Re: Random PID implementation and security

2015-05-27 Thread Fred

On 05/27/15 10:18, Simon wrote:

Le 2015-05-26 16:25, Theo de Raadt a écrit :

Le 2015-05-26 00:10, Miod Vallat a =C3=A9crit=C2=A0:
 It is not the responsibility of the operating system to protect its
 users against software which assumes using the pid as a random source=

=20

 is
 a bright and wise idea.
=20
Isn't this the whole goal of random PIDs, to put a defense at OS
level=20
protecting software against themselves when they make wrong
assumption=20
regarding the PID and use it for wrong purposes?


A 16 bit PID is suppsed to provide true safety?

Please.

The problem is people who believe that shoving a 16 bit value into
a deterministic function gets them somewhere.


So do you confirm that random PID is actually not a security measure?

It is often presented as is, but it would not be the first time that
some wrong rumors get widespread enough to become accepted as a truth by
most people.

I could also easily imagine that PID have been randomized just because
it was allowed to do so and that it was interesting from the coding
perspective as showing up software bugs that sequential PID would hardly
uncover (I'm mainly referring here to Ted Unangst's talk:
http://www.openbsd.org/papers/dev-sw-hostile-env.html, see
randomization section, backed by the philosophy section: The sooner
we can break it, the sooner we can fix it).



Having PID's that are not easily predicable helps to reduce the attack 
surface.


IMO that is a security measure, but YMMV.

Fred



Re: simple maiserver fail (postfix dovecot)

2015-05-27 Thread Tuyosi Takesima
it is hard to understand even for me only to follow thread .
so i write down at
http://openbsd-akita.blogspot.jp/2015/05/wifi-router-run0-192.html

if there are mistakes , please point them .
---
regards



Re: Random PID implementation and security

2015-05-27 Thread Simon

Le 2015-05-26 16:25, Theo de Raadt a écrit :

Le 2015-05-26 00:10, Miod Vallat a =C3=A9crit=C2=A0:
 It is not the responsibility of the operating system to protect its
 users against software which assumes using the pid as a random source=

=20

 is
 a bright and wise idea.
=20
Isn't this the whole goal of random PIDs, to put a defense at OS 
level=20
protecting software against themselves when they make wrong 
assumption=20

regarding the PID and use it for wrong purposes?


A 16 bit PID is suppsed to provide true safety?

Please.

The problem is people who believe that shoving a 16 bit value into
a deterministic function gets them somewhere.


So do you confirm that random PID is actually not a security measure?

It is often presented as is, but it would not be the first time that 
some wrong rumors get widespread enough to become accepted as a truth by 
most people.


I could also easily imagine that PID have been randomized just because 
it was allowed to do so and that it was interesting from the coding 
perspective as showing up software bugs that sequential PID would hardly 
uncover (I'm mainly referring here to Ted Unangst's talk: 
http://www.openbsd.org/papers/dev-sw-hostile-env.html, see 
randomization section, backed by the philosophy section: The sooner 
we can break it, the sooner we can fix it).




Re: Dual-NSD setup management

2015-05-27 Thread Stuart Henderson
On 2015-05-26, Felipe Scarel fbsca...@gmail.com wrote:
 after reading some documentation on the NSD manpage and online, it
 seems there's no support for views as offered with BIND. I've gathered
 that the general suggestion is to run two separate instances (running
 on 127.0.0.1, for example), and divert traffic from pf depending on
 the connecting source-address.

What are you using views *for*?

If it's to present some internal-only hosts to a trusted network that
is also using you as a resolver, just use local-data entries in unbound
for internal use, and run NSD facing external hosts. Simple setup and
fairly easy to use.

If it's something more complex (i.e. where you have other resolvers
querying you and need to present different views to these based on IP
address etc) then yes you will need two separate authoritative servers
(or you could keep using BIND for this job of course).



Re: Random PID implementation and security

2015-05-27 Thread Joel Rees
On Tue, May 26, 2015 at 9:50 PM, Simon
openbsd.li...@whitewinterwolf.com wrote:
 [...]

 Unless specific cases, I do not think that programmers assume that PID
 are especially sequential or not, but merely rely on the hypothesis
 that:

 - PID are unguessable,
 - PID will not be reused quickly.

 And yes, it seems possible to fulfill these two properties by
 providing unguessable and not quickly reusable PID instead of pure
 random PID.

But not in 16 bits.

To a patient remote attacker, the difference between 2 minutes and 2
days is not significant.

64 bit PIDs anyone? High 16 and low sixteen randomized and the middle
32 backwards sequential, just to really throw the unwary attacker off
the trail? ;-/

-- 
Joel Rees

Be careful when you look at conspiracy.
Look first in your own heart,
and ask yourself if you are not your own worst enemy.
Arm yourself with knowledge of yourself, as well.



Re: Random PID implementation and security

2015-05-27 Thread Janne Johansson
 A 16 bit PID is suppsed to provide true safety?
 Please.



 Having PID's that are not easily predicable helps to reduce the attack
 surface.
 IMO that is a security measure, but YMMV.



Random PIDs is that plastic part, not the padlock.







-- 
May the most significant bit of your life be positive.



Re: cvs fingerprint for anonvs.jp.openbsd.org

2015-05-27 Thread Lars Nooden
On Wed, 27 May 2015, Joel Rees wrote:
 Currently, when I connect to the server via the usual cvs command, it 
 responds with an ssh256 fingerprint.
 
 For some reason, my brain is not helping me find a way to ask the
 server to give me md5 fingerprints. Is there a way?

From what I've tried, the variable CVS_RSH won't pass options on to ssh.

But you can force MD5 hashes in ssh_config using FingerprintHash for 
that particular host for all occasions including cvs use.

regards,
/Lars



installing stable failed

2015-05-27 Thread Harald Dunkel
Hi folks,

stable built fine, but make install failed with

:
cc  -Werror -Wall -Wimplicit-function-declaration  -Wno-main -Wno-uninitialized 
 -Wframe-larger-than=2047 -mcmodel=kernel -mno-red-zone -mno-sse2 -mno-sse 
-mno-3dnow  -mno-mmx -msoft-float -fno-omit-frame-pointer -fno-builtin-printf 
-fno-builtin-snprintf  -fno-builtin-vsnprintf -fno-builtin-log  
-fno-builtin-log2 -fno-builtin-malloc -fno-pie -O2 -pipe -nostdinc 
-I../../../.. -I. -I../../../../arch -DDDB -DDIAGNOSTIC -DKTRACE -DACCOUNTING 
-DKMEMSTATS -DPTRACE -DCRYPTO -DSYSVMSG -DSYSVSEM -DSYSVSHM -DUVM_SWAP_ENCRYPT 
-DFFS -DFFS2 -DFFS_SOFTUPDATES -DUFS_DIRHASH -DQUOTA -DEXT2FS -DMFS -DNFSCLIENT 
-DNFSSERVER -DCD9660 -DUDF -DMSDOSFS -DFIFO -DTMPFS -DFUSE -DSOCKET_SPLICE 
-DTCP_SACK -DTCP_ECN -DTCP_SIGNATURE -DINET -DINET6 -DIPSEC -DPPP_BSDCOMP 
-DPPP_DEFLATE -DPIPEX -DMROUTING -DMPLS -DBOOT_CONFIG -DUSER_PCICONF -DAPERTURE 
-DMTRR -DNTFS -DHIBERNATE -DPCIVERBOSE -DUSBVERBOSE -DWSDISPLAY_COMPAT_USL 
-DWSDISPLAY_COMPAT_RAWKBD -DWSDISPLAY_DEFAULTSCREENS=6 
-DWSDISPLAY_COMPAT_PCVT -DX!
 86EMU
-DONEWIREVERBOSE -DMAXUSERS=80 -D_KERNEL -MD -MP  -c vers.c
ld -T ../../../../arch/amd64/conf/ld.script -X --warn-common -nopie -S -x -o 
bsd ${SYSTEM_HEAD} vers.o ${OBJS}
textdatabss dec hex
8836020 248296  598016  9682332 93bd9c
cmp -s bsd /bsd || ln -f /bsd /obsd
ln: /bsd: No such file or directory
*** Error 1 in /usr/src/sys/arch/amd64/compile/GENERIC (Makefile:904 
'install-kernel-gate5c.example.com.')

I have rebuilt it *because* /bsd was deleted by accident. A
little bit more clever code here would be highly appreciated.


Thanx in advance
Harri



Re: Random PID implementation and security

2015-05-27 Thread Kenneth Gober
On Wed, May 27, 2015 at 5:18 AM, Simon
openbsd.li...@whitewinterwolf.com wrote:
 So do you confirm that random PID is actually not a security measure?

 It is often presented as is, but it would not be the first time that some
 wrong rumors get widespread enough to become accepted as a truth by most
 people.

language isn't an exact thing.  words can mean different things to different
people, or different things to the same people in different contexts.

I would consider PID randomization to be a security measure, although
I would not consider it a solution or fix to the problem it
addresses.  rather,
it is a mitigation that reduces the severity of a problem without actually
fixing it.

whether you think of it as a security measure depends on whether you
define a measure as a fix, or a mitigation, or as either/both.

where we get into trouble is when people mistake it for a fix and believe
that they no longer need to worry about this problem.  that is false.

-ken



Re: Random PID implementation and security

2015-05-27 Thread Simon

Le 2015-05-27 11:53, Fred a écrit :

On 05/27/15 10:18, Simon wrote:

Le 2015-05-26 16:25, Theo de Raadt a écrit :


A 16 bit PID is suppsed to provide true safety?

Please.

The problem is people who believe that shoving a 16 bit value into
a deterministic function gets them somewhere.


So do you confirm that random PID is actually not a security measure?

It is often presented as is, but it would not be the first time that
some wrong rumors get widespread enough to become accepted as a truth 
by

most people.

I could also easily imagine that PID have been randomized just because
it was allowed to do so and that it was interesting from the coding
perspective as showing up software bugs that sequential PID would 
hardly

uncover (I'm mainly referring here to Ted Unangst's talk:
http://www.openbsd.org/papers/dev-sw-hostile-env.html, see
randomization section, backed by the philosophy section: The 
sooner

we can break it, the sooner we can fix it).



Having PID's that are not easily predicable helps to reduce the attack 
surface.


IMO that is a security measure, but YMMV.

Fred


There is a difference between having random PIDs and having PIDs which 
are not easily predictable.


For instance, dividing the 16 bits of the PID to make the 8 lower bits 
as a counter and 8 higher bits as a random value would provide both not 
easily predictible and not quickly reused PIDs.


However, minor the 100 items array, OpenBSD uses random PIDs. While it 
indeed reduces the attack surface against PID predictions (mostly local 
exploits) it facilitates attacks relying on PID reuse (includes remote 
exploits, so attacks with higher risk than local exploits).


So all in all I'm not convinced at all that using random PIDs reduces 
the attack surface, I was actually worrying if it may not be actually 
counter productive in terms of security.




Re: Random PID implementation and security

2015-05-27 Thread Simon

Le 2015-05-27 14:01, Janne Johansson a écrit :

A 16 bit PID is suppsed to provide true safety?

Please.





Having PID's that are not easily predicable helps to reduce the attack
surface.
IMO that is a security measure, but YMMV.




Random PIDs is that plastic part, not the padlock.


You mean it's just decorative ;) ?



Re: Random PID implementation and security

2015-05-27 Thread Simon

Le 2015-05-27 14:29, Kenneth Gober a écrit :

On Wed, May 27, 2015 at 5:18 AM, Simon
openbsd.li...@whitewinterwolf.com wrote:

So do you confirm that random PID is actually not a security measure?

It is often presented as is, but it would not be the first time that 
some
wrong rumors get widespread enough to become accepted as a truth by 
most

people.


language isn't an exact thing.  words can mean different things to 
different

people, or different things to the same people in different contexts.

I would consider PID randomization to be a security measure, although
I would not consider it a solution or fix to the problem it
addresses.  rather,
it is a mitigation that reduces the severity of a problem without 
actually

fixing it.

whether you think of it as a security measure depends on whether you
define a measure as a fix, or a mitigation, or as either/both.

where we get into trouble is when people mistake it for a fix and 
believe

that they no longer need to worry about this problem.  that is false.

-ken


I agree with you Ken. I see PID randomization like stack protection for 
instance: in the best world a software should have no bug and should not 
be vulnerable to any buffer overflow, however in a real world there are 
still vulnerable software around and here such protection may help.


The same principle also apply for PID generation method: normally it 
should not even matter if PID were sequential, fully random or 
pseudo-random, but the reality is that there are still bugs around and 
still vulnerable software around, and that the OS may implement systems 
mitigating such risks.




cvs fingerprint for anonvs.jp.openbsd.org

2015-05-27 Thread Joel Rees
The fingerprints shown for anoncvs.jp.openbsd.org at

http://www.openbsd.org/anoncvs.html

are md5. Currently, when I connect to the server via the usual cvs
command, it responds with an ssh256 fingerprint.

For some reason, my brain is not helping me find a way to ask the
server to give me md5 fingerprints. Is there a way?

l sent an inquiry to professor Suzuki about the fingerprints, but have
received no response yet

-- 
Joel Rees



Re: installing stable failed

2015-05-27 Thread Theo Buehler
On Wed, May 27, 2015 at 03:08:53PM +0200, Harald Dunkel wrote:
 cmp -s bsd /bsd || ln -f /bsd /obsd
 ln: /bsd: No such file or directory
 *** Error 1 in /usr/src/sys/arch/amd64/compile/GENERIC (Makefile:904
 'install-kernel-gate5c.example.com.')
 
 I have rebuilt it *because* /bsd was deleted by accident. A
 little bit more clever code here would be highly appreciated.
 
 
You can see what `make install' would have done by using the `-n' switch
for make:

$ make -n install
cmp -s bsd /bsd || ln -f /bsd /obsd
cp bsd /nbsd
mv /nbsd /bsd
$

To fix your machine, either use the cp and mv commands as above or
simply issuing

# cp bsd /bsd

would be enough since `/bsd' isn't in the way.



Re: installing stable failed

2015-05-27 Thread Pedro Tender
Just to be sure, do you have /bsd directory created?
Since the error is:
ln: /bsd: No such file or directory

Since your report is only the make install error and the error is that the
directory does not exist maybe you should start there before making other
assumptions about cleverness. Or maybe start by saying if the directory
already exists or not.



On Wed, May 27, 2015 at 2:08 PM, Harald Dunkel harald.dun...@aixigo.de
wrote:

 Hi folks,

 stable built fine, but make install failed with

 :
 cc  -Werror -Wall -Wimplicit-function-declaration  -Wno-main
 -Wno-uninitialized  -Wframe-larger-than=2047 -mcmodel=kernel -mno-red-zone
 -mno-sse2 -mno-sse -mno-3dnow  -mno-mmx -msoft-float
 -fno-omit-frame-pointer -fno-builtin-printf -fno-builtin-snprintf
 -fno-builtin-vsnprintf -fno-builtin-log  -fno-builtin-log2
 -fno-builtin-malloc -fno-pie -O2 -pipe -nostdinc -I../../../.. -I.
 -I../../../../arch -DDDB -DDIAGNOSTIC -DKTRACE -DACCOUNTING -DKMEMSTATS
 -DPTRACE -DCRYPTO -DSYSVMSG -DSYSVSEM -DSYSVSHM -DUVM_SWAP_ENCRYPT -DFFS
 -DFFS2 -DFFS_SOFTUPDATES -DUFS_DIRHASH -DQUOTA -DEXT2FS -DMFS -DNFSCLIENT
 -DNFSSERVER -DCD9660 -DUDF -DMSDOSFS -DFIFO -DTMPFS -DFUSE -DSOCKET_SPLICE
 -DTCP_SACK -DTCP_ECN -DTCP_SIGNATURE -DINET -DINET6 -DIPSEC -DPPP_BSDCOMP
 -DPPP_DEFLATE -DPIPEX -DMROUTING -DMPLS -DBOOT_CONFIG -DUSER_PCICONF
 -DAPERTURE -DMTRR -DNTFS -DHIBERNATE -DPCIVERBOSE -DUSBVERBOSE
 -DWSDISPLAY_COMPAT_USL -DWSDISPLAY_COMPAT_RAWKBD
 -DWSDISPLAY_DEFAULTSCREENS=6 -DWSDISPLAY_COMPAT_PCVT -DX!
  86EMU
 -DONEWIREVERBOSE -DMAXUSERS=80 -D_KERNEL -MD -MP  -c vers.c
 ld -T ../../../../arch/amd64/conf/ld.script -X --warn-common -nopie -S -x
 -o bsd ${SYSTEM_HEAD} vers.o ${OBJS}
 textdatabss dec hex
 8836020 248296  598016  9682332 93bd9c
 cmp -s bsd /bsd || ln -f /bsd /obsd
 ln: /bsd: No such file or directory
 *** Error 1 in /usr/src/sys/arch/amd64/compile/GENERIC (Makefile:904
 'install-kernel-gate5c.example.com.')

 I have rebuilt it *because* /bsd was deleted by accident. A
 little bit more clever code here would be highly appreciated.


 Thanx in advance
 Harri



Re: Dual-NSD setup management

2015-05-27 Thread Bryan Irvine
Additionally to all this good advice, you can create multiple loopback
interfaces if you did want to use divert-to. 'ifconfig create lo1' then you
don't need to use weird ports to accomplish things.

On Wed, May 27, 2015 at 4:06 AM, Stuart Henderson s...@spacehopper.org
wrote:

 On 2015-05-26, Felipe Scarel fbsca...@gmail.com wrote:
  after reading some documentation on the NSD manpage and online, it
  seems there's no support for views as offered with BIND. I've gathered
  that the general suggestion is to run two separate instances (running
  on 127.0.0.1, for example), and divert traffic from pf depending on
  the connecting source-address.

 What are you using views *for*?

 If it's to present some internal-only hosts to a trusted network that
 is also using you as a resolver, just use local-data entries in unbound
 for internal use, and run NSD facing external hosts. Simple setup and
 fairly easy to use.

 If it's something more complex (i.e. where you have other resolvers
 querying you and need to present different views to these based on IP
 address etc) then yes you will need two separate authoritative servers
 (or you could keep using BIND for this job of course).



Re: Dual-NSD setup management

2015-05-27 Thread Felipe Scarel
Thanks for the input Stuart and Bryan, I think the dual-authoritative
setup might indeed be overkill.
I'll look into unbound local-data options, hadn't considered that.

On Wed, May 27, 2015 at 3:10 PM, Bryan Irvine sparcta...@gmail.com wrote:
 Additionally to all this good advice, you can create multiple loopback
 interfaces if you did want to use divert-to. 'ifconfig create lo1' then you
 don't need to use weird ports to accomplish things.

 On Wed, May 27, 2015 at 4:06 AM, Stuart Henderson s...@spacehopper.org
 wrote:

 On 2015-05-26, Felipe Scarel fbsca...@gmail.com wrote:
  after reading some documentation on the NSD manpage and online, it
  seems there's no support for views as offered with BIND. I've gathered
  that the general suggestion is to run two separate instances (running
  on 127.0.0.1, for example), and divert traffic from pf depending on
  the connecting source-address.

 What are you using views *for*?

 If it's to present some internal-only hosts to a trusted network that
 is also using you as a resolver, just use local-data entries in unbound
 for internal use, and run NSD facing external hosts. Simple setup and
 fairly easy to use.

 If it's something more complex (i.e. where you have other resolvers
 querying you and need to present different views to these based on IP
 address etc) then yes you will need two separate authoritative servers
 (or you could keep using BIND for this job of course).



Re: Logjam Attack: is OpenIKED and OpenSMTPD vulnerable?

2015-05-27 Thread Mike Belopuhov
On 25 May 2015 at 14:33, Pablo Méndez Hernández pabl...@gmail.com wrote:
 Hi,

 Any statement for iked?


iked implements IKEv2 which doesn't use SSL/TLS.  So this
attack doesn't directly apply to IKEv2.  However we would
accept MODP 1024 and better by default.  Perhaps we
should bump it to 2048 minimum.



Re: Openbsd 5.7 and sendmail

2015-05-27 Thread Peter Fraser
Thanks I managed to miss noting  that I should look at 
/usr/local/share/doc/pkg-readmes/sendmail-*

-Original Message-
From: owner-m...@openbsd.org [mailto:owner-m...@openbsd.org] On Behalf Of John 
Merriam
Sent: Tuesday, May 26, 2015 12:20 PM
To: Peter Fraser
Cc: 'misc@openbsd.org'
Subject: Re: Openbsd 5.7 and sendmail

On Tue, 26 May 2015, Peter Fraser wrote:

 I put OpenBSD 5.7 up, but because we make use of the SpamHaus I didn't want 
 to move to smtpd.
 
 It was easy enough to put sendmail in but I found I could not rebuild 
 my /etc/mail/access.db
 
 makemap did not like the To: prefix in the /etc/mail/access file.
 
 being somewhat slow to took me a couple of days to realize that there 
 are now 2 makemap's
 
 /usr/libexec/smtpd/makemap
 
 and
 
 /usr/local/libexec/sendmail/makemap
 
 using the right one for sendmail fixed my problem.
 

You may need to edit your /etc/mailer.conf file.  See the mailer.conf(5) man 
page and /usr/local/share/doc/pkg-readmes/sendmail-*

-- 

John Merriam



Re: Random PID implementation and security

2015-05-27 Thread Claudio Jeker
On Wed, May 27, 2015 at 02:34:43PM +0200, Simon wrote:
 Le 2015-05-27 11:53, Fred a écrit :
 On 05/27/15 10:18, Simon wrote:
 Le 2015-05-26 16:25, Theo de Raadt a écrit :
 
 A 16 bit PID is suppsed to provide true safety?
 
 Please.
 
 The problem is people who believe that shoving a 16 bit value into
 a deterministic function gets them somewhere.
 
 So do you confirm that random PID is actually not a security measure?
 
 It is often presented as is, but it would not be the first time that
 some wrong rumors get widespread enough to become accepted as a truth by
 most people.
 
 I could also easily imagine that PID have been randomized just because
 it was allowed to do so and that it was interesting from the coding
 perspective as showing up software bugs that sequential PID would hardly
 uncover (I'm mainly referring here to Ted Unangst's talk:
 http://www.openbsd.org/papers/dev-sw-hostile-env.html, see
 randomization section, backed by the philosophy section: The sooner
 we can break it, the sooner we can fix it).
 
 
 Having PID's that are not easily predicable helps to reduce the attack
 surface.
 
 IMO that is a security measure, but YMMV.
 
 Fred
 
 There is a difference between having random PIDs and having PIDs which are
 not easily predictable.
 
 For instance, dividing the 16 bits of the PID to make the 8 lower bits as a
 counter and 8 higher bits as a random value would provide both not easily
 predictible and not quickly reused PIDs.
 
 However, minor the 100 items array, OpenBSD uses random PIDs. While it
 indeed reduces the attack surface against PID predictions (mostly local
 exploits) it facilitates attacks relying on PID reuse (includes remote
 exploits, so attacks with higher risk than local exploits).
 
 So all in all I'm not convinced at all that using random PIDs reduces the
 attack surface, I was actually worrying if it may not be actually counter
 productive in terms of security.
 

Please go troll somewhere else. Software that breaks if a PID is reused
too soon is inherently broken and the operating system  should not try to
protect these broken programs. Please put your effort into fixing those
broken programs instead of spreading FUD here.

-- 
:wq Claudio



Re: Random PID implementation and security

2015-05-27 Thread Jihyun Yu
Sorry for interruption. I have sent the message by mistake, please ignore
it.

2015년 5월 27일 (수) 23:17,  yjh0...@gmail.com님이 작성:

 hi



Re: Random PID implementation and security

2015-05-27 Thread ludovic coues
2015-05-27 15:42 GMT+02:00 Joel Rees joel.r...@gmail.com:

 On Tue, May 26, 2015 at 9:50 PM, Simon
 openbsd.li...@whitewinterwolf.com wrote:
  [...]
 
  Unless specific cases, I do not think that programmers assume that PID
  are especially sequential or not, but merely rely on the hypothesis
  that:
 
  - PID are unguessable,
  - PID will not be reused quickly.
 
  And yes, it seems possible to fulfill these two properties by
  providing unguessable and not quickly reusable PID instead of pure
  random PID.

 But not in 16 bits.

 To a patient remote attacker, the difference between 2 minutes and 2
 days is not significant.

 64 bit PIDs anyone? High 16 and low sixteen randomized and the middle
 32 backwards sequential, just to really throw the unwary attacker off
 the trail? ;-/


Having a part of the PID being sequential and a part being random is
non-sense.

The more bit you throw in the random part, the less chance you have to have
collision.
The more bit you throw in the sequential part, the more time you have
before you start to have a chance to have a collision.

Problem is, those bit turn into power of two. So going from 16bit to 8bit
is the same as going from 65,536 to 256.

OpenBSD found a way out of this problem. All the bits used in a PID are
random and you have to wait for an arbitrary 100 PID before you start to
have a chance to get duplicate.


But like Theo said, the problem is that PID shouldn't have been used in the
first place.



Re: Random PID implementation and security

2015-05-27 Thread yjh0502
hi



Re: HP LaserJet 1100 lpr printing?

2015-05-27 Thread Craig Skinner
On 2015-05-22 Fri 17:11 PM |, Antoine Jacoutot wrote:
 On Fri, May 22, 2015 at 04:08:20PM +0100, Craig Skinner wrote:
  On 2015-05-22 Fri 17:01 PM |, Antoine Jacoutot wrote:
   
   What is the version of the cups package you are running?
   
  
  $ pkg_info -I cups cups-filters foomatic-db-engine hplip-common dbus
  cups-1.7.4p0Common Unix Printing System
 
 Yeah that's probably the reason, you are not running the latest stable cups 
 package.
 You need at least p1.
 
 

Thanks Antoine for the updated packages from mTier:


$ uname -msrv
OpenBSD 5.6 GENERIC.MP#299 i386

$ pkg_info -I cups cups-filters cups-libs hpcups \
foomatic-db foomatic-db-engine \
hplip hplip-common hpijs hpaio dbus
cups-1.7.4p3Common Unix Printing System
cups-filters-1.0.54p3 OpenPrinting CUPS filters
cups-libs-1.7.4 CUPS libraries and headers
hpcups-3.14.6   HP native CUPS driver
foomatic-db-4.0.20131218 Foomatic PPD data
foomatic-db-engine-4.0.11 Foomatic PPD generator
hplip-3.14.6HP Linux Imaging and Printing
hplip-common-3.14.6 HPLIP applications common files
hpijs-3.14.6HP ghostscript driver (spooler independent)
hpaio-3.14.6HP sane(7) scanner backend
dbus-1.8.8v0message bus system



$ dmesg | egrep 'lpt|ugen' 
ugen0 at uhub1 port 2 Pr?lific Technology Inc. IEEE-1284 Controller rev 
1.00/2.00 addr 3



$ usbdevs -f /dev/usb1
addr 1: UHCI root hub, Intel
 addr 2: Usb Mouse, SIGMACHIP
 addr 3: Parallel printer, Prolific Technology

$ usbdevs -d -v -f /dev/usb1
Controller /dev/usb1:
addr 1: full speed, self powered, config 1, UHCI root hub(0x), 
Intel(0x8086), rev 1.00
  uhub1
 port 1 addr 2: low speed, power 98 mA, config 1, Usb Mouse(0x0034), 
SIGMACHIP(0x1c4f), rev 1.10
   uhidev0
 port 2 addr 3: full speed, power 100 mA, config 1, Parallel printer(0x2305), 
Prolific Technology(0x067b), rev 2.00
   ugen0






$ fgrep 1100 /etc/cups/ppd/LJ1100.ppd
* PPD file for HP LaserJet 1100 with CUPS.
*PCFileName: hp-laserjet_1100.ppd
*Product: (HP LaserJet 1100 Printer)
*Product: (HP LaserJet 1100se Printer)
*Product: (HP LaserJet 1100xi Printer)
*ModelName: HP LaserJet 1100
*ShortNickName: HP LaserJet 1100
*NickName: HP LaserJet 1100, hpcups 3.14.6
*1284DeviceID: MFG:HP;MDL:hp laserjet 1100;DES:hp laserjet 1100;
*% End of hp-laserjet_1100.ppd, 15203 bytes.




DeviceURI's tried in printers.conf:

usb:/dev/usb1
usb://HP/LaserJet%201100
usb://HP%20LaserJet%201100
usb://HP/hp%20laserjet%201100
usb://HP/hp laserjet 1100
usb://Parallel%20printer,%20Prolific%20Technology
usb://Parallel printer, Prolific Technology
usb://Parallel printer
file:///dev/usb1
file:/dev/usb1


$ lpc status
LJ1100:
printer is on device 'usb' speed -1
queuing is enabled
printing is disabled
1 entries
daemon present
$ lpq -a
RankOwner   Job File(s) Total Size
1st root4   Test Page   1024 bytes





When setting the DeviceURI to file:/dev/usb1,
the CUPS web admin print test page thinks the page gets printed,
but no printer lights/paper movement:
https://bbs.archlinux.org/viewtopic.php?id=79352

$ sudo diff cups-files.conf.0  cups-files.conf
27c27
 #FileDevice No
---
 FileDevice Yes

$ sudo cupsctl FileDevice=yes



I've tried these 3 drivers, with various DeviceURI's:


Description:Ye olde Lazar Jet
Location:   Front room
Driver: HP LaserJet 1100, hpcups 3.14.6 (color, 2-sided printing)
Connection: usb:/dev/usb1
Defaults:   job-sheets=none, none media=iso_a4_210x297mm sides=one-sided

Waiting for printer to become available.


Description:Ye olde Lazar Jet - Foomatic-lj4dith
Location:   Front room
Driver: HP LaserJet 1100 Foomatic/lj4dith (grayscale, 2-sided printing)
Connection: usb:/dev/usb1
Defaults:   job-sheets=none, none media=iso_a4_210x297mm sides=one-sided

Waiting for printer to become available.


Description:Ye olde Lazar Jet - HPIJS
Location:   Front room
Driver: HP LaserJet 1100 hpijs, 3.14.6 (color, 2-sided printing)
Connection: usb:/dev/usb1
Defaults:   job-sheets=none, none media=iso_a4_210x297mm sides=one-sided

Waiting for printer to become available.


Suggestions welcome.
-- 
Never underestimate the bandwidth of a station wagon full of tapes.
-- Dr. Warren Jackson, Director, UTCS



NATing out enc0 traffic

2015-05-27 Thread Justin Mayes
Greetings everyone

I am playing with amazon virtual private clouds (VPC). I have set a few up. I
have no issues connecting ipsec from openbsd  - amazon VPC. All of these
VPCs so far have their own internet connection going out from amazon that
works fine.


[OpenBSD]ipsec-[VPC]-Internet


Next I am setting up a VPC that has no internet gateway. Instead the default
gateway is the vpn and all traffic is sent back through the ipsec tunnel and
then out the local network gateway.

[Internet]
^
|
|
|
[OpenBSD]---ipsec--[VPC]


I added these relevant lines to pf.conf

Match out on $ext_if from !($ext_if:network) nat-to ($ext_if)
pass quick on enc0 keep state (if-bound)

With tcpdump and pfctl  I can tell that traffic from the vpc (10.0.0.0/8)
comes across the tunnel and gets NATed out. I can see that traffic leave the
external interface and I can see the reply come back to the external
interface. The reply never hits enc0 though and never makes it back to the
client.  Is there another piece to the setup I am missing? I assume what I am
trying to do is possible. I would appreciate any insight or advice anyone may
have in regards to this type of setup.

J



Re: booting OpenBSD with grub

2015-05-27 Thread Gareth Nelson
You can also use kopenbsd to load an OpenBSD kernel directly in grub, I did
just this to install OpenBSD from a previous Debian install (just
downloaded bsd.rd, rebooted, used grub to boot bsd.rd)

---
“Lanie, I’m going to print more printers. Lots more printers. One for
everyone. That’s worth going to jail for. That’s worth anything.” -
Printcrime by Cory Doctrow

Please avoid sending me Word or PowerPoint attachments.
See http://www.gnu.org/philosophy/no-word-attachments.html

On Thu, May 28, 2015 at 1:44 AM, Josh Grosse j...@jggimi.homeip.net wrote:

 On Wed, May 27, 2015 at 07:48:49AM -0400, cobalt wrote:
  any idea on the the proper way to get grub to boot openbsd:
 
  set root=(hd1,4) is what i have, but i am missing something and i do not
  know what.
 
  any thoughts would help.
 
  regards.
 
  gilles

 I have an old netbook with sysutils/grub installed.  That's v1, and
 I provision the chainloader.  Here's my menu.lst:

 default 0
 timeout 5

 title OpenBSD
 root (hd0,3)
 chainloader +1

 title WinXP
 root (hd0,0)
 chainloader +1

 WXP is retained for a few select applications: firmware installation
 on peripherals, WebRTC applications ... and that's it.



Re: httpd authenticate option usage

2015-05-27 Thread Yegor Timoschenko
 How does the httpd authenticate option work?  from httpd.conf(5):
 [no] authenticate [realm] with htpasswd
   Authenticate a remote user for realm by checking the credentials
   against the user authentication file htpasswd.  The file name is
   relative to the chroot and must be readable by the www user.  Use
   the no authenticate directive to disable authentication in a
   location.
 
 what's realm?  It shows up twice in the man page, both times in that
 paragraph.  Googling was not overly productive due to that other web
 server that also uses the file name httpd.conf and htpasswd. :-/

Check RFC 2617:
http://tools.ietf.org/html/rfc2617#page-3

Or just Google it via http realm query and check Stack Overflow:

http://stackoverflow.com/questions/12701085/what-is-the-realm-in-basic-authentication

 What I'm trying to do is have one user/pw protected directory on a web
 server.  Most of the server is open to all (and of interest to very
 few), but this one directory should be letting basically no one in
 without authentication.

No prob, just follow the instructions. I've just tested them on OpenBSD 5.7 
release.

1. Put something like this in your /etc/httpd.conf:

server default {
listen on egress port 80

location /priv* {
authenticate with /htpasswd
}
}

2. Now use htpasswd to create a htpasswd file. Swap example with your user 
name:

$ sudo htpasswd /var/www/htpasswd example
Password:
Retype Password:
$

3. Now make it readable for user www group daemon by issuing this command:

$ sudo chown www:daemon /var/www/htpasswd

4. Enjoy.

P.S: I believe httpd should say something explicitly if it fails to load 
htpasswd file.
Currently it just silently fails. Should be at least a warning.



Lenovo T450s status

2015-05-27 Thread Shaun Reiger
Hello Misc I'm looking at purchasing a Lenovo T450s as my main laptop, but
I wanted to find out if anyone has hit any major roadblocks using obsd 5.7
with this model. I know this is a fairly new machine and support is always
hit and miss, but any guidance on this machine would help.

Biggest concerns are battery life and fan noise.


Thanks.


-- 
Shaun

Ars longa, vita brevis, occasio praeceps, experimentum periculosum,
iudicium difficile - Hippocrates (c. 400BC)



Re: installing stable failed

2015-05-27 Thread Harald Dunkel
Hi Theo,

On 05/27/15 15:37, Theo Buehler wrote:
 
 To fix your machine, either use the cp and mv commands as above or
 simply issuing
 
 # cp bsd /bsd
 
 would be enough since `/bsd' isn't in the way.
 

The point is that make install didn't, because it expected
a previous /bsd in the destination directory. Should be easy
to fix.

The workaround is obvious, but thanx anyway


Regards
Harri



Re: Lenovo T450s status

2015-05-27 Thread Harald Dunkel
Hi Shaun,

On 05/28/15 01:48, Shaun Reiger wrote:
 Hello Misc I'm looking at purchasing a Lenovo T450s as my main laptop, but
 I wanted to find out if anyone has hit any major roadblocks using obsd 5.7
 with this model. I know this is a fairly new machine and support is always
 hit and miss, but any guidance on this machine would help.
 
 Biggest concerns are battery life and fan noise.
 

I have a T440s. Battery life and fan noise are excellent
(using Linux, though).

A major issue with this device is: Its highly painful to
open the case for a hard disk replacement or to extend
RAM. You have to be extremely careful to not break a
latch. According to its Hardware Maintenance Manual

http://download.lenovo.com/pccbbs/mobiles_pdf/t450s_hmm_en_sp40g54937.pdf

(page 62) the T450s has the same design problem.


Hope this helps
Harri



Re: booting OpenBSD with grub

2015-05-27 Thread Josh Grosse
On Wed, May 27, 2015 at 07:48:49AM -0400, cobalt wrote:
 any idea on the the proper way to get grub to boot openbsd:
 
 set root=(hd1,4) is what i have, but i am missing something and i do not
 know what.
 
 any thoughts would help.
 
 regards.
 
 gilles

I have an old netbook with sysutils/grub installed.  That's v1, and
I provision the chainloader.  Here's my menu.lst: 

default 0
timeout 5

title OpenBSD
root (hd0,3)
chainloader +1

title WinXP
root (hd0,0)
chainloader +1

WXP is retained for a few select applications: firmware installation
on peripherals, WebRTC applications ... and that's it.



httpd authenticate option usage

2015-05-27 Thread Nick Holland
ok, I'm probably being overly dense here, but ...

How does the httpd authenticate option work?  from httpd.conf(5):
 [no] authenticate [realm] with htpasswd
   Authenticate a remote user for realm by checking the credentials
   against the user authentication file htpasswd.  The file name is
   relative to the chroot and must be readable by the www user.  Use
   the no authenticate directive to disable authentication in a
   location.

what's realm?  It shows up twice in the man page, both times in that
paragraph.  Googling was not overly productive due to that other web
server that also uses the file name httpd.conf and htpasswd. :-/

What I'm trying to do is have one user/pw protected directory on a web
server.  Most of the server is open to all (and of interest to very
few), but this one directory should be letting basically no one in
without authentication.

Adding
authenticate with /htpasswd
to the server section works to protect the entire page (expected that --
though the error handling here isn't my favorite -- produces syntax
error when /htpasswd exists but is not readable by web server user).
 Adding it to a location section like this:

server njh.example.com {
listen on $ext_addr port 80
root /njh.example.com

location /* {
directory auto index
log style combined
}

location /priv/* {
authenticate with /htpasswd
}
}

seems to be a no op -- never seems to prompt for the uid/pw.

I'm sure whatever I'm missing is stupidly simple, but not sure what it
is ...

Nick.



Re: httpd authenticate option usage

2015-05-27 Thread Nick Holland
On 05/27/15 22:42, Yegor Timoschenko wrote:
 How does the httpd authenticate option work?  from httpd.conf(5):
 [no] authenticate [realm] with htpasswd
   Authenticate a remote user for realm by checking the credentials
   against the user authentication file htpasswd.  The file name is
   relative to the chroot and must be readable by the www user.  Use
   the no authenticate directive to disable authentication in a
   location.
 
 what's realm?  It shows up twice in the man page, both times in that
 paragraph.  Googling was not overly productive due to that other web
 server that also uses the file name httpd.conf and htpasswd. :-/
 
 Check RFC 2617:
 http://tools.ietf.org/html/rfc2617#page-3
 
 Or just Google it via http realm query and check Stack Overflow:
 
 http://stackoverflow.com/questions/12701085/what-is-the-realm-in-basic-authentication

oh standard term, eh?  whooda thunk?  Well, obviously you, obviously not
me. :-/

 What I'm trying to do is have one user/pw protected directory on a web
 server.  Most of the server is open to all (and of interest to very
 few), but this one directory should be letting basically no one in
 without authentication.
 
 No prob, just follow the instructions. I've just tested them on OpenBSD 5.7 
 release.

gah. Knew it would be easy.

Your sample works, mine had the 'location /*' before the 'location
/priv/*, and apparently it's first match, not last match (or most
specific or ...).  Swapping the order of my location statements (or as
you did, just leaving the root one out) solved my problem.

(and for a few other related reasons, my example config was pretty dumb,
so thanks for deleting my example!).

 
 P.S: I believe httpd should say something explicitly if it fails to load 
 htpasswd file.
 Currently it just silently fails. Should be at least a warning.

send diff. :D
But yeah, I found lots of ways to make errors and get unexpected results
from those errors.  On the other hand, the apache config file and I
never were best of buddies, either.

Thanks!

Nick.



booting OpenBSD with grub

2015-05-27 Thread cobalt
any idea on the the proper way to get grub to boot openbsd:

set root=(hd1,4) is what i have, but i am missing something and i do not
know what.

any thoughts would help.

regards.

gilles



Re: building mp userland?

2015-05-27 Thread Theo de Raadt
I built the userland with a GENERIC kernel. Then I looked at the dmesg and
realized I had wanted the GENERIC.MP kernel.

I'm going to re-build userland anyway, but how different is the resulting
userland?

Not a single bit different.



building mp userland?

2015-05-27 Thread Joel Rees
I built the userland with a GENERIC kernel. Then I looked at the dmesg and
realized I had wanted the GENERIC.MP kernel.

I'm going to re-build userland anyway, but how different is the resulting
userland?

Joel Rees

Computer memory is just fancy paper,
CPUs just fancy pens.
All is a stream of text
flowing from the past into the future.