binding ftpd

2006-07-03 Thread Lawrence Horvath

Is there any way at all to bind ftpd to a single ip, i would like to
keep ftpd running on one ip of my server while i setup and play with
proftpd on another ip, the man page for ftpd says nothing about being
able to bind but is there any other way, Jerry Rig it if you will.

Thanks

--
-Lawrence



Re: binding ftpd

2006-07-03 Thread Philip Guenther

On 7/3/06, Lawrence Horvath [EMAIL PROTECTED] wrote:

Is there any way at all to bind ftpd to a single ip, i would like to
keep ftpd running on one ip of my server while i setup and play with
proftpd on another ip, the man page for ftpd says nothing about being
able to bind but is there any other way, Jerry Rig it if you will.


Run it from inetd using the IP:service syntax for the first field in
the inetd.conf, ala:

10.0.0.1:ftpstream  tcp nowait  root
/usr/libexec/ftpd   ftpd -US

c.f. inetd.conf(5) for details.

Philip Guenther



Re: Patent jeopardizes IETF syslog standard

2006-07-03 Thread laurent FANIS

Greetings

Couldn't resist asking but can they really patent :
sending formatted data over SSL ?
That is just plain ridiculous !!
If i remember correctly the is also an RFC just for syslog under BSD.
A lot of devices already have syslog build in (for instance my AP
piece of crap USR has a syslog function) machines are going to be
pulled of the market ? That is plain dumb, we are heading for another
one of those frenzy lets patent everything.

Best regards Laurent

On 7/3/06, J.C. Roberts [EMAIL PROTECTED] wrote:

On Sun, 2 Jul 2006 15:52:57 -0400, Nick Guenther [EMAIL PROTECTED]
wrote:

On 7/1/06, J.C. Roberts [EMAIL PROTECTED] wrote:
 On Fri, 30 Jun 2006 12:54:14 +0300, Alexey E. Suslikov
 [EMAIL PROTECTED] wrote:

 Patent jeopardizes IETF syslog standard. Read here
 http://trends.newsforge.com/article.pl?sid=06/06/28/2320232

 This sucks. It's no different than what Cisco did with their HSRP patent
 to try to kill off VRRP. The Huawei IPR claim to the IETF is nearly
 identical to the crap Cisco put out years ago in their IPR claim.

 https://datatracker.ietf.org/public/ipr_detail_show.cgi?ipr_id=724

 The end result is we have CARP, a patent busting implementation that is
 far better than either of the originals...

 Will they never learn?

 Anyone in the mood for slog ?

Isn't syslog just like... send random data on port 514 to whoever and
they record it? How can you possibly patent that? That would be like
patenting talking.

-Nick

Basically you are correct about *current* syslog implementations. The
two goals of the syslog standard work being done are (1) defining a
message format and (2) providing a secure transport of said messages.

In short, secure inter-operability of syslog across various systems.

No one knows what's in the sealed patent application at the moment
since it has not been publicly released but considering the guys
claiming the patent have been involved in the syslog standards process,
you can reasonably certain some degree of dishonesty and corruption are
involved.

JCR


--
Free, Open Source CAD, CAM and EDA Tools
http://www.DesignTools.org




Re: Patent jeopardizes IETF syslog standard

2006-07-03 Thread J.C. Roberts
On Sun, 02 Jul 2006 22:09:02 -0600, Theo de Raadt
[EMAIL PROTECTED] wrote:

 Don't misunderstand me, CARP is an amazingly innovative and extremely
 useful implementation of a redundancy protocol. It's technically better
 than HSRP or any of the versions of VRRP but the problems till stands
 that it is not an official protocol, which simply means adoption and
 inter operability will suffer to some degree.

You are wrong.  It is officially free and unencumbered.

Now if you wish to redeclare the word official to mean because
some corporate people playing politics have dictated it be so,
fine, be that way.

But when you do so you are doing two things:

1. Limiting yourself.

2. Giving them the power to do it again.

I suppose that is your choice.  Keep saying that the Man is right.


I'm a bit confused by your reply. Yes, I kind of see what you mean but
it also seems I failed miserably to write things clearly. By putting
Official in quotes, I was trying to point out the stupidity of the bad
corporate decisions that occur far too often. 

There are countless corporate idiots which make the wrong choice because
they like to waive a nonsense marketing banner saying that they are
Compliant with some official standard, regardless if there is a
standardized, completely free, unincumbered and technically superior
replacement available. Those bad decisions do slow adoption of a free
replacement (CARP) and in general, affect inter operability of systems
because they chose to support some encumbered protocol rather than CARP.

I can kind of see how saying their decisions are wrong/bad might be
limiting but I don't understand how it would give them more power to do
it again?

I've got this bad feeling that I'm missing something that should be
totally obvious... please apply the clue stick.

jcr


--
Free, Open Source CAD, CAM and EDA Tools
http://www.DesignTools.org



Re: Patent jeopardizes IETF syslog standard

2006-07-03 Thread Theo de Raadt
 I'm a bit confused by your reply. Yes, I kind of see what you mean but
 it also seems I failed miserably to write things clearly. By putting
 Official in quotes, I was trying to point out the stupidity of the bad
 corporate decisions that occur far too often. 
 
 There are countless corporate idiots which make the wrong choice because
 they like to waive a nonsense marketing banner saying that they are
 Compliant with some official standard, regardless if there is a
 standardized, completely free, unincumbered and technically superior
 replacement available. Those bad decisions do slow adoption of a free
 replacement (CARP) and in general, affect inter operability of systems
 because they chose to support some encumbered protocol rather than CARP.
 
 I can kind of see how saying their decisions are wrong/bad might be
 limiting but I don't understand how it would give them more power to do
 it again?
 
 I've got this bad feeling that I'm missing something that should be
 totally obvious... please apply the clue stick.

What did you miss?

By even using official in quotes, and your statement:

 Don't misunderstand me, CARP is an amazingly innovative and extremely
 useful implementation of a redundancy protocol. It's technically better
 than HSRP or any of the versions of VRRP but the problems till stands
 that it is not an official protocol, which simply means adoption and
 inter operability will suffer to some degree.

What are you doing?  You are saying that your prediction is that
it WILL suffer in adoption, it WILL suffer in inter operability.

Keep at it.  You might get what you want.  Because what you wrote, it
is what you wanted right?

The problem is there are a whole lot of people who are willing to discuss
the problems their ideas/implimentations face.  And it actually does
affect the adoption of our stuff.  That's because noone from a corporate
role would every say such a thing.

So go ahead, be honest.  Fight the losing fight.

The fact is that CARP (+ pfsync + sasync) kicks the crap out of anything
that is standardized..



Re: Patent jeopardizes IETF syslog standard

2006-07-03 Thread Clint Pachl

J.C. Roberts wrote:

Don't misunderstand me, CARP is an amazingly innovative and extremely
useful implementation of a redundancy protocol. It's technically better
than HSRP or any of the versions of VRRP but the problems till stands
that it is not an official protocol, which simply means adoption and
inter operability will suffer to some degree.


Adoption and interoperability are immaterial if everything is OBSD of 
course. I wonder what percentage of people using OBSD face 
interoperability issues? Isn't CARP so easy, and OBSD in general, that 
you just want to install it on all of your machines?


-pachl



Re: Patent jeopardizes IETF syslog standard

2006-07-03 Thread J.C. Roberts
On Mon, 3 Jul 2006 09:40:01 +0300, laurent FANIS
[EMAIL PROTECTED] wrote:

Couldn't resist asking but can they really patent :
sending formatted data over SSL ?
That is just plain ridiculous !!

As far as I know, at the moment it's only a patent *application* rather
than a granted patent. You can *apply* for a patent on anything you like
but that doesn't mean the patent will be granted.

If i remember correctly the is also an RFC just for syslog under BSD.
A lot of devices already have syslog build in (for instance my AP
piece of crap USR has a syslog function) machines are going to be
pulled of the market ? That is plain dumb, we are heading for another
one of those frenzy lets patent everything.

You a said another ? -Unfortunately, the frenzy has never stopped or
even slowed down, instead, it's only continued to grow worse.

jcr


--
Free, Open Source CAD, CAM and EDA Tools
http://www.DesignTools.org



IPSec unspec transport

2006-07-03 Thread Massimo Lusetti
I got a VPN network which works quite well, i mean works very well
thanks to OpenBSD and its implementation but i got one end point over
the 6 running which causing me troubles.

The configuration is done with ipsec.conf and is identical to others
which works well.
Here some example config:
ike esp from $MY_NET to $OTHER_NET   peer $VPN_PEER main auth hmac-md5
enc aes

Isakmpd is started with no .conf and .policy just with -K and use IPv4
private/pubkeys as identifiers on public static IPs.

This all on a
OpenBSD 3.9-current (GENERIC-RD) #0: Tue Mar 28 12:41:04 EST 2006

From the troubling VPN gateway and respectively from the central VPN
gatewayt i (apparently randomly) got:
unspec transport from x.y.w.z to z.w.y.x spi 0xa0a35d6a

and the tunnel with the flows along falls.

What unspec transport actually means?
What could cause the above message?

Any hint is really appreciated, thanks.
-- 
Massimo



Re: Patent jeopardizes IETF syslog standard

2006-07-03 Thread J.C. Roberts
On Mon, 03 Jul 2006 01:14:59 -0600, Theo de Raadt
[EMAIL PROTECTED] wrote:

 I'm a bit confused by your reply. Yes, I kind of see what you mean but
 it also seems I failed miserably to write things clearly. By putting
 Official in quotes, I was trying to point out the stupidity of the bad
 corporate decisions that occur far too often. 
 
 There are countless corporate idiots which make the wrong choice because
 they like to waive a nonsense marketing banner saying that they are
 Compliant with some official standard, regardless if there is a
 standardized, completely free, unincumbered and technically superior
 replacement available. Those bad decisions do slow adoption of a free
 replacement (CARP) and in general, affect inter operability of systems
 because they chose to support some encumbered protocol rather than CARP.
 
 I can kind of see how saying their decisions are wrong/bad might be
 limiting but I don't understand how it would give them more power to do
 it again?
 
 I've got this bad feeling that I'm missing something that should be
 totally obvious... please apply the clue stick.

What did you miss?

By even using official in quotes, and your statement:

 Don't misunderstand me, CARP is an amazingly innovative and extremely
 useful implementation of a redundancy protocol. It's technically better
 than HSRP or any of the versions of VRRP but the problems till stands
 that it is not an official protocol, which simply means adoption and
 inter operability will suffer to some degree.

What are you doing?  You are saying that your prediction is that
it WILL suffer in adoption, it WILL suffer in inter operability.

Keep at it.  You might get what you want.  Because what you wrote, it
is what you wanted right?

The problem is there are a whole lot of people who are willing to discuss
the problems their ideas/implimentations face.  And it actually does
affect the adoption of our stuff.  That's because noone from a corporate
role would every say such a thing.

So go ahead, be honest.  Fight the losing fight.

The fact is that CARP (+ pfsync + sasync) kicks the crap out of anything
that is standardized..

Got it. It's the ``self-fulfilling prophecy '' thing. Thanks.

jcr


--
Free, Open Source CAD, CAM and EDA Tools
http://www.DesignTools.org



Re: Patent jeopardizes IETF syslog standard

2006-07-03 Thread laurent FANIS

On 7/3/06, J. C. Roberts [EMAIL PROTECTED] wrote:

On Mon, 3 Jul 2006 09:40:01 +0300, laurent FANIS
[EMAIL PROTECTED] wrote:

Couldn't resist asking but can they really patent :
sending formatted data over SSL ?
That is just plain ridiculous !!

As far as I know, at the moment it's only a patent *application* rather
than a granted patent. You can *apply* for a patent on anything you like
but that doesn't mean the patent will be granted.


Yeah that is true i didn't see it but wouldn't be possible to buy off
people ?I mean the company is in china and it is a country that has a
certain degree of corruption.This is what i'm afraid of too.And
countries/companies  are bending over to get parts in the country
growing economics (cough *yahoo* cough *google*).Anyways that is
off-topic and I don't have that much liberties in my country so i will
shut up now.


If i remember correctly the is also an RFC just for syslog under BSD.
A lot of devices already have syslog build in (for instance my AP
piece of crap USR has a syslog function) machines are going to be
pulled of the market ? That is plain dumb, we are heading for another
one of those frenzy lets patent everything.

You a said another ? -Unfortunately, the frenzy has never stopped or
even slowed down, instead, it's only continued to grow worse.


Well i felt it calmed down a little after some debacle in the
states,but then again i was wrong , sorry .

Best Regards Laurent.



Re: IPSec unspec transport

2006-07-03 Thread Clint Pachl

Massimo Lusetti wrote:

I got a VPN network which works quite well, i mean works very well
thanks to OpenBSD and its implementation but i got one end point over
the 6 running which causing me troubles.

The configuration is done with ipsec.conf and is identical to others
which works well.
Here some example config:
ike esp from $MY_NET to $OTHER_NET   peer $VPN_PEER main auth hmac-md5
enc aes


Are both end points trying to negotiate? Try using the passive keyword 
on one endpoint: ike passive esp ...



Isakmpd is started with no .conf and .policy just with -K and use IPv4
private/pubkeys as identifiers on public static IPs.

This all on a
OpenBSD 3.9-current (GENERIC-RD) #0: Tue Mar 28 12:41:04 EST 2006


From the troubling VPN gateway and respectively from the central VPN

gatewayt i (apparently randomly) got:
unspec transport from x.y.w.z to z.w.y.x spi 0xa0a35d6a

and the tunnel with the flows along falls.

What unspec transport actually means?
What could cause the above message?


I have experienced the same issue. I don't know the details of what 
exactly is happening, however, it seems to be a synchronization problem. 
Here's what I have done to get rid of the unspec transport and setup 
the proper flows and SAs:


Execute on the passive box first, then the other:
# ipsecctl -F
# echo R  /var/run/isakmpd.fifo
# ipsecctl -f /etc/ipsec.conf

Note: if you have other flows and SAs setup that you want to preserve, 
ipsecctl -F may be hazardous.


Also, make sure all IP addresses in ipsec.conf are reachable; check 
netstat -rnfinet.


-pachl



inetd on by default

2006-07-03 Thread coolzone
Hi

Here we go again, why is inetd on by default?

I am very sorry to ask this question! My guess is that it has been asked a
thousand times. I did look in the archives and on google, trying to find a
clear answer but I must have mised it.

The note on the inetd.conf file, which states, that it is almost always
needed, doesn't provide that as the reason why it is on.

The reason why I post this is because I have read many times about OpenBSD,
that EVERYTHING is off by default. I never gave it much thought until I had to
do some testing at work, with both FreeBSD and NetBSD. I was rather surprised
that both FreeBSD and NetBSD have inetd off by default but OpenBSD doesn't. So
what? So nothing!

One of the first things I do, after installing OpenBSD, is to turn it off.
Later if needed I turn it on but I have never needed it except on a machine
running tftp. 

I do understand that since it is running by default it doesn't provide a risk,
otherwise OpenBSD would have turned it off. 

With the risk of being flamed: In my opinion it should be off be default. That
way absolutely nothing is running before it is turned on by the user. 

Best and kind regards,
Rico



Re: starting Apache in SSL mode

2006-07-03 Thread Joachim Schipper
On Sun, Jul 02, 2006 at 10:32:12PM +0200, FTP wrote:
 On Tue, Jun 27, 2006 at 05:03:52PM +0200, FTP wrote:
  when I try to access the site via lynx I do get an SSL error message
  moaning that I have a self-signed cert. After accepting this, the
  page gets dispalyed.  So it looks like the problem is with the CA?
  How do I correct that?  I found the a reference in
  manual/mod/mod_ssl/ssl_faq.html#ToC24 but mentions a sign.sh
  script wich isn't present in the OBSD package. 
 
 any chance to draw some attention to the above?

There are two basic solutions:
1. Get a certificate from a commercial CA - Verisign, Thawte,
and the like. This will be trusted by default in most applications,
especially browsers.
2. Create your own certificate, or whole CA chain. In this case,
you'll have to tell applications and visitors to accept the certificate.
I created my own CA, and had it sign one certificate per service. The
users then import the CA (in the ideal world) or just click 'accept
always' or the equivalent in their browser/mail client/... (in the real
world). [1]

If you want to go with the second option, Google has lots of HOWTO's.
It's not too difficult, but it does cost some work - and, being crypto,
finding out just why it doesn't work is not trivial.

Joachim

[1] And then complain when the certificate expires. Well, the CA has a
much longer lifetime...



Re: Patent jeopardizes IETF syslog standard

2006-07-03 Thread Martin Schröder

2006/7/3, laurent FANIS [EMAIL PROTECTED]:

Yeah that is true i didn't see it but wouldn't be possible to buy off
people ?I mean the company is in china and it is a country that has a
certain degree of corruption.This is what i'm afraid of too.


You are right to a degree (the patent will surely be tried in USA
too), but it's also a question of double standards. I wonder how the
USA will see the patent system in 2020 when most of the patents will
come out of China...

Best
  Martin



Re: Encryption and Compression with ipsecctl?

2006-07-03 Thread Markus Friedl
1. IPcomp is only used if it results in smaller packets
2. IPcomp on OpenBSD is broken and does not work correctly (some packets
   are not compressed correctly).

-m



Re: IPSec unspec transport

2006-07-03 Thread Massimo Lusetti
On Mon, 2006-07-03 at 00:51 -0700, Clint Pachl wrote:

 Are both end points trying to negotiate? Try using the passive keyword 
 on one endpoint: ike passive esp ...

Yes both active. Does that should cause problems?

 I have experienced the same issue. I don't know the details of what 
 exactly is happening, however, it seems to be a synchronization problem. 
 Here's what I have done to get rid of the unspec transport and setup 
 the proper flows and SAs:
 
 Execute on the passive box first, then the other:
 # ipsecctl -F
 # echo R  /var/run/isakmpd.fifo
 # ipsecctl -f /etc/ipsec.conf

I know how to put it up again and i actually use -d just to keep up
others tunnel.
Anyway you're telling me that every time your tunnel fall you are there
to cast that command to bring it up again? That's not suitable... :

What i really want to know (investigate) is what is causing this drops
since they happen just on one line not in the other and the devices are
all the same just as the OpenBSD version.

To add infos i just dropped down the max-mss size to a lower value cause
i was seeing a lot of DF! packets without that setting and now all
packets aren't fragmented by the routers between my peers.

Again i'm not so sure how this is related but digging through the
problem i've discovered that the time the tunnel fall is near the time
the ISP's router is negotiating its own wan IP address through PPPoA
with the ISP's kerberos server.
Does this sound resonable or it is totally unrelated?


 
 Also, make sure all IP addresses in ipsec.conf are reachable; check 
 netstat -rnfinet.

Double checked.

Thanks for your time
-- 
Massimo



Re: Boost OpenBSD security - Zophie for 3.9

2006-07-03 Thread Marcin Wilk

At 07:18 2006-07-03, you wrote:

On 7/2/06, Marcin Wilk [EMAIL PROTECTED] wrote:

At 22:35 2006-07-02, you wrote:
On Sun, Jul 02, 2006 at 12:20:49PM -0700, Greg Thomas wrote:
  On 7/2/06, Tobias Ulmer [EMAIL PROTECTED] wrote:
  On Sun, Jul 02, 2006 at 03:13:59PM +0200, Tomasz Zielinski wrote:
  Hello,
 
  Zophie is patch that contains new security features for 
OpenBSD 3.9. BSD

  license. I have not tested it personaly, but probably it's worth to
  analyze it and maybe even incorporate. More info:
  http://www.0penbsd.com/zophie.html, http://akcja.0penbsd.com/zosia/
 
  I normally don't take the bait, but this one is so cute...
 
  After reading through the diffs: (not supplied for added obfusication?)
 
  - add a new sysctl to the kernel.
  - patch some userland tools.
  - If this sysctl is set, supress certain information.
 
  Rocket sience! Even the dumbest scriptkiddie could just compile
  and run these tools from the original OpenBSD sources.
 
  Probably the whole Polish Underground Group profess OpenBSD OS as a
  religion is a big subtle joke? If so, well done and thanks 
for the good

  laugh :)
 
  If it is a subtle joke I sure like the screenshots of the install.

However, note that the page is quite frank about what is being done,
from the web page quoted above:

- kern.zophie.privacy
   This setting is responsible for process privacy in finger, last,
netstat, ps, users, w, and who.
   Value 1 turns on this feature.

This, obviously, still doesn't make it very useful (if only because,
even after you've mounted everything noexec, you still have top, and so
on and so forth) - but the above should be enough to arouse suspicion.

 Joachim

Process privacy itself is done in kernel so top  other tools (like
lsof for example) will not work.
Ps, users, w  who are pathed to not show other users that are in 
this is independent with process privacy.

You may find OpenBSD that is on screenshots here:
http://nicram.sytes.net/openbsd/openbsd-3.9-i386-zophie.iso
It is extactly same OpenBSD.
 yes it is very easy to make it on Your own :) This is how KISS apps
should be made, even when they change something in kernel :)

Best Regards


Do I understand correctly I could just cvs co usr/bin/who and use the
official who and see who is online?


Yes because only process privacy is done in kernel.



Re: IPSec unspec transport

2006-07-03 Thread Clint Pachl

Massimo Lusetti wrote:

On Mon, 2006-07-03 at 00:51 -0700, Clint Pachl wrote:

Are both end points trying to negotiate? Try using the passive keyword 
on one endpoint: ike passive esp ...


Yes both active. Does that should cause problems?


Here is what I have noticed while watching tcpdump: each end point will 
negotiate with the other end point at some time interval, which seems to 
be somewhat random. I have started both end points in active mode and 
because of the randomness and different times each isakmpd was started 
on each end point, one isakmpd is able to make the negotiation before 
the other one and every thing works fine. However, (and I may be totally 
wrong here) at some agreed upon time in the future, new keys will be 
exchanged. This is where you may be running into problems, when both 
boxes are trying to initiate the exchange, creating an unknown state.


I have experienced the same issue. I don't know the details of what 
exactly is happening, however, it seems to be a synchronization problem. 
Here's what I have done to get rid of the unspec transport and setup 
the proper flows and SAs:


Execute on the passive box first, then the other:
# ipsecctl -F
# echo R  /var/run/isakmpd.fifo
# ipsecctl -f /etc/ipsec.conf


I know how to put it up again and i actually use -d just to keep up
others tunnel.


Very good, forgot to mention that.


Anyway you're telling me that every time your tunnel fall you are there
to cast that command to bring it up again? That's not suitable... :


Agreed, that is not suitable and I don't do that. I guess I 
misunderstood the point at which your failure was occurring. I believed 
it to be initially or some short time after you started each end point. 
In my experience, I am using IPSec to secure wireless clients to an AP. 
In my first configuration, all clients and the AP were ike negotiators, 
active, and I was experiencing unspec transport. I changed the 
ipsec.conf on the AP only to be a passive ike and ran the set of 
commands I mentioned earlier and everything worked.


I guess I assumed you changed your ipsec.conf, making one end point 
passive, hence the set of commands to put every thing in sync. Sorry I 
misunderstood.



What i really want to know (investigate) is what is causing this drops
since they happen just on one line not in the other and the devices are
all the same just as the OpenBSD version.


Is the traffic the same on each line? I have had much success with ssh, 
http, ftp, and ICMP traffic through my IPSec tunnel, however, X11 seems 
to be unreliable.


-pachl



Re: inetd on by default

2006-07-03 Thread Otto Moerbeek
On Mon, 3 Jul 2006, [EMAIL PROTECTED] wrote:

 Hi
 
 Here we go again, why is inetd on by default?
 
 I am very sorry to ask this question! My guess is that it has been asked a
 thousand times. I did look in the archives and on google, trying to find a
 clear answer but I must have mised it.
 
 The note on the inetd.conf file, which states, that it is almost always
 needed, doesn't provide that as the reason why it is on.
 
 The reason why I post this is because I have read many times about OpenBSD,
 that EVERYTHING is off by default. I never gave it much thought until I had to
 do some testing at work, with both FreeBSD and NetBSD. I was rather surprised
 that both FreeBSD and NetBSD have inetd off by default but OpenBSD doesn't. So
 what? So nothing!

You were misinformed that we shut everything off. We do not want to
create an unusable system.

 
 One of the first things I do, after installing OpenBSD, is to turn it off.
 Later if needed I turn it on but I have never needed it except on a machine
 running tftp. 

inetd provides a few standard services, like ident. Some things use
those services, like mail. 

 
 I do understand that since it is running by default it doesn't provide a risk,
 otherwise OpenBSD would have turned it off. 
 
 With the risk of being flamed: In my opinion it should be off be default. That
 way absolutely nothing is running before it is turned on by the user. 

It is useful, there's no risk and it consumes very little resources.
Why shut it off? You have given no reason other than: I do not like to
run it. So don't.

-Otto



ftp-proxy does not work in secure level 2

2006-07-03 Thread c.s.r.c.murthy
Hi,
We have configured a firewall with pf on openbsd-3.9. It is found that 
ftp-proxy is unable to operate when system is put in secure level 2. 
This is due to the fact that ftp-proxy can't add/delete rules in pf in 
secure level 2. But for security reasons we would like to have the 
system running in secure level 2. Is there a soultion to have the 
ftp-proxy working in secure level 2?


thanks in advance
murthy

[demime 1.01d removed an attachment of type APPLICATION/DEFANGED which had a 
name of murthy.23611DEFANGED-vcf]



Re: Boost OpenBSD security - Zophie for 3.9

2006-07-03 Thread Gillles Chehade
On Mon, 03 Jul 2006 12:47:40 +0200
Marcin Wilk [EMAIL PROTECTED] wrote:

 Do I understand correctly I could just cvs co usr/bin/who and use the
 official who and see who is online?
 
 Yes because only process privacy is done in kernel.
 

What's the point ?



kernel settings for pf default block

2006-07-03 Thread c.s.r.c.murthy
Hi,
This seems to be widely discussed problem in openbsd pf. There is no 
kernel parameter that makes the pf to block all packets by default. I 
have searched on the internet and found some discussion taken place in 
2005 regarding this. The discussion concludes no such parameter in 
kernel. Are there any changes done in openbsd latest to have a kernel 
configurable parameter to make pf block packets by default?

thanks in advance

murthy

[demime 1.01d removed an attachment of type APPLICATION/DEFANGED which had a 
name of murthy.20019DEFANGED-vcf]



kernel settings for pf default block

2006-07-03 Thread Alexey E. Suslikov
 This seems to be widely discussed problem in openbsd pf. There is no
 kernel parameter that makes the pf to block all packets by default. I
 have searched on the internet and found some discussion taken place in
 2005 regarding this. The discussion concludes no such parameter in
 kernel. Are there any changes done in openbsd latest to have a kernel
 configurable parameter to make pf block packets by default?

use siteXX.tgz to customize install/upgrade process
as you need including block all in /etc/pf.conf.

see http://www.openbsd.org/faq/faq4.html#site



Re: 3.9 freeze

2006-07-03 Thread Pedro Martelletto
Can you break into ddb?

-p.



Re: 3.9 freeze

2006-07-03 Thread diego
no, I can only ping the server or change tty (ctrl alt fn), but I can't type 
anything.



- Original Message - 
From: Pedro Martelletto [EMAIL PROTECTED]

To: diego [EMAIL PROTECTED]
Cc: misc@openbsd.org
Sent: Monday, July 03, 2006 9:34 AM
Subject: Re: 3.9 freeze



Can you break into ddb?

-p.




Re: 3.9 freeze

2006-07-03 Thread mickey
On Mon, Jul 03, 2006 at 09:45:22AM -0300, diego wrote:
 no, I can only ping the server or change tty (ctrl alt fn), but I can't 
 type anything.

you should sysctl ddb.console=1 for that to work...

 - Original Message - 
 From: Pedro Martelletto [EMAIL PROTECTED]
 To: diego [EMAIL PROTECTED]
 Cc: misc@openbsd.org
 Sent: Monday, July 03, 2006 9:34 AM
 Subject: Re: 3.9 freeze
 
 
 Can you break into ddb?
 
 -p.
 

-- 
paranoic mickey   (my employers have changed but, the name has remained)



Re: starting Apache in SSL mode

2006-07-03 Thread FTP
On Mon, Jul 03, 2006 at 10:47:04AM +0200, Joachim Schipper wrote:
 On Sun, Jul 02, 2006 at 10:32:12PM +0200, FTP wrote:
  On Tue, Jun 27, 2006 at 05:03:52PM +0200, FTP wrote:
   when I try to access the site via lynx I do get an SSL error message
   moaning that I have a self-signed cert. After accepting this, the
   page gets dispalyed.  So it looks like the problem is with the CA?
   How do I correct that?  I found the a reference in
   manual/mod/mod_ssl/ssl_faq.html#ToC24 but mentions a sign.sh
   script wich isn't present in the OBSD package. 
  
  any chance to draw some attention to the above?
 
 There are two basic solutions:
   1. Get a certificate from a commercial CA - Verisign, Thawte,
 and the like. This will be trusted by default in most applications,
 especially browsers.
   2. Create your own certificate, or whole CA chain. In this case,
 you'll have to tell applications and visitors to accept the certificate.
 I created my own CA, and had it sign one certificate per service. The
 users then import the CA (in the ideal world) or just click 'accept
 always' or the equivalent in their browser/mail client/... (in the real
 world). [1]
 
 If you want to go with the second option, Google has lots of HOWTO's.
 It's not too difficult, but it does cost some work - and, being crypto,
 finding out just why it doesn't work is not trivial.
 
   Joachim
 
 [1] And then complain when the certificate expires. Well, the CA has a
 much longer lifetime...


but I was following the procedure described in:
http://openbsd.org/faq/faq10.html#HTTPS

which normally should cover the self-signed cert part as well - or not?

Thanks

George



[OpenBGPd] Can a nexthop be set on routes announced as my network ?

2006-07-03 Thread Andrea Cocito

Hi,

after googling, rereading the manuals and lurking into the code I  
really could

not find a way to do this, unless I am missing something really simple!

I have two BGP routers on a small subnet where they peer with a transit
provider, the two routers have a carp shared IP aswell, thus each of  
them has

in there a $myip a $carpip and a $peerip

I wish that each of them when announcing the network I have in  
configuration
as network x.x.x.x/19 sends the announcement stating that $peerip  
is the
nexthop, I am not using depend options on carp, what I want is that  
the
traffic form the peer AS goes straight to the CARP IP (which  
failovers in 50 ms,

much faster than anything BGP can ever do..).

I have tried:

- Having inside the neighbor configuration block a set nexthop  
$carpip,

  but this seems to be plainly ignored

- Having an explicit match to $peerip set nexthop $carpip, but that  
seems

  to affect only routes re-announched to the peer and not routes coming
  from my network a.b.c.d/19 option.

- Checking into the code, from what I see into mrt.c, function
  mrt_dump_bgp_msg(), lines 123-124, the address placed into the BGP  
message
  is abruptly ((struct sockaddr_in *)peer-sa_local)- 
sin_addr.s_addr) which

  confirms why any option does not work.

I think that the possibility to announce an explicit nexthop to a  
peer for
our AS's network(s) would be useful not only with this specific setup  
but also
for all those who run BGP on an IP that is not the one of the  
router that

has to receive the traffic.

I am more than willing to change the code myself but an hint would be  
very
appreciated: am I missing something ? Is mrt_dump_bgp_msg() the right  
place to
do it ? Hints on how to make it configurable (I would say an option  
into the

peer or group configuration block).

Thank you for your attention and help.

A.

PS: I am off-list though I check it on  the web, cc: would be  
appreciated, thanks.





--
Andrea Cocito
[EMAIL PROTECTED]

IEO -- European Institute of Oncology
Department of Experimental Oncology
Fundamental Bioinformatics Research Unit - Director
Via Ripamonti 435
20141 Milano - Italy
tel: +39-02-57489857
fax: +39-02-57489851

IFOM -- FIRC Institute of Molecular Oncology
IT and Bioinformatics services - Coordinator
Via Adamello 16
20139 Milano - Italy
tel: +39-02-56816055
fax: +39-02-574303231



Re: [OpenBGPd] Can a nexthop be set on routes announced as my network ?

2006-07-03 Thread Claudio Jeker
On Mon, Jul 03, 2006 at 03:58:13PM +0200, Andrea Cocito wrote:
 Hi,
 
 after googling, rereading the manuals and lurking into the code I  
 really could
 not find a way to do this, unless I am missing something really simple!
 
 I have two BGP routers on a small subnet where they peer with a transit
 provider, the two routers have a carp shared IP aswell, thus each of  
 them has
 in there a $myip a $carpip and a $peerip
 
 I wish that each of them when announcing the network I have in  
 configuration
 as network x.x.x.x/19 sends the announcement stating that $peerip  
 is the
 nexthop, I am not using depend options on carp, what I want is that  
 the
 traffic form the peer AS goes straight to the CARP IP (which  
 failovers in 50 ms,
 much faster than anything BGP can ever do..).
 

Are you sure that you want to set the nexthop to $peerip. You send a
update to your peer with himself as nexthop?! -- this will not work.
I guess you want to set the nexthop to the $carpip instead.


 I have tried:
 
 - Having inside the neighbor configuration block a set nexthop  
 $carpip,
   but this seems to be plainly ignored
 

This will change the incomming routes and not the outgoing ones.
See man page almost all set options inside neighbor statements work on
incomming updates. You can verify that with bgpd -nvv where these set
roules are expanded to real filter rules.

 - Having an explicit match to $peerip set nexthop $carpip, but that  
 seems
   to affect only routes re-announched to the peer and not routes coming
   from my network a.b.c.d/19 option.
 

match to + set nexthop was broken until recently. The problem is that
nexthops are added and verified asynchronously and so setting them on
outgoing rules did not work. I fixed this by preloading nexthops that are
used by the filters.

 - Checking into the code, from what I see into mrt.c, function
   mrt_dump_bgp_msg(), lines 123-124, the address placed into the BGP  
 message
   is abruptly ((struct sockaddr_in *)peer-sa_local)- 
 sin_addr.s_addr) which
   confirms why any option does not work.
 

This has nothing to do with what is set as nexthop. mrt_dump_bgp_msg()
dumps a BGP message and in the header both the local and remote IP address
is stored. This header is written by mrt_dump_bgp_msg().


Have you tried
network a.b.c.d/19 set nexthop $carpip
this should already work with -stable.

 I think that the possibility to announce an explicit nexthop to a  
 peer for
 our AS's network(s) would be useful not only with this specific setup  
 but also
 for all those who run BGP on an IP that is not the one of the  
 router that
 has to receive the traffic.
 
 I am more than willing to change the code myself but an hint would be  
 very
 appreciated: am I missing something ? Is mrt_dump_bgp_msg() the right  
 place to
 do it ? Hints on how to make it configurable (I would say an option  
 into the
 peer or group configuration block).
 

First try the network a.b.c.d/19 set nexthop $carpip option if that does
not help you need to run a -current bgpd. Additionally mrt_dump_bgp_msg()
is totaly the wrong spot to fix this. The code is more in rde_update.c and
rde_filter.c plus some parts in rde_rib.c.

 Thank you for your attention and help.
 

No problem.
-- 
:wq Claudio



Re: ftp-proxy does not work in secure level 2

2006-07-03 Thread Camiel Dobbelaar
On Mon, 3 Jul 2006, c.s.r.c.murthy wrote:
 We have configured a firewall with pf on openbsd-3.9. It is found that 
 ftp-proxy is unable to operate when system is put in secure level 2. 
 This is due to the fact that ftp-proxy can't add/delete rules in pf in 
 secure level 2. But for security reasons we would like to have the 
 system running in secure level 2. Is there a soultion to have the 
 ftp-proxy working in secure level 2?

I don't think so.  Securelevel 2 makes sure that userland can no longer 
modify pf rules.  ftp-proxy is a userland program that modifies pf 
rules... both work that way by design.  Those are clearly opposites 
so it's not something that can be fixed, short of changing the design.

I'll add this to the CAVEATS section of the ftp-proxy manpage.

--
Cam



Re: Reading a file that is been written make the system freeze?

2006-07-03 Thread Federico Giannici

Federico Giannici wrote:

Pedro Martelletto wrote:

On Thu, Jun 22, 2006 at 03:25:41PM +0200, Federico Giannici wrote:

Yesterday another PC freezed!

It just crashed again!


did it freeze or did it crash?


I wrote it into the first email: it freezes with no error at all, no 
network, only freezed video.


Looking at the vmstat's output (copied below), I have noticed that the 
HighUse value of UVM amap is near the Limit value. If the value 
reach the Limit value, can this be the cause of the freezes?


Thanks.


Memory statistics by bucket size
Size   In Use   Free   Requests  HighWater  Couldfree
  1649512 163480  2830073091280   1313
  3239388 100132  399456442 640   1430
  6447091  33421  661407513 320  49732
 12829957  21051  104321973 160  39189
 25630799  28417   54954624  80 373841
 51219707  17973   21017834  40 795062
1024 5986   4302  119601358  20   18398836
2048 1154562 773127  10 306230
4096  4842381619835   51615453
8192   38 27  10932   5  10778
   163849  0  53806   5  0
   327683  0   1134   5  0
   655364  0253   5  0
  1310722  0 18   5  0
  2621441  0  4   5  0

Memory usage type by bucket size
Size  Type(s)
  16  devbuf, pcb, routetbl, sysctl, UFS mount, dirhash, exec, 
xform_data,

  VM swap, UVM amap, UVM aobj, USB, USB device, temp
  32  devbuf, pcb, routetbl, ifaddr, sem, dirhash, in_multi, exec,
  xform_data, UVM amap, USB, temp
  64  devbuf, pcb, routetbl, ifaddr, vnodes, dirhash, proc, VFS 
cluster,
  in_multi, ether_multi, exec, VM swap, UVM amap, USB, packet 
tags, NDP,

  temp
 128  devbuf, pcb, routetbl, ifaddr, UFS quota, UFS mount, sem, 
dirhash,

  ttys, pfkey data, inodedep, UVM amap, USB, NDP, temp
 256  devbuf, routetbl, ifaddr, ioctlops, vnodes, UFS mount, shm, 
dirhash,

  UVM amap, USB, USB device, temp
 512  devbuf, ifaddr, sysctl, ioctlops, mount, vnodes, UFS mount, 
VM map,

  dirhash, file desc, proc, NFS srvsock, NFS daemon, ttys, newblk,
  UVM amap, USB, USB device, temp
1024  devbuf, pcb, ioctlops, UFS mount, shm, dirhash, file desc, 
ttys, exec,

  UVM amap, crypto data, temp
2048  devbuf, ifaddr, ioctlops, namecache, UFS mount, file desc, proc,
  VM swap, UVM amap, UVM aobj, temp
4096  devbuf, ioctlops, UFS mount, shm, file, file desc, pagedep, 
UVM amap,

  temp
8192  devbuf, UFS mount, file, file desc, MSDOSFS mount, UVM amap
   16384  devbuf, NFS node, namecache, UFS quota, UFS mount, file, 
ISOFS mount,

  inodedep, indirdep, UVM amap, temp
   32768  devbuf, UVM amap
   65536  VM swap, UVM amap
  131072  VM swap, UVM amap
  262144  namecache, UVM amap

Memory statistics by type   Type  Kern
  Type InUse MemUse HighUse  Limit Requests Limit Limit Size(s)
devbuf  2000  1340K   1340K 78644K 20940 0 
16,32,64,128,256,512,1024,2048,4096,8192,16384,32768
   pcb6712K 38K 78644K  23425980 0 
16,32,64,128,1024
  routetbl94 9K 11K 78644K205810 0 
16,32,64,128,256
ifaddr5616K 16K 78644K   560 0 
32,64,128,256,512,2048

sysctl 2 1K  1K 78644K20 0  16,512
  ioctlops 0 0K  4K 78644K  8800 0 
256,512,1024,2048,4096

 mount 4 2K  3K 78644K50 0  512
  NFS node 116K 16K 78644K10 0  16384
vnodes4513K 93K 78644K   1012100 0  64,256,512
 namecache 3   274K274K 78644K30 0 
2048,16384,262144

 UFS quota3621K 21K 78644K   360 0  128,16384
 UFS mount1753K 53K 78644K   170 0 
16,128,256,512,1024,2048,4096,8192,16384
   shm72   282K   1062K 78644K598830 0 
256,1024,4096

VM map 3 2K  2K 78644K30 0  512
   sem 2 1K  1K 78644K20 0  32,128
   dirhash   28256K 83K 78644K   3579000 0 
16,32,64,128,256,512,1024
  file 0 0K 12K 78644K  1380 0 
4096,8192,16384
 file desc7244K142K 78644K655130 0 
512,1024,2048,4096,8192

  proc14 6K  6K 78644K   140 0  64,512,2048
   VFS cluster 0 0K 11K 78644K  34697140 0  64
   NFS srvsock 2 1K  1K 78644K20 0  512
NFS daemon  

Re: carp with hosts in different vlans

2006-07-03 Thread Sebastian Reitenbach
Hi,

sorry for late reply, unfortunately I was a bit off...

 On 2006/06/23 12:53, Sebastian Reitenbach wrote:
 Both hosts are in different VLAN's. to reach each other
 I have to set a host route via the default gateway to reach
 the other system.
 
 You need to be able to multicast between them to run CARP.
 Would your hosting provider be willing to move them into the
 same vlan?

before I am going to try that for ours to find out it will not work:

do I can setup a tunnel between both hosts, and route the mulitcast packets 
through the tunnel and then have the IP address shared between the two hosts?

kind regards
Sebastian
__
Erweitern Sie FreeMail zu einem noch leistungsstdrkeren E-Mail-Postfach!

Mehr Infos unter http://freemail.web.de/home/landingpad/?mc=021131



Re: ftp-proxy does not work in secure level 2

2006-07-03 Thread Joachim Schipper
On Mon, Jul 03, 2006 at 05:25:31PM -0700, c.s.r.c.murthy wrote:
 Hi,
 We have configured a firewall with pf on openbsd-3.9. It is found that 
 ftp-proxy is unable to operate when system is put in secure level 2. 
 This is due to the fact that ftp-proxy can't add/delete rules in pf in 
 secure level 2. But for security reasons we would like to have the 
 system running in secure level 2. Is there a soultion to have the 
 ftp-proxy working in secure level 2?

Camiel already pointed out that the answer is no.

As to securelevels, they are officially considered broken (which caused
quite a bit of a stir here on misc@). One obvious vulnerability is that
mounting stuff is still possible, and thus, what any filename points to
can be altered, even if the inode it originally pointed to has
restrictive flags set.

Plus, a quick look at securelevel(7) does not give any obvious benefit
for a firewall, except locking the pf rules - which doesn't work with
ftp-proxy, as you noted.

Some alternatives to ftp-proxy exist, like the pre-3.8 ftp-proxy and a
program called ftpsesame (sp?) that I know very little about. Both would
be able to work without changing pf rules from userspace, I believe - of
course, this also means they are quite a bit slower.

Joachim



Re: kernel settings for pf default block

2006-07-03 Thread Joachim Schipper
On Mon, Jul 03, 2006 at 05:30:44PM -0700, c.s.r.c.murthy wrote:
 Hi,
 This seems to be widely discussed problem in openbsd pf. There is no 
 kernel parameter that makes the pf to block all packets by default. I 
 have searched on the internet and found some discussion taken place in 
 2005 regarding this. The discussion concludes no such parameter in 
 kernel. Are there any changes done in openbsd latest to have a kernel 
 configurable parameter to make pf block packets by default?

Alexey already answered this, why do you repost it?

Joachim



Re: 3.9 freeze

2006-07-03 Thread diego

no...

- Original Message - 
From: vladas [EMAIL PROTECTED]

To: diego [EMAIL PROTECTED]
Sent: Monday, July 03, 2006 10:00 AM
Subject: Re: 3.9 freeze



On 03/07/06, diego [EMAIL PROTECTED] wrote:
no, I can only ping the server or change tty (ctrl alt fn), but I can't 
type

anything.


how about by ssh?



- Original Message -
From: Pedro Martelletto [EMAIL PROTECTED]
To: diego [EMAIL PROTECTED]
Cc: misc@openbsd.org
Sent: Monday, July 03, 2006 9:34 AM
Subject: Re: 3.9 freeze


 Can you break into ddb?

 -p.




openwebmail with chrooted apache

2006-07-03 Thread FTP
I installed openwebmail from the ports and when trying to launch:
http://your_server/cgi-bin/openwebmail/openwebmail.pl

I get a 500 error. I suppose that this is due to the chrooted apache but how do 
I find the dependencies for a perl script?

Thanks

George



Re: 3.9 freeze

2006-07-03 Thread diego

ok, I have the server on datacenter, when freeze I will try it.

- Original Message - 
From: mickey [EMAIL PROTECTED]

To: diego [EMAIL PROTECTED]
Cc: Pedro Martelletto [EMAIL PROTECTED]; misc@openbsd.org
Sent: Monday, July 03, 2006 9:52 AM
Subject: Re: 3.9 freeze



On Mon, Jul 03, 2006 at 09:45:22AM -0300, diego wrote:

no, I can only ping the server or change tty (ctrl alt fn), but I can't
type anything.


you should sysctl ddb.console=1 for that to work...

- Original Message - 
From: Pedro Martelletto [EMAIL PROTECTED]

To: diego [EMAIL PROTECTED]
Cc: misc@openbsd.org
Sent: Monday, July 03, 2006 9:34 AM
Subject: Re: 3.9 freeze


Can you break into ddb?

-p.



--
   paranoic mickey   (my employers have changed but, the name has 
remained)




Re: News From HiFn

2006-07-03 Thread Jack J. Woehr
On Jun 30, 2006, at 7:11 PM, Theo de Raadt wrote:

 Why should we bleed our little hearts over a company who acted like
 assholes towards us for years, and only changed their policy due to
 public pressure?

Because behavior modification requires rewarding in some fashion  
desired behavior?
Because the stick doesn't work without the carrot? Because all the  
world longs
to see a kinder, gentler Theo? :-)

---
Jack J. Woehr
Director of Development
Absolute Performance, Inc.
[EMAIL PROTECTED]
303-443-7000 ext. 527



Re: Patent jeopardizes IETF syslog standard

2006-07-03 Thread Spruell, Darren-Perot
From: [EMAIL PROTECTED] 
  useful implementation of a redundancy protocol. It's 
 technically better
  than HSRP or any of the versions of VRRP but the problems 
 till stands
  that it is not an official protocol, which simply means 
 adoption and
  inter operability will suffer to some degree.
 
 Adoption and interoperability are immaterial if everything is OBSD of 
 course. I wonder what percentage of people using OBSD face 
 interoperability issues? Isn't CARP so easy, and OBSD in 
 general, that 
 you just want to install it on all of your machines?

That's one option, though we've already seen at least one other
implementation of CARP pop up, the userland one for other *nix OSes (UCARP -
http://www.ucarp.org/project/ucarp).

What it would take is for other vendors who provide HA services via VRRP
(countless) to learn of the availability of CARP and implement it in their
own equipment. Once one or two do this, others should begin to jump on
board, and someone may actually pop up and decide to throw it through the
IETF for standardization so that the others can get their warm fuzzies and
consider it official as JCR was saying. Because we know its not official
until big American corporation say it is and monkey their customers into
paying for its officialness.

Self-fulfilling prophecy: then we can get on target with the back and forth
we've seen with OpenSSH already...

Vendor: OpenSSH doesn't cost anything. Can we use it and just violate the
GPL?
Advisor: It's under the BSDL. You don't have to violate anything, just use
it. You should donate to the project though.
Vendor: Great. Take it, implement it, sell it, and don't make any donations.
Screw those guys.
OpenBSD: You guys using OpenSSH should donate money because we help you
succeed.
Vendor: Take off, we don't owe you anything, eh?
Advisor: Oh look, they also have a CARP protocol that does everything VRRP
does and more, and doesn't have that scary patent thing hanging over it.
Vendor: Great. $$$ Ka-ching $$$
Advisor: Dontaions?
OpenBSD: Donations?
Vendor: Piss off.

DS



Re: openwebmail with chrooted apache

2006-07-03 Thread Nick Holland

FTP wrote:
I installed openwebmail from the ports and when trying to launch: 
http://your_server/cgi-bin/openwebmail/openwebmail.pl


I get a 500 error. I suppose that this is due to the chrooted apache
but how do I find the dependencies for a perl script?


1) you think really hard about what a program does and how it does it.
* It runs as setuid root, so it can jump to any logged in user to fetch 
their mail.  (hint: chrooting a suid root program is kinda pointless)

* It accesses /var/mail (can't recall if directly or via pop3)
* It accesses Sendmail binary directly (another setuid root program).
* it accesses /home/* directly
(that's from memory, from a few years back's version.  I suspect there 
is a lot more.  Some details may have changed, including my memory)


2) you think really hard about how much of the system you would have to 
pull into the chroot to do what you want.
* Too much dangerous stuff...and much of the file system.  The benefit 
of chrooting is mostly lost.


3) Decide if the effort is worth it.
* No, it isn't IN THIS CASE.  Give it up.

See the last sentence in:
  http://www.openbsd.org/faq/faq10.html#httpdchroot
OpenWebmail is one of these apps.  Making it work in a chroot would 
require a major rewrite and restructure, not simply copying files 
over...then you STILL have to trust the mechanism used to do those 
root-like things.


(contrast this to Squirrelmail, which does (amazingly) run in a chroot 
relatively easily...but then, Squirrelmail uses an IMAP server to move 
your mail data around...so instead of worrying about a hole in Apache 
or the web-app, you have to worry about a hole in your IMAP server)


Nick.



Re: openwebmail with chrooted apache

2006-07-03 Thread Stuart Henderson
On 2006/07/03 13:52, Nick Holland wrote:
 (contrast this to Squirrelmail, which does (amazingly) run in a chroot 

Same for Hastymail and Roundcube. I guess it's not too much of a
stretch with IMP either (though I haven't actually used IMP recently
enough to have checked chroot).



Re: openwebmail with chrooted apache

2006-07-03 Thread Sigfred HÃ¥versen

Stuart Henderson wrote:

On 2006/07/03 13:52, Nick Holland wrote:

(contrast this to Squirrelmail, which does (amazingly) run in a chroot 



Same for Hastymail and Roundcube. I guess it's not too much of a
stretch with IMP either (though I haven't actually used IMP recently
enough to have checked chroot).



In tree mail/imp depends on devel/horde that has exploit(s) in the wild.

/Sigfred



FTP / local logins and KerberosV

2006-07-03 Thread Spruell, Darren-Perot
One question regarding Kerberos authentication in ftpd is whether the daemon
supports only password authentication against the kerberos database, or if
it can support authentication using a service ticket from a user who has
already gotten a TGT (passwordless login).

Also, what (if any) openbsd-compatible ftp client/server implementations are
there that do support krb5/gssapi for passwordless auth?

Ditto for sshd; I see that if the user's login class has one of the krb*
authentication styles, the password provided at login is used to
authenticate as a principle against the kerberos realm. Is the only way to
enable seamless ticket authentication in sshd to enable
GSSAPIAuthentication?

Will a user that logs in remotely via SSH and authenticates against the
kerberos database (krb5 / krb5-or-pwd) get a TGT in their credential cache?
I know that this is the case with a local console login...

DS



set skip on interface rule doesn't show up in pfctl -sr

2006-07-03 Thread Daniel Ouellet

Is there a special reason why we couldn't see the

set skip on interface

in the display of the rules in pf with the regular:

pfctl -sr

That's on 3.9.



Re: set skip on interface rule doesn't show up in pfctl -sr

2006-07-03 Thread Henning Brauer
* Daniel Ouellet [EMAIL PROTECTED] [2006-07-03 21:44]:
 Is there a special reason why we couldn't see the
 
 set skip on interface
 
 in the display of the rules in pf with the regular:
 
 pfctl -sr

it is not a rule.


-- 
BS Web Services, http://www.bsws.de/
OpenBSD-based Webhosting, Mail Services, Managed Servers, ...
Unix is very simple, but it takes a genius to understand the simplicity.
(Dennis Ritchie)



Network slowdown (DLINK DGE-530T card maxing out at 17.3Mb/sec) P4 2.4 512M ram 424M free

2006-07-03 Thread Ben
Really odd problem here:

I've set up a fairly simple firewall utilizing dual DGE-530T gigabit cards.
Isolating a windows rack from the rest of campus.  Note that testing the
speed from a 100Mb linux host in the same office (plugged into the same
router as the firewall but of course outside the firewall's control) shows a
better then expected speed (94.2Mb/sec) connecting to the same test server
(100Mb) across campus.   

First the Iperf (again note this is connecting to a 100Mb host) results
with both the linux host and the openbsd firewall running 2.0.2 (final note:
this speed is the same when the openbsd system is connected to a 1Gb host as
well)

(linux host running iperf -s)

Server listening on TCP port 5001
TCP window size: 85.3 KByte (default)

[  4] local x port 5001 connected with y port 36002 [  4]  0.0-10.1 sec
20.8 MBytes  17.3 Mbits/sec

(openbsd host running iperf -s)
Server listening on TCP port 5001
TCP window size: 64.0 KByte (default)

[  6] local y port 5001 connected with x port 34081 [  6]  0.0-10.1 sec
20.8 MBytes  17.3 Mbits/sec



Dmesg (yes, there's only 512M of ram,  will upgrade it to 1G if needed,  but
considering a top shows  Free: 424M  I don't think that's the problem) :

OpenBSD 3.9 (GENERIC) #617: Thu Mar  2 02:26:48 MST 2006
[EMAIL PROTECTED]:/usr/src/sys/arch/i386/compile/GENERIC
cpu0: Intel(R) Pentium(R) 4 CPU 2.40GHz (GenuineIntel 686-class) 2.40 GHz
cpu0:
FPU,V86,DE,PSE,TSC,MSR,PAE,MCE,CX8,APIC,SEP,MTRR,PGE,MCA,CMOV,PAT,PSE36,CFLU
SH,ACPI,MMX,FXSR,SSE,SSE2,SS,HTT,TM,SBF
real mem  = 535871488 (523312K)
avail mem = 481947648 (470652K)
using 4278 buffers containing 26898432 bytes (26268K) of memory mainbus0
(root) bios0 at mainbus0: AT/286+(00) BIOS, date 04/28/03, BIOS32 rev. 0 @
0xffe90 apm0 at bios0: Power Management spec V1.2
apm0: AC on, battery charge unknown
apm0: flags 30102 dobusy 0 doidle 1
pcibios0 at bios0: rev 2.1 @ 0xf/0x1
pcibios0: PCI IRQ Routing Table rev 1.0 @ 0xfeae0/176 (9 entries)
pcibios0: PCI Interrupt Router at 000:31:0 (Intel 82801BA LPC rev 0x00)
pcibios0: PCI bus #2 is the last bus
bios0: ROM list: 0xc/0xc000 0xe/0x1800 cpu0 at mainbus0 pci0 at
mainbus0 bus 0: configuration mode 1 (no bios) pchb0 at pci0 dev 0 function
0 Intel 82845G/GL rev 0x01 ppb0 at pci0 dev 1 function 0 Intel
82845G/GL/GV/GE/PE AGP rev 0x01
pci1 at ppb0 bus 1
vga1 at pci1 dev 0 function 0 ATI Radeon 7500 QW rev 0x00 wsdisplay0 at
vga1 mux 1: console (80x25, vt100 emulation)
wsdisplay0: screen 1-5 added (80x25, vt100 emulation) uhci0 at pci0 dev 29
function 0 Intel 82801DB USB rev 0x01: irq 11 usb0 at uhci0: USB revision
1.0 uhub0 at usb0
uhub0: Intel UHCI root hub, rev 1.00/1.00, addr 1
uhub0: 2 ports with 2 removable, self powered
uhci1 at pci0 dev 29 function 1 Intel 82801DB USB rev 0x01: irq 10
usb1 at uhci1: USB revision 1.0
uhub1 at usb1
uhub1: Intel UHCI root hub, rev 1.00/1.00, addr 1
uhub1: 2 ports with 2 removable, self powered
uhci2 at pci0 dev 29 function 2 Intel 82801DB USB rev 0x01: irq 9
usb2 at uhci2: USB revision 1.0
uhub2 at usb2
uhub2: Intel UHCI root hub, rev 1.00/1.00, addr 1
uhub2: 2 ports with 2 removable, self powered ehci0 at pci0 dev 29 function
7 Intel 82801DB USB rev 0x01: irq 3
usb3 at ehci0: USB revision 2.0
uhub3 at usb3
uhub3: Intel EHCI root hub, rev 2.00/1.00, addr 1
uhub3: 6 ports with 6 removable, self powered
ppb1 at pci0 dev 30 function 0 Intel 82801BA AGP rev 0x81
pci2 at ppb1 bus 2
skc0 at pci2 dev 9 function 0 D-Link Systems DGE-530T rev 0x11, Marvell
Yukon (0x1): irq 9 sk0 at skc0 port A, address 00:0d:88:70:c1:f7 eephy0 at
sk0 phy 0: Marvell 88E1011 Gigabit PHY, rev. 3
skc1 at pci2 dev 10 function 0 D-Link Systems DGE-530T rev 0x11, Marvell
Yukon (0x1): irq 10
sk1 at skc1 port A, address 00:0f:3d:f4:8d:ce
eephy1 at sk1 phy 0: Marvell 88E1011 Gigabit PHY, rev. 3 ichpcib0 at pci0
dev 31 function 0 Intel 82801DB LPC rev 0x01 pciide0 at pci0 dev 31
function 1 Intel 82801DB IDE rev 0x01: DMA, channel 0 configured to
compatibility, channel 1 configured to compatibility wd0 at pciide0 channel
0 drive 0: WDC WD400BB-75JHA0
wd0: 16-sector PIO, LBA, 38146MB, 78125000 sectors
wd0(pciide0:0:0): using PIO mode 4, Ultra-DMA mode 5 atapiscsi0 at pciide0
channel 1 drive 0 scsibus0 at atapiscsi0: 2 targets cd0 at scsibus0 targ 0
lun 0: Lite-On, LTN486S 48x Max, YDS6 SCSI0 5/cdrom removable
atapiscsi1 at pciide0 channel 1 drive 1
scsibus1 at atapiscsi1: 2 targets
cd1 at scsibus1 targ 0 lun 0: HL-DT-ST, CD-RW GCE-8481B, C102 SCSI0
5/cdrom removable
cd0(pciide0:1:0): using PIO mode 4, Ultra-DMA mode 2
cd1(pciide0:1:1): using PIO mode 4, Ultra-DMA mode 2 ichiic0 at pci0 dev 31
function 3 Intel 82801DB SMBus rev 0x01: irq 11 iic0 at ichiic0 auich0 at
pci0 dev 31 function 5 Intel 82801DB AC97 rev 0x01: irq 11, ICH4 AC97
ac97: codec id 0x41445374 (Analog 

Re: set skip on interface rule doesn't show up in pfctl -sr

2006-07-03 Thread Spruell, Darren-Perot
From: [EMAIL PROTECTED] 
 Is there a special reason why we couldn't see the
 
 set skip on interface
 
 in the display of the rules in pf with the regular:
 
 pfctl -sr

If this was to be implemented, it might be more appropriate to show in the
runtime state (pfctl -si) than the rule output.

DS



Re: set skip on interface rule doesn't show up in pfctl -sr

2006-07-03 Thread Daniel Ouellet

it is not a rule.


OK, not a rule, but still shouldn't it be possible or useful to see that 
in effect? If you make changes for testing or what not and you use this 
temporary, etc on a box of 10+ interfaces, just my thinking, but I was 
expecting to see this in display of how the pf was working.


Yes it might be stupid to forget to remove it or what ever, but if you 
do check the active rules to see what's in action and skip doesn't show 
up there, one might think all is good and don't check the details 
configuration to see if that would be there or not.


Just a thought.

Someone might put this in effect and then an other admin check the 
rules, don't see it and think all is good and look else where just to 
find out after many hours that this set skip is bypassing the 
configurations.


May not be a rule, but still have effect in the working configuration.

Doesn't it make sense to see it?



Re: set skip on interface rule doesn't show up in pfctl -sr

2006-07-03 Thread Nick Guenther

On 7/3/06, Daniel Ouellet [EMAIL PROTECTED] wrote:

 it is not a rule.

OK, not a rule, but still shouldn't it be possible or useful to see that
in effect? If you make changes for testing or what not and you use this
temporary, etc on a box of 10+ interfaces, just my thinking, but I was
expecting to see this in display of how the pf was working.

Yes it might be stupid to forget to remove it or what ever, but if you
do check the active rules to see what's in action and skip doesn't show
up there, one might think all is good and don't check the details
configuration to see if that would be there or not.

Just a thought.

Someone might put this in effect and then an other admin check the
rules, don't see it and think all is good and look else where just to
find out after many hours that this set skip is bypassing the
configurations.

May not be a rule, but still have effect in the working configuration.

Doesn't it make sense to see it?


Indeed it does, but not by hacking up `-s rules`. pfctl(8) lists all
the various things you can display with -s. 'options' (as per
pf.conf(5)) do not seem to be among them, however, which  I agree is
unfortunate. It also doesn't help that the manpage say, next to, -s
Rule:
Note that the ``skip step'' optimization done automatically by the
kernel will skip evaluation of rules where possible. which seems to
imply that `-s rules` has something to do with `set skip`.

I don't know a lot about the architecture of pf (I plan to learn soon
though) so maybe this is completely stupid, but I suggest adding modes
for `pfctl -s` to match everything listed in pf.conf(5).

-Nick



Re: openwebmail with chrooted apache

2006-07-03 Thread FTP
On Mon, Jul 03, 2006 at 08:49:03PM +0200, Sigfred Heversen wrote:
 Stuart Henderson wrote:
 On 2006/07/03 13:52, Nick Holland wrote:
 
 (contrast this to Squirrelmail, which does (amazingly) run in a chroot 
 
 
 Same for Hastymail and Roundcube. I guess it's not too much of a
 stretch with IMP either (though I haven't actually used IMP recently
 enough to have checked chroot).
 
 
 In tree mail/imp depends on devel/horde that has exploit(s) in the wild.
 
 /Sigfred


I had a look on IMP and looks fine to me cause you can have POP3 too as well. I 
actually dodn't intend to isntall an IMAP server.

As a result is IMP a good solution for a small e-mail server?

Thanks

George



Re: set skip on interface rule doesn't show up in pfctl -sr

2006-07-03 Thread Stuart Henderson
On 2006/07/03 16:26, Nick Guenther wrote:
 I don't know a lot about the architecture of pf (I plan to learn soon
 though) so maybe this is completely stupid, but I suggest adding modes
 for `pfctl -s` to match everything listed in pf.conf(5).

`-s config' to produce a usable pf.conf from in-memory
configuration would be quite appealing...



Re: set skip on interface rule doesn't show up in pfctl -sr

2006-07-03 Thread Daniel Ouellet

If this was to be implemented, it might be more appropriate to show in the
runtime state (pfctl -si) than the rule output.


I don't know. May be may be not. But I got cut with this. I had a 
sysadmin do changes in a pretty big multi interface box and he use the 
set skip to test new rules on individual interface as I guess it started 
to be to big, I can't explain. But in any case, I started to see pass 
that some strange things that shouldn't be there and looking at the 
pfctl -sr at work, I never saw anything that would explain it.


After many hours of work, I thought that may be there might be a bug 
somehow. Look in that directions and a few more days pass.


Someone time the most obvious is not what jump at you and in the end, I 
started to look in more details to the rules instead of the pfctl -sr 
until I saw the set skip in there.


So, in the end, it is very stupid that I agree with 100%!

No one else to blame then the sysadmin and myself to assume that pfctl 
-sr would show me what's active at the time.


I felt into that trap and that's why I was asking if it wouldn't make 
sense to see what's actually active when you are looking at the live 
configuration running on the system.


I took for granted that looking at the live rules was telling me that's 
what is actively filter. Believe me, I will not felt into that trap 
again, but I thought after a many hours that I could have saved, that 
may be it might be very useful for someone else may be.


I just thought that if you look at the live configuration, it should 
show the life configuration.


That was just my take on it after a real life trap that I don't have 
anyone to blame then myself for not looking at the details configuration 
line by line sooner.


In any case, thanks for the feedback. That's a mistake I will not repeat 
again! (;


Daniel



Re: set skip on interface rule doesn't show up in pfctl -sr

2006-07-03 Thread Daniel Ouellet

Indeed it does, but not by hacking up `-s rules`. pfctl(8) lists all
the various things you can display with -s. 'options' (as per
pf.conf(5)) do not seem to be among them, however, which  I agree is
unfortunate. It also doesn't help that the manpage say, next to, -s
Rule:
Note that the ``skip step'' optimization done automatically by the
kernel will skip evaluation of rules where possible. which seems to
imply that `-s rules` has something to do with `set skip`.


I don't know about all the options. I kind of think these are more 
operations limits or something. I am sure I don't use the right words 
here, but the options would be for optimization of efficiency of busy 
system. In low usage, the options wouldn't be in the way in any case.


I see the set skip as all or nothing, oppose to options that are 
capacity related.


I could be wrong, but I don't see that as the same thing at all.

The show rules, or what ever it may be call should show the go/no go 
stuff and if you want optimization, then you can always looks else where 
for capacity related issues.


I don't think the two should be at the same place here, but again, 
that's just my thinking.


Look logical to me, but I am not saying I hold all the truth here either.



Re: Patent jeopardizes IETF syslog standard

2006-07-03 Thread Chris Cappuccio
J.C. Roberts [EMAIL PROTECTED] wrote:
 
 This sucks. It's no different than what Cisco did with their HSRP patent
 to try to kill off VRRP. The Huawei IPR claim to the IETF is nearly
 identical to the crap Cisco put out years ago in their IPR claim.
 

It's funny how these Chinese guys like to rip-off Cisco.  First they rip off
Cisco IOS, by virtue they rip off all of Cisco's bugs, and now they rip off
Cisco's intellectual property stance.  How do you rip off an intellectual
property stance?  It's counter-intuitive.  Either way, this makes them look
like the biggest fucking idiots ever.

-- 
Quis custodiet ipsos custodes?



Re: set skip on interface rule doesn't show up in pfctl -sr

2006-07-03 Thread Giancarlo Razzolini
Daniel Ouellet wrote:
 If this was to be implemented, it might be more appropriate to show in
 the
 runtime state (pfctl -si) than the rule output.

 I don't know. May be may be not. But I got cut with this. I had a
 sysadmin do changes in a pretty big multi interface box and he use the
 set skip to test new rules on individual interface as I guess it started
 to be to big, I can't explain. But in any case, I started to see pass
 that some strange things that shouldn't be there and looking at the
 pfctl -sr at work, I never saw anything that would explain it.

 After many hours of work, I thought that may be there might be a bug
 somehow. Look in that directions and a few more days pass.

 Someone time the most obvious is not what jump at you and in the end, I
 started to look in more details to the rules instead of the pfctl -sr
 until I saw the set skip in there.

 So, in the end, it is very stupid that I agree with 100%!

 No one else to blame then the sysadmin and myself to assume that pfctl
 -sr would show me what's active at the time.

 I felt into that trap and that's why I was asking if it wouldn't make
 sense to see what's actually active when you are looking at the live
 configuration running on the system.

 I took for granted that looking at the live rules was telling me that's
 what is actively filter. Believe me, I will not felt into that trap
 again, but I thought after a many hours that I could have saved, that
 may be it might be very useful for someone else may be.

 I just thought that if you look at the live configuration, it should
 show the life configuration.

 That was just my take on it after a real life trap that I don't have
 anyone to blame then myself for not looking at the details configuration
 line by line sooner.

 In any case, thanks for the feedback. That's a mistake I will not repeat
 again! (;

 Daniel


pfctl -sI -vv shows you if an interface is skipped or not.

My 2 cents,
--
Giancarlo Razzolini
Linux User 172199
Moleque Sem Conteudo Numero #002
Slackware Current
OpenBSD Stable
Snike Tecnologia em Informatica
4386 2A6F FFD4 4D5F 5842  6EA0 7ABE BBAB 9C0E 6B85

[demime 1.01d removed an attachment of type application/pgp-signature which had 
a name of signature.asc]



Re: set skip on interface rule doesn't show up in pfctl -sr

2006-07-03 Thread Daniel Ouellet

set skip on interface

in the display of the rules in pf with the regular:

pfctl -sr


it is not a rule.


I guess one could argue that:

set block-policy option

is not a rule either, but it does show up however:

Example 1:
In pf.conf
snip
set block-policy return
block all
snip

pfctl -sr
snip
block return all
snip

Example 2:
In pf.conf
snip
set block-policy drop
block all
snip

pfctl -sr
snip
block drop all
snip

This set option does show up here.

OK, it can be argue that it might be a rule as well, but it is enter as 
set option in the same section as set skip.


Daniel



Re: set skip on interface rule doesn't show up in pfctl -sr

2006-07-03 Thread Clint Pachl

Henning Brauer wrote:

* Daniel Ouellet [EMAIL PROTECTED] [2006-07-03 21:44]:

Is there a special reason why we couldn't see the

set skip on interface

in the display of the rules in pf with the regular:

pfctl -sr


it is not a rule.


It is an option.

Would it be beneficial to add an Options modifier to pfctl's -s arg in 
order to verify all options?


# pfctl -s Options
Options:Values:
loginterfaceem0
optimizationnormal
block-policydrop
state-policyfloating
skip on lo0 fxp1
...

-pachl



Preventing password reuse

2006-07-03 Thread Jeff Simmons
A client is setting up a password policy, and would like to prevent users from 
reusing a password for a period of time (four changes ninety days apart). Is 
there a way to do this, either within the OS or via a program in ports? I've 
been looking for quite a while and haven't found anything.

-- 
Jeff Simmons   [EMAIL PROTECTED]
Simmons Consulting - Network Engineering, Administration, Security
You guys, I don't hear any noise. Are you sure you're doing it right?
--My Life With The Thrill Kill Kult



Re: set skip on interface rule doesn't show up in pfctl -sr

2006-07-03 Thread Nick Guenther

On 7/3/06, Giancarlo Razzolini [EMAIL PROTECTED] wrote:


pfctl -sI -vv shows you if an interface is skipped or not.

My 2 cents,


-w is not documented in pfctl(8). What does it do?

On 7/3/06, Clint Pachl [EMAIL PROTECTED] wrote:

Henning Brauer wrote:
 * Daniel Ouellet [EMAIL PROTECTED] [2006-07-03 21:44]:
 Is there a special reason why we couldn't see the

 set skip on interface

 in the display of the rules in pf with the regular:

 pfctl -sr

 it is not a rule.

It is an option.

Would it be beneficial to add an Options modifier to pfctl's -s arg in
order to verify all options?

# pfctl -s Options
Options:Values:
loginterfaceem0
optimizationnormal
block-policydrop
state-policyfloating
skip on lo0 fxp1
...

-pachl


That's what I and Stuart Henderson said. Methinks it is a good idea.

-Nick



Re: openwebmail with chrooted apache

2006-07-03 Thread Nick Holland

FTP wrote:

On Mon, Jul 03, 2006 at 08:49:03PM +0200, Sigfred Heversen wrote:

Stuart Henderson wrote:

On 2006/07/03 13:52, Nick Holland wrote:


(contrast this to Squirrelmail, which does (amazingly) run in a
chroot


Same for Hastymail and Roundcube. I guess it's not too much of a 
stretch with IMP either (though I haven't actually used IMP

recently enough to have checked chroot).


In tree mail/imp depends on devel/horde that has exploit(s) in the
wild.

/Sigfred



I had a look on IMP and looks fine to me cause you can have POP3 too
as well. I actually dodn't intend to isntall an IMAP server.


Using IMP to avoid an IMAP server is like cutting off your hands because 
you don't wish to trim your fingernails.  A Bit Drastic, I do think. 
And similarly crippling, as IMP is less than 100% effective without 
IMAP, apparently:

   http://www.horde.org/imp/docs/?f=INSTALL.html
IMAP is recommended over POP3 in order to let users maintain mail 
folders other than INBOX and is required to allow messages to be 
flagged. IMAP is also much faster than POP3 in displaying a mailbox of 
messages. In short, do not use POP3 unless IMAP is not available.


If you want IMP, IMAP is the least of your tasks.  I think once you have 
IMP configured, you will forget that IMAP was even involved.



As a result is IMP a good solution for a small e-mail server?


I've never got IMP all the way running...but I very quickly came to the 
conclusion that small and IMP or any other Horde-based product have 
nothing to do with each other.


That's not to say that IMP isn't a (potentially) cool product, and I'd 
like to come back to it, but the setup and config is much more 
involved than I'd find justified for a small e-mail server.


OpenWebmail is very charming because of how very little it needs to 
bring into base OpenBSD to get working.  I set it up for a school of 
about 200 students on a PII-450, worked well (once I set up MASSIVE 
amounts of swap space...having 25 students change their PWs at the same 
time burned through something like 600M of RAM+swap very 
quickly...swap-to-file to the rescue!).  I must say, at this point, 
being not written in PHP is starting to look Really Nice, too.


Nick.



Re: set skip on interface rule doesn't show up in pfctl -sr

2006-07-03 Thread Giancarlo Razzolini
Nick Guenther wrote:
 -w is not documented in pfctl(8). What does it do?

It is not -w it is -v that stands for -v(erbose). If you use it twice
(-vv) it increase the verbose level. It is in the pfctl man page.

My regards,
--
Giancarlo Razzolini
Linux User 172199
Moleque Sem Conteudo Numero #002
Slackware Current
OpenBSD Stable
Snike Tecnologia em Informatica
4386 2A6F FFD4 4D5F 5842  6EA0 7ABE BBAB 9C0E 6B85

[demime 1.01d removed an attachment of type application/pgp-signature which had 
a name of signature.asc]



Re: set skip on interface rule doesn't show up in pfctl -sr

2006-07-03 Thread NetNeanderthal

On 7/3/06, Nick Guenther [EMAIL PROTECTED] wrote:

On 7/3/06, Giancarlo Razzolini [EMAIL PROTECTED] wrote:
 pfctl -sI -vv shows you if an interface is skipped or not.
-w is not documented in pfctl(8). What does it do?


It most certainly is.

Try -vv ('v' 'v', as in 'victor' 'victor'), avoid typing your dmesg at
all costs! =)



Re: openwebmail with chrooted apache

2006-07-03 Thread Stuart Henderson
On 2006/07/03 18:25, Nick Holland wrote:
 OpenWebmail is very charming because of how very little it needs to 
 bring into base OpenBSD to get working.  I set it up for a school of 
 about 200 students on a PII-450, worked well (once I set up MASSIVE 
 amounts of swap space...having 25 students change their PWs at the same 
 time burned through something like 600M of RAM+swap very 
 quickly...swap-to-file to the rescue!).

I set IMP up once for a hosted email system for a bunch of
schools, who insisted on using Lookout 97 for admin staff.
The occasional uuencoded attachments (including a scanned
letter pasted as a bitmap into an uncompressed Word document
sent to something like 400 people) caused, shall we say,
interesting things to happen as IMP tried to wordwrap it...



Re: Preventing password reuse

2006-07-03 Thread Spruell, Darren-Perot
From: [EMAIL PROTECTED] 
 A client is setting up a password policy, and would like to 
 prevent users from 
 reusing a password for a period of time (four changes ninety 
 days apart). Is 
 there a way to do this, either within the OS or via a program 
 in ports? I've 
 been looking for quite a while and haven't found anything.

I haven't either, although I haven't looked really hard. I mention
http://www.mindrot.org/passwdqc.html not because I know it can do what
you're looking for but because it can offer a few steps up in password
quality which may also be in your policy.

I notice Linux's pam_cracklib
(http://www.deer-run.com/~hal/sysadmin/pam_cracklib.html) approaches this by
storing password hashes in a history file - meaning you have to basically
have the equivalent of your shadow file (with historically valuable
information) hanging around somewhere else. 

Seems to me a better solution would be to take a one-way hash of the new
password hash out to some kind of a database where a comparison could be
made against the last N password hash hashes that were used. Putting the
actual password hash out to storage for comparison seems more risky than
just a one-way hash of the hash (at least a little bit). A trigger on a
password change could easily tell if the new password hashes out to one on
record and records a hash of the hash if not.

DS



Re: set skip on interface rule doesn't show up in pfctl -sr

2006-07-03 Thread Henning Brauer
* Nick Guenther [EMAIL PROTECTED] [2006-07-03 22:35]:
 unfortunate. It also doesn't help that the manpage say, next to, -s
 Rule:
 Note that the ``skip step'' optimization done automatically by the
 kernel will skip evaluation of rules where possible. which seems to
 imply that `-s rules` has something to do with `set skip`.

skip steps and set skip have noting to do with each other.
set skip basically disables pf on a per-interface basis.
skip steps is an optimization in rule processing you can safely ignore. 
it Just Works in the background and saves you CPU cycles :)

-- 
BS Web Services, http://www.bsws.de/
OpenBSD-based Webhosting, Mail Services, Managed Servers, ...
Unix is very simple, but it takes a genius to understand the simplicity.
(Dennis Ritchie)



Re: Preventing password reuse

2006-07-03 Thread Jeff Simmons
On Monday 03 July 2006 16:19, Spruell, Darren-Perot wrote:
 I mention
 http://www.mindrot.org/passwdqc.html not because I know it can do what
 you're looking for but because it can offer a few steps up in password
 quality which may also be in your policy.

Yes, it does everything I need very nicely except preventing password reuse.

 Seems to me a better solution would be to take a one-way hash of the new
 password hash out to some kind of a database ...

Very much agree. I think we're going to need something like this (similar to 
some of the file integrity monitors) soon. I'm doing a lot of preparation for 
security audits these days (mainly doctor's offices and credit card 
processors right now) and that's something the auditing firms want to see.

Thanks for the assistance.

On Monday 03 July 2006 16:19, Spruell, Darren-Perot wrote:
 From: [EMAIL PROTECTED]

  A client is setting up a password policy, and would like to
  prevent users from
  reusing a password for a period of time (four changes ninety
  days apart). Is
  there a way to do this, either within the OS or via a program
  in ports? I've
  been looking for quite a while and haven't found anything.

 I haven't either, although I haven't looked really hard. I mention
 http://www.mindrot.org/passwdqc.html not because I know it can do what
 you're looking for but because it can offer a few steps up in password
 quality which may also be in your policy.

 I notice Linux's pam_cracklib
 (http://www.deer-run.com/~hal/sysadmin/pam_cracklib.html) approaches this
 by storing password hashes in a history file - meaning you have to
 basically have the equivalent of your shadow file (with historically
 valuable information) hanging around somewhere else.

 Seems to me a better solution would be to take a one-way hash of the new
 password hash out to some kind of a database where a comparison could be
 made against the last N password hash hashes that were used. Putting the
 actual password hash out to storage for comparison seems more risky than
 just a one-way hash of the hash (at least a little bit). A trigger on a
 password change could easily tell if the new password hashes out to one on
 record and records a hash of the hash if not.

 DS

-- 
Jeff Simmons   [EMAIL PROTECTED]
Simmons Consulting - Network Engineering, Administration, Security
You guys, I don't hear any noise. Are you sure you're doing it right?
--My Life With The Thrill Kill Kult



Re: carp with hosts in different vlans

2006-07-03 Thread Ryan McBride
On Mon, Jul 03, 2006 at 04:58:09PM +0200, Sebastian Reitenbach wrote:
 I can setup a tunnel between both hosts, and route the mulitcast
 packets through the tunnel and then have the IP address shared between
 the two hosts?

No.  CARP does not accept packets that have crossed a router, to prevent
external spoofing of carp packets.

Get your colo to change their switch/router config to put your boxes on
the same ethernet segment, put both of the boxes on a switch that you
manage that connects to one of your colo's switch port, or change colo
providers.



Re: set skip on interface rule doesn't show up in pfctl -sr

2006-07-03 Thread Giancarlo Razzolini
Henning Brauer wrote:

 skip steps and set skip have noting to do with each other.
 set skip basically disables pf on a per-interface basis.
 skip steps is an optimization in rule processing you can safely ignore.
 it Just Works in the background and saves you CPU cycles :)

It does not have much to do with the topic but, if i do enable skip on
an interface, if i send packets to the skipped interface with tags on
them, these tags will be lost? I'm asking because i did some tagging and
sent to the ftp-proxy running in the lo0 interface, and the tags were
gone when the ftp-proxy did the connection on behalf of the user. I need
this to do qos.

My regards,
--
Giancarlo Razzolini
Linux User 172199
Moleque Sem Conteudo Numero #002
Slackware Current
OpenBSD Stable
Snike Tecnologia em Informatica
4386 2A6F FFD4 4D5F 5842  6EA0 7ABE BBAB 9C0E 6B85

[demime 1.01d removed an attachment of type application/pgp-signature which had 
a name of signature.asc]



Re: Preventing password reuse

2006-07-03 Thread STeve Andre'
On Monday 03 July 2006 17:37, Jeff Simmons wrote:
 A client is setting up a password policy, and would like to prevent users
 from reusing a password for a period of time (four changes ninety days
 apart). Is there a way to do this, either within the OS or via a program in
 ports? I've been looking for quite a while and haven't found anything.

I can't resist pointing out that this is an AWFUL policy.  You will be
remembering peoples passwords, a history of them, which are
very likely to be used on other systems.  Thats really bad.  I wonder
(at least in the USA) what would happen to your company if that
data was ever stolen?

--STeve Andre'



Re: Preventing password reuse

2006-07-03 Thread Chris Zakelj
STeve Andre' wrote:
 On Monday 03 July 2006 17:37, Jeff Simmons wrote:
   
 A client is setting up a password policy, and would like to prevent users
 from reusing a password for a period of time (four changes ninety days
 apart). Is there a way to do this, either within the OS or via a program in
 ports? I've been looking for quite a while and haven't found anything.
 
 I can't resist pointing out that this is an AWFUL policy.  You will be
 remembering peoples passwords, a history of them, which are
 very likely to be used on other systems.  Thats really bad.  I wonder
 (at least in the USA) what would happen to your company if that
 data was ever stolen?
   

The same thing that happens whenever any other data (like, say, SSNs)
gets stolen.  Absolutely nothing.



Re: Preventing password reuse

2006-07-03 Thread Jeff Simmons
On Monday 03 July 2006 17:51, STeve Andre' wrote:
 On Monday 03 July 2006 17:37, Jeff Simmons wrote:
  A client is setting up a password policy, and would like to prevent users
  from reusing a password for a period of time (four changes ninety days
  apart). Is there a way to do this, either within the OS or via a program
  in ports? I've been looking for quite a while and haven't found anything.

 I can't resist pointing out that this is an AWFUL policy.  You will be
 remembering peoples passwords, a history of them, which are
 very likely to be used on other systems.  Thats really bad.  I wonder
 (at least in the USA) what would happen to your company if that
 data was ever stolen?

 --STeve Andre'

As I mentioned in another post, these are requirements imposed by various 
security auditing firms. So from the company's (and my) standpoint, we've got 
some coverage, since we were required to retain the data.

In general, I agree with most of what I've seen from these firms. I do 
question the basic assumptions, since if I have an audit preparation 
document, I've already got a pretty good basic blueprint of a certified 
firm's security setup and policies. And some of the policies I personally 
disagree with. But overall, it's probably a Good Thing (c), it's getting a 
lot of firms to improve what up till now have been weak 'security' 
arrangements.

An employee of one of these firms claimed that no company that had passed one 
of their audits had ever been compromised. This will, of course, change. And 
the result will be modifications to the required security policies. After 
all, security isn't rocket science, it's chess.

I might also add that all of the auditing firms I've dealt with look with 
favor on the deployment of OpenBSD as opposed to some other OSs.

-- 
Jeff Simmons   [EMAIL PROTECTED]
Simmons Consulting - Network Engineering, Administration, Security
You guys, I don't hear any noise. Are you sure you're doing it right?
--My Life With The Thrill Kill Kult



Re: Preventing password reuse

2006-07-03 Thread Marcus Watts
Chris Zakelj [EMAIL PROTECTED] writes:
 Date: Mon, 03 Jul 2006 21:09:32 -0400
 From: Chris Zakelj [EMAIL PROTECTED]
 To: STeve Andre' [EMAIL PROTECTED]
 CC: misc@openbsd.org
 Subject: Re: Preventing password reuse
 
 STeve Andre' wrote:
  On Monday 03 July 2006 17:37, Jeff Simmons wrote:

  A client is setting up a password policy, and would like to prevent users
  from reusing a password for a period of time (four changes ninety days
  apart). Is there a way to do this, either within the OS or via a program in
  ports? I've been looking for quite a while and haven't found anything.
  
  I can't resist pointing out that this is an AWFUL policy.  You will be
  remembering peoples passwords, a history of them, which are
  very likely to be used on other systems.  Thats really bad.  I wonder
  (at least in the USA) what would happen to your company if that
  data was ever stolen?

 
 The same thing that happens whenever any other data (like, say, SSNs)
 gets stolen.  Absolutely nothing.
 
 

Check out any good newspaper morgue before you believe that.  There are
too many counter-examples to your claim.  The person who made this
initial request claims to be working for medical doctors  credit card
processors.  There are specific horrible examples of the possible
consequences of either.  Of course, most of these are consequences to
the person stealing the data, or the person whose data was lost -- but
if too many data professionals start asserting it's not their
responsibility at all, our politicians who art in whatever will
certainly create laws that say otherwise.  HIPA for instance.
Or think of the poor guy who lost a laptop at the VA recently.

In any case, you don't need to store passwords.  You can store a
history of one-way hashes instead, get (nearly) the same benefit, and
without nearly the security exposure.

I think the more interesting security argument is that if you make
people change passwords too often, they're much more likely to adopt
other less secure policies in compensation, ones you can't control
nearly so easily.  For instance, they're much more likely to write them
down.  Or they may force you to adopt a less strigent password reset
policy.  Or they may just invent an obvious way to permute their password.

-Marcus Watts



Re: Wireless Bridge...

2006-07-03 Thread pedro la peu
On Monday 03 July 2006 23:29, Novak, Trevor SCIC wrote:
 I'm trying to setup a wireless bridge with openbsd on a Toshiba
 laptop. I'm using an SMC2532W-B (Prism 2.5) wireless card and a 3Com
 3C574-TX.

Is the wi(4) in hostap mode? If not you cannot bridge...



Re: Patent jeopardizes IETF syslog standard

2006-07-03 Thread Lars Hansson
On Tuesday 04 July 2006 05:05, Chris Cappuccio wrote:
 Either way, this makes them look like the biggest fucking idiots ever.

Most people who have ever had to use any of their devices knew this already.

---
Lars Hansson



Re: Preventing password reuse

2006-07-03 Thread Damien Miller
On Mon, 3 Jul 2006, Spruell, Darren-Perot wrote:

 From: [EMAIL PROTECTED] 
  A client is setting up a password policy, and would like to 
  prevent users from 
  reusing a password for a period of time (four changes ninety 
  days apart). Is 
  there a way to do this, either within the OS or via a program 
  in ports? I've 
  been looking for quite a while and haven't found anything.
 
 I haven't either, although I haven't looked really hard. I mention
 http://www.mindrot.org/passwdqc.html not because I know it can do what
 you're looking for but because it can offer a few steps up in password
 quality which may also be in your policy.

passwdqc doesn't keep a reuse history, but this is one of the things
that I'd like to implement. 

 (http://www.deer-run.com/~hal/sysadmin/pam_cracklib.html) approaches
 this by storing password hashes in a history file - meaning you
 have to basically have the equivalent of your shadow file (with
 historically valuable information) hanging around somewhere else.

This is the reason why I haven't implemented it in passwdqc yet :)
This naive solution isn't very secure...

-d



Re: starting Apache in SSL mode

2006-07-03 Thread L. V. Lammert
On Sun, 2 Jul 2006, FTP wrote:

 On Tue, Jun 27, 2006 at 05:03:52PM +0200, FTP wrote:

 any chance to draw some attention to the above?

 Thanks

Certificates have nothing to do with Apache, much less OpenBSD. If you
want a signed certificate, you must create your own CA, or purchased a
publically-signed cert from Verisign, Eqifax, Thawte, et al.

Lee



Re: Preventing password reuse

2006-07-03 Thread Chet Uber

On Monday 03 July 2006 17:37, Jeff Simmons wrote:
A client is setting up a password policy, and would like to  
prevent users
from reusing a password for a period of time (four changes ninety  
days
apart). Is there a way to do this, either within the OS or via a  
program in
ports? I've been looking for quite a while and haven't found  
anything.


I can't resist pointing out that this is an AWFUL policy.  You will be
remembering peoples passwords, a history of them, which are
very likely to be used on other systems.  Thats really bad.  I wonder
(at least in the USA) what would happen to your company if that
data was ever stolen?


The prevention of password reuse does not involve the storage of any  
passwords. You would properly store the hash. If you used MD5 there  
is an issue about collisions, but SHA1 would not have this problem.  
So the methodology would depend on the login. It is not normal for an  
OS to store the password, although application developers do do this.  
This is the same problem that you have in biometrics. Lots of people  
think you store the fingerprint, when really you only store data  
related to the fingerprint -- i.e. you cannot replay it to create a  
complete print.


CU



Re: starting Apache in SSL mode

2006-07-03 Thread Michael Erdely

L. V. Lammert wrote:

Certificates have nothing to do with Apache, much less OpenBSD. If you
want a signed certificate, you must create your own CA, or purchased a
publically-signed cert from Verisign, Eqifax, Thawte, et al.


That may be true, but mentioning man 8 ssl and referencing GENERATING 
RSA SERVER CERTIFICATES FOR WEB SERVERS would have been helpful. :)


-ME

--
Support OpenBSD: http://www.openbsd.org/orders.html



Re: Preventing password reuse

2006-07-03 Thread L. V. Lammert
On Mon, 3 Jul 2006, STeve Andre' wrote:

 On Monday 03 July 2006 17:37, Jeff Simmons wrote:

 I can't resist pointing out that this is an AWFUL policy.  You will be
 remembering peoples passwords, a history of them, which are
 very likely to be used on other systems.  Thats really bad.  I wonder
 (at least in the USA) what would happen to your company if that
 data was ever stolen?

 --STeve Andre'

Ahhh, .. that's what hash's are for; easily recreatable given duplicate
input strings, but creating the input string FROM the hash is just about
impossible [lacking near infinate resources].

Storing hashes in a DB is just fine - that's how passwords are encrypted
in any case. Comparing the current to any others in the past 90 days
would work swinningly for a secure audit train.

Lee



Re: Preventing password reuse

2006-07-03 Thread Chet Uber
I can't resist pointing out that this is an AWFUL policy.  You  
will be

remembering peoples passwords, a history of them, which are
very likely to be used on other systems.  Thats really bad.  I wonder
(at least in the USA) what would happen to your company if that
data was ever stolen?

--STeve Andre'

Ahhh, .. that's what hash's are for; easily recreatable given  
duplicate
input strings, but creating the input string FROM the hash is just  
about

impossible [lacking near infinate resources].


Not to bicker, but the resources needed to use a database of all  
possible passwords even with alphanumerics and salted is very finite  
-- albeit large. If we are talking about login() that is. Our company  
maintains one for 8 characters and while requiring a large database  
still makes cracking passwords of finding collisions a trivial chore  
for 8 character passwords. We are currently working on one that will  
handle 13 character strings and hope to have it running by the end of  
the year.


Just don't want people to think that they are safe as is not an NP- 
complete problem. It is an NP-hard problem however.



CU



Chet Uber
President and Principal Scientist
SecurityPosture, Inc.
3718 N 113th Plaza, Omaha, NE 68164
vox +1 (402) 505-9684 | fax +1 (402) 932-2130 | cell (402) 813-3211
[EMAIL PROTECTED]  |  www.securityposture.com

'It is vain to do with more what can be done with fewer'

-- This communication is confidential to the parties it was intended  
to serve --




Re: Preventing password reuse

2006-07-03 Thread Jeff Simmons
Well, just to play the devil's advocate here ...

One of the main functions of any password hygiene program 'should' be to 
prevent users from changing 'mypassword1' to 'mypassword2' and then 
'mypassword3', etc.  (Yes, we can force complex passwords, but the idea is 
the same.)

It's fairly simple to compare 'newpassword' to 'existingpassword' and prevent 
this sort of behavior (I THINK that's what the -s option to passwdqc is for, 
but the man page is kind of ambiguous and I haven't had time to dive into the 
source yet - pam_passwdqc does it) but then the user can just do 
'mypassword1', 'mydogsname1', 'mypassword2', mydogsname2', etc. and totally 
invalidate your carefully designed security policy.

And hashes aren't gonna help.

Don't get me wrong, I'm not knocking the idea completely. My assignment here 
is that I've been told that in order to get my client certified I have to 
avoid reuse of a password over a cycle of 4 90 day forced changes. My JOB is 
to assure that doing this doesn't open my client up to a whole new string of 
vulnerabilities. Mr. Rock, meet Mr. Hard Place.

In conclusion the main thing we did wrong ... was to worry about criminals
being clever;  we should rather have worried about our customers ... being
stupid.  Ross Anderson, Security Engineering

On Monday 03 July 2006 20:25, L. V. Lammert wrote:
 On Mon, 3 Jul 2006, STeve Andre' wrote:
  On Monday 03 July 2006 17:37, Jeff Simmons wrote:
 
  I can't resist pointing out that this is an AWFUL policy.  You will be
  remembering peoples passwords, a history of them, which are
  very likely to be used on other systems.  Thats really bad.  I wonder
  (at least in the USA) what would happen to your company if that
  data was ever stolen?
 
  --STeve Andre'

 Ahhh, .. that's what hash's are for; easily recreatable given duplicate
 input strings, but creating the input string FROM the hash is just about
 impossible [lacking near infinate resources].

 Storing hashes in a DB is just fine - that's how passwords are encrypted
 in any case. Comparing the current to any others in the past 90 days
 would work swinningly for a secure audit train.

   Lee

-- 
Jeff Simmons   [EMAIL PROTECTED]
Simmons Consulting - Network Engineering, Administration, Security
You guys, I don't hear any noise. Are you sure you're doing it right?
--My Life With The Thrill Kill Kult



Re: Preventing password reuse

2006-07-03 Thread Paul de Weerd
On Tue, Jul 04, 2006 at 02:15:09PM +1000, Rod.. Whitworth wrote:
| Ahhh, .. that's what hash's are for; easily recreatable given duplicate
| input strings, but creating the input string FROM the hash is just about
| impossible [lacking near infinate resources].
| 
| Storing hashes in a DB is just fine - that's how passwords are encrypted
| in any case. Comparing the current to any others in the past 90 days
| would work swinningly for a secure audit train.
| 
|  Lee
| 
| 
|
| So, you are suggesting using something other than the hash stored  in
| OpenBSD's master.passwd then?

Why exactly would we need another hash ?

| If not try this:
| Add a user, nothing special.
| Record the hash from master.passwd
| Log in as the test user.
| Change your password.
| Change it back.
| Compare the hashes.
| Different eh?

How come these are different ? What happened ? It's still the same
password, right ? How can one string hash to two different outputs ?

It can not. From http://en.wikipedia.org/wiki/Hash_function : A
fundamental property of all hash functions is that if two hashes
(according to the same function) are different, then the two inputs
are different in some way. This property is a consequence of hash
functions being deterministic.

| So you need to change to a less secure password hash method.

Why ?

How does the system know you've entered the correct password when you
log in ? It applies $magic_function to the text it receives ('the
password') and maybe some other data. Then it compares the output of
this $magic_function to whatever is stored in the password database.
If it matches, hey, you're authenticated and you may log in.

Now we repeat the above procedure using $magic_function on the new
password and compare the output with a list of old hashes. What is
different ? Why would this stop working ?

Think about it.

| Will that affect the security audit?
| Test with well known cracker tools and weep. I have (as root) fed a
| slice of master.passwd to John the Ripper with a few nologin users
| added using dictionary words of 7 or 8 chars as passwords and after 10
| days it had not cracked one of them. I bet it takes less time on lesser
| hashes to get some results.

Your password is not hashed as-is. A salt is added (for extra flavour)
before hashing. This salt it also stored in the database along with
the hash. Enter your password, the system takes the hash from the
database, computes the hash of the concatenation of said salt with
the password you entered. Then the system compares the hash with what
it found in the database.

Google 'password salt'

Cheers,

Paul 'WEiRD' de Weerd

--
[++-]+++.+++[---].+++[+
+++-].++[-]+.--.[-]
 http://www.weirdnet.nl/

[demime 1.01d removed an attachment of type application/pgp-signature]