Re: Reducing dhclient's syslog messages

2012-07-11 Thread Otto Moerbeek
On Wed, Jul 11, 2012 at 05:04:04AM +, dukzcry wrote:

 Julian Smith jules at op59.net writes:
 
  ... my /var/log/daemon is getting filled with
  messages from the dhclient programme, looking like:
  
  Jun  1 00:09:36 server-35 dhclient: DHCPREQUEST 
  on xl1 to xx.xx.xx.xx port 67
  Jun  1 00:09:36 server-35 dhclient: DHCPACK from xx.xx.xx.xx
  Jun  1 00:09:36 server-35 dhclient: bound to 8xx.xx.xx.xx --
  renewal in 30 seconds.
 
  Is there any way of turning these messages off? ...
 
 I know, this is very old question, but still actual. 
 I've patched dhclient to match dhcpd's logging behavior. Use 
 'dhclient -dq dc0 ' to run it in complete silent mode (no 
 stderr/syslog logging). Wrap in '!(' ... ')' for calling from
 interface script. Don't forget to look at updated manpage: old
 '-d' flag moved into '-f'.
 
 Here you go:
 https://raw.github.com/druga/aeriebsd-tree/master/sbin/dhclient/patch-dhclient
 .

Why? Nothing a littke syslog.conf tweaking can't fix.

-Otto



Re: Reducing dhclient's syslog messages

2012-07-11 Thread dukzcry

On 7/11/12 10:00 AM, Otto Moerbeek wrote:

Why? Nothing a littke syslog.conf tweaking can't fix.

-Otto


Agreed, but here's more:
1) User may run few dhclient instances (for different interfaces, 
needless to say),
and wish to log some, while don't log other (too verbositive ones, which 
get low

lease time, for example);
2) Logging to stderr, for debugging purposes.
In final, i think it 'll not harm matching dhcpd's -f/-d flags.

P.S.: Forgive me for noising about this.



Promos para el dia del amigo!!!

2012-07-11 Thread Bonus Cupon Especial!
Si no podes visualizar este mail, ingresa a:
http://news1.bonuscupon.com.ar/r.html?uid=1.1x.29hh.xk.4y053d6a9r



Re: dwm in base

2012-07-11 Thread Joerg Zinke
On Tue, Jul 10, 2012 at 08:26:28PM -0400, Sean Howard wrote:
 Almost everyone compiles dwm on their own, binaries are almost useless. At
 least amongst the users I've known.

  On Tue Jul 10 2012 20:52, z...@sdf.org wrote:
  And, last but not least, its configuration is modified by editing its
  config.h by hand. So, everyone seriously using it compiles it from
  source, anyway.

I think you are both wrong. Several people are fine with the more or less sane
upstream defaults and do not tweak them.

I seriously use dwm from OpenBSD packages since a long time and I know furthers
doing the same (with other OS packages) as well.

Regards,
Joerg



Re: dwm in base

2012-07-11 Thread Matthieu Herrb
On Tue, Jul 10, 2012 at 08:52:14PM +, z...@sdf.org wrote:
 Hello, 
 
 there are a lot of nice window managers in OpenBSD base (fvwm, cwm, ...). 
 
 I am a big fan of dwm and I think it shares the philosophy of minimalism 
 which is important to a lot of BSD lovers. Also, it has a good code 
 quality and is rock solid...
 
 Is there a reason why dwm isnt in OpenBSD base installation?

Because  there are already enough/too many window managers in base.
Use the packages if you prefer to use another window manager.


-- 
Matthieu Herrb



Re: dwm in base

2012-07-11 Thread zz
On Wed, Jul 11, 2012 at 10:38:39AM +0200, Matthieu Herrb wrote:
 On Tue, Jul 10, 2012 at 08:52:14PM +, z...@sdf.org wrote:
  Hello, 
  
  there are a lot of nice window managers in OpenBSD base (fvwm, cwm, ...). 
  
  I am a big fan of dwm and I think it shares the philosophy of minimalism 
  which is important to a lot of BSD lovers. Also, it has a good code 
  quality and is rock solid...
  
  Is there a reason why dwm isnt in OpenBSD base installation?
 
 Because  there are already enough/too many window managers in base.
 Use the packages if you prefer to use another window manager.
 
 
 -- 
 Matthieu Herrb
 

I was surprised how many window managers are in base installation. 
So, I just was interested why dwm isnt. However, I understand 
that most people edit the config.h and compile dwm on there own 
and so do I. But it would be convenient to use dwm to compile my own 
dwm. 

Well, I can fork OpenBSD and make things properly :D. 

Jokes beside: dwm in base doesnt make much sense. 

Cheers 

-- 
z...@sdf.org



Re: does re-injection even work?

2012-07-11 Thread Peter J. Philipp
On Tue, Jul 10, 2012 at 09:34:04PM +0200, Peter J. Philipp wrote:

 # pfctl -srules
 pass all flags S/SA
 block drop in on ! lo0 proto tcp from any to any port 6000:6010
 block drop in on re0 inet from fuckoff to any
 pass in on re0 inet proto udp from any to any port = 53 scrub (reassemble 
 tcp) divert-packet port 

I have taken the code from divert(4) manpage and applied it to the above
divert-packet rule.  Here is what I see:

# ./testd   
192.168.4.1:41863 - 192.168.4.2:53
192.168.4.2:53 - 192.168.4.1:41863

But the packets never make it out to host 192.168.4.1 at all, they get dropped
somewhere.  netstat -s says there is no error on the divert: section.

 Any small hint would be appreciated,

-peter



Re: does re-injection even work?

2012-07-11 Thread Stuart Henderson
On 2012-07-10, Matthew Dempsky matt...@dempsky.org wrote:
 On Tue, Jul 10, 2012 at 12:34 PM, Peter J. Philipp p...@centroid.eu wrote:
 I did this rather fast hoping to get it in for someone I know who is being
 used for a DNS amplifier attack but the final tests broke the hope of
 stopping it with this.

 Tangential, but setting max-udp-size 512 in BIND will limit how
 attractive your DNS server is for DNS amplification attacks.

Also tangential but a lot of the current round of DNS amplification
attacks seem to be targetting insecure CPE routers rather than intentional
DNS servers.



openbsd running on asus eeepc 1000H?

2012-07-11 Thread giovanni
hi misc,

anybody out there w/ an asus eepc 1000H model running openbsd? 
I've found this netbook in a recycle hw store and I would be interested 
in using it for some needs. 

thanks

-- 
see ya,
giovanni



Re: does re-injection even work?

2012-07-11 Thread Otto Moerbeek
On Wed, Jul 11, 2012 at 11:52:41AM +0200, Peter J. Philipp wrote:

 On Tue, Jul 10, 2012 at 09:34:04PM +0200, Peter J. Philipp wrote:
 
  # pfctl -srules
  pass all flags S/SA
  block drop in on ! lo0 proto tcp from any to any port 6000:6010
  block drop in on re0 inet from fuckoff to any
  pass in on re0 inet proto udp from any to any port = 53 scrub (reassemble 
  tcp) divert-packet port 
 
 I have taken the code from divert(4) manpage and applied it to the above
 divert-packet rule.  Here is what I see:
 
 # ./testd   
 192.168.4.1:41863 - 192.168.4.2:53
 192.168.4.2:53 - 192.168.4.1:41863
 
 But the packets never make it out to host 192.168.4.1 at all, they get dropped
 somewhere.  netstat -s says there is no error on the divert: section.
 
  Any small hint would be appreciated,
 
 -peter

Obvious thing to check: return value from sendto(2).

-Otto



Re: does re-injection even work?

2012-07-11 Thread Otto Moerbeek
On Wed, Jul 11, 2012 at 12:32:09PM +0200, Otto Moerbeek wrote:

 On Wed, Jul 11, 2012 at 11:52:41AM +0200, Peter J. Philipp wrote:
 
  On Tue, Jul 10, 2012 at 09:34:04PM +0200, Peter J. Philipp wrote:
  
   # pfctl -srules
   pass all flags S/SA
   block drop in on ! lo0 proto tcp from any to any port 6000:6010
   block drop in on re0 inet from fuckoff to any
   pass in on re0 inet proto udp from any to any port = 53 scrub (reassemble 
   tcp) divert-packet port 
  
  I have taken the code from divert(4) manpage and applied it to the above
  divert-packet rule.  Here is what I see:
  
  # ./testd   
  192.168.4.1:41863 - 192.168.4.2:53
  192.168.4.2:53 - 192.168.4.1:41863
  
  But the packets never make it out to host 192.168.4.1 at all, they get 
  dropped
  somewhere.  netstat -s says there is no error on the divert: section.
  
   Any small hint would be appreciated,
  
  -peter
 
 Obvious thing to check: return value from sendto(2).
 
   -Otto

Also, first make sure that without diverting, packets make it through.
You could be looking at a simple routing problem, for example. 
A couple of time, I managed to forget net.inet.ip.forwarding=1 while
testing routing stuff.

-Otto



Re: openbsd running on asus eeepc 1000H?

2012-07-11 Thread Kenneth R Westerback
On Wed, Jul 11, 2012 at 12:25:24PM +0200, giovanni wrote:
 hi misc,
 
 anybody out there w/ an asus eepc 1000H model running openbsd? 
 I've found this netbook in a recycle hw store and I would be interested 
 in using it for some needs. 
 
 thanks
 
 -- 
 see ya,
 giovanni
 

I had OpenBSD running on a 1000HE if I recall.

 Ken



overload rule for outgoing floods

2012-07-11 Thread Boutros Halingrad
Hello all,

I know this is really stupid, but I'm trying to mitigate the effects of one
hacked server on our (very large) network that is being used to DoS other
computers on the Internet.

I do not have access to the server and I cannot take it down (due to
different reasons), so instead I'm trying to prevent it from attacking
other servers using pf.

First it was UDP-flooding some hosts, so I simply blocked it from doing
that to anything outside our network with:

block out quick on vlan100 proto udp from $HackedServer to ! ournetwork

Now it's SYN-flooding other servers on port 80, however I cannot simply
block outgoing TCP/80, as that will disrupt the service on the machine.

So I'm trying something like this:

# targets being attacked
table floodtargets persist

# block rule
block out quick log on vlan100 from $HackedServer to floodtargets
# overload rule
pass out quick log on vlan100 inet proto tcp from $HackedServer to any keep
state (max-src-conn 100, max-src-conn-rate 15/5, overload floodtargets
flush global)

Problem is, the only address that get added to the floodtargets table is
that of the sending server.

Any ideas on how to get the attack victims added to the table?

Thanks,
Boutros



Re: overload rule for outgoing floods

2012-07-11 Thread Mihai Popescu
 Any ideas on how to get the attack victims added to the table?

 Thanks,
  Boutros

Hire a consultant specialised in OpenBSD firewall, before the damaged
part will sue you.



Re: dwm in base

2012-07-11 Thread Jim Razmus
* z...@sdf.org z...@sdf.org [120711 04:34]:
 On Wed, Jul 11, 2012 at 10:38:39AM +0200, Matthieu Herrb wrote:
  On Tue, Jul 10, 2012 at 08:52:14PM +, z...@sdf.org wrote:
   Hello, 
   
   there are a lot of nice window managers in OpenBSD base (fvwm, cwm, ...). 
   
   I am a big fan of dwm and I think it shares the philosophy of minimalism 
   which is important to a lot of BSD lovers. Also, it has a good code 
   quality and is rock solid...
   
   Is there a reason why dwm isnt in OpenBSD base installation?
  
  Because  there are already enough/too many window managers in base.
  Use the packages if you prefer to use another window manager.
  
  
  -- 
  Matthieu Herrb
  
 
 I was surprised how many window managers are in base installation. 
 So, I just was interested why dwm isnt. However, I understand 
 that most people edit the config.h and compile dwm on there own 
 and so do I. But it would be convenient to use dwm to compile my own 
 dwm. 
 
 Well, I can fork OpenBSD and make things properly :D. 
 
 Jokes beside: dwm in base doesnt make much sense. 
 
 Cheers 
 
 -- 
 z...@sdf.org
 

You can also duplicate the dwm port into the mystuff directory, modify
the patches to your liking, and maintain your own port of dwm.

man bsd.port.mk and search for mystuff

jim@



Re: overload rule for outgoing floods

2012-07-11 Thread Matthew Dempsky
On Wed, Jul 11, 2012 at 4:44 AM, Boutros Halingrad
boutros.haling...@gmail.com wrote:
 Problem is, the only address that get added to the floodtargets table is
 that of the sending server.

Right, sys/net/pf.c is hardcoded to use only the source address for
the overload table.  (Search for overload_tbl to see the relevant
code.)

 Any ideas on how to get the attack victims added to the table?

I think you'll need to patch pf to support this.



Doubt with IPSEC

2012-07-11 Thread Rodrigo Mosconi
Hi,

I`m having a problem to establish a IPSEC transport between two
openbsd hosts (one with 5.1 and the other with 4.9).  They are
configured to use the transport mode (confs bellow).
When I run isakmpd -K ; ipsecctl -f /etc/ipsec.conf on both hosts,
no SA are created.  What did I miss?

Thanks,

Mosconi

OBSD51 (hubble):
PF:
# pfctl -sr
pass all flags S/SA
block drop in on ! lo0 proto tcp from any to any port 6000:6010

# ping -c 5 spitzer
PING spitzer.domain (IP_SPITZER): 56 data bytes
64 bytes from IP_SPITZER: icmp_seq=0 ttl=244 time=69.193 ms
64 bytes from IP_SPITZER: icmp_seq=1 ttl=244 time=70.835 ms
64 bytes from IP_SPITZER: icmp_seq=2 ttl=244 time=70.223 ms
64 bytes from IP_SPITZER: icmp_seq=3 ttl=244 time=70.740 ms
64 bytes from IP_SPITZER: icmp_seq=4 ttl=244 time=69.469 ms
--- spitzer.domain ping statistics ---
5 packets transmitted, 5 packets received, 0.0% packet loss
round-trip min/avg/max/std-dev = 69.193/70.092/70.835/0.661 ms

# cat /etc/ipsec.conf
#   $OpenBSD: ipsec.conf,v 1.5 2006/09/14 15:10:43 hshoexer Exp $
#
# See ipsec.conf(5) for syntax and examples.

# Set up two tunnels using automatic keying with isakmpd(8):
#
# First between the networks 10.1.1.0/24 and 10.1.2.0/24,
# second between the machines 192.168.3.1 and 192.168.3.2.
# Use FQDNs as IDs.

ike esp transport from hubble to spitzer \
main \
auth hmac-sha2-512 \
enc aes-256 \
group modp4096 \
srcid hubble.domain \
dstid spitzer.domain \
psk '/+V1gt9G6FTQ_}/Rn#nny!ZCgmd5+jIe^dKXf+)40R6%ZS(zD8Q2DUt[T(NwJOy'

# ipsecctl -vvf /etc/ipsec.conf
@0 C set [Phase 1]:IP_SPITZER=peer-IP_SPITZER force
C set [peer-IP_SPITZER]:Phase=1 force
C set [peer-IP_SPITZER]:Address=IP_SPITZER force
C set 
[peer-IP_SPITZER]:Authentication=/+V1gt9G6FTQ_}/Rn#nny!ZCgmd5+jIe^dKXf+)40R6%ZS(zD8Q2DUt[T(NwJOy
force
C set [peer-IP_SPITZER]:Configuration=phase1-peer-IP_SPITZER force
C set [phase1-peer-IP_SPITZER]:EXCHANGE_TYPE=ID_PROT force
C add [phase1-peer-IP_SPITZER]:Transforms=AES-256-SHA2-512-GRP16 force
C set [peer-IP_SPITZER]:ID=id-hubble.domain force
C set [id-hubble.domain]:ID-type=FQDN force
C set [id-hubble.domain]:Name=hubble.domain force
C set [peer-IP_SPITZER]:Remote-ID=id-spitzer.domain force
C set [id-spitzer.domain]:ID-type=FQDN force
C set [id-spitzer.domain]:Name=spitzer.domain force
C set [from-IP_HUBBLE-to-IP_SPITZER]:Phase=2 force
C set [from-IP_HUBBLE-to-IP_SPITZER]:ISAKMP-peer=peer-IP_SPITZER force
C set 
[from-IP_HUBBLE-to-IP_SPITZER]:Configuration=phase2-from-IP_HUBBLE-to-IP_SPITZER
force
C set [from-IP_HUBBLE-to-IP_SPITZER]:Local-ID=from-IP_HUBBLE force
C set [from-IP_HUBBLE-to-IP_SPITZER]:Remote-ID=to-IP_SPITZER force
C set [phase2-from-IP_HUBBLE-to-IP_SPITZER]:EXCHANGE_TYPE=QUICK_MODE force
C set 
[phase2-from-IP_HUBBLE-to-IP_SPITZER]:Suites=QM-ESP-TRP-AES-SHA2-256-PFS-SUITE
force
C set [from-IP_HUBBLE]:ID-type=IPV4_ADDR force
C set [from-IP_HUBBLE]:Address=IP_HUBBLE force
C set [to-IP_SPITZER]:ID-type=IPV4_ADDR force
C set [to-IP_SPITZER]:Address=IP_SPITZER force
C add [Phase 2]:Connections=from-IP_HUBBLE-to-IP_SPITZER
@1 C set [Phase 1]:IP6_SPITZER=peer-IP6_SPITZER force
C set [peer-IP6_SPITZER]:Phase=1 force
C set [peer-IP6_SPITZER]:Address=IP6_SPITZER force
C set 
[peer-IP6_SPITZER]:Authentication=/+V1gt9G6FTQ_}/Rn#nny!ZCgmd5+jIe^dKXf+)40R6%ZS(zD8Q2DUt[T(NwJOy
force
C set [peer-IP6_SPITZER]:Configuration=phase1-peer-IP6_SPITZER force
C set [phase1-peer-IP6_SPITZER]:EXCHANGE_TYPE=ID_PROT force
C add [phase1-peer-IP6_SPITZER]:Transforms=AES-256-SHA2-512-GRP16 force
C set [peer-IP6_SPITZER]:ID=id-hubble.domain force
C set [id-hubble.domain]:ID-type=FQDN force
C set [id-hubble.domain]:Name=hubble.domain force
C set [peer-IP6_SPITZER]:Remote-ID=id-spitzer.domain force
C set [id-spitzer.domain]:ID-type=FQDN force
C set [id-spitzer.domain]:Name=spitzer.domain force
C set [from-IP6_HUBBLE-to-IP6_SPITZER]:Phase=2 force
C set [from-IP6_HUBBLE-to-IP6_SPITZER]:ISAKMP-peer=peer-IP6_SPITZER force
C set 
[from-IP6_HUBBLE-to-IP6_SPITZER]:Configuration=phase2-from-IP6_HUBBLE-to-IP6_SPITZER
force
C set [from-IP6_HUBBLE-to-IP6_SPITZER]:Local-ID=from-IP6_HUBBLE force
C set [from-IP6_HUBBLE-to-IP6_SPITZER]:Remote-ID=to-IP6_SPITZER force
C set [phase2-from-IP6_HUBBLE-to-IP6_SPITZER]:EXCHANGE_TYPE=QUICK_MODE force
C set 
[phase2-from-IP6_HUBBLE-to-IP6_SPITZER]:Suites=QM-ESP-TRP-AES-SHA2-256-PFS-SUITE
force
C set [from-IP6_HUBBLE]:ID-type=IPV6_ADDR force
C set [from-IP6_HUBBLE]:Address=IP6_HUBBLE force
C set [to-IP6_SPITZER]:ID-type=IPV6_ADDR force
C set [to-IP6_SPITZER]:Address=IP6_SPITZER force
C add [Phase 2]:Connections=from-IP6_HUBBLE-to-IP6_SPITZER

# cat /var/run/dmesg.boot
OpenBSD 5.1 (GENERIC) #160: Sun Feb 12 09:46:33 MST 2012
dera...@i386.openbsd.org:/usr/src/sys/arch/i386/compile/GENERIC
cpu0: QEMU Virtual CPU version 1.0 (GenuineIntel 686-class) 2.54 GHz
cpu0: 

Re: Doubt with IPSEC

2012-07-11 Thread Paulm
I would suggest passing the -vL option to iskampd.  -v enables verbose
logging which will report errors when trying to setup the SA.

The -L option will create pcap file in /var/run which contains the
packets exchanged to set up the SA.  If you look at this pcap file w/
the verbose (-vv) option to tcpdump, you will see extensive info SA
negotiations.



On Wed, Jul 11, 2012 at 02:23:13PM -0300, Rodrigo Mosconi wrote:
 Hi,
 
 I`m having a problem to establish a IPSEC transport between two
 openbsd hosts (one with 5.1 and the other with 4.9).  They are
 configured to use the transport mode (confs bellow).
 When I run isakmpd -K ; ipsecctl -f /etc/ipsec.conf on both hosts,
 no SA are created.  What did I miss?
 
 Thanks,
 
 Mosconi
 
 OBSD51 (hubble):
 PF:
 # pfctl -sr
 pass all flags S/SA
 block drop in on ! lo0 proto tcp from any to any port 6000:6010
 
 # ping -c 5 spitzer
 PING spitzer.domain (IP_SPITZER): 56 data bytes
 64 bytes from IP_SPITZER: icmp_seq=0 ttl=244 time=69.193 ms
 64 bytes from IP_SPITZER: icmp_seq=1 ttl=244 time=70.835 ms
 64 bytes from IP_SPITZER: icmp_seq=2 ttl=244 time=70.223 ms
 64 bytes from IP_SPITZER: icmp_seq=3 ttl=244 time=70.740 ms
 64 bytes from IP_SPITZER: icmp_seq=4 ttl=244 time=69.469 ms
 --- spitzer.domain ping statistics ---
 5 packets transmitted, 5 packets received, 0.0% packet loss
 round-trip min/avg/max/std-dev = 69.193/70.092/70.835/0.661 ms
 
 # cat /etc/ipsec.conf
 #   $OpenBSD: ipsec.conf,v 1.5 2006/09/14 15:10:43 hshoexer Exp $
 #
 # See ipsec.conf(5) for syntax and examples.
 
 # Set up two tunnels using automatic keying with isakmpd(8):
 #
 # First between the networks 10.1.1.0/24 and 10.1.2.0/24,
 # second between the machines 192.168.3.1 and 192.168.3.2.
 # Use FQDNs as IDs.
 
 ike esp transport from hubble to spitzer \
 main \
 auth hmac-sha2-512 \
 enc aes-256 \
 group modp4096 \
 srcid hubble.domain \
 dstid spitzer.domain \
 psk '/+V1gt9G6FTQ_}/Rn#nny!ZCgmd5+jIe^dKXf+)40R6%ZS(zD8Q2DUt[T(NwJOy'
 
 # ipsecctl -vvf /etc/ipsec.conf
 @0 C set [Phase 1]:IP_SPITZER=peer-IP_SPITZER force
 C set [peer-IP_SPITZER]:Phase=1 force
 C set [peer-IP_SPITZER]:Address=IP_SPITZER force
 C set 
 [peer-IP_SPITZER]:Authentication=/+V1gt9G6FTQ_}/Rn#nny!ZCgmd5+jIe^dKXf+)40R6%ZS(zD8Q2DUt[T(NwJOy
 force
 C set [peer-IP_SPITZER]:Configuration=phase1-peer-IP_SPITZER force
 C set [phase1-peer-IP_SPITZER]:EXCHANGE_TYPE=ID_PROT force
 C add [phase1-peer-IP_SPITZER]:Transforms=AES-256-SHA2-512-GRP16 force
 C set [peer-IP_SPITZER]:ID=id-hubble.domain force
 C set [id-hubble.domain]:ID-type=FQDN force
 C set [id-hubble.domain]:Name=hubble.domain force
 C set [peer-IP_SPITZER]:Remote-ID=id-spitzer.domain force
 C set [id-spitzer.domain]:ID-type=FQDN force
 C set [id-spitzer.domain]:Name=spitzer.domain force
 C set [from-IP_HUBBLE-to-IP_SPITZER]:Phase=2 force
 C set [from-IP_HUBBLE-to-IP_SPITZER]:ISAKMP-peer=peer-IP_SPITZER force
 C set 
 [from-IP_HUBBLE-to-IP_SPITZER]:Configuration=phase2-from-IP_HUBBLE-to-IP_SPITZER
 force
 C set [from-IP_HUBBLE-to-IP_SPITZER]:Local-ID=from-IP_HUBBLE force
 C set [from-IP_HUBBLE-to-IP_SPITZER]:Remote-ID=to-IP_SPITZER force
 C set [phase2-from-IP_HUBBLE-to-IP_SPITZER]:EXCHANGE_TYPE=QUICK_MODE force
 C set 
 [phase2-from-IP_HUBBLE-to-IP_SPITZER]:Suites=QM-ESP-TRP-AES-SHA2-256-PFS-SUITE
 force
 C set [from-IP_HUBBLE]:ID-type=IPV4_ADDR force
 C set [from-IP_HUBBLE]:Address=IP_HUBBLE force
 C set [to-IP_SPITZER]:ID-type=IPV4_ADDR force
 C set [to-IP_SPITZER]:Address=IP_SPITZER force
 C add [Phase 2]:Connections=from-IP_HUBBLE-to-IP_SPITZER
 @1 C set [Phase 1]:IP6_SPITZER=peer-IP6_SPITZER force
 C set [peer-IP6_SPITZER]:Phase=1 force
 C set [peer-IP6_SPITZER]:Address=IP6_SPITZER force
 C set 
 [peer-IP6_SPITZER]:Authentication=/+V1gt9G6FTQ_}/Rn#nny!ZCgmd5+jIe^dKXf+)40R6%ZS(zD8Q2DUt[T(NwJOy
 force
 C set [peer-IP6_SPITZER]:Configuration=phase1-peer-IP6_SPITZER force
 C set [phase1-peer-IP6_SPITZER]:EXCHANGE_TYPE=ID_PROT force
 C add [phase1-peer-IP6_SPITZER]:Transforms=AES-256-SHA2-512-GRP16 force
 C set [peer-IP6_SPITZER]:ID=id-hubble.domain force
 C set [id-hubble.domain]:ID-type=FQDN force
 C set [id-hubble.domain]:Name=hubble.domain force
 C set [peer-IP6_SPITZER]:Remote-ID=id-spitzer.domain force
 C set [id-spitzer.domain]:ID-type=FQDN force
 C set [id-spitzer.domain]:Name=spitzer.domain force
 C set [from-IP6_HUBBLE-to-IP6_SPITZER]:Phase=2 force
 C set [from-IP6_HUBBLE-to-IP6_SPITZER]:ISAKMP-peer=peer-IP6_SPITZER force
 C set 
 [from-IP6_HUBBLE-to-IP6_SPITZER]:Configuration=phase2-from-IP6_HUBBLE-to-IP6_SPITZER
 force
 C set [from-IP6_HUBBLE-to-IP6_SPITZER]:Local-ID=from-IP6_HUBBLE force
 C set [from-IP6_HUBBLE-to-IP6_SPITZER]:Remote-ID=to-IP6_SPITZER force
 C set [phase2-from-IP6_HUBBLE-to-IP6_SPITZER]:EXCHANGE_TYPE=QUICK_MODE force
 C set 
 [phase2-from-IP6_HUBBLE-to-IP6_SPITZER]:Suites=QM-ESP-TRP-AES-SHA2-256-PFS-SUITE
 force
 C set [from-IP6_HUBBLE]:ID-type=IPV6_ADDR force
 C set 

Re: openbsd running on asus eeepc 1000H?

2012-07-11 Thread Ben Calvert
Yes, although its been a couple months since I turned it on.

As i recall, the biggest obstacle was finding a USB stick it would deign to 
boot from

Ben

:wq

On Jul 11, 2012, at 3:25 AM, giovanni qgiova...@gmail.com wrote:

 hi misc,
 
 anybody out there w/ an asus eepc 1000H model running openbsd? 
 I've found this netbook in a recycle hw store and I would be interested 
 in using it for some needs. 
 
 thanks
 
 -- 
 see ya,
 giovanni



Re: Doubt with IPSEC

2012-07-11 Thread Paulm
One of the two hosts needs to use 'passive' in ipsec.conf so that
it acts as server and listens/responds to incoming requests from peers.



On Wed, Jul 11, 2012 at 02:23:13PM -0300, Rodrigo Mosconi wrote:
 Hi,
 
 I`m having a problem to establish a IPSEC transport between two
 openbsd hosts (one with 5.1 and the other with 4.9).  They are
 configured to use the transport mode (confs bellow).
 When I run isakmpd -K ; ipsecctl -f /etc/ipsec.conf on both hosts,
 no SA are created.  What did I miss?
 
 Thanks,
 
 Mosconi
 
 OBSD51 (hubble):
 PF:
 # pfctl -sr
 pass all flags S/SA
 block drop in on ! lo0 proto tcp from any to any port 6000:6010
 
 # ping -c 5 spitzer
 PING spitzer.domain (IP_SPITZER): 56 data bytes
 64 bytes from IP_SPITZER: icmp_seq=0 ttl=244 time=69.193 ms
 64 bytes from IP_SPITZER: icmp_seq=1 ttl=244 time=70.835 ms
 64 bytes from IP_SPITZER: icmp_seq=2 ttl=244 time=70.223 ms
 64 bytes from IP_SPITZER: icmp_seq=3 ttl=244 time=70.740 ms
 64 bytes from IP_SPITZER: icmp_seq=4 ttl=244 time=69.469 ms
 --- spitzer.domain ping statistics ---
 5 packets transmitted, 5 packets received, 0.0% packet loss
 round-trip min/avg/max/std-dev = 69.193/70.092/70.835/0.661 ms
 
 # cat /etc/ipsec.conf
 #   $OpenBSD: ipsec.conf,v 1.5 2006/09/14 15:10:43 hshoexer Exp $
 #
 # See ipsec.conf(5) for syntax and examples.
 
 # Set up two tunnels using automatic keying with isakmpd(8):
 #
 # First between the networks 10.1.1.0/24 and 10.1.2.0/24,
 # second between the machines 192.168.3.1 and 192.168.3.2.
 # Use FQDNs as IDs.
 
 ike esp transport from hubble to spitzer \
 main \
 auth hmac-sha2-512 \
 enc aes-256 \
 group modp4096 \
 srcid hubble.domain \
 dstid spitzer.domain \
 psk '/+V1gt9G6FTQ_}/Rn#nny!ZCgmd5+jIe^dKXf+)40R6%ZS(zD8Q2DUt[T(NwJOy'
 
 # ipsecctl -vvf /etc/ipsec.conf
 @0 C set [Phase 1]:IP_SPITZER=peer-IP_SPITZER force
 C set [peer-IP_SPITZER]:Phase=1 force
 C set [peer-IP_SPITZER]:Address=IP_SPITZER force
 C set 
 [peer-IP_SPITZER]:Authentication=/+V1gt9G6FTQ_}/Rn#nny!ZCgmd5+jIe^dKXf+)40R6%ZS(zD8Q2DUt[T(NwJOy
 force
 C set [peer-IP_SPITZER]:Configuration=phase1-peer-IP_SPITZER force
 C set [phase1-peer-IP_SPITZER]:EXCHANGE_TYPE=ID_PROT force
 C add [phase1-peer-IP_SPITZER]:Transforms=AES-256-SHA2-512-GRP16 force
 C set [peer-IP_SPITZER]:ID=id-hubble.domain force
 C set [id-hubble.domain]:ID-type=FQDN force
 C set [id-hubble.domain]:Name=hubble.domain force
 C set [peer-IP_SPITZER]:Remote-ID=id-spitzer.domain force
 C set [id-spitzer.domain]:ID-type=FQDN force
 C set [id-spitzer.domain]:Name=spitzer.domain force
 C set [from-IP_HUBBLE-to-IP_SPITZER]:Phase=2 force
 C set [from-IP_HUBBLE-to-IP_SPITZER]:ISAKMP-peer=peer-IP_SPITZER force
 C set 
 [from-IP_HUBBLE-to-IP_SPITZER]:Configuration=phase2-from-IP_HUBBLE-to-IP_SPITZER
 force
 C set [from-IP_HUBBLE-to-IP_SPITZER]:Local-ID=from-IP_HUBBLE force
 C set [from-IP_HUBBLE-to-IP_SPITZER]:Remote-ID=to-IP_SPITZER force
 C set [phase2-from-IP_HUBBLE-to-IP_SPITZER]:EXCHANGE_TYPE=QUICK_MODE force
 C set 
 [phase2-from-IP_HUBBLE-to-IP_SPITZER]:Suites=QM-ESP-TRP-AES-SHA2-256-PFS-SUITE
 force
 C set [from-IP_HUBBLE]:ID-type=IPV4_ADDR force
 C set [from-IP_HUBBLE]:Address=IP_HUBBLE force
 C set [to-IP_SPITZER]:ID-type=IPV4_ADDR force
 C set [to-IP_SPITZER]:Address=IP_SPITZER force
 C add [Phase 2]:Connections=from-IP_HUBBLE-to-IP_SPITZER
 @1 C set [Phase 1]:IP6_SPITZER=peer-IP6_SPITZER force
 C set [peer-IP6_SPITZER]:Phase=1 force
 C set [peer-IP6_SPITZER]:Address=IP6_SPITZER force
 C set 
 [peer-IP6_SPITZER]:Authentication=/+V1gt9G6FTQ_}/Rn#nny!ZCgmd5+jIe^dKXf+)40R6%ZS(zD8Q2DUt[T(NwJOy
 force
 C set [peer-IP6_SPITZER]:Configuration=phase1-peer-IP6_SPITZER force
 C set [phase1-peer-IP6_SPITZER]:EXCHANGE_TYPE=ID_PROT force
 C add [phase1-peer-IP6_SPITZER]:Transforms=AES-256-SHA2-512-GRP16 force
 C set [peer-IP6_SPITZER]:ID=id-hubble.domain force
 C set [id-hubble.domain]:ID-type=FQDN force
 C set [id-hubble.domain]:Name=hubble.domain force
 C set [peer-IP6_SPITZER]:Remote-ID=id-spitzer.domain force
 C set [id-spitzer.domain]:ID-type=FQDN force
 C set [id-spitzer.domain]:Name=spitzer.domain force
 C set [from-IP6_HUBBLE-to-IP6_SPITZER]:Phase=2 force
 C set [from-IP6_HUBBLE-to-IP6_SPITZER]:ISAKMP-peer=peer-IP6_SPITZER force
 C set 
 [from-IP6_HUBBLE-to-IP6_SPITZER]:Configuration=phase2-from-IP6_HUBBLE-to-IP6_SPITZER
 force
 C set [from-IP6_HUBBLE-to-IP6_SPITZER]:Local-ID=from-IP6_HUBBLE force
 C set [from-IP6_HUBBLE-to-IP6_SPITZER]:Remote-ID=to-IP6_SPITZER force
 C set [phase2-from-IP6_HUBBLE-to-IP6_SPITZER]:EXCHANGE_TYPE=QUICK_MODE force
 C set 
 [phase2-from-IP6_HUBBLE-to-IP6_SPITZER]:Suites=QM-ESP-TRP-AES-SHA2-256-PFS-SUITE
 force
 C set [from-IP6_HUBBLE]:ID-type=IPV6_ADDR force
 C set [from-IP6_HUBBLE]:Address=IP6_HUBBLE force
 C set [to-IP6_SPITZER]:ID-type=IPV6_ADDR force
 C set [to-IP6_SPITZER]:Address=IP6_SPITZER force
 C add [Phase 2]:Connections=from-IP6_HUBBLE-to-IP6_SPITZER
 
 # cat 

apple : mac : mini : intel : core i5 : 5.2 : support?

2012-07-11 Thread Mayuresh Kathe
would it be there?
http://www.openbsd.org/plat.html shows nothing.
googling around too showed information not upto date (from my location).

need a reliable desktop system with a good resale value, hence a mac mini. :)

thanks.

--
simplicity can be marvelously powerful.
 - rahul jindal



Re: SIL 3512 sata card dma errors

2012-07-11 Thread Chris Cappuccio
LEVAI Daniel [l...@ecentrum.hu] wrote:
  2) jmb0 at pci1 dev 0 function 0 JMicron JMB363 IDE/SATA rev 0x03
  Worked nicely. According to systat it provided around 30MB/sec write
  speed, whereas the SiI3512A only had around 20MB/sec.
 
 This is good to know, I'm sure I'll prefer this kind of device in the
 future.
 

That, or a 3124/3132/3531 suported by sili(4), or an AHCI based controller 
should all be better performers.

soft error like you saw from pciide are likely CRC errors, that could be the 
controller or it could even be your cable or hard disk



Re: apple : mac : mini : intel : core i5 : 5.2 : support?

2012-07-11 Thread Chris Cappuccio
OpenBSD/amd64 and OpenBSD/i386 both support Core i5 based machines.

Mayuresh Kathe [mayur...@kathe.in] wrote:
 would it be there?
 http://www.openbsd.org/plat.html shows nothing.
 googling around too showed information not upto date (from my location).
 
 need a reliable desktop system with a good resale value, hence a mac mini. :)
 
 thanks.
 
 --
 simplicity can be marvelously powerful.
  - rahul jindal

-- 
Keep them laughing half the time, scared of you the other half. And always keep 
them guessing. -- Clair George



Re: apple : mac : mini : intel : core i5 : 5.2 : support?

2012-07-11 Thread Jan Stary
On Jul 11 20:56:24, Mayuresh Kathe wrote:
 would it be there?
 http://www.openbsd.org/plat.html shows nothing.
 googling around too showed information not upto date (from my location).
 
 need a reliable desktop system with a good resale value, hence a mac mini. :)

Mine is not core i5, but runs 5.1 happily.

Jan


# uname -a
OpenBSD mini.stare.cz 5.1 GENERIC#0 macppc

# dmesg
[ using 496832 bytes of bsd ELF symbol table ]
console out [ATY,RockHopper2_A]console in [keyboard] , using USB
using parent ATY,RockHopper2Paren:: memaddr 9800 size 800, : consaddr 
9c008000, : ioaddr 9002, size 2: memtag 8000, iotag 8000: width 800 
linebytes 1024 height 600 depth 8
Copyright (c) 1982, 1986, 1989, 1991, 1993
The Regents of the University of California.  All rights reserved.
Copyright (c) 1995-2012 OpenBSD. All rights reserved.  http://www.OpenBSD.org

uvm_km_kmem_grow: grown to 0xee00
OpenBSD 5.1-current (GENERIC) #0: Wed Jun 13 02:07:49 CEST 2012
r...@mini.stare.cz:/usr/src/sys/arch/macppc/compile/GENERIC
real mem = 1073741824 (1024MB)
avail mem = 1032196096 (984MB)
mainbus0 at root: model PowerMac10,2
cpu0 at mainbus0: 7447A (Revision 0x102): 1499 MHz: 512KB L2 cache
mem0 at mainbus0
spdmem0 at mem0: 1GB DDR SDRAM non-parity PC3200CL3.0
memc0 at mainbus0: uni-n
hw-clock at memc0 not configured
kiic0 at memc0 offset 0xf8001000
iic0 at kiic0
mpcpcibr0 at mainbus0 pci: uni-north, Revision 0xff
pci0 at mpcpcibr0 bus 0
pchb0 at pci0 dev 11 function 0 Apple UniNorth AGP rev 0x00
vgafb0 at pci0 dev 16 function 0 ATI Radeon 9200 rev 0x01, mmio
wsdisplay0 at vgafb0 mux 1: console (std, vt100 emulation)
mpcpcibr1 at mainbus0 pci: uni-north, Revision 0x5
pci1 at mpcpcibr1 bus 0
pchb1 at pci1 dev 11 function 0 Apple UniNorth PCI rev 0x00
bwi0 at pci1 dev 18 function 0 Broadcom BCM4318 rev 0x02: irq 52, address 
00:11:24:bf:cb:2a
macobio0 at pci1 dev 23 function 0 Apple Intrepid rev 0x00
openpic0 at macobio0 offset 0x4: version 0x4614 feature 3f0302 LE
macgpio0 at macobio0 offset 0x50
modem-reset at macgpio0 offset 0x1d not configured
modem-power at macgpio0 offset 0x1c not configured
macgpio1 at macgpio0 offset 0x9 irq 47
programmer-switch at macgpio0 offset 0x11 not configured
gpio5 at macgpio0 offset 0x6f not configured
gpio6 at macgpio0 offset 0x70 not configured
extint-gpio15 at macgpio0 offset 0x67 not configured
escc-legacy at macobio0 offset 0x12000 not configured
zsc0 at macobio0 offset 0x13000: irq 22,23
zstty0 at zsc0 channel 0
zstty1 at zsc0 channel 1
aoa0 at macobio0 offset 0x1: irq 30,1,2
audio0 at aoa0
timer at macobio0 offset 0x15000 not configured
adb0 at macobio0 offset 0x16000 irq 25: via-pmu, 0 targets
apm0 at adb0: battery flags 0x0, 0% charged
piic0 at adb0
iic1 at piic0
maxtmp0 at iic1 addr 0xc8: max6642
kiic1 at macobio0 offset 0x18000
iic2 at kiic1
wdc0 at macobio0 offset 0x2 irq 24: DMA
ohci0 at pci1 dev 24 function 0 Apple Intrepid USB rev 0x00: couldn't map 
interrupt
ohci1 at pci1 dev 25 function 0 Apple Intrepid USB rev 0x00: couldn't map 
interrupt
ohci2 at pci1 dev 26 function 0 Apple Intrepid USB rev 0x00: irq 29, version 
1.0, legacy support
ohci3 at pci1 dev 27 function 0 NEC USB rev 0x43: irq 63, version 1.0
ohci4 at pci1 dev 27 function 1 NEC USB rev 0x43: irq 63, version 1.0
ehci0 at pci1 dev 27 function 2 NEC USB rev 0x04: irq 63
usb0 at ehci0: USB revision 2.0
uhub0 at usb0 NEC EHCI root hub rev 2.00/1.00 addr 1
usb1 at ohci2: USB revision 1.0
uhub1 at usb1 Apple OHCI root hub rev 1.00/1.00 addr 1
usb2 at ohci3: USB revision 1.0
uhub2 at usb2 NEC OHCI root hub rev 1.00/1.00 addr 1
usb3 at ohci4: USB revision 1.0
uhub3 at usb3 NEC OHCI root hub rev 1.00/1.00 addr 1
mpcpcibr2 at mainbus0 pci: uni-north, Revision 0x6
pci2 at mpcpcibr2 bus 0
pchb2 at pci2 dev 11 function 0 Apple UniNorth PCI rev 0x00
kauaiata0 at pci2 dev 13 function 0 Apple Intrepid ATA rev 0x00
wdc1 at kauaiata0 irq 39: DMA
atapiscsi0 at wdc1 channel 0 drive 0
scsibus0 at atapiscsi0: 2 targets
cd0 at scsibus0 targ 0 lun 0: MATSHITA, DVD-R UJ-825, DAND ATAPI 5/cdrom 
removable
wd0 at wdc1 channel 0 drive 1: ST9808211A
wd0: 16-sector PIO, LBA, 76319MB, 156301488 sectors
cd0(wdc1:0:0): using PIO mode 4, DMA mode 2, Ultra-DMA mode 4
wd0(wdc1:0:1): using PIO mode 4, DMA mode 2, Ultra-DMA mode 4
Apple UniNorth Firewire rev 0x81 at pci2 dev 14 function 0 not configured
gem0 at pci2 dev 15 function 0 Apple Uni-N2 GMAC rev 0x80: irq 41, address 
00:14:51:17:42:34
bmtphy0 at gem0 phy 0: BCM5221 100baseTX PHY, rev. 4
uhidev0 at uhub1 port 1 configuration 1 interface 0 Apple Computer HID-proxy 
rev 2.00/19.65 addr 2
uhidev0: iclass 3/1
ukbd0 at uhidev0: 8 modifier keys, 6 key codes
wskbd0 at ukbd0: console keyboard, using wsdisplay0
uhidev1 at uhub1 port 1 configuration 1 interface 1 Apple Computer HID-proxy 
rev 2.00/19.65 addr 2
uhidev1: iclass 3/1
ums0 at uhidev1: 5 buttons
wsmouse0 at ums0 mux 0
uhidev2 at uhub2 port 1 configuration 1 interface 0 Genius Optical Mouse rev 

Re: Doubt with IPSEC

2012-07-11 Thread Rodrigo Mosconi
2012/7/11 Paulm pa...@tetrardus.net:
 One of the two hosts needs to use 'passive' in ipsec.conf so that
 it acts as server and listens/responds to incoming requests from peers.



 On Wed, Jul 11, 2012 at 02:23:13PM -0300, Rodrigo Mosconi wrote:
 Hi,

 I`m having a problem to establish a IPSEC transport between two
 openbsd hosts (one with 5.1 and the other with 4.9).  They are
 configured to use the transport mode (confs bellow).
 When I run isakmpd -K ; ipsecctl -f /etc/ipsec.conf on both hosts,
 no SA are created.  What did I miss?

 Thanks,

 Mosconi

 OBSD51 (hubble):
 PF:
 # pfctl -sr
 pass all flags S/SA
 block drop in on ! lo0 proto tcp from any to any port 6000:6010

 # ping -c 5 spitzer
 PING spitzer.domain (IP_SPITZER): 56 data bytes
 64 bytes from IP_SPITZER: icmp_seq=0 ttl=244 time=69.193 ms
 64 bytes from IP_SPITZER: icmp_seq=1 ttl=244 time=70.835 ms
 64 bytes from IP_SPITZER: icmp_seq=2 ttl=244 time=70.223 ms
 64 bytes from IP_SPITZER: icmp_seq=3 ttl=244 time=70.740 ms
 64 bytes from IP_SPITZER: icmp_seq=4 ttl=244 time=69.469 ms
 --- spitzer.domain ping statistics ---
 5 packets transmitted, 5 packets received, 0.0% packet loss
 round-trip min/avg/max/std-dev = 69.193/70.092/70.835/0.661 ms

 # cat /etc/ipsec.conf
 #   $OpenBSD: ipsec.conf,v 1.5 2006/09/14 15:10:43 hshoexer Exp $
 #
 # See ipsec.conf(5) for syntax and examples.

 # Set up two tunnels using automatic keying with isakmpd(8):
 #
 # First between the networks 10.1.1.0/24 and 10.1.2.0/24,
 # second between the machines 192.168.3.1 and 192.168.3.2.
 # Use FQDNs as IDs.

 ike esp transport from hubble to spitzer \
 main \
 auth hmac-sha2-512 \
 enc aes-256 \
 group modp4096 \
 srcid hubble.domain \
 dstid spitzer.domain \
 psk 
 '/+V1gt9G6FTQ_}/Rn#nny!ZCgmd5+jIe^dKXf+)40R6%ZS(zD8Q2DUt[T(NwJOy'

 # ipsecctl -vvf /etc/ipsec.conf
 @0 C set [Phase 1]:IP_SPITZER=peer-IP_SPITZER force
 C set [peer-IP_SPITZER]:Phase=1 force
 C set [peer-IP_SPITZER]:Address=IP_SPITZER force
 C set 
 [peer-IP_SPITZER]:Authentication=/+V1gt9G6FTQ_}/Rn#nny!ZCgmd5+jIe^dKXf+)40R6%ZS(zD8Q2DUt[T(NwJOy
 force
 C set [peer-IP_SPITZER]:Configuration=phase1-peer-IP_SPITZER force
 C set [phase1-peer-IP_SPITZER]:EXCHANGE_TYPE=ID_PROT force
 C add [phase1-peer-IP_SPITZER]:Transforms=AES-256-SHA2-512-GRP16 force
 C set [peer-IP_SPITZER]:ID=id-hubble.domain force
 C set [id-hubble.domain]:ID-type=FQDN force
 C set [id-hubble.domain]:Name=hubble.domain force
 C set [peer-IP_SPITZER]:Remote-ID=id-spitzer.domain force
 C set [id-spitzer.domain]:ID-type=FQDN force
 C set [id-spitzer.domain]:Name=spitzer.domain force
 C set [from-IP_HUBBLE-to-IP_SPITZER]:Phase=2 force
 C set [from-IP_HUBBLE-to-IP_SPITZER]:ISAKMP-peer=peer-IP_SPITZER force
 C set 
 [from-IP_HUBBLE-to-IP_SPITZER]:Configuration=phase2-from-IP_HUBBLE-to-IP_SPITZER
 force
 C set [from-IP_HUBBLE-to-IP_SPITZER]:Local-ID=from-IP_HUBBLE force
 C set [from-IP_HUBBLE-to-IP_SPITZER]:Remote-ID=to-IP_SPITZER force
 C set [phase2-from-IP_HUBBLE-to-IP_SPITZER]:EXCHANGE_TYPE=QUICK_MODE force
 C set 
 [phase2-from-IP_HUBBLE-to-IP_SPITZER]:Suites=QM-ESP-TRP-AES-SHA2-256-PFS-SUITE
 force
 C set [from-IP_HUBBLE]:ID-type=IPV4_ADDR force
 C set [from-IP_HUBBLE]:Address=IP_HUBBLE force
 C set [to-IP_SPITZER]:ID-type=IPV4_ADDR force
 C set [to-IP_SPITZER]:Address=IP_SPITZER force
 C add [Phase 2]:Connections=from-IP_HUBBLE-to-IP_SPITZER
 @1 C set [Phase 1]:IP6_SPITZER=peer-IP6_SPITZER force
 C set [peer-IP6_SPITZER]:Phase=1 force
 C set [peer-IP6_SPITZER]:Address=IP6_SPITZER force
 C set 
 [peer-IP6_SPITZER]:Authentication=/+V1gt9G6FTQ_}/Rn#nny!ZCgmd5+jIe^dKXf+)40R6%ZS(zD8Q2DUt[T(NwJOy
 force
 C set [peer-IP6_SPITZER]:Configuration=phase1-peer-IP6_SPITZER force
 C set [phase1-peer-IP6_SPITZER]:EXCHANGE_TYPE=ID_PROT force
 C add [phase1-peer-IP6_SPITZER]:Transforms=AES-256-SHA2-512-GRP16 force
 C set [peer-IP6_SPITZER]:ID=id-hubble.domain force
 C set [id-hubble.domain]:ID-type=FQDN force
 C set [id-hubble.domain]:Name=hubble.domain force
 C set [peer-IP6_SPITZER]:Remote-ID=id-spitzer.domain force
 C set [id-spitzer.domain]:ID-type=FQDN force
 C set [id-spitzer.domain]:Name=spitzer.domain force
 C set [from-IP6_HUBBLE-to-IP6_SPITZER]:Phase=2 force
 C set [from-IP6_HUBBLE-to-IP6_SPITZER]:ISAKMP-peer=peer-IP6_SPITZER force
 C set 
 [from-IP6_HUBBLE-to-IP6_SPITZER]:Configuration=phase2-from-IP6_HUBBLE-to-IP6_SPITZER
 force
 C set [from-IP6_HUBBLE-to-IP6_SPITZER]:Local-ID=from-IP6_HUBBLE force
 C set [from-IP6_HUBBLE-to-IP6_SPITZER]:Remote-ID=to-IP6_SPITZER force
 C set [phase2-from-IP6_HUBBLE-to-IP6_SPITZER]:EXCHANGE_TYPE=QUICK_MODE force
 C set 
 [phase2-from-IP6_HUBBLE-to-IP6_SPITZER]:Suites=QM-ESP-TRP-AES-SHA2-256-PFS-SUITE
 force
 C set [from-IP6_HUBBLE]:ID-type=IPV6_ADDR force
 C set [from-IP6_HUBBLE]:Address=IP6_HUBBLE force
 C set [to-IP6_SPITZER]:ID-type=IPV6_ADDR force
 C set [to-IP6_SPITZER]:Address=IP6_SPITZER force
 C add [Phase 

bsd.rd anonymous ftp login broken?

2012-07-11 Thread Jan Stary
Trying to reinstall with the current i386/bsd.rd.
All goes well until I actually select a ftp mirror,
and asked for the ftp login, I accept the default of
'anonymous'. It keeps asking:

ftp login ? anonymous [enter]
ftp login ? anonymous [enter]
ftp login ? anonymous [enter]

and never gets past this.

Tried with different ftp mirrors,
so it's not that the one mirror is broken.

Jan



Re: bsd.rd anonymous ftp login broken?

2012-07-11 Thread Bryan Irvine
On Wed, Jul 11, 2012 at 12:55 PM, Jan Stary h...@stare.cz wrote:
 Trying to reinstall with the current i386/bsd.rd.
 All goes well until I actually select a ftp mirror,
 and asked for the ftp login, I accept the default of
 'anonymous'. It keeps asking:

 ftp login ? anonymous [enter]
 ftp login ? anonymous [enter]
 ftp login ? anonymous [enter]

 and never gets past this.

 Tried with different ftp mirrors,
 so it's not that the one mirror is broken.

Works for me.  Are you behind something?

-Bryan



Re: SIL 3512 sata card dma errors

2012-07-11 Thread Robert
On Sun, 8 Jul 2012 22:46:59 +0200
LEVAI Daniel l...@ecentrum.hu wrote:
 My errors were triggered when I was copying from disk1 to disk2, both
 connected to the SIL card. (in this case this was a 2 port card), not
 when copying something in parallel to both disks from a separate
 location. I think this makes the difference.

Good point.

So I did some more testing today by copying from one disk to the other
(dd bs=4k), both on the same controller.
Btw, I forgot to mention that the SiI is a PCI card and the JMB is a
PCI-E. You probably don't have PCI-E in your Pentium 4 ;)

1) Both controllers (SiI3512A, JMB363) showed the same speed, around
17MB/sec (and 8000 interrupts/sec). 

2) After more than 4h and 350GB, the JMB still showed no error.

3) But: the SiI3512A reported errors after ca. 3h:

Jul 11 16:32:32 pc200 /bsd: wd0c: aborted command writing fsbn
565811920 of 565811920-565811927 (wd0 bn 565811920; cn 35220 tn 41 sn
37), retrying Jul 11 16:32:32 pc200 /bsd: wd0: soft error (corrected)
Jul 11 16:50:56 pc200 /bsd: wd0c: aborted command writing fsbn
601990688 of 601990688-601990695 (wd0 bn 601990688; cn 37472 tn 47 sn
47), retrying Jul 11 16:50:56 pc200 /bsd: wd0: soft error (corrected)
Jul 11 17:15:59 pc200 /bsd: wd0c: aborted command writing fsbn
651398952 of 651398952-651398959 (wd0 bn 651398952; cn 40547 tn 180 sn
57), retrying Jul 11 17:16:00 pc200 /bsd: wd0: soft error (corrected)
Jul 11 17:22:01 pc200 /bsd: wd0c: aborted command writing fsbn
663235184 of 663235184-663235191 (wd0 bn 663235184; cn 41284 tn 122 sn
38), retrying Jul 11 17:22:01 pc200 /bsd: wd0: soft error (corrected)


kind regards,
Robert



Su Tarjeta Ha Sido Temporalmente Suspendida!

2012-07-11 Thread info
BBVA - Particulares

SEGURIDAD.

Le informamos que el accesso a su cuenta BBVAnet ha sido restringido por
razones de seguridad.

Para seguir utilizando los servicios de Banca por Internet de BBVA, debe
reactivar su CLAVE DE ACCESO

REACTIVACION
Acuda a una de las oficinas de BBVA, o bien utilice nuestra pagina
pulsando aqui, o en la nuestra web mas abajo:

https://www.bbva.es/
-NOTA:
: No responda a este mensaje. Utilice nuestra pagina o bien acuda a una
de nuestras oficinas para restaurar su 
acceso.-

Aviso legal Tarifas y otros avisos Mapa AtenciĆ³n al cliente Banco Bilbao
Vizcaya Argentaria S.A. - 2012



Re: bsd.rd anonymous ftp login broken?

2012-07-11 Thread Jan Stary
On Jul 11 13:13:39, Bryan Irvine wrote:
 On Wed, Jul 11, 2012 at 12:55 PM, Jan Stary h...@stare.cz wrote:
  Trying to reinstall with the current i386/bsd.rd.
  All goes well until I actually select a ftp mirror,
  and asked for the ftp login, I accept the default of
  'anonymous'. It keeps asking:
 
  ftp login ? anonymous [enter]
  ftp login ? anonymous [enter]
  ftp login ? anonymous [enter]
 
  and never gets past this.
 
  Tried with different ftp mirrors,
  so it's not that the one mirror is broken.
 
 Works for me.  Are you behind something?

Behind my ISP.

Generaly, what does it mean if the 'ftp login' question gets repeated?
That the FTP connection and/or FTP login failed? That's not the case
here, as I have downloaded the bsd.rd from the very same anon FTP.



Re: bsd.rd anonymous ftp login broken?

2012-07-11 Thread Alexander Polakov
* Jan Stary h...@stare.cz [120712 01:55]:
 Trying to reinstall with the current i386/bsd.rd.
 All goes well until I actually select a ftp mirror,
 and asked for the ftp login, I accept the default of
 'anonymous'. It keeps asking:
 
   ftp login ? anonymous [enter]
   ftp login ? anonymous [enter]
   ftp login ? anonymous [enter]
 
 and never gets past this.

Same here (amd64). I typed anonymous and it proceeded.
 
 Tried with different ftp mirrors,
 so it's not that the one mirror is broken.
 
   Jan



Re: bsd.rd anonymous ftp login broken?

2012-07-11 Thread David Diggles
Use http then?  To get you out of trouble.

Since other people dont have the problem, something fishy going on at your ISP?

I was once with an ISP that had a transparent proxy for http.  I noticed because
it was serving dated content, and the IP address on my remote server logs were
not my own.  Maybe your ISP is transparent proxying ftp?

My current ISP blocks a lot of ports by default.  I needed to login and disable
their firewall in my customer profile.

On Wed, Jul 11, 2012 at 09:55:35PM +0200, Jan Stary wrote:
 Trying to reinstall with the current i386/bsd.rd.
 All goes well until I actually select a ftp mirror,
 and asked for the ftp login, I accept the default of
 'anonymous'. It keeps asking:
 
   ftp login ? anonymous [enter]
   ftp login ? anonymous [enter]
   ftp login ? anonymous [enter]
 
 and never gets past this.
 
 Tried with different ftp mirrors,
 so it's not that the one mirror is broken.
 
   Jan



birds of feather flocked together

2012-07-11 Thread Mayuresh Kathe
anyone with expertise in setting up infrastructure
for a small (3 member) team of volunteers doing
part-time development for openbsd?
the development effort will last for 12 months
starting august 2012.

no remuneration involved nor intent to fork. :)

thanks.



relayd - url filtering actions?

2012-07-11 Thread Joakim Dellrud
Hello!
I have a fun problem:

2 webhosts (backends)
1 relayd (loadbalancer)

Some webapplications BUT one of the webapplications does not scale on a
loadbalanced system so I need to use a specific backend to get that to work:

so if users surfs to app.domain.tld/ they will go to either backend but if
they go to app.domain.tld/banana I want them sent to a specific backend. I
was under the impression (#openbsd@freenode) that this is possible? So my
resolution was to add:

http protocol http {
  things
  things

  request url filter app.domain.tld/banana redirect backend_1_table

}

Am I incorrect? Well I know that since relayd do not want to reload the
config due to:
/etc/relayd.conf:66: syntax error
/etc/relayd.conf:80: no such protocol: http
/etc/relayd.conf:83: syntax error
/etc/relayd.conf:98: no such protocol: http

Anyone that has done this before Im not sure about the redirect in the man
it says that the option for url can be only change/replace actions is what
I want even possible?

Regards Joakim!