$ stress -c 32 -i 16 -m 2 --vm-bytes 500m -d 4 --hdd-bytes 1g -t 24h
Now I will try to test it with -current. If someone want additional
input, please mail me off-list.
--
best regards
q#
# cu -s 9600 -l /dev/tty00
Connected
ddb> dmesg
OpenBSD 3.8 (GENERIC) #138: Sat Sep 10 15
, I will start test with -stable.
--
best regards
q#
On Tue, Dec 06, 2005 at 04:34:32PM +0100, q# wrote:
> On Tue, Dec 06, 2005 at 10:11:51AM -0500, Aaron Campbell wrote:
> > pedro@ committed a patch which should fix this:
> >
> > http://www.openbsd.org/cgi-bin/cvsweb/src/sys/kern/vfs_bio.c.diff?r1=1.77&r2=1.78
> >
# cat review-remove.txt | ( cd ${DESTDIR:=/} && xargs rm )
References:
1. http://kubek.no-ip.org/~hns/downloads/bsd/sh.clean-up
--
best regards
q#
they work. prompted by and okay sturm@
I ask this kurt@ some time ago, but I will try again. It's any reason
it could not be backported to -stable?
--
best regards
q#
pkgname and then recompile ettercap with `make update'
$ cd /usr/ports/net/ettercap
$ cvs up -r1.14 patches/patch-configure
$ vi Makefile # (_bump_ pkgname here)
$ make build
It should work.
--
best regards
q#
hello,
since when the rum driver has been written I'm using it as AP, bridged
w/ the ethernet if i.e
hostname.msk0:
dhcp NONE NONE NONE
hostname.rum0:
up mediaopt hostap chan 1 mode 11g nwid AP wpa wpakey pwd
hostname.bridge0:
add msk0
add rum0
up
I've recently started suspendig the box (zzz)
Hello.
How to remove user from group?
Have read man usermod, and nothing)
--
with best re
Hello brothers and sisters,
Who knows anything about the secret keys in the packet filter(pf), such as
way only for developers.
Is it real in the open source, and how can I realize it in my own firewall
with open source?
--
with best respect
So, you all guys just joke...
On 14 July 2010 12:26, Jan Stary wrote:
> On Jul 13 18:18:12, jackwssp q wrote:
> > Hello brothers and sisters,
> >
> > Who knows anything about the secret keys in the packet filter(pf), such
> as
> > way only for developers.
> &g
Please, help!
--
with best re
2 Tomas Bodzar:
Why you so ugly? I don't looking for pf manual. As you can see above, i'm
not alone. When i got it, will share it for all on misc@, and you may
furiously try to stop me.
Hello,
Have some problem with kids, my pf rules have n't solve problem.
So, i have up last snort, shutdown pf, and log show me this shit:
[**] [116:150:1] (snort decoder) Bad Traffic Loopback IP [**]
[Priority: 3]
02/06-17:58:53.60 127.0.0.1:22350 -> 255.255.255.255:22350
PROTO:017 TTL:128 T
¡Muy Importante!
Si no puede visualizar correctamente este correo, le pedimos que lo arrastre a
su Bandeja de Entrada
Apreciable Ejecutivo:
TIEM de México
Empresa Líder en Capacitación y Actualización de Capital Humano
Ponemos a su disposición este excelente curso denominado:
Mercadotecnia Moder
Package prices for this week:
[ HEALTHCARE ]
ALL LISTS BELOW : $395
> Complete US Physicians Database
> Chiropractic Doctors in the USA
> American Holistic Medicine Providers/Clinics
> General Dentists in the USA
> Dentists with Specialties
> American Veterinarians & Veterinary Clinics
> US Hos
> To: misc@openbsd.org
> Subject: Re: pflog0, ICMP rule 4294967295/3(short)
John L. Scarfone wrote:
> On Wed, Mar 09, 2005 at 07:42:16PM -0500, Jim Fron said:
>> John L. Scarfone wrote:
>> > On Tue, Mar 08, 2005 at 08:49:18PM -0500, Jim Fron mentioned:
>> >> OpenBSD on le0:
>> >> ...0800 60:
I want to thank the people who have responded recommending authpf. That seems
like a nice add-on, as it will allow me to block all access to the LAN from
wireless clients until they have logged in to the router. It's a trade-off, of
course, as I had not intended to allow wireless clients SSH a
I've been informed, if I understand correctly, that bridge isn't intended to do
what I want to do with it.
FWIW, anyone who is interested, I'm hanging up the modification effort at "half
complete," because it accomplishes everything I need. That is, I'm interested
in blocking traffic to the ro
Caso nco consiga visualizar este e-mail, acesse esse link.
Conssrcio Embracon
Conssrcio Embracon
Conssrcio Embracon
Este email i enviado de acordo com o "Guia de Boas Maneiras" de e-mail
marketing da ABEMD (Associagco Brasileira de Marketing Direto). Caso nco
queira mais receber informagues, ca
> internet. So, I stopped my dhcpcd client, and restarted it. After, when
> I try to ping www.google.com, it's does'nt work, but I can ping the next
> router, or gateway if you prefer (showed in netstat -nr. If my IP is
> x.x.x.234, the router is x.x.x.1 ). I tried several time to have the
Sou
Hi all,
I'd like to know which compiler is used in OpenBSD's kernel compiling
process.
Thanks.
--
Joco Salvatti
On 5/6/05, Henry Lenzi <[EMAIL PROTECTED]> wrote:
> On 5/3/05, Ian F. Darwin <[EMAIL PROTECTED]> wrote:
> > Robbert Haarman wrote:
> >
> > >>Just how stupid is SUN? Developing a CROSS platform coding solution
> > >>that fails to achieve is goal due to licensing and testing
> > >>restrictions and th
http://home.wplink.net/~yo2lux/tutorials/mysqlchroot.html
On 5/7/05, Carlos Mantero <[EMAIL PROTECTED]> wrote:
> Hi everybody!
> I'm a spanish newbie user, I only use OpenBSD since two days ago. I'm
> trying to get work my server with the default installed Apache (which is
> in a jail), PHP4 and
On 5/8/05, Kurt B. Kaiser <[EMAIL PROTECTED]> wrote:
> The OpenBSD cases have 3 measly little prongs per CD. They secure
> less than 20% of the hole ID
errata.html should be updated
P.S. These long conversations about CD shippings are deserving their
own mailing list :-X
--
Gerardo Santana
Dave Feustel wrote:
Is there any straightforward way to
block email from locations that whois shows
to have been created by doubleclick.com?
Thanks,
Dave Feustel
You can use BIND for this.
In /var/named/etc/named.conf you can put something like
zone "doubleclick.com" {
type master;
Dave Feustel wrote:
Is there any straightforward way to
block email from locations that whois shows
to have been created by doubleclick.com?
Thanks,
Dave Feustel
Yuck, did not read your mail properly before replying... You can
use the blacklisting functionality of spamd.
/Sigfred
Hi all, I have a OpenBSD 3.6 server box, on a Pentium 3.0 HT, 80 GB SATA HD
AND
1Gb RAM. I've bought a 120Gb HD for backup purposes only, I shut my machine
down, plugged it in, and when it started the OS detected a newly connected
device as it follows:
umass0 at uhub4 port 4 configuration 1 interf
I connect to my firewall with putty. How can I get rid of messages like
these from
appearing in my ssh terminal session? These appeared twice a second so
it is wery hard to
work with the console.
(It was obviously someone trying to get access to something?)
May 16 18:30:05 localhost sshd[21201
Is there any way to configure ssh to allow root access from private
network address.
and at the same time allow ssh-access from outside for other users (not
root) ?
Hello,
I want to use authpf to authenticate users before allowing them out of the
gateway. If I understand correctly by using authpf as shell theyll lose
their regular shell-account (e.g. ksh). Is it possible to use ksh after
authentication by means of authpf? Or should I make 2 accounts for each
Hi all,
I'd like to know if OpenBSD's kernel has loadable modules support, and how I can
do for loading, unloading and check for loaded modules.
Thanks
--
Joco Salvatti
What is the reason for smtpd and smtpfwdd disappearance in 3.5 and 3.6 - and
reappearance in 3.7?
What is the recommended solution for a secure OBSD e-mail server serving som
few internal mail clients + some external?
(sorry - but yes, outlook clients).
sendmail (in base)
spamd(in base)
popa3
Hi all,
I followed with no errors the steps described in
http://www.openbsd.org/stable.html. Does it mean that my kernel and program
binaries are all up to date? Does my kernel have the earlier known bugs fixed?
Is my whole system up to date?
Thanks...
--
Joco Salvatti
Is this secure?
I have set up an authpf on my firewall. When I authenticate with an ssh2
des keyfile the firewall passes
and forwards it to my windows computer according to my rules in
authpf.rules. On my windows computer I run Cygwin sshd also with ssh2
PubkeyAuthentication.
Of courseI have P
Won't this be a mission impossible to hack?
If you ever watched mission impossible you would know that there is no
such thing as impossible.
btw. this message will self destruct in five seconds.
/jtm
You must have unplugged your OpenBSD machine from the internet when you
heard of the blaster virus...
On Sun, 2005-05-08 at 10:00 -0500, Dave Feustel wrote:
> For the OpenBSD experts on this list:
>
> Can the malware at Gookle.com described at the link
> crack OpenBSD and/or Konqueror?
> (I am fa
I am trying to set up ESP tunnels with ISAKMPD myself, but I am far
from an IPSec pro, does anyone know what would be "best practice" in
the light of this event?
/ Johan P
On 5/13/05, Peter Galbavy <[EMAIL PROTECTED]> wrote:
> FYI; This is not specific, but should be interesting to misc@ readers.
Thank you Hans-Joreg for your quick reply.
On 5/13/05, Hans-Joerg Hoexer <[EMAIL PROTECTED]> wrote:
> Use esp with enc+auth, as written in isampd.conf(5).
>
>
> On Fri, May 13, 2005 at 01:28:29PM +0200, Johan P. Lindstrvm wrote:
> > I am trying to set up ESP tunnels with ISAKMPD myself, but I am
Got my 3.7 CD's today in Slovenia, EU. Wim did a great job while packing the
cd's - the UPS guy brought me a A4 sized cardboard box, filled with confetti
from somebody's shredder. Buried within were two CD-sets, each individually
wrapped in the usual padded KD85 envelope. It can't get better than t
Hi all:
I've bought a new Dell X1 and I'm having problems configuring iwi on
it. The access point is a post 3.5 machine using wi (11b)
After installing -current from yesterday, dmesg reports:
# dmesg | grep iwi
iwi0 at pci2 dev 3 function 0 "Intel PRO/Wireless 2200BG" rev 0x05:
irq 10, address 00
Hi
Where can I find info about the OS utility that I think Marco Peereboom worked
on for AMI cards?
Is it released with 3.7? If not, where can I find it?
How does it work and what can it do?
Wonder as I use an LSI logic 150-4 MegaRAID card on 3.6 (+ami driver updates)
and will upgrade to 3.7 s
Hi Marco.
top posting... ok
As I am still on 3.6 I assume this bioctl can bee seen from 3.7?
Another poster said it might be implemented as of 3.8.
Is it possible to do some raid checks after my upgrade to 3.7? Or do I have to
wait for 3.8 or rely on my raid card sound alarm for faulty disks. It
On Wednesday 04 May 2005 20.41, Rogier Krieger wrote:
> Just a happy user report. Hopefully, this is of use for those
> searching the archives.
>
> As it seems, the LSI Logic MegaRAID SATA 150-4 seems another name for
> the LSI/Symbios 523 listed in the HCL. For completeness, I attached a
> dmesg o
On Sunday 15 May 2005 20.11, Alexander Hall wrote:
> Per-Olov Sjvholm wrote:
> > LSI 150-4 works like a charm (OpenBSD 3.6 + driver cleanup patches from
> > CVS)... I have many of them. Both in 32 and 64 bit slots. Now I use it on
> > some OpenBSD 3.7 installations as well.
> >
> > What can I say..
Please do not top post
LSI MegaRAID SATA 300-8x is PCI-X and LSI MegaRAID SATA 150-4 is not. But both
work on 5V.
The PCI connector pins define how the card draws power from the Mother Board.
Pin arrangements are defined for +5 volts, +3.3 volts, or +5 and +3.3 volts.
The +5 volt connect
45 matches
Mail list logo