Error building ospf6d

2011-07-26 Thread Abel Abraham Camarillo Ojeda
Any ideas? # cd /usr/src && make SUDO=sudo build ... cc -O2 -pipe -Wall -I/usr/src/usr.sbin/ospf6d -Wstrict-prototypes -Wmissing-prototypes -Wmissing-declarations -Wshadow -Wpointer-arith -Wcast-qual -Wsign-compare -c parse.c /usr/src/usr.sbin/ospf6d/parse.y:649: error: expected '=', ',', ';'

Re: rdr-to ::1

2011-07-26 Thread Alexander Bluhm
On Fri, May 20, 2011 at 11:54:09AM +0200, Camiel Dobbelaar wrote: > I'll spend some more time on this, but maybe there's an IPv6 guru that > can lend a hand? :-) Just removing the check seems wrong to me. This would allow ::1 addresses from the wire. Also the goto hbhcheck would get lost. A so

Re: Creating route tables

2011-07-26 Thread Claudio Jeker
On Thu, Jul 21, 2011 at 10:20:38PM +0200, Claudio Jeker wrote: > On Thu, Jul 21, 2011 at 01:57:10PM -0500, Josh Hoppes wrote: > > Thanks for the help and for the better understanding of routing > > domains and tables. In the end I was over thinking the problem and > > didn't actually need the addit

Re: setrlimit code

2011-07-26 Thread Amit Kulkarni
>> > > remove that rlimit code, rc.d and login classes do it much betterer these >> > > days. screaming bob ok claudio >> > > >> > >> > Similar code is in a few other places, if it's going from bgpd it >> > should be zapped there too. Should we add login.conf sections for >> > bgpd, ftp-proxy, inet

Set In-Reply-To when responding in mail(1)

2011-07-26 Thread Henri Kemppainen
I felt hacking custom scripts to add the In-Reply-To header in a reply is a bad solution if there's no reason we can't just make mail do it automagically. So, here comes the diff. There are a few additional changes here: - Names starting with underscores are reserved, so I gave _respond and

Re: setrlimit code

2011-07-26 Thread Claudio Jeker
On Tue, Jul 26, 2011 at 01:35:43PM +0100, Stuart Henderson wrote: > On 2011/07/09 09:45, Claudio Jeker wrote: > > On Sat, Jul 09, 2011 at 06:51:04AM +0100, Stuart Henderson wrote: > > > On 2011/07/08 20:51, Henning Brauer wrote: > > > > CVSROOT:/cvs > > > > Module name:src > > > > Chang

Re: setrlimit code

2011-07-26 Thread Stuart Henderson
On 2011/07/09 09:45, Claudio Jeker wrote: > On Sat, Jul 09, 2011 at 06:51:04AM +0100, Stuart Henderson wrote: > > On 2011/07/08 20:51, Henning Brauer wrote: > > > CVSROOT: /cvs > > > Module name: src > > > Changes by: henn...@cvs.openbsd.org 2011/07/08 20:51:18 > > > > > > Modified fil

Align stack in crt0 on i386

2011-07-26 Thread Mark Kettenis
Diff below makes sure we properly align the stack for executing SSE instructions on i386 like we already do on amd64. Our GCC already generates code in main() to do this, but other compilers (including certain versions of GCC as pointed out to me by Jeorg Sonnenberger) might not. ok? Index: crt0

Re: OpenBSD dropping allowed packets - solved

2011-07-26 Thread Robert Wolf
On Tue, 26 Jul 2011, Robert Wolf wrote: > > Hallo all, > > I have one more question about other PF problem. I have installed OpenBSD in > fail-over configuration using carp for shared IPs and pfsync for state > synchronization to fail-over node. Now, we have big problems because openbsd > doe

Re: counting zero-length matches in sed(1)

2011-07-26 Thread Ingo Schwarze
In case you wonder which patch i'm talking about, here it is. Note this is not against -current, but against the backed-out version for brevity. Not fishing for OKs at this time, just FYI. Index: process.c === RCS file: /cvs/src/usr

OpenBSD dropping allowed packets

2011-07-26 Thread Robert Wolf
Hallo all, I have one more question about other PF problem. I have installed OpenBSD in fail-over configuration using carp for shared IPs and pfsync for state synchronization to fail-over node. Now, we have big problems because openbsd does not allow some packets immediately as they come but af

Multilevel anchors in PF? (fwd)

2011-07-26 Thread Robert Wolf
Hallo all, I have question for advanced PF users/admins. I wanted to create multi level anchors firewall (config created using fwbuilder, only important rules pasted): == /etc/firewall.conf == anchor "PolicyIn" in inet from any to any no state label "From main to PolicyIn" anc