Re: can't recognize my cdrom, here is my dmesg

2005-09-23 Thread Siju George
On 9/23/05, Csaba Nemes [EMAIL PROTECTED] wrote:
 Hi all

 it boots from an unofficial cdrom, but it doesn't find my cdrom
 here is my dmesg:


Booting is done by the BIOS and once the OS comes up if you need to
use the CDROM your operating system should support it. (If you have
installed MS windows earlier you would have seen after booting the
installer copies all the instalation files into the hard disk before
starting installation to avoid such issues)

Stating your CDROM model would help others to help you with the issue.
Also you could try changing the channel in which your CDROM is
connected. Not sure if this would help but it works at times.

Kind Regards

Siju



Re: Portmap non-local set / unset attempt

2005-09-23 Thread jimmy
Quoting Clint M. Sand [EMAIL PROTECTED]:

 On Thu, Sep 22, 2005 at 07:09:12PM -0600, Theo de Raadt wrote:
People keep yammering this bullshit about Security is a process.
Bullshit!  Lies!  It's about paying attention to the frigging details
when they are right in front of your face.  And it is very clear other
vendors do not pay attention to the details, considering the work I
did here was talked about all over BUGTRAQ back in that month.  No
wonder these vendors and their blogboys have to have this Security is
a process mantra to protect themselves from looking bad.
   
  
  
   Security is a process is intended to mean 2 things. One is that the
   idea that you can set and forget anything and think it's somehow
   secure is a joke. To secure a network includes at a minimum, keeping
   up with vendor patches for example. Processes like patch management help
   keep systems secure. It does not say Security is ONLY a process.
  
   Secondly, it is meant to refute the moronic idea that some admins seem
   to have is that buying any product makes you secure. Prevelant is the
   idea for example that if you have a firewall then you are now secure.
   Or, I have Norton AntiVirus so now my PC is secured.
 
  No, no no.
 
  You are playing the same semantic games that avoid responsibility at
  the ENGINEERING and PRODUCT DEVELOPMENT STAGES.
 
  It's so very very Microsoft.
 
  Just like the air-conditioning technicians I keep firing because they
  can't read schematics and charts.
 
  Which is why I now know MORE about air-conditioners than most of the
  technicians who come here.
 
  The phrase, and everything you said, is all excuses for the vendors.
 
  It IS POSSIBLE to set something up and have it be secure and NOT TOUCH
  IT, because many people have OpenBSD machines running older releases
  running without any modification for YEARS now, RISK FREE, without
  having to update ANY THING.

 No, you can put an openbsd box up and leave it for years with root login
 enabled and password for a password. It takes more than correct code.
 It's correct code plus correct usage. I think the GOBBLES sshd exploit
 is proof enough that set and forget is not risk free.

 Security is everything you've ever said, plus a process.



If it is secure, it doesn't need a process. So why would security be a
process again? Because of the vendors making mistakes and fix it later?

Jimmy Scott


This message has been sent through ihosting.be
To report spamming or other unaccepted behavior
by a iHosting customer, please send a message 
to [EMAIL PROTECTED]




Re: Portmap non-local set / unset attempt

2005-09-23 Thread Martin Schröder
On 2005-09-23 00:05:14 -0700, Wolfgang S. Rupprecht wrote:
 appreciable added risk.  The only loose end is that sshd doesn't
 currently log the RSA/DSA key that is used to gain access.  Ideally it

Hu? Try 
LogLevel VERBOSE

Best
Martin
-- 
http://www.tm.oneiros.de



Re: Portmap non-local set / unset attempt

2005-09-23 Thread Szechuan Death

[EMAIL PROTECTED] wrote:


Security is everything you've ever said, plus a process.


If it is secure, it doesn't need a process. So why would security be a
process again? Because of the vendors making mistakes and fix it later?

Jimmy Scott


It is a process in the same way that making toast is a process.
The purchase of a bread-crisping solution that is UL-certified to not
set your house on fire is the contribution of the engineering and
product development stages.  In common usage, using this solution
to toast your morning snack will produce crispy bread and will not
produce a howling conflagration.  However, note that it is still very
much possible to ignite your domicile by soaking a rag in lighter fluid,
stuffing it into the bread-toasting slot, and jamming the switch closed
with a butter knife.  For a less extreme example, it _may_ be possible
to cause a fire by leaving a towel too near the toaster while it is
operating, something which is easy to do and all too common.

Having a morning snack and an un-burnt house at the same time, then, is
contingent upon two things - possessing a toaster of adequate quality,
and using it properly.  You don't get to have the whole package without
a) looking for a good toaster in the first place, and b) learning how
to use it.  Security operates similarly:  one boner mistake on anybody's
part - coder, engineer or administrator - and your security vaporizes
_instantly_.  Go read some of Bruce Schneier's screeds on the subject,
they're informative.

So yes, security most certainly _is_ partly a process, various
opinions to the contrary notwithstanding.  It is identical to the
process of locking your doors and checking your windows before you
go to bed at night, or of making sure that you're not stuffing a paper
towel or a cardboard box top in your toaster in the morning before
you've had coffee.  You could call it habitual prudence, I suppose.

Of course, computers being based on hard-core determinism and Boolean
logic, a higher standard is possible.  I note in passing that the
security of every operating system in common use (including OpenBSD) is
_unproven_ [1], with the possible exception of Coyotos.  Asserting
something that is unproven and which may actually be impossible to prove
(X is more secure than Y) is not a good idea.  In other words, don't
toss shit at the vendors unless you can _prove_, from a chain of
irrefutable deduction, that your proposed solution is more secure than
theirs.  (Something which is likely impossible, due to OpenBSD's design
and the language in which it is written.)  Hint:  the manpower,
brainpower, and computing power needed to accomplish this task _even if_
it is possible is probably going to exceed anything you're willing to
marshal to that end.

Theo is right about one thing, however:  Bugs and security flaws arise
from mistakes, every one of which is avoidable.  There are no new
classes of bugs or design flaws, essentially every one has been
generally known of and understood for decades.  It is only sloppy
practices - dare I say it, bad processes - that permit these bugs
to creep into various codebases and multiply.  The cure for this
problem is better processes.  The easy cure is for these processes
to entail continuous auditing (the OBSD solution).  The harder cure
is to work on establishing and maintaining a process that incorporates
rigorous proof as a necessary component.  We may not ever see that, but
hey - it's nice to dream, isn't it?

--
(c) 2005 Unscathed Haze via Central Plexus [EMAIL PROTECTED]
I am Chaos.  I am alive, and I tell you that you are Free.  -Eris
Big Brother is watching you.  Learn to become Invisible.
| Your message must be this wide to ride the Internet. |

[1]  Rigorous proof, that is.  Anecdotal evidence does not establish
proof of anything whatsoever.



RE: Re: Portmap non-local set / unset attempt

2005-09-23 Thread tony
Making is a process.
Toast is not a process.

- --- Original Message --- -
From: [EMAIL PROTECTED]
To: misc@openbsd.org
Sent: Fri, 23 Sep 2005 02:30:10

[EMAIL PROTECTED] wrote:

 Security is everything you've ever said, plus a
process.
 
 If it is secure, it doesn't need a process. So
why would security be a
 process again? Because of the vendors making
mistakes and fix it later?
 
 Jimmy Scott

It is a process in the same way that making
toast is a process.
The purchase of a bread-crisping solution that is
UL-certified to not
set your house on fire is the contribution of the
engineering and
product development stages.  In common usage,
using this solution
to toast your morning snack will produce crispy
bread and will not
produce a howling conflagration.  However, note
that it is still very
much possible to ignite your domicile by soaking a
rag in lighter fluid,
stuffing it into the bread-toasting slot, and
jamming the switch closed
with a butter knife.  For a less extreme example,
it _may_ be possible
to cause a fire by leaving a towel too near the
toaster while it is
operating, something which is easy to do and all
too common.

Having a morning snack and an un-burnt house at the
same time, then, is
contingent upon two things - possessing a toaster
of adequate quality,
and using it properly.  You don't get to have the
whole package without
a) looking for a good toaster in the first place,
and b) learning how
to use it.  Security operates similarly:  one boner
mistake on anybody's
part - coder, engineer or administrator - and your
security vaporizes
_instantly_.  Go read some of Bruce Schneier's
screeds on the subject,
they're informative.

So yes, security most certainly _is_ partly a
process, various
opinions to the contrary notwithstanding.  It is
identical to the
process of locking your doors and checking your
windows before you
go to bed at night, or of making sure that you're
not stuffing a paper
towel or a cardboard box top in your toaster in the
morning before
you've had coffee.  You could call it habitual
prudence, I suppose.

Of course, computers being based on hard-core
determinism and Boolean
logic, a higher standard is possible.  I note in
passing that the
security of every operating system in common use
(including OpenBSD) is
_unproven_ [1], with the possible exception of
Coyotos.  Asserting
something that is unproven and which may actually
be impossible to prove
(X is more secure than Y) is not a good idea.  In
other words, don't
toss shit at the vendors unless you can _prove_,
from a chain of
irrefutable deduction, that your proposed solution
is more secure than
theirs.  (Something which is likely impossible, due
to OpenBSD's design
and the language in which it is written.)  Hint: 
the manpower,
brainpower, and computing power needed to
accomplish this task _even if_
it is possible is probably going to exceed anything
you're willing to
marshal to that end.

Theo is right about one thing, however:  Bugs and
security flaws arise
from mistakes, every one of which is avoidable. 
There are no new
classes of bugs or design flaws, essentially every
one has been
generally known of and understood for decades.  It
is only sloppy
practices - dare I say it, bad processes - that
permit these bugs
to creep into various codebases and multiply.  The
cure for this
problem is better processes.  The easy cure is
for these processes
to entail continuous auditing (the OBSD solution). 
The harder cure
is to work on establishing and maintaining a
process that incorporates
rigorous proof as a necessary component.  We may
not ever see that, but
hey - it's nice to dream, isn't it?

-- 
(c) 2005 Unscathed Haze via Central Plexus
[EMAIL PROTECTED]
I am Chaos.  I am alive, and I tell you that you
are Free.  -Eris
Big Brother is watching you.  Learn to become
Invisible.
| Your message must be this wide to ride
the Internet. |

[1]  Rigorous proof, that is.  Anecdotal evidence
does not establish
proof of anything whatsoever.



em/carp switches slower than fxp/carp

2005-09-23 Thread Stephan A. Rickauer

Hello,

is there any known problem related to em interfaces and carp? They take 
25 seconds longer to switch status from master to backup compared to an 
fxp one ...


Output of 'while true; do date; ifconfig| grep carp:; sleep 1;done' 
while rebooting the master (=advskew 50):


Fri Sep 23 14:25:16 CEST 2005
carp: MASTER carpdev em0 vhid 1 advbase 1 advskew 100
carp: MASTER carpdev em1 vhid 2 advbase 1 advskew 100
carp: MASTER carpdev fxp0 vhid 3 advbase 1 advskew 100
Fri Sep 23 14:25:17 CEST 2005
carp: MASTER carpdev em0 vhid 1 advbase 1 advskew 100
carp: MASTER carpdev em1 vhid 2 advbase 1 advskew 100
carp: BACKUP carpdev fxp0 vhid 3 advbase 1 advskew 100
.
.
.

Fri Sep 23 14:25:43 CEST 2005
carp: MASTER carpdev em0 vhid 1 advbase 1 advskew 100
carp: MASTER carpdev em1 vhid 2 advbase 1 advskew 100
carp: BACKUP carpdev fxp0 vhid 3 advbase 1 advskew 100
Fri Sep 23 14:25:44 CEST 2005
carp: BACKUP carpdev em0 vhid 1 advbase 1 advskew 100
carp: BACKUP carpdev em1 vhid 2 advbase 1 advskew 100
carp: BACKUP carpdev fxp0 vhid 3 advbase 1 advskew 100

Any ideas? Thanks!

--

 Stephan A. Rickauer

 
 Institut f|r Neuroinformatik
 Universitdt / ETH Z|rich
 Winterthurerstriasse 190
 CH-8057 Z|rich

 Tel: +41 44 635 30 50
 Sek: +41 44 635 30 52
 Fax: +41 44 635 30 53

 http://www.ini.ethz.ch
 



Clamav problem

2005-09-23 Thread Cristian Del Carlo
Hi list,
I have a odd problem with clamav.

I am following the openbsd 3.7 (release + fix) and i have  clamav-0.86.2p0, 
smtp-vilter and sendmail.
When  a mail with a zip attachment  arrives sometime i have the following 
message in /var/log/maillog :
Milter: data, reject=451 4.3.2 Please try again later

I have this problem ONLY with some zip attachments. 

Does anyone know how to solve this problem?
I have tried to install clamav ( and his dependences ) from packages but the 
problem isn't fix.

Thanks,

Cristian Del Carlo



Re: MegaRAID SCSI 320-1

2005-09-23 Thread alexyklee
I checked OpenBSD/i386, saw MegaRAID 320 was supported.

I intend to get a MegaRAID SCSI 320-1 Kit(3201064KIT) - per LSI LOGIC catalog. 
Supported by 3.7 stable ?

Thanks.



Re: em/carp switches slower than fxp/carp

2005-09-23 Thread Bill Marquette
Any chance the em's are on a switch doing spanning tree?  Or that the
fxp port (on the master is set to port fast)?  Sounds like STP locking
out the em ports on the master to me.

--Bill

On 9/23/05, Stephan A. Rickauer [EMAIL PROTECTED] wrote:
 Hello,

 is there any known problem related to em interfaces and carp? They take
 25 seconds longer to switch status from master to backup compared to an
 fxp one ...

 Output of 'while true; do date; ifconfig| grep carp:; sleep 1;done'
 while rebooting the master (=advskew 50):

 Fri Sep 23 14:25:16 CEST 2005
  carp: MASTER carpdev em0 vhid 1 advbase 1 advskew 100
  carp: MASTER carpdev em1 vhid 2 advbase 1 advskew 100
  carp: MASTER carpdev fxp0 vhid 3 advbase 1 advskew 100
 Fri Sep 23 14:25:17 CEST 2005
  carp: MASTER carpdev em0 vhid 1 advbase 1 advskew 100
  carp: MASTER carpdev em1 vhid 2 advbase 1 advskew 100
  carp: BACKUP carpdev fxp0 vhid 3 advbase 1 advskew 100
 .
 .
 .

 Fri Sep 23 14:25:43 CEST 2005
  carp: MASTER carpdev em0 vhid 1 advbase 1 advskew 100
  carp: MASTER carpdev em1 vhid 2 advbase 1 advskew 100
  carp: BACKUP carpdev fxp0 vhid 3 advbase 1 advskew 100
 Fri Sep 23 14:25:44 CEST 2005
  carp: BACKUP carpdev em0 vhid 1 advbase 1 advskew 100
  carp: BACKUP carpdev em1 vhid 2 advbase 1 advskew 100
  carp: BACKUP carpdev fxp0 vhid 3 advbase 1 advskew 100

 Any ideas? Thanks!

 --

   Stephan A. Rickauer

   
   Institut f|r Neuroinformatik
   Universitdt / ETH Z|rich
   Winterthurerstriasse 190
   CH-8057 Z|rich

   Tel: +41 44 635 30 50
   Sek: +41 44 635 30 52
   Fax: +41 44 635 30 53

   http://www.ini.ethz.ch
   



Re: Dell 2650, Stupid Adaptec Controller, and Daily Crashes

2005-09-23 Thread Marco Peereboom
On Fri, Sep 23, 2005 at 09:08:28AM -0500, eric wrote:
 First of all, thanks everyone for your replies. They are much appreciated.
 
 On Thu, 2005-09-22 at 18:53:23 -0500, Marco Peereboom proclaimed...
 
  Have you tried by any chance tried a 3.8 with aac enabled?
  This seems to go wrong in em and not aac.
 
 I haven't, yet. I'll just checkout a 3.8-BETA from that box and compile
 userland/kernel and give that a go. As far as I can tell, it's just a matter
 of uncommenting aac(4) from the GENERIC.MP configuration, correct?

Correct.

 
 I'll also fiddle around with the bios and see if I can't disable some of the
 pointlessly-enabled junk on the machine.
 
 Thanks again,
 
 - eric



Any advice on 'Indemnification'? (US Only, obviously)

2005-09-23 Thread L. V. Lammert
I have been working with a local OS friendly hosting company to add support 
for OpenBSD. Unfortunately, they also support with Red Hat, SuSE, and 
Apple, and these vendors offer an 'Open Source Indemnification', ostensibly 
protecting against legal action from contributors.


Of course, the OBSD project is meticulous about good copyright practices, 
so WE all know this isn't an issue here, but, unfortunately, the hosting 
company has lawyer(s) asking for similar 'Indemnification' for OBSD before 
they will officially allow OBSD on premesis.


Question - I know that copyright law trumps 'indemnification' - especially 
given the BSD licenses on all project s/w, but has anyone dealt with this 
issue before? Can anyone point me to any legal resources that I could pass 
along to help satisfy the lawyers?


TIA,

Lee



Re: Storage Server

2005-09-23 Thread Reg

Marco Peereboom wrote:


On Wed, Sep 21, 2005 at 02:05:31PM -0600, Tom Geman wrote:
 


I was hoping someone here could answer a few questions.
Can I install OpenBSD on this PV 220, or is it just a bunch of disks with 
no processor?
   



This question is very ambiguous.  You can't install OpenBSD on the PV220S
itself however you can install OpenBSD on a machine that uses the PV220S as its
disk storage device.  To add more confusion the box does have a SCSI processor
device thats supported by ses(4).

 

If so, does that mean I need another computer to install OpenBSD on, that 
will use the PV 220 as it's storage?
   



Yes.

 


Can this be any computer (what requirements, any recommended brands), or does
it have to be this Dell PowerVault 745N (which seems to come pre-install with
some Windows Storage Server OS)?
   



It can be virtually any computer.  Beck@ uses IBM amd64 boxes for this with a
Dell PERC4 HBA.  Some examples of well supported HBAs are PERC3/4, ahc/ahd and
mpt.

The 745N is a NAS box; don't get that.


 

If the 745N is anything like the 730N (i'm too lazy to look it up), it's 
just a PowerEdge server with some disks and a special version of windows 
advanced server which can do clustering, but not domain controller stuff. 
Marco is right - Don't get it.


As for the 220 - we have three PV220s scsi arrays.   In my experience 
you want to make sure your firmware on that baby is right up to snuff.  
There were some really bad versions out there that caused our windows 
servers to be unable to read from the volumes.  Rebooting fixed it 
(much as it fixes many things  in windows) but firmware upgrade 
resolved it long term.  In our case the volumes held a few million 
little 3-5k .tif files.




Re: Portmap non-local set / unset attempt

2005-09-23 Thread Wolfgang S. Rupprecht
Martin SchrC6der [EMAIL PROTECTED] writes:
 On 2005-09-23 00:05:14 -0700, Wolfgang S. Rupprecht wrote:
 appreciable added risk.  The only loose end is that sshd doesn't
 currently log the RSA/DSA key that is used to gain access.  Ideally it

 Hu? Try 
 LogLevel VERBOSE

Your eloquent reply aside, setting the loglevel to versbose doesn't
add proper key accounting to the sshd login record.  What it does is
add yet more clutter to /var/log/authlog by emitting quite a few more
lines per login.  Sshd's logs seem more like debug printfs, scattered
willy-nilly around the code.  The information one would expect from a
security program is never gathered in one spot and output in a single
audit line to see who logged in as what user.

-wolfgang



Intel ICH6-M chipset and Fujitsu-Siemens Lifebook S7020 on current

2005-09-23 Thread Wojtek

Hi,

there is a problem with Intel ICH6-M chipset support in current snapshot 
(2005-09-22), it doesn't recognize devices (eg. sata controller).


I've checked, that it should be supported in current.


dmesg
--
OpenBSD 3.8 (RAMDISK_CD) #794: Sat Sep 10 15:58:32 MDT 2005
[EMAIL PROTECTED]:/usr/src/sys/arch/i386/compile/RAMDISK_CD
cpu0: Intel(R) Pentium(R) M processor 1.73GHz (GenuineIntel 686-class) 
1.73 GHz
cpu0: 
FPU,V86,DE,PSE,TSC,MSR,PAE,MCE,CX8,APIC,SEP,MTRR,PGE,MCA,CMOV,PAT,CFLUSH,ACPI,MMX,FXSR,SSE,SSE2,SS,TM,SBF,EST,TM2

real mem  = 526491648 (514152K)
avail mem = 474501120 (463380K)
using 4278 buffers containing 26427392 bytes (25808K) of memory
mainbus0 (root)
bios0 at mainbus0: AT/286+(05) BIOS, date 05/30/05, BIOS32 rev. 0 @ 0xfd5f0
pcibios0 at bios0: rev 2.1 @ 0xfd5f0/0xa10
pcibios0: PCI IRQ Routing Table rev 1.0 @ 0xfdf00/224 (12 entries)
pcibios0: PCI Interrupt Router at 000:31:0 (Intel 82371FB ISA rev 0x00)
pcibios0: PCI bus #4 is the last bus
bios0: ROM list: 0xc/0xf200! 0xcf800/0x1000 0xd0800/0x1600 
0xdc000/0x4000!

cpu0 at mainbus0
pci0 at mainbus0 bus 0: configuration mode 1 (no bios)
pchb0 at pci0 dev 0 function 0 Intel 915GM/PM/GMS Host rev 0x03
vga1 at pci0 dev 2 function 0 Intel 915GM/GMS Video rev 0x03
wsdisplay0 at vga1 mux 1: console (80x25, vt100 emulation)
Intel 915GM/GMS Video rev 0x03 at pci0 dev 2 function 1 not configured
Intel 82801FB HD Audio rev 0x04 at pci0 dev 27 function 0 not configured
ppb0 at pci0 dev 28 function 0 Intel 82801FB PCIE rev 0x04
pci1 at ppb0 bus 1
bge0 at pci1 dev 0 function 0 Broadcom BCM5751M rev 0x11, BCM5750 B1 
(0x4101): irq 11 address 00:0b:5d:91:30:db

brgphy0 at bge0 phy 1: BCM5750 10/100/1000baseT PHY, rev. 0
ppb1 at pci0 dev 28 function 1 Intel 82801FB PCIE rev 0x04
pci2 at ppb1 bus 2
uhci0 at pci0 dev 29 function 0 Intel 82801FB USB rev 0x04: irq 11
usb0 at uhci0: USB revision 1.0
uhub0 at usb0
uhub0: Intel UHCI root hub, rev 1.00/1.00, addr 1
uhub0: 2 ports with 2 removable, self powered
uhci1 at pci0 dev 29 function 1 Intel 82801FB USB rev 0x04: irq 11
usb1 at uhci1: USB revision 1.0
uhub1 at usb1
uhub1: Intel UHCI root hub, rev 1.00/1.00, addr 1
uhub1: 2 ports with 2 removable, self powered
uhci2 at pci0 dev 29 function 2 Intel 82801FB USB rev 0x04: irq 11
usb2 at uhci2: USB revision 1.0
uhub2 at usb2
uhub2: Intel UHCI root hub, rev 1.00/1.00, addr 1
uhub2: 2 ports with 2 removable, self powered
uhci3 at pci0 dev 29 function 3 Intel 82801FB USB rev 0x04: irq 11
usb3 at uhci3: USB revision 1.0
uhub3 at usb3
uhub3: Intel UHCI root hub, rev 1.00/1.00, addr 1
uhub3: 2 ports with 2 removable, self powered
ehci0 at pci0 dev 29 function 7 Intel 82801FB USB rev 0x04: irq 11
usb4 at ehci0: USB revision 2.0
uhub4 at usb4
uhub4: Intel EHCI root hub, rev 2.00/1.00, addr 1
uhub4: 8 ports with 8 removable, self powered
ppb2 at pci0 dev 30 function 0 Intel 82801BAM Hub-to-PCI rev 0xd4
pci3 at ppb2 bus 3
cbb0 at pci3 dev 3 function 0 vendor O2 Micro, unknown product 0x7134 
rev 0x20: irq 11

Intel PRO/Wireless 2200BG rev 0x05 at pci3 dev 5 function 0 not configured
Texas Instruments TSB43AB21 FireWire rev 0x00 at pci3 dev 6 function 0 
not configured

cbb0: bad Vcc request. sock_ctrl 0xff88, sock_status 0x
cardslot0 at cbb0 slot 0 flags 0
cardbus0 at cardslot0: bus 4 device 0 cacheline 0x0, lattimer 0x20
pcmcia0 at cardslot0
pcib0 at pci0 dev 31 function 0 Intel 82801FBM LPC rev 0x04
pciide0 at pci0 dev 31 function 1 Intel 82801FB IDE rev 0x04: DMA, 
channel 0 configured to compatibility, channel 1 configured to compatibility

atapiscsi0 at pciide0 channel 0 drive 0
scsibus0 at atapiscsi0: 2 targets
cd0 at scsibus0 targ 0 lun 0: MATSHITA, UJ-831Db, 1.00 SCSI0 5/cdrom 
removable

cd0(pciide0:0:0): using PIO mode 4, Ultra-DMA mode 2
pciide0: channel 1 ignored (disabled)
pciide1 at pci0 dev 31 function 2 Intel 82801FBM IDE rev 0x04: DMA, 
channel 0 configured to native-PCI, channel 1 configured to native-PCI

pciide1: couldn't map channel 0 cmd regs
pciide1: channel 1 disabled (no drives)
Intel 82801FB SMBus rev 0x04 at pci0 dev 31 function 3 not configured
isa0 at pcib0
isadma0 at isa0
pckbc0 at isa0 port 0x60/5
pckbd0 at pckbc0 (kbd slot)
pckbc0: using irq 1 for kbd slot
wskbd0 at pckbd0: console keyboard, using wsdisplay0
npx0 at isa0 port 0xf0/16: using exception 16
pccom0 at isa0 port 0x3f8/8 irq 4: ns16550a, 16 byte fifo
biomask ffed netmask ffed ttymask ffef
rd0: fixed, 3800 blocks
root on rd0a
rootdev=0x1100 rrootdev=0x2f00 rawdev=0x2f02



Re: Question about atheros driver??

2005-09-23 Thread Marcos Latas
On 23/09/05, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
 Hi all,

   Is atheros driver supported under Alpha platform on OpenBSD 3.7??


 --
 CL Martinez
 carlopmart {at} gmail {d0t} com



Why didn't you check, at least, www.openbsd.org/alpha.html?



Re: is there a way to block sshd trolling?

2005-09-23 Thread Mike Hernandez
IIRC there are scripts what will automatically add lines to your
hosts.deny file. Sorry, but I can't remember the names. I suggest you
also create some keys for yourself to use and disable password
authentication. With password auth disabled the attacks won't go be
more than an annoyance for the most part. If you google you'll find
it's a very common problem, I'm sure you'll also find the scripts I
mentioned above.  If I can find them I'll post links.

Good luck!

Mike



Re: is there a way to block sshd trolling?

2005-09-23 Thread Bryan Irvine
Have snort or portsentry add those ips to a table in pf.conf.

--Bryan

On 9/23/05, John Marten [EMAIL PROTECTED] wrote:
 You know what i mean? Every day I get some script kiddie, or adult
 trying to guess usernames or passwords.
 I've installed the newest version of SSH, so i'm covered there. But I
 still get a dozen or 2 of the
 sshd Invalid user somename from ###.##.##.###
 input_userauth_request: ivalid user somename
 Failed password for invalid user somename
 Recieved disconnect from ###.##.##.###
 Someone told me to add a 'block in quick on $net inet proto {tcp,udp}
 from ###.##.##.### to any flags S/SA'
 entry in my pf.conf file. But if I had do that for every hacker my
 pf.conf would be huge!
 There's got to be a better way, and I'm open to suggestions.


 John F. Marten III

 Information Technology Specialist



Re: is there a way to block sshd trolling?

2005-09-23 Thread Mr.Slippery
John Marten ([EMAIL PROTECTED]) dixit:
 You know what i mean? Every day I get some script kiddie, or adult
 trying to guess usernames or passwords.
 I've installed the newest version of SSH, so i'm covered there. But I
 still get a dozen or 2 of the
 sshd Invalid user somename from ###.##.##.###
 input_userauth_request: ivalid user somename
 Failed password for invalid user somename
 Recieved disconnect from ###.##.##.###
 Someone told me to add a 'block in quick on $net inet proto {tcp,udp}
 from ###.##.##.### to any flags S/SA'
 entry in my pf.conf file. But if I had do that for every hacker my
 pf.conf would be huge!
 There's got to be a better way, and I'm open to suggestions.
 
 
 John F. Marten III
 
 Information Technology Specialist
 
That's how I handle this type of annoyance:
http://data.homeip.net/projects/ssh_wall.php
Of course, YMMV.
Ciao.
-- 
.--.
| Florin (Slippery) Iamandi|
| Reason is the first victim of emotion. -- Scytale, Dune Messiah  |



Re: is there a way to block sshd trolling?

2005-09-23 Thread Roy Morris

why not use max-connections ? and dump them into a
table with no access. Or if this is a home machine just
move the port to some high port, most scripts wont bother
looking.

cheers
rm


John Marten wrote:


You know what i mean? Every day I get some script kiddie, or adult
trying to guess usernames or passwords.
I've installed the newest version of SSH, so i'm covered there. But I
still get a dozen or 2 of the
sshd Invalid user somename from ###.##.##.###
input_userauth_request: ivalid user somename
Failed password for invalid user somename
Recieved disconnect from ###.##.##.###
Someone told me to add a 'block in quick on $net inet proto {tcp,udp}
from ###.##.##.### to any flags S/SA'
entry in my pf.conf file. But if I had do that for every hacker my
pf.conf would be huge!
There's got to be a better way, and I'm open to suggestions.


John F. Marten III

Information Technology Specialist




Re: is there a way to block sshd trolling?

2005-09-23 Thread Chris Smith
On Friday 23 September 2005 02:40 pm, John Marten wrote:
 There's got to be a better way, and I'm open to suggestions.

Use a non-standard port and/or public key exchange.

Chris



Re: is there a way to block sshd trolling?

2005-09-23 Thread Brandon Mercer
John Marten wrote:

You know what i mean? Every day I get some script kiddie, or adult
trying to guess usernames or passwords.
I've installed the newest version of SSH, so i'm covered there. But I
still get a dozen or 2 of the
sshd Invalid user somename from ###.##.##.###
input_userauth_request: ivalid user somename
Failed password for invalid user somename
Recieved disconnect from ###.##.##.###
Someone told me to add a 'block in quick on $net inet proto {tcp,udp}
from ###.##.##.### to any flags S/SA'
entry in my pf.conf file. But if I had do that for every hacker my
pf.conf would be huge!
There's got to be a better way, and I'm open to suggestions.
  

You can try to limit the overly persistant number of incoming
connections.  Or you can run SSH on a non-default port.  Try the pf way
first with the max-src-conn-rate on all incoming connections.  I think
it's like pass in quick on $external from any to any port $services
flags... etc keep state (max-src-conn-rate 100/10) or whatever you need. 
Brandon



Re: is there a way to block sshd trolling?

2005-09-23 Thread Abraham Al-Saleh
You could use connection throttling, it won't eliminate them, but it will
make it take longer. If you don't need ssh on that host (although, you
probably do, I'd be lost without it) disable it. You could bind sshd to a
different port, and disable port 22 (most of these attacks are automated
bots). The best thing you can do is to disable root access, use difficult
passwords (or better yet, use keys and disable passwords), go out of your
way to make sure you don't use common names for usernames (if you can), and
enforce a good password policy. Then you can do what I do when I get the
output of my logs, laugh.


On 9/23/05, John Marten [EMAIL PROTECTED] wrote:

 You know what i mean? Every day I get some script kiddie, or adult
 trying to guess usernames or passwords.
 I've installed the newest version of SSH, so i'm covered there. But I
 still get a dozen or 2 of the
 sshd Invalid user somename from ###.##.##.###
 input_userauth_request: ivalid user somename
 Failed password for invalid user somename
 Recieved disconnect from ###.##.##.###
 Someone told me to add a 'block in quick on $net inet proto {tcp,udp}
 from ###.##.##.### to any flags S/SA'
 entry in my pf.conf file. But if I had do that for every hacker my
 pf.conf would be huge!
 There's got to be a better way, and I'm open to suggestions.


 John F. Marten III

 Information Technology Specialist




--
Abe Al-Saleh
And then came the Apocolypse. It actually wasn't that
bad, everyone got the day off and there were barbeques
all around.



Re: is there a way to block sshd trolling?

2005-09-23 Thread Rob Copsey
-
Original Message:
From: Bryan Irvine [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Date: Friday, September 23 2005 09:55 AM
Subject: Re: is there a way to block sshd trolling?

Have snort or portsentry add those ips to a table in pf.conf.

--Bryan

On 9/23/05, John Marten [EMAIL PROTECTED] wrote:
 You know what i mean? Every day I get some script kiddie, or adult
 trying to guess usernames or passwords.
 I've installed the newest version of SSH, so i'm covered there. But I
 still get a dozen or 2 of the
 sshd Invalid user somename from ###.##.##.###
 input_userauth_request: ivalid user somename
 Failed password for invalid user somename
 Recieved disconnect from ###.##.##.###
 Someone told me to add a 'block in quick on $net inet proto {tcp,udp}
 from ###.##.##.### to any flags S/SA'
 entry in my pf.conf file. But if I had do that for every hacker my
 pf.conf would be huge!
 There's got to be a better way, and I'm open to suggestions.


 John F. Marten III

 Information Technology Specialist
-

You could use pf to add the entries to your block table based upon 
connect/disconnect rate.

Notice the timescale of this attack in your authlog, no human types this fast.

See man pf.conf for pertinent examples.

Regards,
Rob



Re: Question about atheros driver??

2005-09-23 Thread ober

Use the tarpit patch that I wrote
http://www.linbsd.org/openssh-samepasswd.patch

-Ober

On Fri, 23 Sep 2005, Marcos Latas wrote:


On 23/09/05, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:

Hi all,

  Is atheros driver supported under Alpha platform on OpenBSD 3.7??


--
CL Martinez
carlopmart {at} gmail {d0t} com




Why didn't you check, at least, www.openbsd.org/alpha.html?




Re: PowerEdge 1850 w/ dual Xeon : now tested with 3.8 GENERIC.MP

2005-09-23 Thread Mariano Benedettini
Thanks, my question was exactly about that, the lack of some hardware 
support on 3.7 :-)


Nick Holland wrote:

Mariano Benedettini wrote:


I wrote last week, about some problems I've experienced with 3.7 GENERIC.MP
on a PowerEdge 1850 dual Xeon [1].
Some people suggested to try a 3.8 snapshot, and that's what I did.
The system runs fine, but is there any way to make it work with 3.7
GENERIC.MP ?



Of course there is!  Push all the things that changed in 3.8 to 3.7.
You will then end up with...a poorly done 3.8!  Wow!  :)

Slightly more seriously, no.  The OpenBSD project is about moving
forward, not adding features to previous versions.  3.7 may have bugs
fixed, but will not be receiving new features, support new hardware, etc.

Just run 3.8.  It works.  Obviously, you weren't running 3.7 on this
machine.  There is no reason not to keep running what you have now, and
bump to 3.8-release when it ships.

Nick.



Here's the full dmesg:

OpenBSD 3.8 (GENERIC.MP) #298: Sat Sep 10 15:51:54 MDT 2005
   [EMAIL PROTECTED]:/usr/src/sys/arch/i386/compile/GENERIC.MP


...
thanks! :)




Re: is there a way to block sshd trolling?

2005-09-23 Thread Tomasz Baranowski
On Fri, Sep 23, 2005 at 11:40:36AM -0700, John Marten wrote:
 You know what i mean? Every day I get some script kiddie, or adult
 trying to guess usernames or passwords.

You can change the port number in /etc/ssh/sshd_config . It's 100%
effective against that kind of bots.

Greetings,
Tomasz Baranowski



ssh passwords and publickeys

2005-09-23 Thread J.D. Bronson

Is there any way to accomplish this:

1. Use ssh with passwords internally (lan to lan connections)
2  Use ssh with publickeys externally (wan to lan connections)

...thanks!






J.D. Bronson
Off The Hook Phone Repair, Inc.
24 Hour Service // Free Estimates
For Fast Repairs: CALL US - IF YOU CAN!
Office: 414.978.8282 // Pager: 414.314.8282



Re: is there a way to block sshd trolling?

2005-09-23 Thread jabbott
My only question is what if I traceroute to you, find out the IP number of your 
upstream router?  Then I make a bunch of connection attempts to your IP but 
forge the packets to make them look like they came from your upstream.  Don't 
*you* end up blacklisting your default route and you become 'so long suckah'd?

--ja

  
 That's how I handle this type of annoyance:
 http://data.homeip.net/projects/ssh_wall.php
 Of course, YMMV.
 Ciao.
 

-- 



Re: Any advice on 'Indemnification'? (US Only, obviously)

2005-09-23 Thread Dirk-Willem van Gulik
On Fri, 23 Sep 2005, L. V. Lammert wrote:

 so WE all know this isn't an issue here, but, unfortunately, the hosting
 company has lawyer(s) asking for similar 'Indemnification' for OBSD before
 they will officially allow OBSD on premesis.

We've solved this in the past by running 'FooBSD' and simply indemnificate
this 'inhouse FooBSD' product ourselves.

Dw



Re: Question about atheros driver??

2005-09-23 Thread Reyk Floeter
On Fri, Sep 23, 2005 at 08:28:29PM +0200, [EMAIL PROTECTED] wrote:
 Hi all,
 
  Is atheros driver supported under Alpha platform on OpenBSD 3.7??
 

no, but i would be really happy about a donated alpha to port ath(4)
to this platform ;).

reyk



Re: ssh passwords and publickeys

2005-09-23 Thread eric
On Fri, 2005-09-23 at 14:44:20 -0500, J.D. Bronson proclaimed...

 Is there any way to accomplish this:
 
 1. Use ssh with passwords internally (lan to lan connections)

Yes.

 2  Use ssh with publickeys externally (wan to lan connections)

Yes!

 ...thanks!

Thank you!



Re: is there a way to block sshd trolling?

2005-09-23 Thread Nick Ryan

You could use pf to block linux ssh access.

block in log quick on $EXT_IF inet proto tcp from any os Linux to port 
22 label Blocked Linux ssh access: 


That'll reduce it quite a lot.



John Marten wrote:


You know what i mean? Every day I get some script kiddie, or adult
trying to guess usernames or passwords.
I've installed the newest version of SSH, so i'm covered there. But I
still get a dozen or 2 of the
sshd Invalid user somename from ###.##.##.###
input_userauth_request: ivalid user somename
Failed password for invalid user somename
Recieved disconnect from ###.##.##.###
Someone told me to add a 'block in quick on $net inet proto {tcp,udp}
from ###.##.##.### to any flags S/SA'
entry in my pf.conf file. But if I had do that for every hacker my
pf.conf would be huge!
There's got to be a better way, and I'm open to suggestions.


John F. Marten III

Information Technology Specialist




Re: ssh passwords and publickeys

2005-09-23 Thread Roy Morris

J.D. Bronson wrote:

No. Its not answering wrong. It crossed my mind...but I am not sure I 
can actually do this and if so, how do I specify the alternate config?


start is as 'sshd -f BLAH' ?


At 03:27 PM 9/23/2005, you wrote:


just a guess, but can you run two instances of sshd with
different conf files? .. each binding to a specific interface?

is this answering a question with a question?


J.D. Bronson wrote:


Is there any way to accomplish this:

1. Use ssh with passwords internally (lan to lan connections)
2  Use ssh with publickeys externally (wan to lan connections)

...thanks!






J.D. Bronson
Off The Hook Phone Repair, Inc.
24 Hour Service // Free Estimates
For Fast Repairs: CALL US - IF YOU CAN!
Office: 414.978.8282 // Pager: 414.314.8282









J.D. Bronson
Off The Hook Phone Repair, Inc.
24 Hour Service // Free Estimates
For Fast Repairs: CALL US - IF YOU CAN!
Office: 414.978.8282 // Pager: 414.314.8282


Yep, looks like it on the command line.
sshd -f /etc/ssh/sshd2.config

#ListenAddress 0.0.0.0



Re: is there a way to block sshd trolling?

2005-09-23 Thread Thordur I. Bjornsson
On Fri, 23 Sep 2005 11:40:36 -0700
John Marten [EMAIL PROTECTED] wrote:

 You know what i mean? Every day I get some script kiddie, or adult
 trying to guess usernames or passwords.
 I've installed the newest version of SSH, so i'm covered there. But I
 still get a dozen or 2 of the
 sshd Invalid user somename from ###.##.##.###
 input_userauth_request: ivalid user somename
 Failed password for invalid user somename
 Recieved disconnect from ###.##.##.###
 Someone told me to add a 'block in quick on $net inet proto {tcp,udp}
 from ###.##.##.### to any flags S/SA'
 entry in my pf.conf file. But if I had do that for every hacker my
 pf.conf would be huge!
 There's got to be a better way, and I'm open to suggestions.
 
 
 John F. Marten III
 
 Information Technology Specialist
 
Use tables.
See:
http://www.section6.net/wiki/index.php/Thwarting_ssh_hackers_with_swatch_pf

-- 
Thordur I.  [EMAIL PROTECTED]
Humppa!



Re: is there a way to block sshd trolling?

2005-09-23 Thread ober
Use the tarpit patch that I wrote 
http://www.linbsd.org/openssh-samepasswd.patch


-Ober


-Ober

On Fri, 23 Sep 2005, Abraham Al-Saleh wrote:


You could use connection throttling, it won't eliminate them, but it will
make it take longer. If you don't need ssh on that host (although, you
probably do, I'd be lost without it) disable it. You could bind sshd to a
different port, and disable port 22 (most of these attacks are automated
bots). The best thing you can do is to disable root access, use difficult
passwords (or better yet, use keys and disable passwords), go out of your
way to make sure you don't use common names for usernames (if you can), and
enforce a good password policy. Then you can do what I do when I get the
output of my logs, laugh.


On 9/23/05, John Marten [EMAIL PROTECTED] wrote:


You know what i mean? Every day I get some script kiddie, or adult
trying to guess usernames or passwords.
I've installed the newest version of SSH, so i'm covered there. But I
still get a dozen or 2 of the
sshd Invalid user somename from ###.##.##.###
input_userauth_request: ivalid user somename
Failed password for invalid user somename
Recieved disconnect from ###.##.##.###
Someone told me to add a 'block in quick on $net inet proto {tcp,udp}
from ###.##.##.### to any flags S/SA'
entry in my pf.conf file. But if I had do that for every hacker my
pf.conf would be huge!
There's got to be a better way, and I'm open to suggestions.


John F. Marten III

Information Technology Specialist





--
Abe Al-Saleh
And then came the Apocolypse. It actually wasn't that
bad, everyone got the day off and there were barbeques
all around.




Re: is there a way to block sshd trolling?

2005-09-23 Thread Brandon Mercer
Roy Morris wrote:

 why not use max-connections ? and dump them into a
 table with no access. Or if this is a home machine just
 move the port to some high port, most scripts wont bother
 looking.

Yup, I forgot to add that you can put another thing in that max-conn...
that handles the overflow it sends it to a bad hosts file or some
such... then just persist that. 
Brandon



Re: is there a way to block sshd trolling?

2005-09-23 Thread Chris Smith
On Friday 23 September 2005 03:15 pm, Mr.Slippery wrote:
 That's how I handle this type of annoyance:
 http://data.homeip.net/projects/ssh_wall.php

Slick. Er...slippery, that is.



Re: ssh passwords and publickeys

2005-09-23 Thread Roy Morris

just a guess, but can you run two instances of sshd with
different conf files? .. each binding to a specific interface?

is this answering a question with a question?


J.D. Bronson wrote:


Is there any way to accomplish this:

1. Use ssh with passwords internally (lan to lan connections)
2  Use ssh with publickeys externally (wan to lan connections)

...thanks!






J.D. Bronson
Off The Hook Phone Repair, Inc.
24 Hour Service // Free Estimates
For Fast Repairs: CALL US - IF YOU CAN!
Office: 414.978.8282 // Pager: 414.314.8282




Re: ssh passwords and publickeys

2005-09-23 Thread J.D. Bronson
No. Its not answering wrong. It crossed my mind...but I am not sure I 
can actually do this and if so, how do I specify the alternate config?


start is as 'sshd -f BLAH' ?


At 03:27 PM 9/23/2005, you wrote:

just a guess, but can you run two instances of sshd with
different conf files? .. each binding to a specific interface?

is this answering a question with a question?


J.D. Bronson wrote:


Is there any way to accomplish this:

1. Use ssh with passwords internally (lan to lan connections)
2  Use ssh with publickeys externally (wan to lan connections)

...thanks!






J.D. Bronson
Off The Hook Phone Repair, Inc.
24 Hour Service // Free Estimates
For Fast Repairs: CALL US - IF YOU CAN!
Office: 414.978.8282 // Pager: 414.314.8282







J.D. Bronson
Off The Hook Phone Repair, Inc.
24 Hour Service // Free Estimates
For Fast Repairs: CALL US - IF YOU CAN!
Office: 414.978.8282 // Pager: 414.314.8282



passive ftp-ssl client behind OpenBSD 3.7 NAT/pf

2005-09-23 Thread Daniel Smereka
Is it possible to get such a client running in passive mode using pf rdr/rules?
 
I understand that I can't use ftp-proxy for this b/c the PORT command coming 
back from the FTP server is encrypted.  Is there any way to do this?  thanks
Tired of spam?  Yahoo! Mail has the best spam protection around 
http://mail.yahoo.com 



Re: is there a way to block sshd trolling?

2005-09-23 Thread ed
On Fri, 23 Sep 2005 21:55:12 +0200
Tomasz Baranowski [EMAIL PROTECTED] wrote:

 You can change the port number in /etc/ssh/sshd_config . It's 100%
 effective against that kind of bots.

Some intelligent scripts look at tcp responses to port scans, ssh
responds with SSH-2.0, which isn't too hard to identify. I don't know if
changing the greeting would break the protocol, but I suspect it might
break certain clients.

-- 
A horse is a horse, of course, of course, And no one can talk to a
horse, of course, Unless, of course, the horse, of course, Is the famous
Mr. Ed! http://www.usenix.org.uk - http://irc.is-cool.net 



Re: is there a way to block sshd trolling?

2005-09-23 Thread Joe S

John Marten wrote:

There's got to be a better way, and I'm open to suggestions.



Use public key authentication to start with. It's very easy to setup and 
much more secure than password authentication. With public key 
authentication, passwords will never work. You might also want to make 
it a practice to disallow root logins via ssh.


Changing the port number is not a bad idea also.



Re: ssh passwords and publickeys

2005-09-23 Thread Spruell, Darren-Perot
From: J.D. Bronson [mailto:[EMAIL PROTECTED]
 Is there any way to accomplish this:
 
 1. Use ssh with passwords internally (lan to lan connections)
 2  Use ssh with publickeys externally (wan to lan connections)
 
 ...thanks!

I can't think of a way to do it with the same user account, but you could
handle it for different users by not setting a password for users that will
only connect externally, and set them up for key-based auth, and then do
keys + set a password for internal user accounts.

Alternatively, you may be able to use some PF magic to get external users
redirected to an sshd listening on a different port on the box - one
configured for only pubkey auth.

DS



Re: is there a way to block sshd trolling?

2005-09-23 Thread Spruell, Darren-Perot
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
 My only question is what if I traceroute to you, find out the 
 IP number of your upstream router?  Then I make a bunch of 
 connection attempts to your IP but forge the packets to make 
 them look like they came from your upstream.  Don't *you* end 
 up blacklisting your default route and you become 'so long suckah'd?

If you blacklist an IP on syn attempts only, maybe. In order for you to try
to brute force logins you'll need a full TCP handshake which you'll never
accomplish if you're spoofing yourself as the IP of the router.

DS



Re: is there a way to block sshd trolling?

2005-09-23 Thread Stuart Henderson

--On 23 September 2005 15:05 -0500, [EMAIL PROTECTED] wrote:


My only question is what if I traceroute to you, find out the IP
number of your upstream router?  Then I make a bunch of connection
attempts to your IP but forge the packets to make them look like they
came from your upstream.


The suggestion is for max-src-conn-rate, not max-src-state.



Re: is there a way to block sshd trolling?

2005-09-23 Thread Matthew Powell
John Marten wrote:
 You know what i mean? Every day I get some script kiddie, or adult
 trying to guess usernames or passwords.
 I've installed the newest version of SSH, so i'm covered there. But I
 still get a dozen or 2 of the
 sshd Invalid user somename from ###.##.##.###
 input_userauth_request: ivalid user somename
 Failed password for invalid user somename
 Recieved disconnect from ###.##.##.###
 Someone told me to add a 'block in quick on $net inet proto {tcp,udp}
 from ###.##.##.### to any flags S/SA'
 entry in my pf.conf file. But if I had do that for every hacker my
 pf.conf would be huge!
 There's got to be a better way, and I'm open to suggestions.
 
 
 John F. Marten III
 
 Information Technology Specialist
 


http://lfriends.franoculator.com/phpBB2/viewtopic.php?t=103

That's the hosts.deny method, for those of you scoring at home.

It's a good solution, but you're better off enabling DSA/RSA keys and
doing away with password auth altogether.  Running sshd on a different
port never hurt anyone either.

HTH.


-- 
Matt



Re: passive ftp-ssl client behind OpenBSD 3.7 NAT/pf

2005-09-23 Thread ed
On Fri, 23 Sep 2005 13:45:45 -0700 (PDT)
Daniel Smereka [EMAIL PROTECTED] wrote:

 Is it possible to get such a client running in passive mode using pf
 rdr/rules?
  
 I understand that I can't use ftp-proxy for this b/c the PORT command
 coming back from the FTP server is encrypted.  Is there any way to do
 this?  thanks

The whole idea of passive ftp is that it is the client initiating both
control and data connections, so ftp or ftpssl there should be no need
for additional nat fw rules.

If the server is behind the NAT then you need to set a rdr rule for the
high port numbers and the ftp server must masquerade as the nat's ip
address.

rdr on $ext_if from any to $ftp port {6:65535} - $local_ftp 

for example.

-- 
A horse is a horse, of course, of course, And no one can talk to a
horse, of course, Unless, of course, the horse, of course, Is the famous
Mr. Ed! http://www.usenix.org.uk - http://irc.is-cool.net 



Re: is there a way to block sshd trolling?

2005-09-23 Thread Wolfgang S. Rupprecht
[EMAIL PROTECTED] writes:
 My only question is what if I traceroute to you, find out the IP number of 
 your upstream router?  Then I make a bunch of connection attempts to your IP 
 but forge the packets to make them look like they came from your upstream.  
 Don't *you* end up blacklisting your default route and you become 'so long 
 suckah'd?

This isn't a problem for 2 reasons.

1) The upstream router isn't likely to be the destination of any
   packet in a consumer-isp situation.  Only if you are running some
   routing protocol that uses that upstream router as an endpoint
   (eg. rip, ospf, etc) will a block against that router's IP matter
   to you.

   I've heard of cases where folks intentionally add an IP-level block
   against their ISP's whole infrastructure.  (Some ISP's don't allow
   any servers.  If they find an sshd hanging on port 22 are they
   going to hassle you?  Just block 'em.)

2) Forging the source IP in a TCP packet and succeeding in negotiating
   the 3-way handshake isn't all that simple any more.  I wouldn't
   worry about it.  If someone could forge that reliably, there is
   much better game to go after (like breaking into machines that
   still use IP addresses for authorization.)  Someone spoofing an IP
   so that you mistakenly block an innocent party is pretty much
   wasting a good trick.

-wolfgang



No sound in KDE

2005-09-23 Thread Chris
Hello.

I am still relatively new to openbsd. 

I have followed the docs pretty closely, and seem to have a vice nice
system going.  I have a couple snags, however.

One of them is that I am not getting any sound while I am running KDE. 
I had the same problem running 3.6, I thought I would try upgrading to
3.7, but it changed nothing there.

The sound card works fine.  I can run waveplay from the commandline on a
wave file and it sounds great.

To rule out permission issues, I am running this all as root.  Normally,
I wouldn't do this.

It is only in KDE that my sound does not work.  Artsd is running in the
background, and by default points to /dev/sound and uses OSS.  I have
tried about every permutation I can think of settings on the control
panel, and nothing works.

I get no errors if I leave these defaults.  Sometimes I get a
high-pitched  squeak, but usually I get nothing out of the speakers.

When I click test on the sound system control panel in KDE, I hear
nothing, but this prints up on the vt where I started X:

Server STatus:  Running, autosuspend disabled
real-time status: no real-time support
server buffer time: 40.5349 ms
buffersize multiplier: 1
minimum stream buffer time: 40.6349 ms
auto suspend time: 0 s
audio method: oss
sampling rate 44100
channels: 2
sample size 16 bits
duplex: half
device: /dev/sound
fragments 7
fragment size: 1024



Any ideas?

Thank you in advance. 

Here is my dmesg:

dmesg:
==
OpenBSD 3.7 (RAMDISK_CD) #573: Sun Mar 20 00:27:05 MST 2005
[EMAIL PROTECTED]:/usr/src/sys/arch/i386/compile/RAMDISK_CD
cpu0: Intel Celeron (GenuineIntel 686-class, 256KB L2 cache) 299 MHz
cpu0: 
FPU,V86,DE,PSE,TSC,MSR,PAE,MCE,CX8,SEP,MTRR,PGE,MCA,CMOV,PAT,PSE36,MMX,FXSR
real mem  = 267952128 (261672K)
avail mem = 238706688 (233112K)
using 3296 buffers containing 13500416 bytes (13184K) of memory
mainbus0 (root)
bios0 at mainbus0: AT/286+(7c) BIOS, date 11/17/99, BIOS32 rev. 0 @ 0xfd7a0
apm0 at bios0: Power Management spec V1.2
pcibios0 at bios0: rev 2.1 @ 0xfd7a0/0x860
pcibios0: PCI IRQ Routing Table rev 1.0 @ 0xfdf40/160 (8 entries)
pcibios0: PCI Interrupt Router at 000:02:0 (Intel 82371FB ISA rev 0x00)
pcibios0: PCI bus #3 is the last bus
bios0: ROM list: 0xc/0xc000
cpu0 at mainbus0
pci0 at mainbus0 bus 0: configuration mode 1 (no bios)
pchb0 at pci0 dev 0 function 0 Intel 82443BX AGP rev 0x03
ppb0 at pci0 dev 1 function 0 Intel 82443BX AGP rev 0x03
pci1 at ppb0 bus 1
vga1 at pci1 dev 0 function 0 Neomagic Magicgraph NM2200 rev 0x20
wsdisplay0 at vga1: console (80x25, vt100 emulation)
pcib0 at pci0 dev 2 function 0 Intel 82371AB PIIX4 ISA rev 0x02
pciide0 at pci0 dev 2 function 1 Intel 82371AB IDE rev 0x01: DMA, channel 0 
wired to compatibility, channel 1 wired to compatibility
wd0 at pciide0 channel 0 drive 0: TOSHIBA MK3021GAS
wd0: 16-sector PIO, LBA, 28615MB, 58605120 sectors
wd0(pciide0:0:0): using PIO mode 4, Ultra-DMA mode 2
atapiscsi0 at pciide0 channel 1 drive 0
scsibus0 at atapiscsi0: 2 targets
cd0 at scsibus0 targ 0 lun 0: LG, CD-ROM CRN-8241B, 1.16 SCSI0 5/cdrom 
removable
cd0(pciide0:1:0): using PIO mode 4, DMA mode 2
uhci0 at pci0 dev 2 function 2 Intel 82371AB USB rev 0x01: irq 11
usb0 at uhci0: USB revision 1.0
uhub0 at usb0
uhub0: Intel UHCI root hub, class 9/0, rev 1.00/1.00, addr 1
uhub0: 2 ports with 2 removable, self powered
Intel 82371AB Power Mgmt rev 0x02 at pci0 dev 2 function 3 not configured
cbb0 at pci0 dev 3 function 0 Texas Instruments PCI1251 CardBus rev 0x01: irq 
11
cbb1 at pci0 dev 3 function 1 Texas Instruments PCI1251 CardBus rev 0x01: irq 
11
ATT/Lucent LTMODEM rev 0x01 at pci0 dev 6 function 0 not configured
ESS SOLO-1 AudioDrive rev 0x02 at pci0 dev 7 function 0 not configured
isa0 at pcib0
isadma0 at isa0
pckbc0 at isa0 port 0x60/5
pckbd0 at pckbc0 (kbd slot)
pckbc0: using irq 1 for kbd slot
wskbd0 at pckbd0 (mux 1 ignored for console): console keyboard, using wsdisplay0
npx0 at isa0 port 0xf0/16: using exception 16
pccom1 at isa0 port 0x2f8/8 irq 3: ns16550a, 16 byte fifo
fdc0 at isa0 port 0x3f0/6 irq 6 drq 2
fd0 at fdc0 drive 0: 1.44MB 80 cyl, 2 head, 18 sec
cardslot0 at cbb0 slot 0 flags 0
cardbus0 at cardslot0: bus 2 device 0 cacheline 0x0, lattimer 0x80
pcmcia0 at cardslot0
cardslot1 at cbb1 slot 1 flags 0
cardbus1 at cardslot1: bus 3 device 0 cacheline 0x0, lattimer 0x80
pcmcia1 at cardslot1
biomask fff5 netmask fff5 ttymask fff7
rd0: fixed, 3800 blocks
ep1 at pcmcia0 function 0 3Com, OfficeConnect 572B, B port 0xa000/32: address 
00:00:86:62:83:f5
tqphy0 at ep1 phy 0: 78Q2120 10/100 PHY, rev. 10
root on rd0a
rootdev=0x1100 rrootdev=0x2f00 rawdev=0x2f02
syncing disks... done
rebooting...
OpenBSD 3.7 (GENERIC) #50: Sun Mar 20 00:01:57 MST 2005
[EMAIL PROTECTED]:/usr/src/sys/arch/i386/compile/GENERIC
cpu0: Intel Celeron (GenuineIntel 686-class, 256KB L2 cache) 299 MHz
cpu0: 

Thats Business - so verdient man heute...!

2005-09-23 Thread Hanzz
Achtung: Wenn Sie ein Skeptiker und f|r neue innovative Mvglichkeiten nicht 
aufgeschlossen sind, dann sollten Sie diese Webseite verlassen!
Anderenfalls bewahren Sie sich einfach Ihr gesundes Ma_ an Misstrauen und 
starten Sie.




That4s Business



450.000 Euro
in 7 Monaten mvglich!
Durch Network-Marketing ging mein Traum in Erf|llung!
Hallo, schvn, dass Sie auf meiner Homepage vorbeischauen. Ich bin genauso wie 
Sie, im Internet auf dieses Programm aufmerksam geworden. Was mir hier sofort 
sympathisch war: ALLES wird sofort beschrieben, wie Sie leicht Geld verdienen 
kvnnen und Sie kvnnen SOFORT loslegen. (Anders wie bei verschiedenen 
Nebenjob-Anbietern im Internet, wo Sie erst einmal f|r viel Geld Informationen 
anfordern m|ssen, um nur zu erfahren worum es |berhaupt geht...) 
Nehmen Sie sich ein paar Minuten Zeit und lesen Sie sich den Text unten in Ruhe 
einmal durch. Und Sie werden sehen WIE einfach man Geld verdienen kann. Und was 
mir persvnlich auch sehr wichtig war: Es macht Spass!!! 
Die Personen weiter unten auf der Liste sind ganz normale Personen wie Sie und 
ich, die sich auch entschieden haben an dem Programm teilzunehmen. Es gibt also 
keine Person dazwischen die noch Kohle einkassiert. Sie sind Ihr eigener 
Chef! 
\brigens f|r alle Skeptiker: ich habe beim Gewerbeaufsichtsamt nochmals 
nachgefragt, es gibt definitiv rechtlich KEINE Einwdnde gegen dieses Programm!
Ich w|nsche Ihnen genauso viel Erfolg und Spass wie ich bis jetzt damit 
habe!
 Wie aus 35 Euro 450.000 Euro und mehr werden - in 7 Monaten mvglich !!!
Sehr geehrte Damen und Herren,
Wir distanzieren uns von allen bis jetzt da gewesenen, dhnlichen Programmen. 
\berzeugen Sie sich selbst. Den Grundgedanken haben wir gelassen, weil das 
Programm GOLD wert ist. Die Dnderungen sind jetzt auf deutschsprachige Ldnder 
zugeschnitten (Gesetze, Verordnungen etc.).
Guten Tag!
Im Internet mit Ihrem PC von zu Hause Geld verdienen! Sie kvnnen innerhalb der 
ndchsten 7 Monaten mehr als 450.000 ? erhalten, indem Sie kostenlos Werbung 
machen, erfahren Sie in einer Schritt f|r Schrittanweisung, die in den 7 
E-B|chern stehen, die Sie per e-mail erhalten werden. Sie sind f|r jeden leicht 
verstdndlich geschrieben.
Bis 450.000 ? in nur 7 Monaten! Erscheint Ihnen das unmvglich? Lesen Sie weiter 
und erfahren Sie detailliert, wie das funktioniert.
Nein, - es gibt dabei keinen Haken !
Vielen Dank f|r Ihre Zeit und Ihr Interesse!
Wegen der Popularitdt dieses Briefes im Internet widmete ein bekanntes 
deutsches Nachrichtenmagazin eine komplette Sendung der Untersuchung des unten 
beschriebenen Programms, um herauszufinden ob es wirklich Geld bringt.

Diese Sendung pr|fte auch, ob das Programm legal ist oder nicht. Dabei wurde 
herausgefunden, dass es keine Gesetze gibt, dass die Teilnahme an dem Programm 
verbietet. Dies hat dazu beigetragen zu zeigen, dass dies ein einfacher, 
harmloser Weg ist, zusdtzlich Geld von zu Hause aus zu verdienen und 
bemerkenswerte Resultate gebracht..

Es nehmen so viele Menschen an diesem Programm teil, dass es f|r diejenigen, 
die schon dabei sind, noch besser lduft, als zuvor. Da jeder mehr verdient, je 
mehr Menschen es ausprobieren, war es in letzter Zeit sehr aufregend dabei zu 
sein. Das werden Sie verstehen, sobald Sie Erfahrungen sammeln.

Sie kvnnen sich das Folgende jetzt ausdrucken, um jederzeit darauf 
zur|ckzugreifen, in jedem Fall aber sicher aufbewahren, denn Sie werden das 
unglaubliche Konzept noch vfters lesen, d.h. wenn Sie gerne 450.000 ? in 
weniger als 7 Monaten verdienen mvchten, dann lesen Sie das folgende Programm 
... und dann lesen Sie es noch einmal!
Das Programm bietet eine legale Mvglichkeit, Geld im Internet zu verdienen.
Daf|r m|ssen Sie keinem etwas persvnlich verkaufen, hart arbeiten und das Beste 
daran ist: Sie m|ssen nicht einmal das Haus verlassen. Sie werden eines Tages 
einen Kontostand erreichen, von dem Sie schon lange getrdumt haben, ob Sie es 
wollen oder nicht!
Rezession: (Einer von vielen Anwendern dieser Geschdftsmvglichkeit)
Ich hei_e Markus Weber. Vor zwei Jahren hat die Firma, f|r die ich die letzten 
12 Jahre arbeitete, rationalisiert und ich wurde entlassen. Nach unergiebigen 
Vorstellungsgesprdchen entschloss ich mich mein eigenes Geschdft aufzumachen.
In den vergangenen Jahren erlebte ich einige unvorhergesehene finanzielle 
Probleme. Ich schuldete meiner Familie, meinen Freunden und meinen Geldgebern 
mehr als 18.000 ?. Die Wirtschaftslage forderte ihren Tribut von meinem 
Geschdft und es gelang mir nicht, ein ausreichendes Auskommen zu finden. Ich 
musste refinanzieren und eine Hypothek aufnehmen, um meine Familie und mein 
Geschdft zu erhalten. In diesem Moment passierte etwas Entscheidendes in meinem 
Leben. Ich schreibe Ihnen dies, um meine Erfahrung zu teilen und bin sicher, 
dass es auch Ihr Leben finanziell f|r immer verdndern wird!
Mitte Mdrz erhielt ich dieses 

Re: Userland Compilation Dies

2005-09-23 Thread Chris
Oh no!

My eyes must have slipped up the page!  (I have the docs open on my
other machine, and I am going back and forth).  I have been at this too
long!  Thank you Mitja!

I actually did do it right the first time.. but it errored out.
Interesting that using the current didn't error out in the same way...

I wound up deleting /usr/src /usr/X4 and /usr/ports, downloading the
tarballs and updating them.  Then everything worked.

Thank you all for catching my blunder.

Chris



Chris wrote:

Hello.

I had an OBSD system, 3.6.  I went to update it the other day to 3.7,
and everything seemed to work swell.  I followed the instructions from
the upgrade faq, and things seemed to work without a hitch.

I am trying to follow the stable branch, so updated my CVS for src,
ports and X like so:

# cd /usr
#cvs -d$CVSROOT up -Pd*

*It took its time, but it updated everything without complaint.

I then recompiled the kernel (GENERIC).  This also seemed to go without
a hitch -- almost.  The only thing that seemed to contradict the
documentation was that it said:

# *cd /usr/src/sys/arch/i386/conf*
# *config GENERIC*
# *cd ../compile/GENERIC*
# *make clean  make depend  make*
/[...lots of output...]/
# *make install*
  

Replace i386 in the first line with your machine name.

Well, my machine name was nowhere to be found in /usr/src/sys/arch (or
anywhere under /usr/src at all), so I had to use i386.  I don't know if
this is an error in the docs or if something else somewhere got
botched.  I do know that there were no complaints from the system
what-so-ever.  It rebooted very nicely.

Then I went to recompile the userland utilities.  I followed the
documentation:

   # *rm -rf /usr/obj/**   
   # *cd /usr/src*
   # *make obj*
   # *cd /usr/src/etc  env DESTDIR=/ make distrib-dirs  
   \\Now I am not certain if is an error in the docs.  Should it 
 be setenv DESTIR=/? (I tried both ways..)

*  # *cd /usr/src*
   # *make build*

The compile goes for about 1 hour and 48 minutes, then it crashes:



c++ -O2-fno-implicit-templates  -idirafter /=/usr/include/g++  
-I/usr/src/gnu/e
gcs/libio -I/usr/src/gnu/egcs/libio/obj -nostdinc -idirafter /=/usr/include -c 
/usr
/src/gnu/egcs/libio/editbuf.cc -o editbuf.o
In file included from /usr/src/gnu/egcs/libio/editbuf.cc:31:
/usr/src/gnu/egcs/libio/editbuf.h:79: error: friend declaration requires
   class-key, i.e. `friend struct edit_buffer'
/usr/src/gnu/egcs/libio/editbuf.cc: In member function `edit_buffer*
   edit_mark::buffer()':
/usr/src/gnu/egcs/libio/editbuf.cc:648: warning: invalid access to non-static
   data member `edit_buffer::end_mark' of NULL object
/usr/src/gnu/egcs/libio/editbuf.cc:648: warning: (perhaps the `offsetof' macro
   was used incorrectly)
*** Error code 1

Stop in /usr/src/gnu/egcs/libio.
*** Error code 1

Stop in /usr/src/gnu/egcs/libio (line 48 of 
/usr/src/gnu/egcs/libio/Makefile.bsd-wrapper).
*** Error code 1

Stop in /usr/src/gnu/egcs.
*** Error code 1

Stop in /usr/src/gnu/lib.
*** Error code 1

Stop in /usr/src (line 72 of Makefile).

===

I have gone through these steps repeatedly, and I get the same results every 
time. 

Can someone please give me a hand?

Thanks!


Chris



My system:
IBM thinkpad 390e
256 megs of ram
30 gb hard drive (21gb free)
pentium II processor


dmesg:
==
OpenBSD 3.7 (RAMDISK_CD) #573: Sun Mar 20 00:27:05 MST 2005
[EMAIL PROTECTED]:/usr/src/sys/arch/i386/compile/RAMDISK_CD
cpu0: Intel Celeron (GenuineIntel 686-class, 256KB L2 cache) 299 MHz
cpu0: 
FPU,V86,DE,PSE,TSC,MSR,PAE,MCE,CX8,SEP,MTRR,PGE,MCA,CMOV,PAT,PSE36,MMX,FXSR
real mem  = 267952128 (261672K)
avail mem = 238706688 (233112K)
using 3296 buffers containing 13500416 bytes (13184K) of memory
mainbus0 (root)
bios0 at mainbus0: AT/286+(7c) BIOS, date 11/17/99, BIOS32 rev. 0 @ 0xfd7a0
apm0 at bios0: Power Management spec V1.2
pcibios0 at bios0: rev 2.1 @ 0xfd7a0/0x860
pcibios0: PCI IRQ Routing Table rev 1.0 @ 0xfdf40/160 (8 entries)
pcibios0: PCI Interrupt Router at 000:02:0 (Intel 82371FB ISA rev 0x00)
pcibios0: PCI bus #3 is the last bus
bios0: ROM list: 0xc/0xc000
cpu0 at mainbus0
pci0 at mainbus0 bus 0: configuration mode 1 (no bios)
pchb0 at pci0 dev 0 function 0 Intel 82443BX AGP rev 0x03
ppb0 at pci0 dev 1 function 0 Intel 82443BX AGP rev 0x03
pci1 at ppb0 bus 1
vga1 at pci1 dev 0 function 0 Neomagic Magicgraph NM2200 rev 0x20
wsdisplay0 at vga1: console (80x25, vt100 emulation)
pcib0 at pci0 dev 2 function 0 Intel 82371AB PIIX4 ISA rev 0x02
pciide0 at pci0 dev 2 function 1 Intel 82371AB IDE rev 0x01: DMA, channel 0 
wired to compatibility, channel 1 wired to compatibility
wd0 at pciide0 channel 0 drive 0: TOSHIBA MK3021GAS
wd0: 16-sector PIO, LBA, 28615MB, 58605120 sectors

pf log entries

2005-09-23 Thread Richard P. Koett
'tcpdump -r /var/log/pflog' shows a lot of entries like this:

14:31:38.279681 33:0:0:0:0:0  3d:2:1:0:6e:65 null I (s=0,r=0,C) len=98
14:31:41.794668 33:0:0:0:0:0  3d:2:1:0:6e:65 null I (s=0,r=0,C) len=98
14:31:42.464382 33:0:0:0:0:0  3d:2:1:0:6e:65 null I (s=0,r=0,C) len=98
14:31:42.614922 33:0:0:0:0:0  3d:2:1:0:6e:65 null I (s=0,r=0,C) len=98
15:06:10.377268 33:0:0:0:0:0  3d:2:1:0:6e:65 null I (s=0,r=0,C) len=954
15:08:53.601656 33:0:0:0:0:0  3d:2:0:0:6e:65 null I (s=0,r=0,C) len=94
15:23:15.870547 33:0:0:0:0:0  3d:2:1:0:6e:65 null I (s=0,r=0,C) len=86
15:36:11.213396 33:0:0:0:0:0  3d:2:1:0:6e:65 null I (s=0,r=0,C) len=94
15:36:11.798560 33:0:0:0:0:0  3d:2:1:0:6e:65 null I (s=0,r=0,C) len=94
15:36:12.405731 33:0:0:0:0:0  3d:2:1:0:6e:65 null I (s=0,r=0,C) len=94

I'm curious what these mean but Google and misc archives haven't shed
much light for me. The MAC addresses (?) don't match anything I know of.

Can anyone point me to a reference or explanation?

TIA,
RPK.



Re: is there a way to block sshd trolling?

2005-09-23 Thread Abraham Al-Saleh
just to add my $0.02. The best they could hope for would be disallowing your
default gateway from connecting to your ssh server... whoop-de-doo.

On 9/23/05, Wolfgang S. Rupprecht 
[EMAIL PROTECTED] wrote:

 [EMAIL PROTECTED] writes:
  My only question is what if I traceroute to you, find out the IP number
 of your upstream router? Then I make a bunch of connection attempts to your
 IP but forge the packets to make them look like they came from your
 upstream. Don't *you* end up blacklisting your default route and you become
 'so long suckah'd?

 This isn't a problem for 2 reasons.

 1) The upstream router isn't likely to be the destination of any
 packet in a consumer-isp situation. Only if you are running some
 routing protocol that uses that upstream router as an endpoint
 (eg. rip, ospf, etc) will a block against that router's IP matter
 to you.

 I've heard of cases where folks intentionally add an IP-level block
 against their ISP's whole infrastructure. (Some ISP's don't allow
 any servers. If they find an sshd hanging on port 22 are they
 going to hassle you? Just block 'em.)

 2) Forging the source IP in a TCP packet and succeeding in negotiating
 the 3-way handshake isn't all that simple any more. I wouldn't
 worry about it. If someone could forge that reliably, there is
 much better game to go after (like breaking into machines that
 still use IP addresses for authorization.) Someone spoofing an IP
 so that you mistakenly block an innocent party is pretty much
 wasting a good trick.

 -wolfgang



Re: is there a way to block sshd trolling?

2005-09-23 Thread Spruell, Darren-Perot
From: Wolfgang S. Rupprecht
 2) Forging the source IP in a TCP packet and succeeding in negotiating
the 3-way handshake isn't all that simple any more.  I wouldn't
worry about it.  If someone could forge that reliably, there is
much better game to go after (like breaking into machines that
still use IP addresses for authorization.)  Someone spoofing an IP
so that you mistakenly block an innocent party is pretty much
wasting a good trick.

Is it possible at all? You spoof your address to appear as my ISP for the
source address of a TCP connection. You send a SYN packet seeming to appear
from the ISP. I send SYN+ACK back to that ISP address. ISP drops it because
that address never sent SYN in first place. You never get anything back,
neither do I, and no TCP handshake occurs.

Or does this involve a much more sophisticated attack than I'm imagining?

DS



Re: is there a way to block sshd trolling?

2005-09-23 Thread Wolfgang S. Rupprecht
Spruell, Darren-Perot [EMAIL PROTECTED] writes:
 From: Wolfgang S. Rupprecht
 2) Forging the source IP in a TCP packet and succeeding in negotiating
the 3-way handshake isn't all that simple any more.  I wouldn't
worry about it.  If someone could forge that reliably, there is
much better game to go after (like breaking into machines that
still use IP addresses for authorization.)  Someone spoofing an IP
so that you mistakenly block an innocent party is pretty much
wasting a good trick.

 Is it possible at all? You spoof your address to appear as my ISP for the
 source address of a TCP connection. You send a SYN packet seeming to appear
 from the ISP. I send SYN+ACK back to that ISP address. ISP drops it because
 that address never sent SYN in first place. You never get anything back,
 neither do I, and no TCP handshake occurs.

 Or does this involve a much more sophisticated attack than I'm imagining?

Spoofing the tcp connection is possible if you can guess what was in
the packet that the other side sent back in response to the first
spoofed syn.  Obviously you'll never see the packet, but the only
thing that you need to know that isn't obvious is the initial sequence
number.  Back in the early days of BSD the initial tcp-sequence number
wasn't all that hard to guess.  Predicting it was relatively easy if
the other side was a BSD system that didn't have too many tcp
connections per second.  

After each tcp connections the kernel incremented the initial sequence
number by some small, fixed amount.  Connecting up to any tcp port
would tell you what the kernel was currently using.  Connecting a few
times in a row would tell you how much it incremented the initial
number by for each connection.  It also gave on a rough idea how many
connections per second the kernel was seeing.

-wolfgang



Re: Any advice on 'Indemnification'? (US Only, obviously)

2005-09-23 Thread Nick Holland
L. V. Lammert wrote:
 I have been working with a local OS friendly hosting company to add support 
 for OpenBSD. Unfortunately, they also support with Red Hat, SuSE, and 
 Apple, and these vendors offer an 'Open Source Indemnification', ostensibly 
 protecting against legal action from contributors.
 
 Of course, the OBSD project is meticulous about good copyright practices, 
 so WE all know this isn't an issue here, but, unfortunately, the hosting 
 company has lawyer(s) asking for similar 'Indemnification' for OBSD before 
 they will officially allow OBSD on premesis.
 
 Question - I know that copyright law trumps 'indemnification' - especially 
 given the BSD licenses on all project s/w, but has anyone dealt with this 
 issue before? Can anyone point me to any legal resources that I could pass 
 along to help satisfy the lawyers?

Well, you could try a little logic with the suits.
  1) Do they permit W2k?  I glanced at the license there, didn't see any
indemnification promises there.  What if GNU sues MS and all users of
W2k over improper use of code (a common bug between GPL'd code and
Windows would be pretty good evidence of such borrowing).  How about
every other piece of software they run on their servers?
  2) What if someone runs Application X on their legally safe Redhat
server?  Do they audit the systems to make sure *every* app offers
indemnification?  We had a situation at my employer recently where we
had to custom compile Apache from source on an SuSE box.  Were we
still indemnified then?
  3) Indemnification for the ISP?  I've not looked over any of those
contracts, but the hosting company seems to be really far out on the
liability limb, would they really be protected by what you run on your
machine?  If it is your machine, are they really claiming they have to
make sure your software meets their standards?  Are they going to do
this for people running supported OSs?  If they are dictating
standards, are they going to accept the responsibilty for those decisions?
  4) Point out that OpenBSD created and maintains OpenSSH.  I'm sure
they would feel happy to follow the logic of their desire to be legal
risk-free and remove all Cisco, Linux, and lots of other products.
Sure, they may claim that Redhat provides indemnification for OpenSSH.
  *IF* that's true, apparently they are either pretty confident there is
no problem with OpenSSH (which might imply that the OpenBSD project is
pretty careful), or they don't think the real risk of a lawsuit over
this stuff is significant, and it's all a big marketing game (scare you
into using our product...i.e., FUD with the emphisis on F)
  5) Anyone done a check to see if RedHat/SuSE/Apple really have the
spare cash to spend on someone else's defense?
  6) Do they feel confident that if you switch to one of the supported
OSs at their demand, and if your box gets rooted and lots of people's
credit card numbers (or similar) gets scattered across the 'net, that
they won't have their pants sued off them by you and your customers for
forcing you to run crapware (you probably wouldn't win that suit, but
you could end up costing them a lot of money defending it)?
  7) Do they understand that it is your money to spend with whatever
vendor they wish, and I doubt they are the only hosting company around?

Not sure any one of those is a killer argument, but might get them to
think about what it is they are requesting.

Nick.



upgrade is it important ?

2005-09-23 Thread Budhi Setiawan
dear all

i guess this is stupid question, but since i very young in the openbsd land, i 
have a lof of question :

1. how important to make our system (OS and packages) always up-to-date ( 
except with security reason of course ), because some people says 
you should update your system at least once a year

2. if i'm doing upgrade from 3.7 to 3.8, what happen to my old program's since 
my old program's using the old librari's ? is it still works without 
recompiling ?

3. and another if, how to make my system clean after i'm upgrade from one 
version to another version ? because i still see the old libraries from the old 
version !

thank's

-- 
/Budhi Setiawan



Re: passive ftp-ssl client behind OpenBSD 3.7 NAT/pf

2005-09-23 Thread Daniel Smereka
Hi Ed thx for the reply.  First I should mention that all non-ssl ftp traffic 
works great through the firewall (setup according to FAQ on openbsd site).
 
My setup is:
 
my client - my nat'd OpenBSD - internet - remote ftp-ssl server
 
I don't have any control over the remote server.  The client simply hangs 
saying Connected to server on port 21. Waiting for response
 
I did a tcpdump on the internal nic during a connection attempt from the client:
 
 tcpdump -ttt -n -i vr0 host remote_ip

Sep 23 19:01:51.887070 192.168.1.111.1156  remote_ip.21: S 
34496577:34496577(0) win 8192 mss 1460 (DF)
Sep 23 19:01:51.887122 remote_ip.21  192.168.1.111.1156: S 
2282047294:2282047294(0) ack 34496578 win 16384 mss 1460
Sep 23 19:01:51.887433 192.168.1.111.1156  remote_ip.21: . ack 1 win 8760 (DF)
Sep 23 19:02:56.887799 192.168.1.111.1156  remote_ip.21: F 1:1(0) ack 1 win 
8760 (DF)
Sep 23 19:02:56.887840 remote_ip.21  192.168.1.111.1156: . ack 2 win 17520

and another on the external nic at the same time:
 
 tcpdump -ttt -n -i fxp0 host remote_ip

 
Sep 23 19:01:51.891462 my_external_ip.63441  remote_ip.21: S 
3772606012:3772606012(0) win 16384 mss 1460,nop,nop,sackOK,nop,wscale 
0,nop,nop,timestamp 3166560978 0 (DF)
Sep 23 19:01:57.883262 my_external_ip.63441  remote_ip.21: S 
3772606012:3772606012(0) win 16384 mss 1460,nop,nop,sackOK,nop,wscale 
0,nop,nop,timestamp 3166560990 0 (DF)
Sep 23 19:02:09.883267 my_external_ip.63441  remote_ip.21: S 
3772606012:3772606012(0) win 16384 mss 1460,nop,nop,sackOK,nop,wscale 
0,nop,nop,timestamp 3166561014 0 (DF)
Sep 23 19:02:33.883268 my_external_ip.63441  remote_ip.21: S 
3772606012:3772606012(0) win 16384 mss 1460,nop,nop,sackOK,nop,wscale 
0,nop,nop,timestamp 3166561062 0 (DF)
 
I would appreciate if anyone can help me understand the tcpdump output.  thx
 Click here to donate to the Hurricane Katrina relief effort. 



Re: upgrade is it important ?

2005-09-23 Thread Chris
Budhi Setiawan wrote:
 dear all
 
 i guess this is stupid question, but since i very young in the openbsd land, 
 i have a lof of question :
 
 1. how important to make our system (OS and packages) always up-to-date ( 
 except with security reason of course ), because some people says 
 you should update your system at least once a year

Depends on you really. I keep my ports tree up to date on a weekly
basis. My src tree - only when SA's are out or I wish to upgrade to a
new release - Then again, FreeBSD allows you to do that - I have not
done that with Open. I always pretty much wiped and reinstalled - seems
like a waste, but that be on my own ignorance.

 2. if i'm doing upgrade from 3.7 to 3.8, what happen to my old program's 
 since my old program's using the old librari's ? is it still works without 
 recompiling ?

OpenBSD and FreeBSD do things differantly here. While Open prefers you
to use and do binary installs of packages (thus the reason they are
called packages) you still can grab the ports tree and work from there.

To me, FreeBSD is far superior when it comes to update/upgrading the
ports tree agains the installed ports. Meaning, there are ports in the
ports tree of FreeBSD that allows you to do just that - somewhat
effortlessly.

Don't get me wrong - I adore Open, but I like to upgrade the src tree
and ports tree within releases and after. FreeBSD is just more flexable
- then again, I speak from a biased point of view - meaning, I have been
with FBSD since 2.2.8

If you find Open to rigit for your tastes, try FreeBSD. However, there
will be a learing curve if you wish to maintane ports and src.

 3. and another if, how to make my system clean after i'm upgrade from one 
 version to another version ? because i still see the old libraries from the 
 old version !

I have never upgraded Open from one version to another. It may be very
simple - To me (again I'm biased) FreeBSD gives you that playability.

These are just my opinions of course.


-- 
Best regards,
Chris

You can make it foolproof, but you can't make it
damnfoolproof.



Re: is there a way to block sshd trolling?

2005-09-23 Thread Eike Lantzsch
On Friday 23 September 2005 14:40, John Marten wrote:
 You know what i mean? Every day I get some script kiddie, or adult
 trying to guess usernames or passwords.
 I've installed the newest version of SSH, so i'm covered there. But I
 still get a dozen or 2 of the
 sshd Invalid user somename from ###.##.##.###
 input_userauth_request: ivalid user somename
 Failed password for invalid user somename
 Recieved disconnect from ###.##.##.###
 Someone told me to add a 'block in quick on $net inet proto {tcp,udp}
 from ###.##.##.### to any flags S/SA'
 entry in my pf.conf file. But if I had do that for every hacker my
 pf.conf would be huge!
 There's got to be a better way, and I'm open to suggestions.


 John F. Marten III

 Information Technology Special

Don't know if this is better and then better in what sense but here it 
goes and it's easy as pie:
I installed denyhosts - a python script. Obvious downside is that you need 
to install python. Only adjustment you need to do is that denyhosts looks 
into /var/log/authlog for OBSD instead of /var/log/auth.log for Linux.
My /etc/hosts.deny is growing steadily ever since ...

Kind regards, Eike

-- 
Eike Lantzsch ZP6CGE
Casilla de Correo 1519
Asuncion / Paraguay
Tel.: 595-21-578698 FAX: 595-21-578690



Re: Max number of states in pf? (100k? 200k? 1M?)

2005-09-23 Thread Ted Unangst
On Fri, 23 Sep 2005, nate wrote:

 ok thats the kind of info I wanted to hear, so kernel
 space can go up to ~300MB ? is this a tunable
 paramter anywhere or is it hard coded?

it is actually 768MB on i386, but you can't use anywhere close to all of 
it for pf states.  it is hard coded.

 is this a low memory vs high memory thing? if so is
 there a good way to monitor low memory on openbsd?
 I tried doing some google searches and all I found was
 people running out of memory.

there is no way i know of to monitor it.  what matters is not memory, but 
address space.

 also one last Q - when you allocate memory for states
 in the pf config, say I allocate for 200k states does
 that allocation happen when the config is loaded or
 is it dynamic? Just wondering if I do exceed the limit
 should I expect it to misbehave immediately upon
 reload(even if it isn't holding that many states) or
 not until it actually hits the state limit.

states are only allocated on demand.  you could set the limit to a billion 
with no problem until you actually start using too many states.  the limit 
is there to protect you from the firewall imploding.


-- 
And that's why your software sucks.



Re: is there a way to block sshd trolling?

2005-09-23 Thread Bryan Irvine
 Some intelligent scripts look at tcp responses to port scans, ssh
 responds with SSH-2.0, which isn't too hard to identify. I don't know if
 changing the greeting would break the protocol, but I suspect it might
 break certain clients.

I wonder if it's possible to fingerprint these programs.  I actually
have a copy of the ssh-scanner that they use.  I got it by looking at
the hack logs on a Linux server and going to the same FTP site they
used (anonymous ftp even ;).

The program that most of you see is probably Skara.  If you're
interested you run the program by doing ./a xxx.xxx where xxx.xxx is
the first 2 octects of the network you want to scan (it only does
class b).  Once it finds all the servers running ssh, it then forks
and runs ssh-scan on each and just crashes through the dictionary,
till it finds some servers, and reports the findings.  Usually
something stupid like admin/admin or vmail/vmail.  I ran it on my
network to look for things that may have been done sloppily.  I
actually did find one server where someone had created a user of
test with the pasword of test...nice.

As long as you have secure passwords, I'd recomend just logging in as
a standard user, and using su so that you don't see all those logs.

Keep in mind that they are just kiddies scanning class b's so there's
probably better things to worry about.

A lot of nice tips though.  I've learned a lot about PF just reading the thread.


--Bryan



Re: is there a way to block sshd trolling?

2005-09-23 Thread Ray Percival
On Fri, Sep 23, 2005 at 08:24:15PM -0700, Bryan Irvine wrote:
  Some intelligent scripts look at tcp responses to port scans, ssh
  responds with SSH-2.0, which isn't too hard to identify. I don't know if
  changing the greeting would break the protocol, but I suspect it might
  break certain clients.
 
 I wonder if it's possible to fingerprint these programs.  I actually
 have a copy of the ssh-scanner that they use.  I got it by looking at
 the hack logs on a Linux server and going to the same FTP site they
 used (anonymous ftp even ;).
I use the blocker script from this article. Seems to work pretty well. I'd just 
block Linux but I have a few friends who have yet to see the OpenBSD light. 
http://www.undeadly.org/cgi?action=articlesid=20041231195454mode=expanded
 
 The program that most of you see is probably Skara.  If you're
 interested you run the program by doing ./a xxx.xxx where xxx.xxx is
 the first 2 octects of the network you want to scan (it only does
 class b).  Once it finds all the servers running ssh, it then forks
 and runs ssh-scan on each and just crashes through the dictionary,
 till it finds some servers, and reports the findings.  Usually
 something stupid like admin/admin or vmail/vmail.  I ran it on my
 network to look for things that may have been done sloppily.  I
 actually did find one server where someone had created a user of
 test with the pasword of test...nice.
 
 As long as you have secure passwords, I'd recomend just logging in as
 a standard user, and using su so that you don't see all those logs.
Yeah. This is only a threat against *really* weak boxes. Having said that I've 
seen a lot of posts talking about changing ports. That's a line that I won't 
cross. I refuse to hide from the bots and it's not even a speedbump against 
somebody who is a real threat. But that just my personalline in the sand. 
 
 Keep in mind that they are just kiddies scanning class b's so there's
 probably better things to worry about.
 
 A lot of nice tips though.  I've learned a lot about PF just reading the 
 thread.
 
 
 --Bryan
 

-- 
BOFH excuse #345:

Having to manually track the satellite.