Age | Commit message (Collapse) | Author |
|
|
|
|
|
|
|
"route -q" already silences all standard output; if it still prints
something, that's a bug to fix in route.
OK bluhm
|
|
check that the resulting db works instead of some more specific test
okay schwarze@
|
|
|
|
ok deraadt@
|
|
okay millert@, tb@
|
|
|
|
|
|
While FIDO/U2F keys were already supported by the generic uhid(4)
driver, this driver adds the first step to tighten the security of
FIDO/U2F access. Specifically, users don't need read/write access to
all USB/HID devices anymore and the driver also improves integration
with pledge(2) and unveil(2): It is pledge-friendly because it doesn't
require any ioctls to discover the device and unveil-friendly because
it uses a single /dev/fido/* directory for its device nodes.
It also allows to support FIDO/U2F in firefox without further
weakening the "sandbox" of the browser. Firefox does not have a
proper privsep design and many operations, such as U2F access, are
handled directly by the main process. This means that the browser's
"fat" main process needs direct read/write access to all USB HID
devices, at least on other operating systems. With fido(4) we can
support security keys in Firefox under OpenBSD without such a
compromise.
With this change, libfido2 stops using the ioctl to query the device
vendor/product and just assumes "OpenBSD" "fido(4)" instead. The
ioctl is still supported but there was no benefit in obtaining the
vendor product or name; it also allows to use libfido2 under pledge.
With feedback from deraadt@ and many others
OK kettenis@ djm@ and jmc@ for the manpage bits
|
|
|
|
|
|
repair that.
|
|
|
|
|
|
OK claudio@
|
|
OK claudio@ benno@
|
|
|
|
|
|
compute, based upon flags. OpenBGPD compatible format by default if
no options, to integrate with bgpd.conf and bgpctl reload. Adapt
mtree and stuff. This will receive further refactoring...
ok benno job
|
|
bpgd configuration, which enables Enterprise-Ready Industry-Leading-by-Example
RPKI ROA filtering on your OpenBGP edge.
Arguments remain about how often to run this operation, for now we propose
9AM when people who can fix their shit are in the office.
ok claudio benno
|
|
discussed at length with claudio and benno
|
|
|
|
rpki-client(8) can deal with it (some upcoming changes...)
|
|
|
|
OK otto
|
|
any implicit behavior
ok eric@, kn@
|
|
ok eric@
|
|
when -F is used. Because of this allow rc.d script to reload sndiod.
OK kn ratchov aja
|
|
|
|
|
|
|
|
|
|
unwind can be started (silently) before pf is configured (for those
few weirdos who use hostnames in pf.conf...). Other unidentified concerns
may be improved by this startup re-ordering, so let's give it a try.
discussed with florian.
|
|
|
|
|
|
dnssec the sysadmin has some idea what's going on in logs, and
"aggressive-nsec: yes", if we're using dnssec anyway we might as well
get the benefits. These were both enabled last time dnssec was enabled
in this sample unbound.conf.
ok florian@
|
|
OK deraadt@ otto@
|
|
avoids DNS lookups entirely, but yes this https is correctly validated)
long discussions with otto, florian, and the quad9 crew.
|
|
other methods failed to inject/churn the rng enough. Move it up far earlier.
ok naddy sthen kettenis
|
|
responsive during packages compilation, especially on slower machines.
feedback welcome from people building ports
discussed with deraadt@
|
|
from brad@
ok bluhm@ claudio@ deraadt@
|
|
|
|
|
|
|
|
OK deraadt@
|
|
file to contain two hashes for bsd.mp, and cause later upgrade problems
spotted by afresh1
|
|
things and can easily exceed the previous 1.5GB limit.
(obviously, as with amd64, machines with less physical RAM won't cope with
building the largest ports).
ok deraadt phessler millert kettenis
|
|
|