Re: importing sam leffler's libstatfoo into -HEAd

2014-03-07 Thread Dag-Erling Smørgrav
Adrian Chadd adrian.ch...@gmail.com writes:
 http://people.freebsd.org/~adrian/patches/20140304-libbsdstatfoo.diff

Why did you rename it?  The whole point of PRIVATELIB is to avoid having
to rename libraries.

DES
-- 
Dag-Erling Smørgrav - d...@des.no
___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org

Re: importing sam leffler's libstatfoo into -HEAd

2014-03-07 Thread John Baldwin
On Friday, March 07, 2014 5:51:27 am Dag-Erling Smørgrav wrote:
 Adrian Chadd adrian.ch...@gmail.com writes:
  http://people.freebsd.org/~adrian/patches/20140304-libbsdstatfoo.diff
 
 Why did you rename it?  The whole point of PRIVATELIB is to avoid having
 to rename libraries.

Because 'statfoo' is a pretty silly name?  (This is detailed in another
subthread, did you not read that?)

-- 
John Baldwin
___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org

Re: Feature Proposal: Transparent upgrade of crypt() algorithms

2014-03-07 Thread John Baldwin
On Wednesday, March 05, 2014 3:09:30 pm Matthew Rezny wrote:
   Password expiry is an orthogonal issue and should be up to administrator
  
  policy.
  
  Yes, but if you are moving to a different algorithm to improve security, not
  coupling it with an eventual expiration of non-migrated accounts gives a
  false sense of security.  Any admin worth his/her salt is going to want the
  option of enforcing that sort of policy along with the transparent update. 
  They should really be implemented together is all.
 
 Account expiration and password expiration are already present. There is 
 absolutely no reason that password algorithm upgrade should be tied in any 
 way 
 to expiration. A transparent algorithm upgrade as proposed is *far* better 
 than the forced password change method that is commonly employed. If the 
 administrator wants to force all accounts to migrate by a set deadline, we 
 already have the expiration facilities in place to accomplish that. Expiring 
 accounts that have not been used in a long time, regardless of algorithm 
 changes, should be part of general housekeeping and may be covered by 
 existing 
 policy. Password expiration serves no purpose, EVER. Password expiration 
 encourages users to choose bad passwords because they are throwaway items.
 
 Bruce states it well enough I need not elaborate further
 https://www.schneier.com/blog/archives/2010/11/changing_passwo.html
 
 Anyone who fails to understand the above should NOT be an administrator.

I think you failed to understand my point.  I am assuming that an administrator
wants the transparent upgrade (which I think is useful) because they are
assuming that the hash algorithm is compromised or inferior.  To that end,
they may wish to limit the time window for which they accept hashes generated
using the suspect algorithm.  This is separate (I believe) from the issue Bruce
raises above.  For example, in this case, the administrator is perfectly happy
for the actual plaintext to remain the same, the administrator simply wants to
enforce the new hash.

As far as I can tell, there is nothing in /etc/login.conf to allow for automatic
account expiration if an account is idle for more than N days.

OTOH, even that is probably not sufficient for the original case since a user 
might
login with a different authentication method (e.g. ssh key) that would reset the
idle timer without updating the hash.

I suppose if you really were paranoid about the hash what you would want is an
ability to set an expiration time on the hash algo itself where authentication
using that hash always fails after the expiration time.  This doesn't 
necessarily
expire the entire account (e.g. ssh key auth would still work), though it might
be a bit surprising to the user to find that the next time they attempt to use
password authentication it doesn't work.  (You would at least want a warning
about the hash being expired on login via another mechanism.)

-- 
John Baldwin
___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org


Re: warning: filename ends with '.', which is not allowed on Windows: 'tools/test/sort/bigtest/q-1.024.003.'

2014-03-07 Thread Warner Losh

On Mar 7, 2014, at 12:30 AM, David Xu davi...@freebsd.org wrote:

 When I am using mercurial to initialize a freebsd repository, it prints
 warning: filename ends with '.', which is not allowed on Windows: 
 'tools/test/sort/bigtest/q-1.024.003.'
 
 it seems filename ended with a dot is illegal on Windows, if someone
 wants to check out freebsd source code on Windows, it will be a problem.

There are other problems as well. We have some directories that have mixed case 
and
lower case versions of the same file. This trips up OS unless you specifically 
format your
disk to be case sensitive…

Warner

___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org


Re: Feature Proposal: Transparent upgrade of crypt() algorithms

2014-03-07 Thread Allan Jude
On 2014-03-07 09:13, John Baldwin wrote:
 On Wednesday, March 05, 2014 3:09:30 pm Matthew Rezny wrote:
 Password expiry is an orthogonal issue and should be up to administrator

 policy.

 Yes, but if you are moving to a different algorithm to improve security, not
 coupling it with an eventual expiration of non-migrated accounts gives a
 false sense of security.  Any admin worth his/her salt is going to want the
 option of enforcing that sort of policy along with the transparent update. 
 They should really be implemented together is all.

 Account expiration and password expiration are already present. There is 
 absolutely no reason that password algorithm upgrade should be tied in any 
 way 
 to expiration. A transparent algorithm upgrade as proposed is *far* better 
 than the forced password change method that is commonly employed. If the 
 administrator wants to force all accounts to migrate by a set deadline, we 
 already have the expiration facilities in place to accomplish that. Expiring 
 accounts that have not been used in a long time, regardless of algorithm 
 changes, should be part of general housekeeping and may be covered by 
 existing 
 policy. Password expiration serves no purpose, EVER. Password expiration 
 encourages users to choose bad passwords because they are throwaway items.

 Bruce states it well enough I need not elaborate further
 https://www.schneier.com/blog/archives/2010/11/changing_passwo.html

 Anyone who fails to understand the above should NOT be an administrator.
 
 I think you failed to understand my point.  I am assuming that an 
 administrator
 wants the transparent upgrade (which I think is useful) because they are
 assuming that the hash algorithm is compromised or inferior.  To that end,
 they may wish to limit the time window for which they accept hashes generated
 using the suspect algorithm.  This is separate (I believe) from the issue 
 Bruce
 raises above.  For example, in this case, the administrator is perfectly happy
 for the actual plaintext to remain the same, the administrator simply wants to
 enforce the new hash.
 
 As far as I can tell, there is nothing in /etc/login.conf to allow for 
 automatic
 account expiration if an account is idle for more than N days.
 
 OTOH, even that is probably not sufficient for the original case since a user 
 might
 login with a different authentication method (e.g. ssh key) that would reset 
 the
 idle timer without updating the hash.
 
 I suppose if you really were paranoid about the hash what you would want is an
 ability to set an expiration time on the hash algo itself where authentication
 using that hash always fails after the expiration time.  This doesn't 
 necessarily
 expire the entire account (e.g. ssh key auth would still work), though it 
 might
 be a bit surprising to the user to find that the next time they attempt to use
 password authentication it doesn't work.  (You would at least want a warning
 about the hash being expired on login via another mechanism.)
 

Honestly, my use case is just silently upgrading the strength of the
hashing algorithm (when combined with my other feature request).
Updating my bcrypt hashes from $2a$04$ to $2b$12$ or something. Same
applies for the default sha512, maybe I want to update to rounds=15000

-- 
Allan Jude



signature.asc
Description: OpenPGP digital signature


Re: Feature Proposal: Transparent upgrade of crypt() algorithms

2014-03-07 Thread Tom Evans
On Fri, Mar 7, 2014 at 2:13 PM, John Baldwin j...@freebsd.org wrote:
 On Wednesday, March 05, 2014 3:09:30 pm Matthew Rezny wrote:
   Password expiry is an orthogonal issue and should be up to administrator
 
  policy.
 
  Yes, but if you are moving to a different algorithm to improve security, 
  not
  coupling it with an eventual expiration of non-migrated accounts gives a
  false sense of security.  Any admin worth his/her salt is going to want the
  option of enforcing that sort of policy along with the transparent update.
  They should really be implemented together is all.

 Account expiration and password expiration are already present. There is
 absolutely no reason that password algorithm upgrade should be tied in any 
 way
 to expiration. A transparent algorithm upgrade as proposed is *far* better
 than the forced password change method that is commonly employed. If the
 administrator wants to force all accounts to migrate by a set deadline, we
 already have the expiration facilities in place to accomplish that. Expiring
 accounts that have not been used in a long time, regardless of algorithm
 changes, should be part of general housekeeping and may be covered by 
 existing
 policy. Password expiration serves no purpose, EVER. Password expiration
 encourages users to choose bad passwords because they are throwaway items.

 Bruce states it well enough I need not elaborate further
 https://www.schneier.com/blog/archives/2010/11/changing_passwo.html

 Anyone who fails to understand the above should NOT be an administrator.

 I think you failed to understand my point.  I am assuming that an 
 administrator
 wants the transparent upgrade (which I think is useful) because they are
 assuming that the hash algorithm is compromised or inferior.  To that end,
 they may wish to limit the time window for which they accept hashes generated
 using the suspect algorithm.  This is separate (I believe) from the issue 
 Bruce
 raises above.  For example, in this case, the administrator is perfectly happy
 for the actual plaintext to remain the same, the administrator simply wants to
 enforce the new hash.

 As far as I can tell, there is nothing in /etc/login.conf to allow for 
 automatic
 account expiration if an account is idle for more than N days.

 OTOH, even that is probably not sufficient for the original case since a user 
 might
 login with a different authentication method (e.g. ssh key) that would reset 
 the
 idle timer without updating the hash.

 I suppose if you really were paranoid about the hash what you would want is an
 ability to set an expiration time on the hash algo itself where authentication
 using that hash always fails after the expiration time.  This doesn't 
 necessarily
 expire the entire account (e.g. ssh key auth would still work), though it 
 might
 be a bit surprising to the user to find that the next time they attempt to use
 password authentication it doesn't work.  (You would at least want a warning
 about the hash being expired on login via another mechanism.)


All of this is orthogonal to adding a way to upgrade hashes. Yes, all
of the points you mentioned are relevant to general password security,
but doesn't explain why a feature that provides transparent hash
upgrades cannot be added without first adding the features you are
asking for.

It's like trying to prevent people from shooting themselves in the
foot by only giving them rocks to throw.

Cheers

Tom
___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org


Re: Feature Proposal: Transparent upgrade of crypt() algorithms

2014-03-07 Thread A.J. Kehoe IV (Nanoman)

Allan Jude wrote:

[...]


Honestly, my use case is just silently upgrading the strength of the
hashing algorithm (when combined with my other feature request).
Updating my bcrypt hashes from $2a$04$ to $2b$12$ or something. Same
applies for the default sha512, maybe I want to update to rounds=15000


Like this?

http://www.freebsd.org/cgi/query-pr.cgi?pr=182518

Request for comments:

http://docs.freebsd.org/cgi/mid.cgi?20140106205156.GD4903

--
A.J. Kehoe IV (Nanoman) |  /\  ASCII Ribbon Campaign
Nanoman's Company   |  \ /   - No HTML/RTF in E-mail
E-mail: nano...@nanoman.ca  |   X- No proprietary attachments
WWW: http://www.nanoman.ca/ |  / \   - Respect for open standards


smime.p7s
Description: S/MIME cryptographic signature


Re: warning: filename ends with '.', which is not allowed on Windows: 'tools/test/sort/bigtest/q-1.024.003.'

2014-03-07 Thread Rui Paulo
On 6 Mar 2014, at 23:30, David Xu davi...@freebsd.org wrote:
 it seems filename ended with a dot is illegal on Windows, if someone
 wants to check out freebsd source code on Windows, it will be a problem.

Is this something we want to support?  NetBSD made some invasive changes on 
their source tree to be able to support case-insensitive filesystems (like 
renaming 'cvs' to 'xcvs' to avoid clashing with the 'CVS' metadata directory), 
but they support building NetBSD on many different platforms.  We don't support 
that yet, though.

The file in question can be easily renamed, I think.

--
Rui Paulo



___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org


Re: warning: filename ends with '.', which is not allowed on Windows: 'tools/test/sort/bigtest/q-1.024.003.'

2014-03-07 Thread Eitan Adler
On 7 March 2014 11:41, Rui Paulo rpa...@freebsd.org wrote:
 On 6 Mar 2014, at 23:30, David Xu davi...@freebsd.org wrote:
 it seems filename ended with a dot is illegal on Windows, if someone
 wants to check out freebsd source code on Windows, it will be a problem.

 Is this something we want to support?

Yes.

   NetBSD made some invasive changes on their source tree to be able to 
 support case-insensitive filesystems (like renaming 'cvs' to 'xcvs' to avoid 
 clashing with the 'CVS' metadata directory), but they support building NetBSD 
 on many different platforms.

Has anyone enumerated the problematic files for FreeBSD ?

  We don't support that yet, though.

However, being able to checkout out the source code is a prerequisite
to building out other platforms.

 The file in question can be easily renamed, I think.

-- 
Eitan Adler
___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org


Re: warning: filename ends with '.', which is not allowed on Windows: 'tools/test/sort/bigtest/q-1.024.003.'

2014-03-07 Thread Warner Losh

On Mar 7, 2014, at 9:47 AM, Eitan Adler li...@eitanadler.com wrote:

 On 7 March 2014 11:41, Rui Paulo rpa...@freebsd.org wrote:
 On 6 Mar 2014, at 23:30, David Xu davi...@freebsd.org wrote:
 it seems filename ended with a dot is illegal on Windows, if someone
 wants to check out freebsd source code on Windows, it will be a problem.
 
 Is this something we want to support?
 
 Yes.
 
  NetBSD made some invasive changes on their source tree to be able to 
 support case-insensitive filesystems (like renaming 'cvs' to 'xcvs' to avoid 
 clashing with the 'CVS' metadata directory), but they support building 
 NetBSD on many different platforms.
 
 Has anyone enumerated the problematic files for FreeBSD ?

Last time I looked there were only a handful. I’ll conduct a census and get a 
concrete enumeration of the problem…

Warner

 We don't support that yet, though.
 
 However, being able to checkout out the source code is a prerequisite
 to building out other platforms.
 
 The file in question can be easily renamed, I think.
 
 -- 
 Eitan Adler
 ___
 freebsd-current@freebsd.org mailing list
 http://lists.freebsd.org/mailman/listinfo/freebsd-current
 To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org

___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org


Re: warning: filename ends with '.', which is not allowed on Windows: 'tools/test/sort/bigtest/q-1.024.003.'

2014-03-07 Thread Ian Lepore
On Fri, 2014-03-07 at 10:19 -0700, Warner Losh wrote:
 On Mar 7, 2014, at 9:47 AM, Eitan Adler li...@eitanadler.com wrote:
 
  On 7 March 2014 11:41, Rui Paulo rpa...@freebsd.org wrote:
  On 6 Mar 2014, at 23:30, David Xu davi...@freebsd.org wrote:
  it seems filename ended with a dot is illegal on Windows, if someone
  wants to check out freebsd source code on Windows, it will be a problem.
  
  Is this something we want to support?
  
  Yes.
  
   NetBSD made some invasive changes on their source tree to be able to 
  support case-insensitive filesystems (like renaming 'cvs' to 'xcvs' to 
  avoid clashing with the 'CVS' metadata directory), but they support 
  building NetBSD on many different platforms.
  
  Has anyone enumerated the problematic files for FreeBSD ?
 
 Last time I looked there were only a handful. I’ll conduct a census and get a 
 concrete enumeration of the problem…

Last time I noticed (early last year) there were 3 files ending in a dot
and no case conflicts.  Mercurial now finds just the one file ending in
a dot and no case conflicts (doing hg init;hg add -q at /usr/src).

-- Ian


___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org

Re: warning: filename ends with '.', which is not allowed on Windows: 'tools/test/sort/bigtest/q-1.024.003.'

2014-03-07 Thread Warner Losh

On Mar 7, 2014, at 10:22 AM, Ian Lepore i...@freebsd.org wrote:

 On Fri, 2014-03-07 at 10:19 -0700, Warner Losh wrote:
 On Mar 7, 2014, at 9:47 AM, Eitan Adler li...@eitanadler.com wrote:
 
 On 7 March 2014 11:41, Rui Paulo rpa...@freebsd.org wrote:
 On 6 Mar 2014, at 23:30, David Xu davi...@freebsd.org wrote:
 it seems filename ended with a dot is illegal on Windows, if someone
 wants to check out freebsd source code on Windows, it will be a problem.
 
 Is this something we want to support?
 
 Yes.
 
 NetBSD made some invasive changes on their source tree to be able to 
 support case-insensitive filesystems (like renaming 'cvs' to 'xcvs' to 
 avoid clashing with the 'CVS' metadata directory), but they support 
 building NetBSD on many different platforms.
 
 Has anyone enumerated the problematic files for FreeBSD ?
 
 Last time I looked there were only a handful. I’ll conduct a census and get 
 a concrete enumeration of the problem…
 
 Last time I noticed (early last year) there were 3 files ending in a dot
 and no case conflicts.  Mercurial now finds just the one file ending in
 a dot and no case conflicts (doing hg init;hg add -q at /usr/src).

Confirmed via regex, almost… Now there’s only one ending in dot:

./tools/test/sort/bigtest/q-1.024.003.

Warner

___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org

Re: importing sam leffler's libstatfoo into -HEAd

2014-03-07 Thread Adrian Chadd
what he said.

-a


On 7 March 2014 05:37, John Baldwin j...@freebsd.org wrote:
 On Friday, March 07, 2014 5:51:27 am Dag-Erling Smørgrav wrote:
 Adrian Chadd adrian.ch...@gmail.com writes:
  http://people.freebsd.org/~adrian/patches/20140304-libbsdstatfoo.diff

 Why did you rename it?  The whole point of PRIVATELIB is to avoid having
 to rename libraries.

 Because 'statfoo' is a pretty silly name?  (This is detailed in another
 subthread, did you not read that?)

 --
 John Baldwin
___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org


failed to complie webkit-gtk2: Cannot allocate memory

2014-03-07 Thread gahn
hi all:

i am trying to compile webkit-gtk2 and stuck on error:

===

ar: warning: can't mmap file: libWebCore_la-SVGFEDisplacementMapElement.o: 
Cannot allocate memory
ar: warning: can't mmap file: libWebCore_la-SVGFEDropShadowElement.o: Cannot 
allocate memory
ar: warning: can't mmap file: libWebCore_la-SVGFEFloodElement.o: Cannot 
allocate memory
[...]
ar: warning: can't mmap file: libWebCore_la-JSNamedNodeMap.o: Cannot allocate 
memory
ar: warning: can't mmap file: libWebCore_la-JSNavigator.o: Cannot allocate 
memory
ar: warning: can't mmap file: libWebCore_la-JSNavigatorUserMediaError.o: Cannot 
allocate memory
ar: warning: can't mmap file: 
libWebCore_la-JSNavigatorUserMediaErrorCallback.o: Cannot allocate memory
[...]
ar: warning: can't mmap file: libWebCore_la-JSWebSocket.o: Cannot allocate 
memory
ar: warning: can't mmap file: libWebCore_la-glslang.o: Cannot allocate memory
ar: warning: can't mmap file: libWebCore_la-glslang_tab.o: Cannot allocate 
memory
ar: warning: can't mmap file: libWebCore_la-JSRequestAnimationFrameCallback.o: 
Cannot allocate memory
ar: warning: can't mmap file: libWebCore_la-JSHTMLShadowElement.o: Cannot 
allocate memory
ranlib: fatal: realloc failed: Cannot allocate memory
gmake[1]: *** [libWebCore.la] Error 70
gmake[1]: Leaving directory `/usr/ports/www/webkit-gtk2/work/webkit-1.8.3'
gmake: *** [all] Error 2
=== Compilation failed unexpectedly.
Try to set MAKE_JOBS_UNSAFE=yes and rebuild before reporting the failure to
the maintainer.
*** [do-build] Error code 1

Stop in /usr/ports/www/webkit-gtk2.
*** [build] Error code 1

Stop in /usr/ports/www/webkit-gtk2.
===


i checked my kernel shared memory and it seem to be pretty big by default:

root@giraffe:/usr/ports # sysctl -a | grep -E shmmax|shmall
kern.ipc.shmall: 131072
kern.ipc.shmmax: 536870912

thanks help.
___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org


Re: warning: filename ends with '.', which is not allowed on Windows: 'tools/test/sort/bigtest/q-1.024.003.'

2014-03-07 Thread David Chisnall
On 7 Mar 2014, at 16:41, Rui Paulo rpa...@freebsd.org wrote:

 On 6 Mar 2014, at 23:30, David Xu davi...@freebsd.org wrote:
 it seems filename ended with a dot is illegal on Windows, if someone
 wants to check out freebsd source code on Windows, it will be a problem.
 
 Is this something we want to support?

Yes, definitely.  Building FreeBSD on other platforms is one of the requests we 
get very often from embedded systems vendors.  Cheap virtualisation has made it 
less urgent (they can just stick a FreeBSD VirtualBox VM on their 
workstations), but it's definitely something we'd like eventually.  To my 
knowledge, no one is working on it, but we should aim to make life easy for 
whoever does...

David

___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org


Re: Feature Proposal: Transparent upgrade of crypt() algorithms

2014-03-07 Thread RW
On Fri, 7 Mar 2014 09:13:30 -0500
John Baldwin wrote:

 I am assuming that an
 administrator wants the transparent upgrade (which I think is useful)
 because they are assuming that the hash algorithm is compromised or
 inferior.

I'd expect it to be done well in advance of that to give plenty of
time for the transition. We are talking about brute force attacks
and GPU development is relatively predicable.

And lets not lose sight of the fact that we are only talking about
limited mitigation after an attacker has gained root access, not
front-line security.


 I suppose if you really were paranoid about the hash what you would
 want is an ability to set an expiration time on the hash algo itself
 where authentication using that hash always fails after the
 expiration time.

Whenever I've been required to change passwords it's always been
imposed immediately after a login.

Just locking-out an account sounds very heavy-handed to me. It seems
like it would be trivial to extract a list of accounts using the
old-style hashes from master.passwd - at least that way you can send
them an email.
___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org


Re: Feature Proposal: Transparent upgrade of crypt() algorithms

2014-03-07 Thread John Baldwin
On Friday, March 07, 2014 10:34:40 am Tom Evans wrote:
 On Fri, Mar 7, 2014 at 2:13 PM, John Baldwin j...@freebsd.org wrote:
  On Wednesday, March 05, 2014 3:09:30 pm Matthew Rezny wrote:
Password expiry is an orthogonal issue and should be up to 
administrator
  
   policy.
  
   Yes, but if you are moving to a different algorithm to improve security, 
   not
   coupling it with an eventual expiration of non-migrated accounts gives a
   false sense of security.  Any admin worth his/her salt is going to want 
   the
   option of enforcing that sort of policy along with the transparent 
   update.
   They should really be implemented together is all.
 
  Account expiration and password expiration are already present. There is
  absolutely no reason that password algorithm upgrade should be tied in any 
  way
  to expiration. A transparent algorithm upgrade as proposed is *far* better
  than the forced password change method that is commonly employed. If the
  administrator wants to force all accounts to migrate by a set deadline, we
  already have the expiration facilities in place to accomplish that. 
  Expiring
  accounts that have not been used in a long time, regardless of algorithm
  changes, should be part of general housekeeping and may be covered by 
  existing
  policy. Password expiration serves no purpose, EVER. Password expiration
  encourages users to choose bad passwords because they are throwaway items.
 
  Bruce states it well enough I need not elaborate further
  https://www.schneier.com/blog/archives/2010/11/changing_passwo.html
 
  Anyone who fails to understand the above should NOT be an administrator.
 
  I think you failed to understand my point.  I am assuming that an 
  administrator
  wants the transparent upgrade (which I think is useful) because they are
  assuming that the hash algorithm is compromised or inferior.  To that end,
  they may wish to limit the time window for which they accept hashes 
  generated
  using the suspect algorithm.  This is separate (I believe) from the issue 
  Bruce
  raises above.  For example, in this case, the administrator is perfectly 
  happy
  for the actual plaintext to remain the same, the administrator simply wants 
  to
  enforce the new hash.
 
  As far as I can tell, there is nothing in /etc/login.conf to allow for 
  automatic
  account expiration if an account is idle for more than N days.
 
  OTOH, even that is probably not sufficient for the original case since a 
  user might
  login with a different authentication method (e.g. ssh key) that would 
  reset the
  idle timer without updating the hash.
 
  I suppose if you really were paranoid about the hash what you would want is 
  an
  ability to set an expiration time on the hash algo itself where 
  authentication
  using that hash always fails after the expiration time.  This doesn't 
  necessarily
  expire the entire account (e.g. ssh key auth would still work), though it 
  might
  be a bit surprising to the user to find that the next time they attempt to 
  use
  password authentication it doesn't work.  (You would at least want a warning
  about the hash being expired on login via another mechanism.)
 
 
 All of this is orthogonal to adding a way to upgrade hashes. Yes, all
 of the points you mentioned are relevant to general password security,
 but doesn't explain why a feature that provides transparent hash
 upgrades cannot be added without first adding the features you are
 asking for.

What I didn't say is that I think adding hash expirations is much more of an
edge case and not very useful generically, so probably not worth the hassle.
Also, I had originally suggested expiring accounts, but expiring accounts isn't
really a good proxy for expiring hashes.  Anyway, I think the original idea is
good so long as it is optional.

-- 
John Baldwin
___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org


ipfw: fetch doesn't reach ftp://fttp.sites.foo

2014-03-07 Thread O. Hartmann

Recently I swaitched from pf to ipfw on some CURRENT boxes and for convenience 
I used the
workstation predefinition of FreeBSD. But with that change, all access of 
ports via
fetch located at ftp-sites stopped passing the filter.

Even switching to open doesn't help and this is confusing me.

The CURRENT box in question is passing its traffic within a LAN through a 
gateway running
also FreeBSD CURRENT, but with pf. The gateway is performing NAT. As long as 
the failing
client behind the gateway system is using pf as the filter, the traffic for ftp 
seems to
pass through. On the gateway with pf as the default filter, the ports fetching 
via
ftp-site their sources perform without problems.

What is up with IPFW?

Is their a solution? I tried to search google for freebsd ipfw ftp but I 
didn't find
anything suitable targeting my problem or any problem of that kind.


Thanks in adavance,

Oliver 


signature.asc
Description: PGP signature


Re: warning: filename ends with '.', which is not allowed on Windows: 'tools/test/sort/bigtest/q-1.024.003.'

2014-03-07 Thread Rui Paulo
On 7 Mar 2014, at 10:38, David Chisnall thera...@freebsd.org wrote:

 On 7 Mar 2014, at 16:41, Rui Paulo rpa...@freebsd.org wrote:
 
 On 6 Mar 2014, at 23:30, David Xu davi...@freebsd.org wrote:
 it seems filename ended with a dot is illegal on Windows, if someone
 wants to check out freebsd source code on Windows, it will be a problem.
 
 Is this something we want to support?
 
 Yes, definitely.  Building FreeBSD on other platforms is one of the requests 
 we get very often from embedded systems vendors.  Cheap virtualisation has 
 made it less urgent (they can just stick a FreeBSD VirtualBox VM on their 
 workstations), but it's definitely something we'd like eventually.  To my 
 knowledge, no one is working on it, but we should aim to make life easy for 
 whoever does...

I guess I should clarify: I wasn’t talking about cross building in general, but 
specifically on Windows.  It’s far easier to setup a case-sensitive file system 
on OS X and cross build FreeBSD from there than it is on Windows.  I’m not even 
sure NetBSD builds on Windows with Cygwin anymore.

Warner was working on building FreeBSD from OS X, IIRC.

--
Rui Paulo



___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org


Re: Feature Proposal: Transparent upgrade of crypt() algorithms

2014-03-07 Thread Allan Jude
On 2014-03-07 11:13, A.J. Kehoe IV (Nanoman) wrote:
 Allan Jude wrote:
 
 [...]
 
 Honestly, my use case is just silently upgrading the strength of the
 hashing algorithm (when combined with my other feature request).
 Updating my bcrypt hashes from $2a$04$ to $2b$12$ or something. Same
 applies for the default sha512, maybe I want to update to rounds=15000
 
 Like this?
 
 http://www.freebsd.org/cgi/query-pr.cgi?pr=182518
 
 Request for comments:
 
 http://docs.freebsd.org/cgi/mid.cgi?20140106205156.GD4903
 

This looks like what we wanted. In the feedback you talked about some
changes to your patch required to make it work, is there any progress on
those?

-- 
Allan Jude



signature.asc
Description: OpenPGP digital signature


Re: ipfw: fetch doesn't reach ftp://fttp.sites.foo

2014-03-07 Thread Allan Jude
On 2014-03-07 13:57, O. Hartmann wrote:
 
 Recently I swaitched from pf to ipfw on some CURRENT boxes and for 
 convenience I used the
 workstation predefinition of FreeBSD. But with that change, all access of 
 ports via
 fetch located at ftp-sites stopped passing the filter.
 
 Even switching to open doesn't help and this is confusing me.
 
 The CURRENT box in question is passing its traffic within a LAN through a 
 gateway running
 also FreeBSD CURRENT, but with pf. The gateway is performing NAT. As long as 
 the failing
 client behind the gateway system is using pf as the filter, the traffic for 
 ftp seems to
 pass through. On the gateway with pf as the default filter, the ports 
 fetching via
 ftp-site their sources perform without problems.
 
 What is up with IPFW?
 
 Is their a solution? I tried to search google for freebsd ipfw ftp but I 
 didn't find
 anything suitable targeting my problem or any problem of that kind.
 
 
 Thanks in adavance,
 
 Oliver 
 

What error does fetch give? Is it having problems with DNS, connection
to the FTP site, or just making the FTP DATA connection? Have you tried
with 'passive' mode on/off?

-- 
Allan Jude



signature.asc
Description: OpenPGP digital signature


bsnmp lm75 module

2014-03-07 Thread Luiz Otavio O Souza
Hello,

I've written a bsnmp module to export the lm75 sensor's temperature
(and some other data) over SNMP.

With this module it is simple and easy to monitor the temperature of
rooms and other devices over the network with help of a RPi, a BBB or
others.

This is my first module for bsnmp, so i would appreciate if someone
more clueful about it could take a look (can i just pick any free MIB
?)

The lm75 kernel driver is the same published on
http://lists.freebsd.org/pipermail/freebsd-embedded/2013-November/002195.html

I'll publish an updated version soon (for the lm75 kernel driver)
which include a man page and support for non FDT systems.

The SNMP data usually looks like: http://pastebin.com/cHYYBY1R

It includes the number of sensors on system, the driver name, the
compat string, the i2c bus and address and, sure, the sensor
temperature.

Cheers,
Luiz
Index: etc/snmpd.config
===
--- etc/snmpd.config(revision 262860)
+++ etc/snmpd.config(working copy)
@@ -296,6 +296,12 @@
 #begemotSnmpdModulePath.bridge = /usr/lib/snmp_bridge.so
 
 #
+# LM75 Sensor module
+#  This requires the mibII module.
+#
+#begemotSnmpdModulePath.lm75 = /usr/lib/snmp_lm75.so
+
+#
 # Wireless module
 #  This requires the mibII module.
 #
Index: usr.sbin/bsnmpd/modules/Makefile
===
--- usr.sbin/bsnmpd/modules/Makefile(revision 262860)
+++ usr.sbin/bsnmpd/modules/Makefile(working copy)
@@ -12,6 +12,7 @@
snmp_bridge \
snmp_hast \
snmp_hostres \
+   snmp_lm75 \
snmp_mibII \
snmp_target \
snmp_usm \
Index: usr.sbin/bsnmpd/modules/snmp_lm75/BEGEMOT-LM75-MIB.txt
===
--- usr.sbin/bsnmpd/modules/snmp_lm75/BEGEMOT-LM75-MIB.txt  (revision 0)
+++ usr.sbin/bsnmpd/modules/snmp_lm75/BEGEMOT-LM75-MIB.txt  (working copy)
@@ -0,0 +1,160 @@
+--
+-- Copyright (c) 2014 Luiz Otavio O Souza l...@freebsd.org
+-- All rights reserved.
+--
+-- Redistribution and use in source and binary forms, with or without
+-- modification, are permitted provided that the following conditions
+-- are met:
+-- 1. Redistributions of source code must retain the above copyright
+--notice, this list of conditions and the following disclaimer.
+-- 2. Redistributions in binary form must reproduce the above copyright
+--notice, this list of conditions and the following disclaimer in the
+--documentation and/or other materials provided with the distribution.
+--
+-- THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+-- ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+-- IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+-- ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+-- FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+-- DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+-- OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+-- HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+-- LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+-- OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+-- SUCH DAMAGE.
+--
+-- $FreeBSD$
+--
+
+BEGEMOT-LM75-MIB DEFINITIONS ::= BEGIN
+
+IMPORTS
+MODULE-IDENTITY, OBJECT-TYPE, NOTIFICATION-TYPE,
+Counter64, Integer32
+   FROM SNMPv2-SMI
+TEXTUAL-CONVENTION, RowStatus
+   FROM SNMPv2-TC
+begemot
+   FROM BEGEMOT-MIB;
+
+begemotLoos MODULE-IDENTITY
+LAST-UPDATED 20140224Z
+ORGANIZATION FreeBSD
+CONTACT-INFO
+  Luiz Otavio O Souza
+
+Postal:N/A
+
+Fax:   N/A
+
+E-Mail:l...@freebsd.org
+DESCRIPTION
+   The Begemot MIB for reading lm75 sensors data.
+REVISION 20140224Z
+DESCRIPTION
+   Initial revision.
+::= { begemot 400 }
+
+begemotLm75Objects OBJECT IDENTIFIER ::= { begemotLm75 1 }
+
+-- -- --
+-- Configuration parameters
+-- -- --
+
+lm75Sensor OBJECT IDENTIFIER ::= { begemotlm75Objects 1 }
+
+lm75SensorsOBJECT-TYPE
+SYNTAX Integer32
+MAX-ACCESS read-only
+STATUS current
+DESCRIPTION
+   Number of LM75 sensors in the system.
+::= { lm75Sensors 1 }
+
+-- -- --
+-- TempSensor Table
+-- -- --
+lm75SensorTable OBJECT-TYPE
+SYNTAX SEQUENCE OF Lm75SensorEntry
+MAX-ACCESS not-accessible
+STATUS current
+DESCRIPTION
+   A table containing information about all temperature sensors.
+::= { begemotLm75Objects 2 }
+

Re: warning: filename ends with '.', which is not allowed on Windows: 'tools/test/sort/bigtest/q-1.024.003.'

2014-03-07 Thread Warner Losh

On Mar 7, 2014, at 11:50 AM, Rui Paulo rpa...@felyko.com wrote:

 On 7 Mar 2014, at 10:38, David Chisnall thera...@freebsd.org wrote:
 
 On 7 Mar 2014, at 16:41, Rui Paulo rpa...@freebsd.org wrote:
 
 On 6 Mar 2014, at 23:30, David Xu davi...@freebsd.org wrote:
 it seems filename ended with a dot is illegal on Windows, if someone
 wants to check out freebsd source code on Windows, it will be a problem.
 
 Is this something we want to support?
 
 Yes, definitely.  Building FreeBSD on other platforms is one of the requests 
 we get very often from embedded systems vendors.  Cheap virtualisation has 
 made it less urgent (they can just stick a FreeBSD VirtualBox VM on their 
 workstations), but it's definitely something we'd like eventually.  To my 
 knowledge, no one is working on it, but we should aim to make life easy for 
 whoever does...
 
 I guess I should clarify: I wasn’t talking about cross building in general, 
 but specifically on Windows.  It’s far easier to setup a case-sensitive file 
 system on OS X and cross build FreeBSD from there than it is on Windows.  I’m 
 not even sure NetBSD builds on Windows with Cygwin anymore.
 
 Warner was working on building FreeBSD from OS X, IIRC.

When I worked at Cisco in 2008, yes. That work went approximately no-where when 
I hit a huge snag in building gdb using static configurations for FreeBSD, but 
on a OS X host and the differences between them mattering.

Warner

___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org


Re: ipfw: fetch doesn't reach ftp://fttp.sites.foo

2014-03-07 Thread O. Hartmann
On Fri, 07 Mar 2014 15:33:39 -0500
Allan Jude free...@allanjude.com wrote:

 On 2014-03-07 13:57, O. Hartmann wrote:
  
  Recently I swaitched from pf to ipfw on some CURRENT boxes and for 
  convenience I used
  the workstation predefinition of FreeBSD. But with that change, all 
  access of ports
  via fetch located at ftp-sites stopped passing the filter.
  
  Even switching to open doesn't help and this is confusing me.
  
  The CURRENT box in question is passing its traffic within a LAN through a 
  gateway
  running also FreeBSD CURRENT, but with pf. The gateway is performing NAT. 
  As long as
  the failing client behind the gateway system is using pf as the filter, the 
  traffic
  for ftp seems to pass through. On the gateway with pf as the default 
  filter, the
  ports fetching via ftp-site their sources perform without problems.
  
  What is up with IPFW?
  
  Is their a solution? I tried to search google for freebsd ipfw ftp but I 
  didn't find
  anything suitable targeting my problem or any problem of that kind.
  
  
  Thanks in adavance,
  
  Oliver 
  
 
 What error does fetch give? Is it having problems with DNS, connection
 to the FTP site, or just making the FTP DATA connection? Have you tried
 with 'passive' mode on/off?
 
The box doesn't have problems contacting any DNS.

Fetch gives the shown errors or simple timeouts.  Either manually or via 
portmaster to
update ports like the one shown below.

The very same port has no problems on the system having pf instead of ipfw.

I will switch back to pf on the box in question to check whether the choice of 
firewall
really makes the difference.

This is what I get when seeting passive mode (it doesn't change anything from 
active
mode):

root@thor: [pciids] setenv FTP_PASSIVE_MODE YES

root@thor: [pciids] make fetch
===  License BSD3CLAUSE GPLv2 GPLv3 accepted by the user
===   pciids-20140301 depends on file: /usr/local/sbin/pkg - found
= pciids-20140301.tar.xz doesn't seem to exist in /usr/ports/distfiles/.
= Attempting to fetch
http://ftp.FreeBSD.org/pub/FreeBSD/ports/local-distfiles/sunpoet/pciids-20140301.tar.xz
fetch:
http://ftp.FreeBSD.org/pub/FreeBSD/ports/local-distfiles/sunpoet/pciids-20140301.tar.xz:
Not Found = Attempting to fetch
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/local-distfiles/sunpoet/pciids-20140301.tar.xz
fetch:
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/local-distfiles/sunpoet/pciids-20140301.tar.xz:
No route to host = Attempting to fetch
ftp://ftp.se.FreeBSD.org/pub/FreeBSD/ports/local-distfiles/sunpoet/pciids-20140301.tar.xz
fetch:
ftp://ftp.se.FreeBSD.org/pub/FreeBSD/ports/local-distfiles/sunpoet/pciids-20140301.tar.xz:
No route to host = Attempting to fetch
ftp://ftp.uk.FreeBSD.org/pub/FreeBSD/ports/local-distfiles/sunpoet/pciids-20140301.tar.xz
fetch:
ftp://ftp.uk.FreeBSD.org/pub/FreeBSD/ports/local-distfiles/sunpoet/pciids-20140301.tar.xz:
No route to host = Attempting to fetch
ftp://ftp.ru.FreeBSD.org/pub/FreeBSD/ports/local-distfiles/sunpoet/pciids-20140301.tar.xz
fetch: transfer timed out


signature.asc
Description: PGP signature


Re: Feature Proposal: Transparent upgrade of crypt() algorithms

2014-03-07 Thread A.J. Kehoe IV (Nanoman)

Allan Jude wrote:

On 2014-03-07 11:13, A.J. Kehoe IV (Nanoman) wrote:

Allan Jude wrote:

[...]


Honestly, my use case is just silently upgrading the strength of the
hashing algorithm (when combined with my other feature request).
Updating my bcrypt hashes from $2a$04$ to $2b$12$ or something. Same
applies for the default sha512, maybe I want to update to rounds=15000


Like this?

http://www.freebsd.org/cgi/query-pr.cgi?pr=182518

Request for comments:

http://docs.freebsd.org/cgi/mid.cgi?20140106205156.GD4903



This looks like what we wanted. In the feedback you talked about some
changes to your patch required to make it work, is there any progress on
those?


Derek's patches worked perfectly for our needs, but we're the sort of people 
who use vipw and our own utilities for user management.  It wasn't until later 
that we discovered at least one other file would need patching to satisfy 
everyone.  We didn't want to employ the same copy-pasta method, so we asked for 
feedback about our proposed alternative.

secteam@, do you have any comments?  Before we put any more work into this, we 
want to be sure that our proposal is an acceptable one.

--
A.J. Kehoe IV (Nanoman) |  /\  ASCII Ribbon Campaign
Nanoman's Company   |  \ /   - No HTML/RTF in E-mail
E-mail: nano...@nanoman.ca  |   X- No proprietary attachments
WWW: http://www.nanoman.ca/ |  / \   - Respect for open standards


smime.p7s
Description: S/MIME cryptographic signature


Re: Feature Proposal: Transparent upgrade of crypt() algorithms

2014-03-07 Thread Xin Li
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi,

On 03/07/14 13:52, A.J. Kehoe IV (Nanoman) wrote:
 Allan Jude wrote:
 On 2014-03-07 11:13, A.J. Kehoe IV (Nanoman) wrote:
 Allan Jude wrote:
 
 [...]
 
 Honestly, my use case is just silently upgrading the strength
 of the hashing algorithm (when combined with my other feature
 request). Updating my bcrypt hashes from $2a$04$ to $2b$12$
 or something. Same applies for the default sha512, maybe I
 want to update to rounds=15000
 
 Like this?
 
 http://www.freebsd.org/cgi/query-pr.cgi?pr=182518
 
 Request for comments:
 
 http://docs.freebsd.org/cgi/mid.cgi?20140106205156.GD4903
 
 
 This looks like what we wanted. In the feedback you talked about
 some changes to your patch required to make it work, is there any
 progress on those?
 
 Derek's patches worked perfectly for our needs, but we're the sort
 of people who use vipw and our own utilities for user management.
 It wasn't until later that we discovered at least one other file
 would need patching to satisfy everyone.  We didn't want to employ
 the same copy-pasta method, so we asked for feedback about our
 proposed alternative.
 
 secteam@, do you have any comments?  Before we put any more work
 into this, we want to be sure that our proposal is an acceptable
 one.
 

Did you mean adding rounds capability, or transparent upgrade of
crypt() algorithms, or both?

I need some time to digest the whole transparent upgrade idea but in
general I think it's good.

Speaking for adding rounds, the only problem that needs to be fixed is
that the proposed patch makes it possible to create conflicting
configuration (passwd_format and passwd_modular can use different
hashing algorithms) and need to be fixed and polished.  I like the
idea of making it possible to use more rounds though.

Cheers,
- -- 
Xin LI delp...@delphij.nethttps://www.delphij.net/
FreeBSD - The Power to Serve!   Live free or die
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (FreeBSD)
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=4Qur
-END PGP SIGNATURE-
___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org


Re: ipfw: fetch doesn't reach ftp://fttp.sites.foo

2014-03-07 Thread Allan Jude
On 2014-03-07 16:55, O. Hartmann wrote:
 On Fri, 07 Mar 2014 15:33:39 -0500
 Allan Jude free...@allanjude.com wrote:
 
 On 2014-03-07 13:57, O. Hartmann wrote:

 Recently I swaitched from pf to ipfw on some CURRENT boxes and for 
 convenience I used
 the workstation predefinition of FreeBSD. But with that change, all 
 access of ports
 via fetch located at ftp-sites stopped passing the filter.

 Even switching to open doesn't help and this is confusing me.

 The CURRENT box in question is passing its traffic within a LAN through a 
 gateway
 running also FreeBSD CURRENT, but with pf. The gateway is performing NAT. 
 As long as
 the failing client behind the gateway system is using pf as the filter, the 
 traffic
 for ftp seems to pass through. On the gateway with pf as the default 
 filter, the
 ports fetching via ftp-site their sources perform without problems.

 What is up with IPFW?

 Is their a solution? I tried to search google for freebsd ipfw ftp but I 
 didn't find
 anything suitable targeting my problem or any problem of that kind.


 Thanks in adavance,

 Oliver 


 What error does fetch give? Is it having problems with DNS, connection
 to the FTP site, or just making the FTP DATA connection? Have you tried
 with 'passive' mode on/off?

 The box doesn't have problems contacting any DNS.
 
 Fetch gives the shown errors or simple timeouts.  Either manually or via 
 portmaster to
 update ports like the one shown below.
 
 The very same port has no problems on the system having pf instead of ipfw.
 
 I will switch back to pf on the box in question to check whether the choice 
 of firewall
 really makes the difference.
 
 This is what I get when seeting passive mode (it doesn't change anything from 
 active
 mode):
 
 root@thor: [pciids] setenv FTP_PASSIVE_MODE YES
 
 root@thor: [pciids] make fetch
 ===  License BSD3CLAUSE GPLv2 GPLv3 accepted by the user
 ===   pciids-20140301 depends on file: /usr/local/sbin/pkg - found
 = pciids-20140301.tar.xz doesn't seem to exist in /usr/ports/distfiles/.
 = Attempting to fetch
 http://ftp.FreeBSD.org/pub/FreeBSD/ports/local-distfiles/sunpoet/pciids-20140301.tar.xz
 fetch:
 http://ftp.FreeBSD.org/pub/FreeBSD/ports/local-distfiles/sunpoet/pciids-20140301.tar.xz:
 Not Found = Attempting to fetch
 ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/local-distfiles/sunpoet/pciids-20140301.tar.xz
 fetch:
 ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/local-distfiles/sunpoet/pciids-20140301.tar.xz:
 No route to host = Attempting to fetch
 ftp://ftp.se.FreeBSD.org/pub/FreeBSD/ports/local-distfiles/sunpoet/pciids-20140301.tar.xz
 fetch:
 ftp://ftp.se.FreeBSD.org/pub/FreeBSD/ports/local-distfiles/sunpoet/pciids-20140301.tar.xz:
 No route to host = Attempting to fetch
 ftp://ftp.uk.FreeBSD.org/pub/FreeBSD/ports/local-distfiles/sunpoet/pciids-20140301.tar.xz
 fetch:
 ftp://ftp.uk.FreeBSD.org/pub/FreeBSD/ports/local-distfiles/sunpoet/pciids-20140301.tar.xz:
 No route to host = Attempting to fetch
 ftp://ftp.ru.FreeBSD.org/pub/FreeBSD/ports/local-distfiles/sunpoet/pciids-20140301.tar.xz
 fetch: transfer timed out
 

'no route to host' suggests it might be trying to do ipv6

-- 
Allan Jude



signature.asc
Description: OpenPGP digital signature


Re: Feature Proposal: Transparent upgrade of crypt() algorithms

2014-03-07 Thread Allan Jude
On 2014-03-07 17:06, Xin Li wrote:
 Hi,
 
 On 03/07/14 13:52, A.J. Kehoe IV (Nanoman) wrote:
 Allan Jude wrote:
 On 2014-03-07 11:13, A.J. Kehoe IV (Nanoman) wrote:
 Allan Jude wrote:

 [...]

 Honestly, my use case is just silently upgrading the strength
 of the hashing algorithm (when combined with my other feature
 request). Updating my bcrypt hashes from $2a$04$ to $2b$12$
 or something. Same applies for the default sha512, maybe I
 want to update to rounds=15000

 Like this?

 http://www.freebsd.org/cgi/query-pr.cgi?pr=182518

 Request for comments:

 http://docs.freebsd.org/cgi/mid.cgi?20140106205156.GD4903


 This looks like what we wanted. In the feedback you talked about
 some changes to your patch required to make it work, is there any
 progress on those?
 
 Derek's patches worked perfectly for our needs, but we're the sort
 of people who use vipw and our own utilities for user management.
 It wasn't until later that we discovered at least one other file
 would need patching to satisfy everyone.  We didn't want to employ
 the same copy-pasta method, so we asked for feedback about our
 proposed alternative.
 
 secteam@, do you have any comments?  Before we put any more work
 into this, we want to be sure that our proposal is an acceptable
 one.
 
 
 Did you mean adding rounds capability, or transparent upgrade of
 crypt() algorithms, or both?

There are 2 separate but related threads

1) specify rounds for crypt()

2) transparent upgrade of crypt() algo (or more likely just number of
rounds)

 
 I need some time to digest the whole transparent upgrade idea but in
 general I think it's good.
 
 Speaking for adding rounds, the only problem that needs to be fixed is
 that the proposed patch makes it possible to create conflicting
 configuration (passwd_format and passwd_modular can use different
 hashing algorithms) and need to be fixed and polished.  I like the
 idea of making it possible to use more rounds though.
 
 Cheers,
 


-- 
Allan Jude



signature.asc
Description: OpenPGP digital signature


Re: Feature Proposal: Transparent upgrade of crypt() algorithms

2014-03-07 Thread John-Mark Gurney
Allan Jude wrote this message on Fri, Mar 07, 2014 at 17:53 -0500:
 On 2014-03-07 17:06, Xin Li wrote:
  Hi,
  
  On 03/07/14 13:52, A.J. Kehoe IV (Nanoman) wrote:
  Allan Jude wrote:
  On 2014-03-07 11:13, A.J. Kehoe IV (Nanoman) wrote:
  Allan Jude wrote:
 
  [...]
 
  Honestly, my use case is just silently upgrading the strength
  of the hashing algorithm (when combined with my other feature
  request). Updating my bcrypt hashes from $2a$04$ to $2b$12$
  or something. Same applies for the default sha512, maybe I
  want to update to rounds=15000
 
  Like this?
 
  http://www.freebsd.org/cgi/query-pr.cgi?pr=182518
 
  Request for comments:
 
  http://docs.freebsd.org/cgi/mid.cgi?20140106205156.GD4903
 
 
  This looks like what we wanted. In the feedback you talked about
  some changes to your patch required to make it work, is there any
  progress on those?
  
  Derek's patches worked perfectly for our needs, but we're the sort
  of people who use vipw and our own utilities for user management.
  It wasn't until later that we discovered at least one other file
  would need patching to satisfy everyone.  We didn't want to employ
  the same copy-pasta method, so we asked for feedback about our
  proposed alternative.
  
  secteam@, do you have any comments?  Before we put any more work
  into this, we want to be sure that our proposal is an acceptable
  one.
  
  
  Did you mean adding rounds capability, or transparent upgrade of
  crypt() algorithms, or both?
 
 There are 2 separate but related threads
 
 1) specify rounds for crypt()
 
 2) transparent upgrade of crypt() algo (or more likely just number of
 rounds)

Can't the two be merged...  where 2 becomes a flag in login.conf instead
of an algo fetch, and then if it's true, it does the algo fetch from
1?

I really would like us to get 1 in, and then on boot dynamicly adjust
the number of rounds depending upon CPU usage... obviously, a flag will
adjust how long/many rounds the admin wants, but it would allow an
automatic increase in security as faster CPUs are used...

Anyways, how many people are still using passwords instead of ssh keys?
Setting the time to be something like 100ms may seem long, but
considering few people should be using passwords these days, it's less
of an issue...

Xin Li, if you need help reviewing, testing, let me know...

  I need some time to digest the whole transparent upgrade idea but in
  general I think it's good.
  
  Speaking for adding rounds, the only problem that needs to be fixed is
  that the proposed patch makes it possible to create conflicting
  configuration (passwd_format and passwd_modular can use different
  hashing algorithms) and need to be fixed and polished.  I like the
  idea of making it possible to use more rounds though.

-- 
  John-Mark Gurney  Voice: +1 415 225 5579

 All that I will do, has been done, All that I have, has not.
___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org


Re: warning: filename ends with '.', which is not allowed on Windows: 'tools/test/sort/bigtest/q-1.024.003.'

2014-03-07 Thread Eitan Adler
On 7 March 2014 13:50, Rui Paulo rpa...@felyko.com wrote:
 On 7 Mar 2014, at 10:38, David Chisnall thera...@freebsd.org wrote:

 On 7 Mar 2014, at 16:41, Rui Paulo rpa...@freebsd.org wrote:

 On 6 Mar 2014, at 23:30, David Xu davi...@freebsd.org wrote:
 it seems filename ended with a dot is illegal on Windows, if someone
 wants to check out freebsd source code on Windows, it will be a problem.

 Is this something we want to support?

 Yes, definitely.  Building FreeBSD on other platforms is one of the requests 
 we get very often from embedded systems vendors.  Cheap virtualisation has 
 made it less urgent (they can just stick a FreeBSD VirtualBox VM on their 
 workstations), but it's definitely something we'd like eventually.  To my 
 knowledge, no one is working on it, but we should aim to make life easy for 
 whoever does...

 I guess I should clarify: I wasn’t talking about cross building in general, 
 but specifically on Windows.  It’s far easier to setup a case-sensitive file 
 system on OS X and cross build FreeBSD from there than it is on Windows.

Over 50% of the people that come to FreeBSD.org run windows.  If it is
possible to support building on windows, we should try.
-- 
Eitan Adler
___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org

Re: warning: filename ends with '.', which is not allowed on Windows: 'tools/test/sort/bigtest/q-1.024.003.'

2014-03-07 Thread Allan Jude
On 2014-03-07 18:12, Eitan Adler wrote:
 On 7 March 2014 13:50, Rui Paulo rpa...@felyko.com wrote:
 On 7 Mar 2014, at 10:38, David Chisnall thera...@freebsd.org wrote:

 On 7 Mar 2014, at 16:41, Rui Paulo rpa...@freebsd.org wrote:

 On 6 Mar 2014, at 23:30, David Xu davi...@freebsd.org wrote:
 it seems filename ended with a dot is illegal on Windows, if someone
 wants to check out freebsd source code on Windows, it will be a problem.

 Is this something we want to support?

 Yes, definitely.  Building FreeBSD on other platforms is one of the 
 requests we get very often from embedded systems vendors.  Cheap 
 virtualisation has made it less urgent (they can just stick a FreeBSD 
 VirtualBox VM on their workstations), but it's definitely something we'd 
 like eventually.  To my knowledge, no one is working on it, but we should 
 aim to make life easy for whoever does...

 I guess I should clarify: I wasn’t talking about cross building in general, 
 but specifically on Windows.  It’s far easier to setup a case-sensitive file 
 system on OS X and cross build FreeBSD from there than it is on Windows.
 
 Over 50% of the people that come to FreeBSD.org run windows.  If it is
 possible to support building on windows, we should try.
 

Even well shy of 'building' on windows, I do most of my docs work on
windows. I even wrote most of the new code for bsdinstall on a windows
machine. Being able to checkout the svn tree and work on it on my
existing work station is nice.

-- 
Allan Jude



signature.asc
Description: OpenPGP digital signature


Re: warning: filename ends with '.', which is not allowed on Windows: 'tools/test/sort/bigtest/q-1.024.003.'

2014-03-07 Thread Warner Losh

On Mar 7, 2014, at 4:12 PM, Eitan Adler li...@eitanadler.com wrote:

 On 7 March 2014 13:50, Rui Paulo rpa...@felyko.com wrote:
 On 7 Mar 2014, at 10:38, David Chisnall thera...@freebsd.org wrote:
 
 On 7 Mar 2014, at 16:41, Rui Paulo rpa...@freebsd.org wrote:
 
 On 6 Mar 2014, at 23:30, David Xu davi...@freebsd.org wrote:
 it seems filename ended with a dot is illegal on Windows, if someone
 wants to check out freebsd source code on Windows, it will be a problem.
 
 Is this something we want to support?
 
 Yes, definitely.  Building FreeBSD on other platforms is one of the 
 requests we get very often from embedded systems vendors.  Cheap 
 virtualisation has made it less urgent (they can just stick a FreeBSD 
 VirtualBox VM on their workstations), but it's definitely something we'd 
 like eventually.  To my knowledge, no one is working on it, but we should 
 aim to make life easy for whoever does...
 
 I guess I should clarify: I wasn’t talking about cross building in general, 
 but specifically on Windows.  It’s far easier to setup a case-sensitive file 
 system on OS X and cross build FreeBSD from there than it is on Windows.
 
 Over 50% of the people that come to FreeBSD.org run windows.  If it is
 possible to support building on windows, we should try.

The big issue isn’t case sensitivity or file names ending in dot. The real 
issue is that our build just isn’t setup for this at the moment and it would be 
a big lift to make it work at all. Sure, go ahead and fix this minor flea-bite 
of an issue, but there are several large elephant-sized issues before we could 
have even a tiny chance of doing this...

Warner


___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org


Re: Feature Proposal: Transparent upgrade of crypt() algorithms

2014-03-07 Thread Xin Li
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 03/07/14 14:50, A.J. Kehoe IV (Nanoman) wrote:
 Xin Li wrote:
 Hi,
 
 On 03/07/14 13:52, A.J. Kehoe IV (Nanoman) wrote:
 Allan Jude wrote:
 On 2014-03-07 11:13, A.J. Kehoe IV (Nanoman) wrote:
 Allan Jude wrote:
 
 [...]
 
 Honestly, my use case is just silently upgrading the
 strength of the hashing algorithm (when combined with my
 other feature request). Updating my bcrypt hashes from
 $2a$04$ to $2b$12$ or something. Same applies for the
 default sha512, maybe I want to update to rounds=15000
 
 Like this?
 
 http://www.freebsd.org/cgi/query-pr.cgi?pr=182518
 
 Request for comments:
 
 http://docs.freebsd.org/cgi/mid.cgi?20140106205156.GD4903
 
 [...]
 
 Speaking for adding rounds, the only problem that needs to be
 fixed is that the proposed patch makes it possible to create
 conflicting configuration (passwd_format and passwd_modular can
 use different hashing algorithms) and need to be fixed and
 polished.  I like the idea of making it possible to use more
 rounds though.
 
 This was deliberate for backward compatibility.  passwd_format will
 be used by default if passwd_modular isn't defined.  If
 passwd_modular is defined as disabled, then passwd_format will be
 used.

Well, my point is that the two shouldn't be allowed to exist together
if they can mean something conflicting.  Allowing passwd_format=sha512
AND passwd_modular=$2a$08$ in the same configuration creates confusion
and it's not good.

My suggestion is that we either have:

a) passwd_format and passwd_round (so that they don't conflict), or

b) extend passwd_format in a compatible manner to allow specifying a
round, or,

c) make passwd_format and passwd_modular conflict so we don't silently
accept it and instead bail out when doing pwd_mkdb.

 What do you think of the idea of putting this into libcrypt instead
 of pam_unix.c, and then patching pam_unix.c and pw_user.c to
 reference libcrypt?

Which part of the idea?  I think it's a bad idea to make libcrypt to
depend on libutil (for login_cap(3)) but we should probably provide
new wrappers in login_cap(3) to do the common things when requested
for various password manipulating tools to reduce duplicated code.

Cheers,
- -- 
Xin LI delp...@delphij.nethttps://www.delphij.net/
FreeBSD - The Power to Serve!   Live free or die
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (FreeBSD)
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=xSx1
-END PGP SIGNATURE-
___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org


Re: Feature Proposal: Transparent upgrade of crypt() algorithms

2014-03-07 Thread Xin Li
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 03/07/14 15:07, John-Mark Gurney wrote:
 Allan Jude wrote this message on Fri, Mar 07, 2014 at 17:53 -0500:
 On 2014-03-07 17:06, Xin Li wrote:
 Hi,
 
 On 03/07/14 13:52, A.J. Kehoe IV (Nanoman) wrote:
 Allan Jude wrote:
 On 2014-03-07 11:13, A.J. Kehoe IV (Nanoman) wrote:
 Allan Jude wrote:
 
 [...]
 
 Honestly, my use case is just silently upgrading the
 strength of the hashing algorithm (when combined with
 my other feature request). Updating my bcrypt hashes
 from $2a$04$ to $2b$12$ or something. Same applies for
 the default sha512, maybe I want to update to
 rounds=15000
 
 Like this?
 
 http://www.freebsd.org/cgi/query-pr.cgi?pr=182518
 
 Request for comments:
 
 http://docs.freebsd.org/cgi/mid.cgi?20140106205156.GD4903



 
This looks like what we wanted. In the feedback you talked about
 some changes to your patch required to make it work, is
 there any progress on those?
 
 Derek's patches worked perfectly for our needs, but we're the
 sort of people who use vipw and our own utilities for user
 management. It wasn't until later that we discovered at least
 one other file would need patching to satisfy everyone.  We
 didn't want to employ the same copy-pasta method, so we asked
 for feedback about our proposed alternative.
 
 secteam@, do you have any comments?  Before we put any more
 work into this, we want to be sure that our proposal is an
 acceptable one.
 
 
 Did you mean adding rounds capability, or transparent upgrade
 of crypt() algorithms, or both?
 
 There are 2 separate but related threads
 
 1) specify rounds for crypt()
 
 2) transparent upgrade of crypt() algo (or more likely just
 number of rounds)
 
 Can't the two be merged...  where 2 becomes a flag in login.conf
 instead of an algo fetch, and then if it's true, it does the algo
 fetch from 1?
 
 I really would like us to get 1 in, and then on boot dynamicly
 adjust the number of rounds depending upon CPU usage... obviously,
 a flag will adjust how long/many rounds the admin wants, but it
 would allow an automatic increase in security as faster CPUs are
 used...

Or by the installer/a tool that gets run when doing
mergemaster/etcupdate/freebsd-update: it's rare that CPU gets faster
after installation, and we can probably just write in the
configuration anyway?

Personally I'm not a big fan of making it something that changes over
time: the attacker may do offline attacker than doing it on the victim
system that revealed the salted hashes, so how fast the system CPU
runs doesn't really matter, except for how long a system administrator
is willing to have the user to wait.

 Anyways, how many people are still using passwords instead of ssh
 keys? Setting the time to be something like 100ms may seem long,
 but considering few people should be using passwords these days,
 it's less of an issue...

I'm currently using SSH key plus Google Authenticator for my systems
but all remote login via password is disabled.  I am aware of,
however, many people who refuse to use SSH key authentication because
they don't want to carry their keys, which is a bad idea but they do
it anyways.

 Xin Li, if you need help reviewing, testing, let me know...

Will do and thanks for the offer!

Cheers,
- -- 
Xin LI delp...@delphij.nethttps://www.delphij.net/
FreeBSD - The Power to Serve!   Live free or die
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (FreeBSD)
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=rCdB
-END PGP SIGNATURE-
___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org


Re: warning: filename ends with '.', which is not allowed on Windows: 'tools/test/sort/bigtest/q-1.024.003.'

2014-03-07 Thread Adrian Chadd
On 7 March 2014 15:25, Warner Losh i...@bsdimp.com wrote:

 On Mar 7, 2014, at 4:12 PM, Eitan Adler li...@eitanadler.com wrote:

 On 7 March 2014 13:50, Rui Paulo rpa...@felyko.com wrote:
 On 7 Mar 2014, at 10:38, David Chisnall thera...@freebsd.org wrote:

 On 7 Mar 2014, at 16:41, Rui Paulo rpa...@freebsd.org wrote:

 On 6 Mar 2014, at 23:30, David Xu davi...@freebsd.org wrote:
 it seems filename ended with a dot is illegal on Windows, if someone
 wants to check out freebsd source code on Windows, it will be a problem.

 Is this something we want to support?

 Yes, definitely.  Building FreeBSD on other platforms is one of the 
 requests we get very often from embedded systems vendors.  Cheap 
 virtualisation has made it less urgent (they can just stick a FreeBSD 
 VirtualBox VM on their workstations), but it's definitely something we'd 
 like eventually.  To my knowledge, no one is working on it, but we should 
 aim to make life easy for whoever does...

 I guess I should clarify: I wasn't talking about cross building in general, 
 but specifically on Windows.  It's far easier to setup a case-sensitive 
 file system on OS X and cross build FreeBSD from there than it is on 
 Windows.

 Over 50% of the people that come to FreeBSD.org run windows.  If it is
 possible to support building on windows, we should try.

 The big issue isn't case sensitivity or file names ending in dot. The real 
 issue is that our build just isn't setup for this at the moment and it would 
 be a big lift to make it work at all. Sure, go ahead and fix this minor 
 flea-bite of an issue, but there are several large elephant-sized issues 
 before we could have even a tiny chance of doing this...


are those issues documented anywhere? :)


-a
___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org


Re: Feature Proposal: Transparent upgrade of crypt() algorithms

2014-03-07 Thread John-Mark Gurney
Xin Li wrote this message on Fri, Mar 07, 2014 at 16:43 -0800:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA512
 
 On 03/07/14 15:07, John-Mark Gurney wrote:
  Allan Jude wrote this message on Fri, Mar 07, 2014 at 17:53 -0500:
  On 2014-03-07 17:06, Xin Li wrote:
  Hi,
  
  On 03/07/14 13:52, A.J. Kehoe IV (Nanoman) wrote:
  Allan Jude wrote:
  On 2014-03-07 11:13, A.J. Kehoe IV (Nanoman) wrote:
  Allan Jude wrote:
  
  [...]
  
  Honestly, my use case is just silently upgrading the
  strength of the hashing algorithm (when combined with
  my other feature request). Updating my bcrypt hashes
  from $2a$04$ to $2b$12$ or something. Same applies for
  the default sha512, maybe I want to update to
  rounds=15000
  
  Like this?
  
  http://www.freebsd.org/cgi/query-pr.cgi?pr=182518
  
  Request for comments:
  
  http://docs.freebsd.org/cgi/mid.cgi?20140106205156.GD4903
 
 
 
  
 This looks like what we wanted. In the feedback you talked about
  some changes to your patch required to make it work, is
  there any progress on those?
  
  Derek's patches worked perfectly for our needs, but we're the
  sort of people who use vipw and our own utilities for user
  management. It wasn't until later that we discovered at least
  one other file would need patching to satisfy everyone.  We
  didn't want to employ the same copy-pasta method, so we asked
  for feedback about our proposed alternative.
  
  secteam@, do you have any comments?  Before we put any more
  work into this, we want to be sure that our proposal is an
  acceptable one.
  
  
  Did you mean adding rounds capability, or transparent upgrade
  of crypt() algorithms, or both?
  
  There are 2 separate but related threads
  
  1) specify rounds for crypt()
  
  2) transparent upgrade of crypt() algo (or more likely just
  number of rounds)
  
  Can't the two be merged...  where 2 becomes a flag in login.conf
  instead of an algo fetch, and then if it's true, it does the algo
  fetch from 1?
  
  I really would like us to get 1 in, and then on boot dynamicly
  adjust the number of rounds depending upon CPU usage... obviously,
  a flag will adjust how long/many rounds the admin wants, but it
  would allow an automatic increase in security as faster CPUs are
  used...
 
 Or by the installer/a tool that gets run when doing
 mergemaster/etcupdate/freebsd-update: it's rare that CPU gets faster
 after installation, and we can probably just write in the
 configuration anyway?

It's just easier to throw something into /etc/rc.d w/ an enable/disable
switch than it is to update one/all of those tools to do it...  If you
update only one, then the users of the other tools won't get the benefit..
Or someone forgets to update the other tool...  or we could detect that
the CPU is the same, and keep the previous results...

 Personally I'm not a big fan of making it something that changes over
 time: the attacker may do offline attacker than doing it on the victim
 system that revealed the salted hashes, so how fast the system CPU
 runs doesn't really matter, except for how long a system administrator
 is willing to have the user to wait.

This is my point, there is currently the default number of rounds which
provides basic security, but if the sysadmin wants to provide
additional security, they can do so, either by fixing the number of
rounds to something larger, or by providing a time they are willing
to spend to do the work...

I'm tired of default security parameters not being ideal, or secure
enough...  Most sysadmins won't go and increase the number of rounds
since they don't know enough to (or couldn't before the other patch
was even presented), but they will continue to install FreeBSD on ever
faster machines, yet our only response so far is to switch algorithms,
instead of including more rounds, etc...  This feature would allow us
to provide better security out of the box, and continue to scale our
security as time goes on...

Performance for default, sha512 w/ 5k rounds:
AMD A10-5700 3.4GHz 3.8ms
AMD Opteron 4228 HE 2.8Ghz  5.4ms
Intel(R) Xeon(R) X5650 2.67GHz  4.0ms

these times are aprox as the timing varies quite a bit, ~+/-10%...

code available at: https://www.funkthat.com/~jmg/testcrypt.c

Most people won't notice a 50ms delay on login, yet it'll give us a
10x security benefit...  Just for fun, compare how long it takes to
run sleep .005 and sleep .05 from the command line...  Heck I think
most people would be fine w/ 100ms delay.. try it.. :)

and if they don't mind something similar to how geli does it, it
could be as long as 2 seconds, giving a 500x benefit! :)

and with the auto recrypt path, we could automatically downgrade
users passwords if system ends up w/ a slower CPU, or we could prevent
the downgrade...

  Anyways, how many people are still using passwords instead of ssh
  keys? Setting the time to be something like 100ms may seem long,
  but considering few people should be using passwords these days,
  it's less of an 

Re: warning: filename ends with '.', which is not allowed on Windows: 'tools/test/sort/bigtest/q-1.024.003.'

2014-03-07 Thread Warner Losh

On Mar 7, 2014, at 6:30 PM, Adrian Chadd adr...@freebsd.org wrote:

 On 7 March 2014 15:25, Warner Losh i...@bsdimp.com wrote:
 
 On Mar 7, 2014, at 4:12 PM, Eitan Adler li...@eitanadler.com wrote:
 
 On 7 March 2014 13:50, Rui Paulo rpa...@felyko.com wrote:
 On 7 Mar 2014, at 10:38, David Chisnall thera...@freebsd.org wrote:
 
 On 7 Mar 2014, at 16:41, Rui Paulo rpa...@freebsd.org wrote:
 
 On 6 Mar 2014, at 23:30, David Xu davi...@freebsd.org wrote:
 it seems filename ended with a dot is illegal on Windows, if someone
 wants to check out freebsd source code on Windows, it will be a problem.
 
 Is this something we want to support?
 
 Yes, definitely.  Building FreeBSD on other platforms is one of the 
 requests we get very often from embedded systems vendors.  Cheap 
 virtualisation has made it less urgent (they can just stick a FreeBSD 
 VirtualBox VM on their workstations), but it's definitely something we'd 
 like eventually.  To my knowledge, no one is working on it, but we should 
 aim to make life easy for whoever does...
 
 I guess I should clarify: I wasn't talking about cross building in 
 general, but specifically on Windows.  It's far easier to setup a 
 case-sensitive file system on OS X and cross build FreeBSD from there than 
 it is on Windows.
 
 Over 50% of the people that come to FreeBSD.org run windows.  If it is
 possible to support building on windows, we should try.
 
 The big issue isn't case sensitivity or file names ending in dot. The real 
 issue is that our build just isn't setup for this at the moment and it would 
 be a big lift to make it work at all. Sure, go ahead and fix this minor 
 flea-bite of an issue, but there are several large elephant-sized issues 
 before we could have even a tiny chance of doing this...
 
 
 are those issues documented anywhere? :)

I believe I talked to some notes at a developer’s summit 5 years ago or so on 
what I found. The hardest part is bootstrapping the tools needed in the build.

Warner

___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org


Re: Feature Proposal: Transparent upgrade of crypt() algorithms

2014-03-07 Thread John-Mark Gurney
Xin Li wrote this message on Fri, Mar 07, 2014 at 16:36 -0800:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA512
 
 On 03/07/14 14:50, A.J. Kehoe IV (Nanoman) wrote:
  Xin Li wrote:
  Hi,
  
  On 03/07/14 13:52, A.J. Kehoe IV (Nanoman) wrote:
  Allan Jude wrote:
  On 2014-03-07 11:13, A.J. Kehoe IV (Nanoman) wrote:
  Allan Jude wrote:
  
  [...]
  
  Honestly, my use case is just silently upgrading the
  strength of the hashing algorithm (when combined with my
  other feature request). Updating my bcrypt hashes from
  $2a$04$ to $2b$12$ or something. Same applies for the
  default sha512, maybe I want to update to rounds=15000
  
  Like this?
  
  http://www.freebsd.org/cgi/query-pr.cgi?pr=182518
  
  Request for comments:
  
  http://docs.freebsd.org/cgi/mid.cgi?20140106205156.GD4903
  
  [...]
  
  Speaking for adding rounds, the only problem that needs to be
  fixed is that the proposed patch makes it possible to create
  conflicting configuration (passwd_format and passwd_modular can
  use different hashing algorithms) and need to be fixed and
  polished.  I like the idea of making it possible to use more
  rounds though.
  
  This was deliberate for backward compatibility.  passwd_format will
  be used by default if passwd_modular isn't defined.  If
  passwd_modular is defined as disabled, then passwd_format will be
  used.
 
 Well, my point is that the two shouldn't be allowed to exist together
 if they can mean something conflicting.  Allowing passwd_format=sha512
 AND passwd_modular=$2a$08$ in the same configuration creates confusion
 and it's not good.
 
 My suggestion is that we either have:
 
 a) passwd_format and passwd_round (so that they don't conflict), or
 
 b) extend passwd_format in a compatible manner to allow specifying a
 round, or,

Couldn't we merge passwd_format and passwd_modular into one, being
either the name, or the begining salt string?  since the salt string
always begins w/ $, they wouldn't conflict, and could be properly
resolved...

 c) make passwd_format and passwd_modular conflict so we don't silently
 accept it and instead bail out when doing pwd_mkdb.
 
  What do you think of the idea of putting this into libcrypt instead
  of pam_unix.c, and then patching pam_unix.c and pw_user.c to
  reference libcrypt?
 
 Which part of the idea?  I think it's a bad idea to make libcrypt to
 depend on libutil (for login_cap(3)) but we should probably provide
 new wrappers in login_cap(3) to do the common things when requested
 for various password manipulating tools to reduce duplicated code.

So, the current code in pam_unix is:
login_setcryptfmt which calls crypt_set_format as necessary
makesalt
crypt

So, we could expand crypt_set_format to understand the two, and keep
a copy of the rounds data, or we could expose makesalt into maybe
crypt_makesalt (this would be nice) w/ an optional arg that provides
either the name or the beging salt string w/ rounds, i.e. what
passwd_format would contain...  and update pam_unix and friends to
use this...  This last method would make login_setcryptfmt unnecessary,
so I'm not sure how good/bad that is..

-- 
  John-Mark Gurney  Voice: +1 415 225 5579

 All that I will do, has been done, All that I have, has not.
___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org


Re: Feature Proposal: Transparent upgrade of crypt() algorithms

2014-03-07 Thread A.J. Kehoe IV (Nanoman)

Xin Li wrote:

Hi,

On 03/07/14 13:52, A.J. Kehoe IV (Nanoman) wrote:

Allan Jude wrote:

On 2014-03-07 11:13, A.J. Kehoe IV (Nanoman) wrote:

Allan Jude wrote:

[...]


Honestly, my use case is just silently upgrading the strength
of the hashing algorithm (when combined with my other feature
request). Updating my bcrypt hashes from $2a$04$ to $2b$12$
or something. Same applies for the default sha512, maybe I
want to update to rounds=15000


Like this?

http://www.freebsd.org/cgi/query-pr.cgi?pr=182518

Request for comments:

http://docs.freebsd.org/cgi/mid.cgi?20140106205156.GD4903


[...]


Speaking for adding rounds, the only problem that needs to be fixed is
that the proposed patch makes it possible to create conflicting
configuration (passwd_format and passwd_modular can use different
hashing algorithms) and need to be fixed and polished.  I like the
idea of making it possible to use more rounds though.


This was deliberate for backward compatibility.  passwd_format will be used by default if 
passwd_modular isn't defined.  If passwd_modular is defined as disabled, then 
passwd_format will be used.

What do you think of the idea of putting this into libcrypt instead of 
pam_unix.c, and then patching pam_unix.c and pw_user.c to reference libcrypt?

--
A.J. Kehoe IV (Nanoman) |  /\  ASCII Ribbon Campaign
Nanoman's Company   |  \ /   - No HTML/RTF in E-mail
E-mail: nano...@nanoman.ca  |   X- No proprietary attachments
WWW: http://www.nanoman.ca/ |  / \   - Respect for open standards


smime.p7s
Description: S/MIME cryptographic signature


Re: Feature Proposal: Transparent upgrade of crypt() algorithms

2014-03-07 Thread Allan Jude
On 2014-03-07 21:15, John-Mark Gurney wrote:
 Xin Li wrote this message on Fri, Mar 07, 2014 at 16:43 -0800:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA512

 On 03/07/14 15:07, John-Mark Gurney wrote:
 Allan Jude wrote this message on Fri, Mar 07, 2014 at 17:53 -0500:
 On 2014-03-07 17:06, Xin Li wrote:
 Hi,

 On 03/07/14 13:52, A.J. Kehoe IV (Nanoman) wrote:
 Allan Jude wrote:
 On 2014-03-07 11:13, A.J. Kehoe IV (Nanoman) wrote:
 Allan Jude wrote:

 [...]

 Honestly, my use case is just silently upgrading the
 strength of the hashing algorithm (when combined with
 my other feature request). Updating my bcrypt hashes
 from $2a$04$ to $2b$12$ or something. Same applies for
 the default sha512, maybe I want to update to
 rounds=15000

 Like this?

 http://www.freebsd.org/cgi/query-pr.cgi?pr=182518

 Request for comments:

 http://docs.freebsd.org/cgi/mid.cgi?20140106205156.GD4903




 This looks like what we wanted. In the feedback you talked about
 some changes to your patch required to make it work, is
 there any progress on those?

 Derek's patches worked perfectly for our needs, but we're the
 sort of people who use vipw and our own utilities for user
 management. It wasn't until later that we discovered at least
 one other file would need patching to satisfy everyone.  We
 didn't want to employ the same copy-pasta method, so we asked
 for feedback about our proposed alternative.

 secteam@, do you have any comments?  Before we put any more
 work into this, we want to be sure that our proposal is an
 acceptable one.


 Did you mean adding rounds capability, or transparent upgrade
 of crypt() algorithms, or both?

 There are 2 separate but related threads

 1) specify rounds for crypt()

 2) transparent upgrade of crypt() algo (or more likely just
 number of rounds)

 Can't the two be merged...  where 2 becomes a flag in login.conf
 instead of an algo fetch, and then if it's true, it does the algo
 fetch from 1?

 I really would like us to get 1 in, and then on boot dynamicly
 adjust the number of rounds depending upon CPU usage... obviously,
 a flag will adjust how long/many rounds the admin wants, but it
 would allow an automatic increase in security as faster CPUs are
 used...

 Or by the installer/a tool that gets run when doing
 mergemaster/etcupdate/freebsd-update: it's rare that CPU gets faster
 after installation, and we can probably just write in the
 configuration anyway?
 
 It's just easier to throw something into /etc/rc.d w/ an enable/disable
 switch than it is to update one/all of those tools to do it...  If you
 update only one, then the users of the other tools won't get the benefit..
 Or someone forgets to update the other tool...  or we could detect that
 the CPU is the same, and keep the previous results...
 
 Personally I'm not a big fan of making it something that changes over
 time: the attacker may do offline attacker than doing it on the victim
 system that revealed the salted hashes, so how fast the system CPU
 runs doesn't really matter, except for how long a system administrator
 is willing to have the user to wait.
 
 This is my point, there is currently the default number of rounds which
 provides basic security, but if the sysadmin wants to provide
 additional security, they can do so, either by fixing the number of
 rounds to something larger, or by providing a time they are willing
 to spend to do the work...
 
 I'm tired of default security parameters not being ideal, or secure
 enough...  Most sysadmins won't go and increase the number of rounds
 since they don't know enough to (or couldn't before the other patch
 was even presented), but they will continue to install FreeBSD on ever
 faster machines, yet our only response so far is to switch algorithms,
 instead of including more rounds, etc...  This feature would allow us
 to provide better security out of the box, and continue to scale our
 security as time goes on...
 
 Performance for default, sha512 w/ 5k rounds:
 AMD A10-5700 3.4GHz   3.8ms
 AMD Opteron 4228 HE 2.8Ghz5.4ms
 Intel(R) Xeon(R) X5650 2.67GHz4.0ms
 
 these times are aprox as the timing varies quite a bit, ~+/-10%...
 
 code available at: https://www.funkthat.com/~jmg/testcrypt.c
 
 Most people won't notice a 50ms delay on login, yet it'll give us a
 10x security benefit...  Just for fun, compare how long it takes to
 run sleep .005 and sleep .05 from the command line...  Heck I think
 most people would be fine w/ 100ms delay.. try it.. :)
 
 and if they don't mind something similar to how geli does it, it
 could be as long as 2 seconds, giving a 500x benefit! :)
 
 and with the auto recrypt path, we could automatically downgrade
 users passwords if system ends up w/ a slower CPU, or we could prevent
 the downgrade...
 
 Anyways, how many people are still using passwords instead of ssh
 keys? Setting the time to be something like 100ms may seem long,
 but considering few people should be using passwords these days,
 it's less of 

Re: Feature Proposal: Transparent upgrade of crypt() algorithms

2014-03-07 Thread Warner Losh

On Mar 7, 2014, at 10:22 PM, Allan Jude free...@allanjude.com wrote:
 Performance for default, sha512 w/ 5k rounds:
 AMD A10-5700 3.4GHz  3.8ms
 AMD Opteron 4228 HE 2.8Ghz   5.4ms
 Intel(R) Xeon(R) X5650 2.67GHz   4.0ms
 
 these times are aprox as the timing varies quite a bit, ~+/-10%…

And what would that be on a RPi or other embedded device?

And do the extra route have a peer-reviewed paper showing the increased 
strength?

 One possible solution would be just setting the default login.conf
 number of rounds, based on a test in the installer. Although this won't
 help for systems that are deployed by imaging, or VM images (like EC2
 images) etc.

I’m not sure that’s a good idea.

Warner

___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org