Commit Graph

7060 Commits

Author SHA1 Message Date
wiz 0fa531d9a4 Add -g to usage. 2020-05-24 21:02:12 +00:00
wiz 11e3f06a51 Use Nx, fix formatting nit. 2020-05-24 21:01:49 +00:00
wiz 6f392fa3a0 Fix typo in macro. Sort option descriptions. 2020-05-24 20:59:16 +00:00
jmcneill f907c64a8f Add -g flag to preserve GPT headers when updating MBR. 2020-05-24 18:42:48 +00:00
jmcneill e5906ade5e Add -H flag to ignore existing MBR (Hybrid MBR/GPT mode). 2020-05-24 18:42:20 +00:00
jmcneill 084befafcb Exit gracefully when auto-expanding a partition and it is already the
correct size. Add a -q flag to "resize" and "resizedisk" commands to skip
printing warnings in the already resize paths.
2020-05-24 14:42:44 +00:00
jmcneill 2cf653d8b7 Use getfsspecname and getrawdiskname so we can resize by NAME= label. 2020-05-24 14:41:26 +00:00
christos 9aa2a9c323 Add ACL support for FFS. From FreeBSD. 2020-05-16 18:31:45 +00:00
msaitoh 8012ca3f0e Remove extra semicolon. 2020-05-14 08:34:17 +00:00
khorben 2478cc98bc Fix and improve parsing of configuration files
XXX pull-up to netbsd-9
2020-05-13 21:44:30 +00:00
simonb da20e95aa9 Whitespace alignment nits. 2020-05-12 09:48:44 +00:00
riastradh 3fb2c51c3c Trigger entropy consolidation before saving seed.
This way, whenever /etc/security runs infrequently (daily), or the
operator manually issues rndctl -S, we ensure that all samples taken
during the entire boot are hashed together in the seed for the next
boot.

This should be infrequent enough that it's unlikely to enable the
iterative-guessing attacks that we try to mitigate by not frequently
consolidating entropy.
2020-05-07 19:13:38 +00:00
riastradh c2a3429284 Rework rndctl seed load sequence again.
Go back to the book's order, now that writing to /dev/random
guarantees to consolidate entropy -- this way the _next_ boot is no
less secure than the current boot, in the event that entropy sources
like interrupt timings provided any security that we just don't know
how to measure honestly.

Make sure to open the old seed to overwrite and the new seed to write
anew first so that we can determine whether the medium is read-only
before accepting the file's entropy estimate.
2020-05-07 19:12:45 +00:00
riastradh 97603a72a0 Touch up rndctl(8) a bit. 2020-05-07 19:09:26 +00:00
wiz fecac516fe Add -i to SYNOPSIS. 2020-05-07 12:58:09 +00:00
riastradh 1e65f60a58 Tweak logic to decide whether a medium is safe for an rndseed.
- Teach rndctl to load the seed, but treat it as zero entropy, if the
  medium is read-only or if the update fails.

- Teach rndctl to accept `-i' flag instructing it to ignore the
  entropy estimate in the seed.

- Teach /etc/rc.d/random_seed to:
  (a) assume nonlocal file systems are unsafe, and use -i, but
  (b) assume / is safe, even if it is nonlocal.
  If the medium is nonwritable, leave it to rndctl to detect that.
  (Could use statvfs and check for ST_LOCAL in rndctl, I guess, but I
  already implemented it this way.)

Treating nonlocal / as safe is a compromise: it's up to the operator
to secure the network for (e.g.) nfs mounts, but that's true whether
we're talking entropy or not -- if the adversary has access to the
network that you've mounted / from, they can do a lot more damage
anyway; this reduces warning fatigue for diskless systems, e.g. test
racks.
2020-05-06 18:49:26 +00:00
riastradh 1154c4b65f Sort includes. 2020-04-30 03:27:15 +00:00
riastradh 825d46aec4 Accept both byte orders for random seed in `rndctl -L'.
The file format was defined with a machine-dependent 32-bit integer
field (the estimated number of bits of entropy in the process that
generated it).  Take whichever byte order gives a number that is
reasonable, i.e. lower than the number of bits in the buffer.

Continue to have `rndctl -S' generate it in machine-dependent byte
order for now, so that if you roll back to an older rndctl(8) then
`rndctl -L' on the same machine will still be able to load it with
the right entropy estimate.  In a future revision, perhaps we can
change it to be little-endian.
2020-04-30 03:24:48 +00:00
gson d609938dfa Remove references to "special", as mount_qemufwcfg(8) does not
actually take such an argument.  Discussed with jmcneill.
2020-04-29 09:54:43 +00:00
christos 4efd5405d6 make umount NAME= work 2020-04-23 04:21:13 +00:00
christos 7df60872d5 Enable the code to clean the extattr blocks 2020-04-19 19:37:06 +00:00
sevan ad16dbb6f1 grammar 2020-04-18 22:02:11 +00:00
jdolecek 1ef16aec19 add NO_IOBUF_ALIGNED to not pull aligned_alloc() for really constrained
boot media
2020-04-18 12:54:38 +00:00
jdolecek 93217591a2 align buffers used for I/O to DEV_BSIZE so it's executed more optimally
when run for xbd(4) raw (character) device
2020-04-17 09:42:27 +00:00
jdolecek 4a168442c5 align buffers used for I/O to DEV_BSIZE so it's executed more optimally
when run for xbd(4) device
2020-04-17 09:33:37 +00:00
jdolecek 171fa94db7 adjust to work with updated dkwedge_bsdlabel.c - provide geteblk() and
brelse() which just allocate/free the memory
2020-04-11 17:21:16 +00:00
plunky 7ea6ef2b6d trim extraneous return statement 2020-04-10 14:32:50 +00:00
christos 9655c24691 Refresh the superblock in memory if changing a mounted partition. 2020-04-09 14:44:38 +00:00
martin b187e11174 Sync "common" declarations with ifdefs in header. 2020-04-06 09:54:24 +00:00
mrg d26fa7dbd1 dion't define endian as well as try to declare it as a variable. 2020-04-06 06:41:34 +00:00
joerg 6ce4f404a1 Fix depenency on common symbols in sbin. 2020-04-05 15:25:39 +00:00
joerg a74e29fe24 Avoid common symbols for fsck_lfs. 2020-04-03 19:36:32 +00:00
maxv 6fa9cf7eed Avoid overflows when reading strings. 2020-04-03 19:09:43 +00:00
joerg a69687b194 Just declare driver and buf 2020-04-03 18:39:15 +00:00
martin af2ed9cf6e Make route and netstat share the same struct progops (and initialization
code)
2020-04-03 16:20:51 +00:00
christos a17e9ce771 Add a prog_setsockopt (thanks kre@) 2020-04-02 18:32:31 +00:00
martin 29b6fd854b Now that we use the same UUID for ZFS as FreeBSD, drop the FreeBSD marker
from the description.
2020-03-30 10:41:53 +00:00
wiz 81e8a3b48e Teach dk(4) about ZFS.
"looks ok" mlelstv
2020-03-30 08:36:09 +00:00
gutteridge b849d2c572 rfilter.2: fix a typo
Reported by Andrius V in PR kern/54889.
2020-03-22 23:24:08 +00:00
khorben 9e6960f916 Forbid command line parameters when parsing configuration files
This behaviour was ambiguous at best.
While there, also correct the usage screen, and the corresponding manual
page.
2020-03-22 07:45:02 +00:00
roy ae92cb1896 route: Enable receive error reporting on the routing socket 2020-03-14 22:26:39 +00:00
wiz 14df4e9b76 New sentence, new line. Bump date for previous. 2020-02-24 11:59:33 +00:00
mlelstv c445faa062 Add one-shot mode. 2020-02-24 11:45:30 +00:00
riastradh 2d468aafe8 Fix userland references to LFS_ORPHAN_NEXTFREE.
Forgot to grep for these or do a full distribution build, oops!
2020-02-23 15:11:33 +00:00
wiz 74532f1d21 Fix date. 2020-02-23 00:14:31 +00:00
pgoyette 9a34b1cfc9 Clarify that the -k option only provides the address of the module's
text segment.  The addresses of any other segments are not available.
2020-02-22 14:26:18 +00:00
kamil b110dc906e Avoid unportable shift construct
boot.c:150:29, left shift of 255 by 24 places cannot be represented in type 'int'
boot.c:153:29, left shift of 255 by 24 places cannot be represented in type 'int'
2020-02-22 09:59:22 +00:00
kamil 7cd593c092 Avoid undefined behavior
route.c:1523:20, left shift of 1073741824 by 1 places cannot be represented
in type 'int'
2020-02-22 00:42:15 +00:00
leot f006c3623b Fix a thinko
Reported by qjsgkem via #netbsd-code, thanks!
2020-02-12 09:43:19 +00:00
kamil 5f94716bd4 Stop including unused header <sys/poll.h> 2020-02-06 19:20:21 +00:00