Re: OpenBSD 5.5 on mSATA SSD unit in PC Engines APU.1C - "bad dir ino 2 at offset 0: mangled entry"

2014-06-27 Thread Mihai Popescu
It think the designer wanted to keep the board compatible with the old
case, or the other way around. To cool the CPU more one needs better pads (
i doubt there are much better, since the industry has standards) or adds a
fan.

Current situation is like this:

\__/  - CPU
 - PAD
== - Aluminium heatsink
 - PAD
 - CASE

A better approach is a cast aluminium case, but this is too expensive. So
one can do pressed steel sheet like this:

\__/  - CPU
 - PAD
   .
../ \... - CASE

   ^^^
  bend area

This way, one pad and the extra aluminium heat spreader can be out of
equation. Of course, and extra bending of the bottom sheet is needed. Maybe
the price will go higher, maybe the CPU is too far and the bending distance
is too much for the sheet. This is just the industry method, excuse my
ASCII "art", please.



Re: OpenBSD 5.5 on mSATA SSD unit in PC Engines APU.1C - "bad dir ino 2 at offset 0: mangled entry"

2014-06-27 Thread Vladislav Manchev
One of the best pads around are Fujipoly [1] with thermal conductivity 
of 17 W/mK.


These made a big difference on several laptop workstations that were 
having overheating issues.


Some default pads are good enough, but in some cases thermal 
conductivity is a problem and you just need a better pad.


[1] http://www.frozencpu.com/products/17499/thr-181/

On 06/27/2014 09:59 AM, Mihai Popescu wrote:

It think the designer wanted to keep the board compatible with the old
case, or the other way around. To cool the CPU more one needs better pads (
i doubt there are much better, since the industry has standards) or adds a
fan.

Current situation is like this:

 \__/  - CPU
 - PAD
== - Aluminium heatsink
 - PAD
 - CASE

A better approach is a cast aluminium case, but this is too expensive. So
one can do pressed steel sheet like this:

 \__/  - CPU
 - PAD
.
../ \... - CASE

^^^
   bend area

This way, one pad and the extra aluminium heat spreader can be out of
equation. Of course, and extra bending of the bottom sheet is needed. Maybe
the price will go higher, maybe the CPU is too far and the bending distance
is too much for the sheet. This is just the industry method, excuse my
ASCII "art", please.




support new

2014-06-27 Thread Socrates Papachilleos
0
C Cyprus
P Nicosia
T Strovolos
I Socrates Papachilleos
M socratesp1...@gmail.com
B +35799222339
N Over 10 years of experience Technical Support and Consulting for Linux/
OpenBSD networking and Server Administration. Providing fully
customized solutions for Routers/Firewalls,VPN servers, IDS systems.



Re: nat-to private address

2014-06-27 Thread Tuyosi Takesima
Hi,all.
I was able to do it thanks to the instruction of misc all
.I report it.
In addition , this openBSD is running  on USB memory only .
sd1 at scsibus2 targ 1 lun 0:  SCSI4
0/direct removable serial.85641000CE38A0VNSTPO
sd1: 30944MB, 512 bytes/sector, 63373312 sectors


OpenBSD
---
more /etc/sysctl.conf
#   $OpenBSD: sysctl.conf,v 1.54 2012/09/20 12:51:43 yasuoka Exp $
#
# This file contains a list of sysctl options the user wants set at
# boot time.  See sysctl(3) and sysctl(8) for more information on
# the many available variables.
#
net.inet.ip.forwarding=1# 1=Permit forwarding (routing) of IPv4 packets

cat /etc/hostname.rum0
#ext_if
dhcp nwid URoad-662EA0 wpakey 04271


cat /etc/hostname.bge0
#int_if
inet 192.168.11.1 255.255.255.0 NONE


cat /etc/dhcpd.interfaces
bge0


cat /etc/dhcpd.conf
option  domain-name-servers 192.168.100.254  ;
subnet 192.168.11.0 netmask 255.255.255.0 {
option routers 192.168.11.1;
range 192.168.11.10 192.168.11.11;

}



cat /etc/pf.conf
# macros
int_if="bge0"
ext_if="rum0"

tcp_services="{ 22, 113 }"
icmp_types="echoreq"

# options
set block-policy return
set loginterface egress
set skip on lo

# FTP Proxy rules
anchor "ftp-proxy/*"
pass in quick on $int_if inet proto tcp to any port ftp divert-to
127.0.0.1 port 8021

# match rules
match out on $ext_if inet from !($ext_if:network) to any nat-to ($ext_if:0)

# filter rules
block in log
pass out quick

antispoof quick for { lo $int_if }

pass in on egress inet proto tcp from any to (egress) \
port $tcp_services
pass in inet proto icmp all icmp-type $icmp_types
pass in on $int_if


pfctl -ss
all tcp 192.168.11.1:22 <- 192.168.11.10:34071   ESTABLISHED:ESTABLISHED
all udp 192.168.11.255:631 <- 192.168.11.10:631   NO_TRAFFIC:SINGLE



pfctl -sr
anchor "ftp-proxy/*" all
pass in quick on bge0 inet proto tcp from any to any port = 21 flags
S/SA divert-to 127.0.0.1 port 8021
match out on rum0 inet from ! (rum0:network) to any nat-to (rum0:0)
block return in log all
pass out quick all flags S/SA
block drop in quick on ! lo inet6 from ::1 to any
block drop in quick on ! lo inet from 127.0.0.0/8 to any
block drop in quick inet from 127.0.0.1 to any
block drop in quick on ! bge0 inet from 192.168.11.0/24 to any
block drop in quick inet from 192.168.11.1 to any
block drop in quick inet6 from ::1 to any
block drop in quick on lo0 inet6 from fe80::1 to any
block drop in quick on bge0 inet6 from fe80::21e:c9ff:fe05:78fc to any
pass in on egress inet proto tcp from any to (egress) port = 22 flags S/SA
pass in on egress inet proto tcp from any to (egress) port = 113 flags S/SA
pass in inet proto icmp all icmp-type echoreq
pass in on bge0 all flags S/SA




puppy linux (dhcp client)
---
fconfig -a
eth0  Link encap:Ethernet  HWaddr 00:00:39:E3:38:99
  inet addr:192.168.11.10  Bcast:192.168.11.255  Mask:255.255.255.0
  UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
  RX packets:1711 errors:0 dropped:0 overruns:0 frame:0
  TX packets:1990 errors:0 dropped:0 overruns:0 carrier:0
  collisions:0 txqueuelen:1000
  RX bytes:1103913 (1.0 MiB)  TX bytes:313349 (306.0 KiB)

loLink encap:Local Loopback
  inet addr:127.0.0.1  Mask:255.0.0.0
  UP LOOPBACK RUNNING  MTU:16436  Metric:1
  RX packets:0 errors:0 dropped:0 overruns:0 frame:0
  TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
  collisions:0 txqueuelen:0
  RX bytes:0 (0.0 B)  TX bytes:0 (0.0 B)


cat /etc/resolv.conf
# Generated by dhcpcd for interface eth0
nameserver 192.168.100.254 (wifi router's addreee)



ping www.openbsd.org
PING www.openbsd.org (129.128.5.194): 56 data bytes
64 bytes from 129.128.5.194: seq=0 ttl=227 time=311.753 ms
64 bytes from 129.128.5.194: seq=1 ttl=227 time=312.358 ms
^C
--- www.openbsd.org ping statistics ---
2 packets transmitted, 2 packets received, 0% packet loss
round-trip min/avg/max = 311.753/312.055/312.358 ms



route -e
Kernel IP routing table
Destination Gateway Genmask Flags   MSS Window  irtt Iface
192.168.11.0*   255.255.255.0   U 0 0  0 eth0
169.254.0.0 *   255.255.0.0 U 0 0  0 eth0
127.0.0.0   *   255.0.0.0   U 0 0  0 lo
default 192.168.11.10.0.0.0 UG0 0  0 eth0



THANKS! THANKS!

--
tuyosi takesima



Re: ssh-add: June 26 snap cannot read an id_rsa file

2014-06-27 Thread Christian Weisgerber
On 2014-06-27, Josh Grosse  wrote:

> I just updated from a June 17 to June 26 snapshot.  The ssh-add utility
> now fails immediately: [...]
>
> Between these two snapshots there was a major bump for libcrypto from 28.0
> to 29.0, but that may not be relevant.

It's most likely fallout from the ssh changes on June 23:

  New key API: refactor key-related functions to be more library-like,
  existing API is offered as a set of wrappers.

-- 
Christian "naddy" Weisgerber  na...@mips.inka.de



Re: ssh-add: June 26 snap cannot read an id_rsa file

2014-06-27 Thread Kent Fritz
On Fri, Jun 27, 2014 at 4:29 AM, Christian Weisgerber
 wrote:
> On 2014-06-27, Josh Grosse  wrote:
>
>> I just updated from a June 17 to June 26 snapshot.  The ssh-add utility
>> now fails immediately: [...]
>>
>> Between these two snapshots there was a major bump for libcrypto from 28.0
>> to 29.0, but that may not be relevant.
>
> It's most likely fallout from the ssh changes on June 23:
>
>   New key API: refactor key-related functions to be more library-like,
>   existing API is offered as a set of wrappers.
>
> --
> Christian "naddy" Weisgerber  na...@mips.inka.de
>
Seeing the same here.  I tested re-creating my keys, and the problem
seems to be with password.  With password, it fails; without, it
works.



Re: ssh-add: June 26 snap cannot read an id_rsa file

2014-06-27 Thread Josh Grosse

On 2014-06-27 08:21, Kent Fritz wrote:

On Fri, Jun 27, 2014 at 4:29 AM, Christian Weisgerber
 wrote:



It's most likely fallout from the ssh changes on June 23:


Yes, there were significant revisions, and they are integrated, as I
cannot back off ssh-add.c r1.110 alone.

I'd mucked about with ktrace output diffs to see if I could determine 
where the

branch in logic occurred, but didn't really have the time to investigate
fully.


Seeing the same here.  I tested re-creating my keys, and the problem
seems to be with password.  With password, it fails; without, it
works.


If I didn't have passphrases, I wouldn't use ssh-add. :)



Re: kernel panic from sys/dev/acpi/dsdt.c rev1.210 change

2014-06-27 Thread Jason Crawford
I can also confirm that newest snapshot works now.

On Thu, Jun 26, 2014 at 7:45 AM, Nils R  wrote:
> Works now with the latest snapshot (dsdt.c rev. 1.211), thanks!



Re: kernel panic from sys/dev/acpi/dsdt.c rev1.210 change

2014-06-27 Thread Jason Crawford
I know on my laptop no acpi meant doesn't work. My saving grace is I
always keep a kernel from the previous snapshot I tried as obsd. So if
bsd doesn't work, I just boot from that. Do you have an older snapshot
kernel you can tell tech support to boot into?

On Thu, Jun 26, 2014 at 7:36 PM, Scott Vanderbilt  wrote:
> Having done a little man page reading on boot-time configuration, I learned
> about the existence of ukc. I'm wondering whether something like
>
>   ukc> disable acpi0
>
> might circumvent the kernel panic and allow the boot to successfully
> complete. I'm hoping that since this is a server, ACPI is non-essential.
> Just grasping at straws in an effort to get this machine up and running
> again.
>
> Thanks.
>
>
>
>
> On 6/26/2014 4:21 PM, Scott Vanderbilt wrote:
>>
>> I have this exact same kernel panic. Unfortunately, it's occurring on a
>> host at a remote co-lo. Does anyone know a way that I can get the
>> on-site tech to suppress the assertion by way of some boot-time
>> configuration? Then at least I can get this machine up and running so I
>> can immediately upgrade to the latest snapshot, which apparently fixes
>> this issue.
>>
>> Thanks.
>>
>>
>> On 6/25/2014 8:05 AM, Jason Crawford wrote:
>>>
>>> My system panic's from the KASSERT() call at line 2269 after dsdt.c was
>>> updated to 1.210.
>>>
>>> All I have is the basic panic message and the dmesg from the last known
>>> working snapshot kernel. I tried to get more information but my USB
>>> keyboard does not work in the kernel debugger, and my on-board keyboard
>>> no longer works at all (I use the laptop as a desktop now). I typed up
>>> everything I could see of that panic message by hand.
>>>
>>> Any patches that need to be tested I will be glad to try out.
>>>
>>> Here's the panic message and dmesg output.
>>>
>>> --- panic ---
>>> acpi0 at bios0: rev 2panic: kernel diagnostic assertion
>>> "rgn->v_opregion.iobase % sz == 0" failed: file
>>> "../../../../dev/acpi/dsdt.c", line 2269
>>> Stopped atDebugger+0x9:leave
>>> panic() at panic+0xfe
>>> __assert() at __assert+0x25
>>> aml_rwgas() at aml_rwgas+0x1fd
>>> aml_rwfield() at aml_rwfield+0x205
>>> aml_eval() at aml_eval+0x1ae
>>> aml_parse() at aml_parse+0x183d
>>> aml_parse() at aml_parse+0x1ff
>>> aml_parse() at aml_parse+0x1ff
>>> aml_parse() at aml_parse+0x1ff
>>> end trace frame: 0x81ef48f0, count: 0
>>> RUN AT LEAST 'trace' AND 'ps' AND INCLUDE OUTPUT WHEN REPORTING THIS
>>> PANIC!
>>> IF RUNNING SMP, USE 'mach ddbcpu <#>' AND 'trace' ON OTHER PROCESSORS,
>>> TOO.
>>> DO NOT EVEN BOTHER REPORTING THIS WITHOUT INCLUDING THAT INFORMATION!
>>>
>>>
>>> --- dmesg ---
>>> OpenBSD 5.5-current (GENERIC.MP) #219: Thu Jun 19 22:16:22 MDT 2014
>>>  dera...@amd64.openbsd.org:/usr/src/sys/arch/amd64/compile/GENERIC.MP
>>> real mem = 4209770496 (4014MB)
>>> avail mem = 4088930304 (3899MB)
>>> mpath0 at root
>>> scsibus0 at mpath0: 256 targets
>>> mainbus0 at root
>>> bios0 at mainbus0: SMBIOS rev. 2.6 @ 0xdbeda000 (35 entries)
>>> bios0: vendor Phoenix Technologies LTD version "V1.04" date 10/22/2009
>>> bios0: Gateway NV53
>>> acpi0 at bios0: rev 2
>>> acpi0: sleep states S0 S3 S4 S5
>>> acpi0: tables DSDT FACP SLIC SSDT APIC MCFG HPET
>>> acpi0: wakeup devices LID0(S3) SLPB(S3) PB2_(S4) PB3_(S4) PB4_(S4)
>>> PB5_(S4) PB6_(S4) PB7_(S4) PB9_(S4) PB10(S4) OHC0(S3) OHC1(S3) OHC2(S3)
>>> OHC3(S3) OHC4(S3) EHC0(S3) [...]
>>> acpitimer0 at acpi0: 3579545 Hz, 32 bits
>>> acpimadt0 at acpi0 addr 0xfee0: PC-AT compat
>>> cpu0 at mainbus0: apid 0 (boot processor)
>>> cpu0: AMD Athlon(tm) II Dual-Core M300, 2000.97 MHz
>>> cpu0:
>>>
>>> FPU,VME,DE,PSE,TSC,MSR,PAE,MCE,CX8,APIC,SEP,MTRR,PGE,MCA,CMOV,PAT,PSE36,CFLUSH,MMX,FXSR,SSE,SSE2,HTT,SSE3,MWAIT,CX16,POPCNT,NXE,MMXX,FFXSR,LONG,3DNOW2,3DNOW,LAHF,CMPLEG,SVM,EAPICSP,AMCR8,ABM,SSE4A,3DNOWP,OSVW,IBS,SKINI
>>>
>>> T,ITSC
>>> cpu0: 64KB 64b/line 2-way I-cache, 64KB 64b/line 2-way D-cache, 512KB
>>> 64b/line 16-way L2 cache
>>> cpu0: ITLB 32 4KB entries fully associative, 16 4MB entries fully
>>> associative
>>> cpu0: DTLB 48 4KB entries fully associative, 48 4MB entries fully
>>> associative
>>> cpu0: AMD erratum 721 detected and fixed
>>> cpu0: smt 0, core 0, package 0
>>> mtrr: Pentium Pro MTRR support, 8 var ranges, 88 fixed ranges
>>> cpu0: apic clock running at 200MHz
>>> cpu0: mwait min=64, max=64, C-substates=0.0.0.0.0, IBE
>>> cpu1 at mainbus0: apid 1 (application processor)
>>> cpu1: AMD Athlon(tm) II Dual-Core M300, 2000.03 MHz
>>> cpu1:
>>>
>>> FPU,VME,DE,PSE,TSC,MSR,PAE,MCE,CX8,APIC,SEP,MTRR,PGE,MCA,CMOV,PAT,PSE36,CFLUSH,MMX,FXSR,SSE,SSE2,HTT,SSE3,MWAIT,CX16,POPCNT,NXE,MMXX,FFXSR,LONG,3DNOW2,3DNOW,LAHF,CMPLEG,SVM,EAPICSP,AMCR8,ABM,SSE4A,3DNOWP,OSVW,IBS,SKINI
>>>
>>> T,ITSC
>>> cpu1: 64KB 64b/line 2-way I-cache, 64KB 64b/line 2-way D-cache, 512KB
>>> 64b/line 16-way L2 cache
>>> cpu1: ITLB 32 4KB entries fully associative, 16 4MB entries fully
>>> associative
>>> cpu1: DTLB 48 4KB entries fully associative, 48 4MB

root's password

2014-06-27 Thread Stefan Wollny
Hi misc@-readers!

I have once more read man afterboot(8) and a question came up related
to the superuser's password.

In section 'root password' advisory is given to "choose a password
that has digits and special characters (not space)". This last advice
is what I do not understand - all of my passwords have spaces,
including root's, and I never noticed any drawbacks. Actually I
consider spaces within a password to be a security feature making it a
'passphrase' which should be harder to crack (yes - it is as looong
password for root ;-) )

Now: Is this advice in afterboot(8) 'out-of-date' or am I just lucky?

STEFAN



Re: ssh-add: June 26 snap cannot read an id_rsa file

2014-06-27 Thread Kent Fritz
On Fri, Jun 27, 2014 at 6:12 AM, Josh Grosse  wrote:
> On 2014-06-27 08:21, Kent Fritz wrote:
>> Seeing the same here.  I tested re-creating my keys, and the problem
>> seems to be with password.  With password, it fails; without, it
>> works.
>
>
> If I didn't have passphrases, I wouldn't use ssh-add. :)
>
Yes, obviously!

ssh-keygen -p seems to have a problem, but works regardlesss:

$ ssh-keygen -p
Enter file in which the key is (/home/kent/.ssh/id_rsa):
key_load_private: invalid format
Enter old passphrase:
Key has comment 'rsa w/o comment'
Enter new passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved with the new passphrase.



Re: root's password

2014-06-27 Thread Ted Unangst
On Fri, Jun 27, 2014 at 16:50, Stefan Wollny wrote:
> Hi misc@-readers!
> 
> I have once more read man afterboot(8) and a question came up related
> to the superuser's password.
> 
> In section 'root password' advisory is given to "choose a password
> that has digits and special characters (not space)". This last advice
> is what I do not understand - all of my passwords have spaces,
> including root's, and I never noticed any drawbacks. Actually I
> consider spaces within a password to be a security feature making it a
> 'passphrase' which should be harder to crack (yes - it is as looong
> password for root ;-) )
> 
> Now: Is this advice in afterboot(8) 'out-of-date' or am I just lucky?

I can't think of a reason why it wouldn't work. I might stay away from
control characters and unicode because you may have keyboard / byte
sequence translation issues, but space should be reliable enough.

The only place I can think spaces would be a problem is command line
arguments, which 1) affects other characters as well 2) is a bad idea.



Re: root's password

2014-06-27 Thread Otto Moerbeek
On Fri, Jun 27, 2014 at 12:56:33PM -0400, Ted Unangst wrote:

> On Fri, Jun 27, 2014 at 16:50, Stefan Wollny wrote:
> > Hi misc@-readers!
> > 
> > I have once more read man afterboot(8) and a question came up related
> > to the superuser's password.
> > 
> > In section 'root password' advisory is given to "choose a password
> > that has digits and special characters (not space)". This last advice
> > is what I do not understand - all of my passwords have spaces,
> > including root's, and I never noticed any drawbacks. Actually I
> > consider spaces within a password to be a security feature making it a
> > 'passphrase' which should be harder to crack (yes - it is as looong
> > password for root ;-) )
> > 
> > Now: Is this advice in afterboot(8) 'out-of-date' or am I just lucky?
> 
> I can't think of a reason why it wouldn't work. I might stay away from
> control characters and unicode because you may have keyboard / byte
> sequence translation issues, but space should be reliable enough.
> 
> The only place I can think spaces would be a problem is command line
> arguments, which 1) affects other characters as well 2) is a bad idea.

I never read that advise and hgave been using passwords with spaces for
many years.

Passwords to be entered in webforms is another story, of course ;-)


-Otto



Re: kernel panic from sys/dev/acpi/dsdt.c rev1.210 change

2014-06-27 Thread Scott Vanderbilt
Unfortunately, not. It was a fresh install from a CD image to a hard 
drive which I then shipped to the ISP for installation, which replaced a 
failing drive in my machine co-located there.


In any event, bypassing acpi in ukc got the machine up again, and I was 
able to upgrade to the latest snapshot which does indeed resolve the 
issue. All is well again.


Thanks to Chris for confirming the boot-time config option.

On 6/27/2014 6:44 AM, Jason Crawford wrote:

I know on my laptop no acpi meant doesn't work. My saving grace is I
always keep a kernel from the previous snapshot I tried as obsd. So if
bsd doesn't work, I just boot from that. Do you have an older snapshot
kernel you can tell tech support to boot into?

On Thu, Jun 26, 2014 at 7:36 PM, Scott Vanderbilt  wrote:

Having done a little man page reading on boot-time configuration, I learned
about the existence of ukc. I'm wondering whether something like

   ukc> disable acpi0

might circumvent the kernel panic and allow the boot to successfully
complete. I'm hoping that since this is a server, ACPI is non-essential.
Just grasping at straws in an effort to get this machine up and running
again.

Thanks.




On 6/26/2014 4:21 PM, Scott Vanderbilt wrote:


I have this exact same kernel panic. Unfortunately, it's occurring on a
host at a remote co-lo. Does anyone know a way that I can get the
on-site tech to suppress the assertion by way of some boot-time
configuration? Then at least I can get this machine up and running so I
can immediately upgrade to the latest snapshot, which apparently fixes
this issue.

Thanks.


On 6/25/2014 8:05 AM, Jason Crawford wrote:


My system panic's from the KASSERT() call at line 2269 after dsdt.c was
updated to 1.210.

All I have is the basic panic message and the dmesg from the last known
working snapshot kernel. I tried to get more information but my USB
keyboard does not work in the kernel debugger, and my on-board keyboard
no longer works at all (I use the laptop as a desktop now). I typed up
everything I could see of that panic message by hand.

Any patches that need to be tested I will be glad to try out.

Here's the panic message and dmesg output.

--- panic ---
acpi0 at bios0: rev 2panic: kernel diagnostic assertion
"rgn->v_opregion.iobase % sz == 0" failed: file
"../../../../dev/acpi/dsdt.c", line 2269
Stopped atDebugger+0x9:leave
panic() at panic+0xfe
__assert() at __assert+0x25
aml_rwgas() at aml_rwgas+0x1fd
aml_rwfield() at aml_rwfield+0x205
aml_eval() at aml_eval+0x1ae
aml_parse() at aml_parse+0x183d
aml_parse() at aml_parse+0x1ff
aml_parse() at aml_parse+0x1ff
aml_parse() at aml_parse+0x1ff
end trace frame: 0x81ef48f0, count: 0
RUN AT LEAST 'trace' AND 'ps' AND INCLUDE OUTPUT WHEN REPORTING THIS
PANIC!
IF RUNNING SMP, USE 'mach ddbcpu <#>' AND 'trace' ON OTHER PROCESSORS,
TOO.
DO NOT EVEN BOTHER REPORTING THIS WITHOUT INCLUDING THAT INFORMATION!


--- dmesg ---
OpenBSD 5.5-current (GENERIC.MP) #219: Thu Jun 19 22:16:22 MDT 2014
  dera...@amd64.openbsd.org:/usr/src/sys/arch/amd64/compile/GENERIC.MP
real mem = 4209770496 (4014MB)
avail mem = 4088930304 (3899MB)
mpath0 at root
scsibus0 at mpath0: 256 targets
mainbus0 at root
bios0 at mainbus0: SMBIOS rev. 2.6 @ 0xdbeda000 (35 entries)
bios0: vendor Phoenix Technologies LTD version "V1.04" date 10/22/2009
bios0: Gateway NV53
acpi0 at bios0: rev 2
acpi0: sleep states S0 S3 S4 S5
acpi0: tables DSDT FACP SLIC SSDT APIC MCFG HPET
acpi0: wakeup devices LID0(S3) SLPB(S3) PB2_(S4) PB3_(S4) PB4_(S4)
PB5_(S4) PB6_(S4) PB7_(S4) PB9_(S4) PB10(S4) OHC0(S3) OHC1(S3) OHC2(S3)
OHC3(S3) OHC4(S3) EHC0(S3) [...]
acpitimer0 at acpi0: 3579545 Hz, 32 bits
acpimadt0 at acpi0 addr 0xfee0: PC-AT compat
cpu0 at mainbus0: apid 0 (boot processor)
cpu0: AMD Athlon(tm) II Dual-Core M300, 2000.97 MHz
cpu0:

FPU,VME,DE,PSE,TSC,MSR,PAE,MCE,CX8,APIC,SEP,MTRR,PGE,MCA,CMOV,PAT,PSE36,CFLUSH,MMX,FXSR,SSE,SSE2,HTT,SSE3,MWAIT,CX16,POPCNT,NXE,MMXX,FFXSR,LONG,3DNOW2,3DNOW,LAHF,CMPLEG,SVM,EAPICSP,AMCR8,ABM,SSE4A,3DNOWP,OSVW,IBS,SKINI

T,ITSC
cpu0: 64KB 64b/line 2-way I-cache, 64KB 64b/line 2-way D-cache, 512KB
64b/line 16-way L2 cache
cpu0: ITLB 32 4KB entries fully associative, 16 4MB entries fully
associative
cpu0: DTLB 48 4KB entries fully associative, 48 4MB entries fully
associative
cpu0: AMD erratum 721 detected and fixed
cpu0: smt 0, core 0, package 0
mtrr: Pentium Pro MTRR support, 8 var ranges, 88 fixed ranges
cpu0: apic clock running at 200MHz
cpu0: mwait min=64, max=64, C-substates=0.0.0.0.0, IBE
cpu1 at mainbus0: apid 1 (application processor)
cpu1: AMD Athlon(tm) II Dual-Core M300, 2000.03 MHz
cpu1:

FPU,VME,DE,PSE,TSC,MSR,PAE,MCE,CX8,APIC,SEP,MTRR,PGE,MCA,CMOV,PAT,PSE36,CFLUSH,MMX,FXSR,SSE,SSE2,HTT,SSE3,MWAIT,CX16,POPCNT,NXE,MMXX,FFXSR,LONG,3DNOW2,3DNOW,LAHF,CMPLEG,SVM,EAPICSP,AMCR8,ABM,SSE4A,3DNOWP,OSVW,IBS,SKINI

T,ITSC
cpu1: 64KB 64b/line 2-way I-cache, 64KB 64b/line 2-way D-cache, 512KB
64b/line 16-way L2 cache
cpu1: ITLB 32 4KB entries fully associati

Re: kernel panic from sys/dev/acpi/dsdt.c rev1.210 change

2014-06-27 Thread Stuart Henderson
On 2014-06-26, Scott Vanderbilt  wrote:
> Having done a little man page reading on boot-time configuration, I 
> learned about the existence of ukc. I'm wondering whether something like
>
>ukc> disable acpi0
>
> might circumvent the kernel panic and allow the boot to successfully 
> complete. I'm hoping that since this is a server, ACPI is non-essential. 
> Just grasping at straws in an effort to get this machine up and running 
> again.

I think you should consider ACPI essential on pretty much any x86
machine from the last 4-5 years or so - servers, laptops, standard PCs.

In an emergency such as this you might get away with it briefly, but
some devices are likely not to work, and it's not recommended leaving
it like that for any length of time, ACPI is involved in a lot of
system controls (thermal controls, power etc) and most modern machines
are just not designed/tested to work without it.



Re: kernel panic from sys/dev/acpi/dsdt.c rev1.210 change

2014-06-27 Thread Theo de Raadt
> On 2014-06-26, Scott Vanderbilt  wrote:
> > Having done a little man page reading on boot-time configuration, I 
> > learned about the existence of ukc. I'm wondering whether something like
> >
> >ukc> disable acpi0
> >
> > might circumvent the kernel panic and allow the boot to successfully 
> > complete. I'm hoping that since this is a server, ACPI is non-essential. 
> > Just grasping at straws in an effort to get this machine up and running 
> > again.
> 
> I think you should consider ACPI essential on pretty much any x86
> machine from the last 4-5 years or so - servers, laptops, standard PCs.

Yes, ACPI is essential.  It is the modern way to interface to the hardware;
it is the modern BIOS API.

The other BIOS interfaces (MPBIOS and PCIBIOS) are totally unreliable and
rotting on most machines these days.   The vendors include support, but they
do not verify their correctness.

> In an emergency such as this you might get away with it briefly, but
> some devices are likely not to work, and it's not recommended leaving
> it like that for any length of time, ACPI is involved in a lot of
> system controls (thermal controls, power etc) and most modern machines
> are just not designed/tested to work without it.

Stuart is correct.  Those of you turning off ACPI are relying on an
interface model we have repeatedly described as broken.



Re: root's password

2014-06-27 Thread Giancarlo Razzolini
Em 27-06-2014 11:50, Stefan Wollny escreveu:
> Hi misc@-readers!
>
> I have once more read man afterboot(8) and a question came up related
> to the superuser's password.
>
> In section 'root password' advisory is given to "choose a password
> that has digits and special characters (not space)". This last advice
> is what I do not understand - all of my passwords have spaces,
> including root's, and I never noticed any drawbacks. Actually I
> consider spaces within a password to be a security feature making it a
> 'passphrase' which should be harder to crack (yes - it is as looong
> password for root ;-) )
>
> Now: Is this advice in afterboot(8) 'out-of-date' or am I just lucky?
>
> STEFAN
>
Perhaps you should take a look at this funny and very accurate xkcd
comic strip:

http://xkcd.com/936/

Passwords are all about entropy. Spaces, special characters, don't mean
much for brute force attacks. If you take a look at the most new, state
of the art password cracking tools, you'll find that they are very, very
good at guessing passwords. I believe that using long phrases composed
of random words as passwords is way more effective than these special,
punctuation, spaces, passwords. But, that's me. Don't take my word for
it. The man page still does give good advice, specially because the
cryptography used on the OpenBSD passwords is much stronger than other
oses. Take a look at crypt(3) man page. You'll see that you can have a
password with 72 characters. I believe that cryptographic attacks on the
hashing are very hard. And remote attacks on your machine are unlikely.
But remember, it's all about entropy.

Cheers,

-- 
Giancarlo Razzolini
GPG: 4096R/77B981BC



Re: kernel panic from sys/dev/acpi/dsdt.c rev1.210 change

2014-06-27 Thread Scott Vanderbilt

On 6/27/2014 12:10 PM, Stuart Henderson wrote:

On 2014-06-26, Scott Vanderbilt  wrote:

Having done a little man page reading on boot-time configuration, I
learned about the existence of ukc. I'm wondering whether something like

ukc> disable acpi0

might circumvent the kernel panic and allow the boot to successfully
complete. I'm hoping that since this is a server, ACPI is non-essential.
Just grasping at straws in an effort to get this machine up and running
again.


I think you should consider ACPI essential on pretty much any x86
machine from the last 4-5 years or so - servers, laptops, standard PCs.

In an emergency such as this you might get away with it briefly, but
some devices are likely not to work, and it's not recommended leaving
it like that for any length of time, ACPI is involved in a lot of
system controls (thermal controls, power etc) and most modern machines
are just not designed/tested to work without it.



Thanks for clarifying.

Disabling acpi was only meant to be a stopgap measure so I could get 
around the assertion in the kernel that caused a panic on boot. Once I 
was able to boot the machine, I upgraded to a later snapshot in which 
the assertion was removed. I never intended to permanently disable acpi. 
As the machine was at a remote co-lo, I felt had no other choice.


Is there some better way that I should have handled this situation?



Re: kernel panic from sys/dev/acpi/dsdt.c rev1.210 change

2014-06-27 Thread Mike Larkin
On Fri, Jun 27, 2014 at 01:15:59PM -0600, Theo de Raadt wrote:
> > On 2014-06-26, Scott Vanderbilt  wrote:
> > > Having done a little man page reading on boot-time configuration, I 
> > > learned about the existence of ukc. I'm wondering whether something like
> > >
> > >ukc> disable acpi0
> > >
> > > might circumvent the kernel panic and allow the boot to successfully 
> > > complete. I'm hoping that since this is a server, ACPI is non-essential. 
> > > Just grasping at straws in an effort to get this machine up and running 
> > > again.
> > 
> > I think you should consider ACPI essential on pretty much any x86
> > machine from the last 4-5 years or so - servers, laptops, standard PCs.
> 
> Yes, ACPI is essential.  It is the modern way to interface to the hardware;
> it is the modern BIOS API.
> 
> The other BIOS interfaces (MPBIOS and PCIBIOS) are totally unreliable and
> rotting on most machines these days.   The vendors include support, but they
> do not verify their correctness.
> 
> > In an emergency such as this you might get away with it briefly, but
> > some devices are likely not to work, and it's not recommended leaving
> > it like that for any length of time, ACPI is involved in a lot of
> > system controls (thermal controls, power etc) and most modern machines
> > are just not designed/tested to work without it.
> 
> Stuart is correct.  Those of you turning off ACPI are relying on an
> interface model we have repeatedly described as broken.
> 

 I have some hardware that doesn't work. Should I just disable mainbus? That
way it doesn't attach.

Maybe that would fix the problem.

-ml



Re: kernel panic from sys/dev/acpi/dsdt.c rev1.210 change

2014-06-27 Thread Mike Larkin
On Fri, Jun 27, 2014 at 12:37:33PM -0700, Scott Vanderbilt wrote:
> On 6/27/2014 12:10 PM, Stuart Henderson wrote:
> >On 2014-06-26, Scott Vanderbilt  wrote:
> >>Having done a little man page reading on boot-time configuration, I
> >>learned about the existence of ukc. I'm wondering whether something like
> >>
> >>ukc> disable acpi0
> >>
> >>might circumvent the kernel panic and allow the boot to successfully
> >>complete. I'm hoping that since this is a server, ACPI is non-essential.
> >>Just grasping at straws in an effort to get this machine up and running
> >>again.
> >
> >I think you should consider ACPI essential on pretty much any x86
> >machine from the last 4-5 years or so - servers, laptops, standard PCs.
> >
> >In an emergency such as this you might get away with it briefly, but
> >some devices are likely not to work, and it's not recommended leaving
> >it like that for any length of time, ACPI is involved in a lot of
> >system controls (thermal controls, power etc) and most modern machines
> >are just not designed/tested to work without it.
> >
> 
> Thanks for clarifying.
> 
> Disabling acpi was only meant to be a stopgap measure so I could get
> around the assertion in the kernel that caused a panic on boot. Once
> I was able to boot the machine, I upgraded to a later snapshot in
> which the assertion was removed. I never intended to permanently
> disable acpi. As the machine was at a remote co-lo, I felt had no
> other choice.
> 
> Is there some better way that I should have handled this situation?
> 

Keep another kernel in / that is known working.

-ml



Re: kernel panic from sys/dev/acpi/dsdt.c rev1.210 change

2014-06-27 Thread patrick keshishian
On 6/27/14, Theo de Raadt  wrote:
>> On 2014-06-26, Scott Vanderbilt  wrote:
>> > Having done a little man page reading on boot-time configuration, I
>> > learned about the existence of ukc. I'm wondering whether something
>> > like
>> >
>> >ukc> disable acpi0
>> >
>> > might circumvent the kernel panic and allow the boot to successfully
>> > complete. I'm hoping that since this is a server, ACPI is non-essential.
>> >
>> > Just grasping at straws in an effort to get this machine up and running
>> >
>> > again.
>>
>> I think you should consider ACPI essential on pretty much any x86
>> machine from the last 4-5 years or so - servers, laptops, standard PCs.
>
> Yes, ACPI is essential.  It is the modern way to interface to the hardware;
> it is the modern BIOS API.

viva pragmatism!
http://www.openbsd.org/lyrics.html#45
:)
--patrick


> The other BIOS interfaces (MPBIOS and PCIBIOS) are totally unreliable and
> rotting on most machines these days.   The vendors include support, but
> they
> do not verify their correctness.
>
>> In an emergency such as this you might get away with it briefly, but
>> some devices are likely not to work, and it's not recommended leaving
>> it like that for any length of time, ACPI is involved in a lot of
>> system controls (thermal controls, power etc) and most modern machines
>> are just not designed/tested to work without it.
>
> Stuart is correct.  Those of you turning off ACPI are relying on an
> interface model we have repeatedly described as broken.



Re: relayd url redirection

2014-06-27 Thread Predrag Punosevac
For people who might stumble on this thread I ended up using Nginx with
a configuration file which looks similar to this.

Predrag


# $OpenBSD: nginx.conf,v 1.16 2014/01/28 14:48:53 stephan Exp $

#user  www;
worker_processes  4;

#syslog local5  nginx;

#error_log  logs/error.log;
#error_log  logs/error.log  notice;
#error_log  logs/error.log  info;
#error_log  syslog:notice|logs/error.log;

#pidlogs/nginx.pid;


events {
worker_connections  1024;
}


http {
include   mime.types;
default_type  application/octet-stream;
index index.html index.htm;

#log_format  main  '$remote_addr - $remote_user [$time_local] "$request" '
#  '$status $body_bytes_sent "$http_referer" '
#  '"$http_user_agent" "$http_x_forwarded_for"';

#access_log  logs/access.log  main;
#access_log  syslog:notice|logs/access.log main;

#tcp_nopush on;

keepalive_timeout  65;

server_tokens off;

# Virtual hosts 
server { 
listen   myIP:80;
server_name  www.test.org;
location /www1 { 
proxy_pass http://www1.int.test.org;
proxy_next_upstream error timeout invalid_header http_500 http_502 
http_503 http_504;
proxy_redirect off;
proxy_buffering off;
proxy_set_headerHost$host;
proxy_set_headerX-Real-IP   $remote_addr;
proxy_set_headerX-Forwarded-For $proxy_add_x_forwarded_for;
}
location /www2 {
proxy_pass http://www2.int.test.org;
proxy_next_upstream error timeout invalid_header http_500 http_502 
http_503 http_504;
proxy_redirect off;
proxy_buffering off;
proxy_set_headerHost$host;
proxy_set_headerX-Real-IP   $remote_addr;
proxy_set_headerX-Forwarded-For $proxy_add_x_forwarded_for;
}
}

}



Re: root's password

2014-06-27 Thread Stuart Henderson
On 2014-06-27, Giancarlo Razzolini  wrote:
> Perhaps you should take a look at this funny and very accurate xkcd
> comic strip:
>
> http://xkcd.com/936/

"yes, cracking a stolen hash is faster, but it's not what the average user 
should worry about"

I disagree, that is *exactly* what the average user should worry about.
And knowing that some people use xkcd style passwords, who would start on
a brute force attack before they've finished with a decent wordlist run?

> Passwords are all about entropy. Spaces, special characters, don't mean
> much for brute force attacks. If you take a look at the most new, state
> of the art password cracking tools, you'll find that they are very, very
> good at guessing passwords. I believe that using long phrases composed
> of random words as passwords is way more effective than these special,
> punctuation, spaces, passwords.

Using a long phrase is *much* worse than an equally long string of random
characters. But of course most people can't remember the latter. It's a trade
off.

> And remote attacks on your machine are unlikely.

/var/log/authlog on pretty much any machine with exposed ssh tells
a different story ...

(not that you really want people even getting as far as being able
to attempt passwords..)



Re: root's password

2014-06-27 Thread Giancarlo Razzolini
Em 27-06-2014 19:48, Stuart Henderson escreveu:
> "yes, cracking a stolen hash is faster, but it's not what the average user 
> should worry about"
>
> I disagree, that is *exactly* what the average user should worry about.
> And knowing that some people use xkcd style passwords, who would start on
> a brute force attack before they've finished with a decent wordlist run?
For someone to be able to stole a hash, they already got into your
machine. I believe that, at this point, you have much more to worry than
just your password being crackable. The wordlist run as you mentioned,
will get the weak passwords, based on one, two or tree small words with
special chars variations. But with four, or five big words, things start
to get a little more complicated. Specially if you throw in the mix a
foreign language word.
> Using a long phrase is *much* worse than an equally long string of random
> characters. But of course most people can't remember the latter. It's a trade
> off.
Yes, that was entirely the point of the comic. The trade off. But, the
entropy of a letter "a" is the same of "@". As I mentioned, and someone
asked me off list, the most modern password cracking tools, know all
these variations people use. This one: http://hashcat.net/oclhashcat/ is
the better AFAIK. So, with that in mind, using these special chars and
punctuation barely keep your password from being hacked. Specially if
you are using a word and only changing some letters with them.
> /var/log/authlog on pretty much any machine with exposed ssh tells
> a different story ...
>
> (not that you really want people even getting as far as being able
> to attempt passwords..)
>
Well, pf come in handy on these cases. In other systems I use fail2ban.
It's worse than pf, but it is what can be done with iptables on linux
anyway. And there are options for not needing to keep your ssh exposed.
I never got a machine hacked, even when not using any mitigation techniques.

Cheers,

-- 
Giancarlo Razzolini
GPG: 4096R/77B981BC



Re: nat-to private address

2014-06-27 Thread Tuyosi Takesima
Hi all .

i add some .

USB memory only 2GB running openbsd works as dhcpd  + nat .

namely
sd1 at scsibus2 targ 1 lun 0:  SCSI0
0/direct removable serial.1d0d0211078C0D1310DE
sd1: 1900MB, 512 bytes/sector, 3891200 sectors
root on sd1a (4ef3e82a493a09dc.a) swap on sd1b dump on sd1b

# df
Filesystem  512-blocks  Used Avail Capacity  Mounted on
/dev/sd1a  3697340481116   303136014%/

and
original pf.conf
+
match out on rum0 from !rum0:network to any nat-to (rum0)
can nat .

it is very convinient to remember.
later think deeply , and rewrite pf.conf.

sorry , I abbrebiate 1 point .
cat /etc/rc.conf.local
dhcpd_flags=""  #NO # for normal use: ""


cat /etc/pf.conf
#   $OpenBSD: pf.conf,v 1.53 2014/01/25 10:28:36 dtucker Exp $

set skip on lo
block return# block stateless traffic
pass# establish keep-state
###
match out on rum0 from !rum0:network to any nat-to (rum0)
###
# rum0 is firewall's ext_if
# By default, do not permit remote connections to X11
block return in on ! lo0 proto tcp to port 6000:6010


# pfctl -ss
all tcp 192.168.11.1:22 <- 192.168.11.3:35074   ESTABLISHED:ESTABLISHED
all udp 192.168.11.255:631 <- 192.168.11.3:631   NO_TRAFFIC:SINGLE

# pfctl -sr
block return all
pass all flags S/SA
match out on rum0 inet from ! 192.168.100.0/24 to any nat-to (rum0) round-robin
block return in on ! lo0 proto tcp from any to any port 6000:6010

In linux I pkg_add udhcpd , and iptables is too complex to deal with .
So ,openbssd is greeat .

-
Bye . tuyosi takesima .
http://openbsd-akita.blogspot.jp/2014/06/openbsad-runs-on-usb-memory-no-need-hdd.html