Re: Limit number of login sessions

2008-10-01 Thread Julian Leyh
Maximo Pech schrieb: would you not be better to use ALTQ to limit the bandwidth available to each user? then if they share their password their only sharing their own use? Users are not in my local network. They will connect from the internet and they have dynamic IPs so I guess that

Re: uvm_fault again...

2008-10-01 Thread Toni Mueller
Hi, On Thu, 25.09.2008 at 13:54:53 +0200, ng-sup01 [EMAIL PROTECTED] wrote: The machine, once power-cycled, rebooted without a hitch, not even complaining about disk corruption or anything. this doesn't have to mean much. I recently wanted to install OpenBSD on a machine which also claimed to

Re: ? Recommended News Server

2008-10-01 Thread Toni Mueller
On Tue, 30.09.2008 at 14:54:25 -0400, bofh [EMAIL PROTECTED] wrote: Unfortunately no. But I think one of the ports maintainers was looking at it for 4.4. *LOL* There are some semi-finished ports floating around in the archives. You might want to make a stab at it, too. Kind regards,

Re: uvm fault panic

2008-10-01 Thread Toni Mueller
Hi, On Tue, 30.09.2008 at 22:23:21 -0600, Dale Carstensen [EMAIL PROTECTED] wrote: I did trace and ps in ddb, but another crash before savecore could capture the result of boot dump lost the crash dump, and the results of those commands. recommended procedure (if you can do this): Get a

Re: DHCP failing to find interface after 20 Interfaces

2008-10-01 Thread Stuart Henderson
On 2008-09-29, Carl Horne [EMAIL PROTECTED] wrote: I build this from source because I needed USE_SOCKETS enabled. What does USE_SOCKETS do for you? Perhaps there's another way to do things that would let you use OpenBSD's dhcpd. (In -current and 4.4 we now support DHCP failover too, by the way).

Re: Weird pkg_info behavior?

2008-10-01 Thread Stuart Henderson
On 2008-10-01, Nick Guenther [EMAIL PROTECTED] wrote: If you are looking for package descriptions, install the ports tree and read the Makefiles. For 4.4/-current, landry@ has written a curses-based package browser, pkg_mgr. It's in the ports tree and of course a package is available, pkg_add

compile programs in standalone mode

2008-10-01 Thread amm
Hi, int main() { int i; short int *screen = (short int *) 0xB8000; char msg[]=Hello World; for(i=0; msg[i] != '\0'; *(screen++) = 0x1F00 | msg[i], ++i); for(;;); return 0; } When i compiled i got a very big main.bin file more then 960MByte, so i tried to change the char vector with

New tcp stack attack

2008-10-01 Thread Leon Dippenaar
Hi there, is there any weight to this new story on slashdot http://it.slashdot.org/it/08/10/01/0127245.shtml about a new attacker possible to break any tcp stack? Sounds rather shady, so here I am, perhaps you guys have your ears closer to the ground Regards

Re: Limit number of login sessions

2008-10-01 Thread Giancarlo Razzolini
Maximo Pech escreveu: I mean, I don't know if there's another way to do it without having to login in the ssh server. What about a VPN? You can filter on vpn ip's. -- Giancarlo Razzolini http://lock.razzolini.adm.br Linux User 172199 Red Hat Certified Engineer no:804006389722501

Re: New tcp stack attack

2008-10-01 Thread Stephan A. Rickauer
On Wed, 2008-10-01 at 14:52 +0200, Leon Dippenaar wrote: Hi there, is there any weight to this new story on slashdot http://it.slashdot.org/it/08/10/01/0127245.shtml about a new attacker possible to break any tcp stack? Sounds rather shady, so here I am, perhaps you guys have your ears

Re: pf - queue filter directive sticky?

2008-10-01 Thread Henning Brauer
* (private) HKS [EMAIL PROTECTED] [2008-09-30 22:34]: Thanks, I overlooked that a default queue was required. With that in mind, then, does this section of pf.conf(5) imply that the queue directive is sticky? pf.conf doesn't say it would be sticky anywhere, and, surprise, it isn't. --

Re: New tcp stack attack

2008-10-01 Thread Claudio Jeker
On Wed, Oct 01, 2008 at 03:31:00PM +0200, Stephan A. Rickauer wrote: On Wed, 2008-10-01 at 14:52 +0200, Leon Dippenaar wrote: Hi there, is there any weight to this new story on slashdot http://it.slashdot.org/it/08/10/01/0127245.shtml about a new attacker possible to break any tcp

Re: New tcp stack attack

2008-10-01 Thread Duncan Patton a Campbell
On Wed, 01 Oct 2008 14:52:29 +0200 Leon Dippenaar [EMAIL PROTECTED] wrote: Hi there, is there any weight to this new story on slashdot http://it.slashdot.org/it/08/10/01/0127245.shtml about a new attacker possible to break any tcp stack? Sounds rather shady, so here I am, perhaps you

Re: New tcp stack attack

2008-10-01 Thread Duncan Patton a Campbell
On Wed, 1 Oct 2008 15:58:22 +0200 Claudio Jeker [EMAIL PROTECTED] wrote: On Wed, Oct 01, 2008 at 03:31:00PM +0200, Stephan A. Rickauer wrote: On Wed, 2008-10-01 at 14:52 +0200, Leon Dippenaar wrote: Hi there, is there any weight to this new story on slashdot

Re: New tcp stack attack

2008-10-01 Thread Alexander Sabourenkov
Duncan Patton a Campbell wrote: It seems to me the problem is with SYN cookies. SYN cookies are only mentioned to boast about their high-performance tcp flooder. Problem is that some systems 'became overly responsive', and this is clearly an implementation issue. We noticed that certain

Re: New tcp stack attack

2008-10-01 Thread Paul de Weerd
On Wed, Oct 01, 2008 at 03:58:22PM +0200, Claudio Jeker wrote: | On Wed, Oct 01, 2008 at 03:31:00PM +0200, Stephan A. Rickauer wrote: | On Wed, 2008-10-01 at 14:52 +0200, Leon Dippenaar wrote: | Hi there, | | is there any weight to this new story on slashdot |

Re: New tcp stack attack

2008-10-01 Thread Dries Schellekens
On Wed, Oct 1, 2008 at 4:22 PM, Duncan Patton a Campbell [EMAIL PROTECTED] wrote: It seems to me the problem is with SYN cookies. When I read the pseudo article, I had the impression that the server does not have to implement SYN cookies. Their sockstress program uses (client) SYN cookies to

Re: New tcp stack attack

2008-10-01 Thread Duncan Patton a Campbell
On Wed, 01 Oct 2008 12:24:16 -0300 Fernando Gont [EMAIL PROTECTED] wrote: At 11:13 a.m. 01/10/2008, Duncan Patton a Campbell wrote: Sockstress computes and stores so-called client-side SYN cookies and enables Lee and Louis to specify a destination port and IP address. The method allows

Re: New tcp stack attack

2008-10-01 Thread Jussi Peltola
Most application protocols running on TCP are quite vulnerable to DoS, but nobody has seemed to care so far...

HPING or equiv

2008-10-01 Thread sslaytor
Hi Folks, Looking for a bit of insight from you guys in the know. I've deployed a 4.3 box as a pen test / scanning tool for our network. One of the toys I've put on is HPING from the packages collection. Ok so here's the problem if I do a 'hping -c 1 -i u100 -1 xx.xx.xx.xx' I generate a

Re: New tcp stack attack

2008-10-01 Thread Fernando Gont
At 11:47 a.m. 01/10/2008, Dries Schellekens wrote: It seems to me the problem is with SYN cookies. When I read the pseudo article, I had the impression that the server does not have to implement SYN cookies. Their sockstress program uses (client) SYN cookies to estabilish a lot of TCP

Re: New tcp stack attack

2008-10-01 Thread Fernando Gont
At 12:41 p.m. 01/10/2008, Duncan Patton a Campbell wrote: This is simply the naphta attack. They don't really need to use syn cookies. They could simply ACK any SYN/ACK they receive, and that's it. The impression I got is that they collect enough SYN cookies from the server to crack the

Re: HPING or equiv

2008-10-01 Thread Geoff Steckel
Ok so here's the problem if I do a 'hping -c 1 -i u100 -1 xx.xx.xx.xx' I generate a rather unimpressive 50pps. Issuing the same command on a gentoo box (sorry) I get 9000+ pps. time sudo ping -f ping PING ping.oat.com (198.5.5.10): 56 data bytes --- ping.oat.com ping statistics --- 12180

Re: New tcp stack attack

2008-10-01 Thread Fernando Gont
At 11:13 a.m. 01/10/2008, Duncan Patton a Campbell wrote: Sockstress computes and stores so-called client-side SYN cookies and enables Lee and Louis to specify a destination port and IP address. The method allows them to complete the TCP handshake without having to store any values, which

Re: New tcp stack attack

2008-10-01 Thread Peter J. Philipp
Fernando Gont wrote: According to a podcast I listened to, this is not what they try to do. And even then, brute force attacks against SYN cookies have already been discussed in the past. (although I agree that it usually requires hard googling to spot the right documentation) Kind regards,

Re: New tcp stack attack

2008-10-01 Thread Fernando Gont
At 01:56 p.m. 01/10/2008, Peter J. Philipp wrote: I listened to the podcast and got the idea that the socket is in ESTABLISHED state (so after 3 way handshake) and they mention that a packets PCB resources have timers, and that is what they exploit. That was just an example of the type of

Re: New tcp stack attack

2008-10-01 Thread Peter J. Philipp
Fernando Gont wrote: At 01:56 p.m. 01/10/2008, Peter J. Philipp wrote: I listened to the podcast and got the idea that the socket is in ESTABLISHED state (so after 3 way handshake) and they mention that a packets PCB resources have timers, and that is what they exploit. That was just an

Re: HPING or equiv

2008-10-01 Thread Simon Slaytor
Hi Geoff, Thanks for the reply, no I don't think it's the box, DMESG below. Ok some test output where the IP pinged is the far end of a /30 subnet on a dedicated 1G line rate router port of a 7609 cisco, sup 720 etc.. If I do a flood PING # time ping -c 1000 -f 80.65.xxx.xxx PING

Sun Blade 2000 with XVR-1000?

2008-10-01 Thread UID ZERO
Hi list. I've been offered a Blade 2000 with an XVR-1000 graphics card, and was hoping to run 4.4-current on it. Ideally would like to use it with X, but can't seem to find any definitive information about whether this graphics card works with xenocara. Anyone have any experience with it? Does

Re: Weird pkg_info behavior?

2008-10-01 Thread Slim Joe
On 2008/10/1, Stuart Henderson [EMAIL PROTECTED] wrote: On 2008-10-01, Nick Guenther [EMAIL PROTECTED] wrote: If you are looking for package descriptions, install the ports tree and read the Makefiles. A lynx dump of http://www.openbsd.org/4.3_packages/i386.html seems more handy. For

Re: New tcp stack attack

2008-10-01 Thread Brian Keefer
On Oct 1, 2008, at 11:11 AM, Peter J. Philipp wrote: Fernando Gont wrote: If the discoverers of this bug don't make their sockstress available to OpenBSD then I have a userland TCP/IP stack for OpenBSD developers (mail me), but it's only written to be a server, but I suspect it would be

uvm_fault again...

2008-10-01 Thread ng-sup01
Hello, Yesterday I managed to get my hands on the system which halted twice with a uvm_fault (see original post). Rebooted in single-user and, as suggested, ran fsck on / first, then on /usr and /var. Turned out clean. If all goes well, I should have a replacement firewall today, so I