Hi,
I think you need to look at the PF configuration on your setup. My
configuration is as follows,
(Not my full pf.conf)
# Allow iked
pass in quick log on egress proto esp from any to egress label "IKED-ESP"
pass in quick log on egress proto udp from any to egress port $iked_ports label
Hi Fabio,
I believe this will do what you want, seemed to work in quick testing
here, adjust to suit your environment.
match in on $ext_if proto tcp from to ($ext_if) port 25
rdr-to 200.200.200.200 port
match out on $ext_if proto tcp to 200.200.200.200 port received-on
$ext_if
Dear Ingo,
On 2/13/20, Ingo Schwarze wrote:
> (Unless you pierce its heart with a woodden stick. Sorry, now i was
>$ kill -CONT 39747
Thank you for showing me the wooden stick! It worked!
Yours sincerely,
Xianwen
Hi,
Xianwen Chen wrote on Thu, Feb 13, 2020 at 09:31:45PM +:
> Maurice wrote:
>> you could try kill -1 8926
> Thank you. I just tried it. It did not kill the process.
Small wonder, you already already dropped a nuke on it (-9 = -KILL)
and even that didn't make the zombie go away.
You
Dear Maurice,
> you could try kill -1 8926
Thank you. I just tried it. It did not kill the process.
Yours sincerely,
Xianwen
Hi,
Xianwen Chen wrote on Thu, Feb 13, 2020 at 08:10:17PM +:
> I am not able to kill a python process.
> $ pgrep python
> showed a PID of 8926
> However, I am not able to kill the process.
> $ kill -9 8926
> # kill -9 8926
> Running as root did not help.
Sounds like a zombie. Seriously,
you could try kill -1 8926
Dear OpenBSD users,
I am not able to kill a python process.
$ pgrep python
showed a PID of 8926
However, I am not able to kill the process.
$ kill -9 8926
# kill -9 8926
Running as root did not help.
How can I kill this process?
Yours sincerely,
Xianwen
Hi,
I am trying to redirect + NAT incoming packets without the need of a TCP
Proxy.
Currently I have the following setup to redirect hosts abusing SMTP to an
email trap:
inetd listening in 127.0.0.1:8000 and redirecting to an external host
# inetd.conf
127.0.0.1:8000 stream tcp nowait
> > On Linux you can do the following:
> > { [1MB unencrypted GRUB bootloader partition] [Rest of hard drive
entirely encrypted] }
... which i would consider to be as insecure, as unencrypted root at all.
maybe check out https://wiki.osdev.org, they have nice articles on this.
IMHO a secure boot
cipher-hea...@riseup.net writes:
>
> On Linux you can do the following:
>
> Hard drive:
> { [1MB unencrypted GRUB bootloader partition] [Rest of hard drive entirely
> encrypted] }
>
> Then the only parts of the (x64) computer that are unencrypted are the BIOS
> and GRUB.
This is how it already
On 2020-02-12, Xiyue Deng wrote:
> --=-=-=
> Content-Type: text/plain
>
> Xiyue Deng writes:
>
>> Hi,
>>
>> It looks like cdn.openbsd.org[1] doesn't sync the 6.6 packages for mips64el
>> from ftp.openbsd.org[2].
>>
>> [1] http://cdn.openbsd.org/pub/OpenBSD/6.6/packages/
>> [2]
On 13.02.2020 08:43, Robert Paschedag wrote:
sent from my mobile device
Am 12. Februar 2020 15:07:46 schrieb Shadrock Uhuru :
hi everyone
i have setup iked on my firewall and laptop as a roadwarrior setup
following https://www.openbsd.org/faq/faq17.html
i.ve tested from within the local
On Thu, Feb 13, 2020 at 10:31:30AM +, cipher-hea...@riseup.net wrote:
>
> On Linux you can do the following:
>
> Hard drive:
> { [1MB unencrypted GRUB bootloader partition] [Rest of hard drive entirely
> encrypted] }
>
> Then the only parts of the (x64) computer that are unencrypted are
On Linux you can do the following:
Hard drive:
{ [1MB unencrypted GRUB bootloader partition] [Rest of hard drive entirely
encrypted] }
Then the only parts of the (x64) computer that are unencrypted are the BIOS and
GRUB.
You can then move the GRUB offline if you wish, execute it externally.
On Thu, Feb 13, 2020 at 09:05:19AM +0100, Tor Houghton wrote:
> Hello,
>
> At present I am running a small python script that tails /var/log/messages
> and looks for '/bsd: VMware guest resuming from suspended state', executes
> 'doas rcctl restart ntpd' (with 'ntpd_flags="-s" in
Hello,
At present I am running a small python script that tails /var/log/messages
and looks for '/bsd: VMware guest resuming from suspended state', executes
'doas rcctl restart ntpd' (with 'ntpd_flags="-s" in /etc/rc.conf.local') so
that the guest's clock gets brought forward.
Are there other
17 matches
Mail list logo