Re: Why are there no PKG_PATH defaults?

2014-09-24 Thread Barbier, Jason
Just to point out if you do an install where you do select a mirror your
mirror settings do seem to persist beyond the install, so it sounds like
the problem is solved and user education is in order.

*washes hands of the problem*

-- 
Jason Barbier | jab...@serversave.us
Pro Patria Vigilans



Re: kvm on OpenBSD?

2014-09-22 Thread Barbier, Jason
 True. Theo de Raadt:

 You've been smoking something really mind altering, and I think you
 should share it.

 x86 virtualization is about basically placing another nearly full
 kernel, full of new bugs, on top of a nasty x86 architecture which
 barely has correct page protection. Then running your operating system
 on the other side of this brand new pile of shit.

 You are absolutely deluded, if not stupid, if you think that a worldwide
 collection of software engineers who can't write operating systems or
 applications without security holes, can then turn around and suddenly
 write virtualization layers without security holes.


That is Theo on thinking you could use virtualization for security. As I
recall through that whole thread he had no real issues if you were foolish
enough to want to maximize utilization of a system just don’t try to call
it more secure.
And yes the KVM stuff is not there.





--
Jason Barbier | jab...@serversave.us
Pro Patria Vigilans



Re: Why anyone in their right mind would like to use NAT64

2012-10-24 Thread Barbier, Jason
Well expanding on the address space and numbering issue, that would be a
valid use for NAT but I honestly think it would be better to actually try
and fix that before trying to put a hack over the top of it. In theory you
could do it with routing tables but I could be retarded also so.

On Wed, Oct 24, 2012 at 12:24 PM, Peter Hessler phess...@theapt.org wrote:

 You have IPv4 only applications, that need to talk with the IPv6 internet.


 On 2012 Oct 24 (Wed) at 12:43:12 -0400 (-0400), Daniel Ouellet wrote:
 :Hi,
 :
 :Just saw a few questions and patch for NAT64 on misc and tech@ and I
 :am really questioning the reason to be fore NAT64 and why anyone in
 :their right mind would actually want to use this?

 --
 Pascal, n.:
 A programming language named after a man who would turn over
 in his grave if he knew about it.
 -- Datamation, January 15, 1984




-- 
Jason Barbier

Pro Patria Vigilans



Re: Why anyone in their right mind would like to use NAT64

2012-10-24 Thread Barbier, Jason
On Wed, Oct 24, 2012 at 12:33 PM, Simon Perreault
sperrea...@openbsd.orgwrote:

 Le 2012-10-24 15:29, Barbier, Jason a écrit :

  Well expanding on the address space and numbering issue, that would be a
 valid use for NAT but I honestly think it would be better to actually try
 and fix that before trying to put a hack over the top of it.


 I'm going to wait a long time for a firmware update that makes my
 IPv4-only printer speak IPv6.

 Simon


Well man there are several stable implementations of 4 to 6 and 6 to 4
bridges.


--
Jason Barbier

Pro Patria Vigilans



KMS/GEM status for Intel cards

2011-12-16 Thread Barbier, Jason
Hey,
its been a while since I have seen any update about how KMS and support for
the Intel HD 3000 (the sandy bridge Intel card). Anyone know what happens
to be going on with that?

-- 
Defendere vivos a mortuis



Re: UEFI BIOS

2011-10-01 Thread Barbier, Jason
Yeah, honestly Microsoft has even said already, there will be no nagging the

only feature you lose by not using secured booting is the swift boot. if you
flip
secured UEFI off it just makes windows 8 go into standard boot. fear
mongering
is not needed, and in the end if a secured boot loader is needed all some
one would
have to do is like Intel for example, get a signed cert from grub and hand
it to manufacturers
so then there is a secured open boot loader. The secured EFI is just the
same principal
as the built in boot sector virus protection.

On Sat, Oct 1, 2011 at 4:43 PM, john slee indig...@oldcorollas.org wrote:

 On 2 October 2011 08:03, LeviaComm Networks n...@leviacomm.net wrote:
  First off, the UEFI boot will *not* prevent other OS's from booting, it
 will
  only pop up a message saying that the boot process was not secure, just
 like
  how you can run unsigned code and it will only pop up a box stating as
 much.
   It would be impossible to prevent an 'insecure' OS from booting since
 that
  would prevent you from booting a newer version of the Windows Installer.
   Ideally UEFI would post a warning stating that the OS signature is not
 on
  the list and allow you to add it.

 ... would it?  I should think that they could simply sign the new installer
 with the existing keys.  OTOH it's quite possible that someone will extract
 the private key(s) from the hardware, too.  It already happened for Apple's
 Airport Express, no?

 On balance, I really don't think this is worth the angst and
 scaremongering.

 John




-- 
Defendere vivos a mortuis