Re: res_init() and 0.0.0.0

2013-09-17 Thread Otto Moerbeek
On Tue, Sep 17, 2013 at 12:25:17AM -0400, Ted Unangst wrote:

 On Mon, Sep 16, 2013 at 21:23, Kapetanakis Giannis wrote:
 
  The following diff fixes the problem and the program works in current.
  The program is bahamut ircd and I managed to make it work up to 5.3
  without this.
  In current it's broken due to resolver errors.
  
  Don't know if you have a reason to not populate _res.nsaddr_list in the
  new res_init() from asr interface.
 
 I think a patch like this should go in. It's just easier to be
 compatible with the stupid old _res interface for now. Maybe later we
 can push programs to use the builtin async resolver.
 
 In the mean time, some feedback on the diff.
 
  _res.nscount = ac-ac_nscount;
  +   for (i = 0; i  ac-ac_nscount; i++) {
  +   _res.nsaddr_list[i] = *((struct sockaddr_in *) 
  ac-ac_ns[i]);
  +   }
  +
 
 I think this will give unexpected results if ipv6 resolvers are
 configured. You'll notice the asr code is allocating possibly varying
 amounts of memory. I think you're going to want to memcpy the correct
 length.
 
   memcpy(_res.nsaddr_list[i], ac-ac_ns[i], ac-ac_ns[i]-sa_len);

That's looks better indeed.

-Otto



Re: cvsync, rsync

2013-09-17 Thread hruodr
Alexander Hall alexan...@beard.se wrote:

 Leaving the internals of rsync aside (of which I assume much but *know* 
 little), if I consider two 4TB blobs to be equal just because they have 
 the same SHA1 hash, I can easily see myself ending up in one of these 
 conditions (but not both):

This was git, not rsync.

Perhaps the hash is only used as an index for a database, and if two
blobs have equal hash, one will note it. It is necessary to see the
details.

As you see, many people do not have any problem with: A=B if hash(A)=hash(B).
Perhaps it will become general programming thechnique.

Rodrigo.



Re: cvsync, rsync

2013-09-17 Thread hruodr
Marc Espie es...@nerim.net wrote:

 On Mon, Sep 16, 2013 at 08:16:50PM +, hru...@gmail.com wrote:
  Marc Espie es...@nerim.net wrote:
  
From a checksum I expect two things: (1) the pre-images of elements
in the range have all similar sizes, 
   Why ?  This makes no sense, and is in contradiction with (2).
  
  I must correct my previous mail. The Domain is numerable, to speak
  about cardinality as size do not help, but perhaps you get the
  idea. The probability of colisions is stronly dependent on how the
  hash distributes the elements of the domain in the range.

 That's still a crypto hash.  Apart from specially crafted attacks,
 input size is irrelevant to the chance of collision.

It is not the input size, it is how the input is mapped.

In the case of rsync the hash is applied to strings of a fixed lenth.
In this case the input is finite and we can argue with cardinality.
Just imagine the set finite strings mapped to a single element in the
range. If all these sets have the same number of elements and the range
n elements, then the probability of colition is n*(1/n)^2=1/nr; otherwise
it is greater (simple school agebra to calculate it). The extreme case
is that all strings are mapped to the same element.

Rodrigo.



Re: Feedback about Desktop Environments

2013-09-17 Thread Raimo Niskanen
On Mon, Sep 16, 2013 at 06:15:50PM +0200, Marc Espie wrote:
 On Mon, Sep 16, 2013 at 03:18:28PM +, Stuart Henderson wrote:
  On 2013-09-16, Stefan Sperling s...@openbsd.org wrote:
   You can use hotplugd(8) to simulate an auto-mounter for known USB disks.
  
  hotplug-diskmount (in packages) saves a bit of time writing a script for 
  this.
  Or there's amd(8) of course...
 
 No, don't use amd. Every time somebody uses amd, a kitten die
 (and we get that much farther away from being able to modernize
 NFS).

Can you recommend an alternative automounter for network mounts?

-- 

/ Raimo Niskanen, Erlang/OTP, Ericsson AB



Re: Ivy Bridge-EP Xeon (E5-2637v2) and Intel C602 Patsburg-A Chipset support

2013-09-17 Thread Peter Hessler
On 2013 Sep 16 (Mon) at 16:42:26 +0100 (+0100), Andy wrote:
:I know that OpenBSD runs on any CPU which is based on the AMD64 
:architecture, however someone has worried me and said that this CPU and 
:chipset is different somehow and might not boot with BSD!?

Does Windows work with it?  Does it claim it is x86 compatible?  Then,
yes it Just Works(tm).

-- 
Goto, n.:
A programming tool that exists to allow structured programmers
to complain about unstructured programmers.
-- Ray Simard



Re: Feedback about Desktop Environments

2013-09-17 Thread David Coppa
On Mon, Sep 16, 2013 at 5:18 PM, Stuart Henderson s...@spacehopper.org wrote:
 On 2013-09-16, Stefan Sperling s...@openbsd.org wrote:
 You can use hotplugd(8) to simulate an auto-mounter for known USB disks.

 hotplug-diskmount (in packages) saves a bit of time writing a script for this.

And there's also this[1], for even better integration.

[1] http://www.bsdua.org/tray-app.html#eject



Re: Ivy Bridge-EP Xeon (E5-2637v2) and Intel C602 Patsburg-A Chipset support

2013-09-17 Thread Andy

On Tue 17 Sep 2013 08:58:12 BST, Peter Hessler wrote:

On 2013 Sep 16 (Mon) at 16:42:26 +0100 (+0100), Andy wrote:
:I know that OpenBSD runs on any CPU which is based on the AMD64
:architecture, however someone has worried me and said that this CPU and
:chipset is different somehow and might not boot with BSD!?

Does Windows work with it?  Does it claim it is x86 compatible?  Then,
yes it Just Works(tm).



Hi, apparently Window support is not quite there yet 
(http://www.theregister.co.uk/2013/09/10/intel_ivy_bridge_xeon_e5_2600_v2_launch/) 
for OS Guard, which is an extension feature so I agree that it should 
work fine, just wanted to be careful before I spend a lot of cash on 
this new CPU and the C602 Patsburg-A Chipset.


But otherwise yes its standard amd64, with the Intel AVX instruction 
set extensions.


Thanks :)



Re: Feedback about Desktop Environments

2013-09-17 Thread Paolo Aglialoro
Try E17: lightning fast, meek on requirements, user friendly.


On Mon, Sep 16, 2013 at 12:18 PM, James Griffin j...@kontrol.kode5.netwrote:

 I need to install a Dektop Environment for my partner.

 I thought about KDE or xfce, i've tried neither on OpenBSD before. Which
 of the 3 main main DE's (gnome, KDE, XFCE) do you feel work best on OpenBSD.

 I would need things like removable media mounting from within the
 graphical environment, good sound support and multimedia applications.

 Any advice would be helpful from those using any of these Desktop's. I
 thought i'd ask on this list before installing loads of packages.

 Cheers, Jamie.



Re: Feedback about Desktop Environments

2013-09-17 Thread David Coppa
On Tue, Sep 17, 2013 at 10:47 AM, Paolo Aglialoro paol...@gmail.com wrote:
 Try E17: lightning fast, meek on requirements, user friendly.

yes, it's nice. A bit buggy, but nice...



Re: cvsync, rsync

2013-09-17 Thread Raimo Niskanen
On Tue, Sep 17, 2013 at 07:23:07AM +, hru...@gmail.com wrote:
 Marc Espie es...@nerim.net wrote:
 
  On Mon, Sep 16, 2013 at 08:16:50PM +, hru...@gmail.com wrote:
   Marc Espie es...@nerim.net wrote:
   
 From a checksum I expect two things: (1) the pre-images of elements
 in the range have all similar sizes, 
Why ?  This makes no sense, and is in contradiction with (2).
   
   I must correct my previous mail. The Domain is numerable, to speak
   about cardinality as size do not help, but perhaps you get the
   idea. The probability of colisions is stronly dependent on how the
   hash distributes the elements of the domain in the range.
 
  That's still a crypto hash.  Apart from specially crafted attacks,
  input size is irrelevant to the chance of collision.
 
 It is not the input size, it is how the input is mapped.
 
 In the case of rsync the hash is applied to strings of a fixed lenth.
 In this case the input is finite and we can argue with cardinality.
 Just imagine the set finite strings mapped to a single element in the
 range. If all these sets have the same number of elements and the range
 n elements, then the probability of colition is n*(1/n)^2=1/nr; otherwise
 it is greater (simple school agebra to calculate it). The extreme case
 is that all strings are mapped to the same element.

I can not follow that calculation. A cryptographic hash is still designed
to give a distribution of the hash value so that you can not even
deliberately craft two inputs that give the same hash value,
regardless of input (and thus input being e.g strings of fixed length).

When you have two different real world contents the collision probability
is just that; 2^-160 for SHA-1. It is when you deliberately craft a
second content to match a known hash value there may be weaknesses
in cryptographic hash functions, but this is not what rsync nor Git
does, as Marc Espie pointed out in this thread.

 
 Rodrigo.

-- 

/ Raimo Niskanen, Erlang/OTP, Ericsson AB



Re: cvsync, rsync

2013-09-17 Thread Marc Espie
On Tue, Sep 17, 2013 at 07:23:07AM +, hru...@gmail.com wrote:
 In the case of rsync the hash is applied to strings of a fixed lenth.
 In this case the input is finite and we can argue with cardinality.
 Just imagine the set finite strings mapped to a single element in the
 range. If all these sets have the same number of elements and the range
 n elements, then the probability of colition is n*(1/n)^2=1/nr; otherwise
 it is greater (simple school agebra to calculate it). The extreme case
 is that all strings are mapped to the same element.

It doesn't really matter. You can go straight to the limit.  If you choose
a given collection of data, the chance of any other collection of data
mapping to the exact same hash is 1/2^128, irregardless of its size.



Re: res_init() and 0.0.0.0

2013-09-17 Thread Kapetanakis Giannis

On 16/09/13 23:49, Stuart Henderson wrote:

the ISC resolver is available in ports/net/libbind, this is used in some
ports which fiddle with resolver internals in _res (e.g. net/mtr).



Thanks for the tip.

Indeed linking with libbind also fixed the problem with the program's 
resolver.


The only problem I've found is the following warnings, which according 
to archive has to do with the snapshot being used(?).


./a.out:/usr/lib/libc.so.70.0: /usr/local/lib/libbind/libbind.so.3.0 : WARNING: 
symbol(__p_class_syms) size mismatch, relink your program
./a.out:/usr/lib/libc.so.70.0: ./a.out : WARNING: symbol(_res) size mismatch, 
relink your program
./a.out:/usr/lib/libc.so.70.0: /usr/local/lib/libbind/libbind.so.3.0 : WARNING: 
symbol(__p_type_syms) size mismatch, relink your program

This is with the latest snapshot and libbind manually compiled from 
ports, after upgrading to latest snapshot (following the normal upgrade 
process).

The only available libc in system is /usr/lib/libc.so.70.0

# ldd a.out
a.out:
StartEnd  Type Open Ref GrpRef Name
1c00 3c004000 exe  10   0  a.out
01b9d000 21ba5000 rlib 01   0  
/usr/local/lib/libbind/libbind.so.3.0
02f09000 22f39000 rlib 01   0  /usr/lib/libc.so.70.0
08e96000 08e96000 rtld 01   0  /usr/libexec/ld.so

# ldconfig -r | grep libbind
search directories: 
/usr/lib:/usr/X11R6/lib:/usr/local/lib:/usr/local/lib/libbind
142:-lbind.3.0 = /usr/local/lib/libbind/libbind.so.3.0

G



Re: Kernel panics on amd64 recently - do I have bad hardware?

2013-09-17 Thread C. Bensend
 This part:

 VOP_FSYNC() at VOP_FSYNC+0x2f
 ffs_sync_vnode() at ffs_sync_vnode+0x77
 vfs_mount_foreach_vnode() at vfs_mount_foreach_vnode+0x38
 ffs_sync() at ffs_sync+0x83
 sys_sync() at sys_sync+0xa1
 vfs_syncwait() at vfs_syncwait+0x50
 vfs_shutdown() at vfs_shutdown+0x32
 boot() at boot+0x17f
 panic() at panic+0xf6

 is from the boot crash, not the original crash.  Looking at the
 original crash:

 --- trap (number 8) ---
 ffs_update() at ffs_update+0x19f

 That points to the math in the ino_to_fsba() macro in this like of
 ffs_update()
 error = bread(ip-i_devvp, fsbtodb(fs, ino_to_fsba(fs,
 ip-i_number)),
 (int)fs-fs_bsize, bp);

 It's trying to calculate the block address of the inode so that it can
 update the timestamps in it and divided by zero.  That means the
 in-memory copy of the superblock had zeros in on other another member.
  If the on-disk superblock had zeros there, I would expected fsck to
 catch it, or for it to crash earlier, but maybe a forced fsck is in
 order.  Otherwise, something's writing through a bogus pointer in the
 kernel...

Thank you so much, Philip.

I ran each filesystem through a 'fsck -n' just to see what it thought,
and it identified three filesystems that seemed to have issues.  So,
I dropped it down to single user and ran fsck on each one.  It didn't
say it fixed anything - kinda surprised me - but I ran fsck on every
filesystem, and then did a 'fsck -p' for good measure.  Everything
came up clean?

I booted it back and and I guess we'll see how things go...

Thank you for your help!

Benny


-- 
No matter how tempted I am with the prospect of unlimited power, I
will not consume any energy field bigger than my head.
  -- #22 on Peter Anspach's Evil
 Overlord list



Re: res_init() and 0.0.0.0

2013-09-17 Thread Kapetanakis Giannis

On 17/09/13 10:13, Otto Moerbeek wrote:

On Tue, Sep 17, 2013 at 12:25:17AM -0400, Ted Unangst wrote:


I think this will give unexpected results if ipv6 resolvers are
configured. You'll notice the asr code is allocating possibly varying
amounts of memory. I think you're going to want to memcpy the correct
length.

memcpy(_res.nsaddr_list[i], ac-ac_ns[i], ac-ac_ns[i]-sa_len);

That's looks better indeed.

-Otto


Yes and of course it works.

G



Re: cvsync, rsync

2013-09-17 Thread Alexander Hall
 Alexander Hall alexan...@beard.se wrote:

 Leaving the internals of rsync aside (of which I assume much but *know*
 little), if I consider two 4TB blobs to be equal just because they have
 the same SHA1 hash, I can easily see myself ending up in one of these
 conditions (but not both):

 This was git, not rsync.

The specific implementation was not the point.

 Perhaps the hash is only used as an index for a database, and if two
 blobs have equal hash, one will note it. It is necessary to see the
 details.

Of course.

 As you see, many people do not have any problem with: A=B if
 hash(A)=hash(B).

This was the point.

 Perhaps it will become general programming thechnique.

I'd say it is already.



Re: pms0: not in sync yet, discard input (state 3)

2013-09-17 Thread frantisek holop
as it seems like this is a legit regression,
could this backed out please?

-f
-- 
between two evils, always pick the one you never tried before.



Re: Feedback about Desktop Environments

2013-09-17 Thread Jes
Regarding samba... there's no need to automount samba folders because you
always can browse them via file browser (konqueror, thunar or nautilus),
but if you want you can mount them in /etc/fstab. Simply read the
documentation about permissions and syntax. It's very easy.

For NFS the best way is mount them in /etc/fstab too.

For external disks/pen drive, hotplug-diskmount, as Marc said, it's the
best option. This pretty tool automount the drives when inserted and
unmount when the drive is plugged off. If the drive is FAT you can extract
it before unmount it. For other systems different from FAT you must unmount
before extract.

BR

Jes



On Tue, Sep 17, 2013 at 9:50 AM, Raimo Niskanen 
raimo+open...@erix.ericsson.se wrote:

 On Mon, Sep 16, 2013 at 06:15:50PM +0200, Marc Espie wrote:
  On Mon, Sep 16, 2013 at 03:18:28PM +, Stuart Henderson wrote:
   On 2013-09-16, Stefan Sperling s...@openbsd.org wrote:
You can use hotplugd(8) to simulate an auto-mounter for known USB
 disks.
  
   hotplug-diskmount (in packages) saves a bit of time writing a script
 for this.
   Or there's amd(8) of course...
 
  No, don't use amd. Every time somebody uses amd, a kitten die
  (and we get that much farther away from being able to modernize
  NFS).

 Can you recommend an alternative automounter for network mounts?

 --

 / Raimo Niskanen, Erlang/OTP, Ericsson AB



OpenBSD not forwarding SSL, strange.

2013-09-17 Thread John Tate
I am having trouble accessing anything which uses SSL behind my NAT,
though I can access the same services from the firewall itself. There
is nothing unusual in /var/log/messages, dmesg, etc. I don't know why
this is happening. The system has been running fine for months, and
nothing I am aware of has changed.

# cat /etc/pf.conf
#Firewall ruleset for KintaroABODE router.

int_if=fxp0
wifi_if = athn0

tcp_services={ 22, 113 }
icmp_types=echoreq

fekete=192.168.0.3
fekete_tcp={ 17001, 8333 }
fekete_udp={ 8333 }
mises=192.168.0.4
mises_tcp={ 25565 }

#options

set block-policy drop
set loginterface egress
set skip on lo

anchor ftp-proxy/*
pass in on $int_if inet proto tcp to any port ftp \
divert-to 127.0.0.1 port 8021

table sshguard persist

#match rules
match out on egress inet from !(egress:network) to any nat-to (egress:0)

#filter rules
block in log
pass out quick

antispoof quick for { lo $int_if $wifi_if }

pass in on egress inet proto tcp from any to (egress) \
port $tcp_services

block in quick on egress proto tcp from sshguard \
to any port ssh label ssh bruteforce

pass in on egress inet proto tcp from any to (egress) port $fekete_tcp
rdr-to $fekete
pass in on egress inet proto tcp from any to (egress) port $fekete_udp
rdr-to $fekete
pass in on egress inet proto tcp from any to (egress) port $mises_tcp
rdr-to $mises

pass in inet proto icmp all icmp-type $icmp_types
pass in on $int_if
pass in on $wifi_if

If anyone could help and tell me where to start looking that would be
good. Some SSL services appear to work fine, such as gmail which I'm
using to send this.

-- 
www.johntate.org



Re: Feedback about Desktop Environments

2013-09-17 Thread Stuart Henderson
On 2013-09-17, David Coppa dco...@gmail.com wrote:
 On Mon, Sep 16, 2013 at 5:18 PM, Stuart Henderson s...@spacehopper.org 
 wrote:
 On 2013-09-16, Stefan Sperling s...@openbsd.org wrote:
 You can use hotplugd(8) to simulate an auto-mounter for known USB disks.

 hotplug-diskmount (in packages) saves a bit of time writing a script for 
 this.

 And there's also this[1], for even better integration.

 [1] http://www.bsdua.org/tray-app.html#eject



Now in ports. :)



Re: Ivy Bridge-EP Xeon (E5-2637v2) and Intel C602 Patsburg-A Chipset support

2013-09-17 Thread Stuart Henderson
On 2013-09-16, Andy a...@brandwatch.com wrote:
 Planning to test Hennings new ALTQ subsystem diff on OpenBSD 5.4 with 
 this hardware :D


pardon the pedantry, but it's not altq..



Re: res_init() and 0.0.0.0

2013-09-17 Thread Stuart Henderson
On 2013-09-17, Kapetanakis Giannis bil...@edu.physics.uoc.gr wrote:
 On 16/09/13 23:49, Stuart Henderson wrote:
 the ISC resolver is available in ports/net/libbind, this is used in some
 ports which fiddle with resolver internals in _res (e.g. net/mtr).


 Thanks for the tip.

 Indeed linking with libbind also fixed the problem with the program's 
 resolver.

 The only problem I've found is the following warnings, which according 
 to archive has to do with the snapshot being used(?).

 ./a.out:/usr/lib/libc.so.70.0: /usr/local/lib/libbind/libbind.so.3.0 : 
 WARNING: symbol(__p_class_syms) size mismatch, relink your program
 ./a.out:/usr/lib/libc.so.70.0: ./a.out : WARNING: symbol(_res) size mismatch, 
 relink your program
 ./a.out:/usr/lib/libc.so.70.0: /usr/local/lib/libbind/libbind.so.3.0 : 
 WARNING: symbol(__p_type_syms) size mismatch, relink your program

 This is with the latest snapshot and libbind manually compiled from 
 ports, after upgrading to latest snapshot (following the normal upgrade 
 process).
 The only available libc in system is /usr/lib/libc.so.70.0

 # ldd a.out
 a.out:
  StartEnd  Type Open Ref GrpRef Name
  1c00 3c004000 exe  10   0  a.out
  01b9d000 21ba5000 rlib 01   0  
 /usr/local/lib/libbind/libbind.so.3.0
  02f09000 22f39000 rlib 01   0  /usr/lib/libc.so.70.0
  08e96000 08e96000 rtld 01   0  /usr/libexec/ld.so

 # ldconfig -r | grep libbind
  search directories: 
 /usr/lib:/usr/X11R6/lib:/usr/local/lib:/usr/local/lib/libbind
  142:-lbind.3.0 = /usr/local/lib/libbind/libbind.so.3.0

 G



yes, current resolvers have a few more resource types and classes than the old
arrays in libc, we should update them sometime.



Re: pms0: not in sync yet, discard input (state 3)

2013-09-17 Thread Stefan Sperling
On Tue, Sep 17, 2013 at 02:36:25PM +0200, frantisek holop wrote:
 as it seems like this is a legit regression,
 could this backed out please?

Which commit exactly needs to be backed out?



Re: pms0: not in sync yet, discard input (state 3)

2013-09-17 Thread frantisek holop
hmm, on Tue, Sep 17, 2013 at 02:56:30PM +0200, Stefan Sperling said that
 On Tue, Sep 17, 2013 at 02:36:25PM +0200, frantisek holop wrote:
  as it seems like this is a legit regression,
  could this backed out please?
 
 Which commit exactly needs to be backed out?

my guess would be the ones done after aug 19..
that one was working.

-f
-- 
anarchy is better than no government at all.



Re: cvsync, rsync

2013-09-17 Thread hruodr
Raimo Niskanen raimo+open...@erix.ericsson.se wrote:

 When you have two different real world contents the collision probability
 is just that; 2^-160 for SHA-1. It is when you deliberately craft a
 second content to match a known hash value there may be weaknesses
 in cryptographic hash functions, but this is not what rsync nor Git
 does, as Marc Espie pointed out in this thread.

You have strings A and B, and you know only that hash(A)=hash(B): what
is the probability that A=B? 2^-160?  

Rodrigo.



Re: OpenBSD not forwarding SSL, strange.

2013-09-17 Thread Jiri B
On Tue, Sep 17, 2013 at 10:42:55PM +1000, John Tate wrote:
 I am having trouble accessing anything which uses SSL behind my NAT,
 though I can access the same services from the firewall itself. There
 is nothing unusual in /var/log/messages, dmesg, etc. I don't know why
 this is happening. The system has been running fine for months, and
 nothing I am aware of has changed.
 
 # cat /etc/pf.conf
 #Firewall ruleset for KintaroABODE router.
 
 int_if=fxp0
 wifi_if = athn0
 
 tcp_services={ 22, 113 }
 icmp_types=echoreq
 
 fekete=192.168.0.3
 fekete_tcp={ 17001, 8333 }
 fekete_udp={ 8333 }
 mises=192.168.0.4
 mises_tcp={ 25565 }
 
 #options
 
 set block-policy drop
 set loginterface egress
 set skip on lo
 
 anchor ftp-proxy/*
 pass in on $int_if inet proto tcp to any port ftp \
 divert-to 127.0.0.1 port 8021
 
 table sshguard persist
 
 #match rules
 match out on egress inet from !(egress:network) to any nat-to (egress:0)
 
 #filter rules
 block in log
 pass out quick
 
 antispoof quick for { lo $int_if $wifi_if }
 
 pass in on egress inet proto tcp from any to (egress) \
 port $tcp_services
 
 block in quick on egress proto tcp from sshguard \
 to any port ssh label ssh bruteforce
 
 pass in on egress inet proto tcp from any to (egress) port $fekete_tcp
 rdr-to $fekete
 pass in on egress inet proto tcp from any to (egress) port $fekete_udp
 rdr-to $fekete
 pass in on egress inet proto tcp from any to (egress) port $mises_tcp
 rdr-to $mises
 
 pass in inet proto icmp all icmp-type $icmp_types
 pass in on $int_if
 pass in on $wifi_if
 
 If anyone could help and tell me where to start looking that would be
 good. Some SSL services appear to work fine, such as gmail which I'm
 using to send this.

sysctl -a ?

j.



Re: cvsync, rsync

2013-09-17 Thread hruodr
Marc Espie es...@nerim.net wrote:

 On Tue, Sep 17, 2013 at 07:23:07AM +, hru...@gmail.com wrote:
  In the case of rsync the hash is applied to strings of a fixed lenth.
  In this case the input is finite and we can argue with cardinality.
  Just imagine the set finite strings mapped to a single element in the
  range. If all these sets have the same number of elements and the range
  n elements, then the probability of colition is n*(1/n)^2=1/nr; otherwise
  it is greater (simple school agebra to calculate it). The extreme case
  is that all strings are mapped to the same element.

 It doesn't really matter. You can go straight to the limit.  If you choose
 a given collection of data, the chance of any other collection of data
 mapping to the exact same hash is 1/2^128, irregardless of its size.

I state you the same question that I stated Raimo Niskanen in my previous
mail.

I think you misunderstand me: I am not speaking about the size of the
input strings, but about the size of sets of input strings.

Rodrigo.



Re: Ivy Bridge-EP Xeon (E5-2637v2) and Intel C602 Patsburg-A Chipset support

2013-09-17 Thread Andy

On Tue 17 Sep 2013 13:48:45 BST, Stuart Henderson wrote:

On 2013-09-16, Andy a...@brandwatch.com wrote:

Planning to test Hennings new ALTQ subsystem diff on OpenBSD 5.4 with
this hardware :D



pardon the pedantry, but it's not altq..



Lol, yes sorry ;)

*ALTQ's replacement..

Does it have a name yet, or are you sticking with; new super duper 
simple prio queuer?




Re: OpenBSD not forwarding SSL, strange.

2013-09-17 Thread John Tate
# sysctl -a
kern.ostype=OpenBSD
kern.osrelease=5.3
kern.osrevision=201305
kern.version=OpenBSD 5.3 (GENERIC) #50: Tue Mar 12 18:35:23 MDT 2013
dera...@i386.openbsd.org:/usr/src/sys/arch/i386/compile/GENERIC

kern.maxvnodes=5926
kern.maxproc=1310
kern.maxfiles=7030
kern.argmax=262144
kern.securelevel=1
kern.hostname=menger.kab.loc
kern.hostid=0
kern.clockrate=tick = 1, tickadj = 40, hz = 100, profhz = 1024, stathz = 128
kern.posix1version=199009
kern.ngroups=16
kern.job_control=1
kern.saved_ids=1
kern.boottime=Tue Sep 17 21:58:10 2013
kern.domainname=
kern.maxpartitions=16
kern.rawpartition=2
kern.maxthread=1950
kern.nthreads=35
kern.osversion=GENERIC#50
kern.somaxconn=128
kern.sominconn=80
kern.usermount=0
kern.random=2434 3584 0 469612 7 0 0 0 0 0 0 0 355 29 849846 2 30 0 3
5 12 26 40 45 34 48 21 25 28 18 6 5 3 1 1 0 1 2 0 0 0 0 0 0 0 1 0 0 0
29 0 0 130 196 0 0 0 0 0 0 1395 1451 0 0
kern.nosuidcoredump=1
kern.fsync=1
kern.sysvmsg=1
kern.sysvsem=1
kern.sysvshm=1
kern.arandom=1443230486
kern.msgbufsize=16364
kern.malloc.buckets=16,32,64,128,256,512,1024,2048,4096,8192,16384,32768,65536,131072,262144,524288
kern.malloc.bucket.16=(calls = 14449 total_allocated = 1024 total_free
= 236 elements = 256 high watermark = 1280 could_free = 0)
kern.malloc.bucket.32=(calls = 1876 total_allocated = 640 total_free =
338 elements = 128 high watermark = 640 could_free = 0)
kern.malloc.bucket.64=(calls = 2674 total_allocated = 1920 total_free
= 304 elements = 64 high watermark = 320 could_free = 0)
kern.malloc.bucket.128=(calls = 2689 total_allocated = 320 total_free
= 50 elements = 32 high watermark = 160 could_free = 0)
kern.malloc.bucket.256=(calls = 3729 total_allocated = 144 total_free
= 33 elements = 16 high watermark = 80 could_free = 0)
kern.malloc.bucket.512=(calls = 5249 total_allocated = 408 total_free
= 10 elements = 8 high watermark = 40 could_free = 0)
kern.malloc.bucket.1024=(calls = 491 total_allocated = 264 total_free
= 3 elements = 4 high watermark = 20 could_free = 0)
kern.malloc.bucket.2048=(calls = 111 total_allocated = 12 total_free =
1 elements = 2 high watermark = 10 could_free = 0)
kern.malloc.bucket.4096=(calls = 93 total_allocated = 31 total_free =
0 elements = 1 high watermark = 5 could_free = 0)
kern.malloc.bucket.8192=(calls = 15 total_allocated = 11 total_free =
1 elements = 1 high watermark = 5 could_free = 0)
kern.malloc.bucket.16384=(calls = 6 total_allocated = 6 total_free = 0
elements = 1 high watermark = 5 could_free = 0)
kern.malloc.bucket.32768=(calls = 7 total_allocated = 6 total_free = 0
elements = 1 high watermark = 5 could_free = 0)
kern.malloc.bucket.65536=(calls = 3 total_allocated = 2 total_free = 0
elements = 1 high watermark = 5 could_free = 0)
kern.malloc.bucket.131072=(calls = 0 total_allocated = 0 total_free =
0 elements = 1 high watermark = 5 could_free = 0)
kern.malloc.bucket.262144=(calls = 0 total_allocated = 0 total_free =
0 elements = 1 high watermark = 5 could_free = 0)
kern.malloc.bucket.524288=(calls = 0 total_allocated = 0 total_free =
0 elements = 1 high watermark = 5 could_free = 0)
kern.malloc.kmemnames=free,,devbuf,debug,pcb,routetbl,,fragtbl,,ifaddr,soopts,sysctl,,,ioctlops,iov,mount,,NFS_req,NFS_mount,,vnodes,namecache,UFS_quota,UFS_mount,shm,VM_map,sem,dirhash,ACPI,VM_pmapfile,file_desc,,proc,subproc,VFS_cluster,,,MFS_node,,,Export_Host,NFS_srvsock,,NFS_daemon,ip_moptions,in_multi,ether_multi,mrt,ISOFS_mount,ISOFS_node,MSDOSFS_mount,MSDOSFS_fat,MSDOSFS_node,ttys,exec,miscfs_mount,,pfkey_data,tdb,xform_data,,pagedep,inodedep,newblk,,,indirdep,VM_swap,,UVM_amap,UVM_aobj,,USB,USB_device,USB_HC,,memdesc,,,crypto_data,,IPsec_credsemuldata,ip6_options,NDP,,,temp,NTFS_mount,NTFS_node,NTFS_fnode,NTFS_dir,NTFS_hash,NTFS_attr,NTFS_data,NTFS_decomp,NTFS_vrun,kqueue,bluetooth,bwmeter,UDF_mount,UDF_file_entry,UDF_file_id,Bluetooth_HID,AGP_Memory,DRM
kern.malloc.kmemstat.free=(inuse = 0, calls = 0, memuse = 0K,
limblocks = 0, mapblocks = 0, maxused = 0K, limit = 39322K, spare = 0,
sizes = (none))
kern.malloc.kmemstat.devbuf=(inuse = 828, calls = 1511, memuse = 571K,
limblocks = 0, mapblocks = 0, maxused = 571K, limit = 39322K, spare =
0, sizes = (16,32,64,128,256,512,1024,2048,4096,8192,16384,32768,65536))
kern.malloc.kmemstat.debug=(inuse = 0, calls = 0, memuse = 0K,
limblocks = 0, mapblocks = 0, maxused = 0K, limit = 39322K, spare = 0,
sizes = (none))
kern.malloc.kmemstat.pcb=(inuse = 31, calls = 57, memuse = 6K,
limblocks = 0, mapblocks = 0, maxused = 6K, limit = 39322K, spare = 0,
sizes = (16,64,512))
kern.malloc.kmemstat.routetbl=(inuse = 105, calls = 811, memuse = 8K,
limblocks = 0, mapblocks = 0, maxused = 32K, limit = 39322K, spare =
0, sizes = (16,32,64,128,256,512))
kern.malloc.kmemstat.fragtbl=(inuse = 0, calls = 0, memuse = 0K,
limblocks = 0, mapblocks = 0, maxused = 0K, limit = 39322K, spare = 0,
sizes = (none))
kern.malloc.kmemstat.ifaddr=(inuse = 159, calls = 159, memuse = 20K,
limblocks = 0, mapblocks = 0, 

Re: Ivy Bridge-EP Xeon (E5-2637v2) and Intel C602 Patsburg-A Chipset support

2013-09-17 Thread Jiri B
On Tue, Sep 17, 2013 at 02:35:48PM +0100, Andy wrote:
 On Tue 17 Sep 2013 13:48:45 BST, Stuart Henderson wrote:
 On 2013-09-16, Andy a...@brandwatch.com wrote:
 Planning to test Hennings new ALTQ subsystem diff on OpenBSD 5.4 with
 this hardware :D
 
 
 pardon the pedantry, but it's not altq..
 
 
 Lol, yes sorry ;)
 
 *ALTQ's replacement..
 
 Does it have a name yet, or are you sticking with; new super duper
 simple prio queuer?

IIRC simple prio emulates/uses just 'prio' in VLAN header. The new
queueing is called in henning@'s paper new OpenBSD queueing subsystem :)

j.



Re: cvsync, rsync

2013-09-17 Thread Raimo Niskanen
On Tue, Sep 17, 2013 at 01:21:04PM +, hru...@gmail.com wrote:
 Raimo Niskanen raimo+open...@erix.ericsson.se wrote:
 
  When you have two different real world contents the collision probability
  is just that; 2^-160 for SHA-1. It is when you deliberately craft a
  second content to match a known hash value there may be weaknesses
  in cryptographic hash functions, but this is not what rsync nor Git
  does, as Marc Espie pointed out in this thread.
 
 You have strings A and B, and you know only that hash(A)=hash(B): what
 is the probability that A=B? 2^-160?  

You have to mean what is the probability that A != B, and it is 2 ^ (-160).

If you actually mean what you wrote, the probability of A = B is
1 - (2 ^ (-160)), which is as said earlier in this thread higher than
what you get when storing the string on disk and then reading it back.

 
 Rodrigo.

-- 

/ Raimo Niskanen, Erlang/OTP, Ericsson AB



Re: pms0: not in sync yet, discard input (state 3)

2013-09-17 Thread Stefan Sperling
On Tue, Sep 17, 2013 at 02:59:19PM +0200, frantisek holop wrote:
 hmm, on Tue, Sep 17, 2013 at 02:56:30PM +0200, Stefan Sperling said that
  On Tue, Sep 17, 2013 at 02:36:25PM +0200, frantisek holop wrote:
   as it seems like this is a legit regression,
   could this backed out please?
  
  Which commit exactly needs to be backed out?
 
 my guess would be the ones done after aug 19..
 that one was working.

Guesses won't help much. We need facts to figure out what's wrong. 

This diff backs out r1.46. Does it help?

Index: pms.c
===
RCS file: /cvs/src/sys/dev/pckbc/pms.c,v
retrieving revision 1.47
diff -u -p -r1.47 pms.c
--- pms.c   3 Sep 2013 09:29:35 -   1.47
+++ pms.c   17 Sep 2013 14:06:03 -
@@ -910,11 +910,6 @@ synaptics_get_hwinfo(struct pms_softc *s
if (SYNAPTICS_EXT_MODEL_BUTTONS(syn-ext_model)  8)
syn-ext_model = ~0xf000;
 
-   if ((syn-model  SYNAPTICS_MODEL_NEWABS) == 0) {
-   printf(%s: don't support Synaptics OLDABS\n, DEVNAME(sc));
-   return (-1);
-   }
-
return (0);
 }
 
@@ -990,9 +985,12 @@ pms_enable_synaptics(struct pms_softc *s
goto err;
}
 
-   if (synaptics_get_hwinfo(sc)) {
-   free(sc-synaptics, M_DEVBUF);
-   sc-synaptics = NULL;
+   if (synaptics_get_hwinfo(sc))
+   goto err;
+
+   if ((syn-model  SYNAPTICS_MODEL_NEWABS) == 0) {
+   printf(%s: don't support Synaptics OLDABS\n,
+   DEVNAME(sc));
goto err;
}
 
@@ -1030,6 +1028,11 @@ pms_enable_synaptics(struct pms_softc *s
return (1);
 
 err:
+   if (sc-synaptics) {
+   free(sc-synaptics, M_DEVBUF);
+   sc-synaptics = NULL;
+   }
+
pms_reset(sc);
 
return (0);
@@ -1272,11 +1275,8 @@ pms_enable_alps(struct pms_softc *sc)
goto err;
}
 
-   if (alps_get_hwinfo(sc)) {
-   free(sc-alps, M_DEVBUF);
-   sc-alps = NULL;
+   if (alps_get_hwinfo(sc))
goto err;
-   }
 
printf(%s: ALPS %s, version 0x%04x\n, DEVNAME(sc),
(alps-model  ALPS_DUALPOINT ? Dualpoint : Glidepoint),
@@ -1339,6 +1339,11 @@ pms_enable_alps(struct pms_softc *sc)
return (1);
 
 err:
+   if (sc-alps) {
+   free(sc-alps, M_DEVBUF);
+   sc-alps = NULL;
+   }
+
pms_reset(sc);
 
return (0);
@@ -1829,11 +1834,8 @@ pms_enable_elantech_v1(struct pms_softc 
goto err;
}
 
-   if (elantech_get_hwinfo_v1(sc)) {
-   free(sc-elantech, M_DEVBUF);
-   sc-elantech = NULL;
+   if (elantech_get_hwinfo_v1(sc))
goto err;
-   }
 
printf(%s: Elantech Touchpad, version %d\n, DEVNAME(sc), 1);
} else if (elantech_set_absolute_mode_v1(sc))
@@ -1845,6 +1847,11 @@ pms_enable_elantech_v1(struct pms_softc 
return (1);
 
 err:
+   if (sc-elantech) {
+   free(sc-elantech, M_DEVBUF);
+   sc-elantech = NULL;
+   }
+
pms_reset(sc);
 
return (0);
@@ -1867,11 +1874,8 @@ pms_enable_elantech_v2(struct pms_softc 
goto err;
}
 
-   if (elantech_get_hwinfo_v2(sc)) {
-   free(sc-elantech, M_DEVBUF);
-   sc-elantech = NULL;
+   if (elantech_get_hwinfo_v2(sc))
goto err;
-   }
 
printf(%s: Elantech Touchpad, version %d\n, DEVNAME(sc), 2);
} else if (elantech_set_absolute_mode_v2(sc))
@@ -1880,6 +1884,11 @@ pms_enable_elantech_v2(struct pms_softc 
return (1);
 
 err:
+   if (sc-elantech) {
+   free(sc-elantech, M_DEVBUF);
+   sc-elantech = NULL;
+   }
+
pms_reset(sc);
 
return (0);
@@ -1902,11 +1911,8 @@ pms_enable_elantech_v3(struct pms_softc 
goto err;
}
 
-   if (elantech_get_hwinfo_v3(sc)) {
-   free(sc-elantech, M_DEVBUF);
-   sc-elantech = NULL;
+   if (elantech_get_hwinfo_v3(sc))
goto err;
-   }
 
printf(%s: Elantech Touchpad, version %d\n, DEVNAME(sc), 3);
} else if (elantech_set_absolute_mode_v3(sc))
@@ -1915,6 +1921,11 @@ pms_enable_elantech_v3(struct pms_softc 
return (1);
 
 err:
+   if (sc-elantech) {
+   free(sc-elantech, M_DEVBUF);
+   sc-elantech = NULL;
+   }
+
pms_reset(sc);
 
return (0);
@@ -1937,11 +1948,8 @@ 

Re: pms0: not in sync yet, discard input (state 3)

2013-09-17 Thread Martin Pieuchot
On 17/09/13(Tue) 14:59, frantisek holop wrote:
 hmm, on Tue, Sep 17, 2013 at 02:56:30PM +0200, Stefan Sperling said that
  On Tue, Sep 17, 2013 at 02:36:25PM +0200, frantisek holop wrote:
   as it seems like this is a legit regression,
   could this backed out please?
  
  Which commit exactly needs to be backed out?
 
 my guess would be the ones done after aug 19..
 that one was working.

Could you try to commenting out all the protocol definitions in
the pms_protocols[] table but the Elantech v2 one and tell me if
it works?

If that's working could you reiterate the manipulation by enabling
one by one the protocols defined before this one and find out which
addition breaks your mouse?

Thanks,
Martin



Re: cvsync, rsync

2013-09-17 Thread Marc Espie
On Tue, Sep 17, 2013 at 01:21:04PM +, hru...@gmail.com wrote:
 Raimo Niskanen raimo+open...@erix.ericsson.se wrote:
 
  When you have two different real world contents the collision probability
  is just that; 2^-160 for SHA-1. It is when you deliberately craft a
  second content to match a known hash value there may be weaknesses
  in cryptographic hash functions, but this is not what rsync nor Git
  does, as Marc Espie pointed out in this thread.
 
 You have strings A and B, and you know only that hash(A)=hash(B): what
 is the probability that A=B? 2^-160?  

No, that's never the problem.

You have a *given*  string A, and another string B.

The problem you are describing is a different problem that leads straight
to the birthday paradox...

I don't know if the issue lies with your mastery of the english language,
or with your understanding of the issue. But you still sound very much
confused.



Re: Ivy Bridge-EP Xeon (E5-2637v2) and Intel C602 Patsburg-A Chipset support

2013-09-17 Thread Andy

Oh yea, just look at the slides.. Dohh ;)

On Tue 17 Sep 2013 14:54:12 BST, Jiri B wrote:

On Tue, Sep 17, 2013 at 02:35:48PM +0100, Andy wrote:

On Tue 17 Sep 2013 13:48:45 BST, Stuart Henderson wrote:

On 2013-09-16, Andy a...@brandwatch.com wrote:

Planning to test Hennings new ALTQ subsystem diff on OpenBSD 5.4 with
this hardware :D



pardon the pedantry, but it's not altq..



Lol, yes sorry ;)

*ALTQ's replacement..

Does it have a name yet, or are you sticking with; new super duper
simple prio queuer?


IIRC simple prio emulates/uses just 'prio' in VLAN header. The new
queueing is called in henning@'s paper new OpenBSD queueing subsystem :)

j.




Re: cvsync, rsync

2013-09-17 Thread Raimo Niskanen
On Tue, Sep 17, 2013 at 01:27:06PM +, hru...@gmail.com wrote:
 Marc Espie es...@nerim.net wrote:
 
  On Tue, Sep 17, 2013 at 07:23:07AM +, hru...@gmail.com wrote:
   In the case of rsync the hash is applied to strings of a fixed lenth.
   In this case the input is finite and we can argue with cardinality.
   Just imagine the set finite strings mapped to a single element in the
   range. If all these sets have the same number of elements and the range
   n elements, then the probability of colition is n*(1/n)^2=1/nr; otherwise
   it is greater (simple school agebra to calculate it). The extreme case
   is that all strings are mapped to the same element.
 
  It doesn't really matter. You can go straight to the limit.  If you choose
  a given collection of data, the chance of any other collection of data
  mapping to the exact same hash is 1/2^128, irregardless of its size.
 
 I state you the same question that I stated Raimo Niskanen in my previous
 mail.
 
 I think you misunderstand me: I am not speaking about the size of the
 input strings, but about the size of sets of input strings.

At least I can not follow your line of reasoning here.

Suppose you are limited to length 1 strings of [a-z], then you have
29 possible strings.

Still. If you select one of those strings and calculates its SHA-1
hash value. When you try any of the other 28 strings (or any other
string of any lenght) and calculates this other strings SHA-1 hash
value, the probability that it has the same hash value is 2 ^ (-160).

 
 Rodrigo.

-- 

/ Raimo Niskanen, Erlang/OTP, Ericsson AB



Re: cvsync, rsync

2013-09-17 Thread hruodr
I wrote to the list. If you have something to say about the thema,
then please to the list. Your impolite mails are not welcome in 
my mailbox.

Rodrigo.

Jan Stary h...@stare.cz wrote:

 On Sep 17 13:21:04, hru...@gmail.com wrote:
  Raimo Niskanen raimo+open...@erix.ericsson.se wrote:
  
   When you have two different real world contents the collision probability
   is just that; 2^-160 for SHA-1. It is when you deliberately craft a
   second content to match a known hash value there may be weaknesses
   in cryptographic hash functions, but this is not what rsync nor Git
   does, as Marc Espie pointed out in this thread.
  
  You have strings A and B, and you know only that hash(A)=hash(B): what
  is the probability that A=B? 2^-160?  

 No. The probability that A!= B is 2^-160.

 However, this is irrelevant to the problem you are describing.
 Please don't enbarass yourself any further and take this silly
 issue somewhere else; preferably to your English teacher.



Re: cvsync, rsync

2013-09-17 Thread Marc Espie
On Tue, Sep 17, 2013 at 03:28:11PM +, hru...@gmail.com wrote:
 Marc Espie es...@nerim.net wrote:
 
   You have strings A and B, and you know only that hash(A)=hash(B): what
   is the probability that A=B? 2^-160?  
 
  No, that's never the problem.
 
  You have a *given*  string A, and another string B.
 
 O.K. You have string A in the client with hash(A)=n. You find string
 B in the server also with hash(B)=n. What is the probability that
 A=B?

1-1/2^n  

(with n the size of the crypto hash, so 128 or 160 for the hashes being
discussed).

... unless someone is out to get you, of course. In such a case, forget
about normal probability rules. Your B is not uniformously random.

But in general, in case of foul play, you have ways ways more 
to worry about than whether your hash is going to match!

(and the attacks we know about for md5 and sha1 are of the choose preimage
variety, so it's for files A and B that *the attacker* can choose, not your
own A file, and a B file chosen by the attacker).



Re: cvsync, rsync

2013-09-17 Thread hruodr
Intentionally I left the problem generic. Is the probability near to 1?

You can suppose that A is 500 bytes long, that the server knows the hash
value of A (but not A), that it searchs only strings of this 
length with the same hash value, that it found such a string
B, that the hash function is the concatenation of the rolling hash of 
rsync with md4.

You can also suppose that A and B are 4 TB long and the hash sha1.

Rodrigo.


Tony Abernethy t...@servasoftware.com wrote:

 INSUFFICIENT DATA

 -Original Message-
 From: owner-m...@openbsd.org [mailto:owner-m...@openbsd.org] On Behalf Of 
 hru...@gmail.com
 Sent: Tuesday, September 17, 2013 10:28 AM
 To: misc@openbsd.org
 Subject: Re: cvsync, rsync

 Marc Espie es...@nerim.net wrote:

   You have strings A and B, and you know only that hash(A)=hash(B): what
   is the probability that A=B? 2^-160?  
 
  No, that's never the problem.
 
  You have a *given*  string A, and another string B.

 O.K. You have string A in the client with hash(A)=n. You find string
 B in the server also with hash(B)=n. What is the probability that
 A=B?

 Rodrigo.



Re: responding to buttonpress ACPI event sent by KVM/Qemu (same behavior in v5.2)

2013-09-17 Thread Adam Thompson
 Resurrecting this thread, since I also got a total freeze in
 Qemu/KVM after sending ACPI shutdown using OpenBSD 5.3.
 
 Testing, I also tried 5.3 in VirtualBox and VMWare, both gave clean
 shutdown.  This makes me suspect KVM is at fault...
 
  QEMU/KVM (echo system_powerdown | nc -U /tmp/test1.monitor
 )
 --- total freeze
  VirtualBox (ACPI shutdown) -- clean shutdown
  VMWare Fusion (Shutdown) -- clean shutdown
 
 FWIW, I'm using an illumos/omnios host on AMD hardware.

Probably not purely a KVM problem; I'm running OpenBSD 5.3-RELEASE inside KVM 
(ProxmoxVE 3.1 platform) on Intel CPUs, and ACPI handling works correctly.  I 
also recall testing OpenBSD 5.2-RELEASE inside RedHat Enterprise Virtualization 
(also KVM-based) and it worked fine there on AMD chips.
The only HVM-related issues I've been able to find are a) speed [no surprise 
there], and b) the long-standing red-console-background effect when switching 
VTs.

This implies that you're seeing a bizarre interaction between your guest, your 
host, and the VM software.  It's remotely possible your hardware has something 
to do with it, but unlikely.  I haven't tested anything illumos-based.

-Adam Thompson
 athom...@athompso.net



Re: cvsync, rsync

2013-09-17 Thread hruodr
Marc Espie es...@nerim.net wrote:

  You have strings A and B, and you know only that hash(A)=hash(B): what
  is the probability that A=B? 2^-160?  

 No, that's never the problem.

 You have a *given*  string A, and another string B.

O.K. You have string A in the client with hash(A)=n. You find string
B in the server also with hash(B)=n. What is the probability that
A=B?

Rodrigo.



This 48 core box...

2013-09-17 Thread Michael Chen

I'm considering bidding on this 48-core box:

http://www.ebay.com/itm/Supermicro-A-Server-1042G-TF-1U-H8QG6-4-CPUS-48-cores-2-2Ghz-128GB-RAM-/151119828428?pt=COMP_EN_Servershash=item232f7195cc

Does anyone have experience with it and can I use all the cores?

Thanks!



Re: cvsync, rsync

2013-09-17 Thread Marc Espie
On Tue, Sep 17, 2013 at 04:16:47PM +, hru...@gmail.com wrote:
 Intentionally I left the problem generic. Is the probability near to 1?

YES it is near to 1.

Your way to phrase mathematical problems is BOGUS. You can't do probability
without formulating a set of complete hypothesis. 

Your way to reason about this is BOGUS.

We've been telling you THE EXACT SAME THING about those hash properties
for MESSAGES by now.

It seems it doesn't get through.

This is either indicative of a very poor grasp of english, or of mathematical
concepts, or both.

So I'm going to finally stop answering your stupid stupid questions.

I've got a feeling you don't trust those programs because you really
don't understand numbers in an intuitive way.

Like I said, FUD.   Just because you feel insecure about numbers doesn't
mean you have to try to communicate your insecurity about it to other
people.



pf.conf for OpenVPN

2013-09-17 Thread Predrag Punosevac
Dear All,

I am still working on OpenVPN gateway for my Lab. As of now I have
everything fully functional and I am trying now to tide up PF rules. 

My network topology roughly looks like this

Internet (128.xxx)   OpenVPN clients (VPN network 10.8.0.xxx)
 | Also Public 128.xxx addresses  
 ||
 ||
 --
   |
   ext_if/tun0 (128.0.0.1/10.8.0.1)
   |
 Firewall/VPN Gateway (OpenBSD 5.4)
   |
   |
int_if (192.168.2.1)
   |
  - Switch --- DNS/LDAP/FileServer (192.168.2.32/8)
  ||
  ||   
  |- other desktops (192.168.2.64/8)
  |   |
  SSH Gateway (192.168.2.200)HPC machines on  (192.168.2.128/8)


Following PF FAQ, Peter's book of PF and Absolute OpenBSD 2nd edition I
had no troubles writing rules which filter trafic on ext_if as well as
int_if. Clients behind  Firewall can access selected internet services
(ssh, SMTP,www). A random machine which tries to reach my internal
network via SSH gets redirected to SSH gateway machine. 

Since I have no experience managing OpenVPNs I have questions about
VPN network (10.8.0.xxx)

1. Right now I pass UDP packets on ext_if port 1194 to allow VPN clients
to connect to server. Is that correct? Is there more restricitve way
of doing this.

2. I would like to filter traffic coming and going from 10.8.0.xxx. 
Do I write separate rules for tun0 interface? 

3. Do I use rdr to allow OpenVPN clients from VPN network 10.8.0.xxx
to reach my internal network (192.168.2.xxx)? I would like VPN clients 
to have the same access to my HPC clusters, DNS etc as my desktops
behind PF.

Thank you so much for you help.
Predrag



Re: cvsync, rsync

2013-09-17 Thread Tony Abernethy
INSUFFICIENT DATA

-Original Message-
From: owner-m...@openbsd.org [mailto:owner-m...@openbsd.org] On Behalf Of 
hru...@gmail.com
Sent: Tuesday, September 17, 2013 10:28 AM
To: misc@openbsd.org
Subject: Re: cvsync, rsync

Marc Espie es...@nerim.net wrote:

  You have strings A and B, and you know only that hash(A)=hash(B): what
  is the probability that A=B? 2^-160?  

 No, that's never the problem.

 You have a *given*  string A, and another string B.

O.K. You have string A in the client with hash(A)=n. You find string
B in the server also with hash(B)=n. What is the probability that
A=B?

Rodrigo.



Re: cvsync, rsync

2013-09-17 Thread hruodr
Kenneth R Westerback kwesterb...@rogers.com wrote:

 And your endless meanderings around the pointless questions you pose
 are not welcome on the list. They certainly have NOTHING to do with
 OpenBSD.

What you say in the last sentence is exactly what I hope. One
of my questions was:

This is a conjecture. Do you have a proof that the probability is so
small? For me it is difficult to accept it. Is this conjecture used
elsewhere?

Rodrigo.



Re: cvsync, rsync

2013-09-17 Thread Roberto E. Vargas Caballero
 But in general, in case of foul play, you have ways ways more 
 to worry about than whether your hash is going to match!
 
 (and the attacks we know about for md5 and sha1 are of the choose preimage
 variety, so it's for files A and B that *the attacker* can choose, not your
 own A file, and a B file chosen by the attacker).

In git case, you have also to think the damage due to the attack is also limited
due to the distributed behaviour of it. Maybe someone can create a git object
with the same hash value of one previous, but this change will not be propagated
in the net, so all the others copies of the original object will be conserved
in the network. And of course, the probability of creating a new git object
with the same hash than other previous and correct linked is zero.


-- 
Roberto E. Vargas Caballero

k...@shike2.com
http://www.shike2.com



Re: pf set prio

2013-09-17 Thread Henning Brauer
* Andy a...@brandwatch.com [2013-09-10 11:38]:
 PS; Thanks for your great work Henning (and others of course).
 Hoping and keeping fingers crossed the new subsystem will make it
 into 5.4 :)

queueing? no, looks like 5.5

-- 
Henning Brauer, h...@bsws.de, henn...@openbsd.org
BS Web Services GmbH, http://bsws.de, Full-Service ISP
Secure Hosting, Mail and DNS Services. Dedicated Servers, Root to Fully Managed
Henning Brauer Consulting, http://henningbrauer.com/



Re: pflow packets before state expires

2013-09-17 Thread Henning Brauer
* Matt Hamilton ma...@netsight.co.uk [2013-09-10 12:30]:
 sven falempin sven.falempin at gmail.com writes:
[nonsense deleted]

 The problem is that (I believe) that the pflow packet is not generated until
 the state expires from pf. In the case of the scp transfer I saw that was not
 for several days. Meaning I had no accounting/reporting of this data
 transfer until it ended and the state expired.

correct.

 At which point the entire
 data transferred during that state's life was counted as if it happened now.

This I'd call a visualization bug; but that doesn't change too much
here.

-- 
Henning Brauer, h...@bsws.de, henn...@openbsd.org
BS Web Services GmbH, http://bsws.de, Full-Service ISP
Secure Hosting, Mail and DNS Services. Dedicated Servers, Root to Fully Managed
Henning Brauer Consulting, http://henningbrauer.com/



Re: cvsync, rsync

2013-09-17 Thread Kenneth R Westerback
On Tue, Sep 17, 2013 at 03:22:16PM +, hru...@gmail.com wrote:
 I wrote to the list. If you have something to say about the thema,
 then please to the list. Your impolite mails are not welcome in 
 my mailbox.
 
 Rodrigo.

And your endless meanderings around the pointless questions you pose
are not welcome on the list. They certainly have NOTHING to do with
OpenBSD.

 Ken

 
 Jan Stary h...@stare.cz wrote:
 
  On Sep 17 13:21:04, hru...@gmail.com wrote:
   Raimo Niskanen raimo+open...@erix.ericsson.se wrote:
   
When you have two different real world contents the collision 
probability
is just that; 2^-160 for SHA-1. It is when you deliberately craft a
second content to match a known hash value there may be weaknesses
in cryptographic hash functions, but this is not what rsync nor Git
does, as Marc Espie pointed out in this thread.
   
   You have strings A and B, and you know only that hash(A)=hash(B): what
   is the probability that A=B? 2^-160?  
 
  No. The probability that A!= B is 2^-160.
 
  However, this is irrelevant to the problem you are describing.
  Please don't enbarass yourself any further and take this silly
  issue somewhere else; preferably to your English teacher.



Re: cvsync, rsync

2013-09-17 Thread Kenneth R Westerback
On Tue, Sep 17, 2013 at 06:18:48PM +, hru...@gmail.com wrote:
 Kenneth R Westerback kwesterb...@rogers.com wrote:
 
  And your endless meanderings around the pointless questions you pose
  are not welcome on the list. They certainly have NOTHING to do with
  OpenBSD.
 
 What you say in the last sentence is exactly what I hope. One
 of my questions was:
 
 This is a conjecture. Do you have a proof that the probability is so
 small? For me it is difficult to accept it. Is this conjecture used
 elsewhere?
 
 Rodrigo.

Wow. Missing the point again. Please go away. Bother some non-OpenBSD
list. As with others I am torn between recommending an english-as-a-second
language list, or a math-for-idiots list. OpenBSD lists provide neither
service.

In any case. PLEASE GO AWAY.

 Ken



Re: This 48 core box...

2013-09-17 Thread Andy

On Tue 17 Sep 2013 18:09:15 BST, Michael Chen wrote:

I'm considering bidding on this 48-core box:

http://www.ebay.com/itm/Supermicro-A-Server-1042G-TF-1U-H8QG6-4-CPUS-48-cores-2-2Ghz-128GB-RAM-/151119828428?pt=COMP_EN_Servershash=item232f7195cc


Does anyone have experience with it and can I use all the cores?

Thanks!



We use loads of Supermicro from Transtec and they work great.

This is second hand though..



Re: This 48 core box...

2013-09-17 Thread Brad Smith

On 17/09/13 2:12 PM, Nick Holland wrote:

On 09/17/2013 01:41 PM, Andy wrote:

On Tue 17 Sep 2013 18:09:15 BST, Michael Chen wrote:

I'm considering bidding on this 48-core box:

http://www.ebay.com/itm/Supermicro-A-Server-1042G-TF-1U-H8QG6-4-CPUS-48-cores-2-2Ghz-128GB-RAM-/151119828428?pt=COMP_EN_Servershash=item232f7195cc



Does anyone have experience with it and can I use all the cores?

Thanks!



We use loads of Supermicro from Transtec and they work great.

This is second hand though..


never used one of those machines, but I did play with a mighty machine
recently. 1.5TB RAM, 4x8 HT'd cores (that's 64 sorta-cores...).
Unfortunately, it seemed that only 512G of RAM was usable, more than that caused
it to panic early in the boot process.  So, I used boot(8) to restrict memory
that the kernel saw.


CVSROOT:/cvs
Module name:src
Changes by: a...@cvs.openbsd.org2004/07/19 09:09:06

Modified files:
sys/arch/amd64/amd64: cpu.c machdep.c mptramp.S pmap.c
sys/arch/amd64/include: pmap.h

Log message:
Implement __HAVE_PMAP_DIRECT on amd64 using large pages. At this moment
it's limited to 512GB (one L4 page table entry) physical memory. Only
used carefully at this moment, but more improvements are in the pipeline.


--
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.



tftpd Receives incomplete incoming transfers over a firewall

2013-09-17 Thread joe . k
Hi,
I'm trying to do some configuration backups from a piece of equipment over 
tftp (only option for this equipment) to a new-ish OBSD 5.3 file server 
running tftpd.

Historically, this equipment has done its backups to a tftpd server running on 
OpenBSD 4.4 and its been working fine for several years. But as it's rather 
old we're switching over to the 5.3 server. 

The device and the servers (both old and new) reside on separate rfc 1918 
networks (equip - lets say 10.1.0.60, servers - 10.5.0.[13  5]) connected 
with an OpenBSD firewall/router. 

However the 5.3 box doesn't seem to allow for complete transfers over the 
firewall. Only about 10-30K of the ~50K transfer completes. The equipment 
reports TFTP Error: Server Timeout. 

Running tftpd manaully with #tftpd -c -d -v /tftproot/ prints the following:
tftpd: 10.1.0.60: write request for 'mybackup.cfg'
tftpd: tftp_wrq recv: Connection refused

Running tcpdump while the transfer is happening shows the following:

nas1 #tcpdump -i em1 net 10.1.0.60  
  
tcpdump: listening on em1, link-type EN10MB
tcpdump: WARNING: compensating for unaligned libpcap packets
12:12:02.790735 10.1.0.60.2164  10.5.0.13.tftp: 27 WRQ mybackup.cfg
12:12:02.828113 10.5.0.13.7048  10.1.0.60.2164: udp 4
12:12:02.852699 10.1.0.60.2164  10.5.0.13.7048: udp 516
12:12:02.852757 10.5.0.13.7048  10.1.0.60.2164: udp 4
12:12:02.952641 10.1.0.60.2164  10.5.0.13.7048: udp 516
12:12:02.952677 10.5.0.13.7048  10.1.0.60.2164: udp 4
12:12:03.059579 10.1.0.60.2164  10.5.0.13.7048: udp 516
12:12:03.059614 10.5.0.13.7048  10.1.0.60.2164: udp 4
12:12:03.072072 10.1.0.60.2164  10.5.0.13.7048: udp 516
12:12:03.072106 10.5.0.13.7048  10.1.0.60.2164: udp 4
[..
.]
12:12:11.048977 10.1.0.60.2164  10.5.0.13.7048: udp 516
12:12:11.049010 10.5.0.13.7048  10.1.0.60.2164: udp 4
12:12:11.148920 10.1.0.60.2164  10.5.0.13.7048: udp 516
12:12:11.148954 10.5.0.13.7048  10.1.0.60.2164: udp 4
12:12:11.276346 10.1.0.60.2164  10.5.0.13.7048: udp 516
12:12:11.276380 10.5.0.13.7048  10.1.0.60.2164: udp 4
12:12:15.293532 10.1.0.60.2164  10.5.0.13.7048: udp 516
12:12:19.311719 10.1.0.60.2164  10.5.0.13.7048: udp 516
12:12:23.329904 10.1.0.60.2164  10.5.0.13.7048: udp 516
12:12:27.348589 10.1.0.60.2164  10.5.0.13.7048: udp 516
12:12:31.366275 10.1.0.60.2164  10.5.0.13.7048: udp 516
12:12:36.375321 10.5.0.13.7048  10.1.0.60.2164: udp 4
12:12:36.384384 10.1.0.60  10.5.0.13: icmp: 10.1.0.60 udp port 2164 
unreachable

On the old OBSD 4.4 file server the tcpdump of the successful transfer looks 
like this:
filestore # tcpdump -i em1 net 10.1.0.60 
tcpdump: listening on em1, link-type EN10MB
12:32:47.946560 10.1.0.60.2165  10.5.0.5.tftp: 27 WRQ ta4303-1.bend1.cfg
12:32:47.956856 10.5.0.5.10436  10.1.0.60.2165: udp 4
12:32:48.026514 10.1.0.60.2165  10.5.0.5.10436: udp 516
12:32:48.026562 10.5.0.5.10436  10.1.0.60.2165: udp 4
12:32:48.126455 10.1.0.60.2165  10.5.0.5.10436: udp 516
12:32:48.126487 10.5.0.5.10436  10.1.0.60.2165: udp 4
[..
.]
12:33:00.820607 10.1.0.60.2165  10.5.0.5.10436: udp 516
12:33:00.820633 10.5.0.5.10436  10.1.0.60.2165: udp 4
12:33:00.920549 10.1.0.60.2165  10.5.0.5.10436: udp 516
12:33:00.920575 10.5.0.5.10436  10.1.0.60.2165: udp 4
12:33:01.020491 10.1.0.60.2165  10.5.0.5.10436: udp 420
12:33:01.020549 10.5.0.5.10436  10.1.0.60.2165: udp 4
12:33:22.597501 10.1.0.60  10.5.0.5: icmp: 10.1.0.60 udp port 2165 
unreachable

Attempting a tftp transfer from my linux workstation (within the 10.5.0.0/24 
net) to the 5.3 box works fine. Doing a tftp transfer over the firewall from 
the equipment to my workstation with atftpd running, works fine.

For giggles, I loaded up the 9/14 snapshot of OpenBSD 5.4 in a virtual 
machine, tested, and got the same result as with 5.3.

Should I be taking a closer look at the firewall (seems unlikely as the 
transfers work on the old box and my workstation) or are the other debugging 
steps I should be looking at?

Thanks!
-- 
Joe Kowalski



Re: Feedback about Desktop Environments

2013-09-17 Thread john slee
On 17 September 2013 20:37, Jes jjje...@gmail.com wrote:

  but if you want you can mount them in /etc/fstab. Simply read the
 documentation about permissions and syntax. It's very easy.

 For NFS the best way is mount them in /etc/fstab too.


/Why/ is it the best way, though?

Unlike automounters, static fstab entries don't address the problem
of network filesystems being unreachable during boot. They will
eventually time out and fail, requiring manual intervention. Fine if
you have only a small group of systems... Failures may also rather
substantially lengthen the boot process.

Perhaps there are nasty side-effects of using automounters, but
I've never encountered any. If there are I'd love to hear about them!

John