Re: Fssh_kex_exchange_identification: Connection closed by remote host (anon...@git.freebsd.org)

2022-07-05 Thread Philip Paeps

On 2022-07-04 23:19:07 (+0800), John Kennedy wrote:
  Sometime this AM (> 07:10:39 PST8PDT, < 08:15 2022/7/4) the 
anonymous git

repo seems to have developed an issue:

# git remote -v
freebsd anon...@git.freebsd.org:src.git (fetch)
freebsd anon...@git.freebsd.org:src.git (push)
# git pull -v
Fssh_kex_exchange_identification: Connection closed by remote host
Connection closed by 149.20.1.203 port 22
fatal: Could not read from remote repository.

Please make sure you have the correct access rights
and the repository exists.


I've been upgrading cluster machines this week.  The GeoDNS should have 
directed you to another mirror.  Perhaps something was cached for longer 
than expected.  That mirror should be up again now though.  Please let 
me know if the problem persists.


Philip

--
Philip Paeps
Senior Reality Engineer
Alternative Enterprises



Re: ntpd: leap-seconds.list expiration

2023-12-13 Thread Philip Paeps

On 2023-12-13 12:03:02 (+0800), Michael Proto wrote:
Noticed recently (in both my upgraded and newly-installed hosts) that 
the

leap-seconds.list file is in danger of expiration very soon (12/28).


Note that there is no actual "danger" here.  No leap second will be 
introduced at the end of 2023, so the contents of the current 
leap-seconds.list are accurate.  Nothing bad will happen.  Moreover, 
ntpd only uses leap-seconds.list as a last resort.  If peers have leap 
second information, ntpd will pick that up.


Having said that, we should do something about the scary warning.

Xin submitted a draft EN.  The security-officer team will pick that up.

Philip


--
Philip Paeps
Senior Reality Engineer
Alternative Enterprises



Re: pkg_https:// failures related to, for example, "SSL certificate problem: certificate is not yet valid"

2024-07-03 Thread Philip Paeps

On 2024-07-04 01:27:03 (+0800), Mark Millard wrote:
Bootstrapping pkg from 
pkg+https://pkg.FreeBSD.org/FreeBSD:14:aarch64/quarterly, please 
wait...

Certificate verification failed for /CN=pkg.freebsd.org
0020616CE168:error:0A86:SSL 
routines:tls_post_process_server_certificate:certificate verify 
failed:/usr/src/crypto/openssl/ssl/statem/statem_clnt.c:1890:


As far as I can tell, at the time of this writing, all fifteen 
pkg.freebsd.org sites have the same certificate, and OpenSSL is happy 
with it.



Note the "pkg+https://";.

I had separate problems yesterday that I side stepped by
testing use of just "pkg+http://";, which worked. See:


Use pkg+http.  This is the default.  Packages are signed.  Transport 
layer security does not provide any additional security.  (Anticipating 
the usual argument: it doesn't provide privacy either - packages are 
trivially fingerprinted by file size.)



pkg with -d for the https context had its debug output
reporting:

* SSL certificate problem: certificate is not yet valid


Does the system being bootstrapped have a real-time clock?  Common 
causes for this error are clocks set to 1970-01-01 or 2000-01-01.



It happened to be using 204.15.11.66:443 for the https activity.


For what it's worth: 204.15.11.66 = pkg0.tuk.freebsd.org.

r...@pkg0.tuk:~ # openssl x509 -noout -in 
/etc/clusteradm/acme-certs/pkg.freebsd.org.crt -dates

notBefore=Jun  1 20:26:18 2024 GMT
notAfter=Aug 30 20:26:17 2024 GMT

Philip



Re: pkg_https:// failures related to, for example, "SSL certificate problem: certificate is not yet valid"

2024-07-03 Thread Philip Paeps

On 2024-07-04 09:51:53 (+0800), Mark Millard wrote:

On Jul 3, 2024, at 17:47, Philip Paeps  wrote:

On 2024-07-04 01:27:03 (+0800), Mark Millard wrote:
Bootstrapping pkg from 
pkg+https://pkg.FreeBSD.org/FreeBSD:14:aarch64/quarterly, please 
wait...

Certificate verification failed for /CN=pkg.freebsd.org
0020616CE168:error:0A86:SSL 
routines:tls_post_process_server_certificate:certificate verify 
failed:/usr/src/crypto/openssl/ssl/statem/statem_clnt.c:1890:


As far as I can tell, at the time of this writing, all fifteen 
pkg.freebsd.org sites have the same certificate, and OpenSSL is happy 
with it.



Note the "pkg+https://";.

I had separate problems yesterday that I side stepped by
testing use of just "pkg+http://";, which worked. See:


Use pkg+http.  This is the default.


Hmm:

# grep http /usr/src/usr.sbin/pkg/FreeBSD.conf.*
/usr/src/usr.sbin/pkg/FreeBSD.conf.latest:  url: 
"pkg+https://pkg.FreeBSD.org/${ABI}/latest";,
/usr/src/usr.sbin/pkg/FreeBSD.conf.quarterly:  url: 
"pkg+https://pkg.FreeBSD.org/${ABI}/quarterly";,


Releases, snapshots, pkgbase, and artifacts all explicitly
end up with https in /etc/pkg/FreeBSD.conf


Sorry.  The default does seem to have changed to HTTPS since I last 
looked.  The commit log suggests it was done only because it is now 
possible.  I don't think it's a good idea.  It only adds work (and work 
is heat) for no benefit.



pkg with -d for the https context had its debug output
reporting:

* SSL certificate problem: certificate is not yet valid


Does the system being bootstrapped have a real-time clock?  Common 
causes for this error are clocks set to 1970-01-01 or 2000-01-01.


/var/log/messages confirms the time issue for my example
boots that had the problem: it stayed back at Mar 16, not
updating via ntpd as it normally does. (That date is
probably from UFS. The system had not been booted since
back then.)


That's what I suspected.

And this is another reason why HTTPS is a terrible default for pkg.  I 
don't think we should require a system to keep (reasonably) accurate 
time in order to be able to download packages.



It does seem that /etc/pkg/FreeBSD.conf should avoid
the https notation so that it presents an appropriate
default.


I agree.  Adding bapt@ to Cc:.  I think this needs to be reverted.  It 
should probably also be an errata candidate so folks running releases 
can update packages even when their clocks get out of sync.


In addition to needlessly generating heat, pkg+https reduces the overall 
security of the system by making it more difficult for some 
installations to receive updates.


For the avoidance of doubt: I completely support HTTPS as a default for 
web traffic.  Privacy is important.  But pkg downloads are not web 
traffic.


Philip




Typo in EN-25:06 URL (was: Re: FreeBSD Errata Notice FreeBSD-EN-25:06.daemon)

2025-04-10 Thread Philip Paeps

On 2025-04-11 02:30:35 (+0800), Lucas Holt wrote:
I think the current URL for the the daemon patch is (with the period 
before patch)


https://www.freebsd.org/security/patches/EN-25:06/daemon.patch


Good catch!  Git blame awards the pointy hat to me. :)

We'll put a revised advisory on https://www.freebsd.org/security/.

Thanks for reporting this.

Philip