summaryrefslogtreecommitdiff
path: root/internal/href/testdata/undeadly.org
diff options
context:
space:
mode:
Diffstat (limited to 'internal/href/testdata/undeadly.org')
-rw-r--r--internal/href/testdata/undeadly.org405
1 files changed, 405 insertions, 0 deletions
diff --git a/internal/href/testdata/undeadly.org b/internal/href/testdata/undeadly.org
new file mode 100644
index 0000000..ba7b7ef
--- /dev/null
+++ b/internal/href/testdata/undeadly.org
@@ -0,0 +1,405 @@
+<!DOCTYPE html>
+<html lang="en">
+<head>
+<meta charset="UTF-8">
+<meta name="viewport" content="width=device-width, initial-scale=1">
+<link rel="stylesheet" href="themes/default.css" title="default/standard theme">
+
+
+<link rel="alternate" type="application/xml" title="RSS" href="https://undeadly.org/cgi?action=rss">
+<title>OpenBSD Journal: A resource for the OpenBSD community</title>
+</head>
+<body>
+
+<header id="page_hdr">
+
+
+
+
+
+<div id="logo">
+<a href="/cgi?action=front"><img src="images/MangaRamblo_25_x.png" alt="Front page"></a>
+</div>
+
+<div id="search">
+<form action="https://undeadly.org/cgi" method="post">
+<input type="hidden" name="action" value="search">
+<input id="f_q" type="text" name="q" required>
+<input type="submit" title="We canardly search!" name="submit" value="Search site">
+</form>
+</div>
+
+<p class="branding">OpenBSD Journal</p>
+
+<nav id="menubar">
+<p><a href="/cgi?action=front">Home</a>
+<a href="/cgi?action=archive">Archives</a>
+<a href="/cgi?action=about">About</a>
+
+<a href="https://undeadly.org/cgi?action=submit">Submit Story</a>
+<a href="https://undeadly.org/cgi?action=register">Create Account</a>
+<a href="https://undeadly.org/cgi?action=login">Login</a>
+</p>
+</nav>
+
+
+<h1 id="front">OpenBSD Journal</h1>
+</header>
+
+
+<main>
+<div id="primary">
+
+<article class="story" id="s20180115073406">
+<header class="story_item_hdr">
+<h1 class="story_subj"><a href="/cgi?action=article;sid=20180115073406">CPU microcode update code for amd64</a></h1>
+<p class="attrib">Contributed by
+<a href="https://undeadly.org">Paul 'WEiRD' de Weerd</a>
+on <time datetime="2018-01-14T11:37:59Z">2018-01-14</time>
+from the not-very-firm-ware dept.</p>
+</header>
+<div class="story_text">
+<p>Patrick Wildt (<kbd>patrick@</kbd>) recently <a href="https://marc.info/?l=openbsd-cvs&amp;m=151570987406841&amp;w=2">committed</a> some code that will update the Intel microcode on many Intel CPUs, a diff initially written by Stefan Fritsch (<kbd>sf@</kbd>). The <a href="https://en.wikipedia.org/wiki/Microcode">microcode</a> of your CPU is basically the firmware that runs on your (Intel) processor, defining its instruction set in terms of so called "microinstructions". The new code depends, of course, on the corresponding firmware package, <a href="https://marc.info/?l=openbsd-ports-cvs&amp;m=151561760123386&amp;w=2">ported</a> by Patrick which can be installed using a very recent <a href="https://man.openbsd.org/fw_update">fw_update(1)</a>. Of course, this all plays into the recently revealed problems in Intel (and other) CPUs, <a href="https://spectreattack.com/">Meltdown and Spectre</a>.</p>
+
+</div>
+<p><a href="/cgi?action=article;sid=20180115073406">Read more&hellip;</a></p>
+<div class="x_cmds_status">
+<p><span class="x_cmds"><a href="/cgi?action=article;sid=20180115073406">3 comments (4d15:34 ago)</a>
+</span></p>
+</div>
+</article>
+<article class="story" id="s20180110090224">
+<header class="story_item_hdr">
+<h1 class="story_subj"><a href="/cgi?action=article;sid=20180110090224"><i>Handling of CPU bugs disclosure 'incredibly bad': OpenBSD's de Raadt</i></a></h1>
+<p class="attrib">Contributed by
+<a href="http://www.openbsdfoundation.org/donations.html">rueda</a>
+on <time datetime="2018-01-09T08:54:53Z">2018-01-09</time>
+from the we-are-not-amused dept.</p>
+</header>
+<div class="story_text">
+<p><a href="https://www.itwire.com/"><i>ITWire</i></a>
+has published
+<a href="https://www.itwire.com/security/81338-handling-of-cpu-bug-disclosure-incredibly-bad-openbsd-s-de-raadt.html">an article</a>
+regarding Theo de Raadt's (<kbd>deraadt@</kbd>) reaction to the
+<i>Meltdown</i>/<i>Spectre</i> disclosures.</p>
+<p>One choice quote reads:
+<blockquote>
+Intel engineers attended the same conferences as other company engineers, and read the same papers about performance enhancing strategies – so it is hard to believe they ignored the risky aspects.
+</blockquote>
+</p>
+
+</div>
+
+<div class="x_cmds_status">
+<p><span class="x_cmds"><a href="/cgi?action=article;sid=20180110090224">2 comments (10d23:46 ago)</a>
+</span></p>
+</div>
+</article>
+<article class="story" id="s20180109082916">
+<header class="story_item_hdr">
+<h1 class="story_subj"><a href="/cgi?action=article;sid=20180109082916">OpenBSD-current now has 'smtpctl spf walk'</a></h1>
+<p class="attrib">Contributed by
+<a href="http://bsdly.blogspot.com/">Peter N. M. Hansteen</a>
+on <time datetime="2018-01-09T06:17:51Z">2018-01-09</time>
+from the check-my-senders dept.</p>
+</header>
+<div class="story_text">
+If you run a mail service, you probably like to have greylisting in place, via <a href="https://man.openbsd.org/spamd">spamd(8)</a> or similar means. However, there are some sites that simply do not play well with greylisting, and for those it's useful to extract <a href="https://en.wikipedia.org/wiki/Sender_Policy_Framework">SPF</a> information to identify their valid outgoing SMTP hosts.
+<p>
+Now OpenBSD offers a straightforward mechanism to do that and fill your nospamd table, right from the <a href="https://man.openbsd.org/smtpctl">smtpctl</a> utility via the subcommand <tt>spf walk</tt>. Gilles Chehade (gilles@) describes how in a recent blog post titled <a href="https://poolp.org/posts/2018-01-08/spfwalk/">spfwalk</a>.
+<p>
+This feature is still in need of testing, so please grab a snapshot and test!
+<p>
+
+</div>
+
+<div class="x_cmds_status">
+<p><span class="x_cmds"><a href="/cgi?action=article;sid=20180109082916">1 comment (13d17:00 ago)</a>
+</span></p>
+</div>
+</article>
+<article class="story" id="s20180106082238">
+<header class="story_item_hdr">
+<h1 class="story_subj"><a href="/cgi?action=article;sid=20180106082238">Response to the &quot;Meltdown&quot; Vulnerability</a></h1>
+<p class="attrib">Contributed by
+<a href="http://www.openbsdfoundation.org/donations.html">rueda</a>
+on <time datetime="2018-01-06T06:27:49Z">2018-01-06</time>
+from the moronoculture dept.</p>
+</header>
+<div class="story_text">
+<p>A
+<a href="https://marc.info/?l=openbsd-tech&amp;m=151521435721902">message to <kbd>tech@</kbd></a>
+from Philip Guenther (<kbd>guenther@</kbd>) provides the first public
+information from developers regarding the OpenBSD response to the recently
+announced
+<a href="https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"><abbr>CPU</abbr> vulnerabilities</a>:
+<blockquote><pre>So, yes, we the OpenBSD developers are not totally asleep and a handful of
+us are working out how to deal with Intel's fuck-up aka the Meltdown
+attack. While we have the advantage of less complexity in this area (e.g.,
+no 32bit-on-64bit compat), there's still a pile of details to work through
+about what has to be *always* in the page tables vs what can/should/must be
+hidden.</pre>
+</blockquote>
+<p><a href="https://marc.info/?l=openbsd-tech&amp;m=151521435721902">Read it</a>
+and weep&hellip;</p>
+
+</div>
+
+<div class="x_cmds_status">
+<p><span class="x_cmds"><a href="/cgi?action=article;sid=20180106082238">2 comments (15d13:10 ago)</a>
+</span></p>
+</div>
+</article>
+<article class="story" id="s20171229080944">
+<header class="story_item_hdr">
+<h1 class="story_subj"><a href="/cgi?action=article;sid=20171229080944">BSDCAN2017 Interview with Peter Hessler, Reyk Floeter, and Henning Brauer</a></h1>
+<p class="attrib">Contributed by
+<a href="http://www.openbsdfoundation.org/donations.html">rueda</a>
+on <time datetime="2017-12-29T03:51:20Z">2017-12-29</time>
+from the Oxford comma dept.</p>
+</header>
+<div class="story_text">
+<p>In a
+<a href="https://marc.info/?l=openbsd-misc&amp;m=151450488816852">message to <kbd>misc@</kbd></a>,
+Tom Smyth wrote (in part):</p>
+<blockquote><pre>While attending BSDCAN2017 in Ottawa I met many OpenBSD Developers,
+and I was fortunate to grab a few moments and video an interview
+with Peter Hessler, Henning Brauer and Reyk Floeter and talk to
+them about OpenBSD generally,
+I really appreciate the guys generosity in their time on the
+interview
+I have posted the video here
+<a href="https://www.youtube.com/watch?v=e-Xim3_rJns">https://www.youtube.com/watch?v=e-Xim3_rJns&amp;feature=youtu.be</a>
+</pre></blockquote>
+<p>Nice work, Tom!</p>
+
+</div>
+
+<div class="x_cmds_status">
+<p><span class="x_cmds"><a href="/cgi?action=article;sid=20171229080944">No comments</a>
+</span></p>
+</div>
+</article>
+<article class="story" id="s20171208082246">
+<header class="story_item_hdr">
+<h1 class="story_subj"><a href="/cgi?action=article;sid=20171208082246"><kbd>pledge()</kbd> work in progress</a></h1>
+<p class="attrib">Contributed by
+<a href="http://www.openbsdfoundation.org/donations.html">rueda</a>
+on <time datetime="2017-12-08T08:22:46Z">2017-12-08</time>
+from the (the) man on pledge dept.</p>
+</header>
+<div class="story_text">
+<p>In a
+<a href="https://marc.info/?l=openbsd-tech&amp;m=151268831628549">message to <kbd>tech@</kbd></a>,
+Theo de Raadt (<kbd>deraadt@</kbd>) provided some insights into ongoing
+work on <a href="https://man.openbsd.org/pledge.2"><kbd>pledge(2)</kbd></a>:</p>
+<blockquote><pre>
+I wanted to give an update that a two pledge-related changes are being
+worked on. The semantics and integration are complicated so it is
+taking some time.
+</pre></blockquote>
+
+</div>
+<p><a href="/cgi?action=article;sid=20171208082246">Read more&hellip;</a></p>
+<div class="x_cmds_status">
+<p><span class="x_cmds"><a href="/cgi?action=article;sid=20171208082246">No comments</a>
+</span></p>
+</div>
+</article>
+<article class="story" id="s20171208082238">
+<header class="story_item_hdr">
+<h1 class="story_subj"><a href="/cgi?action=article;sid=20171208082238"><kbd>arm64</kbd> platform now officially supported [and has <kbd>syspatch(8)</kbd>]</a></h1>
+<p class="attrib">Contributed by
+<a href="http://www.openbsdfoundation.org/donations.html">rueda</a>
+on <time datetime="2017-12-08T08:22:38Z">2017-12-08</time>
+from the not so armless dept.</p>
+</header>
+<div class="story_text">
+<p><a href="https://www.openbsd.org/arm64.html"><kbd>arm64</kbd></a> is now an
+officially supported platform for OpenBSD.
+As some readers will have <a href="https://fastly.cdn.openbsd.org/pub/OpenBSD/syspatch/6.2/arm64/">noticed</a>,
+there's now
+<a href="https://man.openbsd.org/syspatch.8"><kbd>syspatch(8)</kbd></a> support, too.</p>
+<p>Theo de Raadt (<kbd>deraadt@</kbd>) committed the following change:</p>
+<blockquote><pre>
+CVSROOT: /cvs
+Module name: www
+Changes by: deraadt@cvs.openbsd.org 2017/12/07 12:00:12
+
+Modified files:
+ . : plat.html
+
+Log message:
+graduate arm64 to supported; having syspatch it is even beyond some other systems
+</pre></blockquote>
+
+</div>
+
+<div class="x_cmds_status">
+<p><span class="x_cmds"><a href="/cgi?action=article;sid=20171208082238">5 comments (43d8:52 ago)</a>
+</span></p>
+</div>
+</article>
+<article class="story" id="s20171205045703">
+<header class="story_item_hdr">
+<h1 class="story_subj"><a href="/cgi?action=article;sid=20171205045703">s2k17 Hackathon Report: Stefan Sperling (stsp@) on wireless (iwm(4), athn(4) and more) progress</a></h1>
+<p class="attrib">Contributed by
+<a href="http://bsdly.blogspot.com/">Peter N. M. Hansteen</a>
+on <time datetime="2017-12-05T04:57:03Z">2017-12-05</time>
+from the snowshoe puffy dept.</p>
+</header>
+<div class="story_text">
+<blockquote>
+I could not travel to the Toronto t2k17 hackathon earlier this year,
+in circumstances which left me with a voucher for an already purchased
+intercontinental flight ticket and hiking clothes I had bought for
+a trip into the Canadian mountains.
+</blockquote>
+
+</div>
+<p><a href="/cgi?action=article;sid=20171205045703">Read more&hellip;</a></p>
+<div class="x_cmds_status">
+<p><span class="x_cmds"><a href="/cgi?action=article;sid=20171205045703">2 comments (44d4:30 ago)</a>
+</span></p>
+</div>
+</article>
+<article class="story" id="s20171126090055">
+<header class="story_item_hdr">
+<h1 class="story_subj"><a href="/cgi?action=article;sid=20171126090055">Reflections on Hackathons</a></h1>
+<p class="attrib">Contributed by
+Bob Beck
+on <time datetime="2017-11-26T09:00:55Z">2017-11-26</time>
+from the hacks from the wild dept.</p>
+</header>
+<div class="story_text">
+<p>Bob Beck (<kbd>beck@</kbd>) writes:</p>
+<blockquote>
+<p>So, I am sitting in my kitchen with a car packed full of food, packing up my last things
+and getting ready to drive south for a Hackathon. This one is a little different, since it is
+in a wilderness hut I have to hike/ski into.. If the hike doesn't kill me, living for 5 days inside
+a structure heated by wood where Germans are present to stoke the fire might. So here's
+a bit of a ramble about hackathons.</p>
+</blockquote>
+
+</div>
+<p><a href="/cgi?action=article;sid=20171126090055">Read more&hellip;</a></p>
+<div class="x_cmds_status">
+<p><span class="x_cmds"><a href="/cgi?action=article;sid=20171126090055">5 comments (54d18:03 ago)</a>
+</span></p>
+</div>
+</article>
+
+
+</div>
+<div id="extras">
+
+<div class="extra">
+<h2>Donate!</h2>
+<p>Donate to <a href="http://www.openbsd.com/donations.html">OpenBSD</a></p>
+</div>
+
+<div class="extra">
+<h2>Features</h2>
+<p>We are constantly on the lookout for stories of how you put OpenBSD to work.
+Please submit any informative articles on how OpenBSD is helping your company.</p>
+</div>
+
+<div class="extra">
+<h2>Earlier Articles</h2>
+<ul><li><time datetime="2017-11-20">Mon, Nov 20</time><ul><li><b><time datetime="2017-11-20T07:59:03Z">07:59</time></b>
+<a href="/cgi?action=article;sid=20171120075903">p2k17 Hackathon report: Antoine Jacoutot on ports+packages progress</a>
+(2)</li>
+</ul></li>
+<li><time datetime="2017-11-18">Sat, Nov 18</time><ul><li><b><time datetime="2017-11-18T19:03:25Z">19:03</time></b>
+<a href="/cgi?action=article;sid=20171118190325">Official OpenBSD 6.2 CD set - the only one to be made!</a>
+(7)</li>
+</ul></li>
+<li><time datetime="2017-11-13">Mon, Nov 13</time><ul><li><b><time datetime="2017-11-13T23:53:34Z">23:53</time></b>
+<a href="/cgi?action=article;sid=20171113235334">p2k17 Hackathon report: Florian Obser on network stack progress, kernel relinking and more</a>
+(3)</li>
+<li><b><time datetime="2017-11-13T09:18:07Z">09:18</time></b>
+<a href="/cgi?action=article;sid=20171113091807">p2k17 Hackathon Report: Landry Breuil on Mozilla things and much more</a>
+(4)</li>
+</ul></li>
+<li><time datetime="2017-11-10">Fri, Nov 10</time><ul><li><b><time datetime="2017-11-10T12:46:56Z">12:46</time></b>
+<a href="/cgi?action=article;sid=20171110124656">p2k17 Hackathon Report: Anthony J. Bentley on firmware, games and securing pkg_add runs</a>
+(2)</li>
+<li><b><time datetime="2017-11-10T12:46:45Z">12:46</time></b>
+<a href="/cgi?action=article;sid=20171110124645">p2k17 Hackathon report: Sebastian Reitenbach on Puppet progress</a>
+(0)</li>
+</ul></li>
+<li><time datetime="2017-11-09">Thu, Nov 09</time><ul><li><b><time datetime="2017-11-09T17:14:47Z">17:14</time></b>
+<a href="/cgi?action=article;sid=20171109171447">p2k17 Hackathon report: Christian Weisgerber on random devices, build failures and gettext</a>
+(4)</li>
+</ul></li>
+<li><time datetime="2017-11-08">Wed, Nov 08</time><ul><li><b><time datetime="2017-11-08T07:21:17Z">07:21</time></b>
+<a href="/cgi?action=article;sid=20171108072117">p2k17 Hackathon report: Jeremy Evans on ruby progress, postgresql and webdriver work</a>
+(0)</li>
+</ul></li>
+<li><time datetime="2017-11-07">Tue, Nov 07</time><ul><li><b><time datetime="2017-11-07T22:52:58Z">22:52</time></b>
+<a href="/cgi?action=article;sid=20171107225258">Paul Irofti (pirofti@) on hotplugd(8), math ports, xhci(4) and other kernel advancements</a>
+(2)</li>
+</ul></li>
+</ul>
+
+</div>
+
+<div class="extra">
+<h2>OpenBSD Errata</h2>
+<p id="errata_vers"><i>OpenBSD 6.2</i></p>
+<table id="errata_tbl">
+<tr><td><a href="https://www.openbsd.org/errata62.html#p004_libssl"><span class="erratum_num">004</span></a></td><td><span class="erratum_date">2018-01-14</span> <span class="erratum_kind">RELIABILITY</span> <span class="erratum_desc">An incorrect TLS extensions block is generated when no extensions are present, which can result in handshake failures. </span></td></tr>
+<tr><td><a href="https://www.openbsd.org/errata62.html#p003_mpls"><span class="erratum_num">003</span></a></td><td><span class="erratum_date">2017-12-10</span> <span class="erratum_kind">RELIABILITY</span> <span class="erratum_desc">A number of bugs were discovered in the MPLS stack that can be used to remotely trigger kernel crashes. </span></td></tr>
+<tr><td><a href="https://www.openbsd.org/errata62.html#p002_fktrace"><span class="erratum_num">002</span></a></td><td><span class="erratum_date">2017-12-01</span> <span class="erratum_kind"><strong class="security_erratum">SECURITY</strong></span> <span class="erratum_desc">The fktrace(2) system call had insufficient security checks.</span></td></tr>
+<tr><td><a href="https://www.openbsd.org/errata62.html#p001_tcb_invalid"><span class="erratum_num">001</span></a></td><td><span class="erratum_date">2017-10-13</span> <span class="erratum_kind">RELIABILITY</span> <span class="erratum_desc">A local user could trigger a kernel panic by using an invalid TCB value.</span></td></tr>
+</table>
+
+<p><a href="/errata/errata.rss"><img src="images/xml.gif" alt="Unofficial RSS feed of OpenBSD errata"></a></p>
+</div>
+
+<div class="extra">
+<h2>OpenBSD Resources</h2>
+<ul>
+<li><a href="http://openports.se">OpenBSD Ports Tracker</a></li>
+<li><a href="http://www.onlamp.com/bsd/">OReilly BSD DevCenter</a></li>
+<li><a href="http://daemonforums.org/">OpenBSD discussions</a></li>
+<li><a href="http://hup.hu/taxonomy/term/67">Hungarian OpenBSD news</a></li>
+<li><a href="http://bsdforums.unixro.net/forum/16">Romanian OpenBSD Discussions</a></li>
+<li><a href="http://obsd.ru/">Russian OpenBSD community</a></li>
+</ul>
+</div>
+
+<div class="extra">
+<h2><abbr>XML</abbr>/<abbr>RSS</abbr>/<abbr>RDF</abbr></h2>
+<p>Users wishing <abbr>RSS</abbr>/<abbr>RDF</abbr> summary files of <em>OpenBSD Journal</em>
+can retrieve: <a href="/cgi?action=rss"><img src="images/xml.gif" alt="RSS feed"></a></p>
+</div>
+
+<div class="extra">
+<h2>Credits</h2>
+<p id="credits">Copyright &copy;
+<time datetime="2004">2004</time>-<time datetime="2008">2008</time>
+<a href="http://www.benzedrine.ch/dhartmei.html">Daniel Hartmeier</a>.
+All rights reserved.
+Articles and comments are copyright their respective authors,
+submission implies license to publish on this web site.
+Contents of the archive prior to
+<time datetime="2004-04-02">April 2nd 2004</time> as well as images
+and HTML templates were copied from the fabulous original
+<a href="http://web.archive.org/web/20010331150409/http://deadly.org/">deadly.org</a> with
+<a href="http://monkey.org/~jose">Jose</a>'s and
+<a href="mailto:jamesp@deadly.org">Jim</a>'s kind permission.
+This journal runs as <abbr>CGI</abbr> with
+<a href="https://man.openbsd.org/httpd.8">httpd(8)</a>
+on <a href="https://www.openbsd.org/">OpenBSD</a>, the
+<a href="/src/">source code</a> is
+<a href="http://www.opensource.org/licenses/bsd-license.php">BSD licensed</a>.
+undeadly \Un*dead"ly\, a. Not subject to death; immortal. [Obs.]</p>
+
+</div>
+
+</div>
+</main>
+
+</body>
+</html>