Re: FreeBSD, BSDi differences

2000-09-23 Thread Kris Kennaway

On Sat, 23 Sep 2000, steveb99 wrote:

 I'm still new to FreeBSD and like it so far, but I'm thinking of ways I can
 use it at work. I hear about BSDi and that it is used in many network
 appliances like f5's BigIP load balancers and other similar products. What
 I've read BSDi is used because of it excellent TCP stack and other
 networking.  So how different is FreeBSD TCP stack and networking from
 BSDi's?

Very little.

Both FreeBSD and BSDi are derived from the same code. There are no doubt a
few differences, but based on what I've seen in other parts of the BSD/OS
code I'd be surprised if theirs had received as much work as our network
code has.

Kris

--
In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Executable packages (long, sorry)

2000-09-20 Thread Kris Kennaway

On Wed, 20 Sep 2000, Koster, K.J. wrote:

 Riding on the wave of the unified BSD packages effort, this might be a good
 time to rekindle that idea. Say that we agree on some form of uniform
 package layout. You'd say that man pages go into $PKG_BASE/$PKG_NAME/man,
 and that libraries go into $PKG_BASE/$PKG_NAME/lib, and that there is
 probably a script named $PKG_BASE/$PKG_NAME/etc/rc that takes the arguments
 "start" and "stop" for system startup. A script named
 $PKG_BASE/$PKG_NAME/bin/run is invoked when a user types $PKG_NAME at the
 command prompt (triggered by a script in /usr/local/bin, which is symlinked
 to $PKG_NAME.

It's not possible to determine where a lot of packages install, at
run-time - they need compile-time settings. Our packages should mostly
(with some notable exceptions where it's just too damn hard) be
PREFIX-clean, meaning you can install them wherever you like, but you have
to specify that at port compile-time.

A similar idea has come up in the past about using something like stow to
keep ports in sepoarate directories with symlinks from a master
/usr/local/bin, but no-one's done the work to allow it. Hint.

Kris

--
In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: 4.1 make world and cvsup release field

2000-09-18 Thread Kris Kennaway

On Mon, 18 Sep 2000, Christopher Stein wrote:

 I would like to do this via cvsup and `make world'.
 My understanding is that `make world' is just buildworld followed
 by installworld, each a single monolithic step. Hhmm.. it seems
 to me that some build stages will not work without
 some other elements being installed. For example, my current modified
 4.1 kernel will not build on a 3.3 system due to the old binutils (2.9.1
 vs. 2.10). So how can a `make world' work in a monolithic build then
 install sequence?

See the /usr/src/UPDATING file after updating your source and be sure to
follow the directions precisely.

Kris

--
In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: installing ...

2000-09-14 Thread Kris Kennaway

On Wed, 13 Sep 2000, Danny Braniss wrote:

 after i made a 'make buidlworld' how can i get it to install in /5.0-CURRENT?
 i compiled on a 4.1.

I respectfully suggest that if you dont know how to install FreeBSD from
source, you shouldn't be using 5.0-CURRENT, which can and will screw up
your system unless you already know how to fix it yourself.

See http://www.freebsd.org/handbook/current-stable.html

Kris

--
In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: installing ...

2000-09-14 Thread Kris Kennaway

On Thu, 14 Sep 2000, Danny Braniss wrote:

 In message [EMAIL PROTECTED]you 
 write:
 }On Wed, 13 Sep 2000, Danny Braniss wrote:
 }
 } after i made a 'make buidlworld' how can i get it to install in 
 /5.0-CURRENT?
 } i compiled on a 4.1.
 }
 }I respectfully suggest that if you dont know how to install FreeBSD from
 }source, you shouldn't be using 5.0-CURRENT, which can and will screw up
 }your system unless you already know how to fix it yourself.
 
 well, it shouldn't screw up my system, if, for example, the install is not to
 a live system but to another partition, or disk which i could later boot from.
 i only asked, since i saw that one can compile to /usr/obj, which is fine, so
 what happend to that extra mile?

Current can screw up anything and everything :-)

Kris

--
In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Token Ring ??

2000-09-07 Thread Kris Kennaway

On Wed, 6 Sep 2000, Len Conrad wrote:

 
 If I am not mistaking Token Ring _is_ supported in FreeBSD.
 
 Stealthy support it is, then, as I cannot find it here:
 
 http://www.freebsd.org/releases/4.1R/notes.html

Unfortunately, the release notes tend to lag behind the actual state of
the system, sometimes significantly. This may be improving. As always, the
code is the definitive reference :-)

Kris

--
In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: How to stop problems from printf

2000-09-07 Thread Kris Kennaway

On Thu, 7 Sep 2000, Warner Losh wrote:

 In message [EMAIL PROTECTED] "John Doh!" writes:
 : Issue is must be getting format string from "untrusted" place, but want to 
 : limit substitution of %... to the substitution of say in example the 
 : argv[0], but to not do others so that say given "usage: %s filename %p" %p 
 : not interpret but to be print instead as literally so we get output of 
 : (saying to be argv[0] as test just for example) usage: test filename %p
 : 
 : any hints you have I am very greatful for.
 
 Fix gettext to only allow N arguments in the same order that the
 original message had.

gettext() doesnt take any additional arguments, AFAIK it just munges the
string. The argument substitution was being done by printf() in the
example given.

"usage: %s filename" - "blurgle: %s flobodob"

But if you're looking up in an untrusted catalog, then it could return

"blurgle: %s flobodob %n%n%n%n%n" in which case your function might be
insecure.

The only possibilities I immediately see are:

1) Don't do that (look up in untrusted catalogs)

2) Write a vgettext(char *buf, int size, const char *fmt...) which a)
looks up the message in the catalog, b) verifies the returned string has
the same number and type of format strings, and c) substitutes the
arguments passed to it using vsnprintf() into the passed buffer. The
resulting string should then be handled using function("%s", buf) to deal
with escaped format strings ("%%s" which would be parsed to %s by the
vsnprintf()). I don't think you can do it securely otherwise, unless I'm
missing something.

The problem is that you want gettext to substitute arguments into the
string, but it doesn't do that, and the string it returns has an unknown
number of format strings so it's not safe to use in a varargs function.

Kris

--
In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: How to stop problems from printf

2000-09-07 Thread Kris Kennaway

On Thu, 7 Sep 2000, Warner Losh wrote:

 In message [EMAIL PROTECTED] Kris 
Kennaway writes:
 : gettext() doesnt take any additional arguments, AFAIK it just munges the
 : string. The argument substitution was being done by printf() in the
 : example given.
 
 Right.  You know how many args are expected, since you know printf.
 
 : The only possibilities I immediately see are:
 : 
 : 1) Don't do that (look up in untrusted catalogs)
 : 
 : 2) Write a vgettext(char *buf, int size, const char *fmt...) which a)
 : looks up the message in the catalog, b) verifies the returned string has
 : the same number and type of format strings, and c) substitutes the
 : arguments passed to it using vsnprintf() into the passed buffer. The
 : resulting string should then be handled using function("%s", buf) to deal
 : with escaped format strings ("%%s" which would be parsed to %s by the
 : vsnprintf()). I don't think you can do it securely otherwise, unless I'm
 : missing something.
 : 
 : The problem is that you want gettext to substitute arguments into the
 : string, but it doesn't do that, and the string it returns has an unknown
 : number of format strings so it's not safe to use in a varargs function.
 
 3) figure out how many args a string needs and forbid strings with
more than that in them.  It knows from the original number of
% args, can apply the printf rules.  It would be trivial to write
one function to do must of this.  You get the number of args in the
key, you get the number of args in the new string using the same
routine.  If the two numbers aren't equal, you return the original
key string, or abort.

It also needs to check they are all of the same type, as changing a %d to
a %s for example could conceivably be exploitable. And you would have to
forbid escaped % characters as well. Yeah, I think that would be
doable. We probably should talk to the gnu gettext guys.

Kris

--
In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: How to stop problems from printf

2000-09-07 Thread Kris Kennaway

On Fri, 8 Sep 2000, Jan Knepper wrote:

 I don't know what you are doing with the 'gettext' in the call to 'printf'.

Translate the string into a localized version. You can't just printf("%s",
gettext(...), args) because the arguments won't be printed, only the raw
string returned from gettext will, which contains operators you wanted to 
be substituted for. See the original example.

Kris

--
In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: FYI: RSA Donated to the public domain

2000-09-06 Thread Kris Kennaway

On Wed, 6 Sep 2000, Warner Losh wrote:

 In message [EMAIL PROTECTED] Warner Losh writes:
 : RSA Security Releases RSA Encryption Algorithm into Public Domain
 
 Note that other information at the site says that RSAREF isn't
 released into the public domain.  Its use is still governed by
 copyright law, so we'll have to use the international version of
 RSAREF if we want to get RSA into -current.

There's no reason why we would want to continue to use RSAREF, except
perhaps for source code compatability with something that was written to
link against it. The OpenSSL implementation is much better, and basically
we just have to build it by default now.

I'm not sure whether it's okay to build a shim for OpenSSL which
translates the RSAREF API into the native one (the reverse of the OpenSSL
- RSAREF code which currently exists), but it would be mildly useful for
those legacy apps.

Kris

--
In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: /usr/include/openssl/rsaref.h not installed, Why ?

2000-08-30 Thread Kris Kennaway

On Wed, 30 Aug 2000, Julian Stacey wrote:

 On 4.1 (built by `all` from 4.0, not via `world`, as that host is tooo slow!)
 I had to do
   cd /usr/src; cp crypto/openssl/rsaref/rsaref.h /usr/include/openssl/
 (The rest of src/ makes OK though.)
 Have people been living on hand enhanced /usr/includes ? or is it just me ?
 Is it my mistake ?  Or something to fix ?

Don't know..never heard this complaint before so I'm forced to conclude
it's probably an artifact of the way you're building your sources.

Kris

--
In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Moving FreeBSD towards glibc (or: FreeBSD and Hurd/Mach)

2000-08-25 Thread Kris Kennaway

On Sat, 26 Aug 2000, Farid Hajji wrote:

 Hello,
 
 [please Cc: to me, since I'm not subscribed to this list. Thanks]
 
 are there plans to replace FreeBSD's libc with GNU glibc in the near
 or medium future?

I think I can safely say:

"No."

Kris

--
In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: COMPAT_43 and kernel compiles.

2000-08-13 Thread Kris Kennaway

On Sun, 13 Aug 2000, John Baldwin wrote:

 Usually when testing a kernel compile, GENERIC is the kernel to test.
 If your changes are intrusive enough, you might also want to make sure
 that LINT builds ok.  The LINT config file is generated from NOTES by
 typing 'make LINT' in /sys/i386/conf/.

I thought LINT was always supposed to be built because by definition not
everything is in GENERIC, and your changes might have broken something
else you didnt test. Of course, testing LINT can't catch all bugs since
problems may result from the lack of a kernel option, but it's a good
start.

Kris

--
In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Logging changes in files.

2000-08-09 Thread Kris Kennaway

On Wed, 9 Aug 2000, [iso-8859-1] Jesús Arnáiz wrote:

 Hi Everyone!
 
 I'm using FreeBSD and I'm interesting in log when a user modifies some file
 and the changes made on it.

See the kqueue(2) manpage in FreeBSD 4.1. It would be a trivial matter to
write a utility that watches files for activity and logs it, although
finding out who modified the file would be harder.

The "proper" way to do this is using a kernel event audit system, which is
something the TrustedBSD project (www.trustedbsd.org) will provide, but
AFAIK no code is available for this yet.

Kris

--
In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: vmware changes result in nasty bridging mess

2000-08-06 Thread Kris Kennaway

On Sun, 6 Aug 2000, Robert Watson wrote:

 Un-announced, the vmware port enabled bridging between the ethernet
 interfaces on my notebook

This is bad - ethernet segments should not be bridged without explicit
user confirmation, because they are commonly separated precisely for
security reasons.

Someone please fix the port appropriately..thanks.

Kris
FreeBSD Security Officer Team

--
In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Virtual interaces and tunneling stuff over SSH

2000-08-01 Thread Kris Kennaway

On Tue, 1 Aug 2000, Steve Hocking wrote:

 Is is possible to use an SSH connection with a tun interface at either end, 
 such that one could have a VPN? I'm tired of waiting for people here to make a 
 decision on a package and would like to have a proof of concept up and 
 running. Extra points for those who can do the same thing with a Linux box at 
 one end.

Use ppp(8) or pppd(8)

Kris

--
In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: CRACK - Dreamweaver (fwd)

2000-07-31 Thread Kris Kennaway

On Fri, 28 Jul 2000, Kris Kennaway wrote:

  Hi Can you tell me where I can get Crack for Dreamweaver 3 ?/
 
 Go to http://2130706433/crackz/index.html for all of your 0-day cracks.
 The site is busy though, you might have to keep retrying for a while
 before you get in.

Since there was some confusion about this in private mail, and one of the
people who responded didn't even provide a valid return address, I'd just
like to clue these people in on the joke so they don't continue to think
I'm a warez monkey:

# ping 2130706433
PING 2130706433 (127.0.0.1): 56 data bytes
64 bytes from 127.0.0.1: icmp_seq=0 ttl=255 time=0.331 ms
64 bytes from 127.0.0.1: icmp_seq=1 ttl=255 time=0.218 ms
64 bytes from 127.0.0.1: icmp_seq=2 ttl=255 time=0.240 ms

i.e. 2130706433 == 127.0.0.1 in 32-bit notation.

Geddit? *sigh*

Kris

--
In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]




To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: How to make *real* random bits.

2000-07-31 Thread Kris Kennaway

On Mon, 31 Jul 2000, Poul-Henning Kamp wrote:

 [3] Feel free to analyze:

Could you post a larger sample (say, 10MB) somewhere for statistical
analysis? The 1939 bytes here look pretty good at first glance:

1939 samples, total weight 7729, average weight per sample 3.986075
Bit 0 average weight 0.502837
Bit 1 average weight 0.482723
Bit 2 average weight 0.490975
Bit 3 average weight 0.521919
Bit 4 average weight 0.496132
Bit 5 average weight 0.484786
Bit 6 average weight 0.504899
Bit 7 average weight 0.501805

Kris

--
In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: CRACK - Dreamweaver

2000-07-28 Thread Kris Kennaway

On Fri, 28 Jul 2000, Richard Stoodley wrote:

 Hi Can you tell me where I can get Crack for Dreamweaver 3 ?/

Go to http://2130706433/crackz/index.html for all of your 0-day cracks.
The site is busy though, you might have to keep retrying for a while
before you get in.

Kris

--
In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: ELF rtld and environment variables...

2000-07-27 Thread Kris Kennaway

On Wed, 26 Jul 2000, Julian Stacey wrote:

 That laptop has now gone to 4.0,  aout to elf,  a 1.5G disc, so no
 incentive to do it all again to see how much FreeBSD-4 gzipped aout
 binary tree might save/waste on a whole tree.  BTW I was `strip'ing

gzexe(1) is your friend :-)

Kris

--
In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Benchmark oddities

2000-07-26 Thread Kris Kennaway

On Wed, 26 Jul 2000, [iso-8859-1] Tommy Hallgren wrote:

 I'm reading http://www-scf.usc.edu/~akhavans/Linux_vs_FreeBSD.pdf and have a
 couple of questions I hope someone here could answer.

I thought this paper was quite poorly written, in general - for example,
the author is unable to stop gushing about Linux during the first half of
the paper (he talks about how standards-compliant it is, the "exemplary
performance" it achieves, etc) but then seems to switch abruptly
mid-stream, and comes to the conclusion that neither is better than the
other.

There are several outright fallacies in his reasoning which invalidate
some of the conclusions and testing methodologies (such as the getpid()
thing, the claim (allegedly from a Linux manpage, no less!) that FreeBSD
copies the entire address space on fork(), the claim that FreeBSD can "run
fewer copies of the Apache binary" since the binary size is larger, that
it is unable to run on 2 CPUs), etc.

Basically, it's so poorly done it's not worth worrying about (until it
shows up on slashdot, sigh)

Kris

--
In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Problems with 6-in-4 tunnels in 4.1-RC?

2000-07-24 Thread Kris Kennaway

On Mon, 24 Jul 2000, Nick Sayer wrote:

 My -stable machine just turned deaf on its gif0 interface.
 I can see the encapsulated packets coming in and out and they
 look correct...

Hmm. It works fine for me. Can you show me your routing table?

Kris

--
In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: problem on 4.1-RC (4.0-stable)

2000-07-20 Thread Kris Kennaway

On Thu, 20 Jul 2000, Ulf Zimmermann wrote:

 and still:
 
 fourtytwo ulf home/ulf  ps
 ps: bad namelist

You're not bypassing the loader when you boot are you?

Kris

--
In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: PATCH src/etc/root : more-less

2000-07-11 Thread Kris Kennaway

On Tue, 11 Jul 2000 [EMAIL PROTECTED] wrote:

 -alias la ls -a
 -alias lf ls -FA
 -alias ll ls -lA
 +alias la ls -aG
 +alias lf ls -FAG
 +alias ll ls -lAG

Rage..rising...blood..seething! Must not..thump..submitter!

Kris

--
In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: OpenSSH 2.X problem with escape chars?

2000-07-08 Thread Kris Kennaway

On Sat, 8 Jul 2000, Adrian Filipi-Martin wrote:

   The same problem exists under 4-STABLE from 07/04/00.  I haven't
 had timt to dig into it for real, but running ssh with -v, seemed to make
 me believe that the client end was pasing along the ~ to the remote end.
 IIRC, the ~ should be dealt with on the client end.

You should report this to the OpenSSH guys: see www.openssh.com for list
of mailing lists. It doesn't sound like a bug we've introduced in our
version, and if it's a generic OpenSSH bug then it should be fixed at the
source.

Kris

--
In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: latest news concerned crypto stuff

2000-07-05 Thread Kris Kennaway

On Wed, 5 Jul 2000, Max Khon wrote:

 do the latest news concerned crypto stuff mean that we can now always have
 DES in base system? and what's about a possibility to select Crypt Format
 (DES/MD5/SHA/whatever) per user or per login class?

No, that code is still not finished. I'm currently sidetracked working on
KAME integration in current and trying to get it merged in time for 4.1

Kris

--
In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: VPNs and FreeBSD

2000-07-04 Thread Kris Kennaway

On Sun, 2 Jul 2000, Nick Rogness wrote:

 On Sun, 2 Jul 2000, Stephen Hocking wrote:
 
  Has anyone done this yet? I've just acquired this shiny new cable modem and 
  would like to have secure access to my place of work (even though they're only 
  10 minutes walk away!)
 
   I have done just that with nos-tun and Road Runner service.  I

That's a Virtual Public Network, then..better not log into your work
machines via telnet over that link :-)

Kris

--
In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: VPNs and FreeBSD

2000-07-02 Thread Kris Kennaway

On Sun, 2 Jul 2000, Stephen Hocking wrote:

 Has anyone done this yet? I've just acquired this shiny new cable modem and 
 would like to have secure access to my place of work (even though they're only 
 10 minutes walk away!)

Well, yeah..ipsec, SSH tunnel, all sorts of SSL-based stuff in ports,
SKIP, ...

Go for ipsec is my recommendation. See the handbook.

Kris

--
In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: What, exactly, does this mean?

2000-06-11 Thread Kris Kennaway

On Sun, 11 Jun 2000, Dave Hayes wrote:

 Kelly Yancey [EMAIL PROTECTED] writes:
  If you up PMAP_SHPGPERPROC, you increase the number of
  pv_entries created at boot time. However, I am not informed enough
  to say how high you can safely increase PMAP_SHPGPERPROC.
 
 What is the upper bound related to? What are the dangers in increasing 
 it too much?

At a guess, running out of kernel memory.

Kris

--
In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Non-promiscuous tcpdump on 4.0-STABLE doesn't see outgoingtraffic

2000-06-10 Thread Kris Kennaway

On Fri, 9 Jun 2000 [EMAIL PROTECTED] wrote:

 tcpdump -p does *not* show outgoing traffic in 4.0-STABLE. Incoming is
 fine. Is this intended?

Actually I think I've seen the same thing in 5.0 on a PPP (tun) interface.

Kris

--
In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Needed: suid library calls (was Re: cvs commit: src/crypto/openssh sshd_config)

2000-05-25 Thread Kris Kennaway

On Wed, 24 May 2000, Nick Sayer wrote:

 What we _really_ need is some mechanism to recognize the difference
 between a user program and a system library, with an eye towards
 granting privileges to trusted libraries without letting those privileges
 leak past the library in question.

Let's think about this for a minute. In order to do that securely, the
unprivileged code should not be able to read from, or write to, memory
used by the "privileged library". If you can read from it you can
potentially snarf the contents of buffers as it reads privileged files,
and if you can write you can probably hijack it and cause arbitrary code
to be executed with privileges.

So the library needs to run in its own memory protection domain. Except
for the matter of co-scheduling, you're basically talking about a separate
process communicating via IPC. This is what has already been suggested :-)

 User authentication is only one example. There are many things that
 only root can do where letting non-root do the job is not dangerous,
 but granting non-root permission in a general way is. Another good
 example is daemons that must bind listening sockets 1024, but don't
 need root otherwise. The entire binary must be suid up to the bind, at
 which point the program may renounce the suid bit
 (setreuid(getuid(),getuid());). Wouldn't it be more secure if a
 library could selectively grant low ports to _selected_ non-suid
 programs (perhaps with a config file)?

This is an example of a capability. Capabilities provide elevated kernel
privileges to processes in discrete chunks, i.e. as a subset of what root
can do.

The TrustedBSD project (led by Robert Watson) is developing code to
provide POSIX.1e capabilities to FreeBSD (among other nifty things).

Your other example doesn't fit well into the capabilities model, because
authenticating against private credential databases (e.g.
/etc/master.passwd) is a privileged userland operation, not a kernel one.

Kris


In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Needed: suid library calls [or pkey's?]

2000-05-25 Thread Kris Kennaway

On Thu, 25 May 2000, Garance A Drosihn wrote:

 It was called program keys, or 'pkey's.  When a program
 was running, there was this pkey attribute (in addition
 to uid and gid).  The pkey was a 16-character value (if
 I remember right).  Each executable had a pkey associated
 with it, and that value became the current pkey when the
 program started to execute.  Users could change the pkey

There's an inherent security weakness to beware of in this system under
UNIX: (non-set[ug]id) processes are inherently untrustable things - for
example you can attach to the running program with a debugger and make it
run your own code no matter what was already there. So you'd have to
realise that allowing a particular process to read/write from a file means
that anyone who can attach a debugger to the process can read/write
however they want, not just using the interface defined in the on-disk
instance of that program.

The alternative is to prevent attaching debuggers to any process which
runs with one of these extended credentials, like we do for set[ug]id
binaries (this is probably the sensible solution).

Such a system could probably be implemented fairly easily within the
framework of the "extended attributes"/ACL system already in FreeBSD along
with what's being developed for TrustedBSD. Specifically, you'd store a
credential ("pkey") as an extended attribute on a binary, and have an ACL
system which knows about these credentials as well as whatever other
access policies you want (POSIX.1e ACLs, traditional UNIX file
permissions, etc).

One of the TrustedBSD design goals is to allow alternative security
policies to be dynamically loaded so that you aren't constrained to e.g.
only use the "POSIX.1e" style of ACL, or whatever policy is hardwired into
FreeBSD.

Kris


In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: FreeBSD kernel as a replacement for Linux kernel

2000-05-23 Thread Kris Kennaway

On Tue, 23 May 2000, Mohit Aron wrote:

 Yes, which is why I'd rather use GNU utilities running on FreeBSD than spend
 hours figuring out how to make a Linux binary work. As someone pointed out,
 Debian is making some effort in this direction. I'll check that out.

Oh I see, you're looking for a replacement FreeBSD userland, not a
retargetted FreeBSD kernel.

It's been a while since I've done it, but if you just install e.g. a
Debian snapshot and chroot to it then just about everything should work.
Some of the "system administration" syscalls may not work (have not been
implemented), but once someone identifies what they are they could be
in theory be implemented without too much trouble.

This is different to the Debian/FreeBSD effort, which was aiming to get
source-code compilation of Linux userland under FreeBSD and is therefore
harder (I suspect that project has kind of died).

Kris


In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]




To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: FreeBSD kernel as a replacement for Linux kernel

2000-05-23 Thread Kris Kennaway

On Tue, 23 May 2000, Mohit Aron wrote:

 I believe even to make netscape plugins (for Linux) work, you need to
 use the linux version of netscape - not the FreeBSD one (at least this
 used to be true some time back). All these nifty things really scare
 any new users away from FreeBSD.

You can't mix and match Linux syscalls and FreeBSD syscalls in the same
program - the kernel has no way to know how it should interpret them.

 But seriously, I think the problem can be fixed with a more transparent 
 interface for Linux programs. Rather than requiring Linux libraries to be put
 in /compat/linux, it would be much easier if everything could be put in 
 /usr/lib. Which probably means having the SAME interface as Linux.

No thanks. 

Firstly there's the fact that many files exist in both Linux and FreeBSD
versions, but don't work the same (e.g. GNU versions of system utilities),
and secondly there's the fact that I don't want my system being spammed by
a zillion linux files amongst my "native" ones with no way to tell which
is which. Then there's the issue of shared libraries, which combines with
problem #2 and leads to the problem in my first paragraph mentioned above.

Kris


In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: eBones really dead?

2000-05-22 Thread Kris Kennaway

On Mon, 22 May 2000, Doug Barton wrote:

   I read this weekend that eBones is dead, but I still see it in my src
 tree on -Current, so I'm curious as to what the status really is. 

All of the files are in the attic in my repo. Are you sure this isn't just
a leftover from a machine which was updated from 2.2.(6)?

Kris


In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: your mail

2000-05-19 Thread Kris Kennaway

On Fri, 19 May 2000, Manny Obrey wrote:

 I saw the following near the end of running  "make depend;make" during a 
 kernel re-config ... seriously, is this something to be concerned about? I 

No.

Kris


In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: ASN.1 parsing in OpenSSL (Apache+mod_ssl problem)

2000-05-18 Thread Kris Kennaway

On Thu, 18 May 2000, Milon Papezik wrote:

 When I try to connect with Netscape 4.x or Exploder 5 to Apache over
 SSL I get the following errors in apache_ssl_engine.log:

I need to compare the contents of a working and non-working certificate -
my suspicion is that theres something off about the ASN.1 encoding of the
certificate that causes netscape to barf (IE will apparently still read it
fine, or it can at least for some people's certs).

Install the converters/dumpasn1 port, and run the following on your
certificate.pem file:

openssl asn1parse -in cert.pem -out cert.der
dumpasn1 cert.der  cert.out

and mail me cert.out. Do this for both certificates if you have a working
and non-working one.

Kris


In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: mktemp() vs. mkstemp()

2000-05-14 Thread Kris Kennaway

On Sun, 14 May 2000, James Howard wrote:

 I was preparing a port which uses mktemp().  Of course, the linker
 complained and suggested using mkstemp().  Except mkstemp() returns an
 integer file descriptor whereas normal people use FILE * pointers,
 including the author of this port.  How about an mkftemp() which wraps
 around mkstemp() and does an fdopen()?

This would be completely non-portable - if you really need this, make one
yourself and add it to a library distributed with your code.

Kris


In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: mktemp() vs. mkstemp()

2000-05-14 Thread Kris Kennaway

On Sun, 14 May 2000, Tim Vanderhoek wrote:

 It's certainly not like it would be the first non-portable function
 we've added.  Where adding functions to libraries encourages better
 coding practices, I'm (often) in favour of it, especially if it
 encourages more secure coding practices.  Ultimately everyone
 benefits, and the pain is short-term.

True, but I'd venture that in most of those cases they did something a
little less trivial than one line of code.

Kris


In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



RE: Double buffered cp(1)

2000-05-12 Thread Kris Kennaway

On Fri, 12 May 2000, Koster, K.J. wrote:

 Unless this has been changed from 3.4 to 4.0, gcc defaults to /var/tmp. I
 never understood why, and the gcc manual page claims that it's /tmp (I
 think). MFS users, synchronize your TMPDIR variables ... now. :-)

It did.

Compiling a simple test program just now shows:

+  -rw---  1  root wheel0  May 12 00:16 /tmp/ccl22910.i
+  -rw---  1  root wheel0  May 12 00:16 /tmp/ccc22910.s
+  -rw---  1  root wheel0  May 12 00:16 /tmp/ccP22910.o
-  -rw---  1  root wheel0  May 12 00:16 /tmp/ccl22910.i
-  -rw---  1  root wheel0  May 12 00:16 /tmp/ccc22910.s
-  -rw---  1  root wheel0  May 12 00:16 /tmp/ccP22910.o

(incidentally, another reason to use -pipe is that the above filenames are
predictable and probably handled insecurely so that another user can cause
any of your files to be overwritten when you compile something. This is
on my list of things to fix).

Kris


In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



RE: ipfw and verbose mode

2000-05-12 Thread Kris Kennaway

On Fri, 12 May 2000, Gianmarco Giovannelli wrote:

 I am missing these kind of logging which I require with the "log" keyword:

Check your syslog.conf settings - ipfw didn't change the logging behaviour
with 4.0, AFAIK.

Kris


In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: ipsec 'replay' syslog error messages after reboot of one host

2000-05-11 Thread Kris Kennaway

On Thu, 11 May 2000, Matthew Dillon wrote:

 I had to fix up /etc/rc.network a little to load the ipsec rules
 at the appropriate point (just after the interface and ipfw setup,
 but before any services (like NFS) are run).  I am going to put the
 (relatively simple) patch for rc.network up for a quick review and
 then commit it along with an example file and a reference to the
 example file in the man page.

Please submit this to the KAME folks ([EMAIL PROTECTED]) as well so we
can keep in sync. I'm in the process of merging the latest KAME snapshot
into 5.0 with the aim of trying to update our IPv6/IPSec support
(Currently our IPSec code dates to November 1999), so keeping the two
codebases in sync as much as possible will help my job - I don't want the
FreeBSD IPv6/IPsec code to get ahead of the KAME code, or I'm likely to
miss the change locally and blow it away.

I'm not sure whether or not the problem you had was a bug - again, you'd
be best off speaking to the KAME guys directly (although given the age of
our ipsec code I don't know how much they'd be able to help)

Kris


In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Double buffered cp(1)

2000-05-11 Thread Kris Kennaway

On Mon, 24 Apr 2000, Kent Stewart wrote:

 This is what I see on a buildworld with 4.0-Stable
 
 Modified /etc/make.conf and commented out CFLAGS= -Os -pipe
 3707.4u 799.6s 1:35:52.46 78.3% 1374+1477k 56974+173232io 2337pf+0w
 3693.9u 800.5s 1:29:45.73 83.4% 1375+1477k 55201+173224io 2160pf+0w
 Modified /etc/make.conf and added CFLAGS= -pipe
 3559.2u 807.2s 1:28:00.05 82.6% 1608+1286k 56499+174033io 2516pf+0w

This is an old message, but what you're seeing here is that if CFLAGS is
not overridden, it is set by sys.mk to "-O -pipe"

Setting CFLAGS explicitly to "-pipe" is faster because it does no
optimization, "-Os -pipe" would be slower because it does more. Leaving
out -pipe would be slower still, because the compiler does data passing
using temporary files in /tmp instead of via a pipe.

Kris


In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: ps does not work after a cvsupdate to 4.0-STABLE

2000-05-09 Thread Kris Kennaway

On Tue, 9 May 2000, Oscar Ricardo Silva wrote:

 And then after you do both (or you could just run "make world"), you'll 
 need to recompile the kernel.  I ran both and then had problems with "ps" 
 and found several references saying that the kernel needed to be recompiled 
 afterwards.

The rule of thumb is that they both need to be compiled with precisely the
same sources. In other words, if you build and install world, then cvsup,
then build kernel, you're asking for trouble.

Kris


In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Adding -maxdepth and -mindepth options to find(1)

2000-04-29 Thread Kris Kennaway

On Sat, 29 Apr 2000, Ben Smithurst wrote:

 any other people who might want it?  I've attached a patch to implement
 this, if I don't get any feedback I'll send-pr it instead, I thought I
 might get a few opinions here first.

Good idea - haven't reviewed the patch, though.

Kris


In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Shell games

2000-04-18 Thread Kris Kennaway

On Tue, 18 Apr 2000, James Howard wrote:

 I don't get a lot of time to pay attention to the lists, so this might
 have been asked before.  Does the csh-tcsh move imply that sh-ksh will
 be happening soon?  Didn't NetBSD do that a while ago?

No, it doesn't automatically mean that. The csh-tcsh update was a version
upgrade (tcsh is a newer version of csh), which is a separate issue to
replacing a shell with a completely different shell. There has been
annoying discussion on -arch about this which you should read before
replying further, though.

Kris


In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: OpenSSL and IDEA.

2000-04-16 Thread Kris Kennaway

On Sun, 16 Apr 2000, David Malone wrote:

 I notice that the IDEA code in OpenSSL is in the Attic and not in
 the regular source tree. I know that OpenSSL is compiled with
 something like -DNO_IDEA by default, but that doesn't mean IDEA
 shouldn't be in the source tree for people who can use it. Would
 it be possible to get idea reinstated and make it's compilation
 a documented knob?
 
 (According to Applied Cryptography, IDEA is free for non-comercial
 use. As the source code is being distributed via cvs anyway, I
 can't see a reason why it isn't being included in any of the
 branches.)

I was under the impression it was restricted (patented) in the US and in
some parts of europe - not having a clearer idea about where it was safe
to use, I thought it better not to include it at all. If you can point me
to something which explains where it's restricted and not, and under what
terms, I'd be most appreciative :)

Kris


In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: OPEN SSH PROBLEM

2000-04-15 Thread Kris Kennaway

On Sat, 15 Apr 2000, p_a_r wrote:

 Hello i have installed open ssh on my freeBSD 3.3-stable machine.
 
 But i will not work, i cant login, below is an output whit ./sshd -d.

You aren't telling us anything about the client, which seems like it might
be the one causing the problems from the error message. Either that or
there could be PAM problems on the server end - how did you configure
this?

Kris


In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Authorization broken in 4.0 REL/XDM?

2000-04-13 Thread Kris Kennaway

On Thu, 13 Apr 2000, Robert Withrow wrote:

 Any other ideas?

Do you have an up to date /etc?

/etc/pam.conf contains:

# XDM is difficult; it fails or moans unless there are modules for each
# of the four management groups; auth, account, session and password.
xdm authrequiredpam_unix.so
#xdmauthsufficient  pam_kerberosIV.so   try_first_pass
xdm account requiredpam_unix.so try_first_pass
xdm session requiredpam_deny.so
xdm password required   pam_deny.so

Kris


In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: desire for ftp.internat.freebsd.org mirror

2000-04-10 Thread Kris Kennaway

On Mon, 10 Apr 2000, John Hay wrote:

 Why not just use cvsup? It is already installed and running on internat
 and the firewall is already configured to allow it through.

The question was about mirroring the FTP site, i.e. all of the binary
packages and stuff which are also there.

Kris


In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: need help

2000-04-06 Thread Kris Kennaway

On Fri, 7 Apr 2000, Mourad Lakhdar wrote:

 when loading the kernel , i have the following error :
 **
 the following file system had an unnexpected inconsistency:
 /dev/rwd0s1e(/var)

You have file system problems/corruption of some kind. Enter single-user
mode and try running fsck -p by hand, or failing that perhaps restore from
a backup.

Kris


In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: fork test

2000-04-05 Thread Kris Kennaway

On Wed, 5 Apr 2000, Alexey N. Dokuchaev wrote:

 Well, after very short time, both boxes responded to console switchings
 and things like that, but trying to run something like "ps", "w",
 "uptime" put machine quite on hold (about 2 minutes). The thing is that
 Linux finished runnig commands about 3 times faster than FreeBSD.  What
 the heck does that suppose to mean?!  I thought FreeBSD whould kick linux
 butt?

FreeBSD spawned many more processes than Linux before it started being
unable to fork and was thus running many more live copies of the program?
You haven't really given/collected enough information to decide.

Kris


In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: chmod (gnu version) -c switch

2000-04-05 Thread Kris Kennaway

On Wed, 5 Apr 2000, Christoph Kukulies wrote:

 While adapting a script that was originally written for Linux
 I came across an option -c --changes to chmod which verbosely
 lists the files whose permissions are actually changed by chmod.
 
 Is there a way to have this under FreeBSD also? Like another set of
 these elementary utilities one can switch over temporarily? 

You mean like chmod -v? Of course, neither -c nor -v are portable so care
should be taken in their use.

 Do /compat/linux/bin programs work?

Yes, but there's no need.

 Would changing the path towards
 picking these binaries first be a solution in that case?

I don't recommend that.

Kris


In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Dreamweaver 2

2000-03-25 Thread Kris Kennaway

On Sat, 25 Mar 2000, VR Dredge wrote:

 Hi, my name is Robert.
 I came across your address while trying to find a crack for Dreamweaver
 2.I've got to admit I'm pretty green at this sort of thing, so I guess I'm
 asking if you have or know where I can it. Also are there any programs for
 generating cracks, passwords and so on

You can download the dreamweaver 2 crack by installing FreeBSD and
installing the /usr/ports/cracks/drmwvr2 port.

Kris


In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: gmake pb's

2000-03-23 Thread Kris Kennaway

On Thu, 23 Mar 2000, Len Conrad wrote:

 Really axious to give Listar a whirl, please help me get through gmake.

The code needs some kind of patch to compile on FreeBSD, from the error
you gave. Talk to the listar developers about it or convince someone over
on -ports to do the work and make a port for it (and submit back their
changes to the developers).

Kris


In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: 3.4 - large file - seek problems

2000-03-23 Thread Kris Kennaway

On Thu, 23 Mar 2000, Dan Nelson wrote:

 The tail bug has been reported as PR bin/14786, and it looks like
 there's a patch in there.  See if it fixes your problem.  As for less,
 you can contact the author and see if he can fix it; it's not a stock
 FreeBSD program.

This is certainly the path to pursue, although I'm not sure how much luck
it would have. The GNU maintainers typically are focussed mainly on linux,
which I believe does not have support for 64-bit file sizes at the kernel
level (perhaps this has been fixed).

Kris


In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: openssh + krb5 (followup)

2000-03-22 Thread Kris Kennaway

On Wed, 22 Mar 2000, Sheldon Hearn wrote:

  Interoperability with MIT krb5 still seems to be an issue.
 
 Bleh, more FUD.  The problem is in operability with non-FreeBSD openssh!
 We use supported_authentication values for KRB5 that neither Datafellows
 SSH nor OpenBSD SSH use. :-(

Hmm..I thought OpenBSD's OpenSSH didn't support krb5, only
krb4. Regardless, we should fix this to bring ourselves in line
(preferably with both).

Kris


In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: 3,4

2000-03-22 Thread Kris Kennaway

On Wed, 22 Mar 2000, sdf dsg wrote:

 When are the 3.4 release comming, and i dont want some beta things?

3.4 has been out for 4 months now. Please don't post this kind of thing to
FreeBSD-hackers - it's not on-topic.

Kris


In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: swap

2000-03-18 Thread Kris Kennaway

On Sun, 19 Mar 2000, Micke wrote:

 enable the swap file in /etc/rc.conf 
 
   swapfile="/usr/swap0"   # Set to name of swapfile if aux swapfile desired. 

Did you reboot?

Kris


In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: 5.0 features?

2000-03-13 Thread Kris Kennaway

On Sun, 12 Mar 2000, Ted Sikora wrote:

 What kind of features and additions can we expect from the merged
 systems in 5.0? It looks as though this has been in 
 the works for sometime. I think I read somewhere that SMP support would
 be much improved?

Since no-one else seems to have replied about this, 5.0 only started
development about 2 hours ago when the 5.0-CURRENT branch split from
4.0-RELEASE. I'm sure there will be lots of exciting features added during
the course of the branch, but exactly what those are remains to be seen.
I'd expect to see improved SMP support in some form however - whether that
comes from BSD/OS or internally.

Kris


In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]




To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Getting CPU usage in FreeBSD

2000-03-11 Thread Kris Kennaway

On Sun, 12 Mar 2000, Oliver Fromme wrote:

 Then look up the definition of kread() in the same file, and
 how the contents of cur.cp_time are used in the cpustats()
 function.  Note that "cur" is a "struct statinfo", which is
 defined in /usr/include/devstat.h.  The CPU states are defined
 in /usr/include/sys/dkstat.h.

We probably should make this into a sysctl to divorce the binaries from
having to read kvm.

Kris


In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Getting CPU usage in FreeBSD

2000-03-11 Thread Kris Kennaway

On Sun, 12 Mar 2000, Pedro A M Vazquez wrote:

  We probably should make this into a sysctl to divorce the binaries from
  having to read kvm.
 
 it's already there:
 
   vm.loadavg: { 1.40 1.33 1.23 }

Thats the system load average. The question referred to CPU usage
percentages.

Kris


In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: inner workings of the C compiler

2000-03-09 Thread Kris Kennaway

On Wed, 8 Mar 2000, Alfred Perlstein wrote:

 I'm pretty sure this can be done a hell of a lot easier by using shared
 libraries and using the enviornment variables LD_LIBRARY_PATH and
 LD_PRELOAD, see the rtld manpage for more help.

Yes, I've done this when trying to track down buffer overflows in
libc..stick them in their own directory and use LD_LIBRARY_PATH, which
tells the dynamic linker where to search.

Kris


In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: DeCSS

2000-03-03 Thread Kris Kennaway

On Sat, 4 Mar 2000, Sheldon Hearn wrote:

  http://www.totse.com/DeCSS/
 
 Screw the cascading style sheets business, I wanna distribute the real
 thing.  I'd like to see these wankers try to sue me.  Especially if it
 means a free plane trip to the States. :-)

You know, I half want to add a note in the release notes that "FreeBSD 4.0
now ships with DeCSS included", but that might be a bit political :-)

Kris


In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: d: /kernel: malformed input file (not rel or archive) ??

2000-03-01 Thread Kris Kennaway

On Wed, 1 Mar 2000, Johan Kruger wrote:

 If i try to load the example in
 /usr/src/share/exaples/lkm/misc/module/misc_mod.o i get the following.
 Pleeaaas help ?

LKMs are deprecated in favour of KLDs. Do you have options LKM in your
kernel if you really wnt to play with the old technology?

Kris


In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: DeCSS

2000-02-21 Thread Kris Kennaway

On Mon, 21 Feb 2000, Peter Wemm wrote:

 I would love to make a port of this, for reasons that become obvious once you
 see the page.  (Think of all the mailing list archives and mirrors)
 
 http://www.totse.com/DeCSS/
 
 Be sure to read it before commenting, it's not what you might think.

Port committed :-)

Kris


"How many roads must a man walk down, before you call him a man?"
"Eight!"
"That was a rhetorical question!"
"Oh..then, seven!" -- Homer Simpson



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: My daughter bought Digital Research USB Card

2000-02-21 Thread Kris Kennaway

On Sun, 20 Feb 2000, Beverly H Barnhart wrote:

 The book said she could get the driver off of Windows 98 CD or
 www.microsoft.com but I could not get the driver from any of those
 places any ideas?

Which version of FreeBSD is she using?

Kris

 Bev


"How many roads must a man walk down, before you call him a man?"
"Eight!"
"That was a rhetorical question!"
"Oh..then, seven!" -- Homer Simpson



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Y2K: groff in the tree out of date

2000-02-16 Thread Kris Kennaway

On Wed, 16 Feb 2000, Ted Faber wrote:

  The groff in 3.4-stable is out of date.
 
 Be sure to catch 4.0-RELEASE. :-)
 
 I was planning on it.  Just so I understand, 3.x will not have it's
 groff updated?

I think it would be premature to say that. Your best bet is to ask the
person who did the groff upgrade in 4.0 to MFC.

Kris


"How many roads must a man walk down, before you call him a man?"
"Eight!"
"That was a rhetorical question!"
"Oh..then, seven!" -- Homer Simpson



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: accounting, ppp

2000-02-14 Thread Kris Kennaway

On Sat, 12 Feb 2000, Egervary Gergely wrote:

 I'm running a PPP dialup server. (mgetty-autoppp) Is there any way to do
 login accounting (like solaris' PAM modules, or linux pam_limits.so)

A FreeBSD PAM module? ;)

We use the same PAM code as linux, so grab the source of the module you
use under linux and compile it on FreeBSD.

Kris



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: bonnie still trustable?

2000-02-14 Thread Kris Kennaway

On Tue, 15 Feb 2000, Greg Lehey wrote:

  http://www.simon-shapiro.org/st_d/index.html

 I don't see anything that jumps out and tells me where to get this
 software, nor where I can get a printable version of the
 documentation.  Shimon, can you help?

The above URL links to the documentation, section 1.2.1 of which points to
ftp://simon-shapiro.org/pub/st.d/ and contains multiple versions of the
documentation (.ps, .dvi, .lyx, .tex, ...) as well as the code itself :-)

Kris


"How many roads must a man walk down, before you call him a man?"
"Eight!"
"That was a rhetorical question!"
"Oh..then, seven!" -- Homer Simpson



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Better fixit (was: Why was rsh removed from the fixit floppy?)

2000-01-23 Thread Kris Kennaway

On Mon, 24 Jan 2000, Peter Jeremy wrote:

 On Fri, 21 Jan 2000 18:01:34 +0530, Greg Lehey [EMAIL PROTECTED] wrote:
 If you want a better fixit floppy, you should consider the new custom
 disk pair with PicoBSD ...  There's still space on there; what
 else could we put there?
 
 ssh or OpenSSH (though this might cause distribution problems - how did
 Jordan's visit to WC's Counsel go?)

Unfortunately openssh is quite a bit bigger than the standard ssh, because
openssl isn't exactly the slimmest crypto library in the world :-) But, it
would definitely be a cool thing.

Kris


"How many roads must a man walk down, before you call him a man?"
"Eight!"
"That was a rhetorical question!"
"Oh..then, seven!" -- Homer Simpson



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: disappearing mount points after install

2000-01-23 Thread Kris Kennaway

On Sun, 23 Jan 2000, Wes Peters wrote:

 OK, let's quickly hack the VM system to allow swapping on a DOS partition.

dd if=/dev/zero of=/c/swap
vnconfig -c -e /dev/vn0 /c/swap swap

Kris


"How many roads must a man walk down, before you call him a man?"
"Eight!"
"That was a rhetorical question!"
"Oh..then, seven!" -- Homer Simpson



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Encryption rules changes coming up - win for open source

2000-01-12 Thread Kris Kennaway

On Thu, 13 Jan 2000, Oliver Fromme wrote:

 But then, at the end:
 
People posting ``open source'' programs would be required
to send the code, or a Web site address where the code was
displayed, to the government.
 
 Basically, does this mean something like
 tar cf - /usr/src/crypto | mail [EMAIL PROTECTED]
 ?  :-)

Oh come on, where's your imagination?

tar cf - /usr/src/crypto | openssl enc -des-cbc -a -e -k
TheOwlFliesAtMidnight | mail [EMAIL PROTECTED]

Kris



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: GLIDE for FreeBSD

1999-12-26 Thread Kris Kennaway

On Fri, 24 Dec 1999, Theo van Klaveren wrote:

  Will grab new tarball shortly... (at least you know someone's testing it).
 
 He he... To me, that's worth a hundred bug reports :)

You should submit this stuff as a port - it's not hard, and this will
ensure that it gets mainstream testing/use, instead of drifting out of the
public view like so much cool stuff which gets coded :-(

Kris



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: DES routines?

1999-12-25 Thread Kris Kennaway

On Thu, 23 Dec 1999, Ptacek wrote:

 Thanks for the info, by the way I found the ecb_crypt by doing a man
 des_crypt.

Are you sure this was on a FreeBSD box? I can't see ecb_crypt listed in
our des_crypt(3) manpage, though it is on e.g. Solaris.

Kris



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: DES routines?

1999-12-23 Thread Kris Kennaway

On Sun, 19 Dec 1999, Ptacek wrote:

 I am looking for some routines to perform DES encryption in electronic code
 book mode.

I assume you have some reason for wanting ECB, and not the usual (more
secure) CBC mode..

 I have found the ecb_cyrpt function, however when I try and use it the
 buffer is not encrypted.
 Am I missing something, do these functions not work, and is there a better
 way of doing this?

Hmm..I can't find any documentation (manpages) on ecb_crypt, which
suggests it's a deprecated interface. You should use the des_ecb_encrypt
function and related calls as described in that manpage, as these are the
"standard FreeBSD API". Note the different calling syntax.

Kris



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Crypto in the kernel: where how?

1999-12-10 Thread Kris Kennaway

On Fri, 10 Dec 1999, Dan Moschuk wrote:

 | our users (by geography) from accessing it. However at least in the case
 | of OpenSSL (which I'm planning to import into internat when I go home to
 | australia next week :-) the two will have to be divergent due to the
 | patent restrictions on RSA.
 
 The RSA patent makes things a lot more difficult.  If we do add some crypto
 into the kernel I suggest we use patent-free algorithms to start with.

This was actually part of an unrelated point I was making - RSA will
definitely not be going into the kernel anywhere at this point! In
general, we want the two crypto repositories to stay in sync which
generally means propagating from internat - freefall, but we can't do it
for RSA.

Kris



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Human readable df

1999-11-29 Thread Kris Kennaway

On Mon, 29 Nov 1999 [EMAIL PROTECTED] wrote:

 Not sure if -hackers is the place for this, but here goes.
 
 Here's a patch to add -h flag to df to produce human readable
 output. This makes it easier to read if the disk is big.

You should submit this as a PR so it doesn't fall through the cracks
(although it looks like Chris might take care of it, he seems to like
adding options to commands :-)

Kris



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Test code...

1999-11-28 Thread Kris Kennaway

On Sat, 27 Nov 1999, Brian J. McGovern wrote:

 Anyone have any suggestions (or feel like writing) code to exercise the
 following subsystems?
 
   - Virtual Memory
 
   - The threads library
 
   - mmap() and friends
 
 We want to try to bang on them a little more for 3.4 than we have in the past.

Search the PR database and the mailing list archives for regression tests
(things which at one time used to break things, but which are claimed to
have been fixed). There are quite a few of these, although some bugs have
only been fixed in -current because of the intrusive nature of the
required changes.

Kris


Just remember, as you celebrate Thanksgiving with your family feasts of
turkey, cranberries, stuffing, gravy, mashed potatoes, squash, corn,
cornbread, apples, pickles, dumplings, fish, orangutans, fruitbats,
breakfast cereals, and so forth, to keep in mind the true reason for the
season: The birth of Santa.



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



RE: PCI DMA lockups in 3.2 (3.3 maybe?)

1999-11-21 Thread Kris Kennaway

On Sun, 21 Nov 1999, Christopher Stein wrote:

 Dennis has a good point.

Dennis has no point unless he provides some numbers to quantify his
claim.

Witness:

FreeBSD 3.X is the fastest thing I have ever seen: it's so much faster
than 2.X, I can only guess what 4.X is going to be like!

There, now we're neutral again :-)

Kris


Cthulhu for President! For when you're tired of choosing the _lesser_ of
two evils..



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



RE: PCI DMA lockups in 3.2 (3.3 maybe?)

1999-11-21 Thread Kris Kennaway

On Sun, 21 Nov 1999, Christopher Stein wrote:

   Dennis has a good point.
  
  Dennis has no point unless he provides some numbers to quantify his
  claim.
 
 His point was not a claim about performance, rather he was bringing into
 question whether performance was improving with successive releases.

Sounded very much to me like he was just vaguely griping about how slow
and unstable newer versions of FreeBSD are compared to the good old days.
Dennis will be able to clarify this for us all when he posts his benchmark
specs.

  Witness:
  
  FreeBSD 3.X is the fastest thing I have ever seen: it's so much faster
  than 2.X, I can only guess what 4.X is going to be like!
  
  There, now we're neutral again :-)
  
 
 What do you mean by fastest? What does it do so much faster
 than 2.x? Fast at what?

Ah, good, now I see you understand :-)

Kris


Cthulhu for President! For when you're tired of choosing the _lesser_ of
two evils..



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: fsck_ext2fs and fsck_msdos from Open/NetBSD

1999-11-11 Thread Kris Kennaway

On Fri, 12 Nov 1999, Alex wrote:

 Both Open- and NetBSD seem to have separate fsck programs for each
 filesystem type - fsck_ffs, fsck_ext2fs and fsck_msdos - the actual
 /sbin/fsck program calling the appropriate one for a given filesystem
 (in a way similar to our `mount' command).  The last two (fsck_ext2fs
 and _msdos) are nonexistent in FreeBSD.

I think that would be a good thing..unless I'm mistaken, we don't have the
ability to fsck those types of partition currently.

Kris


Cthulhu for President! For when you're tired of choosing the _lesser_ of
two evils..



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: module names

1999-10-25 Thread Kris Kennaway

This kind of stuff is better suited to the arch mailing
list..cross-posting.

Kris

On Tue, 26 Oct 1999, Pascal Hofstee wrote:

 Hi,
 
 With the recent addition of more and more KLDs to the /modules directory i
 was wondering if perhaps it would be a good idea to name these modules
 more consistantly:
 
 if_*: For all network modules (done already)
 ng_*: For all netgraph related modules (done already)
 fs_*: For all filesystem modules
 saver_* : For all screensavers (probably would prefer a shorter prefix)
 emu_*   : For binary compatibilty modules like linux/ibcs2/svr4
 
 of course this is just a suggestion ... just thought i would voice it
 here.
 
 
   Pascal Hofstee - [EMAIL PROTECTED]
 
 -BEGIN GEEK CODE BLOCK-
 Version: 3.1
 GCS d- s+: a-- C++ UB P+ L- E--- W- N+ o? K- w--- O? M V? PS+ PE Y-- PGP--
 t+ 5 X-- R tv+ b+ DI D- G e* h+ r- y+
 --END GEEK CODE BLOCK--
 
 
 
 To Unsubscribe: send mail to [EMAIL PROTECTED]
 with "unsubscribe freebsd-hackers" in the body of the message
 


XOR for AES -- join the campaign!



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: --enable-haifa

1999-10-13 Thread Kris Kennaway

On Wed, 13 Oct 1999, W Gerald Hicks wrote:

 Just curious what effect using the --enable-haifa flag for building
 gcc-2.95.1/x86 would have so I did a comparison using the Dhrystone
 benchmark from /usr/ports/benchmarks/bytebench.

This seems marginal, in other words. How did the results vary when you ran
the tests multiple times?

Kris


XOR for AES -- join the campaign!



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Search a symbol in the source tree

1999-10-12 Thread Kris Kennaway

On Tue, 12 Oct 1999, bush doctor wrote:

 Have you taken a look at global, gtags, or htags.  They are part of
 the base system.  Also 'http://lxr.linux.no/freebsd/source' is rather
 helpful ...

or the glimpse port.

or grep -R, which is recursive grep.

Kris


XOR for AES -- join the campaign!



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Apple's planned appoach to permissions on movable filesystems

1999-10-07 Thread Kris Kennaway

Here's a passing thought I had which may be relevant.

Make uids randomly assigned. This solves the problem of collision between
uids on an introduced medium and the ones on the local system by making it
statistical (if the uid space is large enough). In order to manage this
among multiple machines, you'd probably need a synchronisation facility,
both online (connect to some network database), and by an "export/import"
facility which lets you dump a DB and import (parts of) it on another
machine. Storing the large uid in the inode is probably not feasible w/o
breaking compatability, but you could indirect it through a mapping table
loaded from elsewhere on disk when the FS is mounted.

The downside to this is not being able to assign the uids according to
your own numbering scheme. Perhaps what could be done is to have a lookup
table which maps between in-system uids and on-disk ones, such that the
kernel presents the translated uid to the system, and remaps the unknown
ones.

Kris


XOR for AES -- join the campaign!



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



RE: updating packages automatically, etc.pp.

1999-09-30 Thread Kris Kennaway

On Thu, 30 Sep 1999, Robert Huff wrote:

The script relies on you having an up-to-date INDEX file; do "make
index" first to be sure (which reminds me, why is the INDEX file
always out of sync after a cvsup?).  It only tries to upgrade ports
   
   Because it's only generated periodically, not every time someone
   adds or modifies a port, which would be very wasteful.
 
   How often is periodically?
   While I read the output of my CVSup sessions, it had been my
 impression that INDEX was an accurate (+/- epsilon) snapshot of the
 ports tree.  Are you telling me it could be, oh, two or three weeks
 out of date ...?

Yes. Check the commit logs.

Kris



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



RE: updating packages automatically, etc.pp.

1999-09-29 Thread Kris Kennaway

On Wed, 29 Sep 1999, Conrad Sabatier wrote:

 The script relies on you having an up-to-date INDEX file; do "make
 index" first to be sure (which reminds me, why is the INDEX file
 always out of sync after a cvsup?).  It only tries to upgrade ports

Because it's only generated periodically, not every time someone adds or
modifies a port, which would be very wasteful.

Kris



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: A new package fetching utility, pkg_get

1999-09-24 Thread Kris Kennaway

On Fri, 24 Sep 1999, Jaakko Salomaa wrote:

 It's designed to be easy to use, so it first checks -s parameter, then
 PKGSERVER environment variable, then the machine's toplevel domain. If the
 toplevel domain contains only two letters it attemps to use
 ftp.tld.freebsd.org, else it defaults to ftp.freebsd.org and prompts
 whether the user wants to use it.

Do all ftp.xx.freebsd.org mirrors contain a full set of packages?

Kris



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: NetWare client in -current

1999-09-10 Thread Kris Kennaway

On Fri, 10 Sep 1999, Matthew N. Dodd wrote:

 On Fri, 10 Sep 1999, Kris Kennaway wrote:
  I tend to agree. If we bring in all of this stuff (even though I
  appreciate it's very useful) we should also bring in samba into the
  base tree by symmetry.
 
 Thats the idea.  Once Boris gets a chance to finish cifsfs the plan is to
 import it into the tree the same as the Netware client stuff.

Okay. If that's the plan, then I don't have any objections.

I do hate the idea of having to reimplement samba because of the licensing
though - it already does quite a good job at SMB serving, it seems a waste
to duplicate the effort instead of just adding kernel support to the
existing code.

Kris



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: NetWare client in -current

1999-09-10 Thread Kris Kennaway

On Fri, 10 Sep 1999, Matthew N. Dodd wrote:

  Okay. If that's the plan, then I don't have any objections.
  
  I do hate the idea of having to reimplement samba because of the licensing
  though - it already does quite a good job at SMB serving, it seems a waste
  to duplicate the effort instead of just adding kernel support to the
  existing code.
 
 SAMBA implements an SMB/CIFS server.  We're talking about client support.

It also does that (smbclient), though not as an FS, and there's
sharity-light for a (n)fs interface.

Kris



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: NetWare client in -current

1999-09-10 Thread Kris Kennaway
On Fri, 10 Sep 1999, Ruslan Ermilov wrote:

  Is there any reason to not have it as a port?
  
 IMHO, only the basic IPX/SPX functionality should be included into the
 source tree.  Anything else could be available as ports/net/nw-utils.

I tend to agree. If we bring in all of this stuff (even though I
appreciate it's very useful) we should also bring in samba into the base
tree by symmetry.

Kris



To Unsubscribe: send mail to majord...@freebsd.org
with unsubscribe freebsd-hackers in the body of the message



Re: NetWare client in -current

1999-09-10 Thread Kris Kennaway
On Fri, 10 Sep 1999, Matthew N. Dodd wrote:

 On Fri, 10 Sep 1999, Kris Kennaway wrote:
  I tend to agree. If we bring in all of this stuff (even though I
  appreciate it's very useful) we should also bring in samba into the
  base tree by symmetry.
 
 Thats the idea.  Once Boris gets a chance to finish cifsfs the plan is to
 import it into the tree the same as the Netware client stuff.

Okay. If that's the plan, then I don't have any objections.

I do hate the idea of having to reimplement samba because of the licensing
though - it already does quite a good job at SMB serving, it seems a waste
to duplicate the effort instead of just adding kernel support to the
existing code.

Kris



To Unsubscribe: send mail to majord...@freebsd.org
with unsubscribe freebsd-hackers in the body of the message



Re: NetWare client in -current

1999-09-10 Thread Kris Kennaway
On Fri, 10 Sep 1999, Matthew N. Dodd wrote:

  Okay. If that's the plan, then I don't have any objections.
  
  I do hate the idea of having to reimplement samba because of the licensing
  though - it already does quite a good job at SMB serving, it seems a waste
  to duplicate the effort instead of just adding kernel support to the
  existing code.
 
 SAMBA implements an SMB/CIFS server.  We're talking about client support.

It also does that (smbclient), though not as an FS, and there's
sharity-light for a (n)fs interface.

Kris



To Unsubscribe: send mail to majord...@freebsd.org
with unsubscribe freebsd-hackers in the body of the message



RE: TCP sequence numbers

1999-09-07 Thread Kris Kennaway

On Thu, 2 Sep 1999, Geoff Rehmet wrote:

  How do OpenBSD do it?

 They use arc4random(), to add a random increment.

And you do ISN = C + f(state) where C is a 250KHz counter and f is your
cut-down MD5? And state = {random secret, src addr, src port, dst addr,
dst port, ?}

I haven't had time to read through the patch yet, I'm sorry.

  Just curious whether you have a reference for doing this or
  whether it was an ad-hoc change. Playing with cryptographic
  algorithms isn't usually a good idea unless you're sure, as I'm
  sure you know.

 Yup - dead right.  The requirements in this instance are however
 also slightly different to what you normally use a cryptographic
 hash for.  I want to let the code be picked at a bit before
 it goes into the tree though.

What speed difference is there between MD5 and your cut-down version? Have
you benchmarked performance differences in general?

I'm also still curious about your rationale/references for modifying MD5
in that way.

The other comment I have is that this should probably be hidden behind a
sysctl for configurability and to appease folks who might not like it.

  I'd expect Yarrow to be (perhaps quite a bit) slower than our existing
  PRNG - it's a more conservative design and uses primitives 
  like SHA-1 (for
  yarrow-160). I don't know how much of an impact this would be for
  network performance.
 
 If it is only used to generate a secret every 5 minutes, that should
 not be a problem.

Sounds reasonable.

Kris



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



RE: TCP sequence numbers

1999-09-07 Thread Kris Kennaway

On Thu, 2 Sep 1999, Geoff Rehmet wrote:

  I'd expect Yarrow to be (perhaps quite a bit) slower than our existing
  PRNG - it's a more conservative design and uses primitives 
  like SHA-1 (for
  yarrow-160). I don't know how much of an impact this would be for
  network performance.
 
 If it is only used to generate a secret every 5 minutes, that should not
 be a problem.

Hrm. RFC 1948 seems to warn against changing the secret while "live". It's
not immediately obvious to me why this is so.

Kris



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



RE: TCP sequence numbers

1999-09-07 Thread Kris Kennaway
On Thu, 2 Sep 1999, Geoff Rehmet wrote:

  How do OpenBSD do it?

 They use arc4random(), to add a random increment.

And you do ISN = C + f(state) where C is a 250KHz counter and f is your
cut-down MD5? And state = {random secret, src addr, src port, dst addr,
dst port, ?}

I haven't had time to read through the patch yet, I'm sorry.

  Just curious whether you have a reference for doing this or
  whether it was an ad-hoc change. Playing with cryptographic
  algorithms isn't usually a good idea unless you're sure, as I'm
  sure you know.

 Yup - dead right.  The requirements in this instance are however
 also slightly different to what you normally use a cryptographic
 hash for.  I want to let the code be picked at a bit before
 it goes into the tree though.

What speed difference is there between MD5 and your cut-down version? Have
you benchmarked performance differences in general?

I'm also still curious about your rationale/references for modifying MD5
in that way.

The other comment I have is that this should probably be hidden behind a
sysctl for configurability and to appease folks who might not like it.

  I'd expect Yarrow to be (perhaps quite a bit) slower than our existing
  PRNG - it's a more conservative design and uses primitives 
  like SHA-1 (for
  yarrow-160). I don't know how much of an impact this would be for
  network performance.
 
 If it is only used to generate a secret every 5 minutes, that should
 not be a problem.

Sounds reasonable.

Kris



To Unsubscribe: send mail to majord...@freebsd.org
with unsubscribe freebsd-hackers in the body of the message



RE: TCP sequence numbers

1999-09-07 Thread Kris Kennaway
On Thu, 2 Sep 1999, Geoff Rehmet wrote:

  I'd expect Yarrow to be (perhaps quite a bit) slower than our existing
  PRNG - it's a more conservative design and uses primitives 
  like SHA-1 (for
  yarrow-160). I don't know how much of an impact this would be for
  network performance.
 
 If it is only used to generate a secret every 5 minutes, that should not
 be a problem.

Hrm. RFC 1948 seems to warn against changing the secret while live. It's
not immediately obvious to me why this is so.

Kris



To Unsubscribe: send mail to majord...@freebsd.org
with unsubscribe freebsd-hackers in the body of the message



Re: TCP sequence numbers

1999-09-01 Thread Kris Kennaway
On Wed, 1 Sep 1999, Geoff Rehmet wrote:

 After a bit of work on TCP sequence numbers, and generating initial
 sequence numbers which are difficult to predict, I have put some
 code together, which I belive makes the way in which FreeBSD
 generates initial send sequence numbers more secure.

How do OpenBSD do it?

 The patch I have developed is based on RFC1948, and also takes some ideas
 from the way in which Linux calculates TCP ISS values.  However, unlike
 Linux, I am keeping the code true to RFC793's requirement for a
 fictitious 250kHz clock.  Instead of uising a cut-down MD4 transform,
 (which is what Linux does), I have used a cut-down MD5 transform, with
 round 4 removed.

Just curious whether you have a reference for doing this or whether it was
an ad-hoc change. Playing with cryptographic algorithms isn't usually a
good idea unless you're sure, as I'm sure you know.

 As with the Linux code, I am using 9 32-bit words of
 random secret, which is rekeyed every 5 minutes.
 The remainder of the sequence number generation is based on our existing
 code.
 
 I have placed the diff in
 
 http://www.freebsd.org/~csgr/tcp_sequence.diff
 
 The diff was taken against -current as at approximately 0600 GMT
 1 September 1999.
 
 testing, comments would be appreciated.
 
 Once Mark has completed his work in devrandom, I will rather use
 devrandom as a source of randomness.

I'd expect Yarrow to be (perhaps quite a bit) slower than our existing
PRNG - it's a more conservative design and uses primitives like SHA-1 (for
yarrow-160). I don't know how much of an impact this would be for
network performance.

Kris



To Unsubscribe: send mail to majord...@freebsd.org
with unsubscribe freebsd-hackers in the body of the message



Re: [mount.c]: Option user-patch

1999-08-29 Thread Kris Kennaway

On Sun, 29 Aug 1999, Chris Piazza wrote:

 # set sysctl variables early as we can
 if [ -f /etc/rc.sysctl ]; then
 . /etc/rc.sysctl
 fi
 
 Mind you it doesn't look like it was merged into releng_3

Could someone do this before 3.3? It's useful functionality.

Kris



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



<    1   2   3   4   5   6   7   >