>Log message:
>Add logger(1) support for daemons that are logging to stdout/stderr
>(mostly from
>the go ecosystem).
>Properly handle failing daemon startup now that we have pipefail.
>
Go can log to syslog. Is this so that panics can also be captured from stderr?
> CVSROOT: /cvs
> Module name: src
> Changes by: n...@cvs.openbsd.org2015/07/19 01:12:58
>
> Modified files:
> lib/libc/sys : tame.2
>
> Log message:
> succesfull -> succesful, from Ross L Richardson
>
I think that should be successful?
p.s. I like the thinking behind tame
On Tue, 10 Feb 2015 06:52:24 -0700
Theo de Raadt wrote:
> > > Document that RFC 5905 (ie. NTP protocol) has a limit which will be
> > > hit before Y2038.
> >
> > RFC868?
>
> No.
>
> Apparently you cannot use google or such before you send a mail.
>
_
On Tue, 10 Feb 2015 06:10:27 -0700 (MST)
Theo de Raadt wrote:
> Document that RFC 5905 (ie. NTP protocol) has a limit which will be
> hit before Y2038.
RFC868?
p.s. Do you think there is *any* chance of getting long long in as
rfc5905 is sometimes used as a reference for other time format
standa
On Sat, 8 Nov 2014 00:06:52 -0700 (MST)
Antoine Jacoutot wrote:
> CVSROOT: /cvs
> Module name: www
> Changes by: ajacou...@cvs.openbsd.org 2014/11/08 00:06:52
>
> Modified files:
> . : want.html
>
> Log message:
> My OpenBSD dev laptop died from an accident last
On Sat, 25 Oct 2014 14:20:25 +0200
Someone wrote:
> > Nick Holland wrote:
> >
> >> encrypted vnd is going away for 5.7. Suggeted by lists at srdn dot
> >> de, thanks!
> >
> > I haven't been able to find this suggestion. Has a maintenance
> > burdon arisen? Otherwise I would argue that it i
On Wed, 22 Oct 2014 08:47:45 -0600 (MDT)
Nick Holland wrote:
> encrypted vnd is going away for 5.7. Suggeted by lists at srdn dot de,
> thanks!
I haven't been able to find this suggestion. Has a maintenance
burdon arisen? Otherwise I would argue that it is more secure
than softraid for small fi
On Thu, 16 Oct 2014 19:55:00 -0600 (MDT)
Ted Unangst wrote:
> remove performance throttling code from here, use the kernel version
> instead. this effectively kills -C, though the option is kept for compat.
>> redo the performance throttling in the kernel.
>> introduce a new sysctl, hw.perfpolicy
lacement 'apropos' on Linux is a tool
to help psychopaths learn to control their anger.
(Kevin Chadwick)
___
previously on this list Mark Kettenis contributed:
> Use Linux compat functions to do kernel memory allocations in the bits of code
> that are shared with Linux. Use OpenBSD functions in the few sports where we
> have our own implementation of bits.
Does this mean that any machines with i915 and
> CVSROOT: /cvs
> Module name: src
> Changes by: d...@cvs.openbsd.org2013/10/09 17:42:17
>
> Modified files:
> usr.bin/ssh: sftp-server.8 sftp-server.c
>
> Log message:
> Add ability to whitelist and/or blacklist sftp protocol requests by name.
> Refactor dispatch loop and
On Thu, 30 Aug 2012 12:57:23 +0100
Stuart Henderson wrote:
> > > > I don't disagree with using AES-128 as default on a possibly busy mail
> > > > server. I was just wondering why the word obsolete was used and if it
> > > > was simply because twofish and AES are faster.
> > >
> > > I don't th
On Wed, 29 Aug 2012 16:12:53 -0400
Ted Unangst wrote:
> >> Seconded. Was going to ask myself.
> >>
> >> > I would have thought AES-128 was more obsolete than blowfish? Speed?
> >> >
> >>
> >> ? How can the current standard be obsolete?
> >
> > Blowfish is strong. I'm sure I read advice to
On Wed, 29 Aug 2012 14:40:13 -0400
Ted Unangst wrote:
> Seconded. Was going to ask myself.
>
> > I would have thought AES-128 was more obsolete than blowfish? Speed?
> >
>
> ? How can the current standard be obsolete?
Blowfish is strong. I'm sure I read advice to move to AES-256 where
poss
> > By default, it will use Blowfish in CBC mode with a different random IV for
> > each envelope and message. User provided key is expanded using sha256 but a
> > different cipher and digest may be specified in smtpd.conf
>
> I think this should default to AES-128. Introducing a new design
> t
> Log message:
> Remove hmac-sha2-256-96 and hmac-sha2-512-96 MACs since they were removed
> from draft6 of the spec and will not be in the RFC when published. Patch
> from mdb at juniper net via bz#2023, ok markus.
aw does it matter if the spec is still fulfilled. I assume it doesn't
state they
On Tue, 17 May 2011 03:08:27 +0200
Henning Brauer wrote:
> you're a victim of western propaganda of course!
I guess it would depend on your definition of a computer from abacus to
mainframe. I wouldn't call it propaganda, certainly not like what the
Romans used to rewrite the History books about
On Mon, 16 May 2011 18:01:26 -0600 (MDT)
Henning Brauer wrote:
> CVSROOT: /cvs
> Module name: www
> Changes by: henn...@cvs.openbsd.org 2011/05/16 18:01:26
>
> Modified files:
> papers : index.html
>
> Log message:
> bsdcan 2011:
> 10 years of pf (henning & ryan)
> OpenBSD
On Wed, 13 Apr 2011 14:53:18 -0600 (MDT)
Gilles Chehade wrote:
> smtpd now uses a ram-queue instead of doing
> a continuous walk on the disk-queue
Does that not increase the chances of losing mail if a crash or panic
occurs? Of course you may deem the performance improvement to be worth
it?
On Tue, 12 Oct 2010 08:52:21 -0600 (MDT)
David Hill wrote:
> CVSROOT: /cvs
> Module name: src
> Changes by: dh...@cvs.openbsd.org 2010/10/12 08:52:21
>
> Modified files:
> usr.sbin/relayd: relay.c
>
> Log message:
> Plug a significant memory leak when using SSL.
>
> ok claudio
On Mon, 11 Oct 2010 13:20:56 +0200
Claudio Jeker wrote:
> On Sun, Oct 10, 2010 at 11:22:03AM +0100, Kevin Chadwick wrote:
> > On Mon, 11 Oct 2010 02:44:35 -0600 (MDT)
> > Claudio Jeker wrote:
> >
> > > CVSROOT: /cvs
> > > Module name: src
> >
On Mon, 11 Oct 2010 02:44:35 -0600 (MDT)
Claudio Jeker wrote:
> CVSROOT: /cvs
> Module name: src
> Changes by: clau...@cvs.openbsd.org 2010/10/11 02:44:34
>
> Modified files:
> sbin/sysctl: sysctl.8
>
> Log message:
> Remove net.inet.tcp.recvspace and net.inet.tcp.sendspace h
22 matches
Mail list logo