Re: a small C program to test xdm's /dev/mem reading on your architecture

2002-08-30 Thread Jonathan Amery
In article <[EMAIL PROTECTED]> Branden writes:
>> I can't believe he actually intends to keep it like this..
>I'm going to #define DEV_RANDOM /dev/random for Linux systems.

 And Debian Hurd?  Or does the Hurd not have /dev/random or /dev/urandom?

 I suspect that /dev/urandom may be the better choice, however.

 Jonathan.



Re: a small C program to test xdm's /dev/mem reading on your architecture

2002-08-30 Thread Jonathan Amery
In article <[EMAIL PROTECTED]> Kusti writes:
>I believe the /dev/mem gets read only in systems where no /dev/(u)random
>exists. 

 Actually, the standard configuration is that /dev/mem is read.  The
code to read from /dev/(u)random isn't activated in any situation in
the standard upstream X distribution, and given that it contains an
error that stops it from compiling[1] I suspect that it has only ever
rarely been used.

 Obviously the correct thing to do is to shift to using /dev/(u)random 
by default.

 Jonathan.



Re: a small C program to test xdm's /dev/mem reading on your architecture

2002-08-30 Thread Jonathan Amery
[Apologies to readers of debian-sparc, who have already received a copy of this]

In article <[EMAIL PROTECTED]> [EMAIL PROTECTED] write:
[XDM randomness]
>/dev/random? /dev/urandom? You are kidding. This randmomness is used 
>to create authorisation cookies for X which in my understanding provide 
>ZERO security. Use plain libc rand() and the security is exactly the same.

 In the situation where the X session is in practice running over unix
sockets (or other configurations where all the data stays local to the
machine without being vulnerable to network (or other) sniffing
attacks)[1], the cookies in question provide the security that they were
designed for - namely requiring a significant proportion of the space
available to said cookies to be trawled to be able to send
authenticated requests to the X server.[2]

 Jonathan.

[1] Although, said server may be listening for tcpip connections, or
those of other protocols to which the attacker can send their
requests.

[2] Having looked at the code, it is not obvious to me that the
entropy produced in said cookies doesn't have a maximum of 32 bits,
even if the cookie is longer than that.



Re: a small C program to test xdm's /dev/mem reading on your architecture

2002-08-30 Thread Jonathan Amery
In article <[EMAIL PROTECTED]> [EMAIL PROTECTED] write:
[XDM randomness]
>/dev/random? /dev/urandom? You are kidding. This randmomness is used 
>to create authorisation cookies for X which in my understanding provide 
>ZERO security. Use plain libc rand() and the security is exactly the same.

 In the situation where the X session is in practice running over unix
sockets (or other configurations where all the data stays local to the
machine without being vulnerable to network (or other) sniffing
attacks)[1], the cookies in question provide the security that they were
designed for - namely requiring a significant proportion of the space
available to said cookies to be trawled to be able to send
authenticated requests to the X server.[2]

 Jonathan.

[1] Although, said server may be listening for tcpip connections, or
those of other protocols to which the attacker can send their
requests.

[2] Having looked at the code, it is not obvious to me that the
entropy produced in said cookies doesn't have a maximum of 32 bits,
even if the cookie is longer than that.



Re: 2.4.19-ac1 kernel compilation

2002-08-06 Thread Jonathan Amery
> On Mon, Aug 05, 2002 at 04:52:39PM +0100, Jonathan Amery wrote:
> > 
> >  So long as you don't want RAID.  Any ETA on sparc32 running well with
> > 2.4.x?  
> 
> There is no ETA, because there is no one really maintaining sparc32
> anymore. Feel free to pitch in, but we have plenty of testers and not
> many people with enough time to devote to actually fixing things.
> 

 Ahh...

 Is there a list of things that are known not towork anywhere?

 (other than the archives of various mailing lists?)

 J.



Re: 2.4.19-ac1 kernel compilation

2002-08-05 Thread Jonathan Amery
In article <[EMAIL PROTECTED]> you write:
>On Sun, Aug 04, 2002 at 12:14:35PM +0200, Wilmer van der Gaast wrote:
>> What's the best kernel for sun4m/sparc5 machines exactly? I'm told I
>> should be running 2.4, but I'm not quite sure about that anymore...
>Heh, someone told you wrong. For sparc32, the most stable kernel is
>2.2.20.

 So long as you don't want RAID.  Any ETA on sparc32 running well with
2.4.x?  



Re: RAID1 on sparc64

2001-12-21 Thread Jonathan Amery
In article <[EMAIL PROTECTED]> you write:
>Hello,
>
>I have installed Debian 2.2 on a Sun Enterprise 420R.  Everything seems to =
>be working alright except software RAID, which is working fine on our x86 =
>machines.  The patch itself installs cleanly as does the kernel build, it =
>is just the 'fdisk' and 'mkraid' tools that give me issues:
>
 A couple of known problems with RAID on sparc on 2.2 are:

 - The superblock contains a 64bit value (event counter) on a 32 bit
   boundary, and so ends up the wrong size
 - only MS-DOS partitions support auto-detect, and you really need
   autodetect for reliable RAID operation.

There is a patch for the former at
  http://www.cse.unsw.edu.au/~neilb/patches/raid-2.2.20/raid-2.2.20.patch

It is Ingo Molnar's patch applied to 2.2.20, and with the superblock
event counter tidied up as is done in 2.4.

 However I believe that raid-sets made like this will not be forwards
compatible with 2.4 kernels - I suggest you ask the linux-raid list
for further information.

 Jonathan.



Re: HELP 2.4 booting on a serial console (resend)

2001-11-25 Thread Jonathan Amery
In article <[EMAIL PROTECTED]> you write:
>Jonathan Amery wrote:
>>  Right - I've just been talking to the linux-raid people about raid on
>> sparc (if you search for my name on their archive then it'll come up),
>> the conclusion being that:
>> 
>>  a) raid in the stock 2.2.X kernels won't work on sparc
>>  b) there are patches to make it (probably) work, but they haven't
>> been heavily tested.
>>  c) patched 2.2.X raid systems won't be forwards compatible with 2.4.X
>>  d) 2.4.X raid stuff should work.
>
>That's of no or little use if you're on a sparc32 system.
>
 Well, yes :(.

 (I also have a sparc32 system).

 If you really need 2.2 with raid on sparc then the patches are available.

 Jonathan.



Re: HELP 2.4 booting on a serial console (resend)

2001-11-21 Thread Jonathan Amery
In article <[EMAIL PROTECTED]> you write:
>Ok,
>
>I go for 2.2.20, but still can't
>
>2) - get raid stuff work, at least with 2.2.20 kernel shipped with potato
>Debian distrib (when I'll come to have stock 2.2.20 run , I may try :)
>
 Right - I've just been talking to the linux-raid people about raid on
sparc (if you search for my name on their archive then it'll come up), 
the conclusion being that:

 a) raid in the stock 2.2.X kernels won't work on sparc
 b) there are patches to make it (probably) work, but they haven't
been heavily tested.
 c) patched 2.2.X raid systems won't be forwards compatible with 2.4.X
 d) 2.4.X raid stuff should work.

 Jonathan.



Re: strange ssh problem with dns...

2001-11-09 Thread Jonathan Amery
In article <[EMAIL PROTECTED]>,
Pierfrancesco Caci  <[EMAIL PROTECTED]> wrote:
>
>Hello, I receive these messages whenever someone connects to an
>ultra10 running linux 2.4.10-pre2
>
>Nov  9 12:06:36 etabeta sshd[766]: Could not reverse map address 172.16.1.9.
>Nov  9 12:06:41 etabeta sshd[766]: packet_set_maxsize: setting to 4096
> 

  what is the output of `host 172.16.1.9` and `host ` where
 is the fqdn that the first host command gave you as the
output.  (The output of host should the first time be something like:
13.100.168.192.IN-ADDR.ARPA domain name pointer vermont.petrologic.co.uk
in which case  is vermont.petrologic.co.uk)

--
Jonathan Amery.
   #The world is collapsing around our ears
  ###__oI turned up the radio, but I can't hear it.
  ###'/ - REM, Radio Song



Re: Sun Box will not auto boot

2001-05-08 Thread Jonathan Amery
In article <[EMAIL PROTECTED]> you write:
>I have my Sparc 5 up and running now. I have a Debian distro of Linux
>running on it. I want to make it a firewall but I have one problem. When I
>boot it up there is a message about a bad argument from the boot prom. If I
>boot it from the boot floppy I made it boots. This means that I must type
>the command "boot floppy" every time I boot up. If I do not type the command
>it can not boot. What to I have to do to boot from the hard drive
>automatically at boot up time?
>
 Could you please report the messages the machine gives on boot up?

 Jonathan.