prompt

2001-10-26 Thread Mark Murray

Hi

Please ask these questions on [EMAIL PROTECTED]

M

 Hi ;
   I use bash shell in my FreeBSD machine . How do I change a promt from 
 $ to # when I login as superuser  from normal user to root  ?
 
 
 my .bashrc script looks as following .
 
 PS1=[\u@\h: \w]\$ 
 alias ls='ls -F'
 alias cp='cp -i'
 alias mv='mv -i'
 alias rm='rm  -i
 
 
 Another question , what is the function of PS2 and when to use it ? Please 
 advise 
 
 
 To Unsubscribe: send mail to [EMAIL PROTECTED]
 with unsubscribe freebsd-current in the body of the message
-- 
o   Mark Murray
\_  FreeBSD Services Limited
O.\_Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: It's baaack... -- (make: don't know how to make copies. Stop)

2001-10-24 Thread Mark Murray

 Mark, please back your 1.32 revision from share/examples/Makefile out,

Done.

M
-- 
o   Mark Murray
\_  FreeBSD Services Limited
O.\_Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: It's baaack... -- (make: don't know how to make copies. Stop)

2001-10-23 Thread Mark Murray

 David Wolfskill wrote:
  Found this in my typescript after a make installworld on today's
 
 There was a commit about a problem with a missing NOOBJ..
 May I suggest either:
 - rm -rf /usr/obj/*
 - cd src/share; cd `make -V .OBJDIR`; rm -rf *  (check that its not your
 srcdir first :-).

Actually, it is possible for there to be no copies: target in
src/share/examples/something. The copies: (actually copies::)
target is built up in a .for loop that may be empty.

The fix is a dummy copies:: target.

M
-- 
o   Mark Murray
\_  FreeBSD Services Limited
O.\_Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: Fix for pam_nologin.so runtime error

2001-10-19 Thread Mark Murray

 Forgot to mention, I had to make kcheckpass setuid root to make kcheckpass
 itself work (just verified this on -stable).

Yes - this is documented. :-)

M
-- 
o   Mark Murray
\_  FreeBSD Services Limited
O.\_Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: kerberos5/libexec/telnetd build fails in -current

2001-10-18 Thread Mark Murray

Do you really need kerberos IV and Kerberos5?

M

 === libexec/telnetd
 cc -O -pipe  -DLINEMODE -DUSE_TERMIO -DDIAGNOSTICS -DOLD_ENVIRON
 -DENV_HACK -DAUTHENTICATION -DENCRYPTION
 -I/usr/src/kerberos5/libexec/telnetd/../../../crypto/telnet -DINET6 -Wall
 -I/usr/src/kerberos5/libexec/telnetd/../../include
 -I/usr/src/kerberos5/libexec/telnetd/../../include -DHAVE_CONFIG_H
 -DKRB5_KRB4_COMPAT -DKRB4 -DINET6 -o telnetd global.o slc.o state.o
 sys_term.o telnetd.o termstat.o utility.o authenc.o  -lutil -ltermcap
 /usr/obj/usr/src/kerberos5/libexec/telnetd/../../lib/libtelnet/libtelnet.a
 -lmp -lcrypto  -lcrypt -lpam
 
/usr/obj/usr/src/kerberos5/libexec/telnetd/../../lib/libtelnet/libtelnet.a(auth.o)(.data+0x44):
 undefined reference to `kerberos4_init'
 
/usr/obj/usr/src/kerberos5/libexec/telnetd/../../lib/libtelnet/libtelnet.a(auth.o)(.data+0x48):
 undefined reference to `kerberos4_send'
 
/usr/obj/usr/src/kerberos5/libexec/telnetd/../../lib/libtelnet/libtelnet.a(auth.o)(.data+0x4c):
 undefined reference to `kerberos4_is'
 
/usr/obj/usr/src/kerberos5/libexec/telnetd/../../lib/libtelnet/libtelnet.a(auth.o)(.data+0x50):
 undefined reference to `kerberos4_reply'
 
/usr/obj/usr/src/kerberos5/libexec/telnetd/../../lib/libtelnet/libtelnet.a(auth.o)(.data+0x54):
 undefined reference to `kerberos4_status'
 
/usr/obj/usr/src/kerberos5/libexec/telnetd/../../lib/libtelnet/libtelnet.a(auth.o)(.data+0x58):
 undefined reference to `kerberos4_printsub'
 
/usr/obj/usr/src/kerberos5/libexec/telnetd/../../lib/libtelnet/libtelnet.a(auth.o)(.data+0x64):
 undefined reference to `kerberos4_init'
 
/usr/obj/usr/src/kerberos5/libexec/telnetd/../../lib/libtelnet/libtelnet.a(auth.o)(.data+0x68):
 undefined reference to `kerberos4_send'
 
/usr/obj/usr/src/kerberos5/libexec/telnetd/../../lib/libtelnet/libtelnet.a(auth.o)(.data+0x6c):
 undefined reference to `kerberos4_is'
 
/usr/obj/usr/src/kerberos5/libexec/telnetd/../../lib/libtelnet/libtelnet.a(auth.o)(.data+0x70):
 undefined reference to `kerberos4_reply'
 
/usr/obj/usr/src/kerberos5/libexec/telnetd/../../lib/libtelnet/libtelnet.a(auth.o)(.data+0x74):
 undefined reference to `kerberos4_status'
 
/usr/obj/usr/src/kerberos5/libexec/telnetd/../../lib/libtelnet/libtelnet.a(auth.o)(.data+0x78):
 undefined reference to `kerberos4_printsub'
 *** Error code 1
 
 Stop in /usr/src/kerberos5/libexec/telnetd.
 *** Error code 1
 
 Stop in /usr/src/kerberos5/libexec.
 *** Error code 1
 
 Stop in /usr/src/kerberos5.
 
 
 
 
 To Unsubscribe: send mail to [EMAIL PROTECTED]
 with unsubscribe freebsd-current in the body of the message
-- 
o   Mark Murray
\_  FreeBSD Services Limited
O.\_Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: Fix for pam_nologin.so runtime error

2001-10-18 Thread Mark Murray

 Should I file a PR?

No. I have this :-)

M
-- 
o   Mark Murray
\_  FreeBSD Services Limited
O.\_Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: rshd broken on -CURRENT

2001-09-26 Thread Mark Murray

 It seems that we dont have a /usr/lib/pam_rhosts_auth.so.

Yes - I need to write one.

M
-- 
o   Mark Murray
\_  FreeBSD Services Limited
O.\_Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: panic on mount

2001-09-23 Thread Mark Murray

 
 After compiling a new kernel, installing it, when my laptop
 tries to mount its drive, it panics with this message:
 
 panic: lock (sleep mutex) vnode interlock not locked  @
 ../../../kern/vfs_default.c:460
 
 which is:
 
   if (ap-a_flags  LK_INTERLOCK)
mtx_unlock(ap-a_vp-v_interlock);

I get exactly the same thing.

Manual bactrace is:

panic
witness_unlock
_mtx_unlock_flags
vop_nolock
vop_defaultop
vn_lock
ffs_mountfs
ffs_mount
vfs_mountroot_try
vfs_mountroot
mi_startup
begin

M
-- 
o   Mark Murray
\_  FreeBSD Services Limited
O.\_Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: rexecd broken(?) on -current

2001-09-13 Thread Mark Murray

 Hi Mark,

Hi

 
 I tried to use rexecd on my -current environment, but it failed.
 
 If OPIE is defined, opiechallenge() is called to configure opiedata
 structue, but this structure is filled with 0 because I don't use
 one-time password.
 
 I think it should fallback to call crypt() or so if opiechallenge() is
 failed.
 
 I don't know how it should work with OPIE.  Could you please fixing
 this, Mark?

Sure! I've never used rexecd, su could you please suggest a minimalist
test/command that I could use, and I'll get right to it. :-)

M
-- 
o   Mark Murray
\_  FreeBSD Services Limited
O.\_Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: ACPI breakage on Libretto 110CT with CURRENT

2001-09-04 Thread Mark Murray
/2 Mouse irq 12 on atkbdc0
psm0: model Generic PS/2 mouse, device ID 0
pmtimer0 on isa0
ppc0: Parallel port at port 0x378-0x37f irq 7 on isa0
ppc0: Generic chipset (ECP/PS2/NIBBLE) in COMPATIBLE mode
ppc0: FIFO with 16/16/16 bytes threshold
lpt0: Printer on ppbus0
lpt0: Interrupt-driven port
sc0: System console at flags 0x100 on isa0
sc0: VGA 16 virtual consoles, flags=0x300
vga0: Generic ISA VGA at port 0x3c0-0x3df iomem 0xa-0xb on isa0
unknown: PNP0303 can't assign resources
unknown: PNP0f13 can't assign resources
ata0: Generic ESDI/IDE/ATA controller at port 0x1f0-0x1f7,0x3f6 irq 14 on isa0
sio0: 16550A-compatible COM port at port 0x3f8-0x3ff irq 4 on isa0
sio0: type 16550A
unknown: PNP0401 can't assign resources
pcic0: Intel i82365SL-A/B at port 0x3e0-0x3e1 on isa0
pcic0: Polling mode
pccard0: PC Card bus (classic) on pcic0
pccard1: PC Card bus (classic) on pcic0
ad0: 19077MB TOSHIBA MK2016GAP [38760/16/63] at ata0-master BIOSPIO
Mounting root from ufs:/dev/ad0s2a
pccard: card inserted, slot 0
reset 1
int is 0 stat is ff
pccard: card inserted, slot 1
reset 1
int is 0 stat is ff
reset 2
int is 60 stat is ef
reset 2
int is 60 stat is cf
reset 3
int is 60 stat is ef
reset 3
int is 60 stat is ef
sio1 at port 0x2f8-0x2ff irq 3 slot 0 on pccard0
sio1: type 16550A

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



ACPI breakage on Libretto 110CT with CURRENT

2001-09-02 Thread Mark Murray

Hi

ACPI breaks my Libretto with (typed by hand):

Mounting root from ufs/dev/ad0s2a
setrootbyname failed
ffs_mountroot: can't find rootvp
Root mount failed: 6

Manual root filesystem specification:
  fstype:device BLAHBLAHBLAH...

mountroot enter

(PANIC - no root fs (no help if I type the correct root FS))

If I undef acpi_load at boot, the system boots fine.

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: libss termination

2001-08-19 Thread Mark Murray

  
  As far as I can tell, there's nothing in the tree which uses libss any
  longer, and hasnt been for quite some time.  Is there any reason to
  keep it?
 
 Nope.

Right. Kill it.

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: help! su(1) is still broken

2001-08-18 Thread Mark Murray

There is a recen-ish fix that may sort this out.

Re-sup and build again...

M


 I cvsupped earlier in the week (august 9th) for the first time in
 about 3 weeks. The pam changes seem to have broken su on my machine.
 I'm using the default pam.conf (via mergemaster), so I would assume
 that it should work. I can't seem to tweak it into behaving.  I
 searched the list, but moving libpam to /compat/lib didn't work
 for me.  The best clue so far is the contents of my security log
 (I turned on debugging).  pam_wheel seems to be working, but pam_unix
 blows in completely:
 
 Aug 16 12:06:07 su: pam_unix: pam_sm_authenticate: Options processed
 Aug 16 12:06:07 su: pam_unix: pam_sm_authenticate: Got user: toor
 Aug 16 12:06:07 su: pam_unix: pam_sm_authenticate: Doing real authentication
 Aug 16 12:06:10 pam_unix: pam_sm_authenticate: Got password
 Aug 16 12:06:10 su: pam_unix: pam_sm_authenticate: Encrypted passwords are: 
**NuIxEpaVQeE  *
 Aug 16 12:06:10 su: pam_unix: pam_sm_authenticate: returning PAM_AUTH_ERR
 
 I trimmed the lines a little.  The thing that makes no sense here is
 that I'm using md5 passwords.  When I login as toor on the console,
 pam_unix does the right thing.  So perhaps it some sort of bizarre
 crypto problem.  I really don't know where to go next, or what to zap
 and re-build, so any suggestions would be greatly appreciated.
 
 -- 
 Robert Sexton, [EMAIL PROTECTED]
 No one told me that it could not be done, and so I did it. - Jack Kloepfer
 
 To Unsubscribe: send mail to [EMAIL PROTECTED]
 with unsubscribe freebsd-current in the body of the message
-- 
Mark Murray
Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Big telnet commit coming!

2001-08-15 Thread Mark Murray

Hi all

I have a big commit planned for telnet(d).

You can see it at http://people.freebsd.org/~markm/patches/diff.cvs.gz

The main aims of the patch are to reduce the number of warnings
telnet(d) emits during compilation, and to properly merge the
differences between the base telnet and the crypto telnet in
src/crypto/telnet. a very small amount of style(9) work has been
done.

In the future, I aim to have the base telnet generated entirely by
unifdef(1)'ing the crypto one. This commit does not achieve that goal,
and nor does it intend to - there are some other fixes that will come at
a later stage.

I have already asked for reviews on -audit. Those who are looking at my
patches should download again, because I have done some further fixes
and improvements.

I'll commit in three days from the date of this email if nothing comes
up.

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: rlogin terminal settings messed up

2001-08-06 Thread Mark Murray

 Does anyone know what changed?
 (someone has suggested the change came about when PAM's session model was
 changed)

Following up on my previous message; I've asked re@ for permission
to MFC the fix.

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: rlogin terminal settings messed up

2001-08-06 Thread Mark Murray

 For quite a while now (?3-4 months?) one's terminal settings are messed
 up when rlogin'ing into a FreeBSD from a FreeBSD-current one.  It used to
 be I could rlogin from an 80x24 Xterm, and the terminal settings on the
 remote box would also be 80x24.  Now COLUMNS=80 and ROWS and TERMCAP
 isn't set, so a very large number is assumed.
 
 Does anyone know what changed?

Hmm. rlogind(8) on STABLE and CURRENT is effectively identical, and
the bug does not show on a CURRENT-CURRENT rlogin session.

 (someone has suggested the change came about when PAM's session model was
 changed)

Hmm. Maybe I need to MFC login(1) some more. Please try that, and if it
works, lets get it committed.

STABLE's PAM modules and support are quite a bit behind CURRENT's.

What are your /etc/pam.conf entries for login? See if borrowing
any CURRENT entries helps you.

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: ntpd 4.1

2001-08-05 Thread Mark Murray

 According to Mark Murray:
  Can you make it so that if NO_OPENSSL is not defined, then openssl is used?
 
 I could of course but I don't think that having PUBKEYS by defaults (X.509
 based, not the PGP ones) is probably not very useful yet as it is a fairly
 recent option.
 
 AUTOKEY should be enough. Any objection?

No objection from me :-)

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: ntpd 4.1

2001-08-03 Thread Mark Murray

 Now that ntpd 4.1.0 has been released (finally!), I'll upgrade current very
 soon.

:-) :-) :-)

 The question I have is the following: authentication was done with md5 code
 builtin and I disabled DES support (not supported anymore). Now, with 4.1,
 it can be linked to openssl but it is still an optional component.
 
 I'm a bit reluctant to force openssl for just ntpd.

Can you make it so that if NO_OPENSSL is not defined, then openssl is used?

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: su root broken in -CURRENT

2001-07-31 Thread Mark Murray

I have the PR, and I will fix this :-)

M

 
 On Tue, 31 Jul 2001, Terry Lambert wrote:
 
  The reason for this is that the pam code for doing the enforcement
  is being trusted utterly.  In the past, we would consider both
  the primary group (the group from the passwd file entry), and the
  auxillary groups (the groups from the groups file entries, if any),
  as synonymous.  With the pam code being used, we no longer consider
  the primary group to be on the same par as the groups file entries.
 
 I can pin this down at r1.26 of su.c
 (Mon May 25 03:34:52 1998 UTC (3 years, 2 months ago) by steve)
 
 Prior to this date only appearance in /etc/group was considered.
 
 The change occurred in response to PR bin/6696
 
 Like terry, I prefer the semantics whereby the users primary
 group is considered. Three years of precedent should be sufficient
 to have this change to pam_wheel.c, I hope, before PAM use in su
 is MFC'd.
 
 I have just entered a PR on this.
 
 cc'd to: markm
 
 Joshua
 
 
-- 
Mark Murray
Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: cvs commit: src/lib/libpam Makefile.inc

2001-07-12 Thread Mark Murray

 At Thu, 12 Jul 2001 15:26:58 +0900,
 I wrote:
  Actually this doesn't help libpam.so.1, because the new pam modules
  (pam_*.so) do not work with it.  Which means you need to recompile
  the programs linked with it, such as sudo, xdm, and the X server.
   Xwrapper

I'm not sure I follow you here...

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: HEADS UP!! S/Key is ancient, OPIE is new

2001-06-22 Thread Mark Murray

 Why? Better way will be rewritting ports to use good-new OPIE.
 wi-ftpd already have OPIE hooks, but I not sure they works. Popper needs
 modifications. Doesn't know, if other ports using Skey exists.

I can do base software, but I haven't time to fill all ports.

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: convert libgmp to a port?

2001-06-18 Thread Mark Murray

 No, I'm saying that the author of the SRA patches did the right thing
 and used the traditional BSD math library when extending the
 traditional BSD telnet utility.  I am furthermore making the point
 that FreeBSD should continue to ship with a library that provides
 the `libmp' interface, regardless of how it is implemented internally.

Strongly disagree.

The libmp interface is not very fault-tolerant, and not well used
(anymore).

The bignum (BN) bits of libcrypto are much more fault tolerant and
ubiquitous.

Time to throw out the trash. The its traditionally part of BSD
argument holds no water - the BSD books that I have point to MH and
Emacs in the same way.

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: PAM causes segfault in login(1)

2001-06-12 Thread Mark Murray

 I've noticed that new PAM segfaults when I'm typing non-existing login
 at console login prompt. Please fix.

This current, right? I'll sort it out. Thanks for the debug-sleuthing!

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: PAM forgets to unblock signals [was Terminal line discipline is broken [sorta]]

2001-06-07 Thread Mark Murray

 That explains... Attached patch solved the problem for me.

I have a functionally similar but less clean patch in BDE's court
for testing. Thanks for letting me know this works - I'll commit
it.

M
 Content-Type: text/plain; charset=koi8-r;
  name=misc_conv.c.diff
 Content-Transfer-Encoding: 7bit
 Content-Disposition: inline;
  filename=misc_conv.c.diff
-- 
Mark Murray
Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: nss_ldap and pam_ldap ?

2001-06-06 Thread Mark Murray

 Is there any plan to port pam_ldap ( and nss_ldap )
 to FreeBSD-CURRENT ?

No plans, but if you submit something, I would be interested.

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



HEADS UP! Breakage in Perl/BSDPAN

2001-05-02 Thread Mark Murray

Hi

Those who made a buildworld without NO_PERL=true with sources
newer than Tue, 1 May 2001 02:25:25 -0700 (PDT), but older than
2001/05/02 14:18:33 PDT, must apply the following patch as root in
/usr/libdata/perl/BSDPAN directory.

(If you are tracking CURRENT, then CVSup and/or cvs update after this
message will get you the same fix.)

A patch: (by Anton Berezin [EMAIL PROTECTED])

diff -u -ru /usr/src/gnu/usr.bin/perl/BSDPAN/BSDPAN/Override.pm ./BSDPAN/Override.pm
--- /usr/src/gnu/usr.bin/perl/BSDPAN/BSDPAN/Override.pm Tue May  1 11:25:24 2001
+++ ./BSDPAN/Override.pmWed May  2 20:38:12 2001
@@ -13,9 +13,8 @@
 #
 use strict;
 use Carp;
+use BSDPAN;
 require Exporter;
-require SelfLoader;# XXX 2nd-order magic over SelfLoader's magic  :-)
-# require AutoLoader;  # XXX do we need to do similar hoop-la with it?
 
 use vars qw(@ISA @EXPORT);
 @ISA = qw(Exporter);
@@ -77,8 +76,11 @@
 
# do we need to protect against SelfLoader?
my $sl_autoload = eval *$pkg\::AUTOLOAD{CODE};
-   $sl_autoload = 0
-   if $sl_autoload  $sl_autoload != \SelfLoader::AUTOLOAD;
+   if ($sl_autoload) {
+   require SelfLoader;
+   $sl_autoload = 0
+   if $sl_autoload != \SelfLoader::AUTOLOAD;
+   }
 
# get the reference to the original sub
my $name_addr = eval *$name\{CODE};
diff -u -ru /usr/src/gnu/usr.bin/perl/BSDPAN/BSDPAN.pm ./BSDPAN.pm
--- /usr/src/gnu/usr.bin/perl/BSDPAN/BSDPAN.pm  Tue May  1 11:25:23 2001
+++ ./BSDPAN.pm Wed May  2 20:39:39 2001
@@ -11,7 +11,6 @@
 #
 # The pod documentation for this module is at the end of this file.
 #
-use Config;
 
 my $bsdpan_path;   # Directory pathname of BSDPAN itself
 
@@ -34,19 +33,22 @@
 }
 
 sub perl_version {
-   return $Config{version};
+   require Config;
+   return $Config::Config{version};
 }
 
 sub perl_ver {
+   require Config;
# pre-5.6.0 perls
-   return $Config{apiversion} if exists $Config{apiversion};
+   return $Config::Config{apiversion} if exists $Config::Config{apiversion};
# post-5.6.0 perls
-   return $Config{version};
+   return $Config::Config{version};
 }
 
 sub perl_arch {
+   require Config;
# pre-5.6.0 perls
-   return $Config{archname} if exists $Config{apiversion};
+   return $Config::Config{archname} if exists $Config::Config{apiversion};
# post-5.6.0 perls
return 'mach';
 }

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: PAMmed su still broken for passwordless accounts

2001-04-28 Thread Mark Murray

  1) su on passwordless accounts.
 (a) `su passwordless' now bogusly prompts for a password.  It lets
 you in if you type an empty password.
 (b) `echo somecommand | su passwordless' now bogusly prompts for
 a password.  su doesn't find a password, and exits without printing
 anything or running `somecommand'.  I use the latter form a lot.

Feature, not bug. PAM has been told to use unix authentication.
You can override this by setting

su  authrequiredpam_permit.so

instead of

su authrequiredpam_unix.so try_first_pass

in /etc/pam.conf.

For situations where some accounts have passwords and some don't, play
with the third word - required may become sufficient etc.

 (2) static linkage of rshd.  Previously, only static linkage of many other
  commands that are linked to libpam was broken (ftpd was one).

Those patches of yours look reasonable.

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: PAMmed su still broken for passwordless accounts

2001-04-28 Thread Mark Murray

  Feature, not bug. PAM has been told to use unix authentication.
 
 The bug turns out to be that PAM shouldn't have been told this.  The
 non-PAM case uses the following check to avoid checking for passwords
 on passwordless accounts:
 ---
   /* if target requires a password, verify it */
   if (*pwd-pw_passwd) {
 ---
 but the PAM case always calls pam_authenticate() (for non-root).

Right. To avoid a pam/other turf fight. I'll do the above until we
can fix the pams to allow a 'if no password, let him in' mode for
the pam_unix module.

 The first form is equivalent to making all accounts passwordless.  I don't
 see how changing the third word could affect this.

Er, yes :-) 

The pam modules need a mode for this. I'll do that.

 login(1) uses the same configuration as su(1) in pam.conf but handles
 passwordless accounts correctly.  In login.c, most of the complications
 for PAM authorization are in the auth_pam() function, and goto
 ttycheck; skips over all types of authorization when there is no
 password.  The corresponding code in su.c is a tangle of ifdefs and
 large inline code for PAM authorization.

I need to take out some of that #ifdef hell. For one, KERBEROS is no
longer needed. (fixed locally). WHEELSU needs to be properly documented.

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: broken sshd or libssl ?

2001-04-16 Thread Mark Murray

 I update 4.3 RC to 5.0-CURRENT and have some troubles.
 
 Why make buildworld build system without RSA support ?
 And how i can correct this problem ?
 System cvsuped today.

Go to /dev and remake all your devices.

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



i586 FP optimizations hosed.

2001-03-29 Thread Mark Murray

Hi

I have an SMP kernel with I586 and I686 support. If I boot it
on a 686 it works. On a 586 it craps out with

CPU1 stopping CPUs: 0x0001... Stopped.
Stopped at  i586_bzero_oops+0x1:jmp i586_bzero_oops

late into the boot (during network/RPC init stuff).

I thought the 586 FP stuff was disabled?

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: random woes (no RSA support in libssl and libcrypto)

2001-03-27 Thread Mark Murray

  See src/UPDATING 2624
 
 Well, but it says about `options RANDOMDEV'. Later, `device random' was
 invented instead of it. A few days ago I installed -CURRENT
 (date=2001.03.25.12.00.00) with removing all previous content of /usr/lib
 (which contained legacy since 3.1-RELEASE) and /usr/sbin/sshd began to refuse
 supporting protocol 1 with identical message
 (`no RSA support in libssl and libcrypto.  See ssl(8)'). Also,
 kernel was build with `device random', and
 
 netch@iv:/usr/HEAD/src/sys/i386/confegrep '(RSA|USA)' /etc/make.conf
 # If you're resident in the USA, this will help various ports to determine
 USA_RESIDENT=   NO
 WITH_RSA=YES

You missed (and deleted) the bit where it tells you to rerun MAKEDEV
to rebuild your devices.

 And, my questions are
 1) What can happen to refuse RSA support in libcrypto, with environment
 described above?

An incorrect /dev/urandom

 2) How can one diagnose reason of such problems without abusing studying
 of libcrypto internals?

More reading of UPDATING? I'll see if I can get it clarified.

 3) Can anybody provide more descriptive message when random device
 works improperly?

Yes. I'm working on making the random device itself moan at you.

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



HEADS UP!! New PAM functionaity in CURRENT!

2001-03-27 Thread Mark Murray

Hello all!

I have just added new PAM functionality to CURRENT. There is now
better support for account management and sessions. If you foul
up your pam.conf merging, you may not be able to get into your
system.

PLEASE MERGE /etc/pam.conf WITH CARE!

At the least, your login section should look like:

login   authrequiredpam_unix.so try_first_pass
login   account requiredpam_unix.so
login   password required   pam_permit.so
login   session requiredpam_permit.so

and your sshd section should look like:

sshdauthrequiredpam_unix.so try_first_pass
sshdaccount requiredpam_unix.so
sshdpassword required   pam_permit.so
sshdsession requiredpam_permit.so

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: Whatever happened to CTM?

2001-03-24 Thread Mark Murray

 Anyway: If CTM was to ever be given up (it's good to read, that Ulf will 
 get his CTM box connected again, soon), then there should be a alternate
 access method, that works through tightly configured firewalls. And CVsup
 via SSL might be a good candidate ...

Hmm. Look at sslproxy and sslwrap in the ports. They may just work for you.

It shouldn't be too difficult to set up the other side - after all, there
is a need :-)

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: Whatever happened to CTM?

2001-03-21 Thread Mark Murray

 Just an idea:
 
 How about a CVSUP via HTTPS server (just as a means to tunnel CVSUP
 through a HTTPS proxy ...) ?
 
 Most probably a CVSUP daemon bound to port 443 would do (there are 
 programs that tunnel arbitrary data through a HTTPS proxy, though
 I admit this is cheating ;-)

You should be able to do it with SSH (assuming that you can get out with
ssh!)

$ ssh -v -l yourname otherhost.example.com -L5559:cvsup.example.com:5559

Then doing a cvsup with the server set to 127.0.0.1 will work.

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: cvsup/cvsupfile question

2001-03-21 Thread Mark Murray

 Using cvsup to catch up to changes for 4.2-Stable, we ended up with
 4.3-Beta. We used cvsup Nov-December, with (I thought) the attached
 cvsup file, to keep 4.2-Stable current. We ran cvsup yesterday. After
 `buildworld`, `buildkernel`, `uname` says:
 
 FreeBSD [host]  4.3-BETA FreeBSD 4.3-BETA #0: Wed Mar 21
 
 previous build `uname` says:
 FreeBSD [host] 4.2-STABLE FreeBSD 4.2-STABLE #1: Wed Dec  6
 
 Where'd we go wrong?

Nowhere.

 Can it be put right?

It is right.

This "BETA" (not to be confused with an unstable commercial "beta")
is simply "STABLE" with a tag on it to indicate that it is going
through the release engineering process to become 4.3-RELEASE (and
then 4.3-STABLE).

You have something that is stable, and is just close to the next
release.

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: random woes (no RSA support in libssl and libcrypto)

2001-03-19 Thread Mark Murray

 It seems the compatibility with the previous minor of urandom has
 been silently removed (I assume this happened with the last
 update/cleanup of the random device). It took me two hours to figure
 it out.

See src/UPDATING 2624

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: Ethernet entropy harvesting seriously pessimizes performance

2001-03-12 Thread Mark Murray

 In addition to reported earlier general machine slowdown with
 interrupt harvesting is turning on, ethernet entropy harvesting
 seriously hammers network performance as well. Ftping big file over my
 10M network now about 15% slower with ethernet harvesting turning on.

Even with the Rijndael code and kern.random.sys.burst=$SMALLNUMBER ??

 Mark, please get slow machine (say 100MHz or slower) and test you
 fu^H^Hboring harvester on it before committing anything. The whole
 devrandom affair gone too far and shown exactly how things should not
 be developed in FreeBSD.

I've done this.

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: Ethernet entropy harvesting seriously pessimizes performance

2001-03-12 Thread Mark Murray

  Even with the Rijndael code and kern.random.sys.burst=$SMALLNUMBER ??
 
 Rijndael stops it showing up much in top -S.  I'm wondering where it is
 hiding :-).  kern.random.sys.burst=$SMALLNUMBER had very little effect.

The Rijndael code makes a 2-orders-of-magnitude difference to the speed
of the Davies-Meyer hash in hash.c.

In order for the random kthread to show me numbers (I got paranoid
when it didn't seem to show up), I slowed it down by looping the
hashing "guts" 100 times :).

This very clearly shows the superior key agility of Rijndael over
Blowfish.

Now kern.random.sys.burst is still available for those very slow,
very high interrupt cases.

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: Ethernet entropy harvesting seriously pessimizes performance

2001-03-12 Thread Mark Murray

 Please try this patch.  This should solve all the random harvesting
 performance issues no matter how efficient or inefficient the hash
 function (untested as I do not have a -current box at the moment).

Erm, you are behind :-)

I have already committed something that does this in a much more
configurable way.

M

   -Matt
 
 Index: yarrow.c
 ===
 RCS file: /home/ncvs/src/sys/dev/random/yarrow.c,v
 retrieving revision 1.31
 diff -u -r1.31 yarrow.c
 --- yarrow.c  2001/02/11 16:21:35 1.31
 +++ yarrow.c  2001/03/12 19:09:15
 @@ -104,11 +104,8 @@
  
   for (;;) {
  
 - if (harvestring.tail == harvestring.head)
 - tsleep(harvestring, PUSER, "rndslp", hz/10);
 -
 - else {
 -
 + tsleep(harvestring, PUSER, "rndslp", hz/10);
 + if (harvestring.tail != harvestring.head) {
   /* Suck the harvested entropy out of the queue and hash
* it into the appropriate pool.
    */
 
-- 
Mark Murray
Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: Ethernet entropy harvesting seriously pessimizes performance

2001-03-12 Thread Mark Murray

 Mark, something like this doesn't REQUIRE any configuration!!!  Don't
 add confusion to the system.  Just make the default something 
 reasonable.  There is absolutely no reason to have to be able to adjust
 the interrupt seeding code if the default is made something reasonable.

Matt,

At it is very obvious to me that you have not even looked at the new
code, let alone run it, I suggest that you do both before further
engaging in this conversation.

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: Ethernet entropy harvesting seriously pessimizes performance

2001-03-12 Thread Mark Murray

 I don't understand what is so difficult about simply rate-limiting
 the code at the proper point -- at the very beginning of the
 call that the interrupt harvester makes, removing most of the fixed
 overhead for the case where a system is getting a large number of 
 interrupts per second?  Why are you going through loops to create
 complex, sensitive code paths when a simple solution can be plopped 
 down and will work, SNAP, just like that?

Because I need to make folks other than you happy.

Lots of security minded people what _all_ the interrupt entropy
they can get, and this method gives them that while allowing others
to throttle the harvester back.

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: Ethernet entropy harvesting seriously pessimizes performance

2001-03-12 Thread Mark Murray

Let me be clear about what I mean by interrupt rate limiting:
 
interrupt()
{
   harvester(...)
}

It does that already.

harvester(...) 
{
if (queue is not full) {
  ... add data to queue (reasonably sized queue, like 32 entries)
}
}

It does that. I guess we differ on the idea of "reasonable". 

queue-runner(...)
{
for(;;) {
  sleep for 1/10 second
 
  Pull next item (if any) off queue
}
}

It almost does that, except it sleeps every N items where the user
is given control of N.

That is what my patch does.  If a high rate of interrupts occur, the
queue becomes full almost instantly because the queue-runner only
pulls one item off per 1/10 second.  The result is that the
harvester() routine effectively becomes a NOP for most of the
interrupts.

My code does that. Do a "cat /dev/zero  /dev/random"
to see it in action.

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: New improved panic!

2001-03-09 Thread Mark Murray

 0xc0147290 is in random_kthread (../../dev/random/yarrow.c:97).
 92  mtx_lock(Giant);
 93  printf("OWNERSHIP Giant == %d sched_lock == %d\n",
 94  mtx_owned(Giant), mtx_owned(sched_lock));
 95  mtx_unlock(Giant);
 96  #endif
 97
 98  for (pl = 0; pl  2; pl++)
 99  yarrow_hash_init(random_state.pool[pl].hash, NULL, 0);
 100
 101 for (;;) {

Is DEBUG defined?

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: Entropy harvesting? Grim reaper is more like it...

2001-03-09 Thread Mark Murray

 I changed nothing from whatever the default is. It seems like a bit of POLA to
 freeze now. 
 
 But I'll check this - if I can get that machine up again :-)...

OK - if this is the entropy driver, then typing about 2 lines of shit
will unlock it.

Please put some echo's into the rc scripts to tie down where this is
happening.

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: harvest_interrupt=YES slows down machine

2001-03-07 Thread Mark Murray

 Just installed new world, rebuild kernel, ran mergemaster and after
 reboot discovered that the system slowed down 4-5 times. Turning
 harvest_interrupt=NO in /etc/rc.conf solved the problem. The system in
 question is Toshiba Satellite Pro 445 notebook, see dmesg and kernel
 config attached with this message.

 Please investigate and fix what is necessary. In the meantime I would
 suggest turning harvest_interrupt=NO in default rc.conf, as it may
 hurt others as well.

Apart from a ridiculously low maxusers (you have 10, I recommend 128),
I'm not sure what the problem is.

Please set maxusers to 128, and time a make world with interrupt
harvesting on, and again with it off.

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: harvest_interrupt=YES slows down machine

2001-03-07 Thread Mark Murray

  Apart from a ridiculously low maxusers (you have 10, I recommend 128),
  I'm not sure what the problem is.
 
 I do not see why it is "ridiculously low". Even GENERIC recommends 32, while
 this is a small system intended to be used by only one person, so I do not see
 any problem with it. I never had any `out of descriptors' or `can't fork'
 during my routine operations on this box (2.5 years).

Ok - then please leave it at 32.

  Please set maxusers to 128, and time a make world with interrupt
  harvesting on, and again with it off.

 I do not see what it will buy you. Could you please just believe my
 opinion based on the boot time? After all, even when this box unslowed
 make world takes 4-5 hours to complete, so with this slowdown it would
 take about 20-30, which I certainly can't tolerate without sufficient
 reason.

If you want me to help you, please help me get good info.

It's very important to me _know_ wether this is a boot slowdown or
a generic - assertions are not good enough, I need hard facts.

My own laptop (A Toshiba Libretto 110CT) does a make world in
about 8 hours (and it always has). Interrupt harvesting has not
made a noticable difference (I have not been keeping records, but
an overnight build has not yet progressed into my breakfast).

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: harvest_interrupt=YES slows down machine

2001-03-07 Thread Mark Murray

 Just do something that causes a lot of interrupts that go through the
 random harvester.  E.g.:
 
 dd if=/dev/ad0 of=/dev/null
 
 causes 7750 interrupts/sec here (on a Celeron 366 overclocked to
 522).  The random task takes 100% of the available cpu cycles.  This
 slows down cpu-bound processes by a factor of about 3.5.  With a block
 size of 64k instead of the default of 512, this causes only 300
 interrupts/sec.  The random task takes a measly 27% of the cpu to
 process these.  It can apparently only handle about 10 interrupts/second
 with a reasonable overhead (1%).

OK. Try tweaking the "Computational intensity factor" ;-) by dropping
the kern.random.yarrow.bins:

# sysctl -w kern.random.yarrow.bins=2

And let me know how well that works.

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: harvest_interrupt=YES slows down machine

2001-03-07 Thread Mark Murray

 I think it would be a much better idea to cap the number of interrupts
 per second the reseeder accepts.  e.g. have a sysctl to set the 
 max and default it to something reasonable, like 200.  The seeder would
 thus only run 200 times a second even if A person were getting
 7750 interrupts/sec.  Frankly, once we have a good random seed it would
 only take about 10 interrupts a second to keep the random number 
 generator in good shape, and possibly even less.  Overkill is not 
 necessary.

This effectively happens.

The harvest ring is a limited length, and any overflows are discarded.

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: harvest_interrupt=YES slows down machine

2001-03-07 Thread Mark Murray

 1) Reduce the ring size to something reasonable.  1024 is massive
 overkill.  32 would be just fine.

I'll play with this.

 2) Add a mandatory tsleep in random_kthread() for EACH entry scanned
 from the harvest ring.  Something reasonable like 1/10 second (similar
 to what you do if the harvest ring is empty.  Or may you could pull
 off 5 entries at a time and then sleep.  Right now you run it in a
 tight loop until the ring is completely empty.

Hmm. Sounds doable. I'll play.

 A 1/10 second sleep and a ring limit of 32 still gives you an effective
 320 seeds per second.  Still overkill, but at least not  the massive
 overkill that its doing now.

Event != seed.  I'll juggle numbers and see if I can come up with any
tweakables (sysctl's) that could give users more control here.

Thanks!

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: Can't build 5-current world on 4-stable box (perl doesn't bootstrap properly)

2001-03-06 Thread Mark Murray

 I reported it about a month ago, but the problem still persists. 5-current
 buildworld can't be performed on reasonably recent 4-stable system, hence
 source upgrade path from -stable to -current is broken. Please fix.

I just did this on 4-STABLE with no problems at all.

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: Major bumping of libFOO

2001-02-14 Thread Mark Murray

 Please review this patch as I'd like to commit it soon.  Also, I'm not 
 100% sure what to do about libdes.so.3, so if you have commments on
 that please let me know.  Other than that, the patches should be close 
 to commitable.

Now is the time to toss that into compat/

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: Kernel Panic from Yesterday's CVSup

2001-02-05 Thread Mark Murray

John Baldwin said:

 On 06-Feb-01 Andrea Campi wrote:

  Sorry to bother everybody, but did anybody note from my panic trace,
  that instruction pointer is 0xdeadc0de? Isn't that bad? :-p

 That means it is free'd memory.  One cause might be something
 that is free'ing its interrupt handler w/o releasing it properly.
 Alternatively, it might be a race in the interrupt list code that was
 been brought about by preemption.  Since locks are rather expensive,
 we have avoided locking the list of interrupt handlers in the past,
 but we may have to break down and do that now. :( This will hurt
 interrupt latency unless I can figure out a slick way of fixing it.
 Can anyone confirm that a pre-preemption kernel works fine for them?

I have 2 SMP boxes (one with pentium 200MMX's, the other with PPro
233's. There are other differences in peripherals). Both boxes run
an identical build of a kernel dating to sun 4th feb. The PPro is
rock-stable. The PentiumMMX is very fragile, and will panic easily
(often in vm_fault) with a sig9 (IIRC).

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Kernel hackers, please review.

2001-02-03 Thread Mark Murray

Hi

Please review the patch at http://people.freebsd.org/~markm/no_lock_h.diff.

the idea is to remove sys/*/include/lock.h.

I tested it with the usual i386 stuff, and it is known to break the cy
driver because of the COM_(UN)LOCK macros (which is another issue).

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: kernel threading: the first steps [patch]

2001-01-28 Thread Mark Murray

  This is the single most flagrant lack of cooperation I have experienced
  while working with the FreeBSD Project.  I'm truly dumbfounded.
 
 It's not a lack of co-operation.. it's a lack of communication. I didn't
 see an any lists that anyone was doing this yet and thought I'd get 
 the ball rolling to promote discussion.. I'm dumfounded to discover that you've 
 done work here already as I thought I'd have heard of it.  I'm sad you
 take it as an insult. All I want is to start discussion, and I was doing
 it as a way of clarifying my thoughts as to what wqas needed.

Um, Julian - I have known about this for a good couple of months. I
can't remember specifically _how_ I know; suffice to say there has
been a fair bit of dialogue on the lists and Jason's progress-page
has a good overview.

http://people.freebsd.org/~jasone/smp/

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: buildworld failed and PERL_THREADED=true dead...

2001-01-25 Thread Mark Murray

Hi

I see no perl failure below...

M

 Hello.
 I tried make buildworld after cvsuped my source and it failed in perl
 area.
 I remove PERL_THREADED=true and tried again and it failed.
 
 === usr.bin/kdump
 cc -O -pipe -march=pentium -I/usr/src/usr.bin/kdump/../ktrace 
-I/usr/src/usr.bin/kdump/../..   -I/usr/obj/usr/src/i386/usr/include -c 
/usr/src/usr.bin/kdump/kdump.c
 cc -O -pipe -march=pentium -I/usr/src/usr.bin/kdump/../ktrace 
-I/usr/src/usr.bin/kdump/../..   -I/usr/obj/usr/src/i386/usr/include -c 
/usr/src/usr.bin/kdump/../ktrace/subr.c
 gzip -cn /usr/src/usr.bin/kdump/kdump.1  kdump.1.gz
 cc -O -pipe -march=pentium -I/usr/src/usr.bin/kdump/../ktrace 
-I/usr/src/usr.bin/kdump/../..   -I/usr/obj/usr/src/i386/usr/include -c ioctl.c
 In file included from ioctl.c:99:
 /usr/obj/usr/src/i386/usr/include/sys/memrange.h:18: warning: `MDF_ACTIVE' redefined
 /usr/obj/usr/src/i386/usr/include/pccard/cardinfo.h:81: warning: this is the 
location of the previous definition
 In file included from ioctl.c:51:
 /usr/obj/usr/src/i386/usr/include/machine/i4b_rbch_ioctl.h:45: `TELNO_MAX' 
undeclared here (not in a function)
 ioctl.c: In function `ioctlname':
 ioctl.c:693: invalid use of `restrict'
 ioctl.c:693: sizeof applied to an incomplete type
 *** Error code 1
 1 error
 *** Error code 2
 
 FreeBSD 5.0-CURRENT #0: Sat Jan 13 22:57:43 MSK 2001
 
 Any idea?
 -- 
 
 Rgdz,/"\ 
 Sergey Osokin aka oZZ,   \ /  ASCII RIBBON CAMPAIGN
 [EMAIL PROTECTED]X AGAINST HTML MAIL
 http://freebsd.org.ru/~osa/  / \
 
 
 To Unsubscribe: send mail to [EMAIL PROTECTED]
 with "unsubscribe freebsd-current" in the body of the message
 
-- 
Mark Murray
Warning: this .sig is umop ap!sdn


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: syslogd(8) does not update hostname

2001-01-20 Thread Mark Murray
 
 
 To Unsubscribe: send mail to [EMAIL PROTECTED]
 with "unsubscribe freebsd-current" in the body of the message
 
-- 
Mark Murray
Warning: this .sig is umop ap!sdn


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: syslogd(8) does not update hostname

2001-01-20 Thread Mark Murray

 On Sat, Jan 20, 2001 at 11:24:16AM +0200, Mark Murray wrote:
  I don't agree with this change.
  
  hostname != name-that-IP-address-resolves-to.
 
 Dunno what you are talking about. That has nothing directly to do with
 this. No one is talking about forcing you to change your hostname. The
 patch just allows syslogd(8) to take note if the hostname were to
 change.

D'uh. Bad crack I'm on. :-)

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: current hangs...

2001-01-20 Thread Mark Murray

 
 on a 2xPII/350, 256M, two scsi disks on ahc, and ccd I have three times
 now hung the machine so that only reset got any attention simply by
   make -j 128 world

Do you have an easy way to narrow it down to CCD by doing the same
thing but without ccd involvement?

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: pcm status

2001-01-20 Thread Mark Murray

 This is directly traceable to entropy harvesting by /dev/*random.
 I know it's not an option if you need to use ssh, but not loading
 random.ko will fix the sound problems when moving the mouse or
 typing.  It doesn't fix the 'hwptr went backwards' messages, though.

Please tell me if

sysctl -w kern.random.yarrow.bins=2
makes a difference for you.

Thanks!

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: pcm status

2001-01-20 Thread Mark Murray

OK, please try this, then; change the HARVEST_RING_SIZE in
sys/dev/random/yarrow.h to a smaller power-of-2 (256 or 128 would
be good), and let me know how that helps-or-not.

Thanks!

M

 If it helps at all, it's marginal.  I still get skips.
 
 On Sat, Jan 20, 2001 at 05:36:08PM +0200, Mark Murray wrote:
   This is directly traceable to entropy harvesting by /dev/*random.
   I know it's not an option if you need to use ssh, but not loading
   random.ko will fix the sound problems when moving the mouse or
   typing.  It doesn't fix the 'hwptr went backwards' messages, though.
  
  Please tell me if
  
  sysctl -w kern.random.yarrow.bins=2
  makes a difference for you.
  
  Thanks!
  
  M
  -- 
  Mark Murray
  Warning: this .sig is umop ap!sdn
  
  
  To Unsubscribe: send mail to [EMAIL PROTECTED]
  with "unsubscribe freebsd-current" in the body of the message
 
-- 
Mark Murray
Warning: this .sig is umop ap!sdn


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Atomic breakage?

2001-01-14 Thread Mark Murray

Hi John

There seems to be same breakage in the atomic stuff:

link_elf: symbol atomic_load_acq_int undefined
KLD file random.ko - could not finalize loading

I back out the latest commit to sys/i386/include/atomic.h, and things
work a bit better (on my laptop).

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: entropy bikesheds

2001-01-12 Thread Mark Murray

 Start some kind of hardware-managed timer at the earliest possible
 opportunity (perhaps start it in the boot loader!), then when you need to
 pick up your first seed, read the timer's value and seed your random
 generator from that.

I have some much more sophisticated code (written by JHB) that does
effectively this. It does it by hooking interrupt randomness, and by
using the interrupts from your disk controllers (SCSI and IDE/ATA),
a nicely fast reseed is gained.

I'll happily commit it now, but I'd prefer a code review first, and
is suspect that this will be better received once Jake's preemptive
ithread code is committed.

 The idea is to catch that timer at an unknown condition, and certainly the
 computer is not going to boot in the exact same amount of time, every time
 it's restarted.  This would be especially true if the boot sequence gets
 interrupted (to load another kernel perhaps) or the user forces the
 machine into single-user mode while it's booting.

All entropy harvesting uses some kind of harvesting. On i386,
(Pentium and better) it is the TSC register. 80386 and 80486 use
nanotime(9) and other CPUs have a TSC-like register.

 In my hobby platform, it's common to start the timer, then grab a value
 from it after the user hits a key after viewing some introduction screen.
 The value grabbed is often used as the actual random number, but it could
 be just as useful if used to seed a random generator.

SOP :-)

 If you're particularly paranoid, you set both timers for 32-bit mode,
 start one first thing at startup, and the other when the user hits the
 key, then read both of them the first time a random number is needed.
 Seed your random generator from that, along with any other sources you can
 (such as the video raster counter and the sound device's readable
 oscillator, set to generate a noise waveform).

Slight overkill, when the TSC register is already used and deliberately
underestimated to improve randomness quality.

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: entropy bikesheds

2001-01-11 Thread Mark Murray

Doug Barton said:
   Since this post actually has some content I'm moving it to
 -current.

Cool!

  Our /var isn't persistant accross boots, btw.  It is a mfs file
  system.  Having a requirement that /var contain persistant data would
  likely lead to problems.
 
   It's precisely for these, and other hairy examples that I haven't
 put the thing in /var yet. Even a diskless workstation can read files from
 a RO root that the host writes out periodically, but there is no guarantee
 that there will be a /var filesystem that we can read from at boot time. I
 actually started to write some code to handle some obvious cases and got a
 major headache just thinking about it.

What is needed is some form of persistant storage to stash the Yarrow
state over a reboot or a crash.

There are a number of people saying "Over my dead body can you put it
${HERE}!!", without coming up with alternatives that are useful. At
BSDCon, the concept of using the first swap partition was discussed,
and I think it is a great idea, but the volunteer has yet to offer
any code.

  I'm still not sure why we can't do something like:
 
  date  /dev/random
  cat /bin/ls  /dev/random
  fsck
  mount the file systems
  read in the entropy file
 
  Eg, toss some bone to the random pool.  Sure, it will be highly
  preditable, but for the mount commands it doesn't matter.  We fix
  before anything interesting happens.

Just as usable is "echo 'sekrit password'  /dev/random".

Might as well not bother. There is no usable randomness here, so rather
than pretending, it is better to simply admit to ourselves that the
entropy generator is giving crap numbers at this point.

I originally put a block-at-startup in precicesly because of this 
complaint. Remember that on a brand-new system, at first boot, the
sshd is going to use /dev/random to make keys. How insecure do you
want that?

Can we decide this, please - do we want secure startup (which will
take some effort to achieve), or can we say "screw it" and start
insecure like the old system?

I'm happy to accomodate folks, but the constant lack of concensus
combined with extreme positions is wearing a bit thin.

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: YES! laptop installing

2001-01-09 Thread Mark Murray

 This is to let everyone know that right now as I type I am setting up
 FreeBSD to start downloading over my cardbus ethernet card. It seems to
 work great except it doesn't beep when the card enables, but that's fine
 with me. :-)

What card?

My Netgear FA510 (dc0) probes (sorta) but comes up with a crazy
MAC address, and then doesn't work. It doesn't even go UP.

MAC=00:00:80:00:00:80, FWIW.

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: buildworld Problems at NTP

2001-01-05 Thread Mark Murray

 On Fri, Jan 05, 2001 at 12:37:43AM -0800, Crist J. Clark wrote:
 
  What is happening is that the system is killing off the make process
  because it starts to swell up so much it consumes all swap. Here is
  the dmesg,
 
 Were any bits of the compiler killed off? A new test snapshot of gcc
 was recently added to -current and maybe it's had a strange effect on
 makedepend or something

There was a make(1) problem a couple of weeks back. Resup, make-and-install
make(1), and you should be OK.

Dunno why, but ntp(d) tickled the bug.

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: buildworld Problems at NTP

2001-01-05 Thread Mark Murray

  There was a make(1) problem a couple of weeks back. Resup, make-and-install
  make(1), and you should be OK.
  
  Dunno why, but ntp(d) tickled the bug.
 
 To be safe, I nuked the /usr/src/usr.bin/make tree and re-cvsup'ed so
 I'd checkout new-car-smell-fresh copies. I killed the /usr/obj tree to
 ensure a clean start there and started a buildworld. Six hours later,
 
   === usr.sbin/ntp/ntpd
   Killed

Read what I said!!

Make-and-install _make_ (not anything else) first.

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: NFS/VM panic in current with INVARIANTS

2000-12-27 Thread Mark Murray
{
 :-#if defined(SMP)
 : return zalloci(z);
 :-#else
 :-return _zalloc(z);
 :-#endif
 : }
 : 
 : static __inline__ void
 : zfree(vm_zone_t z, void *item)
 : {
 :-#ifdef SMP
 : zfreei(z, item);
 :-#else
 :-_zfree(z, item);
 :-#endif
 : }
 : 
 :-#endif
 :+#endif /* _SYS_ZONE_H */
 :
 :--=-=-=--
 :
 :
 :To Unsubscribe: send mail to [EMAIL PROTECTED]
 :with "unsubscribe freebsd-current" in the body of the message
 :
 
 
 
 To Unsubscribe: send mail to [EMAIL PROTECTED]
 with "unsubscribe freebsd-current" in the body of the message
 
--
Mark Murray
Warning: this .sig is umop ap!sdn


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: Unicode support in cd9660 [patch for review]

2000-12-27 Thread Mark Murray

Aimed at the thread, not the participants.

This is off-topic for audit-. Please bring it back to audit- when you have
some actual code to audit.

Thanks!

M

 On Wed, Dec 27, 2000 at 12:05:57PM +0200, Maxim Sobolev scribbled:
 | Several days ago I got a CD with Russian filenames on it and discovered tha
t
 | I'm unable to read those filenames. After some hacking I produced a patch,
 | which should solve this problem in the manner similar to what we have in
 | msdosfs module (i.e. user-provided conversion table). I have to emphasize t
hat
 | it's a temporary solution until we will have iconv support in kernel.
 | 
 | Please somebody review attached patches.
 
 Please do not assume Unicode.  I18N/L10N efforts have been crying for
 programmers to *not* and *never* assume *anything*.  :)
 
 Also, this belongs more on -i18n more than anything else.  I really
 do not want to generate all the traffic on -i18n alone.. :)
 
 Have you seen ports/chinese/big5fs?  Japanese/Korean do the same thing too
 You could simply make a port of this that loads KLD's.  This enables us 
 to have the support without having hacks in src/sys.  I talked
 to Boris at length about this.  And I think this would be the best way
 to implement "temporary" hacks.
 
 As to the progress of iconv, we should have it soon, as soon as
 itojun and I work out how to import either the Citrus code
 or Konstantin's code. 
 
 If you make this a port, I say "go for it." :) If you wish to commit
 to src/sys, I have strong doubts about this.  I hope you do not
 mind my bluntness about this, as I really want to express the feelings.
 
 Merry Christmas and a Happy New Year,
 Michael
 -- 
 +--+
 | [EMAIL PROTECTED] | [EMAIL PROTECTED] |
 | http://peorth.iteration.net/~keichii | Yes, BSD is a conspiracy. |
 +--+
 
 
 To Unsubscribe: send mail to [EMAIL PROTECTED]
 with "unsubscribe freebsd-audit" in the body of the message
 
--
Mark Murray
Warning: this .sig is umop ap!sdn


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



NFS/VM panic in current with INVARIANTS

2000-12-26 Thread Mark Murray

Hi Matt

I'm getting a reliable panic on CURRENT (2000/12/26) with INVARIANTS
set. I suppose I could "fix" this by taking out INVARIANTS, but it
seems to make more sense to try to get it fixed.

The panic() is "freeing free entry", and the traceback (minus most
of the numbers) is:

panic
zerror
zfreei
NDFREE
nfsrv_lookup
nfs_nfsd
nfssvc
syscall(2f, 2f, 2f, 1, 0)
xint0x80

NFS activity (not mounting) triggers it. The panic happens on the
server box, which is a dual-cpu i386 class running an SMP kernel.

What else do you need?

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: NFS/VM panic in current with INVARIANTS

2000-12-26 Thread Mark Murray

 On Tue, Dec 26, 2000 at 02:00:54PM +0200, Mark Murray wrote:
 
  I'm getting a reliable panic on CURRENT (2000/12/26) with INVARIANTS
  set. I suppose I could "fix" this by taking out INVARIANTS, but it
  seems to make more sense to try to get it fixed.
 
 Do you have NFS compiled in to the kernel? I've had trouble using
 INVARIANTS in the kernel and NFS as a module many times - it always
 panics in the zone allocation stuff.

No I don't. Hmmm...

 (Either you always need to compile modules with the same INVARIENTS
 options as the kernel, or we need to fix INVARIENTS so it doesn't
 change the expected behaviour of anything in the kernel)

OK.

M
--
Mark Murray
Warning: this .sig is umop ap!sdn


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: No cable modems??

2000-12-19 Thread Mark Murray

This is offtopic! If you need to discuss it, please take it to
-chat.

OFFTOPIC
 Sorry to post this to -current, but (as should be obvious from
 the below) it's the only way I can get Ollivier to see it :(
 
 Why are you (or your ISP) refusing to accept mail from people
 with cable modems?  Enquiring minds want to know... ;-)

:

- The following addresses had permanent fatal errors -
 [EMAIL PROTECTED]
 (reason: 550 no cable modems here)

Many ISP's consider cable modem pools and DSL pools as the same sort
of "animal" as dialup users.

Very many ISPs will refuse to receive mail from all three of those
user-classes, because of the "direct-to-MX" spam issue. The solution
is to use your ISP's SMTP "smarthost" for your mail.

See http://mail-abuse.org/dul/
/OFFTOPIC

M
--
Mark Murray
Warning: this .sig is umop ap!sdn


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: usr.sbin/ntp/ntpd make: Cannot allocate memory

2000-12-15 Thread Mark Murray

I'm also seing this, on my smallest build machine. (My biggest
is an SMP box, and it hasn't completed a make world in about a
week due to hard hangs).

 I'm new at tracking current and I'm having trouble getting
 past this make error.  I've searched around the archive but
 can't find the answer.  I have 128MB of memory and 384MB
 of swap so I'm really not sure what's going on.
 
 I'm running a tyan s1832dl with dual PII350s and SMP seems
 to be working fine everywhere else so I don't think it's
 that.  Heck, I even got my sound card to make noise.
 
 Anyone want to help this newbie?
 
 Thanks,
 Pete...
 
 
 
 To Unsubscribe: send mail to [EMAIL PROTECTED]
 with "unsubscribe freebsd-current" in the body of the message
 
--
Mark Murray
Warning: this .sig is umop ap!sdn


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: ACPI and Sony laptop

2000-12-03 Thread Mark Murray

 That seems to be intended. I also observed this behaviour some
 time ago because with -current the entropy file is written by the
 rc.shutdown script and if this is not done at shutdown the next boot
 will take more time.

Definitely not "intended". It is intended that a seedfile get written at
shutdown. Are you fully up to date with your mergemaster(1)ing?

 Now I use "init 0" for shutdown and "init 6" for reboot.

That is a bug if you are up to date. However, it is beyond my ken to fix.

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



<    1   2   3   4   5   6   7   8   >