Re: Partitions

2006-07-02 Thread Craig Skinner
On Sat, Jul 01, 2006 at 09:39:28PM +0200, Joachim Schipper wrote:
 Yes, but /etc/rc doesn't:
 
 # prune quickly with one rm, then use find to clean up /tmp/[lq]*
 # (not needed with mfs /tmp, but doesn't hurt there...)
 (cd /tmp  rm -rf [a-km-pr-zA-Z]* 
 find . ! -name . ! -name lost+found ! -name quota.user \
 ! -name quota.group -execdir rm -rf -- {} \; -type d -prune)
 

Well spotted, solved:

$ diff /etc/rc /etc/rc.orig 
450,451c450,451
 (cd /tmp  rm -rf [a-km-pr-uw-zA-Z]* 
 find . ! -name . ! -name lost+found ! -name vi.recover ! -name
quota.user \
---
 (cd /tmp  rm -rf [a-km-pr-zA-Z]* 
 find . ! -name . ! -name lost+found ! -name quota.user \



Why I started doing this is because one night when I was working at an
ISP, I found an SSH zombie had gotten onto one of our DNS servers 
(sales:qwerty).
While /tmp and /home were mounted noexec, /var wasn't, so the zombie
compiled its own list driven sshd in /var/tmp and went scanning for more
hosts.

I thought that if /var/tmp was a symlink to /tmp, there would be no need
to repartition the disk and it would stop users messing about with their
own executables in /var/tmp.


-- 
Craig Skinner | http://www.kepax.co.uk | [EMAIL PROTECTED]



Re: Encryption and Compression with ipsecctl?

2006-07-02 Thread Matthew R. Dempsky
On Fri, Jun 30, 2006 at 04:43:21PM -0500, Todd T. Fries wrote:
 IPcomp is known broken for at least two years, perhaps longer.  Do not use it.

What makes you say that?  I can't find any mention of this in the man 
pages, on openbsd.org, or misc's archives.



Re: Ports and BSD.MP question

2006-07-02 Thread Gabriel George POPA

  Neah, Mozilla crashed again. What's the problem:
- the port?
- the libraries?
- ME?
   Did this happened to other people too? On what OpenBSD 
versions? How did they solve this?




Re: Ports and BSD.MP question

2006-07-02 Thread Adam PAPAI

Gabriel George POPA wrote:




  Neah, Mozilla crashed again. What's the problem:
- the port?
- the libraries?
- ME?
   Did this happened to other people too? On what OpenBSD 
versions? How did they solve this?


I must say yes. :) Sometimes firefox crashs. What pages are related? Are 
there javascripts on the websites? Or so many pictures? Have you 
installed extensions or plugins? If yes, list of them.


--
Adam PAPAI
D i g i t a l Influence
http://www.digitalinfluence.hu
E-mail: [EMAIL PROTECTED]
Phone: +36 30 33-55-735 (Hungary)
Phone: +49 176-67264167 (Germany)



Re: Encrypting files

2006-07-02 Thread Joachim Schipper
On Sun, Jul 02, 2006 at 02:14:59AM +0200, Rico Secada wrote:
 Hi
 
 I have been thinking about encrypting some private files on my laptop,
 in case it gets stolen.
 
 I have no prior experience in this field.
 
 I have been thinking about using mcrypt with blowfish, but is this a
 good way to go about? Are there a better alternative? And is blowfish
 the best way to encrypt it?
 
 Please bear with me if these questions are ignorent.

There are many solutions; not mentioned yet is gnupg, which has quite a
few bells and whistles you don't need but is otherwise a rather solid
program (or so I used to think; there have been a few vulnerabilities in
the past month or two).

However, svnd is probably the most convenient if you are running
-current.

Do remember to remove the original files; rm -P, as suggested, works.

Joachim



Re: Ports and BSD.MP question

2006-07-02 Thread Gabriel George POPA
 I use Mozilla 1.7.12. Help-About-About Plug-ins sais I have no 
plugins installed.
   And yes, indeed. It crashes especially on www.yahoo.com (when 
running javascripts) and when there are a lot of pictures.
I really don't know what to do... Once I lost my bookmarks. There was a 
moment when I lost some e-mails, stuff like this.




  Neah, Mozilla crashed again. What's the problem:
- the port?
- the libraries?
- ME?
   Did this happened to other people too? On what OpenBSD 
versions? How did they solve this?



I must say yes. :) Sometimes firefox crashs. What pages are related? 
Are there javascripts on the websites? Or so many pictures? Have you 
installed extensions or plugins? If yes, list of them.




Re: Encrypting files

2006-07-02 Thread Sigfred Håversen

Joachim Schipper wrote:

On Sun, Jul 02, 2006 at 02:14:59AM +0200, Rico Secada wrote:


Hi

I have been thinking about encrypting some private files on my laptop,
in case it gets stolen.

I have no prior experience in this field.

I have been thinking about using mcrypt with blowfish, but is this a
good way to go about? Are there a better alternative? And is blowfish
the best way to encrypt it?

Please bear with me if these questions are ignorent.



There are many solutions; not mentioned yet is gnupg, which has quite a
few bells and whistles you don't need but is otherwise a rather solid
program (or so I used to think; there have been a few vulnerabilities in
the past month or two).

However, svnd is probably the most convenient if you are running
-current.

Do remember to remove the original files; rm -P, as suggested, works.


A users tmp files should be encrypted as well. Setting TMPDIR to point into
an encrypted filesystem may be enough, assuming that the application(s) respect
TMPDIR.

/Sigfred



Re: Ports and BSD.MP question

2006-07-02 Thread Tobias Ulmer
On Sun, Jul 02, 2006 at 12:17:09PM +0300, Gabriel George POPA wrote:
   Neah, Mozilla crashed again. What's the problem:
 - the port?
 - the libraries?
 - ME?

- Mozilla/Firefox [x]

Did this happened to other people too? On what OpenBSD 
 versions? How did they solve this?
 
 

Yep. On all. 

Change the port to produce a debug version, make sure that
you have at least 2GiB of ram/swap and start mozilla/firefox in gdb.
(It will be slow as hell...)
Now reproduce the crash, get a bt full and start diging in the code.
Create patch, send it to [EMAIL PROTECTED] Then go to their bugtracker, do a 
good
search on the issue and you will find that exactly the same bug was
discovered back in 2003 (with a patch), but until now nobody fixed it.

The whole process will decrease your opinion about the most secure
browser by 400%

Just my experience

Tobias



Message (Your message dated Sun, 2 Jul 2006 11:12:08 +0900...)

2006-07-02 Thread LISTS.UFL.EDU LISTSERV Server (14.4)
Your message  dated Sun, 2  Jul 2006  11:12:08 +0900 with  subject Returned
mail: see transcript for details has been submitted to the moderator of the
PALEOLIM list: Thomas J. Whitmore [EMAIL PROTECTED].



Re: Encrypting files

2006-07-02 Thread Joachim Schipper
On Sun, Jul 02, 2006 at 12:00:34PM +0200, Sigfred H?versen wrote:
 Joachim Schipper wrote:
 On Sun, Jul 02, 2006 at 02:14:59AM +0200, Rico Secada wrote:
 
 Hi
 
 I have been thinking about encrypting some private files on my laptop,
 in case it gets stolen.
 
 I have no prior experience in this field.
 
 I have been thinking about using mcrypt with blowfish, but is this a
 good way to go about? Are there a better alternative? And is blowfish
 the best way to encrypt it?
 
 Please bear with me if these questions are ignorent.
 
 
 There are many solutions; not mentioned yet is gnupg, which has quite a
 few bells and whistles you don't need but is otherwise a rather solid
 program (or so I used to think; there have been a few vulnerabilities in
 the past month or two).
 
 However, svnd is probably the most convenient if you are running
 -current.
 
 Do remember to remove the original files; rm -P, as suggested, works.
 
 A users tmp files should be encrypted as well. Setting TMPDIR to point into
 an encrypted filesystem may be enough, assuming that the application(s) 
 respect TMPDIR.

Yes, indeed, I should have pointed that out. Thoroughly wiping the
filesystem /tmp resides on (at boot?) works, too.

However, many important files may be kept elsewhere; for instance, vim
uses .filename.swp for swap files, and while this certainly has
advantages, it does not make for optimal security...

All in all, svnd is probably the most convenient option; any other
option requires a lot of work.

Note that, on other systems, a huge problem is that files may be written
to swap at any time unless the memory was specifically allocated not to
allow this (certain high-security programs, like gnupg, do this for at
least part of the memory; but editors typically don't). This means that
the swap partition(s) also need periodic overwriting. However, OpenBSD
uses encrypted swap by default, at least on more-or-less recent
versions.

Joachim



Boost OpenBSD security - Zophie for 3.9

2006-07-02 Thread Tomasz Zielinski
Hello,

Zophie is patch that contains new security features for OpenBSD 3.9. BSD 
license. I have not tested it personaly, but probably it's worth to analyze it 
and maybe even incorporate. More info: http://www.0penbsd.com/zophie.html, 
http://akcja.0penbsd.com/zosia/

--
Pozdrawienia/Regards
Tomasz Zielinski



5 sierpnia o6 CESARIA EVORA w Gdyni. Koncert z morzem w tle
w ramach festiwalu GLOBALTICA! Spotkania Kultur wiata!
http://klik.wp.pl/?adr=http%3A%2F%2Fadv.reklama.wp.pl%2Fas%2Fcesaria.htmlsid=805



Re: Boost OpenBSD security - Zophie for 3.9

2006-07-02 Thread Tobias Ulmer
On Sun, Jul 02, 2006 at 03:13:59PM +0200, Tomasz Zielinski wrote:
 Hello,
 
 Zophie is patch that contains new security features for OpenBSD 3.9. BSD 
 license. I have not tested it personaly, but probably it's worth to analyze 
 it and maybe even incorporate. More info: http://www.0penbsd.com/zophie.html, 
 http://akcja.0penbsd.com/zosia/
 
 --
 Pozdrawienia/Regards
 Tomasz Zielinski


I normally don't take the bait, but this one is so cute...

After reading through the diffs: (not supplied for added obfusication?)

- add a new sysctl to the kernel.
- patch some userland tools.
- If this sysctl is set, supress certain information.

Rocket sience! Even the dumbest scriptkiddie could just compile
and run these tools from the original OpenBSD sources.

Probably the whole Polish Underground Group profess OpenBSD OS as a
religion is a big subtle joke? If so, well done and thanks for the good
laugh :)

Tobias



pf + altq syntax check plz

2006-07-02 Thread S t i n g r a y
I am configuring altq  pf for the first time ,  have a few problems here ..

well i need to traffic shape between diffrent protocols as you can see in my 
pf.conf

now i am stuck  confused what to do next as i have built this file with 
diffrent ref from web.

the im is the most common Instant messengers protocoles can you tell me how to 
make it right ?

also when running hte file as it is i get pfctl: SIOCGIFMTU: Device not 
configured error.

what does this mean ?

thanks


extad=192.168.0.6/32
chadd=10.0.0.6/32
scrub in all
altq on extif hfsc bandwidth 500Kb \
queue { www, dns, im, mail, other}
queue www bandwidth (linkshare 35%)
queue dns bandwidth (linkshare 10%)
queue im bandwidth (linkshare 25%)
queue mail bandwidth (linkshare 10%)
queue other hfsc (default)
rdr on $intif proto tcp from $intad to any port 80 - $chadd port 8080
nat on $extif inet from $intad - $extad
pass out on $extif inet proto { icmp, udp, tcp } keep state




regards 


 *B:B$., B8B8,.B$B:*B(B(B(*B$ Stingray *B:B$., B8B8,.B$B:*B(B(*B$



ntpd gps clock

2006-07-02 Thread Wolfgang S. Rupprecht
Is there any way to run a my gps pps (pulse per second) clock off of
obsd-current with Mills' ntpd?  So far the gps is hooked up to a
machine running nbsd, but I'd like to consolidate things.

-wolfgang
-- 
Wolfgang S. Rupprechthttp://www.wsrcc.com/wolfgang/



Re: pf + altq syntax check plz

2006-07-02 Thread Jeff Quast

On 7/2/06, S t i n g r a y [EMAIL PROTECTED] wrote:

I am configuring altq  pf for the first time ,  have a few problems here ..

well i need to traffic shape between diffrent protocols as you can see in my 
pf.conf

now i am stuck  confused what to do next as i have built this file with 
diffrent ref from web.

the im is the most common Instant messengers protocoles can you tell me how to 
make it right ?

also when running hte file as it is i get pfctl: SIOCGIFMTU: Device not 
configured error.

what does this mean ?

thanks


extad=192.168.0.6/32
chadd=10.0.0.6/32
scrub in all
altq on extif hfsc bandwidth 500Kb \

altq on $extif hfsc bandwidth 500Kb

queue { www, dns, im, mail, other}
queue www bandwidth (linkshare 35%)
queue dns bandwidth (linkshare 10%)
queue im bandwidth (linkshare 25%)
queue mail bandwidth (linkshare 10%)
queue other hfsc (default)
rdr on $intif proto tcp from $intad to any port 80 - $chadd port 8080
nat on $extif inet from $intad - $extad
pass out on $extif inet proto { icmp, udp, tcp } keep state




regards


 *B:B$., B8B8,.B$B:*B(B(B(*B$ Stingray *B:B$., B8B8,.B$B:*B(B(*B$



That's your immediate answer for the immediate problem at hand. There
is probably a lot more problems. Maybe you should start with priq and
cbq first.



Re: pf + altq syntax check plz

2006-07-02 Thread Jason Dixon

On Jul 2, 2006, at 11:38 AM, S t i n g r a y wrote:

I am configuring altq  pf for the first time ,  have a few  
problems here ..


well i need to traffic shape between diffrent protocols as you can  
see in my pf.conf


now i am stuck  confused what to do next as i have built this file  
with diffrent ref from web.


the im is the most common Instant messengers protocoles can you  
tell me how to make it right ?


also when running hte file as it is i get pfctl: SIOCGIFMTU: Device  
not configured error.


what does this mean ?


That error means it doesn't recognize the device you've referenced.   
In your altq line you have extif which does not exist in any of the  
macros you've listed.



extad=192.168.0.6/32
chadd=10.0.0.6/32
scrub in all
altq on extif hfsc bandwidth 500Kb \
queue { www, dns, im, mail, other}
queue www bandwidth (linkshare 35%)
queue dns bandwidth (linkshare 10%)
queue im bandwidth (linkshare 25%)
queue mail bandwidth (linkshare 10%)
queue other hfsc (default)
rdr on $intif proto tcp from $intad to any port 80 - $chadd port 8080
nat on $extif inet from $intad - $extad
pass out on $extif inet proto { icmp, udp, tcp } keep state


First, I would stop using hfsc and just use priority queueing  
(priq).  All you're trying to do is prioritize services.  HFSC is an  
advanced algorithm that is certainly overkill for your use.  You  
don't list your devices, so I'm going to pretend you're using em  
(4).  Here is a revised version of yours that should work (not  
tested), with a bonus tossed in for free (ack prioritization).  I've  
removed IM protocols;  they are easy enough for you to insert them  
once you understand the concepts and know *which* IM protocols you  
wish to prioritize.


# Define our macros
ext_if=em0
int_if=em1
extadd=192.168.0.6
chadd=10.0.0.6
www_ports={ http, https }
mail_ports={ pop3, pop3s, imap, imaps, smtp }

# Normalization
scrub in all

# Queueing
altq on $ext_if priq bandwidth 500Kb queue { other, mail, www, dns,  
ack }

   queue other priq(default)
   queue mail priority 2
   queue www priority 3
   queue dns priority 5
   queue ack priority 6

# Translation
rdr on $int_if proto tcp from ($int_if:network) to any port http -  
$chadd port 8080

nat on $ext_if inet from ($int_if:network) to any - $chadd

# Filtering
block in on $ext_if all
pass out on $ext_if inet proto { icmp, udp } all keep state queue other
pass out on $ext_if inet proto tcp all keep state queue(other, ack)
pass out on $ext_if inet proto { tcp, udp } from any to any port  
domain keep state queue dns
pass out on $ext_if inet proto tcp from ($int_if:network) to any port  
$www_ports keep state queue www
pass out on $ext_if inet proto tcp from ($int_if:network) to any port  
$mail_ports keep state queue mail



HTH.

--
Jason Dixon
DixonGroup Consulting
http://www.dixongroup.net



Re: Encrypting files

2006-07-02 Thread Chris Kuethe

Bear in mind that if you're serious about keeping plaintext away from
people who you don't want to see it, this could get quite tricky.

What happens if an application generates temporary files? What happens
if an application swaps? What happens if an application crashes and
dumps core? What happens if the kernel crashes and dumps core? What
happens if you accidentally copy and past some content into your
shell, thereby logging it into your .history?

Certain editors (vim for sure, probably emacs too) can encrypt your
files on the fly. I don't use that feature, but if you do, make sure
they handle temp files properly, etc.

Be very careful - just because your long-term, bulk storage is
encrypted there is no guarantee that you haven't left plaintext
anywhere.

And that's not even taking into account that the thief might just put
trojan horses all over your laptop before letting you have it back.
Think of how often you hear of windows machines being turned into
spambots with keyloggers. Just because it seems to be mostly windows
machines doesn't mean it can't happen. *NIX makes it easy for even a
moderately competent programmer to write a trivial keylogger.

CK

--
GDB has a 'break' feature; why doesn't it have 'fix' too?



Re: Encrypting files

2006-07-02 Thread Joachim Schipper
On Sun, Jul 02, 2006 at 10:57:42AM -0600, Chris Kuethe wrote:
 Bear in mind that if you're serious about keeping plaintext away from
 people who you don't want to see it, this could get quite tricky.
 
 What happens if an application generates temporary files? What happens
 if an application swaps? What happens if an application crashes and
 dumps core? What happens if the kernel crashes and dumps core?

Well, in that case, you are usually sufficiently alerted to clean out
the relevant parts of the disk.

(Note that the case where you do not have administrator access is not
relevant, as root can read your files any time you can, anyway.)

 What
 happens if you accidentally copy and past some content into your
 shell, thereby logging it into your .history?

 Certain editors (vim for sure, probably emacs too) can encrypt your
 files on the fly. I don't use that feature, but if you do, make sure
 they handle temp files properly, etc.
 
 Be very careful - just because your long-term, bulk storage is
 encrypted there is no guarantee that you haven't left plaintext
 anywhere.

But this is still good advice; a crashing kernel is not very believable,
but such mundane mistakes are likely to provide at least snippets of
information.

More importantly, a file like ~/.viminfo contains quite a bit of
information. I *suppose* vim handles encrypted files in a sane fashion,
but I am not sure.

 And that's not even taking into account that the thief might just put
 trojan horses all over your laptop before letting you have it back.
 Think of how often you hear of windows machines being turned into
 spambots with keyloggers. Just because it seems to be mostly windows
 machines doesn't mean it can't happen. *NIX makes it easy for even a
 moderately competent programmer to write a trivial keylogger.

If you do *that*, however, you are just being stupid. Wipe and
reinstall; if the data is important, preserve that - but no binaries or
somesuch.

Joachim



Re: Encrypting files

2006-07-02 Thread Nick Guenther

On 7/2/06, Chris Kuethe [EMAIL PROTECTED] wrote:

Bear in mind that if you're serious about keeping plaintext away from
people who you don't want to see it, this could get quite tricky.


And that's not even taking into account that the thief might just put
trojan horses all over your laptop before letting you have it back.
Think of how often you hear of windows machines being turned into
spambots with keyloggers. Just because it seems to be mostly windows
machines doesn't mean it can't happen. *NIX makes it easy for even a
moderately competent programmer to write a trivial keylogger.


This is a good thread!

I have some questions though:
How can you make a keylogger on UNIX? I thought that UNIX segmented
it's memory spaces, unlike Windows which has the problem of a global
key trampoline (I'm sorry, I read this somewhere once and do not
remember exactly what it was called). I suppose if you replaced the
kernel than you could do this but I don't think that's what was meant.

How do you choose between svnd and vnd devices? I'm guessing the type
of the device is determined by whether you do `vnconfig svnd...` or
`vnconfig vnd` but the manpage doesn't explicitly say this.

-Nick



Re: Boost OpenBSD security - Zophie for 3.9

2006-07-02 Thread Greg Thomas

On 7/2/06, Tobias Ulmer [EMAIL PROTECTED] wrote:

On Sun, Jul 02, 2006 at 03:13:59PM +0200, Tomasz Zielinski wrote:
 Hello,

 Zophie is patch that contains new security features for OpenBSD 3.9. BSD 
license. I have not tested it personaly, but probably it's worth to analyze it and 
maybe even incorporate. More info: http://www.0penbsd.com/zophie.html, 
http://akcja.0penbsd.com/zosia/

 --
 Pozdrawienia/Regards
 Tomasz Zielinski


I normally don't take the bait, but this one is so cute...

After reading through the diffs: (not supplied for added obfusication?)

- add a new sysctl to the kernel.
- patch some userland tools.
- If this sysctl is set, supress certain information.

Rocket sience! Even the dumbest scriptkiddie could just compile
and run these tools from the original OpenBSD sources.

Probably the whole Polish Underground Group profess OpenBSD OS as a
religion is a big subtle joke? If so, well done and thanks for the good
laugh :)



If it is a subtle joke I sure like the screenshots of the install.



Re: Encrypting files

2006-07-02 Thread Peter Philipp
On Sun, Jul 02, 2006 at 02:56:03PM -0400, Nick Guenther wrote:
 I have some questions though:
 How can you make a keylogger on UNIX? I thought that UNIX segmented
 it's memory spaces, unlike Windows which has the problem of a global
 key trampoline (I'm sorry, I read this somewhere once and do not
 remember exactly what it was called). I suppose if you replaced the
 kernel than you could do this but I don't think that's what was meant.

I think this was meant.  man wskbd tells a little about the keyboard and
the routines for this are in /sys/dev/wscons I think.  Because you have
the source, can recompile and the code is written with KISS in mind you'll
be able to patch something up.  However if you do you should check your
morals, they come back to haunt you if you abuse them.  Running a default
kernel compiled by deraadt directly from the CD-ROM should ensure that no
keylogger of any sort is installed in the kernel.  There really isn't much 
reason to compile your own kernel unless you add your own stuff or want to 
change something.

-peter

-- 
Here my ticker tape .signature  My name is Peter Philipp  lynx -dump 
http://en.wikipedia.org/w/index.php?title=Pufferfisholdid=20768394; | sed -n 
131,136p  So long and thanks for all the fish!!!



Re: Patent jeopardizes IETF syslog standard

2006-07-02 Thread Nick Guenther

On 7/1/06, J.C. Roberts [EMAIL PROTECTED] wrote:

On Fri, 30 Jun 2006 12:54:14 +0300, Alexey E. Suslikov
[EMAIL PROTECTED] wrote:

Patent jeopardizes IETF syslog standard. Read here
http://trends.newsforge.com/article.pl?sid=06/06/28/2320232

This sucks. It's no different than what Cisco did with their HSRP patent
to try to kill off VRRP. The Huawei IPR claim to the IETF is nearly
identical to the crap Cisco put out years ago in their IPR claim.

https://datatracker.ietf.org/public/ipr_detail_show.cgi?ipr_id=724

The end result is we have CARP, a patent busting implementation that is
far better than either of the originals...

Will they never learn?

Anyone in the mood for slog ?


Isn't syslog just like... send random data on port 514 to whoever and
they record it? How can you possibly patent that? That would be like
patenting talking.

-Nick



Re: Encrypting files

2006-07-02 Thread Nick Guenther

On 7/2/06, Peter Philipp [EMAIL PROTECTED] wrote:

On Sun, Jul 02, 2006 at 02:56:03PM -0400, Nick Guenther wrote:
 I have some questions though:
 How can you make a keylogger on UNIX? I thought that UNIX segmented
 it's memory spaces, unlike Windows which has the problem of a global
 key trampoline (I'm sorry, I read this somewhere once and do not
 remember exactly what it was called). I suppose if you replaced the
 kernel than you could do this but I don't think that's what was meant.

I think this was meant.  man wskbd tells a little about the keyboard and
the routines for this are in /sys/dev/wscons I think.  Because you have
the source, can recompile and the code is written with KISS in mind you'll
be able to patch something up.  However if you do you should check your
morals, they come back to haunt you if you abuse them.  Running a default
kernel compiled by deraadt directly from the CD-ROM should ensure that no
keylogger of any sort is installed in the kernel.  There really isn't much
reason to compile your own kernel unless you add your own stuff or want to
change something.


Ah, okay, thank you! I see a lot go across on this list only
half-explained, which is good for those who know what is going on but
not for newbies like me.

It's nice that this list is the sort of place where you are expected
to use your own morals instead of blindly following the no hacking is
bad! mantra. For the record, I was just curious, I'm not actually
planning on bugging my systems.

-Nick



Re: Encrypting files

2006-07-02 Thread Joachim Schipper
On Sun, Jul 02, 2006 at 02:56:03PM -0400, Nick Guenther wrote:
 On 7/2/06, Chris Kuethe [EMAIL PROTECTED] wrote:
 Bear in mind that if you're serious about keeping plaintext away from
 people who you don't want to see it, this could get quite tricky.
 
 
 And that's not even taking into account that the thief might just put
 trojan horses all over your laptop before letting you have it back.
 Think of how often you hear of windows machines being turned into
 spambots with keyloggers. Just because it seems to be mostly windows
 machines doesn't mean it can't happen. *NIX makes it easy for even a
 moderately competent programmer to write a trivial keylogger.
 
 This is a good thread!
 
 I have some questions though:
 How can you make a keylogger on UNIX? I thought that UNIX segmented
 it's memory spaces, unlike Windows which has the problem of a global
 key trampoline (I'm sorry, I read this somewhere once and do not
 remember exactly what it was called). I suppose if you replaced the
 kernel than you could do this but I don't think that's what was meant.

UNIX offers some very nice things, including ptys, ttys, and pipes. ptys
were made for the explicit purpose of allowing programs to send and
receive stuff to a tty-like interface, but with a program on the other
end (instead of a terminal).

You are right that reading keystrokes out of kernel memory is not
trivial, and impossible without superuser priviliges, but if you already
are the user whose keystrokes you want to snoop, it's not very
difficult.

 How do you choose between svnd and vnd devices? I'm guessing the type
 of the device is determined by whether you do `vnconfig svnd...` or
 `vnconfig vnd` but the manpage doesn't explicitly say this.

That's correct, you will want to name a complete device, though - so
vnconfig svnd0 (...).

Joachim



Re: Encrypting files

2006-07-02 Thread Joachim Schipper
On Sun, Jul 02, 2006 at 09:34:50PM +0200, Peter Philipp wrote:
 On Sun, Jul 02, 2006 at 02:56:03PM -0400, Nick Guenther wrote:
  I have some questions though:
  How can you make a keylogger on UNIX? I thought that UNIX segmented
  it's memory spaces, unlike Windows which has the problem of a global
  key trampoline (I'm sorry, I read this somewhere once and do not
  remember exactly what it was called). I suppose if you replaced the
  kernel than you could do this but I don't think that's what was meant.
 
 I think this was meant.  man wskbd tells a little about the keyboard and
 the routines for this are in /sys/dev/wscons I think.  Because you have
 the source, can recompile and the code is written with KISS in mind you'll
 be able to patch something up.  However if you do you should check your
 morals, they come back to haunt you if you abuse them.  Running a default
 kernel compiled by deraadt directly from the CD-ROM should ensure that no
 keylogger of any sort is installed in the kernel.

Well, provided the BIOS (or equivalent) cannot be flashed from the
kernel, yes.

Of course, worrying about this requires raging paranoia. But from a
quick look, flashing the BIOS and combining it with an attack like the
recent Blue Pill
http://theinvisiblethings.blogspot.com/2006/06/introducing-blue-pill.html
(and elsewhere, but this one looks pretty complete) method would make
for a *very* nasty rootkit.

Just rewriting the kernel that is loaded by the bootloader would also be
nasty, and potentially undetectable from software, too - but that's old
news, and I have a vague notion that the above could likely be done in
fewer instructions, which means that it's easier to put in what limited
space is available.

Of course, if you have people who can do this and are willing to invest
the time to actually do it after you, be glad you're running OpenBSD, be
careful with ports and new code, and remember - it's not paranoia if
they really are out to get you.

 There really isn't much 
 reason to compile your own kernel unless you add your own stuff or want to 
 change something.

Of course, that's still true.

Joachim



Re: Encrypting files

2006-07-02 Thread Joachim Schipper
On Sun, Jul 02, 2006 at 03:59:41PM -0400, Nick Guenther wrote:
 On 7/2/06, Peter Philipp [EMAIL PROTECTED] wrote:
 On Sun, Jul 02, 2006 at 02:56:03PM -0400, Nick Guenther wrote:
  How can you make a keylogger on UNIX?
 I think this was meant. (...)
 Ah, okay, thank you! I see a lot go across on this list only
 half-explained, which is good for those who know what is going on but
 not for newbies like me.
 
 It's nice that this list is the sort of place where you are expected
 to use your own morals instead of blindly following the no hacking is
 bad! mantra. For the record, I was just curious, I'm not actually
 planning on bugging my systems.

Note that, under certain circumstances, it can make sense to bug your
own systems, and in most (all?) jurisdictions it is legal if the users
are warned beforehand.

This can make sense if you run a shell provider, and d00m10rd_t3h_1337
is running another ssh scan, for instance...

Plus, you need at least a high-level theoretical knowledge of an attack
to be able to adequately defend yourself from it.

Joachim



Re: starting Apache in SSL mode

2006-07-02 Thread FTP
On Tue, Jun 27, 2006 at 05:03:52PM +0200, FTP wrote:
 On Tue, Jun 27, 2006 at 04:34:19PM +0200, FTP wrote:
  On Tue, Jun 27, 2006 at 03:55:16PM +0200, FTP wrote:
   On Tue, Jun 27, 2006 at 08:49:37AM -0400, Peter Blair wrote:
SSL certificates for a hostname requires a unique IP address.  Are you
trying to do virtual name hosting with https?

On 6/27/06, FTP [EMAIL PROTECTED] wrote:
On Mon, Jun 26, 2006 at 08:30:29AM -0700, Scott Francis wrote:
 On 6/26/06, FTP [EMAIL PROTECTED] wrote:
 Hi there,
 
 I was trying to start Apache in SSL mode and I did follow the
 http://openbsd.org/faq/faq10.html#HTTPS steps. After that I issued
 apachectl startssl and everything went fine.
 
 Now, when I point to the https://IP-address from my server I get 
 an
 unable to connect error!
 
 What did I do wrong?
 
 In the ssl_engine_log I get: Configuring server new.host.name:443 
 for 
SSL
 protocol. This server has no domain assigned. Did I do something 
 wrong 
in
 the certs?

 no, but you probably neglected to edit /var/www/conf/httpd.conf
 B
 appropriately (ServerName and NameVirtualHost come to mind, as well 
 as
 the appropriate name-specific parts of the SSL config in the same
 file). ssl_engine_log probably won't give you the info you need here;
 take a look at your access_log and error_log.
 --
 [EMAIL PROTECTED],darkuncle.net} || 0x5537F527
encrypted email to the latter address please
http://darkuncle.net/pubkey.asc for public key


Thanks for your reply.

Well, the error_log doesn't get any message. Also, the regular http 
does 
show the web page without having the IP address in the http.conf file. 
Why 
doesn't this work with SSL as well?
Certs etc. are in the correct path.

Thanks

George


   
   the weird thing is that I don't anything in the logs! No errors - nothing!
  
  
  some more ifo:
  
  when trying curl https://localhost I get the follwing:
  
  curl: (60) Failed to connect to ::1: Connection refused
  More details here: http://curl.haxx.se/docs/sslcerts.html
  
  curl performs SSL certificate verification by default, using a bundle
   of Certificate Authority (CA) public keys (CA certs). The default
bundle is named curl-ca-bundle.crt; you can specify an alternate file
 using the --cacert option.
 If this HTTPS server uses a certificate signed by a CA represented in
  the bundle, the certificate verification probably failed due to a
   problem with the certificate (it might be expired, or the name might
not match the domain name in the URL).
If you'd like to turn off curl's verification of the certificate, use
 the -k (or --insecure) option.
  
  if I issue curl -k https://localhost instead, I do get the page. Could it 
  be due to the self-signed cert?
  
  Thanks George
 
 
 even more info:
 
 when I try to access the site via lynx I do get an SSL error message moaning 
 that I have a self-signed cert. After accepting this, the page gets dispalyed.
 So it looks like the problem is with the CA? How do I correct that?
 I found the a reference in manual/mod/mod_ssl/ssl_faq.html#ToC24 but 
 mentions a sign.sh script wich isn't present in the OBSD package. 
 
 Thanks
 
 George


any chance to draw some attention to the above?

Thanks



Re: Boost OpenBSD security - Zophie for 3.9

2006-07-02 Thread Joachim Schipper
On Sun, Jul 02, 2006 at 12:20:49PM -0700, Greg Thomas wrote:
 On 7/2/06, Tobias Ulmer [EMAIL PROTECTED] wrote:
 On Sun, Jul 02, 2006 at 03:13:59PM +0200, Tomasz Zielinski wrote:
 Hello,

 Zophie is patch that contains new security features for OpenBSD 3.9. BSD 
 license. I have not tested it personaly, but probably it's worth to 
 analyze it and maybe even incorporate. More info: 
 http://www.0penbsd.com/zophie.html, http://akcja.0penbsd.com/zosia/

 I normally don't take the bait, but this one is so cute...

 After reading through the diffs: (not supplied for added obfusication?)

 - add a new sysctl to the kernel.
 - patch some userland tools.
 - If this sysctl is set, supress certain information.

 Rocket sience! Even the dumbest scriptkiddie could just compile
 and run these tools from the original OpenBSD sources.

 Probably the whole Polish Underground Group profess OpenBSD OS as a
 religion is a big subtle joke? If so, well done and thanks for the good
 laugh :)
 
 If it is a subtle joke I sure like the screenshots of the install.

However, note that the page is quite frank about what is being done,
from the web page quoted above:

- kern.zophie.privacy
  This setting is responsible for process privacy in finger, last,
netstat, ps, users, w, and who.
  Value 1 turns on this feature.

This, obviously, still doesn't make it very useful (if only because,
even after you've mounted everything noexec, you still have top, and so
on and so forth) - but the above should be enough to arouse suspicion.

Joachim



Re: Encrypting files

2006-07-02 Thread Peter Philipp
On Sun, Jul 02, 2006 at 10:25:35PM +0200, Joachim Schipper wrote:
 Well, provided the BIOS (or equivalent) cannot be flashed from the
 kernel, yes.
 
 Of course, worrying about this requires raging paranoia. But from a

Paranoia isn't necessarily a bad thing.  It motivates people to seek true or 
possible points of compromise in a system.  Motivation is the key in 
productivity and security.

-peter



Re: Boost OpenBSD security - Zophie for 3.9

2006-07-02 Thread Marcin Wilk

At 22:35 2006-07-02, you wrote:

On Sun, Jul 02, 2006 at 12:20:49PM -0700, Greg Thomas wrote:
 On 7/2/06, Tobias Ulmer [EMAIL PROTECTED] wrote:
 On Sun, Jul 02, 2006 at 03:13:59PM +0200, Tomasz Zielinski wrote:
 Hello,

 Zophie is patch that contains new security features for OpenBSD 3.9. BSD
 license. I have not tested it personaly, but probably it's worth to
 analyze it and maybe even incorporate. More info:
 http://www.0penbsd.com/zophie.html, http://akcja.0penbsd.com/zosia/

 I normally don't take the bait, but this one is so cute...

 After reading through the diffs: (not supplied for added obfusication?)

 - add a new sysctl to the kernel.
 - patch some userland tools.
 - If this sysctl is set, supress certain information.

 Rocket sience! Even the dumbest scriptkiddie could just compile
 and run these tools from the original OpenBSD sources.

 Probably the whole Polish Underground Group profess OpenBSD OS as a
 religion is a big subtle joke? If so, well done and thanks for the good
 laugh :)

 If it is a subtle joke I sure like the screenshots of the install.

However, note that the page is quite frank about what is being done,
from the web page quoted above:

- kern.zophie.privacy
  This setting is responsible for process privacy in finger, last,
netstat, ps, users, w, and who.
  Value 1 turns on this feature.

This, obviously, still doesn't make it very useful (if only because,
even after you've mounted everything noexec, you still have top, and so
on and so forth) - but the above should be enough to arouse suspicion.

Joachim


Process privacy itself is done in kernel so top  other tools (like 
lsof for example) will not work.
Ps, users, w  who are pathed to not show other users that are in  
this is independent with process privacy.


You may find OpenBSD that is on screenshots here: 
http://nicram.sytes.net/openbsd/openbsd-3.9-i386-zophie.iso

It is extactly same OpenBSD.
 yes it is very easy to make it on Your own :) This is how KISS apps 
should be made, even when they change something in kernel :)


Best Regards



Re: Patent jeopardizes IETF syslog standard

2006-07-02 Thread Jim Razmus
* Nick Guenther [EMAIL PROTECTED] [060702 15:58]:
 On 7/1/06, J.C. Roberts [EMAIL PROTECTED] wrote:
 On Fri, 30 Jun 2006 12:54:14 +0300, Alexey E. Suslikov
 [EMAIL PROTECTED] wrote:
 
 Patent jeopardizes IETF syslog standard. Read here
 http://trends.newsforge.com/article.pl?sid=06/06/28/2320232
 
 This sucks. It's no different than what Cisco did with their HSRP patent
 to try to kill off VRRP. The Huawei IPR claim to the IETF is nearly
 identical to the crap Cisco put out years ago in their IPR claim.
 
 https://datatracker.ietf.org/public/ipr_detail_show.cgi?ipr_id=724
 
 The end result is we have CARP, a patent busting implementation that is
 far better than either of the originals...
 
 Will they never learn?
 
 Anyone in the mood for slog ?
 
 Isn't syslog just like... send random data on port 514 to whoever and
 they record it? How can you possibly patent that? That would be like
 patenting talking.
 
 -Nick
 

I hold the patent on talking.  Watch for a battery of law suits
forthcoming.

Sorry, couldn't resist.  Laugh people.

Jim



How to get a (working) screen editor inside bsd.rd?

2006-07-02 Thread Todd Pytel
I've got a RAIDFrame system for which I'm building a custom bsd.rd. That's
basically fine - I understand how /usr/src/distrib works and how crunchgen
is used to add files (like raidctl) to instbin on the kernel ramdisk. So I
figure that as long as I'm at it, I'd like to have a real screen editor as
well. That doesn't seem to work, though. I've gotten the build process to
incorporate either (n)vi or ee by using CRUNCHSPECIAL directives, and that
seems to go OK. But after booting into the new bsd.rd, any attempt to use
the editors segfaults. Because ee is small, I also tried compiling it
statically and using a straight COPY with it rather than building it into
instbin. That segfaults the same way. Is there some terminal or screen
related issue I'm not understanding here that's causing the editors to fail?
I notice both of them use some version of curses.

Thanks,
Todd



Re: A little script to remove packages don't needed

2006-07-02 Thread Andrés

I changed a couple of things:

a) Now there's a license notice (template from
/usr/src/share/misc/license.template). Nothing important, just to be
sure.

b) All packages which you didn't want to delete are saved to a file,
so you will not have to answer n in future runs (to check the full
list of packages just do: sudo rm /etc/pkg_check.conf).

c) If, in a run, packages were deleted, a new run is suggested,
because maybe there are packages which were *only* used by those
packages.

Again, feedback is useful :)



#!/bin/ksh

# Copyright (c) 2006 AndrC)s Delfino [EMAIL PROTECTED]
#
# Permission to use, copy, modify, and distribute this software for any
# purpose with or without fee is hereby granted, provided that the above
# copyright notice and this permission notice appear in all copies.
#
# THE SOFTWARE IS PROVIDED AS IS AND THE AUTHOR DISCLAIMS ALL WARRANTIES
# WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
# MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
# ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
# WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
# ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
# OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.

function move_cursor_up {

tput up dl 0

}

function check_for_packages {

for package in $( ls /var/db/pkg ); {

echo Checking for $package

if ! { test -a /var/db/pkg/$package/+REQUIRED_BY || {
package_name=$( echo $package | sed s/-[^-]\{1,\}$// ); grep -qs
$package_name /etc/pkg_check.conf; } } then

move_cursor_up

echo -n No package depends on $package, would you like to 
delete it? YES/n 

while true; do

read answer

case $answer in

YES )

sudo pkg_delete $package

let deleted_packages = 1

break

;;

n )

echo $package_name  
/etc/pkg_check.conf

break

;;

* )

echo -n 'YES/n '

;;

esac

done

else

move_cursor_up

fi

}

}

while true; do

check_for_packages

if ! let deleted_packages; then

break

fi

let deleted_packages = 0

echo -n \nIt's possible that there are packages which were only used
by any of the deleted ones, would you like to run pkg_check again? y/n


while true; do

read answer

case $answer in

y )

echo

break

;;

n )

break 2

;;

* )

echo -n 'y/n '

;;

esac

done

done



Re: Encrypting files

2006-07-02 Thread Travers Buda
On Sun, 2 Jul 2006 10:57:42 -0600
Chris Kuethe [EMAIL PROTECTED] wrote:

 Bear in mind that if you're serious about keeping plaintext away from
 people who you don't want to see it, this could get quite tricky.

After a bout of homocidal paranoia and time spent wondering just what
to do with several hundred pounds of tin foil...

Crypted data is good. It will stop snooping office workers and common
laptop thieves. But if some organization wants your data, they could
trick it out of you (keyloggers, et al.) Or more crude physical methods.

I once advocated some insane crypto here, which was indeed silly of me.
I have seen the light. svnd is a fantastic _practical and real_
solution. I'm happy that there is such a fantastic OS for me to run...
though I wonder what I will do 60 years down the line. 

Anyhow, thanks for the great OS guys. When can I buy the next release?
=)

Travers



Re: Patent jeopardizes IETF syslog standard

2006-07-02 Thread J.C. Roberts
On Sun, 2 Jul 2006 18:55:46 -0400, Jim Razmus [EMAIL PROTECTED] wrote:

* Nick Guenther [EMAIL PROTECTED] [060702 15:58]:
 On 7/1/06, J.C. Roberts [EMAIL PROTECTED] wrote:
 On Fri, 30 Jun 2006 12:54:14 +0300, Alexey E. Suslikov
 [EMAIL PROTECTED] wrote:
 
 Patent jeopardizes IETF syslog standard. Read here
 http://trends.newsforge.com/article.pl?sid=06/06/28/2320232
 
 This sucks. It's no different than what Cisco did with their HSRP patent
 to try to kill off VRRP. The Huawei IPR claim to the IETF is nearly
 identical to the crap Cisco put out years ago in their IPR claim.
 
 https://datatracker.ietf.org/public/ipr_detail_show.cgi?ipr_id=724
 
 The end result is we have CARP, a patent busting implementation that is
 far better than either of the originals...
 
 Will they never learn?
 
 Anyone in the mood for slog ?
 
 Isn't syslog just like... send random data on port 514 to whoever and
 they record it? How can you possibly patent that? That would be like
 patenting talking.
 
 -Nick
 

I hold the patent on talking.  Watch for a battery of law suits
forthcoming.

Sorry, couldn't resist.  Laugh people.

Jim

Jim,

I really wish I could laugh about it... -I put my time and effort into
getting the VRRP crap settled Cisco (i.e. Robert Bar), so we could just
use a standard protocol -and no, I'm not the only human being around
here that wasted their time and effort on this particular problem.

Think about the time/effort/planing the developers put into making CARP
such that it gets around the Cisco patent...

Don't misunderstand me, CARP is an amazingly innovative and extremely
useful implementation of a redundancy protocol. It's technically better
than HSRP or any of the versions of VRRP but the problems till stands
that it is not an official protocol, which simply means adoption and
inter operability will suffer to some degree.

Frivolous patents have a cost to those who fight them.

jcr


--
Free, Open Source CAD, CAM and EDA Tools
http://www.DesignTools.org



Re: Patent jeopardizes IETF syslog standard

2006-07-02 Thread Theo de Raadt
 Don't misunderstand me, CARP is an amazingly innovative and extremely
 useful implementation of a redundancy protocol. It's technically better
 than HSRP or any of the versions of VRRP but the problems till stands
 that it is not an official protocol, which simply means adoption and
 inter operability will suffer to some degree.

You are wrong.  It is officially free and unencumbered.

Now if you wish to redeclare the word official to mean because
some corporate people playing politics have dictated it be so,
fine, be that way.

But when you do so you are doing two things:

1. Limiting yourself.

2. Giving them the power to do it again.

I suppose that is your choice.  Keep saying that the Man is right.



Re: Patent jeopardizes IETF syslog standard

2006-07-02 Thread J.C. Roberts
On Sun, 2 Jul 2006 15:52:57 -0400, Nick Guenther [EMAIL PROTECTED]
wrote:

On 7/1/06, J.C. Roberts [EMAIL PROTECTED] wrote:
 On Fri, 30 Jun 2006 12:54:14 +0300, Alexey E. Suslikov
 [EMAIL PROTECTED] wrote:

 Patent jeopardizes IETF syslog standard. Read here
 http://trends.newsforge.com/article.pl?sid=06/06/28/2320232

 This sucks. It's no different than what Cisco did with their HSRP patent
 to try to kill off VRRP. The Huawei IPR claim to the IETF is nearly
 identical to the crap Cisco put out years ago in their IPR claim.

 https://datatracker.ietf.org/public/ipr_detail_show.cgi?ipr_id=724

 The end result is we have CARP, a patent busting implementation that is
 far better than either of the originals...

 Will they never learn?

 Anyone in the mood for slog ?

Isn't syslog just like... send random data on port 514 to whoever and
they record it? How can you possibly patent that? That would be like
patenting talking.

-Nick

Basically you are correct about *current* syslog implementations. The
two goals of the syslog standard work being done are (1) defining a
message format and (2) providing a secure transport of said messages.

In short, secure inter-operability of syslog across various systems.

No one knows what's in the sealed patent application at the moment
since it has not been publicly released but considering the guys
claiming the patent have been involved in the syslog standards process,
you can reasonably certain some degree of dishonesty and corruption are
involved.

JCR


--
Free, Open Source CAD, CAM and EDA Tools
http://www.DesignTools.org



NTP timedelta sensor support in snapshot

2006-07-02 Thread Bo Granlund
Hi,

I'm running a snapshot from 29.06.2006 on a soekris net4801 board. I
also recently bought a Globalsat BU-353 USB GPS receiver. When I attach
the receiver to the soekris board the kernel reports the following:

uplcom0 at uhub0 port 1
uplcom0: Prolific Technology Inc. USB-Serial Controller, rev 1.10/3.00, addr 2
ucom0 at uplcom0

I then add the following lines to /etc/ntpd.conf:

sensor *
sensor uplcom0

But when ntpd starts it doesn't say anything about a found sensor. Should
the GPS receiver work with ntpd as it is or does it need a specialized
driver to handle it properly? I'd appreciate any input. I've tried to
search the archives for any hints but I can't seem to find any.

The dmesg of the soekris board is below and also the ntpd.conf I'm using.

OpenBSD 3.9-current (GENERIC) #930: Thu Jun 29 22:21:06 MDT 2006
[EMAIL PROTECTED]:/usr/src/sys/arch/i386/compile/GENERIC
cpu0: Geode(TM) Integrated Processor by National Semi (Geode by NSC 
586-class) 267 MHz
cpu0: FPU,TSC,MSR,CX8,CMOV,MMX
cpu0: TSC disabled
real mem  = 133787648 (130652K)
avail mem = 115347456 (112644K)
using 1658 buffers containing 6791168 bytes (6632K) of memory
mainbus0 (root)
bios0 at mainbus0: AT/286+(00) BIOS, date 20/50/29, BIOS32 rev. 0 @ 0xf7840
pcibios0 at bios0: rev 2.0 @ 0xf/0x1
pcibios0: pcibios_get_intr_routing - function not supported
pcibios0: PCI IRQ Routing information unavailable.
pcibios0: PCI bus #0 is the last bus
bios0: ROM list: 0xc8000/0x9000
cpu0 at mainbus0
pci0 at mainbus0 bus 0: configuration mode 1 (bios)
pchb0 at pci0 dev 0 function 0 Cyrix GXm PCI rev 0x00
sis0 at pci0 dev 6 function 0 NS DP83815 10/100 rev 0x00, DP83816A: irq 10, 
address 00:00:24:c6:66:5c
nsphyter0 at sis0 phy 0: DP83815 10/100 PHY, rev. 1
sis1 at pci0 dev 7 function 0 NS DP83815 10/100 rev 0x00, DP83816A: irq 10, 
address 00:00:24:c6:66:5d
nsphyter1 at sis1 phy 0: DP83815 10/100 PHY, rev. 1
sis2 at pci0 dev 8 function 0 NS DP83815 10/100 rev 0x00, DP83816A: irq 10, 
address 00:00:24:c6:66:5e
nsphyter2 at sis2 phy 0: DP83815 10/100 PHY, rev. 1
gscpcib0 at pci0 dev 18 function 0 NS SC1100 ISA rev 0x00
gpio0 at gscpcib0: 64 pins
NS SC1100 SMI rev 0x00 at pci0 dev 18 function 1 not configured
pciide0 at pci0 dev 18 function 2 NS SCx200 IDE rev 0x01: DMA, channel 0 
wired to compatibility, channel 1 wired to compatibility
wd0 at pciide0 channel 0 drive 1: SILICONSYSTEMS INC 128MB
wd0: 1-sector PIO, LBA, 124MB, 254208 sectors
wd0(pciide0:0:1): using PIO mode 4, DMA mode 2
geodesc0 at pci0 dev 18 function 5 NS SC1100 X-Bus rev 0x00: iid 6 revision 3 
wdstatus 0
ohci0 at pci0 dev 19 function 0 Compaq USB OpenHost rev 0x08: irq 11, version 
1.0, legacy support
usb0 at ohci0: USB revision 1.0
uhub0 at usb0
uhub0: Compaq OHCI root hub, rev 1.00/1.00, addr 1
uhub0: 3 ports with 3 removable, self powered
isa0 at gscpcib0
isadma0 at isa0
pckbc0 at isa0 port 0x60/5
pckbd0 at pckbc0 (kbd slot)
pckbc0: using irq 1 for kbd slot
wskbd0 at pckbd0: console keyboard
pcppi0 at isa0 port 0x61
midi0 at pcppi0: PC speaker
spkr0 at pcppi0
nsclpcsio0 at isa0 port 0x2e/2: NSC PC87366 rev 9: GPIO VLM TMS
gpio1 at nsclpcsio0: 29 pins
gscsio0 at isa0 port 0x15c/2: SC1100 SIO rev 1:
npx0 at isa0 port 0xf0/16: using exception 16
pccom0 at isa0 port 0x3f8/8 irq 4: ns16550a, 16 byte fifo
pccom0: console
pccom1 at isa0 port 0x2f8/8 irq 3: ns16550a, 16 byte fifo
biomask fbe5 netmask ffe5 ttymask ffe7
pctr: no performance counters in CPU
uplcom0 at uhub0 port 1
uplcom0: Prolific Technology Inc. USB-Serial Controller, rev 1.10/3.00, addr 2
ucom0 at uplcom0
dkcsum: wd0 matches BIOS drive 0x80
root on wd0a
rootdev=0x0 rrootdev=0x300 rawdev=0x302
arplookup: unable to enter address for 84.231.224.1
arplookup: unable to enter address for 84.231.224.1
uplcom0: at uhub0 port 1 (addr 2) disconnected
ucom0 detached
uplcom0 detached
uplcom0 at uhub0 port 1
uplcom0: Prolific Technology Inc. USB-Serial Controller, rev 1.10/3.00, addr 2
ucom0 at uplcom0
uplcom0: at uhub0 port 1 (addr 2) disconnected
ucom0 detached
uplcom0 detached
uplcom0 at uhub0 port 1
uplcom0: Prolific Technology Inc. USB-Serial Controller, rev 1.10/3.00, addr 2
ucom0 at uplcom0


And my /etc/ntpd.conf:

# $OpenBSD: ntpd.conf,v 1.7 2004/07/20 17:38:35 henning Exp $
# sample ntpd configuration file, see ntpd.conf(5)

# Addresses to listen on (ntpd does not listen by default)
listen on *

# sync to a single server
#server ntp.example.org

# use a random selection of 8 public stratum 2 servers
# see http://twiki.ntp.org/bin/view/Servers/NTPPoolServers
servers pool.ntp.org

#sensor uplcom0
sensor *
sensor uplcom0



Re: pf isakmpd: NAT through encryption interface?

2006-07-02 Thread Matthew Closson

On Wed, 28 Jun 2006, Stephen Bosch wrote:


Hi, Roy:

Roy Morris wrote:


Yes it does work! I guess I better hold on to these two boxes I have. Seems
they are the only ones that do! lol 
I have

A. clients on each end behind a vpn/pf box
B. enc0 binat from internal client to public IP of other side client
C. /etc/hostname.if alias for the binat IP
D. isakmpd.conf uses public IP (A) for phase 1, and (B internal client nat) 
for phase 2


I've had a closer look at this...

In my case, the other peer expects a private IP on my internal network. Your 
directions involve an alias. Do I need this alias?


Can I not just nat on the encryption interface like so?

nat on $enc_if from $internal_ip to $remote_internal_ip - 
$private_nat_address?


This is really confusing me.

-Stephen-




If you do nat on $enc_if your incoming packets will not match an existing 
IPSEC flow and will never get routed to your enc0 interface in the first place.


man ipsec shows a flow diagram of how packets move in the kernel

-Matt-



Re: NTP timedelta sensor support in snapshot

2006-07-02 Thread Theo de Raadt
 I'm running a snapshot from 29.06.2006 on a soekris net4801 board. I
 also recently bought a Globalsat BU-353 USB GPS receiver. When I attach
 the receiver to the soekris board the kernel reports the following:
 
 uplcom0 at uhub0 port 1
 uplcom0: Prolific Technology Inc. USB-Serial Controller, rev 1.10/3.00, addr 2
 ucom0 at uplcom0
 
 I then add the following lines to /etc/ntpd.conf:
 
 sensor *
 sensor uplcom0
 
 But when ntpd starts it doesn't say anything about a found sensor. Should
 the GPS receiver work with ntpd as it is or does it need a specialized
 driver to handle it properly? I'd appreciate any input. I've tried to
 search the archives for any hints but I can't seem to find any.

There are pieces you need which are not commited yet.  For instance, to
turn a serial port into a ntp time sensor.  Wait a bit longer please.