08.12.2019 16:42, Alexandr Nedvedicky wrote:
Hello,
commit from today [1] makes IP stack more paranoid. Up to now OpenBSD
implemented so called 'weak host model' [2]. The today's commit alters
that for hosts, which don't forward packets (don't act as routers).
Your laptops, desktops and servers
On Sun, Dec 08, 2019 at 02:07:46AM -0800, Pratik Vyas wrote:
> Hi!
>
> This is an attempt to address 'thundering herd' problem when a lot of
> vms are configured in vm.conf. A lot of vms booting in parallel can
> overload the host and also mess up tsc calibration in openbsd guests as
> it uses PI
Hi,
when "split-horizon simple" is used, ripd might send out messges with 0
routes in it. This is because nentries is counted up even if the route
was not added to buf. Moving nentries++ up is fixing this.
Below log message is an indicator for this bug:
recv_response: bad packet size, interface v
Hi,
this fixes an error message to reflect the correct function name.
OK?
Remi
Index: message.c
===
RCS file: /cvs/src/usr.sbin/ripd/message.c,v
retrieving revision 1.12
diff -u -p -r1.12 message.c
--- message.c 25 Oct 2014 03:2
Hi,
iface is not used afterwards. I think it should have been removed
in revision 1.8.
OK?
Remi
Index: ripe.c
===
RCS file: /cvs/src/usr.sbin/ripd/ripe.c,v
retrieving revision 1.23
diff -u -p -r1.23 ripe.c
--- ripe.c 4 Nov 20
>I meant that as a privacy concern that some users might not be aware of.
What privacy concern?
You don't bring up privacy concerns with DNS lookup of pool.ntp.org.
Nor do you bring up the traffic to the IP addresses offered by
pool.ntp.org. That traffic has a pattern easily distinguished as
"s
I meant that as a privacy concern that some users might not be aware of.
As a way of solving that problem one could suggest and point a finger
explicitly on the default ntpd.conf.
Reasons ? A privacy concern that most users won't be aware of.
I might have understood you wrong, otto. Please corr
Hello,
commit from today [1] makes IP stack more paranoid. Up to now OpenBSD
implemented so called 'weak host model' [2]. The today's commit alters
that for hosts, which don't forward packets (don't act as routers).
Your laptops, desktops and servers now check packet destination address
with IP a
On Thu, Dec 05 2019, Martin Pieuchot wrote:
> Convert them to tsleep_nsec(9), ok?
Pretty mechanical, no regression spotted on my laptop or on my amd64 and
sparc64 builders. ok jca@
--
jca | PGP : 0x1524E7EE / 5135 92C1 AD36 5293 2BDF DDCC 0DFA 74AE 1524 E7EE
On Thu, Dec 05 2019, Martin Pieuchot wrote:
> Convert them to {m,t}sleep_nsec(9), ok?
Pretty mechanical, no regression spotted on my laptop or on my amd64 and
sparc64 builders. ok jca@
--
jca | PGP : 0x1524E7EE / 5135 92C1 AD36 5293 2BDF DDCC 0DFA 74AE 1524 E7EE
> On 8 Dec 2019, at 11:08, Pratik Vyas wrote:
>
> Hi!
>
> This is an attempt to address 'thundering herd' problem when a lot of
> vms are configured in vm.conf. A lot of vms booting in parallel can
> overload the host and also mess up tsc calibration in openbsd guests as
> it uses PIT which
Hi!
This is an attempt to address 'thundering herd' problem when a lot of
vms are configured in vm.conf. A lot of vms booting in parallel can
overload the host and also mess up tsc calibration in openbsd guests as
it uses PIT which doesn't fire reliably if the host is overloaded.
This diff mak
On Sat, Dec 07 2019, Jonathan Gray wrote:
> While we don't have C11's quick_exit() we do have timespec_get() and
> struct timespec/aligned_alloc().
LGTM, ok jca@
For other readers, no shared_libs bump is needed, this only affects
the headers.
> Index: include/__config
> ===
On Sun, Dec 08, 2019 at 11:15:55AM +0100, List wrote:
> Please excuse that I wasted your time. You're absolutely right.
>
> The only thing that comes to my mind is that one could add something
> like a small notice that tells the new user to maybe alter his ntpd
> constraints to a "TLS-Provider"
Please excuse that I wasted your time. You're absolutely right.
The only thing that comes to my mind is that one could add something
like a small notice that tells the new user to maybe alter his ntpd
constraints to a "TLS-Provider" that resides in his time zone.
A good place for that could be th
15 matches
Mail list logo