summaryrefslogtreecommitdiff
path: root/sbin
AgeCommit message (Collapse)Author
2024-09-09Add triple-dots to synopsis as multiple name[=value] arguments may be givenKlemens Nanni
OK jmc sobrado
2024-09-06Repair build with gcc.Miod Vallat
2024-09-05Sync to unbound 1.21.0; heavy lifting by sthenFlorian Obser
parse_edns_from_query_pkt() grew a parameter to handle cookies, which we don't use.
2024-09-01dhcpleased: fix a sizeof for IMSG_REQUEST_REBOOT.Theo Buehler
"fatal in engine: engine_dispatch_frontend: invalid IMSG_REQUEST_REBOOT" reported by qwer.ty tuta io ok florian kn
2024-08-27Do not send zero sized vendor or client ids.Florian Obser
The frontend and engine do not like this due to improved error checking. Found by Josh Grosse and Renato Aguiar, thanks!
2024-08-26Use i2s instead of hard coding the imsg type. Suggested by tb.Florian Obser
2024-08-26errno is unset, use fatalx(3) instead of fatal(3).Florian Obser
2024-08-26Be stricter in what we accept from the main process.Florian Obser
While here mention function where fatalx(3) occurred like everywhere else. Suggested by & OK tb
2024-08-25Do not peek inside of struct imsg.Florian Obser
input & OK tb
2024-08-25sin6_to_str and i2s take a single argument.Florian Obser
Pointed out by tb
2024-08-24Simplify engine_showinfo_ctl()Florian Obser
It only handles one imsg type these days, so it doesn't need to peek into struct imsg at all. pointed out by & OK tb
2024-08-24Stop peeking into struct imsg when relaying control messages.Florian Obser
pointed out by & OK tb
2024-08-24Do not peek inside of struct imsg.Florian Obser
While here use i2s helper function for error logging. OK tb
2024-08-24Helper function for logging imsg type names.Florian Obser
OK tb as part of a larger diff
2024-08-19correctly indent a lineJonathan Gray
2024-08-19Replace too flexible inet_aton(3) with getaddrinfo(3).Florian Obser
0xdecafbad will no longer work as an IPv4 address, sorry. OK bluhm
2024-08-17Fix some memory leaks in the RADIUS part.YASUOKA Masahiko
ok tobhe
2024-08-11rework DESCRIPTION for both dhcpleased(8) and slaacd(8) to more accuratelyJason McIntyre
reflect how they work, to emphasize that they do nothing unless auto conf is set, and to more closely match each other; prompted by a diff from andrew christopher hawk on tech, who noted a wonky sentence; help/feedback deraadt florian; ok deraadt
2024-08-09Add 2024 root zone trust-anchor, it is expected to be used in 2026.Florian Obser
The trust-anchor was copied from the upcoming unbound(8) release and verified against https://www.iana.org/reports/2024/root-ksk-2024.pdf While here switch the 2017 trust-anchor from DNSKEY to DS to use the same record type as for the 2024 trust-anchor. They are functionally equivalent. It was verified against https://www.iana.org/reports/2017/root-ksk-2017.pdf As well as with run-time testing, i.e. unwind would still perform DNSSEC validation. checked pdfs & OK phessler
2024-08-08Fix a typo in log message.YASUOKA Masahiko
2024-07-18Fix memory leaks and improve id handling of iked_radserver_req.YASUOKA Masahiko
original diff from markus ok tobhe
2024-07-15Add e2fs_fsmnt, and the newly defined e2fs_kbytes_written to the list ofMartijn van Duren
fields that can differ between the primary and 1st backup superblock. This fixes fsck issues I've encountered on my system with a shared home partition. OK miod@
2024-07-15bioctl.8:Jason McIntyre
- tweak bioctl text - don;t repeat the device examples - reinstate softraid device being always softraid0 usage(): - add vertical blank between two formats - rewrap to match 80col (shorter and matches man) feedback/ok krw kn
2024-07-14This change allows user to define table inside the anchor like that:Alexandr Nedvedicky
anchor foo { table <bar> { 192.168.1.1 } pass in from <bar> to <self> } Without this diff one must either create table <bar> in main ruleset (root) or use 'pfctl -a foo -t bar -T add 192.168.1.1' This glitch is hard to notice. Not many human admins try to attach tables to non-global anchors. Deamons which configure pf(4) automatically at run time such as relayd(8) and spamd(8) create tables attached to thair anchors (for example 'relayd/*') but the deamons use way similar to pfctl(8) to add and manage those tables. The reason why I'd like to seal this gap is that my long term goal is to turn global `pfr_ktable` in pf(4) into member of pf_anchor. So each ruleset will get its own tree of tables. feedback and OK bluhm@
2024-07-14Shuffle verbiage to make page more general. e.g. by mentioningKenneth R Westerback
nvme(4). Feedback jmc@ jmatthew@ deraadt@ kn@ ok jmc@ kn@
2024-07-14Fail explicitly on unexptected imsg->hdr_type. Otherwise the followingTobias Heider
comparison is undefined.
2024-07-14sync slaacd(8) log.c to dhcpleased(8)'s version.Florian Obser
We don't built log.c on the ramdisk so no need for ifndef small.
2024-07-14log_getverbose() is a void functionFlorian Obser
pointed out by tb
2024-07-14sync slaacd(8) log.h to dhcpleased(8) log.hFlorian Obser
- include stdlib.h for exit(3) - knf fixes - define log_getverbose as (0) instead of 0 input & OK tb
2024-07-14Unbreak tree by defining log_getverbose() for SMALL buildsTheo Buehler
ok anton florian
2024-07-13Reduce if_indextoname(3) usage.Florian Obser
Don't ask the kernel to translate an if_index to a name if we are not running with verbose logging, it's not free.
2024-07-13NULL check must be inside the loop. found tobheYASUOKA Masahiko
ok tobhe
2024-07-13Fix radius.c again^2. Cancel previous and revert the latest oneYASUOKA Masahiko
(sent to tech@).
2024-07-13Fix radius.c again. Previous was old one.YASUOKA Masahiko
2024-07-13grammar/macro fixes for the radius text;Jason McIntyre
2024-07-13Fix radius.c. Previous it was broken.YASUOKA Masahiko
2024-07-13Add RADIUS support. Authentication, accounting, and "DynamicYASUOKA Masahiko
Authorization Extensions"(DAE) are supported. feedback markus stu ok tobhe
2024-07-11Make sure we are interested in an interface that shows up.Florian Obser
2024-07-11Be a bit more noisy in syslog on what is going on.Florian Obser
So far dhcp6leased(8) has been completely silent. Prodding by Brian Conway.
2024-07-11Write lease after we configured prefixes.Florian Obser
While here, do not claim we have a ::/0 lease, it confuses the parser.
2024-07-11Do not show expired lease information in dhcp6leasectl.Florian Obser
2024-07-11Forgot to initialize status_code in previous.Florian Obser
No STATUS_CODE option from the server means "success", but we are now using stack garbage, which is usually not "success".
2024-07-10Pass status option up.Florian Obser
If we are in state "renewing" and the DHCPv6 server returns an unsuccessful status go to "rebinding", i.e. ask any DHCPv6 server for a lease not just the one we got the lease from. This likely fixes a problem reported by Brian Conway where the ISP returned "NoBinding - Prefix not bound to this interface." for a renew. dhcp6leased recovered once T1 expired and we went to "rebinding" after some time.
2024-07-10Pass int to the *2str functions, we don't need anything fancy.Florian Obser
2024-07-10Only vis(3) the option, not the rest of the packet.Florian Obser
Lots of head scratching and help from the hackroom ensued because of a inconveniently placed \r that truncated a string and placed garbage at a weird place.
2024-07-09Track configured and new prefix delegations in iface.Florian Obser
When the DHCPv6 server renumbers and hands us new delegations we have to deconfigure the old prefixes. To prevent situations where we have no IPv6 at all, first configure the new prefixes and then remove the old prefixes.
2024-07-09Skip prefixes with vltime 0.Florian Obser
Servers indicate unusable prefixes with vltime 0 when we are in state reboot and probably hand us new, valid prefixes. In IPv4 dhcp we would receive a NACK instead...
2024-07-09remove unnused prototypeFlorian Obser
2024-07-09point mount -> mount point;Jason McIntyre
from netbsd -r1.46/pgoyette
2024-07-01Enclose IPv6 address in a square bracket if the address is used withYASUOKA Masahiko
the port number. ok florian tobhe