Re: Is ZFS native encryption safe to use?

2023-08-23 Thread Leif Pedersen
On Wed, Aug 23, 2023, 02:02 grarpamp wrote: > On 8/22/23, i...@tutanota.com wrote: > > There seems to be a bit of open (and rather old) ZFS native encryption > > bugs which still haven't been fixed and it doesn't look like it is > > something that is being working on. > > > > Last night I was go

Re: Important note for future FreeBSD base system OpenSSH update

2021-09-12 Thread Leif Pedersen
On Sun, Sep 12, 2021, 2:45 PM Christian Weisgerber wrote: > On 2021-09-12, Leif Pedersen wrote: > > > Management ports for power strips, switches, UPSs, generators, > thermostats, > > radios, etc should already be isolated on a separate vlan or whatever. > > In

Re: Important note for future FreeBSD base system OpenSSH update

2021-09-12 Thread Leif Pedersen
I agree with Karl. To further the point: "Secure by default" is a good idea, so removing ssh-rsa from the default list makes sense to alert people if its still in use. Management ports for power strips, switches, UPSs, generators, thermostats, radios, etc should already be isolated on a separate

Re: FreeBSD Security Advisory FreeBSD-SA-19:19.mldv2

2019-10-17 Thread Leif Pedersen
On Thu, Oct 17, 2019 at 5:06 AM Eugene Grosbein wrote: > 15.10.2019 0:00, Fernando Gont wrote: > > >>> Since FreeBSD ships with IPv6 support enabled by default, aren't all > >>> systems affected, one way or another? > >> > >> No, you have to configure IPv6, otherwise processing is not done. > > >

Re: Let's Encrypt

2019-10-13 Thread Leif Pedersen
On Sat, Oct 12, 2019 at 6:28 PM Garrett Wollman wrote: > < > said: > > > Trond Endrestøl wrote: > >> > >> #minute hourmdaymonth wdaywho command > >> > >> 52 4 1 * * rootcertbot renew --quiet > --pre-hook "service apache24 stop" --post-hook "ser

Re: OpenSSH HPN

2015-11-11 Thread Leif Pedersen
On Wed, Nov 11, 2015 at 4:29 PM, Robert Simmons wrote: > I don't think there is such a thing as a trusted network. That is a unicorn > these days. > > No networks should be considered trusted. > oh baloney. That's just a clever way to say you want to stop thinking about trust. If I've connected

Re: Leap Second

2015-07-01 Thread Leif Pedersen
On Wed, Jul 1, 2015 at 3:27 PM, Peter Jeremy wrote: > > On 2015-Jul-01 12:46:21 -0500, Leif Pedersen wrote: > >Is there a reasonable way to enable awareness of leap-seconds while syncing > >with ntpd? That is to say, how can I get the system to include leap-seconds > >

Re: Leap Second

2015-07-01 Thread Leif Pedersen
On Wed, Jul 1, 2015 at 4:01 PM, John-Mark Gurney wrote: > Though from my reading of the code, you need to have TZ files compiled > w/ leap seconds which FreeBSD doesn't do by default... > I did an equivalent, see my note [2]...and afaict ntp doesn't use tzdata. -- As implied by email protoco

Re: Leap Second

2015-07-01 Thread Leif Pedersen
Is there a reasonable way to enable awareness of leap-seconds while syncing with ntpd? That is to say, how can I get the system to include leap-seconds in calculating `date +%s`, without having `date` be off by 26[1] seconds? The default configuration produces incorrect results when computing hist

Re: Forums.FreeBSD.org - SSL Issue?

2015-05-17 Thread Leif Pedersen
On May 17, 2015 4:49 PM, "Roger Marquis" wrote: > Leif Pedersen wrote: >>> >>> ... more easily remediated (than installworld) and so 'pkg audit' could >> >> report on those. >> >> Exactly how would that differ from using freebs

Re: Forums.FreeBSD.org - SSL Issue?

2015-05-17 Thread Leif Pedersen
On Sun, May 17, 2015 at 3:50 PM, Roger Marquis wrote: > I recommended an openssl_base port so that > security vulnerabilities (not necessarily protocol weaknesses) could be > more easily remediated (than installworld) and so 'pkg audit' could > report on those. > Exactly how would that differ fr

Re: DRAM Rowhammer exploits

2015-03-10 Thread Leif Pedersen
I have a suggestion. As a simpler measure, would it be possible to implement a test at boot time to determine whether the system is vulnerable? I guess such a test would have to run in the kernel to get the particular memory mapping required. The result would naturally emit a kernel message, but it

Re: Strange package checksum report

2015-01-23 Thread Leif Pedersen
I wonder if your computer's clock is off by a lot. Python might insist on rebuilding .pyc files if their timestamps are in the future. On Fri, Jan 23, 2015 at 3:57 PM, Brian Reichert wrote: > On Fri, Jan 23, 2015 at 11:59:12AM -0500, Garrett Wollman wrote: > > On some of my machines, I've been

Re: FreeBSD Security Advisory FreeBSD-SA-14:31.ntp

2015-01-07 Thread Leif Pedersen
On Wed, Jan 7, 2015 at 12:50 PM, Dag-Erling Smørgrav wrote: > Leif Pedersen writes: > > # env UNAME_r=10.1-RELEASE freebsd-update -b /j/test upgrade > > freebsd-update: Release target must be specified via -r option. > > This doesn't work because you

Re: FreeBSD Security Advisory FreeBSD-SA-14:31.ntp

2015-01-07 Thread Leif Pedersen
On Fri, Jan 2, 2015 at 11:59 AM, Dag-Erling Smørgrav wrote: > $ sudo env UNAME_r=X.Y-RELEASE freebsd-update -b /path/to/jail fetch > install I use freebsd-update enthusiastically, but I hadn't noticed the -b option before. I'm glad you mentioned it. I've always run freebsd-update inside of each

Re: FreeBSD Security Advisory FreeBSD-SA-14:19.tcp

2014-09-16 Thread Leif Pedersen
On Tue, Sep 16, 2014 at 8:49 AM, Mark Felder wrote: > > How many AS are out there don't implement BCP38? Spoofing these days > without MITM should be considered hard, and TCP even harder, no? I'd > find it more believable that it's easier to hijack BGP than to target > someone and successfully sp

Re: Speed and security of /dev/urandom

2014-07-18 Thread Leif Pedersen
On Fri, Jul 18, 2014 at 1:28 PM, Paul Hoffman wrote: > On Jul 18, 2014, at 11:19 AM, Leif Pedersen wrote: > > > The extra readers interrupt the position of the stream, so that it is > harder to predict the next value. This only works if one instance of the > PRNG is shared b

Re: Speed and security of /dev/urandom

2014-07-18 Thread Leif Pedersen
On Fri, Jul 18, 2014 at 9:26 AM, Paul Hoffman wrote: > On Jul 17, 2014, at 4:41 PM, Steven Chamberlain > wrote: > > > * after seeding, some arc4random implementations completely forget to > > reseed after the process forks - the same 'random' stream of bytes could > > occur twice, with security

Re: ports requiring OpenSSL not honouring OpenSSL from ports

2014-04-27 Thread Leif Pedersen
stall script to put them back. It's kind of like how having multiple versions of perl installed works. This would also fix the problem that if you have both installed then which openssl executables you get depends on $PATH. Thoughts? On 2014-04-27 11:36 AM, "Leif Pedersen" wrote: >

Re: ports requiring OpenSSL not honouring OpenSSL from ports

2014-04-27 Thread Leif Pedersen
With respect that there are valid reasons to have port build options, I kind of hate them. You can't choose them with pkg, and if you pick the wrong one changing it later is a fragile process, and there's no indication if a dependency needs options set a particular way. I'm not bashing the necessa

RE: am I NOT hacked?

2014-04-26 Thread Leif Pedersen
The vulnerability is contained by the process's memory space, since one process cannot read another's memory by merely referencing it (although with exec priv a process can inspect another ...doesn't apply here). OpenSSH doesn't use OpenSSL, nor does su, so passwords aren't vulnerable when typed i

Re: am I NOT hacked?

2014-04-26 Thread Leif Pedersen
Joe, Just thinking about this practically, I don't think you were compromised. It seems more like you goofed the upgrade in the same way on each VM. Also, if I were attacking, I wouldn't leave such overt traces that one would immediately notice. And if the attacker were goofing up that badly, he'd