summaryrefslogtreecommitdiff
path: root/etc
AgeCommit message (Collapse)Author
2020-04-05crank to 6.7-betaTheo de Raadt
2020-04-04clang bsd.rd is a bit bigger..Theo de Raadt
2020-04-03increase rdroot sizeJonathan Gray
ok kettenis@ deraadt@
2020-03-13Run getty on all /dev/ttyC* apart from ttyC0, since it might conflictPatrick Wildt
with /dev/console. Feedback from and ok kettenis@
2020-03-12syncPatrick Wildt
2020-03-12Add /dev/drm[0-3].Patrick Wildt
ok deraadt@
2020-03-12grow limits a bit because clang is a pig.Theo de Raadt
2020-03-11Bump the pbuild data size limit to 7G; Firefox 74 no longer builds in 6G.Christian Weisgerber
ok deraadt@
2020-03-10add 6.8 fw pubkeyStuart Henderson
2020-03-04add 6.8 syspatch public keyRobert Nagy
2020-02-28oops some snapshot tests fell inTheo de Raadt
2020-02-28syncTheo de Raadt
2020-02-276.8 packages keyChristian Weisgerber
2020-02-26add 6.8 base keyTheo de Raadt
2020-02-22Do not run _rc_parse_conf of /var/run/rc.d/foobar on "start".Antoine Jacoutot
This is needed in case a foobar fails to start but still returns 0. Changing its flags (in rc.conf.local) would then get ignored because of this cache (which is around to handle stop/check/reload on flags changes). claudio@ reported this issue when struggling with prometheus several weeks ago
2020-02-20Import regenerated moduli.Darren Tucker
2020-02-16Remove trailing backslasheskn
"prefix-set" blocks work with line breaks just fine, probably old macro leftover. OK job claudio
2020-02-12do not propagate TMPDIR and override value from /etc/locate.rc in weeklyJoerg Jung
effectively reverting r1.9 to follow principal of least surprise "this is fine" millert "i agree with direction" schwarze
2020-01-28sortChristian Weisgerber
2020-01-26try disconnecting old world boot.mac bootloader for a bitTed Unangst
2020-01-25sync rc.d/sshd with sshd proctitle change - listener has been modified toStuart Henderson
keep command-line arguments again; ok aja@ djm@
2020-01-24regenMartin Pieuchot
2020-01-24Use major 32 for dt(4).Martin Pieuchot
ok visa@, kettenis@, deraadt@
2020-01-24retire rebound etc bits to the atticTed Unangst
2020-01-24revert previous; guenther noted that the csh(1) part belongs in dot.loginOkan Demirmen
because each invocation will grow the path, but that exposed an interaction with loginShell:true in our dot.Xdefaults...
2020-01-23Extend PATH from login(1)/setusercontext(3) instead of overriding.Okan Demirmen
OK millert@
2020-01-23regen after adding pppacDavid Gwynne
2020-01-23wire up pppac(4).David Gwynne
with help from claudio@
2020-01-22update pexp in rc.d/sshd to match the new setproctitle ('sshd: [listener]Stuart Henderson
1 of 10-100 startups'). "makes sense" deraadt@ Beware if you have multiple sshd processes (e.g. on different ports) and want to restart/stop just one - with the current proctitle there's no way to distinguish between these so rc.d/rcctl will match all of them.
2020-01-21regenMartin Pieuchot
2020-01-21Add /dev/dtMartin Pieuchot
2020-01-156.4 keys not needed anymoreTheo de Raadt
2020-01-15Do not redirect already quiet stdout for IPv6 reject routeskn
"route -q" already silences all standard output; if it still prints something, that's a bug to fix in route. OK bluhm
2019-12-30don't suppress error output from running updatelocatedbMarc Espie
check that the resulting db works instead of some more specific test okay schwarze@
2019-12-22regenMark Kettenis
2019-12-22Wire up ipmi(4).Mark Kettenis
ok deraadt@
2019-12-21a few depend:-related thingies that were still in.Marc Espie
okay millert@, tb@
2019-12-17syncReyk Floeter
2019-12-17Fix fido(4) documentation link (no functional change)Reyk Floeter
2019-12-17Add fido(4), a HID driver for FIDO/U2F security keysReyk Floeter
While FIDO/U2F keys were already supported by the generic uhid(4) driver, this driver adds the first step to tighten the security of FIDO/U2F access. Specifically, users don't need read/write access to all USB/HID devices anymore and the driver also improves integration with pledge(2) and unveil(2): It is pledge-friendly because it doesn't require any ioctls to discover the device and unveil-friendly because it uses a single /dev/fido/* directory for its device nodes. It also allows to support FIDO/U2F in firefox without further weakening the "sandbox" of the browser. Firefox does not have a proper privsep design and many operations, such as U2F access, are handled directly by the main process. This means that the browser's "fat" main process needs direct read/write access to all USB HID devices, at least on other operating systems. With fido(4) we can support security keys in Firefox under OpenBSD without such a compromise. With this change, libfido2 stops using the ioctl to query the device vendor/product and just assumes "OpenBSD" "fido(4)" instead. The ioctl is still supported but there was no benefit in obtaining the vendor product or name; it also allows to use libfido2 under pledge. With feedback from deraadt@ and many others OK kettenis@ djm@ and jmc@ for the manpage bits
2019-12-14Fix comment: vmctl command options come before argumentskn
2019-12-14syncTheo de Raadt
2019-12-14usb devices nodes have been excesively permissive.Theo de Raadt
repair that.
2019-12-13syncTheo de Raadt
2019-12-13gpr(4) goes awayTheo de Raadt
2019-12-04Insert missing &&job
OK claudio@
2019-12-04Attempt to smear out stampedes on the RPKI rsync serversjob
OK claudio@ benno@
2019-12-02sync namesTheo de Raadt
2019-12-01grow i386 cd ramdisk a little bitTheo de Raadt
2019-11-30Tweak rpki-client to create all 4 output file formats from a singleTheo de Raadt
compute, based upon flags. OpenBGPD compatible format by default if no options, to integrate with bgpd.conf and bgpctl reload. Adapt mtree and stuff. This will receive further refactoring... ok benno job