Re: SPAM/virii apparently from freeBSD addresses.
Hi, Julian Elischer wrote on Sun, Feb 29, 2004 at 08:01:41PM -0800: Oh it was just a rant.. :-( [..] Somewhere out there there is a ?Virus?/?Hacker?/?Spammer? getting really annoying.. Yeah, but what do you expect anyone to do about it? [..] Many people are already using digital signatures. The occurence of massively forged senders in e-mails by spammers and viruses could be seen as motivation to establish a more widespread use of digital signatures. Of course it doesn't help for e-mail that we receive (unless we complain to the sender that one would only accept signed e-mails, which is a bit tough), but at least one could tell anyone, who complains that one has sent a virus, to check for the signature. Just a thought, Daniel P.S.: If your MUA complains about my signature, be sure to import the CA certificates from http://ca.in.tum.de/, just because it's not in the mozilla default root-ca set, it is not a less trustworthy CA. -- IRCnet: Mr-Spock - In dieser Mail ist ein Geist, der Dich in den Hintern beisst - Daniel Lang * [EMAIL PROTECTED] * +49 89 289 18532 * http://www.leo.org/~dl/ smime.p7s Description: S/MIME cryptographic signature
USB 2.0 Hub, patch for BSD stack
I have an ednet. USB 2.0 Hub 4-1 which seems to be identicyl to the Cypress Semiconductor Slim Hub. The latest 4.9-STABLE is still missing the patch --- uhub.c.orig Fri Jul 4 20:17:50 2003 +++ uhub.c Fri Jul 4 21:57:31 2003 @@ -185,7 +185,7 @@ /* Get hub descriptor. */ req.bmRequestType = UT_READ_CLASS_DEVICE; req.bRequest = UR_GET_DESCRIPTOR; - USETW(req.wValue, 0); + USETW2(req.wValue, (dev-address 1 ? UDESC_HUB : 0), 0); USETW(req.wIndex, 0); USETW(req.wLength, USB_HUB_DESCRIPTOR_SIZE); DPRINTFN(1,(usb_init_hub: getting hub descriptor\n)); http://lists.freebsd.org/pipermail/freebsd-hardware/2003-July/000390.html The hub is now working on my system, even though detaching and attaching an 8-in-1 Card Reader (USB 2: hama 46945) several times locks the system (ie reset required). Will this patch be MFCd any time soon or was this part just forgotten, as the other minor patches (usbdevs.h, usbdevs_data.h) made it to 4.9-STABLE? Regards, Holger Kipp ___ [EMAIL PROTECTED] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-hackers To unsubscribe, send any mail to [EMAIL PROTECTED]
USB 2.0 Hub, patch for BSD stack, addendum
Here what happens after detaching and attaching: Feb 29 16:43:26 katrin /kernel: umass0: at uhub2 port 4 (addr 3) disconnected Feb 29 16:43:26 katrin /kernel: (da0:umass-sim0:0:0:0): lost device Feb 29 16:43:26 katrin /kernel: (da0:umass-sim0:0:0:0): removing device entry Feb 29 16:43:26 katrin /kernel: umass0: detached Feb 29 16:43:33 katrin /kernel: umass0: SMSC 223 USB97C223, rev 2.00/1.95, addr 3 Feb 29 16:43:40 katrin /kernel: umass0: BBB reset failed, IOERROR Feb 29 16:43:40 katrin /kernel: umass0: BBB bulk-in clear stall failed, IOERROR Feb 29 16:43:40 katrin /kernel: umass0: BBB bulk-out clear stall failed, IOERROR Feb 29 16:43:40 katrin /kernel: umass0: BBB reset failed, IOERROR Feb 29 16:43:40 katrin /kernel: umass0: BBB bulk-in clear stall failed, IOERROR Feb 29 16:43:40 katrin /kernel: umass0: BBB bulk-out clear stall failed, IOERROR Feb 29 16:43:40 katrin /kernel: umass0: BBB reset failed, IOERROR Feb 29 16:43:40 katrin /kernel: umass0: BBB bulk-in clear stall failed, IOERROR Feb 29 16:43:40 katrin /kernel: umass0: BBB bulk-out clear stall failed, IOERROR Feb 29 16:43:40 katrin /kernel: umass0: BBB reset failed, IOERROR Feb 29 16:43:40 katrin /kernel: umass0: BBB bulk-in clear stall failed, IOERROR Feb 29 16:43:40 katrin /kernel: umass0: BBB bulk-out clear stall failed, IOERROR Feb 29 16:43:40 katrin /kernel: umass0: BBB reset failed, IOERROR Feb 29 16:43:40 katrin /kernel: umass0: BBB bulk-in clear stall failed, IOERROR Feb 29 16:43:40 katrin /kernel: umass0: BBB bulk-out clear stall failed, IOERROR Feb 29 16:43:40 katrin /kernel: umass0: at uhub2 port 4 (addr 3) disconnected Feb 29 16:43:40 katrin /kernel: umass0: detached Feb 29 16:43:42 katrin /kernel: umass0: SMSC 223 USB97C223, rev 2.00/1.95, addr 3 MfG, Holger Kipp ___ [EMAIL PROTECTED] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-hackers To unsubscribe, send any mail to [EMAIL PROTECTED]
Re: em0, polling performance, P4 2.8ghz FSB 800mhz
On Sat, 28 Feb 2004 23:17:44 -0500, in sentex.lists.freebsd.hackers If you want to spend more time in kernel, perhaps change I might have HZ @ 2500 as well. Hi, Just curious as to the reasoning behind that ? ---Mike ___ [EMAIL PROTECTED] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-hackers To unsubscribe, send any mail to [EMAIL PROTECTED]
Re: SPAM/virii apparently from freeBSD addresses.
On Sun, Feb 29, 2004 at 04:50:34PM -0800, Julian Elischer wrote: Somewhere out there there is a ?Virus?/?Hacker?/?Spammer? getting really annoying.. Yeah, but what do you expect anyone to do about it? Kris pgp0.pgp Description: PGP signature
Re: SPAM/virii apparently from freeBSD addresses.
On Sun, Feb 29, 2004 at 04:50:34PM -0800, Julian Elischer wrote: Somewhere out there there is a ?Virus?/?Hacker?/?Spammer? getting really annoying.. Yeah, but what do you expect anyone to do about it? Kris pgp0.pgp Description: PGP signature
Re: SPAM/virii apparently from freeBSD addresses.
well, i collected about 2200 iworm.swens from freebsd since december'03 which is about 700 per month or 20 per day ... isnt there a way to track this down ? its at all not the best reference, freebsd gives besides its known advantages ... best kai On Sun, 29 Feb 2004, Julian Elischer wrote: Somewhere out there there is a ?Virus?/?Hacker?/?Spammer? getting really annoying.. Yeah, I'm getting it too. Worst part is, clamav 0.65 doesn't pick it up. I'm waiting for the 0.67 port to be committed... Mike Silby Silbersack ___ [EMAIL PROTECTED] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-hackers To unsubscribe, send any mail to [EMAIL PROTECTED] ___ [EMAIL PROTECTED] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-hackers To unsubscribe, send any mail to [EMAIL PROTECTED]
RE: em0, polling performance, P4 2.8ghz FSB 800mhz
At 09:38 PM 29/02/2004, Don Bowman wrote: From: Mike Tancsa [mailto:[EMAIL PROTECTED] At 08:44 PM 29/02/2004, Don Bowman wrote: From: Mike Tancsa [mailto:[EMAIL PROTECTED] On Sat, 28 Feb 2004 23:17:44 -0500, in sentex.lists.freebsd.hackers If you want to spend more time in kernel, perhaps change I might have HZ @ 2500 as well. I picked 2500 as the best for my system. Its higher than allowed by rfc1323 and PAWS [kern/61404], but not by so much that i anticipate a problem. Do you run the box with the supplied patch ? On the firewall device I was thinking of experimenting with, I do have long TCP sessions that it sounds like HZ=2500 would break. For my target packets per second rate, it means that i can use a reasonable number of dma descriptors. I found that bridging performance in particular needs the higher hz to avoid dropping packets, to improve its performance. In terms of fiddling with the em tunables, what are the drawbacks of moving from 256 to 512 on EM_MAX_TXD EM_MAX_RXD more buffers == better ability to handle latency bursts, but worse for cache occupancy. Buffers as is net.inet.ip.intr_queue_maxlen ? Thanks, ---Mike ___ [EMAIL PROTECTED] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-hackers To unsubscribe, send any mail to [EMAIL PROTECTED]
Re: SPAM/virii apparently from freeBSD addresses.
Kris Kennaway [EMAIL PROTECTED] writes: On Sun, Feb 29, 2004 at 04:50:34PM -0800, Julian Elischer wrote: Somewhere out there there is a ?Virus?/?Hacker?/?Spammer? getting really annoying.. Yeah, but what do you expect anyone to do about it? Swen and MyDoom are easy to detect and reject at the SMTP stage. The fact that our mail servers don't do this is a PITA, as it forces list subscribers to accept them as well (if you reject list mail because it contains a virus, Mailman disables your subscription) DES -- Dag-Erling Smørgrav - [EMAIL PROTECTED] ___ [EMAIL PROTECTED] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-hackers To unsubscribe, send any mail to [EMAIL PROTECTED]
Re: SPAM/virii apparently from freeBSD addresses.
Dag-Erling Smørgrav wrote: Somewhere out there there is a ?Virus?/?Hacker?/?Spammer? getting really annoying.. Yeah, but what do you expect anyone to do about it? Swen and MyDoom are easy to detect and reject at the SMTP stage. The fact that our mail servers don't do this is a PITA, as it forces list subscribers to accept them as well (if you reject list mail because it contains a virus, Mailman disables your subscription). You shoudn't reject email because it contains Swen or MyDoom anyway, all you'll do is generate a bounce message to someone who never sent you the infected mail in the first place - becuase the SMTP envelope addresses are forged. I believe the correct thing to do is to accept in and silently drop it. ___ [EMAIL PROTECTED] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-hackers To unsubscribe, send any mail to [EMAIL PROTECTED]
Re: SPAM/virii apparently from freeBSD addresses.
On Monday 01 March 2004 10:53 am, Dag-Erling Smørgrav wrote: Swen and MyDoom are easy to detect and reject at the SMTP stage. The fact that our mail servers don't do this is a PITA, as it forces list subscribers to accept them as well (if you reject list mail because it contains a virus, Mailman disables your subscription) Most of the Swens I get don't come from the list servers but are sent to my subscription address directly (probably grabbed from posts to the list). I have a separate address for each list to make sorting easier. When I set up freebsd-hackers, I was getting Swen sent to me within an hour of posting to the list for the first time. I filter it but it still wastes bandwidth... Craig ___ [EMAIL PROTECTED] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-hackers To unsubscribe, send any mail to [EMAIL PROTECTED]
System Crash(bundirty) on 5.2.1
Hi all. First, sorry for my bad english =) Well, on the past(28/03/2003 on FreeBSD 5.1-Release), i'm read about the nfs bug, and now, i'm got the same error on my fbsd box, and on history of all freebsd lists i've found the same response: no fix for this bug. On my server the error appears, only before to mount my nfs home and mailspool dir into my server, and (the interessing point) when i run any ftp server, the server go down, with the error: panic: bundirty: buffer 0xe28a198f About the box: My server is a FreeBSD 5.2.1-RELEASE, running apache+php, mysql4.0, openwebmail 2.30, proftpd 1.2.9(tried to use the internal ftp, but doesn't solve the problem), mounting two nfs volumes: /data and /var/mail /data: openwebmail users directory on other server, not my MTA box I'm using NIS to auth the users on all systems. The question: Can functions like, getpw* cause this problem? running only apache, mysql, openwebmail, the system dont crash, but before start any ftp server and anyone make upload of files the system stop with the error described above. Thanks 4 all. Klaus Porto Schneider ___ [EMAIL PROTECTED] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-hackers To unsubscribe, send any mail to [EMAIL PROTECTED]
Recovering from RELENG_5_1 - RELENG_5.2 world/kernel statfs fubar?
[ nb. There's a question at the bottom. The rest is for context and the archives, since I couldn't find this kind of detail there. ] System running RELENG_5_1 (5.1-p12, IIRC) built RELENG_5_2 and started installworld before installkernel in flagrant violation of the correct method and dire warnings of 20031112 in UPDATING. The installworld borked early on during an mtree process and for reasons I can't quite determine the output which should have eneded up in a file didn't. From the datestamps, most or much of /bin and /usr got updated. Booting the old (5.1) kernel made it almost to single user, but /bin/sh wouldn't play. With the help of CD 2 from my 5.1 set I put the new kernel in place and booted it, expecting the worst, however almost everything runs fine - desktop, tools, apps and even the not-yet-installed linux.ko. The problems I still have that /usr/bin/make was the old one, so there was no simple installkernel/world option to fix things. # /usr/bin/make Bad system call (core dumped) I replaced /usr/bin/make with /usr/obj/home/src/usr.bin/make/make and after being much confused relaced /usr/obj/home/src/make.i386/make too since this one appears to be used instead of /usr/bin/make - part of the bootstrap, presumably. With make appearing to work, a make installkernel KERNCONF=MYKERNEL bombed on the first install. Unlike make, /usr/bin/install seems to run ok, despite being the old 5.1 version and doesn't core: # /usr/bin/install -v usage: install [-bCcpSsv] [-B suffix] [-f flags] [-g group] [-m mode] ... After a bit of digging in /usr/obj and /usr/src, it looks like usr.bin/install has been replaced with usr.bin/xinstall, which gets installed as /usr/bin/install. Replacing /usr/bin/install with /usr/obj/home/src/i386/home/src/usr.bin/xinstall/xinstall made no difference and althugh this new /usr/bin/install seems to run ok, the installkernel still bombed with a signal 12: # make installkernel KERNCONF=MYKERNEL ... mkdir -p /boot/kernel install -p -m 555 -o root -g wheel kernel /boot/kernel *** Signal 12 This looks like it's doing the same kind of bootstrap jiggery-pokery, but I can't find another install after digging deep with find and make debugging output. Since install is static, it's not a so problem. Other seemingly broken bits I've found so far include logging through syslog (which is running), sockstat -4, csh (which I don't use and know is tcsh and is a contrib, but I can't find any sign of anything resenbing a csh binary in /usr/obj). How can I dig myself out of this hole so I can installkernel and installworld with my shiney new 5.2.1 build? I'm sure I've glossed over or missed much critial information, so please let me know whatis relevant and needed. For starteds, here are lists of all files in /bin, /lib, /usr/bin, /usr/lib and /sbin installed during the last installworld[1]. and all files not installed during the recent aborted installworld[2]. I'm AJC_Z0 (09:00 - 18:00 EST) and AJ_Z0 in #freebsd on FreeNode IRC. [1] http://halplant.com:88/misc/51.files.lastinstallworld [2] http://halplant.com:88/misc/51.files.ALL -Andrew- -- ___ | -Andrew J. Caines- Unix Systems Engineer [EMAIL PROTECTED] | | They that can give up essential liberty to obtain a little temporary | | safety deserve neither liberty nor safety - Benjamin Franklin, 1759 | ___ [EMAIL PROTECTED] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-hackers To unsubscribe, send any mail to [EMAIL PROTECTED]
Re: Recovering from RELENG_5_1 - RELENG_5.2 world/kernel statfs fubar?
On Mon, Mar 01, 2004 at 05:04:29PM -0500, Andrew J Caines wrote: [Tale of pain and suffering related to statfs change omitted.] How can I dig myself out of this hole so I can installkernel and installworld with my shiney new 5.2.1 build? Download fixit CDs or floppy images for 5.2+ or from snapshots.jp.freebsd.org and install the included kernel on your hard drive by hand. It will work with your halfway installed world. Use that to install the correct kernel. Reboot with that kernel and finish following the instructions in UPDATING. Alternatly, you could use any fixit CD that can read your disks to install the new kernel by hand (i.e. copying files from /usr/obj). -- Brooks -- Any statement of the form X is the one, true Y is FALSE. PGP fingerprint 655D 519C 26A7 82E7 2529 9BF0 5D8E 8BE9 F238 1AD4 pgp0.pgp Description: PGP signature
Looking for static analysis tool to generate call graphs
I'd like to generate static call graphs from sections of src/sys/kern, src/sys/net, and src/sys/netinet, and ideally, get an output that looks pretty when printed to a (perhaps large) piece of paper. It doesn't need to be able to handle function pointer magic in structures (vnode operations, socket operations, file descriptor operations, sysinits, etc); I just want a fairly high-level graph to get a feel for particular chunks of code spanning a couple of C files. Anyone have any recommendations? Preferably something that can actually parse the variant of C we use in our kernel :-). Thanks, Robert N M Watson FreeBSD Core Team, TrustedBSD Projects [EMAIL PROTECTED] Senior Research Scientist, McAfee Research ___ [EMAIL PROTECTED] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-hackers To unsubscribe, send any mail to [EMAIL PROTECTED]
Re: Looking for static analysis tool to generate call graphs
Robert Watson [EMAIL PROTECTED] writes: I'd like to generate static call graphs from sections of src/sys/kern, src/sys/net, and src/sys/netinet, and ideally, get an output that looks pretty when printed to a (perhaps large) piece of paper. It doesn't need to be able to handle function pointer magic in structures (vnode operations, socket operations, file descriptor operations, sysinits, etc); I just want a fairly high-level graph to get a feel for particular chunks of code spanning a couple of C files. Anyone have any recommendations? Preferably something that can actually parse the variant of C we use in our kernel :-). I used patch to gcc to output call graph in dot format based on parse tree generated by gcc year or so ago. It was pretty nice, but I dont awared is this patch yet supported or not. You can find some info about it at http://luxik.cdi.cz/~devik/mm.htm Thanks, Robert N M Watson FreeBSD Core Team, TrustedBSD Projects [EMAIL PROTECTED] Senior Research Scientist, McAfee Research ___ [EMAIL PROTECTED] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-hackers To unsubscribe, send any mail to [EMAIL PROTECTED] -- lg ___ [EMAIL PROTECTED] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-hackers To unsubscribe, send any mail to [EMAIL PROTECTED]
Re: SPAM/virii apparently from freeBSD addresses.
Swen and MyDoom are easy to detect and reject at the SMTP stage. The fact that our mail servers don't do this is a PITA, as it forces list subscribers to accept them as well (if you reject list mail because it contains a virus, Mailman disables your subscription) not a problem - those should be silently discarded and not rejected anyway Timestamp: 0x40442CF6 [SorAlx] http://cydem.org.ua/ ___ [EMAIL PROTECTED] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-hackers To unsubscribe, send any mail to [EMAIL PROTECTED]