Commit Graph

7073 Commits

Author SHA1 Message Date
wiz
c6cc6b9db4 Use Nm. 2020-06-23 14:08:01 +00:00
nia
44bd074d70 cgdconfig.8: remove references to using cgd for swap
this is potentially misleading now that the kernel does swap encryption
2020-06-23 13:23:56 +00:00
nia
4e9ba6e816 cgdconfig.8: Reflect actual behaviour of /dev/(u)random 2020-06-23 13:20:14 +00:00
msaitoh
9007cd7213 s/successfuly/successfully/ in comment. No functional change. 2020-06-22 07:50:53 +00:00
wiz
634f9eb189 The ACL flag is -p, not -n. 2020-06-18 19:32:56 +00:00
kamil
aa97815be0 Include explicitly <rump/rump_syscallshotgun.h> for previous indirect users
via <rump/rump.h>.
2020-06-17 00:16:21 +00:00
thorpej
aae463daac Update for proplib(3) API changes. 2020-06-11 13:49:57 +00:00
thorpej
759cf71618 When we add "entries", "index", and "sector_size" values to the dictionary,
add them as signed valaues, rather than unsigned (which is how we keep them
in memory).  This causes them be serialized in base-10 (rather than base-16,
which is the default for unsigned).  This behavior is documented in
prop_number(3).  Fixes t_gpt::backup_2part unit test.
2020-06-08 22:52:09 +00:00
wiz
99aaf50145 Sort option descriptions. 2020-06-07 19:35:15 +00:00
thorpej
abcb66ec85 Update for proplib(3) API changes. 2020-06-07 05:54:00 +00:00
thorpej
d147ce2226 Update for proplib(3) API changes. 2020-06-07 05:42:25 +00:00
thorpej
aebbed3d12 Update for proplib(3) API changes. 2020-06-06 22:33:23 +00:00
uwe
22cb993c0d Make -f description actually use the word "force" so that it can be
found when searched for.
2020-06-01 03:18:36 +00:00
wiz
0fa531d9a4 Add -g to usage. 2020-05-24 21:02:12 +00:00
wiz
11e3f06a51 Use Nx, fix formatting nit. 2020-05-24 21:01:49 +00:00
wiz
6f392fa3a0 Fix typo in macro. Sort option descriptions. 2020-05-24 20:59:16 +00:00
jmcneill
f907c64a8f Add -g flag to preserve GPT headers when updating MBR. 2020-05-24 18:42:48 +00:00
jmcneill
e5906ade5e Add -H flag to ignore existing MBR (Hybrid MBR/GPT mode). 2020-05-24 18:42:20 +00:00
jmcneill
084befafcb Exit gracefully when auto-expanding a partition and it is already the
correct size. Add a -q flag to "resize" and "resizedisk" commands to skip
printing warnings in the already resize paths.
2020-05-24 14:42:44 +00:00
jmcneill
2cf653d8b7 Use getfsspecname and getrawdiskname so we can resize by NAME= label. 2020-05-24 14:41:26 +00:00
christos
9aa2a9c323 Add ACL support for FFS. From FreeBSD. 2020-05-16 18:31:45 +00:00
msaitoh
8012ca3f0e Remove extra semicolon. 2020-05-14 08:34:17 +00:00
khorben
2478cc98bc Fix and improve parsing of configuration files
XXX pull-up to netbsd-9
2020-05-13 21:44:30 +00:00
simonb
da20e95aa9 Whitespace alignment nits. 2020-05-12 09:48:44 +00:00
riastradh
3fb2c51c3c Trigger entropy consolidation before saving seed.
This way, whenever /etc/security runs infrequently (daily), or the
operator manually issues rndctl -S, we ensure that all samples taken
during the entire boot are hashed together in the seed for the next
boot.

This should be infrequent enough that it's unlikely to enable the
iterative-guessing attacks that we try to mitigate by not frequently
consolidating entropy.
2020-05-07 19:13:38 +00:00
riastradh
c2a3429284 Rework rndctl seed load sequence again.
Go back to the book's order, now that writing to /dev/random
guarantees to consolidate entropy -- this way the _next_ boot is no
less secure than the current boot, in the event that entropy sources
like interrupt timings provided any security that we just don't know
how to measure honestly.

Make sure to open the old seed to overwrite and the new seed to write
anew first so that we can determine whether the medium is read-only
before accepting the file's entropy estimate.
2020-05-07 19:12:45 +00:00
riastradh
97603a72a0 Touch up rndctl(8) a bit. 2020-05-07 19:09:26 +00:00
wiz
fecac516fe Add -i to SYNOPSIS. 2020-05-07 12:58:09 +00:00
riastradh
1e65f60a58 Tweak logic to decide whether a medium is safe for an rndseed.
- Teach rndctl to load the seed, but treat it as zero entropy, if the
  medium is read-only or if the update fails.

- Teach rndctl to accept `-i' flag instructing it to ignore the
  entropy estimate in the seed.

- Teach /etc/rc.d/random_seed to:
  (a) assume nonlocal file systems are unsafe, and use -i, but
  (b) assume / is safe, even if it is nonlocal.
  If the medium is nonwritable, leave it to rndctl to detect that.
  (Could use statvfs and check for ST_LOCAL in rndctl, I guess, but I
  already implemented it this way.)

Treating nonlocal / as safe is a compromise: it's up to the operator
to secure the network for (e.g.) nfs mounts, but that's true whether
we're talking entropy or not -- if the adversary has access to the
network that you've mounted / from, they can do a lot more damage
anyway; this reduces warning fatigue for diskless systems, e.g. test
racks.
2020-05-06 18:49:26 +00:00
riastradh
1154c4b65f Sort includes. 2020-04-30 03:27:15 +00:00
riastradh
825d46aec4 Accept both byte orders for random seed in `rndctl -L'.
The file format was defined with a machine-dependent 32-bit integer
field (the estimated number of bits of entropy in the process that
generated it).  Take whichever byte order gives a number that is
reasonable, i.e. lower than the number of bits in the buffer.

Continue to have `rndctl -S' generate it in machine-dependent byte
order for now, so that if you roll back to an older rndctl(8) then
`rndctl -L' on the same machine will still be able to load it with
the right entropy estimate.  In a future revision, perhaps we can
change it to be little-endian.
2020-04-30 03:24:48 +00:00
gson
d609938dfa Remove references to "special", as mount_qemufwcfg(8) does not
actually take such an argument.  Discussed with jmcneill.
2020-04-29 09:54:43 +00:00
christos
4efd5405d6 make umount NAME= work 2020-04-23 04:21:13 +00:00
christos
7df60872d5 Enable the code to clean the extattr blocks 2020-04-19 19:37:06 +00:00
sevan
ad16dbb6f1 grammar 2020-04-18 22:02:11 +00:00
jdolecek
1ef16aec19 add NO_IOBUF_ALIGNED to not pull aligned_alloc() for really constrained
boot media
2020-04-18 12:54:38 +00:00
jdolecek
93217591a2 align buffers used for I/O to DEV_BSIZE so it's executed more optimally
when run for xbd(4) raw (character) device
2020-04-17 09:42:27 +00:00
jdolecek
4a168442c5 align buffers used for I/O to DEV_BSIZE so it's executed more optimally
when run for xbd(4) device
2020-04-17 09:33:37 +00:00
jdolecek
171fa94db7 adjust to work with updated dkwedge_bsdlabel.c - provide geteblk() and
brelse() which just allocate/free the memory
2020-04-11 17:21:16 +00:00
plunky
7ea6ef2b6d trim extraneous return statement 2020-04-10 14:32:50 +00:00
christos
9655c24691 Refresh the superblock in memory if changing a mounted partition. 2020-04-09 14:44:38 +00:00
martin
b187e11174 Sync "common" declarations with ifdefs in header. 2020-04-06 09:54:24 +00:00
mrg
d26fa7dbd1 dion't define endian as well as try to declare it as a variable. 2020-04-06 06:41:34 +00:00
joerg
6ce4f404a1 Fix depenency on common symbols in sbin. 2020-04-05 15:25:39 +00:00
joerg
a74e29fe24 Avoid common symbols for fsck_lfs. 2020-04-03 19:36:32 +00:00
maxv
6fa9cf7eed Avoid overflows when reading strings. 2020-04-03 19:09:43 +00:00
joerg
a69687b194 Just declare driver and buf 2020-04-03 18:39:15 +00:00
martin
af2ed9cf6e Make route and netstat share the same struct progops (and initialization
code)
2020-04-03 16:20:51 +00:00
christos
a17e9ce771 Add a prog_setsockopt (thanks kre@) 2020-04-02 18:32:31 +00:00
martin
29b6fd854b Now that we use the same UUID for ZFS as FreeBSD, drop the FreeBSD marker
from the description.
2020-03-30 10:41:53 +00:00