You people just don't understand

2013-05-29 Thread Justin Lindberg
I am mainly a USER of OpenBSD.  Not particularly interested in developing
I just hate it when shitty code starts showing up, drug money appears in my
bank account, ladies and gentlemen start hanging around all the wrong places,
and I can no longer get an undistrurbed night's sleep anywhere on the face of
the earth.

I do financial analysis, which sometimes involves some pretty deep math to
figure out where my clients' money is disappearing to.

Come on now, is this a secure operating system, or a gang of cat burglars,
identity thieves, sex offenders, and drug addicts?  When you start digging into
my bank account, and hacking my clients' brokerage accounts, without
permission and without a warrant from lawful authorities, YOU WILL
BE SHOT TO DEATH.

Yes, I know.  I made a death threat on a public mailing list.  I used to do 
payroll.
And guess what.  If you mind your own business, you don't have to worry about
any death threats from me.


Just like anyone else, when I get too much spam in my Yahoo account, I get
another one.  Same with my bank account.  When too many fraudulent
transactions appear, I close it and open a new one with a different number.



Fw: IC3 Complaint: I1305292157456181

2013-05-29 Thread Justin Lindberg
Do you people understand long sentences at the federal penitentiary?

With a fat blonde cellmate who never shuts her big mouth?

Because you can just keep your computer masturbathons, drugs, alcohol, and

forced and unwanted sex away from me.  I do not associate with identity thieves,
burglars, sex offenders, or people who hack into other people's computers where
they don't belong.  I don't like the johns that hang out with you people, 
either.

- Forwarded Message -
From: no-re...@ic3.gov no-re...@ic3.gov
To: zx006...@yahoo.com
Cc: 
Sent: Wednesday, May 29, 2013 6:58 PM
Subject: IC3 Complaint: I1305292157456181

Thank you for filing a complaint with the Internet Crime Complaint Center (IC3).

Your complaint has been successfully submitted. Please retain the following 
information for future contacts with the IC3: 

Complaint Id: 
Password: 

If you wish to view/download your complaint or have any additional information 
to provide to the IC3, please use the following link and login with the above 
complaint id and password.
http://complaint.ic3.gov/update

The IC3's mission is to serve as a vehicle to receive, develop, and refer 
criminal complaints regarding the rapidly expanding arena of cyber crime. The 
IC3 aims to give the victims of cyber crime a convenient and easy-to-use 
reporting mechanism. 

Complaint Status
The IC3 receives thousands of complaints each month and does not have the 
resources to respond to inquiries regarding the status of complaints. It is the 
IC3's intention to review all complaints and refer them to law enforcement and 
regulatory agencies having jurisdiction. Ultimately, investigation and 
prosecution are at the discretion of the receiving agencies.

Evidence
It is important that you maintain any evidence you may have relating to your 
complaint. Evidence may include canceled checks, credit card receipts, phone 
bills, mailing envelopes, mail receipts, a printed copy of a website, copies of 
emails, or similar items. Please keep the items in a safe location, in case you 
are requested to provide them for investigative purposes.


Additionally, to learn more about Internet schemes and ways to protect 
yourself, please visit www.lookstoogoodtobetrue.com.



Re: From the military propaganda department

2013-05-28 Thread Justin Lindberg
Richard Thornton: Not sorry, not a dude, I do not drink alcohol, and I do not
associate with people like you.  Take your dude problems elsewhere, because
I am not interested.  OpenBSD is the only reason I am here, and I do not like
rubber hoses or the people who try to shove them up my butt.  I don't care what
Theo thinks, either.  It's his operating system, and he can take it or leave it 
or
ignore the spam.  And anyone else can use it under the BSD license.  That's
what he did to NetBSD anyway.  I am going to use whatever software I want
to use as long as it is legal.  Same as anyone else on the mailing list, unless
I get B for some reason, in which case I will find a different mailing list.  
I don't
run the show here, so don't act like I do or I am trying to, because I am not.
I'm not interesting in forkingan operating system or going back to Net- or
FreeBSD, either.  I don't like Linux, either, because the kernel is far too 
bloated,
and I don't like all the spyware, adware, and malware that goes along with it.
I just use OpenBSD as an operating system.  It does not put me in the mood
to party, nor, do I think, is it intended to.  Yet another defense to 
rubber-hose
cryptanalysis is to slice those rubber hoses to ribbons with a sharp razor, and
install a decent burglar alarm with a secure OS.


From: Richard Thornton rich...@thornton.net
To: zx5...@yahoo.com; misc@openbsd.org 
Sent: Monday, May 27, 2013 7:51 PM
Subject: Re: From the military propaganda department



Time to drink a beer and chill out, dude!

Sent from my BlackBerry 10 smartphone on the Verizon Wireless 4G LTE network.
From: Justin Lindberg
Sent: Saturday, May 25, 2013 2:01 PM
To: misc@openbsd.org
Reply To: Justin Lindberg
Subject: From the military propaganda department 

Excuse the Yahoo address.  That's the best I can do here in the United States
of Amerikkka.  How is life in OpenBSD-land?  The gummint dont trust me when
I use OpenBSD because they don't have a clue what I'm doing when I'm at my
computer.  Even after they've read my code, and obtained all my passwords via
rubber-hose cryptanalysis, and they're sitting at my keyboard staring at the 
hash
prompt, they still don't have a clue what I am doing, and they think the problem
can be solved by the more liberal use of rubber hoses.

Oh, I was writing a letter to my attorney.  But some people consider that to be
illegal here in Amerikkka.

They don't understand that when I am ready to release my software, I release it,
and when it's released, it's released.  That is my right under our First 
Amendment
guarantee of freedom of speech and of the press.  I think it works pretty 
similarly
over there in Canada.  When you've tested your code and you are ready, you
commit it, and when it's committed, it's committed, and the rest of the team is
free to tear it to shreds.

The best defense to rubber-hose cryptanalysis is small pieces of lead, saboted
and silenced and projected at high speed at anyone and everyone armed with a
rubber hose.  The Penguins over in Linux-land understand this very well.  Do the
Pufferfish?  Because that's my right, too, under our Second Amendment
guarantee of the right to keep and bear arms.

So when I'm ready, I fire a shot, and when it's fired, it's fired, and there is 
no
calling it back.  And that's why I make dead certain that I am ready before I 
fire.

Even if the U.S. Department of Defense considers computer cryptography to be a
munition of war, then the right to use it is still protected, only under the 
Second
Amendment rather than the First.  Some communications are private, confidential,
classified, or privileged and not obtainable with a warrant, and that is why we 
use
cryptography here in the United States of America. 



Re: From the military propaganda department

2013-05-28 Thread Justin Lindberg
You need to be shot to death.


- Original Message -
From: Richard Thornton rich...@thornton.net
To: Justin Lindberg zx5...@yahoo.com
Cc: 
Sent: Tuesday, May 28, 2013 4:09 AM
Subject: Re: From the military propaganda department

If you dont drink, then take a valium



From the military propaganda department

2013-05-27 Thread Justin Lindberg
Excuse the Yahoo address.  That's the best I can do here in the United States
of Amerikkka.  How is life in OpenBSD-land?  The gummint dont trust me when
I use OpenBSD because they don't have a clue what I'm doing when I'm at my
computer.  Even after they've read my code, and obtained all my passwords via
rubber-hose cryptanalysis, and they're sitting at my keyboard staring at the 
hash
prompt, they still don't have a clue what I am doing, and they think the problem
can be solved by the more liberal use of rubber hoses.
 
Oh, I was writing a letter to my attorney.  But some people consider that to be
illegal here in Amerikkka.
 
They don't understand that when I am ready to release my software, I release it,
and when it's released, it's released.  That is my right under our First 
Amendment
guarantee of freedom of speech and of the press.  I think it works pretty 
similarly
over there in Canada.  When you've tested your code and you are ready, you
commit it, and when it's committed, it's committed, and the rest of the team is
free to tear it to shreds.
 
The best defense to rubber-hose cryptanalysis is small pieces of lead, saboted
and silenced and projected at high speed at anyone and everyone armed with a
rubber hose.  The Penguins over in Linux-land understand this very well.  Do the
Pufferfish?  Because that's my right, too, under our Second Amendment
guarantee of the right to keep and bear arms.
 
So when I'm ready, I fire a shot, and when it's fired, it's fired, and there is 
no
calling it back.  And that's why I make dead certain that I am ready before I 
fire.
 
Even if the U.S. Department of Defense considers computer cryptography to be a
munition of war, then the right to use it is still protected, only under the 
Second
Amendment rather than the First.  Some communications are private, confidential,
classified, or privileged and not obtainable with a warrant, and that is why we 
use
cryptography here in the United States of America.



Microsoft Wireless Mobile Mouse 3500

2012-09-24 Thread Justin Lindberg
Hello again misc,

I recently bought a Microsoft Wireless Mobile Mouse 3500, and I assumed
it would work like most any other mouse on OpenBSD.  Unfortunately it
did not.  After googling, I found a patch on the following page,
which again unfortunately seems down at the moment, and moreover it's in
Japanese, of which I don't understand a word:

http://yasuoka.net/~yasuoka/hack-2012.html

At first I thought the patch was working perfectly in an amd64 otherwise
generic MP kernel, but the mouse has a tendency to slow down and
become unresponsive over time, and then I have to power-cycle the mouse
itself in order to get it to work again.

I'm inclined to think it's just a piece of junk, but is there any hope
to support this mouse, or should I simply avoid all Microsoft mice?

Thanks,
Justin



Re: Microsoft Wireless Mobile Mouse 3500

2012-09-24 Thread Justin Lindberg
On Tue, 25 Sep 2012 12:23:52 +0900 (JST)
YASUOKA Masahiko yasu...@yasuoka.net wrote:

 The patch is for myself.  It fixes the problem of my laptop.
 
 I already sent the patch to yuo@.  I heard from him the mouse doesn't
 work because openbsd cannot read the usb hid descriptors properly and
 it is not easy to fix.  He is trying to fix that.
 
 --yasuoka

I haven't tried it on a very recent kernel, but as far as I can tell
the patch works perfectly for getting the device recognized properly,
and it was very helpful to me for that part, so thank you very much.

The weirdness I experience with the mouse might be a more general issue
with X or a deeper issue with the mouse itself.  It tends to happen
when I move a lot of windows around, and then things remain seized up
until I turn the mouse off and back on again.



Re: Ethernet bridge over IPsec in OpenBSD 4.1

2007-08-08 Thread Justin Lindberg
On Wednesday 08 August 2007 07:51, you wrote:
 it was broken and you need to apply the patch from revision 1.161

Thank you for the quick reply.

I actually am trying that patch, but it seems to have no effect on
the behavior of the system.  Doing tcpdump -n -p -igif0 will
show incoming packets normally, but only a timestamp for packets
that were supposed to be going out.  These empty packets are not
even seen at the other end of the gif tunnel.

Packets that were picked up at a physical interface on the bridge
are apparently still not being sent out on the gif tunnel properly.

--Justin Lindberg



Ethernet bridge over IPsec in OpenBSD 4.1

2007-08-07 Thread Justin Lindberg
I have not been able to get an Ethernet bridge over IPsec to work
in OpenBSD 4.1.  I have two machines running as NAT gateways with a
gif tunnel between them protected by IPsec ESP.  The internal
interfaces are both bridged to the gif tunnel.  I can ping either
gateway from the other over the tunnel, but the bridges are not
learning any MAC addresses from the gif side save that of the other
gateway.  When I try to ping a machine on one LAN from the opposite
gateway, the ARP who-is packets from the gateway will be forwarded
by the other gateway's bridge, but the reply packets do not seem to
be properly sent back over the gif interface by the bridge.

I noticed in the source repository the following comment in 
src/sys/net/if_bridge.c, revision 1.161

 make bridge(4) mark packets with M_PROTO1 if gif(4) needs to use
 etherip encapsulation; unbreaks remote ipsec bridges; ok claudio;
 additional testing Renaud Allard

Is this type of bridging broken in OpenBSD 4.1, or am I missing
something?  Is there a way to make this work while I am waiting for
4.2?  I had this exact same setup working in a previous version of
OpenBSD.  (I can't remember if it was 3.9 or 4.0.)