A quick thought... are you extracting src.tar.gz into /usr (like you to
with ports.tar.gz)? On a few occasions, I've done this (instead of making
sure I'm in /usr/src first as I should) and had system binaries get
clobbered. When I've accidentally done this in the past, I do get a bunch
of abort
On Wed, Nov 15, 2017 at 03:04:15PM -0500, mabi wrote:
> Hi,
>
> I just got myself a new firewall device (Lanner FW-7526) to replace my dying
> Soekris box. That new firewall shipped with an Atheros AR9300 wireless chip
> and just realized from the dmesg output and athn man page (OpenBSD 6.2)
On Wed, Nov 15, 2017 at 06:39:20PM +, Roderick wrote:
>
> I get in dmesg:
>
> ath0 at pci1 dev 0 function 0 "Atheros AR5424" rev 0x01: apic 1 int 16
> ath0: AR5424 14.2 phy 7.0 rf 10.2 eeprom 5.3, EU1W, address
> 00:24:2b:e3:03:40
> [...]
> ath0: unable to reset hardware; hal status
On 11/15/17, Philip Guenther wrote:
> On Wed, Nov 15, 2017 at 11:08 AM, Mike Coddington
> wrote:
>
>> On Wed, Nov 15, 2017 at 10:01:09AM -0600, Daniel Boyd wrote:
>> > I've installed OpenBSD/macppc twice on my G4 Cube now and it seems to
>> > be working
On Wed, 2017-11-15 at 13:35 -0800, Philip Guenther wrote:
>
> tar _is_ pax:
> : corwin; ls -li /bin/tar /bin/pax
> 52015 -r-xr-xr-x 3 root bin 433472 Nov 1 11:15 /bin/pax
> 52015 -r-xr-xr-x 3 root bin 433472 Nov 1 11:15 /bin/tar
> : corwin;
>
> Fundamentally, unless a userspace process
On Wed, Nov 15, 2017 at 11:08 AM, Mike Coddington
wrote:
> On Wed, Nov 15, 2017 at 10:01:09AM -0600, Daniel Boyd wrote:
> > I've installed OpenBSD/macppc twice on my G4 Cube now and it seems to
> > be working fine until I go to untar src.tar.gz at which point it throws
> >
On 11/15/17 21:50, James wrote:
> On Wed, Nov 15, 2017 at 3:06 PM, Gareth Nelson
> wrote:
>> Use key-based authentication?
>>
>
> Okay, but that doesn't fit the requirement.
> I want something iteratively password free.
> AFAIK, somewhere along the line in key-based
> On Wed, Nov 15, 2017 at 3:06 PM, Gareth Nelson wr=
> ote:
> > Use key-based authentication?
> >
>
> Okay, but that doesn't fit the requirement.
> I want something iteratively password free.
> AFAIK, somewhere along the line in key-based authentication you need
> to
On Wed, Nov 15, 2017 at 3:06 PM, Gareth Nelson wrote:
> Use key-based authentication?
>
Okay, but that doesn't fit the requirement.
I want something iteratively password free.
AFAIK, somewhere along the line in key-based authentication you need
to enter a password to
On Wed, 2017-11-15 at 13:08 -0600, Mike Coddington wrote:
> On Wed, Nov 15, 2017 at 10:01:09AM -0600, Daniel Boyd wrote:
> > I've installed OpenBSD/macppc twice on my G4 Cube now and it seems
> > to
> > be working fine until I go to untar src.tar.gz at which point it
> > throws
> > some abort trap
Hi,
I just got myself a new firewall device (Lanner FW-7526) to replace my dying
Soekris box. That new firewall shipped with an Atheros AR9300 wireless chip and
just realized from the dmesg output and athn man page (OpenBSD 6.2) that this
chip must not be supported (yet).
The dmesg output is
http://www.congatec.com/en/products/smarc/conga-sa5.html
I would like to get a number of intel device IDs and/or drivers working
with OpenBSD including broxton graphics 0x5a85 and azalia sound 0x5a98.
Can I help in any way such as by providing patches or is it simply a
case of waiting for a sync
On Wed, Nov 15, 2017 at 10:01:09AM -0600, Daniel Boyd wrote:
> I've installed OpenBSD/macppc twice on my G4 Cube now and it seems to
> be working fine until I go to untar src.tar.gz at which point it throws
> some abort trap errors and crashes. If I reboot, I get a bunch of
> abort traps during
I get in dmesg:
ath0 at pci1 dev 0 function 0 "Atheros AR5424" rev 0x01: apic 1 int 16
ath0: AR5424 14.2 phy 7.0 rf 10.2 eeprom 5.3, EU1W, address
00:24:2b:e3:03:40
[...]
ath0: unable to reset hardware; hal status 3523714312
ath0: unable to reset hardware; hal status 1
I thank for any hint.
Em 15/11/2017 13:38, Silamael escreveu:
Hi,
You could try to set LD_DEBUG=yes before running the test.
With this you should see, what's really missing.
-- Matthias
Thanks Matthias!
I tried that with a perl compiled with debugging symbols (-DDEBUGGING):
dlopen:
Use key-based authentication?
On Wed, Nov 15, 2017 at 2:38 PM, James wrote:
> On Wed, Nov 15, 2017 at 10:42 AM, Raul Miller
> wrote:
> > Assumption is invalid. Flaws are widely documented (e.g. fixed
> > supply). Probably wrong list, also.
> >
>
> Ok
Em 15/11/2017 15:06, Stuart Henderson escreveu:
On 2017-11-15, Stuart Henderson wrote:
If I make a port using the normal ports framework and try it on -current,
I get this, which is a bit further but not all the way :
1..23
ok 1 - use PerlIO::eol;
ok 2
ok 3
ok 4
ok 5
ok
On 11/15/17 18:28, Charlie Eddy wrote:
> Hello,
>
> Please let me know how to find information on OpenBSD security as it
> relates to web browser sessions.
>
> For instance, I am aware that some attack vectors depend on browser
> connections with OS components. What security flaws exist that
On 11/15/2017 02:50 PM, Alceu Rodrigues de Freitas Junior wrote:
Hello folks,
I'm struggling to get installed the module PerlIO::eol by downloding it
from CPAN and installing it.
I tried with both the standard perl in OpenBSD 6.1 and also one that I
compiled with perlbrew, but the results
Hello,
Please let me know how to find information on OpenBSD security as it
relates to web browser sessions.
For instance, I am aware that some attack vectors depend on browser
connections with OS components. What security flaws exist that OpenBSD
specifically is able to address?
Thanks,
On 2017-11-15, Stuart Henderson wrote:
> On 2017-11-15, Alceu Rodrigues de Freitas Junior
> wrote:
>> Hello folks,
>>
>> I'm struggling to get installed the module PerlIO::eol by downloding it
>> from CPAN and installing it.
>>
>> I tried with
I've installed OpenBSD/macppc twice on my G4 Cube now and it seems to
be working fine until I go to untar src.tar.gz at which point it throws
some abort trap errors and crashes. If I reboot, I get a bunch of
abort traps during the boot process followed by several:
init: can't exec getty
On 2017-11-15, Alceu Rodrigues de Freitas Junior
wrote:
> Hello folks,
>
> I'm struggling to get installed the module PerlIO::eol by downloding it
> from CPAN and installing it.
>
> I tried with both the standard perl in OpenBSD 6.1 and also one that I
> compiled with
On Wed, Nov 15, 2017 at 10:42 AM, Raul Miller wrote:
> Assumption is invalid. Flaws are widely documented (e.g. fixed
> supply). Probably wrong list, also.
>
Ok a little more on topic then. SSH.
How would you secure SSH without a password, iteratively password - free?
a
Assumption is invalid. Flaws are widely documented (e.g. fixed
supply). Probably wrong list, also.
Thanks,
--
Raul
On Wed, Nov 15, 2017 at 8:46 AM, James wrote:
> While a little off topic it is security related so I hope you don't mind.
>
> This is the misc list, right?
>
Hello folks,
I'm struggling to get installed the module PerlIO::eol by downloding it
from CPAN and installing it.
I tried with both the standard perl in OpenBSD 6.1 and also one that I
compiled with perlbrew, but the results are the same (after the classic
"perl Makefile.PL; make"):
While a little off topic it is security related so I hope you don't mind.
This is the misc list, right?
Assumption 1.
bitcoin is a secure protocol without flaws.
quote from
https://github.com/bitcoinbook/bitcoinbook/blob/second_edition/ch01.asciidoc
With these keys they can sign transactions
27 matches
Mail list logo