Re: Actual BIND error - Patching OpenBSD 4.3 named ?

2008-07-09 Thread mark reardon
Hi Andreas,

Aren't you dumping on the wrong interface here?
Should it not be your $ext_if where the alleged poisoning will come from?




2008/7/9 Rod Whitworth [EMAIL PROTECTED]:

 On Wed, 9 Jul 2008 11:10:09 +0200, Andreas Maus wrote:

 Hi.
 
 I guess OpenBSDs named is affected by the actual issue:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447
 http://www.kb.cert.org/vuls/id/800113
 
 So I hope a patch is in progress ?
 Or is OpenBSD not affected by this issue?
 
 So long,
 
 Andreas.
 --


 # tcpdump -nettti rl0 dst port 53
 tcpdump: listening on rl0, link-type EN10MB
 Jul 09 19:48:27.786683 00:01:80:0f:2b:94 00:00:24:c6:18:85 0800 70:
 192.168.80.4.16284  192.168.80.1.53: 57120+ A? pps.com.au. (28)
 Jul 09 19:48:43.690332 00:01:80:0f:2b:94 00:00:24:c6:18:85 0800 67:
 192.168.80.4.1356  192.168.80.1.53: 32536+ A? ibm.com. (25)
 Jul 09 19:49:11.013223 00:01:80:0f:2b:94 00:00:24:c6:18:85 0800 69:
 192.168.80.4.14540  192.168.80.1.53: 29420+ A? intel.com. (27)
 

 # uname -a
 OpenBSD master.witworx.com 4.3 GENERIC#698 i386

 Guess again.

 Was that so hard to try?

 R/
 ** note replies off-list are not required. If you insist you MUST use
 the reply-to: address.
 The sender address is a tarpit except for the list servers. ***

 Rod/

 A consultant is someone who's called in when someone has painted himself
 into a corner.  He's expected to levitate his client out of that corner.

 -The Sayings of Chairman Morrow. 1984.



Re: Actual BIND error - Patching OpenBSD 4.3 named ?

2008-07-09 Thread mark reardon
doxpara.com reports no issues with unbound FWIW.

Thanks to Stuart for this suggestion during the previous DJBware for ports
thread.

2008/7/9 Stuart Henderson [EMAIL PROTECTED]:

 On 2008-07-09, Steve Tornio [EMAIL PROTECTED] wrote:
  I get a different result using the external interface of my caching
  name server, and mine looks vulnerable.

 named is. the stub resolver isn't.

 mcbride@ pointed out that you can give named some more protection
 by natting outbound udp traffic destined for port 53 (even just on
 the box running the resolver, it doesn't have to be on a firewall
 in front). something like,

 nat on egress proto udp from (self) to any port 53 - (self)

 there - if you need to tell people you're doing something
 while you wait for a better solution, you have an option.
 check this with tcpdump and requests from multiple NS, the
 doxpara.com checker will not notice this as an improvement.



Re: support for Sun Fire

2007-07-16 Thread mark reardon
Yep - x2100 M2. OpenBSD 4.1. It works brilliantly compared to the Dell it
replaced which was getting to 55+% IO bound.


On 16/07/07, Toni Mueller [EMAIL PROTECTED] wrote:

 Hi Mark,

 On Tue, 29.05.2007 at 14:13:06 +0100, mark reardon [EMAIL PROTECTED]
 wrote:
  I just got a x2100 M2 from Sun yesterday on a 60 day trial and am having
  trouble setting the MTU on one of the bge NICs. Just some initial
 findings.
  Not a big problem for me really.

 did you get it to run OpenBSD properly? Which model do you have?


 Best,
 --Toni++



Re: Publishing your spamtraps list, is that a wise move?

2007-07-05 Thread mark reardon
If you have a good whitelist this won't bother you.

Why make it obvious that the addresses are spamtrap ones?
Just hide a comment somewhere on the homepage that only harvesters will see
but
not people who browse your web site ( unless they read the html source ).

I have been hit where a spammer has used one of our addresses as a reply_to
address.
No worries. spamd doesn't even break a sweat. The mail doesn't ever hit our
server
and the only servers that have the problem are the mail servers that believe
the forged reply to address
as they bang their heads trying to deliver the bounced mails. They should
try spamd :-)

g'day

Mark




On 05/07/07, Darrin Chandler [EMAIL PROTECTED] wrote:

 On Thu, Jul 05, 2007 at 11:07:55AM +0200, Peter N. M. Hansteen wrote:
  Now I wonder if it would be a good idea to put that list of spamtrap
  addresses on a web page for the address slurpers to find and use, so I
  can detect spam senders early and either treat them to 24 hours at the
  time in the tar pit or have them move on to the next target.
 
  The only downside to this that I can see is that occasionally somebody
  naive and innocent sending backscatter (bounces of undeliverable spam)
  would be tarpitted for a while.
 
  Does anybody else here have views or relevant experience they want to
  share?

 I thought about this a while back, and I found a weakness. Now, I
 haven't seen this used, but it's trivially possible. Here's the deal:

 You publish spamtrap addresses, and of course you make them easily
 recognizable as such so you don't trap real people. Spammers spend a
 very small amount of effort and harvest spamtrap addresses *on purpose*
 and use them as sender addresses (joe job). The result being, of course,
 that you blacklist significant valid portions of the internet. Am I
 wrong here?

 --
 Darrin Chandler|  Phoenix BSD User Group  |  MetaBUG
 [EMAIL PROTECTED]   |  http://phxbug.org/  |
 http://metabug.org/
 http://www.stilyagin.com/  |  Daemons in the Desert   |  Global BUG
 Federation



Re: need a machine for an itanium port

2007-06-08 Thread mark reardon
ok - I can match Diana with 100 euros so. Cheers.

On 08/06/07, Theo de Raadt [EMAIL PROTECTED] wrote:

   From what I know, I think dlg has not received any real offers
   yet.
 
  Sad, well I'll throw US$100 into the mix if someone wants to co-ordinate
  it.  I don't have any use for Itanium, but I do know that dlg@ has done
  some great work, so I might as well support him in something he wants to
  do.

 From my perspective, I have some hopes that doing work on ia64 will
 lead us to developing security techniques that may affect other
 architectures.  But perhaps noone cares about that anymore...



Re: need a machine for an itanium port

2007-06-08 Thread mark reardon
yep, just donated here too:

Your order currently is:
- EUR 100.00 [DON] DONATION to the OpenBSD Project
- Total: EUR 100.00 + Shipping.
...
...
...

Comments: in response to Theos call to support Itanium port by dlg@ on the
[EMAIL PROTECTED] list.




On 08/06/07, Bryan Vyhmeister [EMAIL PROTECTED] wrote:

 On Jun 8, 2007, at 1:22 PM, Diana Eichert wrote:

  Dunno what the target amount is but if we can get  20 people
  contributing US/E 100 then there should be enough for an Itanium.
 
  So where are the other 18 or so folks?

 One more just donated $100.

 Bryan



Re: support for Sun Fire

2007-05-29 Thread mark reardon
I just got a x2100 M2 from Sun yesterday on a 60 day trial and am having
trouble setting the MTU on one of the bge NICs. Just some initial findings.
Not a big problem for me really.


On 29/05/07, mufurcz [EMAIL PROTECTED] wrote:

 Greetings,

 Are the Sun Fire X2100 (1 x AMD Opteron,  Model 175, dual core 2.26 MHz
 CPU)
 servers fully supported?  I am interested in booth - good and bad
 experiences
 with this boxes.  If you don't want to generate noise on this group,
 please
 e-mail to me personally.

 Thanks,

 mufurcz



Re: support for Sun Fire

2007-05-29 Thread mark reardon
my problem was only setting the mtu  9000 btw. as I said not a biggie ;-)

On 29/05/07, mark reardon [EMAIL PROTECTED] wrote:

 I just got a x2100 M2 from Sun yesterday on a 60 day trial and am having
 trouble setting the MTU on one of the bge NICs. Just some initial findings.
 Not a big problem for me really.


 On 29/05/07, mufurcz [EMAIL PROTECTED] wrote:
 
  Greetings,
 
  Are the Sun Fire X2100 (1 x AMD Opteron,  Model 175, dual core 2.26 MHz
  CPU)
  servers fully supported?  I am interested in booth - good and bad
  experiences
  with this boxes.  If you don't want to generate noise on this group,
  please
  e-mail to me personally.
 
  Thanks,
 
  mufurcz



Re: using spamd to block outbound spam

2007-04-13 Thread mark reardon
hogwash might help. I havent used it in a fair while though.

http://www.securityfocus.com/infocus/1208

On 13/04/07, Paolo Supino [EMAIL PROTECTED] wrote:

 Hi

I have the following problem: I host a group of windows servers that
 run a webapp using IIS6 ASP technology. The webapp was written and is
 maintained by a small private company that develops custom webapps for
 companies. One of the services the webapp does is send out emails
 (nothing amazing until now). The problem is that the webapp isn't
 written securely. The developers keep saying the webapp is secure and
 isn't the problem. Bringing someone from the outside to prove them wrong
 has failed thus far. Showing logs and showing network access also proved
 futile. the webapp is (ab)used by spammers to relay spam emails which
 caused the webapp's IP address to be added to various spam black lists
 :-( I'm sure it's the ASP is the problem because only HTTP and HTTPS are
 accessible on these servers. The website itself is hidden behind a
 firewall and SMTP port isn't reachable. I'm in the process of replacing
 the current firewall (Microtik's RouterOS, a Linux based OS) with
 OpenBSD and I thought of using spamd to block outgoing spam emails. I've
 started reading about spamd and usage scenarios, but thus far only found
 spamd being used on incoming emails. Did anyone use spamd to block
 outgoing spam emails? Is what I want to do possible (in combination PF)?
 Other solutions will also be appreciated obviously based on OpenBSD :-)





 TIA
 Paolo



pfctl not loading rules - Must enable table loading for optimizations

2007-04-06 Thread mark reardon
Hello,

Trying to load any rules ( even /usr/share/pf/ examples ) I get the error
about enabling table loading for optimizations
and rules get ignored. anybody able to gently apply a cluestick as to what
table loading it is talking about?

# uname -a
OpenBSD gooner.mynet.net 4.1 GENERIC#10 i386

# pfctl -Rf /etc/pf.conf
pfctl: Must enable table loading for optimizations

# cat /etc/pf.conf
# macros
ext_if=re0
int_if=bge0

tcp_services={ 22, 113 }
icmp_types=echoreq

#comp3=192.168.0.3

# options
set block-policy drop
set loginterface $ext_if

set skip on lo

# scrub
scrub in

# nat/rdr
nat on $ext_if from !($ext_if) - ($ext_if:0)
nat-anchor ftp-proxy/*
rdr-anchor ftp-proxy/*

#rdr pass on $int_if proto tcp to port ftp - 127.0.0.1 port 8021
#rdr on $ext_if proto tcp from any to any port 80 - $comp3

# filter rules
block in

pass out

anchor ftp-proxy/*
antispoof quick for { lo $int_if }

pass in on $ext_if inet proto tcp from any to ($ext_if) port $tcp_services

pass in inet proto icmp all icmp-type $icmp_types

pass quick on $int_if no state

# pfctl -s nat
nat on re0 from ! (re0) to any - (re0:0)
rdr pass on re0 inet proto tcp from any to (re0:0) port = 64831 -
10.254.1.40 port 64831
rdr pass on re0 inet proto udp from any to (re0:0) port = 64831 -
10.254.1.40 port 64831
# pfctl -s rules
scrub in all fragment reassemble
#



Re: use OpenBSD to blacklist phone calls?

2007-03-20 Thread mark reardon
use zapteller() [ page 115 ] and / or anti-girlfriend-logic [ page 104 ] as
documented in the Asterisk - the future of Telephony.

The asterisk book is available online via:

http://www.asteriskdocs.org/modules/tinycontent/index.php?id=11

enjoy.

Mark

On 20/03/07, Paul Pruett [EMAIL PROTECTED] wrote:

 OpenBSD spamd works great for blacklisting IPs,
 and maybe it could be use for our blacklisting
 telephone calls using callerID?

 Even though we are on the 'do not call' registry
 we still get 4-10 calls a day at home, and
 at work its just phone spam spam spam

 Thinking about adding a modem that recognizes callerID
 to my home openbsd firewall/server to have it also
 monitor the phones and intercept telemarketing
 calls between ring 1 and 2 and if a match then
 give a false fax signal,
 message or just hangup signal.

 Has anyone else setup an openbsd server to hangup
 phone calls by callerid?

 I looked through /usr/ports/comms
 and /usr/ports/telephony I think this could be
 done with the port package asterisk, but it does
 look complex and I wondered if another package
 was more appropriate than a VOIP package?

 I did google some notes for [EMAIL PROTECTED]
 but I did not read that it is
 the same as the port ASTERISK.

 -TIA.



Re: use OpenBSD to blacklist phone calls?

2007-03-20 Thread mark reardon
nice one. thanks.

On 20/03/07, Stuart Henderson [EMAIL PROTECTED] wrote:

 On 2007/03/20 17:25, mark reardon wrote:
  use zapteller() [ page 115 ] and / or anti-girlfriend-logic [ page 104 ]
 as
  documented in the Asterisk - the future of Telephony.
 
  The asterisk book is available online via:

 it's in ports/packages now - /usr/ports/books/AsteriskTFOT