Re: httpd(8): don't send HSTS headers over unencrypted connections

2018-10-14 Thread Florian Obser
OK florian@ On Mon, Oct 15, 2018 at 12:38:56AM -0600, Anthony J. Bentley wrote: > Florian Obser writes: > > On Sun, Oct 14, 2018 at 07:36:18PM -0600, Anthony J. Bentley wrote: > > > Hi, > > > > > > RFC 6797 says: > > > > > >An HSTS Host MUST NOT include the STS header field in HTTP responses

Re: httpd(8): don't send HSTS headers over unencrypted connections

2018-10-14 Thread Anthony J. Bentley
Florian Obser writes: > On Sun, Oct 14, 2018 at 07:36:18PM -0600, Anthony J. Bentley wrote: > > Hi, > > > > RFC 6797 says: > > > >An HSTS Host MUST NOT include the STS header field in HTTP responses > >conveyed over non-secure transport. > > > > Is this the correct check? With this I get

Re: pkg_add -Dsnap not fetching any updates and packages on -current

2018-10-14 Thread Sebastian Benoit
Neeraj Pal(neerajpa...@gmail.com) on 2018.10.15 10:36:16 +0530: > Hi there, > > Yesterday I installed OpenBSD 6.3-stable then upgraded it to OpenBSD > -current by downloading and copying bsd.rd file into / > Then, after that, I am trying to update the userland but it is > throwing an error but it

Re: httpd(8): don't send HSTS headers over unencrypted connections

2018-10-14 Thread Florian Obser
On Mon, Oct 15, 2018 at 07:33:52AM +0200, Bruno Flueckiger wrote: > On 14.10.18 19:36, Anthony J. Bentley wrote: > > Hi, > > > > RFC 6797 says: > > > >An HSTS Host MUST NOT include the STS header field in HTTP responses > >conveyed over non-secure transport. > > > > Is this the correct c

Re: httpd(8): don't send HSTS headers over unencrypted connections

2018-10-14 Thread Florian Obser
On Sun, Oct 14, 2018 at 07:36:18PM -0600, Anthony J. Bentley wrote: > Hi, > > RFC 6797 says: > >An HSTS Host MUST NOT include the STS header field in HTTP responses >conveyed over non-secure transport. > > Is this the correct check? With this I get what I expect: HSTS headers please use

Re: httpd(8): don't send HSTS headers over unencrypted connections

2018-10-14 Thread Anthony J. Bentley
Bruno Flueckiger writes: > If you don't want to send HSTS headers then don't set the option hsts in > httpd.conf(5). Why would you provide an option for the admin to choose > but restrict it to only encrypted connections? Because it's possible to specify both "listen on * tls port 443" and "liste

Re: httpd(8): don't send HSTS headers over unencrypted connections

2018-10-14 Thread Bruno Flueckiger
On 14.10.18 19:36, Anthony J. Bentley wrote: > Hi, > > RFC 6797 says: > >An HSTS Host MUST NOT include the STS header field in HTTP responses >conveyed over non-secure transport. > > Is this the correct check? With this I get what I expect: HSTS headers > over TLS, and no HSTS headers ov

pkg_add -Dsnap not fetching any updates and packages on -current

2018-10-14 Thread Neeraj Pal
Hi there, Yesterday I installed OpenBSD 6.3-stable then upgraded it to OpenBSD -current by downloading and copying bsd.rd file into / Then, after that, I am trying to update the userland but it is throwing an error but it was working fine previously like one or two days before because I have done

Re: user mod -u lead to segfault

2018-10-14 Thread Todd C. Miller
On Sat, 13 Oct 2018 21:16:10 -0600, "Todd C. Miller" wrote: > I think it is safest to use user_from_uid, uid_from_user, group_from_gid > and gid_from_group in all places where the return value of getpw* > and getgr* is unused. Updated diff that adds wrapper functions for improved readability. It'

httpd(8): don't send HSTS headers over unencrypted connections

2018-10-14 Thread Anthony J. Bentley
Hi, RFC 6797 says: An HSTS Host MUST NOT include the STS header field in HTTP responses conveyed over non-secure transport. Is this the correct check? With this I get what I expect: HSTS headers over TLS, and no HSTS headers over unencrypted HTTP. Index: server_fcgi.c

spf walk: lookup aaaa records with "a" mechanism

2018-10-14 Thread Tim Kuijsten
Hi, When the "a" designated sender mechanism is used in an spf txt record, both v4 and v6 addresses are matched according to [1], so let `smtpctl spf walk` resolve both A and records. Current output: $ echo netsend.nl | smtpctl spf walk 80.127.135.115 80.127.98.234 Expected output: $ ec

Re: vmd losing VMs

2018-10-14 Thread Greg Steuck
Now that I'm running OpenBSD 6.4 (GENERIC.MP) #362: Thu Oct 11 04:53:41 MDT 2018, I can start debugging again. I just observed an interesting tidbit which I failed to notice before. Namely, there are also hanging vmctl processes trying to stop those spinning VMs. So, I tried to reproduce this mysel

Re: ping: fix ID comments

2018-10-14 Thread Sebastian Benoit
Klemens Nanni(k...@openbsd.org) on 2018.10.14 21:23:30 +0200: > These were left behind in > > revision 1.225 > date: 2018/04/11 16:03:58; author: zhuk; state: Exp; lines: +4 -4; > commitid: 3LTLgJehHSWyW63G; > Two fixes in ping: > > 1. Stop telling our PID to th

ping: fix ID comments

2018-10-14 Thread Klemens Nanni
These were left behind in revision 1.225 date: 2018/04/11 16:03:58; author: zhuk; state: Exp; lines: +4 -4; commitid: 3LTLgJehHSWyW63G; Two fixes in ping: 1. Stop telling our PID to the world: the ident values could overlap anyway since PID

Re: gre(4): handle IPv6 traffic class like IPv4 tos

2018-10-14 Thread Sebastian Benoit
David Gwynne(da...@gwynne.id.au) on 2018.10.14 07:59:21 +1000: > pretty straightforward... > > ok? ok > Index: if_gre.c > === > RCS file: /cvs/src/sys/net/if_gre.c,v > retrieving revision 1.124 > diff -u -p -r1.124 if_gre.c > --- i

Re: unneeded ai_addrlen size checks

2018-10-14 Thread Klemens Nanni
On Sun, Oct 14, 2018 at 11:00:38AM +0200, Florian Obser wrote: > I went through the tree and found these uneeded checks. > They are unneeded because either: > > - we are asking getaddrinfo for a specific AF and shove the result > into the right sized sockaddr_in{,6} > - we are asking for AF_UNSP

Re: 802.1q with 0 tag

2018-10-14 Thread Tom Smyth
Hello Rivo, Im not sure what benefit if any this would be, I have seen both tagged and untagged frames on ports in"general" mode would it not be better to have the priority set on the DSCP / TOS ie determining the priority against a field that you know exists...as opposed as opposed to making pri

unneeded ai_addrlen size checks

2018-10-14 Thread Florian Obser
I went through the tree and found these uneeded checks. They are unneeded because either: - we are asking getaddrinfo for a specific AF and shove the result into the right sized sockaddr_in{,6} - we are asking for AF_UNSPEC and switch on the returned ai_family - we stuff the result into sockaddr

Re: ping: sockaddr size check

2018-10-14 Thread Florian Obser
On Sat, Oct 13, 2018 at 08:29:34PM +0200, Klemens Nanni wrote: > After calling getaddrinfo(3) we check the size of the returned socket > address to match for AF-specific cases, but I fail to see how this is > even possible. > > `hints.ai_family' is set appropiately and `res->ai_family' is checked,