Re: dhcpleased[59824]: sendto: Permission denied

2023-07-08 Thread Thomas M. Beaudry
You did not even look at the list rules.
"Do your homework first..
No desire to deprive you of a learning experience."

Nobody is here to hold your hand. They do too much of that at work. You
must be knowledgeable of the subject. If not, use Google (many web sites
for teaching) or switch to FreeBSD with support for the novice.

The boss gave up a DARPA research grant rather than make changes for them.

On Sat, Jul 8, 2023, 11:42 Mark  wrote:

> What kind of anger and rudeness is that?
>
> We're all (at least those who ask questions) learning here. @misc is for
> that, right?
>
> And I think you should learn, too. You must.
>
> You said it's -no way- related to PF. Yet, it was PF in the end.
>
> Anyway, stop blindly insulting people here.
>
>
>
> Zack Newman , 8 Tem 2023 Cmt, 20:02 tarihinde
> şunu yazdı:
>
> > I am only replying to this in the interest of closure since I am
> > already part of this thread, but disclaimer here is some tough love.
> >
> > You need to stop being lazy and actually understand your network
> > topology, the security/privacy real or contrived-I see you adhere to
> > the whole security by obscurity nonsense with the masking of the last
> > 2 octets of that IPv4 address-and pf. Besides your first attempt at
> > "magically" fixing your problem which was doomed to fail for the
> > reasons I gave, you are now asking for people to guess what rules you
> > need.
> >
> > Do you "really need to block 'martians'"? Seriously? Ignoring the
> > philosophical trap of what you mean by "need", do you even know what a
> > "martian" is; and if not, then why are you blindly blocking them? If you
> > don't know what you are doing, then just don't do it. I don't even know
> > what a "martian" is other than an alien thing from outer space. In the
> > interest of providing a modicum of constructive criticism as opposed to
> > just criticism, here you go:
> >
> >
> https://www.iana.org/assignments/iana-ipv6-special-registry/iana-ipv6-special-registry.xhtml
> > .
> >
> >
> https://www.iana.org/assignments/iana-ipv4-special-registry/iana-ipv4-special-registry.xhtml
> > Not sure if that is what "martians" refer to, but your "martians"
> > appear to be a proper subset of what is listed there or at least close.
> > With that information, seek out what those blocks mean and decide based
> > on your topology and security/privacy needs if you should block
> > them.
> >
> > Should I block 192.168.3.2 on my laptop? What about
> > ingress traffic from 2343:24ad:afde:8224::23 destined to UDP port 764
> > on my VPS? Those are obviously rhetorical questions as only I know (or
> > at least _should_ know) what my network topology is like, what
> > services I run, to whom I want to serve, etc.
> >
> > You clearly blindly copied and pasted some rules you found without
> > knowing what they do or why you are doing it as evidenced by the rather
> > embarrassing blocking of your DHCP server. If you are going to be lazy
> > and just want stuff to magically work, then disable pf. Bam. Don't need
> > to worry about anything. If you plan to block stuff though, then
> > actually learn about what you are blocking and why.
> >
> > Here is a tiny olive branch: I would allow all egress traffic from your
> > VPS since that is within _my_ wheel of trust. If my VPS is trying to
> > talk to an IP, then either it is already compromised or at least running
> > software it shouldn't at which point I have bigger problems; or it
> > needs to. Does that "magical" rule apply to you? I don't know, and it
> > sounds like you don't either. Even if it does, you will still need to
> > decide if you want to allow other IPs to send traffic; but that requires
> > you to learn more about your topology, pf, and security/privacy needs.
> >
> >
>


Re: dhcpleased[59824]: sendto: Permission denied

2023-07-08 Thread Daniele B.
Jul 8, 2023 20:42:57 Mark wrote:

> Anyway, stop blindly insulting people here.


More blood, more fun.. indeed.

I guess this should complaint with some specs from Texas, uh?


PS: Mark, don't give it up we are all with you! It is just the next big 
frontier to do mailing :)



Re: Intel DRM error on T 440

2023-07-08 Thread Nick Holland

On 7/6/23 01:46, Jonathan Drews wrote:

uname:  OpenBSD 7.3 GENERIC.MP#1125 amd64

  I get the following error message when my Thinkpad T440 wakes up:

drm:pid73944:intel_dp_aux_wait_done *ERROR* [drm] *ERROR* AUX A/DDI
A/PHY A: did not complete or timeout within 10ms (status 0xa01300e1)

I have Googled that error message and no fixes turn up.

In other respects, my OpenBSD T440 works just great. My rc.conf.local
contains this:>
apmd_flags=-A
pf=YES
pkg_scripts=messagebus cupsd mysqld
xenodm_flags=

Any suggestions as to what I may have misconfigured would be helpful.
I have loaded the firmware using fw_update. This error did not occur
in OpenBSD 7.2.


I believe what you are seeing is an informative message about what is
going on under the covers, not an problem you (as a user) need to
deal with if everything is working as it should be.  However, if things
are NOT working as they should, messages like this are potentially
helpful to developers to track down the problem.

Hardware is often imperfect, and often doesn't behave as documented,
and has to be "fixed" (or more accurately, worked around) in software.
I think that's all you are seeing here -- notification that something
was worked around (or at least, didn't behave as expected) -- if
there are no other symptoms.

Nick.



Re: dhcpleased[59824]: sendto: Permission denied

2023-07-08 Thread Zack Newman

In the interest of transparency, an individual was kind enough to teach
me that the term "martian" is in fact defined in RFC 1812:
https://www.rfc-editor.org/rfc/rfc1812#page-149

Thank you for the information.



Re: dhcpleased[59824]: sendto: Permission denied

2023-07-08 Thread Zack Newman

Clearly you cannot read either. Please show me where I said "it's -no
way- related to PF". I'm waiting...

I'll do the work for you.

"Certainly could be. If this happens consistently around a particular
time, you can 'live dangerously' and allow all traffic temporarily to
see if the issue is resolved. More safely, use tcpdump(8) to see if you
can find the problem."

Hm, looks like I said that PF "certainly could be" the problem. That is
literally the first thing I said in this thread. I even concluded that
initial e-mail with the following:

"If it is a pf(4) issue, then it not related to that traffic."

Look at the antecedent there. I did not claim PF was not an issue. What
I _correctly_ claimed was that the issue was _not_ related to blocking
DHCP traffic on UDP port 67. If that claim is wrong, please prove me
wrong. I am not being facetious either. I would love to _learn_ where I
am wrong. I'll even go to the lengths of showing you how you could go
about proving that claim wrong. See if you have any issues with the
following rules:

# Options.
set block-policy drop

# Macros.
ext_if = 

# Filtering rules.
block in quick on $ext_if inet proto udp to port 68
block out quick on $ext_if inet proto udp to port 67
pass quick

If you have issues, then my claim was in fact wrong. Which is great!
I get to learn something.


And I think you should learn, too. You must.


I agree which is why I learned about my network topology and what rules
in my pf.conf(5) do instead of crossing my fingers and hoping some
rules I found on the Internet would work. I even offered to learn how
exactly your FreeBSD setup worked despite that being a different OS.
You never took me up on that offer on trying to understand what is
happening though. Instead you were again lazily content that adding
a rule to the likely list of rules you didn't even understand was
good enough.

I will hopefully learn to have much lower standards for the people on
@misc, and perhaps wait until I at least have had a cup of coffee before I
reply.



Re: dhcpleased[59824]: sendto: Permission denied

2023-07-08 Thread Mark
What kind of anger and rudeness is that?

We're all (at least those who ask questions) learning here. @misc is for
that, right?

And I think you should learn, too. You must.

You said it's -no way- related to PF. Yet, it was PF in the end.

Anyway, stop blindly insulting people here.



Zack Newman , 8 Tem 2023 Cmt, 20:02 tarihinde
şunu yazdı:

> I am only replying to this in the interest of closure since I am
> already part of this thread, but disclaimer here is some tough love.
>
> You need to stop being lazy and actually understand your network
> topology, the security/privacy real or contrived-I see you adhere to
> the whole security by obscurity nonsense with the masking of the last
> 2 octets of that IPv4 address-and pf. Besides your first attempt at
> "magically" fixing your problem which was doomed to fail for the
> reasons I gave, you are now asking for people to guess what rules you
> need.
>
> Do you "really need to block 'martians'"? Seriously? Ignoring the
> philosophical trap of what you mean by "need", do you even know what a
> "martian" is; and if not, then why are you blindly blocking them? If you
> don't know what you are doing, then just don't do it. I don't even know
> what a "martian" is other than an alien thing from outer space. In the
> interest of providing a modicum of constructive criticism as opposed to
> just criticism, here you go:
>
> https://www.iana.org/assignments/iana-ipv6-special-registry/iana-ipv6-special-registry.xhtml
> .
>
> https://www.iana.org/assignments/iana-ipv4-special-registry/iana-ipv4-special-registry.xhtml
> Not sure if that is what "martians" refer to, but your "martians"
> appear to be a proper subset of what is listed there or at least close.
> With that information, seek out what those blocks mean and decide based
> on your topology and security/privacy needs if you should block
> them.
>
> Should I block 192.168.3.2 on my laptop? What about
> ingress traffic from 2343:24ad:afde:8224::23 destined to UDP port 764
> on my VPS? Those are obviously rhetorical questions as only I know (or
> at least _should_ know) what my network topology is like, what
> services I run, to whom I want to serve, etc.
>
> You clearly blindly copied and pasted some rules you found without
> knowing what they do or why you are doing it as evidenced by the rather
> embarrassing blocking of your DHCP server. If you are going to be lazy
> and just want stuff to magically work, then disable pf. Bam. Don't need
> to worry about anything. If you plan to block stuff though, then
> actually learn about what you are blocking and why.
>
> Here is a tiny olive branch: I would allow all egress traffic from your
> VPS since that is within _my_ wheel of trust. If my VPS is trying to
> talk to an IP, then either it is already compromised or at least running
> software it shouldn't at which point I have bigger problems; or it
> needs to. Does that "magical" rule apply to you? I don't know, and it
> sounds like you don't either. Even if it does, you will still need to
> decide if you want to allow other IPs to send traffic; but that requires
> you to learn more about your topology, pf, and security/privacy needs.
>
>


Re: IPsec "road warrior" VPN not getting set up properly.

2023-07-08 Thread Andy Bradford
Thus said Anthony Coulter on Thu, 06 Jul 2023 21:52:54 -0400:

> I would also suggest comparing the  "hackiness" of NDP proxying to the
> hackiness of NAT, which is how we solve this same problem in IPv4.

I realize  I'm coming in late  to this discussion, and  may not actually
have anything of value to add, but...

I'm not sure how NDP proxying and NAT  are related at all. I seems to me
that NDP proxying is more akin to proxy ARP than NAT:

http://man.openbsd.org/arp#s

Andy



Re: dhcpleased[59824]: sendto: Permission denied

2023-07-08 Thread Zack Newman

I am only replying to this in the interest of closure since I am
already part of this thread, but disclaimer here is some tough love.

You need to stop being lazy and actually understand your network
topology, the security/privacy real or contrived-I see you adhere to
the whole security by obscurity nonsense with the masking of the last
2 octets of that IPv4 address-and pf. Besides your first attempt at
"magically" fixing your problem which was doomed to fail for the
reasons I gave, you are now asking for people to guess what rules you
need.

Do you "really need to block 'martians'"? Seriously? Ignoring the
philosophical trap of what you mean by "need", do you even know what a
"martian" is; and if not, then why are you blindly blocking them? If you
don't know what you are doing, then just don't do it. I don't even know
what a "martian" is other than an alien thing from outer space. In the
interest of providing a modicum of constructive criticism as opposed to
just criticism, here you go:
https://www.iana.org/assignments/iana-ipv6-special-registry/iana-ipv6-special-registry.xhtml.
https://www.iana.org/assignments/iana-ipv4-special-registry/iana-ipv4-special-registry.xhtml
Not sure if that is what "martians" refer to, but your "martians"
appear to be a proper subset of what is listed there or at least close.
With that information, seek out what those blocks mean and decide based
on your topology and security/privacy needs if you should block
them.

Should I block 192.168.3.2 on my laptop? What about
ingress traffic from 2343:24ad:afde:8224::23 destined to UDP port 764
on my VPS? Those are obviously rhetorical questions as only I know (or
at least _should_ know) what my network topology is like, what
services I run, to whom I want to serve, etc.

You clearly blindly copied and pasted some rules you found without
knowing what they do or why you are doing it as evidenced by the rather
embarrassing blocking of your DHCP server. If you are going to be lazy
and just want stuff to magically work, then disable pf. Bam. Don't need
to worry about anything. If you plan to block stuff though, then
actually learn about what you are blocking and why.

Here is a tiny olive branch: I would allow all egress traffic from your
VPS since that is within _my_ wheel of trust. If my VPS is trying to
talk to an IP, then either it is already compromised or at least running
software it shouldn't at which point I have bigger problems; or it
needs to. Does that "magical" rule apply to you? I don't know, and it
sounds like you don't either. Even if it does, you will still need to
decide if you want to allow other IPs to send traffic; but that requires
you to learn more about your topology, pf, and security/privacy needs.



Re: dhcpleased[59824]: sendto: Permission denied

2023-07-08 Thread Mark
So it seems PF was indeed blocking my DHCP stuff. After disabling PF for a
long time, I grabbed this:

"Jul  7 19:13:54 mailsrv dhcpleased[15591]: adding 95.214.xxx.xxx to vio0
(lease from 172.31.1.1)"

from /var/log/daemon file. Noticed; "lease from 172.31.1.1" that's the DHCP
server of my server provider it seems.

(Still weird, as I receive an IP starting like; 95.214.xx from that,
anyways)

AND, I had in my pf.conf file;

martians = "{ 127.0.0.0/8, 192.168.0.0/16, 172.16.0.0/12, 10.0.0.0/8,
169.254.0.0/16, 192.0.2.0/24, 0.0.0.0/8, 240.0.0.0/4 }"
block drop in quick on $ext_if from $martians to any
block drop out quick on $ext_if from any to $martians

See "172.16.0.0/12" there among the IPs?

Removed that block from the martians and it seems my problem is solved.

Question: for a mail/web server VPS box with a single public IP with only
one NIC, do I really need to block "martians"?

Best wishes.

Mark.


Otto Moerbeek , 4 Tem 2023 Sal, 21:44 tarihinde şunu yazdı:

> On Mon, Jul 03, 2023 at 10:34:24AM -0600, Zack Newman wrote:
>
> > On 7/3/23 11:25, Mark wrote:
> > > I'm getting (I think once per day) "dhcpleased[59824]: sendto:
> Permission
> > > denied" error message in my daemon and messages log files.
> > >
> > > I think that's happening due to my PF configuration.
> >
> > Certainly could be. If this happens consistently around a particular
> > time, you can "live dangerously" and allow all traffic temporarily to
> > see if the issue is resolved. More safely, use tcpdump(8) to see if you
> > can find the problem.
> >
> > > I tried to add:
> > > pass log quick on $ext_if proto udp from any to any port = 67
> > > in my pf.conf file, didn't help.
> >
> > Completely useless. DHCP traffic never makes its way to pf(4) due to
> > being handled by bpf(4) first, so you don't need such a rule-in fact
> > you could explicitly block such traffic, and it won't matter. Proof:
>
> That may be true for reading dhcp packets, but in some cases
> dhcpleased sends UDP datagram lika any ordinary program, for other
> cases it uses BPF for sending. As the error reported is for sending,
> it *is* possible that pf plays a role.
>
> -Otto
>
> >
> > router# cat /etc/pf.conf
> > # Options.
> > set block-policy drop
> >
> > # Macros.
> > wan = em0
> >
> > # Filtering rules.
> > block in quick on $wan inet proto udp to port 68
> > block out quick on $wan inet proto udp to port 67
> > pass quick
> >
> > router# rcctl stop dhcpcd
> > dhcpcd(ok)
> > router# rm -rf /var/run/dhcpcd/
> > router# ifconfig em0 -inet
> > router# ifconfig em0 -inet6
> > router# ifconfig em0 down
> > router# pfctl -f /etc/pf.conf
> > router# tcpdump -ntt -i em0 -w pkts.dat 'udp and ip and (dst port 67 or
> dst port 68)' &
> > [1] 98425
> > router# tcpdump: listening on em0, link-type EN10MB
> > router# rcctl start dhcpcd
> > dhcpcd(ok)
> > router# pkill -x tcpdump
> >
> > 12551 packets received by filter
> > 0 packets dropped by kernel
> > router# tcpdump -nr pkts.dat
> > 10:02:29.663056 0.0.0.0.68 > 255.255.255.255.67:  xid:0x3544268 [|bootp]
> > 10:02:32.802098 0.0.0.0.68 > 255.255.255.255.67:  xid:0x3544268 secs:3
> [|bootp]
> > 10:02:32.857942 96.120.140.45.67 > 73.78.65.184.68:  xid:0x3544268
> Y:73.78.65.184 G:96.120.140.45 [|bootp] [tos 0x10]
> >
> > The use of dhcpcd(8) is not relevant. I choose to use it for both DHCPv6
> > and DHCP so that I only have one daemon. I am _not_ recommending its
> > use over dhcpleased(8). The point is to show that such traffic is
> > allowed regardless of what rules you have in pf(4).
> >
> > If it is a pf(4) issue, then it not related to that traffic.
> >
>
>


Re: Self-hosting OpenBSD server, any documentation?

2023-07-08 Thread Paul Pace

On 7/8/23 1:03 AM, Theo de Raadt wrote:

Jonathan Drews  wrote:





On Sat, Jul 8, 2023, at 01:42, Jonas Borchelt wrote:

The book "Absolute OpenBSD" is an excellent choice to expand your knowledge of 
the OpenBSD operating system. It was written by Michael W. Lucas and is regarded as a 
comprehensive resource for beginners and advanced users alike. It covers various aspects 
of OpenBSD, including installation, network security, system administration, and more. 
Enjoy reading it!


There is another book by Michael Lucas that may be of benefit: "Httpd and Relayd 
Mastery".
You can buy it as a *.pdf from Tilted Windmill Press.




One day I really should try this self-hosting which seems to be all the rage.


For those of us not very good at promoting, it turns out to be a very 
self-serving endeavor.




Re: Audio issue: noise/interference

2023-07-08 Thread Alexandre Ratchov
On Fri, Jul 07, 2023 at 06:23:26PM -0400, Ricky Cintron wrote:
> I recently resolved an audio issue where I could hear a constant, light
> static noise in my earphones. It wasn't loud or distracting, but it was
> always there. The solution was to remove 'mix' as a source for mix2 and
> mix3.
> 
> However, once I got rid of that static, I noticed some additional noise
> that was apparently hidden behind the original static. Compared to the
> first issue, this noise is quieter and not constant. Anyway, it
> manifests itself in the following ways:
> 
> 1) Very light static noise that never increases, but I've noticed that
> when I load a web page (YouTube, for example), the noise is silenced
> until the page finishes loading. This also sometimes happens when I
> move the mouse cursor around the web browser window, but very briefly.
> It's easier to notice when loading a page since it lasts longer.
> 
> 2) Moving the mouse generates a barely audible buzzing sound, but this
> either doesn't occur or is barely noticeable when moving the cursor on
> a web browser window.
> 
> To troubleshoot, I inspected all the cables in the back of the
> computer (power, DP, ethernet, USB keyboard, USB mouse, speakers/line),
> and unplugged them (except the power cable) one at a time. I didn't
> hear a difference, good or bad. I also turned some mixerctl knobs with
> no noticeable effects.
> 
> Does anyone have any ideas? This isn't a big deal since I can't notice
> it while listening to audio, and it's pretty easy to tune out even
> without audio, but I'd still like to remove it if possible. I'm
> considering buying a USB audio interface, so if that even works, that
> could be a solution.

Check that your AC power plug is connected to the ground. Possibly
plug the computer in another plug, in another room, and see if this
makes any difference.

FWIW, I managed to reduce similar noises by putting ferrite rings on
most cables, the HDMI cable was a significant source of noise in my
case. I didn't try to put ferrite rings on the internal cables
(ex. those between the power supply and the motherboard), but it might
make sense as well.

Certain motherboards are just not well designed and noise might
remain, no matter what you do. A good audio interface would solve this
problem, assuming you're using speakers that don't generate noise or
passive headphones.

HTH



Re: Self-hosting OpenBSD server, any documentation?

2023-07-08 Thread xad231

https://www.openbsd.org/faq/index.html
https://www.openbsdhandbook.com/
https://openbsdrouterguide.net/

These are easy to follow introductions.
Also the man pages, all of the mentioned refer to them.

On 7/8/23 09:32, lisper.drea...@tutanota.com wrote:

Hi, misc!
What documents would you recommend for setting up a self-hosted OpenBSD server?
This way I might learn more about OpenBSD and what is under its hood.

Cheers,
Andy





Re: Self-hosting OpenBSD server, any documentation?

2023-07-08 Thread Theo de Raadt
Jonathan Drews  wrote:

> 
> 
> 
> On Sat, Jul 8, 2023, at 01:42, Jonas Borchelt wrote:
> > The book "Absolute OpenBSD" is an excellent choice to expand your knowledge 
> > of the OpenBSD operating system. It was written by Michael W. Lucas and is 
> > regarded as a comprehensive resource for beginners and advanced users 
> > alike. It covers various aspects of OpenBSD, including installation, 
> > network security, system administration, and more. Enjoy reading it!
> > 
> There is another book by Michael Lucas that may be of benefit: "Httpd and 
> Relayd Mastery".
> You can buy it as a *.pdf from Tilted Windmill Press.
> 


One day I really should try this self-hosting which seems to be all the rage.



Re: Self-hosting OpenBSD server, any documentation?

2023-07-08 Thread Jonathan Drews



On Sat, Jul 8, 2023, at 01:42, Jonas Borchelt wrote:
> The book "Absolute OpenBSD" is an excellent choice to expand your knowledge 
> of the OpenBSD operating system. It was written by Michael W. Lucas and is 
> regarded as a comprehensive resource for beginners and advanced users alike. 
> It covers various aspects of OpenBSD, including installation, network 
> security, system administration, and more. Enjoy reading it!
> 
There is another book by Michael Lucas that may be of benefit: "Httpd and 
Relayd Mastery".
You can buy it as a *.pdf from Tilted Windmill Press.



Re: Self-hosting OpenBSD server, any documentation?

2023-07-08 Thread Jonas Borchelt
The book "Absolute OpenBSD" is an excellent choice to expand your knowledge of 
the OpenBSD operating system. It was written by Michael W. Lucas and is 
regarded as a comprehensive resource for beginners and advanced users alike. It 
covers various aspects of OpenBSD, including installation, network security, 
system administration, and more. Enjoy reading it!

Best
Jonas

> Am 08.07.2023 um 09:35 schrieb lisper.drea...@tutanota.com:
> 
> Hi, misc!
> What documents would you recommend for setting up a self-hosted OpenBSD 
> server?
> This way I might learn more about OpenBSD and what is under its hood.
> 
> Cheers,
> Andy
> 
> -- 
> Sent with Tutanota, enjoy secure & ad-free emails.



Self-hosting OpenBSD server, any documentation?

2023-07-08 Thread lisper . dreamer
Hi, misc!
What documents would you recommend for setting up a self-hosted OpenBSD server?
This way I might learn more about OpenBSD and what is under its hood.

Cheers,
Andy

-- 
 Sent with Tutanota, enjoy secure & ad-free emails.