rc.conf issue on upgrade from 5.5 to 5.6

2014-10-08 Thread Jason Tubnor
Hi, I was just testing upgrades prior to the 5.6 release and noticed items in the rc.conf.local were being ignored. A bit of digging, I noticed, rc.subr had some changes and more importantly there were quite a few changes to rc.conf. Cutting to the chase, replacing rc.conf from the upgraded 5.5

Re: Route-to with a dynamic 'next hop'

2014-10-08 Thread Justin Mayes
Ok I got it working. Here is what I did Enabled multipath routing (sysctl) Added the relayd anchor to pf.conf Created a relayd.conf with this in it gw1="fxp0" gw2="fxp1" table { $gw1 ip ttl 1, $gw2 ip ttl 1 } router "uplinks" { route 0.0.0.0/0 forward to check icmp } Started

Re: Route-to with a dynamic 'next hop'

2014-10-08 Thread Justin Mayes
I just watched Reyk's youtube. I'm going with relayd. I can see the 'routers' section in the man page for relayd to do what I want. http://www.youtube.com/watch?v=JtMxGslqGbM -Original Message- From: owner-m...@openbsd.org [mailto:owner-m...@openbsd.org] On Behalf Of Justin Mayes Sent

Route-to with a dynamic 'next hop'

2014-10-08 Thread Justin Mayes
Greetings all - I have 2 internet connections. One of them is static IP, one is dynamic. I want to use both of them on my gateway. From the man pages and other docs I see the use of route-to in the pf.conf including the 'next-hop' that it requires. This is easy enough. Problem is that the next hop

Re: smtpd smarthost ISP config

2014-10-08 Thread trondd
What is the failing result? Does the email bounce? Error in the log? Does your smtp server require authentication and you need to provide a password with the secrets.db?

smtpd smarthost ISP config

2014-10-08 Thread admin
Hello Current Sep 25 i386: I want to use shawmail.vc.shawcable.net as smarthost, and i tried smtp:// tls+auth:// and the others with failing results. What could be wrong? Thanks. -- # $OpenBSD: smtpd.conf,v 1.7 2014/03/12

Re: no keyboard during snapshot/amd64 installation on MacBookPro 11,1

2014-10-08 Thread Bryan Steele
On Wed, Oct 08, 2014 at 09:45:59PM +0200, Jind??ich Ka wrote: > Hello list, > > Trying to install amd64 snapshot on MacBookPro 11,1. Boot process stops on > message: scsibus1at softraid0: 256 targets. After minute or more the install > program appear. But keyboard do not work. I tried to use

Re: combination of ssh port fowarding and pf redirection

2014-10-08 Thread stan
Anyone have any sugestions as to how to make this work? On Tue, Oct 07, 2014 at 07:32:53PM -0400, stan wrote: > Sorry that I did not make this clear. > > Here s what I am tryin to do, I have a DB server behind a OpenbSD firewall > that we control. I have a non routable nework behind it that conne

no keyboard during snapshot/amd64 installation on MacBookPro 11,1

2014-10-08 Thread Jindřich Káňa
Hello list, Trying to install amd64 snapshot on MacBookPro 11,1. Boot process stops on message: scsibus1at softraid0: 256 targets. After minute or more the install program appear. But keyboard do not work. I tried to use another USB keyboard, but its same. In pckbc(4) is written, that device fl

Re: Firewall: Where is the bottleneck?

2014-10-08 Thread jummo4
Hi Andy, This morning I have added Priority Queueing (PRIQ) to the ruleset and prefer TCP ACK packets over everything else. I can see the queues with systat queue but the change has no effect on the user experience nor the throughput. I have read something about adjust TCP send and receive w

Re: ksh, csh same vulnerability as bash

2014-10-08 Thread Giancarlo Razzolini
On 08-10-2014 17:14, David Coppa wrote: > On Wed, Oct 8, 2014 at 9:47 PM, Giancarlo Razzolini > wrote: >> On 08-10-2014 15:03, Артур Истомин wrote: >>> How affiliate mtier with OpenBSD? Is it safe method/source for update? >>> Who they are? >> It has been pointed to me that one of the

Re: ksh, csh same vulnerability as bash

2014-10-08 Thread David Coppa
On Wed, Oct 8, 2014 at 9:47 PM, Giancarlo Razzolini wrote: > On 08-10-2014 15:03, Артур Истомин wrote: >> How affiliate mtier with OpenBSD? Is it safe method/source for update? >> Who they are? > It has been pointed to me that one of the ports maintainer/developer, is > associated with them. not

Re: ksh, csh same vulnerability as bash

2014-10-08 Thread Giancarlo Razzolini
On 08-10-2014 15:03, Артур Истомин wrote: > How affiliate mtier with OpenBSD? Is it safe method/source for update? > Who they are? It has been pointed to me that one of the ports maintainer/developer, is associated with them. I've been using since 5.4, and had no issues so far. Their pa

Re: packet filter: question about parentheses around "self"

2014-10-08 Thread Henning Brauer
* Harald Dunkel [2014-10-07 13:46]: > A related question: I wonder how well "(self)" and "(group)" > perform, compared to tables listing IP addresses? Is (self) > evaluated every time for each rule using it, once per connection, > in certain intervals, or only if one of the network interfaces > ar

Re: NAT logging and limits using pf

2014-10-08 Thread Henning Brauer
* Stuart Henderson [2014-10-05 22:49]: > Normal PF logging isn't particularly well-suited to CGNAT-type requirements, > in order to record both the internal address and the nat mapping you need > to log both the inbound and outbound packets and piece it together from the > two separate log entries

Re: ksh, csh same vulnerability as bash

2014-10-08 Thread Артур Истомин
On Wed, Oct 08, 2014 at 09:39:39AM +, Stuart Henderson wrote: > On 2014-10-08, Jason Adams wrote: > > On 09/29/2014 05:00 AM, Peter Hessler wrote: > >> You tested bash. All 3 shells are behaving correctly by passing the env > >> variable to the bash command you are running. the bash command

OpenBSD don't recoginize Android Phone (Alcatel OneTouch 993D with Android 4.0.4) as USB Modem

2014-10-08 Thread Dmitry Orlov
>Synopsis:OpenBSD don't recoginize Android Phone (Alcatel OneTouch 993D with Android 4.0.4) as USB Modem >Category:Kernel, URNDIS (probably) >Environment: System : OpenBSD 5.6 Details : OpenBSD 5.6-current (GENERIC.MP) #403: Tue Oct 7 18:24:37 MDT 2014 dera...@amd64.op

Re: ksh, csh same vulnerability as bash

2014-10-08 Thread Stuart Henderson
On 2014-10-08, Jason Adams wrote: > On 09/29/2014 05:00 AM, Peter Hessler wrote: >> You tested bash. All 3 shells are behaving correctly by passing the env >> variable to the bash command you are running. the bash command you are >> running is behaving incorrectly by parsing the variable as a fu

Re: ksh, csh same vulnerability as bash

2014-10-08 Thread Dennis Davis
On Wed, 8 Oct 2014, Gregor Best wrote: > From: Gregor Best > To: Jason Adams > Cc: misc@openbsd.org > Date: Wed, 8 Oct 2014 08:57:53 > Subject: Re: ksh, csh same vulnerability as bash > > On Tue, Oct 07, 2014 at 10:05:57PM -0700, Jason Adams wrote: > > [...] > > So the question is, for those of

Re: ksh, csh same vulnerability as bash

2014-10-08 Thread Gregor Best
On Tue, Oct 07, 2014 at 10:05:57PM -0700, Jason Adams wrote: > [...] > So the question is, for those of us that have added the bash package, > why is bash still vulnerable after all these weeks, when everyone else has > fixed > their bash packages? > > Just checked for updated pkg, today, and its