<feed xmlns='http://www.w3.org/2005/Atom'>
<title>wireguard-openbsd/libexec/spamlogd, branch jd/queueboosts</title>
<subtitle>WireGuard implementation for the OpenBSD kernel</subtitle>
<id>https://git.zx2c4.com/wireguard-openbsd/atom/libexec/spamlogd?h=jd%2Fqueueboosts</id>
<link rel='self' href='https://git.zx2c4.com/wireguard-openbsd/atom/libexec/spamlogd?h=jd%2Fqueueboosts'/>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/'/>
<updated>2019-07-25T17:32:33Z</updated>
<entry>
<title>Fix copy pasto, re-add missing goto in error path.</title>
<updated>2019-07-25T17:32:33Z</updated>
<author>
<name>brynet</name>
<email>brynet@openbsd.org</email>
</author>
<published>2019-07-25T17:32:33Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=49f581ec404d0f363e4fe168598b97b652566817'/>
<id>urn:sha1:49f581ec404d0f363e4fe168598b97b652566817</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Yet another workaround for crappy libpcap API design</title>
<updated>2019-07-25T14:53:21Z</updated>
<author>
<name>brynet</name>
<email>brynet@openbsd.org</email>
</author>
<published>2019-07-25T14:53:21Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=4053af6133ce1545a5e87acec29fae4cbe62e66a'/>
<id>urn:sha1:4053af6133ce1545a5e87acec29fae4cbe62e66a</id>
<content type='text'>
Add an internal version of pcap_open_live that ensures bpf(4) devices
are opened read-only before locking. Neither pflogd(8) or spamlogd(8)
require write access to bpf(4). Inspired by similar solution in
OpenBSD tcpdump(8).

pflogd(8) was safe since being unveiled last year, but spamlogd(8)
was having /dev/bpf opened O_RDWR.

Issue discovered by bluhm@'s unveil(2) accounting commit.

ok deraadt@, mestre@ (thanks for testing spamlogd!)
</content>
</entry>
<entry>
<title>When system calls indicate an error they return -1, not some arbitrary</title>
<updated>2019-06-28T13:32:41Z</updated>
<author>
<name>deraadt</name>
<email>deraadt@openbsd.org</email>
</author>
<published>2019-06-28T13:32:41Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=df69c215c7c66baf660f3f65414fd34796c96152'/>
<id>urn:sha1:df69c215c7c66baf660f3f65414fd34796c96152</id>
<content type='text'>
value &lt; 0.  errno is only updated in this case.  Change all (most?)
callers of syscalls to follow this better, and let's see if this strictness
helps us in the future.
</content>
</entry>
<entry>
<title>The only file that spamlogd(8) needs to access after calling pledge(2) is</title>
<updated>2018-10-25T06:41:50Z</updated>
<author>
<name>mestre</name>
<email>mestre@openbsd.org</email>
</author>
<published>2018-10-25T06:41:50Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=222d93a52f12801b4efd7108b4e889f694dd9c8f'/>
<id>urn:sha1:222d93a52f12801b4efd7108b4e889f694dd9c8f</id>
<content type='text'>
PATH_SPAMD_DB, so unveil(2) it with O_RDWR permissions.

OK millert@ beck@
</content>
</entry>
<entry>
<title>add missing ${LIBCRYPTO} to DPADD</title>
<updated>2018-06-28T02:23:27Z</updated>
<author>
<name>gsoares</name>
<email>gsoares@openbsd.org</email>
</author>
<published>2018-06-28T02:23:27Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=e88f0f1e5d17ee9b610eb62651aff392a239f2f6'/>
<id>urn:sha1:e88f0f1e5d17ee9b610eb62651aff392a239f2f6</id>
<content type='text'>
OK deraadt@ millert@ jca@
</content>
</entry>
<entry>
<title>- Check if user running spamlogd(8) has root privileges and if not then stop</title>
<updated>2016-03-16T14:47:04Z</updated>
<author>
<name>mestre</name>
<email>mestre@openbsd.org</email>
</author>
<published>2016-03-16T14:47:04Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=e7066a17a6f313030c2274ea3bfd53983590f392'/>
<id>urn:sha1:e7066a17a6f313030c2274ea3bfd53983590f392</id>
<content type='text'>
program early
- #define SPAMD_USER "_spamd" and use it on getpwnam(3) call
- Set usage() as __dead void
- Remove lint-style comments

OK beck@
</content>
</entry>
<entry>
<title>pledge spamlogd - again from  Ricardo Mestre &lt;serial@helheim.mooo.com&gt; - Thanks!</title>
<updated>2015-12-11T17:16:52Z</updated>
<author>
<name>beck</name>
<email>beck@openbsd.org</email>
</author>
<published>2015-12-11T17:16:52Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=f87e39af99a8d5349736df79bc9376379bc87e31'/>
<id>urn:sha1:f87e39af99a8d5349736df79bc9376379bc87e31</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Include &lt;netinet/in.h&gt; before &lt;net/pfvar.h&gt;.  In a future change when</title>
<updated>2015-01-21T21:50:32Z</updated>
<author>
<name>deraadt</name>
<email>deraadt@openbsd.org</email>
</author>
<published>2015-01-21T21:50:32Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=68928c43a99c1507757b46fa476c5482a4d9e547'/>
<id>urn:sha1:68928c43a99c1507757b46fa476c5482a4d9e547</id>
<content type='text'>
ports is ready, &lt;net/pfvar.h&gt; will stop including a pile of balony.
</content>
</entry>
<entry>
<title>Replace &lt;sys/param.h&gt; with &lt;limits.h&gt; and other less dirty headers where</title>
<updated>2015-01-16T06:39:28Z</updated>
<author>
<name>deraadt</name>
<email>deraadt@openbsd.org</email>
</author>
<published>2015-01-16T06:39:28Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=b9fc9a728fce9c4289b7e9a992665e28d5629a54'/>
<id>urn:sha1:b9fc9a728fce9c4289b7e9a992665e28d5629a54</id>
<content type='text'>
possible.  Annotate &lt;sys/param.h&gt; lines with their current reasons.  Switch
to PATH_MAX, NGROUPS_MAX, HOST_NAME_MAX+1, LOGIN_NAME_MAX, etc.  Change
MIN() and MAX() to local definitions of MINIMUM() and MAXIMUM() where
sensible to avoid pulling in the pollution.  These are the files confirmed
through binary verification.
ok guenther, millert, doug (helped with the verification protocol)
</content>
</entry>
<entry>
<title>Remove unnecessary netinet/in_systm.h include.</title>
<updated>2014-10-25T03:19:22Z</updated>
<author>
<name>lteo</name>
<email>lteo@openbsd.org</email>
</author>
<published>2014-10-25T03:19:22Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=5f665e96f554b29999e49f1ef88a1ef0a9dd3ccc'/>
<id>urn:sha1:5f665e96f554b29999e49f1ef88a1ef0a9dd3ccc</id>
<content type='text'>
ok millert@
</content>
</entry>
</feed>
