undeadly.org
Open in
urlscan Pro
2a02:898:28:500::1
Public Scan
Submitted URL: http://undeadly.org/
Effective URL: http://undeadly.org/cgi?action=front
Submission: On March 08 via manual from US — Scanned from NL
Effective URL: http://undeadly.org/cgi?action=front
Submission: On March 08 via manual from US — Scanned from NL
Form analysis
1 forms found in the DOMPOST https://undeadly.org/cgi
<form action="https://undeadly.org/cgi" method="post" autocomplete="off" autocapitalize="none">
<input type="hidden" name="action" value="search">
<input id="f_q" type="text" name="q" required="">
<input type="submit" title="We canardly search!" name="submit" value="Search site">
</form>
Text Content
OpenBSD Journal Home Archives About Submit Story Create Account Login OPENBSD JOURNAL OPENBGPD 8.4 RELEASED Contributed by Peter N. M. Hansteen on 2024-03-07 from the routed in a route, bordering dept. The OpenBSD Border Gateway Protocol (BGP) routing daemon OpenBGPD has a new version out, version 8.4. The release announcement reads, > Subject: OpenBGPD 8.4 released > From: Claudio Jeker <claudio () openbsd ! org> > Date: 2024-03-07 13:12:51 > > We have released OpenBGPD 8.4, which will be arriving in the > OpenBGPD directory of your local OpenBSD mirror soon. Read more… No comments RPKI-CLIENT 9.0 RELEASED Contributed by Peter N. M. Hansteen on 2024-03-03 from the key my route dept. In what can only be called a great stride forward in routing security, Sebastian Benoit (benno@) announced the availability of rpki-client version 9.0. The announcement reads, > Subject: rpki-client 9.0 released > From: Sebastian Benoit <benno () openbsd ! org> > Date: 2024-03-03 17:24:06 > > rpki-client 9.0 has just been released and will be available in the > rpki-client directory of any OpenBSD mirror soon. It is recommended > that all users update to this version for improved reliability. > > rpki-client is a FREE, easy-to-use implementation of the Resource > Public Key Infrastructure (RPKI) for Relying Parties (RP) to > facilitate validation of BGP announcements. The program queries the > global RPKI repository system and validates untrusted network inputs. > The program outputs validated ROA payloads, BGPsec Router keys, and > ASPA payloads in configuration formats suitable for OpenBGPD and BIRD, > and supports emitting CSV and JSON for consumption by other routing > stacks. Read more… No comments OPENBSD -CURRENT DROPS -BETA TAG, GOES TO 7.5 Contributed by Peter N. M. Hansteen on 2024-02-29 from the puffing up the versions again dept. A clear sign that the OpenBSD 7.5 release cycle is entering the final phases just emerged. In this commit, Theo de Raadt (deraadt@) changed the version string to 7.5: > From: Theo de Raadt <deraadt () cvs ! openbsd ! org> > Date: 2024-02-29 17:05:10 > > CVSROOT: /cvs > Module name: src > Changes by: deraadt@cvs.openbsd.org 2024/02/29 10:05:10 > > Modified files: > sys/conf : newvers.sh > > Log message: > move from 7.5-beta to 7.5 Read more… No comments IPV6 FOR PPP(4) ENABLED IN -CURRENT. Contributed by Janne Johansson on 2024-02-28 from the upppgrading to the sixes dept. In this commit, Denis Fondras (denis@) added code to allow IPv6 over PPP. The message reads, > Subject: CVS: cvs.openbsd.org: src > From: Denis Fondras <denis () cvs ! openbsd ! org> > Date: 2024-02-28 16:08:34 > > CVSROOT: /cvs > Module name: src > Changes by: denis@cvs.openbsd.org 2024/02/28 09:08:34 > > Modified files: > share/man/man4 : ppp.4 > sys/net : if_ppp.c if_pppvar.h > > Log message: > Enable IPv6 AF for ppp(4) > > OK claudio@ With this one commit, the brave new world of IPv6 opens up to a whole chunk of traditional-style Internet users. No comments MWX(4), ANOTHER NEW WI-FI DRIVER, ADDED TO -CURRENT Contributed by rueda on 2024-02-23 from the it's-raining-wi-fi-drivers dept. Hot on the heels of qwx(4) [see earlier report], and soon after going -beta, -current has gained another new wi-fi driver - mwx(4). Claudio Jeker (claudio@) committed the import: > CVSROOT: /cvs > Module name: src > Changes by: claudio@cvs.openbsd.org 2024/02/21 03:48:10 > > Modified files: > sys/dev/pci : files.pci > Added files: > sys/dev/pci : if_mwx.c if_mwxreg.h > > Log message: > Import mwx(4) a driver for Mediatek MT7921 and MT7922 802.11ax devices > > This is work in progress. Scan works, RX of packets is more or less there > but TX does not work yet. The packets are passed to the chip but get stuck > or ignored there. It is easy to hang the device or the system since device > reset is not quite right (like many other bits). > > Also this is only for MT7921 right now since I have no access to a MT7922 > device. > > Lots of pushing from deraadt@ to commit this now. So, WIP and MT7921-only [at this stage], but very promising. No comments NEW CODE FOR SIGILL FAULTS HELP IDENTIFY MISBRANCHES Contributed by Janne Johansson on 2024-02-22 from the don't pee on the electric fence dept. If you run recent OpenBSD on certain amd64 or aarch64 platforms, indirect branching to an "unexpected" location will crash your program, in order to prevent ROP attacks and similar ways to have your program execute code where it shouldn't. The OpenBSD compiler will insert an extra instruction in all the places where a branch is supposed to land, and if it lands anywhere else, a CPU fault is raised and your program gets an "Illegal Instruction". Previously, crashes of this kind have looked more or less like any other kind of fault where code is executing random data or from random locations, but since the kernel knows when this has happened, we can make it explicit that the fault is due to missing branch target instructions, which will help a lot when debugging. Link to the commit here. 1 comment (12d5:01 ago) OPENBSD -CURRENT MOVES TO 7.5-BETA Contributed by Janne Johansson on 2024-02-17 from the springtime for Puffy dept. It's that time of the year again. With this commit, Theo de Raadt (deraadt@) changed the version string for the OpenBSD development branch (i.e. -current) to 7.5-beta: > CVSROOT: /cvs > Module name: src > Changes by: deraadt@cvs.openbsd.org 2024/02/17 09:13:24 > > Modified files: > sys/sys : param.h > etc/root : root.mail > sys/conf : newvers.sh > sys/arch/macppc/stand/tbxidata: bsd.tbxi > share/mk : sys.mk > usr.bin/signify: signify.1 > > Log message: > move to 7.5-beta With the upcoming release expected to appear in May, testing is particularly welcome. 7.5-beta snapshots are already appearing on the mirrors. 2 comments (5d4:56 ago) NEW WI-FI DRIVER, QWX(4), ENABLED IN -CURRENT Contributed by rueda on 2024-02-16 from the qwx my line dept. Stefan Sperling (stsp@) tooted regarding the addition of qwx(4) to -current: > The next set of #OpenBSD amd64/arm64 snapshots will start shipping the qwx > driver for #ath11k QCNFA765 wifi devices. > > My part-time effort on this driver started about a year ago, with much help > from mpi@, @bluerise, kettenis@, and claudio@ > > https://marc.info/?l=openbsd-cvs&m=170801475321249&w=2 > > Edit: And I should mention that the OpenBSD Foundation supports this effort. > Thanks to everyone who donated! The QCNFA765 is found in some laptops. The driver currently supports only 11a/b/g modes. Thanks to Stefan, his helpers, and The OpenBSD Foundation! No comments RPKI-CLIENT 8.9 RELEASED Contributed by rueda on 2024-02-14 from the key-toning dept. Sebastian Benoit (benno@) announced the release of version 8.9 of rpki-client. Updating is recommended for "improved reliability". Read more… No comments DONATE! Donate to OpenBSD FEATURES We are constantly on the lookout for stories of how you put OpenBSD to work. Please submit any informative articles on how OpenBSD is helping your company. EARLIER ARTICLES * Wed, Feb 14 * 07:05 Game of Trees 0.96 released (0) * Sun, Feb 04 * 11:29 Soft updates (softdep) support removed from -current (29) * Mon, Jan 29 * 06:01 pinsyscalls(2) work summarized by Theo de Raadt (0) * Thu, Jan 25 * 06:44 KMS for Apple silicon machines (0) * Thu, Jan 18 * 08:07 pinsyscalls(2) working in anger (1) * Mon, Jan 15 * 17:07 Effortless OpenBSD Audio and Desktop Screen Recording Guide (0) * Thu, Jan 11 * 10:59 DSA removal from OpenSSH (0) * Wed, Jan 03 * 10:32 OpenBSD workstation hardening tips (0) * Mon, Jan 01 * 09:32 TSO for em(4) committed to -current (1) OPENBSD ERRATA OpenBSD 7.4 0142024-02-29 SECURITY vmm(4) did not restore GDTR limits properly on Intel (VMX) CPUs. 0132024-02-13 SECURITY DNSSEC protocol vulnerabilities have been discovered that render various DNSSEC validators victims of Denial Of Service while trying to validate specially crafted DNSSEC responses. Fix CVE-2023-50387 and CVE-2023-50868 in unwind(8) and unbound(8). 0122024-01-16 SECURITY Fix multiple xserver heap buffer overflows, out of bounds memory accesses and memory corruption. CVE-2023-6816 CVE-2024-0229 CVE-2024-21885 CVE-2024-21886 CVE-2024-0408 CVE-2024-0409 0112023-12-18 SECURITY An SSH protocol weakness (the Terrapin Attack) exists that allows an on-path adversary to disable keystroke timing obfuscation. 0102023-12-14 SECURITY Fix out of bounds memory accesses in XRandR and XKB X server extensions. CVE-2023-6377 CVE-2023-6478 0092023-12-10 RELIABILITY A race condition between pf(4)'s processing of packets and expiration of packet states may cause a kernel panic. OpenBSD 7.3 0262024-02-13 SECURITY DNSSEC protocol vulnerabilities have been discovered that render various DNSSEC validators victims of Denial Of Service while trying to validate specially crafted DNSSEC responses. Fix CVE-2023-50387 and CVE-2023-50868 in unwind(8) and unbound(8). 0252024-01-16 SECURITY Fix multiple xserver heap buffer overflows, out of bounds memory accesses and memory corruption. CVE-2023-6816 CVE-2024-0229 CVE-2024-21885 CVE-2024-21886 CVE-2024-0408 CVE-2024-0409 0242023-12-18 SECURITY An SSH protocol weakness (the Terrapin Attack) exists that allows an on-path adversary to disable keystroke timing obfuscation. 0232023-12-14 SECURITY Fix out of bounds memory accesses in XRandR and XKB X server extensions. CVE-2023-6377 CVE-2023-6478 0222023-12-10 RELIABILITY vmm(4) restored stale GDTR & TR values on vm exit which could lead to memory corruption or kernel deadlocks. 0212023-11-29 SECURITY A crafted regular expression when compiled by perl can cause a one-byte attacker controlled buffer overflow in a heap allocated buffer. CVE-2023-47038 OPENBSD RESOURCES * OpenBSD * The OpenBSD Foundation * OpenBSD Ports Readme * MARC * Commits on FreshBSD * -stable commits * OpenBSD discussions * Hungarian OpenBSD news * OpenBSD on Lobsters * #openbsd toots / tweets * LinkedIn group XML/RSS/RDF Users wishing RSS/RDF summary files of OpenBSD Journal can retrieve: Options are available. CREDITS Copyright © 2004-2008 Daniel Hartmeier. All rights reserved. Articles and comments are copyright their respective authors, submission implies license to publish on this web site. Contents of the archive prior to April 2nd 2004 as well as images and HTML templates were copied from the fabulous original deadly.org with Jose's and Jim's kind permission. This journal runs as CGI with httpd(8) on OpenBSD, the source code is BSD licensed. undeadly \Un*dead"ly\, a. Not subject to death; immortal. [Obs.]