Re: rewrite of sysinstall

2000-03-13 Thread Bruce Gingery
p or the memory filesystem root.

So long as the module has a checksum in its file format, partial
fetches could be handled fairly easily, even with a minimal
webserver that doesn't send file sizes in the protocol headers
(in fact non-error headers could be merely tossed in the bitbucket
 and MOVED errors should merely be reported rather than followed).

That would also allow for a far more complete HELP system in the
basic install.   Only an HTTP1.0 plus file:///  would be needed,
so long as all links are relative once that BASE is set, because
multi-file fetches would seldom (if ever) be any enhancement.  It
should send a Host: header, though, for HTTP.  Perhaps a questonmark
on EACH option could offer context-sensitive help.

It would even be logical to register an application/vnd. MIME type
for these modules.   With OpenSSL in the base distribution for 4.x
(${OSVERSION} >= 400014) and up, should the shell try for https://
before http://  ??



**
Color code the modules.  The Royal Blue is pretty, but this can help
with remote voice support, and even E-Mail/Usenet support and FAQ
documentation.



**
Check for screen/terminal size with the GUI.  If post-install
configuration is run (later) in an X-Term that's 80x60 - or even
160x80, why should it still be stuck at about 80x24, if there are
more options to display than fit in that size.


**
If system component addition is done from an X-Term, open another
one as a log view, comparable to the 2nd console in a basic system
install.  (e.g. if DISPLAY is a non-null shell variable).


**
In post-install, allow for the TRADITIONAL distinct kernel hostname
from kernel domainname, whether or not NIS will be used.  I know
that this is a "religious battle"  but there are still some of us on
the other side of that argument from current presumptions.   Sure
each active interface (other than lo0) should  have a FQDN assigned,
ideally, but certainly there are a lot of status displays that
benefit from a shorter hostname.  Sendmail defaults (last I
installed one) still allow for Dj set following $w set to
`hostname` appending .`domainname` internally. 

Many other utils allow for this, as well, including Perl's host
determination.   Very few are able to handle both a FQDN as
`hostname` and a non-null `domainname`.   I know of quite a
bit of UUCP use still going on around the world, and although
UUCP on FreeBSD handles internet addressing ... 


**
In disk partitioning, several preset presumptions could be selected
from, rather than a single default.

/  swap /usr- Personal use  
   with /var/ symlinked to /usr/var/
   
/  swap /var  /usr  - Plain server

/  swap /var  /usr  - Print, Fax or Mail server

/  swap /var  /usr
   and /home  and/or /usr/local
   
/  swap /var  /usr
   and /var/cache or similar for proxy servers
   
/  swap /var  /var/db  /usr for database servers.

   etc.  Even if only half a dozen typical uses were used for
   formulation it could cut down on the "I've run out of room on..."
   posts in the mailing lists and newsgroup.


**
   Would it be easier to just do the rewrite based on Tcl which
   already has regexp's and socket support built in, along with
   UTF-8 for internationalization, sub-interpreter for "safe"
   zones, and the like.  The XF86Setup utility is Tcl/Tk without
   a "normal" Tcl/Tk install, already, for example.  With the Tk
   dynamic loading in the works, it could even make sysinstall 
   evolve into one which is OPTIONALLY an X application when
   used post-install.

Bruce Gingery   <[EMAIL PROTECTED]>





To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Recommended addition to FAQ (Troubleshooting)

2000-02-18 Thread Bruce Gingery
h has been put up on the FBI's NIPC site, and
with much of the same reasoning you display about this RAM test
software.

That "signature checker" which is documented as tested on 3
versions of Solaris, and 2 RedHat distributions, but NOT able to
handle a.out nor COFF binaries, is (perhaps) worse than nothing at
all, because of the false sense of security it might convey.  Of
course, one additional thing against it is that it's a binary-only
distribution that they say _must_be_run_as_root?! (apparently 
it does direct memory access to loaded code in addition to
scanning stored binaries for a recognizable compiled signature?)  

Am I the only one seeing something windowsey about that?  Who gets
to make the recurring profits this time for band-aid solutions to
a spurting artery.

http://www.fbi.gov/nipc/trinoo.htm

So I'll leave it up to you.  There should be info at least in
a FAQ somewhere that indicates that bad RAM is not something
that can be ruled out until tested adequately, and perhaps a 
checklist of symptoms that (virtually) ALWAYS indicate bad RAM,
or at least should make it suspect.

Bruce Gingery   <[EMAIL PROTECTED]>





To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Recommended addition to FAQ (Troubleshooting)

2000-02-18 Thread Bruce Gingery

I recently installed FreeBSD on my daughter's machine, remotely.

She'd been on Windows3 since growing up and moving away from my
NeXT, so "UNIX" wasn't a scary word to her, and she was getting
tired of "Windows95 or better" on anything she was interested in,
and certainly wanted "better" if she was going to change anyways.

Well, just for a quickie, so she could play with it long enough to 
be familiar with it before moving on to FreeBSD, we tried to install
Windows95, first. The install bombed three times, and we thought it
was a scratched CD-ROM.  VMM32 something-or-other failed to be
installed each time, or so the bluescreen said AFTER what was
supposedly a complete (minimal) install.

So, boom, take the 3.2-STABLE diskettes I'd prepared ... boot up
fine ... mfs mount CRASHRe-installed Windows3 (95 had
thoroughly messed the drive) ... got back on line, got 3.4-RELEASE
diskette images and fdimage.exe ... just to be sure, wrote the diskettes
three times each from the .flp files.  Again, good boot UNTIL the
mfs mount.  CRASH...

So, Win3.1 was still installed on the hard drive, this time, downloaded
2.2.8 boot.flp in hopes that the smaller footprint would install (this
is a K6-300 64Mx9-bit system with NO BIOS errors showing, and
fast-boot turned off!).  It did.  Had slight problems getting PPP logged
in (the username required a provider prefix).  Started the install. 
Got to about slice 15 or so of the first distribution and BOOM... Kernel
fault AGAIN!

I can't praise highly enough, two software packages:

http://reality.sgi.com/cbrady_denver/memtest86/

and

http://www.qcc.sk.ca/~charlesc/software/memtester/

The former is a bootable image memory tester, built from some pieces
of LiLo, Linux Kernel, and some good algorithms that sweep flat memory.

The latter is a user-space utility that has different algorithms, and
built for FreeBSD pretty easily (I've submitted my modifications to the
author for a 2.2.8 build -- I don't have any hosts - yet - running 3.x).

BOTH of these quickly identified flakey RAM that a supposedly full BIOS
sweep of RAM totally missed, and that had caused "normal crashes" with 
her old Win3.1 installed.

I'd really like to recommend that memtest86 be placed in tools/ from now
on, including a pre-compiled .flp image.  Anybody who's built a
kern.flp and mfsroot.flp, or a boot.flp, will have NO problem creating
a stand-alone i386 and up, memory tester from the "memtest.bin" file in
the ZIP distribution, or the "precomp.bin" in the source .tar.gz  Both
are .flp images with a custom bootstrap loader.

Similarly, I'd like to recommend that the user-space memtester be
at LEAST added to the ports, although it wouldn't hurt to have it
as a GPL'd part of the base distribution.  For people who reboot rarely,
it probably wouldn't hurt to run that one just before multiuser
startup on every reboot.  With the slight tweak I sent the author,
the creation of a port for this should be trivial - and might not even
be needed with the later FreeBSD versions.

The reason I'm sending this to the DOC list, is that at a bare minimum,
this info needs to be added to the FAQ and/or manual.  To the hackers
list because everybody reads it :) and I'm recommending changes to the
distribution.

Bruce Gingery   <[EMAIL PROTECTED]>







To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message