Formación de Auditores Internos ISO 9001. publicidad te geh
[demime 1.01d removed an attachment of type image/jpeg which had a name of fsemasiologia.jpg] [demime 1.01d removed an attachment of type image/jpeg which had a name of chancuco.jpg]
Re: urtwn0 does not recover from suspend
On Sun, Feb 12, 2012 at 7:45 PM, Edd Barrett vex...@gmail.com wrote: Hi, I think i discussed this with someone before, but I forget where we got with it. Pretty bad timing, I know. Bring a urtwn interface up, put system to sleep with zzz, then wake it, firmware shits itself: urtwn0: could not send firmware command 5 urtwn0: could not send firmware command 5 urtwn0: device timeout urtwn0: could not send firmware command 5 urtwn0: could not send firmware command 5 ... This is not all that severe because it can be worked around: See these for a workaround: http://marc.info/?l=openbsd-miscm=130640496205737 http://marc.info/?l=openbsd-miscm=130640580006765 i.e.: use /etc/apm/suspend, /etc/apm/resume to down/up the interface. But, yes, this should be fixed properly ciao, David
relayd UDP bug and patch ...
Hello tech@ There is a bug in relayd which is related to udp relays. It can be triggered with the following relayd.conf: relayd_addr=192.168.10.2 relayd_port=53 table dns_servers { 10.10.10.2 } dns_servers_port=53 interval 10 timeout 200 dns protocol dnsfilter { tcp { nodelay, sack, socket buffer 1024, backlog 1000 } } relay dnsproxy { listen on $relayd_addr port $relayd_port protocol dnsfilter forward to dns_servers port $dns_servers_port \ mode loadbalance check tcp } nslookup via 192.168.10.2 triggers a coredump in relayd. The problem is within relay_dns_request() in relay_udp.c, env is a NULL pointer but env-sc_timeout is used in event_again(). Here is my patch: --- relay_udp.c.origMon Feb 13 16:29:07 2012 +++ relay_udp.c Mon Feb 13 16:32:20 2012 @@ -474,6 +474,8 @@ if (gettimeofday(con-se_tv_start, NULL) == -1) return (-1); + bcopy( rlay-rl_conf.timeout, con-se_timeout, sizeof( con-se_timeout )); + if (rlay-rl_dsttable != NULL) { if (relay_from_table(con) != 0) return (-1); @@ -508,7 +510,7 @@ } event_again(con-se_ev, con-se_out.s, EV_TIMEOUT|EV_READ, - relay_udp_response, con-se_tv_start, env-sc_timeout, con); + relay_udp_response, con-se_tv_start, con-se_timeout, con); return (0); } Best regards, Tom
Re: fix incorrect document titles in several man pages
On 11 February 2012 13:56, Jason McIntyre j...@cava.myzen.co.uk wrote: On Sat, Feb 11, 2012 at 10:26:18AM -0200, Christiano F. Haesbaert wrote: Reads fine to me, any objections ? jmc ? i had just filed this under look at after lock, but if you want to take it on, that's fine. No problem, let us wait for the unlock then, I was only making sure this wouldn't die. note there is no rpcauth function, so that page should probably be renamed (to something which does exist). except for that niggle, the rest of the diff looks correct. jmc On 10 February 2012 03:50, Lawrence Teo l...@lteo.net wrote: This diff fixes several man pages that have incorrect document titles (.Dt). Lawrence Index: src/bin/md5/sha256.1 === RCS file: /cvs/src/bin/md5/sha256.1,v retrieving revision 1.3 diff -u -p -r1.3 sha256.1 --- src/bin/md5/sha256.1 ? ? ? ?3 Sep 2010 09:53:20 - ? ? ? 1.3 +++ src/bin/md5/sha256.1 ? ? ? ?10 Feb 2012 05:41:09 - @@ -19,7 +19,7 @@ ?.\ Materiel Command, USAF, under agreement number F39502-99-1-0512. ?.\ ?.Dd $Mdocdate: September 3 2010 $ -.Dt SHA1 1 +.Dt SHA256 1 ?.Os ?.Sh NAME ?.Nm sha256 Index: src/lib/libc/rpc/rpcauth.3 === RCS file: /cvs/src/lib/libc/rpc/rpcauth.3,v retrieving revision 1.15 diff -u -p -r1.15 rpcauth.3 --- src/lib/libc/rpc/rpcauth.3 ?7 Sep 2010 19:52:37 - ? ? ? 1.15 +++ src/lib/libc/rpc/rpcauth.3 ?10 Feb 2012 05:41:09 - @@ -31,7 +31,7 @@ ?.\ ? OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ?.\ ?.Dd $Mdocdate: September 7 2010 $ -.Dt RPC 3 +.Dt RPCAUTH 3 ?.Os ?.Sh NAME ?.Nm auth_destroy , Index: src/lib/libc/time/wcsftime.3 === RCS file: /cvs/src/lib/libc/time/wcsftime.3,v retrieving revision 1.1 diff -u -p -r1.1 wcsftime.3 --- src/lib/libc/time/wcsftime.3 ? ? ? ?10 Oct 2011 14:40:25 - ? ? ?1.1 +++ src/lib/libc/time/wcsftime.3 ? ? ? ?10 Feb 2012 05:41:09 - @@ -14,7 +14,7 @@ ?.\ OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. ?.\ ?.Dd $Mdocdate: October 10 2011 $ -.Dt STRFTIME 3 +.Dt WCSFTIME 3 ?.Os ?.Sh NAME ?.Nm wcsftime Index: src/lib/libm/man/sin.3 === RCS file: /cvs/src/lib/libm/man/sin.3,v retrieving revision 1.13 diff -u -p -r1.13 sin.3 --- src/lib/libm/man/sin.3 ? ? ?7 Jul 2011 01:34:52 - ? ? ? 1.13 +++ src/lib/libm/man/sin.3 ? ? ?10 Feb 2012 05:41:09 - @@ -29,7 +29,7 @@ ?.\ ? ? from: @(#)cos.3 ? ? ? ?5.1 (Berkeley) 5/2/91 ?.\ ?.Dd $Mdocdate: July 7 2011 $ -.Dt COS 3 +.Dt SIN 3 ?.Os ?.Sh NAME ?.Nm sin , Index: src/libexec/login_krb5/login_krb5.8 === RCS file: /cvs/src/libexec/login_krb5/login_krb5.8,v retrieving revision 1.16 diff -u -p -r1.16 login_krb5.8 --- src/libexec/login_krb5/login_krb5.8 1 Feb 2012 17:32:59 - ? ? ? 1.16 +++ src/libexec/login_krb5/login_krb5.8 10 Feb 2012 05:41:09 - @@ -15,7 +15,7 @@ ?.\ OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. ?.\ ?.Dd $Mdocdate: February 1 2012 $ -.Dt LOGIN_KERBEROS 8 +.Dt LOGIN_KRB5 8 ?.Os ?.Sh NAME ?.Nm login_krb5 Index: src/usr.bin/bgplg/bgplgsh.8 === RCS file: /cvs/src/usr.bin/bgplg/bgplgsh.8,v retrieving revision 1.5 diff -u -p -r1.5 bgplgsh.8 --- src/usr.bin/bgplg/bgplgsh.8 13 Oct 2010 18:56:03 - ? ? ?1.5 +++ src/usr.bin/bgplg/bgplgsh.8 10 Feb 2012 05:41:09 - @@ -15,7 +15,7 @@ ?.\ OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. ?.\ ?.Dd $Mdocdate: October 13 2010 $ -.Dt BGPLG 8 +.Dt BGPLGSH 8 ?.Os ?.Sh NAME ?.Nm bgplgsh
Unbound in base
Hello, After some recent discussions [1, 2] on the topic of unbound in base, and (more important) really liking the idea of an alternative for BIND in base, I made a start with fitting the different pieces of the puzzle. What is finished: 1.) Integration of ldns 1.6.12 and unbound 1.4.15 and writing of relevant Makefile wrappers. Wrapper script also compiles and installs drill; 2.) Testing (read: does it compile and work) on AMD64. Stuart Henderson had some good remarks on integrating the above [3]. What do you guys think of the following: What to do with the BIND tools (dig/host/nslookup)? Unbound offers drill. From drill.1: The name drill is a pun on dig. With drill you should be able get even more information than with dig.. Proposal therefore is to replace the BIND tools with drill. Do we run unbound-anchor automatically? if so, how do we handle possibly not having working DNS at that time to resolve data.iana.org (http://data.iana.org) (http://data.iana.org)? From unbound-anchor.8 I understand that unbound-anchor can be run from the command line, or run as part of startup scripts _before_ the actual (unbound) DNS server is started. So there is no need for DNS. Proposal therefor is to run unbound-anchor automatically before starting the unbound daemon (rc_pre in unbound rc-script). How and when do we automatically generate unbound-control keys? if so, where should that be done? b From unbound-control.8: The script unbound-control-setup generates these control keys in the default run directory. If you change the access control permissions on the key files you can decide who can use unbound-control. Run the script under the same username as you have configured in unbound.conf or as root, so that the daemon is permitted to read the files, for example with: sudo -u unbound unbound-control-setup. If you have not configured a username in unbound.conf, the keys need read permission for the user credentials under which the daemon is started. The script preserves private keys present in the directory. After running the script as root, turn on control-enable in unbound.conf. The unbound-control-script can be called from rc-make_keys(). The knob 'control-enable' can be set as default. After tar/gzip the source files and Makefile wrappers weigh ~4.6MB. A bit to large to send to this list. if anyone feels like looking at the workbdo not hesitate to mail me. Again, what do you guys think? Kind regards, BjC6rn [1] http://marc.info/?l=openbsd-miscm=132205020820910w=2 [2] http://marc.info/?l=openbsd-techm=132573371521516w=2 [3] http://marc.info/?l=openbsd-miscm=132217547525487w=2
Re: Unbound in base
On 2012/02/13 22:35, Bjvrn Ketelaars wrote: After some recent discussions [1, 2] on the topic of unbound in base, and (more important) really liking the idea of an alternative for BIND in base, I made a start with fitting the different pieces of the puzzle. What is finished: 2.) Testing (read: does it compile and work) on AMD64. amd64 is easy, better questions are things like does it build/work on vax (gcc2, no shared libs), does it work on unusual arch like hppa, etc. What to do with the BIND tools (dig/host/nslookup)? Unbound offers drill. From drill.1: The name drill is a pun on dig. With drill you should be able get even more information than with dig.. Proposal therefore is to replace the BIND tools with drill. I don't think drill is quite a sufficient replacement for dig yet, and the other tools are certainly still used and I'd expect to find them in the base OS. So at this point I think they should stay. From unbound-anchor.8 I understand that unbound-anchor can be run from the command line, or run as part of startup scripts _before_ the actual (unbound) DNS server is started. So there is no need for DNS. Proposal therefor is to run unbound-anchor automatically before starting the unbound daemon (rc_pre in unbound rc-script). This (i.e. connecting out to https://data.iana.org from the system startup scripts) should *not* happen by default even if unbound is enabled. There would need to be a separate option controlling this. After tar/gzip the source files and Makefile wrappers weigh ~4.6MB. A bit to large to send to this list. if anyone feels like looking at the workbdo not hesitate to mail me. Please do. It would be nice to put them on a public server.