doas called multiple times hangs

2019-01-20 Thread Dariusz Sendkowski
Hi,

Calling 'doas' in a loop makes the machine hang.
I guess this is not an expected behavior.
It can be checked by executing the following simple bash script:

for i in {0..2}
do
doas ls some_dir
done

I have run it on three different machines and the result is the same on
each of them. After about 9000 iterations the entire machine hangs.
Executing the script without 'doas' works fine.


Re: doas called multiple times hangs

2019-01-20 Thread Dariusz Sendkowski
This is -stable 6.4.
doas.conf:
permit nopass myuser as root




On Sun, 20 Jan 2019 at 11:50, Hiltjo Posthuma 
wrote:

> On Sun, Jan 20, 2019 at 11:15:38AM +0100, Dariusz Sendkowski wrote:
> > Hi,
> >
> > Calling 'doas' in a loop makes the machine hang.
> > I guess this is not an expected behavior.
> > It can be checked by executing the following simple bash script:
> >
> > for i in {0..2}
> > do
> > doas ls some_dir
> > done
> >
> > I have run it on three different machines and the result is the same on
> > each of them. After about 9000 iterations the entire machine hangs.
> > Executing the script without 'doas' works fine.
>
> Hi,
>
> Just tested, but no issue here on -current.
>
> What is your doas.conf contents and OpenBSD version / dmesg?
>
> --
> Kind regards,
> Hiltjo
>


Re: doas called multiple times hangs

2019-01-20 Thread Hiltjo Posthuma
On Sun, Jan 20, 2019 at 11:15:38AM +0100, Dariusz Sendkowski wrote:
> Hi,
> 
> Calling 'doas' in a loop makes the machine hang.
> I guess this is not an expected behavior.
> It can be checked by executing the following simple bash script:
> 
> for i in {0..2}
> do
> doas ls some_dir
> done
> 
> I have run it on three different machines and the result is the same on
> each of them. After about 9000 iterations the entire machine hangs.
> Executing the script without 'doas' works fine.

Hi,

Just tested, but no issue here on -current.

What is your doas.conf contents and OpenBSD version / dmesg?

-- 
Kind regards,
Hiltjo



Re: Problems trying to format currency with python

2019-01-20 Thread Ingo Schwarze
Hi Luca,

Luca Franchini wrote on Sun, Jan 20, 2019 at 03:41:46PM +0100:

> I got an error while running this:
> 
> amidatacyber730:~$ python3.6
> Python 3.6.6 (default, Oct 11 2018, 12:39:19)
> [GCC 4.2.1 Compatible OpenBSD Clang 6.0.0 (tags/RELEASE_600/final)] on o
> Type "help", "copyright", "credits" or "license" for more information.
> >>> import locale
> >>> locale.setlocale(locale.LC_ALL, "it_IT.UTF-8")
> 'it_IT.UTF-8'
> >>> locale.currency(6.4)
> Traceback (most recent call last):
>   File "", line 1, in 
>   File "/usr/local/lib/python3.6/locale.py", line 262, in currency
> raise ValueError("Currency formatting is not possible using "
> ValueError: Currency formatting is not possible using the 'C' locale.

The error message that Python is producing is confusing.

Here is what the code in the Python library actually does:

  /usr/local/lib/python3.6/locale.py:
def currency(val, symbol=True, grouping=False, international=False):
conv = localeconv()
# check for illegal values
digits = conv[international and 'int_frac_digits' or 'frac_digits']
if digits == 127:
raise ValueError("Currency formatting is not possible using "
 "the 'C' locale.")

OpenBSD intentionally does not implement any LC_MONETARY or strfmon(3)
functionality because we believe that such functionality does not
belong in the C library but should instead be implemented in
specialized support libraries for user interface design.

Consequently, LC_MONETARY is completely ignored by the OpenBSD base
system and localeconv(3) always returns the values that POSIX
specifies for the C locale, no matter what the user asks for.

You might wish to report upstream (to the Python project) that the
error message is misleading.  It is true that this message can occur
when the user selected LC_MONETARY=C.  But it can also happen when the
operating system does not implement LC_MONETARY support at all.

Yours,
  Ingo



Re: Raspberry Pi support in 6.4

2019-01-20 Thread seclists


> On January 19, 2019 at 11:34 PM Karel Gardas  wrote:
> Well, with RPiX you completely missed the target I'm afriad. If I'm
> correct, then whole SoC is booted on the side of video processor which
> loads some blobs into it, run ThreadX OS and then boots ARMv8
> bootloader on ARM core. There have been some attempt to replace ThreadX
> and binary blob on RPiX, but so far IIRC unsuccessful.

I did indeed miss the target, and what you say is largely consistent with my 
own further research.

The upside of the RPi is it (seems) to be a stateless device outside the data 
stored on the SD card -- there seems to be no other firmware/flash devices that 
could store malware.

While the RPi does this for pedagogical rather than security reasons (they 
wanted it to be un-brickable) some security researchers (Rutkowska) recommend 
statelessness as a partial mitigation strategy for the security risks inherent 
in blobs (to stop them being used to persist malware outside the OS).

Unfortunately it looks like there are no current production mainstream devices 
which do any better (unless OpenBSD has figured out how to replace the Pine64 
firmware), leaving niche devices based on e.g OpenPOWER and RISC V.

Neither of which fit in hand luggage :/



Re: Raspberry Pi support in 6.4

2019-01-20 Thread seclists


> On January 19, 2019 at 6:17 PM Mihai Popescu  wrote:
> Since it looks to me that you missed the point, here is it: most
> people on this list, devs mostly are not on vacation ...
> Ask precisely!

Ok, thanks for pointing that out.



Problems trying to format currency with python

2019-01-20 Thread Luca Franchini
Hi all,

I got an error while running this:

amidatacyber730:~$ python3.6
Python 3.6.6 (default, Oct 11 2018, 12:39:19)
[GCC 4.2.1 Compatible OpenBSD Clang 6.0.0 (tags/RELEASE_600/final)] on o
Type "help", "copyright", "credits" or "license" for more information.
>>> import locale
>>> locale.setlocale(locale.LC_ALL, "it_IT.UTF-8")
'it_IT.UTF-8'
>>> locale.currency(6.4)
Traceback (most recent call last):
  File "", line 1, in 
  File "/usr/local/lib/python3.6/locale.py", line 262, in currency
raise ValueError("Currency formatting is not possible using "
ValueError: Currency formatting is not possible using the 'C' locale.
>>> quit()

amidatacyber730:~$ locale -a | grep IT
it_IT.UTF-8

amidatacyber730:~$ uname -mrsv
OpenBSD 6.4 GENERIC.MP#3 amd64

Thank you,

Luca


Re: Raspberry Pi support in 6.4

2019-01-20 Thread Dinesh Thirumurthy
On Sun, Jan 20, 2019, 21:53  Unfortunately it looks like there are no current production mainstream
> devices which do any better (unless OpenBSD has figured out how to replace
> the Pine64 firmware), leaving niche devices based on e.g OpenPOWER and RISC
> V.
>
> Neither of which fit in hand luggage :/
>

The SiFive FU540 runs FreeBSD.

https://www.sifive.com/boards/hifive-unleashed

https://fosdem.org/2019/schedule/event/testing_freebsd_risc_v5/

Thanks.

Regards,
Dinesh

>


Re: APU2 and Spectre

2019-01-20 Thread kolargol
If someone is interested:
https://github.com/kolargol/apu2_firmware

of course for testing bins, OpenBSD reports IBPB:

cpu0: 
FPU,VME,DE,PSE,TSC,MSR,PAE,MCE,CX8,APIC,SEP,MTRR,PGE,MCA,CMOV,PAT,PSE36,CFLUSH,MMX,FXSR,SSE,SSE2,HTT,SSE3,PCLMUL,MWAIT,SSSE3,CX16,SSE4.1,SSE4.2,MOVBE,POPCNT,AES,XSAVE,AVX,F16C,NXE,MMXX,FFXSR,PAGE1GB,RDTSCP,LONG,LAHF,CMPLEG,SVM,EAPICSP,AMCR8,ABM,SSE4A,MASSE,3DNOWP,OSVW,IBS,SKINIT,TOPEXT,DBKP,PERFTSC,PCTRL3,ITSC,BMI1,IBPB,XSAVEOPT

On 21:11 Mon 10 Sep, Zbyszek Żółkiewski wrote:
>
> > Wiadomość napisana przez Consus <
con...@ftml.net
> w dniu 25.08.2018, o godz. 17:08:
> >
> > Seems like APU2 board is vulnerable to Spectre:
>
> seems there is microcode update with mitigations but looks like none want to 
> claim where that microcode comes from:
>
>
https://github.com/pcengines/apu2-documentation/issues/75
>
> did someone try to load it from obsd? is it possible?

>> There is an unofficial binary with unknown origin. Seems like AMD have
>> sent microcode updates to some motherboard manufacturers, but there is
>> no hard proof though.


Re: doas called multiple times hangs

2019-01-20 Thread Ted Unangst
Dariusz Sendkowski wrote:
> I investigated the problem a little more and found, that when there is a
> non-existent directory entry in my PATH, the problem occurs. If all of the
> directories from my PATH exist, then it works fine.

To help isolate the problem, if you disable unveil, does it work?


Index: doas.c
===
RCS file: /cvs/src/usr.bin/doas/doas.c,v
retrieving revision 1.74
diff -u -p -r1.74 doas.c
--- doas.c  17 Jan 2019 05:35:35 -  1.74
+++ doas.c  20 Jan 2019 21:30:55 -
@@ -409,8 +409,6 @@ main(int argc, char **argv)
if (setenv("PATH", safepath, 1) == -1)
err(1, "failed to set PATH '%s'", safepath);
}
-   if (unveilcommands(getenv("PATH"), cmd) == 0)
-   goto fail;
 
if (pledge("stdio rpath getpw exec id", NULL) == -1)
err(1, "pledge");



Re: smtpd - help needed tranlsating to new virtual map syntax

2019-01-20 Thread Adam Thompson
As it turns out, no, that doesn't work.
Trying to fix up broken sender mail domain-parts only simply gets me a "5.2.4 
Mailing list expansion problem" error, with no debug output to suggest why.

In this test case, my translations map had:

@bad.athompso.net @good.athompso.net

in it.  Obviously, this is a test setup :).
Smtpd.conf itself consisted of:

listen on all received-auth
smtp max-message-size 100M
table translations file:/etc/mail/translations  # ORIG->NEW 
mappings
table allowed-hosts file:/etc/mail/allowed-hosts# Who can 
connect?  (bare IP addresses or CIDR subnets)
action translate lmtp "/var/run/lmtp.sock" virtual
# 1st pass on allowed rewrite mail
action forward forward-only 
# and now it's not our problem anymore
match for any from local action forward # 2nd pass for 
reinjected mail, this time just forward it
match for any from src  action translate # inbound mail 
- hand it to LMTP, translating as we go

A cursory glance at the source code (yikes, it's been a long time since I was a 
programmer) suggests that virtual now only works on recipients, not senders.  
Which is too bad for me, as that means I'll have to switch at least one box to 
use Postfix.

I'm not convinced the new smtpd.conf grammar improves anything at all, but I 
assume it must help someone or it wouldn't have changed... but I believe my use 
case got thrown out with the bathwater, so to speak.  Oh, well.  :-(

(If anyone cares, the bad sender addresses are mostly alerts coming from older 
Sun ALOMs and at least one Lexmark printer that also sends email with broken 
From addresses.)

-Adam

 
-Original Message-
From: owner-m...@openbsd.org  On Behalf Of Adam Thompson
Sent: Wednesday, January 16, 2019 8:26 AM
To: 'Edgar Pettijohn' ; misc@openbsd.org
Subject: Re: smtpd - help needed tranlsating to new virtual map syntax

As I said, I haven't tried anything yet as I don't want to break a working 
system, and I don't have a good way to test this in parallel right now. 

The manpage says "The local delivery methods support additional options: [...] 
virtual" without specifying which delivery methods are "local".  My assumption 
was that only "mbox" and "mda" were local, as lmtp can, and often does, point 
to another server.

Some brief experiments with a VM only got me syntax errors, so I didn't pursue 
that very thoroughly before asking for clarification.

-Adam

-Original Message-
From: Edgar Pettijohn 
Sent: Wednesday, January 16, 2019 8:12 AM
To: Adam Thompson ; misc@openbsd.org
Subject: Re: smtpd - help needed tranlsating to new virtual map syntax

It would be helpful if you show what you have tried.

Should be as simple as:

action "relay-01" lmtp /var/run/lmtp.sock virtual 

match from src  action "relay-01"

Edgar
On Jan 16, 2019 7:37 AM, Adam Thompson  wrote:
>
> [Cross-posting here before I give up and switch to Postfix  -Adam]
>
>
> I have an old instance that uses smtpd's virtual  to rewrite *sender* 
> addresses.
> Reading the 6.4-STABLE version of the smtpd.conf(5) manpage, I can't see how 
> to accomplish my goal any more - it looks impossible.
>
> I don't want to upgrade a working mail relay server to something that might 
> be broken, so I'm seeking assistance first.
>
> The purpose of this system is purely to relay mail from internal, 
> semi-broken-ish systems out to our Office365 tenant, but I need to clean up 
> bogus MAIL FROM / "From:" headers first, lest they be flagged as spam.
>
> In general, I think I'm asking how to use virtual  with the "relay" 
> action in the new syntax - the manual tells me this is impossible!?
>
> Thanks,
> -Adam
>
>
> Old smtpd.conf:
>
> ===start===
> listen on 0.0.0.0
> listen on ::
> table aliases db:/etc/opensmtpd/aliases.db table vmap 
> db:/etc/opensmtpd/vmap.db table localnets { 192.168.10.0/24, 
> 192.168.100.0/24, 192.168.157.0/24, 192.168.158.0/24,
> 192.168.101.0/24, 10.158.0.0/16 } accept from local 
> for anyrelay via 
> smtp://XXX-ca.mail.protection.outlook.com hostname remote.XXX.ca 
> accept from source 192.168.158.63 for domain 192.168.158.63 virtual 
>  deliver to lmtp localhost:25 accept from source 192.168.100.63 
> for domain 192.168.100.63 virtual  deliver to lmtp localhost:25
> accept from source 192.168.158.63 for anyrelay via 
> smtp://XXX-ca.mail.protection.outlook.com as sys...@xxx.ca hostname 
> remote.XXX.ca accept from source 192.168.100.63 for any
> relay via smtp://XXX-ca.mail.protection.outlook.com as sys...@xxx.ca 
> hostname remote.XXX.ca accept from source for any  
>   
> relay via smtp://XXX-ca.mail.protection.outlook.com hostname 
> remote.XXX.ca ===end===
>
> old vmap:
>
> ===start===
> ilom-alert@192.168.100.63:  sys...@xxx.ca
> sys...@xxx.ca:   sys...@xxx.ca
> sys...@ad.xxx.ca: 

Re: smtpd - help needed tranlsating to new virtual map syntax

2019-01-20 Thread Adam Thompson
I found the "-T" (trace) flag to smtpd(8), and it gives me this, which AFAICT 
confirms my suspicions:
[...]
rule #2 matched: match from src allowed-hosts for any => translate
lookup: lookup "athom...@athompso.net" as ALIAS in table 
static:translations -> 0
lookup: lookup "athompso" as ALIAS in table static:translations -> 0
lookup: lookup "@athompso.net" as ALIAS in table static:translations -> 0
lookup: lookup "@" as ALIAS in table static:translations -> 0
expand: lka_expand: no aliases for virtual
mproc: lka -> pony : 53 IMSG_SMTP_EXPAND_RCPT
expand: 0x154201b89018: clearing expand tree
imsg: pony <- lka: IMSG_SMTP_EXPAND_RCPT (len=53)
smtp: 0x1127a72e6000: >>> 524 5.2.4 Mailing list expansion problem
[...]

complete output attached below, I've changed to @old.athompso.net and 
@new.athompso.net during testing since the last email.

On the sending side, from another host (listed in ), I'm running:
swaks --to athom...@athompso.net --from athom...@old.athompso.net 
--server 
which faithfully reports the 5.2.4 error.

I'm slightly disappointed, I still like OpenSMTPd's concise configuration 
syntax.  Postfix could still rewrite source addresses last time I checked, I 
hope it's still there - I do NOT want to run sendmail, thank you very much.

-Adam



Smtpd(8) trace output including invocation:
===from here to end of message===
bhs# smtpd -d -T all -v -d
debug: init ssl-tree
debug: init ca-tree
debug: init ssl-tree
debug: using "fs" queue backend
debug: using "ramqueue" scheduler backend
debug: using "ram" stat backend
info: OpenSMTPD 6.4.0 starting
debug: init ssl-tree
debug: init ssl-tree
debug: init ssl-tree
debug: init ssl-tree
debug: init ssl-tree
debug: init ca-tree
debug: init ca-tree
debug: init ca-tree
debug: init ca-tree
debug: init ca-tree
debug: init ssl-tree
debug: init ssl-tree
debug: init ssl-tree
debug: init ssl-tree
debug: init ssl-tree
debug: init ssl-tree
debug: init ca-tree
debug: using "fs" queue backend
debug: using "fs" queue backend
debug: using "fs" queue backend
debug: using "fs" queue backend
debug: using "fs" queue backend
debug: init ssl-tree
debug: using "ramqueue" scheduler backend
debug: using "ramqueue" scheduler backend
debug: using "ramqueue" scheduler backend
debug: using "ramqueue" scheduler backend
debug: using "ramqueue" scheduler backend
debug: using "fs" queue backend
debug: using "ram" stat backend
setup_peer: klondike -> control[63932] fd=4
setup_peer: klondike -> pony express[40666] fd=5
setup_done: ca[35575] done
debug: using "ram" stat backend
setup_peer: control -> klondike[35575] fd=4
setup_peer: control -> lookup[49698] fd=5
setup_peer: control -> pony express[40666] fd=6
setup_peer: control -> queue[21502] fd=7
setup_peer: control -> scheduler[14152] fd=8
setup_done: control[63932] done
debug: using "ram" stat backend
setup_peer: lookup -> control[63932] fd=4
setup_peer: lookup -> pony express[40666] fd=5
setup_peer: lookup -> queue[21502] fd=6
setup_done: lka[49698] done
debug: using "ram" stat backend
setup_peer: pony express -> control[63932] fd=4
setup_peer: pony express -> klondike[35575] fd=5
setup_peer: pony express -> lookup[49698] fd=6
setup_peer: pony express -> queue[21502] fd=7
setup_done: pony[40666] done
debug: using "ram" stat backend
setup_peer: queue -> control[63932] fd=4
setup_peer: queue -> pony express[40666] fd=5
setup_peer: queue -> lookup[49698] fd=6
setup_peer: queue -> scheduler[14152] fd=7
setup_done: queue[21502] done
debug: using "ramqueue" scheduler backend
debug: using "ram" stat backend
setup_peer: scheduler -> control[63932] fd=4
setup_peer: scheduler -> queue[21502] fd=5
setup_done: scheduler[14152] done
smtpd: setup done
mproc: parent -> control: enabled
mproc: parent -> lka: enabled
mproc: parent -> queue: enabled
mproc: parent -> ca: enabled
mproc: parent -> pony: enabled
debug: parent_send_config_ruleset: reloading
mproc: parent -> lka : 0 IMSG_CONF_START
mproc: parent -> lka : 0 IMSG_CONF_END
debug: parent_send_config: configuring pony process
mproc: parent -> pony : 0 IMSG_CONF_START
mproc: parent -> pony : 0 IMSG_CONF_END
debug: parent_send_config: configuring ca process
mproc: parent -> ca : 0 IMSG_CONF_START
mproc: parent -> ca : 0 IMSG_CONF_END
setup_proc: klondike done
setup_proc: control done
setup_proc: lookup done
setup_proc: pony express done
setup_proc: queue done
setup_proc: scheduler done
mproc: ca -> control: enabled
debug: bounce warning after 4h
mproc: ca -> parent: enabled
mproc: ca -> pony: enabled
mproc: ca -> pony: disabled
mproc: pony -> parent: enabled
mproc: scheduler -> control: enabled
imsg: ca <- parent: IMSG_CONF_START (len=0)
mproc: lka -> parent: enabled
mproc: pony -> queue: enabled
mproc: scheduler -> queue: enabled
scheduler: getting batch: mask=0x3f, count=10
debug: /--- ramqueue: scheduler_ram_batch()
debug: \---
scheduler: got r=0, delay=-1, count=10
scheduler: sleeping
imsg: 

Re: doas called multiple times hangs

2019-01-20 Thread Dariusz Sendkowski
Yes, it does.

I extracted 'unveilcommands' function from doas.c and put it into a
standalone program to run it.
It turned out the result was the same as in doas command. When I disable
unveil, then it works fine.





niedz., 20 sty 2019 o 22:31 Ted Unangst  napisał(a):

> Dariusz Sendkowski wrote:
> > I investigated the problem a little more and found, that when there is a
> > non-existent directory entry in my PATH, the problem occurs. If all of
> the
> > directories from my PATH exist, then it works fine.
>
> To help isolate the problem, if you disable unveil, does it work?
>
>
> Index: doas.c
> ===
> RCS file: /cvs/src/usr.bin/doas/doas.c,v
> retrieving revision 1.74
> diff -u -p -r1.74 doas.c
> --- doas.c  17 Jan 2019 05:35:35 -  1.74
> +++ doas.c  20 Jan 2019 21:30:55 -
> @@ -409,8 +409,6 @@ main(int argc, char **argv)
> if (setenv("PATH", safepath, 1) == -1)
> err(1, "failed to set PATH '%s'", safepath);
> }
> -   if (unveilcommands(getenv("PATH"), cmd) == 0)
> -   goto fail;
>
> if (pledge("stdio rpath getpw exec id", NULL) == -1)
> err(1, "pledge");
>


Re: doas called multiple times hangs

2019-01-20 Thread Dariusz Sendkowski
I investigated the problem a little more and found, that when there is a
non-existent directory entry in my PATH, the problem occurs. If all of the
directories from my PATH exist, then it works fine.



niedz., 20 sty 2019 o 12:00 Dariusz Sendkowski 
napisał(a):

> This is -stable 6.4.
> doas.conf:
> permit nopass myuser as root
>
>
>
>
> On Sun, 20 Jan 2019 at 11:50, Hiltjo Posthuma 
> wrote:
>
>> On Sun, Jan 20, 2019 at 11:15:38AM +0100, Dariusz Sendkowski wrote:
>> > Hi,
>> >
>> > Calling 'doas' in a loop makes the machine hang.
>> > I guess this is not an expected behavior.
>> > It can be checked by executing the following simple bash script:
>> >
>> > for i in {0..2}
>> > do
>> > doas ls some_dir
>> > done
>> >
>> > I have run it on three different machines and the result is the same on
>> > each of them. After about 9000 iterations the entire machine hangs.
>> > Executing the script without 'doas' works fine.
>>
>> Hi,
>>
>> Just tested, but no issue here on -current.
>>
>> What is your doas.conf contents and OpenBSD version / dmesg?
>>
>> --
>> Kind regards,
>> Hiltjo
>>
>


New York Times: Microwave Weapons Are Prime Suspect in Ills of U.S. Embassy Workers

2019-01-20 Thread Turritopsis Dohrnii Teo En Ming
Subject/Topic: New York Times: Microwave Weapons Are Prime Suspect in
Ills of U.S. Embassy Workers

This New York Times newspaper article is very welcome and being held
dear by millions of Targeted Individuals (TIs) all over the world,
including Mr. Turritopsis Dohrnii Teo En Ming, who is based in
Singapore.

New York Times Article: Microwave Weapons Are Prime Suspect in Ills of
U.S. Embassy Workers
Author: William J. Broad is a science journalist and senior writer. He
joined The Times in 1983, and has shared two Pulitzer Prizes with his
colleagues, as well as an Emmy Award and a DuPont Award.
@WilliamJBroad
Date Published: 1st September 2018 (Today is 19 January 2019 Saturday)
Link: 
https://www.nytimes.com/2018/09/01/science/sonic-attack-cuba-microwave.html

Snippets from the New York Times newspaper article:

Doctors and scientists say microwave strikes may have caused sonic
delusions and very real brain damage among embassy staff and family
members.

During the Cold War, Washington feared that Moscow was seeking to turn
microwave radiation into covert weapons of mind control.

More recently, the American military itself sought to develop
microwave arms that could invisibly beam painfully loud booms and even
spoken words into people’s heads. The aims were to disable attackers
and wage psychological warfare.

Now, doctors and scientists say such unconventional weapons may have
caused the baffling symptoms and ailments that, starting in late 2016,
hit more than three dozen American diplomats and family members in
Cuba and China. The Cuban incidents resulted in a diplomatic rupture
between Havana and Washington.

But Douglas H. Smith, the study’s lead author and director of the
Center for Brain Injury and Repair at the University of Pennsylvania,
said in a recent interview that microwaves were now considered a main
suspect and that the team was increasingly sure the diplomats had
suffered brain injury.

In particular, a growing number of analysts cite an eerie phenomenon
known as the Frey effect, named after Allan H. Frey, an American
scientist. Long ago, he found that microwaves can trick the brain into
perceiving what seem to be ordinary sounds.

The false sensations, the experts say, may account for a defining
symptom of the diplomatic incidents — the perception of loud noises,
including ringing, buzzing and grinding. Initially, experts cited
those symptoms as evidence of stealthy attacks with sonic weapons.

Members of Jason, a secretive group of elite scientists that helps the
federal government assess new threats to national security, say it has
been scrutinizing the diplomatic mystery this summer and weighing
possible explanations, including microwaves.

The microwave idea teems with unanswered questions. Who fired the
beams? The Russian government? The Cuban government? A rogue Cuban
faction sympathetic to Moscow? And, if so, where did the attackers get
the unconventional arms?

At his home outside Washington, Mr. Frey, the scientist who uncovered
the neural phenomenon, said federal investigators have questioned him
on the diplomatic riddle and that microwave radiation is considered a
possible cause.

Mr. Frey, now 83, has traveled widely and long served as a contractor
and a consultant to a number of federal agencies. He speculated that
Cubans aligned with Russia, the nation’s longtime ally, might have
launched microwave strikes in attempts to undermine developing ties
between Cuba and the United States.

The dimensions of the human head, scientists say, make it a fairly
good antenna for picking up microwave signals.

Mr. Frey, a biologist, said he stumbled on the acoustic effect in 1960
while working for General Electric’s Advanced Electronics Center at
Cornell University. A man who measured radar signals at a nearby G.E.
facility came up to him at a meeting and confided that he could hear
the beam’s pulses — zip, zip, zip.

Intrigued, Mr. Frey traveled to the man’s workplace in Syracuse and
positioned himself in a radar beam. “Lo,” he recalled, “I could hear
it, too.”

Mr. Frey’s resulting papers — reporting that even deaf people could
hear the false sounds — founded a new field of study on radiation’s
neural impacts. Mr. Frey’s first paper, in 1961, reported that power
densities 160 times lower than “the standard maximum safe level for
continuous exposure” could induce the sonic delusions.

Investigators raced to confirm and extend Mr. Frey’s findings. At
first they named the phenomenon after him, but eventually called it
the microwave auditory effect and, in time, more generally,
radio-frequency hearing.

Moscow was so intrigued by the prospect of mind control that it
adopted a special terminology for the overall class of envisioned
arms, calling them psychophysical and psychotronic.

Soviet research on microwaves for “internal sound perception,” the
Defense Intelligence Agency warned in 1976, showed great promise for
“disrupting the behavior patterns of military or diplomatic
personnel.”


Re: doas called multiple times hangs

2019-01-20 Thread Ted Unangst
Dariusz Sendkowski wrote:
> Yes, it does.
> 
> I extracted 'unveilcommands' function from doas.c and put it into a
> standalone program to run it.
> It turned out the result was the same as in doas command. When I disable
> unveil, then it works fine.

This diff should fix the problem.


Index: kern_unveil.c
===
RCS file: /cvs/src/sys/kern/kern_unveil.c,v
retrieving revision 1.22
diff -u -p -r1.22 kern_unveil.c
--- kern_unveil.c   17 Jan 2019 03:26:19 -  1.22
+++ kern_unveil.c   21 Jan 2019 01:31:23 -
@@ -630,8 +630,6 @@ unveil_add(struct proc *p, struct nameid
  done:
if (ret == 0)
unveil_add_traversed_vnodes(p, ndp);
-   unveil_free_traversed_vnodes(ndp);
-   pool_put(_pool, ndp->ni_cnd.cn_pnbuf);
return ret;
 }
 
Index: vfs_syscalls.c
===
RCS file: /cvs/src/sys/kern/vfs_syscalls.c,v
retrieving revision 1.310
diff -u -p -r1.310 vfs_syscalls.c
--- vfs_syscalls.c  3 Jan 2019 21:52:31 -   1.310
+++ vfs_syscalls.c  21 Jan 2019 01:29:38 -
@@ -92,6 +92,7 @@ int dofutimens(struct proc *, int, struc
 int dounmount_leaf(struct mount *, int, struct proc *);
 int unveil_add(struct proc *, struct nameidata *, const char *);
 void unveil_removevnode(struct vnode *vp);
+void unveil_free_traversed_vnodes(struct nameidata *);
 ssize_t unveil_find_cover(struct vnode *, struct proc *);
 struct unveil *unveil_lookup(struct vnode *, struct proc *, ssize_t *);
 
@@ -948,6 +949,8 @@ sys_unveil(struct proc *p, void *v, regi
vrele(nd.ni_vp);
if (nd.ni_dvp && nd.ni_dvp != nd.ni_vp)
vrele(nd.ni_dvp);
+   unveil_free_traversed_vnodes();
+   pool_put(_pool, nd.ni_cnd.cn_pnbuf);
 
return (error);
 }



Re: Raspberry Pi support in 6.4

2019-01-20 Thread seclists


> The SiFive FU540 runs FreeBSD.
> 
> https://www.sifive.com/boards/hifive-unleashed
> 
> https://fosdem.org/2019/schedule/event/testing_freebsd_risc_v5/

Very cool!



Re: doas called multiple times hangs

2019-01-20 Thread Ted Unangst
Ted Unangst wrote:
> Dariusz Sendkowski wrote:
> > Yes, it does.
> > 
> > I extracted 'unveilcommands' function from doas.c and put it into a
> > standalone program to run it.
> > It turned out the result was the same as in doas command. When I disable
> > unveil, then it works fine.
> 
> This diff should fix the problem.

Actually, miscalculation. This is a better diff. Sorry for the trouble.
Against current, but should be adaptable to stable.

Index: vfs_syscalls.c
===
RCS file: /cvs/src/sys/kern/vfs_syscalls.c,v
retrieving revision 1.310
diff -u -p -r1.310 vfs_syscalls.c
--- vfs_syscalls.c  3 Jan 2019 21:52:31 -   1.310
+++ vfs_syscalls.c  21 Jan 2019 04:57:17 -
@@ -92,6 +92,7 @@ int dofutimens(struct proc *, int, struc
 int dounmount_leaf(struct mount *, int, struct proc *);
 int unveil_add(struct proc *, struct nameidata *, const char *);
 void unveil_removevnode(struct vnode *vp);
+void unveil_free_traversed_vnodes(struct nameidata *);
 ssize_t unveil_find_cover(struct vnode *, struct proc *);
 struct unveil *unveil_lookup(struct vnode *, struct proc *, ssize_t *);
 
@@ -911,7 +912,7 @@ sys_unveil(struct proc *p, void *v, regi
 
nd.ni_pledge = PLEDGE_UNVEIL;
if ((error = namei()) != 0)
-   return (error);
+   goto end;
 
/*
 * XXX Any access to the file or directory will allow us to
@@ -948,6 +949,10 @@ sys_unveil(struct proc *p, void *v, regi
vrele(nd.ni_vp);
if (nd.ni_dvp && nd.ni_dvp != nd.ni_vp)
vrele(nd.ni_dvp);
+
+   pool_put(_pool, nd.ni_cnd.cn_pnbuf);
+end:
+   unveil_free_traversed_vnodes();
 
return (error);
 }
Index: kern_unveil.c
===
RCS file: /cvs/src/sys/kern/kern_unveil.c,v
retrieving revision 1.22
diff -u -p -r1.22 kern_unveil.c
--- kern_unveil.c   17 Jan 2019 03:26:19 -  1.22
+++ kern_unveil.c   21 Jan 2019 05:01:26 -
@@ -630,8 +630,6 @@ unveil_add(struct proc *p, struct nameid
  done:
if (ret == 0)
unveil_add_traversed_vnodes(p, ndp);
-   unveil_free_traversed_vnodes(ndp);
-   pool_put(_pool, ndp->ni_cnd.cn_pnbuf);
return ret;
 }