Re: Strange CAM errors

2012-12-18 Thread Willem Jan Withagen
On 2012-12-18 1:01, Jim Harris wrote:
 
 
 On Mon, Dec 17, 2012 at 4:52 PM, Willem Jan Withagen w...@digiware.nl
 mailto:w...@digiware.nl wrote:
 
 Right,
 
 That did the trick.
 Thanx for the code.
 
 --WjW
 
 
 
 Patch committed as r244369. It will get MFC'd but obviously won't be in 9.1.
 

Oke, thanx very much.
As far as I can tell the has not hurt the system, since it seems to be
probing code. And probing finds all the disks.

There are also some ZFS reboot fixes by Andriy, that will only make it
in after the release of 9.1.
And that one is really a tricky/nasty one because it makes it easy the
hang-up remote systems in the upgrade process.

And would definitely deserve a warning in the release notes
Since otherwise there might be more than the average set of complaints.

--WjW

___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to freebsd-stable-unsubscr...@freebsd.org


No more torrents.....

2012-12-18 Thread Willem Jan Withagen
Hi,

Not sure on what other list this would be discussed...

But I noticed that:

Error 503 torrents.FreeBSD.org is offline. It will probably will not be
back.

And this has been one of the small ways to support the FreeBSD
community, by offering almost all images on torrents

Got about
750 full 7.0 CD1 download
350 full 7.0 DVD1 downloads

So what is the reason for this?
policy
no more support?

--WjW

___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to freebsd-stable-unsubscr...@freebsd.org


Startup lapic messages

2012-12-18 Thread S . N . Grigoriev
Hi list,

I've installed FreeBSD 9.1R amd64 on a new Intel server.
The following lapic messages appear during system startup:

lapic18: Forcing LINT1 to edge trigger
SMP: AP CPU #2 Launched!
lapic50: Forcing LINT1 to edge trigger
SMP: AP CPU #6 Launched!
lapic20: Forcing LINT1 to edge trigger
SMP: AP CPU #3 Launched!
lapic32: Forcing LINT1 to edge trigger
SMP: AP CPU #4 Launched!
lapic2: Forcing LINT1 to edge trigger
SMP: AP CPU #1 Launched!
lapic34: Forcing LINT1 to edge trigger
SMP: AP CPU #5 Launched!
lapic52: Forcing LINT1 to edge trigger
SMP: AP CPU #7 Launched!

I've never seen such messages in past.
Does it mean I have some hardware problem/misconfiguration?

-- 
Thanks,
Serguey.
___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to freebsd-stable-unsubscr...@freebsd.org


FreeBSD-9.0-RELEASE-amd64 fails to start with SMP on qemu-kvm

2012-12-18 Thread Artur Samborski

Hello,

When i try to run FreeBSD-9.0-RELEASE-amd on more than 1 vcpu in 
quemu-kvm (Fedora Core 17) eg. with:


qemu-kvm -m 1024m -cpu host -smp 2 -cdrom 
/storage/iso/FreeBSD-9.0-RELEASE-amd64-dvd1.iso


it freezes KVM with:

KVM internal error. Suberror: 1
emulation failure
RAX=80b0d4c0 RBX=0009f000 RCX=c080 
RDX=
RSI=d238 RDI= RBP= 
RSP=
R8 = R9 = R10= 
R11=
R12= R13= R14= 
R15=

RIP=0009f076 RFL=00010086 [--S--P-] CPL=0 II=0 A20=1 SMM=0 HLT=0
ES =   f300 DPL=3 DS16 [-WA]
CS =0008   00209900 DPL=0 CS64 [--A]
SS =9f00 0009f000  f300 DPL=3 DS16 [-WA]
DS =0018   00c09300 DPL=0 DS   [-WA]
FS =   f300 DPL=3 DS16 [-WA]
GS =   f300 DPL=3 DS16 [-WA]
LDT=   8200 DPL=0 LDT
TR =   8b00 DPL=0 TSS64-busy
GDT= 0009f080 0020
IDT=  
CR0=8011 CR2= CR3=0009c000 CR4=0030
DR0= DR1= DR2= 
DR3=

DR6=0ff0 DR7=0400
EFER=0501
Code=00 00 00 80 0f 22 c0 ea 70 f0 09 00 08 00 48 b8 c0 d4 b0 80 ff ff 
ff ff ff e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 99 20 00 
ff ff 00 00


Freeze occurs immediately after kernel messages:

Copyright (c) 1992-2012 The FreeBSD Project.
Copyright (c) 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994
The Regents of the University of California. All rights reserved.
FreeBSD is a registered trademark of The FreeBSD Foundation.
FreeBSD 9.0-RELEASE #0: Tue Jan  3 07:46:30 UTC 2012
r...@farrell.cse.buffalo.edu:/usr/obj/usr/src/sys/GENERIC amd64
CPU: Intel(R) Xeon(R) CPU   X5570  @ 2.93GHz (2925.91-MHz 
K8-class CPU)
  Origin = GenuineIntel  Id = 0x106a5  Family = 6  Model = 1a 
Stepping = 5


Features=0xf83fbffFPU,VME,DE,PSE,TSC,MSR,PAE,MCE,CX8,APIC,SEP,MTRR,PGE,MCA,CMOV,PAT,PSE36,MMX,FXSR,SSE,SSE2,SS
  Features2=0x80982201SSE3,SSSE3,CX16,SSE4.1,SSE4.2,POPCNT,HV
  AMD Features=0x28100800SYSCALL,NX,RDTSCP,LM
  AMD Features2=0x1LAHF
real memory  = 1073741824 (1024 MB)
avail memory = 1011343360 (964 MB)
Event timer LAPIC quality 400
ACPI APIC Table: BOCHS  BXPCAPIC

This also applies to FreeBSD-7.3-RELEASE-amd64 and FreeBSD-9.1-RC3-amd64 
(other releases not tested).


When quemu-kvm is started without SMP (1 vpcu) amd64 FreeBSD kernel 
boots correctly. I did not notice this problem for the i386 versions 
(FreeBSD-7.3-RELEASE-i386, FreeBSD-9.0-RELEASE-i386, FreeBSD-9.1-RC3-i386).


CPUs on KVM host -- Xeons X5570

# cat /proc/cpuinfo
processor   : 0
vendor_id   : GenuineIntel
cpu family  : 6
model   : 26
model name  : Intel(R) Xeon(R) CPU   X5570  @ 2.93GHz
stepping: 5
microcode   : 0x11
cpu MHz : 2926.183
cache size  : 8192 KB
physical id : 1
siblings: 8
core id : 0
cpu cores   : 4
apicid  : 16
initial apicid  : 16
fpu : yes
fpu_exception   : yes
cpuid level : 11
wp  : yes
flags   : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge 
mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe 
syscall nx rdtscp lm constant_tsc arch_perfmon pebs bts rep_good nopl 
xtopology nonstop_tsc aperfmperf pni dtes64 monitor ds_cpl vmx est tm2 
ssse3 cx16 xtpr pdcm dca sse4_1 sse4_2 popcnt lahf_lm ida dtherm 
tpr_shadow vnmi flexpriority ept vpid

bogomips: 5852.36
clflush size: 64
cache_alignment : 64
address sizes   : 40 bits physical, 48 bits virtual
power management:

Any ideas?

Regards,
Artur Samborski

___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to freebsd-stable-unsubscr...@freebsd.org


FreeBSD-9.0-RELEASE-amd64 fails to start with SMP on qemu-kvm

2012-12-18 Thread Artur Samborski

Hello,

When i try to run FreeBSD-9.0-RELEASE-amd on more than 1 vcpu in 
quemu-kvm (Fedora Core 17) eg. with:


qemu-kvm -m 1024m -cpu host -smp 2 -cdrom 
/storage/iso/FreeBSD-9.0-RELEASE-amd64-dvd1.iso


it freezes KVM with:

KVM internal error. Suberror: 1
emulation failure
RAX=80b0d4c0 RBX=0009f000 RCX=c080 
RDX=
RSI=d238 RDI= RBP= 
RSP=
R8 = R9 = R10= 
R11=
R12= R13= R14= 
R15=

RIP=0009f076 RFL=00010086 [--S--P-] CPL=0 II=0 A20=1 SMM=0 HLT=0
ES =   f300 DPL=3 DS16 [-WA]
CS =0008   00209900 DPL=0 CS64 [--A]
SS =9f00 0009f000  f300 DPL=3 DS16 [-WA]
DS =0018   00c09300 DPL=0 DS   [-WA]
FS =   f300 DPL=3 DS16 [-WA]
GS =   f300 DPL=3 DS16 [-WA]
LDT=   8200 DPL=0 LDT
TR =   8b00 DPL=0 TSS64-busy
GDT= 0009f080 0020
IDT=  
CR0=8011 CR2= CR3=0009c000 CR4=0030
DR0= DR1= DR2= 
DR3=

DR6=0ff0 DR7=0400
EFER=0501
Code=00 00 00 80 0f 22 c0 ea 70 f0 09 00 08 00 48 b8 c0 d4 b0 80 ff ff 
ff ff ff e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 99 20 00 
ff ff 00 00


Freeze occurs immediately after kernel messages:

Copyright (c) 1992-2012 The FreeBSD Project.
Copyright (c) 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994
The Regents of the University of California. All rights reserved.
FreeBSD is a registered trademark of The FreeBSD Foundation.
FreeBSD 9.0-RELEASE #0: Tue Jan  3 07:46:30 UTC 2012
r...@farrell.cse.buffalo.edu:/usr/obj/usr/src/sys/GENERIC amd64
CPU: Intel(R) Xeon(R) CPU   X5570  @ 2.93GHz (2925.91-MHz 
K8-class CPU)
  Origin = GenuineIntel  Id = 0x106a5  Family = 6  Model = 1a 
Stepping = 5


Features=0xf83fbffFPU,VME,DE,PSE,TSC,MSR,PAE,MCE,CX8,APIC,SEP,MTRR,PGE,MCA,CMOV,PAT,PSE36,MMX,FXSR,SSE,SSE2,SS
  Features2=0x80982201SSE3,SSSE3,CX16,SSE4.1,SSE4.2,POPCNT,HV
  AMD Features=0x28100800SYSCALL,NX,RDTSCP,LM
  AMD Features2=0x1LAHF
real memory  = 1073741824 (1024 MB)
avail memory = 1011343360 (964 MB)
Event timer LAPIC quality 400
ACPI APIC Table: BOCHS  BXPCAPIC

This also applies to FreeBSD-7.3-RELEASE-amd64 and FreeBSD-9.1-RC3-amd64 
(other releases not tested).


When quemu-kvm is started without SMP (1 vpcu) amd64 FreeBSD kernel 
boots correctly. I did not notice this problem for the i386 versions 
(FreeBSD-7.3-RELEASE-i386, FreeBSD-9.0-RELEASE-i386, FreeBSD-9.1-RC3-i386).


CPUs on KVM host -- Xeons X5570

# cat /proc/cpuinfo
processor   : 0
vendor_id   : GenuineIntel
cpu family  : 6
model   : 26
model name  : Intel(R) Xeon(R) CPU   X5570  @ 2.93GHz
stepping: 5
microcode   : 0x11
cpu MHz : 2926.183
cache size  : 8192 KB
physical id : 1
siblings: 8
core id : 0
cpu cores   : 4
apicid  : 16
initial apicid  : 16
fpu : yes
fpu_exception   : yes
cpuid level : 11
wp  : yes
flags   : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge 
mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe 
syscall nx rdtscp lm constant_tsc arch_perfmon pebs bts rep_good nopl 
xtopology nonstop_tsc aperfmperf pni dtes64 monitor ds_cpl vmx est tm2 
ssse3 cx16 xtpr pdcm dca sse4_1 sse4_2 popcnt lahf_lm ida dtherm 
tpr_shadow vnmi flexpriority ept vpid

bogomips: 5852.36
clflush size: 64
cache_alignment : 64
address sizes   : 40 bits physical, 48 bits virtual
power management:

Any ideas?

Regards,
Artur Samborski

___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to freebsd-stable-unsubscr...@freebsd.org


MFC: Distributed audit daemon committed (was: svn commit: r243752 - in head: etc etc/defaults etc/mail etc/mtree etc/rc.d share/man/man4 usr.sbin usr.sbin/auditdistd (fwd)) (fwd)

2012-12-18 Thread Robert Watson


Dear all:

Just an FYI that the new distributed audit daemon has been MFC'd to 9-STABLE.

As noted in UPDATING, you will need to run mergemaster -p before using 
installkernel or installworld targets in order to add the new auditdistd 
system user.  This should be part of the regular update cycle anyway, but 
after the experience of adding auditdistd in 10-CURRENT, we've discovered that 
many people are skipping that step in the update cycle, so I figured it best 
to point out here.


(Technically, only installworld requires the user, but the user-check guards 
in the system Makefiles are enforced for both targets.)


More details on the daemon below.

Robert N M Watson
Computer Laboratory
University of Cambridge

-- Forwarded message --
Date: Sat, 1 Dec 2012 15:15:11 + (GMT)
From: Robert Watson rwat...@freebsd.org
To: curr...@freebsd.org
Cc: secur...@freebsd.org
Subject: Distributed audit daemon committed (was: svn commit: r243752 - in head:
 etc etc/defaults etc/mail etc/mtree etc/rc.d share/man/man4 usr.sbin
usr.sbin/auditdistd (fwd))


Dear all:

I've now committed the build glue required to install the recently merged Audit 
Distribution Daemon (auditdistd) contributed by the Pawel Dawidek, and 
sponsored by the FreeBSD Foundation.  This allows individual hosts generating 
audit trails to submit trails to a central audit server for review and safe 
keeping.  Part of the goal is to ensure that a host submitting trail data can't 
later modify the trails.  Pawel uses a variety of useful security- and 
resilience-related features such as TLS, Capsicum, etc, in auditdistd.  As the 
recent security incident in the FreeBSD.org cluster illustrated, having 
reliable and detailed audit trails makes a big difference in forensic work, and 
hopefully this will allow the FreeBSD Project (and our users) to do that better 
in the future.


Robert N M Watson
Computer Laboratory
University of Cambridge

-- Forwarded message --
Date: Sat, 1 Dec 2012 15:11:46 + (UTC)
From: Robert Watson rwat...@freebsd.org
To: src-committ...@freebsd.org, svn-src-...@freebsd.org,
svn-src-h...@freebsd.org
Subject: svn commit: r243752 - in head: etc etc/defaults etc/mail etc/mtree
etc/rc.d share/man/man4 usr.sbin usr.sbin/auditdistd

Author: rwatson
Date: Sat Dec  1 15:11:46 2012
New Revision: 243752
URL: http://svnweb.freebsd.org/changeset/base/243752

Log:
  Merge a number of changes required to hook up OpenBSM 1.2-alpha2's
  auditdistd (distributed audit daemon) to the build:

  - Manual cross references
  - Makefile for auditdistd
  - rc.d script, rc.conf entrie
  - New group and user for auditdistd; associated aliases, etc.

  The audit trail distribution daemon provides reliable,
  cryptographically protected (and sandboxed) delivery of audit tails
  from live clients to audit server hosts in order to both allow
  centralised analysis, and improve resilience in the event of client
  compromises: clients are not permitted to change trail contents
  after submission.

  Submitted by: pjd
  Sponsored by: The FreeBSD Foundation (auditdistd)

Added:
  head/etc/rc.d/auditdistd   (contents, props changed)
  head/usr.sbin/auditdistd/
  head/usr.sbin/auditdistd/Makefile   (contents, props changed)
Modified:
  head/etc/defaults/rc.conf
  head/etc/ftpusers
  head/etc/mail/aliases
  head/etc/master.passwd
  head/etc/mtree/BSD.var.dist
  head/etc/rc.d/Makefile
  head/share/man/man4/audit.4
  head/usr.sbin/Makefile

Modified: head/etc/defaults/rc.conf
==
--- head/etc/defaults/rc.conf   Sat Dec  1 13:46:37 2012(r243751)
+++ head/etc/defaults/rc.conf   Sat Dec  1 15:11:46 2012(r243752)
@@ -590,6 +590,9 @@ sendmail_rebuild_aliases=NO # Run newa
 auditd_enable=NO   # Run the audit daemon.
 auditd_program=/usr/sbin/auditd# Path to the audit daemon.
 auditd_flags=  # Which options to pass to the audit daemon.
+auditdistd_enable=NO   # Run the audit daemon.
+auditdistd_program=/usr/sbin/auditdistd	# Path to the auditdistd 
daemon.

+auditdistd_flags=  # Which options to pass to the auditdistd daemon.
 cron_enable=YES# Run the periodic job daemon.
 cron_program=/usr/sbin/cron# Which cron executable to run (if 
enabled).
 cron_dst=YES   # Handle DST transitions intelligently (YES/NO)

Modified: head/etc/ftpusers
==
--- head/etc/ftpusers   Sat Dec  1 13:46:37 2012(r243751)
+++ head/etc/ftpusers   Sat Dec  1 15:11:46 2012(r243752)
@@ -19,6 +19,7 @@ _pflogd
 _dhcp
 uucp
 pop
+auditdistd
 www
 hast
 nobody

Modified: head/etc/mail/aliases
==
--- head/etc/mail/aliases   Sat Dec  1 13:46:37 2012(r243751)
+++ head/etc/mail/aliases   Sat Dec  1 15:11:46 2012(r243752)
@@ -26,6 +26,7 

RE: Custom Kernel for FreeBSD Installation

2012-12-18 Thread xenophon\+freebsd
 From: owner-freebsd-sta...@freebsd.org [mailto:owner-freebsd-
 sta...@freebsd.org] On Behalf Of Torfinn Ingolfsen
 Sent: Tuesday, December 11, 2012 4:02 PM

 Not an answer to your question, but do you need to?
 Can't the DL380 G3 boot from something else, like a usb image?

The issue is with the ciss(4) driver restricting the maximum number of
logical drives to 15 in order to limit the driver's memory requirements.
If I understand it correctly, the driver allocates a certain amount of
memory (under 4 GiB) for each logical drive for DMA.  If an adapter
exports more than 15 logical drives, the driver refuses to attach any of
them and logs an error message like adapter claims to report absurd
number of logical drives (20  15).  On my server, I have 20 logical
drives (20 single-disk RAID-0 arrays), so the driver won't work without
modification.

So, to close the loop on this, I modified the value of CISS_MAX_LOGICAL
in src/sys/dev/ciss/cissvar.h and ran make buildworld buildkernel.  I
think I had to install sysutils/cdrecord as well.  Then, to create an
installation CD from the newly built world, I ran cd release; make
cdrom -D NOPORTS -D NOSRC -D NODOC.  This last step resulted in a file
named release.iso in the release directory.  I successfully booted
the FreeBSD installer using the new image, and FreeBSD was able to
detect and attach all 20 logical drives.

Leon Kos suggested increasing the value of the CISS_MAX_LOGICAL constant
(see http://www.freebsd.org/cgi/query-pr.cgi?pr=151564cat=kern), but I
think a boot-time tunable is a better approach.  I'm currently testing
this out and will submit patches if successful.

Best wishes,
Matthew

-- 
I FIGHT FOR THE USERS

___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to freebsd-stable-unsubscr...@freebsd.org


Re: MFC: Distributed audit daemon committed (was: svn commit: r243752 - in head: etc etc/defaults etc/mail etc/mtree etc/rc.d share/man/man4 usr.sbin usr.sbin/auditdistd (fwd)) (fwd)

2012-12-18 Thread Bas Smeelen

On 12/18/12 16:18, Robert Watson wrote:


Dear all:

Just an FYI that the new distributed audit daemon has been MFC'd to 
9-STABLE.


Thanks.



As noted in UPDATING, you will need to run mergemaster -p before 
using installkernel or installworld targets in order to add the new 
auditdistd system user.  This should be part of the regular update 
cycle anyway, but after the experience of adding auditdistd in 
10-CURRENT, we've discovered that many people are skipping that step 
in the update cycle, so I figured it best to point out here.


(Technically, only installworld requires the user, but the user-check 
guards in the system Makefiles are enforced for both targets.)


Maybe /usr/src/UPDATING should be updated?
The end of /usr/src/UPDATING mentiones mergemaster -p after the 
installtion of the new kernel and rebooting to single user mode instead 
of before. This is on 9.1-RELEASE and also in CURRENT.


At least the entry in /usr/src/UPDATING on CURRENT for this change

20121201:
With the addition of auditdistd(8), a new auditdistd user is now
depended on during installworld.  mergemaster -p can be used 
to add

the user prior to installworld, as documented in the handbook.

should be prior to installkernel then also instead of prior to 
installworld





More details on the daemon below.

Robert N M Watson
Computer Laboratory
University of Cambridge

-- Forwarded message --
Date: Sat, 1 Dec 2012 15:15:11 + (GMT)
From: Robert Watson rwat...@freebsd.org
To: curr...@freebsd.org
Cc: secur...@freebsd.org
Subject: Distributed audit daemon committed (was: svn commit: r243752 
- in head:

 etc etc/defaults etc/mail etc/mtree etc/rc.d share/man/man4 usr.sbin
usr.sbin/auditdistd (fwd))


Dear all:

I've now committed the build glue required to install the recently 
merged Audit Distribution Daemon (auditdistd) contributed by the Pawel 
Dawidek, and sponsored by the FreeBSD Foundation.  This allows 
individual hosts generating audit trails to submit trails to a central 
audit server for review and safe keeping.  Part of the goal is to 
ensure that a host submitting trail data can't later modify the 
trails.  Pawel uses a variety of useful security- and 
resilience-related features such as TLS, Capsicum, etc, in 
auditdistd.  As the recent security incident in the FreeBSD.org 
cluster illustrated, having reliable and detailed audit trails makes a 
big difference in forensic work, and hopefully this will allow the 
FreeBSD Project (and our users) to do that better in the future.


Robert N M Watson
Computer Laboratory
University of Cambridge

-- Forwarded message --
Date: Sat, 1 Dec 2012 15:11:46 + (UTC)
From: Robert Watson rwat...@freebsd.org
To: src-committ...@freebsd.org, svn-src-...@freebsd.org,
svn-src-h...@freebsd.org
Subject: svn commit: r243752 - in head: etc etc/defaults etc/mail 
etc/mtree

etc/rc.d share/man/man4 usr.sbin usr.sbin/auditdistd

Author: rwatson
Date: Sat Dec  1 15:11:46 2012
New Revision: 243752
URL: http://svnweb.freebsd.org/changeset/base/243752

Log:
  Merge a number of changes required to hook up OpenBSM 1.2-alpha2's
  auditdistd (distributed audit daemon) to the build:

  - Manual cross references
  - Makefile for auditdistd
  - rc.d script, rc.conf entrie
  - New group and user for auditdistd; associated aliases, etc.

  The audit trail distribution daemon provides reliable,
  cryptographically protected (and sandboxed) delivery of audit tails
  from live clients to audit server hosts in order to both allow
  centralised analysis, and improve resilience in the event of client
  compromises: clients are not permitted to change trail contents
  after submission.

  Submitted by:pjd
  Sponsored by:The FreeBSD Foundation (auditdistd)

Added:
  head/etc/rc.d/auditdistd   (contents, props changed)
  head/usr.sbin/auditdistd/
  head/usr.sbin/auditdistd/Makefile   (contents, props changed)
Modified:
  head/etc/defaults/rc.conf
  head/etc/ftpusers
  head/etc/mail/aliases
  head/etc/master.passwd
  head/etc/mtree/BSD.var.dist
  head/etc/rc.d/Makefile
  head/share/man/man4/audit.4
  head/usr.sbin/Makefile

Modified: head/etc/defaults/rc.conf
== 


--- head/etc/defaults/rc.confSat Dec  1 13:46:37 2012 (r243751)
+++ head/etc/defaults/rc.confSat Dec  1 15:11:46 2012 (r243752)
@@ -590,6 +590,9 @@ sendmail_rebuild_aliases=NO# Run newa
 auditd_enable=NO# Run the audit daemon.
 auditd_program=/usr/sbin/auditd# Path to the audit daemon.
 auditd_flags=# Which options to pass to the audit daemon.
+auditdistd_enable=NO# Run the audit daemon.
+auditdistd_program=/usr/sbin/auditdistd# Path to the auditdistd 
daemon.

+auditdistd_flags=# Which options to pass to the auditdistd daemon.
 cron_enable=YES# Run the periodic job daemon.
 cron_program=/usr/sbin/cron# Which cron executable to run (if 

Re: MFC: Distributed audit daemon committed (was: svn commit: r243752 - in head: etc etc/defaults etc/mail etc/mtree etc/rc.d share/man/man4 usr.sbin usr.sbin/auditdistd (fwd)) (fwd)

2012-12-18 Thread Chris H
 On 12/18/12 16:18, Robert Watson wrote:

 Dear all:

 Just an FYI that the new distributed audit daemon has been MFC'd to
 9-STABLE.

 Thanks.


 As noted in UPDATING, you will need to run mergemaster -p before
 using installkernel or installworld targets in order to add the new
 auditdistd system user.  This should be part of the regular update
 cycle anyway, but after the experience of adding auditdistd in
 10-CURRENT, we've discovered that many people are skipping that step
 in the update cycle, so I figured it best to point out here.

 (Technically, only installworld requires the user, but the user-check
 guards in the system Makefiles are enforced for both targets.)

 Maybe /usr/src/UPDATING should be updated?
 The end of /usr/src/UPDATING mentiones mergemaster -p after the
 installtion of the new kernel and rebooting to single user mode instead
 of before. This is on 9.1-RELEASE and also in CURRENT.

 At least the entry in /usr/src/UPDATING on CURRENT for this change

 20121201:
  With the addition of auditdistd(8), a new auditdistd user is now
  depended on during installworld.  mergemaster -p can be used
 to add
  the user prior to installworld, as documented in the handbook.

 should be prior to installkernel then also instead of prior to
 installworld

Greetings,
 FWIW, I just performed an build(world||kernel)  install(world||kernel) 
yesterday.
I used the following:

cd /usr/src

make buildworld
make buildkernel KERNCONF=mykern_name_here
make install KERNCONF=mykern_name_here

reboot to single user...

mount -u /
mount -a

cd /usr/src
mergemaster -p
blah,blah,blah...
make installworld
mergemaster
reboot

All of the auditdistd bits were merged into my system, and all is well.
Isn't that the way Updating lists the correct order?
Anyway, that's how I understood it, and just wanted to report that it
all worked as expected/anticipated.

HTH, and best wishes.

--Chris





 More details on the daemon below.

 Robert N M Watson
 Computer Laboratory
 University of Cambridge

 -- Forwarded message --
 Date: Sat, 1 Dec 2012 15:15:11 + (GMT)
 From: Robert Watson rwat...@freebsd.org
 To: curr...@freebsd.org
 Cc: secur...@freebsd.org
 Subject: Distributed audit daemon committed (was: svn commit: r243752
 - in head:
  etc etc/defaults etc/mail etc/mtree etc/rc.d share/man/man4 usr.sbin
 usr.sbin/auditdistd (fwd))


 Dear all:

 I've now committed the build glue required to install the recently
 merged Audit Distribution Daemon (auditdistd) contributed by the Pawel
 Dawidek, and sponsored by the FreeBSD Foundation.  This allows
 individual hosts generating audit trails to submit trails to a central
 audit server for review and safe keeping.  Part of the goal is to
 ensure that a host submitting trail data can't later modify the
 trails.  Pawel uses a variety of useful security- and
 resilience-related features such as TLS, Capsicum, etc, in
 auditdistd.  As the recent security incident in the FreeBSD.org
 cluster illustrated, having reliable and detailed audit trails makes a
 big difference in forensic work, and hopefully this will allow the
 FreeBSD Project (and our users) to do that better in the future.

 Robert N M Watson
 Computer Laboratory
 University of Cambridge

 -- Forwarded message --
 Date: Sat, 1 Dec 2012 15:11:46 + (UTC)
 From: Robert Watson rwat...@freebsd.org
 To: src-committ...@freebsd.org, svn-src-...@freebsd.org,
 svn-src-h...@freebsd.org
 Subject: svn commit: r243752 - in head: etc etc/defaults etc/mail
 etc/mtree
 etc/rc.d share/man/man4 usr.sbin usr.sbin/auditdistd

 Author: rwatson
 Date: Sat Dec  1 15:11:46 2012
 New Revision: 243752
 URL: http://svnweb.freebsd.org/changeset/base/243752

 Log:
   Merge a number of changes required to hook up OpenBSM 1.2-alpha2's
   auditdistd (distributed audit daemon) to the build:

   - Manual cross references
   - Makefile for auditdistd
   - rc.d script, rc.conf entrie
   - New group and user for auditdistd; associated aliases, etc.

   The audit trail distribution daemon provides reliable,
   cryptographically protected (and sandboxed) delivery of audit tails
   from live clients to audit server hosts in order to both allow
   centralised analysis, and improve resilience in the event of client
   compromises: clients are not permitted to change trail contents
   after submission.

   Submitted by:pjd
   Sponsored by:The FreeBSD Foundation (auditdistd)

 Added:
   head/etc/rc.d/auditdistd   (contents, props changed)
   head/usr.sbin/auditdistd/
   head/usr.sbin/auditdistd/Makefile   (contents, props changed)
 Modified:
   head/etc/defaults/rc.conf
   head/etc/ftpusers
   head/etc/mail/aliases
   head/etc/master.passwd
   head/etc/mtree/BSD.var.dist
   head/etc/rc.d/Makefile
   head/share/man/man4/audit.4
   head/usr.sbin/Makefile

 Modified: head/etc/defaults/rc.conf
 ==

 --- 

Re: MFC: Distributed audit daemon committed (was: svn commit: r243752 - in head: etc etc/defaults etc/mail etc/mtree etc/rc.d share/man/man4 usr.sbin usr.sbin/auditdistd (fwd)) (fwd)

2012-12-18 Thread Bryan Drewery
On 12/18/2012 9:18 AM, Robert Watson wrote:
 
 Dear all:
 
 Just an FYI that the new distributed audit daemon has been MFC'd to
 9-STABLE.
 
 As noted in UPDATING, you will need to run mergemaster -p before using
 installkernel or installworld targets in order to add the new
 auditdistd system user.  This should be part of the regular update
 cycle anyway, but after the experience of adding auditdistd in
 10-CURRENT, we've discovered that many people are skipping that step in
 the update cycle, so I figured it best to point out here.
 
 (Technically, only installworld requires the user, but the user-check
 guards in the system Makefiles are enforced for both targets.)

Have you seen misc/174405? Apparently installkernel is requiring the
user as well. The documented process in UPDATING does not mention
running mergemaster -p before [install]kernel.


 
 More details on the daemon below.
 
 Robert N M Watson
 Computer Laboratory
 University of Cambridge
 
 -- Forwarded message --
 Date: Sat, 1 Dec 2012 15:15:11 + (GMT)
 From: Robert Watson rwat...@freebsd.org
 To: curr...@freebsd.org
 Cc: secur...@freebsd.org
 Subject: Distributed audit daemon committed (was: svn commit: r243752 -
 in head:
  etc etc/defaults etc/mail etc/mtree etc/rc.d share/man/man4 usr.sbin
 usr.sbin/auditdistd (fwd))
 
 
 Dear all:
 
 I've now committed the build glue required to install the recently
 merged Audit Distribution Daemon (auditdistd) contributed by the Pawel
 Dawidek, and sponsored by the FreeBSD Foundation.  This allows
 individual hosts generating audit trails to submit trails to a central
 audit server for review and safe keeping.  Part of the goal is to ensure
 that a host submitting trail data can't later modify the trails.  Pawel
 uses a variety of useful security- and resilience-related features such
 as TLS, Capsicum, etc, in auditdistd.  As the recent security incident
 in the FreeBSD.org cluster illustrated, having reliable and detailed
 audit trails makes a big difference in forensic work, and hopefully this
 will allow the FreeBSD Project (and our users) to do that better in the
 future.
 
 Robert N M Watson
 Computer Laboratory
 University of Cambridge
 
 -- Forwarded message --
 Date: Sat, 1 Dec 2012 15:11:46 + (UTC)
 From: Robert Watson rwat...@freebsd.org
 To: src-committ...@freebsd.org, svn-src-...@freebsd.org,
 svn-src-h...@freebsd.org
 Subject: svn commit: r243752 - in head: etc etc/defaults etc/mail etc/mtree
 etc/rc.d share/man/man4 usr.sbin usr.sbin/auditdistd
 
 Author: rwatson
 Date: Sat Dec  1 15:11:46 2012
 New Revision: 243752
 URL: http://svnweb.freebsd.org/changeset/base/243752
 
 Log:
   Merge a number of changes required to hook up OpenBSM 1.2-alpha2's
   auditdistd (distributed audit daemon) to the build:
 
   - Manual cross references
   - Makefile for auditdistd
   - rc.d script, rc.conf entrie
   - New group and user for auditdistd; associated aliases, etc.
 
   The audit trail distribution daemon provides reliable,
   cryptographically protected (and sandboxed) delivery of audit tails
   from live clients to audit server hosts in order to both allow
   centralised analysis, and improve resilience in the event of client
   compromises: clients are not permitted to change trail contents
   after submission.
 
   Submitted by:pjd
   Sponsored by:The FreeBSD Foundation (auditdistd)
 
 Added:
   head/etc/rc.d/auditdistd   (contents, props changed)
   head/usr.sbin/auditdistd/
   head/usr.sbin/auditdistd/Makefile   (contents, props changed)
 Modified:
   head/etc/defaults/rc.conf
   head/etc/ftpusers
   head/etc/mail/aliases
   head/etc/master.passwd
   head/etc/mtree/BSD.var.dist
   head/etc/rc.d/Makefile
   head/share/man/man4/audit.4
   head/usr.sbin/Makefile
 
 Modified: head/etc/defaults/rc.conf
 ==
 
 --- head/etc/defaults/rc.confSat Dec  1 13:46:37 2012(r243751)
 +++ head/etc/defaults/rc.confSat Dec  1 15:11:46 2012(r243752)
 @@ -590,6 +590,9 @@ sendmail_rebuild_aliases=NO# Run newa
  auditd_enable=NO# Run the audit daemon.
  auditd_program=/usr/sbin/auditd# Path to the audit daemon.
  auditd_flags=# Which options to pass to the audit daemon.
 +auditdistd_enable=NO# Run the audit daemon.
 +auditdistd_program=/usr/sbin/auditdistd# Path to the auditdistd
 daemon.
 +auditdistd_flags=# Which options to pass to the auditdistd daemon.
  cron_enable=YES# Run the periodic job daemon.
  cron_program=/usr/sbin/cron# Which cron executable to run (if
 enabled).
  cron_dst=YES# Handle DST transitions intelligently (YES/NO)
 
 Modified: head/etc/ftpusers
 ==
 
 --- head/etc/ftpusersSat Dec  1 13:46:37 2012(r243751)
 +++ head/etc/ftpusersSat Dec  1 15:11:46 2012(r243752)
 @@ -19,6 +19,7 @@ _pflogd
  _dhcp
  uucp

Re: No more torrents.....

2012-12-18 Thread Eitan Adler
On 18 December 2012 03:59, Willem Jan Withagen w...@digiware.nl wrote:

 So what is the reason for this?

The software used to seed the torrents was horribly insecure.   This
was found *prior* to the security incident.

 policy
 no more support?

I have been trying to convince re@ and clusteradm@ to produce web
seed torrents using the same mirrors we have now.  I imagine further
progress could be made after the 9.1 release.


-- 
Eitan Adler
___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to freebsd-stable-unsubscr...@freebsd.org


Re: No more torrents.....

2012-12-18 Thread Efraín Déctor
I don't know why it went offline, however if you go to 
http://www.gotbsd.net/ you can get the latest release, I dont know if this 
can help you.


Greetings.

-Mensaje original- 
From: Willem Jan Withagen

Sent: Tuesday, December 18, 2012 2:59 AM
To: sta...@freebsd.org
Subject: No more torrents.

Hi,

Not sure on what other list this would be discussed...

But I noticed that:

Error 503 torrents.FreeBSD.org is offline. It will probably will not be
back.

And this has been one of the small ways to support the FreeBSD
community, by offering almost all images on torrents

Got about
750 full 7.0 CD1 download
350 full 7.0 DVD1 downloads

So what is the reason for this?
policy
no more support?

--WjW

___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to freebsd-stable-unsubscr...@freebsd.org 


___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to freebsd-stable-unsubscr...@freebsd.org


Re: No more torrents.....

2012-12-18 Thread Chris Rees
On 18 Dec 2012 19:44, Eitan Adler li...@eitanadler.com wrote:

 On 18 December 2012 03:59, Willem Jan Withagen w...@digiware.nl wrote:

  So what is the reason for this?

 The software used to seed the torrents was horribly insecure.   This
 was found *prior* to the security incident.

What software?

Chris
___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to freebsd-stable-unsubscr...@freebsd.org


Re: MFC: Distributed audit daemon committed (was: svn commit: r243752 - in head: etc etc/defaults etc/mail etc/mtree etc/rc.d share/man/man4 usr.sbin usr.sbin/auditdistd (fwd)) (fwd)

2012-12-18 Thread Bas Smeelen

On 12/18/12 18:44, Chris H wrote:

On 12/18/12 16:18, Robert Watson wrote:

Dear all:

Just an FYI that the new distributed audit daemon has been MFC'd to
9
20121201:
  With the addition of auditdistd(8), a new auditdistd user is now
  depended on during installworld.  mergemaster -p can be used
to add
  the user prior to installworld, as documented in the handbook.

should be prior to installkernel then also instead of prior to
installworld

Greetings,
  FWIW, I just performed an build(world||kernel)  install(world||kernel) 
yesterday.
I used the following:

cd /usr/src

make buildworld
make buildkernel KERNCONF=mykern_name_here
make install KERNCONF=mykern_name_here


Hi
I guess you did make installkernel instead of just make install 
KERNCONF=mykern_name_here ?


I did a day ago on a 9.1-RC3:

freebsd-update
make buildkernel
make installkernel

Then got prompted that the auditdistd user did not exist so I had to add 
it prior to installing the kernel.

But this was when going from 9.1-RC3 to 9.1-RELEASE
So I copied the bits from a CURRENT machine where everything went fine 
using the standard buildworld, buildkernel, installkernel, mergemaster 
-p, installworld, mergemaster procedure


So that was not the usual way, but just using freebsd-update and 
installing a custom kernel.


On CURRENT it went al well.

Never mind and thanks.



reboot to single user...

mount -u /
mount -a

cd /usr/src
mergemaster -p
blah,blah,blah...
make installworld
mergemaster
reboot

All of the auditdistd bits were merged into my system, and all is well.
Isn't that the way Updating lists the correct order?


Yes it is. I did an unusual combination of binary update and then 
building and installing a custom kernel.



Anyway, that's how I understood it, and just wanted to report that it
all worked as expected/anticipated.

HTH, and best wishes.

--Chris




___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to freebsd-stable-unsubscr...@freebsd.org


Re: MFC: Distributed audit daemon committed (was: svn commit: r243752 - in head: etc etc/defaults etc/mail etc/mtree etc/rc.d share/man/man4 usr.sbin usr.sbin/auditdistd (fwd)) (fwd)

2012-12-18 Thread Chris H
 On 12/18/12 18:44, Chris H wrote:
 On 12/18/12 16:18, Robert Watson wrote:
 Dear all:

 Just an FYI that the new distributed audit daemon has been MFC'd to
 9
 20121201:
   With the addition of auditdistd(8), a new auditdistd user is now
   depended on during installworld.  mergemaster -p can be used
 to add
   the user prior to installworld, as documented in the handbook.

 should be prior to installkernel then also instead of prior to
 installworld
 Greetings,
   FWIW, I just performed an build(world||kernel)  install(world||kernel) 
 yesterday.
 I used the following:

 cd /usr/src

 make buildworld
 make buildkernel KERNCONF=mykern_name_here
 make install KERNCONF=mykern_name_here

 Hi
 I guess you did make installkernel instead of just make install
 KERNCONF=mykern_name_here ?

D'OH! :P

Sorry. That _should_ have read:

make installkernel KERNCONF=mykern_name_here
^^

Good catch! I can assure you, I _did_ do it correctly, when
actually performing the install. :)

FWIW Mine was a fresh install from the 9.0 CD1,
then a sync src, ports  make build(world||kernel); install(kernel||world).

Best wishes.

--Chris


 I did a day ago on a 9.1-RC3:

 freebsd-update
 make buildkernel
 make installkernel

 Then got prompted that the auditdistd user did not exist so I had to add
 it prior to installing the kernel.
 But this was when going from 9.1-RC3 to 9.1-RELEASE
 So I copied the bits from a CURRENT machine where everything went fine
 using the standard buildworld, buildkernel, installkernel, mergemaster
 -p, installworld, mergemaster procedure

 So that was not the usual way, but just using freebsd-update and
 installing a custom kernel.

 On CURRENT it went al well.

 Never mind and thanks.


 reboot to single user...

 mount -u /
 mount -a

 cd /usr/src
 mergemaster -p
 blah,blah,blah...
 make installworld
 mergemaster
 reboot

 All of the auditdistd bits were merged into my system, and all is well.
 Isn't that the way Updating lists the correct order?

 Yes it is. I did an unusual combination of binary update and then
 building and installing a custom kernel.

 Anyway, that's how I understood it, and just wanted to report that it
 all worked as expected/anticipated.

 HTH, and best wishes.

 --Chris



 ___
 freebsd-stable@freebsd.org mailing list
 http://lists.freebsd.org/mailman/listinfo/freebsd-stable
 To unsubscribe, send any mail to freebsd-stable-unsubscr...@freebsd.org


___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to freebsd-stable-unsubscr...@freebsd.org


Re: No more torrents.....

2012-12-18 Thread Peter Wemm
On Tue, Dec 18, 2012 at 11:52 AM, Chris Rees utis...@gmail.com wrote:
 On 18 Dec 2012 19:44, Eitan Adler li...@eitanadler.com wrote:

 On 18 December 2012 03:59, Willem Jan Withagen w...@digiware.nl wrote:

  So what is the reason for this?

 The software used to seed the torrents was horribly insecure.   This
 was found *prior* to the security incident.

 What software?

A hybrid of bnbt, xbnbt, xbtt, and something else that I don't recall
the name of.  We ran the seeders from py-bittornado in curses mode in
about 15 screen sessions.. by hand.

The tracker/indexer code had an open http connect proxy in it (!).
The code was particularly difficult to work with and looked extremely
light for defensive programming.  (string buffer overflows, the
works).

The bottom line is the nice indexer / tracker / stats thing we had
isn't something I feel we can trust.

I do believe we can/should publish trackerless/dht torrent files to go
with the release binaries.

Perhaps an initial web-seed might work, otherwise we could have a few
folks with good ftp connectivity do an initial seed from the ftp
files.

Another option is a no-frills tracker (eg: no gui).

So, the old way:
xbnbt + xbtt + bnbt provided a tracker, an index, downloads of the
.torrent files.
via screen, we ran a farm of py-bittornado (which particpated in
utorrent-compatible pex/dht)
very high maintenence and magic.

New way:
www.freebsd.org: provides an index and downloads of the .torrent files
if required, a no-frills tracker.
as required, run py-bittornado for a week or so, and/or well connected
folks preload their clients via ftp.


-- 
Peter Wemm - pe...@wemm.org; pe...@freebsd.org; pe...@yahoo-inc.com; KI6FJV
All of this is for nothing if we don't go to the stars - JMS/B5
If Java had true garbage collection, most programs would delete
themselves upon execution. -- Robert Sewell
___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to freebsd-stable-unsubscr...@freebsd.org


Re: No more torrents.....

2012-12-18 Thread pete wright

 A hybrid of bnbt, xbnbt, xbtt, and something else that I don't recall
 the name of.  We ran the seeders from py-bittornado in curses mode in
 about 15 screen sessions.. by hand.

 The tracker/indexer code had an open http connect proxy in it (!).
 The code was particularly difficult to work with and looked extremely
 light for defensive programming.  (string buffer overflows, the
 works).

 The bottom line is the nice indexer / tracker / stats thing we had
 isn't something I feel we can trust.

 I do believe we can/should publish trackerless/dht torrent files to go
 with the release binaries.

 Perhaps an initial web-seed might work, otherwise we could have a few
 folks with good ftp connectivity do an initial seed from the ftp
 files.


I would be very much be willing to assist with seeding if we make dht
torrent files available from my nodes located in downtown Los Angeles
for west-coast and APAC network presence.

as an aside:
I have been running libtorrent/rtorrent for a bit and it seems like a
pretty decent platform for building on.  having said that - I am not a
security researcher and would be keen to hear if libtorrent/rotrrent
suffers from these similar issues?


-pete

-- 
pete wright
www.nycbug.org
@nomadlogicLA
___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to freebsd-stable-unsubscr...@freebsd.org


Re: No more torrents.....

2012-12-18 Thread Peter Wemm
On Tue, Dec 18, 2012 at 3:19 PM, pete wright nomadlo...@gmail.com wrote:

 A hybrid of bnbt, xbnbt, xbtt, and something else that I don't recall
 the name of.  We ran the seeders from py-bittornado in curses mode in
 about 15 screen sessions.. by hand.

 The tracker/indexer code had an open http connect proxy in it (!).
 The code was particularly difficult to work with and looked extremely
 light for defensive programming.  (string buffer overflows, the
 works).

 The bottom line is the nice indexer / tracker / stats thing we had
 isn't something I feel we can trust.

 I do believe we can/should publish trackerless/dht torrent files to go
 with the release binaries.

 Perhaps an initial web-seed might work, otherwise we could have a few
 folks with good ftp connectivity do an initial seed from the ftp
 files.


 I would be very much be willing to assist with seeding if we make dht
 torrent files available from my nodes located in downtown Los Angeles
 for west-coast and APAC network presence.

 as an aside:
 I have been running libtorrent/rtorrent for a bit and it seems like a
 pretty decent platform for building on.  having said that - I am not a
 security researcher and would be keen to hear if libtorrent/rotrrent
 suffers from these similar issues?

Oh wait, I told a lie.  It wasn't py-bittornado we used.. it was
rtorrent.  Thanks for prompting that.

I have no concerns with rtorrent except that it was a curses beastie.
It was something we had to manually start up after a machine reboot
until we did some evil scripts with screen.

-- 
Peter Wemm - pe...@wemm.org; pe...@freebsd.org; pe...@yahoo-inc.com; KI6FJV
All of this is for nothing if we don't go to the stars - JMS/B5
If Java had true garbage collection, most programs would delete
themselves upon execution. -- Robert Sewell
___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to freebsd-stable-unsubscr...@freebsd.org


Re: No more torrents.....

2012-12-18 Thread pete wright
On Tue, Dec 18, 2012 at 3:22 PM, Peter Wemm pe...@wemm.org wrote:
 On Tue, Dec 18, 2012 at 3:19 PM, pete wright nomadlo...@gmail.com wrote:

 A hybrid of bnbt, xbnbt, xbtt, and something else that I don't recall
 the name of.  We ran the seeders from py-bittornado in curses mode in
 about 15 screen sessions.. by hand.

 The tracker/indexer code had an open http connect proxy in it (!).
 The code was particularly difficult to work with and looked extremely
 light for defensive programming.  (string buffer overflows, the
 works).

 The bottom line is the nice indexer / tracker / stats thing we had
 isn't something I feel we can trust.

 I do believe we can/should publish trackerless/dht torrent files to go
 with the release binaries.

 Perhaps an initial web-seed might work, otherwise we could have a few
 folks with good ftp connectivity do an initial seed from the ftp
 files.


 I would be very much be willing to assist with seeding if we make dht
 torrent files available from my nodes located in downtown Los Angeles
 for west-coast and APAC network presence.

 as an aside:
 I have been running libtorrent/rtorrent for a bit and it seems like a
 pretty decent platform for building on.  having said that - I am not a
 security researcher and would be keen to hear if libtorrent/rotrrent
 suffers from these similar issues?

 Oh wait, I told a lie.  It wasn't py-bittornado we used.. it was
 rtorrent.  Thanks for prompting that.

 I have no concerns with rtorrent except that it was a curses beastie.
 It was something we had to manually start up after a machine reboot
 until we did some evil scripts with screen.


ah ok - understood.  well i'll keep an eye on the lists, and if some
trackerless torrents become available i'll be sure to contribute my
resources to this :)  I'd volunteer to help build them but
unfortunately my human bandwidth is limited atm.

cheers,
-pete

-- 
pete wright
www.nycbug.org
@nomadlogicLA
___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to freebsd-stable-unsubscr...@freebsd.org


9-STABLE - NFS - NetAPP:

2012-12-18 Thread Hub- Marketing

I'm running a few servers sitting on top of a NetAPP file server … everything 
runs great, but periodically I'm getting:

nfs_getpages: error 13
vm_fault: pager read error, pid 11355 (https)

errors on my screen … not always same pid … the annoying part is that it seems 
to always affect the same jail that is running .. if I shutdown all jails on 
that physical server, everything shuts down except for that *one* jail, with a 
ps listing looking like:

USER   PID %CPU %MEMVSZ   RSS TT  STAT STARTEDTIME COMMAND
root  6670  0.0  0.0   9936  1372 ??  DsJ   3:00AM 0:00.01 newsyslog
root  6815  0.0  0.0   9936  1288 ??  DsJ   3:00AM 0:00.01 /usr/sbin/newsyslog 
-f /usr/local/etc/rotate_logs.cfg
root  8361  0.0  0.1 220740 11400 ??  DsJ   7:33PM 0:01.25 
/usr/local/sbin/httpd -DNOHTTPACCEPT
www   8364  0.0  0.0  0 0 ??  ZJ7:33PM 0:00.00 defunct
www  11866  0.0  0.1 318444 16792 ??  TJ7:36PM 0:00.03 
/usr/local/sbin/httpd -DNOHTTPACCEPT
www  11872  0.0  0.1 297964 14008 ??  TJ7:36PM 0:00.01 
/usr/local/sbin/httpd -DNOHTTPACCEPT
www  11873  0.0  0.1 306156 15028 ??  DEJ   7:36PM 0:00.02 
/usr/local/sbin/httpd -DNOHTTPACCEPT
root 17190  0.0  0.0   9936  1240 ??  DsJ   8:00PM 0:00.01 /usr/sbin/newsyslog 
-f /usr/local/etc/rotate_logs.cfg
root 24864  0.0  0.0   9936  1392 ??  DsJ   4:00AM 0:00.01 newsyslog
root 24910  0.0  0.0   9936  1336 ??  DsJ   4:00AM 0:00.01 /usr/sbin/newsyslog 
-f /usr/local/etc/rotate_logs.cfg
root 29972  0.0  0.0   9936  1240 ??  DsJ   9:00PM 0:00.01 /usr/sbin/newsyslog 
-f /usr/local/etc/rotate_logs.cfg
root 34221  0.0  0.0  51480  4332 ??  DsJ   4:47AM 0:00.02 sshd: root@pts/1 
(sshd)
root 42452  0.0  0.0   9936  1296 ??  DsJ  10:00PM 0:00.01 newsyslog
root 42522  0.0  0.0   9936  1240 ??  DsJ  10:00PM 0:00.01 /usr/sbin/newsyslog 
-f /usr/local/etc/rotate_logs.cfg
root 55179  0.0  0.0   9936  1296 ??  DsJ  11:00PM 0:00.01 newsyslog
root 55244  0.0  0.0   9936  1240 ??  DsJ  11:00PM 0:00.01 /usr/sbin/newsyslog 
-f /usr/local/etc/rotate_logs.cfg
root 67592  0.0  0.0   9936  1336 ??  DsJ  12:00AM 0:00.01 newsyslog
root 67762  0.0  0.0   9936  1288 ??  DsJ  12:00AM 0:00.01 /usr/sbin/newsyslog 
-f /usr/local/etc/rotate_logs.cfg
root 81603  0.0  0.0   9936  1340 ??  DsJ   1:00AM 0:00.01 newsyslog
root 81640  0.0  0.0   9936  1284 ??  DsJ   1:00AM 0:00.01 /usr/sbin/newsyslog 
-f /usr/local/etc/rotate_logs.cfg
root 93792  0.0  0.0   9936  1344 ??  DsJ   2:00AM 0:00.01 newsyslog
root 93815  0.0  0.0   9936  1288 ??  DsJ   2:00AM 0:00.01 /usr/sbin/newsyslog 
-f /usr/local/etc/rotate_logs.cfg
root 34228  0.0  0.0  67960  4464  1  Ds+J  4:47AM 0:00.00 sshd: root@pts/1 
(sshd)
root 38473  0.0  0.0  17556  3272  3  SJ4:53AM 0:00.02 /bin/tcsh
root 38475  0.0  0.0  14212  1512  3  R+J   4:53AM 0:00.00 ps aux

I can do a 'jexec JID /bin/tcsh' to get into the jail, I can perform ps 
commands, etc … I just can't get those processes to shutdown …

everything within the jail is 'up to date' … updates the userland and ports … 
I've checked over the NetApp, but everything appears fine, and it only seems to 
repeatedly affect that one jail, on that same physical server ...

I have no ideas on what / how to debug this … thoughts?  help?

thx


___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to freebsd-stable-unsubscr...@freebsd.org


Re: ipv6_addrs_IF aliases in rc.conf(5)

2012-12-18 Thread Kimmo Paasiala
On Fri, Dec 7, 2012 at 12:42 PM, Kimmo Paasiala kpaas...@gmail.com wrote:
 Hello,

 I wrote a small patch for /etc/network.subr to add support for
 ipv6_addrs_IF aliases in rc.conf(5) to match the already existing
 ipv4_addrs_IF aliases for ipv4 addresses. With this patch the ipv6
 aliases can be written like:

 ipv6_addrs_re0=2001:db8::::1/64 2001:db8::::2/64

 Only this syntax is supported, it's not possible to use the prefixlen
 nn syntax in the list.

 The patch is against a recent 9-STABLE, last changed rev of
 network.subr on my SVN checkout is r242187. I don't have a CURRENT
 system to test if it applies to CURRENT as well.

 The patch can be found attached to a PR I sent:

 http://www.freebsd.org/cgi/query-pr.cgi?pr=174225


 I wrote this patch inspired by a question on the FreeBSD forums:

 http://forums.freebsd.org/showthread.php?t=36136

 Please test and report if it works for you :)


 Regards,
 Kimmo Paasiala

Hello,

Did anyone try my patch? I thought it would be nice to have the
ipv6_addrs_IF syntax supported to complement the existing
ipv4_addrs_IF alias syntax.

-Kimmo
___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to freebsd-stable-unsubscr...@freebsd.org


Re: 9.1-RC3 fusefs-encfs problem ( ls: b: Bad file descriptor )

2012-12-18 Thread Joseph Mingrone
On Thu, Dec 6, 2012 at 3:00 AM, Özkan KIRIK ozkan.ki...@gmail.com wrote:
 I just installed fusefs-encfs from ports.
 There is something wrong while mounting the fuse.
 The output :

 root@host # kldstat
 Id Refs AddressSize Name
  13 0x8020 13e0d58  kernel
  21 0x81812000 a9bb fuse.ko

 root@host # encfs `pwd`/a `pwd`/b
 The directory /usr/home/sysadmin/a/ does not exist. Should it be created?
 (y,n) y
 The directory /usr/home/sysadmin/b does not exist. Should it be created?
 (y,n) y
 Creating new encrypted volume.
 Please choose from one of the following options:
  enter x for expert configuration mode,
  enter p for pre-configured paranoia mode,
  anything else, or an empty line will select standard mode.
 ?

 Standard configuration selected.

 Configuration finished.  The filesystem to be created has
 the following properties:
 Filesystem cipher: ssl/aes, version 3:0:2
 Filename encoding: nameio/block, version 3:0:1
 Key Size: 192 bits
 Block Size: 1024 bytes
 Each file contains 8 byte header with unique IV data.
 Filenames encoded using IV chaining mode.
 File holes passed through to ciphertext.

 Now you will need to enter a password for your filesystem.
 You will need to remember this password, as there is absolutely
 no recovery mechanism.  However, the password can be changed
 later using encfsctl.

 New Encfs Password:
 Verify Encfs Password:
 root@host #

 root@host # mount
 /dev/ada0p2 on / (ufs, local, journaled soft-updates)
 devfs on /dev (devfs, local, multilabel)
 /dev/fuse0 on /usr/home/b (fusefs, local, synchronous)

 root@host # cd b
 b: Not a directory.

 root@host  # ls b
 ls: b: Bad file descriptor

 root@host # umount b
 umount: b: stat: Bad file descriptor
 umount: b: unknown file system

 root@host # umount /usr/home/b
 - has no errors.


 I tried this on two different machines with 9.1-RC3 amd64.
 How can we solve this problem?

 Sincerely,
 Ozkan KIRIK

I have the same problem.  Downgrading sysutils/fusefs-kmod and
sysutils/fusefs-libs as described in the PR linked to below allowed me
to mount again.

http://www.freebsd.org/cgi/query-pr.cgi?pr=ports/173240
___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to freebsd-stable-unsubscr...@freebsd.org