00:52:15 i make /etc/devfs.conf why does sudo pw groupadd -n network -m logg error that m is illegal option? man page shows it 00:52:24 it's just how to add a user to a group 00:53:01 oh -m is just for groupmod 00:57:49 why isn't my devfs.conf for /dev/bpf* working pls? https://termbin.com/swpp the groups should be network but they're wheel? 01:12:46 I don't think you can glob match in devfs.conf? 01:13:05 frfr? 01:17:37 If you want to use glob match you need devfs.rules 01:21:14 can i use that in a jail? 01:21:44 jail host devfs.rules has add path 'bpf*' unhide, so what would the jail devfs.rules have to apply those same rules? 01:22:48 mode ... user ... group ... ? 01:25:09 ok then set in rc.conf with devfs_system_ruleset="localrules" man page says ty i'll try it! 01:56:07 ok i think i'm doing it right but why are the perms of /dev/bpf* still root:wheel? https://termbin.com/pxua 02:05:43 should be root:network 02:35:08 anyone know? 02:49:57 oh this is in a jail? 02:50:11 Just do it on the host 02:50:35 i need the jail to be completly independent from jail host 02:50:41 i don't wanna mix configs 02:51:11 How are you starting the jail? 02:51:22 * skered only has exp. with devfs rules with ezjail config files. 02:51:25 from the jail host 02:59:20 You have a devfs_ruleset in your jail.conf for the jail? 02:59:53 jail_name { devfs_ruleset= ... } ? 02:59:59 I guess 10 in this case? 03:00:06 https://termbin.com/8nz4 03:16:16 does that show the info you want? 03:27:54 No idea. I've only done devfs where the config is on the host and in ezjail. 03:28:11 there has to be a way 04:09:12 so then in a jail, what's the right way to allow a regular user access to /dev/bpf so it can run tcpdump? 05:16:57 skered https://cgit.freebsd.org/ports/tree/net/wireshark/pkg-message seems you /can/ use bpf* in devfs.conf? 05:16:59 Title: pkg-message « wireshark « net - ports - FreeBSD ports tree 05:24:05 network general packet sniffer.. the sniffer 05:24:36 https://en.wikipedia.org/wiki/Sniffer_(protocol_analyzer) why a jail? 05:24:37 Title: Sniffer (protocol analyzer) - Wikipedia 05:25:39 why what? 05:25:59 why you putting the tcpdump/sniffer/wireshark foo in a jail? 05:26:02 polyex: yes, devfs.conf is processed in /etc/rc.d/devfs; the device field is generally open to whatever shell globbing you can come up with 05:26:56 kevans i can't get it to work either by modifying the jail's devfs.conf OR devfs.rules. https://termbin.com/hl75, https://termbin.com/0x75 05:27:16 what's the right way to allow an unprivileged user in a jail access to bpf so it can run tcpdump? 05:27:28 it's a vnet jail fwiw 05:29:12 so they can sniff their chroot jail..swell 05:29:32 devfs_system_ruleset isn't used in a jail 05:29:46 so what's the solution? 05:30:30 my end goal is to put pf block/allow loggings into syslog. this is the only way i've found 05:30:47 i can get it working if it's running as jail's root but i'd rather it not use the root 05:30:54 tcpdump -> logger 05:31:07 it wouldn't be unreasonable to throw it in the host's devfs.rules 05:31:15 hmm 05:31:20 maybe the group doesn't exist 05:31:24 i'd prefer to keep jail's self-contained as much as possible 05:31:28 network? 05:31:51 pw group show network shows it 05:31:56 also shows my logg user in it 05:32:14 oh, no idea- I closed those tabs eons ago now :-) 05:32:42 I'd probably just shove it in /etc/rc.local, then 05:32:51 shove what? 05:32:52 I can't think of a clean solution here 05:32:55 vnet network traffic within the jail is isolated from the host system and other jails..so your jail needs this ? 05:32:57 ownership change 05:33:27 am i the only person that wants a jail to be able to run tcpdump? 05:33:40 nah, it's a reasonable task 05:33:49 what's the normal clean way? 05:34:43 normally you'd do it in devfs.rules, but that rc script is tagged nojail entirely 05:35:20 so i'd definitely NOT do it in devfs.conf? 05:35:50 yeah 05:36:24 I wonder how much of an ideot would it be to set up a directory which symlinks everything in $PATH to it and runs on a cron job 05:36:49 idea* 05:37:08 polyex: and devfs.rules are provided by the jail's parent and immutable to the jail, so that's out 05:37:29 kevans so you're saying the cleanest solution is put chgrp and other things into rc.local. ill try that now 05:37:31 that generally leaves you with... something that runs at startup, e.g., rc.local 05:37:35 yeah 05:37:44 well, I wouldn't claim 'cleanest', no 05:37:57 It's the cleanest that I can see at the moment, and generally easy to do 05:41:05 ok so i added the https://cgit.freebsd.org/ports/tree/net/wireshark/pkg-message chgrp chmod chmod to rc.local. i start the jail back up and /dev/bpf* perms are... 05:41:06 Title: pkg-message « wireshark « net - ports - FreeBSD ports tree 05:41:44 for /dev/bpf it's crw-rw---- root:network, /dev/bpf0 -> bpf is lrwxr-xr-x root:wheel 05:41:47 is that good? 05:42:26 umask 0660 foo...you put in earlier... 05:42:43 what? 05:42:49 exactly 05:43:34 perm bpf* 0660 05:43:41 a umask 05:43:51 do that in rc.local or? 05:44:12 https://en.wikipedia.org/wiki/Umask 05:44:13 Title: umask - Wikipedia 05:44:44 https://cgit.freebsd.org/ports/tree/net/wireshark/pkg-message that link you posted 05:44:45 Title: pkg-message « wireshark « net - ports - FreeBSD ports tree 05:47:24 ok seems to be working 05:51:53 yes it's working!! tyvm kevans you are my hero 05:52:06 i want to hold your hand and look into your eyes and thank you 05:52:58 if you go to bsdcan you can send a beer in my direction =-) 05:53:26 what kinda beer you like best? 05:53:33 ipa or dark ale or? 05:55:43 the drinkable kind, in general 05:55:47 i like experimenting 05:56:06 we could do all kinds of experimenting together 06:20:08 so bpf in a jail can sniff the jail host and other jails traffic? i thought vnet gave each jail a separate network stack 06:28:10 cut copy pastw computing, doesnt really work well in the end 06:28:16 cut copy paste computing, doesnt really work well in the end 06:28:23 bridge epair perhaps 06:28:53 plent of bind/sendmail cut/copy/paste computing...using a computer and not understanding anything 06:29:32 dangerous computing, risk digest 06:30:28 https://wiki.freebsd.org/Jails 06:30:29 Title: Jails - FreeBSD Wiki 06:30:34 https://wiki.freebsd.org/MasonLoringBliss/JailsEpair 06:30:35 Title: MasonLoringBliss/JailsEpair - FreeBSD Wiki 06:37:31 Hi folks. I run FreeBSD 13.2 as a guest of Linux KVM and found the virtio pci devices not use MSI but legacy pin based irq, is this expected? Thanks. 13:10:20 Hello guys, off top, anyone else experience issues with ddg search ? 13:10:50 here is the error: "We're currently experiencing an issue with DuckDuckGo Search. Thanks for your patience while we get our ducks in a row. 13:10:50 In the meantime, you can use other search engines right here by using "bangs":" 13:11:53 ddg backend to bing and that is suffering some issues apparently: https://www.theregister.com/2024/05/23/bing_and_copilot_fall_from/ 13:11:54 Title: Bing and Copilot fall from the clouds • The Register 13:12:21 yeah, noticed it today. moved to startpage for now 13:12:40 :( 13:13:21 From that article "Bing's downtime meant that DuckDuckGo, which uses Bing as a search results source, was also down" 13:13:56 never used startpage 13:14:17 what about privacy things on startpage? 13:16:42 dunno, didn't look too far into it. it seemed mostly acceptable when it comes to the stuff it was showing me, so i'll just stick with it until bing is operational again 13:17:16 thank you guys for quick replies 13:52:53 so, if i want to launch a single process from the CLI, but i want to make sure it can't use networking, is that possible? i don't want to setup a jail. 13:54:20 Demosthenex: In my case, I have a dedicated user for that, with a pf rule to block all network activity from that user 13:54:54 ooo. tsocks! 13:55:18 it literally takes just a single line in pf.conf: 13:55:20 block all user disconnected_guy 13:55:42 (of course, using your username of choice) 13:56:46 yeah, but $$ tsocks myapp is much easier 13:56:54 and i want x11 14:01:57 hm, casper seems like what you want, but I have no idea where you can find it https://www.bsdcan.org/2016/schedule/events/661.en.html 14:01:59 Title: BSDCan2016: Capsicum and Casper 14:06:02 nimaje: a ldpreload like tsocks was enough for me ;] 14:59:29 lithio 15:20:28 hi all 16:54:46 If I observe a bug / incorrect behavior in a program, would it be rude to email the maintainer and offer to help? 16:55:20 I see that there is a FreeBSD bugzilla, but other than just report the bug, I'd want to offer to research / proopse a fix 16:56:46 And lastly, if someone is listed as the "Maintained by:" field on ports.freebsd.org, would the "artifacts" they maintain also correlate to the binary package of the same name? 16:56:59 Steeve: You can do that in bugzilla. If you label the PR properly, the maintainer will be notified. Then, you can propose fixes, provide patches, make suggestions, etc... all in bugzilla as well. It's meant to be used as a collaboration tool. 16:58:02 For the last bit, yes. The packages are also maintained (not built/provided by) the port maintainer. 16:58:40 Great, thank you 16:59:26 You're welcome. 19:22:30 Hello here 19:22:45 FreeBSD is fully working on rpi3 ? 19:23:09 i can't see linux and systemd anymore :) 19:24:00 Wifi is not working on rpi3 19:24:06 arg 19:25:04 well i'm waiting more :) 19:25:15 learning linux :p 20:53:28 I think the rpi wifi support is heavily dependent on the firmware, right? It won't happen until the firmware supports FreeBSD. 22:00:36 i thought there was pi info on the wiki 22:50:36 trying to make a rc.d service but even tho it runs it doesn't return when i type service logg start. just sits there Starting logg... forever https://termbin.com/k4y9 but i'm using daemon to run it so what i'm doing wrong? 23:03:22 cmd piped into itself? reading on mobile is tough, but that looks weird/recursive 23:03:48 i'm trying to just make sure it's always running 23:04:00 it's how i'm piping pf log events into syslog 23:04:11 if i'm doing it wrong how should i do it? 23:04:12 ah that's a new line 23:04:20 my fault 23:11:56 know why it doesn't return? 23:34:27 perhaps running with -x will point to the issue. verbose of course 23:47:43 where scoobybejesus? 23:55:53 In the rc script put in "set -x" and then run it and see where it is hanging. 23:56:49 The -x will emit tracing print to stderr an echo print for every command executed. 23:59:12 hm well i ran that and a bunch of stuff outputted but duno 23:59:35 i feel like there's gotta be an easier way to make it return