Today's snapshot brokes some Qt app?

2024-03-31 Thread Kirill A . Korinsky
Folks,

I just run: pkg_add -D snap -u

After that I've discovered that some Qt apps are crashing with errors like:

  Cannot add multiple registrations for QtQuick
  Abort trap (core dumped) 

for example telegram-desktop crashes but wireshark doesn't.

-- 
wbr, Kirill



Re: No coloring with colorls

2024-03-31 Thread Karel Lucas
This method also works! Instead of vt220 I now used xterm-256color. 
Thank you!


Op 30-03-2024 om 11:51 schreef Stuart Henderson:

On 2024-03-29, Karel Lucas  wrote:

What should I put in /etc/ttys, taking into account that I regularly use
multiple virtual consoles? And where in that file do I place that? At
the beginning or the end? Or somewhere in between?

Replace "vt220" with your preferred option on "console" and "ttyC" lines.
  





Re: Minimum viable HW for OpenBSD

2024-03-31 Thread Peter J. Philipp



On 3/30/24 14:18, Peter J. Philipp wrote:


PS:  I'll probably do this next week I have a need for different 
hardware in my 9U rackmount cabinet.  And one particular one needs 
powercycles (and possibly console) as well.  It's the mango pi, which 
is currently in panic mode most likely or it's hung up, I was building 
ports on it and the 100 Mbit connection went down. 


Hi,

I rebooted the mango pi, btw and I've enabled the watchdogd, hoping it 
will work.  It's awesome that sxidog(4) configures on these!


Best,

-pjp



Re: Security questions: Login spoofing, X11 keylogging, and sandboxed apps

2024-03-31 Thread Dan
On Wednesday, March 27, 2024, Dan  wrote:

> Hello, I have 3 security-related questions:
> (1) Does OpenBSD have a mechanism like Ctrl-Alt-Delete on Windows (Secure
> Attention Key, or SAK) to prevent malware (or a website in fullscreen, for
> example) from faking a logout process and/or faking a login prompt? On
> Windows the kernel ensures that the operating system captures this key
> combination and takes over with a real login prompt that malware can't fake
> without first defeating the OS security.
>

(Let me clarify for the rest of this message: malware is any program that
acts maliciously; it doesn't *necessarily* bypass exploit mitigations or
security features of the OS (e.g. it could work around them, or abuse the
lack of them).)

Something recent that I found that's relevant:
https://www.bleepingcomputer.com/news/security/decade-old-linux-wall-bug-helps-make-fake-sudo-prompts-steal-passwords/
(From March 28, 2024. Note that this isn't a vulnerability in how the OS
separates users or enforces security, this is a vulnerability that could be
used to make a convincing "phishing" attack.)
This isn't exactly the issue that SAK prevents, because the SAK is meant to
be used at login time (not when already logged in as one user and trying to
doas/sudo one program/command into another user), but I'll repeat the two
links I sent before:
https://security.stackexchange.com/a/34975
https://learn.microsoft.com/windows/win32/winstation/desktops
The second link being the more relevant one. Notice how Microsoft describes
that User Account Control takes over the screen with a secure desktop mode.
UAC is the equivalent of doas/sudo. There's an additional problem though:
malware and websites in fullscreen could mimic the sound and visual dimming
effect that UAC does on Windows. While UAC doesn't ask the user to press a
privileged key combination like Ctrl-Alt-Delete (so the user has no
guarantee that the UAC prompt is authentic, even with the said perceptual
effects), it does something else: it asks for authorization (and details
what is authorized exactly) without relying on knowledge of the passphrase
as proof for authorization. Malware on OpenBSD that knows the root
passphrase, or the passphrase of a doas-capable/sudoer user, can escalate
its privileges; malware on Windows (including web content that escapes the
browser's sandbox) that knows the passphrase of a user in the
Administrators group cannot escalate its privileges without first
compromising the integrity of Windows, because asking Windows to escalate
privileges would ensure that the user authorizes the escalation regardless
of the passphrase (let's assume that UAC is set to its highest (fourth)
level, rather than the default (third) level that excepts some system
programs from causing a UAC prompt when escalating). (Web content that
escapes the browser's sandbox of Chromium, Firefox, and Tor Browser on
OpenBSD would need to compromise the integrity of OpenBSD, because it
sandboxes them further using pledge(2) and unveil(2) (or find a weakness in
how these two are set up). So that's already a very good thing, but that
alone is not enough.) It's important to emphasize that it doesn't matter
whether UAC asks or doesn't ask for a passphrase to authorize, rather the
important thing here is that it takes over the computer temporarily in a
way that cannot be interfered with by normal programs and asks for explicit
authorization; it could as well ask for a passphrase too as a second
factor. Malware that fakes a UAC prompt and get "authorized" by the user
would achieve nothing, as it hasn't really asked Windows to escalate,
whereas malware on OpenBSD that convincingly fakes a doas prompt and gets
"authorized" by the user can then impersonate the "authorizing" user going
forward.


Re: configure rad for ULA addresses

2024-03-31 Thread Evan Sherwood
Ok, think I figured it out.

My core problem was that I was assigning prefixes manually in rad.conf,
then assigning each interface an address *in the same prefix*. This
created some kind of conflict—the nature of which I still don't fully
understand.

This was the key line I missed in rad.conf(5):

> The default is to discover prefixes to announce by inspecting the IPv6
> addresses configured on an interface.

So as long as my interface has both addresses assigned in their
respective prefixes, rad can serve those without any extra
configuration.

Here's my final /etc/hostname.igc1:

inet 192.168.1.1 255.255.255.0 NONE
inet6 autoconf
inet6 alias fdd0:c720:85fa:100::1 64

And my final /etc/rad.conf:

interface igc1 {
  dns {
nameserver {
  fdd0:c720:85fa:100::1
}
  }
}

Now devices on my network are getting both GUA and ULA addresses
assigned automatically through SLAAC.



Re: silence logging of dhcpd deny unknown-clients

2024-03-31 Thread Evan Sherwood
> Is there any way to silence these logs? I only want to hand out a
> small number of IPv4 addresses on my IPv6 network to those machines
> that won't function properly without them. That leaves many machines
> on my network constantly requesting IPv4 addresses, and dhcpd is
> clogging my /var/log/daemon file:
>
>> ... dhcpd[13399]: DHCPDISCOVER from xx:xx:xx:xx:xx:xx via igc3
>> ... dhcpd[13399]: no free leases on subnet 192.168.3.0
> 
> ... over and over and over again.
> 
> I didn't see any logging options in dhcpd(8) or dhcpd.conf(5).

I wasn't able to figure out how silence specific messages from a given
daemon at a specific level. I read up on syslog.conf(5) and saw that I
could silence all warnings from dhcpd, but I don't want to do that—just
those for this specific directive.

In the meantime, I realized that my list of machines that need IPv4
addresses is so small I'm probably better off statically-assigning those
machines their addresses instead of running dhcpd at all, so I've done
that.

If there is a way to silence a log message from a "facility" at a given
"level" without affecting other messages at the same "facility" and
"level," I'd be curious to know, as I'm sure I'll run into this issue
again with something else.



Booting with secure boot enabled

2024-03-31 Thread Chris Narkiewicz
Is it possible to boot OpenBSD with secure boot enabled?

I'd like to try unattended installation over WiFi on ThinkPad X1 and
my UEFI firmware supports PXE over WiFi, but it works only in Secure
Boot mode.

Best regards,
Chris Narkiewicz



Re: Security questions: Login spoofing, X11 keylogging, and sandboxed apps

2024-03-31 Thread Jose Maldonado
El Sun, 31 Mar 2024 01:10:15 +
Dan  escribió:
> On Wednesday, March 27, 2024, Dan  wrote:
> 

Hi @list!

Lots of discussion and useless talk when the solution is in your hands
@Dan:

1.- Are you worried about the fact that apps on X11 may suffer
input-spoofing? Great, start writing all the code necessary to prevent
that from happening and help us improve the security of OpenBSD and any
other OS that uses X11.

Coming here and saying that we are not attentive to security and that
is why we "HAVE" to do something, is utter idiocy. Start doing
something yourself, if you want to collaborate beyond a stupid speech.

2.- Do you want a mechanism that prevents logins being stolen? Same
story, start writing kid, crying at the list doesn't help.

3.- Do you want more applications to have pledge/unveil to improve
security? Same story...start writing the code necessary for it and stop
crying.

Nobody is here to serve your designs or needs. Want something? Write it
down, it contributes to the project more than tantrums and tears.

My last and unique message in this thread: Don´t feed the fucking
troll!

This thread to /dev/null 

-- 
*
Dios en su cielo, todo bien en la Tierra



I DEMAND TO KNOW (re recent activity)

2024-03-31 Thread Peter N. M. Hansteen
Friends,

Some recent activity here (you will remember the threads) had me want to post
this earlier, but I was bowled over by a stomach bug and only found the 
reference 
again now - 

https://mastodon.social/deck/@danielbowen/112173051434619556

which reads:

Daniel Bowen @danielbowen@mastodon.social

>From a tweet of mine from 2011, but evergreen:

I DEMAND TO KNOW WHY YOUR GROUP OF OVERWORKED VOLUNTEERS, WHICH 
I AM NOT A MEMBER OF, IS NOT PURSUING MY PERSONAL GRIEVANCE.

Mar 28, 2024, 12:22 PM

-- 
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
https://bsdly.blogspot.com/ https://www.bsdly.net/ https://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.



Re: I DEMAND TO KNOW (re recent activity)

2024-03-31 Thread Jose Maldonado
El Sun, 31 Mar 2024 22:59:01 +0200
"Peter N. M. Hansteen"  escribió:
> Friends,
> 
> Some recent activity here (you will remember the threads) had me want
> to post this earlier, but I was bowled over by a stomach bug and only
> found the reference again now - 
> 
> https://mastodon.social/deck/@danielbowen/112173051434619556
> 
> which reads:
> 
> Daniel Bowen @danielbowen@mastodon.social
> 
> From a tweet of mine from 2011, but evergreen:
> 
> I DEMAND TO KNOW WHY YOUR GROUP OF OVERWORKED VOLUNTEERS, WHICH 
> I AM NOT A MEMBER OF, IS NOT PURSUING MY PERSONAL GRIEVANCE.
> 
> Mar 28, 2024, 12:22 PM
> 

They demand, but they do not collaborate in any way. They do not lift a
finger to improve things, but they demand and demand that their designs
be fulfilled.

Trolls, who only know how to do one thing: cry loudly.

Don't give them importance, filter the garbage and we continue our
lives.

-- 
*
Dios en su cielo, todo bien en la Tierra



Re: I DEMAND TO KNOW (re recent activity)

2024-03-31 Thread Stuart Henderson
On 2024-03-31, Peter N. M. Hansteen  wrote:
> Some recent activity here (you will remember the threads) had me want to post
> this earlier, but I was bowled over by a stomach bug and only found the 
> reference 
> again now - 

Just block the senders, ignore the threads and move on.




Re: Security questions: Login spoofing, X11 keylogging, and sandboxed apps

2024-03-31 Thread Dan
On Sunday, March 31, 2024, Jose Maldonado  wrote:

> El Sun, 31 Mar 2024 01:10:15 +
> Dan  escribió:
> > On Wednesday, March 27, 2024, Dan  wrote:
> >
>
> Hi @list!
>
> Lots of discussion and useless talk when the solution is in your hands
> @Dan:
>
> 1.- Are you worried about the fact that apps on X11 may suffer


Emphasis on "may".


> input-spoofing? Great, start writing all the code necessary to prevent
> that from happening and help us improve the security of OpenBSD and any
> other OS that uses X11.


There's already rootless X on OpenBSD, it may prevent that? The thing is, I
don't know. So I asked. And there's already efforts to replace X11 with
Wayland, and already efforts to port Wayland to OpenBSD.


>
> Coming here and saying that we are not attentive to security and that


Where did I say that? False accusation.


> is why we "HAVE" to do something, is utter


Where did I say anybody has to do anything? False accusation.


> idiocy. Start doing
> something yourself, if you want to collaborate beyond a stupid speech.


"Speech"? These are important questions.


>
> 2.- Do you want a mechanism that prevents logins being stolen? Same


Why should I want something to be added when it might already exist and I'm
missing it? Again, I asked.


> story, start writing kid, crying at the list doesn't help.


Where did I "cry" or whine about OpenBSD? False accusation. Quite the
contrary, I praised OpenBSD at various times, and I wouldn't have come here
in the first place if I wouldn't have had appreciation for OpenBSD.


>
> 3.- Do you want more applications to have pledge/unveil to improve


Which "more" applications? I do not know whether this:
https://openports.pl/search?file=unveil
https://openports.pl/search?descr=unveil
Is the exhaustive list of all third-party apps that are sandboxed with
pledge/unveil. I asked whether people knew of other programs or whether
it's possible to list other programs beyond that. It seems that you expect
me to assume that these links list all sandboxed programs exhaustively, but
I do not assume, I ask.


> security? Same story...start writing the code necessary for it and stop
> crying.


Where did I "cry" or whine about OpenBSD? False accusation.


>
> Nobody is here to serve your designs or needs.


Which ones? I didn't know I had any.


> Want something? Write it
> down, it contributes to the project more than


What if it's already written down?


> tantrums and tears.


Which ones?


>
> My last and unique message in this thread: Don´t feed the fucking
> troll!


In case you're referring to me feeding trolls rather than being the troll:
Peter N. M. Hansteen said he blocked me after merely my second message in
this thread. Because of his reputation, I lost sense of whether I'm
perceived as a troll here.


Re: Security questions: Login spoofing, X11 keylogging, and sandboxed apps

2024-03-31 Thread Dan
If I'm explaining security or lack of security, or saying things like "this
is not enough", it's not as part of a speech that's meant to whine. I'll
explain: I could've just asked, in my first message, whether OpenBSD has a
mechanism like Ctrl-Alt-Delete on Windows, and whether it has sandboxing
for desktop apps, without explaining the rationale of having such security
features. Then, someone could've come and tell me that these security
features aren't necessary, or that I'm focusing on a minor security aspect.
I wanted an informed discussion, so I was explaining the rationale behind
these to make readers understand why I was asking about them. Furthermore,
in my recent message about the faking of a doas/sudo prompt and User
Account Control (UAC) on Windows, there was a part where I said that the
sandboxing that OpenBSD provides for certain apps "[that alone] is not
enough"; I said that in the context of explaining the security that UAC
provides on Windows compared to what there seems to be with the default
installation of OpenBSD, notice the rest of the message and how that
comment of mine was in parantheses. It may sound like I'm completely
knowledgeable about OpenBSD, but I'm not. I understand certain
generally-applying concepts, but I don't know if, for example, there's a
sysctl(2) or something that can optionally toggle into that. (As an
example, until recently, I didn't know there was an optional sysctl(2) that
can enable extra hardening for malloc.) I hope this clears up why I'm
writing things the way I do.


Re: Security questions: Login spoofing, X11 keylogging, and sandboxed apps

2024-03-31 Thread Todd C . Miller
This thread is now closed, please don't try to continue it.

 - todd



Re: Today's snapshot brokes some Qt app?

2024-03-31 Thread Lucas de Sena
On 2024-03-31, Kirill A. Korinsky wrote:
> Folks,
> 
> I just run: pkg_add -D snap -u
> 
> After that I've discovered that some Qt apps are crashing with errors like:
> 
>   Cannot add multiple registrations for QtQuick
>   Abort trap (core dumped) 
> 
> for example telegram-desktop crashes but wireshark doesn't.
> 
> -- 
> wbr, Kirill
> 

Telegram-desktop (net/tdesktop) also crashed here after a package update.

I then noticed it was caused by linking issues with the qt6 libraries.
Deleting and adding net/tdesktop simply solved that.

That should not be a problem tho.  Applications are normally reinstalled
after the library is updated (or does that only happen when a major
version of the library is installed?).