Re: Strange kernel panic-like problem

2019-02-07 Thread Otto Moerbeek
On Thu, Feb 07, 2019 at 11:18:40PM -0600, Kyle wrote:

> I recently upgraded a box running 6.2 to 6.4 via clean install. After a few 
> days of running normally it started locking up, usually within a minute or so 
> after booting up to the login prompt. ddb appears on the console.
> 
> I eventually thought to try booting bsd.sp, which has been running for about 
> a day now without locking up.
> 
> Any clues to point me in the right direction would be much appreciated.
> 
> Here's some excerpts from the serial console (different sessions) and a dmesg:
> 
> 
> ddb{0}> show panic
> the kernel did not panic
> ddb{0}> trace
> acpicpu_idle() at acpicpu_idle+0x1ea
> sched_idle(0) at sched_idle+0x245
> end trace frame: 0x0, count: -2
> 
> 
> 
> login: NMI ... going o debugger

NMIs (Non Maskable Interrupts) are often an indication of hardware problems.

-Otto

> ddb{0}䀿   movq$0x8,%rcxuaei[1;24r c
>db{}> 
> ddb{0}> 
> d{0}> 
> ddb{0} 
> ddb{0}> 
> ddb{0}> 
> ddb{�}> 
> ddb{0> 
> db{0}> show panic
> the kernel did not panic
> ddb{0}> 
> the kernel did not panic
> ddb{0}> 
> the kernel did not panic
> ddb{0}> 
> the kernel did not panic
> ddb{0}> 
> the kernel di no paniddb{0}> 
> the erne i nic
> ddb{0}> 
> the kernel did not nic
> ddb{0}> 
> thernel id not nc
> ddb{0}> 
> the keel did notpanic
> ddb{0}> 
> theknel did not nic
> ddb{0}> 
> the kernel did not panic
> ddb{0}> 
> the kernel did not panic
> ddb{0}> 
> the kernel did not panc
> ddb0}> 
> the kernel did not panic
> ddb{0}> traccce
> No such command
> ddb{0}> 
> the kernel did not panic
> ddb{0}> tracce
> No such command
> ddb{0}> traace
> No such command
> ddb{0}> trace
> acpicpu_idle() at acpicpu_idle+0x1ea
> sched_idle(0) at sched_idle+0x245
> end trace frame: 0x0, count: -2
> ddb{0}> 
> acpicpu_idle() at acpicpu_idle+0x1ea
> end trace frame: 0x8000218fca60, count: 0
> ddb{0}> 
> acpicpu_idle() at acpicpu_idle+0x1ea
> end trace frame: 0x8000218fca60, count: 0
> ddb{0}> 
> acpicpu_idle() at acpicpu_idle+0x1ea
> end trace frame: 0x8000218fca60, count: 0
> ddb{0}> 
> acpicpu_idle() at acpicpu_idle+0x1ea
> end trace frame: 0x8000218fca60, count: 0
> ddb{0}> 
> acpicpu_idle() at acpicpu_idle+0x1ea
> end trace frame: 0x8000218fca60, count: 0
> ddb{0}> 
> acpicpu_idle() at acpicpu_idle+0x1ea
> end trace frame: 0x8000218fca60, count: 0
> ddb{0}> boot dump
> syncing disks..
> 
> 
> 
> 
> ddb{1}> boot dump
> syncing disks...panic: kernel diagnostic assertion "p->p_wchan == NULL" 
> failed: file "/usr/src/sys/kern/kern_sched.c", line 338
> Stopped at  db_enter+0x12:  popq%r11
> TIDPIDUID PRFLAGS PFLAGS  CPU  COMMAND
>   72309  19595 730x100010   0x800  syslogd
> db_enter() at db_enter+0x12
> panic() at panic+0x120
> __assert(811929f4,80002191fa00,800021750ff0,8000e960) 
> a
> t __assert+0x24
> sched_chooseproc() at sched_chooseproc+0x241
> mi_switch() at mi_switch+0x1b4
> sleep_finish(6d3fbc03daad5a02,80002191fb10) at sleep_finish+0x7f
> sleep_finish_all(270c6ff115c03531,80002191fb10) at sleep_finish_all+0x1f
> tsleep(64263b673ec8ed92,ff02417d4200,ff027f616830,65420) at 
> tsleep+0xcd
> 
> getblk(f6e14443bcd449df,ff027f6167d0,80002191fd00,0,ff027f3d3000) 
> a
> t getblk+0xf5
> bread(80145000,ff027f616a28,ff027f3d3000,0) at bread+0x1b
> ffs_update(292bb10918b461bf,ff027f616a28) at ffs_update+0xfc
> VOP_FSYNC(f6e14443bcb92266,80002191fe38,2be1d547d68afbf,8000e960) 
> a
> t VOP_FSYNC+0x52
> ffs_sync_vnode(5116a32c89f5a557,80002191fe38) at ffs_sync_vnode+0xd2
> vfs_mount_foreach_vnode(9582de35d54b8f61,2,8000e960) at 
> vfs_mount_forea
> ch_vnode+0x4e
> end trace frame: 0x80002191fea0, count: 0
> https://www.openbsd.org/ddb.html describes the minimum info required in bug
> reports.  Insufficient info makes it difficult to find and fix bugs.
> ddb{1}> boot sync
> panic: kernel diagnostic assertion "__mp_lock_held(&sched_lock, curcpu()) == 
> 0" failed: file "/usr/src/sys/kern/kern_lock.c", line 63
> Stopped at  db_enter+0x12:  popq%r11
> db_enter() at db_enter+0x12
> panic() at panic+0x120
> __assert(811929f4,80002191f530,0,ff02369aeae8) at 
> __assert+0x24
> 
> _kernel_lock(778d687e7309b96e,1) at _kernel_lock+0xea
> solock(537a4000962b3bf3) at solock+0x44
> route_input(6e54ffebe841494b,80002191f610,8012f000) at 
> route_input+
> 0xd1
> if_down(8012f000) at if_down+0x94
> if_downall() at if_downall+0x62
> boot(c) at boot+0x8d
> reboot(4800) at reboot+0x5a
> nvramattach(81d05260) at nvramattach
> db_boot_sync_cmd(819a1c9e,80002191f6c0,81d05260,1) at 
> db_bo
> ot_sync_cmd+0xe
> db_command(be4ef64b60647db8,0) at db_command+0x2b4
> db_command_loop() at db_command_loop+0x96
> end trace frame: 0x80002191f820, count: 0
> ddb{1}>
> 
> 
> 
> ddb{1}> dmesg  
> OpenBSD 6.4 (GENERIC.MP) #6: Sat Jan 26 20:37

Strange kernel panic-like problem

2019-02-07 Thread Kyle
I recently upgraded a box running 6.2 to 6.4 via clean install. After a few 
days of running normally it started locking up, usually within a minute or so 
after booting up to the login prompt. ddb appears on the console.

I eventually thought to try booting bsd.sp, which has been running for about a 
day now without locking up.

Any clues to point me in the right direction would be much appreciated.

Here's some excerpts from the serial console (different sessions) and a dmesg:


ddb{0}> show panic
the kernel did not panic
ddb{0}> trace
acpicpu_idle() at acpicpu_idle+0x1ea
sched_idle(0) at sched_idle+0x245
end trace frame: 0x0, count: -2



login: NMI ... going o debugger
ddb{0}䀿   movq$0x8,%rcxuaei[1;24r c
   db{}> 
ddb{0}> 
d{0}> 
ddb{0} 
ddb{0}> 
ddb{0}> 
ddb{�}> 
ddb{0> 
db{0}> show panic
the kernel did not panic
ddb{0}> 
the kernel did not panic
ddb{0}> 
the kernel did not panic
ddb{0}> 
the kernel did not panic
ddb{0}> 
the kernel di no paniddb{0}> 
the erne i nic
ddb{0}> 
the kernel did not nic
ddb{0}> 
thernel id not nc
ddb{0}> 
the keel did notpanic
ddb{0}> 
theknel did not nic
ddb{0}> 
the kernel did not panic
ddb{0}> 
the kernel did not panic
ddb{0}> 
the kernel did not panc
ddb0}> 
the kernel did not panic
ddb{0}> traccce
No such command
ddb{0}> 
the kernel did not panic
ddb{0}> tracce
No such command
ddb{0}> traace
No such command
ddb{0}> trace
acpicpu_idle() at acpicpu_idle+0x1ea
sched_idle(0) at sched_idle+0x245
end trace frame: 0x0, count: -2
ddb{0}> 
acpicpu_idle() at acpicpu_idle+0x1ea
end trace frame: 0x8000218fca60, count: 0
ddb{0}> 
acpicpu_idle() at acpicpu_idle+0x1ea
end trace frame: 0x8000218fca60, count: 0
ddb{0}> 
acpicpu_idle() at acpicpu_idle+0x1ea
end trace frame: 0x8000218fca60, count: 0
ddb{0}> 
acpicpu_idle() at acpicpu_idle+0x1ea
end trace frame: 0x8000218fca60, count: 0
ddb{0}> 
acpicpu_idle() at acpicpu_idle+0x1ea
end trace frame: 0x8000218fca60, count: 0
ddb{0}> 
acpicpu_idle() at acpicpu_idle+0x1ea
end trace frame: 0x8000218fca60, count: 0
ddb{0}> boot dump
syncing disks..




ddb{1}> boot dump
syncing disks...panic: kernel diagnostic assertion "p->p_wchan == NULL" failed: 
file "/usr/src/sys/kern/kern_sched.c", line 338
Stopped at  db_enter+0x12:  popq%r11
TIDPIDUID PRFLAGS PFLAGS  CPU  COMMAND
  72309  19595 730x100010   0x800  syslogd
db_enter() at db_enter+0x12
panic() at panic+0x120
__assert(811929f4,80002191fa00,800021750ff0,8000e960) a
t __assert+0x24
sched_chooseproc() at sched_chooseproc+0x241
mi_switch() at mi_switch+0x1b4
sleep_finish(6d3fbc03daad5a02,80002191fb10) at sleep_finish+0x7f
sleep_finish_all(270c6ff115c03531,80002191fb10) at sleep_finish_all+0x1f
tsleep(64263b673ec8ed92,ff02417d4200,ff027f616830,65420) at tsleep+0xcd

getblk(f6e14443bcd449df,ff027f6167d0,80002191fd00,0,ff027f3d3000) a
t getblk+0xf5
bread(80145000,ff027f616a28,ff027f3d3000,0) at bread+0x1b
ffs_update(292bb10918b461bf,ff027f616a28) at ffs_update+0xfc
VOP_FSYNC(f6e14443bcb92266,80002191fe38,2be1d547d68afbf,8000e960) a
t VOP_FSYNC+0x52
ffs_sync_vnode(5116a32c89f5a557,80002191fe38) at ffs_sync_vnode+0xd2
vfs_mount_foreach_vnode(9582de35d54b8f61,2,8000e960) at vfs_mount_forea
ch_vnode+0x4e
end trace frame: 0x80002191fea0, count: 0
https://www.openbsd.org/ddb.html describes the minimum info required in bug
reports.  Insufficient info makes it difficult to find and fix bugs.
ddb{1}> boot sync
panic: kernel diagnostic assertion "__mp_lock_held(&sched_lock, curcpu()) == 0" 
failed: file "/usr/src/sys/kern/kern_lock.c", line 63
Stopped at  db_enter+0x12:  popq%r11
db_enter() at db_enter+0x12
panic() at panic+0x120
__assert(811929f4,80002191f530,0,ff02369aeae8) at __assert+0x24

_kernel_lock(778d687e7309b96e,1) at _kernel_lock+0xea
solock(537a4000962b3bf3) at solock+0x44
route_input(6e54ffebe841494b,80002191f610,8012f000) at route_input+
0xd1
if_down(8012f000) at if_down+0x94
if_downall() at if_downall+0x62
boot(c) at boot+0x8d
reboot(4800) at reboot+0x5a
nvramattach(81d05260) at nvramattach
db_boot_sync_cmd(819a1c9e,80002191f6c0,81d05260,1) at db_bo
ot_sync_cmd+0xe
db_command(be4ef64b60647db8,0) at db_command+0x2b4
db_command_loop() at db_command_loop+0x96
end trace frame: 0x80002191f820, count: 0
ddb{1}>



ddb{1}> dmesg  
OpenBSD 6.4 (GENERIC.MP) #6: Sat Jan 26 20:37:44 CET 2019
r...@syspatch-64-amd64.openbsd.org:/usr/src/sys/arch/amd64/compile/GENERIC.
MP
real mem = 8544854016 (8149MB)
avail mem = 8276611072 (7893MB)
mpath0 at root
scsibus0 at mpath0: 256 targets
mainbus0 at root
bios0 at mainbus0: SMBIOS rev. 2.8 @ 0x7f4d8000 (50 entries)
bios0: vendor American Megatrends Inc. version "1.1a" date 08/27/2015
bios0: Supermicro A1SAi
acpi0 at bios0: rev 2
acpi0: sleep states S0 S5
acpi0: tables DSDT FACP FPDT FIDT SPMI MCFG WDA

Re: SSH disconnects right after accepting

2019-02-07 Thread Максим
Hello,
Did you edit /etc/login.conf recently?

-- 
Best Regards
Maksim Rodin


08.02.2019, 03:27, "Lars Bonnesen" :
> OpenBSD 6.4
>
> Putty just reports "Authenticating with public key "XXX" from agent" and
> then I am disconnected. If I run sshd with -ddd, I get the following
> output. I can't seem to get any error, and therefor I can't tell what is
> wrong. Anyone has any idea? Thanks
>
> debug2: load_server_config: filename /etc/ssh/sshd_config
> debug2: load_server_config: done config len = 204
> debug2: parse_server_config: config /etc/ssh/sshd_config len 204
> debug3: /etc/ssh/sshd_config:25 setting LogLevel DEBUG
> debug3: /etc/ssh/sshd_config:30 setting PermitRootLogin no
> debug3: /etc/ssh/sshd_config:39 setting AuthorizedKeysFile
> .ssh/authorized_keys
> debug3: /etc/ssh/sshd_config:86 setting Subsystem sftp
> /usr/libexec/sftp-server
> debug1: sshd version OpenSSH_7.9, LibreSSL 2.8.2
> debug1: private host key #0: ssh-rsa SHA256:XXX
> debug1: private host key #1: ecdsa-sha2-nistp256 SHA256:XXX
> debug1: private host key #2: ssh-ed25519 SHA256:XXX
> debug1: rexec_argv[0]='/usr/sbin/sshd'
> debug1: rexec_argv[1]='-ddd'
> debug2: fd 3 setting O_NONBLOCK
> debug1: Bind to port 22 on 0.0.0.0.
> Server listening on 0.0.0.0 port 22.
> debug2: fd 4 setting O_NONBLOCK
> debug1: Bind to port 22 on ::.
> Server listening on :: port 22.
> debug1: fd 5 clearing O_NONBLOCK
> debug1: Server will not fork when running in debugging mode.
> debug3: send_rexec_state: entering fd = 8 config len 204
> debug3: ssh_msg_send: type 0
> debug3: send_rexec_state: done
> debug1: rexec start in 5 out 5 newsock 5 pipe -1 sock 8
> debug1: inetd sockets after dupping: 3, 3
> Connection from 172.17.4.3 port 63721 on 172.17.1.2 port 22 rdomain "0"
> debug1: Client protocol version 2.0; client software version
> PuTTY_Release_0.70
> debug1: no match: PuTTY_Release_0.70
> debug1: Local version string SSH-2.0-OpenSSH_7.9
> debug2: fd 3 setting O_NONBLOCK
> debug3: ssh_sandbox_init: preparing pledge sandbox
> debug2: Network child is on pid 89382
> debug3: preauth child monitor started
> debug3: privsep user:group 27:27 [preauth]
> debug1: permanently_set_uid: 27/27 [preauth]
> debug1: list_hostkey_types:
> rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256,ssh-ed25519 [preauth]
> debug3: send packet: type 20 [preauth]
> debug1: SSH2_MSG_KEXINIT sent [preauth]
> debug3: receive packet: type 20 [preauth]
> debug1: SSH2_MSG_KEXINIT received [preauth]
> debug2: local server KEXINIT proposal [preauth]
> debug2: KEX algorithms:
> curve25519-sha256,curve25519-sha...@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1
> [preauth]
> debug2: host key algorithms:
> rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256,ssh-ed25519 [preauth]
> debug2: ciphers ctos: chacha20-poly1...@openssh.com
> ,aes128-ctr,aes192-ctr,aes256-ctr,aes128-...@openssh.com,
> aes256-...@openssh.com [preauth]
> debug2: ciphers stoc: chacha20-poly1...@openssh.com
> ,aes128-ctr,aes192-ctr,aes256-ctr,aes128-...@openssh.com,
> aes256-...@openssh.com [preauth]
> debug2: MACs ctos: umac-64-...@openssh.com,umac-128-...@openssh.com,
> hmac-sha2-256-...@openssh.com,hmac-sha2-512-...@openssh.com,
> hmac-sha1-...@openssh.com,umac...@openssh.com,umac-...@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
> [preauth]
> debug2: MACs stoc: umac-64-...@openssh.com,umac-128-...@openssh.com,
> hmac-sha2-256-...@openssh.com,hmac-sha2-512-...@openssh.com,
> hmac-sha1-...@openssh.com,umac...@openssh.com,umac-...@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
> [preauth]
> debug2: compression ctos: none,z...@openssh.com [preauth]
> debug2: compression stoc: none,z...@openssh.com [preauth]
> debug2: languages ctos: [preauth]
> debug2: languages stoc: [preauth]
> debug2: first_kex_follows 0 [preauth]
> debug2: reserved 0 [preauth]
> debug2: peer client KEXINIT proposal [preauth]
> debug2: KEX algorithms:
> curve25519-sha...@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,rsa2048-sha256,rsa1024-sha1,diffie-hellman-group1-sha1
> [preauth]
> debug2: host key algorithms:
> ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-rsa,ssh-dss
> [preauth]
> debug2: ciphers ctos: aes256-ctr,aes256-cbc,rijndael-...@lysator.liu.se
> ,aes192-ctr,aes192-cbc,aes128-ctr,aes128-cbc,chacha20-poly1...@openssh.com,blowfish-ctr,blowfish-cbc,3des-ctr,3des-cbc,arcfour256,arcfour128
> [preauth]
> debug2: ciphers stoc: aes256-ctr,aes256-cbc,rijndael-...@lysator.liu.se
> ,aes192-ctr,aes192-cbc,aes128-ctr,aes128-cbc,chacha20-poly1...@openssh.com,blowfish-ctr,blowfish-cbc,3des-ctr,3des-cbc,arcfour256,arcfour128
> [preauth]
> debug2: MACs ctos: hmac-sha2-256,hmac-sha1,hmac-sha1-96,hmac-md5,
> hmac-sha2-256-

Re: [SUSPECTED SPAM] SSH disconnects right after accepting

2019-02-07 Thread Damien Miller
On Fri, 8 Feb 2019, Lars Bonnesen wrote:

> OpenBSD 6.4
> 
> Putty just reports "Authenticating with public key "XXX" from agent" and
> then I am disconnected. If I run sshd with -ddd, I get the following
> output. I can't seem to get any error, and therefor I can't tell what is
> wrong. Anyone has any idea? Thanks

Darren has been unable to replicate this problem using PuTTY as a client.

Could you please try to see whether sshd is dumping core? You can follow
the instructions at the end of "man sysctl" - search for "nosuidcoredump"
to enable coredumps for the sshd process. Once that is done, you can
try to reproduce your problem and then check the /var/crash/sshd
directory.

-d



Re: SSH disconnects right after accepting

2019-02-07 Thread Aaron Mason
Can you share your sshd_config file, and ~user/.ssh/rc  and
~user/.ssh/config files (if they exist) please.

On Fri, Feb 8, 2019 at 12:07 PM Lars Bonnesen  wrote:
>
> No, clear text login also does not work. Only when I log on through the 
> console, not say.
>
> Regards, Lars.
>
> On Fri, Feb 8, 2019, 02:03 Aaron Mason >
>> Hi
>>
>> Does it work fine if you log in with the user's password?
>>
>> On Fri, Feb 8, 2019 at 11:25 AM Lars Bonnesen  
>> wrote:
>> >
>> > OpenBSD 6.4
>> >
>> > Putty just reports "Authenticating with public key "XXX" from agent" and
>> > then I am disconnected. If I run sshd with -ddd, I get the following
>> > output. I can't seem to get any error, and therefor I can't tell what is
>> > wrong. Anyone has any idea? Thanks
>> >
>> >
>> > debug2: load_server_config: filename /etc/ssh/sshd_config
>> > debug2: load_server_config: done config len = 204
>> > debug2: parse_server_config: config /etc/ssh/sshd_config len 204
>> > debug3: /etc/ssh/sshd_config:25 setting LogLevel DEBUG
>> > debug3: /etc/ssh/sshd_config:30 setting PermitRootLogin no
>> > debug3: /etc/ssh/sshd_config:39 setting AuthorizedKeysFile
>> > .ssh/authorized_keys
>> > debug3: /etc/ssh/sshd_config:86 setting Subsystem sftp
>> > /usr/libexec/sftp-server
>> > debug1: sshd version OpenSSH_7.9, LibreSSL 2.8.2
>> > debug1: private host key #0: ssh-rsa SHA256:XXX
>> > debug1: private host key #1: ecdsa-sha2-nistp256 SHA256:XXX
>> > debug1: private host key #2: ssh-ed25519 SHA256:XXX
>> > debug1: rexec_argv[0]='/usr/sbin/sshd'
>> > debug1: rexec_argv[1]='-ddd'
>> > debug2: fd 3 setting O_NONBLOCK
>> > debug1: Bind to port 22 on 0.0.0.0.
>> > Server listening on 0.0.0.0 port 22.
>> > debug2: fd 4 setting O_NONBLOCK
>> > debug1: Bind to port 22 on ::.
>> > Server listening on :: port 22.
>> > debug1: fd 5 clearing O_NONBLOCK
>> > debug1: Server will not fork when running in debugging mode.
>> > debug3: send_rexec_state: entering fd = 8 config len 204
>> > debug3: ssh_msg_send: type 0
>> > debug3: send_rexec_state: done
>> > debug1: rexec start in 5 out 5 newsock 5 pipe -1 sock 8
>> > debug1: inetd sockets after dupping: 3, 3
>> > Connection from 172.17.4.3 port 63721 on 172.17.1.2 port 22 rdomain "0"
>> > debug1: Client protocol version 2.0; client software version
>> > PuTTY_Release_0.70
>> > debug1: no match: PuTTY_Release_0.70
>> > debug1: Local version string SSH-2.0-OpenSSH_7.9
>> > debug2: fd 3 setting O_NONBLOCK
>> > debug3: ssh_sandbox_init: preparing pledge sandbox
>> > debug2: Network child is on pid 89382
>> > debug3: preauth child monitor started
>> > debug3: privsep user:group 27:27 [preauth]
>> > debug1: permanently_set_uid: 27/27 [preauth]
>> > debug1: list_hostkey_types:
>> > rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256,ssh-ed25519 [preauth]
>> > debug3: send packet: type 20 [preauth]
>> > debug1: SSH2_MSG_KEXINIT sent [preauth]
>> > debug3: receive packet: type 20 [preauth]
>> > debug1: SSH2_MSG_KEXINIT received [preauth]
>> > debug2: local server KEXINIT proposal [preauth]
>> > debug2: KEX algorithms:
>> > curve25519-sha256,curve25519-sha...@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1
>> > [preauth]
>> > debug2: host key algorithms:
>> > rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256,ssh-ed25519 [preauth]
>> > debug2: ciphers ctos: chacha20-poly1...@openssh.com
>> > ,aes128-ctr,aes192-ctr,aes256-ctr,aes128-...@openssh.com,
>> > aes256-...@openssh.com [preauth]
>> > debug2: ciphers stoc: chacha20-poly1...@openssh.com
>> > ,aes128-ctr,aes192-ctr,aes256-ctr,aes128-...@openssh.com,
>> > aes256-...@openssh.com [preauth]
>> > debug2: MACs ctos: umac-64-...@openssh.com,umac-128-...@openssh.com,
>> > hmac-sha2-256-...@openssh.com,hmac-sha2-512-...@openssh.com,
>> > hmac-sha1-...@openssh.com,umac...@openssh.com,umac-...@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
>> > [preauth]
>> > debug2: MACs stoc: umac-64-...@openssh.com,umac-128-...@openssh.com,
>> > hmac-sha2-256-...@openssh.com,hmac-sha2-512-...@openssh.com,
>> > hmac-sha1-...@openssh.com,umac...@openssh.com,umac-...@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
>> > [preauth]
>> > debug2: compression ctos: none,z...@openssh.com [preauth]
>> > debug2: compression stoc: none,z...@openssh.com [preauth]
>> > debug2: languages ctos:  [preauth]
>> > debug2: languages stoc:  [preauth]
>> > debug2: first_kex_follows 0  [preauth]
>> > debug2: reserved 0  [preauth]
>> > debug2: peer client KEXINIT proposal [preauth]
>> > debug2: KEX algorithms:
>> > curve25519-sha...@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,rsa2048-sha256,rsa1024-sha1,diffie-hellman-group1-sha1
>> > [preauth]
>> > debug2: host key algorithms:
>> > ssh-ed25519,ecdsa-sha2-nistp256,ec

Re: SSH disconnects right after accepting

2019-02-07 Thread Aaron Mason
Hi

Does it work fine if you log in with the user's password?

On Fri, Feb 8, 2019 at 11:25 AM Lars Bonnesen  wrote:
>
> OpenBSD 6.4
>
> Putty just reports "Authenticating with public key "XXX" from agent" and
> then I am disconnected. If I run sshd with -ddd, I get the following
> output. I can't seem to get any error, and therefor I can't tell what is
> wrong. Anyone has any idea? Thanks
>
>
> debug2: load_server_config: filename /etc/ssh/sshd_config
> debug2: load_server_config: done config len = 204
> debug2: parse_server_config: config /etc/ssh/sshd_config len 204
> debug3: /etc/ssh/sshd_config:25 setting LogLevel DEBUG
> debug3: /etc/ssh/sshd_config:30 setting PermitRootLogin no
> debug3: /etc/ssh/sshd_config:39 setting AuthorizedKeysFile
> .ssh/authorized_keys
> debug3: /etc/ssh/sshd_config:86 setting Subsystem sftp
> /usr/libexec/sftp-server
> debug1: sshd version OpenSSH_7.9, LibreSSL 2.8.2
> debug1: private host key #0: ssh-rsa SHA256:XXX
> debug1: private host key #1: ecdsa-sha2-nistp256 SHA256:XXX
> debug1: private host key #2: ssh-ed25519 SHA256:XXX
> debug1: rexec_argv[0]='/usr/sbin/sshd'
> debug1: rexec_argv[1]='-ddd'
> debug2: fd 3 setting O_NONBLOCK
> debug1: Bind to port 22 on 0.0.0.0.
> Server listening on 0.0.0.0 port 22.
> debug2: fd 4 setting O_NONBLOCK
> debug1: Bind to port 22 on ::.
> Server listening on :: port 22.
> debug1: fd 5 clearing O_NONBLOCK
> debug1: Server will not fork when running in debugging mode.
> debug3: send_rexec_state: entering fd = 8 config len 204
> debug3: ssh_msg_send: type 0
> debug3: send_rexec_state: done
> debug1: rexec start in 5 out 5 newsock 5 pipe -1 sock 8
> debug1: inetd sockets after dupping: 3, 3
> Connection from 172.17.4.3 port 63721 on 172.17.1.2 port 22 rdomain "0"
> debug1: Client protocol version 2.0; client software version
> PuTTY_Release_0.70
> debug1: no match: PuTTY_Release_0.70
> debug1: Local version string SSH-2.0-OpenSSH_7.9
> debug2: fd 3 setting O_NONBLOCK
> debug3: ssh_sandbox_init: preparing pledge sandbox
> debug2: Network child is on pid 89382
> debug3: preauth child monitor started
> debug3: privsep user:group 27:27 [preauth]
> debug1: permanently_set_uid: 27/27 [preauth]
> debug1: list_hostkey_types:
> rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256,ssh-ed25519 [preauth]
> debug3: send packet: type 20 [preauth]
> debug1: SSH2_MSG_KEXINIT sent [preauth]
> debug3: receive packet: type 20 [preauth]
> debug1: SSH2_MSG_KEXINIT received [preauth]
> debug2: local server KEXINIT proposal [preauth]
> debug2: KEX algorithms:
> curve25519-sha256,curve25519-sha...@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1
> [preauth]
> debug2: host key algorithms:
> rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256,ssh-ed25519 [preauth]
> debug2: ciphers ctos: chacha20-poly1...@openssh.com
> ,aes128-ctr,aes192-ctr,aes256-ctr,aes128-...@openssh.com,
> aes256-...@openssh.com [preauth]
> debug2: ciphers stoc: chacha20-poly1...@openssh.com
> ,aes128-ctr,aes192-ctr,aes256-ctr,aes128-...@openssh.com,
> aes256-...@openssh.com [preauth]
> debug2: MACs ctos: umac-64-...@openssh.com,umac-128-...@openssh.com,
> hmac-sha2-256-...@openssh.com,hmac-sha2-512-...@openssh.com,
> hmac-sha1-...@openssh.com,umac...@openssh.com,umac-...@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
> [preauth]
> debug2: MACs stoc: umac-64-...@openssh.com,umac-128-...@openssh.com,
> hmac-sha2-256-...@openssh.com,hmac-sha2-512-...@openssh.com,
> hmac-sha1-...@openssh.com,umac...@openssh.com,umac-...@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
> [preauth]
> debug2: compression ctos: none,z...@openssh.com [preauth]
> debug2: compression stoc: none,z...@openssh.com [preauth]
> debug2: languages ctos:  [preauth]
> debug2: languages stoc:  [preauth]
> debug2: first_kex_follows 0  [preauth]
> debug2: reserved 0  [preauth]
> debug2: peer client KEXINIT proposal [preauth]
> debug2: KEX algorithms:
> curve25519-sha...@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,rsa2048-sha256,rsa1024-sha1,diffie-hellman-group1-sha1
> [preauth]
> debug2: host key algorithms:
> ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-rsa,ssh-dss
> [preauth]
> debug2: ciphers ctos: aes256-ctr,aes256-cbc,rijndael-...@lysator.liu.se
> ,aes192-ctr,aes192-cbc,aes128-ctr,aes128-cbc,chacha20-poly1...@openssh.com,blowfish-ctr,blowfish-cbc,3des-ctr,3des-cbc,arcfour256,arcfour128
> [preauth]
> debug2: ciphers stoc: aes256-ctr,aes256-cbc,rijndael-...@lysator.liu.se
> ,aes192-ctr,aes192-cbc,aes128-ctr,aes128-cbc,chacha20-poly1...@openssh.com,blowfish-ctr,blowfish-cbc,3des-ctr,3des-cbc,arcfour256,arcfour128
> [preauth]
> debug2: MACs ctos: hmac-sha2-256,hmac-sha1,hmac-sha1-96,hmac-md5,
> hmac-

SSH disconnects right after accepting

2019-02-07 Thread Lars Bonnesen
OpenBSD 6.4

Putty just reports "Authenticating with public key "XXX" from agent" and
then I am disconnected. If I run sshd with -ddd, I get the following
output. I can't seem to get any error, and therefor I can't tell what is
wrong. Anyone has any idea? Thanks


debug2: load_server_config: filename /etc/ssh/sshd_config
debug2: load_server_config: done config len = 204
debug2: parse_server_config: config /etc/ssh/sshd_config len 204
debug3: /etc/ssh/sshd_config:25 setting LogLevel DEBUG
debug3: /etc/ssh/sshd_config:30 setting PermitRootLogin no
debug3: /etc/ssh/sshd_config:39 setting AuthorizedKeysFile
.ssh/authorized_keys
debug3: /etc/ssh/sshd_config:86 setting Subsystem sftp
/usr/libexec/sftp-server
debug1: sshd version OpenSSH_7.9, LibreSSL 2.8.2
debug1: private host key #0: ssh-rsa SHA256:XXX
debug1: private host key #1: ecdsa-sha2-nistp256 SHA256:XXX
debug1: private host key #2: ssh-ed25519 SHA256:XXX
debug1: rexec_argv[0]='/usr/sbin/sshd'
debug1: rexec_argv[1]='-ddd'
debug2: fd 3 setting O_NONBLOCK
debug1: Bind to port 22 on 0.0.0.0.
Server listening on 0.0.0.0 port 22.
debug2: fd 4 setting O_NONBLOCK
debug1: Bind to port 22 on ::.
Server listening on :: port 22.
debug1: fd 5 clearing O_NONBLOCK
debug1: Server will not fork when running in debugging mode.
debug3: send_rexec_state: entering fd = 8 config len 204
debug3: ssh_msg_send: type 0
debug3: send_rexec_state: done
debug1: rexec start in 5 out 5 newsock 5 pipe -1 sock 8
debug1: inetd sockets after dupping: 3, 3
Connection from 172.17.4.3 port 63721 on 172.17.1.2 port 22 rdomain "0"
debug1: Client protocol version 2.0; client software version
PuTTY_Release_0.70
debug1: no match: PuTTY_Release_0.70
debug1: Local version string SSH-2.0-OpenSSH_7.9
debug2: fd 3 setting O_NONBLOCK
debug3: ssh_sandbox_init: preparing pledge sandbox
debug2: Network child is on pid 89382
debug3: preauth child monitor started
debug3: privsep user:group 27:27 [preauth]
debug1: permanently_set_uid: 27/27 [preauth]
debug1: list_hostkey_types:
rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256,ssh-ed25519 [preauth]
debug3: send packet: type 20 [preauth]
debug1: SSH2_MSG_KEXINIT sent [preauth]
debug3: receive packet: type 20 [preauth]
debug1: SSH2_MSG_KEXINIT received [preauth]
debug2: local server KEXINIT proposal [preauth]
debug2: KEX algorithms:
curve25519-sha256,curve25519-sha...@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1
[preauth]
debug2: host key algorithms:
rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256,ssh-ed25519 [preauth]
debug2: ciphers ctos: chacha20-poly1...@openssh.com
,aes128-ctr,aes192-ctr,aes256-ctr,aes128-...@openssh.com,
aes256-...@openssh.com [preauth]
debug2: ciphers stoc: chacha20-poly1...@openssh.com
,aes128-ctr,aes192-ctr,aes256-ctr,aes128-...@openssh.com,
aes256-...@openssh.com [preauth]
debug2: MACs ctos: umac-64-...@openssh.com,umac-128-...@openssh.com,
hmac-sha2-256-...@openssh.com,hmac-sha2-512-...@openssh.com,
hmac-sha1-...@openssh.com,umac...@openssh.com,umac-...@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
[preauth]
debug2: MACs stoc: umac-64-...@openssh.com,umac-128-...@openssh.com,
hmac-sha2-256-...@openssh.com,hmac-sha2-512-...@openssh.com,
hmac-sha1-...@openssh.com,umac...@openssh.com,umac-...@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
[preauth]
debug2: compression ctos: none,z...@openssh.com [preauth]
debug2: compression stoc: none,z...@openssh.com [preauth]
debug2: languages ctos:  [preauth]
debug2: languages stoc:  [preauth]
debug2: first_kex_follows 0  [preauth]
debug2: reserved 0  [preauth]
debug2: peer client KEXINIT proposal [preauth]
debug2: KEX algorithms:
curve25519-sha...@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,rsa2048-sha256,rsa1024-sha1,diffie-hellman-group1-sha1
[preauth]
debug2: host key algorithms:
ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-rsa,ssh-dss
[preauth]
debug2: ciphers ctos: aes256-ctr,aes256-cbc,rijndael-...@lysator.liu.se
,aes192-ctr,aes192-cbc,aes128-ctr,aes128-cbc,chacha20-poly1...@openssh.com,blowfish-ctr,blowfish-cbc,3des-ctr,3des-cbc,arcfour256,arcfour128
[preauth]
debug2: ciphers stoc: aes256-ctr,aes256-cbc,rijndael-...@lysator.liu.se
,aes192-ctr,aes192-cbc,aes128-ctr,aes128-cbc,chacha20-poly1...@openssh.com,blowfish-ctr,blowfish-cbc,3des-ctr,3des-cbc,arcfour256,arcfour128
[preauth]
debug2: MACs ctos: hmac-sha2-256,hmac-sha1,hmac-sha1-96,hmac-md5,
hmac-sha2-256-...@openssh.com,hmac-sha1-...@openssh.com,
hmac-sha1-96-...@openssh.com,hmac-md5-...@openssh.com [preauth]
debug2: MACs stoc: hmac-sha2-256,hmac-sha1,hmac-sha1-96,hmac-md5,
hmac-sha2-256-...@openssh.com,hmac-sha1-...@openssh.com,
hmac-sha1-96-...@openssh.com,hmac-md5-...@openssh.com [preauth]
d

Re: OpenBSD 6.4 cu and cuaU0

2019-02-07 Thread Mihai Popescu
As an irony, your email footer note is a perfect answer for your questions.

How did you try to kill it? Send more info, please.



Re: Relayd with multiple lets encrypt cert's

2019-02-07 Thread Aham Brahmasmi
Hi Stuart,

> Sent: Monday, December 24, 2018 at 1:13 AM
> From: "Stuart Henderson" 
> To: misc@openbsd.org
> Subject: Re: Relayd with multiple lets encrypt cert's
>
> On 2018-12-22, Aham Brahmasmi  wrote:
> >> On Sat, Dec 22, 2018 at 12:28:46PM +0100, Aham Brahmasmi wrote:
> >> > Hi,
> >> > 
> >> > > On Sat, Dec 22, 2018 at 07:07:58AM +0100, Flipchan wrote:
> >> > > > Hello,
> >> > > > Does anyone know how to get this working with multiple letsencrypt 
> >> > > > certs?
> >> > > > 
> >> > > 
> >> > > You need individual IP:port settings for each of the certs. Also don't
> >> > > forward to different hosts based on match rules unless you really know
> >> > > what you are doing. The backend system is only evaluated at the start 
> >> > > of
> >> > > the connection and so keepalive sessions will not route correctly.
> >> > > 
> >> > > -- 
> >> > > :wq Claudio
> >> > 
> >> > Would having a single SAN certificate help in this case [1]?
> >> > 
> >> 
> >> Yes and no. It would make listening on one port possible but it does not
> >> solve the issue of 'match forward to' being sticky for a connection.
> >> 
> >> -- 
> >> :wq Claudio
> >
> > Danke Claudio for your response.
> >
> > Would it be possible for you to please elaborate on the 'match forward
> > to' being sticky for a connection? I presume that there is some problem
> > which might occur due to this.
> 
> A request comes in with some Host geader, relayd decides the destination
> based on this and proxies the request. Client does keepalive and
> holds on to the connection for use with another request to the same
> destination IP. Client then sends a second request - different Host:
> header on the same IP. relayd already picked a backend with the first
> request and sends it there rather than doing a fresh lookup based on the
> second Host header.

I am sorry for the delay in my response.

Thank you for the simple and helpful explanation. I had not thought
about this possibility of the client reusing the underlying connection
to an IP:port shared by different hosts.

Dhanyavaad.

Regards,
ab
-|-|-|-|-|-|-|--



Re: How to print nicely formatted man pages?

2019-02-07 Thread Ingo Schwarze
Hi,

Sijmen J. Mulder wrote on Thu, Feb 07, 2019 at 05:41:57PM +0100:
> Op do feb 7 2019, om 14:33 schreef Ingo Schwarze:

>> But please, if you can, always provide complete, working, tested
>> command invocations to users, in this case:

> Apologies - I was on mobile which but that's no excuse.

No need to apologize - a timely and correct answer is of course
better than no answer.  I didn't intend to discourage that.  :)

Yours,
  Ingo



Re: How to print nicely formatted man pages?

2019-02-07 Thread Sijmen J. Mulder
Op do feb 7 2019, om 14:33 schreef Ingo Schwarze:
> But please, if you can, always provide complete, working, tested
> command invocations to users, in this case:

Apologies - I was on mobile which but that's no excuse.



Re: How to print nicely formatted man pages?

2019-02-07 Thread Ingo Schwarze
Hi Anne,

Anne Wainwright wrote on Thu, Feb 07, 2019 at 05:54:04PM +0200:

> I have now got well-formatted pages chugging out from the printer.

Good.  :-)

> I did use the example at the end of the mandoc man which outputs .ps
> files. But I did not succeed in persuading lp to print them. Thus:
> 
> $ lp lpadmin.ps
> lp: no file in print request
> 
> so not sure what the issue is there, but what I have is what I need.

A command called "lp" simply doesn't exist in the OpenBSD base system:

   $ man lp
  man: No entry for lp in the manual.
   $ which lp
  which: lp: Command not found.

Just use lpr(1) = /usr/bin/lpr.

   $ pkglocate bin/lp | grep 'lp$'
  cups-2.2.10p0:print/cups,-main:/usr/local/bin/lp

I'd advise against using cups when you can avoid it.
It is a behemoth that is extremely poorly designed,
and the documentation of cups is of terrible quality.

You are no doubt in for no end of surprises if you attempt
to use cups.  Admittedly, with some low-quality printers,
using it may look like an easy workaround for other problems.

But if your printer understands PostScript, you should be just
fine without cups.

Yours,
  Ingo



Re: How to print nicely formatted man pages?

2019-02-07 Thread Ingo Schwarze
Hi Peter,

Peter N. M. Hansteen wrote on Thu, Feb 07, 2019 at 10:26:03AM +0100:
> On Thu, Feb 07, 2019 at 09:29:39AM +0200, Anne Wainwright wrote:

>> I can print out nicely formatted man pages in linux, thus:
>> 
>> $ man -t ls | lpr -P hp_laserjet
>> 
>> But find that the -t option is not present in bsd.
>> 
>> Have really dug around but can find no hints, where should I be looking?

> I would say what you are probably looking for is mandoc (man mandoc or
> http://man.openbsd.org/mandoc), which supports a variety of output formats.

That answer is mostly correct in so far as the mandoc(1) manual page
indeed documents the -T option and PostScript output mode, but it is
also slightly misleading for the following reason:

If there is anything you can do with apropos(1), whatis(1), or mandoc(1),
then you can do exactly the same thing with man(1):

  apropos ...  ==  man -k  ...
  whatis  ...  ==  man -f  ...
  mandoc  ...  ==  man -lc ...

where "..." stands for additional options and arguments.

So "mandoc" no longer has significance as a separate program with
distinct options and/or functionality: it is just the same program
as man(1), except for having -l and -c active by default.

Of course the name "mandoc" is still significant for the (portable)
software package implementing man(1), apropos(1), whatis(1), help(1),
mandoc(1), makewhatis(8), and man.cgi(8) in OpenBSD style.

Yours,
  Ingo



Re: How to print nicely formatted man pages?

2019-02-07 Thread Ingo Schwarze
Hi,

Sijmen J. Mulder wrote on Thu, Feb 07, 2019 at 09:50:47AM +0100:
> Op 7 feb. 2019 om 08:29 heeft Anne Wainwright het volgende geschreven:

>> I can print out nicely formatted man pages in linux, thus:
>> 
>> $ man -t ls | lpr -P hp_laserjet
>> 
>> But find that the -t option is not present in bsd.
>> 
>> Have really dug around but can find no hints, where should I be looking?

> man supports mandoc's -T option, e.g.:
> 
> man -T ps | ...

That is the correct answer.

But please, if you can, always provide complete, working, tested
command invocations to users, in this case:

  $ man -T ps ls > ls.ps

to generate a PostScript file on disk or

  $ man -T ps ls | lpr

to directly send the same PostScript code to the default printer.

That practice helps to avoid misunderstandings and to promote
good idioms.

> There's a little note about it at the end of the option list in
> man's man page.  See mandoc's man page for the formats and such.

Exactly.  The reason for doing it like that was to keep the man(1)
manual page simple because new users have to read that quite early
when they are not yet experienced.  It would be of dubious benefit
to put lots of rarely-used non-standard options into the man(1)
manual.  Besides, duplicate information is also a problem - both
for maintenance and because it forces readers to scan and compare
two (identical? similar? or subtly different?) versions.

As to why we have mo -t option, see

  http://mandoc.bsd.lv/man/man.options.1.html
  http://mandoc.bsd.lv/man/man.options.1.html#t

Even though it is similar to -T ps in most man(1) implementations,
it has ambiguous meanings in the wider program family, in particular:

 - preprocess with tbl(7) in groff
 - test = check manual pages in the hierarchy with mandb
 - test = check files for problems related to mandoc.db(5) in makewhatis

So i decided it is best to not implement an alias -t, also because
every alias makes the documentation longer, and it is best to get
used to the -T ps option which needs to be supported anyway.

Yours,
  Ingo



Re: SPA112 VoIP with pf and NAT - States keeps open on address change

2019-02-07 Thread Stuart Henderson
On 2019-02-06, Patrick  wrote:
> My nat rule use the parenthesis and all other devices behind the
> firewall works fine. I think it’s more a specific issue with the SPA112.
> I have also set the ruleset optimization to conservative but in this
> case the generated state has just a longer time to live. This isn’t the
> problem because the SPA112 sends regular keep alive packets which reset
> the counter for the state.

Setting to 'conservative' (i.e. hanging on to states for longer) can't
help with this.

Using parentheses won't help either, that means "do a lookup at state
creation time", but you aren't getting a new state created because the 
old one hasn't expired.

>
> Here the related rules:
> pass out quick on egress inet from (vether0:network) nat-to (egress) modulate 
> state
> pass in on egress inet proto udp from  to (egress) port 5060
>
> As I’m just reading again my rules. Is the modulate state the problem?
> Or will pf use keep state for UDP packets as the default?

PF uses "keep state" by default, and "keep state" is required for NAT.

I think your main options are:

- use a *shorter* timeout for this rule (this can be set per-rule
and overrides the default from "set optimization") and have a port
forward rule so that incoming packets still work even when the
state has timed out

- arrange a way to flush these states when the IP changes

The first of these is probably easiest if you can do it ..




Re: How to print nicely formatted man pages?

2019-02-07 Thread Peter N. M. Hansteen
On Thu, Feb 07, 2019 at 09:29:39AM +0200, Anne Wainwright wrote:
> I can print out nicely formatted man pages in linux, thus:
> 
> $ man -t ls | lpr -P hp_laserjet
> 
> But find that the -t option is not present in bsd.
> 
> Have really dug around but can find no hints, where should I be looking?

I would say what you are probably looking for is mandoc (man mandoc or
http://man.openbsd.org/mandoc), which supports a variety of output formats.

- Peter

-- 
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.



Re: How to print nicely formatted man pages?

2019-02-07 Thread Sijmen J. Mulder
> Op 7 feb. 2019 om 08:29 heeft Anne Wainwright  het 
> volgende geschreven:
> 
> I can print out nicely formatted man pages in linux, thus:
> 
> $ man -t ls | lpr -P hp_laserjet
> 
> But find that the -t option is not present in bsd.
> 
> Have really dug around but can find no hints, where should I be looking?

man supports mandoc’s -T option, e.g.:

man -T ps | ...

There’s a little note about it at the end of the option list in man’s man page. 
See mandoc’s man page for the formats and such.

Cheers,
Sijmen