Taller de Licitaciones Públicas para la Ley de Adquisiciones, Arrendamientos y Servicios749859

2012-06-25 Thread Lic. Paola Hernandez
749859
[IMAGE]
Taller de Licitaciones Públicas para la Ley de Adquisiciones,
Arrendamientos y Servicios
28 de Junio, Cd. de México.
Un taller totalmente práctico guiado por un experto.
Optimice sus procesos y ahorre dinero con esta práctica herramienta!
¡Reciba la información completa, Inscríbase y Capacítese!
Por favor responda este e-mail con los datos siguientes.

Empresa, Nombre, Teléfono, Email, Número de Interesados

En breve recibirá temario, reseña de expositor y tarifas.
Si lo prefiere comuníquese a los teléfonos donde con gusto uno de
nuestros ejecutivos le atenderá.
Teléfonos: (0133) 8851-2365, (0133) 8851-2741 con más de 10 líneas.
Pms Capacitación Efectiva de México es una empresa Registrada ante la
STPS
Trabajamos con expertos en la materia para poder brindar herramientas
tácticas, vanguardistas y de fácil aplicación.
Síguenos en Twitter@pmscapacitacion o bien en Facebook PMS de México
Tip del día! Planea: Evita los problemas de “vivir al momento” y crear
estrategias de último momento. Planea tus objetivos, elige un rumbo y
mantente. Anticipa posibles causales de emergencia y diseña planes de
contingencia previos que permitan conocer rutas a seguir. Esto ayudará a
crear metas en su compañía, compartirlas con su equipo y anticipar
obstáculos.

Copyright (C) 2011, PMS Capacitación Efectiva de México  S.C. Derechos
Reservados.
E-Mail MARKETING SERVICE POWERED BY MEDIAMKTOOLS.

Este Mensaje ha sido enviado a misc@openbsd.org como usuario de Pms de
México o bien un usuario le refirió para recibir este boletín.
Como usuario de Pms de México, en este acto autoriza de manera expresa
que Pms de México le puede contactar vía correo electrónico u otros
medios.
ALTO, si en esta ocasión la información recibida no fue de su interés
pero desea recibir información personalizada en relación a otros temas
favor de indicarlo.
Si usted ha recibido este mensaje por error, haga caso omiso de el y de
antemano una sincera disculpa por la molestia, reporte su cuenta
respondiendo este correo con el subject BAJALICITA
Unsubscribe to this mailing list, reply a blank message with the subject
UNSUBSCRIBE BAJALICITA
Tenga en cuenta que la gestión de nuestras bases de datos es de suma
importancia para nosotros y no es intención de la empresa la
inconformidad del receptor, nuestra intención es promover herramientas de
utilidad para el

[demime 1.01d removed an attachment of type image/jpeg which had a name of 
imagelicitaciones001.jpg]



after upgrade to current(25-06-2012), can not login ssh

2012-06-25 Thread johnw
I attached the server side error message (photo)
please help, thank you.

ssh - 192.168.168.1
OpenSSH_6.0p1 Debian-2, OpenSSL 1.0.1c 10 May 2012
debug1: Reading configuration data /home/john/.ssh/config
debug1: /home/john/.ssh/config line 1: Applying options for 192.168.168.1
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: /etc/ssh/ssh_config line 19: Applying options for *
debug2: ssh_connect: needpriv 0
debug1: Connecting to 192.168.168.1 [192.168.168.1] port 22.
debug1: Connection established.
debug3: Incorrect RSA1 identifier
debug3: Could not load /home/john/.ssh/kdc.id_rsa as a RSA1 public key
debug1: identity file /home/john/.ssh/kdc.id_rsa type 1
debug1: Checking blacklist file /usr/share/ssh/blacklist.RSA-2048
debug1: Checking blacklist file /etc/ssh/blacklist.RSA-2048
debug1: identity file /home/john/.ssh/kdc.id_rsa-cert type -1
debug1: Remote protocol version 2.0, remote software version OpenSSH_6.0
debug1: match: OpenSSH_6.0 pat OpenSSH*
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_6.0p1 Debian-2
debug2: fd 3 setting O_NONBLOCK
debug3: load_hostkeys: loading entries for host 192.168.168.1 from file
/home/john/.ssh/known_hosts
debug3: load_hostkeys: found key type ECDSA in file
/home/john/.ssh/known_hosts:2
debug3: load_hostkeys: loaded 1 keys
debug3: order_hostkeyalgs: prefer hostkeyalgs:
ecdsa-sha2-nistp256-cert-...@openssh.com,
ecdsa-sha2-nistp384-cert-...@openssh.com,
ecdsa-sha2-nistp521-cert-...@openssh.com
,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug2: kex_parse_kexinit:
ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ecdsa-sha2-nistp256-cert-...@openssh.com,
ecdsa-sha2-nistp384-cert-...@openssh.com,
ecdsa-sha2-nistp521-cert-...@openssh.com
,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,
ssh-rsa-cert-...@openssh.com,ssh-dss-cert-...@openssh.com,
ssh-rsa-cert-...@openssh.com,ssh-dss-cert-...@openssh.com,ssh-rsa,ssh-dss
debug2: kex_parse_kexinit:
aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,
rijndael-...@lysator.liu.se
debug2: kex_parse_kexinit:
aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,
rijndael-...@lysator.liu.se
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac...@openssh.com
,hmac-sha2-256,hmac-sha2-256-96,hmac-sha2-512,hmac-sha2-512-96,hmac-ripemd160,
hmac-ripemd...@openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac...@openssh.com
,hmac-sha2-256,hmac-sha2-256-96,hmac-sha2-512,hmac-sha2-512-96,hmac-ripemd160,
hmac-ripemd...@openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,z...@openssh.com,zlib
debug2: kex_parse_kexinit: none,z...@openssh.com,zlib
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: kex_parse_kexinit:
ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss,ecdsa-sha2-nistp256
debug2: kex_parse_kexinit:
aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,
rijndael-...@lysator.liu.se
debug2: kex_parse_kexinit:
aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,
rijndael-...@lysator.liu.se
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac...@openssh.com
,hmac-sha2-256,hmac-sha2-256-96,hmac-sha2-512,hmac-sha2-512-96,hmac-ripemd160,
hmac-ripemd...@openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac...@openssh.com
,hmac-sha2-256,hmac-sha2-256-96,hmac-sha2-512,hmac-sha2-512-96,hmac-ripemd160,
hmac-ripemd...@openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,z...@openssh.com
debug2: kex_parse_kexinit: none,z...@openssh.com
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: mac_setup: found hmac-md5
debug1: kex: server-client aes128-ctr hmac-md5 none
debug2: mac_setup: found hmac-md5
debug1: kex: client-server aes128-ctr hmac-md5 none
debug1: sending SSH2_MSG_KEX_ECDH_INIT
debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
debug1: Server host key: ECDSA
ee:e2:6a:0d:b9:a0:31:15:14:35:17:7b:b2:c6:f8:ba
debug3: load_hostkeys: loading entries for host 192.168.168.1 from file
/home/john/.ssh/known_hosts
debug3: load_hostkeys: found key type ECDSA in file

Re: after upgrade to current(25-06-2012), can not login ssh

2012-06-25 Thread johnw
I upload the photo to here
http://www1.picturepush.com/photo/a/8571544/640/8571544.jpg

2012/6/25 johnw johnw.m...@gmail.com

 I attached the server side error message (photo)
 please help, thank you.

 ssh - 192.168.168.1
 OpenSSH_6.0p1 Debian-2, OpenSSL 1.0.1c 10 May 2012
 debug1: Reading configuration data /home/john/.ssh/config
 debug1: /home/john/.ssh/config line 1: Applying options for 192.168.168.1
 debug1: Reading configuration data /etc/ssh/ssh_config
 debug1: /etc/ssh/ssh_config line 19: Applying options for *
 debug2: ssh_connect: needpriv 0
 debug1: Connecting to 192.168.168.1 [192.168.168.1] port 22.
 debug1: Connection established.
 debug3: Incorrect RSA1 identifier
 debug3: Could not load /home/john/.ssh/kdc.id_rsa as a RSA1 public key
 debug1: identity file /home/john/.ssh/kdc.id_rsa type 1
 debug1: Checking blacklist file /usr/share/ssh/blacklist.RSA-2048
 debug1: Checking blacklist file /etc/ssh/blacklist.RSA-2048
 debug1: identity file /home/john/.ssh/kdc.id_rsa-cert type -1
 debug1: Remote protocol version 2.0, remote software version OpenSSH_6.0
 debug1: match: OpenSSH_6.0 pat OpenSSH*
 debug1: Enabling compatibility mode for protocol 2.0
 debug1: Local version string SSH-2.0-OpenSSH_6.0p1 Debian-2
 debug2: fd 3 setting O_NONBLOCK
 debug3: load_hostkeys: loading entries for host 192.168.168.1 from file
 /home/john/.ssh/known_hosts
 debug3: load_hostkeys: found key type ECDSA in file
 /home/john/.ssh/known_hosts:2
 debug3: load_hostkeys: loaded 1 keys
 debug3: order_hostkeyalgs: prefer hostkeyalgs:
 ecdsa-sha2-nistp256-cert-...@openssh.com,
 ecdsa-sha2-nistp384-cert-...@openssh.com,
 ecdsa-sha2-nistp521-cert-...@openssh.com
 ,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521
 debug1: SSH2_MSG_KEXINIT sent
 debug1: SSH2_MSG_KEXINIT received
 debug2: kex_parse_kexinit:
 ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
 debug2: kex_parse_kexinit: ecdsa-sha2-nistp256-cert-...@openssh.com,
 ecdsa-sha2-nistp384-cert-...@openssh.com,
 ecdsa-sha2-nistp521-cert-...@openssh.com
 ,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,
 ssh-rsa-cert-...@openssh.com,ssh-dss-cert-...@openssh.com,
 ssh-rsa-cert-...@openssh.com,ssh-dss-cert-...@openssh.com,ssh-rsa,ssh-dss
 debug2: kex_parse_kexinit:
 aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,
 rijndael-...@lysator.liu.se
 debug2: kex_parse_kexinit:
 aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,
 rijndael-...@lysator.liu.se
 debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac...@openssh.com
 ,hmac-sha2-256,hmac-sha2-256-96,hmac-sha2-512,hmac-sha2-512-96,hmac-ripemd160,
 hmac-ripemd...@openssh.com,hmac-sha1-96,hmac-md5-96
 debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac...@openssh.com
 ,hmac-sha2-256,hmac-sha2-256-96,hmac-sha2-512,hmac-sha2-512-96,hmac-ripemd160,
 hmac-ripemd...@openssh.com,hmac-sha1-96,hmac-md5-96
 debug2: kex_parse_kexinit: none,z...@openssh.com,zlib
 debug2: kex_parse_kexinit: none,z...@openssh.com,zlib
 debug2: kex_parse_kexinit:
 debug2: kex_parse_kexinit:
 debug2: kex_parse_kexinit: first_kex_follows 0
 debug2: kex_parse_kexinit: reserved 0
 debug2: kex_parse_kexinit:
 ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
 debug2: kex_parse_kexinit: ssh-rsa,ssh-dss,ecdsa-sha2-nistp256
 debug2: kex_parse_kexinit:
 aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,
 rijndael-...@lysator.liu.se
 debug2: kex_parse_kexinit:
 aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,
 rijndael-...@lysator.liu.se
 debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac...@openssh.com
 ,hmac-sha2-256,hmac-sha2-256-96,hmac-sha2-512,hmac-sha2-512-96,hmac-ripemd160,
 hmac-ripemd...@openssh.com,hmac-sha1-96,hmac-md5-96
 debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac...@openssh.com
 ,hmac-sha2-256,hmac-sha2-256-96,hmac-sha2-512,hmac-sha2-512-96,hmac-ripemd160,
 hmac-ripemd...@openssh.com,hmac-sha1-96,hmac-md5-96
 debug2: kex_parse_kexinit: none,z...@openssh.com
 debug2: kex_parse_kexinit: none,z...@openssh.com
 debug2: kex_parse_kexinit:
 debug2: kex_parse_kexinit:
 debug2: kex_parse_kexinit: first_kex_follows 0
 debug2: kex_parse_kexinit: reserved 0
 debug2: mac_setup: found hmac-md5
 debug1: kex: server-client aes128-ctr hmac-md5 none
 debug2: mac_setup: found hmac-md5
 debug1: kex: client-server aes128-ctr hmac-md5 none
 debug1: sending SSH2_MSG_KEX_ECDH_INIT
 debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
 debug1: Server host key: ECDSA
 

question_about_OpenBSD_on_ADSL_modems/routers

2012-06-25 Thread soko.tica
Hallo list,

I ask for information about ADSL modems/routers (preferably low-cost)
on which OpenBSD can run.

I know there was a possibility to get Traverse Technologies Viking PCI
ADSL card on any box, but I have learned recently it is out of
production.

Thanking you in advance.



Recording from azalia does not work

2012-06-25 Thread Gregor Best
Hi people,

I'm trying to get recording from the mic input of my laptop working, but have
not have success so far. I'm using a thinkpad laptop
with an azalia device and a pretty run of the mill headset, attached to
headphone out and microphone in. The headset itself works
fine on other machines and the microphone input and headphone output of the
laptop work fine hardware-wise (i.e. tested with another
operating system). On OpenBSD however, the mic input remains silent. Files
recorded with aucat -o foo.wav remain silent for the
entire recording duration, as if the mic was somehow muted. Below is the
output of mixerctl:

outputs.spkr_source=dac-0:1
outputs.spkr_mute=on
outputs.spkr=125,125
outputs.spkr_eapd=on
outputs.hp_source=dac-0:1
outputs.hp_mute=off
outputs.hp=155,155
outputs.hp_dir=output
outputs.hp_boost=off
outputs.mic_dir=input-vr80
inputs.beep_mute=off
inputs.beep=108
inputs.mix_source=dac-0:1,mic,hp
inputs.mix_dac-0:1=125,125
inputs.mix_mic=215,215
inputs.mix_hp=125,125
record.adc-0:1_source=mic
record.adc-0:1_mute=off
record.adc-0:1=253,253
outputs.hp_sense=plugged
outputs.mic_sense=plugged
outputs.spkr_muters=hp
outputs.master=157,157
outputs.master.mute=off
outputs.master.slaves=spkr,hp
record.volume=255,255
record.volume.mute=off
record.volume.slaves=adc-0:1

As you can see, all recording related devices are at full volume and no device
is muted except for the built-in speakers. Is
recording on azalia devices simply not supported or am I missing something
really obvious here?

--
Gregor Best

[demime 1.01d removed an attachment of type application/pgp-signature]



Re: question_about_OpenBSD_on_ADSL_modems/routers

2012-06-25 Thread Tomas Bodzar
On Mon, Jun 25, 2012 at 10:47 AM, soko.tica soko.t...@gmail.com wrote:
 Hallo list,

 I ask for information about ADSL modems/routers (preferably low-cost)
 on which OpenBSD can run.


Are you looking for ADSL modem/router to which you want to connect
OpenBSD system or do you want to build ADSL modem on OpenBSD?

 I know there was a possibility to get Traverse Technologies Viking PCI
 ADSL card on any box, but I have learned recently it is out of
 production.

 Thanking you in advance.



Re: after upgrade to current(25-06-2012), can not login ssh

2012-06-25 Thread johnw
The sshd_config like this:
ListenAddress 192.168.168.1
PermitRootLogin yes
PubkeyAuthentication yes
AuthorizedKeysFile .ssh/authorized_keys
PasswordAuthentication yes
UsePrivilegeSeparation sandbox
Subsystem sftp /usr/libexec/sftp-server

2012/6/25 johnw johnw.m...@gmail.com

 I attached the server side error message (photo)
 please help, thank you.

 ssh - 192.168.168.1
 OpenSSH_6.0p1 Debian-2, OpenSSL 1.0.1c 10 May 2012
 debug1: Reading configuration data /home/john/.ssh/config
 debug1: /home/john/.ssh/config line 1: Applying options for 192.168.168.1
 debug1: Reading configuration data /etc/ssh/ssh_config
 debug1: /etc/ssh/ssh_config line 19: Applying options for *
 debug2: ssh_connect: needpriv 0
 debug1: Connecting to 192.168.168.1 [192.168.168.1] port 22.
 debug1: Connection established.
 debug3: Incorrect RSA1 identifier
 debug3: Could not load /home/john/.ssh/kdc.id_rsa as a RSA1 public key
 debug1: identity file /home/john/.ssh/kdc.id_rsa type 1
 debug1: Checking blacklist file /usr/share/ssh/blacklist.RSA-2048
 debug1: Checking blacklist file /etc/ssh/blacklist.RSA-2048
 debug1: identity file /home/john/.ssh/kdc.id_rsa-cert type -1
 debug1: Remote protocol version 2.0, remote software version OpenSSH_6.0
 debug1: match: OpenSSH_6.0 pat OpenSSH*
 debug1: Enabling compatibility mode for protocol 2.0
 debug1: Local version string SSH-2.0-OpenSSH_6.0p1 Debian-2
 debug2: fd 3 setting O_NONBLOCK
 debug3: load_hostkeys: loading entries for host 192.168.168.1 from file
 /home/john/.ssh/known_hosts
 debug3: load_hostkeys: found key type ECDSA in file
 /home/john/.ssh/known_hosts:2
 debug3: load_hostkeys: loaded 1 keys
 debug3: order_hostkeyalgs: prefer hostkeyalgs:
 ecdsa-sha2-nistp256-cert-...@openssh.com,
 ecdsa-sha2-nistp384-cert-...@openssh.com,
 ecdsa-sha2-nistp521-cert-...@openssh.com
 ,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521
 debug1: SSH2_MSG_KEXINIT sent
 debug1: SSH2_MSG_KEXINIT received
 debug2: kex_parse_kexinit:
 ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
 debug2: kex_parse_kexinit: ecdsa-sha2-nistp256-cert-...@openssh.com,
 ecdsa-sha2-nistp384-cert-...@openssh.com,
 ecdsa-sha2-nistp521-cert-...@openssh.com
 ,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,
 ssh-rsa-cert-...@openssh.com,ssh-dss-cert-...@openssh.com,
 ssh-rsa-cert-...@openssh.com,ssh-dss-cert-...@openssh.com,ssh-rsa,ssh-dss
 debug2: kex_parse_kexinit:
 aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,
 rijndael-...@lysator.liu.se
 debug2: kex_parse_kexinit:
 aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,
 rijndael-...@lysator.liu.se
 debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac...@openssh.com
 ,hmac-sha2-256,hmac-sha2-256-96,hmac-sha2-512,hmac-sha2-512-96,hmac-ripemd160,
 hmac-ripemd...@openssh.com,hmac-sha1-96,hmac-md5-96
 debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac...@openssh.com
 ,hmac-sha2-256,hmac-sha2-256-96,hmac-sha2-512,hmac-sha2-512-96,hmac-ripemd160,
 hmac-ripemd...@openssh.com,hmac-sha1-96,hmac-md5-96
 debug2: kex_parse_kexinit: none,z...@openssh.com,zlib
 debug2: kex_parse_kexinit: none,z...@openssh.com,zlib
 debug2: kex_parse_kexinit:
 debug2: kex_parse_kexinit:
 debug2: kex_parse_kexinit: first_kex_follows 0
 debug2: kex_parse_kexinit: reserved 0
 debug2: kex_parse_kexinit:
 ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
 debug2: kex_parse_kexinit: ssh-rsa,ssh-dss,ecdsa-sha2-nistp256
 debug2: kex_parse_kexinit:
 aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,
 rijndael-...@lysator.liu.se
 debug2: kex_parse_kexinit:
 aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,
 rijndael-...@lysator.liu.se
 debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac...@openssh.com
 ,hmac-sha2-256,hmac-sha2-256-96,hmac-sha2-512,hmac-sha2-512-96,hmac-ripemd160,
 hmac-ripemd...@openssh.com,hmac-sha1-96,hmac-md5-96
 debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac...@openssh.com
 ,hmac-sha2-256,hmac-sha2-256-96,hmac-sha2-512,hmac-sha2-512-96,hmac-ripemd160,
 hmac-ripemd...@openssh.com,hmac-sha1-96,hmac-md5-96
 debug2: kex_parse_kexinit: none,z...@openssh.com
 debug2: kex_parse_kexinit: none,z...@openssh.com
 debug2: kex_parse_kexinit:
 debug2: kex_parse_kexinit:
 debug2: kex_parse_kexinit: first_kex_follows 0
 debug2: kex_parse_kexinit: reserved 0
 debug2: mac_setup: found hmac-md5
 debug1: kex: server-client aes128-ctr hmac-md5 none
 debug2: mac_setup: found hmac-md5
 debug1: kex: 

Re: question_about_OpenBSD_on_ADSL_modems/routers

2012-06-25 Thread Kaya Saman
I think this is what you might be looking for:

http://www.rocksolidelectronics.com/pages/products.php

Not sure where you are based but if in Europe then Linitx can help
you is in the UK however.

http://linitx.com/viewcategory.php?catid=148


Regards,


Kaya


On Mon, Jun 25, 2012 at 9:47 AM, soko.tica soko.t...@gmail.com wrote:
 Hallo list,

 I ask for information about ADSL modems/routers (preferably low-cost)
 on which OpenBSD can run.

 I know there was a possibility to get Traverse Technologies Viking PCI
 ADSL card on any box, but I have learned recently it is out of
 production.

 Thanking you in advance.



Re: Something other than getty/login on console?

2012-06-25 Thread MERIGHI Marcus
Hello David, 

da...@elven.com.au (David Diggles), 2012.06.25 (Mon) 07:10 (CEST):
 Thanks Marcus!  I have been sidetracked with a few things,
 but will give this technique a try soon.

please do not think I invented that wheel! See misc archives instead...

 I take it dostuff.sh is where I could put something like

yes.

 #!/bin/sh

I recommend the use of ``#!/bin/sh -e'', see ksh(1). 

 while [ ! ]; do

I use ``while :; do'' in such cases; BUT: please read init(8), it will
respawn your process anyways; read DIAGNOSTICS section carefully,
especially the ``getty repeating too quickly'' part.

Bye, Marcus

 /usr/local/bin/ttyplay kickassci.demo
 done

 On Fri, Jun 15, 2012 at 09:36:43AM +0200, MERIGHI Marcus wrote:
  da...@elven.com.au (David Diggles), 2012.06.15 (Fri) 00:20 (CEST):
   I want the default login console to run something like
   /usr/games/worms -n100
   or
   rsh host /opt/local/bin/xaos -driver aa -autopilot
  
  the way I do it...
  
  $ grep ttyC0 /etc/ttys
  ttyC0   /usr/local/libexec/getty.sh vt220 on 
  
  $ ls -al /usr/local/libexec/getty.sh
  -rwxr-xr-x  1 root  wheel  210 Feb 15 19:01 /usr/local/libexec/getty.sh
  
  $ cat /usr/local/libexec/getty.sh 
  #!/bin/ksh -e
  TERM=vt220 /usr/local/sbin/dostuff.sh  /dev/$1  /dev/$1
  
  $ ls -la /usr/local/sbin/dostuff.sh 
  -rwxr-xr-x  1 root  wheel  -  2.2K Feb 18 11:28 /usr/local/sbin/dostuff.sh
  
  dostuff.sh has stdin/stdout connected to console, now.
  
  Bye, Marcus
  
  (nice project, btw!)
 
 !DSPAM:4fe7f2c2455333111015!



Re: after upgrade to current(25-06-2012), can not login ssh

2012-06-25 Thread johnw
I change UsePrivilegeSeparation sandbox to UsePrivilegeSeparation yes,
then i can login now.
maybe the sandbox feature has something broken.
thank you.

2012/6/25 Fred Crowson fred.crow...@gmail.com

 On 25 June 2012 10:03, johnw johnw.m...@gmail.com wrote:
  The sshd_config like this:
  ListenAddress 192.168.168.1
  PermitRootLogin yes
  PubkeyAuthentication yes
  AuthorizedKeysFile .ssh/authorized_keys
  PasswordAuthentication yes
  UsePrivilegeSeparation sandbox
  Subsystem sftp /usr/libexec/sftp-server

 Is pf enabled on the server?
 Have you allowed ssh connections in pf?

 Broken pipes hint at a network error.

 hth

 Fred



Re: hello I have question for openssh !

2012-06-25 Thread Tomasz Marszal
 Actually it doesn't.  You're talking about different things: he's
 asking about RSA key exchange (ie how the client and server arrive at
 a shared secret, ie http://www.ietf.org/rfc/rfc4432.txt), but you're
 talking about RSA host key algorithms (ie how the server proves it is
 who you think it is, which happens latter in the connection).
Does it prevent man in the middle attack ?

 
 Here's the list of supported key exchange algorithms (from
 usr.bin/ssh/myproposal.h):
 
 #define KEX_DEFAULT_KEX \
 ecdh-sha2-nistp256, \
 ecdh-sha2-nistp384, \
 ecdh-sha2-nistp521, \
 diffie-hellman-group-exchange-sha256, \
 diffie-hellman-group-exchange-sha1, \
 diffie-hellman-group14-sha1, \
 diffie-hellman-group1-sha1
 
 so no rsa1024-sha1 or rsa2048-sha256.
 
 To the original question:
  - Putty implements the client side, which makes me wonder what they
 tested against.  Ben Harris mentioned that his initial implementation
 used OpenSSH.  I don't know if the code is available anywhere, but it
 might be.
  - the threads on the ietf working group lists mentioned der Mouse
 implemented it, so it's probably in
 http://sparkle.rodents-montreal.org/mouseware/local-src/moussh/moussh/.
 
 On a related topic: I added an openssh specs page recently
 (http://www.openssh.com/specs.html) which should be the authoritative
 reference for what is supported.  Corrections are welcome (but before
 someone says RFC6594, note that I'm trying to keep it accurate for
 the most recent release).
 
 --
 Darren Tucker (dtucker at zip.com.au)
 GPG key 8FF4FA69 / D9A3 86E9 7EEE AF4B B2D4  37C9 C982 80C7 8FF4 FA69
     Good judgement comes with experience. Unfortunately, the experience
 usually comes from bad judgement.



Re: after upgrade to current(25-06-2012), can not login ssh

2012-06-25 Thread Fred Crowson
On 25 June 2012 12:41, johnw johnw.m...@gmail.com wrote:
 I change UsePrivilegeSeparation sandbox to UsePrivilegeSeparation yes,
 then i can login now.
 maybe the sandbox feature has something broken.
 thank you.

The following article gives some more information on the sandbox function:

http://www.undeadly.org/cgi?action=articlesid=20110721123003

hth

Fred



Re: ipsec tunnel speeds

2012-06-25 Thread Mark Romer
Great question Ted
Does anyone know the answer?
Thanks Mark
On Jun 22, 2012 12:58 PM, Ted Unangst t...@tedunangst.com wrote:

 On Fri, Jun 22, 2012 at 12:52, Ryan McBride wrote:

  550Mb/s with aes-128-gcm (requires AES-NI and amd64) on
  hw.model=Intel(R) Xeon(R) CPU E5649 @ 2.53GHz
  hw.vendor=HP
  hw.product=ProLiant DL360 G7

 what's the reason aes-128-gcm requires amd64?  we can't add that code
 to i386?



PF: clock upd packets that allready have a state

2012-06-25 Thread Matthias Cramer
Hi

From time to time I have some attacks to my SIP PBX. I like to block them on
my OpenBSD
box which stands in front of it. The problem I'm facing is that the attackers
IP has already
a state in the state table and the block rule I insert simply does nothing.

In the state table I see the following:

all udp my_ip:5060 - attacker_ip:5231   MULTIPLE:MULTIPLE
all udp attacker_ip:5231 - my_ip:5060   MULTIPLE:MULTIPLE

in /etc/pf.conf at the top I have the following

table badguys {attacker_ip}

block out quick to {badguys}
block in quick from {badguys}

After clearing all states with pfctl -F states the connection is blocked.

Is there a way to:
 - clear a single state?
 - to block a packet even with a established state ?

Regards

  Matthias

--
Matthias Cramer, Erachfeldstrasse 1b, CH-8180 Bülach
http://www.freestone.net
GnuPG 1024D/2D208250 = DBC6 65B6 7083 1029 781E  3959 B62F DF1C 2D20 8250

[demime 1.01d removed an attachment of type application/pgp-signature which had 
a name of signature.asc]



Re: PF: clock upd packets that allready have a state

2012-06-25 Thread Johan Fredin
On 25 jun 2012, at 15:36, Matthias Cramer wrote:

 After clearing all states with pfctl -F states the connection is blocked.
 
 Is there a way to:
 - clear a single state?
 - to block a packet even with a established state ?

Hi Matthias,

The pfctl -K/-k options allow you to kill specific state entries.

/Johan



Re: PF: block upd packets that allready have a state

2012-06-25 Thread Matthias Cramer
Hi Marios

On 25/06/12 15:58, Marios Makassikis wrote:
 On 25 June 2012 15:36, Matthias Cramer cra...@freestone.net wrote:
 Hi


 Hi,

 From time to time I have some attacks to my SIP PBX. I like to block them
on
 my OpenBSD
 box which stands in front of it. The problem I'm facing is that the
attackers
 IP has already
 a state in the state table and the block rule I insert simply does
nothing.

 In the state table I see the following:

 all udp my_ip:5060 - attacker_ip:5231   MULTIPLE:MULTIPLE
 all udp attacker_ip:5231 - my_ip:5060   MULTIPLE:MULTIPLE

 in /etc/pf.conf at the top I have the following

 table badguys {attacker_ip}

 block out quick to {badguys}
 block in quick from {badguys}

 After clearing all states with pfctl -F states the connection is blocked.

 Is there a way to:
  - clear a single state?
 This will remove all states associated with attacker_ip:

 pfctl -k attacker_ip

Superb.

 If you want to remove only a given state, you can do so by specifying a
state id
 rather than a IP address.
 You can find out about the state IDs with pfctl -vvss

  - to block a packet even with a established state ?


 How are you detecting attackers in your current setup ?

At the moment by hand ... I know that is not acceptable ...

 I would consider having PF rate-limit connections to your SIP PBX, and
 add any host
 that goes over the limit to your badguys table.
 An example is described here:
http://home.nuug.no/~peter/pf/en/bruteforce.html

I saw this. But the problem is, the attacker allways comes with the same
IP/Port Combo
so the is allways the same session for pf. So this method does not work!

Is there a way to so something simmilar by packets per second ?

Regards

  Matthias

--
Matthias Cramer, Erachfeldstrasse 1b, CH-8180 Bülach
http://www.freestone.net
GnuPG 1024D/2D208250 = DBC6 65B6 7083 1029 781E  3959 B62F DF1C 2D20 8250

[demime 1.01d removed an attachment of type application/pgp-signature which had 
a name of signature.asc]



Re: question_about_OpenBSD_on_ADSL_modems/routers

2012-06-25 Thread soko.tica
Thanks for your replies Tomas and Kaya.

I am looking for a device that will be used as an ADSLmodem/router on
which I want to build OpenBSD. I have been being connected from
OpenBSD boxes through an ordinary ADSL modem since 4.3.

I am not sure if the RockSolid cards are supported by OpenBSD. Can
anyone confirm they are?

Yes, I am in Europe (non-EU).

Thanks in advance for your replies.

On 6/25/12, Tomas Bodzar tomas.bod...@gmail.com wrote:
 On Mon, Jun 25, 2012 at 10:47 AM, soko.tica soko.t...@gmail.com wrote:
 Hallo list,

 I ask for information about ADSL modems/routers (preferably low-cost)
 on which OpenBSD can run.


 Are you looking for ADSL modem/router to which you want to connect
 OpenBSD system or do you want to build ADSL modem on OpenBSD?

 I know there was a possibility to get Traverse Technologies Viking PCI
 ADSL card on any box, but I have learned recently it is out of
 production.

 Thanking you in advance.



Re: question_about_OpenBSD_on_ADSL_modems/routers

2012-06-25 Thread Zafer Daştan

25.06.2012 18:03 tarihinde, soko.tica yazdı:

...



I am not sure if the RockSolid cards are supported by OpenBSD. Can
anyone confirm they are?
...

Single port modem works fine, it seems to OS as a realtech ethernet.

-zafer



Re: question_about_OpenBSD_on_ADSL_modems/routers

2012-06-25 Thread Martin Schröder
2012/6/25 soko.tica soko.t...@gmail.com:
 Yes, I am in Europe (non-EU).

You should check with your telco if the modem supports your ADSL.

Best
   Martin



Re: question_about_OpenBSD_on_ADSL_modems/routers

2012-06-25 Thread Brian W.
I have an openbsd box plugged into a switch with other things that then
connects to a dsl modem, no problem.
On Jun 25, 2012 8:15 AM, Zafer Daştan z...@z-sistem.com wrote:

 25.06.2012 18:03 tarihinde, soko.tica yazdı:

 ...



 I am not sure if the RockSolid cards are supported by OpenBSD. Can
 anyone confirm they are?
 ...

 Single port modem works fine, it seems to OS as a realtech ethernet.

 -zafer



Re: PF: block upd packets that allready have a state

2012-06-25 Thread Marios Makassikis
On 25 June 2012 16:12, Matthias Cramer cra...@freestone.net wrote:
 Hi Marios

Hi Matthias,

 On 25/06/12 15:58, Marios Makassikis wrote:
 On 25 June 2012 15:36, Matthias Cramer cra...@freestone.net wrote:


  - to block a packet even with a established state ?


 How are you detecting attackers in your current setup ?

 At the moment by hand ... I know that is not acceptable ...

 I would consider having PF rate-limit connections to your SIP PBX, and
 add any host
 that goes over the limit to your badguys table.
 An example is described here:
http://home.nuug.no/~peter/pf/en/bruteforce.html

 I saw this. But the problem is, the attacker allways comes with the same
IP/Port Combo
 so the is allways the same session for pf. So this method does not work!
My understanding of this, is that the fact that PF creates a state,
and uses it for the other
communications with the attacker. Considering there is no other state
created, it will never
reach the limit to be added to the table.

If that is the case, the question remains: how do you detect the
attack ? Is the PBX rendered
unusable for other clients ?

I think a more accurate description of the attack would be helpful to
find a solution to the problem.

 Is there a way to so something simmilar by packets per second ?

packets per second sounds like a unit for bandwidth, which would
suggest using something
like ALTQ to throttle traffic. The problem remains though, since you
may end up throttling all
connections to your PBX, including legitimate clients.

 Regards

  Matthias

 --
 Matthias Cramer, Erachfeldstrasse 1b, CH-8180 Bülach
 http://www.freestone.net
 GnuPG 1024D/2D208250 = DBC6 65B6 7083 1029 781E  3959 B62F DF1C 2D20 8250



Re: PF: block upd packets that allready have a state

2012-06-25 Thread Matthias Cramer
Hi Marios

On 25/06/12 18:50, Marios Makassikis wrote:
 I would consider having PF rate-limit connections to your SIP PBX, and
 add any host
 that goes over the limit to your badguys table.
 An example is described here:
 http://home.nuug.no/~peter/pf/en/bruteforce.html

 I saw this. But the problem is, the attacker allways comes with the same
 IP/Port Combo
 so the is allways the same session for pf. So this method does not work!
 My understanding of this, is that the fact that PF creates a state,
 and uses it for the other
 communications with the attacker. Considering there is no other state
 created, it will never
 reach the limit to be added to the table.

Exactly that's the case.

 If that is the case, the question remains: how do you detect the
 attack ? Is the PBX rendered
 unusable for other clients ?

Yes, It becomes more or less unusable...

 I think a more accurate description of the attack would be helpful to
 find a solution to the problem.

I now have a script, which watches the PBX for unsuccessful authentication
and
adds the IP, if there are 10 unsuccessful tries in 5 seconds, via ssh to the
table on
the OpenBSD box, that solves all my problems greatly.


 Is there a way to so something simmilar by packets per second ?

 packets per second sounds like a unit for bandwidth, which would
 suggest using something
 like ALTQ to throttle traffic. The problem remains though, since you
 may end up throttling all
 connections to your PBX, including legitimate clients.

I considered ALTQ, but that is in my opinion not a very nice way to solve this
problem.

Regards

  Mattthias

--
Matthias Cramer, Erachfeldstrasse 1b, CH-8180 Bülach, Switzerland
http://www.freestone.net
GnuPG 1024D/2D208250 = DBC6 65B6 7083 1029 781E  3959 B62F DF1C 2D20 8250

[demime 1.01d removed an attachment of type application/pgp-signature which had 
a name of signature.asc]



HUKUKI BILGILENDIRME -1İSTANBUL PROJESİ - ISPARTAKULE (TULİP TURKUAZ PROJESİ) ( www.biristanbul.com )

2012-06-25 Thread HUKUK SERVISI
1ÝSTANBUL PROJESÝ - ISPARTAKULE  ( www.biristanbul.com )

4822 SAYILI KANUNLA DEÐÝÞÝK 4077 SAYILI TÜKETÝCÝNÝN KORUNMASI HAKKINDA KANUN
ÝKÝNCÝ KISIM

Tüketicinin korunmasý ve aydýnlatýlmasý zorunluluðuna tabi olarak, ayýplý mal
ve ayýplý hizmetlerle (Madde 4 ve 4/A) ilgili olarak 1ÝSTANBUL ISPARTAKULE
projesinin ilgili taraflarý EMLAK KONUT GYO A.Þ. ve DOÐU ÝNÞAAT-PREKAST
BETON-ÜSTÜNLER YAPI ADÝ ORTAKLIÐININ proje ile ilgili sayýn Tüketicileri
tanýtým kýlavuzlarýnda veya reklam ve ilânlarýnda veya standardýnda veya
teknik kuralýnda veya satýþ sözleþmelerinde mevcut teknik hukuki durum ve
riskler açýsýndan hiçbir þekilde bilgilendirmediði hususunda aþaðýdaki
açýklamayý projeden ev satýn alan ve almayý düþünen potansiyel müþterilerin
dikkatine sunmayý zorunluluk olarak addetmekteyiz.


Kanun tarifi çerçevesinde tanýtma ve kullanma kýlavuzunda ya da reklam ve
ilânlarýnda yer alan veya satýcý tarafýndan bildirilen veya standardýnda veya
teknik düzenlemesinde tespit edilen nitelik veya niteliði etkileyen niceliðine
aykýrý olan ya da tahsis veya kullaným amacý bakýmýndan deðerini veya
tüketicinin ondan beklediði faydalarý azaltan veya ortadan kaldýran maddi,
hukuki veya ekonomik eksiklikler içeren mallar, ayýplý mal ve hizmet olarak
kabul edilir.

1ÝSTANBUL ISPARTAKULE PROJESÝ ile ilgili olarak EMLAK KONUT GYO A.Þ. ve DOÐU
ÝNÞAAT-PREKAST BETON-ÜSTÜNLER YAPI ADÝ ORTAKLIÐI tarafýndan Tüketicilerin
bilgilendirilmediði hususlar aþaðýdadýr.

Proje ile ilgili mevcut davalar ve hukuki süreç:

Türkiye'deki Hukuk Süreçleri:

1. Bakýrköy 5. Asliye Ticaret Mahkemesi Dosya No. 2010/788 E.

Davacý: TULIP Gayrimenkul

Davalý: Emlak Konut GYO

Dava Konusu: Proje ile ilgili haksýz feshin iptali.



2. Yargýtay 15. Hukuk Dairesi Dosya No. 2012/2502 E.

Davacý: TULIP Gayrimenkul

Davalý: Emlak Konut GYO

Dava Konusu: Proje ile ilgili haksýz feshin iptali.



3. Kadýköy 5. Asliye Ticaret Mahkemesi Dosya No. 2010/1654 E.

Davacý: TULIP-FMS-Mertkan-Ýlci Adi Ortaklýðý

Davalý: Emlak Konut GYO

Dava Konusu: Proje ile ilgili haksýz feshin iptali.



Detaylar icin : www.emlakkonutgercegi.com

Uluslararasý Hukuk Süreçleri:

- DÜNYA BANKASI ICSID Washington ABD (Uluslararasý Yatýrým Anlaþmazlýklarý
Çözüm Tahkim Mahkemesi) Dosya No. ICSID Case No. ARB/11/28 Davacý: Tulip
Gayrimenkul Ana Ortaðý Tulip Real Estate Investment and Development
Netherlands BV

Detaylar icin : www.crowell.com/tuliparbitration


Ayrýca yakýn tarihte tazminat talepleri ve diðer baþka davalarda gerek TULIP
Gayrimenkul gerekse TULIP Real Estate Investment and Development Netherlands
BV ve de TULIP-FMS-Mertkan-Ýlci Adi Ortaklýðý tarafýndan açýlacak ve bu
davalarda açýldýkça eðer tüketiciye karþý yükümlü taraf EMLAK KONUT GYO A.Þ.
ve/veya DOÐU ÝNÞAAT-PREKAST BETON-ÜSTÜNLER YAPI ADÝ ORTAKLIÐI tarafýndan
bildirilmez ise Tüketici Kanunu uyarýnca tarafýmýzca ayrýca bilgi
verilecektir.


Hukuki sürecin projeden ev alan Tüketiciler veya almayý düþünen potansiyel
Tüketiciler açýsýndan olasý sonuçlarý

1. 1ÝSTANBUL PROJESÝNDE haksýz feshin iptal edilerek DOÐU ÝNÞAAT-PREKAST
BETON-ÜSTÜNLER YAPI ADÝ ORTAKLIÐININ sözleþmesinin iptali ile projenin TULIP'e
iadesi, bu durumda projeden ev alanlarýn durumunun hukuken geçersiz olmasý,

2. TULIP, TULIP BV ve TULIP-FMS-Mertkan-Ýlci Adi Ortaklýðý kar kaybý
tazminatlarý ödenmesi, bu durumda tazminat miktarlarý ödenmesi hususunda proje
arsasý dahil diðer Emlak Konut GYO A.Þ. varlýklarýna icra takibi yapýlmasý ve
ipotek konulmasý.


Hukuken ev alan ve alacak Tüketicilerin dikkat etmesi gereken husus projeden
ev alýmýnda yapýlan Satýþ Vaadi Sözleþmesidir bu projede yapýlan uygulamaya
göre Satýþ Vaadi Sözleþmesi noterden onaylatýlmamaktadýr. Oysa Noterce
onaylanmayan Satýþ Vaadi Sözleþmelerinde yukarýda belirtilen ve/veya baþka
hukuki sorunlar çýkmasý halinde Alýcý açýsýndan önemli hak zayileri
olabilmektedir.

Bilgi edinilmesi için:

Taþýnmaz Satýþ Vaadi Sözleþmesi, bir taþýnmazýn satým sözleþmesinin
yapýlmasýný isteme hakký veren bir ön sözleþmedir. Taraflar düzenledikleri ön
sözleþme ile ana sözleþmenin akdedilmesini hüküm altýna almak istemektedirler.
Ön sözleþmenin akdedilmesi ile taraflardan biri yükümlülüðünü yerine
getirmediði takdirde diðer tarafýn ifayý talep hakký doðacaktýr.

Satýþ Vaadi Sözleþmesinin yukarýda anýlan ana sözleþme açýsýndan baðlayýcýlýk
unsurunu taþýyabilmesi için kanunda belirtilmiþ olan þekil þartýna uygun
olarak düzenlenmiþ olmasý gerekmektedir. Noterlik Kanunu'nun 60/3'ncü ve
89'ncu maddelerine göre taþýnmaz Satýþ Vaadi Sözleþmesinin geçerlilik
kazanabilmesi için noterde düzenlenmesi gerekir. Taraflar bu þekilde noterde
düzenlenecek ön sözleþme niteliðindeki Satýþ Vaadi Sözleþmesi ile ana
sözleþmeyi akdetme iradelerini ortaya koyarlar. Burada önemli olan her iki
taraf iradesinin açýkça ortaya konmasýdýr. Tek taraflý bir irade beyaný içeren
belge satýþ vaadi sözleþmesi olarak deðerlendirilemez. Kanuni düzenlenme
olmamasýna raðmen doktrin ve pratikte taþýnmaz Satýþ Vaadi Sözleþmesinin
tapuda da düzenlenebileceði 

Re: PF: block upd packets that allready have a state

2012-06-25 Thread Marios Makassikis
On 25 June 2012 19:06, Matthias Cramer cra...@freestone.net wrote:
 Hi Marios

 On 25/06/12 18:50, Marios Makassikis wrote:
 I would consider having PF rate-limit connections to your SIP PBX, and
 add any host
 that goes over the limit to your badguys table.
 An example is described here:
 http://home.nuug.no/~peter/pf/en/bruteforce.html

 I saw this. But the problem is, the attacker allways comes with the same
 IP/Port Combo
 so the is allways the same session for pf. So this method does not work!
 My understanding of this, is that the fact that PF creates a state,
 and uses it for the other
 communications with the attacker. Considering there is no other state
 created, it will never
 reach the limit to be added to the table.

 Exactly that's the case.

 If that is the case, the question remains: how do you detect the
 attack ? Is the PBX rendered
 unusable for other clients ?

 Yes, It becomes more or less unusable...


In that case, the ALTQ trick is pointless.

 I think a more accurate description of the attack would be helpful to
 find a solution to the problem.

 I now have a script, which watches the PBX for unsuccessful authentication
 and
 adds the IP, if there are 10 unsuccessful tries in 5 seconds, via ssh to
the
 table on
 the OpenBSD box, that solves all my problems greatly.

Seeing your solution ( glad you solved your problem by the way :) ), it looks
like someone is bruteforcing your server. Which implies that the first
step prior
to attempting to authenticate is to establish a connection. I'm
surprised PF doesn't
catch it though.
Even if the attacker is using the exact same packets, I recall reading
that PF tracks
connections by looking at source and destination transport addresses,
but also ISNs.
(Of course, you shouldn't take my word for it, as I couldn't find any
source that backs
this up.)
In that case, it would mean your server is using weak ISNs and using
modulate state
instead of keep state would help mitigate the issue, as new states
would be created
for each connection and you can effectively do some rate limiting.

There's also the possibility that your software keeps the connection
open upon a failed
auth, instead of closing after a predefined number of attempts. If
that's the case, I'd send
a bug report to the developers.


 Is there a way to so something simmilar by packets per second ?

 packets per second sounds like a unit for bandwidth, which would
 suggest using something
 like ALTQ to throttle traffic. The problem remains though, since you
 may end up throttling all
 connections to your PBX, including legitimate clients.

 I considered ALTQ, but that is in my opinion not a very nice way to solve
this
 problem.

 Regards

  Mattthias

 --
 Matthias Cramer, Erachfeldstrasse 1b, CH-8180 Bülach, Switzerland
 http://www.freestone.net
 GnuPG 1024D/2D208250 = DBC6 65B6 7083 1029 781E  3959 B62F DF1C 2D20 8250

 [demime 1.01d removed an attachment of type application/pgp-signature which
had a name of signature.asc]



Re: PF: block upd packets that allready have a state

2012-06-25 Thread Matthias Cramer
Hi Marios

On 25/06/12 20:36, Marios Makassikis wrote:

 Seeing your solution ( glad you solved your problem by the way :) ), it
looks
 like someone is bruteforcing your server. Which implies that the first
 step prior
 to attempting to authenticate is to establish a connection. I'm
 surprised PF doesn't
 catch it though.
 Even if the attacker is using the exact same packets, I recall reading
 that PF tracks
 connections by looking at source and destination transport addresses,
 but also ISNs.
 (Of course, you shouldn't take my word for it, as I couldn't find any
 source that backs
 this up.)
 In that case, it would mean your server is using weak ISNs and using
 modulate state
 instead of keep state would help mitigate the issue, as new states
 would be created
 for each connection and you can effectively do some rate limiting.

 There's also the possibility that your software keeps the connection
 open upon a failed
 auth, instead of closing after a predefined number of attempts. If
 that's the case, I'd send
 a bug report to the developers.

There are no connections to close ... It's SIP -- UDP .. The attacker can
always
use the same packet header.

Think there is no way to solve that at Layer 3 or 4, You have to look at the
content.

Regards

  Matthias

--
Matthias Cramer, Erachfeldstrasse 1b, CH-8180 Bülach, Switzerland
http://www.freestone.net
GnuPG 1024D/2D208250 = DBC6 65B6 7083 1029 781E  3959 B62F DF1C 2D20 8250

[demime 1.01d removed an attachment of type application/pgp-signature which had 
a name of signature.asc]



thanks a bunch

2012-06-25 Thread Gilles Chehade
Hi,

Thanks to the many people who offered soekris and similar boards after
my request on want.html.

I can't update the page right now, but I have received offers from 4
people, one being a backup if the others change their plans. I should
be fine now.

Thanks again !

-- 
Gilles Chehade

https://www.poolp.org  @poolpOrg



Sudden crashes with OpenBSD 4.6-5.1, trunk and CARP interfaces

2012-06-25 Thread Fernando Braga
Hi,

I'm having trouble pinpointing this problem.

We got two CARPed OpenBSD boxes running for a very long time now, and I've
been updating the machines up to 4.6. The last time we had hardware
maintenance was over a year ago.

One of them, zeca, crashed suddenly while it was the CARP master. Every
time we tried to promote it to be master again (using advskew), it crashed.
We upgraded it to OpenBSD 5.1, and it kept crashing.

So we upgraded motherboard, CPU, and memory. It also crashed.

Below is the serial output captured from a full cycle (boot, crash, ddb ps
and trace, and new reboot).

If you need further information, please let me know.

Thanks for your attention.

Best regards,

 OpenBSD/i386 BOOT 3.17
boot
booting hd0a:/bsd: 8251712+1089284 [61+370672+356296]=0x99a1d8
entry point at 0x200120

[ using 727444 bytes of bsd ELF symbol table ]
Copyright (c) 1982, 1986, 1989, 1991, 1993
The Regents of the University of California.  All rights reserved.
Copyright (c) 1995-2012 OpenBSD. All rights reserved.
http://www.OpenBSD.org

OpenBSD 5.1 (GENERIC.MP) #188: Sun Feb 12 09:55:11 MST 2012
dera...@i386.openbsd.org:/usr/src/sys/arch/i386/compile/GENERIC.MP
cpu0: Pentium(R) Dual-Core CPU E6300 @ 2.80GHz (GenuineIntel 686-class)
2.81 GHz
cpu0:
FPU,V86,DE,PSE,TSC,MSR,PAE,MCE,CX8,APIC,SEP,MTRR,PGE,MCA,CMOV,PAT,PSE36,CFLUSH,DS,ACPI,MMX,FXSR,SSE,SSE2,SS,HTT,TM,SBF,NXE,LONG,SSE3,MWAIT,DS-CPL,VMX,EST,TM2,SSSE3,CX16,xTPR,PDCM,XSAVE,LAHF
real mem  = 2137124864 (2038MB)
avail mem = 2092040192 (1995MB)
mainbus0 at root
bios0 at mainbus0: AT/286+ BIOS, date 05/20/09, BIOS32 rev. 0 @ 0xf0010,
SMBIOS rev. 2.5 @ 0xf06b0 (57 entries)
bios0: vendor American Megatrends Inc. version 0402 date 05/20/2009
bios0: ASUSTeK Computer INC. P5KPL-AM-CKD-VISUM-SI
acpi0 at bios0: rev 0
acpi0: sleep states S0 S1 S3 S4 S5
acpi0: tables DSDT FACP APIC MCFG OEMB HPET GSCI
acpi0: wakeup devices P0P2(S4) P0P1(S4) PS2K(S4) PS2M(S4) UAR1(S4) MC97(S4)
P0P4(S4) P0P5(S4) P0P6(S4) P0P7(S4) P0P8(S4) P0P9(S4) USB0(S4) USB1(S4)
USB2(S4) USB3(S4) EUSB(S4) SLPB(S4)
acpitimer0 at acpi0: 3579545 Hz, 24 bits
acpimadt0 at acpi0 addr 0xfee0: PC-AT compat
cpu0 at mainbus0: apid 0 (boot processor)
cpu0: apic clock running at 266MHz
cpu1 at mainbus0: apid 1 (application processor)
cpu1: Pentium(R) Dual-Core CPU E6300 @ 2.80GHz (GenuineIntel 686-class)
2.81 GHz
cpu1:
FPU,V86,DE,PSE,TSC,MSR,PAE,MCE,CX8,APIC,SEP,MTRR,PGE,MCA,CMOV,PAT,PSE36,CFLUSH,DS,ACPI,MMX,FXSR,SSE,SSE2,SS,HTT,TM,SBF,NXE,LONG,SSE3,MWAIT,DS-CPL,VMX,EST,TM2,SSSE3,CX16,xTPR,PDCM,XSAVE,LAHF
ioapic0 at mainbus0: apid 2 pa 0xfec0, version 20, 24 pins
acpimcfg0 at acpi0 addr 0xf000, bus 0-63
acpihpet0 at acpi0: 14318179 Hz
acpiprt0 at acpi0: bus 0 (PCI0)
acpiprt1 at acpi0: bus 7 (P0P1)
acpiprt2 at acpi0: bus 6 (P0P4)
acpiprt3 at acpi0: bus 5 (P0P5)
acpiprt4 at acpi0: bus -1 (P0P6)
acpicpu0 at acpi0: PSS
acpicpu1 at acpi0: PSS
aibs0 at acpi0: RTMP RVLT RFAN GGRP GITM SITM
acpibtn0 at acpi0: SLPB
acpibtn1 at acpi0: PWRB
bios0: ROM list: 0xc/0xb400!
cpu0: Enhanced SpeedStep 2801 MHz: speeds: 2793, 2128, 1596 MHz
pci0 at mainbus0 bus 0: configuration mode 1 (bios)
pchb0 at pci0 dev 0 function 0 Intel 82G33 Host rev 0x10
ppb0 at pci0 dev 1 function 0 Intel 82G33 PCIE rev 0x10: apic 2 int 16
pci1 at ppb0 bus 1
ppb1 at pci1 dev 0 function 0 IDT 89HPES12N3A rev 0x0e
pci2 at ppb1 bus 2
ppb2 at pci2 dev 2 function 0 IDT 89HPES12N3A rev 0x0e
pci3 at ppb2 bus 3
em0 at pci3 dev 0 function 0 Intel PRO/1000 QP (82576) rev 0x01: msi,
address 00:1b:21:6e:95:68
em1 at pci3 dev 0 function 1 Intel PRO/1000 QP (82576) rev 0x01: msi,
address 00:1b:21:6e:95:69
ppb3 at pci2 dev 4 function 0 IDT 89HPES12N3A rev 0x0e
pci4 at ppb3 bus 4
em2 at pci4 dev 0 function 0 Intel PRO/1000 QP (82576) rev 0x01: msi,
address 00:1b:21:6e:95:6c
em3 at pci4 dev 0 function 1 Intel PRO/1000 QP (82576) rev 0x01: msi,
address 00:1b:21:6e:95:6d
vga1 at pci0 dev 2 function 0 Intel 82G33 Video rev 0x10
wsdisplay0 at vga1 mux 1: console (80x25, vt100 emulation)
wsdisplay0: screen 1-5 added (80x25, vt100 emulation)
intagp0 at vga1
agp0 at intagp0: aperture at 0xe000, size 0x1000
inteldrm0 at vga1: apic 2 int 16
drm0 at inteldrm0
azalia0 at pci0 dev 27 function 0 Intel 82801GB HD Audio rev 0x01: msi
azalia0: codecs: VIA/0xe721
audio0 at azalia0
ppb4 at pci0 dev 28 function 0 Intel 82801GB PCIE rev 0x01: apic 2 int 16
pci5 at ppb4 bus 6
ppb5 at pci0 dev 28 function 1 Intel 82801GB PCIE rev 0x01: apic 2 int 17
pci6 at ppb5 bus 5
re0 at pci6 dev 0 function 0 Realtek 8101E rev 0x02: RTL8102EL (0x2480),
apic 2 int 17, address 90:e6:ba:b4:c0:f0
rlphy0 at re0 phy 7: RTL8201L 10/100 PHY, rev. 1
uhci0 at pci0 dev 29 function 0 Intel 82801GB USB rev 0x01: apic 2 int 23
uhci1 at pci0 dev 29 function 1 Intel 82801GB USB rev 0x01: apic 2 int 19
uhci2 at pci0 dev 29 function 2 Intel 82801GB USB rev 0x01: apic 2 int 18
uhci3 at pci0 dev 29 function 3 Intel 82801GB USB rev 0x01: apic 2 int 16
ehci0 at pci0 dev 29 function 7 Intel 82801GB USB