Re: Necessary Files?
On 9/15/06, Ray [EMAIL PROTECTED] wrote: I plan to configure a device to boot from a CF card, but to reduce writes to the CF, run /tmp /var and /dev from a memory (mfs) drive. When preping the device, I copy the contents of the /var directory to another directory path. When 'swap mfs' in the fstab file mounts the mfs drive, the contents of the that directory is copied there. However, when I copy files to the new directory with the command: cp -rp /var /mfstmp/var I get cp: /var/cron/tabs/.sock: Operation not supported cp: /var/empty/dev/log: Operation not supported Is there any ugly problems that may come about later without these socks or file? I am doing similar things, but I use find /var |cpio -o -Hustar|gzip -9 varXX.tgz I don't have this problem. You can leave out the gzip part, too.
Re: tutorial for securing wifi networks with ipsec and openbsd, somewhere?
Christian Weisgerber [EMAIL PROTECTED] wrote: Meanwhile, ipsecctl has gained support for pre-shared key authentication. So in 3.9, things are simpler still: Sounds great and thx a lot for your help :-)) For those who are interested and have wifi windows xp clients. Recently I came across a tool called smartvpn dial-up connection management from draytek. It is a freeware (ipsec) client that makes it very simple to configure ipsec on windows 2k/xp. You will not have to use mmc + ipsec policy editor or ipseccmd.exe. It is available here: http://217.160.102.141/data/RouterTools/win/SmartVPN/SMARTVPN09_05.zip This tool does the following (based on your configuration choices), it dynamically creates the policies and activate/deactivate them when you need or don't need them anymore. I don't see a reason why it shouldn't not work with an openbsd ipsec gateway. Have a look at the client's ipsec tunnel mode (I think this is the one you will use) of the client. I personally did not have the opportunity to test it with openbsd (as I'm an ipsec novice) but I will make the test with openbsd current as soon as I can ... Regards Didier fyi: I am using this now with WinXP SP2 connected to my wireless LAN. This is the ipsec.conf entry that works for me: ike esp from any to $XP_LAPTOP_IP main auth hmac-sha1 enc 3des \ quick auth hmac-sha1 enc 3des \ psk secretkey I found it very easy to use, the ipseccmd.exe from SP2 chrashes every time and Softremote is too complex. Regards gp