Displaying 20 results from an estimated 3000 matches similar to: "syslog from chrooted environment"
2017 Jul 25
3
syslog from chrooted environment
On 7/24/2017 8:39 PM, Nico Kadel-Garcia wrote:
>
> Why are the targets of the hardlinks evaporating on rebooting? Is that
> a FreeBSD'ism?
Its when syslogd stops/starts. The hardlinks need to be recreated for
some reason.
---Mike
--
-------------------
Mike Tancsa, tel +1 519 651 3400
Sentex Communications, mike at sentex.net
Providing Internet services since 1994
2013 Jan 06
2
audit events confusion
On a rather full customer web server, I am trying to track down whose
web site script is trying to make outbound network connections when they
should not be. In /etc/security/audit_control, I added to the flags line
dir:/var/audit
flags:lo,aa,-nt
minfree:5
to log failed network connection. When I try an make an outbound
connection to something that is blocked in pf, it seems to sometimes
work.
2006 Sep 05
2
http://www.openssl.org/news/secadv_20060905.txt
Does anyone know the practicality of this attack ? i.e. is this trivial to do ?
---Mike
--------------------------------------------------------------------
Mike Tancsa, tel +1 519 651 3400
Sentex Communications, mike@sentex.net
Providing Internet since 1994 www.sentex.net
Cambridge, Ontario Canada
2004 Jan 16
1
HiFn / FAST_IPSEC question
Hi,
Just got some of the new Soekris 1401 VPN cards based on the hifn 7955 chip.
hifn0 mem 0xe8510000-0xe8517fff,0xe8518000-0xe8519fff,0xe851a000-0xe851afff
irq 5 at device 0.0 on pci1
hifn0: Hifn 7955, rev 0, 32KB dram, 64 sessions
vs
hifn0 mem 0xeb902000-0xeb902fff,0xeb901000-0xeb901fff irq 10 at device 8.0
on pci0
hifn0: Hifn 7951, rev 0, 128KB sram, 193 sessions
When it says "n
2017 Sep 26
2
tweaking max sessions / scaling
Other than cranking up logging to debug2, is there a way to better tune
logging on a server to see if I am running into max sessions ? On
FreeBSD RELENG11 I am periodically seeing connections being refused-
3way handshake not completing or completing and then FINs.
Typically, I have a hundred or so connections at one time, but they can
bounce up to a few hundred on occasion. Without leaving the
2003 Aug 28
1
new DoS technique (exploiting TCP retransmission timeouts)
An interesting paper
http://www.acm.org/sigcomm/sigcomm2003/papers/p75-kuzmanovic.pdf
---Mike
--------------------------------------------------------------------
Mike Tancsa, tel +1 519 651 3400
Sentex Communications, mike@sentex.net
Providing Internet since 1994 www.sentex.net
Cambridge, Ontario Canada www.sentex.net/mike
2012 Dec 12
1
How to create Jail in FreeBSD
Operating system virtualization is the most effective way to utilize your system resources, jails let you setup isolated mini-systems. Jails are explains well in handbook however, from practical standpoint of view, the presented material is incomplete.
The post below setup few scrips that follow handbook's 'Application of Jails' article and enhance with few missing features
2005 Mar 04
4
Fwd: FreeBSD hiding security stuff
FYI
>To: misc@openbsd.org
>Subject: FreeBSD hiding security stuff
>Date: Fri, 04 Mar 2005 03:51:42 -0700
>From: Theo de Raadt <deraadt@cvs.openbsd.org>
>
>A few FreeBSD developers apparently have found some security issue
>of some sort affecting i386 operating systems in some cases.
>
>They have refused to give us real details.
>
>A promise is now being
2012 Sep 21
3
tws bug ? (LSI SAS 9750)
Hi,
I have been trying out a nice new tws controller and decided to enable
debugging in the kernel and run some stress tests. With a regular
GENERIC kernel, it boots up fine. But with debugging, it panics on
boot. Anyone know whats up ? Is this something that should be sent
directly to LSI ?
pcib0: <ACPI Host-PCI bridge> port 0xcf8-0xcff on acpi0
pci0: <ACPI PCI bus> on pcib0
2008 Dec 02
6
repeatable crash on RELENG7
While trying to speed up nanobsd builds, I mounted /usr/obj on a
ramdisk and found my box crashing. Thinking it might be hardware, I
tried a separate machine, but with the same results. I have 4G of
ram (i386). Am I just running out of some kernel memory ? If so, is
there anything I can adjust to prevent this, yet still use mfs in this way ?
mdconfig -a -t malloc -s 1800M
newfs /dev/md0
2016 Dec 13
4
pkcs #11/hardware support for server keys/sshd?
Hello,
Is there any support (existing or planned) for host keys/certs being
managed by some hardware device (tpm,hsm,etc..) instead of a flat
file?
thanks,
-Kenny
2003 Jul 01
2
4.9R bug fix ?
Any chance someone can look at / commit the fix in PR 52349 before 4.9R ?
Its a simple fix. As it is to netstat, I dont know of anyone who 'owns'
that program to bug other than to make a general plea :-)
---Mike
--------------------------------------------------------------------
Mike Tancsa, tel +1 519 651 3400
Sentex Communications,
2003 Jul 11
3
Login.Access
Login seems to be ignoring my /etc/login.access settings.
I have the following entries (see below) in my login.access, yet any new
user (not in the wheel group) is still allowed to login. What am I missing?
# $FreeBSD: src/etc/login.access,v 1.3 1999/08/27 23:23:42 peter Exp $
#
-:ALL EXCEPT wheel:console
-:ALL EXCEPT wheel:ALL
Thanks,
--
Scott Gerhardt, P.Geo.
Gerhardt Information
2003 Nov 26
1
perms of /dev/uhid0
I wrote a small app that monitors a Back-UPS ES500 UPS via the uhid0
interface. I want to run the daemon with as little privs as possible.
gastest# ls -l /dev/uhid0
crw-rw---- 1 root operator 122, 0 Nov 12 05:26 /dev/uhid0
gastest#
Is it safe to chmod o+r /dev/uhid0 ? Or is there a better way to drop
privs of the daemon yet still be able to read from the device ?
All I am doing is
2003 Apr 01
1
LOG_AUTHPRIV and the default syslog.conf
Hello,
Some time ago I wrote PR conf/48170, which discussed
the following problem:
Syslog messages of facility LOG_AUTHPRIV and priority LOG_NOTICE
(or higher) are sent by default to the world-readable log file
/var/log/messages. That seems unacceptable since the facility
LOG_AUTHPRIV is for hiding sensitive log messages inside a protected
file, e.g., /var/log/auth.log.
For example, login(1)
2004 May 10
5
rate limiting sshd connections ?
Does anyone know of a way to rate limit ssh connections from an IP address
? We are starting to see more and more brute force attempts to guess
simple passwords "/usr/sbin/inetd -wWl -C 10" is nice for slowing down
attempts to services launched via inetd. Is there an equiv method for
doing this to sshd? Running from inetd has some issues supposedly.
---Mike
2015 Aug 05
2
host key on hardware
Hi,
I'm new to this list.
For some years I've used CryptoSticks and YubiKeys to authenticate to
SSH on the client side.
Now I wondered if the same also worked on the server side.
The closest I found was this old thread from 2012:
http://www.gossamer-threads.com/lists/openssh/dev/54825
How did this progress further? Is it in the packages in the debian
repositories yet? And is there some
2013 Jul 30
1
fatal: cipher_init: EVP_CipherInit: set key failed for aes128-cbc [preauth]
Am I the only person to be seeing this log message from sshd:
fatal: cipher_init: EVP_CipherInit: set key failed for aes128-cbc [preauth]
?
(security/openssh-portable, with HPN patches and MIT Kerberos,
although Kerberos is not actually configured on this server.) A
work-around is to disable aes128-cbc in sshd_config, but it would be
nice not to have my logs spammed with this. Currently
2009 May 01
2
current zfs tuning in RELENG_7 (AMD64) suggestions ?
I gave the AMD64 version of 7.2 RC2 a spin and all installed as
expected off the dvd
INTEL S3200SHV MB, Core2Duo, 4G of RAM
In the past it had been suggested that for zfs tuning, something like
vm.kmem_size_max="1073741824"
vm.kmem_size="1073741824"
vfs.zfs.prefetch_disable=1
However doing a simple test with bonnie and dd, there does not seem
to be very much difference in
2012 Jun 08
13
Default password hash
We still have MD5 as our default password hash, even though known-hash
attacks against MD5 are relatively easy these days. We've supported
SHA256 and SHA512 for many years now, so how about making SHA512 the
default instead of MD5, like on most Linux distributions?
Index: etc/login.conf
===================================================================
--- etc/login.conf (revision