Re: Why I abandoned OpenBSD, and why you should too...

2013-07-04 Thread Zamri Besar
On Fri, Jul 5, 2013 at 12:28 PM, Tito Mari Francis EscaƱo <
titomarifran...@gmail.com> wrote:

> I was initially thinking this is a troll, but with these quotes:
>


I vote for another troll... but... this year April Fool was over 3 months
ago.

--
Thank you.

Zamri Besar



Ghost Domain Names: Revoked Yet Still Resolvable

2012-02-09 Thread Zamri Besar
Dear all,

It said due to design issues in the DNS protocol. So, indirectly and
probably this will affect OpenBSD BIND too?

Ghost Domain Names: Revoked Yet Still Resolvable
https://www.isc.org/software/bind/advisories/cve-2012-1033

-- 
Thank you.

Zamri Besar



Re: Is it necessary to recompile just to apply a security patch?

2008-08-03 Thread Zamri Besar
On Wed, Jul 30, 2008 at 5:25 AM, Ingo Schwarze <[EMAIL PROTECTED]> wrote:

> Hi skogzort,
>
> Nick Guenther wrote on Tue, Jul 29, 2008 at 01:05:52PM -0400:
> > On Tue, Jul 29, 2008 at 11:41 AM, skogzort <[EMAIL PROTECTED]> wrote:
>
> >> I know nothing/very little about OpenBSD or UNIX. I have been tasked
> with
> >> updating our OpenBSD DNS server with a security fix (Vulnerability Note
> >> VU#800113- Multiple DNS implementations vulnerable to cache poisoning).
>
> That doesn't sound all too well.  You have an OpenBSD server,
> but you have nobody knowing more than very little about UNIX?
> UNIX is easier to administer than Windows, but some learning
> will be required...
>
> Quite probably, your server might be terribly out of date.
> OpenBSD servers ought to be updated at least once a year.
> Please look at the first line of the output of dmesg(8).
> If the version number is lower than "OpenBSD 4.2",
> you should upgrade the base system before applying patches.
> In any case, you should establish a process for regular
> updates of the server.  The best times to update are
> in May and November, just after the -stable releases.
> In my experience, updating twice a year is easier and
> less risky than just once: You get used to it.
> Regularly ordering the CDs and just upgrading from CD
> is the most convenient way to go.
>
> If your task is to maintain that server, carefully read
>  http://www.openbsd.org/cgi-bin/cvsweb/src/etc/root/root.mail?rev=HEAD
> Have a quick look at the resources referenced there,
> just to get an impression what is available.
> The man pages, the FAQ and afterboot(8) are particularly useful.
>
> >> In order to do this it appears that I have to download the source code
> >> re-compile the entire OS.  Recompiling the OS seems to involve a lot of
> >> steps.
>
> Don't compile the whole system from source unless you are actively
> hacking on the base system (which clearly you aren't) or unless
> you want to track -current using a single build for multiple servers.
> As others told you, each errata patch contains instructions what
> exactly must be rebuilt, and how.
>
> >> you don"t even have to reboot the server,
>
> That's indeed true in the present case, yes.
> After patching named, you must restart named,
> but rebooting would be useless.
>
> Of course, kernel patches require rebooting -
> which applies to Windows machines as well, by the way.  ;-)
>
>
> Nick wrote:
> > OpenBSD is mostly designed as a monolithic kernel.
>
> Please stop spreading misleading advice.
> This has nothing to do with the kernel.
> (Hopefully, skogzort didn't start building kernels yet.)
>
> Yours,
>  Ingo
>
> --
> Ingo Schwarze <[EMAIL PROTECTED]>
> usta.de / studis.de system operation
>  *** Can we get a bind9 kernel module for OpenBSD any time soon? ***
>
>

And I just learn that ISC was releasing -p2 patches for BIND to address
stability and performance issues:

http://isc.sans.org/diary.html?storyid=4816

-zamri-



Re: MPLS On OpenBGP

2008-08-07 Thread Zamri Besar
On Wed, Aug 6, 2008 at 11:07 PM, Claudio Jeker <[EMAIL PROTECTED]>wrote:

> On Wed, Aug 06, 2008 at 03:17:41PM +0100, [EMAIL PROTECTED] wrote:
> > Will it be likely possible and feasible to add MPLS feature on OpenBGPd?
> >
>
> Yes.  It is neither impossible nor unfeasible.
> But don't ask when it will happen unless you like to do the work.
>
> --
> :wq Claudio
>
>

Or is it possible to port ayame to OpenBSD? Or is it in progress / done?
http://www.ayame.org/


-zamri-



Re: Document: OpenBSD for PyMES

2008-08-07 Thread Zamri Besar
On Fri, Aug 8, 2008 at 12:07 PM, Fernando Quintero <
[EMAIL PROTECTED]> wrote:

> OpenBSD Colombia team, wrote a document about how to configure a OpenBSD
> Server for a small company.
> Services like dhcp, dns, apache + mysql + php, squid, sarge, nat and
> firewall are "touched".
> I hope you enjoy it.
> Note: Just for people who read spanish.
> Note2: it's based on release OpenBSD v4.3
>
> URL: http://www.openbsdcolombia.org/?q=node/66
>
> See ya!.
>
> --
> --
>
> Fernando Quintero
> *Just a nonroot User*
>
>

And google will be trying to help us. :)

http://translate.google.com/translate_t
http://translate.google.com/translate?u=http%3A%2F%2Fwww.openbsdcolombia.org%2F%3Fq%3Dnode%2F66&hl=en&ie=UTF8&sl=es&tl=en

-- 
Thank you.

Zamri Besar



Vulnerability Note VU#800113 - Multiple DNS implementations vulnerable to cache poisoning

2008-07-09 Thread Zamri Besar
Good morning,

Today, I'm received alert from one of my friends regarding to
Vulnerability Note VU#800113 - Multiple DNS implementations vulnerable
to cache poisoning.
http://www.kb.cert.org/vuls/id/800113

I checked the above site, and found that most of the *BSD status are
unknown. Is this bug affected OpenBSD default bind dns?

I'm don't know either the above bug is similar to this thread or not.
http://marc.info/?l=openbsd-misc&m=118539211412877&w=2

--
Thank you.

Yours truly,

Zamri Besar



Re: Vulnerability Note VU#800113 - Multiple DNS implementations vulnerable to cache poisoning

2008-07-09 Thread Zamri Besar
On Thu, Jul 10, 2008 at 12:14 AM, Mathieu SEGAUD
<[EMAIL PROTECTED]> wrote:
> Vous m'avez dit ricemment :
>
>> On Wed, Jul 09, 2008 at 04:52:39PM +0200, Mathieu SEGAUD wrote:
>>> Vous m'avez dit ricemment :
>>>
>>> > Good morning,
>>> >
>>> > Today, I'm received alert from one of my friends regarding to
>>> > Vulnerability Note VU#800113 - Multiple DNS implementations vulnerable
>>> > to cache poisoning.
>>> > http://www.kb.cert.org/vuls/id/800113
>>> >
>>> > I checked the above site, and found that most of the *BSD status are
>>> > unknown. Is this bug affected OpenBSD default bind dns?
>>>
>>> OpenBSD's named is affected.
>>> It is a flow in the DNS protocol, which means potentially *all*
>>> implementations are affected...
>>
>> Credit where credit is due: djbdns isn't.
>
> good to know. thanks. thus "potentially"
>
>> Without specifics on the issue, I can't tell if OpenBSD's bind is truly
>> vulnerable, but it certainly does use a fixed source port.
>
> Stuart Henderson already answered this question on misc@ (12:10 UTC,
> today). Named is vulnerable. The resolver is not :)
>
> --
> Mathieu
>
>


I'm just finish re-read it right now. Thank you for the input and I
agree that at this moment, we will waiting for the latest official
update from OpenBSD developers.

And probably a minor update for those who are deploying it over
Debian. Looks like it is time to patch it.
http://www.debian.org/security/2008/dsa-1603

Have a nice day!

-zamri-



Re: Identifying Bandwidth Hogs

2008-07-14 Thread Zamri Besar
> On Tue, Jul 8, 2008 at 10:51 PM, David Schulz <[EMAIL PROTECTED]> wrote:
>> Hello,
>>
>> can someone recommend me a good way to quickly determine who on the network
>> is using up most the Bandwith, and preferrably, what are the using it for?
>>
>> I have a 4.3 Machine, which is the Firewall and Router for a Network with
>> about 100 Machines. Every once in a while, i see the Traffic picking up
>> consideribly when using bwm-ng to check. During normal Operation, i know the
>> average Kilobytes per second is around 100kbps , but when bwm-ng shows me
>> the traffic is going up 750kbps, and then i know something is up.
>>
>> Normally then i use something like pftop -s 1 -o rate , and then find out
>> who is on top of the list. I wonder if anyone has a better way of finding
>> Bandwidth Hogs. On an older FreeBSD System, i simply installed iftop, which
>> quickly showed me my top Users. Similar to bwm-ng, but basically showing you
>> per IP who is using how much Bandwidth.
>>
>> Ideally would be a way that not only shows me quickly who is using the most
>> Bandwidth, but also, if they are using it for HTTP traffic, or simply
>> downloading a large mail or having a Skype Conversation or else.
>>
>> Excellent would also be a way i can somehow graph all of that, so that even
>> when i am not in the office, i can identify people who are doing things they
>> shouldnt. I do have an RRD Graph for my main Interface, so i can say for
>> example a few hours ago something made the Traffic pick up to 750kbps for 20
>> minutes, but i have no idea who it was. I once had all my protocols and IP's
>> labeled, and used pfctl -s labels to parse them into my rrd files, but the
>> whole process with collecting and graphing got quite slow.
>>
>> Also i tried darkstat, but its doesnt do a better job than current bwm-ng
>> and pftop.
>>
>> Thanks for any suggestions,
>> David
>
>

Dear Mr David,

Two months ago, one of my members was using Hex to deploy a quick
solution to analyze his network. You may try to check and see either
it is suitable for your environment or not by visiting this website:

http://www.rawpacket.org/projects/hex

Have a nice day! ;)

-zamri-



Re: This is what Linus Torvalds calls openBSD crowd

2008-07-20 Thread Zamri Besar
On Sun, Jul 20, 2008 at 7:42 PM, Duncan Patton a Campbell <
[EMAIL PROTECTED]> wrote:
>
>
>
> Wanking Sea Monkeys, then: the oceanic analogue of fleas,
> at least in the area of genital proportion ;-)
>
> Dhu
>
>

lol. Looks like someone is selling new stuffs over the net:

http://www.cafepress.com/spankymm

-zamri-



Re: Memory not detected

2008-07-23 Thread Zamri Besar
On Wed, Jul 23, 2008 at 10:59 PM, John Nietzsche <[EMAIL PROTECTED]>
wrote:

> Dear OpenBSD user,
>
> i am installing openbsd 4.3 on a dell poweredge 2900 hardware. It has
> 8GB RAM but openbsd seems to detect only 4 GB.
> Any suggestions on this matter (i would like to have openbsd detecting 8
> GB)?
>
> Thanks for your time and cooperation.
>
> Best regards.
>
>
Are you running amd64 or i386 or else?

-- 
Thank you.

Zamri Besar



Re: Is it necessary to recompile just to apply a security patch?

2008-07-29 Thread Zamri Besar
On Tue, Jul 29, 2008 at 11:41 PM, skogzort <[EMAIL PROTECTED]> wrote:

> Is it necessary to recompile just to apply a security patch?
>
> Hello,
> I know nothing/very little about OpenBSD or UNIX. I have been tasked with
> updating our OpenBSD DNS server with a security fix (Vulnerability Note
> VU#800113- Multiple DNS implementations vulnerable to cache poisoning).
>
> In order to do this it appears that I have to download the source code
> re-compile the entire OS. Recompiling the OS seems to involve a lot of
> steps.
> Before I continue to read through them all, I just want to confirm that it
> is
> actually necessary to do all of this, simply to apply a security patch:
>
> Down load the tree..
> Pre load the tree..
> Build the Kernel..
> Build the userland..
> Etc.
>
> The only thing we use the server for is DNS. I don"t know what Flavor we
> are
> running, since its on a production server I assume it will be * release or
> *
> stable, either way from what I"ve read so far it looks like in order to
> apply
> this security patch I will have to update it to * stable.
>
> Is it true that the only way to apply this patch is to recompile the entire
> OS, and go through all the steps above? I"m only familiar with Windows,
> where
> you just push a button to apply a security patch and you don"t even have to
> reboot the server, so I was thinking that I may be misunderstanding what
> I"m
> reading.
>
> Thanks very much for your time and any info
>
> Kyle
>
>
>

The first step is you need to identify which version of OpenBSD that you're
running right now, and apply suitable patches to your system. For latest DNS
patches, OpenBSD developers were releasing two version of security fixes for
4.2 and 4.3. Just follow the given instruction at the top/head of every
patch.

http://www.openbsd.org/errata43.html
ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/004_bind.patch

http://www.openbsd.org/errata42.html
ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/013_bind.patch

And you may check archive, couple of days ago, iirc someone reported they
were successfully updating their DNS in 4.1 by using patch from 4.2.

And finally, probably you need to read about this too (not sure either the
above patches will affect DNS performance in OpenBSD, but someone just
reporting it about some issue with Ironport, check archive):
http://marc.info/?l=bind-users&m=121726908015389&w=2

-- 
Thank you.

Zamri Besar



[Full-disclosure] FreeBSD and OpenBSD ftpd bug (not exploitable?)

2010-03-07 Thread Zamri Besar
Dear all,

Found this in full-disclosure mailing list.

-- Forwarded message --
From: Kingcope 
Date: Fri, Mar 5, 2010 at 11:19 PM
Subject: [Full-disclosure] FreeBSD and OpenBSD ftpd bug (not exploitable?)
To: full-disclos...@lists.grok.org.uk, bugt...@securityfocus.com


 FreeBSD ftpd globbing bug - null pointer dereference ?

Affected FreeBSD Releases
+-+-+-+-+-+-+-+-+-+
FreeBSD 8.0, 6.3 and 4.9

Affected OpenBSD Releases
+-+-+-+-+-+-+-+-+-+
OpenBSD 4.6

Testing Environment
+-+-+-+-+-+-+-+-+-+
FreeBSD localhost.Belkin 8.0-RELEASE FreeBSD 8.0-RELEASE #0: Sat Nov 21
15:48:17 UTC 2009 r...@almeida.cse.buffalo.edu:/usr/obj/usr/src/sys/GENERIC
i386

Full Description
+-+-+-+-+-+-+-+-+-+
FreeBSD (tested back to 4.9-Release) (and OpenBSD 4.6) has a bug in its ftpd
when handling globbing requests.

My investigation results in this being a null pointer dereference in
popen.c.
I am not sure if this could be a heap overrun, but I don't think so.

from popen.c:

/* glob each piece */
gargv[0] = argv[0];
for (gargc = argc = 1; argv[argc] && gargc < (MAXGLOBARGS-1); argc++) {
glob_t gl;
int flags = GLOB_BRACE|GLOB_NOCHECK|GLOB_TILDE;

memset(&gl, 0, sizeof(gl));
gl.gl_matchc = MAXGLOBARGS;
flags |= GLOB_LIMIT;
[1] if (glob(argv[argc], flags, NULL, &gl))
gargv[gargc++] = strdup(argv[argc]);
[2] else
[3] for (pop = gl.gl_pathv; *pop && gargc < (MAXGLOBARGS-1);
 pop++)
gargv[gargc++] = strdup(*pop);
globfree(&gl);
}

At [1] glob() is called. if theres a long directory (for example "A" x 200)
and a request like described
in "how to repeat this problem" is sent to the ftpd it crashes. My
assumption is because it lands in the
else clause [2], glob doesn't fail but gives back a zeroed out gl structure.
In [3] then there's no check
if pop is null and therefore *pop gets dereferenced which is a null pointer
and the ftpd instance crashes.

Could someone please shed some light into why glob doesn't fail but gives a
zeroed out structure back?

How to repeat the problem
+-+-+-+-+-+-+-+-+-+-+-+-+-+

$ ftp 192.168.2.11
Connected to 192.168.2.11.
220 localhost.Belkin FTP server (Version 6.00LS) ready.
Name (192.168.2.11:nr): kcope
331 Password required for kcope.
Password:
230 User kcope logged in.
Remote system type is UNIX.
Using binary mode to transfer files.
ftp> mkdir
W
257
"W"
directory created.
ftp> ls {W*/../W*/../W*/../W*/../W*/../W*/../W*/}
200 PORT command successful.
---snip---

on the other side:

---snip---
0x282261e5 in read () at read.S:3
3 RSYSCALL(read)
Current language:  auto; currently asm
(gdb) c
Continuing.

Program received signal SIGSEGV, Segmentation fault.
0x0805622c in getline ()
(gdb) i r
eax0x0 0
ecx0x0 0
edx0x0 0
ebx0xbfbfd911 -1077946095
esp0xbfbfba70 0xbfbfba70
ebp0xbfbfcc08 0xbfbfcc08
esi0x1 1
edi0xbfbfcbf4 -1077949452
eip0x805622c 0x805622c
eflags 0x10293 66195
cs 0x33 51
ss 0x3b 59
ds 0x3b 59
es 0x3b 59
fs 0x3b 59
gs 0x1b 27
(gdb) x/10i $eip
0x805622c : mov(%edx),%eax
0x805622e : setle  %cl
0x8056231 : mov%ecx,%esi
0x8056233 : test   %eax,%eax
0x8056235 : je 0x8056281 
0x8056237 : test   %cl,%cl
0x8056239 : je 0x8056281 
0x805623b : mov%edx,%ebx
0x805623d : mov0xee7c(%ebp),%edx
0x8056243 : lea0xee90(%ebp,%edx,4),%edi
(gdb) i f
Stack level 0, frame at 0xbfbfcc10:
eip = 0x805622c in getline; saved eip 0x805047b
called by frame at 0xbfbfcc14
Arglist at 0xbfbfcc08, args:
Locals at 0xbfbfcc08, Previous frame's sp is 0xbfbfcc10
Saved registers:
  ebx at 0xbfbfcbfc, ebp at 0xbfbfcc08, esi at 0xbfbfcc00, edi at
0xbfbfcc04,
  eip at 0xbfbfcc0c
(gdb)

Testing program:

---snip---

#include 
#include 

#define MAXUSRARGS  100
#define MAXGLOBARGS 1000

void do_glob() {
glob_t gl;
char **pop;

char buffer[256];
strcpy(buffer, "{A*/../A*/../A*/../A*/../A*/../A*/../A*}");

int flags = GLOB_BRACE|GLOB_NOCHECK|GLOB_TILDE;
memset(&gl, 0, sizeof(gl));
gl.gl_matchc = MAXGLOBARGS;
flags |= GLOB_LIMIT;
if (glob(buffer, flags, NULL, &gl)) {
printf("GLOB FAILED!\n");
return 0;
}
else
//for (pop = gl.gl_pathv; pop && *pop && 1 <
(MAXGLOBARGS-1);
for (pop = gl.gl_pathv; *pop && 1 < (MAXGLOBARGS-1);
 pop++) {
   

IPv6 - www.openbsd.org

2011-06-04 Thread Zamri Besar
Good morning,

Just a question. www.openbsd.org not reachable via IPv6 network?

> ping6 -c2 www.kame.net
PING6(56=40+8+8 bytes) 2001:e68:2000:3:215:c5ff:fefb:c22f -->
2001:200:dff:fff1:216:3eff:feb1:44d7
16 bytes from 2001:200:dff:fff1:216:3eff:feb1:44d7, icmp_seq=0 hlim=53
time=128.810 ms
16 bytes from 2001:200:dff:fff1:216:3eff:feb1:44d7, icmp_seq=1 hlim=53
time=121.426 ms

--- orange.kame.net ping6 statistics ---
2 packets transmitted, 2 packets received, 0.0% packet loss
round-trip min/avg/max/std-dev = 121.426/125.118/128.810/3.692 ms

> ping6 -c2 www.openbsd.org
ping6: hostname nor servname provided, or not known

> ping6 -c2 www.freebsd.org
PING6(56=40+8+8 bytes) 2001:e68:2000:3:215:c5ff:fefb:c22f -->
2001:4f8:fff6::22
16 bytes from 2001:4f8:fff6::22, icmp_seq=0 hlim=51 time=340.325 ms
16 bytes from 2001:4f8:fff6::22, icmp_seq=1 hlim=51 time=340.765 ms

--- red.freebsd.org ping6 statistics ---
2 packets transmitted, 2 packets received, 0.0% packet loss
round-trip min/avg/max/std-dev = 340.325/340.545/340.765/0.220 ms

> ping6 -c2 www.netbsd.org
PING6(56=40+8+8 bytes) 2001:e68:2000:3:215:c5ff:fefb:c22f -->
2001:4f8:3:7:2e0:81ff:fe52:9a6b
16 bytes from 2001:4f8:3:7:2e0:81ff:fe52:9a6b, icmp_seq=0 hlim=51
time=341.447 ms
16 bytes from 2001:4f8:3:7:2e0:81ff:fe52:9a6b, icmp_seq=1 hlim=51
time=343.418 ms

--- www.netbsd.org ping6 statistics ---
2 packets transmitted, 2 packets received, 0.0% packet loss
round-trip min/avg/max/std-dev = 341.447/342.433/343.418/0.986 ms

> nslookup -type= www.kame.net 8.8.8.8
Server: 8.8.8.8
Address:8.8.8.8#53

Non-authoritative answer:
www.kame.netcanonical name = orange.kame.net.
orange.kame.net has  address 2001:200:dff:fff1:216:3eff:feb1:44d7

Authoritative answers can be found from:

> nslookup -type= www.openbsd.org 8.8.8.8
Server: 8.8.8.8
Address:8.8.8.8#53

Non-authoritative answer:
*** Can't find www.openbsd.org: No answer

Authoritative answers can be found from:
openbsd.org
origin = zeus.theos.com
mail addr = root.theos.com
serial = 950512
refresh = 17200
retry = 3600
expire = 360
minimum = 86400

> nslookup -type= www.freebsd.org 8.8.8.8
Server: 8.8.8.8
Address:8.8.8.8#53

Non-authoritative answer:
www.freebsd.org canonical name = red.freebsd.org.
red.freebsd.org has  address 2001:4f8:fff6::22

Authoritative answers can be found from:

> nslookup -type= www.netbsd.org 8.8.8.8
Server: 8.8.8.8
Address:8.8.8.8#53

Non-authoritative answer:
www.netbsd.org  has  address 2001:4f8:3:7:2e0:81ff:fe52:9a6b

Authoritative answers can be found from:

-- 
Thank you.

Zamri Besar



The insecurity of OpenBSD

2010-01-21 Thread Zamri Besar
The insecurity of OpenBSD
http://allthatiswrong.wordpress.com/2010/01/20/the-insecurity-of-openbsd/

-zamri-