You people just don't understand
I am mainly a USER of OpenBSD. Not particularly interested in developing I just hate it when shitty code starts showing up, drug money appears in my bank account, ladies and gentlemen start hanging around all the wrong places, and I can no longer get an undistrurbed night's sleep anywhere on the face of the earth. I do financial analysis, which sometimes involves some pretty deep math to figure out where my clients' money is disappearing to. Come on now, is this a secure operating system, or a gang of cat burglars, identity thieves, sex offenders, and drug addicts? When you start digging into my bank account, and hacking my clients' brokerage accounts, without permission and without a warrant from lawful authorities, YOU WILL BE SHOT TO DEATH. Yes, I know. I made a death threat on a public mailing list. I used to do payroll. And guess what. If you mind your own business, you don't have to worry about any death threats from me. Just like anyone else, when I get too much spam in my Yahoo account, I get another one. Same with my bank account. When too many fraudulent transactions appear, I close it and open a new one with a different number.
Fw: IC3 Complaint: I1305292157456181
Do you people understand long sentences at the federal penitentiary? With a fat blonde cellmate who never shuts her big mouth? Because you can just keep your computer masturbathons, drugs, alcohol, and forced and unwanted sex away from me. I do not associate with identity thieves, burglars, sex offenders, or people who hack into other people's computers where they don't belong. I don't like the johns that hang out with you people, either. - Forwarded Message - From: no-re...@ic3.gov no-re...@ic3.gov To: zx006...@yahoo.com Cc: Sent: Wednesday, May 29, 2013 6:58 PM Subject: IC3 Complaint: I1305292157456181 Thank you for filing a complaint with the Internet Crime Complaint Center (IC3). Your complaint has been successfully submitted. Please retain the following information for future contacts with the IC3: Complaint Id: Password: If you wish to view/download your complaint or have any additional information to provide to the IC3, please use the following link and login with the above complaint id and password. http://complaint.ic3.gov/update The IC3's mission is to serve as a vehicle to receive, develop, and refer criminal complaints regarding the rapidly expanding arena of cyber crime. The IC3 aims to give the victims of cyber crime a convenient and easy-to-use reporting mechanism. Complaint Status The IC3 receives thousands of complaints each month and does not have the resources to respond to inquiries regarding the status of complaints. It is the IC3's intention to review all complaints and refer them to law enforcement and regulatory agencies having jurisdiction. Ultimately, investigation and prosecution are at the discretion of the receiving agencies. Evidence It is important that you maintain any evidence you may have relating to your complaint. Evidence may include canceled checks, credit card receipts, phone bills, mailing envelopes, mail receipts, a printed copy of a website, copies of emails, or similar items. Please keep the items in a safe location, in case you are requested to provide them for investigative purposes. Additionally, to learn more about Internet schemes and ways to protect yourself, please visit www.lookstoogoodtobetrue.com.
Re: From the military propaganda department
Richard Thornton: Not sorry, not a dude, I do not drink alcohol, and I do not associate with people like you. Take your dude problems elsewhere, because I am not interested. OpenBSD is the only reason I am here, and I do not like rubber hoses or the people who try to shove them up my butt. I don't care what Theo thinks, either. It's his operating system, and he can take it or leave it or ignore the spam. And anyone else can use it under the BSD license. That's what he did to NetBSD anyway. I am going to use whatever software I want to use as long as it is legal. Same as anyone else on the mailing list, unless I get B for some reason, in which case I will find a different mailing list. I don't run the show here, so don't act like I do or I am trying to, because I am not. I'm not interesting in forkingan operating system or going back to Net- or FreeBSD, either. I don't like Linux, either, because the kernel is far too bloated, and I don't like all the spyware, adware, and malware that goes along with it. I just use OpenBSD as an operating system. It does not put me in the mood to party, nor, do I think, is it intended to. Yet another defense to rubber-hose cryptanalysis is to slice those rubber hoses to ribbons with a sharp razor, and install a decent burglar alarm with a secure OS. From: Richard Thornton rich...@thornton.net To: zx5...@yahoo.com; misc@openbsd.org Sent: Monday, May 27, 2013 7:51 PM Subject: Re: From the military propaganda department Time to drink a beer and chill out, dude! Sent from my BlackBerry 10 smartphone on the Verizon Wireless 4G LTE network. From: Justin Lindberg Sent: Saturday, May 25, 2013 2:01 PM To: misc@openbsd.org Reply To: Justin Lindberg Subject: From the military propaganda department Excuse the Yahoo address. That's the best I can do here in the United States of Amerikkka. How is life in OpenBSD-land? The gummint dont trust me when I use OpenBSD because they don't have a clue what I'm doing when I'm at my computer. Even after they've read my code, and obtained all my passwords via rubber-hose cryptanalysis, and they're sitting at my keyboard staring at the hash prompt, they still don't have a clue what I am doing, and they think the problem can be solved by the more liberal use of rubber hoses. Oh, I was writing a letter to my attorney. But some people consider that to be illegal here in Amerikkka. They don't understand that when I am ready to release my software, I release it, and when it's released, it's released. That is my right under our First Amendment guarantee of freedom of speech and of the press. I think it works pretty similarly over there in Canada. When you've tested your code and you are ready, you commit it, and when it's committed, it's committed, and the rest of the team is free to tear it to shreds. The best defense to rubber-hose cryptanalysis is small pieces of lead, saboted and silenced and projected at high speed at anyone and everyone armed with a rubber hose. The Penguins over in Linux-land understand this very well. Do the Pufferfish? Because that's my right, too, under our Second Amendment guarantee of the right to keep and bear arms. So when I'm ready, I fire a shot, and when it's fired, it's fired, and there is no calling it back. And that's why I make dead certain that I am ready before I fire. Even if the U.S. Department of Defense considers computer cryptography to be a munition of war, then the right to use it is still protected, only under the Second Amendment rather than the First. Some communications are private, confidential, classified, or privileged and not obtainable with a warrant, and that is why we use cryptography here in the United States of America.
Re: From the military propaganda department
You need to be shot to death. - Original Message - From: Richard Thornton rich...@thornton.net To: Justin Lindberg zx5...@yahoo.com Cc: Sent: Tuesday, May 28, 2013 4:09 AM Subject: Re: From the military propaganda department If you dont drink, then take a valium
From the military propaganda department
Excuse the Yahoo address. That's the best I can do here in the United States of Amerikkka. How is life in OpenBSD-land? The gummint dont trust me when I use OpenBSD because they don't have a clue what I'm doing when I'm at my computer. Even after they've read my code, and obtained all my passwords via rubber-hose cryptanalysis, and they're sitting at my keyboard staring at the hash prompt, they still don't have a clue what I am doing, and they think the problem can be solved by the more liberal use of rubber hoses. Oh, I was writing a letter to my attorney. But some people consider that to be illegal here in Amerikkka. They don't understand that when I am ready to release my software, I release it, and when it's released, it's released. That is my right under our First Amendment guarantee of freedom of speech and of the press. I think it works pretty similarly over there in Canada. When you've tested your code and you are ready, you commit it, and when it's committed, it's committed, and the rest of the team is free to tear it to shreds. The best defense to rubber-hose cryptanalysis is small pieces of lead, saboted and silenced and projected at high speed at anyone and everyone armed with a rubber hose. The Penguins over in Linux-land understand this very well. Do the Pufferfish? Because that's my right, too, under our Second Amendment guarantee of the right to keep and bear arms. So when I'm ready, I fire a shot, and when it's fired, it's fired, and there is no calling it back. And that's why I make dead certain that I am ready before I fire. Even if the U.S. Department of Defense considers computer cryptography to be a munition of war, then the right to use it is still protected, only under the Second Amendment rather than the First. Some communications are private, confidential, classified, or privileged and not obtainable with a warrant, and that is why we use cryptography here in the United States of America.
Microsoft Wireless Mobile Mouse 3500
Hello again misc, I recently bought a Microsoft Wireless Mobile Mouse 3500, and I assumed it would work like most any other mouse on OpenBSD. Unfortunately it did not. After googling, I found a patch on the following page, which again unfortunately seems down at the moment, and moreover it's in Japanese, of which I don't understand a word: http://yasuoka.net/~yasuoka/hack-2012.html At first I thought the patch was working perfectly in an amd64 otherwise generic MP kernel, but the mouse has a tendency to slow down and become unresponsive over time, and then I have to power-cycle the mouse itself in order to get it to work again. I'm inclined to think it's just a piece of junk, but is there any hope to support this mouse, or should I simply avoid all Microsoft mice? Thanks, Justin
Re: Microsoft Wireless Mobile Mouse 3500
On Tue, 25 Sep 2012 12:23:52 +0900 (JST) YASUOKA Masahiko yasu...@yasuoka.net wrote: The patch is for myself. It fixes the problem of my laptop. I already sent the patch to yuo@. I heard from him the mouse doesn't work because openbsd cannot read the usb hid descriptors properly and it is not easy to fix. He is trying to fix that. --yasuoka I haven't tried it on a very recent kernel, but as far as I can tell the patch works perfectly for getting the device recognized properly, and it was very helpful to me for that part, so thank you very much. The weirdness I experience with the mouse might be a more general issue with X or a deeper issue with the mouse itself. It tends to happen when I move a lot of windows around, and then things remain seized up until I turn the mouse off and back on again.
Re: Ethernet bridge over IPsec in OpenBSD 4.1
On Wednesday 08 August 2007 07:51, you wrote: it was broken and you need to apply the patch from revision 1.161 Thank you for the quick reply. I actually am trying that patch, but it seems to have no effect on the behavior of the system. Doing tcpdump -n -p -igif0 will show incoming packets normally, but only a timestamp for packets that were supposed to be going out. These empty packets are not even seen at the other end of the gif tunnel. Packets that were picked up at a physical interface on the bridge are apparently still not being sent out on the gif tunnel properly. --Justin Lindberg
Ethernet bridge over IPsec in OpenBSD 4.1
I have not been able to get an Ethernet bridge over IPsec to work in OpenBSD 4.1. I have two machines running as NAT gateways with a gif tunnel between them protected by IPsec ESP. The internal interfaces are both bridged to the gif tunnel. I can ping either gateway from the other over the tunnel, but the bridges are not learning any MAC addresses from the gif side save that of the other gateway. When I try to ping a machine on one LAN from the opposite gateway, the ARP who-is packets from the gateway will be forwarded by the other gateway's bridge, but the reply packets do not seem to be properly sent back over the gif interface by the bridge. I noticed in the source repository the following comment in src/sys/net/if_bridge.c, revision 1.161 make bridge(4) mark packets with M_PROTO1 if gif(4) needs to use etherip encapsulation; unbreaks remote ipsec bridges; ok claudio; additional testing Renaud Allard Is this type of bridging broken in OpenBSD 4.1, or am I missing something? Is there a way to make this work while I am waiting for 4.2? I had this exact same setup working in a previous version of OpenBSD. (I can't remember if it was 3.9 or 4.0.)