Re: Update OpenBSD Remotely

2015-05-18 Thread Doug Hogan
On Sun, May 17, 2015 at 11:52:19PM +0100, Raf Czlonka wrote:
> There are several things which this script does not check for - some of
> those are on my TODO list:

I didn't review your script, but I did ctrl+s...

TODO item #0 should be to use signify with SHA256.sig rather than
checking SHA256 directly.  There's an example in the man page. :)

SHA-256 checks if the files were downloaded properly, but it does not
check if the files are from us.  signify with SHA256.sig provides both
integrity and authentication.



Re: Update OpenBSD Remotely

2015-05-18 Thread Giancarlo Razzolini
On 17-05-2015 11:08, Peter Leber wrote:
> I recognize that there's m:tier's binary patching service 
> (https://stable.mtier.org), but the packages are signed
> by m:tier rather than the OpenBSD project. While following m:tier's
> binary patches is a good compromise to me, it's not a perfect solution.
> I'm perfectly fine with running the -current flavour of OpenBSD feature-
> and stability-wise, but I did not have the success of remotely triggering
> a script, rebooting the machine and have an up and running updated
> machine.
> While I did find the autoinstall(8) feature, which, since 5.7, should be
> able to trigger an automatic upgrade if the file /auto_upgrade.conf is
> present, I did not see an effect in the bootup messages on the virtual
> machine I'm using for testing things out.
> Furthermore, I did find a tool named snap, aiming at making running 
> -current more enjoyable (see https://github.com/qbit/snap), but it does
> also seem to be relying on the user to manually start the upgrading
> process on system reboot, if I got everything correctly.
Do you really need to follow -current? Because I've been using
m:tier and their openup tool for years to follow -stable with no
problems. I don't like the idea of automatic update + reboot. But it's
doable with openup. I personally have it setup to run with -c from cron
so it will mail me what changed.

Following -current on a production or critical environment will
prove to be a challenge. Unless you carefully test each snapshot and
then have some tool like puppet to automate the upgrade with snap or
other tool. Even with autoinstall(8).

Cheers,
Giancarlo Razzolini



Re: Update OpenBSD Remotely

2015-05-18 Thread Aaron Bieber
On Sun, May 17, 2015, at 08:08 AM, Peter Leber wrote:
> I want to build a test system based on OpenBSD 5.7 which updates
> in an automated fashion.
> The goal is to have a remotely located machine which runs OpenBSD 5.7
> and is constantly updated. While restarting the machine remotely via SSH
> is perfectly fine to me, I do not want to access the machine locally in
> order to interrupt the automatic reboot in order to trigger the manual
> upgrading process. I'm fine with following -stable and -current alike.
> 
> I recognize that there's m:tier's binary patching service 
> (https://stable.mtier.org), but the packages are signed
> by m:tier rather than the OpenBSD project. While following m:tier's
> binary patches is a good compromise to me, it's not a perfect solution.
> I'm perfectly fine with running the -current flavour of OpenBSD feature-
> and stability-wise, but I did not have the success of remotely triggering
> a script, rebooting the machine and have an up and running updated
> machine.
> While I did find the autoinstall(8) feature, which, since 5.7, should be
> able to trigger an automatic upgrade if the file /auto_upgrade.conf is
> present, I did not see an effect in the bootup messages on the virtual
> machine I'm using for testing things out.
> Furthermore, I did find a tool named snap, aiming at making running 
> -current more enjoyable (see https://github.com/qbit/snap), but it does
> also seem to be relying on the user to manually start the upgrading
> process on system reboot, if I got everything correctly.

Author of snap here. It depends, you can have it run things
automatically for you.. or it can just install the sets. By default it
will only install the sets.

It's specifically designed to run with no external dependencies (nothing
needs to be installed from ports) and can be run from cron. If you do
use it via cron don't forget to run sysmerge!

Let me know if you have any questions :D

> 
> Is there someone aware of a procedure which could help me solving my
> problem?
> I thank you very much in advance.
> 
> Peter



possible httpd Content-Length overflow

2015-05-18 Thread lists
I'm not intimately familiar with the HTTP spec, but I'm having an issue
transferring a large file (2GB) from httpd.

Chrome starts streaming the file, but stops somewhere between 7-10 MB.
Using the debugger, it appears that the "Content-Length" header is
negative (-2095872469) in this case.

A quick search of misc@ turned up nothing related to this, but maybe I
missed it somewhere.



Re: Httpd perfect forward secrecy

2015-05-18 Thread Martijn Rijkeboer
> On Mon, May 18, 2015 at 07:43:26PM +0200, Martijn Rijkeboer wrote:
>> Hi,
>>
>> I've just switched my webserver from 5.6/nginx to 5.7/httpd and was
>> testing my TLS setup using SSL Labs[1]. The SSL Labs test indicates
>> that my setup doesn't support forward secrecy. Is this not implemented
>> in the 5.7 version of httpd or is my configuration wrong (included
>> below)?

> We disabled older cipher suites and protocols by default.  Any new-ish
> browser should prefer ECDHE over DHE.

Thank you very much for your explanation. SSL labs flags this webserver
as not supporting Forward Secrecy with the reference browsers, because
one of the reference browsers doesn't work (IE 8-10 / Win 7). Since none
of my users uses that browser I will stick to the sane defaults.


> So if your really want to enable legacy DHE modes, set the following
> in the server section:
>
>   tls dhe "legacy"

This doesn't help either, but as explained above that's no problem for
me.

Kind regards,


Martijn Rijkeboer



Re: Httpd perfect forward secrecy

2015-05-18 Thread Reyk Floeter
On Mon, May 18, 2015 at 07:43:26PM +0200, Martijn Rijkeboer wrote:
> Hi,
> 
> I've just switched my webserver from 5.6/nginx to 5.7/httpd and was
> testing my TLS setup using SSL Labs[1]. The SSL Labs test indicates that
> my setup doesn't support forward secrecy. Is this not implemented in
> the 5.7 version of httpd or is my configuration wrong (included below)?
> 
> OS: OpenBSD 5.7-stable AMD64
> 
> Kind regards,
> 
> 
> Martijn Rijkeboer
> 

We disabled older cipher suites and protocols by default.  Any new-ish
browser should prefer ECDHE over DHE.

>From httpd.conf:
---snip---
 dhe params
 Specify the DHE parameters to use for DHE cipher suites.
 Valid parameter values are none, legacy and auto.  For
 legacy a fixed key length of 1024 bits is used, whereas
 for auto the key length is determined automatically.  The
 default is none, which disables DHE cipher suites.

 ecdhe curve
 Specify the ECDHE curve to use for ECDHE cipher suites.
 Valid parameter values are none, auto and the short name
 of any known curve.  The default is auto.
---snap---

So if your really want to enable legacy DHE modes, set the following
in the server section:

tls dhe "legacy"

Reyk

> 
> --- /etc/httpd.conf ---
> 
> ext_addr="*"
> 
> server "www.bunix.org" {
> listen on $ext_addr tls port 443
> tls certificate "/etc/ssl/www.bunix.org.crt.pem"
> tls key "/etc/ssl/private/www.bunix.org.key.pem"
> 
> connection {
> max requests 500
> timeout 3600
> }
> 
> root "/htdocs/www.bunix.org"
> }
> 
> types {
> include "/usr/share/misc/mime.types"
> }
> 
> 
> -
> 
> [1] https://www.ssllabs.com/ssltest/
> 

-- 



Re: Httpd perfect forward secrecy

2015-05-18 Thread Martijn Rijkeboer
> I've just switched my webserver from 5.6/nginx to 5.7/httpd and was
> testing my TLS setup using SSL Labs[1]. The SSL Labs test indicates
> that my setup doesn't support forward secrecy. Is this not implemented
> in the 5.7 version of httpd or is my configuration wrong (included
> below)?

In my previous message I have forgotten to mention that I also tried
setting tls dhe to "auto", but that didn't help either.

Kind regards,


Martijn Rijkeboer



Re: Robustness in ports fetch program?

2015-05-18 Thread Marc Espie
On Sun, May 17, 2015 at 08:18:06AM -0400, Alan Corey wrote:
> I don't think it did this back in 5.0 days or maybe earlier.  I started
> with OpenBSD 2.7, I just usually attributed problems to being my fault.
> And I've always used the ports tree, not packages. Distfiles are often
> useful across OpenBSD versions, sometimes in FreeBSD, I've even built some
> under Linux.
> 
> I didn't look at what FETCH_CMD was defined as by default, I just assumed
> defining something non-null changed it.  I did notice that when it retries
> it's wrongly assumed there's a problem with the first source and gone to
> another.
> 
> Does every developer have perfect internet?  That's very frustrating, maybe
> counterproductive in testing.  Try a modem, you can probably find a free
> one.  Connection interruptions and resets happen many times a day.
> On May 17, 2015 1:22 AM, "Marc Espie"  wrote:

Why are you ranting instead of providing the info I'm asking for ?!!!

JUST OVERRIDE THE DAMN FETCH_CMD!!!

put
FETCH_CMD = /usr/bin/ftp -v ${_PROGRESS} -k ${FTP_KEEPALIVE} -C

in /etc/mk.conf

so that *at least* we can see verbose output from your fetches.

Like I said, *the error comes from ftp*.

More accurately, fetch itself has the following logic:

for site in list
do
if FETCH_CMD -o file.part ${site}url
then
ck=`check_size file.part.part`
-> leading to "size does not match, hence rm file.part, hence retry"
fi
done

this is where your problem lies: ftp returns "everything okay", so the logic
assumes the file retrieved correctly, and when it finds out the size does not
match, it assumes a corrupted mirror, and hence deletes the partial file.

ftp(1)'s code is awful. I'm not wading thru those waters without more info.

GIVE ME WHATEVER FTP IS SAYING WHEN THINGS BREAK, when you tell it to be
verbose.



Httpd perfect forward secrecy

2015-05-18 Thread Martijn Rijkeboer
Hi,

I've just switched my webserver from 5.6/nginx to 5.7/httpd and was
testing my TLS setup using SSL Labs[1]. The SSL Labs test indicates that
my setup doesn't support forward secrecy. Is this not implemented in
the 5.7 version of httpd or is my configuration wrong (included below)?

OS: OpenBSD 5.7-stable AMD64

Kind regards,


Martijn Rijkeboer


--- /etc/httpd.conf ---

ext_addr="*"

server "www.bunix.org" {
listen on $ext_addr tls port 443
tls certificate "/etc/ssl/www.bunix.org.crt.pem"
tls key "/etc/ssl/private/www.bunix.org.key.pem"

connection {
max requests 500
timeout 3600
}

root "/htdocs/www.bunix.org"
}

types {
include "/usr/share/misc/mime.types"
}


-

[1] https://www.ssllabs.com/ssltest/



Re: spamd - whitelist sender email addresses

2015-05-18 Thread Craig Skinner
Hi Alex,

On 2015-05-18 Mon 16:37 PM |, Alex Greif wrote:
> On Mon, May 18, 2015 at 02:20:08PM +0100, Craig Skinner wrote:
> 
> yes, this should help, in the case that the sender tries longer
> than 4 hours.
> 

RFC 5321, in section "4.5.4.1.  Sending Strategy" has:


...
..

   Retries continue until the message is transmitted or the sender gives
   up; the give-up time generally needs to be at least 4-5 days. .


> Are there any experiences, after how many hours/days the sender
> side (at the large ones like google, yahoo, hotmail, etc)
> gives up?
> 

I didn't make notes on that, sorry.

>From memory, they honour the 4 day rule.

While 1 day greyexp time wasn't enough,
2 days works here for the big free mail providers.

If that doesn't work for you, increase it to 3 days & try again.

Once even a low (but regular) volume comes through,
spamd auto whitelisting does the job without extra help.

I created test Goatmail, Snotmail & Yahoons email accounts & mailed my
boxes to test. Maybe you could try that from your friend's provider?




See this recent thread:
http://marc.info/?t=14245592082&r=1&w=2

SPF is open to abuse. Paul calculated gmail alone SPF lists
217088 total IPv4 addresses
29710560942849126597578981376 total IPv6 addresses
http://marc.info/?l=openbsd-misc&m=142478407909186&w=2

That can't be an honest representation of legitimate SMTP servers to add
to white lists. Plus all the other providers IP addresses
Too much work maintaining, loading, parsing all that.

Cool.
-- 
We gave you an atomic bomb, what do you want, mermaids?
-- I. I. Rabi to the Atomic Energy Commission



Re: Apache2 on 5.7 = certificate error

2015-05-18 Thread John Merriam
On Mon, 18 May 2015, Stefan Sperling wrote:
> On Mon, May 18, 2015 at 10:04:03AM -0400, John Merriam wrote:
> > I get the following error in the error_log when I try to start Apache2:
> > 
> > [Mon May 18 09:51:43 2015] [error] Failed to configure CA certificate 
> > chain!
> > 
> > The certificate is a wildcard certificate from RapidSSL.
> > 
> > I have their 'intermediate CA bundle' from here:
> > 
> > https://knowledge.rapidssl.com/support/ssl-certificate-support/index?page=content&actp=CROSSLINK&id=SO26459
> > 
> > in a file that is pointed to with the SSLCertificateChainFile directive in 
> > my Apache2 config.
> 
> What does this file contain exactly? I believe mod_ssl expects the server
> certificate followed by any intermediate CA certificates up to the root
> CA cert, all in PEM format, in one file.
> 
> It's very odd that the behaviour between 5.6 and 5.7 changed.
> None of the upstream changes between 2.2.27 and 2.2.29 seem to apply.
> http://www.apache.org/dist/httpd/CHANGES_2.2
> 
> Given your error message, the point of failure in mod_ssl is a call to
> SSL_CTX_use_certificate_chain(), a function name which exists in mod_ssl
> and also existed in LibreSSL for a brief period before 5.7.
> During which time mod_ssl's version was renamed in our ports tree.
> Before release, LibreSSL's function was renamed and mod_ssl's version
> renamed back to its original name. This should not matter at all unless
> something unexpected happened during release package builds (unlikely).
> 
> Can you make it work by using alternative configuration options, such as
> SSLCertificateFile and SSLCACertificateFile or SSLCACertificatePath?
> 

Yes, it was very odd to me as well that it didn't work after the upgrade.  
I didn't change a single bit of my Apache2 config.  I checked 
/usr/local/share/examples/apache2/conf/* for changes after the upgrade.  
Since there were none I didn't change anything.

I just changed SSLCertificateChainFile to SSLCACertificateFile in my 
httpd-ssl.conf and it works!  I should have thought of trying something 
like that...

The file pointed to in my SSLCertificateChainFile (and now 
SSLCACertificateFile) directives contains:

-BEGIN CERTIFICATE-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-END CERTIFICATE-
-BEGIN CERTIFICATE-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-END CERTIFICATE-

which is the RapidSSL 'RSA SHA-2 (under SHA-1 Ro

Re: Apache2 on 5.7 = certificate error

2015-05-18 Thread Stefan Sperling
On Mon, May 18, 2015 at 10:04:03AM -0400, John Merriam wrote:
> I get the following error in the error_log when I try to start Apache2:
> 
> [Mon May 18 09:51:43 2015] [error] Failed to configure CA certificate 
> chain!
> 
> The certificate is a wildcard certificate from RapidSSL.
> 
> I have their 'intermediate CA bundle' from here:
> 
> https://knowledge.rapidssl.com/support/ssl-certificate-support/index?page=content&actp=CROSSLINK&id=SO26459
> 
> in a file that is pointed to with the SSLCertificateChainFile directive in 
> my Apache2 config.

What does this file contain exactly? I believe mod_ssl expects the server
certificate followed by any intermediate CA certificates up to the root
CA cert, all in PEM format, in one file.

It's very odd that the behaviour between 5.6 and 5.7 changed.
None of the upstream changes between 2.2.27 and 2.2.29 seem to apply.
http://www.apache.org/dist/httpd/CHANGES_2.2

Given your error message, the point of failure in mod_ssl is a call to
SSL_CTX_use_certificate_chain(), a function name which exists in mod_ssl
and also existed in LibreSSL for a brief period before 5.7.
During which time mod_ssl's version was renamed in our ports tree.
Before release, LibreSSL's function was renamed and mod_ssl's version
renamed back to its original name. This should not matter at all unless
something unexpected happened during release package builds (unlikely).

Can you make it work by using alternative configuration options, such as
SSLCertificateFile and SSLCACertificateFile or SSLCACertificatePath?



ASF, AMT and PCIe cards (Re: WOL support for bge driver)

2015-05-18 Thread David Vasek

On Mon, 18 May 2015, Stefan Sperling wrote:


OTOH, many laptops nowadays ship with Intel AMT and suffer the same issue
or worse. Yet we still run on them. Current AMT versions have an attack
surface that dwarfs ASF's. Perhaps this is a lost cause and we'll simply
have to accept that a lot of hardware is insecure by design.


(I have borrowed another thread from tech@ for start this one.)

This brings other questions. Are standalone PCIe cards safe from this? 
Many specification documents mention that they support at least ASF too. 
Don't they contain the same firmware (or most of it) as their onboard 
variants?


What PCIe gigabit ethernet cards that are supported in OpenBSD are 
considered secure? Does anyone have a recommendation?


Thank you.

Regards,
David



Re: spamd - whitelist sender email addresses

2015-05-18 Thread Alex Greif
On Mon, May 18, 2015 at 02:20:08PM +0100, Craig Skinner wrote:

Hi Craig,

yes, this should help, in the case that the sender tries longer
than 4 hours.
Are there any experiences, after how many hours/days the sender
side (at the large ones like google, yahoo, hotmail, etc)
gives up?

thanks,
Alex.


> On 2015-05-18 Mon 09:26 AM |, Alex Greif wrote:
> > 
> > I am using spamd on a current installation in greylisting mode,
> > and have have problems with large sites that have several
> > SMTP servers but no SPF ip-address ranges.
> 
> Hi Alex,
> 
> Bumping up the spamd(8) greyexp time to 2-4 days works well (on 5.6):
> 
> spamd_flags='-G 25:48:864 ...'
> 
> > Sometimes I have more than 10 mail server IPs in the greylisted
> > in spamdb, from the same (friend) email address, and the the
> > sender side finally/unfortunately gives up, so that I don't get
> > the mail.
> > 
> 
> greyexp is 4 hours by default.
> 
> Unless the same sending server in the pool retries within greyexp hours,
> it will not be whitelisted.
> 
> Increasing it to 2+ days works for gmail, yahoo, hotmail, etc
> 
> It is slow to start with, but once a host is whitelisted, it just works.
> 
> Cheers.



Re: console prompt disappeared after login

2015-05-18 Thread dan mclaughlin
On Mon, 18 May 2015 14:21:39 +0100 Pedro Tender  
wrote:
> I'm not having problems with ksh nor zsh, going in and out of X (xfce).
> ​TTY's working fine.​
> 
> 
> On Mon, May 18, 2015 at 12:56 PM, dan mclaughlin 
> wrote:
> 
> > On Mon, 18 May 2015 11:24:13 +0100 Pedro Tender 
> > wrote:
> > > I've updated another machine today to latest snapshot and it is fixed.
> > > Have you tried the 18th May (ftp3.eu) snapshot ?
> > >
> > >
> > >
> > > On Sun, May 17, 2015 at 10:51 PM, dan mclaughlin <
> > thev...@openmailbox.org>
> > > wrote:
> > >
> > > > On Sun, 17 May 2015 14:29:07 - "Maurits Fennis" 
> > > > wrote:
> > > > > > just not the TTY's
> > > > >
> > > > > same here.
> > > > >
> > > > > --
> > > > > Maurits Fennis
> > > > >
> > > > > ()  ascii ribbon campaign
> > > > > /\  www.asciiribbon.org
> > > > >
> > > >
> > > > here too. i just submitted a bug report "problems with console output".
> > >
> >
> > it's a partial fix. the console works until you switch to X, which works
> > fine until you switch back to console, then nothing displays right.
> >
> > my original bug report didn't go thru, so i'll retry.
> 

i tried the same site, and i'm using ksh as well, though i am using fvwm
as my window manager.

looking further into it, my problem may be unrelated. it was just that
i discovered it at the same time, and maybe conflated them. i reverted to
an older snapshot that gives the the same problem as well. i think it has
to do with the vesa driver.



Apache2 on 5.7 = certificate error

2015-05-18 Thread John Merriam
Hello.  I have upgraded my home server from OpenBSD 5.6 to 5.7.  It is 
amd64 and it is on -stable with -stable ports.

Everything is working fine after the upgrade except SSL in Apache2 
(apache-httpd package/port).

I get the following error in the error_log when I try to start Apache2:

[Mon May 18 09:51:43 2015] [error] Failed to configure CA certificate 
chain!

The certificate is a wildcard certificate from RapidSSL.

I have their 'intermediate CA bundle' from here:

https://knowledge.rapidssl.com/support/ssl-certificate-support/index?page=content&actp=CROSSLINK&id=SO26459

in a file that is pointed to with the SSLCertificateChainFile directive in 
my Apache2 config.

This worked fine with the old Apache2 in 5.6.

I've tried several different things to try to convince it to work but 
nothing has done the trick yet.

I use the same certificate in sendmail and dovecot on the same server and 
it is working fine with those two daemons.

Any ideas or suggestions as to what the problem may be or where I should 
start digging?  Thanks!

-- 

John Merriam



Re: console prompt disappeared after login

2015-05-18 Thread Pedro Tender
I'm not having problems with ksh nor zsh, going in and out of X (xfce).
​TTY's working fine.​


On Mon, May 18, 2015 at 12:56 PM, dan mclaughlin 
wrote:

> On Mon, 18 May 2015 11:24:13 +0100 Pedro Tender 
> wrote:
> > I've updated another machine today to latest snapshot and it is fixed.
> > Have you tried the 18th May (ftp3.eu) snapshot ?
> >
> >
> >
> > On Sun, May 17, 2015 at 10:51 PM, dan mclaughlin <
> thev...@openmailbox.org>
> > wrote:
> >
> > > On Sun, 17 May 2015 14:29:07 - "Maurits Fennis" 
> > > wrote:
> > > > > just not the TTY's
> > > >
> > > > same here.
> > > >
> > > > --
> > > > Maurits Fennis
> > > >
> > > > ()  ascii ribbon campaign
> > > > /\  www.asciiribbon.org
> > > >
> > >
> > > here too. i just submitted a bug report "problems with console output".
> >
>
> it's a partial fix. the console works until you switch to X, which works
> fine until you switch back to console, then nothing displays right.
>
> my original bug report didn't go thru, so i'll retry.



Re: spamd - whitelist sender email addresses

2015-05-18 Thread Craig Skinner
On 2015-05-18 Mon 09:26 AM |, Alex Greif wrote:
> 
> I am using spamd on a current installation in greylisting mode,
> and have have problems with large sites that have several
> SMTP servers but no SPF ip-address ranges.

Hi Alex,

Bumping up the spamd(8) greyexp time to 2-4 days works well (on 5.6):

spamd_flags='-G 25:48:864 ...'

> Sometimes I have more than 10 mail server IPs in the greylisted
> in spamdb, from the same (friend) email address, and the the
> sender side finally/unfortunately gives up, so that I don't get
> the mail.
> 

greyexp is 4 hours by default.

Unless the same sending server in the pool retries within greyexp hours,
it will not be whitelisted.

Increasing it to 2+ days works for gmail, yahoo, hotmail, etc

It is slow to start with, but once a host is whitelisted, it just works.

Cheers.
-- 
The sooner you make your first 5000 mistakes, the sooner you will be
able to correct them.
-- Nicolaides



Re: Error when compiling libcrypto after 003_openssl.patch

2015-05-18 Thread Chess Griffin

On 5/17/2015 11:13 PM, Michael McConville wrote:

Patch 002 applied and built cleanly, and patch 003 applied without
issue. However, I get the error shown below when I attempt to build
libcrypto for patch 003.


...


Has anyone else experienced this? Any ideas about what might be causing
it?



Yes, I experienced this too.

I just upgraded a 5.6 i386 server last night using the bsd.rd install 
kernel and the upgrade went fine.  All the package updates were ok too.


I then started patching and ran into the exact same problem with patch 
003 (002 was ok).




Re: console prompt disappeared after login

2015-05-18 Thread dan mclaughlin
On Mon, 18 May 2015 11:24:13 +0100 Pedro Tender  
wrote:
> I've updated another machine today to latest snapshot and it is fixed.
> Have you tried the 18th May (ftp3.eu) snapshot ?
> 
> 
> 
> On Sun, May 17, 2015 at 10:51 PM, dan mclaughlin 
> wrote:
> 
> > On Sun, 17 May 2015 14:29:07 - "Maurits Fennis" 
> > wrote:
> > > > just not the TTY's
> > >
> > > same here.
> > >
> > > --
> > > Maurits Fennis
> > >
> > > ()  ascii ribbon campaign
> > > /\  www.asciiribbon.org
> > >
> >
> > here too. i just submitted a bug report "problems with console output".
> 

it's a partial fix. the console works until you switch to X, which works
fine until you switch back to console, then nothing displays right.

my original bug report didn't go thru, so i'll retry.



Re: spamd - whitelist sender email addresses

2015-05-18 Thread Adam Wolk
On Mon, 18 May 2015 09:26:13 +0200
Alex Greif  wrote:

> Hi,
> I am using spamd on a current installation in greylisting mode,
> and have have problems with large sites that have several
> SMTP servers but no SPF ip-address ranges.
> Sometimes I have more than 10 mail server IPs in the greylisted
> in spamdb, from the same (friend) email address, and the the
> sender side finally/unfortunately gives up, so that I don't get
> the mail.
> 
> Is there a way to define a list of (friendly) sender email addresses
> or domains in the following form:
> some.fri...@domail1.com
> @freinds-domain.com
> 
> so that spamd ignores greylisting the IPs of the hosts, where these
> specified senders come from?
> 
> thanks,
> Alex.

I personally use the bgpd solution to obtain a solid list of hosts

http://bgp-spamd.net/index.html

They synchronize around 200k white listed hosts by now. Those hosts
went through the regular spamd process on a more widely used mail
server hence I prefer that solution to manually hunting for those
services that deliver with a pool of servers.

Regards,
Adam



Re: console prompt disappeared after login

2015-05-18 Thread Pedro Tender
I've updated another machine today to latest snapshot and it is fixed.
Have you tried the 18th May (ftp3.eu) snapshot ?



On Sun, May 17, 2015 at 10:51 PM, dan mclaughlin 
wrote:

> On Sun, 17 May 2015 14:29:07 - "Maurits Fennis" 
> wrote:
> > > just not the TTY's
> >
> > same here.
> >
> > --
> > Maurits Fennis
> >
> > ()  ascii ribbon campaign
> > /\  www.asciiribbon.org
> >
>
> here too. i just submitted a bug report "problems with console output".



Da man passing an other year

2015-05-18 Thread Rod Whitworth
Happy Birthday Theo.

Rod/

*** NOTE *** Please DO NOT CC me. I  subscribed to the list.
Mail to the sender address that does not originate at the list server is 
tarpitted. The reply-to: address is provided for those who feel compelled to 
reply off list. Thankyou.

Rod/
---
This life is not the real thing.
It is not even in Beta.
If it was, then OpenBSD would already have a man page for it.



Re: console prompt disappeared after login

2015-05-18 Thread dan mclaughlin
On Sun, 17 May 2015 14:29:07 - "Maurits Fennis"  wrote:
> > just not the TTY's
> 
> same here.
> 
> -- 
> Maurits Fennis
> 
> ()  ascii ribbon campaign
> /\  www.asciiribbon.org
> 

here too. i just submitted a bug report "problems with console output".



Re: spamd - whitelist sender email addresses

2015-05-18 Thread Alex Greif
On Mon, May 18, 2015 at 10:52:52AM +0200, Peter N. M. Hansteen wrote:
> On Mon, May 18, 2015 at 10:05:45AM +0200, Alex Greif wrote:
> > But in some cases, the sender mail server tried so often from different
> > SMTP IPs, and finally gave up with an error to the sender. Then the sender 
> > and
> > receiver persons are quite unhappy, and a lot of time is vasted.
> 
> In most cases the MXes will be in an identifiable IP address range such as
> 194.54.104.64/26 (just a random example) you can add to a PF table
> 
> > Another problem with IPs is that the SMTP servers often change, so that IPs 
> > get
> > obsolete, or new ones are set up.
> 
> Again, unless they jump to addresses in totally unrelated ranges, something 
> like
> the nospamd example in the spamd man page should do the trick. (I make my 
> nospamd
> file available at http://www.bsdly.net/~peter/nospamd if you want to start 
> from a
> working examplei in addition to the rules from the man page)
> 

thanks, I will do it as you suggested.
And will keep an eye on "spamdb|grep GREY" output.

Alex.



Re: spamd - whitelist sender email addresses

2015-05-18 Thread Peter N. M. Hansteen
On Mon, May 18, 2015 at 10:05:45AM +0200, Alex Greif wrote:
> But in some cases, the sender mail server tried so often from different
> SMTP IPs, and finally gave up with an error to the sender. Then the sender and
> receiver persons are quite unhappy, and a lot of time is vasted.

In most cases the MXes will be in an identifiable IP address range such as
194.54.104.64/26 (just a random example) you can add to a PF table

> Another problem with IPs is that the SMTP servers often change, so that IPs 
> get
> obsolete, or new ones are set up.

Again, unless they jump to addresses in totally unrelated ranges, something like
the nospamd example in the spamd man page should do the trick. (I make my 
nospamd
file available at http://www.bsdly.net/~peter/nospamd if you want to start from 
a
working examplei in addition to the rules from the man page)

-- 
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.



Re: spamd - whitelist sender email addresses

2015-05-18 Thread Alex Greif
On Mon, May 18, 2015 at 09:46:19AM +0200, Peter N. M. Hansteen wrote:
> On Mon, May 18, 2015 at 09:26:13AM +0200, Alex Greif wrote:
> > I am using spamd on a current installation in greylisting mode,
> > and have have problems with large sites that have several
> > SMTP servers but no SPF ip-address ranges.
> > Sometimes I have more than 10 mail server IPs in the greylisted
> > in spamdb, from the same (friend) email address, and the the
> > sender side finally/unfortunately gives up, so that I don't get
> > the mail.
> 
> In cases like these, it's probably best to try to identify the likely 
> IP address range(s) where their outgoing MXes live, and add those 
> ranges to a nospamd table. I think the spamd man page has a useful example. 
> 
> In addition you can add hosts to the spamd whitelist using spamdb, ie
> 
> $ sudo spamdb -a nn.mm.xx.yy 
> 

that is exactly what I am currently doing ... trying to collect all
valid IPs an dfeeding them in nospamdb table and adding to the whitelist.

But in some cases, the sender mail server tried so often from different
SMTP IPs, and finally gave up with an error to the sender. Then the sender and
receiver persons are quite unhappy, and a lot of time is vasted.

Another problem with IPs is that the SMTP servers often change, so that IPs get
obsolete, or new ones are set up.

Thanks,
ALex.



Re: spamd - whitelist sender email addresses

2015-05-18 Thread Peter N. M. Hansteen
On Mon, May 18, 2015 at 09:26:13AM +0200, Alex Greif wrote:
> I am using spamd on a current installation in greylisting mode,
> and have have problems with large sites that have several
> SMTP servers but no SPF ip-address ranges.
> Sometimes I have more than 10 mail server IPs in the greylisted
> in spamdb, from the same (friend) email address, and the the
> sender side finally/unfortunately gives up, so that I don't get
> the mail.

In cases like these, it's probably best to try to identify the likely 
IP address range(s) where their outgoing MXes live, and add those 
ranges to a nospamd table. I think the spamd man page has a useful example. 

In addition you can add hosts to the spamd whitelist using spamdb, ie

$ sudo spamdb -a nn.mm.xx.yy 

-- 
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.



spamd - whitelist sender email addresses

2015-05-18 Thread Alex Greif
Hi,
I am using spamd on a current installation in greylisting mode,
and have have problems with large sites that have several
SMTP servers but no SPF ip-address ranges.
Sometimes I have more than 10 mail server IPs in the greylisted
in spamdb, from the same (friend) email address, and the the
sender side finally/unfortunately gives up, so that I don't get
the mail.

Is there a way to define a list of (friendly) sender email addresses
or domains in the following form:
some.fri...@domail1.com
@freinds-domain.com

so that spamd ignores greylisting the IPs of the hosts, where these
specified senders come from?

thanks,
Alex.