Re: SPAM/virii apparently from freeBSD addresses.

2004-03-01 Thread Daniel Lang
Hi,

Julian Elischer wrote on Sun, Feb 29, 2004 at 08:01:41PM -0800:
 Oh it was just a rant.. :-(
 
[..]
   Somewhere out there there is a ?Virus?/?Hacker?/?Spammer?
   getting really annoying..
  
  Yeah, but what do you expect anyone to do about it?
[..]

Many people are already using digital signatures. The occurence
of massively forged senders in e-mails by spammers and viruses
could be seen as motivation to establish a more widespread use
of digital signatures. Of course it doesn't help for e-mail
that we receive (unless we complain to the sender that one would
only accept signed e-mails, which is a bit tough), but at least
one could tell anyone, who complains that one has sent a virus, to
check for the signature.

Just a thought,
 Daniel

P.S.: If your MUA complains about my signature, be sure to import the
  CA certificates from http://ca.in.tum.de/, just because it's not
in the mozilla default root-ca set, it is not a less 
trustworthy CA.
-- 
IRCnet: Mr-Spock  
   - In dieser Mail ist ein Geist, der Dich in den Hintern beisst - 
 Daniel Lang * [EMAIL PROTECTED] * +49 89 289 18532 * http://www.leo.org/~dl/


smime.p7s
Description: S/MIME cryptographic signature


USB 2.0 Hub, patch for BSD stack

2004-03-01 Thread Holger Kipp
I have an ednet. USB 2.0 Hub 4-1 which seems to be 
identicyl to the Cypress Semiconductor Slim Hub.

The latest 4.9-STABLE is still missing the patch

  --- uhub.c.orig Fri Jul  4 20:17:50 2003
  +++ uhub.c  Fri Jul  4 21:57:31 2003
  @@ -185,7 +185,7 @@
  /* Get hub descriptor. */
  req.bmRequestType = UT_READ_CLASS_DEVICE;
  req.bRequest = UR_GET_DESCRIPTOR;
  -   USETW(req.wValue, 0);
  +   USETW2(req.wValue, (dev-address  1 ? UDESC_HUB : 0), 0);
  USETW(req.wIndex, 0);
  USETW(req.wLength, USB_HUB_DESCRIPTOR_SIZE);
  DPRINTFN(1,(usb_init_hub: getting hub descriptor\n));

http://lists.freebsd.org/pipermail/freebsd-hardware/2003-July/000390.html

The hub is now working on my system, even though detaching and attaching
an 8-in-1 Card Reader (USB 2: hama 46945) several times locks the system
(ie reset required).



Will this patch be MFCd any time soon or was this part just forgotten,
as the other minor patches (usbdevs.h, usbdevs_data.h) made it to
4.9-STABLE?

Regards,
Holger Kipp
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to [EMAIL PROTECTED]


USB 2.0 Hub, patch for BSD stack, addendum

2004-03-01 Thread Holger Kipp
Here what happens after detaching and attaching:

Feb 29 16:43:26 katrin /kernel: umass0: at uhub2 port 4 (addr 3) disconnected
Feb 29 16:43:26 katrin /kernel: (da0:umass-sim0:0:0:0): lost device
Feb 29 16:43:26 katrin /kernel: (da0:umass-sim0:0:0:0): removing device entry
Feb 29 16:43:26 katrin /kernel: umass0: detached
Feb 29 16:43:33 katrin /kernel: umass0: SMSC 223 USB97C223, rev 2.00/1.95, addr 3
Feb 29 16:43:40 katrin /kernel: umass0: BBB reset failed, IOERROR
Feb 29 16:43:40 katrin /kernel: umass0: BBB bulk-in clear stall failed, IOERROR
Feb 29 16:43:40 katrin /kernel: umass0: BBB bulk-out clear stall failed, IOERROR
Feb 29 16:43:40 katrin /kernel: umass0: BBB reset failed, IOERROR
Feb 29 16:43:40 katrin /kernel: umass0: BBB bulk-in clear stall failed, IOERROR
Feb 29 16:43:40 katrin /kernel: umass0: BBB bulk-out clear stall failed, IOERROR
Feb 29 16:43:40 katrin /kernel: umass0: BBB reset failed, IOERROR
Feb 29 16:43:40 katrin /kernel: umass0: BBB bulk-in clear stall failed, IOERROR
Feb 29 16:43:40 katrin /kernel: umass0: BBB bulk-out clear stall failed, IOERROR
Feb 29 16:43:40 katrin /kernel: umass0: BBB reset failed, IOERROR
Feb 29 16:43:40 katrin /kernel: umass0: BBB bulk-in clear stall failed, IOERROR
Feb 29 16:43:40 katrin /kernel: umass0: BBB bulk-out clear stall failed, IOERROR
Feb 29 16:43:40 katrin /kernel: umass0: BBB reset failed, IOERROR
Feb 29 16:43:40 katrin /kernel: umass0: BBB bulk-in clear stall failed, IOERROR
Feb 29 16:43:40 katrin /kernel: umass0: BBB bulk-out clear stall failed, IOERROR
Feb 29 16:43:40 katrin /kernel: umass0: at uhub2 port 4 (addr 3) disconnected
Feb 29 16:43:40 katrin /kernel: umass0: detached
Feb 29 16:43:42 katrin /kernel: umass0: SMSC 223 USB97C223, rev 2.00/1.95, addr 3

MfG,
Holger Kipp
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: em0, polling performance, P4 2.8ghz FSB 800mhz

2004-03-01 Thread Mike Tancsa
On Sat, 28 Feb 2004 23:17:44 -0500, in sentex.lists.freebsd.hackers 
If you want to spend more time in kernel, perhaps change

I might have HZ @ 2500 as well.

Hi,
Just curious as to the reasoning behind that ?

---Mike
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: SPAM/virii apparently from freeBSD addresses.

2004-03-01 Thread Kris Kennaway
On Sun, Feb 29, 2004 at 04:50:34PM -0800, Julian Elischer wrote:
 
 Somewhere out there there is a ?Virus?/?Hacker?/?Spammer?
 getting really annoying..

Yeah, but what do you expect anyone to do about it?

Kris


pgp0.pgp
Description: PGP signature


Re: SPAM/virii apparently from freeBSD addresses.

2004-03-01 Thread Kris Kennaway
On Sun, Feb 29, 2004 at 04:50:34PM -0800, Julian Elischer wrote:
 
 Somewhere out there there is a ?Virus?/?Hacker?/?Spammer?
 getting really annoying..

Yeah, but what do you expect anyone to do about it?

Kris


pgp0.pgp
Description: PGP signature


Re: SPAM/virii apparently from freeBSD addresses.

2004-03-01 Thread Kai Mosebach
well,

i collected about 2200 iworm.swens from freebsd since december'03 which is 
about 700 per month or 20 per day ...

isnt there a way to track this down ?

its at all not the best reference, freebsd gives besides its known 
advantages ...

best kai

 
 On Sun, 29 Feb 2004, Julian Elischer wrote:
 
  Somewhere out there there is a ?Virus?/?Hacker?/?Spammer?
  getting really annoying..
 
 Yeah, I'm getting it too.  Worst part is, clamav 0.65 doesn't pick it
 up.  I'm waiting for the 0.67 port to be committed...
 
 Mike Silby Silbersack
 ___
 [EMAIL PROTECTED] mailing list
 http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
 To unsubscribe, send any mail to [EMAIL PROTECTED]
 
 



___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to [EMAIL PROTECTED]


RE: em0, polling performance, P4 2.8ghz FSB 800mhz

2004-03-01 Thread Mike Tancsa
At 09:38 PM 29/02/2004, Don Bowman wrote:
From: Mike Tancsa [mailto:[EMAIL PROTECTED]
 At 08:44 PM 29/02/2004, Don Bowman wrote:
 From: Mike Tancsa [mailto:[EMAIL PROTECTED]
  
   On Sat, 28 Feb 2004 23:17:44 -0500, in
 sentex.lists.freebsd.hackers 
   If you want to spend more time in kernel, perhaps change
   
   I might have HZ @ 2500 as well.
I picked 2500 as the best for my system. Its higher than
allowed by rfc1323 and PAWS [kern/61404], but not by so much
that i anticipate a problem.
Do you run the box with the supplied patch ?  On the firewall device I was 
thinking of experimenting with, I do have long TCP sessions that it sounds 
like HZ=2500 would break.


For my target packets per second
rate, it means that i can use a reasonable number of dma
descriptors. I found that bridging performance in particular
needs the higher hz to avoid dropping packets, to improve
its performance.
In terms of fiddling with the em tunables, what are the drawbacks of moving 
from 256 to 512 on

EM_MAX_TXD
EM_MAX_RXD
more buffers == better ability to handle latency
bursts, but worse for cache occupancy.
Buffers as is net.inet.ip.intr_queue_maxlen ?

Thanks,

---Mike 

___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: SPAM/virii apparently from freeBSD addresses.

2004-03-01 Thread Dag-Erling Smørgrav
Kris Kennaway [EMAIL PROTECTED] writes:
 On Sun, Feb 29, 2004 at 04:50:34PM -0800, Julian Elischer wrote:
  Somewhere out there there is a ?Virus?/?Hacker?/?Spammer?
  getting really annoying..
 Yeah, but what do you expect anyone to do about it?

Swen and MyDoom are easy to detect and reject at the SMTP stage.  The
fact that our mail servers don't do this is a PITA, as it forces list
subscribers to accept them as well (if you reject list mail because it
contains a virus, Mailman disables your subscription)

DES
-- 
Dag-Erling Smørgrav - [EMAIL PROTECTED]
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: SPAM/virii apparently from freeBSD addresses.

2004-03-01 Thread Andrew Boothman
Dag-Erling Smørgrav wrote:

Somewhere out there there is a ?Virus?/?Hacker?/?Spammer?
getting really annoying..
Yeah, but what do you expect anyone to do about it?


Swen and MyDoom are easy to detect and reject at the SMTP stage.  The
fact that our mail servers don't do this is a PITA, as it forces list
subscribers to accept them as well (if you reject list mail because it
contains a virus, Mailman disables your subscription).
You shoudn't reject email because it contains Swen or MyDoom anyway, all 
you'll do is generate a bounce message to someone who never sent you the 
infected mail in the first place - becuase the SMTP envelope addresses 
are forged.

I believe the correct thing to do is to accept in and silently drop it.
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: SPAM/virii apparently from freeBSD addresses.

2004-03-01 Thread Craig Boston
On Monday 01 March 2004 10:53 am, Dag-Erling Smørgrav wrote:
 Swen and MyDoom are easy to detect and reject at the SMTP stage.  The
 fact that our mail servers don't do this is a PITA, as it forces list
 subscribers to accept them as well (if you reject list mail because it
 contains a virus, Mailman disables your subscription)

Most of the Swens I get don't come from the list servers but are sent to my 
subscription address directly (probably grabbed from posts to the list).

I have a separate address for each list to make sorting easier.  When I set up 
freebsd-hackers, I was getting Swen sent to me within an hour of posting to 
the list for the first time.  I filter it but it still wastes bandwidth...

Craig
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to [EMAIL PROTECTED]


System Crash(bundirty) on 5.2.1

2004-03-01 Thread Klaus
Hi all.
First, sorry for my bad english =)
Well, on the past(28/03/2003 on FreeBSD 5.1-Release), i'm read about the 
nfs bug, and now, i'm got the same error on my fbsd box, and on history 
of all freebsd lists i've found the same response: no fix for this bug.
On my server the error appears, only before to mount my nfs home and 
mailspool dir into my server, and (the interessing point) when i run any 
ftp server, the server go down, with the error: panic: bundirty: buffer 
0xe28a198f

About the box:
My server is a FreeBSD 5.2.1-RELEASE, running apache+php, mysql4.0, 
openwebmail 2.30, proftpd 1.2.9(tried to use the internal ftp, but 
doesn't solve the problem), mounting two nfs volumes:
/data and /var/mail
/data: openwebmail users directory on other server, not my MTA box
I'm using NIS to auth the users on all systems.

The question: Can functions like, getpw* cause this problem?
running only apache, mysql, openwebmail, the system dont crash, but 
before start any ftp server and anyone make upload of files the system 
stop with the error described above.

Thanks 4 all.

Klaus Porto Schneider
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to [EMAIL PROTECTED]


Recovering from RELENG_5_1 - RELENG_5.2 world/kernel statfs fubar?

2004-03-01 Thread Andrew J Caines
[ nb. There's a question at the bottom. The rest is for context and the
  archives, since I couldn't find this kind of detail there. ]


System running RELENG_5_1 (5.1-p12, IIRC) built RELENG_5_2 and started
installworld before installkernel in flagrant violation of the correct
method and dire warnings of 20031112 in UPDATING.

The installworld borked early on during an mtree process and for reasons I
can't quite determine the output which should have eneded up in a file
didn't. From the datestamps, most or much of /bin and /usr got updated.

Booting the old (5.1) kernel made it almost to single user, but /bin/sh
wouldn't play. With the help of CD 2 from my 5.1 set I put the new kernel
in place and booted it, expecting the worst, however almost everything
runs fine - desktop, tools, apps and even the not-yet-installed linux.ko.


The problems I still have that /usr/bin/make was the old one, so there was
no simple installkernel/world option to fix things.

# /usr/bin/make
Bad system call (core dumped)

I replaced /usr/bin/make with /usr/obj/home/src/usr.bin/make/make and
after being much confused relaced /usr/obj/home/src/make.i386/make too
since this one appears to be used instead of /usr/bin/make - part of the
bootstrap, presumably.

With make appearing to work, a make installkernel KERNCONF=MYKERNEL
bombed on the first install. Unlike make, /usr/bin/install seems to run
ok, despite being the old 5.1 version and doesn't core:

# /usr/bin/install -v
usage: install [-bCcpSsv] [-B suffix] [-f flags] [-g group] [-m mode]
...

After a bit of digging in /usr/obj and /usr/src, it looks like
usr.bin/install has been replaced with usr.bin/xinstall, which gets
installed as /usr/bin/install. Replacing /usr/bin/install with
/usr/obj/home/src/i386/home/src/usr.bin/xinstall/xinstall made no
difference and althugh this new /usr/bin/install seems to run ok, the
installkernel still bombed with a signal 12:

# make installkernel KERNCONF=MYKERNEL
...
mkdir -p /boot/kernel
install -p -m 555 -o root -g wheel kernel /boot/kernel
*** Signal 12

This looks like it's doing the same kind of bootstrap jiggery-pokery, but
I can't find another install after digging deep with find and make
debugging output. Since install is static, it's not a so problem.

Other seemingly broken bits I've found so far include logging through
syslog (which is running), sockstat -4, csh (which I don't use and know is
tcsh and is a contrib, but I can't find any sign of anything resenbing a
csh binary in /usr/obj).


How can I dig myself out of this hole so I can installkernel and
installworld with my shiney new 5.2.1 build?


I'm sure I've glossed over or missed much critial information, so please
let me know whatis relevant and needed. For starteds, here are lists of
all files in /bin, /lib, /usr/bin, /usr/lib and /sbin installed during the
last installworld[1]. and all files not installed during the recent
aborted installworld[2].

I'm AJC_Z0 (09:00 - 18:00 EST) and AJ_Z0 in #freebsd on FreeNode IRC.


[1] http://halplant.com:88/misc/51.files.lastinstallworld
[2] http://halplant.com:88/misc/51.files.ALL


-Andrew-
-- 
 ___
| -Andrew J. Caines-   Unix Systems Engineer   [EMAIL PROTECTED]  |
| They that can give up essential liberty to obtain a little temporary |
|  safety deserve neither liberty nor safety - Benjamin Franklin, 1759 |
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: Recovering from RELENG_5_1 - RELENG_5.2 world/kernel statfs fubar?

2004-03-01 Thread Brooks Davis
On Mon, Mar 01, 2004 at 05:04:29PM -0500, Andrew J Caines wrote:
[Tale of pain and suffering related to statfs change omitted.]

 How can I dig myself out of this hole so I can installkernel and
 installworld with my shiney new 5.2.1 build?

Download fixit CDs or floppy images for 5.2+ or from
snapshots.jp.freebsd.org and install the included kernel on your hard
drive by hand.  It will work with your halfway installed world.  Use
that to install the correct kernel.  Reboot with that kernel and finish
following the instructions in UPDATING.  Alternatly, you could use any
fixit CD that can read your disks to install the new kernel by hand
(i.e. copying files from /usr/obj).

-- Brooks

-- 
Any statement of the form X is the one, true Y is FALSE.
PGP fingerprint 655D 519C 26A7 82E7 2529  9BF0 5D8E 8BE9 F238 1AD4


pgp0.pgp
Description: PGP signature


Looking for static analysis tool to generate call graphs

2004-03-01 Thread Robert Watson

I'd like to generate static call graphs from sections of src/sys/kern,
src/sys/net, and src/sys/netinet, and ideally, get an output that looks
pretty when printed to a (perhaps large) piece of paper.  It doesn't need
to be able to handle function pointer magic in structures (vnode
operations, socket operations, file descriptor operations, sysinits, etc); 
I just want a fairly high-level graph to get a feel for particular chunks
of code spanning a couple of C files.  Anyone have any recommendations? 
Preferably something that can actually parse the variant of C we use in
our kernel :-). 

Thanks,

Robert N M Watson FreeBSD Core Team, TrustedBSD Projects
[EMAIL PROTECTED]  Senior Research Scientist, McAfee Research

___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: Looking for static analysis tool to generate call graphs

2004-03-01 Thread Zajcev Evgeny
Robert Watson [EMAIL PROTECTED] writes:

 I'd like to generate static call graphs from sections of src/sys/kern,
 src/sys/net, and src/sys/netinet, and ideally, get an output that looks
 pretty when printed to a (perhaps large) piece of paper.  It doesn't need
 to be able to handle function pointer magic in structures (vnode
 operations, socket operations, file descriptor operations, sysinits, etc); 
 I just want a fairly high-level graph to get a feel for particular chunks
 of code spanning a couple of C files.  Anyone have any recommendations? 
 Preferably something that can actually parse the variant of C we use in
 our kernel :-). 


I used patch to gcc to output call graph in dot format based on parse
tree generated by gcc year or so ago.  It was pretty nice, but I dont
awared is this patch yet supported or not.  You can find some info
about it at http://luxik.cdi.cz/~devik/mm.htm

 Thanks,

 Robert N M Watson FreeBSD Core Team, TrustedBSD Projects
 [EMAIL PROTECTED]  Senior Research Scientist, McAfee Research

 ___
 [EMAIL PROTECTED] mailing list
 http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
 To unsubscribe, send any mail to [EMAIL PROTECTED]

-- 
lg
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: SPAM/virii apparently from freeBSD addresses.

2004-03-01 Thread soralx

 Swen and MyDoom are easy to detect and reject at the SMTP stage.  The
 fact that our mail servers don't do this is a PITA, as it forces list
 subscribers to accept them as well (if you reject list mail because it
 contains a virus, Mailman disables your subscription)

not a problem - those should be silently discarded and not rejected anyway

Timestamp: 0x40442CF6
[SorAlx]  http://cydem.org.ua/
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to [EMAIL PROTECTED]