remove mobileip(4) from the kernel

2019-10-28 Thread David Gwynne
this removes all the kernel code. if we want it back we can look in the attic. ok? or is this too much too fast? Index: conf/files === RCS file: /cvs/src/sys/conf/files,v retrieving revision 1.675 diff -u -p -r1.675 files ---

remove mobileip(4) knobs from sysctl(8)

2019-10-28 Thread David Gwynne
i disabled mobileip(4) with the idea that if noone complained, i'd remove it. noone has complained, so im going to remove it. starting at the edge, this removes the mobileip stuff from sysctl(8). ok? Index: sysctl.c === RCS file:

flex HAVE_DECL___FUNC__

2019-10-28 Thread Michael Mikonos
Hello, When reviewing flex's config.h I think we could enable HAVE_DECL___FUNC__. This allows the flex_die() macro to include __func__ in its output. For example: flex: fatal internal error at main.c:146 (flex_main): spooky error Does this look OK? - Michael Index: config.h

Re: /etc/daily : flexible df output

2019-10-28 Thread Raf Czlonka
On Mon, Oct 28, 2019 at 09:25:22PM GMT, Raf Czlonka wrote: > On Mon, Oct 28, 2019 at 01:32:05PM GMT, Andre Stoebe wrote: > > > > - df -ikl > > + df ${DFARGS-"-ikl"} > > > > Hi Andre, > > Instead of ${DFARGS-"-ikl"}, you should most likely be using: > > ${DFARGS:-"-ikl"} > > Cheers,

Re: /etc/daily : flexible df output

2019-10-28 Thread Raf Czlonka
On Mon, Oct 28, 2019 at 01:32:05PM GMT, Andre Stoebe wrote: > > - df -ikl > + df ${DFARGS-"-ikl"} > Hi Andre, Instead of ${DFARGS-"-ikl"}, you should most likely be using: ${DFARGS:-"-ikl"} Cheers, Raf

add errata66 to security.html

2019-10-28 Thread Andras Farkas
This diff adds a link to https://www.openbsd.org/errata66.html on https://www.openbsd.org/security.html I noticed this when reading the 6.6 announcement email. Index: security.html === RCS file: /cvs/www/security.html,v retrieving

Re: /etc/daily : flexible df output

2019-10-28 Thread Stuart Henderson
On 2019/10/28 10:39, Theo de Raadt wrote: > I also think this is getting out of hand. > > This script is supposed to be a simplistic subsystem providing the > minimum. Intentionally.. Adding this option today, another option > tomorrow, eventually this turns into a ${} scribble-fest. And

Re: snmp(1) & snmpd(8) saner crypto defaults

2019-10-28 Thread Martijn van Duren
To be absolutely clear: this only changes the defaults and only means that people using snmp(1) against appliances with crappy digest/cipher need to specify the crappy parameters via -a and -x. They will continue to keep working. In a similar fashion people using clients that don't support AES or

Re: iwm: add support for firmware paging

2019-10-28 Thread Mark Kettenis
> Date: Mon, 28 Oct 2019 19:28:29 +0100 > From: Stefan Sperling > > Newer iwm(4) firmware versions will require paging to host DRAM. > This diff implements support for this. It was written by Imre Vadasz in 2017. > > I would like to get review by people with experience in the kernel memory >

iwm: add support for firmware paging

2019-10-28 Thread Stefan Sperling
Newer iwm(4) firmware versions will require paging to host DRAM. This diff implements support for this. It was written by Imre Vadasz in 2017. I would like to get review by people with experience in the kernel memory subsystem and DMA, to check that this diff isn't doing something stupid. As it

Re: /etc/daily : flexible df output

2019-10-28 Thread Theo de Raadt
I also think this is getting out of hand. This script is supposed to be a simplistic subsystem providing the minimum. Intentionally.. Adding this option today, another option tomorrow, eventually this turns into a ${} scribble-fest. And somewhere around the time the script doubles in size,

Re: /etc/daily : flexible df output

2019-10-28 Thread Ingo Schwarze
Hi Nick, Nick Holland wrote on Sun, Oct 27, 2019 at 02:27:46PM -0400: > In version 1.78 of /etc/daily, the -i flag was added to the df output. > Apparently, some people run out of inodes. > > I only seem to run out of disk space, and too often, my eye skims > the daily report from a machine,

Re: HID devices without numbered reports

2019-10-28 Thread Gerhard Roth
On Mon, 28 Oct 2019 15:41:34 +0100 Patrick Wildt wrote: > On Mon, Oct 28, 2019 at 03:14:22PM +1100, Damien Miller wrote: > > On Mon, 28 Oct 2019, Damien Miller wrote: > > > > > BTW, the token still becomes unresponsive after the first transaction, > > > but looking at a sniff (using an

Re: HID devices without numbered reports

2019-10-28 Thread Patrick Wildt
On Mon, Oct 28, 2019 at 03:14:22PM +1100, Damien Miller wrote: > On Mon, 28 Oct 2019, Damien Miller wrote: > > > BTW, the token still becomes unresponsive after the first transaction, > > but looking at a sniff (using an OpenViszla), it seems we're getting the > > DATA0/DATA1 flipping incorrect

Re: snmp(1) & snmpd(8) saner crypto defaults

2019-10-28 Thread Stuart Henderson
On 2019/10/28 08:02, Martijn van Duren wrote: > At the moment we are neither consistent nor really secure in what we > offer by default for snmp. For snmp(1) we default to MD-5 and DES and > for snmpd(8) we default to SHA-1 and DES. Both are horrendously out of > date. > > Diff below updates

Re: /etc/daily : flexible df output

2019-10-28 Thread Andre Stoebe
Hello Nick, > Those of us that don't worry about running out of inodes, we can > set DF_FLAGS in /etc/daily.local to be whatever we want, in my > case, I like "-hl" (currently, it's "-ikl") I really like the idea, because getting human-readable numbers in the report without replicating

snmp(1) & snmpd(8) saner crypto defaults

2019-10-28 Thread Martijn van Duren
At the moment we are neither consistent nor really secure in what we offer by default for snmp. For snmp(1) we default to MD-5 and DES and for snmpd(8) we default to SHA-1 and DES. Both are horrendously out of date. Diff below updates both tools to use SHA-256 and AES by default. SHA-256 should

snmp(1) Call for testing AES-192 and AES-256

2019-10-28 Thread Martijn van Duren
tl;dr: Can anyone with Cisco equipment with AES-192 and AES-256 support for snmp test the diff below as much -a variants as possible and report back to me? According to the archives there was once an initiative for AES-192 and AES-256[0]. Unfortunately this was removed after draft 4. Since

snmp(1) Let walk options work on bulkwalk

2019-10-28 Thread Martijn van Duren
When originally writing snmp(1) I wanted to stay as close to netsnmp as possible to make sure I didn't introduce anything I would regret. Now that 6.6 is out the door and I'm feeling more comfortable with the tool I want to start being a little more lenient. Here's a first step by allowing the -C