a few more sparcles

2016-09-04 Thread Ted Unangst
a few sparc references sprinkled about in dev Index: ic/com.c === RCS file: /cvs/src/sys/dev/ic/com.c,v retrieving revision 1.160 diff -u -p -r1.160 com.c --- ic/com.c3 Sep 2016 14:43:37 - 1.160 +++ ic/com.c4 Sep 201

Re: iwm ioctl rwlock

2016-09-04 Thread Ted Unangst
Stefan Sperling wrote: > Replace the ioctl tsleep/wakeup BUSY flag dance with an rwlock. This does the same change for the other intel wifi drivers. Mechanical change, but I don't have hardware to test. Index: if_ipw.c === RCS file:

Re: remove usermount remnants

2016-09-04 Thread Ted Unangst
Martin Natano wrote: > usermount is dead. Ok? ok

Re: mount(8): strlen + malloc + snprintf == asprintf

2016-09-05 Thread Ted Unangst
Ali H. Fardan wrote: > If you can read my statement and reply with a proper statement, > I'd appreciate it. You are wrong.

Re: Sync getopt with getopt

2016-09-05 Thread Ted Unangst
Todd C. Miller wrote: > On Sun, 04 Sep 2016 11:58:23 -0600, "Anthony J. Bentley" wrote: > > > This brings /usr/share/misc/getopt in sync with the example in getopt(3). > > OK, though I wonder if anyone actually looks at this file? i think it's better to delete it.

Re: Drop main() prototype

2016-09-05 Thread Ted Unangst
Sevan Janiyan wrote: > Hello, > Attached patches remove the main() prototype from > src/{sbin,usr.bin,usb.sbin} yes!

memmove in memcpy

2016-09-05 Thread Ted Unangst
It seems we're sticking with the C memcpy for a while (which does the bounds check and logging) but now we're missing out on the potential asm speedup. Let's try the best of both worlds by having the C memcpy call into memmove. Yes, it'll do another direction test, but then it will go zip zoom fast

Re: [PATCH] Callback-based interface to libtls

2016-09-05 Thread Ted Unangst
Bob Beck wrote: > > > > Agreed, I was also a bit unclear on payload at first (though it grew on > > me over time, so I didn't change it). Here's an update with the > > parameter renamed and better documented. > > > > ok? > > Yeah. I'm good with this > > IMO get it in so we can tweak it in tree.

Re: mount(8): remove unneeded headers

2016-09-07 Thread Ted Unangst
Michal Mazurek wrote: > ok? > > Index: sbin/mount/getmntopts.c > === > RCS file: /cvs/src/sbin/mount/getmntopts.c,v > retrieving revision 1.12 > diff -u -p -r1.12 getmntopts.c > --- sbin/mount/getmntopts.c 16 Jan 2015 06:39:59 -

random malloc junk

2016-09-07 Thread Ted Unangst
Instead of always using a fixed byte pattern, I think malloc should use a random pattern. Now, this sometimes means it's harder to identify exactly what's used after free, so we should provide a means to get the old 0xdf pattern back. Since we already have two junk modes, I thought I'd carry on al

Re: ps -o etime

2016-09-08 Thread Ted Unangst
Carlin Bingham wrote: > The "etime" keyword is currently an alias for "start". posix says it > should be the amount of time since the program started running, in the > format [[dd-]hh:]mm:ss, I've encountered some code that doesn't work on > openbsd because that's what it expects. The commit that a

reduce double caching in mfs

2016-09-08 Thread Ted Unangst
Currently, the bufcache doesn't know that mfs is backed by memory. All i/o to mfs ends up being double cached, once in the userland process and again in the kernel bufcache. This is wasteful. In particular, it means one can't use mfs to increase the effective size of the buffer cache. Reading or wr

reduce dependency on _KERNEL

2016-09-09 Thread Ted Unangst
The _KERNEL define is overloaded to mean two things, which results in frequent errors. 1. It means we are compiling the kernel. 2. It means we are compiling a userland program that looks at kernel data structures. Just because we need data structures doesn't mean we want everything else in the ker

Re: reduce double caching in mfs

2016-09-11 Thread Ted Unangst
Bob Beck wrote: > I really dislike "CHEAP". > > and it almost seems like these should actually be NOCACHE.. why the heck > can't they be? So i looked at NOCACHE, but it seemed like that option may destroy the buffer too soon. Anyway, I tested it and it does go boom. With just NOCACHE in mfs, crea

Re: rwsleep(9)

2016-09-12 Thread Ted Unangst
Martin Pieuchot wrote: > I'd like to use a write lock to serialize accesses to ip_output(). This > will be used to guarantee that atomic code sections in the socket layer > stay atomic when the input/forwarding path won't run under KERNEL_LOCK(). > > For such purpose I'll have to convert some tsl

Re: split gzip into processes

2016-09-12 Thread Ted Unangst
Ted Unangst wrote: > This splits gzip into two processes, such that the heavy lifting is done in a > process with even fewer privileges. The idea is the child decompresses the > data and feeds it to the parent over a pipe. There's also a control pipe used > for some metadata

Re: rwsleep(9)

2016-09-12 Thread Ted Unangst
Philip Guenther wrote: > So what's protecting the state that you're waiting for the change to > occur in? If it's the mutex, then why are you accessing it with only > the rwlock early on? If it's the rwlock then how to prevent a > lost-wakeup by a thread on another CPU getting in between the > rw

acme switch

2016-09-13 Thread Ted Unangst
convert two if else if chains to switches. Index: base64.c === RCS file: /cvs/src/usr.sbin/acme-client/base64.c,v retrieving revision 1.5 diff -u -p -r1.5 base64.c --- base64.c1 Sep 2016 13:49:32 - 1.5 +++ base64.c13

Re: random malloc junk

2016-09-14 Thread Ted Unangst
Daniel Micay wrote: > > The current OpenBSD code only wipes up to MALLOC_MAXCHUNK with junk @ 1, > and it similarly doesn't wipe at all with 'U' (even though junk-on-free > also serves the purpose of preventing information leaks, not just > mitigating use-after-free). IMO, optimizing large allocat

rebound quantum entanglement

2016-09-14 Thread Ted Unangst
So the plan is for rebound to be the 'system' resolver, with libc talking to rbeound and rebound talking to the cloud. The main wrinkle is how does rebound find the cloud? rebound.conf, but dhclient doesn't know anything about rebound.conf, preferring to edit resolv.conf. But if rebound reads resol

Re: rebound quantum entanglement

2016-09-14 Thread Ted Unangst
Bob Beck wrote: > how is rebound going to handle a change in resolv.conf? thats still a > problem here oh, that's easy. it watches the file for changes. i never quite got around to that, but it's another five lines.

Re: rebound quantum entanglement

2016-09-14 Thread Ted Unangst
Bob Beck wrote: > wont this also mean if it is not running i have to wait for the localhost > attempt to fail before the resolver moves on? (ASR_STATE_NEXT_NS, etc) so i > slow everything down for a timeout? you get back unreachable and move on. it's fast. you can try it. :)

Re: rebound quantum entanglement

2016-09-14 Thread Ted Unangst
Ted Unangst wrote: > Bob Beck wrote: > > how is rebound going to handle a change in resolv.conf? thats still a > > problem here > > oh, that's easy. it watches the file for changes. i never quite got around to > that, but it's another five lines. ok, so it&#

Re: random malloc junk

2016-09-15 Thread Ted Unangst
Otto Moerbeek wrote: > On Wed, Sep 14, 2016 at 12:53:05PM -0400, Ted Unangst wrote: > > > Daniel Micay wrote: > > > > > > The current OpenBSD code only wipes up to MALLOC_MAXCHUNK with junk @ 1, > > > and it similarly doesn't wipe at all with 'U

Re: rebound quantum entanglement

2016-09-15 Thread Ted Unangst
Florian Obser wrote: > Not everything listening on localhost port 53 is a recursive resolver. > nsd(8) per defaults listens on 0.0.0.0 and will respond with REFUSED for > almost every query. asr stops in that case and does not try the next > resolver in the list. Ah! There's the catch. The good ne

Re: rebound quantum entanglement

2016-09-15 Thread Ted Unangst
Ted Unangst wrote: > So the plan is for rebound to be the 'system' resolver, with libc talking to > rbeound and rebound talking to the cloud. The main wrinkle is how does rebound > find the cloud? rebound.conf, but dhclient doesn't know anything about > rebound.conf, pre

Re: [RFC] domain name matching support for rebound(8)

2016-09-16 Thread Ted Unangst
Dimitris Papastamos wrote: > Hi everyone, > > I've put together a patch for 6.0-stable that adds domain name > matching support to rebound(8). The patch is quite rough at the > moment. > > The config is as follows: > > match "local." 10.0.0.53 > match "." 8.8.8.8 So this is taking

Re: [RFC] domain name matching support for rebound(8)

2016-09-16 Thread Ted Unangst
Dimitris Papastamos wrote: > By the way, what do you think about TCP caching support? I could send > a patch to do just that. It seems unnecessary. tcp proxy support is there because it's necessary, but not because i think it's likely to be used. i'm pretty sure i never use it, except when i deli

little simpler ssh code

2016-09-16 Thread Ted Unangst
no change, but makes the code a little shorter. Index: clientloop.c === RCS file: /cvs/src/usr.bin/ssh/clientloop.c,v retrieving revision 1.287 diff -u -p -r1.287 clientloop.c --- clientloop.c12 Sep 2016 01:22:38 - 1

Re: little simpler ssh code

2016-09-17 Thread Ted Unangst
Ted Unangst wrote: > no change, but makes the code a little shorter. while here, another similar spot. Index: clientloop.c === RCS file: /cvs/src/usr.bin/ssh/clientloop.c,v retrieving revision 1.287 diff -u -p -r1.287 clientloo

Re: hashfree: sizes for free(9) when using hashinit.

2016-09-24 Thread Ted Unangst
Philip Guenther wrote: > On Wed, Sep 21, 2016 at 1:30 AM, Mathieu - wrote: > >> > I'm introducing hashfree, a counterpart to hashinit in order to pass the > >> > size to free(9) while hiding the implementation details. thanks, committed. > I don't understand the rename to hashfree() from the Net

Re: timeout_set_proc(9)

2016-09-25 Thread Ted Unangst
David Gwynne wrote: > + mtx_enter(&timeout_mutex); > + while (!CIRCQ_EMPTY(&timeout_proc)) { > + to = timeout_from_circq(CIRCQ_FIRST(&timeout_proc)); > + CIRCQ_REMOVE(&to->to_list); leave(); > + timeout_run(

Re: Explicitly cast the return variable in tls_load_file()

2016-10-01 Thread Ted Unangst
Kinichiro Inoguchi wrote: > I would like to cast the return variable explicitly in tls_load_file(). > This fix also avoiding Intel C++ compiler "assertion failed" described here. > https://github.com/libressl-portable/portable/issues/209#issuecomment-249587024 This is a compiler bug? The code does

Re: Explicitly cast the return variable in tls_load_file()

2016-10-02 Thread Ted Unangst
Brent Cook wrote: > ​Why not just make the variable type match the return type to begin with? sure, that's reasonable. > > ​--- a/src/lib/libtls/tls_util.c > +++ b/src/lib/libtls/tls_util.c > @@ -105,7 +105,8 @@ tls_load_file(const char *name, size_t *len, char > *password) > FILE *fp; >

Re: Unexpected behavior in su/doas

2016-10-03 Thread Ted Unangst
Simon Ruderich wrote: > Hello, > > I stumbled upon unexpected behavior on OpenBSD 6.0 (all patches) > which seems to allow running commands as the original user when > using su and doas interactively because the controlling terminal > is the same. > Is this behavior expected and if so, how do I r

Re: rebound quantum entanglement

2016-10-03 Thread Ted Unangst
Ted Unangst wrote: > Ted Unangst wrote: > > So the plan is for rebound to be the 'system' resolver, with libc talking to > > rbeound and rebound talking to the cloud. The main wrinkle is how does > > rebound > > find the cloud? rebound.conf, but

Re: timeout_set_proc(9)

2016-10-05 Thread Ted Unangst
Christiano F. Haesbaert wrote: > There is another bug, the thread runs outside of IPL_SOFTCLOCK, the > interrupt handler already runs at IPL_SOFTCLOCK so it did not need to raise > it, but the thread does. > > The mutex is not enough as it will drop before running the handler, this > can cause int

Re: better implementation of malloc option C: canaries

2016-10-06 Thread Ted Unangst
Otto Moerbeek wrote: > > This reduces the size of the canary to 32 bytes max and also prints > the size of the chunk and the offset corruption was spotted. > > a.out(22658) in free(): error: chunk canary corrupted: 0x00c800e7 > > I allocated 200 (0xc8) bytes and overwrote a byte at offset 231

Re: ps.1 tweak

2016-10-06 Thread Ted Unangst
Theo Buehler wrote: > On Thu, Oct 06, 2016 at 08:34:31PM +0100, Jason McIntyre wrote: > > On Thu, Oct 06, 2016 at 09:27:21PM +0200, Michal Mazurek wrote: > > > > > > Don't place a space after the minus sign. Change from this: > > > width in columns. Otherwise, ps defaults to the terminal wi

Re: Fix boundary issue in chacha code

2016-10-07 Thread Ted Unangst
Kinichiro Inoguchi wrote: > I think this 16 bytes string assignment has boundary issue. > > static const char sigma[16] = "expand 32-byte k"; > > I found this when I tried to build libressl-portable with MSVC on Windows. another broken compiler? the above line is perfectly valid C.

Re: Fix boundary issue in chacha code

2016-10-07 Thread Ted Unangst
Brent Cook wrote: > > > On Oct 7, 2016, at 12:18 PM, Ted Unangst wrote: > > > > Kinichiro Inoguchi wrote: > >> I think this 16 bytes string assignment has boundary issue. > >> > >>static const char sigma[16] = "expand 32-byte k&quo

Re: rm.c functions in mv(1)

2016-10-10 Thread Ted Unangst
Jan Stary wrote: > bin/mv has its own copies of cp.c and mv.c. > Apparently, they are modifications of cp's cp.c and rm's rm.c, > used when moving as "copy and remove the source". > > In bin/mv/rm.c, the following snippet of rm_file() confuses me: > > if (S_ISDIR(sb.st_mode)) { >

Re: newlines in unexpand(1)

2016-10-10 Thread Ted Unangst
Jan Stary wrote: > Why do we need to trim the newlines in unexpand(1)? > The result seems to be the same without it. > > Jan > > > Index: unexpand.c > === > RCS file: /cvs/src/usr.bin/unexpand/unexpand.c,v > retrieving revisio

Re: let globals be global in unexpand(1)

2016-10-10 Thread Ted Unangst
Jan Stary wrote: > In unexpand.c, the -a indicator is > both a global int and a local char. I think this is backwards. We want fewer globals, not more.

Re: systat(1) hostname

2016-10-12 Thread Ted Unangst
Theo de Raadt wrote: > > On Wed, Oct 12, 2016 at 03:20:00PM +0200, Otto Moerbeek wrote: > > > simple diff to show the hostname on the second line. OK? > > > > OK bluhm@ > > > > > > > > BTW, batch mode doesn't function here as expected. Need to look into that, > > I hoped this would look more li

Re: systat(1) hostname

2016-10-13 Thread Ted Unangst
Otto Moerbeek wrote: > On Thu, Oct 13, 2016 at 08:20:52AM +0200, Otto Moerbeek wrote: > > > On Thu, Oct 13, 2016 at 08:01:22AM +0200, Otto Moerbeek wrote: > > > > > On Thu, Oct 13, 2016 at 12:15:34AM -0400, Ted Unangst wrote: > > > > > > > Theo

rebound double checking

2016-10-13 Thread Ted Unangst
Currently rebound ignores packets with bad IDs. we should log them. But while we're at it, we should do something a little sneakier. Leave the socket open and listen for additional replies. Ordinarily that shouldn't happen, but it can mean that somebody is trying to mess with us. A local attacker

rebound case randomization

2016-10-13 Thread Ted Unangst
16 bit IDs don't offer much security. This is well known. A trick to encode more bits into the query is to vary the case of the query name. It's case insensitive, but all known servers echo it back exactly, case preserving. Thus we can twiddle the query on the way out and verify we get exactly the

Re: rebound case randomization

2016-10-13 Thread Ted Unangst
Ted Unangst wrote: > 16 bit IDs don't offer much security. This is well known. A trick to encode > more bits into the query is to vary the case of the query name. It's case > insensitive, but all known servers echo it back exactly, case preserving. Thus > we can twiddle th

Re: mcl2k2 mbuf clusters

2016-10-13 Thread Ted Unangst
David Gwynne wrote: > this adds a pool backend for MCLGETI thats 2k+2 bytes in size, which > can be used on some very common nics that have annoying constraints > on their rx descriptors. > > this in turn simplifies the code in those drivers and lets them > always operate on ETHER_ALIGN boundaries

Re: malloc junk bytes

2016-10-14 Thread Ted Unangst
Otto Moerbeek wrote: > Hi, > > 0xdb is better dan 0xd0, since it is unaligned in more cases (think > about the bytes being used as a pointer. ok

Re: malloc canaries for > page sized objects

2016-10-20 Thread Ted Unangst
Otto Moerbeek wrote: > That is certainly not correct: snprintf and friends return the length as > it would have been if an infinite buffer was passed in. > So the strlen should stay. I'll make a new diff soon though with the > error checking, although it might be overkill for this case. I think w

Re: doas.conf(5): clarify args

2016-12-04 Thread Ted Unangst
Ingo Schwarze wrote: > Hi, > > Anton Lindqvist wrote on Fri, Dec 02, 2016 at 10:40:16AM +0100: > > > Make it clear that args is a keyword followed by zero or more arguments. > > Your argument makes sense to me, we generally don't use "..." > to imply a preceding .Ar, but we use it to indicate th

doas parse.y refinement

2016-12-29 Thread Ted Unangst
it occurs to me that arglist and envlist are the same thing, a strlist. Index: parse.y === RCS file: /cvs/src/usr.bin/doas/parse.y,v retrieving revision 1.25 diff -u -p -r1.25 parse.y --- parse.y 29 Dec 2016 19:12:42 - 1.

Re: snapshot installs

2016-12-31 Thread Ted Unangst
Theo de Raadt wrote: > I'm wondering if anyone doing an install/upgrade has noticed any > behaviour changes in the last week... Small buglet: grep /tmp/i/cgiinfo: No such file

Re: using httpd to distribute signify keys

2015-06-19 Thread Ted Unangst
David Gwynne wrote: > this adds the current signify pub key for base to the httpd Server > version header. > > as you say, the keys are small. this could help distribute it widely. > > here's an example of what it looks like: > > dlg@mild ~$ curl -I http://es45/ > HTTP/1.1 200 OK > Connection:

Re: Fix for segfault in find(1)

2015-07-14 Thread Ted Unangst
Gregor Best wrote: > On Tue, Jul 14, 2015 at 09:57:45AM -0600, Todd C. Miller wrote: > > [...] > > Shouldn't this be: > > > > p = (p - *store) + newstore; > > [...] > > Of course, that makes way more sense. An amended patch is attached. so technically i believe this i

Re: Fix for segfault in find(1)

2015-07-14 Thread Ted Unangst
Todd C. Miller wrote: > On Tue, 14 Jul 2015 12:55:35 -0400, "Ted Unangst" wrote: > > > so technically i believe this is still undefined since you're not supposed > > to > > look at freed pointers. an even more better fix would be to save the offset > &g

Re: Thinkpad active cooling

2015-07-14 Thread Ted Unangst
Tobias Ulmer wrote: > As we all know, some Thinkpads have problems with their EC fan control. > EC is not spinning up the fans to maximum speed, let alone blast mode. > They also do not offer ACPI methods to spin the fan up. > > Previous diffs doing manual fan control were always rejected because

Re: words splitting in doas

2015-07-16 Thread Ted Unangst
Vadim Zhukov wrote: > The manpage recommends using absolute paths for commands, but those > won't work. :) This patch makes everything not in a list of special > characters to be a part of word; this way you can easily put > the following in doas.conf: > > permit :somepeople cmd /usr/bin/mail vi

Re: Ask for password for failed commands

2015-07-16 Thread Ted Unangst
Vadim Zhukov wrote: > Ask for a password when we're going to fail() anyway, to avoid > leaking information about available commands. The sudo(8) behaves > the same way, FWIW. > > okay? i need to think about this for a bit. there's a strange interaction where if the nopasswd option is used, you've

Re: words splitting in doas

2015-07-16 Thread Ted Unangst
Vadim Zhukov wrote: > 2015-07-17 1:02 GMT+03:00 Ted Unangst : > > Vadim Zhukov wrote: > >> The manpage recommends using absolute paths for commands, but those > >> won't work. :) This patch makes everything not in a list of special > >> characters to be a

Re: words splitting in doas

2015-07-16 Thread Ted Unangst
Vadim Zhukov wrote: > 2015-07-17 1:02 GMT+03:00 Ted Unangst : > > Vadim Zhukov wrote: > >> The manpage recommends using absolute paths for commands, but those > >> won't work. :) This patch makes everything not in a list of special > >> characters to be a

Re: Ask for password for failed commands

2015-07-16 Thread Ted Unangst
Vadim Zhukov wrote: > Ask for a password when we're going to fail() anyway, to avoid > leaking information about available commands. The sudo(8) behaves > the same way, FWIW. Let's say no for now. I'm not too concerned about this leak. I'm not sure what a user would hope to discover. Hasn't the sy

Re: httpd: hsts (rfc 6797)

2015-07-17 Thread Ted Unangst
Florian Obser wrote: > OK? > > diff --git httpd.conf.5 httpd.conf.5 > index b3eaad8..bfca29f 100644 > --- httpd.conf.5 > +++ httpd.conf.5 > @@ -262,6 +262,18 @@ root directory of > .Xr httpd 8 > and defaults to > .Pa /run/slowcgi.sock . > +.It Ic hsts Oo Ar option Oc > +Enable HTTP Strict Trans

Re: Get Ruby 2.2 test suite passing

2015-07-17 Thread Ted Unangst
Ted Unangst wrote: > Jeremy Evans wrote: > > As an aside, crypt("passwd", "$2") returns ":" instead of NULL. I'm not > > sure if that's a security issue, but I think it is and we should fix it. > > I'll see if I can get a patch f

Re: Get Ruby 2.2 test suite passing

2015-07-17 Thread Ted Unangst
Stuart Henderson wrote: > On 2015/07/17 20:24, Ted Unangst wrote: > > Jeremy Evans wrote: > > > As an aside, crypt("passwd", "$2") returns ":" instead of NULL. I'm not > > > sure if that's a security issue, but I think it is and

Re: httpd: hsts (rfc 6797)

2015-07-17 Thread Ted Unangst
Reyk Floeter wrote: > On Fri, Jul 17, 2015 at 08:20:11PM -0400, Ted Unangst wrote: > > Florian Obser wrote: > > > OK? > > > > > > diff --git httpd.conf.5 httpd.conf.5 > > > index b3eaad8..bfca29f 100644 > > > --- httpd.conf.5 > > >

Re: Patch to add -f flag to cat(1)

2015-07-19 Thread Ted Unangst
Sevan Janiyan wrote: > The feature was actually added to ensure whatever cat was meant to be > reading from was indeed a plain file and not another which could block a > process. > "Use cat -f to avoid denial of service attacks by people who make > .rhosts files fifos." > http://mail-index.netbsd.o

Re: Patch to add -f flag to cat(1)

2015-07-19 Thread Ted Unangst
Sevan Janiyan wrote: > > > On 19/07/2015 15:35, Bob Beck wrote: > > The place to solve this is in whatever is using cat for this purpose. > > check for the file type before blindly cat'ing. > > Understood both your & Ted's explanation regarding cat. > Just so it's crisp clear, ignoring cat(1), h

Re: doas failsafe

2015-07-20 Thread Ted Unangst
Manuel Giraud wrote: > Hi, > > I've just shot myself in the foot after /etc/doas.conf tweaking. This > patch adds a failsafe "permit :wheel" rule in case of syntax error. Is > this safe enough? Should it be done elsewhere (with some kind of > visudo)? I think the failsafe is "run su". Since it is

Re: tame(1), like nice(1) but for permissions

2015-07-20 Thread Ted Unangst
Jeremy Evans wrote: > > If this is worthy of more work, the command line options can certainly > be changed. I just used getopt(3) since it seemed like the easiest > way to handle it. I talked with theo about this some. I'd say it's probably too early, and may lead us down a weird path, where ta

Re: doas failsafe

2015-07-20 Thread Ted Unangst
li...@wrant.com wrote: > > I think the failsafe is "run su". > > Visudo(8) style wrapper for doas(1) that would respect the editor > preferences... is only a suggestion, no? We're 2015 here. and vipf after that? there are countless config files, even more dangerous than doas.conf, that you edit a

Re: softraid and 4096-byte sectors 'fixed'

2015-07-22 Thread Ted Unangst
Kenneth R Westerback wrote: > CAVEAT: The metadata version has changed so new volumes you create > will not be loadable on boxes running older versions of OpenBSD. > > CAVEAT: You can't rebuild a volume created with *only* 512-byte > devices onto a 4K-sector device. The volume must be created with

Re: softdep by default on AMD64

2015-07-23 Thread Ted Unangst
Michael McConville wrote: > There was a great discussion about softdep recently: > > https://marc.info/?t=14216401691&r=1&w=2 > > It needs extra memory, so the FAQ warns against its use on really old > architectures. > > tedu@ described the two main deterrents: > > https://marc.

Re: ssh agent authentication for doas

2015-07-26 Thread Ted Unangst
David Gwynne wrote: > this is rough, but enough to start a discussion. > > this lets doas authenticate a user by talking to their ssh agent > by specifying 'ssh-agent' on a permit line in the config. if agent > auth fails, doas falls back to bsd auth (ie, password auth). > > to minimise the amoun

Re: doas -n

2015-07-26 Thread Ted Unangst
Marc Espie wrote: > > I don't think it falls on the side of bloat, and it's a pretty nifty option > to sudo... well, it's not just about code bloat. or even mostly about code bloat. every option added to the program is added to the man page, and then users learning how to use the program must

Re: doas -n

2015-07-26 Thread Ted Unangst
Marc Espie wrote: > > I don't think it falls on the side of bloat, and it's a pretty nifty option > to sudo... > @@ -361,7 +365,7 @@ main(int argc, char **argv, char **envp) > } > > if (!(rule->options & NOPASS)) { > - if (!auth_userokay(myname, NULL, NULL, NULL)) { >

Re: doas with a timeout

2015-07-27 Thread Ted Unangst
Theo Buehler wrote: > I'm probably missing something, but from reading your implementation of > checktimeout() it seems that you can easily cumvent the password prompt > using something like this (assuming the timeout is enabled for the > user): And this is why this feature is not included in doas

Re: doas with a timeout

2015-07-27 Thread Ted Unangst
Gregory Edigarov wrote: > hi, > here's an updated diff using /var/doas directory root:wheel owned with a > strict 700 permissions. checks and batteries included. Sorry, but this is not a feature we want at this time.

Re: doas strtogid to parsegid

2015-07-27 Thread Ted Unangst
Martijn van Duren wrote: > Hello tech@, > > I looked at the doas code and really like the concept and simplicity. I > did found the strtogid code a little odd for two reasons: > 1) It reads like an mangled variety on the parseuid function. > 2) It returns -1 on error, but gid_t is defined as a __

new errata for TCP, exec, and patch

2015-07-27 Thread Ted Unangst
A few patches are now available. Please consult the website for details. OpenBSD 5.6 errata: http://www.openbsd.org/errata56.html 027: SECURITY FIX: July 14, 2015 All architectures A TCP socket can become confused and not properly cleanup resources. A source code patch exists which remedies

Re: Do not hide actual error for setusercontext

2015-07-28 Thread Ted Unangst
Vadim Zhukov wrote: > I see no point in hidding underlying error message from user. > Found while preparing chroot for doas run tests. > > Okay? setusercontext(3) doesn't say anything about setting errno, so it's not clear it will always be set or to a correct value.

Re: doas keepenv fix

2015-07-28 Thread Ted Unangst
Vadim Zhukov wrote: > This fixes (as t-run-keepenv-path says) the problem found be Ze Loff: > http://marc.info/?l=openbsd-misc&m=143807620616845&w=2 > > Okay? ah, oops. that was supposed to be --nextras i think, but it's clearer this way. > -- > WBR, > Vadim Zhukov > > > Index: doas.c >

Re: fixes for coverity warnings to cat(1)

2015-07-29 Thread Ted Unangst
Sevan Janiyan wrote: > > > On 21/07/2015 00:16, Sevan Janiyan wrote: > > Hi, > > Attached is a diff for a couple of issues raised by coverity, obtained > > from NetBSD src/bin/cat/cat.c r1.53 & r1.54 > > > >>From the commit message in NetBSD CVS: > > "bin/cat/cat.c 976654 Argument cannot be nega

Re: softdep by default on AMD64

2015-07-30 Thread Ted Unangst
Karel Gardas wrote: > Yes, Free also adds softdep journaling. on the other hand Net > completely abandoned softdep in favour of wapbl, this thing is > interesting since it's about ~1k lines. Net also as the only one from > *BSD supports ffs snapshoting, this is about another ~2k lines of > code. Su

Re: worm(6): exit earlier if given invalid arg

2015-08-10 Thread Ted Unangst
Michael Reed wrote: > I only have a very loose idea of what gets accepted or not when the tree > is "locked", so apologies if this should have been sent at a different > time. patches are always welcome. they just get overlooked sometimes. :) > Index: worm.c >

Re: LibreSSL 2.2.2 release

2015-08-12 Thread Ted Unangst
Jan Engelhardt wrote: > > On Wednesday 2015-08-12 20:29, Mark Kettenis wrote: > > > >One possible reason to deviate from using the LibreSSL release version > >would be if we want to continue to be a drop-in replacement for > >OpenSSL. In that case continuing to adevrtise a reasonable OpenSSL > >v

Re: get rid of em_realign()

2015-08-13 Thread Ted Unangst
Martin Pieuchot wrote: > > How many sparc64 come with em(4)? Can we assume that the amount of > wasted memory on such system is acceptable? What about other strict- > alignment architectures? just(? mostly?) t5120. mine has 32gb in it. it is, or could be, a popular openbsd machine. it's also ne

Re: It's '(U)pgrade' these days, no?

2015-08-15 Thread Ted Unangst
Michael McConville wrote: > ndex: faq/ports/guide.html > === > RCS file: /cvs/www/faq/ports/guide.html,v > retrieving revision 1.37 > diff -u -p -r1.37 guide.html > --- faq/ports/guide.html 2 Jul 2015 05:49:05 - 1.37 > +

Re: Fwd: worm.c removing unused variables

2015-08-20 Thread Ted Unangst
Rafael Zalamena wrote: > On Mon, Aug 17, 2015 at 01:00:26PM -0300, Vinicios Barros wrote: > > Hello all, > > > > I would like to suggest these changes to remove unused variables > > and a respectively unnecessary call of the gettimeofday, also removes > > a casting in the malloc, that seems to be

Re: Don't allow "rm -rf /"

2015-08-23 Thread Ted Unangst
Theo Buehler wrote: > In episode 103 of BSD Now, Bryan Cantrill talks about the fact that > on illumos "rm -rf /" is an error. It turns out that this behavior > is mandated by POSIX 1003.1-2013: > > "If either of the files dot or dot-dot are specified as the basename > portion of an operand (that

Re: doas auth

2015-08-24 Thread Ted Unangst
Alexander Hall wrote: > I was inspired by a related mail to send out this doas auth diff again. > Hopefully my phone won't ruin the formatting. > > . . . . . > > Add a type to auth_userokay() to allow for giving a specific > authentication method for doas in login.conf, e.g. > > staff:\ >

Re: [PATCH] doas authentication type

2015-08-27 Thread Ted Unangst
Renaud Allard wrote: > On 08/26/2015 06:39 PM, Michael Reed wrote: > > Hi Renauld, > > > > On 08/26/15 09:38, Renaud Allard wrote: > >> I rewrote a little bit the patch to remove a small kind-of typo in the > >> manpage and remove too long lines. > >> So with this patch, you add the user the right

Re: [PATCH] doas authentication type

2015-08-27 Thread Ted Unangst
Renaud Allard wrote: > > > On 27/08/15 18:32, Ted Unangst wrote: > > > > > Sorry, I think adding an option is too much. I just committed halex's > > original > > diff to only change the type. I thought he was going to do that by now. > > > &g

amd64 free sizes

2015-08-27 Thread Ted Unangst
add some sizes to free. as a bonus, an xxx comment where i believe there's a leak. Index: aesni.c === RCS file: /cvs/src/sys/arch/amd64/amd64/aesni.c,v retrieving revision 1.32 diff -u -p -r1.32 aesni.c --- aesni.c 14 Mar 2015 0

more apmd logging

2015-08-27 Thread Ted Unangst
I would prefer that apmd log 10% increments not 20. And fix the off by one, which made it 21. (I find it odd to see a sequence of 99, 78, 57% in logs.) Index: apmd.c === RCS file: /cvs/src/usr.sbin/apmd/apmd.c,v retrieving revision 1

Re: pool allocator names

2015-08-29 Thread Ted Unangst
Mark Kettenis wrote: > This diff is purely mechanical. This means that it also changes some > pool_allocator_nointr into pool_allocator_single where the intention > was to signal that the pool would never be used in interrupt context. > However, using pool_allocator_single in those cases isn't a b

Re: pool allocator names

2015-08-31 Thread Ted Unangst
Mark Kettenis wrote: > > From: "Ted Unangst" > > Date: Sat, 29 Aug 2015 18:38:45 -0400 > > > > Mark Kettenis wrote: > > > This diff is purely mechanical. This means that it also changes some > > > pool_allocator_nointr into pool_allocator_sin

Re: Like free(), ksh's afree() is NULL-safe

2015-08-31 Thread Ted Unangst
Michael McConville wrote: > Also, why is fs on line 390 cast to char* when afree() takes void*? this code is older than void. and NULL apparently. please remove the casts too.

<    2   3   4   5   6   7   8   9   10   11   >