01:41:38 whats the correct command to update freebsd 14.0 01:41:39 ? 01:43:33 warsoul: freebsd-update is probably what you want 01:44:06 thanks markmcb 01:48:03 warsoul: if you are on the last recent version, you'll want to 'freebsd-update fetch' followed by a 'freebsd-update install' and a reboot -- check out this link for more information and to confirm what steps you need to take: https://docs.freebsd.org/en/books/handbook/cutting-edge/ 01:48:04 Title: Chapter 26. Updating and Upgrading FreeBSD | FreeBSD Documentation Portal 01:48:41 is there a simple way to "change" the uid/gid of shared folders over nfs to match the user on the client side? I have a simple use case that doesn't require the overhead of kerberos, but I also don't want to change that users id on the client to match the host 02:25:39 fluent-bit pkg has a bug? i enable it in rc.conf with fluent_bit_enable="YES", fluent_bit_group="fluentbit", fluent_bit_user="fluentbit". reboot server, sudo top shows fluent-bit running, but service fluent-bit status (rc.d/fluent-bit) says "fluent_bit is not running". fwiw /var/run/fluent_bit.pid exists -rwxr-xr-x fluentbit:fluentbit, not sure why 02:25:39 it's +x. 02:25:41 the bug was reported already https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=269480 but i tried the diff and it didn't seem to fix the problem for me. any help is appreciated! 02:25:43 Title: 269480 – sysutils/fluent-bit: rc.d script should not use --daemon option when combined with daemon command 03:19:37 anyone know? 03:19:49 i'm too new to rc and daemon to figure it out 03:39:38 ? 04:17:56 polyex: not sure about that package, but i've seen this bahavior when daemon options -p and -P aren't used correctly, maybe experiment with those 06:24:34 releng/14.1 just got branched for 14.1-BETA1 06:43:53 omfg yess 07:05:35 markmcb by "this behavior" talking about the weird +x part or service status not working? 07:48:25 tried everything i can think of, like -P and -p 07:48:32 still won't fucking work 08:02:55 anyone can help pls? 08:09:29 polyex: missed your question, please state again ^_^ 08:09:40 fluent-bit pkg has a bug? i enable it in rc.conf with fluent_bit_enable="YES", fluent_bit_group="fluentbit", fluent_bit_user="fluentbit". reboot server, sudo top shows fluent-bit running, but service fluent-bit status (rc.d/fluent-bit) says "fluent_bit is not running". fwiw /var/run/fluent_bit.pid exists -rwxr-xr-x fluentbit:fluentbit, not sure why 08:09:40 it's +x. 08:09:46 the bug was reported already https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=269480 but i tried the diff and it didn't seem to fix the problem for me. any help is appreciated! 08:09:48 Title: 269480 – sysutils/fluent-bit: rc.d script should not use --daemon option when combined with daemon command 08:09:54 tyvm 08:12:04 polyex: how does your rc.d script look now? it seems you could just remoev the --daemon from the end of the command_args 08:12:22 ya tried. didn't fix anything 08:12:41 also tried -P instead of -p 08:14:10 polyex: what does it say when you enable verbose: service -v fluent_bit restart 08:16:17 well restart won't work because it can't find the existing instance so i have to manually kill -9 it then start it. want me to do that? 08:18:09 polyex: well that's up to you but you might find something useful 08:19:11 just says fluent-bit is located in /usr/local/etc/rc.d \n Starting fluent_bit 08:21:48 ok just got it kinda working 08:21:51 get this... 08:23:15 the problem seems to stem from having daemon on in the fluent-bit.conf 08:23:24 seems it needs daemon off? 08:28:12 interesting bug of the day: pf(4) 'match all scrub (reassemble tcp)' breaks TCP connections to Amazon 08:28:15 ya the default rc.d doesn't even need to be changed 08:28:20 lol 08:51:06 polyex: lol good job solving it *highfive* 08:51:22 ty for helping 08:54:32 nowi just need to figure out how to configure fluent bit to actually work lol 08:54:44 anyone use fluent bit before? 08:55:16 polyex: a long time ago, i think it was quite straightforward 08:55:47 i want to output to an opentelemetry endpoint over network 08:55:50 polyex: just basic fowarding of java logs methinks 08:56:07 polyex: ok no clue there unfortunately 09:01:34 just saw in the fluent bit log, error permission denied, cannot open /var/log/mylogfile.log 09:01:44 from the input:tail plugin 09:02:31 the log file is 600 i guess that's why 09:04:53 ya there it's outputting over net now 09:05:49 it logs error tho, that http status 404 route not found 09:05:50 hmm 11:09:11 Two things, firstly whats with the FreeBSD mailing list sprawling... there is so many of them 11:09:20 which one is the main one? 11:09:35 secondly lw what mailing list did you say I should post my query about hardware RF switch? 14:04:34 Hi all. 14:05:53 Is FreeBSD (or any BSD or derivate for tht matter) susceptible to what Linux got with xz-utils? i.e. is there a more centralized checking of the code base that will prevent untrusted external sources comitting unchecked code? 14:08:41 the person built up trust in the project before commiting the act, so... it normal social engineering that anyone is susceptible to 14:09:22 deadrom: I asked about this back in March. Here's the discussion thread on fediverse https://floss.social/@subpop/112181350769874172 14:09:23 Title: subpop: "Genuinely curious, and not able to research much …" - FLOSS.social 14:14:10 The link doesn't go anywhere 14:15:26 wait, does in chromium, not in vivaldi. nvm 14:17:49 o_O 14:27:33 deadrom: It can happen to any OS, yes. It didn't affect FreeBSD, however 14:28:41 llua: the bit that worries me here and is what I've been getting gtom the Linux crowd as well is that it seems to be seen as ... normal that this type of thing happens. Yes, true, social engineering happened before, but at that scale, with such effort, and right into a central application as crucial as ssh? If blackhat X wants to gain access to a specific system, spies out its particular attributes etc, that's one thing, but infiltrating 14:28:43 the lock maker in general to by abble to open any house using their locks has a new quality to me. 14:30:47 zwr: well, it cannot happen lie this exaclty to any OS if the OS isn't open, one of the prerequisites here being that the attacker could build its scheme on the availability of the src code and play the helpful hand. Not possible to approach like that on say Solaris, or that, um, OS from that Redmond company. 14:32:02 Solaris has package management. Updating a program people use to introduce malware can be done without package management, in fact it's easier because there won't be anybody to veto your changes 14:44:50 deadrom, testing and code review by someone other than the committer are the only ways to stop this sort of code infiltration. This is how FOSS teams are supposed to work. Someone noticed an odd thing with the code, the code was reviewed, the bad code was discovered and fixed. The process worked. 14:52:22 unixman_home: that's not entirely true: someone noticed their openssh server took unusually long to respond and drew too much CPU. That caused them to investigate further. It was a rather close call. The code got into the testing repos exactly because nobody else looked into the code. Apart form the attackers. One overworked guy was maintaining xz-utils. that's what I'm all about, no FOSS distributor tells you they have such mechanisms as 14:52:23 a simple extra pair of eyes checkes. 14:53:01 zwr: if you install any package from anywhere you only have to blame yourself. 14:53:56 unixman_home: ultimately you suggest the thing that need to happen: all code needs to be checked by at least on additional trustworthy party. 16:58:15 Is there a usergroup I can add myself to so that I can execute zzz? 16:58:36 I would like to be able to invoke zzz from a keybind 17:13:49 i mean, you could have a doas rule that allows your user to execute just your specific command w/out password 18:18:31 polarian: i have been chgrp 18:18:44 ing zzz to operator for years with no problems 18:42:05 a ka naj shqiptar te gjall 19:55:16 the "source" command is missing even though I installed python. Am I missing a packages I'm unaware of? 19:58:43 entikan: "source" is a shell command 19:59:29 entikan: Try "." instead of "source". 20:00:29 ah there we go 20:00:34 thanks, mason 20:00:43 entikan: If you were using Bash, you'd have "source". 20:00:56 But it's the same thing, so I just use "." everywhere. 20:02:28 makes sense. Shows what I know thinking it was a python thing :) 20:17:29 FWIW entikan, when i'm creating a venv, i'm creating another user, installing bash, and using bash for that user, and then source bin/activate works 20:25:49 hey 20:26:15 scoobybejesus: I was tempted to install bash but after looking into it want to try it the bsd way first :P You wouldn't happen to know how to symlink directories in the site-packages? 20:26:36 since I updated some ports (in particular amavisd-new), it crashs when it tries to check an ED25519 DKIM signature with signal 6... 20:27:25 here is the output I got from amavisd: https://pastebin.com/d4GfJ6Qz 20:27:27 Title: /usr/local/sbin/amavisd[19629]: (19629-04) get_body_digest: reading mail body fr - Pastebin.com 20:27:38 you can just ln -s whatever you want, but ideally you don't need to. you generally just want to the python inside the venv to be called so that its got a proper path... i think 20:27:44 unfortunately I don't find any similar bug on the internet.. I don't understand since my ports are up to date 20:27:54 and I don't know how to debug that.. 20:30:26 scoobybejesus: idk... it feels wrong writing doas in a script 20:31:01 and although I currently use nopass, it will not work if there is nopass because the command is forked into the background by the wm 20:31:25 concussious: chgrp'ing what exactly? 20:31:28 zzz is a command... 20:36:51 if you don't have any idea (and I think so since you don't develop these tools..) maybe you could tell me what you use in order to add protection to an smtp server to add antivirus and spam protection in 2024 (without using amavisd) 20:36:57 for a small smtp server 20:49:26 ClamAV... but nothing stops spam entirely. Firewalling whole countries and AS' helps, if you can 20:50:27 Its a little redundant as some spam will still get through, and when you start putting more barriers in the way you risk spamming legitimate emails 20:50:45 if you are a small smtp server you should be fine with just enforcing DMARC, and validating spf and DKIM 20:51:13 thanks 20:51:22 and what do you think about rspamd ? I just discovered it 20:51:50 rspamd is commonly used... but afaik it doesn't support IPv6 (and the developer refuses to admit IPv6 even exists) 20:52:07 really? where does he come from?! 20:52:27 in fact if rspamd is used locally as a milter we don't care about IPv6 no? 20:53:58 * polarian shrugs... I have never dabbled in rspamd 20:54:45 I think it only matters if you try using blacklists 20:55:11 ok 20:56:00 wait the IPv6 stuff can't find a source on... I must have got it confused with something else 21:13:54 it is just seasier to setup ssh on a jail than trying to remember jexec -u root 21:16:08 is it? surely that is more attack surface area... why setup a jail if you expose another ssh instance you got to protect? 21:17:29 Also... I found that setting the brightness with xrandr (or xorg in any other way) seems to just make the pixels darker... instead of actually dimming the backlight... dimming the backlight works well if you use backlight(8) but there isn't any conf for it... what would be the best way to issue "backlight 50" on startup? 21:17:41 I have seen some posts on making it a rc service... but there must be a better way? 21:19:22 polarian: that is possible but i am looking at this as ease and this is a homelab 21:19:35 plus you do not allow password prompt logins, you have to have a valid cert. so minimizes that 21:20:00 voy4g3r2: well if its within a homelab, and isn't exposed to WAN... then maybe it isn't a big deal... 21:20:10 you could just alias jexec -u root no? 21:20:15 make an alias for it 21:20:26 yes, that is an option also 21:20:51 i do not want to be in jail as root but as a user i created for services i have running so it would be jexec -u root ; su ; do work 21:20:57 now i just ssh @ 21:20:58 :) 21:21:52 whatever floats your boat... 21:24:55 yeah, it was just like.. why they heck am i doing all these extra steps 21:26:12 security sometimes requires extra steps :P 21:30:22 ssh may actually be more secure than jexec - https://www.freebsd.org/security/advisories/FreeBSD-SA-21:05.jail_chdir.asc 21:32:59 ssh is unbroken 21:33:19 imho unbroken is the highest level in security 21:33:29 famous last words 21:33:50 polarian: chgrp operator /usr/sbin/zzz 21:34:16 then, a user in the operator group is allowed to operate the zzz command 21:34:16 oh... 21:34:31 which, to me, is consistent with the meaning of the operator group 21:34:38 I think this is similar to giving the user doas permissions 21:34:58 no, doas is adding an extra layer on top 21:35:13 doing it the way i suggested is using raw unix 21:35:52 so, from a security standpoint, doas and sudo are unbroken, but they're an extra attack surface, extra complexity, resource usage, etc 21:36:02 concussious: yes... but doas elevates you to root 21:36:09 while operator only gives you access to operator group'd permissions 21:36:30 so operator i would assume is better 21:36:43 precisely! my way doesn't elevate you. it simply lets the operator... operate sleep mode 21:36:47 but anyways I found I don't need to do this... I found the function key to do it instead :) 21:36:49 no keybind needed 21:36:58 oooh tell me more 21:37:04 concussious: I already use doas... sooooo 21:37:09 either one works 21:37:22 concussious: E6430 F1 key 21:37:24 lol 21:37:45 huh, thanks for sharing, but mine doesn't do that 21:39:11 there's definitely different ways of doing everything 21:39:21 any ideas on my other issue... 21:39:30 executing the backlight command on boot? 21:40:57 backlight is new since freebsd 13, actually this is my first time seeing it 21:41:04 thank you 21:41:44 lol 21:41:46 ive never figured out, after all this time, how to bind backlight and volume adjustment to keys 21:41:49 well its the only thing which worked 21:41:53 I have tried on and off for weeks 21:41:59 but I have been having a really bad headache for weeks... 21:42:09 and its from the brightness being at max... literally burning my eyes 21:42:32 50% seems to be a more comfortable brightness... plus saves quite a bit of power too \o/ 21:43:16 concussious: I have function keys for volume on my E6430, they work out of the box 21:43:22 the mute button doesn't... 21:43:33 you could put the brightness command in your .login 21:43:36 and the brightness up and down keys do not work either 21:43:42 concussious: amazing idea, thanks! 21:45:40 putting it in .login is certainly not the best way to do it though 21:46:09 but i don't know a better way 21:49:25 hey... its a quick and easy solution 22:10:57 polarian: quick and easy solutions all around 22:11:10 lol 22:12:07 for console keybinding, i have used this: https://man.freebsd.org/cgi/man.cgi?kbdcontrol 22:12:08 Title: kbdcontrol 22:12:22 when in a gui.. i have used this: https://vhernando.github.io/xbindkeys-grab-keys-X 22:12:23 Title: xbindkeys: how to bind keys to commands (X window) - Vicente Hernando 22:15:46 i just use csh's bindkey 22:16:02 interestingly, "which bindkey" shows nothing 22:17:06 but "which which" says "which: shell built-in command." 22:17:42 after unaliasing which, i alias which to /usr/bin/which because it supports -a 22:53:28 anyone have fluentbit log collector running and outputting with opentelemetry?