-
ukky
Trying to install FreeBSD. Both 15.0-amd64-current-bootonly and 14.1-stable-amd64-bootonly panic in ioapic_create() at boot. Disabling ACPI doesn't help. Should I try older ISOs?
-
rwp
HER, Is this a VNET jail? Or a non-VNET jail? I think it must be a non-VNET jail. In which case the jail guest shares the network stack with the host. In which case whatever happens to the network stack anywhere happens everywhere. (Pretty sure, I think, not absolutely positive.)
-
rwp
ukky, If it were me I would try older images but I would also be checking the system. I would boot a live boot image. I would run memtest. The panic may indicate a hardware problem.
-
ukky
rwp: thanks, will try live ISO.
-
jnewt
i updated from 13.2 to 14.1. it seems to have gone well, but i have a couple of applications running remotely that are no longer able to ssh to the server. I can still ssh manually using their keyfile / user & passsphrase. what do I look for?
-
rwp
jnewt, You got past the out of disk space problem? Excellent! :-)
-
HER
rwp: right, not vnet
-
jnewt
rwp: finally. what a mess that was
-
jnewt
rwp: i'm going to upgrade those root disks from 120 to 256 in the future
-
rwp
jnewt, Is this for root? In sshd_config look at the setting of PermitRootLogin which might be no or might be prohibit-password or even something different.
-
HER
rwp: yes.. i am using more jails now .. and learning my way... i had a vision jails were 100% secure.. but maybe not for 'non vnet jail' .. i mean.. if the guest is able to disable the host firewall...
-
jnewt
rwp: no, i have a specific & restricted user login for this remote application.
-
rwp
I don't want to have to merge those sshd_config files. In the upstream they configure with "Include /etc/ssh/sshd_config.d/*.conf" but that's not in FreeBSD 14.
-
rwp
What I do is I configure sshd_flags="-f /usr/local/etc/ssh/sshd_config" in /etc/rc.conf and then my /usr/local/etc/ssh/sshd_config contains exactly two lines. Include /usr/local/etc/ssh/sshd_config.d/*.conf and Include /etc/ssh/sshd_config and then I do all of my local configuration changes in /usr/local/etc/ssh/sshd_config.d/sshd_local.conf
-
rwp
jnewt, So it was using ssh keys but now the ssh keys are not working? I would check /var/log/auth.log and see if it logs any error messages for these login attempts. Should be a clue there. I suspect then that the clients are using obsoleted ciphers/algorithms which have been disabled. Maybe.
-
rwp
HER, Jails are not a complete VM system. I am not even sure that is what is happening. I will have to try a test and deduce it. But it seemed reasonable.
-
jnewt
rwp: the message I'm getting on the client side is: "ssh: handshake failed: ssh: unable to authenticate, attempted methods [none publickey], no supported methods remain"
-
rwp
I mostly use VNET jails these days. But also remember that a process would need to be root in the jail in order to take that action.
-
jnewt
but then i can open a terminal on the client and run ssh -i keyfile user@server:port and it uses the keyfile, i put in the passphrase and it connects
-
rwp
No supported methods remain. That's the clue. Between the client and the server they don't have a compatible method. Probably the client is old and /should/ be updated.
-
jnewt
so to me, it presents as a client issue, but I know the only thing that changed was the server updated. so I'm digging around
-
rwp
You will need to figure out what method is obsolete and either upgrade the client or enable it on the server.
-
jnewt
rwp: oh ffs, if i have to upgrade another server my head is gonna light on fire
-
rwp
It's a never ending conveyer belt forward.
-
rwp
But before you get to that point try this on the server side: /usr/sbin/sshd -d -p 2222
-
rwp
Then on the client attempt the login to the port 2222
-
rwp
On the server side that sets up a one-shot server in the foreground with all of the debug messages going to the terminal. It has useful information about which algorithms and ciphers each end is using.
-
rwp
Perhaps on the client side it will be enough to dump more verbosity with ssh -vv too.
-
rwp
When OpenSSH 8.8 released it was a breaking release for many old clients.
openssh.com/txt/release-8.8
-
jnewt
aand there it is: "userauth_pubkey: signature algorithm ssh-rsa not in PubkeyAcceptedAlgorithms [preauth]"
-
rwp
Read those release notes looking at the ssh-rsa workarounds listed.
-
rwp
And then let me STRONGLY SUGGEST changing the client from ssh-rsa to ed25519 keys. That's the best workaround. "ssh-keygen -t ed25519"
-
rwp
Using ED25519 keys has the side effect of avoiding the SHA-1 problem because ED25519 keys were newer and never used SHA-1 anywhere and it also pushes the client to use that for the host key too.
-
rwp
Which turns it into a win-win situation really. You shouldn't have to upgrade your clients OS, just their access ssh key. Stronger keys, more efficient, faster, avoids SHA-1.
-
rwp
Since ED25519 keys were introduced in OpenSSH 6.5 as long as the client is newer than that then it is supported on older clients.
-
rwp
HER, I have this vague memory that there is a sysctl security level available to prevent jails from having that level of access to the network stack. I don't remember more off the top of my head. But perhaps searching around in that area or asking others if they know might turn up something?
-
jnewt
rwp: why does it allow me to use the key from the terminal, but the client application can't? shouldn't an outdated ssh version without the allowance on the server side stop both?
-
HER
rwp: right, i will search that too, thanks
-
rwp
jnewt, I don't understand which part is which part. You try from the client command line and it is working but some client side application program (what?) is not working?
-
rwp
Sounds like the client side application program is not the same as the command line ssh?
-
jnewt
correct. so it sounds like maybe the application itself needs upgraded...which I am very unqualified to do
-
jnewt
(not that I'm qualified to do what I do here anyway, but i digress)
-
» jnewt proceeds to try to learn how to upgrade the cryptography dependencies of the application :)
-
jnewt
it's almost like it's not using the system level ssh installation, otherwise there would be no discrepancy
-
rwp
jnewt, It's an endless conveyer belt. Upgrade one thing. Something else needs to be upgraded. Abandon all hope!
-
rwp
On the other side of things, if your desktop system is upgraded and then the client is too new, it is possible to create an older jail and then jexec into the jail and use the older system to client ssh out to a remote older system. That works pretty straight forward. Just mentioning that in passing.
-
jnewt
i think the best course of action is to just never upgrade. isn't the space station running on like windows 95 or something? we'll probably be fine
-
rwp
The opposite direction though I have the same problem. A co-worker and I have this almost but not quite dead contract git. My co-worker friend is using an ancient Windows box to access the subversion based version control. Can't contact the server anymore. But has no real reason to do so either since the project is virtually moribund anyway.
-
rwp
I figure we will work something out if we really need him to be able to ssh connect to the svn server. I will probably set up a vnet jail running an older ssh and lock it down to just him or something.
-
rwp
As far as the ISS still running old systems that is true. And the Mars rover is running a system with a known remote code vulnerability. But you have to be able to poke packets at those systems too and they are rather space-gapped systems. :-)
-
scoobybejesus
I was just listening to 2.5 admins and them talking about how rsa-512 was finally deprecated in openssh (or something like that)
-
scoobybejesus
perhaps the keys are ancient, and rsa is actually supported, but keys that ancient (insecure) are not unless you specifically allow them
-
al1r4d
My new email server powered by freebsd + openstmpd + dovecot
-
al1r4d
:)
-
sidh
Greetings
-
sidh
poudriere users, did you notice this problem : at the end of a bulk poudriere generates a pkg.pkg (new format name iirc) , while pkg bootstrap -f expect the old name pkg.txz ?
-
ukky
rwp: 9.3-release-amd64-memstick boots fine.
-
rwp
ukky, Interesting. I have no idea! I don't use the memstick versions but have only ever used the disc1 iso images.
-
ukky
rwp: bisecting, latest working image is 14.0 on that system. Both 14.1 and 15.0 trigger panic at boot. I don't think memstick vs disc1 matters.
-
skered
We have devel/py-graphql-core, devel/py-graphene, .. maybe a couple others from github.com/graphql-python but no gql? Any chance it's there by a different name?
-
skered
gql is graphql python client from the same project.
-
skered
There isn't a simple way to inspect python ports for something that looks like a plist? maybe freshports?
-
skered
I'm pretty sure ports doesn't have gql though.
-
dvl
Nothing listed in FreshPorts contains gql in the pkg-plist
-
skered
But does freshports track auto plist ports?
-
skered
Most py- don't have a plist file.
-
dvl
Only what it can extract from pkg-plist or from ...
-
dvl
-
dvl
skered: But yeah, py- ports are hard to get pkg-plist infor from, example:
freshports.org/databases/py-carbon
-
rwp
ukky, Given what you have found so far I am sure you have found a kernel bug! One that would be good to root cause and get fixed. Good hunting!
-
lw
hello is this the channel for GNU/FreeBSD
-
vkarlsen
lw: Yes, but only the flavor that runs off of LILO
-
lw
vkarlsen: oh good, i just installed LILO on my 386, i really hope GNU/FreeBSD didn't recently announce any plans to drop 32-bit x86 support!!
-
lw
fortunately the Linux Public License makes it illegal for them to do that
-
debdrup
lw: isn't that project dead?
-
debdrup
Oh, I was thinking of GNU/kFreeBSD, which yes is dead.
-
mason
Not entirely dead. People work on it still.
-
debdrup
Even after the termination of the project by Debian?
-
mason
debdrup: Yes.
-
debdrup
Yeah, there does seem to be a tiny bit of activity on the mailing list even in 2024, more than a half year after.
-
mason
And there's an IRC channel on OFTC - #debian-kbsd.
-
mason
Some folks *want* it to be dead, but it is not so.
-
debdrup
Seems pretty rude.
-
mason
Eh, everyone can have opinions.
-
debdrup
True.
-
markmcb
opinions on a SSD for a SLOG/ZIL for a zfs raidz storage device? seems to be mixed opinions online. my use case is just a home nas, but you know, gotta optimize :)
-
daemon
main question is do you even need one
-
daemon
if you do, do you have any spare pcie lanes?>
-
daemon
because if you do just shove a pcie->nvme conversion card in
-
daemon
and wallah
-
markmcb
i have a few extra SATA SSDs and plenty of room on my backplane, so was thinking to mirror them and try it out
-
daemon
Sounds a plan
-
daemon
buy some smaller dram backed SATA SSD's and shove them in mirrow or raidz
-
debdrup
an entry in the separate intent log takes up ~80 bytes and you'll need one for each record - so figure out the maximum number of records that can be on your raidz and you'll have the size it needs to be
-
debdrup
more importantly, do you understand that the separate intent log is _only_ for synchronous writes?
-
debdrup
it won't speed up any asynchronous writes at all, and those are the majority of what you're likely seeing, unless you're working with databases, nfs, or another sync-heavy write load
-
debdrup
something that will speed up any zpool is a special vdev used for metadata and allocation classes - but those also need to be sized appropriately, and you also need them in an n-way mirror
-
markmcb
debdrup: yeah, i have my doubts if it'll yield any real benefits. i'm mostly just experimenting. i'll read up on the special vdev you mentioned. hadn't heard of that.
-
debdrup
it's somewhat new
-
debdrup
with zfs and enough non-volatile flash devices to throw at a zpool (for cache, log, and special vdev, and eventually maybe even a dedup device), spinning rust can be made to feel a lot like flash storage, despite having much higher density
-
rwp
Cache and power failures interact badly. High performance enterprise level HBA cards usually have a battery to keep their cache going long enough to write through upon sudden power failure. The ZIL should either have this. Or don't do it at all.
-
rwp
An HBA card without any cache is in some ways better because there is no worry about the battery having failed off with it.
-
rwp
If you haven't got a UPS configured with graceful shutdown then that's the place to start first.
-
ek
I avoid batteries on HBA's, personally. But, there's always a UPS in it's place.
-
ek
Unless, of course, the HBA's can be flashed between RAID/HBA (IT-mode most manufacturers call it?) Then I'll leave it so the card can be resold later as whatever the purchaser needs. I always disconnect the better in HBA mode, though.