archive-org.com » ORG » N » NETBSD.ORG

Total: 1243

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • how to contribute to the netbsd documentation
    Edit Comment Source History New RecentChanges NetBSD Wiki tutorials how to contribute to the netbsd documentation Introduction to NetBSD s documentation htdocs NetBSD s website and online documentation infrastructure The htdocs infrastructure is based on XML DocBook DocBook Pros Cons Pros Separation of content from layout Semantic markup Easily convertable to other formats online as well as printed media Well defined widely used and standards compliant document format and toolchain

    Original URL path: http://wiki.netbsd.org/tutorials/how_to_contribute_to_the_netbsd_documentation/ (2016-02-01)
    Open archived version from archive


  • how to create an L2TP ipsec tunnel between an Android or iPhone or iOS device to NetBSD
    npfctl reload tmp npf conf to reload the rules The npf file I am using is in usr share examples npf l2tp gw npf conf To debug problems you can use tcpdump on the external internal ppp interfaces and npflog device Sample messages output This is aggressive mode OS X the iPhone iOS uses main mode racoon INFO respond new phase 1 negotiation 1 2 3 4 500 5 6 7 8 500 racoon INFO begin Aggressive mode racoon INFO received broken Microsoft ID FRAGMENTATION racoon INFO received Vendor ID RFC 3947 racoon INFO received Vendor ID draft ietf ipsec nat t ike 07 racoon INFO received Vendor ID draft ietf ipsec nat t ike 06 racoon INFO received Vendor ID draft ietf ipsec nat t ike 05 racoon INFO received Vendor ID draft ietf ipsec nat t ike 04 racoon INFO received Vendor ID draft ietf ipsec nat t ike 03 racoon INFO received Vendor ID draft ietf ipsec nat t ike 02 racoon INFO received Vendor ID draft ietf ipsec nat t ike 02 racoon INFO received Vendor ID DPD racoon 5 6 7 8 INFO Selected NAT T version RFC 3947 racoon INFO Adding remote and local NAT D payloads racoon 5 6 7 8 INFO Hashing 5 6 7 8 500 with algo 2 racoon 1 2 3 4 INFO Hashing 1 2 3 4 500 with algo 2 racoon INFO NAT T ports changed to 5 6 7 8 4500 1 2 3 4 4500 racoon 1 2 3 4 INFO Hashing 1 2 3 4 4500 with algo 2 racoon INFO NAT D payload 0 verified racoon 5 6 7 8 INFO Hashing 5 6 7 8 4500 with algo 2 racoon INFO NAT D payload 1 doesn t match racoon INFO NAT detected PEER racoon INFO ISAKMP SA established 1 2 3 4 4500 5 6 7 8 4500 spi 4f47a16084102305 a47415e957a56da4 racoon 5 6 7 8 INFO received INITIAL CONTACT racoon INFO purging spi 249311193 racoon INFO respond new phase 2 negotiation 1 2 3 4 4500 5 6 7 8 4500 racoon INFO Update the generated policy 192 168 1 103 32 55576 1 2 3 4 32 1701 proto udp dir in racoon INFO Adjusting my encmode UDP Transport Transport racoon INFO Adjusting peer s encmode UDP Transport 4 Transport 2 racoon INFO IPsec SA established ESP Transport 1 2 3 4 500 5 6 7 8 500 spi 258257246 0xf64b15e racoon INFO IPsec SA established ESP Transport 1 2 3 4 500 5 6 7 8 500 spi 236082834 0xe125692 xl2tpd 454 Connection established to 5 6 7 8 55576 Local 34593 Remote 6 ref 0 0 LNS session is default xl2tpd 454 set queue size for dev pts 0 to 32768 xl2tpd 454 Call established with 5 6 7 8 Local 12914 Remote 28785 Serial 1 pppd 26068 pppd 2 4 4 started by root uid 0 pppd 26068 set up tty Changed queue size of 12 from

    Original URL path: http://wiki.netbsd.org/tutorials/how_to_create_an_l2tp_ipsec_tunnel_between_an_android_or_iphone_or_ios_device_to_netbsd/ (2016-02-01)
    Open archived version from archive

  • how to create bootable netbsd image
    ramdisk big make TOOLDIR usr tools Custom ramdisk If you want to customize the contents of the filesystem customize the list file Let s say for example that we need the basics uname utility to be included in the ramdisk which is not by default cd usr src build sh O obj T tools u tools cd usr src etc make MAKEDEV cd usr src distrib i386 ramdisks ramdisk big cp list list old Then we edit the list file by adding the following line PROG bin uname And after having done it make TOOLDIR usr tools Either way you will get something like this create ramdisk big ramdisk big fs Calculated size of ramdisk big fs tmp 5120000 bytes 65 inodes Extent size set to 4096 ramdisk big fs tmp 4 9MB 10000 sectors block size 4096 fragment size 512 using 1 cylinder groups of 4 88MB 1250 blks 96 inodes super block backups for fsck b at 32 Populating ramdisk big fs tmp Image ramdisk big fs tmp complete And verify with ls lh ramdisk big fs rwxr xr x 1 root wheel 4 9M Jun 19 08 33 ramdisk big fs Build the kernel Next we shall build our custom kernel with ramdisk support We may choose any INSTALL kernel configuration Here we will use INSTALL TINY cd usr src sys arch i386 conf cp INSTALL TINY MY INSTALL TINY Then we edit MY INSTALL TINY file and we go to the section Enable the hooks used for initializing the root memory disk options MEMORY DISK HOOKS options MEMORY DISK IS ROOT force root on memory disk options MEMORY DISK SERVER 0 no userspace memory disk support options MEMORY DISK ROOT SIZE 3100 size of memory disk in blocks The size of MEMORY DISK ROOT SIZE must be equal or bigger than the size of your image To calculate the kernel value you can use following rule MEMORY DISK ROOT SIZE 10000 would give 10000 512 1024 5000 kb We check that the following lines are un commented pseudo device md 1 memory disk device ramdisk file system MFS memory file system Once we are done with the configuration file we proceed with building our kernel cd usr src build sh O obj T tools u kernel MY INSTALL TINY Insert ramdisk to kernel Having built our kernel we may now insert the ramdisk to the kernel itself cd usr src distrib i386 instkernel cp Makefile Makefile old Then we edit the Makefile to make sure that the RAMDISKS and MDSETTARGETS variables are set properly After the modifications mine looks like this NetBSD how to create bootable netbsd image mdwn v 1 3 2014 04 03 03 27 42 wiki Exp include bsd own mk include NETBSDSRCDIR distrib common Makefile distrib create RAMDISK variables RAMDISKS RAMDISK B ramdisk big for V F in RAMDISKS V DIR cd CURDIR ramdisks F PRINTOBJDIR V V DIR F fs endfor MDSETTARGETS MY INSTALL TINY RAMDISK B MDSET RELEASEDIR binary kernel

    Original URL path: http://wiki.netbsd.org/tutorials/how_to_create_bootable_netbsd_image/ (2016-02-01)
    Open archived version from archive

  • how to customize keyboard mappings in x
    keyboard or mouse under X It links commands to keys or mouse buttons cd usr pkgsrc x11 xbindkeys make install clean Create a default file xbindkeys defaults HOME xbindkeysrc Grab a key code xbindkeys k or xbindkeys mk for multi keys respectively Examples xbindkeysrc control shift d starts an xterm it s a comment xterm control shift q Menu key starts xbindkeys show xbindkeys show Menu Control mouse button 1 starts an xterm xterm Control b 1 Control Shift a release event starts rxvt rxvt release control shift a Control mouse button 2 release event starts rxvt rxvt Control b 2 Release xmodmap X utility for modifying keymaps and pointer button mappings Call it from xinitrc or xsession depending on whether you use startx or the X display manager like xmodmap xmodmaprc German umlauts with en US keyboards I use the right Alt vowel key combination For that add the following to your xmodmaprc Alt R aAeEoOuUs für Umlaute auf US Tastaturen clear mod1 add mod1 Alt L add mod3 Alt R keysym Alt R Mode switch keysym u u U udiaeresis Udiaeresis keysym a a A adiaeresis Adiaeresis keysym o o O odiaeresis Odiaeresis keysym s s S ssharp

    Original URL path: http://wiki.netbsd.org/tutorials/how_to_customize_keyboard_mappings_in_x/ (2016-02-01)
    Open archived version from archive

  • how to determine the scheduler
    Security Community Blogs Mailing lists List archives Developers Browse source Cross reference Release engineering Projects list Ports History Emulators Packages Browse packages Release engineering Wiki Home Edit Comment Source History New RecentChanges NetBSD Wiki tutorials how to determine the scheduler If you would like to know what type of scheduler you are currently using type sysctl kern sched name kern sched name M2 in this case I am using the

    Original URL path: http://wiki.netbsd.org/tutorials/how_to_determine_the_scheduler/ (2016-02-01)
    Open archived version from archive

  • how to enable and run dtrace
    kernel and user space See the DTrace Community Page for more information Also see DTrace Introduction Current status Supported platforms DTrace is a work in progress effort and it is for x86 systems and some arm boards i386 and amd64 evbarm BEAGLEBONE and SHEEVAPLUG Supported providers SDT Statically Defined Tracing FBT Function Boundary Tracing You can currently run a hello world DScript TODO for netbsd 7 Measure effect of options KDTRACE HOOKS on system performance Determine whether the profile module works and list it here Integrate riz s syscall provider patch TODO for netbsd 6 Need to identify changes to pull up to netbsd 6 and pull them up Candidates Profile provider How to use Building DTrace You need the following options in your kernel options INSECURE options KDTRACE HOOKS kernel DTrace hooks options MODULAR You also need to build distribution with the options MKDTRACE yes and MKCTF yes Running hello world Load the solaris and dtrace modules and the SDT Statically Defined Tracing and FBT Function Boundary Tracing modules modload solaris modload dtrace modload dtrace sdt modload dtrace fbt Make the dtrace device node cd dev sh MAKEDEV dtrace List the dtrace probes dtrace l ID PROVIDER MODULE FUNCTION NAME 1 dtrace BEGIN 2 dtrace END 3 dtrace ERROR 4 fbt netbsd AcpiAcquireGlobalLock entry 5 fbt netbsd AcpiAcquireGlobalLock return 6 fbt netbsd AcpiAllocateRootTable entry 7 fbt netbsd AcpiAttachData entry 29129 fbt solaris zfs vop getattr entry 29130 fbt solaris zfs vop getattr return 29131 proc create 29132 proc exec 29140 proc lwp start 29141 proc lwp exit Put the following into the file hello d BEGIN trace Hello world exit 0 Run the hello world script dtrace s hello d dtrace script hello d matched 1 probe CPU ID FUNCTION NAME 0 1 BEGIN Hello world A more complex

    Original URL path: http://wiki.netbsd.org/tutorials/how_to_enable_and_run_dtrace/ (2016-02-01)
    Open archived version from archive

  • how to encrypt iscsi devices
    Looking at the last line we can see that the initiator is running via the puffs device We now add a vnd device on top of the storage which the target is presenting vnconfig vnd0 mnt inspiron1300 wherever co uk target1 storage We now add a disklabel which is offset 63 blocks into the iSCSI device This is so that the encrypted device which we shall put on top of the vnd does not clash with the vnd s label You should set the cgd s type to cgd disklabel e vnd0 dev rvnd0d type vnd disk vnd label fictitious flags bytes sector 512 sectors track 32 tracks cylinder 64 sectors cylinder 2048 cylinders 50 total sectors 102400 rpm 3600 interleave 1 trackskew 0 cylinderskew 0 headswitch 0 microseconds track to track seek 0 microseconds drivedata 0 4 partitions size offset fstype fsize bsize cpg sgs a 102336 63 cgd 2048 16384 28360 Cyl 0 49 d 102400 0 unused 0 0 Cyl 0 49 We now set up the cgd device pointing it at the vnd device priv cgdconfig s cgd0 dev vnd0a aes cbc 128 dev urandom and then zero the cgd device s storage dd if dev zero of dev rcgd0d bs 32k dd dev rcgd0d Invalid argument 1601 0 records in 1600 0 records out 52428800 bytes transferred in 16 633 secs 3152095 bytes sec We now unconfigure the cgd device cgdconfig u cgd0 and then write using the disklabel verification method onto the cgd Sometimes this process does not always complete properly and so it has to be repeated cgdconfig g V disklabel o etc cgd vnd0a aes cbc 256 cgdconfig could not calibrate pkcs5 pbkdf2 cgdconfig Failed to generate defaults for keygen cgdconfig g V disklabel o etc cgd vnd0a aes cbc 256 Now we have to add the password to the cgd device cgdconfig V re enter cgd0 dev vnd0a dev vnd0a s passphrase re enter device s passphrase and disklabel inside the cgd itself disklabel I e cgd0 dev rcgd0d type cgd disk cgd label fictitious flags bytes sector 512 sectors track 2048 tracks cylinder 1 sectors cylinder 2048 cylinders 49 total sectors 102336 rpm 3600 interleave 1 trackskew 0 cylinderskew 0 headswitch 0 microseconds track to track seek 0 microseconds drivedata 0 4 partitions size offset fstype fsize bsize cpg sgs a 102336 0 4 2BSD 2048 16384 28360 Cyl 0 49 d 102336 0 unused 0 0 Cyl 0 49 Having placed a disklabel inside the cgd we can now make a filesystem on there newfs dev rcgd0a dev rcgd0a 50 0MB 102336 sectors block size 8192 fragment size 1024 using 4 cylinder groups of 12 49MB 1599 blks 3136 inodes super block backups for fsck ffs b at 32 25616 51200 76784 We can then mount the new file system in the cgd on the iscsi mount point df Filesystem 1K blocks Used Avail Cap Mounted on dev dk0 28101396 20910216 5786112 78 kernfs 1 1 0 100 kern

    Original URL path: http://wiki.netbsd.org/tutorials/how_to_encrypt_iscsi_devices/ (2016-02-01)
    Open archived version from archive

  • how to gather network information on netbsd
    but two or more networks with different addresses of this host Additional addresses referred as alias Note ifconfig rtk0 may also have content like this inet 192 168 17 1 netmask 255 255 255 254 In this example subnet defines the number of hosts within the network Use of the 255 255 255 254 subnet is limiting number of hosts up to 2 hosts Count starts from the address of the machine and continues up further ping Use the ping command to check plain network connections of other devices e g computers printers VoIP phones etc which is connected to your the network For example start from IP address of single computer to see if it is alive ping n 192 168 17 1 It returns 64 bytes from 192 168 17 1 icmp seq 0 ttl 255 time 0 049 ms 64 bytes from 192 168 17 1 icmp seq 1 ttl 255 time 0 051 ms 64 bytes from 192 168 17 1 icmp seq 2 ttl 255 time 0 050 ms Stop it by pressing CTRL C Please note that return replies to our ping request means that the host is up and running Also check the the response It may be come from a different IP address Subnet router or intermediary switch may bear special route or have altered address and answer calls on the middle of route nmap Install and use net nmap to see list of all hosts in your the network After installation of nmap just run nmap sP 192 168 17 1 254 or nmap sP 192 168 17 Asterisk and 1 254 means that nmap checks the whole 192 168 17 24 network nmap is a very powerful network tool Please use with care mygate etc mygate contains the IP address of your default gateway The address of such router may be written in etc mygate file like this 192 168 170 201 or you can use defaultroute 192 168 170 201 in your etc rc conf Some systems have route added into etc rc conf file or routing software installed like Zebra Quagga etc to deal with TCP BGP OSPF and other protocols In this case etc mygate file may be empty netstat The netstat command shows network status command symbolically displays the contents of various network related data To see network relating routing tables do netstat rn It returs somthing like this Internet Destination Gateway Flags Refs Use Mtu Interface default 192 168 170 201 UGS 1 34064 rtk0 loopback 8 localhost UGRS 0 0 33192 lo0 localhost localhost UH 1 6 33192 lo0 192 168 170 24 link 1 UC 6 0 rtk0 192 168 170 201 00 60 97 51 d1 d0 UHLc 2 7121 rtk0 192 168 170 216 00 00 21 2b d5 9b UHLc 0 71 lo0 192 168 170 255 link 1 UHLc 3 787 rtk0 This output means Your Network Interface Card NIC is here 192 168 170 216 00 00 21

    Original URL path: http://wiki.netbsd.org/tutorials/how_to_gather_network_information_on_netbsd/ (2016-02-01)
    Open archived version from archive