On Tue, 26 Jun 2012, Norman Golisz wrote:
Hi Darrel,
On Tue Jun 26 2012 14:58, Darrel wrote:
We have less limitation on partitioning these days, so /usr/obj
was obvious- actually had that one before. I chose /usr/src and
/usr/local as well, and expect that this was unimportant unless
moving
I am trying to achieve something I thought would be simple, but
haven't had any luck.
I have an OpenBSD 5.0 router/firewall with public IP X.X.X.A
Behind it are a mix of OpenBSD and Linux systems, all with public IP. NO NAT.
I run ssh on an alternate port, XXX22. However, from a certain
We have less limitation on partitioning these days, so /usr/obj
was obvious- actually had that one before. I chose /usr/src and
/usr/local as well, and expect that this was unimportant unless
moving into NFS or some special circumstance.
I have looked at some of the things that folks are doing
Darrel
On Tue, 26 Jun 2012, Micha? Markowski wrote:
2012/6/26 Darrel levi...@iglou.com:
does anyone have some neat ideas about partitions under /var?
Are you familiar with FAQ?
http://openbsd.org/faq/faq4.html#Partitioning
Good point, Micha.
I should consider /var/www
Thank you,
Darrel
On 2012 Jul 09 (Mon) at 15:20:19 +1000 (+1000), David Diggles wrote:
:dmesg|grep ^cpu[0-9]*:
Every time I see this, I stop reading the mail. Please, for the love of
everything (un)holy, stop doing this.
--
An Englishman never enjoys himself, except for a noble purpose.
-- A. P.
On Mon, Jul 9, 2012 at 5:03 AM, Nico Kadel-Garcia nka...@gmail.com wrote:
Many of us can comfortably disable UEFI, but it's going to be
problematic for our less skilled colleagues.
Well, are you sure UEFI disable button will turn off ALL of UEFI functions?
Also, UEFI will possibly take down a
On Mon, Jul 09, 2012 at 10:22:34AM +0200, Peter Hessler wrote:
On 2012 Jul 09 (Mon) at 15:20:19 +1000 (+1000), David Diggles wrote:
:dmesg|grep ^cpu[0-9]*:
Every time I see this, I stop reading the mail. Please, for the love of
everything (un)holy, stop doing this.
--
An Englishman
On Sun, Jun 17, 2012 at 2:45 AM, Theo de Raadt dera...@cvs.openbsd.org wrote:
They started the fork because they got kicked out because one
developer (Marco) hired 5 other developers for his startup company,
and attempted to hire around 10 other developers in a sneaky and
underhanded way.
Well, are you sure UEFI disable button will turn off ALL of UEFI
functions?
With that virtualization, both hardware bugs and attacks against
hypervisors are real world cases. So don't be naive.
Trust me, I'll try hard to avoid virtualization and Fedora@UEFI on my
firewalls, no matter
Hi,
I disabled a few user account on my 5.1 by letting them expire yesterday
(is that the correct way)? When testing today that the account are
indeed unavailable, this is what I get:
Checking the /etc/master.passwd file:
Login koles has expired.
Login lubosek has expired.
# su -
http://www.h-online.com/security/news/item/John-the-Ripper-now-able-to-crack-office-files-and-use-GPUs-1631901.html
bcrypt kicks pams ass due to being memory intensive. :-)
I thought I saw a commit raising the default rounds in login.conf but
they don't seem to have raised, am I mistaken?
--
On Mon, Jul 9, 2012 at 11:55 AM, Siju George sgeorge@gmail.com wrote:
On Sun, Jun 17, 2012 at 2:45 AM, Theo de Raadt dera...@cvs.openbsd.org
wrote:
They started the fork because they got kicked out because one
developer (Marco) hired 5 other developers for his startup company,
and
I tend to get old computers from folks that upgrade and actually
have a DNS Server running on an Intel built for windows95. :)
Yeah, BSDs deal fine with old computers and limited resources. I love
that, too. :)
And for the sake of comparison, I have a FreeBSD machine with ZFS
filesystem
On Mon, Jul 9, 2012 at 11:55 AM, Siju George sgeorge@gmail.com wrote:
On Sun, Jun 17, 2012 at 2:45 AM, Theo de Raadt dera...@cvs.openbsd.org
wrote:
They started the fork because they got kicked out because one
developer (Marco) hired 5 other developers for his startup company,
and
On 2012-07-09, Fil DiNoto fdin...@gmail.com wrote:
I am trying to achieve something I thought would be simple, but
haven't had any luck.
I have an OpenBSD 5.0 router/firewall with public IP X.X.X.A
Behind it are a mix of OpenBSD and Linux systems, all with public IP. NO NAT.
I run ssh on
2012/7/9 Stuart Henderson s...@spacehopper.org
On 2012-07-09, Fil DiNoto fdin...@gmail.com wrote:
I am trying to achieve something I thought would be simple, but
haven't had any luck.
I have an OpenBSD 5.0 router/firewall with public IP X.X.X.A
Behind it are a mix of OpenBSD and
On 2012-07-09 10:17, Stuart Henderson wrote:
On 2012-07-09, Fil DiNotofdin...@gmail.com wrote:
But i was wondering if I could achieve something that would work for
ALL the addresses behind the router as well without creating
individual rules for each address. Something like this:
pass in on
Hello,
I'm pretty sure the problem is on my end but I'm running out of ideas on
how to get gimp to work with jpegs again. Any pointers welcome. Details
below.
pkesh...@gmail.com (patrick keshishian), 2012.07.05 (Thu) 23:36 (CEST):
On Tue, Jul 3, 2012 at 2:35 PM, Fred Crowson
Hi,
Was there any bugfixes between 5.0 and 5.1 that would allow certain packets
through the pf filter? I have a case where I cannot block a certain IP on
a 5.0 box. I tested that same IP on an 5.1 box with a spoofer and I found
my same rules to catch, so it's not my logic I don't think.
I
You need to provide more information about your situation to be able to
help you. dmesg, pf ruleset, network config., etc.
-luis
On Mon, Jul 9, 2012 at 12:34 PM, Peter J. Philipp p...@centroid.eu wrote:
Hi,
Was there any bugfixes between 5.0 and 5.1 that would allow certain packets
through
On Fri, 2012-07-06 at 10:00 +, Stuart Henderson wrote:
On 2012-07-04, mlambda mlam...@gmail.com wrote:
Sometimes the touchpad doesn't work (the two buttons work, but the
cursor doesn't move), unfortunately this doesn't seem to be reproducible
and can only be fixed by rebooting.
I
On Mon, Jul 09, 2012 at 12:47:18PM -0600, Luis Coronado wrote:
You need to provide more information about your situation to be able to
help you. dmesg, pf ruleset, network config., etc.
-luis
Due to the sensitivity of the host I cannot do that. But I'll tell you what
I will do. Upgrade.
I would take steps to see if another rule is being matched when you see the
flaw?
Brian
On Jul 9, 2012 12:28 PM, Peter J. Philipp p...@centroid.eu wrote:
On Mon, Jul 09, 2012 at 12:47:18PM -0600, Luis Coronado wrote:
You need to provide more information about your situation to be able to
You should find a file named gaim.core in your home directory, try to
analyze it using gdb. Also, better, try to run gaim from gdb and see
if you call pull some extra infos. Maybe they are helpful.
I got some segmentation faults with blender, another graphical
frontend but from a discussion with
Rudolf Leitgeb wrote:
For 15+ years I read these regular Cassandra calls that this and that
innovation will kill free operating systems on commodity hardware,
remember Adaptec SCSI controllers, 3D video cards, I2O, trusted
computing and whatever the feature of the day is called.
It very
Use 'pfctl -vvss' to see which rule it is matching on. I bet you have a
rule that matches that traffic.
On 2012 Jul 09 (Mon) at 20:34:55 +0200 (+0200), Peter J. Philipp wrote:
:Hi,
:
:Was there any bugfixes between 5.0 and 5.1 that would allow certain packets
:through the pf filter? I have a
On Mon, Jul 09, 2012 at 10:21:47PM +0200, Peter Hessler wrote:
Use 'pfctl -vvss' to see which rule it is matching on. I bet you have a
rule that matches that traffic.
That was the hint I needed. Thanks! It did cross my mind and I did dump
the states before but I must have missed that IP in
On 2012-07-09, Simon Perreault sperrea...@openbsd.org wrote:
On 2012-07-09 10:17, Stuart Henderson wrote:
On 2012-07-09, Fil DiNotofdin...@gmail.com wrote:
But i was wondering if I could achieve something that would work for
ALL the addresses behind the router as well without creating
On 2012-07-09, MERIGHI Marcus mcmer-open...@tor.at wrote:
both hints were not enough on my very dirty (as in: updating not
reinstalling for years) notebook:
That really shouldn't make a difference.
Though I have run ``pkg_add -v -v -u -i -D update -D updatedepends'',
Hi,
so we were used for a dns amplification attack. Some jackass thought
it would be a good idea to send us ~50k qps with the DO flag set and
type ANY. This would have resulted in ~750mbit/s outbound traffic.
For all you masochists out there, this is the iptables rule I came up with:
iptables
30 matches
Mail list logo