Re: Solid-Run's HoneyComb LX2K for OpenBSD

2019-12-10 Thread VanL


> How good are the chances of the 'HoneyComb LX2K' running OpenBSD?  [1]
>
> Footnotes: 
> [1]  https://www.solid-run.com/nxp-lx2160a-family/honeycomb-workstation/

For future reference, the more specific place to ask is a...@openbsd.org
and the places to see before asking are:

https://ftp.openbsd.org/pub/OpenBSD/snapshots/arm64/INSTALL.arm64
https://ftp.openbsd.org/pub/OpenBSD/6.6/arm64/INSTALL.arm64
https://www.openbsd.org/arm64.html

For now, the LX2K looks less likely to run OpenBSD than any of the
documented targets of OpenBSD/arm64, there is one offering from SolidRun
which is a good sign:

Allwinner A64/H5
Pine64 Pine 64/64+
NanoPi A64
Orange Pi PC2
AMD Opteron A1100 (Seattle)
AMD Seattle Development Board
SoftIron OverDrive 1000
SoftIron OverDrive 3000
Amlogic G12A/B
Hardkernel ODROID-N2
Ampere eMAG
Lenovo ThinkSystem HR330A
Lenovo ThinkSystem HR350A
Broadcom BCM2837
Raspberry Pi 3
Marvell ARMADA 7K/8K
SolidRun/Marvell MACCHIATObin[1]
Rockchip RK3328/RK3399
Pine64 ROCK64
Pine64 ROCKPro64
Firefly-RK3399
Theobroma Systems RK3399-Q7
Socionext SC2A11
Socionext SynQuacer-E Developerbox

Footnotes: 
[1]  https://www.solid-run.com/marvell-armada-family/macchiatobin/

-- 
VanL.



Re: password-less user (without bothering security(8))?

2019-12-10 Thread Pierre Emeriaud
Le mar. 10 déc. 2019 à 16:52, Adam Thompson  a écrit :
>
> Is there a way to placate security(8) that I'm just not seeing?  Or is
> my goal fundamentally misguided for some reason I'm not seeing?  The
> user in this case is semi-trusted (e.g. yes, we'll let you login using
> an unprivileged account to run bgpctl in pipelines) but not
> organizationally-trusted (i.e. but that's ALL we want you to do on this
> system).

If bgpctl is the only thing you want, have a look at bgplgsh(8). It
doesn't do everything bgpctl does (only show/ping/traceroute), but it
might be sufficient for your needs.



Re: Strong Host Model in OpenBSD network stack

2019-12-10 Thread Bastian Kanbach
Good evening all,

following up on the previous discussions, I noticed that the network
stack changed recently [1] (limited to cases when packet forwarding is
enabled).

What's the idea behind it, as it seemed to be unlikely that this default
would be changed at all?


Thanks,

Bastian

[1] https://marc.info/?l=openbsd-tech&m=157580561114203


Am 18.10.19 um 08:56 schrieb Claudio Jeker:
> On Thu, Oct 17, 2019 at 09:50:28PM +0200, Bastian Kanbach wrote:
>> Hello,
>>
>> recently I was performing some checks that relate to the "Strong Host
>> Model" and "Weak Host Model", and I noticed that OpenBSD was behaving
>> different than I expected. I always assumed that the network stack of
>> OpenBSD was following the "Strong Host Model", but I might be wrong with
>> that:
> OpenBSD does follow the "Weak Host Model". Has always been like that.
>  
>> Basically the Strong Host Model means that the network stack "accepts
>> locally destined packets if the destination IP address in the packet
>> matches an IP address assigned to the network interface on which the
>> packet was received."
>>
>> FreeBSD and NetBSD have a sysctl property for this, called
>> "net.inet.ip.check_interface", which defaults to 0 (Weak Host Model).
>> However for OpenBSD I haven't seen such a property at all.
>>
>>
>> Basically my setup consisted of the following virtual machines and
>> network interfaces (IP-Forwarding disabled):
>>
>>
>> VM 1 (OpenBSD 6.5):
>>
>> em0: 192.168.100.1/24 ("Internal Network")
>>
>> em1: 10.0.0.97/24 ("NAT")
>>
>>
>> VM 2 (Ubuntu Server 18.10):
>>
>> ens33: 192.168.100.2/24 ("Internal Network")
>>
>>
>> 
>>
>>
>> As expected, ens33 of VM2 can communicate with em0 of VM1, since both
>> interfaces are associated with the same Virtualbox network, and both IP
>> addresses are part of the same /24 subnet.
>>
>> ens33 of VM2 can't directly communicate with em1 of VM1, since the IP
>> addresses are part of different subnets and no routes were configured.
>>
>>
>> Then I performed 2 tests:
>>
>>
>> Test 1:
>>
>> Perform an arping from ens33/VM2 (192.168.100.2) to 10.0.0.97 (VM1). The
>> packet was NOT answered by VM1.
>>
> This is a Layer 2 ARP test. Since 10.0.0.97 is not on that interface arp
> will not answer. The host model only matters for Layer 3.
>
>> Test 2:
>>
>> Set the following route on VM2: ip r add 10.0.0.0/24 via 192.168.100.1.
>> Then send an ICMP echo request to 10.0.0.97 (VM1), originating from
>> 192.168.100.2 (VM2). VM1 replied with an ICMP echo reply (with a source
>> MAC address of interface em0).
>>
>>
>> While the behaviour of Test 1 indicates that the Strong Host Model is
>> followed, Test 2 shows the behaviour of a "Weak Host Model".
>  
> No, Test 1 is not the right test for the host model.
>  
>> What of both is actually supposed to be the default for OpenBSD? Is
>> there any kernel parameter to control these behaviours, like
>> net.inet.ip.check_interface for FreeBSD or NetBSD?
> We don't have a button and just follow the "Weak Host Model".
> You can enforce a strong model per interface with pf(4):
>
> block in on !em0 inet to (em0)
>
> or
>
> block in
> pass in on em0 to (em0)
> pass in on em1 to (em1)
>



Re: password-less user (without bothering security(8))?

2019-12-10 Thread Manuel Giraud
Evan Silberman  writes:

> Why not assign a long, random password and then not share it with the
> user?

Or you can set your encrypted password to "*" as it is done for other
daemon users. You can use chpass(1) for this.
-- 
Manuel Giraud



Re: password-less user (without bothering security(8))?

2019-12-10 Thread Philipp Buehler

Am 10.12.2019 17:07 schrieb Evan Silberman:
Is there a way to placate security(8) that I'm just not seeing?  Or is 
my goal fundamentally misguided for some reason I'm not seeing?  The 
user in this case is semi-trusted (e.g. yes, we'll let you login using 
an unprivileged account to run bgpctl in pipelines) but not 
organizationally-trusted (i.e. but that's ALL we want you to do on 
this system).


Why not assign a long, random password and then not share it with the 
user?


Or put 13 asterisks as "password" in master.passwd(5)
(the case is mentioned explicitly there)

HTH,
--
pb



Re: password-less user (without bothering security(8))?

2019-12-10 Thread Evan Silberman



> On Dec 10, 2019, at 7:55 AM, Adam Thompson  wrote:
> 
> Hi,
> On 6.6-STABLE, I'm looking at security(8) and it's not immediately obvious to 
> me how I can have an SSH key-only user who does not have a password, that 
> also does not trigger daily security warnings.
> 
> The goal is to have a user that can never log in on the console, or via 
> password any other way (FTP, SMTP auth, POP, etc., etc.), but only via the 
> RSA key provided.
> 
> Is there a way to placate security(8) that I'm just not seeing?  Or is my 
> goal fundamentally misguided for some reason I'm not seeing?  The user in 
> this case is semi-trusted (e.g. yes, we'll let you login using an 
> unprivileged account to run bgpctl in pipelines) but not 
> organizationally-trusted (i.e. but that's ALL we want you to do on this 
> system).

Why not assign a long, random password and then not share it with the user?



password-less user (without bothering security(8))?

2019-12-10 Thread Adam Thompson

Hi,
On 6.6-STABLE, I'm looking at security(8) and it's not immediately 
obvious to me how I can have an SSH key-only user who does not have a 
password, that also does not trigger daily security warnings.


The goal is to have a user that can never log in on the console, or via 
password any other way (FTP, SMTP auth, POP, etc., etc.), but only via 
the RSA key provided.


Is there a way to placate security(8) that I'm just not seeing?  Or is 
my goal fundamentally misguided for some reason I'm not seeing?  The 
user in this case is semi-trusted (e.g. yes, we'll let you login using 
an unprivileged account to run bgpctl in pipelines) but not 
organizationally-trusted (i.e. but that's ALL we want you to do on this 
system).


Thanks,
-Adam



Re: What's up with bluhms perf tests?

2019-12-10 Thread Tommy Nevtelen

On 10/12/2019 01.12, Todd C. Miller wrote:

That was probably the following commit:
https://www.mail-archive.com/source-changes@openbsd.org/msg111985.html

which has since been reverted:
https://www.mail-archive.com/source-changes@openbsd.org/msg112279.html


Great! Thanks for the info, hope it shows up in the next run.

I'm following it for eventual performance increases for router usage.

Kind of hoping for some soon otherwise openbsd might have to go in our 
networks );


/T



Re: pinentry-tty in OpenBSD? to be used with emacs

2019-12-10 Thread Rudolf Sykora


Timo Myyrä  writes:

> I don't know about pinentry but emacs freezes sound familiar. Have you
> tried using the workaround given in following site:
> https://omecha.info/blog/org-capture-freezes-emacs.html
>
> Timo

Thanks! The freezing using a graphical emacs made me change to a
terminal emacs. The link seems relevant to me (I first tried to move to
the athena build [also because with GTK build there is some long lasting
bug when one runs emacs in its daemon mode], but no matter what, emacs
froze randomly at the very point the linked page discusses. So I will
try the quick fix (a hack, I would say); still, he only changes an
x-selection-timeout from 5000 ms to 10 ms, while my emacs froze (when it
did) apparently forever (ie, not just for 5 s).


Regarding the pinentry-emacs I now have yet another problem. 
When the pinentry prompt appears in one emacs frame (on one computer,
say at work), as it happens for me when the validity of the passphrase
has timed out, it blocks any other emacs frame. Ie, when I run
emacsclient -c from another machine, it freezes.

I tried a few things to no avail...


Thanks for any help.


Best regards
Ruda