-
rennj
so the keylogger virus on efi partition backdoors your FDE
-
rennj
or worse ACPI table virus..like lenovo did m-i-t-m foo.
-
rennj
-
rennj
-
rennj
ffects-products-from-other-vendors.html
-
rennj
grr...
-
rennj
-
rennj
-
rennj
correction
-
rennj
3rd time is the charm
-
rennj
award,ami,phoenix.insyde can't even trust the bios vendors..
-
rennj
independent BIOS vendors (IBVs) who lenovo blamed it on..supply chain attack.
-
rennj
mfsbsd.vx.sk boot iso readonly, into ram/in-memory os. the local hd,ssd, or das,nas,san is nothing but data. how i would use freebsd.
-
rennj
i would bake in x11/bhyve into the iso.
-
rennj
cosmic rays and virus cant change .iso image..i know i can trust that.
-
rennj
how can i trust disk based os, that could have bit-flips on ls,grep,awk..you run tripwire/aide each time on os?
-
rennj
static-os image.iso, stable i know if shit starts crashing, its not software must be hardware. another bonus
-
rennj
patch Tuesday is stupid in production
-
rennj
-
rennj
i been doing it since like 2007 or so with linux/vmware-vmx unionfs/aufs/overlayfs and squashfs before squashfs was in linux kernel.
-
rennj
-
rennj
size / 3 = good guess..from what i see.
-
rennj
In 2009 Squashfs was merged into Linux mainline as part of Linux 2.6.29.
-
rennj
yeah no more tainted kernels
-
rennj
mfsbsd and Squashfs would rock.
-
rennj
imgur.com/PN1wOYI 2024 597MB.iso vs
imgur.com/9H8EV5S 2021 350MB.iso
-
rennj
kernel,userland,X11/vmware-vmx. enough to run all other os's.
-
rennj
done beating this dead-horse.
-
rennj
-
rennj
thats low value craptop from hp..like $500 bucks
-
rennj
100 day uptime on craptop..
-
rennj
no ECC ram
-
thumbs
Who is rennj talking to?
-
SponiX
thumbs: you obviously
-
SponiX
I was just lurking
-
thumbs
SponiX: No, he's not talking to me.
-
rennj
Bo Burnham - Welcome To The Internet
-
GoSox
thumbs are you the same thumbs from..... maybe #php or #mysql or i forget where
-
rennj
cause /whois nick fail!
-
rennj
learn irc perhaps
-
rennj
you could tell the channels nick logged into
-
rennj
how about the time /ctcp nick time
-
rennj
how about the time /ctcp GoSox time
-
thumbs
GoSox: Maybe.
-
rennj
Frank Gingras
-
rennj
thumbs thaewrapt that_lurker thekingo- thisbe Thorne thorre whats that about
-
rennj
Bo Burnham - Welcome To The Internet
-
rennj
hey frank, you want to argue with me?
-
thumbs
Can you just stop flooding this channel with nonsense?
-
rennj
cause zfs,gbde,geli,secure boot is nonsense?
-
thumbs
When you're talking to yourself for hours, yes, it is.
-
rennj
says you?
-
rennj
the arbitrator
-
rennj
i think
en.wikipedia.org/wiki/SmartOS was on to something. but hey figure it out.
-
rennj
oxide computer
-
rennj
-
rennj
it's all just spam?
-
unixery
rennj: SmartOS is still around:
tritondatacenter.com/smartos
-
_al1r4d
o_o i dont think rennj flooding. he is talking about nice topic, i guess.. without him, i dont know anything
-
Alver
Hmhm. I did "reboot" in my local console, and now the server is not rebooted but powered off
-
Alver
This is not the wanted behaviour. Anything I can do to change this?
-
Alver
Hrm, even a ctrl-alt-del in the console makes FreeBSD power off instead of rebooting
-
lts
-
vortexx
freebsd-update fetch && freebsd-update install all your systems asap
-
vortexx
-
vortexx
If sshd(8) cannot be updated, this signal handler race condition can be
-
vortexx
mitigated by setting LoginGraceTime to 0 in /etc/ssh/sshd_config and
-
vortexx
restarting sshd(8). This makes sshd(8) vulnerable to a denial of service
-
vortexx
(the exhaustion of all MaxStartups connections), but makes it safe from the
-
vortexx
remote code execution presented in this advisory
-
_al1r4d
okay thank you
-
debdrup
please don't paste into the channel
-
souji
13.3-RELEASE-p4 is fixed isn't it?
-
ridcully
souji: yes. `echo | nc localhost 22 | grep 20240701`
-
souji
ridcully: Ok, thank you!
-
leah2
time for pkgbase to catch up ;)
-
|cos|
Successful exploitation of the sshd RCE should be made harder by ASLR, but Linux' implementation appears to only be as random as a toin-coss, according to qualys. Would FreeBSD:s ASLR provide a larger distribution of possible memory addresses?
-
_al1r4d
I'm on root
-
_al1r4d
sysctl: kern.securelevel=-1: Operation not permitted
-
_al1r4d
How to fix
-
_al1r4d
I dont want to "-1", but " 0"
-
vortexx
_al1r4d: securelevel can't be downgraded when running the OS, only at boot
-
vortexx
debdrup: sorry but it seemed crucial to provide that extra info
-
vortexx
should have removed the nextlines
-
|cos|
vortexx: for a rce in such a central component, i'd say you did the right call posting quickly
-
debdrup
vortexx: that's what the SA is for
-
debdrup
|cos|: it's not up for debate.
-
leah2
|cos|: the "toin-coss" is on 32-bit aslr
-
|cos|
leah2: ...which is the only architecture the exploit is known to actually work on. beating the odds on 2^19 (linux amd64) requires "a few" more attempts, i guess.
-
leah2
or a better approach ;)
-
leah2
i wonder if the lock in syslog() forfeits these attacks into deadlocks however...
-
|cos|
maybe this is drifting off-topic, but i'm bit confused about syslog() vs. syslog_r(). the problem is that the former is not reentrant when called from a signal handler, right?
-
leah2
syslog_r is an openbsd thing
-
|cos|
i remember comparing them in the past, and getting confused since linux syslog() says it's thread safe. guess i never even got around to consider calling it from a signal.
-
leah2
but yes, that is the problem
-
» |cos| is quite sure AIX has it too
-
leah2
glibc syslog is not thread safe, as the exploit shows
-
|cos|
the manpage on claims "Thread safe" "MT-Safe"
-
leah2
yes, but not AS-Safe
-
leah2
(it's thread safe, but that doesn't matter here)
-
mfisher
nice job by the security team in responding to the regreSSHion bug so quickly!
-
thorre
+1
-
tunedal
Hi. How do I use the new cloud-init support in 14.1? When I set an SSH key for a new instance in OpenStack, nothing seems to happen in FreeBSD.
-
tunedal
...and the logs from the first boot say: "/etc/rc: ERROR: Impossible to find a cloud init provider"
-
mzar
-
mzar
it should work out of the box
-
mzar
at least it worked with sysutils/vm-bhyve
-
tunedal
Hmm, I think I used the BASIC-CLOUDINIT image, not the BASIC-CI one. Shouldn't that work?
-
mzar
tunedal: you are right, I probably misled you
-
mzar
it should have worked
-
tunedal
I mean, it works in the sense that it boots, but it's not getting configuration from OpenStack to set up the SSH keys. The error message seems to be /etc/rc.d/nuageinit looking for a disk with configuration – but shouldn't OpenStack provide that somehow?
-
leah2
is this true?
wiki.freebsd.org/PkgBase#Status I don't see any updates for today yet, and it's 13:30 UTC
-
rtyler
good morning from California party people. I see the buzz is already going about today's news x_x
-
crest
it should show you a diff
-
victori
rtyler in terms of ssh?
-
rtyler
aye
-
victori
yeah recompiling - looks rushed, the commit message should have been p2 -
cgit.freebsd.org/src/commit/?h=rele…59e2f689d4014136048a8e470e852bdc69b
-
debdrup
Probably better to inform the commiter via email.
-
rogersm
folks, any idea what is the impact of the new opensshd remote code execution to freebsd? It looks openbsd is not impacted, but no idea with freebsd
-
concussious
lets not have any misinformation
-
concussious
here is the official security advisory
-
concussious
-
rogersm
thanks, that is what I was looking for
-
concussious
if you like to use a newsreader, here is the feed:
-
concussious
-
rwp
There is interesting discussion of the issue here:
news.ycombinator.com/item?id=40843778
-
rogersm
thx
-
concussious
that is interesting discussion, thanks!
-
rtyler
agreed, that was helpful
-
s2r
I'd like to create an user just to pull backups from a server, since that user wouldn't have any login privileges where would be the bsd way to store its keys? /var/ids/user ?
-
rtprio
you can make that user's home directory whatever* you want
-
» rtyler giggles at *
-
rtprio
but /var/ids doesn't make quite as much sense as /home/user
-
rtprio
if you're following hier
-
vkarlsen
Just don't put them in /tmp
-
rtprio
vkarlsen: that's what the * was for
-
vkarlsen
:)
-
s2r
rtprio so nologin but /home/user, ok.
-
rtprio
that's what i would do
-
rtprio
s2r: you can't use the user that pushes the backups to the backup server?
-
s2r
rtprio I would rather do a pull from the server.
-
rwp
s2r, I wonder what is happening when one "pulls backups from the server"? I either have the server pull a backup from a client. Or... I have the client push a backup to the server.
-
rwp
In order to restore a backup almost certainly it needs to be the root user to restore owner:group:mode of files.
-
rwp
In order to push backups almost certainly it would need to be local root and remote storage might be unpriviledged blob storage.
-
rwp
In order to pull a backup onto a server the server would almost certainly need root access to the client in order to perform the backup pull. And then locally they would already be root but perhaps might be a non-privileged user locally storing backup blobs.
-
scoobybejesus
-
scoobybejesus
i do pulls, whether scp or sanoid/zfs
-
rwp
As I read that root has bestowed specific feature permissions send,hold,mount,snapshot,destroy for datasets to the non-root user elevating that user to an equiv-for-dataset-access for backup for that user. It's a reduced privilege set.
-
rwp
But it does include destroy in the set. So not completely without teeth to bite with.
-
rwp
And there is still the need for ssh access (I presume ssh is being used for access) and therefore the user credentials for ssh authorization still need to be managed. Which is at the point of the question from s2r asking "I'd like to create an user just to pull backups from a server, since that user wouldn't have any login privileges where would be the bsd way to store its keys?"
-
rwp
If I ignore my question clarifying "pull backups" then the keys would normally go in $HOME/.ssh/authorized_keys normally. However the sshd_config may be modified to have the authorized_keys file located elsewhere. Anywhere else. And as far as I know there is no BSD standard other location for it. It would be a local decision to locate it where it is thought best to locate it.
-
weust
I've added a HDD to my server, and running "zpool attach zhdd raidz2-0 /dev/da0" but I get "cannot attach /dev/da0 to raidz2-0: can only attach to mirrors and top-level disks". What am I missing?
-
weust
FreeBSD 14.1-RELEASE with updated ZFS on pools
-
weust
The zhdd pool consists of disks da1 through da6 atm
-
llua
not being able to add disks to a raidz, its there in the message
-
weust
Yes, I know. But that should be able to do now
-
rwp
What? It's possible to expand raidz2 VDEVs now?
-
weust
-
rwp
Are you sure that is available in 14.1R?
-
weust
I thought it was added with 14.0, but tbh I can't find it now of course
-
rwp
I see some preparation for it in
cgit.freebsd.org/src/commit/?id=78c9d8f1ce65 but not that it is all there yet.
-
rwp
Well clearly I don't know anything so... Good luck! It's a feature we would all love to have available!
-
weust
yup. My pool is getting to close to full. want to add another 12TB disk to it
-
rwp
The steady state of disks is full.
-
weust
?
-
jgh
spare disk space is like socks. Always close to none left
-
scoobybejesus
s2r, rwp, what I do is i have a $script_user and an $scp_user. the script_user has rights to run backup scripts to prepare the things to be transferred. then the scp_user has the right to scp from a specific location. and each of their authorized_keys files specifies various restrictions, such as a specific command (script) for the script_user to run, and scp_user has no-pty