Re: make update stores twice the packages
Hi Ben Calvert, Ben Calvert wrote: On Aug 28, 2008, at 1:36 PM, Stuart Henderson wrote: I don't think they are links, they are real copies. I am checking this with konqueror as su and it show clearly when the file is a link or a real file. That's not a good way to check. Try ls(1). It's likely that he doesn't know the difference between a soft and hard link. I'm very busy so I am not currently checking my threads, till next week t least. But I have just accidentally read your (this) posting. I am quickly learning more about soft and hard links, and there is a thread at kde-dev to create a patch for konqueror (+ kdedirstats + other KDE tools) to avoid confusing people when dealing with files hard linked to different folders (as crazily OpenBSD does in the /usr/ports/packages folder ), which happened to me causing an erroneously information about my system space getting eaten by "ghost" duplicated files. mac - you need a basic unix book. for now, read man ln man ln on my night sleep table, as some unix pdf books I found online as "Introduction to Unix" 1998 by Frank G. Fiamingo and "Unix for Dummies" - 2004 - Wiley Publishing Any advice here? Mac.
Not updating .libs1-gettext-0.16.1, remember to clean it
how?
You may wish to add /usr/local/jdk-1.7.0/man to /etc/man.conf ?
how? jdk-1.7.0.00b24p2: complete --- jdk-1.7.0.00b24p2 --- You may wish to add /usr/local/jdk-1.7.0/man to /etc/man.conf
Re: pkg_add and make via tor?
Hi, Stuart Henderson wrote: > On 2008-08-02, macintoshzoom <[EMAIL PROTECTED]> wrote: >> I need an alternative to the default system fetch ftp used by pkg_add, >> something that could be socksified via dsocks, or that accepts to run >> through a socks server, e.g. FETCH_CMD="dsocks-torify.sh >> newsocksifiableftp", and that understands >> ${FETCH_CMD} -o - url (as per man pkg_add) >> >> Any one had success here? > > For normal pkg_add, try curl. > >> I want to run pkg_add -u routed via my (only) exit socks 4a/5 proxy >> server (tor). > > But iirc, you won't be able to pkg_add -u with curl. This is a must, I need pkg_add -u via tor. ..? > > Not sure what's up with ftp(1). First time I tried it, making a > transfer via the ftp CLI, connecting through ssh -D1080 / dsocks, > it transferred a file through socks, but then hanged at the end. > If I try again, it just connects directly. Very odd...
pkg_add and make via tor?
I need an alternative to the default system fetch ftp used by pkg_add, something that could be socksified via dsocks, or that accepts to run through a socks server, e.g. FETCH_CMD="dsocks-torify.sh newsocksifiableftp", and that understands ${FETCH_CMD} -o - url (as per man pkg_add) Any one had success here? I want to run pkg_add -u routed via my (only) exit socks 4a/5 proxy server (tor). (dsocks-torify.sh ftp don't work) Can you help me? Thanks. Mac
Re: how to undelete?
Which hex editor do you advise? Should I have to umount the partition before? the partition is 40 GB size on a secondary disk, OpenBSD old slice, should I need at least such space (/tmp ?) to open it on the hex editor from my OpenBSD 4.3? Thanks! Die Gestalt wrote: > Just open your disk in a hex editor and look for your data, it should be here.
how to undelete?
I deleted a directory from an OpenBSD slice from my 2nd HD, and I need to recover a single file. I tried : http://myutil.com/2008/1/15/undelete-unrm-for-openbsd-4-2-with-dls but failed : # dls /dev/wd1x > /xxx/xx/undelete.bin Sector offset supplied is larger than disk image (maximum: 0) Help & thanks.
Re: Any offshore OpenBSD hosting?
Hey, Your postings on this subject are interesting, it seems you know about what your are talking about. What should be your summary global advice for creating an hosting offshore corporation/foundation to help human right watchers and activists, say as eg Greenpeace, hrw.org , tibetans, chinesse/asian free speech/democacy activists, and the like?. If we are able to provide these communities with strong privacy-security-enhanced turnkey hosting services, individials, corporations, foundations will become also interested to adhere (or to order, if we go on business)our hosting system(s) and services... There are other considerations to implement in the hosting servers and customers PC's to help against Big Brother(s), as it's the software (and OS): Here OpenBSD can help a lot as the OS of choice, but it requires yet a lot of implementations and tricky configurations. To be implemented: Fully encryption of the OS boxes (a-la drivecrypt / compusec), also encrypting (eventually on fake video-music file containers for stegaqnography?) the users space via OTF-like (truecrypt?) encryption, including one or more layers of denial plausibility with fake/honey-pots areas if server maintainers or hosted customers are eventually forced (or hacked) to reveal their pass keys. The hoster company should never be able to decrypt the hosted customers content, its their matter and their privacy. A new kind of "secure&private" hosting standard should be created, e.g to force the use of only strong SSL for browsing and e-mail/webmail, and allowing only gpg protected communications on specific or aproved-verified secured pre-configured software clients. And networking ONLY on gateways as tor, i2p, mixminion, jap, freenet or similar systems. And etc etc... I can't understand why everyone still gives their websites on (weak/cleartext) http, instead of using strong https that should be the standard. Most if not all of the current PC boxes and bandwiths allow this, or not?. Why is https only used for banking, order former and the like, and not for everything? All this seems a lot of job (we all are working on that), but once done it can set up a new standard(s) for data and communications privacy ( a new standard that can/should have its own brand name) not only for individuals but also for corporations (industrial and commercial secrets theft causes billions loses), govs. We believe that this is an essential feature for a fair world and to reach a new degree of civilization, justice, equity and fraternity (if we can avoid to extinguish the humanity in the meantime): Information and association of the masses is a very powerful power. If and when you can freely communicate with everyone at the last desert village inhabitants in deep Africa, if and when a global worldwide individual can learn, know, opine and vote, then there will be a new kind of planet lobby from the masses against any ill-minded government, corporation, money or justice laws that can change the world in decades. And there are enough goods and resources in earth for all to leave in peace; someone is tricking us the wrong way. Here the OLPC (one laptop per children, wifi connected and solar/handcrank powered) is a good step (we are working also on an OpenBSD based version suite to fit on these as an alternate of the standard software (probably bigbro-dirty as not-privacy secured at all) . Of course, a super-secure information/communication/privacy system will help also criminals and ill-minded likes, but we must fight against them not at the price of losing our freespeech nor robbing the freespeech (nor the planet) of our childs, that are the real owners of the world. macintoshzoom --- On Wed, 18 Jun 2008 13:29:29 + [EMAIL PROTECTED] wrote: > > But if ISP's must have blackbox on their interfaces (hello FBI),than you can't > > trust your local hosting company even if they are very friendly ;-) > > Cisco prefers a blueish-black color. Juniper boxes tend to be white and blue. > > In most Western countries there are many ISPs; if many of them were forced to have, in secret, black boxes on their networks, it would soon be public that that is occuring. > > Providers are, in many cases, being forced to allow, unmonitored, snooping by their governments - read up on CALEA. Hardware based routing platforms will be able to handle only a very small amount of traffic, the CPUs that are used in them tend to be very slow and even the fastest CPUs can route only a tiny amount of the traffic modern hardware-based routers can. > > So, if the government wants to monitor YOU specifically, or occasionally monitor everyone, they might be able to do it via CALEA. > > If I wished to monitor a large amount of peoples traffic (not all - that's not technically feasible), I would try and use passive taps with the cooperation of majo
Re: Any offshore OpenBSD hosting?
That's a good question. I will give my 2cents next days. macintoshzoom On Tue, 17 Jun 2008 17:51:59 -0300 "Rildo Cezar" <[EMAIL PROTECTED]> wrote: > So, what would be the best country to host a server? > > based on privacy rights. > > Rcmp > > > - Original Message - > From: "David Schulz" <[EMAIL PROTECTED]> > To: "macintoshzoom" <[EMAIL PROTECTED]> > Cc: > Sent: Tuesday, June 17, 2008 10:28 AM > Subject: Re: Any offshore OpenBSD hosting? > > > > Hello, > > > > i have a few Servers with these Guys; http://www.hktechnology.com/ , for a > > few Years, no major Issues. > > > > Mine are FreeBSD, but i would not be surprised if they help you to install > > OpenBSD on a Server for you; they turned out to be helpful in a number of > > Situations for me. > > > > regards, > > David > > > > macintoshzoom wrote: > >> Does anyone knows about any offshore OpenBSD dedicated hosting : Asia, > >> PanamC!, honest and privacy conscious hosting services? > >> It seems that as per today it's better to go offshore for a hosting > >> business to avoid and protest against endemic surveillance, USA is rated > >> as one of the worst countries in the world as per the 2007 report of > >> www.privacyinternational.org : > >> http://www.privacyinternational.org/article.shtml?cmd%5B347%5D=x-347-559597 > >> ... > >> USA is not anymore the world flagship for human liberty rights and > >> civilization (positive) evolution, its a pain and a pitty. > >> > >> > >> !DSPAM:48579097590355368818224! > > > > > > > > -- > > No virus found in this incoming message. > > Checked by AVG. Version: 7.5.524 / Virus Database: 270.3.0/1505 - Release > > Date: 6/16/ 07:20 [demime 1.01d removed an attachment of type application/pgp-signature]
Re: Any offshore OpenBSD hosting?
You are probably right, this is an issue that have to be checked with the network manager of the hosting companies, eventually testing their servers with traceroute tools. The main issue if you want offshore hosting seems to be that you have to verify the servers and the datacenters are really located offshore. I think those are the main "leaking privacy" and easiest to snoop points. Some Panama or India ( https://scorpioinformatics.com/ ) hosting companies are "proudly" advertising they data centers are located in USA ... good for performance (if the US datacenter is powerful) but not good for supporting the human rights privacy of your customers or good for your philosophical way of thinking. Malaysian hosting as shinjiru.com have their data center in Kuala Lumpur, but perhaps they redirect all traffic via US before going anyway else, I don'T know how all this works. Again, traceroute testing required. This is a very tricky world. The only easy worldwide solution to the global eavesdroppers problem could be to forget http forever and go always for a strong https, ssh2 for other protocolos and use always and only gpg over ssl for email. Today CPUs, RAMs and bandwith standards allow for this, I think. Do you know any link(s) about the global traffic maps routing(s)? macintoshzoom --- On Tue, 17 Jun 2008 13:28:13 + [EMAIL PROTECTED] wrote: > > Does anyone knows about any offshore OpenBSD dedicated hosting : Asia, > > PanamC!, honest and privacy conscious hosting services? > > It seems that as per today it's better to go offshore for a hosting > > business to avoid and protest against endemic surveillance, USA is rated as > > one of the worst countries in the world as per the 2007 report of > > www.privacyinternational.org : > > http://www.privacyinternational.org/article.shtml?cmd%5B347%5D=x-347-559597 > > ... > > USA is not anymore the world flagship for human liberty rights and > > civilization (positive) evolution, its a pain and a pitty. > > So the obvious choice is to go to a country where almost all traffic will > pass through the US... A lot of *national* traffic in South America is routed > through the US.
Any offshore OpenBSD hosting?
Does anyone knows about any offshore OpenBSD dedicated hosting : Asia, PanamC!, honest and privacy conscious hosting services? It seems that as per today it's better to go offshore for a hosting business to avoid and protest against endemic surveillance, USA is rated as one of the worst countries in the world as per the 2007 report of www.privacyinternational.org : http://www.privacyinternational.org/article.shtml?cmd%5B347%5D=x-347-559597 ... USA is not anymore the world flagship for human liberty rights and civilization (positive) evolution, its a pain and a pitty.
red [EMAIL PROTECTED] homepna 1.0 ?
Anyone knows how to run this usb network system on OpenBSD or Linux?
gnupg to add LDAP - how?
I have gnupg-1.4.8, and KDE KGpg, but no LDAP server support. It seems that this gnupg has an LDAP flavor, which I miss somehow to install. Should I have to uninstall and reinstall gnupg-1.4.8 from the command line to enable this flavor (a bit of a pain as it is binded with KDE etc), or is there an easier trick for this? I want to import to my keyring some public keys available at a private LDAP server ( "ldap://keys.hush.com:389"; ). Thanks.
pf table syntax for Ip ranges?
pf table syntax for Ip ranges? In my pf.conf : table persist file "/etc/bad-guys" and in bad-guys file: 222.249.000.000 222.249.255.255 ### 000 ### Beijing Educational Information Network but doing # pfctl -t bad-guys -T show 222.249.0.0 222.249.255.255 # it shows two IPs but not the range 222.249.000.000-222.249.255.255 that it's what I want. What is the correct syntax for Ip ranges on these table files?
Re: How to HIDE "OpenBSD" as user-agent?
seen some pf.conf settings against remote OS detection at http://nmap.org/misc/defeat-nmap-osdetect.html#OPENBSD: ""The OpenBSD packet filter can also be configured to try to defeat remote OS Fingerprint.."" and at http://hackepedia.org/?title=Pf : "" # block nmap OS detection scans somewhat (-O) block in quick proto tcp flags FUP/WEUAPRSF block in quick proto tcp flags WEUAPRSF/WEUAPRSF block in quick proto tcp flags SRAFU/WEUAPRSF block in quick proto tcp flags /WEUAPRSF block in quick proto tcp flags SR/SR block in quick proto tcp flags SF/SF "" Any tips for a full pf.conf settings ? On Tue, 29 Apr 2008 06:18:38 -0600 macintoshzoom <[EMAIL PROTECTED]> wrote: > How to HIDE "OpenBSD" as user-agent? > > For security reasons it is sometimes interesting to hide GLOBALLLY th > O.S. you are running on AGAINST GIVING ANY CLUE TO HACKERS ABOUT HOW TO > ATTACK YOU. > > Not only browsing but globally. > > Thanks for any tip about this.
How to HIDE "OpenBSD" as user-agent?
How to HIDE "OpenBSD" as user-agent? For security reasons it is sometimes interesting to hide GLOBALLLY th O.S. you are running on AGAINST GIVING ANY CLUE TO HACKERS ABOUT HOW TO ATTACK YOU. Not only browsing but globally. Thanks for any tip about this.