summaryrefslogtreecommitdiff
path: root/sbin
AgeCommit message (Collapse)Author
2019-02-26get rid of the mpw goopDavid Gwynne
this reduces the output that mpw interfaces generate from 3 lines to the one generic mpls and pwe3 line. mpw can be configured with the individual ioctls, and gains the ability to do flow aware transport.
2019-02-26implement support for pwe3 ioctlsDavid Gwynne
this allows individual configuration of the use of control words, flow aware tranport labels, and the local and remote label plus neighbor individually. discussed with claudio@ at a2k19 ok mpi@
2019-02-23Correct comment on delete_addresses() return value.Kenneth R Westerback
2019-02-23Restore pre-a2k19 behaviour of clearing out all existing addressesKenneth R Westerback
when setting new address. That change needs specific consideration rather than inadvertant inclusion, especially after claiming no functional change was being made. Change and related problems noted and reversion tested by Kurt Mosiejczuk.
2019-02-21If sysctl(8) was compiled with an obsolete struct sensordev size,Alexander Bluhm
it could get stuck in an endless loop. After sensors sysctl(2) fails, do not continue using uninitialized memory. Catch the error, print a warning, and skip the sensors. OK benno@ visa@ deraadt@
2019-02-21Compute params of shrunk partition and not of resized one; ok krw@Otto Moerbeek
2019-02-20Tweak previous, use the same wording everywhereJeremie Courreges-Anglas
ok deraadt@
2019-02-20avoid abbreviation "AF" when "address family" fits on the line; noted by ↵Theo de Raadt
Alfred Morgan
2019-02-19Make ifconfig(8) display whether bwfm(4) firmware is using 802.11ac.Stefan Sperling
ok patrick@ mpi@
2019-02-19oops, bad Pp snuck in;Jason McIntyre
2019-02-18Rework the certificate generation examples a bit:Stuart Henderson
- show an example sed to substitute the $ENV::CERTIP/CERTFQDN strings while copying /etc/ssl/x509v3.cnf to a temp file - don't use /etc/ssl/x509v3.cnf on the command line when we've just told people to copy and edit - fix an instance of CERTIP that should have been CERTFQDN based on diffs from Sevan Janiyan, feedback/ok jmc@
2019-02-18fix typoTheo de Raadt
2019-02-18Change ps_len of struct pfioc_states and psn_len of structAlexander Bluhm
pfioc_src_nodes to size_t. This avoids integer truncation by casts to unsigned. As the types of DIOCGETSTATES and DIOCGETSRCNODES ioctl(2) arguments change, pfctl(8) and systat(1) should be updated together with the kernel. Calculate number of pf(4) states as size_t in userland. OK sashan@ deraadt@
2019-02-18Introduce IMSG_DATA_SIZE() macro to to replace reoccuring math onFlorian Obser
imsg.hdr.len and shorten code. Input & OK pamela
2019-02-17Since we do a naive string comparison to see if the trust anchorFlorian Obser
changed we need to fix the TTL to the value we would get from the root for the ksk DNSKEY (currently 2 days). Otherwise we would interpret a lowerd TTL from a cache as changed trust anchor. Use the same define everywhere. (Considering the glacial speed with which the root ksk rotates this should be fine for the forseable future.)
2019-02-17On log verbosity change we need to restart all resolvers: add missingFlorian Obser
DoT resolver.
2019-02-17Pass verbosity changes to captive portal process.Florian Obser
2019-02-17 s/unwind_/uw_/ to save screen real estate; fix style(9) issues while hereFlorian Obser
2019-02-16SSID/LLADDR/LINK_STATE_IS_UP changes must discard the previousKenneth R Westerback
proposal to ensure the new lease is applied to the interface.
2019-02-13(unsigned) means (unsigned int) which on ptrdiff_t or size_t or otherTheo de Raadt
larger types really is a range reduction... Almost any cast to (unsigned) is a bug. ok millert tb benno
2019-02-13Nuke unused variable.Kenneth R Westerback
2019-02-13Try harder to start a new line when link is obtained and a newKenneth R Westerback
message is about to be displayed on the console.
2019-02-12Restructure code to simplifiy imsg communications, further separatingKenneth R Westerback
DHCP knowledge and interface manipulation. Unprivileged process now sends proposal derived from the accepted lease to the privileged process rather than individual interface manipulation requests. The only intended functional change is that /etc/resolv.conf.tail is not re-read each time a new proposal is implemented, rather than once at dhclient startup.
2019-02-11With the rewrite of the trust anchor handling code we no longer need aFlorian Obser
directory writable by group _unwind. Move the on-disk trustanchor to /var/db/unwind.key. OK sthen
2019-02-10Delete BUGS: dubious style and not relevant/accurateJeremie Courreges-Anglas
Noticed by deraadt@
2019-02-10Add a warning that scan_ffs doesn't support FFS2 filesystemsJeremie Courreges-Anglas
Hints and wording from jmc@
2019-02-10Drop useless .TH line; ok jmc@Jeremie Courreges-Anglas
2019-02-10Anchor names must not be emptykn
The parser would allow bogus input and sometimes even produce invalid rules on empty anchor names, so error out immediately. OK sashan
2019-02-10Unify anchor name sanity checkskn
For anchor names, make `load anchor' use the same grammar as `anchor' and merge unique checks from both places so that anchor names are validated regardless of the specific rule at hand. OK sashan
2019-02-10Simplify trust anchor handling.Florian Obser
Open trust anchor file for reading and writing on startup and pass it to the frontend process. The frontend process seeks and truncates the file apropriately when writing out new trust anchors learned via DNS but never closes the file. On error the file is truncated to zero length. This is in turn handled on startup by switching to the built in trust anchor when no trustanchor can be read from disk. This side steps the need for an unveil'ed directory with "c" permission and also removes the wpath and cpath pledges from the parent process. deraadt@ pointed out that my previous design didn't make sense and I had confused myself along the way. (It did work, but was too complicated for no good reason). While here validate that we actually read a trust anchor from disk by trying to parse it and checking that it is a DNSKEY. Unfortunately ub_ctx_add_ta() accepts just any string as a trust anchor without any validation.
2019-02-08Backport r5108 from unbound upstream, pointed out by florian@.Stuart Henderson
Shouldn't affect unwind but keeping in sync. r5108 | wouter | 2019-02-08 15:05:24 +0000 (Fri, 08 Feb 2019) | 3 lines - Fix #4225: clients seem to erroneously receive no answer with DNS-over-TLS and qname-minimisation.
2019-02-08update unwind's copy of libunbound to match the new 1.9.0 update inStuart Henderson
/usr/src/usr.sbin/unbound, diff from florian@
2019-02-08Oops, unbreak captive portal detection.Florian Obser
The captive portal process needs to receive sockets from the main process to speak http to.
2019-02-07Rewrite trust anchor handling.Florian Obser
Do not use the libunbound's auto trust anchor file feature since it then the resolver process needs rpath, wpath, and cpath pledges and permission on the trust anchor file. Instead configure the trust anchor as resource record strings. The parent process opens the file, passes a filedescriptor to the frontend process to parse the file and then passes trust anchors to the resolver process to (re-) configure the resolver contexts. The resolver process periodically probes for new trust anchors (DNSKEY records of the root zone) and passes those to the frontend process. This in turn requests a file descripter for writing from the parent process. Once the trust anchors have been written the parent process renames the tmp file to the final location. Also provide a built in trust anchor for boot strapping purposes if no file is found on disk. That way we can get rid of unbound-anchor in unwind's rc.d script.
2019-02-06Replace overlapping memcpy() with memmove() in getpathname().Todd C. Miller
Same fix as in fsck_ffs. OK deraadt@ tb@
2019-02-06Replace overlapping memcpy() with memmove() in getpathname().Todd C. Miller
Found the hard way and OK tb@
2019-02-05Cm yes | Cm no -> Cm yes | noJason McIntyre
2019-02-05unref resolver in error branchFlorian Obser
2019-02-05missing full stop;Jason McIntyre
2019-02-05dev_t is signed to permit passing -1 as an invalid condition, but theTheo de Raadt
decomposition into major and minor is unsigned, so we should print them with %u instead of %d. ok guenther
2019-02-04various minor tweaks, plus an adjustment from florian;Jason McIntyre
ok florian
2019-02-03Stop lying about slaacd(8).Florian Obser
This requires quite a bit of yak shaving until we can pick up nameservers from router advertisements. Pointed out by sthen & kn
2019-02-03Captive portal detection for unwind(8).Florian Obser
2019-02-02Show the routing address selected by "route-to" in "pfctl -s states".YASUOKA Masahiko
ok sthen
2019-02-01Don't send udp sockets that we failed to open to the frontend,Florian Obser
it will crash when it sees a -1 FD. Found the hard way by solene on a box without ::1
2019-02-01port is in network byte orderFlorian Obser
2019-01-31Make divert-packet port accept any port specificationkn
Contrary to other rules accepting a single port, this one only works with numerical values. Fix it by simply using the proper grammar. Port ranges are not accepted, but an error message on a range without start was missing in general, so add it while here. OK bluhm
2019-01-31Remove a log statement used for debugsolene
ok florian@
2019-01-31restrict commands reload and log to root onlysolene
tweaks and ok florian@
2019-01-30fix parsing of imcomplete dhclient.lease files, initialize epoch to 0.Sebastian Benoit
ok florian@