FAQ#16 - add link

2019-03-28 Thread Oleg Pahl

Hi,

please check my diff for www part of cvs (faq16.html).

ok?

BR

Oleg Pahl

Index: faq/faq16.html
===
RCS file: /cvs/www/faq/faq16.html,v
retrieving revision 1.13
diff -u -p -u -p -r1.13 faq16.html
--- faq/faq16.html	21 Jan 2019 02:29:34 -	1.13
+++ faq/faq16.html	28 Mar 2019 10:10:18 -
@@ -290,7 +290,7 @@ This option only works for Ethernet-base
 prevents wireless interfaces from participating in network bridges.
 
 
-Create the bridge0 interface with the host network interface as a
+Create the https://man.openbsd.org/bridge";>bridge(4) interface with the host network interface as a
 bridge port.
 In this example, the host network interface is em0 - you should
 substitute the interface name that you wish to connect the VM to:


security.html -> patch

2019-02-19 Thread Oleg Pahl

Hi @all,


in an attachment you can find one more patch for *security.html page.

Link:

https://www.openbsd.org/security.html

please confirm.


-Oleg Pahl

Index: security.html
===
RCS file: /cvs/www/security.html,v
retrieving revision 1.438
diff -u -r1.438 security.html
--- security.html    19 Feb 2019 10:17:31 -    1.438
+++ security.html    19 Feb 2019 10:50:37 -
@@ -136,7 +136,7 @@
 have fixed many simple and obvious careless programming errors in code
 and only months later discovered that the problems were in fact
 exploitable.  (Or, more likely someone on
-http://online.securityfocus.com/archive/1";>BUGTRAQ
+https://www.securityfocus.com/archive/1";>BUGTRAQ
 would report that other operating systems were vulnerable to a `newly
 discovered problem', and then it would be discovered that OpenBSD had
 been fixed in a previous release).  In other cases we have been saved
@@ -178,7 +178,7 @@
 Our proactive auditing process has really paid off.  Statements like
 ``This problem was fixed in OpenBSD about 6 months ago'' have become
 commonplace in security forums like
-http://online.securityfocus.com/archive/1";>BUGTRAQ.
+https://www.securityfocus.com/archive/1";>BUGTRAQ.

 The most intense part of our security auditing happened immediately
 before the OpenBSD 2.0 release and during the 2.0->2.1 transition,

Index: security.html
===
RCS file: /cvs/www/security.html,v
retrieving revision 1.438
diff -u -r1.438 security.html
--- security.html   19 Feb 2019 10:17:31 -  1.438
+++ security.html   19 Feb 2019 10:50:37 -
@@ -136,7 +136,7 @@
 have fixed many simple and obvious careless programming errors in code
 and only months later discovered that the problems were in fact
 exploitable.  (Or, more likely someone on
-http://online.securityfocus.com/archive/1";>BUGTRAQ
+https://www.securityfocus.com/archive/1";>BUGTRAQ
 would report that other operating systems were vulnerable to a `newly
 discovered problem', and then it would be discovered that OpenBSD had
 been fixed in a previous release).  In other cases we have been saved
@@ -178,7 +178,7 @@
 Our proactive auditing process has really paid off.  Statements like
 ``This problem was fixed in OpenBSD about 6 months ago'' have become
 commonplace in security forums like
-http://online.securityfocus.com/archive/1";>BUGTRAQ.
+https://www.securityfocus.com/archive/1";>BUGTRAQ.
 
 The most intense part of our security auditing happened immediately
 before the OpenBSD 2.0 release and during the 2.0->2.1 transition,


security.html -> broken link

2019-02-19 Thread Oleg Pahl

Hi @all,

On https://www.openbsd.org/security.html there is a broken link.


 --->


 Full Disclosure

Like many readers of theBUGTRAQ mailing list 
<http://online.securityfocus.com/archive/1>, we believe in full 
disclosure of security problems.


* http://online.securityfocus.com/archive/1

<---

Please check!

BR,

Oleg Pahl



PKG_SIGN(1) - D argument

2019-02-15 Thread Oleg Pahl

Hi @all,

Is it ok, that on man page *PKG_SIGN(1)* there is*[-D name=[value]]* 
argument,


but there is no info about value of arg. below ... (I mean what kind of 
value's is possible to use with -D)


I think, that its will be better to put this Info on man page. Not just 
for me =)


Many thx for all.

BR,

Oleg Pahl



Re: man -> vim

2019-02-15 Thread Oleg Pahl

Perfect !

Thanks all !

On 2/15/19 11:35 AM, Otto Moerbeek wrote:

On Fri, Feb 15, 2019 at 11:19:57AM +0100, Oleg Pahl wrote:


Hi @all,

Today I try to work with man pages using *vim*.

*# man man | vim -*

why i see raw (a lot of special char.) data by default? is it ok?

*# ma man | less *

I see no special characters. looks very good.

Is it possible to convert *raw* data of man page to normal format (for
*vim*) with one command?

BR,

-op


Pipe through col -b

-Otto




man -> vim

2019-02-15 Thread Oleg Pahl

Hi @all,

Today I try to work with man pages using *vim*.

*# man man | vim -*

why i see raw (a lot of special char.) data by default? is it ok?

*# ma man | less *

I see no special characters. looks very good.

Is it possible to convert *raw* data of man page to normal format (for 
*vim*) with one command?


BR,

-op



firmware.openbsd.org (SHA256)

2019-02-13 Thread Oleg Pahl

Hi all,

I use 6.4 Release.
I install fm on my laptop from http://firmware.openbsd.org/firmware/6.4/
This URL i found in man page FW_UPDATE(1)
You can see that ( index.txt ) has one file more then as on server!

---

From index.txt:

-rw-r--r--  1 0  0 1707 Oct 16 22:41:37 2018 SHA256

---


This file I need to check that NSA don't ...

Please explain me why this file is absent on -> firmware.openbsd.org

BR,
Oleg Pahl

/
Index of 6.4/

drwxr-xr-x  2019-02-12 13:53../  
<http://firmware.openbsd.org/firmware/>
-r--r--r--  18572018-10-16 22:41SHA256.sig  
<http://firmware.openbsd.org/firmware/6.4/SHA256.sig>
-r--r--r--  132269  2018-10-16 22:41acx-firmware-1.4p5.tgz  
<http://firmware.openbsd.org/firmware/6.4/acx-firmware-1.4p5.tgz>
-r--r--r--  175991  2018-10-16 22:41athn-firmware-1.1p4.tgz  
<http://firmware.openbsd.org/firmware/6.4/athn-firmware-1.1p4.tgz>
-r--r--r--  9464409 2018-10-16 22:41bwfm-firmware-20171125.tgz  
<http://firmware.openbsd.org/firmware/6.4/bwfm-firmware-20171125.tgz>
-r--r--r--  39394   2018-10-16 22:41bwi-firmware-1.4p4.tgz  
<http://firmware.openbsd.org/firmware/6.4/bwi-firmware-1.4p4.tgz>
-r--r--r--  16762018-10-16 22:41index.txt  
<http://firmware.openbsd.org/firmware/6.4/index.txt>
-r--r--r--  1586910 2018-10-16 22:41intel-firmware-20180807p0v0.tgz  
<http://firmware.openbsd.org/firmware/6.4/intel-firmware-20180807p0v0.tgz>
-r--r--r--  250278  2018-10-16 22:41ipw-firmware-1.3p2.tgz  
<http://firmware.openbsd.org/firmware/6.4/ipw-firmware-1.3p2.tgz>
-r--r--r--  272109  2018-10-16 22:41iwi-firmware-3.1p2.tgz  
<http://firmware.openbsd.org/firmware/6.4/iwi-firmware-3.1p2.tgz>
-r--r--r--  4139154 2018-10-16 22:41iwm-firmware-0.20170105.tgz  
<http://firmware.openbsd.org/firmware/6.4/iwm-firmware-0.20170105.tgz>
-r--r--r--  3233866 2018-10-16 22:41iwn-firmware-5.11p1.tgz  
<http://firmware.openbsd.org/firmware/6.4/iwn-firmware-5.11p1.tgz>
-r--r--r--  140369  2018-10-16 22:41malo-firmware-1.4p4.tgz  
<http://firmware.openbsd.org/firmware/6.4/malo-firmware-1.4p4.tgz>
-r--r--r--  49935   2018-10-16 22:41otus-firmware-1.0p1.tgz  
<http://firmware.openbsd.org/firmware/6.4/otus-firmware-1.0p1.tgz>
-r--r--r--  162130  2018-10-16 22:41pgt-firmware-1.2p4.tgz  
<http://firmware.openbsd.org/firmware/6.4/pgt-firmware-1.2p4.tgz>
-r--r--r--  5218724 2018-10-16 22:41radeondrm-firmware-20170119.tgz  
<http://firmware.openbsd.org/firmware/6.4/radeondrm-firmware-20170119.tgz>
-r--r--r--  65551   2018-10-16 22:41rsu-firmware-1.2p1.tgz  
<http://firmware.openbsd.org/firmware/6.4/rsu-firmware-1.2p1.tgz>
-r--r--r--  75328   2018-10-16 22:41rtwn-firmware-20180103.tgz  
<http://firmware.openbsd.org/firmware/6.4/rtwn-firmware-20180103.tgz>
-r--r--r--  73476   2018-10-16 22:41uath-firmware-2.0p1.tgz  
<http://firmware.openbsd.org/firmware/6.4/uath-firmware-2.0p1.tgz>
-r--r--r--  24371   2018-10-16 22:41upgt-firmware-1.1p4.tgz  
<http://firmware.openbsd.org/firmware/6.4/upgt-firmware-1.1p4.tgz>
-r--r--r--  63587   2018-10-16 22:41urtwn-firmware-20180103.tgz  
<http://firmware.openbsd.org/firmware/6.4/urtwn-firmware-20180103.tgz>
-r--r--r--  68204   2018-10-16 22:41uvideo-firmware-1.2p2.tgz  
<http://firmware.openbsd.org/firmware/6.4/uvideo-firmware-1.2p2.tgz>
-r--r--r--  45960   2018-10-16 22:41vmm-firmware-1.11.0p0.tgz  
<http://firmware.openbsd.org/firmware/6.4/vmm-firmware-1.11.0p0.tgz>
-r--r--r--  66182   2018-10-16 22:41wpi-firmware-3.2p1.tgz  
<http://firmware.openbsd.org/firmware/6.4/wpi-firmware-3.2p1.tgz>




CRYPTO CONTAINER

2019-02-11 Thread Oleg Pahl

Hi All,

Linux has one tool CRYPTSETUP.

With this tool I can prepare one container, then open it put some 
private data and close.


I know that our OpenBSD is also Crypto Paranoid OS.

Any idea how can I do the same procedure using OBSD default tools?

What is recommended work flow for it (to secure file/data) ?

P.S. I have full encrypted hard disk. But its not enough for me.

Many thx for strong support.

BR,

deface