From owner-svn-doc-head@freebsd.org Mon Jan 7 02:51:30 2019 Return-Path: Delivered-To: svn-doc-head@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id CCD491482BB6; Mon, 7 Jan 2019 02:51:30 +0000 (UTC) (envelope-from ygy@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 726556D073; Mon, 7 Jan 2019 02:51:30 +0000 (UTC) (envelope-from ygy@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 676B6982B; Mon, 7 Jan 2019 02:51:30 +0000 (UTC) (envelope-from ygy@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id x072pUoZ087623; Mon, 7 Jan 2019 02:51:30 GMT (envelope-from ygy@FreeBSD.org) Received: (from ygy@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id x072pUeC087622; Mon, 7 Jan 2019 02:51:30 GMT (envelope-from ygy@FreeBSD.org) Message-Id: <201901070251.x072pUeC087622@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: ygy set sender to ygy@FreeBSD.org using -f From: Guangyuan Yang Date: Mon, 7 Jan 2019 02:51:30 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r52748 - head/en_US.ISO8859-1/htdocs X-SVN-Group: doc-head X-SVN-Commit-Author: ygy X-SVN-Commit-Paths: head/en_US.ISO8859-1/htdocs X-SVN-Commit-Revision: 52748 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: 726556D073 X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-2.93 / 15.00]; local_wl_from(0.00)[FreeBSD.org]; NEURAL_HAM_MEDIUM(-1.00)[-0.998,0]; NEURAL_HAM_SHORT(-0.93)[-0.934,0]; ASN(0.00)[asn:11403, ipnet:2610:1c1:1::/48, country:US]; NEURAL_HAM_LONG(-1.00)[-0.999,0] X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 07 Jan 2019 02:51:31 -0000 Author: ygy Date: Mon Jan 7 02:51:29 2019 New Revision: 52748 URL: https://svnweb.freebsd.org/changeset/doc/52748 Log: Update the mailing address of FreeBSD Foundation. Obtained from: https://www.freebsdfoundation.org/about/contact-us/ Modified: head/en_US.ISO8859-1/htdocs/about.xml Modified: head/en_US.ISO8859-1/htdocs/about.xml ============================================================================== --- head/en_US.ISO8859-1/htdocs/about.xml Fri Jan 4 19:34:30 2019 (r52747) +++ head/en_US.ISO8859-1/htdocs/about.xml Mon Jan 7 02:51:29 2019 (r52748) @@ -103,8 +103,7 @@ contact info@FreeBSDFoundation.org for more information or write to: The FreeBSD - Foundation, 600 South Airport Road, Building - A, Suite F1, Longmont, CO 80503 USA.

+ Foundation, 2222 14th Street, Boulder, CO 80302 USA.

From owner-svn-doc-head@freebsd.org Mon Jan 7 11:37:33 2019 Return-Path: Delivered-To: svn-doc-head@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 86F82148F45B; Mon, 7 Jan 2019 11:37:33 +0000 (UTC) (envelope-from ryusuke@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 1F7C487CF7; Mon, 7 Jan 2019 11:37:33 +0000 (UTC) (envelope-from ryusuke@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 06B6AF400; Mon, 7 Jan 2019 11:37:33 +0000 (UTC) (envelope-from ryusuke@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id x07BbWMJ062532; Mon, 7 Jan 2019 11:37:32 GMT (envelope-from ryusuke@FreeBSD.org) Received: (from ryusuke@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id x07BbWtp062531; Mon, 7 Jan 2019 11:37:32 GMT (envelope-from ryusuke@FreeBSD.org) Message-Id: <201901071137.x07BbWtp062531@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: ryusuke set sender to ryusuke@FreeBSD.org using -f From: Ryusuke SUZUKI Date: Mon, 7 Jan 2019 11:37:32 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r52749 - head/ja_JP.eucJP/htdocs X-SVN-Group: doc-head X-SVN-Commit-Author: ryusuke X-SVN-Commit-Paths: head/ja_JP.eucJP/htdocs X-SVN-Commit-Revision: 52749 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: 1F7C487CF7 X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-2.94 / 15.00]; local_wl_from(0.00)[FreeBSD.org]; NEURAL_HAM_MEDIUM(-1.00)[-0.997,0]; NEURAL_HAM_SHORT(-0.95)[-0.946,0]; NEURAL_HAM_LONG(-1.00)[-0.998,0]; ASN(0.00)[asn:11403, ipnet:2610:1c1:1::/48, country:US] X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 07 Jan 2019 11:37:33 -0000 Author: ryusuke Date: Mon Jan 7 11:37:32 2019 New Revision: 52749 URL: https://svnweb.freebsd.org/changeset/doc/52749 Log: - Merge the following from the English version: r51392 -> r52748 head/ja_JP.eucJP/htdocs/about.xml Modified: head/ja_JP.eucJP/htdocs/about.xml Modified: head/ja_JP.eucJP/htdocs/about.xml ============================================================================== --- head/ja_JP.eucJP/htdocs/about.xml Mon Jan 7 02:51:29 2019 (r52748) +++ head/ja_JP.eucJP/htdocs/about.xml Mon Jan 7 11:37:32 2019 (r52749) @@ -4,7 +4,7 @@ ]> - + @@ -104,8 +104,7 @@ ¾ÜºÙ¤Ë´Ø¤·¤Æ¤Ï info@FreeBSDFoundation.org ¤Ë¥á¡¼¥ë¤òÁ÷¤ë¤«¡¢The FreeBSD - Foundation, 600 South Airport Road, Building - A, Suite F1, Longmont, CO 80503 USA + Foundation, 2222 14th Street, Boulder, CO 80302 USA ¤Þ¤Ç¼ê»æ¤ò¤ªÁ÷¤ê¤¯¤À¤µ¤¤¡£

From owner-svn-doc-head@freebsd.org Mon Jan 7 12:43:06 2019 Return-Path: Delivered-To: svn-doc-head@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 3835D1491CB3; Mon, 7 Jan 2019 12:43:06 +0000 (UTC) (envelope-from mfechner@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id CDC588ACB6; Mon, 7 Jan 2019 12:43:05 +0000 (UTC) (envelope-from mfechner@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id C1F44FFEB; Mon, 7 Jan 2019 12:43:05 +0000 (UTC) (envelope-from mfechner@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id x07Ch5Jf097891; Mon, 7 Jan 2019 12:43:05 GMT (envelope-from mfechner@FreeBSD.org) Received: (from mfechner@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id x07Ch577097890; Mon, 7 Jan 2019 12:43:05 GMT (envelope-from mfechner@FreeBSD.org) Message-Id: <201901071243.x07Ch577097890@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: mfechner set sender to mfechner@FreeBSD.org using -f From: Matthias Fechner Date: Mon, 7 Jan 2019 12:43:05 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r52750 - head/share/pgpkeys X-SVN-Group: doc-head X-SVN-Commit-Author: mfechner X-SVN-Commit-Paths: head/share/pgpkeys X-SVN-Commit-Revision: 52750 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: CDC588ACB6 X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-2.94 / 15.00]; local_wl_from(0.00)[FreeBSD.org]; NEURAL_HAM_MEDIUM(-1.00)[-0.997,0]; NEURAL_HAM_LONG(-1.00)[-0.998,0]; NEURAL_HAM_SHORT(-0.94)[-0.941,0]; ASN(0.00)[asn:11403, ipnet:2610:1c1:1::/48, country:US] X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 07 Jan 2019 12:43:06 -0000 Author: mfechner (ports committer) Date: Mon Jan 7 12:43:05 2019 New Revision: 52750 URL: https://svnweb.freebsd.org/changeset/doc/52750 Log: Added my FreeBSD email address to my key. Modified: head/share/pgpkeys/mfechner.key Modified: head/share/pgpkeys/mfechner.key ============================================================================== --- head/share/pgpkeys/mfechner.key Mon Jan 7 11:37:32 2019 (r52749) +++ head/share/pgpkeys/mfechner.key Mon Jan 7 12:43:05 2019 (r52750) @@ -8,6 +8,7 @@ pub rsa4096/B68B75DC9FD747E1 2018-03-04 [SC] [expire uid Matthias Fechner uid Matthias Fechner uid Matthias Fechner +uid Matthias Fechner sub rsa4096/640EB84EEFCCE295 2018-03-04 [E] [expires: 2023-03-03] ]]> @@ -71,30 +72,43 @@ IpMswXZjVswJhoo+rl9MvI2HvFNftdmvDwgfZyDUBYdQdmjSq4R4zr TaKjriaE9mystUCVEnEv+8n4/AM352R9Nf6QZKV3m0nXnunze/JBikZKCKehcxcD +rpD2A+/iF0EEBEKAB0WIQTfF4c1yg7xf8gsBTSRlL+pG3Vu9gUCWqIxIAAKCRCR lL+pG3Vu9vSqAJ9a0WNvvM+blgnRI1itXx8+EONCZwCfVHOZloba63oTIb4qWtU5 -gXxYIbC5Ag0EWpxrVgEQAN3uCLHZF+1VgcrzYjwL1wAJwjYb7UnHKvNYdaBKgW0n -0NTfaTCLHxHYPO8NlV1+lNctSeXLeiWpmE1lCDHq/++53EJ34OsRd/n246PdtfIf -ltML73tsmq6S9zTye2zv7LsmE7jgUBaasbv0qSLSybOUvkRxj3xBuK9Ymg/ZXaEN -OhxwIQ6oQoNLg3ers9t5Xl4NVK6gzzZ2OdTGnuUVhQmi4rbP04R0GJFhAtGLAYUC -xlXVZhdPAs4qZaoAEP5nW/u2MyzSaIouwcEIdttAiPZdrJr+a4OGKz88Sn6zqKSa -uyUADgX+G8tKUONgZbfz4SSRvlinOgyU2RyyfNS977r/YfaHH+oAxg31yUWPtD/r -yfVw69bGvK8RQrZ9+c1vyWBABoQOh5+JHW/AE9Xj5dQatEfWmGO3+/FRo2TIhqZQ -XXl8PW+jtEjkhgOHOUX5ERzSm6nCcPIw+LUkEINcLc9bw4fv1eOWIdBuCckGM4rW -XkLYbqhdSzdWeCsC0tiQk8x7O1zXRJOKF4rITJd/qX322EH29BR+T9V1Hw7LDSRe -+3YxtoXhROZRXjF8QniEHeKVNRUComr6rWGmuHjsNTQ7twtwnG8xSOfCkYAp9Grb -zBkIYX+VFvFQLqVM+It3RAlge/bwpZPvkr3bFsJk4JS+EAugBIrP0xd9BMOh6Ej5 -ABEBAAGJAjwEGAEKACYWIQRpYHriYKnzThg62q62i3Xcn9dH4QUCWpxrVgIbDAUJ -CWYBgAAKCRC2i3Xcn9dH4ZZsEACoQI109htphVe2AQhJ7wuPo8pIrSFA0Mb0pfib -X/sYw8ZZz/x3ctTI3Ajq2baSaoebIuUyd6oPI7cAzgL4s2zHiZ3ChH2dDxJlOPfk -OaiK124DJMPqWiWuxe39tgq23tsPhwcvF+DC+SkJoLWKCYNC06fS3bLktZ0s4lVE -5tqfL5wwMvxgxB+6+sWHwZWSv1IwB/geov6zkEhVdkXqrGPE52LyLfU0ACMmihcl -0/npsCMZSls0urgeCsPMuHPQnmcM2ERbere8i9OdKQDzGBrTbWl9DxNRf4o+cAYi -rEJM3Kc+ZD2SE34bTSvg3kdQQZQbj+o+BRcsR0LaGbORkNaMZlp5OuXteL6nG7sb -APn0bjUUlup8CJEXDXENG6LJG1/oVWFqm3OtPyr5UoMQAuhuGx0/Om6AXKr/mk+v -euoKWMXkqll045/bYE7bX2A0gkyGE5DdjaiHPmS9NsWuKDeExLlXZOL1GX+PKjWL -ADwlv07XHB8Hf6U0/lpf3/mggRtqHyKbHt0iRqYaMC95gVdMrbugxh61U/zxIawe -U7VolD5cRrltxqPp5szOwDzw42JYwbpYsXFJXNkuCGCmK1LHcShfEggtfV3g/JKz -vNRQn6p1f0frppl/eZ5UvWVKrNERJzcZgkOecxwiK/L/JoGpGfWOqWGsTxe/AnQc -Xxj8Dw== -=yEz2 +gXxYIbC0J01hdHRoaWFzIEZlY2huZXIgPG1mZWNobmVyQGZyZWVic2Qub3JnPokC +VAQTAQoAPhYhBGlgeuJgqfNOGDrarraLddyf10fhBQJcM0f8AhsDBQkJZgGABQsJ +CAcDBRUKCQgLBRYDAgEAAh4BAheAAAoJELaLddyf10fhbYQP/2ui+8XTAQcJK7Gf +xbmzmqF71Fu8J4EQO7IewQMwODpGD7VPeX8jbsAlgitUbPZwu8s5a4NlepnQ+Xlg +Yras6gXHk8xVTg+o/7OanLg4WMLx+C6RgPgviuyDNOWkLQDD2Q/n/MndyVW2v41j +cRNFKzHk1o46zlaoAz1K9gvOWqdMzFqDc3dG8qgZgGbzKSNhzRonaoMfhp3N5FJm +5LaHmUc/D2xD8+Nmx9pXHawznajLpmbKYWp58AIa9aaMYCmlNI/lmsqTAM5yGmgs +SKqTgQ4iBHRSP57zbvbaY0rfejBnY8UDsdc9rv8nFT5viWIi/8v/OQQqGDnkeN5Z +T5nKyYVw71NvKbyq3E3UjDXOi/+dYNlm3AnhmU0r6k7W1pj5zGnKutmuVCKahluS +WLtagvI23V/dtTo6KQ3I+ftg0kvQ1NF7zQN5T6/4wM0lSNxaWrb2YCB483ptJLcg +kwHrR61ZTtuwO3zzrgUaxptH9DG5frf4ho8QolX4M0gDUFXwEAoHjw8jSLBL97FU +osvnIYWFmLQfdQ/AfBikfi93q1QmjoeFsOWlm9drOwPioX8MaXFvEdoTN1dPxOah +z9PO0QxtvTKkd2c2O7GXg3bRikK7/xjEgRJgEvqNfxujmsU94dEtrevJVdtqp5su +56eEVL05IsiR7rupQryKqtCTJyuOuQINBFqca1YBEADd7gix2RftVYHK82I8C9cA +CcI2G+1JxyrzWHWgSoFtJ9DU32kwix8R2DzvDZVdfpTXLUnly3olqZhNZQgx6v/v +udxCd+DrEXf59uOj3bXyH5bTC+97bJqukvc08nts7+y7JhO44FAWmrG79Kki0smz +lL5EcY98QbivWJoP2V2hDToccCEOqEKDS4N3q7PbeV5eDVSuoM82djnUxp7lFYUJ +ouK2z9OEdBiRYQLRiwGFAsZV1WYXTwLOKmWqABD+Z1v7tjMs0miKLsHBCHbbQIj2 +Xaya/muDhis/PEp+s6ikmrslAA4F/hvLSlDjYGW38+Ekkb5YpzoMlNkcsnzUve+6 +/2H2hx/qAMYN9clFj7Q/68n1cOvWxryvEUK2ffnNb8lgQAaEDoefiR1vwBPV4+XU +GrRH1phjt/vxUaNkyIamUF15fD1vo7RI5IYDhzlF+REc0pupwnDyMPi1JBCDXC3P +W8OH79XjliHQbgnJBjOK1l5C2G6oXUs3VngrAtLYkJPMeztc10STiheKyEyXf6l9 +9thB9vQUfk/VdR8Oyw0kXvt2MbaF4UTmUV4xfEJ4hB3ilTUVAqJq+q1hprh47DU0 +O7cLcJxvMUjnwpGAKfRq28wZCGF/lRbxUC6lTPiLd0QJYHv28KWT75K92xbCZOCU +vhALoASKz9MXfQTDoehI+QARAQABiQI8BBgBCgAmFiEEaWB64mCp804YOtqutot1 +3J/XR+EFAlqca1YCGwwFCQlmAYAACgkQtot13J/XR+GWbBAAqECNdPYbaYVXtgEI +Se8Lj6PKSK0hQNDG9KX4m1/7GMPGWc/8d3LUyNwI6tm2kmqHmyLlMneqDyO3AM4C ++LNsx4mdwoR9nQ8SZTj35DmoitduAyTD6lolrsXt/bYKtt7bD4cHLxfgwvkpCaC1 +igmDQtOn0t2y5LWdLOJVRObany+cMDL8YMQfuvrFh8GVkr9SMAf4HqL+s5BIVXZF +6qxjxOdi8i31NAAjJooXJdP56bAjGUpbNLq4HgrDzLhz0J5nDNhEW3q3vIvTnSkA +8xga021pfQ8TUX+KPnAGIqxCTNynPmQ9khN+G00r4N5HUEGUG4/qPgUXLEdC2hmz +kZDWjGZaeTrl7Xi+pxu7GwD59G41FJbqfAiRFw1xDRuiyRtf6FVhaptzrT8q+VKD +EALobhsdPzpugFyq/5pPr3rqCljF5KpZdOOf22BO219gNIJMhhOQ3Y2ohz5kvTbF +rig3hMS5V2Ti9Rl/jyo1iwA8Jb9O1xwfB3+lNP5aX9/5oIEbah8imx7dIkamGjAv +eYFXTK27oMYetVP88SGsHlO1aJQ+XEa5bcaj6ebMzsA88ONiWMG6WLFxSVzZLghg +pitSx3EoXxIILX1d4PySs7zUUJ+qdX9H66aZf3meVL1lSqzRESc3GYJDnnMcIivy +/yaBqRn1jqlhrE8XvwJ0HF8Y/A8= +=oQ6U -----END PGP PUBLIC KEY BLOCK----- ]]> From owner-svn-doc-head@freebsd.org Tue Jan 8 07:57:25 2019 Return-Path: Delivered-To: svn-doc-head@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 9D40F14935D2; Tue, 8 Jan 2019 07:57:25 +0000 (UTC) (envelope-from ehaupt@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 3C6BB7445C; Tue, 8 Jan 2019 07:57:25 +0000 (UTC) (envelope-from ehaupt@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 0AEBD24A04; Tue, 8 Jan 2019 07:57:25 +0000 (UTC) (envelope-from ehaupt@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id x087vO7W004165; Tue, 8 Jan 2019 07:57:24 GMT (envelope-from ehaupt@FreeBSD.org) Received: (from ehaupt@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id x087vOIP004164; Tue, 8 Jan 2019 07:57:24 GMT (envelope-from ehaupt@FreeBSD.org) Message-Id: <201901080757.x087vOIP004164@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: ehaupt set sender to ehaupt@FreeBSD.org using -f From: Emanuel Haupt Date: Tue, 8 Jan 2019 07:57:24 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r52751 - head/share/pgpkeys X-SVN-Group: doc-head X-SVN-Commit-Author: ehaupt X-SVN-Commit-Paths: head/share/pgpkeys X-SVN-Commit-Revision: 52751 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: 3C6BB7445C X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-2.97 / 15.00]; local_wl_from(0.00)[FreeBSD.org]; NEURAL_HAM_MEDIUM(-1.00)[-0.998,0]; NEURAL_HAM_SHORT(-0.97)[-0.971,0]; NEURAL_HAM_LONG(-1.00)[-0.998,0]; ASN(0.00)[asn:11403, ipnet:2610:1c1:1::/48, country:US] X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 08 Jan 2019 07:57:25 -0000 Author: ehaupt (ports committer) Date: Tue Jan 8 07:57:24 2019 New Revision: 52751 URL: https://svnweb.freebsd.org/changeset/doc/52751 Log: Update my gpg key Modified: head/share/pgpkeys/ehaupt.key Modified: head/share/pgpkeys/ehaupt.key ============================================================================== --- head/share/pgpkeys/ehaupt.key Mon Jan 7 12:43:05 2019 (r52750) +++ head/share/pgpkeys/ehaupt.key Tue Jan 8 07:57:24 2019 (r52751) @@ -3,10 +3,10 @@ sh addkey.sh ehaupt 104E62C545316E89 ; --> -sub rsa2048/AB8EF8AD753A7017 2016-01-30 [expires: 2019-01-29] +sub rsa2048/AB8EF8AD753A7017 2016-01-30 [E] [expires: 2019-01-29] ]]> From owner-svn-doc-head@freebsd.org Tue Jan 8 07:57:42 2019 Return-Path: Delivered-To: svn-doc-head@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 3416E1493630; Tue, 8 Jan 2019 07:57:42 +0000 (UTC) (envelope-from ygy@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id CD93B744C2; Tue, 8 Jan 2019 07:57:41 +0000 (UTC) (envelope-from ygy@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id B9B9524A06; Tue, 8 Jan 2019 07:57:41 +0000 (UTC) (envelope-from ygy@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id x087vffV004221; Tue, 8 Jan 2019 07:57:41 GMT (envelope-from ygy@FreeBSD.org) Received: (from ygy@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id x087veI0004216; Tue, 8 Jan 2019 07:57:40 GMT (envelope-from ygy@FreeBSD.org) Message-Id: <201901080757.x087veI0004216@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: ygy set sender to ygy@FreeBSD.org using -f From: Guangyuan Yang Date: Tue, 8 Jan 2019 07:57:40 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r52752 - in head: en_US.ISO8859-1/htdocs/cgi en_US.ISO8859-1/htdocs/copyright share/mk share/xml X-SVN-Group: doc-head X-SVN-Commit-Author: ygy X-SVN-Commit-Paths: in head: en_US.ISO8859-1/htdocs/cgi en_US.ISO8859-1/htdocs/copyright share/mk share/xml X-SVN-Commit-Revision: 52752 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: CD93B744C2 X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-2.97 / 15.00]; local_wl_from(0.00)[FreeBSD.org]; NEURAL_HAM_MEDIUM(-1.00)[-0.998,0]; NEURAL_HAM_SHORT(-0.97)[-0.971,0]; NEURAL_HAM_LONG(-1.00)[-0.998,0]; ASN(0.00)[asn:11403, ipnet:2610:1c1:1::/48, country:US] X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 08 Jan 2019 07:57:42 -0000 Author: ygy Date: Tue Jan 8 07:57:40 2019 New Revision: 52752 URL: https://svnweb.freebsd.org/changeset/doc/52752 Log: Bump copyright years to 2019 for the doc tree. Modified: head/en_US.ISO8859-1/htdocs/cgi/cgi-style.pl head/en_US.ISO8859-1/htdocs/copyright/freebsd-doc-license.xml head/en_US.ISO8859-1/htdocs/copyright/freebsd-license.xml head/share/mk/doc.xml.mk head/share/xml/header.ent Modified: head/en_US.ISO8859-1/htdocs/cgi/cgi-style.pl ============================================================================== --- head/en_US.ISO8859-1/htdocs/cgi/cgi-style.pl Tue Jan 8 07:57:24 2019 (r52751) +++ head/en_US.ISO8859-1/htdocs/cgi/cgi-style.pl Tue Jan 8 07:57:40 2019 (r52752) @@ -238,7 +238,7 @@ sub html_footer { return qq` Modified: head/en_US.ISO8859-1/htdocs/copyright/freebsd-doc-license.xml ============================================================================== --- head/en_US.ISO8859-1/htdocs/copyright/freebsd-doc-license.xml Tue Jan 8 07:57:24 2019 (r52751) +++ head/en_US.ISO8859-1/htdocs/copyright/freebsd-doc-license.xml Tue Jan 8 07:57:40 2019 (r52752) @@ -13,7 +13,7 @@ -

Copyright 1994-2018 +

Copyright 1994-2019 The FreeBSD Project. All rights reserved.

Modified: head/en_US.ISO8859-1/htdocs/copyright/freebsd-license.xml ============================================================================== --- head/en_US.ISO8859-1/htdocs/copyright/freebsd-license.xml Tue Jan 8 07:57:24 2019 (r52751) +++ head/en_US.ISO8859-1/htdocs/copyright/freebsd-license.xml Tue Jan 8 07:57:40 2019 (r52752) @@ -13,7 +13,7 @@ -

Copyright 1992-2018 The FreeBSD Project.

+

Copyright 1992-2019 The FreeBSD Project.

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the Modified: head/share/mk/doc.xml.mk ============================================================================== --- head/share/mk/doc.xml.mk Tue Jan 8 07:57:24 2019 (r52751) +++ head/share/mk/doc.xml.mk Tue Jan 8 07:57:40 2019 (r52752) @@ -185,7 +185,7 @@ _PARAMS.events= --param events.xml-master "'${XML_EVE XML_EVENTS_EVENTS_MASTER=${DOC_PREFIX}/share/xml/events.xml XML_EVENTS_EVENTS_MASTER_SUBFILES= .for Y in 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 \ -2017 2018 +2017 2018 2019 XML_EVENTS_EVENTS_MASTER_SUBFILES+= ${DOC_PREFIX}/share/xml/events${Y}.xml .endfor .if exists(${DOC_PREFIX}/${LANGCODE}/share/xml/events.xml) @@ -195,7 +195,7 @@ XML_EVENTS_EVENTS= ${XML_EVENTS_EVENTS_MASTER} .endif XML_EVENTS_EVENTS_SUBFILES= .for Y in 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 \ -2017 2018 +2017 2018 2019 .if exists(${DOC_PREFIX}/${LANGCODE}/share/xml/events${Y}.xml) XML_EVENTS_EVENTS_SUBFILES+= ${DOC_PREFIX}/${LANGCODE}/share/xml/events${Y}.xml .endif Modified: head/share/xml/header.ent ============================================================================== --- head/share/xml/header.ent Tue Jan 8 07:57:24 2019 (r52751) +++ head/share/xml/header.ent Tue Jan 8 07:57:40 2019 (r52752) @@ -11,7 +11,7 @@ Site Map | - Legal Notices | © 1995–2018 The FreeBSD Project. + Legal Notices | © 1995–2019 The FreeBSD Project. All rights reserved.'> home   |   contact   |   legal   |   ©right;'> From owner-svn-doc-head@freebsd.org Tue Jan 8 17:57:10 2019 Return-Path: Delivered-To: svn-doc-head@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 5D26714854E0; Tue, 8 Jan 2019 17:57:10 +0000 (UTC) (envelope-from luporl@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 032CE6FB9E; Tue, 8 Jan 2019 17:57:10 +0000 (UTC) (envelope-from luporl@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id E53303306; Tue, 8 Jan 2019 17:57:09 +0000 (UTC) (envelope-from luporl@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id x08Hv9BS028107; Tue, 8 Jan 2019 17:57:09 GMT (envelope-from luporl@FreeBSD.org) Received: (from luporl@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id x08Hv92j028106; Tue, 8 Jan 2019 17:57:09 GMT (envelope-from luporl@FreeBSD.org) Message-Id: <201901081757.x08Hv92j028106@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: luporl set sender to luporl@FreeBSD.org using -f From: Leandro Lupori Date: Tue, 8 Jan 2019 17:57:09 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r52753 - head/share/pgpkeys X-SVN-Group: doc-head X-SVN-Commit-Author: luporl X-SVN-Commit-Paths: head/share/pgpkeys X-SVN-Commit-Revision: 52753 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: 032CE6FB9E X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-2.95 / 15.00]; local_wl_from(0.00)[FreeBSD.org]; NEURAL_HAM_MEDIUM(-1.00)[-0.998,0]; NEURAL_HAM_LONG(-1.00)[-0.998,0]; NEURAL_HAM_SHORT(-0.96)[-0.955,0]; ASN(0.00)[asn:11403, ipnet:2610:1c1:1::/48, country:US] X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 08 Jan 2019 17:57:10 -0000 Author: luporl (src committer) Date: Tue Jan 8 17:57:09 2019 New Revision: 52753 URL: https://svnweb.freebsd.org/changeset/doc/52753 Log: Changed PGP key (passphrase lost for the old, never used, one) Modified: head/share/pgpkeys/luporl.key Modified: head/share/pgpkeys/luporl.key ============================================================================== --- head/share/pgpkeys/luporl.key Tue Jan 8 07:57:40 2019 (r52752) +++ head/share/pgpkeys/luporl.key Tue Jan 8 17:57:09 2019 (r52753) @@ -1,43 +1,43 @@ -sub rsa2048/B8D1F02BC21A5D1F 2018-05-23 [E] [expires: 2021-05-22] +sub rsa2048/9FDFD0227E484C12 2019-01-08 [E] [expires: 2022-01-07] ]]> From owner-svn-doc-head@freebsd.org Wed Jan 9 01:08:57 2019 Return-Path: Delivered-To: svn-doc-head@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 45A4214910A5; Wed, 9 Jan 2019 01:08:57 +0000 (UTC) (envelope-from bcran@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id AB3EF943ED; Wed, 9 Jan 2019 01:08:56 +0000 (UTC) (envelope-from bcran@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 8867FCA40; Wed, 9 Jan 2019 01:08:56 +0000 (UTC) (envelope-from bcran@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id x0918uP5053053; Wed, 9 Jan 2019 01:08:56 GMT (envelope-from bcran@FreeBSD.org) Received: (from bcran@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id x0918tjb053048; Wed, 9 Jan 2019 01:08:55 GMT (envelope-from bcran@FreeBSD.org) Message-Id: <201901090108.x0918tjb053048@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: bcran set sender to bcran@FreeBSD.org using -f From: Rebecca Cran Date: Wed, 9 Jan 2019 01:08:55 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r52754 - in head: en_US.ISO8859-1/articles/contributors share/pgpkeys share/xml X-SVN-Group: doc-head X-SVN-Commit-Author: bcran X-SVN-Commit-Paths: in head: en_US.ISO8859-1/articles/contributors share/pgpkeys share/xml X-SVN-Commit-Revision: 52754 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: AB3EF943ED X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-2.95 / 15.00]; local_wl_from(0.00)[FreeBSD.org]; NEURAL_HAM_MEDIUM(-1.00)[-0.998,0]; NEURAL_HAM_SHORT(-0.95)[-0.951,0]; NEURAL_HAM_LONG(-1.00)[-0.998,0]; ASN(0.00)[asn:11403, ipnet:2610:1c1:1::/48, country:US] X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 09 Jan 2019 01:08:57 -0000 Author: bcran (src committer) Date: Wed Jan 9 01:08:55 2019 New Revision: 52754 URL: https://svnweb.freebsd.org/changeset/doc/52754 Log: Add my PGP key, and add myself to developers and authors. Added: head/share/pgpkeys/bcran.key (contents, props changed) Modified: head/en_US.ISO8859-1/articles/contributors/contrib.committers.xml head/share/pgpkeys/pgpkeys-developers.xml head/share/pgpkeys/pgpkeys.ent head/share/xml/authors.ent Modified: head/en_US.ISO8859-1/articles/contributors/contrib.committers.xml ============================================================================== --- head/en_US.ISO8859-1/articles/contributors/contrib.committers.xml Tue Jan 8 17:57:09 2019 (r52753) +++ head/en_US.ISO8859-1/articles/contributors/contrib.committers.xml Wed Jan 9 01:08:55 2019 (r52754) @@ -257,6 +257,10 @@ xmlns:xlink="http://www.w3.org/1999/xlink" version="5. + &a.bcran.email; + + + &a.culot.email; Added: head/share/pgpkeys/bcran.key ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/pgpkeys/bcran.key Wed Jan 9 01:08:55 2019 (r52754) @@ -0,0 +1,79 @@ + + + +uid Rebecca Cran +sub rsa4096/09ABD7DF293B1BCA 2018-04-16 [E] [expires: 2023-04-15] + +]]> + Modified: head/share/pgpkeys/pgpkeys-developers.xml ============================================================================== --- head/share/pgpkeys/pgpkeys-developers.xml Tue Jan 8 17:57:09 2019 (r52753) +++ head/share/pgpkeys/pgpkeys-developers.xml Wed Jan 9 01:08:55 2019 (r52754) @@ -446,6 +446,11 @@ &pgpkey.jeb; + + &a.bcran.email; + &pgpkey.bcran; + + &a.culot.email; &pgpkey.culot; Modified: head/share/pgpkeys/pgpkeys.ent ============================================================================== --- head/share/pgpkeys/pgpkeys.ent Tue Jan 8 17:57:09 2019 (r52753) +++ head/share/pgpkeys/pgpkeys.ent Wed Jan 9 01:08:55 2019 (r52754) @@ -52,6 +52,7 @@ + Modified: head/share/xml/authors.ent ============================================================================== --- head/share/xml/authors.ent Tue Jan 8 17:57:09 2019 (r52753) +++ head/share/xml/authors.ent Wed Jan 9 01:08:55 2019 (r52754) @@ -252,6 +252,9 @@ bcr@FreeBSD.org"> + +bcran@FreeBSD.org"> + bde@FreeBSD.org"> From owner-svn-doc-head@freebsd.org Wed Jan 9 19:17:58 2019 Return-Path: Delivered-To: svn-doc-head@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id CB3FB148BB81; Wed, 9 Jan 2019 19:17:57 +0000 (UTC) (envelope-from gordon@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 6B8CC70872; Wed, 9 Jan 2019 19:17:57 +0000 (UTC) (envelope-from gordon@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 1531E205CE; Wed, 9 Jan 2019 19:17:57 +0000 (UTC) (envelope-from gordon@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id x09JHvrx026047; Wed, 9 Jan 2019 19:17:57 GMT (envelope-from gordon@FreeBSD.org) Received: (from gordon@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id x09JHtSB026034; Wed, 9 Jan 2019 19:17:55 GMT (envelope-from gordon@FreeBSD.org) Message-Id: <201901091917.x09JHtSB026034@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: gordon set sender to gordon@FreeBSD.org using -f From: Gordon Tetlow Date: Wed, 9 Jan 2019 19:17:55 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r52756 - in head/share: security/advisories security/patches/EN-19:01 security/patches/EN-19:02 security/patches/EN-19:03 security/patches/EN-19:04 security/patches/EN-19:05 xml X-SVN-Group: doc-head X-SVN-Commit-Author: gordon X-SVN-Commit-Paths: in head/share: security/advisories security/patches/EN-19:01 security/patches/EN-19:02 security/patches/EN-19:03 security/patches/EN-19:04 security/patches/EN-19:05 xml X-SVN-Commit-Revision: 52756 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: 6B8CC70872 X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-2.99 / 15.00]; local_wl_from(0.00)[FreeBSD.org]; NEURAL_HAM_MEDIUM(-1.00)[-0.999,0]; NEURAL_HAM_LONG(-1.00)[-0.999,0]; NEURAL_HAM_SHORT(-0.99)[-0.988,0]; ASN(0.00)[asn:11403, ipnet:2610:1c1:1::/48, country:US] X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 09 Jan 2019 19:17:58 -0000 Author: gordon (src,ports committer) Date: Wed Jan 9 19:17:54 2019 New Revision: 52756 URL: https://svnweb.freebsd.org/changeset/doc/52756 Log: Add EN-19:01 through EN-19:05. Approved by: so Added: head/share/security/advisories/FreeBSD-EN-19:01.cc_cubic.asc (contents, props changed) head/share/security/advisories/FreeBSD-EN-19:02.tcp.asc (contents, props changed) head/share/security/advisories/FreeBSD-EN-19:03.sqlite.asc (contents, props changed) head/share/security/advisories/FreeBSD-EN-19:04.tzdata.asc (contents, props changed) head/share/security/advisories/FreeBSD-EN-19:05.kqueue.asc (contents, props changed) head/share/security/patches/EN-19:01/ head/share/security/patches/EN-19:01/cc_cubic.patch (contents, props changed) head/share/security/patches/EN-19:01/cc_cubic.patch.asc (contents, props changed) head/share/security/patches/EN-19:02/ head/share/security/patches/EN-19:02/tcp.patch (contents, props changed) head/share/security/patches/EN-19:02/tcp.patch.asc (contents, props changed) head/share/security/patches/EN-19:03/ head/share/security/patches/EN-19:03/sqlite-11.patch (contents, props changed) head/share/security/patches/EN-19:03/sqlite-11.patch.asc (contents, props changed) head/share/security/patches/EN-19:03/sqlite-12.patch (contents, props changed) head/share/security/patches/EN-19:03/sqlite-12.patch.asc (contents, props changed) head/share/security/patches/EN-19:04/ head/share/security/patches/EN-19:04/tzdata-2018i.patch (contents, props changed) head/share/security/patches/EN-19:04/tzdata-2018i.patch.asc (contents, props changed) head/share/security/patches/EN-19:05/ head/share/security/patches/EN-19:05/kqueue.patch (contents, props changed) head/share/security/patches/EN-19:05/kqueue.patch.asc (contents, props changed) Modified: head/share/xml/notices.xml Added: head/share/security/advisories/FreeBSD-EN-19:01.cc_cubic.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-EN-19:01.cc_cubic.asc Wed Jan 9 19:17:54 2019 (r52756) @@ -0,0 +1,133 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-EN-19:01.cc_cubic Errata Notice + The FreeBSD Project + +Topic: Connection stalls with CUBIC congestion control + +Category: core +Module: tcp +Announced: 2019-01-09 +Credits: Matt Garber, Hiren Panchasara +Affects: FreeBSD 12.0 +Corrected: 2018-12-17 21:46:42 UTC (stable/12, 12.0-STABLE) + 2019-01-09 18:38:35 UTC (releng/12.0, 12.0-RELEASE-p2) + +For general information regarding FreeBSD Errata Notices and Security +Advisories, including descriptions of the fields above, security +branches, and the following sections, please visit +. + +I. Background + +CUBIC is a modern congestion control algorithm for the Transmission Control +Protocol (TCP), which along with its predecessor BIC TCP is specifically +optimized for high bandwidth, high latency networks. It is widely +implemented across a variety of operating systems, and is the default TCP +implementation or enabled by default in recent versions of Linux and +Microsoft Windows. CUBIC is available as an alternate congestion control +algorithm since FreeBSD 9.0 using the cc_cubic module. + +II. Problem Description + +Changes to the cc_cubic module in FreeBSD 12.0 can cause network stuttering +or connection stalls when loaded and enabled as default. + +III. Impact + +FreeBSD 12.0 systems loading cc_cubic and setting non-default sysctl value +net.inet.tcp.cc.algorithm=cubic exhibit stuttering and complete stalls of +network connections. Under certain conditions, this may cause loss of system +availability over the network or service unreachability. + +IV. Workaround + +Disabling cc_cubic and selecting one of the alternate included congestion +control algorithms (e.g., newreno, htcp) will restore normal network +connectivity and alleviate stuttering and stalls. Note that disabling CUBIC +may cause a reduction in expected performance based on specific, unique +network condition characteristics and the module used as a workaround. + +V. Solution + +Perform one of the following: + +1) Upgrade your system to a supported FreeBSD stable or release / security +branch (releng) dated after the correction date, and reboot the system. + +2) To update your system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install +# shutdown -r +30 "Rebooting for FreeBSD errata update" + +3) To update your system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +[FreeBSD 12.0] +# fetch https://security.FreeBSD.org/patches/EN-19:01/cc_cubic.patch +# fetch https://security.FreeBSD.org/patches/EN-19:01/cc_cubic.patch.asc +# gpg --verify cc_cubic.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile your kernel as described in + and reboot the +system. + +VI. Correction details + +The following list contains the correction revision numbers for each +affected branch. + +Branch/path Revision +- ------------------------------------------------------------------------- +stable/12/ r342181 +releng/12.0/ r342893 +- ------------------------------------------------------------------------- + +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + + + +VII. References + +The latest revision of this advisory is available at + +-----BEGIN PGP SIGNATURE----- + +iQKTBAEBCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAlw2Rb5fFIAAAAAALgAo +aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD +MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n +5cJGyRAAnpturBqU4XIZMdvInaVHOXA5P6KemeFuJkwz/aMtIbgefm49lvZVS4q6 +RO8/GytONX1OHaoJQDdincVfRbe9x+ID+ulCJfSLuZMhjLYpxDQJo9d4NWZtvpBn +3wJNEQEXB0AjrYUOrebiT7yd3zA4f+7zSHu0Uvq4k5Tk0Xxsqxsx3/MG5ezEmdxx +IWub1RnYvgmUVJBKn/C5A4v17dE12VnZtLrnfhZ4K3U3mVZYc3cJxF34wSscVqYd +iAsntF786FV+hAXBX7wHa3JIqe+uXE2uemrquNmxgup+zrbVWPWPirgku2TVcvsm +m9aQILNc9RvJ/XkViLV8+ypqCymBFsl3VhO3dzmOnsbL72G9rqjQtgdYWT2dp69p +VyU4EWsTULXIbIBNxyrYhinT+DAqyt8bdrtyT3AhcVJaVk5B5APWnXiwjgS4mPN9 +hf2mCjZw10tJgsqYYrBlTERomgHU/pyliu0Rt2sof5+iGArbe7ZhEorHrM7YhD9n +Hc+3oNzA0dYDStJQpEb4rJ7dEKP/mpppwIosMhPbku6u3ViafCJVq2dIGNQpDope +Mh00Kk7cY0o3Rukw2lGNc9vDbIyUSqT/jV4lBDhp4k5ilQynvkMZETLlynI+KQUH +J2uOOvYzkIZLzZyXtaQfkmrkV6DxzmjxDsqwiMz5DB7o70w/M54= +=e8Wg +-----END PGP SIGNATURE----- Added: head/share/security/advisories/FreeBSD-EN-19:02.tcp.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-EN-19:02.tcp.asc Wed Jan 9 19:17:54 2019 (r52756) @@ -0,0 +1,128 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-EN-19:02.tcp Errata Notice + The FreeBSD Project + +Topic: TCP connections may stall and eventually fail in case of + packet loss + +Category: core +Module: kernel +Announced: 2019-01-09 +Credits: Michael Tuexen +Affects: FreeBSD 12.0 +Corrected: 2018-12-23 09:48:36 UTC (stable/12, 12.0-STABLE) + 2019-09-09 18:42:40 UTC (releng/12.0, 12.0-RELEASE-p2) + +For general information regarding FreeBSD Errata Notices and Security +Advisories, including descriptions of the fields above, security +branches, and the following sections, please visit +. + +I. Background + +The TCP stack limits the resources used for TCP connections. Once a limit +is reached, further received TCP segments for the TCP connection are dropped. + +II. Problem Description + +To continue delivering data to the application, accepting the TCP segment +with the next expected sequence number is required. If this TCP segment is +dropped due to a resource limit, no further progress can be made. Therefore +exceptions for this particular TCP segment have to be implemented. + +III. Impact + +In case of lost TCP segments, TCP connections may stall and then eventually +fail. + +IV. Workaround + +No workaround is available. + +V. Solution + +Perform one of the following: + +1) Upgrade your system to a supported FreeBSD stable or release / security +branch (releng) dated after the correction date. + +Afterward, reboot the system. + +2) To update your system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install + +Afterward, reboot the system. + +3) To update your system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +[FreeBSD 12.0] +# fetch https://security.FreeBSD.org/patches/EN-19:02/tcp.patch +# fetch https://security.FreeBSD.org/patches/EN-19:02/tcp.patch.asc +# gpg --verify tcp.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile your kernel as described in + and reboot the +system. + +VI. Correction details + +The following list contains the correction revision numbers for each +affected branch. + +Branch/path Revision +- ------------------------------------------------------------------------- +stable/12/ r342378 +releng/12.0/ r342894 +- ------------------------------------------------------------------------- + +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + + + +VII. References + +The latest revision of this advisory is available at + +-----BEGIN PGP SIGNATURE----- + +iQKTBAEBCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAlw2Rc1fFIAAAAAALgAo +aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD +MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n +5cJtnxAAgOIJjP9Dg76onxJUPJWiKTAR5VZeZ8od0RJREIeZMUpgFiVUVH82fr8z +ajAzGZbVFhEgFvYwQRU4R/MokNqONoG1O3YPdjcMFyW5HPBoAG+9h67qD3CtLgTN +xnXMR72ed83oY8ts1WSfYVAKF+9X6U5G6FtchBgAhap2k9tI22QKiEmTTmqzUnoy +ddLZatOyKmig8MZKshMmleEpvU+BoYR66d2K9CYxcjHqgNNJOQwQK6yLR3oX41Z9 +n5Akkg/KC7wD02CPFjmO9008ZC4fFiQ8D4eGt9D/lPI4AzLcfkvRdzt5CjMlamXm +Rjf2H5/2f4iYSXiEi2wkChFJHh+MQuYgcfTqRJdNB0qf3DbLwTL5wULfrMVNn7LU +rLHd8CNRTN4+d+//p7nZ/atFbuLjJE08YFqE2ODcMa8eJFaY09/+X+NMIqO6AdTE +hGzqDuiVmI/1MSFjD7dxUotw6Y2iRf+DiLx+JUmb0L+C0FXfl/u8x1ErYbzuLyyL +vD1qb66fDuuSC8aNWO6Qv55bBWAhYhO668CQwfmvEgree72ShbzJPEn3vUN2dIX4 +zg0kTs30QOlizAT2lxQchiPBKkQ+IExPurTT7lW0cZ5PID8y/FSKl49yeQo/nhrD +j/vnF7yMgc6roCyasNlREdi20yTYbp2PItfhaSXWVrtYAFN1jNc= +=3a3w +-----END PGP SIGNATURE----- Added: head/share/security/advisories/FreeBSD-EN-19:03.sqlite.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-EN-19:03.sqlite.asc Wed Jan 9 19:17:54 2019 (r52756) @@ -0,0 +1,145 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-EN-19:03.sqlite Errata Notice + The FreeBSD Project + +Topic: sqlite update + +Category: contrib +Module: sqlite3 +Announced: 2019-01-09 +Credits: Cy Schubert +Affects: All supported versions of FreeBSD. +Corrected: 2018-12-21 01:58:01 UTC (stable/12, 12.0-STABLE) + 2019-01-09 18:47:10 UTC (releng/12.0, 12.0-RELEASE-p2) + 2018-12-21 02:04:15 UTC (stable/11, 11.2-STABLE) + 2019-01-09 18:50:27 UTC (releng/11.2, 11.2-RELEASE-p8) +CVE Name: CVE-2018-20346, CVE-2018-20505, CVE-2018-20506 + +For general information regarding FreeBSD Errata Notices and Security +Advisories, including descriptions of the fields above, security +branches, and the following sections, please visit +. + +I. Background + +SQLite is an SQL database engine in a C library. Programs that link the +SQLite library can have SQL database access without running a separate RDBMS +process. The distribution comes with a standalone command-line access +program (sqlite3) that can be used to administer an SQLite database and which +serves as an example of how to use the SQLite library. + +II. Problem Description + +According to https://blade.tencent.com/magellan/index_en.html, the +vulnerabilities known as Magellan are a group vulnerabilities that exist +in sqlite3, documented by CVE-2018-20346, CVE-2018-20505, and CVE-2018-20506. + +When the FTS3 extension is enabled an integer overflow resulting in a buffer +overflow when allowing remote attackers to run arbitrary SQL statements which +can be leveraged to execute arbitrary code. + +III. Impact + +The vulnerabilities were discovered by Tencent Blade Team and verified to be +able to successfully implement remote code execution in Chromium browsers. + +IV. Workaround + +No workaround is available. + +V. Solution + +Perform one of the following: + +1) Upgrade your system to a supported FreeBSD stable or release / security +branch (releng) dated after the correction date. + +2) To update your system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install + +3) To update your system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +[FreeBSD 11.2] +# fetch https://security.FreeBSD.org/patches/EN-19:03/sqlite-11.patch +# fetch https://security.FreeBSD.org/patches/EN-19:03/sqlite-11.patch.asc +# gpg --verify sqlite-11.patch.asc + +[FreeBSD 12.0] +# fetch https://security.FreeBSD.org/patches/EN-19:03/sqlite-12.patch +# fetch https://security.FreeBSD.org/patches/EN-19:03/sqlite-12.patch.asc +# gpg --verify sqlite-12.patch.asc + + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile the operating system using buildworld and installworld as +described in . + +Restart all daemons that use the library, or reboot the system. + +VI. Correction details + +The following list contains the correction revision numbers for each +affected branch. + +Branch/path Revision +- ------------------------------------------------------------------------- +stable/12/ r342291 +releng/12.0/ r342895 +stable/11/ r342292 +releng/11.2/ r342896 +- ------------------------------------------------------------------------- + +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + + + +VII. References + + + + + +The latest revision of this advisory is available at + +-----BEGIN PGP SIGNATURE----- + +iQKTBAEBCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAlw2RdFfFIAAAAAALgAo +aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD +MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n +5cLtJg/9EM0jQbTBrSgVy5X1AyQ2rcFz9KbjtA0L48wOuOLiAh7eeYxh4Wxuz9k1 +QnEJavMbpVr71yhmt6maEAbRzyGUvemDh4vlu0wjcYSlEzcvk7xaRzfXimippxky +GumFBCvs7UKDIiGRr62ukmxu3FgfEaTM/Cc4bNcuV5k4za+DWIGTu+97i0+B2ieX +/IZ5hQq42w1YIUY5QOy2vj87rnQf2t+uShcBjRg8HsnPsG9BfQfI8vfuWjjtaKMI +iva++F5UJWcsykjZo5J3aaZFxnHsW2hs3buQN+AhoEt7oKdGquOHdweSw8xtSlp9 +3Y+qj+veD7u4Mt95OtnYrJOg8Kynlrzg5uMDbNGbyqktbxfpi2gqBbPEVmx2+nGj +Aj9PDSHMliBZsVKvr1opExfYp4HL0LB9Kqhato08lFxs05TUxiT6LRcel/iXiIfl +vCqfWhKJYVZ+alAW+Kjic6iWw7AtmVLbV64dDu03jxS/14RtRp1Hbk1BRCrnJeLn +sLSdFj6bi2mQx6OXAd9G9jhReoxylyZwRXyhPSsPG1E4mzX6ZRbJfnkriSazW4hq +F+PjTyXidn3uhS6z6CZB08Ltw2NBd3baRl/TQBEiFHd6SSGByqX6gMguK/tQV92U +uM/Q4Ak4H/Q+nEN8/LdXioW0P7ZEC6X/9GXKWv+bUs6LjcZXftA= +=TG5W +-----END PGP SIGNATURE----- Added: head/share/security/advisories/FreeBSD-EN-19:04.tzdata.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-EN-19:04.tzdata.asc Wed Jan 9 19:17:54 2019 (r52756) @@ -0,0 +1,147 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-EN-19:04.tzdata Errata Notice + The FreeBSD Project + +Topic: Timezone database information update + +Category: contrib +Module: zoneinfo +Announced: 2019-01-09 +Credits: Philip Paeps +Affects: All supported versions of FreeBSD. +Corrected: 2019-01-01 10:04:49 UTC (stable/12, 12.0-STABLE) + 2019-01-09 18:53:35 UTC (releng/12.0, 12.0-RELEASE-p2) + 2019-01-01 10:05:12 UTC (stable/11, 11.2-STABLE) + 2019-01-09 18:54:42 UTC (releng/11.2, 11.2-RELEASE-p8) + +For general information regarding FreeBSD Errata Notices and Security +Advisories, including descriptions of the fields above, security +branches, and the following sections, please visit +. + +I. Background + +The tzsetup(8) program allows the user to specify the default local timezone. +Based on the selected timezone, tzsetup(8) copies one of the files from +/usr/share/zoneinfo to /etc/localtime. This file actually controls the +conversion. + +II. Problem Description + +Several changes in Daylight Savings Time happened after previous FreeBSD +releases were released that would affect many people who live in different +countries. Because of these changes, the data in the zoneinfo files need to +be updated, and if the local timezone on the running system is affected, +tzsetup(8) needs to be run so the /etc/localtime is updated. + +III. Impact + +An incorrect time will be displayed on a system configured to use one of the +affected timezones if the /usr/share/zoneinfo and /etc/localtime files are +not updated, and all applications on the system that rely on the system time, +such as cron(8) and syslog(8), will be affected. + +IV. Workaround + +The system administrator can install an updated timezone database from the +misc/zoneinfo port and run tzsetup(8) to get the timezone database corrected. + +Applications that store and display times in Coordinated Universal Time (UTC) +are not affected. + +V. Solution + +Please note that some third party software, for instance PHP, Ruby, Java and +Perl, may be using different zoneinfo data source, in such cases this +software must be updated separately. For software packages that is installed +via binary packages, they can be upgraded by executing `pkg upgrade'. + +Following the instructions in this Errata Notice will update all of the +zoneinfo files to be the same as what was released with FreeBSD release. + +Perform one of the following: + +1) Upgrade your system to a supported FreeBSD stable or release / security +branch (releng) dated after the correction date. Restart all the affected +applications and daemons, or reboot the system. + +2) To update your system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install + +Restart all the affected applications and daemons, or reboot the system. + +3) To update your system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +# fetch https://security.FreeBSD.org/patches/EN-19:04/tzdata-2018i.patch +# fetch https://security.FreeBSD.org/patches/EN-19:04/tzdata-2018i.patch.asc +# gpg --verify tzdata-2018i.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile the operating system using buildworld and installworld as +described in . + +Restart all the affected applications and daemons, or reboot the system. + +VI. Correction details + +The following list contains the correction revision numbers for each +affected branch. + +Branch/path Revision +- ------------------------------------------------------------------------- +stable/12/ r342667 +releng/12.0/ r342897 +stable/11/ r342668 +releng/11.2/ r342898 +- ------------------------------------------------------------------------- + +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + + + +VII. References + +The latest revision of this advisory is available at + +-----BEGIN PGP SIGNATURE----- + +iQKTBAEBCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAlw2RdRfFIAAAAAALgAo +aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD +MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n +5cKd+Q//QYBUcMdBnW6URT8bWCrIOTPP84aGpMKmU4ZZYidUfI6CJiiWVaGQHJgD +tmdQjaHemSRfxQ+yAZ5XR8oUIBxrzBhA51cM5QMNnJMXBkpqz9yCbHefH3Fxfr6n +Dg+Vt2cZ745MHPK9uhjtUTmLYRF2iztUqlATr3R1NxBbJ6QQzQuVEyeAvTSY9Jdw +/+cQM72m28iHPP+ff5v9n2MLqoTg74HbchwJthtDvgK9elfQFuC1F07i8I6F4krT +FHnPRISpg4EEOKYG/Jjedk9FQBUpKiOhsDz+siGtjQoivz8TemaH5nTMI7P/WP/7 +jFJ6+jQirc2vCvcUzmiPGrBXRx3OptYcIiLOeKfgc+wCtgEHap4Nrl4Damt1QC13 +T4kpaOi3TcqtDtKxZyxwR8tOtJGEayqXFHA5FL1Fgr63JcvbZTXlBg0BT4oAd7mX +DuvDkap5hXh6jlQ2BM4L9J+I+GNMfrpULsM4drsqd7GVBcLrnu06po3M8jgja44T +rVzNB62FuOX19Q2W8kZ7LOfAwW+ho02GNzwuYWiLCpP4JSTaxtHrd1LexpCzO4Lg +zsttA2bkNjmzHxfcbAPbS5IMX539iJdTgZiDlBNzUi+QqiCG83/fRcVvgD7qH1iM +kF7DipZUURjlV/RbtCZFU/fsKVzR7rF5MSQl9q7llwe5uMto6lQ= +=1NIG +-----END PGP SIGNATURE----- Added: head/share/security/advisories/FreeBSD-EN-19:05.kqueue.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-EN-19:05.kqueue.asc Wed Jan 9 19:17:54 2019 (r52756) @@ -0,0 +1,126 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-EN-19:05.kqueue Errata Notice + The FreeBSD Project + +Topic: kqueue race condition and kernel panic + +Category: core +Module: kqueue +Announced: 2019-01-09 +Credits: Mark Johnston +Affects: FreeBSD 11.2 +Corrected: 2019-11-24 17:11:47 UTC (stable/11, 11.2-STABLE) + 2019-01-09 18:57:38 UTC (releng/11.2, 11.2-RELEASE-p8) + +For general information regarding FreeBSD Errata Notices and Security +Advisories, including descriptions of the fields above, security +branches, and the following sections, please visit +. + +I. Background + +kevent(2) is a system call which provides a generic method of notifying the +caller when a caller-specified event happens or a condition holds. One use +for kevent(2) is to wait for a specified timeout to elapse. + +II. Problem Description + +The kevent(2) implementation in the kernel contains a race condition which +can be triggered when an event is added and fires shortly after. Most event +types are not affected, but timer events can trigger the race if the timeout +duration is very short. + +III. Impact + +The race condition can cause corruption of a queue structure, leading to +a kernel panic when it is later accessed. Applications using kevent(2) may +trigger the panic if their usage causes the race condition to occur. + +IV. Workaround + +No workaround is available. + +V. Solution + +Perform one of the following: + +1) Upgrade your system to a supported FreeBSD stable or release / security +branch (releng) dated after the correction date, and reboot. + +2) To update your system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install +# shutdown -r +30 "Rebooting for errata update" + +3) To update your system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +[FreeBSD 11.2] +# fetch https://security.FreeBSD.org/patches/EN-19:05/kqueue.patch +# fetch https://security.FreeBSD.org/patches/EN-19:05/kqueue.patch.asc +# gpg --verify kqueue.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile your kernel as described in + and reboot the +system. + +VI. Correction details + +The following list contains the correction revision numbers for each +affected branch. + +Branch/path Revision +- ------------------------------------------------------------------------- +stable/11/ r340904 +releng/11.2/ r342899 +- ------------------------------------------------------------------------- + +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + + + +VII. References + +The latest revision of this advisory is available at + +-----BEGIN PGP SIGNATURE----- + +iQKTBAEBCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAlw2RdZfFIAAAAAALgAo +aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD +MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n +5cK0nRAAgPsdkc/TyBTqpvJrvvNaVd0xgNC2lxnYK3HxOPbo5kqj6XHZxb3KvrrN +He6TyGvwGCPHNzlFwHILH+FtFkgrvGVBoPu/U0e/NKRrkhyxPHJMz0bZPu7yqQoG +GDFRIsw5D3JKZW38yMD9Menh3mag81OVZii1LfzkcDLLKfwX/zcx1vV7MSwMzoNs +5L7Fm8lg0uIxrrlKvvmrPxfWoZENhCr9CAAdg8moL3thl64NaVVmPo7tXDXosNGo +EQYT19SY0FBSboUcpVaChgyZaCFzOeCPuXuJPoUYppIWNiv2S8ZTjuq9d1g4R4SD +7GBMozz8EG1rN0pzhx8mVEECZBzdt5rjggiWKjkOVxH/sy5LQjppONK3VVOygoCz +dve2wGq6S1ke/b2NDRpAinmIr8I3x3b7JLNkE5OvNJ6bTLk3ZmpIRYQNYT+eu8Fx +GNe/oTU9DRbB4yv0kcKsypHqQ0cKdn6+duYzKGZ4+c86B7IHJgsYoG/NTKYfFzQx +BHWuI/P/9pakHESNiDidKRz+z5w679+jIfZDcbBIXaw+PCqzg5a1GFN8Bub2mGLw +2wmVQJV1nbdE+6UbWvaV2seV/bo+N/L8k4QS6OPIDUefLPGgCdRFr/MlLoiTaJ43 +p+L3iVlVbiOTCfsCGI/QVQq+IOngKzqSUXN3Ys7PXvvAzSyaTFg= +=fD2U +-----END PGP SIGNATURE----- Added: head/share/security/patches/EN-19:01/cc_cubic.patch ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/patches/EN-19:01/cc_cubic.patch Wed Jan 9 19:17:54 2019 (r52756) @@ -0,0 +1,194 @@ +--- sys/netinet/cc/cc.h.orig ++++ sys/netinet/cc/cc.h +@@ -102,8 +102,6 @@ + #define CCF_ACKNOW 0x0008 /* Will this ack be sent now? */ + #define CCF_IPHDR_CE 0x0010 /* Does this packet set CE bit? */ + #define CCF_TCPHDR_CWR 0x0020 /* Does this packet set CWR bit? */ +-#define CCF_MAX_CWND 0x0040 /* Have we reached maximum cwnd? */ +-#define CCF_CHG_MAX_CWND 0x0080 /* Cubic max_cwnd changed, for K */ + + /* ACK types passed to the ack_received() hook. */ + #define CC_ACK 0x0001 /* Regular in sequence ACK. */ +--- sys/netinet/cc/cc_cubic.c.orig ++++ sys/netinet/cc/cc_cubic.c +@@ -88,8 +88,6 @@ + unsigned long max_cwnd; + /* cwnd at the previous congestion event. */ + unsigned long prev_max_cwnd; +- /* Cached value for t_maxseg when K was computed */ +- uint32_t k_maxseg; + /* Number of congestion events. */ + uint32_t num_cong_events; + /* Minimum observed rtt in ticks. */ +@@ -126,9 +124,6 @@ + cubic_data = ccv->cc_data; + cubic_record_rtt(ccv); + +- if (ccv->flags & CCF_MAX_CWND) +- return; +- + /* + * Regular ACK and we're not in cong/fast recovery and we're cwnd + * limited and we're either not doing ABC or are slow starting or are +@@ -156,12 +151,6 @@ + cubic_data->mean_rtt_ticks, cubic_data->max_cwnd, + CCV(ccv, t_maxseg)); + +- if (ccv->flags & CCF_CHG_MAX_CWND || cubic_data->k_maxseg != CCV(ccv, t_maxseg)) { +- cubic_data->K = cubic_k(cubic_data->max_cwnd / CCV(ccv, t_maxseg)); +- cubic_data->k_maxseg = CCV(ccv, t_maxseg); +- ccv->flags &= ~(CCF_MAX_CWND|CCF_CHG_MAX_CWND); +- } +- + w_cubic_next = cubic_cwnd(ticks_since_cong + + cubic_data->mean_rtt_ticks, cubic_data->max_cwnd, + CCV(ccv, t_maxseg), cubic_data->K); +@@ -173,18 +162,13 @@ + * TCP-friendly region, follow tf + * cwnd growth. + */ +- CCV(ccv, snd_cwnd) = ulmin(w_tf, TCP_MAXWIN << CCV(ccv, snd_scale)); ++ CCV(ccv, snd_cwnd) = w_tf; + + else if (CCV(ccv, snd_cwnd) < w_cubic_next) { + /* + * Concave or convex region, follow CUBIC + * cwnd growth. + */ +- if (w_cubic_next >= TCP_MAXWIN << CCV(ccv, snd_scale)) { +- w_cubic_next = TCP_MAXWIN << CCV(ccv, snd_scale); +- ccv->flags |= CCF_MAX_CWND; +- } +- w_cubic_next = ulmin(w_cubic_next, TCP_MAXWIN << CCV(ccv, snd_scale)); + if (V_tcp_do_rfc3465) + CCV(ccv, snd_cwnd) = w_cubic_next; + else +@@ -202,10 +186,8 @@ + * max_cwnd. + */ + if (cubic_data->num_cong_events == 0 && +- cubic_data->max_cwnd < CCV(ccv, snd_cwnd)) { ++ cubic_data->max_cwnd < CCV(ccv, snd_cwnd)) + cubic_data->max_cwnd = CCV(ccv, snd_cwnd); +- ccv->flags |= CCF_CHG_MAX_CWND; +- } + } + } + } +@@ -254,7 +236,6 @@ + cubic_data->num_cong_events++; + cubic_data->prev_max_cwnd = cubic_data->max_cwnd; + cubic_data->max_cwnd = CCV(ccv, snd_cwnd); +- ccv->flags |= CCF_CHG_MAX_CWND; + } + ENTER_RECOVERY(CCV(ccv, t_flags)); + } +@@ -267,8 +248,6 @@ + cubic_data->prev_max_cwnd = cubic_data->max_cwnd; + cubic_data->max_cwnd = CCV(ccv, snd_cwnd); + cubic_data->t_last_cong = ticks; +- ccv->flags |= CCF_CHG_MAX_CWND; +- ccv->flags &= ~CCF_MAX_CWND; + CCV(ccv, snd_cwnd) = CCV(ccv, snd_ssthresh); + ENTER_CONGRECOVERY(CCV(ccv, t_flags)); + } +@@ -285,7 +264,6 @@ + if (CCV(ccv, t_rxtshift) >= 2) { + cubic_data->num_cong_events++; + cubic_data->t_last_cong = ticks; +- ccv->flags &= ~CCF_MAX_CWND; + } + break; + } +@@ -304,7 +282,6 @@ + * get used. + */ + cubic_data->max_cwnd = CCV(ccv, snd_cwnd); +- ccv->flags |= CCF_CHG_MAX_CWND; + } + + static int +@@ -329,11 +306,9 @@ + pipe = 0; + + /* Fast convergence heuristic. */ +- if (cubic_data->max_cwnd < cubic_data->prev_max_cwnd) { ++ if (cubic_data->max_cwnd < cubic_data->prev_max_cwnd) + cubic_data->max_cwnd = (cubic_data->max_cwnd * CUBIC_FC_FACTOR) + >> CUBIC_SHIFT; +- ccv->flags |= CCF_CHG_MAX_CWND; +- } + + if (IN_FASTRECOVERY(CCV(ccv, t_flags))) { + /* +@@ -356,7 +331,6 @@ + cubic_data->max_cwnd) >> CUBIC_SHIFT)); + } + cubic_data->t_last_cong = ticks; +- ccv->flags &= ~CCF_MAX_CWND; + + /* Calculate the average RTT between congestion epochs. */ + if (cubic_data->epoch_ack_count > 0 && +@@ -367,6 +341,7 @@ + + cubic_data->epoch_ack_count = 0; + cubic_data->sum_rtt_ticks = 0; ++ cubic_data->K = cubic_k(cubic_data->max_cwnd / CCV(ccv, t_maxseg)); + } + + /* +--- sys/netinet/cc/cc_cubic.h.orig ++++ sys/netinet/cc/cc_cubic.h +@@ -41,8 +41,6 @@ + #ifndef _NETINET_CC_CUBIC_H_ + #define _NETINET_CC_CUBIC_H_ + +-#include +- + /* Number of bits of precision for fixed point math calcs. */ + #define CUBIC_SHIFT 8 + +@@ -163,6 +161,8 @@ + /* + * Compute the new cwnd value using an implementation of eqn 1 from the I-D. + * Thanks to Kip Macy for help debugging this function. ++ * ++ * XXXLAS: Characterise bounds for overflow. + */ + static __inline unsigned long + cubic_cwnd(int ticks_since_cong, unsigned long wmax, uint32_t smss, int64_t K) +@@ -174,15 +174,6 @@ + /* t - K, with CUBIC_SHIFT worth of precision. */ + cwnd = ((int64_t)(ticks_since_cong << CUBIC_SHIFT) - (K * hz)) / hz; + +- /* moved this calculation up because it cannot overflow or underflow */ +- cwnd *= CUBIC_C_FACTOR * smss; +- +- if (cwnd > 2097151) /* 2^21 cubed is long max */ +- return INT_MAX; +- +- if (cwnd < -2097152) /* -2^21 cubed is long min */ +- return smss; +- + /* (t - K)^3, with CUBIC_SHIFT^3 worth of precision. */ + cwnd *= (cwnd * cwnd); + +@@ -191,17 +182,8 @@ + * The down shift by CUBIC_SHIFT_4 is because cwnd has 4 lots of + * CUBIC_SHIFT included in the value. 3 from the cubing of cwnd above, + * and an extra from multiplying through by CUBIC_C_FACTOR. +- * +- * The original formula was this: +- * cwnd = ((cwnd * CUBIC_C_FACTOR * smss) >> CUBIC_SHIFT_4) + wmax; +- * +- * CUBIC_C_FACTOR and smss factors were moved up to an earlier +- * calculation to simplify overflow and underflow detection. + */ +- cwnd = (cwnd >> CUBIC_SHIFT_4) + wmax; +- +- if (cwnd < 0) +- return 1; ++ cwnd = ((cwnd * CUBIC_C_FACTOR * smss) >> CUBIC_SHIFT_4) + wmax; + + return ((unsigned long)cwnd); + } Added: head/share/security/patches/EN-19:01/cc_cubic.patch.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/patches/EN-19:01/cc_cubic.patch.asc Wed Jan 9 19:17:54 2019 (r52756) @@ -0,0 +1,18 @@ +-----BEGIN PGP SIGNATURE----- + +iQKTBAABCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAlw2RhZfFIAAAAAALgAo +aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD +MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n +5cK6Bw/+NJXfzNxz2c9hS4RgZSeDZxtqPEC6ZG5aKN2vc7RzwYsGgv5f4VzuU40A +MsRNRmbDjoQYj9zkBKOYUWaIX6ZffOjUwc7DZ1Us4ykXRxlB2Ys4R98z5lY6mQDA +hcTnCPvKTMChcXO3hQ77W3bUPk+p5+XvcDhks8K8N5/Xixj1xoy5J8dmbGvQ9i/R +JZa2loacsPab/c2Fr/6L7DyHU3bbXIh+27HknCUOyK0dekbZ8g0oP+u/qb4VX/7s +BkSbIkLUNq3dBkb0vOAoTry/M2kKpU8Dz/SITuW4bSJqfvNWN2hiT7YTQaNg+E0J +VaaKHhpGO5TrYDnYRfmJyrAiobROEbpoGXg9TvfZ9VLk0sGOPcBN598DNJLkiZCa +dzMrimOOcgeeyPhvG0Mq4ZGBkYgqj88jb29bwJbkCLvjTfaL3kPeKxky1bylgEmR +Vevzqlp9IhrnSW21u0Kd8ZWuXka8ni+uKe2B24FyOZntziODWOi/rFAE7DV21y1V +gZsX2v9kwr/M2ApFpAhtEnF3JHX0sl5J8mF9Wnv0CdJP3fTpC9M0byZsCc2qy84g +5f6KPu57CgvuHG/YRKLDxG7tt1jXYi/LFsR7iGbbCCbthx5pImQrYfKMOdSR81s+ +Iwa8j657nxF+YjM+aq8l7E3g1uonJ2aWT95WFssUnv2ww+O14fw= +=4RIV +-----END PGP SIGNATURE----- Added: head/share/security/patches/EN-19:02/tcp.patch ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/patches/EN-19:02/tcp.patch Wed Jan 9 19:17:54 2019 (r52756) @@ -0,0 +1,56 @@ +--- sys/netinet/tcp_reass.c.orig ++++ sys/netinet/tcp_reass.c +@@ -579,7 +579,8 @@ + */ + lenofoh = tcp_reass_overhead_of_chain(m, &mlast); + sb = &tp->t_inpcb->inp_socket->so_rcv; +- if ((sb->sb_mbcnt + tp->t_segqmbuflen + lenofoh) > sb->sb_mbmax) { ++ if ((th->th_seq != tp->rcv_nxt || !TCPS_HAVEESTABLISHED(tp->t_state)) && ++ (sb->sb_mbcnt + tp->t_segqmbuflen + lenofoh) > sb->sb_mbmax) { + /* No room */ + TCPSTAT_INC(tcps_rcvreassfull); + #ifdef TCP_REASS_COUNTERS +@@ -588,6 +589,11 @@ + #ifdef TCP_REASS_LOGGING + tcp_log_reassm(tp, NULL, NULL, th->th_seq, lenofoh, TCP_R_LOG_LIMIT_REACHED, 0); + #endif ++ if ((s = tcp_log_addrs(&tp->t_inpcb->inp_inc, th, NULL, NULL))) { ++ log(LOG_DEBUG, "%s; %s: mbuf count limit reached, " ++ "segment dropped\n", s, __func__); ++ free(s, M_TCPLOG); ++ } + m_freem(m); + *tlenp = 0; + #ifdef TCP_REASS_LOGGING +@@ -936,6 +942,20 @@ + * is understood. + */ + new_entry: ++ if (th->th_seq == tp->rcv_nxt && TCPS_HAVEESTABLISHED(tp->t_state)) { ++ tp->rcv_nxt += *tlenp; ++ flags = th->th_flags & TH_FIN; ++ TCPSTAT_INC(tcps_rcvoopack); ++ TCPSTAT_ADD(tcps_rcvoobyte, *tlenp); ++ SOCKBUF_LOCK(&so->so_rcv); ++ if (so->so_rcv.sb_state & SBS_CANTRCVMORE) { ++ m_freem(m); ++ } else { ++ sbappendstream_locked(&so->so_rcv, m, 0); ++ } ++ sorwakeup_locked(so); ++ return (flags); ++ } + if (tcp_new_limits) { + if ((tp->t_segqlen > tcp_reass_queue_guard) && + (*tlenp < MSIZE)) { +@@ -960,9 +980,7 @@ + return (0); + } + } else { +- +- if ((th->th_seq != tp->rcv_nxt || !TCPS_HAVEESTABLISHED(tp->t_state)) && +- tp->t_segqlen >= min((so->so_rcv.sb_hiwat / tp->t_maxseg) + 1, ++ if (tp->t_segqlen >= min((so->so_rcv.sb_hiwat / tp->t_maxseg) + 1, + tcp_reass_maxqueuelen)) { + TCPSTAT_INC(tcps_rcvreassfull); + *tlenp = 0; Added: head/share/security/patches/EN-19:02/tcp.patch.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/patches/EN-19:02/tcp.patch.asc Wed Jan 9 19:17:54 2019 (r52756) @@ -0,0 +1,18 @@ +-----BEGIN PGP SIGNATURE----- + +iQKTBAABCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAlw2RhxfFIAAAAAALgAo +aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD +MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n +5cIsjBAAiM9K9Y/ci+sVsH0HrunEbdJT5dI4oabI6Z7zV7X2F5OZobC0neXYCpqH +sknU/phwdWTmSdLlqxI37At2rQPRFnnAF0sfyByJEmnrNq3CPg/cFabvuNWfetPh +wpHQc7XUJAz58Lk5o382Dn4POZP+aBmo1e6ULHIXCcgR8xHvGAtQoCLJFh9VXKZx +tSP+PiwCfHXjIF1J+bEPhv6IO3H59COb5daj1qhTbUnkCmacPBDCFzrSqqbUPOru +MAvXxcUP3mhPDrIx5eDUNo5C1t54PF6fPzBj8Pq+SUKXrHI1PYHxw2yL+y0vn7vT +TImWde+rRdDwzab2mt/IP2WaRnC5wVNS+QHZc9M+QB+ujAx8e278uK/eiJwKkm59 +MShtZ46YB96aoZuLYibk+i53jW7OOJbCH9xwFXvZb2n3ObBfJcqig4aXtvug7BOr +v/90s6Q72jKpJUopgzFut6E2XtJ6ImAvq8qDxo0qLix5vASu57tst/5vyfj4dt79 +AJ05x20KKKKhaNzpnwyOWW4/egeElJPLHg8WsWzwtsRW1ZMWBRIqAzS+dLlDNod9 +ywSbOYb0FMmYe0rtv1gbm5wWjAQ8QYEe/8JoD7y5O04mUVmxmubeYYQ2vAxtxDPs +ODiJtLdALWkPidb8ynn4r5LBYDjQRvni1+3j2E+nCh9Z08nHzzs= +=KVpY +-----END PGP SIGNATURE----- Added: head/share/security/patches/EN-19:03/sqlite-11.patch ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/patches/EN-19:03/sqlite-11.patch Wed Jan 9 19:17:54 2019 (r52756) @@ -0,0 +1,76146 @@ +--- contrib/sqlite3/Makefile.am.orig ++++ contrib/sqlite3/Makefile.am +@@ -1,6 +1,5 @@ + +-AM_CFLAGS = @THREADSAFE_FLAGS@ @DYNAMIC_EXTENSION_FLAGS@ @FTS5_FLAGS@ @JSON1_FLAGS@ @SESSION_FLAGS@ -DSQLITE_ENABLE_FTS3 -DSQLITE_ENABLE_RTREE *** DIFF OUTPUT TRUNCATED AT 1000 LINES *** From owner-svn-doc-head@freebsd.org Wed Jan 9 19:58:06 2019 Return-Path: Delivered-To: svn-doc-head@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id BBB71148D67B; Wed, 9 Jan 2019 19:58:06 +0000 (UTC) (envelope-from bcran@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 5B0E672ABA; Wed, 9 Jan 2019 19:58:06 +0000 (UTC) (envelope-from bcran@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 48B2820CAA; Wed, 9 Jan 2019 19:58:06 +0000 (UTC) (envelope-from bcran@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id x09Jw6lO047346; Wed, 9 Jan 2019 19:58:06 GMT (envelope-from bcran@FreeBSD.org) Received: (from bcran@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id x09Jw5Cb047344; Wed, 9 Jan 2019 19:58:05 GMT (envelope-from bcran@FreeBSD.org) Message-Id: <201901091958.x09Jw5Cb047344@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: bcran set sender to bcran@FreeBSD.org using -f From: Rebecca Cran Date: Wed, 9 Jan 2019 19:58:05 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r52758 - head/share/pgpkeys X-SVN-Group: doc-head X-SVN-Commit-Author: bcran X-SVN-Commit-Paths: head/share/pgpkeys X-SVN-Commit-Revision: 52758 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: 5B0E672ABA X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-2.95 / 15.00]; local_wl_from(0.00)[FreeBSD.org]; NEURAL_HAM_MEDIUM(-1.00)[-0.999,0]; NEURAL_HAM_SHORT(-0.95)[-0.953,0]; ASN(0.00)[asn:11403, ipnet:2610:1c1:1::/48, country:US]; NEURAL_HAM_LONG(-1.00)[-0.998,0] X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 09 Jan 2019 19:58:06 -0000 Author: bcran (src committer) Date: Wed Jan 9 19:58:05 2019 New Revision: 52758 URL: https://svnweb.freebsd.org/changeset/doc/52758 Log: Remove the PGP key for my old account (brucec). Deleted: head/share/pgpkeys/brucec.key Modified: head/share/pgpkeys/pgpkeys-developers.xml head/share/pgpkeys/pgpkeys.ent Modified: head/share/pgpkeys/pgpkeys-developers.xml ============================================================================== --- head/share/pgpkeys/pgpkeys-developers.xml Wed Jan 9 19:18:25 2019 (r52757) +++ head/share/pgpkeys/pgpkeys-developers.xml Wed Jan 9 19:58:05 2019 (r52758) @@ -431,11 +431,6 @@ &pgpkey.alc; - - &a.brucec.email; - &pgpkey.brucec; - - &a.olivier.email; &pgpkey.olivier; Modified: head/share/pgpkeys/pgpkeys.ent ============================================================================== --- head/share/pgpkeys/pgpkeys.ent Wed Jan 9 19:18:25 2019 (r52757) +++ head/share/pgpkeys/pgpkeys.ent Wed Jan 9 19:58:05 2019 (r52758) @@ -77,7 +77,6 @@ - From owner-svn-doc-head@freebsd.org Wed Jan 9 20:10:23 2019 Return-Path: Delivered-To: svn-doc-head@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 9FE1E148E299; Wed, 9 Jan 2019 20:10:23 +0000 (UTC) (envelope-from gordon@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4798973844; Wed, 9 Jan 2019 20:10:23 +0000 (UTC) (envelope-from gordon@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 1ABDF20E66; Wed, 9 Jan 2019 20:10:23 +0000 (UTC) (envelope-from gordon@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id x09KAMe3052724; Wed, 9 Jan 2019 20:10:22 GMT (envelope-from gordon@FreeBSD.org) Received: (from gordon@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id x09KAM6s052723; Wed, 9 Jan 2019 20:10:22 GMT (envelope-from gordon@FreeBSD.org) Message-Id: <201901092010.x09KAM6s052723@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: gordon set sender to gordon@FreeBSD.org using -f From: Gordon Tetlow Date: Wed, 9 Jan 2019 20:10:22 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r52759 - head/share/security/advisories X-SVN-Group: doc-head X-SVN-Commit-Author: gordon X-SVN-Commit-Paths: head/share/security/advisories X-SVN-Commit-Revision: 52759 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: 4798973844 X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-2.98 / 15.00]; local_wl_from(0.00)[FreeBSD.org]; NEURAL_HAM_MEDIUM(-1.00)[-0.999,0]; NEURAL_HAM_LONG(-1.00)[-0.998,0]; NEURAL_HAM_SHORT(-0.98)[-0.980,0]; ASN(0.00)[asn:11403, ipnet:2610:1c1:1::/48, country:US] X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 09 Jan 2019 20:10:23 -0000 Author: gordon (src,ports committer) Date: Wed Jan 9 20:10:22 2019 New Revision: 52759 URL: https://svnweb.freebsd.org/changeset/doc/52759 Log: Correct wrong year in advisory text. Approved by: so Pointy hat to: so Modified: head/share/security/advisories/FreeBSD-EN-19:05.kqueue.asc Modified: head/share/security/advisories/FreeBSD-EN-19:05.kqueue.asc ============================================================================== --- head/share/security/advisories/FreeBSD-EN-19:05.kqueue.asc Wed Jan 9 19:58:05 2019 (r52758) +++ head/share/security/advisories/FreeBSD-EN-19:05.kqueue.asc Wed Jan 9 20:10:22 2019 (r52759) @@ -12,7 +12,7 @@ Module: kqueue Announced: 2019-01-09 Credits: Mark Johnston Affects: FreeBSD 11.2 -Corrected: 2019-11-24 17:11:47 UTC (stable/11, 11.2-STABLE) +Corrected: 2018-11-24 17:11:47 UTC (stable/11, 11.2-STABLE) 2019-01-09 18:57:38 UTC (releng/11.2, 11.2-RELEASE-p8) For general information regarding FreeBSD Errata Notices and Security @@ -108,19 +108,19 @@ The latest revision of this advisory is available at -----BEGIN PGP SIGNATURE----- -iQKTBAEBCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAlw2RdZfFIAAAAAALgAo +iQKTBAEBCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAlw2VMNfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n -5cK0nRAAgPsdkc/TyBTqpvJrvvNaVd0xgNC2lxnYK3HxOPbo5kqj6XHZxb3KvrrN -He6TyGvwGCPHNzlFwHILH+FtFkgrvGVBoPu/U0e/NKRrkhyxPHJMz0bZPu7yqQoG -GDFRIsw5D3JKZW38yMD9Menh3mag81OVZii1LfzkcDLLKfwX/zcx1vV7MSwMzoNs -5L7Fm8lg0uIxrrlKvvmrPxfWoZENhCr9CAAdg8moL3thl64NaVVmPo7tXDXosNGo -EQYT19SY0FBSboUcpVaChgyZaCFzOeCPuXuJPoUYppIWNiv2S8ZTjuq9d1g4R4SD -7GBMozz8EG1rN0pzhx8mVEECZBzdt5rjggiWKjkOVxH/sy5LQjppONK3VVOygoCz -dve2wGq6S1ke/b2NDRpAinmIr8I3x3b7JLNkE5OvNJ6bTLk3ZmpIRYQNYT+eu8Fx -GNe/oTU9DRbB4yv0kcKsypHqQ0cKdn6+duYzKGZ4+c86B7IHJgsYoG/NTKYfFzQx -BHWuI/P/9pakHESNiDidKRz+z5w679+jIfZDcbBIXaw+PCqzg5a1GFN8Bub2mGLw -2wmVQJV1nbdE+6UbWvaV2seV/bo+N/L8k4QS6OPIDUefLPGgCdRFr/MlLoiTaJ43 -p+L3iVlVbiOTCfsCGI/QVQq+IOngKzqSUXN3Ys7PXvvAzSyaTFg= -=fD2U +5cKd6w//TosPdyuAk6CprourETJqeCI8IfeBcErPs1gAXhSw53Qiv0p6vQoPRUK3 +Hy9JjI5+OonvN178ebWMGDuVr5Q6LrFbn1/ZB9/RSwfKnCGAkKqvAxz/fGypwjLn +BDAY3y+opIaLGxxSK9pVdfEqiWtfwsbvQIDLcrFNDdndASWE2vsTJsviQ5jqb/kQ +oja8cAidKy4g2E+afUD7QAQHISNkxmNTQ1ahYnf3XsLIJVllWIIU9h5rH5JhiUpp +A7ZK2ryCQLbgee98UtfMD56cb4tA4sVwomHv6US/U2exUfKDfWQur5g8XYkAoXJ/ +Pn0HfH1ojbMlzqzuiwAmtRvJKP1AjAlpIZXv1Co30yEMTaT3lEilNiQyibYXnYQa +FBCrwyFVxBdQnznNYtHdiM+prQ06j8f76AXoRUt/K/cRLaTtUdTagBVc+Byz9WE4 +2tcVSyx54nP3NRaL6Yp/CuaIhpr68AUvSiU+nJhB9F3oC9TToBjCdm+CAnjvnZVq +OF6whswr8KHAdw48aRACgW9FpnCWGE78R4B9TnISae98KyaLPrsFGoSd4mBEWRYK +eZQWQg92bq8LIfElUW7Pc30Tp5l8GbCaHcyLuzGkBNWCIkQ24ugIay4ZfNoknYQL +CIvp8JUNy3hd9ROGHouyUjPgoBQNIQ1WUlgUZxjglMY2jP/LF/Y= +=htJA -----END PGP SIGNATURE----- From owner-svn-doc-head@freebsd.org Wed Jan 9 20:18:53 2019 Return-Path: Delivered-To: svn-doc-head@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 8E279148EC9E; Wed, 9 Jan 2019 20:18:53 +0000 (UTC) (envelope-from gjb@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 2C7E874601; Wed, 9 Jan 2019 20:18:53 +0000 (UTC) (envelope-from gjb@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 2161121020; Wed, 9 Jan 2019 20:18:53 +0000 (UTC) (envelope-from gjb@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id x09KIq4C058170; Wed, 9 Jan 2019 20:18:52 GMT (envelope-from gjb@FreeBSD.org) Received: (from gjb@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id x09KIqPC058169; Wed, 9 Jan 2019 20:18:52 GMT (envelope-from gjb@FreeBSD.org) Message-Id: <201901092018.x09KIqPC058169@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: gjb set sender to gjb@FreeBSD.org using -f From: Glen Barber Date: Wed, 9 Jan 2019 20:18:52 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r52760 - head/en_US.ISO8859-1/htdocs/releases/12.0R/share/xml X-SVN-Group: doc-head X-SVN-Commit-Author: gjb X-SVN-Commit-Paths: head/en_US.ISO8859-1/htdocs/releases/12.0R/share/xml X-SVN-Commit-Revision: 52760 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: 2C7E874601 X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-2.97 / 15.00]; local_wl_from(0.00)[FreeBSD.org]; NEURAL_HAM_MEDIUM(-1.00)[-0.999,0]; NEURAL_HAM_SHORT(-0.98)[-0.978,0]; ASN(0.00)[asn:11403, ipnet:2610:1c1:1::/48, country:US]; NEURAL_HAM_LONG(-1.00)[-0.998,0] X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 09 Jan 2019 20:18:53 -0000 Author: gjb Date: Wed Jan 9 20:18:52 2019 New Revision: 52760 URL: https://svnweb.freebsd.org/changeset/doc/52760 Log: Document EN-19:01-04. Sponsored by: The FreeBSD Foundation Modified: head/en_US.ISO8859-1/htdocs/releases/12.0R/share/xml/errata.xml Modified: head/en_US.ISO8859-1/htdocs/releases/12.0R/share/xml/errata.xml ============================================================================== --- head/en_US.ISO8859-1/htdocs/releases/12.0R/share/xml/errata.xml Wed Jan 9 20:10:22 2019 (r52759) +++ head/en_US.ISO8859-1/htdocs/releases/12.0R/share/xml/errata.xml Wed Jan 9 20:18:52 2019 (r52760) @@ -19,9 +19,34 @@ - No errata notices. -   -   + FreeBSD-EN-19:01.cc_cubic + 9 January 2019 + Connection stalls with CUBIC congestion + control + + + + FreeBSD-EN-19:02.tcp + 9 January 2019 + TCP connections may stall and eventually fail in + case of packet loss + + + + FreeBSD-EN-19:03.sqlite + 9 January 2019 + sqlite update + + + + FreeBSD-EN-19:04.tzdata + 9 January 2019 + Timezone database information + update From owner-svn-doc-head@freebsd.org Wed Jan 9 20:20:42 2019 Return-Path: Delivered-To: svn-doc-head@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 89F91148EDC7; Wed, 9 Jan 2019 20:20:42 +0000 (UTC) (envelope-from gjb@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 2F1A9747CD; Wed, 9 Jan 2019 20:20:42 +0000 (UTC) (envelope-from gjb@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 1EADA21032; Wed, 9 Jan 2019 20:20:42 +0000 (UTC) (envelope-from gjb@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id x09KKgB5058379; Wed, 9 Jan 2019 20:20:42 GMT (envelope-from gjb@FreeBSD.org) Received: (from gjb@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id x09KKfVK058378; Wed, 9 Jan 2019 20:20:42 GMT (envelope-from gjb@FreeBSD.org) Message-Id: <201901092020.x09KKfVK058378@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: gjb set sender to gjb@FreeBSD.org using -f From: Glen Barber Date: Wed, 9 Jan 2019 20:20:41 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r52761 - head/en_US.ISO8859-1/htdocs/releases/11.2R X-SVN-Group: doc-head X-SVN-Commit-Author: gjb X-SVN-Commit-Paths: head/en_US.ISO8859-1/htdocs/releases/11.2R X-SVN-Commit-Revision: 52761 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: 2F1A9747CD X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-2.98 / 15.00]; local_wl_from(0.00)[FreeBSD.org]; NEURAL_HAM_MEDIUM(-1.00)[-0.999,0]; NEURAL_HAM_SHORT(-0.98)[-0.980,0]; ASN(0.00)[asn:11403, ipnet:2610:1c1:1::/48, country:US]; NEURAL_HAM_LONG(-1.00)[-0.998,0] X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 09 Jan 2019 20:20:42 -0000 Author: gjb Date: Wed Jan 9 20:20:41 2019 New Revision: 52761 URL: https://svnweb.freebsd.org/changeset/doc/52761 Log: Regen after r342902. Sponsored by: The FreeBSD Foundation Modified: head/en_US.ISO8859-1/htdocs/releases/11.2R/errata.html Modified: head/en_US.ISO8859-1/htdocs/releases/11.2R/errata.html ============================================================================== --- head/en_US.ISO8859-1/htdocs/releases/11.2R/errata.html Wed Jan 9 20:18:52 2019 (r52760) +++ head/en_US.ISO8859-1/htdocs/releases/11.2R/errata.html Wed Jan 9 20:20:41 2019 (r52761) @@ -47,7 +47,9 @@ update

FreeBSD-EN-18:15.loader27 November 2018

Deferred kernel loading breaks loader password

FreeBSD-EN-18:16.ptrace19 December 2018

Kernel panic when attaching to stopped process

FreeBSD-EN-18:17.vm19 December 2018

Kernel panic under load on Intel® Skylake™ - CPUs

FreeBSD-EN-18:18.zfs19 December 2018

ZFS vnode reclaim deadlock

4. Open Issues

4. Open Issues

  • FreeBSD/i386 installed on ZFS may crash during boot when the ZFS pool mount is attempted while booting an unmodified GENERIC kernel.

    A system tunable has been added as of revision r286584 to make the From owner-svn-doc-head@freebsd.org Thu Jan 10 17:34:01 2019 Return-Path: Delivered-To: svn-doc-head@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id D6F0114935D4; Thu, 10 Jan 2019 17:34:00 +0000 (UTC) (envelope-from ngie@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 8B29F8DDE1; Thu, 10 Jan 2019 17:34:00 +0000 (UTC) (envelope-from ngie@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 7ECF8774F; Thu, 10 Jan 2019 17:34:00 +0000 (UTC) (envelope-from ngie@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id x0AHY0A4035656; Thu, 10 Jan 2019 17:34:00 GMT (envelope-from ngie@FreeBSD.org) Received: (from ngie@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id x0AHY0j9035655; Thu, 10 Jan 2019 17:34:00 GMT (envelope-from ngie@FreeBSD.org) Message-Id: <201901101734.x0AHY0j9035655@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: ngie set sender to ngie@FreeBSD.org using -f From: Enji Cooper Date: Thu, 10 Jan 2019 17:34:00 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r52762 - head/share/pgpkeys X-SVN-Group: doc-head X-SVN-Commit-Author: ngie X-SVN-Commit-Paths: head/share/pgpkeys X-SVN-Commit-Revision: 52762 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: 8B29F8DDE1 X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-2.95 / 15.00]; local_wl_from(0.00)[FreeBSD.org]; NEURAL_HAM_MEDIUM(-1.00)[-0.999,0]; NEURAL_HAM_LONG(-1.00)[-0.999,0]; NEURAL_HAM_SHORT(-0.96)[-0.957,0]; ASN(0.00)[asn:11403, ipnet:2610:1c1:1::/48, country:US] X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 10 Jan 2019 17:34:01 -0000 Author: ngie (src committer) Date: Thu Jan 10 17:34:00 2019 New Revision: 52762 URL: https://svnweb.freebsd.org/changeset/doc/52762 Log: Update my PGP key following my legal name update This syncs up the remaining reference to my nickname to use my legal name. Approved by: emaste (mentor) Differential Revision: https://reviews.freebsd.org/D18643 Modified: head/share/pgpkeys/ngie.key Modified: head/share/pgpkeys/ngie.key ============================================================================== --- head/share/pgpkeys/ngie.key Wed Jan 9 20:20:41 2019 (r52761) +++ head/share/pgpkeys/ngie.key Thu Jan 10 17:34:00 2019 (r52762) @@ -1,319 +1,65 @@ -uid [jpeg image of size 11571] -sub 4096R/6D072D4A13D70405 2016-05-21 [expires: 2020-05-21] +pub rsa4096/E4914D31978318DE 2018-12-24 [SC] [expires: 2023-12-24] + Key fingerprint = B6FB 7137 A90E 9651 05DE 7997 E491 4D31 9783 18DE +uid Enji Cooper +sub rsa4096/057B0DCA584EE2AC 2018-12-24 [E] [expires: 2023-12-24] ]]> From owner-svn-doc-head@freebsd.org Fri Jan 11 20:46:48 2019 Return-Path: Delivered-To: svn-doc-head@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 98F51149CD32; Fri, 11 Jan 2019 20:46:48 +0000 (UTC) (envelope-from danger@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 3CD0786F41; Fri, 11 Jan 2019 20:46:48 +0000 (UTC) (envelope-from danger@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 31D2F2109E; Fri, 11 Jan 2019 20:46:48 +0000 (UTC) (envelope-from danger@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id x0BKkmaV005280; Fri, 11 Jan 2019 20:46:48 GMT (envelope-from danger@FreeBSD.org) Received: (from danger@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id x0BKklwC005279; Fri, 11 Jan 2019 20:46:47 GMT (envelope-from danger@FreeBSD.org) Message-Id: <201901112046.x0BKklwC005279@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: danger set sender to danger@FreeBSD.org using -f From: Daniel Gerzo Date: Fri, 11 Jan 2019 20:46:47 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r52763 - in head: en_US.ISO8859-1/articles/committers-guide share/xml X-SVN-Group: doc-head X-SVN-Commit-Author: danger X-SVN-Commit-Paths: in head: en_US.ISO8859-1/articles/committers-guide share/xml X-SVN-Commit-Revision: 52763 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: 3CD0786F41 X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-2.98 / 15.00]; local_wl_from(0.00)[FreeBSD.org]; NEURAL_HAM_MEDIUM(-1.00)[-0.999,0]; NEURAL_HAM_SHORT(-0.98)[-0.982,0]; ASN(0.00)[asn:11403, ipnet:2610:1c1:1::/48, country:US]; NEURAL_HAM_LONG(-1.00)[-0.999,0] X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 11 Jan 2019 20:46:48 -0000 Author: danger Date: Fri Jan 11 20:46:47 2019 New Revision: 52763 URL: https://svnweb.freebsd.org/changeset/doc/52763 Log: - add instructions for FreeBSD.org SMTP access setup Reviewed by: bcr, mat, rpokala, allanjude Differential Revision: https://reviews.freebsd.org/D18708 Modified: head/en_US.ISO8859-1/articles/committers-guide/article.xml head/share/xml/docbook50.dtd Modified: head/en_US.ISO8859-1/articles/committers-guide/article.xml ============================================================================== --- head/en_US.ISO8859-1/articles/committers-guide/article.xml Thu Jan 10 17:34:00 2019 (r52762) +++ head/en_US.ISO8859-1/articles/committers-guide/article.xml Fri Jan 11 20:46:47 2019 (r52763) @@ -36,6 +36,7 @@ 2016 2017 2018 + 2019 The &os; Documentation Project @@ -91,6 +92,13 @@ + SMTP Host + smtp.FreeBSD.org:587 + (see also ). + + + src/ Subversion Root svn+ssh:// without warning if space needs to be freed, so forward it or save it elsewhere. + + If your e-mail system uses SPF with strict rules, you + should whitelist mx2.FreeBSD.org from + SPF checks. + + Due to the severe load dealing with SPAM places on the central mail servers that do the mailing list processing, the front-end server does do some basic checks and will @@ -2255,6 +2270,69 @@ freebsd-mfc-after = 2 weeks lists. The subscriptions are derived from the access rights. + + + SMTP Access Setup + + For those willing to send e-mail messages through the + FreeBSD.org infrastructure, follow the instructions + below: + + + + Point your mail client at smtp.FreeBSD.org:587. + + + + Enable STARTTLS. + + + + Ensure your From: address is set + to + yourusername@FreeBSD.org. + + + + For authentication, you can use your &os; Kerberos + username and password (see ). The + yourusername/mail + principal is preferred, as it is only valid for + authenticating to mail resources. + + + Do not include @FreeBSD.org + when entering in your username. + + + + + + Additional notes + + + + Will only accept mail from + yourusername@FreeBSD.org. + If you are authenticated as one user, you are not + permitted to send mail from another. + + + + A header will be appended with the SASL username: + (Authenticated sender: + username). + + + + Host has various rate limits in place to cut down + on brute force attempts. + + + + Modified: head/share/xml/docbook50.dtd ============================================================================== --- head/share/xml/docbook50.dtd Thu Jan 10 17:34:00 2019 (r52762) +++ head/share/xml/docbook50.dtd Fri Jan 11 20:46:47 2019 (r52763) @@ -3429,7 +3429,7 @@ > - +