Secure end points for Internet tunnel, the most secure hardware

2020-05-11 Thread info
Hi,

Please let me know, is it a good idea to use OpenBSD to connect to a remote LAN 
via SSH? Port forwarding is enough for me, though I can pass-through OpenVPN 
via SSH forward too.
SSH seems to me as the most secure channel compare to other software and it is 
easy to get it working.

I need a secure dedicated textual SSH console connected to Internet at home - 
Console1
and preferably a two ports router  on another end of the Internet line to 
accept my SSH connections - Router1.

What are the best methods to keep private keys in a safe place? I do not know 
anything better than devices like Nitrokey Pro, though some PCI card (secure 
java card) reader devices exist too.

Can OpenBSD use USB dongle (not a flash drive) Nitrokey Pro 2 to store SSH 
private keys BOTH on the server side and on the client side? One first dongle 
on the client and another second dongle on the server - two dongles in total :)

What is the most secure hardware (which was sold in public shops) for Console1 
and Router1 ?

Can you offer anything better than Cortex A7 board which is immune to Spectre?
What is the most secure Cortex A7 board on which OpenBSD can run? I guess it 
shall have as little BLOBs as possible - only a small Boot ROM like Beaglebone 
Black which unfortunately is not Cortex A7, but rather Cortex A8.




Trinity desktop environment

2020-05-11 Thread info
Is it possible to run TDE by trinitydesktop.org  on OpenBSD?
Or is it going to be possible in the future?



Re: Networking/pf question, I am not sure ?

2020-05-11 Thread man Chan
 


Here is all the config files of my openbsd-router.  traceroute yahoo.com.hk on 
my xperia (android) stop at ip of my openbsd-router.  There is nothing display 
on openbsd-router running tcpdump -eni pflog0.

dhclient.conf
append domain-name-servers 127.0.0.1;
==

dhcpd.conf-
#    $OpenBSD: dhcpd.conf,v 1.1 2014/07/11 21:20:10 deraadt Exp $
#
# DHCP server options.
# See dhcpd.conf(5) and dhcpd(8) for more information.
#

# Network:        192.168.1.0/255.255.255.0
# Domain name:        my.domain
# Name servers:        192.168.1.3 and 192.168.1.5
# Default router:    192.168.1.1
# Addresses:        192.168.1.32 - 192.168.1.127
#
option  domain-name "my.domain";
#option  domain-name-servers 192.168.1.3, 192.168.1.5;

subnet 192.168.1.0 netmask 255.255.255.0 {
    option routers 192.168.1.1;
    option domain-name-servers 192.168.1.1;

    range 192.168.1.32 192.168.1.127;
}

 ==
pf.conf --
# The wirde and wireless interface of the LAN
wired="re0"
#wifi=""

# This is a table of non-routable addresses that will be used later
table  { 0.0.0.0/8 10.0.0.0/8 127.0.0.0/8 169.254.0.0/16 \
           172.16.0.0/12 192.0.0.0/24 192.0.2.0/24 224.0.0.0/3    \
           192.168.0.0/16 192.18.0.0/15 198.51.100.0/24        \
           203.0.113.0/24 }

set block-policy drop
set loginterface egress
set skip on lo

# Normalize the traffic
match in all scrub (no-df random-id max-mss 1440)

# Perform NAT
match out on egress inet from !(egress:network) to any nat-to (egress:0)

block in quick on egress from  to any

block return out quick on egress from any to 

block all

pass out quick inet keep state

pass in on { $wired } inet

# Forward incoming connection ( on TCP port 40 and 443 ) to web server
#pass in on egress inet proto tcp from any to (egress) port { 80 443 } rdr-to 
192.168.1.2



resolv.conf--
# Generated by alc0 dhclient
nameserver 192.168.8.1
nameserver 127.0.0.1
lookup file bind


sysctl.conf-
net.inet.ip.forwarding=1
net.inet6.ip6.forwarding=1

=
unbound.conf  
server:
    interface: 192.168.1.1
    interface: 127.0.0.1
    interface: ::1

    access-control: 127.0.0.0/8 allow
    access-control: 10.0.0.0/24 allow
    access-control: 0.0.0.0/0 refuse
    access-control: ::0/0 refuse
    access-control: ::1 allow

    do-not-query-localhost: no
    hide-identity: yes
    hide-version: yes

forward-zone:
    name: "."
    forward-addr: 64.6.64.6        # Verisign 
    forward-addr: 94.75.228.29    # chaos Computer Club
    forward-first: yes        #try direct if forwarder fails


===
dmesg
OpenBSD 6.6-stable (GENERIC.MP) #1: Thu May  7 17:40:45 HKT 2020
    clare...@o66.my.domain:/usr/src/sys/arch/amd64/compile/GENERIC.MP
real mem = 6156845056 (5871MB)
avail mem = 5957545984 (5681MB)
mpath0 at root
scsibus0 at mpath0: 256 targets
mainbus0 at root
bios0 at mainbus0: SMBIOS rev. 2.6 @ 0xfbe20 (23 entries)
bios0: vendor American Megatrends Inc. version "P1.20" date 11/30/2012
bios0: ASRock 960GM-VGS3 FX
acpi0 at bios0: ACPI 1.0
acpi0: sleep states S0 S1 S3 S4 S5
acpi0: tables DSDT FACP APIC MCFG OEMB AAFT HPET SSDT
acpi0: wakeup devices PCE2(S4) PCE3(S4) PCE4(S4) PCE5(S4) PCE6(S4) PCE7(S4) 
PCE9(S4) PCEA(S4) PCEB(S4) PCEC(S4) SBAZ(S4) PS2K(S4) P0PC(S4) UHC1(S4) 
UHC2(S4) UHC3(S4) [...]
acpitimer0 at acpi0: 3579545 Hz, 32 bits
acpimadt0 at acpi0 addr 0xfee0: PC-AT compat
cpu0 at mainbus0: apid 0 (boot processor)
cpu0: AMD Athlon(tm) II X4 630 Processor, 2805.89 MHz, 10-05-02
cpu0: 
FPU,VME,DE,PSE,TSC,MSR,PAE,MCE,CX8,APIC,SEP,MTRR,PGE,MCA,CMOV,PAT,PSE36,CFLUSH,MMX,FXSR,SSE,SSE2,HTT,SSE3,MWAIT,CX16,POPCNT,NXE,MMXX,FFXSR,PAGE1GB,RDTSCP,LONG,3DNOW2,3DNOW,LAHF,CMPLEG,SVM,EAPICSP,AMCR8,ABM,SSE4A,MASSE,3DNOWP,OSVW,IBS,SKINIT,NODEID,ITSC
cpu0: 64KB 64b/line 2-way I-cache, 64KB 64b/line 2-way D-cache, 512KB 64b/line 
16-way L2 cache
cpu0: ITLB 32 4KB entries fully associative, 16 4MB entries fully associative
cpu0: DTLB 48 4KB entries fully associative, 48 4MB entries fully associative
cpu0: AMD erratum 721 detected and fixed
cpu0: smt 0, core 0, package 0
mtrr: Pentium Pro MTRR support, 8 var ranges, 88 fixed ranges
cpu0: apic clock running at 200MHz
cpu0: mwait min=64, max=64, IBE
cpu1 at mainbus0: apid 1 (application processor)
cpu1: AMD Athlon(tm) II X4 630 Processor, 2805.51 MHz, 10-05-02
cpu1: 
FPU,VME,DE,PSE,TSC,MSR,PAE,MCE,CX8,APIC,SEP,MTRR,PGE,MCA,CMOV,PAT,PSE36,CFLUSH,MMX,FXSR,SSE,SSE2,HTT,SSE3,MWAIT,CX16,POPCNT,NXE,MMXX,FFXSR,PAGE1GB,RDTSCP,LONG,3DNOW2,3DNOW,LAHF,CMPLEG,SVM,EAPICSP,AMCR8,ABM,SSE4A,MASSE,3DNOWP,OSVW,IBS,SKINIT,NODEID,ITSC
cpu1: 64KB 64b/line 2-way I-cache, 64KB 64b/line 2-way D-cache, 512KB 64b/line 
16-way L2 cache
cpu1: ITLB 32 4KB entries fully associative, 16 4MB entries fully associative
cpu1: DTLB 48 4KB en

Re: Networking/pf question, I am not sure ?

2020-05-11 Thread man Chan
 I find out the problem is in the unbound.conf file.  Now, my xeperia can use 
the internet.  Thanks you for your help..
Clarence



===original 
server:
    interface: 192.168.1.1
    interface: 127.0.0.1
    interface: ::1

    access-control: 127.0.0.0/8 allow
    access-control: 10.0.0.0/24 allow
    access-control: 0.0.0.0/0 refuse
    access-control: ::0/0 refuse
    access-control: ::1 allow

    do-not-query-localhost: no
    hide-identity: yes
    hide-version: yes

forward-zone:
    name: "."
    forward-addr: 64.6.64.6        # Verisign 
    forward-addr: 94.75.228.29    # chaos Computer Club
    forward-first: yes        #try direct if forwarder fails

==  changed unbound.conf===

server:
    interface: 192.168.1.1
    interface: 127.0.0.1
  
    access-control: 192.168.1.0/24 allow
    access-control: 127.0.0.0/8 allow
  
    do-not-query-localhost: no
    hide-identity: yes
    hide-version: yes

forward-zone:
    name: "."
    forward-addr: 64.6.64.6        # Verisign 
    forward-addr: 94.75.228.29    # chaos Computer Club
    forward-first: yes        #try direct if forwarder fails

==




man Chan () 在 2020年5月11日星期一 下午3:21:17 [GMT+8] 寫道:  
 
  


Here is all the config files of my openbsd-router.  traceroute yahoo.com.hk on 
my xperia (android) stop at ip of my openbsd-router.  There is nothing display 
on openbsd-router running tcpdump -eni pflog0.

dhclient.conf
append domain-name-servers 127.0.0.1;
==

dhcpd.conf-
#    $OpenBSD: dhcpd.conf,v 1.1 2014/07/11 21:20:10 deraadt Exp $
#
# DHCP server options.
# See dhcpd.conf(5) and dhcpd(8) for more information.
#

# Network:        192.168.1.0/255.255.255.0
# Domain name:        my.domain
# Name servers:        192.168.1.3 and 192.168.1.5
# Default router:    192.168.1.1
# Addresses:        192.168.1.32 - 192.168.1.127
#
option  domain-name "my.domain";
#option  domain-name-servers 192.168.1.3, 192.168.1.5;

subnet 192.168.1.0 netmask 255.255.255.0 {
    option routers 192.168.1.1;
    option domain-name-servers 192.168.1.1;

    range 192.168.1.32 192.168.1.127;
}

 ==
pf.conf --
# The wirde and wireless interface of the LAN
wired="re0"
#wifi=""

# This is a table of non-routable addresses that will be used later
table  { 0.0.0.0/8 10.0.0.0/8 127.0.0.0/8 169.254.0.0/16 \
           172.16.0.0/12 192.0.0.0/24 192.0.2.0/24 224.0.0.0/3    \
           192.168.0.0/16 192.18.0.0/15 198.51.100.0/24        \
           203.0.113.0/24 }

set block-policy drop
set loginterface egress
set skip on lo

# Normalize the traffic
match in all scrub (no-df random-id max-mss 1440)

# Perform NAT
match out on egress inet from !(egress:network) to any nat-to (egress:0)

block in quick on egress from  to any

block return out quick on egress from any to 

block all

pass out quick inet keep state

pass in on { $wired } inet

# Forward incoming connection ( on TCP port 40 and 443 ) to web server
#pass in on egress inet proto tcp from any to (egress) port { 80 443 } rdr-to 
192.168.1.2



resolv.conf--
# Generated by alc0 dhclient
nameserver 192.168.8.1
nameserver 127.0.0.1
lookup file bind


sysctl.conf-
net.inet.ip.forwarding=1
net.inet6.ip6.forwarding=1

=
unbound.conf  
server:
    interface: 192.168.1.1
    interface: 127.0.0.1
    interface: ::1

    access-control: 127.0.0.0/8 allow
    access-control: 10.0.0.0/24 allow
    access-control: 0.0.0.0/0 refuse
    access-control: ::0/0 refuse
    access-control: ::1 allow

    do-not-query-localhost: no
    hide-identity: yes
    hide-version: yes

forward-zone:
    name: "."
    forward-addr: 64.6.64.6        # Verisign 
    forward-addr: 94.75.228.29    # chaos Computer Club
    forward-first: yes        #try direct if forwarder fails


===
dmesg
OpenBSD 6.6-stable (GENERIC.MP) #1: Thu May  7 17:40:45 HKT 2020
    clare...@o66.my.domain:/usr/src/sys/arch/amd64/compile/GENERIC.MP
real mem = 6156845056 (5871MB)
avail mem = 5957545984 (5681MB)
mpath0 at root
scsibus0 at mpath0: 256 targets
mainbus0 at root
bios0 at mainbus0: SMBIOS rev. 2.6 @ 0xfbe20 (23 entries)
bios0: vendor American Megatrends Inc. version "P1.20" date 11/30/2012
bios0: ASRock 960GM-VGS3 FX
acpi0 at bios0: ACPI 1.0
acpi0: sleep states S0 S1 S3 S4 S5
acpi0: tables DSDT FACP APIC MCFG OEMB AAFT HPET SSDT
acpi0: wakeup devices PCE2(S4) PCE3(S4) PCE4(S4) PCE5(S4) PCE6(S4) PCE7(S4) 
PCE9(S4) PCEA(S4) PCEB(S4) PCEC(S4) SBAZ(S4) PS2K(S4) P0PC(S4) UHC1(S4) 
UHC2(S4) UHC3(S4) [...]
acpitimer0 at acpi0: 3579545 Hz, 32 bits
acpimadt0 at acpi0 addr 0xfee0: PC-AT compat
cpu0 at mainbus0: apid 0 (boot processor)
cpu0: AMD Athlon(tm) II X4 630 Processor, 2805.89 MHz, 10-05-02
cpu0:

Re: Trinity desktop environment

2020-05-11 Thread Chris Cappuccio
i...@aulix.com [i...@aulix.com] wrote:
> Is it possible to run TDE by trinitydesktop.org  on OpenBSD?
> Or is it going to be possible in the future?

You'd have to ask Trinity.

Trinity doesn't maintain their own compatibility for BSDs as a priority,
so it's not a trivial effort for an outsider.

That being said, the port and patches for KDE 3.5 in /usr/ports/x11/kde 
might be a good start if you wanted to make the effort yourself.



Re: OpenBSD insecurity rumors from isopenbsdsecu.re

2020-05-11 Thread Daniel Jakots
On Mon, 11 May 2020 17:27:24 +, slackwaree
 wrote:

> I wish if the someone who took the time to make this page at least
> would make an antisystemD page instead.

I doubt anyone asked you how they should spend their time.

>  Let's face it how much time that old fart linus has, maybe
> COVID takes him too.

Are you really saying you hope he dies?
What the fuck is wrong with you?

> I couldn't care less either, all I care is my
> BSD servers uptime 600+ days and not 1 day I worry about their
> security.

You are clearly clueless.


Please refrain from posting again such shitty emails.

Thanks,
Daniel



Re: @OpenBSD_src Twitter 140char limit?

2020-05-11 Thread Tommy Nevtelen

On 10/05/2020 23.30, Isak Holmström wrote:
> I do believe it's using the "new" limit introduced 2017 :)
>
> my $default_maxlen = 280;
>
> I found this on GitHub. Though there a reference in the code to 140.

Yes.. I might not have counted the characters actually used and assumed 
it was 140 since it says:


    "OpenBSD Commit messages in 140 characters or less. Just commits to 
the src module.

    For more see @OpenBSD_src"

--
TN




Re: OpenBSD insecurity rumors from isopenbsdsecu.re

2020-05-11 Thread info
There are already enough funny pages about systemd technical deviations, e.g.:

https://dev1galaxy.org/viewtopic.php?id=3427



Re: OpenBSD insecurity rumors from isopenbsdsecu.re

2020-05-11 Thread Kevin Chadwick
Here's a game.

Name as many operating systems as you can that encrypt the page file or swap
space by default?



Re: @OpenBSD_src Twitter 140char limit?

2020-05-11 Thread Stuart Henderson
On 2020-05-11, Tommy Nevtelen  wrote:
> On 10/05/2020 23.30, Isak Holmström wrote:
> > I do believe it's using the "new" limit introduced 2017 :)
> >
> > my $default_maxlen = 280;
> >
> > I found this on GitHub. Though there a reference in the code to 140.
>
> Yes.. I might not have counted the characters actually used and assumed 
> it was 140 since it says:

It definitely uses 280, check the tweets.




Mandate control in OpenBSD like SELinux or AppArmor

2020-05-11 Thread info
Please let me know, what are analogues of SELinux and AppArmor in OBSD ?



Re: @OpenBSD_src Twitter 140char limit?

2020-05-11 Thread Tommy Nevtelen

On 11/05/2020 21.23, Stuart Henderson wrote:

On 2020-05-11, Tommy Nevtelen  wrote:

On 10/05/2020 23.30, Isak Holmström wrote:

I do believe it's using the "new" limit introduced 2017 :)

my $default_maxlen = 280;

I found this on GitHub. Though there a reference in the code to 140.

Yes.. I might not have counted the characters actually used and assumed
it was 140 since it says:

It definitely uses 280, check the tweets.
Yes yes, that was what I meant. I did count them before I sent the last 
mail, but not the first one :)
So only an update to the description would be needed, just to make it 
correct.

--
TN




Re: Mandate control in OpenBSD like SELinux or AppArmor

2020-05-11 Thread Kevin Chadwick
On May 11, 2020 7:27:49 PM UTC, i...@aulix.com wrote:
>Please let me know, what are analogues of SELinux and AppArmor in OBSD
>

http://www.openbsd.org/mail.html

You are supposed to "do your homework" and try googling and searching the 
mailing list archive before asking questions. 

Clearly you have not, please do!



Re: change default constraint server in ntpd.conf

2020-05-11 Thread Marko Cupać

On 2020-05-08 00:17, Theo de Raadt wrote:

Theo de Raadt  wrote:
(...)

Stuart Henderson  wrote:
(...)


Dear Stuart, Theo,

thank you for insightful answers.

I admit my understanding of intricacies of ntp protocol equals zero - 
same as my current motivation to learn more about it. My need for 
accurate timekeeping on my OpenBSD firewalls is best described by the 
fact that I occasionally log into branch routers where I routinely 
discover their clock is off by >2 years because I forget to either start 
ntpd with default ntpd.conf in appropriate rdomain with Internet access, 
or to edit default ntpd.conf to point them to internal ntp server, also 
running on OpenBSD with default ntpd.conf. To my great joy, this never 
affects their main functionality of pushing packets between branch 
office and HQ in a way I consider secure enough.


My main motivation for asking this question on @misc was political, and 
went along the lines of "why send these ad-peddling, 
private-data-slurping clowns any packets?"


Thanks to your answers, I understand now there is more to it than "let's 
just put some website that is most likely to be there when we query it 
for constraints, and also promote it a bit while there".


Stay fresh,
--
Before enlightenment - chop wood, draw water.
After  enlightenment - chop wood, draw water.

Marko Cupać
https://www.mimar.rs/



discard me

2020-05-11 Thread Salvatore Cuzzilla
discard me



Re: OpenBSD insecurity rumors from isopenbsdsecu.re

2020-05-11 Thread Stuart Longland
On 11/5/20 5:00 am, i...@aulix.com wrote:
> Btw, does not it look like a PR competition of Linux from USA vs OpenBSD from 
> Canada/London?

Actually, I think you'll find both OSes have significant contributions
from all around the world.

Linux (which is a kernel, not an OS) originated from Finland.

BSD came from the US (University of California), but most of today's
implementations have been very significantly changed since then.

In any case, I don't think it's helpful to characterise an OS by its
country of origin.  Even less so, when it's an open-source OS with
contributions that are sourced globally.
-- 
Stuart Longland (aka Redhatter, VK4MSL)

I haven't lost my mind...
  ...it's backed up on a tape somewhere.

Help fund COVID-19 research:
https://stuartl.longlandclan.id.au/blog/2020/04/20/who-covid19/



Re: OpenBSD insecurity rumors from isopenbsdsecu.re

2020-05-11 Thread slackwaree
I wish if the someone who took the time to make this page at least would make 
an antisystemD page instead. This is just a pointless brainless monkey(s) 
wasting our time webpage, it is not even funny and we are passed April 1 a long 
time ago.

However I never knew linus said such things:

"I think the OpenBSD crowd is a bunch of masturbating monkeys"

I guess this is just another reason for ditching linux in favor of BSDs. Let's 
face it how much time that old fart linus has, maybe COVID takes him too. I 
couldn't care less either, all I care is my BSD servers uptime 600+ days and 
not 1 day I worry about their security.


Sent with ProtonMail Secure Email.

‐‐‐ Original Message ‐‐‐
On Thursday, May 7, 2020 4:00 PM,  wrote:

> Dear OpenBSD fans,
>
> Can you please comment negative appraisal from the following website:
>
> https://isopenbsdsecu.re/quotes/
>
> I did not want to hurt anyone, just looking for a secure OS and OpenBSD 
> looked very nice to me before I have found this website.
>
> Kind Regards




Re: OpenBSD insecurity rumors from isopenbsdsecu.re

2020-05-11 Thread Christian Weisgerber
On 2020-05-11, Stuart Longland  wrote:

> BSD came from the US (University of California), but most of today's
> implementations have been very significantly changed since then.

BSD built on top of AT&T UNIX, which came from Bell Labs in New Jersey.

-- 
Christian "naddy" Weisgerber  na...@mips.inka.de



Re: OpenBSD insecurity rumors from isopenbsdsecu.re

2020-05-11 Thread info
I was told on the chat that Linux GNU software has hardly visible NSA backdoors 
and IMHO most funding for Linux seems to be from USA ?

Only single Linus person alone is paid about 30 times more per year by Linux 
foundation than the whole OpenBSD foundation total fundraising goal, not sure 
if it is an indication of Linux be more corporation sponsored and oriented.Is 
not USA a beneficiary of big transnational corporation and capital?



Re: OpenBSD insecurity rumors from isopenbsdsecu.re

2020-05-11 Thread info
Is not a prohibition for USA citizens to work on OpenBSD cryptography software 
parts an indication of trust relationship between current OpenBSD and current 
USA?



Re: Mandate control in OpenBSD like SELinux or AppArmor

2020-05-11 Thread info
Good point, yesterday I found only:

https://www.osnews.com/story/18684/selinux-vs-openbsds-default-security/

According to which there was not a mandate control in OpenBSD 10 years ago 
while in FreeBSD it appeared and existed significantly earlier.



Re: OpenBSD insecurity rumors from isopenbsdsecu.re

2020-05-11 Thread Brian Waters
If any widely-used open source software had government backdoors in it, nobody 
in the know would be telling folks about it in random IRC chat rooms.



BW







 On Mon, 11 May 2020 18:13:35 -0700   wrote 


I was told on the chat that Linux GNU software has hardly visible NSA backdoors 
and IMHO most funding for Linux seems to be from USA ? 
 
Only single Linus person alone is paid about 30 times more per year by Linux 
foundation than the whole OpenBSD foundation total fundraising goal, not sure 
if it is an indication of Linux be more corporation sponsored and oriented.Is 
not USA a beneficiary of big transnational corporation and capital?


Re: OpenBSD insecurity rumors from isopenbsdsecu.re

2020-05-11 Thread info
> If any widely-used open source software had government backdoors in it, 
> nobody in the know would be telling folks about it in random IRC chat rooms.

I do not understand your argument, are you trolling to hide how actual things 
are going to?



Re: OpenBSD insecurity rumors from isopenbsdsecu.re

2020-05-11 Thread Philip Guenther
On Mon, May 11, 2020 at 4:28 PM  wrote:

> Is not a prohibition for USA citizens to work on OpenBSD cryptography
> software parts an indication of trust relationship between current OpenBSD
> and current USA?
>

I'm not sure what that sentence even means.  What would a "trust
relationship" between OpenBSD and "current USA" actually mean in terms of a
CHANGE IN BEHAVIOR?  Hell, what does "current USA" even _mean_?!?  Did you
mean to say "the US Federal Government"?  If so, what would "trust between
OpenBSD and the US Federal Government" actually mean in terms of a change
in behavior that you, i...@aulix.com, could actually detect?

And why would *you* care about those ways?  If you can't tell us why you
would care, how can we answer your _real_ question?

There is cryptographic software in OpenBSD that was developed in part by
someone who is/was a US citizen, in OpenSSH even, as a check of
copyright/license statements on source files show.  How does that change
your world view?


Philip Guenther


Re: Secure end points for Internet tunnel, the most secure hardware

2020-05-11 Thread Aaron Mason
On Mon, May 11, 2020 at 5:16 PM  wrote:
>
> Hi,

Hi!

>
> [SNIP]
>
> Can you offer anything better than Cortex A7 board which is immune to Spectre?
> What is the most secure Cortex A7 board on which OpenBSD can run? I guess it 
> shall have as little BLOBs as possible - only a small Boot ROM like 
> Beaglebone Black which unfortunately is not Cortex A7, but rather Cortex A8.
>

The Pine A64 (US$15 for the 512mb version or US$21 for the 1GB plus
version) and the Rock64 (US$24.95 for the 1GB version) that both use a
Cortex-A53 CPU that is immune to Spectre, can't speak to the
blobbiness, though.

-- 
Aaron Mason - Programmer, open source addict
I've taken my software vows - for beta or for worse



Re: OpenBSD insecurity rumors from isopenbsdsecu.re

2020-05-11 Thread info
> I'm not sure what that sentence even means. What would a "trust relationship" 
> between OpenBSD and "current USA" actually mean in terms of a CHANGE IN 
> BEHAVIOR?

"CHANGE IN BEHAVIOR" of whom or of what?

> Hell, what does "current USA" even _mean_?!? 
Very high activity of NSA to embed their backdoors eveywhere they can.

>Did you mean to say "the US Federal Government"? If so, what would "trust 
>between OpenBSD and the US Federal Government" actually mean in terms of a 
>change in behavior that you, i...@aulix.com, could actually detect?

How does it matter if I can detect something?

Do you mean i...@aulix.com is too Untermensch just to even wonder and ask such 
questions?

Can anyone detect this?

https://web.archive.org/web/20190624163342/https://www.rlighthouse.com/targeted-individuals.html

Does OpenBSD project according to:

https://web.archive.org/web/20200512025352/https://www.openbsd.org/crypto.html

prohibit american people to work on OpenBSD cryptography?


> 
> And why would *you* care about those ways? If you can't tell us why you would 
> care, how can we answer your _real_ question?

Treat it as my secret, I want and that is why I ask because I can, I wish you 
tell me the answer without a knowledge of "why I ask",
it is a very long discussion of answering by a question to question in your 
Jewish style, is not it?

> 
> There is cryptographic software in OpenBSD that was developed in part by 
> someone who is/was a US citizen, in OpenSSH even, as a check of 
> copyright/license statements on source files show. How does that change your 
> world view?

I told you not about the past, but about the CURRENT (TODAY not EARLIER) state 
of things, and OpenBSD ban on americans to work on its crypto, you see?



Re: Secure end points for Internet tunnel, the most secure hardware

2020-05-11 Thread info
Aaron, thank you for your suggestion. 

For now I prefer to try to use the oldest suitable hardware I can find, not 
sure if it is a good idea.

Please someone let me know if AllWinner SoC backdoor described at:

https://www.theregister.co.uk/2016/05/09/allwinners_allloser_custom_kernel_has_a_nasty_root_backdoor/

can be exploited in OpenBSD? 

Is it a bad idea to run a small communication server on a AllWinner A20 board 
like a Cubitruck if it works with OpenBSD (it is not on the list though). What 
about other compatible boards like AllWinner A10 Orange PI One?

I just want my DNS (local) and postfix, dovecot (Internet)  and SSH (local and 
Internet) work on it protected from hackers.



Re: Secure end points for Internet tunnel, the most secure hardware

2020-05-11 Thread info
> What about other compatible boards like AllWinner A10 Orange PI One?

Sorry for my mistake, Orange PI One is based on Cortex A7 AllWinner H3.



Re: OpenBSD insecurity rumors from isopenbsdsecu.re

2020-05-11 Thread Philip Guenther
On Mon, May 11, 2020 at 6:09 PM  wrote:
...

> > And why would *you* care about those ways? If you can't tell us why you
> would care, how can we answer your _real_ question?


> Treat it as my secret, I want and that is why I ask because I can, I wish
> you tell me the answer without a knowledge of "why I ask",
> it is a very long discussion of answering by a question to question in
> your Jewish style, is not it?
>

I considered treating your questions in good faith, but then you said
this.  If my questions have you spouting this nonrational drivel them you
should stay away from OpenBSD because I am a committer and if you can't
trust my questions then you shouldn't trust my code.




Philip Guenther


Re: OpenBSD insecurity rumors from isopenbsdsecu.re

2020-05-11 Thread info
It is IMHO rather not a matter of trusting your questions, but not my 
willingness to answer them right now, but I can answer them later if I want, it 
is not a matter of trust but rather a tactics of choosing a sequence of what to 
answer and when.

You know there is no a lot of secure enough alternatives to choose from except 
OpenBSD, and your commits alone shall not be of that a big problem and reason 
to reject OpenBSD since the code is being reviewed by other OpenBSD 
participants?

Do you think there are less committers like you in many many Linux  components 
like Linux kernel, AppArmor, a Linux distro and is there any other choice for 
me except OpenBSD and some type of a hardened Linux without systemd like Devuan 
or Alpine?

Is not it a childish behavior of yours that is if I do not follow your method 
of discussion then I shall not use your work, you ban me from allowed users at 
least mentally by your ultimatum not practically of course as you cannot 
prohibit me to use any open source products like OpenBSD or Linux distros.



Re: OpenBSD insecurity rumors from isopenbsdsecu.re

2020-05-11 Thread Louis Fredrickson
You are acting a fool.
If you admit to seeing how they eat their own dog food and the quality of
the project because of their own way, but only when it suits your internet
arguments, then you may as well just buy security from a big corporate
Linux.
It's not about $100 words hiding a children's tantrum after being told it's
up to you, it's about understanding that *it's up to you*.


On Tue, May 12, 2020, 4:20 PM  wrote:

> It is IMHO rather not a matter of trusting your questions, but not my
> willingness to answer them right now, but I can answer them later if I
> want, it is not a matter of trust but rather a tactics of choosing a
> sequence of what to answer and when.
>
> You know there is no a lot of secure enough alternatives to choose from
> except OpenBSD, and your commits alone shall not be of that a big problem
> and reason to reject OpenBSD since the code is being reviewed by other
> OpenBSD participants?
>
> Do you think there are less committers like you in many many Linux
> components like Linux kernel, AppArmor, a Linux distro and is there any
> other choice for me except OpenBSD and some type of a hardened Linux
> without systemd like Devuan or Alpine?
>
> Is not it a childish behavior of yours that is if I do not follow your
> method of discussion then I shall not use your work, you ban me from
> allowed users at least mentally by your ultimatum not practically of course
> as you cannot prohibit me to use any open source products like OpenBSD or
> Linux distros.
>
>


Re: OpenBSD insecurity rumors from isopenbsdsecu.re

2020-05-11 Thread info
I would prefer to begin from grsecurity, but it is not available up to date for 
my budget.

I would also try HardenedBSD, but it is only amd64 now? And how many active 
developers there are? one or two?

OpenBSD looks as the only viable option for me right now, may be one another is 
a systemd free distro like Devuan with a hardened kernel like by @anthrax, but 
I am too unskilled even to understand what are improvements of @anthrax kernel 
for me without a good doc for it in the existence, and on the other hand 
OpenBSD is famous with its very good documentation. 

I guess it is a huge work to harden Linux installation to a level compared to 
OpenBSD, there is some interesting work which is by Whonix but unfortunately 
with systemd, and it seems someone from that community is referring to 
isopenbsdsecu.re site, so it looks to me like a OpenBSD vs Whonix dispute, 
excuse me if I am wrong.



Re: OpenBSD insecurity rumors from isopenbsdsecu.re

2020-05-11 Thread Raul Miller
On Mon, May 11, 2020 at 9:17 PM  wrote:
> I was told on the chat that Linux GNU software has hardly visible NSA 
> backdoors and IMHO most funding for Linux seems to be from USA ?

This is beyond incompetent. You've got the wrong mailing list for this
kind of issue, you haven't identified the version with the problem,
you haven't even identified the problem.

All you are doing is citing vague rumor.

Why are you doing this?

-- 
Raul



Re: OpenBSD insecurity rumors from isopenbsdsecu.re

2020-05-11 Thread Anders Andersson
On Tue, May 12, 2020 at 7:19 AM  wrote:
>
> I would prefer to begin from grsecurity, but it is not available up to date 
> for my budget.
>
> I would also try HardenedBSD, but it is only amd64 now? And how many active 
> developers there are? one or two?
>
> OpenBSD looks as the only viable option for me right now, may be one another 
> is a systemd free distro like Devuan with a hardened kernel like by @anthrax, 
> but I am too unskilled even to understand what are improvements of @anthrax 
> kernel for me without a good doc for it in the existence, and on the other 
> hand OpenBSD is famous with its very good documentation.
>
> I guess it is a huge work to harden Linux installation to a level compared to 
> OpenBSD, there is some interesting work which is by Whonix but unfortunately 
> with systemd, and it seems someone from that community is referring to 
> isopenbsdsecu.re site, so it looks to me like a OpenBSD vs Whonix dispute, 
> excuse me if I am wrong.

You keep swallowing up buzzwords from completely random places without
taking the time to understand what everything means or how it affects
you.

There's no silver bullet. Figure out and enumerate *your* threat
model, then find a solution that you understand.



Re: OpenBSD insecurity rumors from isopenbsdsecu.re

2020-05-11 Thread info
There is a single place to take buzzwords from (not random as you said):

http://www.freezepage.com/1589263204VJFCCPNUBQ

https://hardenedbsd.org/content/easy-feature-comparison



Re: OpenBSD insecurity rumors from isopenbsdsecu.re

2020-05-11 Thread doug
 Original Message 
Subject: Re: OpenBSD insecurity rumors from isopenbsdsecu.re
From: i...@aulix.com
Date: Mon, May 11, 2020 9:18 pm
To: Philip Guenther 
Cc: OpenBSD misc 

It is IMHO rather not a matter of trusting your questions, but not my
willingness to answer them right now, but I can answer them later if I
want, it is not a matter of trust but rather a tactics of choosing a
sequence of what to answer and when.

You know there is no a lot of secure enough alternatives to choose from
except OpenBSD, and your commits alone shall not be of that a big problem
and reason to reject OpenBSD since the code is being reviewed by other
OpenBSD participants?

Do you think there are less committers like you in many many Linux
components like Linux kernel, AppArmor, a Linux distro and is there any
other choice for me except OpenBSD and some type of a hardened Linux
without systemd like Devuan or Alpine?

Is not it a childish behavior of yours that is if I do not follow your
method of discussion then I shall not use your work, you ban me from
allowed users at least mentally by your ultimatum not practically of
course as you cannot prohibit me to use any open source products like
OpenBSD or Linux distros.

**

To give a quick answer and to the point, when OpenBSD originally split
from NetBSD, cryptographic software with any part of it written by US
citizens could not be distributed outside the US without explicit
government approval and licensure. If any revisions are made by US
citizens, the entire code base would also be considered to prohibited to
anyone outside the US without explicit government approval.

If you want further details of the restrictions, lookup ITAR in your
favorite search engine. I do not choose to further test the patience of
most of the other users of the listserve, many of whom are already aware
of this.