OpenBSD lectures in Bavaria?

2023-10-13 Thread Jiri Navratil
Hello,

I'm using OpenBSD when teaching Unix operating systems on University of
Ostrava.

I'm searching for a teacher or student from University in Bavaria, who
is interested to cooperate on a university project with OpenBSD
involved.

Best regards,
Jiří

--
Jiri Navratil, https://prf.osu.eu/kip/jiri-navratil/77251/


smime.p7s
Description: S/MIME cryptographic signature


Re: vmd and /dev/sd*

2023-10-13 Thread Dave Voutila


Manuel Giraud  writes:

> Mike Larkin  writes:
>
>> On Thu, Oct 12, 2023 at 09:24:33AM -0600, Theo de Raadt wrote:
>>> Manuel Giraud  wrote:
>>>
>>> > > Manuel Giraud  writes:
>>> > >
>>> > >> Hi,
>>> > >>
>>> > >> I can't find the information on this list (or elsewhere).  Is it
>>> > >> possible to have a vm that access a disk through its device?  The
>>> > >> following does not seem to work:
>>> > >>
>>> > >> # vmctl start -cL -m 1G -b /bsd.rd -d /dev/sd1c myvm
>>> > >> vmctl: start vm command failed: Unknown error: -1
>>> > >
>>> > > No, passing file descriptors to devices over ipc sockets isn't currently
>>> > > allowed by the kernel. You'd need to use the raw character device, too,
>>> > > afaik if passing them were allowed.
>>> >
>>> > Ok, noted.  BTW I have the same error passing the raw character device.
>>>
>>>
>>>
>>> I made the decision to not allow passing of weird file descriptor types
>>> very intentionally.  I'm still very sure that is the right decision.
>>>
>>> Here's 1 program which wants to do it, but the other 1000 pledge'd programs
>>> are being protected from being passed an incorrect fd and then doing system
>>> calls upon it which behave "different".  By that, I mean seek, read, and
>>> write short-operation behaviours are subtly different outside of files and
>>> sockets, and it would also expose some ioctl (which is MOSTLY limited by
>>> pledge, but ioctl "request" values are just numbers, and they can overlap in
>>> surprising ways).
>>>
>>
>> I would like to make clear that vmd does not "want to do it", and that I 
>> agree
>> that the current design of not being able to pass these types of fds is
>> correct. It may be slightly inconvient for certain niche use cases, but not
>> worth weakening everything else or putting in hacks. Just dd the device you
>> want to a .raw file and use that.
>
> Thanks for making that clear.  I do not understand all the security
> implications but you do :)  Maybe to prevent future request, you could
> have a more explicit error message.

I agree reporting "Unknown error" is unhelpful. I don't think having
something specific to people trying to use devices instead of files is
worth the effort as none of the documentation should be implying that's
a feature.



Re: OpenBSD 7.4

2023-10-13 Thread Crystal Kolipe
On Fri, Oct 13, 2023 at 10:36:43AM +, Laura Smith wrote:
> Certainly by all means, track that file on CVS as the "source of truth" but
> ultimately there's no certainty until it happens.

For more accuracy you could try grabbing a local copy of the CVS repo with
reposync and writing a script to carefully analyse the changes to every file
across each release ever made, compare them to previous known release dates,
do some kind of statistical analysis using a machine learning system, produce
a mathematical model that approximates the mental processes of the developers
involved, manually adjust the algo for known external factors then compute an
estimated release date for 7.4.

Or just wait until Monday.



Re: OpenBSD 7.4

2023-10-13 Thread Laura Smith


> I usually track the following file.
> 
> https://cvsweb.openbsd.org/src/etc/root/root.mail
> 


Ironically, that file seems to support the earlier statement made by Peter 
Hansteen that he got shot down for (i.e. "The exact date will not be generally 
known until it happens if recent releases
are anything to go by.").

Peter was absolutely right, and the CVS shows it, the date is constantly 
subject to change until such point as the powers that be call time.

Certainly by all means, track that file on CVS as the "source of truth" but 
ultimately there's no certainty until it happens.



Re: vmd and /dev/sd*

2023-10-13 Thread Manuel Giraud
Mike Larkin  writes:

> On Thu, Oct 12, 2023 at 09:24:33AM -0600, Theo de Raadt wrote:
>> Manuel Giraud  wrote:
>>
>> > > Manuel Giraud  writes:
>> > >
>> > >> Hi,
>> > >>
>> > >> I can't find the information on this list (or elsewhere).  Is it
>> > >> possible to have a vm that access a disk through its device?  The
>> > >> following does not seem to work:
>> > >>
>> > >> # vmctl start -cL -m 1G -b /bsd.rd -d /dev/sd1c myvm
>> > >> vmctl: start vm command failed: Unknown error: -1
>> > >
>> > > No, passing file descriptors to devices over ipc sockets isn't currently
>> > > allowed by the kernel. You'd need to use the raw character device, too,
>> > > afaik if passing them were allowed.
>> >
>> > Ok, noted.  BTW I have the same error passing the raw character device.
>>
>>
>>
>> I made the decision to not allow passing of weird file descriptor types
>> very intentionally.  I'm still very sure that is the right decision.
>>
>> Here's 1 program which wants to do it, but the other 1000 pledge'd programs
>> are being protected from being passed an incorrect fd and then doing system
>> calls upon it which behave "different".  By that, I mean seek, read, and
>> write short-operation behaviours are subtly different outside of files and
>> sockets, and it would also expose some ioctl (which is MOSTLY limited by
>> pledge, but ioctl "request" values are just numbers, and they can overlap in
>> surprising ways).
>>
>
> I would like to make clear that vmd does not "want to do it", and that I agree
> that the current design of not being able to pass these types of fds is
> correct. It may be slightly inconvient for certain niche use cases, but not
> worth weakening everything else or putting in hacks. Just dd the device you
> want to a .raw file and use that.

Thanks for making that clear.  I do not understand all the security
implications but you do :)  Maybe to prevent future request, you could
have a more explicit error message.
-- 
Manuel Giraud