Formación de Auditores Internos ISO 9001. publicidad te geh

2012-02-13 Thread IF CONSULTING

[demime 1.01d removed an attachment of type image/jpeg which had a name of 
fsemasiologia.jpg]

[demime 1.01d removed an attachment of type image/jpeg which had a name of 
chancuco.jpg]



Re: urtwn0 does not recover from suspend

2012-02-13 Thread David Coppa
On Sun, Feb 12, 2012 at 7:45 PM, Edd Barrett vex...@gmail.com wrote:
 Hi,

 I think i discussed this with someone before, but I forget where we got
 with it. Pretty bad timing, I know.

 Bring a urtwn interface up, put system to sleep with zzz, then wake it,
 firmware shits itself:

 urtwn0: could not send firmware command 5
 urtwn0: could not send firmware command 5
 urtwn0: device timeout
 urtwn0: could not send firmware command 5
 urtwn0: could not send firmware command 5
 ...

 This is not all that severe because it can be worked around:

See these for a workaround:

http://marc.info/?l=openbsd-miscm=130640496205737

http://marc.info/?l=openbsd-miscm=130640580006765

i.e.: use /etc/apm/suspend, /etc/apm/resume to down/up the interface.
But, yes, this should be fixed properly

ciao,
David



relayd UDP bug and patch ...

2012-02-13 Thread Tom Knienieder
Hello tech@

There is a bug in relayd which is related to udp relays.
It can be triggered with the following relayd.conf:


relayd_addr=192.168.10.2
relayd_port=53

table dns_servers { 10.10.10.2 }
dns_servers_port=53

interval 10
timeout 200

dns protocol dnsfilter {
tcp { nodelay, sack, socket buffer 1024, backlog 1000 }
}

relay dnsproxy {
listen on $relayd_addr port $relayd_port

protocol dnsfilter

forward to dns_servers port $dns_servers_port \
mode loadbalance check tcp
}



nslookup via 192.168.10.2 triggers a coredump in relayd.

The problem is within relay_dns_request() in relay_udp.c,
env is a NULL pointer but env-sc_timeout is used in event_again().

Here is my patch:


--- relay_udp.c.origMon Feb 13 16:29:07 2012
+++ relay_udp.c Mon Feb 13 16:32:20 2012
@@ -474,6 +474,8 @@
if (gettimeofday(con-se_tv_start, NULL) == -1)
return (-1);

+   bcopy( rlay-rl_conf.timeout,  con-se_timeout, sizeof(
con-se_timeout ));
+
if (rlay-rl_dsttable != NULL) {
if (relay_from_table(con) != 0)
return (-1);
@@ -508,7 +510,7 @@
}

event_again(con-se_ev, con-se_out.s, EV_TIMEOUT|EV_READ,
-   relay_udp_response, con-se_tv_start, env-sc_timeout, con);
+   relay_udp_response, con-se_tv_start, con-se_timeout, con);

return (0);
 }


Best regards,
Tom



Re: fix incorrect document titles in several man pages

2012-02-13 Thread Christiano F. Haesbaert
On 11 February 2012 13:56, Jason McIntyre j...@cava.myzen.co.uk wrote:
 On Sat, Feb 11, 2012 at 10:26:18AM -0200, Christiano F. Haesbaert wrote:
 Reads fine to me, any objections ?

 jmc ?


 i had just filed this under look at after lock, but if you want to
 take it on, that's fine.


No problem, let us wait for the unlock then, I was only making sure
this wouldn't die.

 note there is no rpcauth function, so that page should probably be renamed
 (to something which does exist).

 except for that niggle, the rest of the diff looks correct.

 jmc

 On 10 February 2012 03:50, Lawrence Teo l...@lteo.net wrote:
  This diff fixes several man pages that have incorrect document titles
  (.Dt).
 
  Lawrence
 
 
  Index: src/bin/md5/sha256.1
  ===
  RCS file: /cvs/src/bin/md5/sha256.1,v
  retrieving revision 1.3
  diff -u -p -r1.3 sha256.1
  --- src/bin/md5/sha256.1 ? ? ? ?3 Sep 2010 09:53:20 - ? ? ? 1.3
  +++ src/bin/md5/sha256.1 ? ? ? ?10 Feb 2012 05:41:09 -
  @@ -19,7 +19,7 @@
  ?.\ Materiel Command, USAF, under agreement number F39502-99-1-0512.
  ?.\
  ?.Dd $Mdocdate: September 3 2010 $
  -.Dt SHA1 1
  +.Dt SHA256 1
  ?.Os
  ?.Sh NAME
  ?.Nm sha256
  Index: src/lib/libc/rpc/rpcauth.3
  ===
  RCS file: /cvs/src/lib/libc/rpc/rpcauth.3,v
  retrieving revision 1.15
  diff -u -p -r1.15 rpcauth.3
  --- src/lib/libc/rpc/rpcauth.3 ?7 Sep 2010 19:52:37 - ? ? ? 1.15
  +++ src/lib/libc/rpc/rpcauth.3 ?10 Feb 2012 05:41:09 -
  @@ -31,7 +31,7 @@
  ?.\ ? OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  ?.\
  ?.Dd $Mdocdate: September 7 2010 $
  -.Dt RPC 3
  +.Dt RPCAUTH 3
  ?.Os
  ?.Sh NAME
  ?.Nm auth_destroy ,
  Index: src/lib/libc/time/wcsftime.3
  ===
  RCS file: /cvs/src/lib/libc/time/wcsftime.3,v
  retrieving revision 1.1
  diff -u -p -r1.1 wcsftime.3
  --- src/lib/libc/time/wcsftime.3 ? ? ? ?10 Oct 2011 14:40:25 - ? ? ?1.1
  +++ src/lib/libc/time/wcsftime.3 ? ? ? ?10 Feb 2012 05:41:09 -
  @@ -14,7 +14,7 @@
  ?.\ OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
  ?.\
  ?.Dd $Mdocdate: October 10 2011 $
  -.Dt STRFTIME 3
  +.Dt WCSFTIME 3
  ?.Os
  ?.Sh NAME
  ?.Nm wcsftime
  Index: src/lib/libm/man/sin.3
  ===
  RCS file: /cvs/src/lib/libm/man/sin.3,v
  retrieving revision 1.13
  diff -u -p -r1.13 sin.3
  --- src/lib/libm/man/sin.3 ? ? ?7 Jul 2011 01:34:52 - ? ? ? 1.13
  +++ src/lib/libm/man/sin.3 ? ? ?10 Feb 2012 05:41:09 -
  @@ -29,7 +29,7 @@
  ?.\ ? ? from: @(#)cos.3 ? ? ? ?5.1 (Berkeley) 5/2/91
  ?.\
  ?.Dd $Mdocdate: July 7 2011 $
  -.Dt COS 3
  +.Dt SIN 3
  ?.Os
  ?.Sh NAME
  ?.Nm sin ,
  Index: src/libexec/login_krb5/login_krb5.8
  ===
  RCS file: /cvs/src/libexec/login_krb5/login_krb5.8,v
  retrieving revision 1.16
  diff -u -p -r1.16 login_krb5.8
  --- src/libexec/login_krb5/login_krb5.8 1 Feb 2012 17:32:59 - ? ? ? 
  1.16
  +++ src/libexec/login_krb5/login_krb5.8 10 Feb 2012 05:41:09 -
  @@ -15,7 +15,7 @@
  ?.\ OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
  ?.\
  ?.Dd $Mdocdate: February 1 2012 $
  -.Dt LOGIN_KERBEROS 8
  +.Dt LOGIN_KRB5 8
  ?.Os
  ?.Sh NAME
  ?.Nm login_krb5
  Index: src/usr.bin/bgplg/bgplgsh.8
  ===
  RCS file: /cvs/src/usr.bin/bgplg/bgplgsh.8,v
  retrieving revision 1.5
  diff -u -p -r1.5 bgplgsh.8
  --- src/usr.bin/bgplg/bgplgsh.8 13 Oct 2010 18:56:03 - ? ? ?1.5
  +++ src/usr.bin/bgplg/bgplgsh.8 10 Feb 2012 05:41:09 -
  @@ -15,7 +15,7 @@
  ?.\ OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
  ?.\
  ?.Dd $Mdocdate: October 13 2010 $
  -.Dt BGPLG 8
  +.Dt BGPLGSH 8
  ?.Os
  ?.Sh NAME
  ?.Nm bgplgsh



Unbound in base

2012-02-13 Thread Björn Ketelaars
Hello,

After some recent discussions [1, 2] on the topic of unbound in base, and
(more important) really liking the idea of an alternative for BIND in base, I
made a start with fitting the different pieces of the puzzle. What is
finished:

1.) Integration of ldns 1.6.12 and unbound 1.4.15 and writing of relevant
Makefile wrappers. Wrapper script also compiles and installs drill;
2.) Testing (read: does it compile and work) on AMD64.

Stuart Henderson had some good remarks on integrating the above [3]. What do
you guys think of the following:

What to do with the BIND tools (dig/host/nslookup)?

Unbound offers drill. From drill.1: The name drill is a pun on dig. With
drill you should be able get even more information than with dig.. Proposal
therefore is to replace the BIND tools with drill.

Do we run unbound-anchor automatically? if so, how do we handle possibly not
having working DNS at that time to resolve data.iana.org
(http://data.iana.org) (http://data.iana.org)?

From unbound-anchor.8 I understand that unbound-anchor can be run from the
command line, or run as part of startup scripts _before_ the actual (unbound)
DNS server is started. So there is no need for DNS. Proposal therefor is to
run unbound-anchor automatically before starting the unbound daemon (rc_pre in
unbound rc-script).



How and when do we automatically generate unbound-control keys? if so, where
should that be done? b

From unbound-control.8: The script unbound-control-setup generates these
control keys in the default run directory. If you change the access control
permissions on the key files you can decide who can use unbound-control. Run
the script under the same username as you have configured in unbound.conf or
as root, so that the daemon is permitted to read the files, for example with:
sudo -u unbound unbound-control-setup. If you have not configured a username
in unbound.conf, the keys need read permission for the user credentials under
which the daemon is started. The script preserves private keys present in the
directory. After running the script as root, turn on control-enable in
unbound.conf.

The unbound-control-script can be called from rc-make_keys(). The knob
'control-enable' can be set as default.

After tar/gzip the source files and Makefile wrappers weigh ~4.6MB. A bit to
large to send to this list. if anyone feels like looking at the workbdo not
hesitate to mail me.

Again, what do you guys think?

Kind regards,

BjC6rn


[1] http://marc.info/?l=openbsd-miscm=132205020820910w=2
[2] http://marc.info/?l=openbsd-techm=132573371521516w=2
[3] http://marc.info/?l=openbsd-miscm=132217547525487w=2



Re: Unbound in base

2012-02-13 Thread Stuart Henderson
On 2012/02/13 22:35, Bjvrn Ketelaars wrote:
 After some recent discussions [1, 2] on the topic of unbound in base, and
 (more important) really liking the idea of an alternative for BIND in base, I
 made a start with fitting the different pieces of the puzzle. What is
 finished:

 2.) Testing (read: does it compile and work) on AMD64.

amd64 is easy, better questions are things like does it build/work on vax
(gcc2, no shared libs), does it work on unusual arch like hppa, etc.

 What to do with the BIND tools (dig/host/nslookup)?
 
 Unbound offers drill. From drill.1: The name drill is a pun on dig. With
 drill you should be able get even more information than with dig.. Proposal
 therefore is to replace the BIND tools with drill.

I don't think drill is quite a sufficient replacement for dig yet,
and the other tools are certainly still used and I'd expect to find them
in the base OS. So at this point I think they should stay.

 From unbound-anchor.8 I understand that unbound-anchor can be run from the
 command line, or run as part of startup scripts _before_ the actual (unbound)
 DNS server is started. So there is no need for DNS. Proposal therefor is to
 run unbound-anchor automatically before starting the unbound daemon (rc_pre in
 unbound rc-script).

This (i.e. connecting out to https://data.iana.org from the system startup
scripts) should *not* happen by default even if unbound is enabled. There
would need to be a separate option controlling this.

 After tar/gzip the source files and Makefile wrappers weigh ~4.6MB. A bit to
 large to send to this list. if anyone feels like looking at the workbdo not
 hesitate to mail me.

Please do. It would be nice to put them on a public server.