On 2017-02-06, Tinker wrote:
> How use a HDD as crypto softraid root filesystem media, but put boot
> code and cryto softraid keydisk partition (and perhaps /boot file and/or
> kernel) on an USB disk?
Create a bootable OpenBSD area with two OpenBSD partitions on the
USB stick: 'a' with type 4.
On Mon, Feb 06, 2017 at 09:18:09AM -0800, jungle Boogie wrote:
> On 6 February 2017 at 04:41, Marc Espie wrote:
> > On Sat, Feb 04, 2017 at 08:31:45PM -0800, jungle boogie wrote:
> >> On 02/04/2017 05:45 PM, Philip Guenther wrote:
> >> >On Sat, 4 Feb 2017, jungle boogie wrote:
> >> >>What's happen
Just read it today, hopefully it could be useful for the OpenBSD team too:
http://www.prweb.com/releases/2017/02/prweb14044396.htm
https://grsecurity.net/rap_announce_ret.php
https://grsecurity.net/download.php#test
On 6 February 2017 at 04:41, Marc Espie wrote:
> On Sat, Feb 04, 2017 at 08:31:45PM -0800, jungle boogie wrote:
>> On 02/04/2017 05:45 PM, Philip Guenther wrote:
>> >On Sat, 4 Feb 2017, jungle boogie wrote:
>> >>What's happening here?
>> >>
>> >>$ doas pkg_add -u
>> >>Error from http://ftp.openbsd
On 2017-02-06, Tinker wrote:
> The following is for AMD64 though I'd guess that a similar approach
> would be possible on other platforms also.
>
> The boot sequence with MBR is:
>
> MBR: Load PBR (unencrypted)
>
> PBR: Load /boot (encrypted)
/boot is not encrypted. In fact, with r
etherip0 and bridge0 were not up.
I added the up keyword into /etc/hostname.bridge0 and
/etc/hostname.etherip0.
Thanks to Pierre.
Now, I can see traffic crossing the etherip tunnel. But ARP is still not
fully working. I investigate...
2017-02-03 15:11 GMT+01:00 jean-yves boisiaud <
jean-yves.bo
just committed, will be in the next series of snapshots.
so, basic installs create /etc/installurl
now, pkg_add uses it "by default" to create an installpath.
pkg.conf(5) takes precedence (user defines are stronger than
automatic defines):
installpath = anything
in pkg.conf will replace the inst
Op Sat, 04 Feb 2017 10:03:02 +0100 schreef Clint Pachl
:
Can someone explain how the spammer at 81.7.16.33 got white listed by
spamd and delivered 3 spam emails to me? What exactly triggered the
white listing?
I may not understand spamd's behavior, but according to the spamd log
below, the
Hi,
how could I generate sha512 password hashes for Linux on OpenBSD?
Using 'crypto' from Python is no go, as this is OS dependent. So I
tried following via passlib but it does not work, ie. I can't login on EL7.
~~~
#!/usr/bin/python2.7
from passlib.hash import sha512_crypt
import getpass
has
On Sat, Feb 04, 2017 at 08:31:45PM -0800, jungle boogie wrote:
> On 02/04/2017 05:45 PM, Philip Guenther wrote:
> >On Sat, 4 Feb 2017, jungle boogie wrote:
> >>What's happening here?
> >>
> >>$ doas pkg_add -u
> >>Error from http://ftp.openbsd.org/pub/OpenBSD/snapshots/packages/amd64/
> >>ftp: conn
On Fri, Feb 03, 2017 at 04:07:25PM +0100, Boudewijn Dijkstra wrote:
> Op Sat, 28 Jan 2017 06:26:16 +0100 schreef Damian McGuckin
> :
> > What is the recommended most portable way to force memory alignment for
> > a datum of any type, assuming one has a pointer say
> >
> > char *x
> >
> > I
Perhaps I should point out that the only reason I suggested installing
OpenBSD on the stick here was for recovery purposes, and for installing
the boot loader.
The boot loader allows you to select the HDD you have at the start. So
edit /etc/boot.conf *on the stick* as follows:
boot sr0a:/bsd
Tha
Op Sat, 28 Jan 2017 06:26:16 +0100 schreef Damian McGuckin
:
What is the recommended most portable way to force memory alignment for
a datum of any type, assuming one has a pointer say
char *x
I currently use something like
char *xany = aligntonext(x, sizeof(long))
where I
On 2017-02-06 08:40, bytevolc...@safe-mail.net wrote:
Perhaps I should point out that the only reason I suggested installing
OpenBSD on the stick here was for recovery purposes, and for installing
the boot loader.
The boot loader allows you to select the HDD you have at the start. So
edit /etc/b
14 matches
Mail list logo