Recommend a laptop for FreeBSD

2002-04-19 Thread Koroush Saraf



Hi All,

I'm looking to purchase a laptop to run 
FreeBSD. Other than the best price performance, I'm looking for 
troublefree installation and native support for all the hardware. My main 
requirement is native openGL driver supportto take advantage of the 
3Dhardware acceleration. I'm leaning toward the Dell Dimension line 
of laptops, if you can recommend a better --name brand-- machine please let me 
know as well.

Also do you know if any vendors that sell laptops 
preinstalled with FreeBSD?

Thanks in advance,
~koroush


Re: Recommend a laptop for FreeBSD

2002-04-19 Thread Mark Santcroos

On Thu, Apr 18, 2002 at 11:20:37PM -0700, Koroush Saraf wrote:
 I'm looking to purchase a laptop to run FreeBSD.  Other than the best
 price performance, I'm looking for troublefree installation and native
 support for all the hardware.  My main requirement is native openGL
 driver support to take advantage of the 3D hardware acceleration.  I'm
 leaning toward the Dell Dimension line of laptops, if you can recommend
 a better --name brand-- machine please let me know as well.

This is a faq on freebsd-mobile.
Read the archives there.

Mark


-- 
Mark Santcroos  RIPE Network Coordination Centre
http://www.ripe.net/home/mark/  New Projects Group/TTM

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-hackers in the body of the message



Re: make(1) command-line variables

2002-04-19 Thread Alex Semenyaka

On Fri, Apr 19, 2002 at 11:01:04AM +0300, Ruslan Ermilov wrote:
 So what will The Right Thing be:
  - to take ``make'' from NetBSD
  - to transfer corresponding changes from NetBSD
  - to re-make my patch (to store the command line variables in MAKEFLAGS,
not in the new variable)?
 The second, in a form of the patch for FreeBSD -CURRENT would be preferable.

Ok, will be done.

SY, Alex




msg33661/pgp0.pgp
Description: PGP signature


Re: Looking for pointers: loader, sysctl, kern.ipc.semmni co.

2002-04-19 Thread Jan Grant

On Fri, 19 Apr 2002, Michael Reifenberger wrote:

 On Thu, 18 Apr 2002, Jan Grant wrote:
 ...
  Sorry if this is a newbie question:
 
  I'm looking to tune (amongst others) kern.ipc.semmni; looking at the
  code (sys/kern/sysv_sem.c) the value seems pretty hardwired - proof
  against anything short of a kernel rebuild.
 Take a closer look.
 Esp. in seminit() starting at line 162 ( -current ).
 You'll see a bunch of TUNABLE_INT_FETCH(...).
 These are tunable during loader(8) time.

Cheers; the -current stuff looks a lot more admin-friendly than -stable.
[never occurred to me that this might already be fixed and awaiting
5-release]

-- 
jan grant, ILRT, University of Bristol. http://www.ilrt.bris.ac.uk/
Tel +44(0)117 9287088 Fax +44 (0)117 9287112 RFC822 [EMAIL PROTECTED]
On modesty: whoever said it's hard being perfect obviously wasn't me.


To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-hackers in the body of the message



Re: updated install files for 4.5-R after security patches?

2002-04-19 Thread D J Hawkey Jr

In article [EMAIL PROTECTED],
[EMAIL PROTECTED] writes:
 I installed 4.5-RELEASE the other day, and then this zlib security
 advisory came out and I got to wondering.. are the install files for
 4.5-RELEASE updated after patches are put into RELENG_4_5?

If you mean, Are the 4.5-RELEASE ISO images or CD-ROMs updated to
reflect bug fixes?, then, no, they're not. The usual and recommended
way to update an installed system is documented in the FreeBSD Handbook
(http://www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/index.html),
Sections 9 and 19. In a nutshell, one uses the 'cvsup' tool to freshen
your source code, then one rebuilds and installs the OS and/or kernel.
It's not as daunting a task as it sounds.

As it turns out, there's a very recent thread in freebsd-security about
this very topic, if you want to know the ups and downs about it.

BTW, freebsd-hackers is not the appropriate venue for questions like this.
Neither is freebsd-security, actually. Try freebsd-questions next time.

Dave

-- 

Windows: Where do you want to go today?
Linux: Where do you want to go tomorrow?
FreeBSD: Are you guys coming, or what?


To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-hackers in the body of the message



4.5-STABLE panicks ... KVA_PAGES the solution?

2002-04-19 Thread Marc G. Fournier


Morning ...

I have a server with the following specs from DMESG:

Copyright (c) 1992-2002 The FreeBSD Project.
Copyright (c) 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994
The Regents of the University of California. All rights reserved.
FreeBSD 4.5-STABLE #7: Fri Apr 12 09:20:30 CDT 2002
[EMAIL PROTECTED]:/usr/obj/usr/src/sys/kernel
Timecounter i8254  frequency 1193182 Hz
CPU: Pentium III/Pentium III Xeon/Celeron (996.84-MHz 686-class CPU)
  Origin = GenuineIntel  Id = 0x68a  Stepping = 10
  
Features=0x387fbffFPU,VME,DE,PSE,TSC,MSR,PAE,MCE,CX8,APIC,SEP,MTRR,PGE,MCA,CMOV,PAT,PSE36,PN,MMX,FXSR,SSE
real memory  = 3221225472 (3145728K bytes)
avail memory = 3135082496 (3061604K bytes)
Programming 16 pins in IOAPIC #0
IOAPIC #0 intpin 2 - irq 0
Programming 16 pins in IOAPIC #1
FreeBSD/SMP: Multiprocessor motherboard
 cpu0 (BSP): apic id:  0, version: 0x00040011, at 0xfee0
 cpu1 (AP):  apic id:  1, version: 0x00040011, at 0xfee0
 io0 (APIC): apic id:  4, version: 0x000f0011, at 0xfec0
 io1 (APIC): apic id:  5, version: 0x000f0011, at 0xfec01000
stuff deleted

Which crashes on me at around 2am in the morning (either after 24
or 48hrs of uptime, depending on my luck) with the following error:

| panic: vm_map_entry_create: kernel resources exhausted
| mp_lock = 0101; cpuid = 1; lapic.id = 0100
| boot() called on cpu#1

Attached at the bottom of this is my current kernel config ...
last night, I ran top on the system and cut-n-paste the results from when
it hung, which look like:

last pid: 84988;  load averages: 19.82, 57.35, 44.426   up 0+23:33:12 02:05:00
5021 processes:16 running, 5005 sleeping
CPU states:  8.7% user,  0.0% nice, 24.3% system,  2.2% interrupt, 64.7% idle
Mem: 2320M Active, 211M Inact, 390M Wired, 92M Cache, 199M Buf, 4348K Free
Swap: 3072M Total, 1048M Used, 2024M Free, 34% Inuse, 448K Out


So, I have plenty of swapspace left, lots of idle CPU and a whole whack of 
processes ...

Someone suggested setting KVA_PAGES higher then the default for
this, but, as this is a production server, and its not something I've ever
played with, I'd like to know what the ramifications are ...

The server has 3Gig of RAM now ... according to opt_global.h,
KVA_PAGES is set to 256 (1G) right now ... but if its 1G by default,  how
does a system withi 1G of RAM in it work?  Or does this limit something
else altogether?  I'm not finding any good 'reading material' on this so
far, but from waht I found through a search, it seems that its recommended
to be set to 768(3G) vs 256(1G)?

Thanks for any help in advance ..


---
machine i386
cpu I686_CPU
ident   kernel
maxusers512

options NMBCLUSTERS=15360

options INET#InterNETworking
options INET6   #IPv6 communications protocols
options FFS #Berkeley Fast Filesystem
options FFS_ROOT#FFS usable as root device [keep this!]
options SOFTUPDATES #Enable FFS soft updates support
options PROCFS  #Process filesystem
options COMPAT_43   #Compatible with BSD 4.3 [KEEP THIS!]
options SCSI_DELAY=15000#Delay (in ms) before probing SCSI
options KTRACE  #ktrace(1) support

options SYSVSHM
options SHMMAXPGS=98304
options SHMMAX=(SHMMAXPGS*PAGE_SIZE+1)

options SYSVSEM
options SEMMNI=2048
options SEMMNS=4096

options SYSVMSG #SYSV-style message queues

options P1003_1B#Posix P1003_1B real-time extensions
options _KPOSIX_PRIORITY_SCHEDULING
options ICMP_BANDLIM#Rate limit bad replies

options SMP # Symmetric MultiProcessor Kernel
options APIC_IO # Symmetric (APIC) I/O

device  isa
device  pci

device  scbus   # SCSI bus (required)
device  da  # Direct Access (disks)
device  sa  # Sequential Access (tape etc)
device  cd  # CD
device  pass# Passthrough device (direct SCSI access)

device  amr # AMI MegaRAID
device  sym

device  atkbdc0 at isa? port IO_KBD
device  atkbd0  at atkbdc? irq 1 flags 0x1
device  psm0at atkbdc? irq 12

device  vga0at isa?

pseudo-device   splash

device  sc0 at isa? flags 0x100

device  npx0at nexus? port IO_NPX irq 13

device  sio0at isa? port IO_COM1 flags 0x10 irq 4
device  sio1at isa? port IO_COM2 irq 3

device  miibus  # MII bus support
device  fxp # Intel EtherExpress PRO/100B (82557, 82558)

pseudo-device   loop# Network loopback
pseudo-device   

Re: Older releases? was Re: FreeBSD Security Advisory FreeBSD-SA-02:21.tcpip

2002-04-19 Thread D J Hawkey Jr

Terribly sorry for this cross-post, but it seems relevant, if not
appropriate, this time.

In article [EMAIL PROTECTED],
[EMAIL PROTECTED] writes:
 The patch described in the advisory talks about 4.5-RELEASE.
 I'm running two systems on 4.3-RELEASE-p28; I am guessing they are 
 vulnerable.  If so, what steps do I follow to patch the system?
 
 Upgrading is not an option since the fxp (QLogic fibre-channel HAB) 
 driver is very flaky since 4.4 and above.
 
 The patches seem to make relavent changes; I just want to be sure.

I was going to ask the same thing today, to try to provide backported
patches. I assume you're writing of source patches, not binary patches?

Let's stay in contact with one another on this. If 4.4 and earlier are
vulnerable and patchable (that is, no make world required), I'll create
patchfiles and make them available. It may take me a day or two, though.

Developers: Userland is affected here - /usr/lib/libz. Would a
make  make install (sic) in /usr/src/lib/libz before building the
kernel suffice for a solid upgrade?

 Thanks!

Ditto,
Dave

-- 

Windows: Where do you want to go today?
Linux: Where do you want to go tomorrow?
FreeBSD: Are you guys coming, or what?


To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-hackers in the body of the message



InterScan NT Alert

2002-04-19 Thread virus

Receiver, InterScan has detected virus(es) in the e-mail attachment.

Date:   Fri, 19 Apr 2002 17:53:59 +0200
Method: Mail
From:   [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
File:   Decimal.pif
Action: clean failed - deleted
Virus:  WORM_KLEZ.G 

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-hackers in the body of the message



Re: Older releases? was Re: FreeBSD Security Advisory FreeBSD-SA-02:21.tcpip

2002-04-19 Thread Jacques A. Vidrine

On Fri, Apr 19, 2002 at 09:59:14AM -0500, D J Hawkey Jr wrote:
 Developers: Userland is affected here - /usr/lib/libz. Would a
 make  make install (sic) in /usr/src/lib/libz before building the
 kernel suffice for a solid upgrade?

No, the src/lib/libz is --- as you note --- for userland.  It is not
used by the kernel. 
Note that the patch includes updates to the kernel source as well.
Also note that `savecore' statically links libz, so it must be
recompiled and reinstalled also.  I don't believe there are any other
programs in the base system that statically link libz.

Cheers,
-- 
Jacques A. Vidrine [EMAIL PROTECTED] http://www.nectar.cc/
NTT/Verio SME  . FreeBSD UNIX .   Heimdal Kerberos
[EMAIL PROTECTED] .  [EMAIL PROTECTED]  .  [EMAIL PROTECTED]

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-hackers in the body of the message



Re: vlan traffic over ipsec tunnel

2002-04-19 Thread Archie Cobbs

Terry Lambert writes:
 Bridging doesn't work with the vlanX interface currently in FreeBSD.

Why not?

I believe you, I've just never used vlans and always assumed
that they acted like normal Ethernet interfaces.

-Archie

__
Archie Cobbs * Packet Design * http://www.packetdesign.com

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-hackers in the body of the message



4.5 STABLE - kernel panics

2002-04-19 Thread Herbert

Hei!

When I have tried to compile QT-3.0.3 with g++30 today my
FreeBSD-STABLE kernel paniced while gmake was generating the Makefiles.

# uname -a
FreeBSD freebsd3.rocks 4.5-STABLE FreeBSD 4.5-STABLE #0: Fri Apr 19
07:24:16 CEST 2002
[EMAIL PROTECTED]:/usr/obj/usr/src/sys/ATAPICAM  i386

Fatal trap 12: page fault while in kernel mode
fault virtual address   = 0x46
fault code  = supervisor read, page not present
instruction pointer = 0x8:0xc02798d4
stack pointer   = 0x10:0xdd7d5c28
frame pointer   = 0x10:0xdd7d5c18
code segment= base 0x0, limit 0xf, type 0x1b
= DPL 0, pres 1, def32 1, gran 1
processor eflags= interrupt enabled, resume, IOPL = 0
current process = 16947 (cpp0)
interrupt mask  = none
trap number = 12
panic: page fault

syncing disks... 24 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 
done
Uptime: 6h15m10s

(kgdb) bt
#0  dumpsys () at /usr/src/sys/kern/kern_shutdown.c:487
#1  0xc016d313 in boot (howto=256) at
/usr/src/sys/kern/kern_shutdown.c:316
#2  0xc016d751 in panic (fmt=0xc02bbfcc %s)
at /usr/src/sys/kern/kern_shutdown.c:595
#3  0xc027c36b in trap_fatal (frame=0xdd7d5be8, eva=70)
at /usr/src/sys/i386/i386/trap.c:966
#4  0xc027c019 in trap_pfault (frame=0xdd7d5be8, usermode=0, eva=70)
at /usr/src/sys/i386/i386/trap.c:859
#5  0xc027bb93 in trap (frame={tf_fs = 16, tf_es = 16, tf_ds = 16, 
  tf_edi = -574190496, tf_esi = -578986936, tf_ebp = -578986984, 
  tf_isp = -578986988, tf_ebx = 14, tf_edx = -578998272, 
  tf_ecx = 13077933, tf_eax = 14, tf_trapno = 12, tf_err = 0, 
  tf_eip = -1071146796, tf_cs = 8, tf_eflags = 66050, tf_esp = 0, 
  tf_ss = -579023232}) at /usr/src/sys/i386/i386/trap.c:458
#6  0xc02798d4 in pmap_prefault (pmap=0x8, addra=66050, entry=0x0)
at /usr/src/sys/i386/i386/pmap.c:2535

Anyone knows what's going on here?

Regards,
Herbert

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-hackers in the body of the message



Re: vlan traffic over ipsec tunnel

2002-04-19 Thread Doug Ambrisko

Archie Cobbs writes:
| Terry Lambert writes:
|  Bridging doesn't work with the vlanX interface currently in FreeBSD.
| 
| Why not?
| 
| I believe you, I've just never used vlans and always assumed
| that they acted like normal Ethernet interfaces.

Same here:
  a21p#  ngctl list
  There are 5 total nodes:
Name: ngctl53375  Type: socket  ID: 0006   Num hooks: 0
Name: an0 Type: ether   ID: 0005   Num hooks: 0
Name: vmnet1  Type: ether   ID: 0004   Num hooks: 0
Name: vlan0   Type: ether   ID: 0003   Num hooks: 0
Name: fxp0Type: ether   ID: 0002   Num hooks: 0
  a21p# ifconfig vlan0
  vlan0: flags=8843UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST mtu 1500
  inet 192.168.33.1 netmask 0xff00 broadcast 192.168.33.255
  ether 00:10:a4:91:2e:ce 
  vlan: 34 parent interface: fxp0
  a21p# 

Would imply it should just work to bridge vlan's via netgraph bridging.
As Archie said I have not tested this to prove how it does or does not
work since I haven't had a need to try it.

Doug A.

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-hackers in the body of the message



Re: vlan traffic over ipsec tunnel

2002-04-19 Thread Julian Elischer



On Fri, 19 Apr 2002, Doug Ambrisko wrote:

 Archie Cobbs writes:
 | Terry Lambert writes:
 |  Bridging doesn't work with the vlanX interface currently in FreeBSD.
 | 
 | Why not?
 | 
 | I believe you, I've just never used vlans and always assumed
 | that they acted like normal Ethernet interfaces.
 
 Same here:
   a21p#  ngctl list
   There are 5 total nodes:
 Name: ngctl53375  Type: socket  ID: 0006   Num hooks: 0
 Name: an0 Type: ether   ID: 0005   Num hooks: 0
 Name: vmnet1  Type: ether   ID: 0004   Num hooks: 0
 Name: vlan0   Type: ether   ID: 0003   Num hooks: 0
 Name: fxp0Type: ether   ID: 0002   Num hooks: 0
   a21p# ifconfig vlan0
   vlan0: flags=8843UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST mtu 1500
   inet 192.168.33.1 netmask 0xff00 broadcast 192.168.33.255
   ether 00:10:a4:91:2e:ce 
   vlan: 34 parent interface: fxp0
   a21p# 
 
 Would imply it should just work to bridge vlan's via netgraph bridging.
 As Archie said I have not tested this to prove how it does or does not
 work since I haven't had a need to try it.

I don't know, but it may have problems setting promiscuous mode..
is there such a thing in vlan mode?

 
 Doug A.
 
 To Unsubscribe: send mail to [EMAIL PROTECTED]
 with unsubscribe freebsd-hackers in the body of the message
 


To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-hackers in the body of the message



Re: vlan traffic over ipsec tunnel

2002-04-19 Thread Julian Elischer

failing that, I have just had contributed
some code that produces an actual vlan netgraph node.
You attach it to the ethernet node.. I'm still
reading it to work out what it does..


On Fri, 19 Apr 2002, Doug Ambrisko wrote:

 Archie Cobbs writes:
 | Terry Lambert writes:
 |  Bridging doesn't work with the vlanX interface currently in FreeBSD.
 | 
 | Why not?
 | 
 | I believe you, I've just never used vlans and always assumed
 | that they acted like normal Ethernet interfaces.
 
 Same here:
   a21p#  ngctl list
   There are 5 total nodes:
 Name: ngctl53375  Type: socket  ID: 0006   Num hooks: 0
 Name: an0 Type: ether   ID: 0005   Num hooks: 0
 Name: vmnet1  Type: ether   ID: 0004   Num hooks: 0
 Name: vlan0   Type: ether   ID: 0003   Num hooks: 0
 Name: fxp0Type: ether   ID: 0002   Num hooks: 0
   a21p# ifconfig vlan0
   vlan0: flags=8843UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST mtu 1500
   inet 192.168.33.1 netmask 0xff00 broadcast 192.168.33.255
   ether 00:10:a4:91:2e:ce 
   vlan: 34 parent interface: fxp0
   a21p# 
 
 Would imply it should just work to bridge vlan's via netgraph bridging.
 As Archie said I have not tested this to prove how it does or does not
 work since I haven't had a need to try it.
 
 Doug A.
 
 To Unsubscribe: send mail to [EMAIL PROTECTED]
 with unsubscribe freebsd-hackers in the body of the message
 


To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-hackers in the body of the message



Re: vlan traffic over ipsec tunnel

2002-04-19 Thread Terry Lambert

Julian Elischer wrote:
  Would imply it should just work to bridge vlan's via netgraph bridging.
  As Archie said I have not tested this to prove how it does or does not
  work since I haven't had a need to try it.
 
 I don't know, but it may have problems setting promiscuous mode..
 is there such a thing in vlan mode?

It might work with the Netgraph bridging.  It's not going to work
with the packet fast forwarding.

The new netgraph version goes through ether_input, so it should
not be a problem.

Promiscuous mode isn't really necessary (IMO), at least on the
interface to which it's trunked.  It *might* be an issue for the
VLAN itself, though, if it's supposed to bridge to a non-VLAN.

My impression of bridging in theis context was that you would
use it to create a virtual LAN at otherwise physically disjoint
locations, so that bridging should be automatic, at least that
way.  That implied (to me) that the bridging was e.g. to allow
a box to be on the local net with an ethernet interface, and
act as a bridge between that net and another local net, using
the VLAN as a transport, over something else (e.g. a point-to-point
IPSEC link between the bridges).

From old DEC days, I'd say it was the moral equivalent of a DELNI,
where you have half a bridge, a quarter mile of optical fiber, and
the other half of the bridge, and everything on either side just
sees a bridge.

I imagine that the primary use would be for VPN's, where there
were N nodes at one site and M nodes at another, where N  1 
M  1.

Unfortunately, I don't have a Cisco Catalyst 2900 or other toys
necessary to play with VLAN interoperability at the moment, I
can only play with FreeBSD-FreeBSD VLAN stuff, and then draw
conclusions based on the RFCs and Cisco and other documentation.

Sorry to be so vague.  8-(.  Maybe someone with a larger toy
budget than I have could contribute something to the conversation?
I know Bill Paul has done a lot of work with VLAN code (he wrote
the FreeBSD FEC code), and I expect Jon Lemon would be quite
knowledgable, too, being a Cisco employee (plus have access to
toys we haven't even heard of, yet ;^)).


-- Terry

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-hackers in the body of the message



Re: vlan traffic over ipsec tunnel

2002-04-19 Thread Terry Lambert

Julian Elischer wrote:
 
 failing that, I have just had contributed
 some code that produces an actual vlan netgraph node.
 You attach it to the ethernet node.. I'm still
 reading it to work out what it does..

Is this the VLAN implemented in Netgraph thing you were
talking about last December, or is it the just glue code?

-- Terry

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-hackers in the body of the message



Re: vlan traffic over ipsec tunnel

2002-04-19 Thread Julian Elischer


On Fri, 19 Apr 2002, Terry Lambert wrote:

 
 Julian's approach would put the vlan's on ng_ether, which
 would push through the code that does the bridging.  Last
 December 20 on -net, he said the caode for a VLAN netgraph
 node was being donated by this French committer (sorry, I
 don't remember the exact words he used; I only scanned the
 posting in passing, 4 months ago, when VLAN's weren't
 important to me).

I have the netgraph vlan code now..
I'm reading it to try understand what it does..

 
 -- Terry
 
 To Unsubscribe: send mail to [EMAIL PROTECTED]
 with unsubscribe freebsd-net in the body of the message
 


To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-hackers in the body of the message



Re: vlan traffic over ipsec tunnel

2002-04-19 Thread Julian Elischer

apparently, though I am still trying to understand it..


On Fri, 19 Apr 2002, Terry Lambert wrote:

 Julian Elischer wrote:
  
  failing that, I have just had contributed
  some code that produces an actual vlan netgraph node.
  You attach it to the ethernet node.. I'm still
  reading it to work out what it does..
 
 Is this the VLAN implemented in Netgraph thing you were
 talking about last December, or is it the just glue code?
 
 -- Terry
 


To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-hackers in the body of the message



resolver library and changes in /etc/resolv.conf

2002-04-19 Thread bdodson

As part of debugging massive email failures for my local lab domain
after our campus IS people changed from Solaris to Windows2000 for DNS
last weekend, I had the occasion to change the name server entries in
/etc/resolv.conf.  I thought (wrongly it turns out) that I could just
make the changes, and they would be picked up automatically.  Is this
sendmail remembering the name server list it got when it was started?
Can I just send it a HUP and have it pick up the changes?  I know that
going down to single user and back to multiuser is sufficient, but is
there a less intrusive way to force the changes to be recognized?  I
would like a procedure that worked globally for all processes, not just
sendmail, if possible.

TIA,

Bud Dodson

-- 
M. L. Dodson[EMAIL PROTECTED]
409-772-2178FAX: 409-772-1790


To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-hackers in the body of the message



Re: resolver library and changes in /etc/resolv.conf

2002-04-19 Thread Sean Kelly

On Thu, Apr 18, 2002 at 06:55:24PM -0500, [EMAIL PROTECTED] wrote:
 As part of debugging massive email failures for my local lab domain
 after our campus IS people changed from Solaris to Windows2000 for DNS
 last weekend, I had the occasion to change the name server entries in
 /etc/resolv.conf.  I thought (wrongly it turns out) that I could just
 make the changes, and they would be picked up automatically.  Is this
 sendmail remembering the name server list it got when it was started?
 Can I just send it a HUP and have it pick up the changes?  I know that
 going down to single user and back to multiuser is sufficient, but is
 there a less intrusive way to force the changes to be recognized?  I
 would like a procedure that worked globally for all processes, not just
 sendmail, if possible.

The contents of /etc/resolv.conf are picked up when the application calls
res_init().  Your best bet would be to just restart sendmail.  You don't
have to go to singleuser to make the change, just restart the networked
stuff.

-- 
Sean Kelly | PGP KeyID: 77042C7B
[EMAIL PROTECTED] | http://www.zombie.org



msg33682/pgp0.pgp
Description: PGP signature


Re: updated install files for 4.5-R after security patches?

2002-04-19 Thread Rogier R. Mulhuijzen

At 07:15 19-4-2002 -0500, D J Hawkey Jr wrote:
In article [EMAIL PROTECTED],
Sections 9 and 19. In a nutshell, one uses the 'cvsup' tool to freshen
your source code, then one rebuilds and installs the OS and/or kernel.
It's not as daunting a task as it sounds.

As it turns out, there's a very recent thread in freebsd-security about
this very topic, if you want to know the ups and downs about it.

I actually know David and I know he's familiar with cvsupping and 
rebuilding from source.

I guess what his question should be read as if the ISO images and 
distributions are not updated after the -SECURE branch has been updated, 
why isn't this the case?

And I must agree, we know there are bugs in 4.5-RELEASE, yet we don't 
update the images for 4.5-RELEASE.

Yes of course people can use cvsup and upgrade that way. But what about 
people who are about to install from scratch? Do we REALLY want them to 
install a faulty version and then upgrade with cvsup? I can't see any good 
reasons to not update them, or replace 4.5-RELEASE with 4.5-RELEASE-pN at 
the very least.

And also, cvsup is a beautiful thing, but I can't see someone with a 500MB 
harddrive doing a make buildworld. And yes I sometimes am forced to run 
FreeBSD on such a small system.

BTW, freebsd-hackers is not the appropriate venue for questions like this.
Neither is freebsd-security, actually. Try freebsd-questions next time.

Since he was aware of cvsup I don't think -questions was the right place. 
He just should have elaborated a little more.

Greets,

 Doc


To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-hackers in the body of the message



Re: updated install files for 4.5-R after security patches?

2002-04-19 Thread D J Hawkey Jr

On Apr 20, at 05:55 AM, Rogier R. Mulhuijzen wrote:
 
 At 07:15 19-4-2002 -0500, D J Hawkey Jr wrote:
 In article [EMAIL PROTECTED],
 Sections 9 and 19. In a nutshell, one uses the 'cvsup' tool to freshen
 your source code, then one rebuilds and installs the OS and/or kernel.
 It's not as daunting a task as it sounds.
 
 As it turns out, there's a very recent thread in freebsd-security about
 this very topic, if you want to know the ups and downs about it.
 
 I actually know David and I know he's familiar with cvsupping and 
 rebuilding from source.
 
 I guess what his question should be read as if the ISO images and 
 distributions are not updated after the -SECURE branch has been updated, 
 why isn't this the case?
 
 And I must agree, we know there are bugs in 4.5-RELEASE, yet we don't 
 update the images for 4.5-RELEASE.
 
 Yes of course people can use cvsup and upgrade that way. But what about 
 people who are about to install from scratch? Do we REALLY want them to 
 install a faulty version and then upgrade with cvsup? I can't see any good 
 reasons to not update them, or replace 4.5-RELEASE with 4.5-RELEASE-pN at 
 the very least.

You and David ought to check out that thread in freebsd-security. I think
it's died down now, but it does cover your and other's issues better than
I care to try to interate here.

For my money, I came down in it with a If you want it, you're going to
have to get that ball moving for yourself, 'cuz it's got it's technological
downsides, and The Project hasn't the resources to devote..

 And also, cvsup is a beautiful thing, but I can't see someone with a 500MB 
 harddrive doing a make buildworld. And yes I sometimes am forced to run 
 FreeBSD on such a small system.

Now, I don't recall seeing this a an issue in that thread I refer to.
OTOH, I don't know that it would have added or subtracted much, either.

 BTW, freebsd-hackers is not the appropriate venue for questions like this.
 Neither is freebsd-security, actually. Try freebsd-questions next time.
 
 Since he was aware of cvsup I don't think -questions was the right place. 
 He just should have elaborated a little more.

I meant no offense in that comment. I hope none was taken. I hope none is
taken with this, either: Do we really want to open this discussion [again]
in freebsd-hackers?

 Greets,
  Doc

SeeYa,
Dave

-- 
  __ __
  \__   \D. J. HAWKEY JR.   /   __/
 \/\ [EMAIL PROTECTED]/\/
  http://www.visi.com/~hawkeyd/


To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-hackers in the body of the message



freebsd-hackers@freebsd.org

2002-04-19 Thread



¿Ë·Rªº«È¤á±z¦n:

  
  OEA¥þ²y¶T©öºô¡Awww.oea.com.tw¡AÅwªï¥xÆW¤¤¤p¥ø·~§K¶O¥[¤J·|­û¡C
  OEA¥þ²y¶T©öºô¬O±M¬°¥þ²yµØ°Ó¥«³õ¤Î¥xÆW¤º¾P¥«³õ©Ò«Ø¥ßªº±M·~¥xÆW²£·~¹q¤l¶T©ö¥­¥x¡A´£¨Ñ¤F²£«~·j´M¡B¶T©ö¾÷·|¡B¼t°Óµn¿ý¡B¦h´CÅ餬°Ê¥ø·~²¤¶¥úºÐ¡B¥ø·~ºô¯¸³ø»ù¤Î¸ß»ù¨t²Î¡B¥ø·~¹q¤l«¬¿ý¡B2D»P3D°Êµe¡B¼v¤ù»PµêÀÀ¹ê¹Ò¡BµêÀÀ¥D¾÷¯²¥Î¡Bºô­¶³]­p¡B±M®×ºô¯¸«Ø¸m¡B°Ó°È¸ê°Tµ¥±M·~ªA°È¡C 
  OEA¥þ²y¶T©öºô¡A¬°¥þ²y³Ì¤jµØ¤H°Ó·~¶T©öºô¯¸¤§¤@¡A¾Ö¦³¥xÆW¤G¤d®a¥ø·~·|­û¡A®ü¥~µØ°Ó¤W¤d®a·|­û¡A©M°ê¤ºª¾¦W¤W¥«¤WÂd¤½¥q¤Î³\¦h¤¤¤p¥ø·~ªº«È¤á¡C 
  
  µL½×¶Q¤½¥q¬O¸gÀ示¾P¨Æ·~¡A©Ý®i°ê¤º¦æ¾P³q¸ô¡A©Î¬O¸gÀç¥~¾P¨Æ·~¡A©Ý®i®ü¥~¥«³õ¡COEA¥þ²y¶T©öºô´£¨Ñ¥þ¤è¦ìºô¸ô¦æ¾P¾ã¦X¤è®×¡A´£¨Ñµ¹¶Q¤½¥q¨ã¦³°ê¤º¥~¶R½æ¸ê°T¡B°Ó·~¾÷·|¡B¦X§@¥[¤u¡B¸g¾P¥N²z¤Î·s²£«~¤W¥«µ¥¦h¶µ¼s§i¤ÎÃn¥ú¥\¯à¡C 
  ºô¯¸³W¹º¥H°È¹ê¡A¿Ë¤Á¡A²³æªº¾Þ§@¤¶­±¬°®Ö¤ß²z©À¡CÅwªï¶Q¤½¥q§K¶O¥[¤J¤@¯ë·|­û¡A¾Ö¦³¦h¶µ¥[­ÈªA°È¡C 
  
  ¶Àª÷·|­û«P¾P±M®×¡G¤@¦~¥u­nNT$6,000¤¸¡A¨ã¦³¤U¦C¥[­ÈªA°È¡C1. ´£¨Ñ1¦~20M±MÄݺô¯¸¼eÀWµêÀÀ¥D¾÷¯²¥Î¡A°ê¤º³s½uÀW¼e1000M¡A¬ü°êT3±M½u¡C2. ´£¨Ñ¥D¾÷²¾Âà¤Îºô­¶­×§ï¡C3. µn¿ýOEA¥þ²y¶T©öºô²£«~¸ê®Æ®w¤Î­º­¶banner¼s§i¬Ýª©¡C4. 
  µn¿ý10­Ó¥xÆW·j´M¤ÞÀº¡A¥]¬A©_¼¯¯¸¡B¿»Á¦ÃáBHinet¡B·s®öºôµ¥µ¥¡C5. 
  µn¿ý°ê»Úª¾¦W¸g¶Tºô¯¸¡A¥]¬Aªü¨½¤Ú¤Ú¡BEC21¡BGlobal sourceµ¥µ¥¡C6. 
  ´£¨Ñ¤@­Ó¹q¤l¶l¥ó±MÄÝ«H½c (username@domain name)¡C
  ±M®×ºô¯¸«Ø¸m¡G¥ø·~ºô¯¸¡G§g°ê¤Ñ¤U¦³­­¤½¥q°Ó·~ºô¯¸¡G°·¶×¹ê·~ªÑ¥÷¦³­­¤½¥qÀRºAºô¯¸¡GÂêÄ_¦³­­¤½¥q



~OEA¥þ²yµØ°Ó¶T©ö¸ê·½ºô www.oea.com.tw·s¨£¸ê°T¦³­­¤½¥q www.newsight.com.tw¹q¤l¶l¥ó«H½c¡G[EMAIL PROTECTED]~


Free Open Source Software for International Development

2002-04-19 Thread Obi Anizor

Dear International Development Colleague: 

This mail is being sent to you as a person who or whose organization has been 
identified
as interested in issues of international development and the digital divide. If you 
would
rather not receive e-mail from us any more, please respond to this message with
'REMOVE ME' as the subject. We honor all removal requests.

My organization has developed an internet application for the collection, analysis and
dissemination of project data; recording e-readiness assessments; running discussion 
groups;
maintaining ICT infrastructure statistics; sharing calendars; sending e-mail,
among other things. It is designed for COLLABORATIVE work over the internet or 
intranet.
Each component can be implemented independently.

You can run a demonstration at:
http://www.leapfrogindex.org:8080/leapfrog/index.html
(Use the pre-set default values. Only test data is used. The demonstration data
is not guaranteed to be correct, complete or consistent. These attributes are the
responsibility of projects that install or use the system).

We plan to finalize the development and release the application for free distribution 
under the GNU Public Licence ( http://www.gnu.org/copyleft/gpl.html ) if the 
international 
development community shows interest in using such a system as a whole or in parts.
This means that not only is our software free for anyone to use, but the source code 
for
the software are also freely available to be adapted and improved upon, so long as
credit is given to contributors along the way.

Please indicate your interest in using such a system by responding to this message
with Yes and any other comments in the body of the message.

A tally of the response will be made in due course and the next steps
will be made known to interested parties.

Please forward this message to anyone who might benefit from such a system.

For more information contact:

Dr. Obi Anizor
leapfrogindex.org
87 Oakwood Village
Suite 2
Flanders, New Jersey 07836-9048
Tel : (973) 252-8641
Cell: (905) 301-1985
Fax : (973) 252-4265/(416) 605-1905
E-mail: [EMAIL PROTECTED]


To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-hackers in the body of the message