information about what fail and how,
of course.
Some access points are just plain weird - in some cases I've had to play with
of all things mtu sizes (setting them to various values lower than the 1500
byte default) in order to successfully connect. Any quirks like those will
turn up as th
ut if there is, will you
realistically see any difference in performance (assuming this is about
shaving cycles off)?
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit
ing
the simpler WPA setups, ie
ifconfig athn0 up nwid foo wpakey foospresharedsecret
but there is a wpa-supplicant package available if you need it.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to
transfer files
(photos etc) from the device to my OpenBSD machines is to use an SFTP or
SCP client. I imagine there are several such applications available for
the ipad too.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/
ser
somewhere while doing the install could turn out to be very useful.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah s
l -wm jan 2016 January 2016 Mo Tu We Th Fr Sa
> Su 1 2 3 [53] 4 5 6 7 8 9 10 [ 1] 11 12 13 14 15 16 17 [ 2]
> 18 19 20 21 22 23 24 [ 3] 25 26 27 28 29 30 31 [ 4]
Ah, excellent!
cal -wm certainly covers almost all my week numbering needs :)
- --
Peter N. M. Hansteen, member
7;m not aware of (and of course there's
the Monday vs Sunday as week start day issue).
- - P
- --
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious
f each one. It's worth noting that tcpdump with the right
options is able to display information such as the packets's ToS and
which rule in the loaded PF rule set the packet matched.
If you run those tests properly and report your findings, I'm sure it
will be appreciated.
- --
Pet
:
> https://gist.github.com/anonymous/69e047797f696c1df8eaa0c82e39e01d
As in, is that a pf.conf for the thing that tries to run curl or is it
a separate system?
- --
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http
system, you should expect to spend significant time studying,
experimenting, making mistakes and fixing them.
> thanks for any reply.
I'm sure replies will be more constructive if you offer up some more
information about the actual problem.
- --
Peter N. M. Hansteen, member of t
e AND ps AND INCLUDE OUTPUT WHEN REPORTING THIS PANIC!"
If you had done that and reported the contents, that would have been a lot more
useful.
http://www.openbsd.org/report.html is a useful starting point. If you can get
the system
to boot somehow, sendbug(1) is your friend.
--
y be delivered anyway, but delivery would not happen immediatel
y.
The only advice I can offer is to check that your side has a
reasonable retry period (IIRC default setups for all the MTAs on
OpenBSD come with reasonable settings, but do check), and tell the
other side that for their own sake they n
wo-sentence description at sourceforge, it's possible you'd
be well served with bandwidth monitoring via symon and friends or by
setting up pflow and using one of the several netflow packages to
generate graphs and suchlike.
- --
Peter N. M. Hansteen, member of the first RFC 1149 implementa
t as the
domain
for their internal-but-occasionally-internet-visible machines comes to mind.
For a totally separate set of reasons, I was not compelled to stick around to
help them
sort out that particular mess.
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation t
no, what is the true story of BSD developers?
Others have already supplied references to useful literature. I would suggest
you
read those things. Several other useful references are just a simple web search
away.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementati
47:02 dhcrelay: send_packet: No buffer space available
I've seen that message only when a link or interface is down but for
some reason the machine still thinks that it's OK to route packets over
it anyway.
So I'd start with checking routing vs actually available links.
--
other solutions out there, possibly with more
sophisticated approaches than the ones I've mentioned here?
Good suggestions may merit a beverage of choice (within reason) at the first
possible opportunity.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http:/
agine you
could come fairly close to that regime with some state tracking and
overload tables trickery to match a finer-grained set of queues.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remem
oment, but do take a peek
at the relevant source files while preparing to measure anything).
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network tra
rved results /when one or more
queues approach a threshold that triggers shaping/.
If you can come up with measurements that show the mechanism is
defective, I'm sure a bug report would be appreciated.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
h
that comes out of packages (or ports) tends to land somewhere
under /usr/local, so the binaries you're looking for will likely be in
/usr/local/bin.
Other than that, pasting the error message (minus the hostname) into a
favorite search engine produces a number of potentially useful hints.
remains,
logging is essential to debugging, which is what the original poster needs to
do.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traf
xxx.xx.xx
int_net = "10.0.11.0/24"
block
match out on egress inet nat-to $ext_if
pass inet from $int_net
(hint: careful where you block and where you pass)
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ ht
userland side, the networking configuration will be changed to
> a slightly different approach, but I kind of suspended this until the
> previous issue is solved.
for the terminally curious among us, do you have a ballpark figure for when
it comes back in GENERIC? (as in, pre- or post-5
mage shows that the connection is in SYN state; I
> guess your client (10.0.11.19) just gets blocked when entering the
> firewall via de1.
This means that your client has a route for the target address that it
considers valid,
however in that state it has yet to receive *anything* back from t
some history) attached and at
http://www.bsdly.net/~peter/dmesg_elke_20160118.txt.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traff
erland out of sync" and a search on the obvious keywords (as in,
pasting the error message into a search engine) seems to confirm this.
Did you by any chance attempt an upgrade via source recently?
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.c
smtp
block return in quick from to any
The traffic matches the first quick rule here, and the blacklist
reference rule is never evaluated. Remove the 'quick's or move the
blacklist check to somewhere earlier in your config.
--
Peter N. M. Hansteen, member of the first RFC 1149
sets. I went to
> shell and the sets could inded be fetched with "ftp" program from
> that location. BTW ftp is also not offered, only disc and http.
were those files also visible by pointing a browser at http://10.0.0.1/5.8/i386
?
--
Peter N. M. Hanst
Give it a few hours and try again.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconnec
04 addr 2
vscsi0 at root
scsibus2 at vscsi0: 256 targets
softraid0 at root
scsibus3 at softraid0: 256 targets
root on sd1a (80f765a902e5ca12.a) swap on sd1b dump on sd1b
iwm0: hw rev 0x140, fw ver 25.228 (API ver 9), address a0:a8:cd:63:ab:b9
video0 at uvideo0
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.
t the sa-learn input directories usually
helps, and of course some version of throwing more or faster hardware at
the problem might also help.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"
can override the default flags by specifying a different set or even
'flags any' but the question remains, why?
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on a
re is much more likely to
be fully supported.
Now, as Jiri said already, what's the real problem you need help solving?
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set th
will you please do a bit of reading?
HTH, HAND
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147:
t least handles the
situation.
Go search the archives, nothing much has changed since the first time
this issue came up on misc. And I remember this actually being a topic
of one of Theo's presentations and possibly others. Seek and you shall find.
--
Peter N. M. Hansteen, member o
d to adjust some of the rather conservatively set resource limits upwards.
Some relevant, possiby suboptimal choices but of the WorkedForMe(TM) kind, see
http://home.nuug.no/~peter/transition/eurobsdcon2014/desktop.html and the
following slide.
--
Peter N. M. Hansteen, member of the first RFC 1
rting bugs, see http://www.openbsd.org/report.html
Good luck!
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spa
t of your self
preservation. If those derivative projects were run by people who didn't
see that fairly basic fact, that's their loss, not ours.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
hod and how you add entries to your blacklist would be
useful
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[299
ces such as phones and tablets run a unixish system
underneath the designed-for-one-finger interface. And for my own part,
getting any real work done requires a unix, whick in my case tends to
be OpenBSD unless something specific to the occasion trips me up.
- - Peter
- --
Peter N. M. Hansteen,
ed by sysmerge will be quicker and
easier, but in the general case, yes.
> 3. If one use a 5.8 snapshot (i.e [1] ), is it possible to apply updates
> for 5.8 *-stable* later?
No. As I said earlier (and would be clear from a careful reading of the FAQ),
snapshots track -current, not -stable.
-
spamdb corrupted, not that I've noticed. What are the symptoms more
specifically?
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
due to the 32bit queues.
Which version are you running now?
Peeking at /usr/src/sys/net/hfsc.{c,h} appears to indcate that hfsc
(which is what the 5.5 and later queues uses) has 64 bit values where
it counts.
- - Peter
- --
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
ht
go buy it, stick it in an OpenBSD
system
and see if it comes up as something useful. Check -current too. If it isn't
supported, consider tracking down a developer to send the part to.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogsp
symptoms, but there's no way anybody can
help you without some actual information on the configuration and
problem at hand.
- --
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the e
e code in
question can fill in some gaps.
- --
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.2
dresses in totally unrelated ranges, something like
the nospamd example in the spamd man page should do the trick. (I make my
nospamd
file available at http://www.bsdly.net/~peter/nospamd if you want to start from
a
working examplei in addition to the rules from the man page)
--
Peter N. M. Hanst
add those
ranges to a nospamd table. I think the spamd man page has a useful example.
In addition you can add hosts to the spamd whitelist using spamdb, ie
$ sudo spamdb -a nn.mm.xx.yy
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.
be /dev/fd0a but more likely the i
partition of some sd device or other)
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delila
/07/what-to-expect-in-openbsd-50-onwards.html
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.22
you at the best
moment in the relese cycle. Just wait until CD set preorders open, and hope
yours arrive early.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evi
7, there is no other
option than wait until CD preorders
open and be quick about ordering, as far as anybody knows preorders are served
on a first come, first served basis.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdl
t the paper is still a very good read.
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.
e are FAQ-style (or ugh, HOWTO-style) documents out there that still
mention manual conversion of your passphrase via wpa-psk as a viable option,
please to everybody a favor and contact their authors to either update or
remove.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation
ybe it was a temporary network glitch?
>
> : http://ftp5.eu.openbsd.org/ftp/pub/OpenBSD/snapshots/packages/amd64/
> is empty
amd64 packages on i386 is not supported. perhaps pkg_add is simply keeping
you from wrecking your configuration?
--
Peter N. M. Hansteen, member of the
into the new system, and likely
other
nits I may possibly address in the near future).
- Peter
[1] http://bsdly.blogspot.no/2012/07/keeping-your-openbsd-system-in-trim.html
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.
d0 through
whatever), but if you're on i386, you may see them turn up as wd-something (wd0
through
whatever), while your USB drive still most likely turns up as sd0
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.
ck).
IIRC it's choose disk, choose not mounted, then choose device. The
installer will do the magic without you needing to escape to a shell.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
&q
.
The idea (which I think is also in the changelogs somewhere) was that PF
is enabled by default, and tcpwrappers doesn't do anything that's not
easily done with PF rules.
So the short answer is: Implement what you used to do with tcpwrappers as rules
in your pf.conf.
- Peter
--
Pet
operate this time around, unfortunately. OTOH, I tweeted the link.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
de
r subject doesn't give me current laptops at all,
but turns up a wifi adapter:
http://www.cellularfactory.com/laptop/HP/4/50244/329533/
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"
-3rd-edition-is-here.html).
Now how much higher can we push this year's total?
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network tra
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.
are or firmware
bugs are what's tripping you up.
How far did you install proceed before you pushed the reset button?
Have you tried attaching the disk to a different machine?
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.
.
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.
hat does not let it boot easily.
But once again, your best option right now is to look up the install
part of the FAQ, get hold of a valid install medium that include the
install sets (both CD images and USB thumbdrive images are available)
and go from there.
--
Peter N. M. Hansteen, member of
e problem, you need to look at the contortions taken at eg
http://www.openbsd.org/faq/pf/rdr.html#reflect
Also a variation at http://home.nuug.no/~peter/pf/newest/rdr2servers.html and
the slides immediately following.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation
update after running quite a few hours on the 2014-11-22T2243 snapshot
and relatively infrequent drops in connectivity, a panic (transcribed,
with some interactivity):
kernel: page fault trap, code=0
Stopped at rt_missmsg+0x7f:movzwl 0xb0(%r15),%eax
ddb{0}> trace
rtmissmsg() at rt_mi
More data on the USB problems - on the most recent snapshot,
apparently only one of two USB ports work (dmesg has "uhub0: device
problem, disabling port 1"), but attaching the urtwn dongle does work,
and when the connection drops, so far 4 out of 5 times just doing a
"sudo sh /etc/netstart urtwn0"
when the device
does work, its throughput is significantly worse than earlier (guesstimate 10%
of previous throughput
although pinging the gateway yields wildly fluctuating round trip times).
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blo
ached.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 secon
les where you add
other state options (such as state tracking). If you have rules with
specific state options, check that you have the pflow option in there
too. It's by no means certain that this is your problem, rather
something to check and if needed eliminate.
- Peter
--
Peter N. M. Hanst
foundation instead, equal to
their highest bid.
Thank you all for your kind support, it has been good fun.
All the best,
Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evi
pe...@bsdly.net (Peter N. M. Hansteen) writes:
> It's that scribe from the fjords again. Today I took delivery of my
> The Book of PF 3rd edition author copies, and I blogged about it:
> http://bsdly.blogspot.no/2014/10/the-book-of-pf-3rd-edition-is-here.html
On OpenBSD 5.6 releas
in the default install.
Congratulations on yet another excellent release!
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
del
the network directly connected to the internal-facing interface.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.
ot to be the successful one, please make
the amount of your highest bid a direct donation to OpenBSD instead.
Even if you wouldn't consider bidding, go on, head over to
http://www.openbsd.org/orders.html or http://www.openbsd.org/donations.html
and spend some money!
- Peter
--
Peter N. M.
I've
encountered.
If you do not win this auction, I strongly urge you to donate the
amount of your highest bid to the OpenBSD Foundation.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember
will update as soon as I
have useful information on this.
In the meantime, if you want to donate, please go ahead. Donating will
however not influence your chance of owning the first signed copy of
The Book of PF, 3rd edition
All the best,
Peter
--
Peter N. M. Hansteen, member of the
auctioning off the first author signed copy to whoever makes the
most generous online donation between now and November 25th. The
Foundation picks the winner, I send the book to their stated mailing
address. More details in the blog post.
Have a nice weekend, then donate, donate donate!
- Peter
-
you'll get the idea.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.
s near impossible to debug your
problem. But on any recent OpenBSD you can improve your debugging
capability sighificantly by using log (matches) to track exactly what
rules are in fact matched by a specific connection.
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
ht
~peter/pf/ for the tutorial, with the latest
version of the slides, updated as per the latest conference or other
event at http://home.nuug.no/~peter/pf/newest/. The book (now in its
third edition) is available via http://www.nostarch.com/pf3 and better
bookstores.
- Peter
--
Peter N. M. Hansteen,
pass inet from 127.0.0.1 to any flags S/SA
pass inet from 192.168.1.144 to any flags S/SA
now change the final line to read
pass from (self)
and you get
$ sudo pfctl -vnf pfmyself
table persist counters { ::1 fe80::1 127.0.0.1 192.168.1.144 }
block drop all
pass from (self) to any flags S/SA
-
/students/google-travel-and-conference-grants/#!europe
[3]
http://2014.eurobsdcon.org/sponsors/google-emea-women-in-tech-conference-and-travel-grants-for-female-computer-scientists/
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net
f the EuroBSDCon 2014 program committee
Peter N. M. Hansteen
On Mon, Aug 11, 2014 at 09:02:29AM +0200, Gustav Fransson Nyvell wrote:
> Good thing OpenBSD didn't go down the multiple versions path.
does the word 'dependencies' ring a bell?
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.
each the
organizers at oc-2014 (at) eurobsdcon (dot) org.
Join us in September in Sofia!
On behalf of the EuroBSDCon 2014 organizers,
Peter N. M. Hansteen
.
And if the hard disks are small enough, you can attach them to pigeons, or
swallows, even! (African or European)
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit o
0x003c: Interrupt Pin: 01 Line: 0a Min Gnt: 00 Max Lat: 00
0x0040: Capability 0x01: Power Management
0x0050: Capability 0x05: Message Signaled Interrupts (MSI)
0x0070: Capability 0x10: PCI Express
Link Speed: 2.5 / 2.5 GT/s Link Width: x1 / x1
0x00b0:
oblem also happens with freebsd 10.
Are you saying here that the exact same hardware works with linux, but gets
a 'no carrier' with OpenBSD and FreeBSD? Is it possible to try booting with
Linux again (a live cd will do) and check link status?
- Peter
--
Peter N. M. Hansteen, member
ets is in fact
smaller today after the comp set got pruned for a bit of old cruft).
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network tra
.
Yes, I should make that clearer in the slide and when I get enough
round tuits, the wip article.
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious netwo
MMW'.
http://home.nuug.no/~peter/transition/bsdcan2014/desktop.html and the
following slide has the meat, such as it is.
There's more work to be done for any 'OpenBSD as the ultimate desktop'
article, though.
- Peter
--
Peter N. M. Hansteen, member of the first RF
and everybody else to contribute.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.
s inet proto tcp from to port { smtp
smtps 587 \
imap imaps pop3 pop3s } nat-to $natto_addr
as always, a pfctl -vnf on the config file would show all these things expanded
(yes,
I've been bit by the exact same round-robin problem myself)
- Peter
--
Peter N. M. Hansteen, member of the first R
EuroBSDcon 2014: September 25-28 in Sofia, Bulgaria
EuroBSDcon is the European technical conference for users and developers of
BSD-based systems. The conference will take place September 25 to 28 at
InterExpo Congress Center in Sofia (see http://iec.bg/en/). Tutorials will be
held on thursday
something like this on boxes I upgrade, from
the directory with the updated sets:
$ sudo sysmerge -s etcNM.tgz -x xetcNM.tgz
where 'NM' would have been '55' for the last few weeks on boxes
running snapshots.
- Peter
--
Peter N. M. Hansteen, member of the first RFC 1149 imple
. Queues serve to slice up your bandwidth
into known-sized chunks (which may be flexible, hfsc-style), while
priorities play within whatever limits are in place. You can get
rather close to the queues with fixed priorities scheme by using both
set queue and set prio in the same match or pass rule.
301 - 400 of 974 matches
Mail list logo