Re: no flows with my iked vpn

2020-02-13 Thread Antonino Sidoti
Hi, I think you need to look at the PF configuration on your setup. My configuration is as follows, (Not my full pf.conf) # Allow iked pass in quick log on egress proto esp from any to egress label "IKED-ESP" pass in quick log on egress proto udp from any to egress port $iked_ports label

Re: Replace PF rule + inetd Proxy with 2 PF rules

2020-02-13 Thread Nick Gustas
Hi Fabio, I believe this will do what you want, seemed to work in quick testing here, adjust to suit your environment. match in on $ext_if proto tcp from to ($ext_if) port 25 rdr-to 200.200.200.200 port match out on $ext_if proto tcp to 200.200.200.200 port received-on $ext_if

Re: Unable to kill a python process

2020-02-13 Thread 陈贤文
Dear Ingo, On 2/13/20, Ingo Schwarze wrote: > (Unless you pierce its heart with a woodden stick. Sorry, now i was >$ kill -CONT 39747 Thank you for showing me the wooden stick! It worked! Yours sincerely, Xianwen

Re: Unable to kill a python process

2020-02-13 Thread Ingo Schwarze
Hi, Xianwen Chen wrote on Thu, Feb 13, 2020 at 09:31:45PM +: > Maurice wrote: >> you could try kill -1 8926 > Thank you. I just tried it. It did not kill the process. Small wonder, you already already dropped a nuke on it (-9 = -KILL) and even that didn't make the zombie go away. You

Re: Unable to kill a python process

2020-02-13 Thread 陈贤文
Dear Maurice, > you could try kill -1 8926 Thank you. I just tried it. It did not kill the process. Yours sincerely, Xianwen

Re: Unable to kill a python process

2020-02-13 Thread Ingo Schwarze
Hi, Xianwen Chen wrote on Thu, Feb 13, 2020 at 08:10:17PM +: > I am not able to kill a python process. > $ pgrep python > showed a PID of 8926 > However, I am not able to kill the process. > $ kill -9 8926 > # kill -9 8926 > Running as root did not help. Sounds like a zombie. Seriously,

Re: Unable to kill a python process

2020-02-13 Thread Maurice McCarthy
you could try kill -1 8926

Unable to kill a python process

2020-02-13 Thread 陈贤文
Dear OpenBSD users, I am not able to kill a python process. $ pgrep python showed a PID of 8926 However, I am not able to kill the process. $ kill -9 8926 # kill -9 8926 Running as root did not help. How can I kill this process? Yours sincerely, Xianwen

Replace PF rule + inetd Proxy with 2 PF rules

2020-02-13 Thread Fabio Martins
Hi, I am trying to redirect + NAT incoming packets without the need of a TCP Proxy. Currently I have the following setup to redirect hosts abusing SMTP to an email trap: inetd listening in 127.0.0.1:8000 and redirecting to an external host # inetd.conf 127.0.0.1:8000 stream tcp nowait

Re: Full disk encryption including /boot, excluding bootloader?

2020-02-13 Thread no@s...@mgedv.net
> > On Linux you can do the following: > > { [1MB unencrypted GRUB bootloader partition] [Rest of hard drive entirely encrypted] } ... which i would consider to be as insecure, as unencrypted root at all. maybe check out https://wiki.osdev.org, they have nice articles on this. IMHO a secure boot

Re: Full disk encryption including /boot, excluding bootloader?

2020-02-13 Thread chohag
cipher-hea...@riseup.net writes: > > On Linux you can do the following: > > Hard drive: > { [1MB unencrypted GRUB bootloader partition] [Rest of hard drive entirely > encrypted] } > > Then the only parts of the (x64) computer that are unencrypted are the BIOS > and GRUB. This is how it already

Re: Packages for 6.6 mips64el missing from cdn.openbsd.org

2020-02-13 Thread Stuart Henderson
On 2020-02-12, Xiyue Deng wrote: > --=-=-= > Content-Type: text/plain > > Xiyue Deng writes: > >> Hi, >> >> It looks like cdn.openbsd.org[1] doesn't sync the 6.6 packages for mips64el >> from ftp.openbsd.org[2]. >> >> [1] http://cdn.openbsd.org/pub/OpenBSD/6.6/packages/ >> [2]

Re: no flows with my iked vpn

2020-02-13 Thread Shadrock Uhuru
On 13.02.2020 08:43, Robert Paschedag wrote: sent from my mobile device Am 12. Februar 2020 15:07:46 schrieb Shadrock Uhuru : hi everyone i have setup iked on my firewall and laptop as a roadwarrior setup following https://www.openbsd.org/faq/faq17.html i.ve tested from within the local

Re: Full disk encryption including /boot, excluding bootloader?

2020-02-13 Thread Otto Moerbeek
On Thu, Feb 13, 2020 at 10:31:30AM +, cipher-hea...@riseup.net wrote: > > On Linux you can do the following: > > Hard drive: > { [1MB unencrypted GRUB bootloader partition] [Rest of hard drive entirely > encrypted] } > > Then the only parts of the (x64) computer that are unencrypted are

Full disk encryption including /boot, excluding bootloader?

2020-02-13 Thread cipher-hearts
On Linux you can do the following: Hard drive: { [1MB unencrypted GRUB bootloader partition] [Rest of hard drive entirely encrypted] } Then the only parts of the (x64) computer that are unencrypted are the BIOS and GRUB. You can then move the GRUB offline if you wish, execute it externally.

Re: Setting clock on resumed OpenBSD guest (VMware host)

2020-02-13 Thread Otto Moerbeek
On Thu, Feb 13, 2020 at 09:05:19AM +0100, Tor Houghton wrote: > Hello, > > At present I am running a small python script that tails /var/log/messages > and looks for '/bsd: VMware guest resuming from suspended state', executes > 'doas rcctl restart ntpd' (with 'ntpd_flags="-s" in

Setting clock on resumed OpenBSD guest (VMware host)

2020-02-13 Thread Tor Houghton
Hello, At present I am running a small python script that tails /var/log/messages and looks for '/bsd: VMware guest resuming from suspended state', executes 'doas rcctl restart ntpd' (with 'ntpd_flags="-s" in /etc/rc.conf.local') so that the guest's clock gets brought forward. Are there other