summaryrefslogtreecommitdiff
path: root/sbin
AgeCommit message (Collapse)Author
4 dayspfctl: clear statistic for specified addresseskirill
OK: bluhm@
13 daysbump the type used to specify traffic queue bandwidth to 64bit.David Gwynne
this should let people specify interface and queue bandwidths greater than ~4Gbit. this changes the pf ioctls used to specify queues, so if you want to try this you'll need a new kernel, new headers, and a new pfctl (and systat). or upgrade using a snapshot. the effort and benefit of providing compat isn't worth it. putting it in now so people can kick it around.
13 daysPrevent completely empty interface blocks.Florian Obser
This is meaningless in dhcpleased(8) and *not* needed to receive leases for an interface. In fact dhcpleased(8) works just fine without any configuration file at all. man page diff & OK kn
2024-11-09sync curly braces markup, fix indentKlemens Nanni
Replace literal braces with .Brq, use a list and indent the interface options under that interface entry to reflect hierarchy (rad.conf(5) does that, too). Feedback from/fine with jmc
2024-11-09usage should fit in a 80-column display.Igor Sobrado
ok jmc@
2024-11-04Ignore extra groups that don't fit in the buffer passed to getgrouplist(3)Jeremie Courreges-Anglas
Our kernel supports 16 groups (NGROUPS_MAX), but nothing prevents an admin from adding a user to more groups. With that tweak we'll keep on ignoring them instead of potentially reading past the buffer passed to getgrouplist(3). That behavior is explicitely described in initgroups(3). ok millert@ gilles@
2024-11-04add a "natt" option that forces negotiation of nat-t (and udpencap).David Gwynne
this is like the -t command line option on iked itself, but you get to keep the ike listener on port 500 and you can enable this on specific policies instead of all of them. this is useful if you're dealing with an org that can't firewall ESP traffic well and so you need to force the traffic to be udp encapsulated even if there's no NAT involved. ok markus@ tobhe@
2024-11-01Simplify name/prefix markup, readability tweak and cleanupKlemens Nanni
Leave the notion of repition to ... and markup optional prefixes as such; 'name/prefix [name/prefix ...]' becomes 'name[/prefix] ...'. Also sync with unwind.conf.5 to fix curly braces and indentation. OK florian Input OK jmc
2024-10-30Document /var/db/dhcp6leased/uuid.Florian Obser
Input & OK kn, jmc, sthen
2024-10-23remove duplicate definesJonathan Gray
2024-10-08apply the CVE-2024-8508 fix from unbound (put a limit on resources usedStuart Henderson
for handling DNS compression). OK florian
2024-10-05Make scaling available for normal mice, too; not just for touchpads.Christopher Zimmermann
Add reverse_scrolling to the manpage. ok bru@
2024-09-29add some commas, to aid readability;Jason McIntyre
from thorsten blum
2024-09-25Correct an indexing error that may leave stale data in the mousecfg buffer.Ulf Brosziewski
ok mpi@
2024-09-20remove unneeded semicolons; checked by millert@Jonathan Gray
2024-09-16Close correct file descriptor.Florian Obser
Instead of closing the just received UDP socket we closed the imsg fd thus cleanly shutting down dhcpleased(8). Problem triggered by sf@ with something like while :; do ifconfig vio0 -inet; done while :; do ifconfig vio0 inet autoconf; done The problem triggers when dhcpleased configured a lease and in just the right moment the autoconf flag gets removed. The main process opens a udp socket and sends it to the frontend. At the same time the frontend learned (from the route socket), that the interface lost its autoconf flag. When the frontend then receives the udp socket via fd passing it tries to close it. Due to a typo it would instead close the imsg file descriptor. Found by me after lots of head scratching. OK tb
2024-09-15Add handling of "Class" attribute. diff from markusYASUOKA Masahiko
ok markus
2024-09-15remove unused variablesJonathan Gray
2024-09-11Fix a typoYASUOKA Masahiko
2024-09-10missing "Ar" in previous;Jason McIntyre
2024-09-09When accounting start the type attribute was added twice.YASUOKA Masahiko
from markus
2024-09-09Add triple-dots to synopsis as multiple name[=value] arguments may be givenKlemens Nanni
OK jmc sobrado
2024-09-06Repair build with gcc.Miod Vallat
2024-09-05Sync to unbound 1.21.0; heavy lifting by sthenFlorian Obser
parse_edns_from_query_pkt() grew a parameter to handle cookies, which we don't use.
2024-09-01dhcpleased: fix a sizeof for IMSG_REQUEST_REBOOT.Theo Buehler
"fatal in engine: engine_dispatch_frontend: invalid IMSG_REQUEST_REBOOT" reported by qwer.ty tuta io ok florian kn
2024-08-27Do not send zero sized vendor or client ids.Florian Obser
The frontend and engine do not like this due to improved error checking. Found by Josh Grosse and Renato Aguiar, thanks!
2024-08-26Use i2s instead of hard coding the imsg type. Suggested by tb.Florian Obser
2024-08-26errno is unset, use fatalx(3) instead of fatal(3).Florian Obser
2024-08-26Be stricter in what we accept from the main process.Florian Obser
While here mention function where fatalx(3) occurred like everywhere else. Suggested by & OK tb
2024-08-25Do not peek inside of struct imsg.Florian Obser
input & OK tb
2024-08-25sin6_to_str and i2s take a single argument.Florian Obser
Pointed out by tb
2024-08-24Simplify engine_showinfo_ctl()Florian Obser
It only handles one imsg type these days, so it doesn't need to peek into struct imsg at all. pointed out by & OK tb
2024-08-24Stop peeking into struct imsg when relaying control messages.Florian Obser
pointed out by & OK tb
2024-08-24Do not peek inside of struct imsg.Florian Obser
While here use i2s helper function for error logging. OK tb
2024-08-24Helper function for logging imsg type names.Florian Obser
OK tb as part of a larger diff
2024-08-19correctly indent a lineJonathan Gray
2024-08-19Replace too flexible inet_aton(3) with getaddrinfo(3).Florian Obser
0xdecafbad will no longer work as an IPv4 address, sorry. OK bluhm
2024-08-17Fix some memory leaks in the RADIUS part.YASUOKA Masahiko
ok tobhe
2024-08-11rework DESCRIPTION for both dhcpleased(8) and slaacd(8) to more accuratelyJason McIntyre
reflect how they work, to emphasize that they do nothing unless auto conf is set, and to more closely match each other; prompted by a diff from andrew christopher hawk on tech, who noted a wonky sentence; help/feedback deraadt florian; ok deraadt
2024-08-09Add 2024 root zone trust-anchor, it is expected to be used in 2026.Florian Obser
The trust-anchor was copied from the upcoming unbound(8) release and verified against https://www.iana.org/reports/2024/root-ksk-2024.pdf While here switch the 2017 trust-anchor from DNSKEY to DS to use the same record type as for the 2024 trust-anchor. They are functionally equivalent. It was verified against https://www.iana.org/reports/2017/root-ksk-2017.pdf As well as with run-time testing, i.e. unwind would still perform DNSSEC validation. checked pdfs & OK phessler
2024-08-08Fix a typo in log message.YASUOKA Masahiko
2024-07-18Fix memory leaks and improve id handling of iked_radserver_req.YASUOKA Masahiko
original diff from markus ok tobhe
2024-07-15Add e2fs_fsmnt, and the newly defined e2fs_kbytes_written to the list ofMartijn van Duren
fields that can differ between the primary and 1st backup superblock. This fixes fsck issues I've encountered on my system with a shared home partition. OK miod@
2024-07-15bioctl.8:Jason McIntyre
- tweak bioctl text - don;t repeat the device examples - reinstate softraid device being always softraid0 usage(): - add vertical blank between two formats - rewrap to match 80col (shorter and matches man) feedback/ok krw kn
2024-07-14This change allows user to define table inside the anchor like that:Alexandr Nedvedicky
anchor foo { table <bar> { 192.168.1.1 } pass in from <bar> to <self> } Without this diff one must either create table <bar> in main ruleset (root) or use 'pfctl -a foo -t bar -T add 192.168.1.1' This glitch is hard to notice. Not many human admins try to attach tables to non-global anchors. Deamons which configure pf(4) automatically at run time such as relayd(8) and spamd(8) create tables attached to thair anchors (for example 'relayd/*') but the deamons use way similar to pfctl(8) to add and manage those tables. The reason why I'd like to seal this gap is that my long term goal is to turn global `pfr_ktable` in pf(4) into member of pf_anchor. So each ruleset will get its own tree of tables. feedback and OK bluhm@
2024-07-14Shuffle verbiage to make page more general. e.g. by mentioningKenneth R Westerback
nvme(4). Feedback jmc@ jmatthew@ deraadt@ kn@ ok jmc@ kn@
2024-07-14Fail explicitly on unexptected imsg->hdr_type. Otherwise the followingTobias Heider
comparison is undefined.
2024-07-14sync slaacd(8) log.c to dhcpleased(8)'s version.Florian Obser
We don't built log.c on the ramdisk so no need for ifndef small.
2024-07-14log_getverbose() is a void functionFlorian Obser
pointed out by tb
2024-07-14sync slaacd(8) log.h to dhcpleased(8) log.hFlorian Obser
- include stdlib.h for exit(3) - knf fixes - define log_getverbose as (0) instead of 0 input & OK tb