Re: relayd.conf.5: less SSL

2023-10-24 Thread Peter N. M. Hansteen
On Tue, Oct 24, 2023 at 06:54:30AM +, Klemens Nanni wrote:
> - parse.y still accepting undocumented "ssl" with a warning since 2014
> - more "SSL/TLS" instead of "TLS" in manual and code comments

my take would be that while it's fine to streamline the documentation to use
the modern terminology, I suspect there may still be ancient configurations
out there that use the "ssl" keyword, so removing the last bit of support for
that option should be accompanied by or preceded by a warning on relevant
mailing lists or at least in the commit message. 

And I think undeadly.org would be more than happy to help spread the word :)

- Peter

-- 
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
https://bsdly.blogspot.com/ https://www.bsdly.net/ https://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.



Re: FWD: FWD: Re: Setting personal mailserver

2023-09-08 Thread Peter N. M. Hansteen
On Fri, Sep 08, 2023 at 11:35:37AM +0200, Sagar Acharya wrote:
> Requesting a feature at OpenSMTPD.
> Date: 8 Sept 2023, 14:50
> From: sagaracha...@tutanota.com
> To: b...@opensmtpd.org
> Subject: FWD: Re: Setting personal mailserver
> 
> 
> > I request a feature from all the devs.
> >
> > This would enable users of smtpd to host an email server at any port 
> > instead of standard 25.

Unless I read the smtpd.conf man page very wrong 
(https://man.openbsd.org/smtpd.conf) 
it is possible, but not recommended, to set up to listen on ports other than 
the standard ones.

To put it bluntly, what you need is not a new smtpd feature. What you need is 
for you to
take the advice given on the opensmptd mailing list: Read the literature others 
have pointed
you at, and please consider one or more of the alternative approaches that have 
been 
suggested to you.  

-- 
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
https://bsdly.blogspot.com/ https://www.bsdly.net/ https://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.



Re: preliminary kabylake support for inteldrm

2017-09-27 Thread Peter N. M. Hansteen
On 09/27/17 18:41, Peter N. M. Hansteen wrote:
> On 09/27/17 00:07, Robert Nagy wrote:
>>
>> Hi
>>
>> This is an updated diff for preliminary kabylake support for 6.2,
>> this needs extensive testing on all inteldrm variants.
>>
>> This diff is also in snapshots now so please, test, test test!
> 
> Installed the latest snapshot (OpenBSD 6.2 (GENERIC.MP) #114: Wed Sep 27
> 01:19:45 MDT 2017), now running the machine from
> http://bsdly.blogspot.com/2017/07/openbsd-and-modern-laptop.html with no
> xorg.conf, and it looks wonderful so far!
> 
> Preserved dmesg and xdpyinfo output:
> 
> https://home.nuug.no/~peter/20170927_dmesg_greyhame.txt
> https://home.nuug.no/~peter/20170927_xdpyinfo_greyhame.txt

Following up on this, I see that there is a firmware load failure

error: [drm:pid0:i915_firmware_load_error_print] *ERROR* failed to load
firmware i915/kbl_dmc_ver1.bin (-22)

and later, repeated at intervals

[Wed Sep 27 21:39:21] peter@greyhame:~/div/hailmary/2016$ grep drm
/var/log/messages
Sep 27 19:44:35 greyhame /bsd: error:
[drm:pid46498:intel_pipe_update_start] *ERROR* Potential atomic update
failure on pipe A
Sep 27 21:37:09 greyhame /bsd: error:
[drm:pid46498:intel_pipe_update_start] *ERROR* Potential atomic update
failure on pipe A

Then again, I'm not sure what if any functionality is impacted here

- P
-- 
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.



Re: preliminary kabylake support for inteldrm

2017-09-27 Thread Peter N. M. Hansteen
On 09/27/17 00:07, Robert Nagy wrote:
> 
> Hi
> 
> This is an updated diff for preliminary kabylake support for 6.2,
> this needs extensive testing on all inteldrm variants.
> 
> This diff is also in snapshots now so please, test, test test!

Installed the latest snapshot (OpenBSD 6.2 (GENERIC.MP) #114: Wed Sep 27
01:19:45 MDT 2017), now running the machine from
http://bsdly.blogspot.com/2017/07/openbsd-and-modern-laptop.html with no
xorg.conf, and it looks wonderful so far!

Preserved dmesg and xdpyinfo output:

https://home.nuug.no/~peter/20170927_dmesg_greyhame.txt
https://home.nuug.no/~peter/20170927_xdpyinfo_greyhame.txt

- Peter
-- 
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.



Re: OpenBSD 5.6 Released

2014-11-01 Thread Peter N. M. Hansteen
Antoine Jacoutot ajacou...@openbsd.org writes:

 November 1, 2014.
 
 We are pleased to announce the official release of OpenBSD 5.6.
 This is our 36th release on CD-ROM (and 37th via FTP/HTTP).  We remain
 proud of OpenBSD's record of more than ten years with only two remote
 holes in the default install.

Congratulations on yet another excellent release!

- Peter

-- 
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.



Re: Packet Filter nat-to issue

2014-02-28 Thread Peter N. M. Hansteen
On Fri, Feb 28, 2014 at 10:15:15AM +0100, Lo?c Blot wrote:
 i encounter a strange problem today on PF. I don't know if this i normal
 but the result is illogic.
 
 I have this rule:
 
 pass out quick proto tcp from all_clients_v4 to port { smtp smtps 587
 imap imaps pop3 pop3s } nat-to $natto_iface

the problem here is that the interface has several addresses, so you end up with

 pass out quick inet6 proto tcp from all_clients_v4 to any port = 465
 flags S/SA nat-to __automatic_d309aaac_0 round-robin

an automatically generated table, containing all addresses assigned to the
interface, and the poor thing tries to load balance between them (round-robin).

The most straightforward fix is to change the nat-to so it refers to one 
specific 
address only, and only applies to inet, something like

natto_addr=192.0.2.198
pass out quick on egress inet proto tcp from all_clients_v4 to port { smtp 
smtps 587 \
 imap imaps pop3 pop3s } nat-to $natto_addr

as always, a pfctl -vnf on the config file would show all these things expanded 
(yes,
I've been bit by the exact same round-robin problem myself)

- Peter
-- 
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.



Re: Iso image integrity verification

2013-09-13 Thread Peter N. M. Hansteen
On Fri, Sep 13, 2013 at 10:32:43AM +0300, Paul Irofti wrote:
  Yes, the MITM was DPD. Great currier. I recommand it to everyone. NOT!
^courier

the two aren't necessarily mutually exclusive ;)

- P 

-- 
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.



Re: pfctl / nat / dhcp

2013-02-07 Thread Peter N. M. Hansteen
On Thu, Feb 07, 2013 at 09:26:03AM -0500, sven falempin wrote:
 
 egress, vr0 ext are all the same, arent they ?

in your case, it sounds like there would be a full overlap. In general 'egress' 
is the interface group that contains the interfaces with default routes. As 
long 
as egress has only one member, you should be OK.

- Peter
-- 
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.



Re: PF-MIB for snmpd

2012-02-18 Thread Peter N. M. Hansteen
Joel Knight knight.j...@gmail.com writes:

 Looks like there's an issue pulling the diff with lynx or curl. If you
 use Firefox or Chrome it seems to work fine. Not sure what's going on.

looks clean when fetched with ftp(1) as well, didn't actually try
applying though. it's against a recent -current, right?

- P

-- 
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.



Re: recent change of nat-to behavior

2011-07-31 Thread Peter N. M. Hansteen
Ryan McBride mcbr...@openbsd.org writes:

 Please try a newer snapshot, this bug was fixed in the following commit:

Latest snapshot (date Jul 31) still loads

match out log on $ext_if inet nat-to ($ext_if)

as 

match out log on xl0 inet all nat-to (xl0) round-robin

but NATed traffic is handled correctly AFAICS.

So you should consider this bug closeable.

- Peter
-- 
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.



Re: recent change of nat-to behavior

2011-07-31 Thread Peter N. M. Hansteen
Ryan McBride mcbr...@openbsd.org writes:

 match out log on xl0 inet all nat-to (xl0) round-robin

 This part of the behaviour is normal and has not changed (since the
 commit below, I believe). On 4.9 I get the following:

 i386-49$ echo pass out on egress nat-to (egress) | pfctl -vnf -
 pass out on egress all flags S/SA keep state nat-to (egress) round-robin
 i386-49$

 The interface may have more than one address...

That's probably just me not noticing, but the odd part is that while
this interface has several addresses, it only has one IPv4 address:

peter@skapet:~$ ifconfig xl0
xl0: flags=8843UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST mtu 1500
lladdr 00:50:da:21:cb:c9
priority: 0
groups: egress
media: Ethernet autoselect (100baseTX full-duplex)
status: active
inet 213.187.179.198 netmask 0xfffc broadcast 213.187.179.199
inet6 fe80::250:daff:fe21:cbc9%xl0 prefixlen 64 scopeid 0x3
inet6 2001:16d8:ccbc:dead:beef::1 prefixlen 64

But anyway, with this snapshot I don't need to rewrite the NAT parts of
my tutorial :)

- P
-- 
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.



recent change of nat-to behavior

2011-07-30 Thread Peter N. M. Hansteen
I finally got around to upgrading my home gateway from 4.9-current
(late snapshot) to 5.0-beta (jul 27 snapshot), and I stumbled across
what appears to be a subtle but significant change in nat-to behavior.

my $ext_if is

xl0: flags=8843UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST mtu 1500
lladdr 00:50:da:21:cb:c9
priority: 0
groups: egress
media: Ethernet autoselect (100baseTX full-duplex)
status: active
inet 213.187.179.198 netmask 0xfffc broadcast 213.187.179.199
inet6 fe80::250:daff:fe21:cbc9%xl0 prefixlen 64 scopeid 0x3
inet6 2001:16d8:ccbc:dead:beef::1 prefixlen 64

and the nat-to line was

match out log on $ext_if inet nat-to ($ext_if)

AFter upgrading, this was loaded as 

match out log on $ext_if inet nat-to $ext_addr round-robin

- meaning that return traffic wasn't necessarily seen.

Changing the rule to 

match out log on $ext_if inet nat-to $ext_addr

restored the config to a working state.

Does this count as a buglet (or something that should be documented, at
least)?

- P

-- 
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.



Re: recent change of nat-to behavior

2011-07-30 Thread Peter N. M. Hansteen
Not the most precise description I see - 

pe...@bsdly.net (Peter N. M. Hansteen) writes:

 match out log on $ext_if inet nat-to ($ext_if)

 AFter upgrading, this was loaded as 

 match out log on $ext_if inet nat-to $ext_addr round-robin

Actually 

match out log on $ext_if inet nat-to $ext_if round-robin

was the result, but this part is accurate:

 - meaning that return traffic wasn't necessarily seen.

 Changing the rule to 

 match out log on $ext_if inet nat-to $ext_addr

where $ext_addr is defined as the IPv4 address,

 restored the config to a working state.

-- 
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.



Re: recent change of nat-to behavior

2011-07-30 Thread Peter N. M. Hansteen
Ryan McBride mcbr...@openbsd.org writes:

 Please try a newer snapshot, this bug was fixed in the following commit:

Trying a newer snapshot is exactly what I plan to do, no worries

- P
-- 
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.



Troublesome bge variant:

2011-07-27 Thread Peter N. M. Hansteen
 SDRAM non-parity PC2-3200CL5
spdmem1 at iic0 addr 0x52: 512MB DDR2 SDRAM non-parity PC2-3200CL5
usb1 at uhci0: USB revision 1.0
uhub1 at usb1 Intel UHCI root hub rev 1.00/1.00 addr 1
usb2 at uhci1: USB revision 1.0
uhub2 at usb2 Intel UHCI root hub rev 1.00/1.00 addr 1
usb3 at uhci2: USB revision 1.0
uhub3 at usb3 Intel UHCI root hub rev 1.00/1.00 addr 1
usb4 at uhci3: USB revision 1.0
uhub4 at usb4 Intel UHCI root hub rev 1.00/1.00 addr 1
isa0 at ichpcib0
isadma0 at isa0
com0 at isa0 port 0x3f8/8 irq 4: ns16550a, 16 byte fifo
com1 at isa0 port 0x2f8/8 irq 3: ns16550a, 16 byte fifo
pckbc0 at isa0 port 0x60/5
pckbd0 at pckbc0 (kbd slot)
pckbc0: using irq 1 for kbd slot
wskbd0 at pckbd0: console keyboard, using wsdisplay0
pcppi0 at isa0 port 0x61
spkr0 at pcppi0
lpt0 at isa0 port 0x378/4 irq 7
npx0 at isa0 port 0xf0/16: reported by CPUID; using exception 16
fdc0 at isa0 port 0x3f0/6 irq 6 drq 2
fd0 at fdc0 drive 0: 1.44MB 80 cyl, 2 head, 18 sec
mtrr: Pentium Pro MTRR support
umass0 at uhub0 port 1 configuration 1 interface 0 Kingston DataTraveler 112 
rev 2.00/1.00 addr 2
umass0: using SCSI over Bulk-Only
scsibus1 at umass0: 2 targets, initiator 0
sd0 at scsibus1 targ 1 lun 0: Kingston, DataTraveler 112, 1.00 SCSI2 0/direct 
removable serial.0951162aFB31B6031B7A
sd0: 14762MB, 512 bytes/sector, 30233588 sectors
vscsi0 at root
scsibus2 at vscsi0: 256 targets
softraid0 at root
scsibus3 at softraid0: 256 targets
root on wd0a (c45f82cf8c94c709.a) swap on wd0b dump on wd0b

- Peter

-- 
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.



EuroBSDCon 2011 - is your proposal in yet?

2011-05-01 Thread Peter N. M. Hansteen
The 10th European BSD conference will take place in Maarssen, the
Netherlands on 6 - 9 October 2011, a fresh website is up at
http://2011.eurobsdcon.org/.

The call for proposals has been out for a while, with the deadline set
at May 15th (will be extended if necessary).  

I would very much like to see more OpenBSD proposals,
please send yours to submiss...@eurobsdcon.org as soon as you have it
together (perhaps you have something left over from the partially
cancelled AsiaBSDCon earlier this year?).

Please help spread the word and make this year's EuroBSDCon an
OpenBSD-heavy conference!

- Peter

-- 
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.



Re: invalid ata_xfer state 06: Apr 23 snapshot amd64, Lenovo Thinkpad SL500

2011-04-25 Thread Peter N. M. Hansteen
 not configured
pcib0 at pci0 dev 31 function 0 Intel 82801IBM LPC rev 0x03
ahci0 at pci0 dev 31 function 2 Intel 82801I AHCI rev 0x03: apic 2 int 19, 
AHCI 1.2
scsibus0 at ahci0: 32 targets
sd0 at scsibus0 targ 0 lun 0: ATA, WDC WD3200BEVS-0, 14.0 SCSI3 0/direct 
fixed naa.50014ee258d6e95e
sd0: 305245MB, 512 bytes/sec, 625142448 sec total
cd0 at scsibus0 targ 1 lun 0: HL-DT-ST, DVDRAM GSA-T50N, RE06 ATAPI 5/cdrom 
removable
usb2 at uhci0: USB revision 1.0
uhub2 at usb2 Intel UHCI root hub rev 1.00/1.00 addr 1
usb3 at uhci1: USB revision 1.0
uhub3 at usb3 Intel UHCI root hub rev 1.00/1.00 addr 1
usb4 at uhci2: USB revision 1.0
uhub4 at usb4 Intel UHCI root hub rev 1.00/1.00 addr 1
usb5 at uhci3: USB revision 1.0
uhub5 at usb5 Intel UHCI root hub rev 1.00/1.00 addr 1
usb6 at uhci4: USB revision 1.0
uhub6 at usb6 Intel UHCI root hub rev 1.00/1.00 addr 1
usb7 at uhci5: USB revision 1.0
uhub7 at usb7 Intel UHCI root hub rev 1.00/1.00 addr 1
isa0 at pcib0
isadma0 at isa0
pckbc0 at isa0 port 0x60/5
pckbd0 at pckbc0 (kbd slot)
pckbc0: using irq 1 for kbd slot
wskbd0 at pckbd0: console keyboard, using wsdisplay0
pms0 at pckbc0 (aux slot)
pckbc0: using irq 12 for aux slot
wsmouse0 at pms0 mux 0
pcppi0 at isa0 port 0x61
spkr0 at pcppi0
mtrr: Pentium Pro MTRR support
uvideo0 at uhub1 port 5 configuration 1 interface 0 Chicony Electronics Co., 
Ltd. CNF7237CNF7238 rev 2.00/9.63 addr 2
video0 at uvideo0
umodem0 at uhub1 port 6 configuration 1 interface 1 Ericsson Ericsson F3507g 
Mobile Broadband Minicard Composite Device rev 2.00/0.00 addr 3
umodem0: data interface 2, has CM over data, has break
umodem0: status change notification available
ucom0 at umodem0
umodem1 at uhub1 port 6 configuration 1 interface 3 Ericsson Ericsson F3507g 
Mobile Broadband Minicard Composite Device rev 2.00/0.00 addr 3
umodem1: data interface 4, has CM over data, has break
umodem1: status change notification available
ucom1 at umodem1
umodem2 at uhub1 port 6 configuration 1 interface 9 Ericsson Ericsson F3507g 
Mobile Broadband Minicard Composite Device rev 2.00/0.00 addr 3
umodem2: data interface 12, has CM over data, has break
umodem2: no data interface
ugen0 at uhub1 port 6 configuration 1 Ericsson Ericsson F3507g Mobile 
Broadband Minicard Composite Device rev 2.00/0.00 addr 3
ugen1 at uhub4 port 1 Lenovo Computer Corp ThinkPad Bluetooth with Enhanced 
Data Rate II rev 2.00/3.99 addr 2
ugen2 at uhub4 port 2 TouchStrip Fingerprint Sensor rev 1.00/0.33 addr 3
vscsi0 at root
scsibus1 at vscsi0: 256 targets
softraid0 at root
root on sd0a swap on sd0b dump on sd0b

-- 
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.



invalid ata_xfer state 06: Apr 23 snapshot amd64, Lenovo Thinkpad SL500

2011-04-24 Thread Peter N. M. Hansteen
 dev 0 function 1 Ricoh 5C822 SD/MMC rev 0x22: apic 2 int 17
sdmmc0 at sdhc0
Ricoh 5C843 MMC rev 0x12 at pci5 dev 0 function 2 not configured
Ricoh 5C592 Memory Stick rev 0x12 at pci5 dev 0 function 3 not configured
Ricoh 5C852 xD rev 0x12 at pci5 dev 0 function 4 not configured
pcib0 at pci0 dev 31 function 0 Intel 82801IBM LPC rev 0x03
ahci0 at pci0 dev 31 function 2 Intel 82801I AHCI rev 0x03: apic 2 int 19, 
AHCI 1.2
ahci0: invalid ata_xfer state 06 in ahci_put_ccb, slot 31
ahci0: invalid ata_xfer state 06 in ahci_put_ccb, slot 31
scsibus0 at ahci0: 32 targets
sd0 at scsibus0 targ 0 lun 0: ATA, WDC WD3200BEVS-0, 14.0 SCSI3 0/direct 
fixed naa.50014ee258d6e95e
sd0: 305245MB, 512 bytes/sec, 625142448 sec total
cd0 at scsibus0 targ 1 lun 0: HL-DT-ST, DVDRAM GSA-T50N, RE06 ATAPI 5/cdrom 
removable
usb2 at uhci0: USB revision 1.0
uhub2 at usb2 Intel UHCI root hub rev 1.00/1.00 addr 1
usb3 at uhci1: USB revision 1.0
uhub3 at usb3 Intel UHCI root hub rev 1.00/1.00 addr 1
usb4 at uhci2: USB revision 1.0
uhub4 at usb4 Intel UHCI root hub rev 1.00/1.00 addr 1
usb5 at uhci3: USB revision 1.0
uhub5 at usb5 Intel UHCI root hub rev 1.00/1.00 addr 1
usb6 at uhci4: USB revision 1.0
uhub6 at usb6 Intel UHCI root hub rev 1.00/1.00 addr 1
usb7 at uhci5: USB revision 1.0
uhub7 at usb7 Intel UHCI root hub rev 1.00/1.00 addr 1
isa0 at pcib0
isadma0 at isa0
pckbc0 at isa0 port 0x60/5
pckbd0 at pckbc0 (kbd slot)
pckbc0: using irq 1 for kbd slot
wskbd0 at pckbd0: console keyboard, using wsdisplay0
pms0 at pckbc0 (aux slot)
pckbc0: using irq 12 for aux slot
wsmouse0 at pms0 mux 0
pcppi0 at isa0 port 0x61
spkr0 at pcppi0
mtrr: Pentium Pro MTRR support
uvideo0 at uhub1 port 5 configuration 1 interface 0 Chicony Electronics Co., 
Ltd. CNF7237CNF7238 rev 2.00/9.63 addr 2
video0 at uvideo0
umodem0 at uhub1 port 6 configuration 1 interface 1 Ericsson Ericsson F3507g 
Mobile Broadband Minicard Composite Device rev 2.00/0.00 addr 3
umodem0: data interface 2, has CM over data, has break
umodem0: status change notification available
ucom0 at umodem0
umodem1 at uhub1 port 6 configuration 1 interface 3 Ericsson Ericsson F3507g 
Mobile Broadband Minicard Composite Device rev 2.00/0.00 addr 3
umodem1: data interface 4, has CM over data, has break
umodem1: status change notification available
ucom1 at umodem1
umodem2 at uhub1 port 6 configuration 1 interface 9 Ericsson Ericsson F3507g 
Mobile Broadband Minicard Composite Device rev 2.00/0.00 addr 3
umodem2: data interface 12, has CM over data, has break
umodem2: no data interface
ugen0 at uhub1 port 6 configuration 1 Ericsson Ericsson F3507g Mobile 
Broadband Minicard Composite Device rev 2.00/0.00 addr 3
ugen1 at uhub4 port 1 Lenovo Computer Corp ThinkPad Bluetooth with Enhanced 
Data Rate II rev 2.00/3.99 addr 2
ugen2 at uhub4 port 2 TouchStrip Fingerprint Sensor rev 1.00/0.33 addr 3
vscsi0 at root
scsibus1 at vscsi0: 256 targets
softraid0 at root
root on sd0a swap on sd0b dump on sd0b

-- 
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.



Re: Hello

2011-04-09 Thread Peter N. M. Hansteen
Stuart Henderson s...@spacehopper.org writes:

 There's a big problem which makes it not generally useful: if your
 users have multithreaded downloads/uploads or P2P traffic with many
 peers, bandwidth will just split across a larger number of sessions.
 In that case queueing per source address (probably with hfsc
 linkshare which can reduce the speed of traffic after a certain
 time) would be a much better idea. 

hfsc has a lot going for it, true. And there's a number of ways to
achieve roughly what Ali is asking for in near-realtime with some
scriptery and pfctl output parsing (plus a few other approaches), but
for the use case he describes it *might* make sense to have max-src-*
state tracking options that trigger on number of bytes or packets
passed.

We record those per state anyway, so as a gedankenexperiment, say
we could implement max-src-bytes B/s and max-src-packets P/s modeled on
max-src-conn-rate and have rules like 

pass proto tcp to $somewhere port $wanted \
keep state (max-src-bytes 15G/86400, \
 overload bytehogs flush global)

that is, no source address allowed more than 15GB per day, or we bump
to table bytehogs for whatever treatment is appropriate or

pass proto tcp to $somewhere port $wanted \
keep state (max-src-packets 1G/86400, \
 overload packethogs flush global)

to trigger on some insane number of packets instead.

Not sure if it stands out as a screaming must-have feature, but after
about half an hour mulling the idea I kinda like it for now.

- Peter

-- 
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.



Re: Allegations regarding OpenBSD IPSEC

2010-12-15 Thread Peter N. M. Hansteen
The IPSEC allegations have produced a flurry of blog posts and
suchlike, mostly just rehashing the contents of Theo's original
message.  However, I've found two followups that are interesting for
their own separate reasons:

in http://blogs.csoonline.com/1296/an_fbi_backdoor_in_openbsd , there
appears to be some additional veribage from Gregory Perry, but IMHO it
does not really add much in the way of useful information.

The other item,

http://maycontaintracesofbolts.blogspot.com/2010/12/openbsd-ipsec-backdoor-allegations.html

is quite a bit more interesting, since it's a public challenge (with a
cash bounty) to come up with actual evidence of backdoor code in the
relevant parts of OpenBSD.  There have been offers to match original 3
* USD 100 bounty, so with a little more circulation the bounty could
turn into a good amount.

I would say the second post here deserves more attention; if you
agree, please make that URL visible via whatever news sites you can
think of (yup, it's in the /. submissions queue).

- Peter
-- 
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.



Re: Allegations regarding OpenBSD IPSEC

2010-12-15 Thread Peter N. M. Hansteen
patrick keshishian pkesh...@gmail.com writes:
 It is easy to shoot one's mouth off like that about bounty offered,
 given the ridiculously constrained conditions the bounty is offered
 under. He might as well offered a million USD. No one will be able to
 prove this under these restrictions.

I won't get into a discussion about DES' stated requirements, but I do
think it's a good-faith effort.  Then again, as Jason Dixon points out in
his blog http://obfuscurity.com/2010/12/Updates-on-the-OpenBSD-IPsec-Gossip ,
making a donation to the OpenBSD project is likely to give you more bang
for the buck.

- Peter
-- 
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.



Re: end the VOP experiment

2010-08-27 Thread Peter N. M. Hansteen
Kenneth R Westerback kwesterb...@rogers.com writes:

 Man, another reason to get my vax up to -current. Sigh. :-)

More idle curiosity than anything else (although I occasionally get
that question myself), how long does a typical vax 'make build' take?

- Peter

-- 
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
Remember to set the evil bit on all malicious network traffic
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.