libera/#devuan/ Thursday, 2021-10-07

psionicrwp lmao i did it under my 20 years sa career so many times even when doublechecking DD00:23
psionicmy other worldclass screwups were being logged in on a plethora of servers and rebooting or shutting down the worng server00:23
psionicso I just renamed both halt shutdown poweroff reboot on those00:23
psionicLaughs Out Loud00:23
systemdleteIf ssh server is set to "PermitRootLogin prohibit-password" then I try to set up root passwordless login, I can't login to so much as copy local root's  public key to the server!00:25
systemdleteDo I need to set it to "yes" temporarily to do this first?00:26
systemdlete(this one has me scratching my head)00:26
systemdletesorry if this is sysadmin 101 stuff...00:27
sadsnorksystemdlete, I believe some people [not me] use ssh-copy-id somehow, but rather than temporarily changing your sshd_config it might be easier to connect once as a user (with a password rather than key) and su to paste in your authorized_keys for root.00:33
systemdletessh-copy-id won't work either because it blocks all ssh access00:34
systemdleteand you are right, maybe that is only way to do this00:35
ham5urgIs there a filesystem which preserves a file before it is rw-opened? So a rsync would sync the file in it last closed version. E.g. a user rw-opens many files, alter these and let these stay open over night. In such case, I would like to synchronize the last closed version of any file.00:42
sadsnorkAssuming you've done a fresh Devuan install, there is very likely a non-priv user account already that should allow you to quickly push your key to the root account.  If you have a fancy SSH client [I like asbru-cm] you might also find that it has a way to script it too. :-)00:43
rwpsystemdlete, You have the center of the problem understood.  I think the way people use PermitRootLogin without-password is to set up the key in the image ahead of time so it is available at the first boot.02:25
systemdleteI've figured out a means for myself here.  Thanks.02:25
rwpPersonally I believe in math and use long random generated passwords.  Therefore I have no fear about "PermitRootLogin yes".  It cannot be guessed.02:26
rwpThe default Devuan installation will set up the install user that you create at install time as able to either su or sudo to root.02:27
rwpSo...  Interactively one can log in as that user, then su or sudo to root, then install the ssh key, and then after doing that manually "PermitRootLogin without-password" works.02:27
adhocrwp: having strong passwords is great02:28
adhocrwp: most people don't though02:28
adhocI don't see the point in sudo02:29
adhocbut it does make some people happy not to have to remember a second password02:30
adhocand the XKCD joke ...02:31
rwpI use both su and sudo.  But right, some people just turn their nose up, screw up their face, stand upside down, and just refuse to think about having TWO passwords, for user and for root.  So in that case sudo is good for them.02:36
rwpFor passwords if it is something you can remember then it isn't random enough.  I use "pwgen -s 16 3" most often to generate 3 random passwords from which I will pick one.02:37
Hydragyrumrwp, passphrases > passwords02:55
Hydragyruma 16-char random password's got less entropy than a 3-5 word passphrase02:55
rwpUhm...  What?  Is that plausible?  I would like an independent audit to check our math. :-)02:56
rwpFor that though we get offtopic and should escape to #devuan-offtopic02:57
fluffywolfsome quick math says there's about a billion times as many 16-char passwords as 5-word passwords.02:59
fluffywolfactually, only 4.6 million.03:00
* fluffywolf did less-quick math the second time03:00
fluffywolf~$ echo "96^16 / $(wc -l /usr/share/dict/words | cut -d ' ' -f 1) ^ 5" | bc03:01
fluffywolf462188003:01
fluffywolfbut, yeah, they're both very very large numbers.03:01
rwpThat is not a great dictionary though as people will not be using those as "words" to choose from.03:01
rwpBetter to use something like the EFF's curated word list of practical words for a passphrase.  https://www.eff.org/deeplinks/2016/07/new-wordlists-random-passphrases03:01
fluffywolf#words^5 is 11259548834977651098112001, which is a big number.03:02
fluffywolfbah.  that's just for people who don't want their auto-generated passwords for customers to be "fuck e magnetohydrodynamic bewusstseinslage yiff".  :P03:05
rwpThe practical EFF list of is 7776 words.  7776^5=28,430,288,029,929,701,376 which is certainly a very big number.  62^16=47,672,401,706,823,533,450,263,330,816 which also being a large number is also an even larger number.03:08
rwpIn either case though I think we can all be confident that it would not be possible to brute force through a networked ssh login attempt.03:09
fluffywolfexcept in the real world, 5% of them are "password"...03:09
rwpIt's heat death of the universe in either case.  Plus fail2ban (FTW!) will drop repeated failing attempts automatically.  Highly recommended.03:09
rwphttps://en.wikipedia.org/wiki/List_of_the_most_common_passwords03:10
fluffywolfI get so many failed ssh logins that I finally gave up and changed the port on both my servers.03:10
fluffywolfone of my servers was getting unintentionally DOSed trying to handle all of them.03:10
fluffywolflooks like password being 5% is outdated.  now 4% is 123456?   :P03:11
onefangAlas fail2ban needs some work, otherwise it fails2ban.04:45
fluffywolflol04:46
Xenguy"I'm sorry Sir, you're *cough* fails to ban..."04:48
hyrcanushow do i disable gtk's drag and drop for all apps, e.g. in firefox05:34
hyrcanusi want to never see anything drag05:34
Xenguyoh gawd05:34
hyrcanusi need to hilight a url in ddg results05:34
hyrcanusand i cannot because i get a drag event05:34
XenguySounds like a difficult and obscure problem, maybe05:35
XenguyIs it a #gtk thing?05:36
hyrcanusi'll try gtk-dnd-drag-threshold=2861 in .gtkrc-2.005:37
hyrcanusoh maybe it's  gtk_drag_check_threshold05:38
golinuxMouse problem?05:38
hyrcanusno, try to hilight a youtube url in ddg results05:38
golinuxMine is currently acting up with right click options05:38
golinuxI do that all the time05:39
golinuxafk05:39
hyrcanusincreasing drag threshold worked. i can hilight ddg results again05:42
XenguyThere's hope, after all05:43
hyrcanuscourse ddg corrupts the copied text with their javascript05:43
hyrcanusi told them don't allow code in browsers05:43
XenguyBut they wouldn't listen05:43
hyrcanusthe spirit of satan lives in their hearts05:44
XenguyAnd there you have it05:44
hyrcanusyup disabling script gets me an uncorrupted text05:45
XenguyWell all hail freedom then05:46
hyrcanushigh drag threshold fixes gimp too05:47
XenguyYou got it made in the shade05:48
hyrcanusa good start for /etc/hosts http://0x0.st/-g5P.txt09:30
UsLI hate paste sites that blocks Tor..09:31
UsLand silently like 0x0.st does as well.. No 403 or anything. Just empty screen.09:32
hyrcanushttps://gist.github.com/djaiss/85a0ada83e6bca68e41e  has some of them09:34
hyrcanusi find i have to chattr +i /etc/hosts09:38
hyrcanuswhat is removing it?09:38
hyrcanusshould firewall it as well ofc09:39
UsLdon't know. Firewall your hosts file? How do you mean?09:44
hyrcanusegress; run through the list, get ip addresses, add to blocklist in iptables09:47
hyrcanusfor those things that bypass host dns09:47
UsLah, I see.09:47
hyrcanusmight do better with a whitelist actually09:48
UsLI have yet to encounter such a thing. Only thing that bypass hosts here is the local http proxy which is chained to Tor.09:51
UsLerr, I totally switched dns and hosts right now. I need sleep. Gnight.09:55
hyrcanusttyl09:55
DPAI just upgraded to chimaera. I still have a small problem though. It replaced wicd with NetworkManager. Now I can't connect to WLAN, it says I'm unauthorized. It seams there is no polcit agent running. How can I fix this?14:59
DPA*polkit agent14:59
DPAI can't start one either. There seams to be something wrong with the XDG_RUNTIME_DIR...15:02
DPAAnd the path in the DBUS_SESSION_BUS_ADDRESS doesn't exist. That seams familiar.15:03
gnarfacepolkit agent maybe just missing? it would be in another package15:05
gnarface apt-cache search ^libpolkit-agent15:06
gnarface dpkg -l |grep 'polkit.agent'15:06
DPAI have a few installed. I remember I did something in the lightdm config once which probably got overwritten in the update, I'll have to check what that was.15:07
gnarfaceDPA: if you changed graphical logins, it might have also changed which permissions backend library you need to use15:16
gnarfacein ascii and beowulf it wasn't smart enough to pick the right one, it would just install both and they would choke each other15:16
gnarfacei assume that problem has still persisted into chimera if you're having trouble with it15:16
gnarfacein theory installing the right one and/or removing the others should fix it15:17
gnarfaceat least if it's the same problem as before15:17
DPANo, that's fine here.15:17
DPASee, the permission backend stuff is all elogind: https://pastebin.com/0KtEAis715:20
systemdleteMy logwatch report tells me that ssh changed a users password -- I did not change ANY passwords anywhere yesterday.   So what does this really mean?  (I am assuming that the wording is misleading)17:23
GyrosGeiersingle-user box?17:23
systemdleteyes17:23
GyrosGeierbecause passwords can be changed during login if they are expired, but the user notices that generally17:24
systemdleteI'm not following, sorry.17:24
GyrosGeierthe other thing that may have happened would be a hash change17:24
systemdleteThe only way I know of to change passwords on *nix is to go to the command line (once logged in that is) and run "passwd"17:25
GyrosGeiere.g. if that is the first login after an upgrade, then it can replace the encrypted hash of the password with a new one17:25
systemdletewhat do you mean by "after an upgrade" -- upgrade of what exactly?17:26
GyrosGeierwhole system17:26
systemdleteno, nothing like that here17:26
GyrosGeiermore specifically, the "shadow" package17:26
GyrosGeierthere is a system-wide default for what hashing algorithm should be used for passwords, and the algo that was actually used is also encoded in the password field17:26
onefangWhat was the actual log text?17:27
GyrosGeierso when the default changes, old passwords are checked against the hash with the old method, and then the hash is rewritten with the new algo17:27
systemdleteChanged users password:17:27
systemdlete    sshd changed password: 1 Time(s)17:27
systemdlete(from the logwatch report)17:27
GyrosGeiersystemdlete, the actual log line would be interesting, not just the summary17:28
systemdleteLet me be absolutely clear:  I did not run "passwd" anwhere at anytime for any login anywhere yesterday17:29
onefangMight be the "sshd" user had their password changed.  Logwatch can be a little ambiguous sometimes.17:29
hyrcanusfrom /var/log/auth.log.*17:29
systemdleteOct  6 23:36:19 mysys usermod[6731]: change user 'sshd' password17:30
systemdleteOct  6 23:36:20 mysys chage[6736]: changed password expiry for sshd17:30
systemdlete(hostname obfuscated)17:30
systemdleteI DID install openssh-server around that time17:31
onefangThat looks like what I said then.17:31
gnarfacesystemdlete: it's saying usermod changed sshd's password17:32
systemdleteok, but I did not run usermod. Something else did, like apt maybe?17:32
gnarfacenever noticed this before but i would also assume it coincides with the post-installation setup of openss-server17:32
gnarfaceopenssh-server17:32
gnarfacei mean17:33
onefangSo you install opennsh-server, IT creates the sshd user, and sets their password.17:33
systemdleteyeah, I figured this out now, thanks.  That has got to be the most misleading advertisement I've ever seen.  I actually thought it was telling me that someone had managed to login into my system to hijack it.17:34
gnarfacei'm honestly not sure sshd is supposed to have a password but maybe it says that even if it's setting it to "no password"17:34
gnarfacei would double-check the groups, passwd and shadow files to make sure nothing looks insane17:34
onefangLike I said, logwatch can be ambiguous.  For along time I was wondering what sort of error a "Level error" was.  lol17:35
systemdleteNo, this makes sense to me now.17:35
gnarfacethere should also be an apt log you can use to verify that the installation time of openssh-server coincides17:35
onefangWhen I eventually saw "Level critical" as well the shoe dropped.17:36
systemdleteI'm no longer concerned.  I wish apt and its friends would be a little bit clearer in its terminology and organization.  But given that is a debian thing, I suppose that17:36
systemdletewill not ever get fixed.17:36
gnarfacei have hope for the future but we'll have to fix the public school system first17:37
hyrcanusby ending it17:37
systemdletegnarface: +117:38
systemdletenot sure "ending it" will improve matters17:38
systemdletebut this is getting OT17:39
systemdletethanks for confirming my suspicions and addressing my concerns, everyone.  I feel relieved.17:39
hyrcanuswhy do you think people who can afford to, send their kids to private schools17:43
hyrcanusgive the people back their school tax money and let them choose which school to send their child to17:43
onefangTake that to #devuan-offtopic.17:44
hyrcanusyou wouldn't want the government choosing your OS for you17:44
hyrcanusi'm sorry, joerg decided he didn't want me talking in -offtopic17:46
hyrcanushowever i've corrected gnarface's error and am done with that subject17:46
gnarfaceoh, now i know why they silenced you in -offtopic17:47
gnarfacethat was unacceptably hostile and wrong-minded17:47
hyrcanusthat's a syntax error18:11
joergtriggers (incomplete list): *) start a conversation thread with an obviously false and conflict triggering statement that makes all trolling-sensors yell  *) repeatedly use expletive attacks and ad-hominem, as well as NSFW dusgusting speech  *) threaten people  *) spread potentially hazardous life-threatening advise or fake news  *) threaten chanop to extort them a certain measure zaken or not taken  *) cause other users to ask chanops to take action to sort the18:30
joergsituation18:30
buZzlol18:32
buZzjoerg: I'LL JUMBLE THE LETTERS IN YOUR NAME IF YOU KEEP THIS UP18:32
buZzJEORG!18:32
buZz:D18:32
buZzlolol18:32
joergnot related to "speaking in $cahnnel" - those triggers apply universally18:32
* joerg pricks buzz' back with a long thin stick18:37
buZz<318:37
* buZz hugs joerg 18:37
hyrcanusyou should stop lying, joerg18:40
joergyou should wake up from that nightmare you're in18:42
joergsee, I don't even intend to make the horror worse for you by calling for a citation showing a lie of me which you can't provide without exposing your own misconceptions and weird intentions18:47
joergand I call for staying on-topic in this channel now. If you want to continue this you're welcome to PM me (well... :-x)18:48
hyrcanusontopic, what kid introduced tmpfs19:04
hyrcanusah it's just being used by the python idiots for things it shouldn't19:05
hyrcanus"i don't want to keep these gigabytes of downloads, so I'll use tmpfs"19:06
hyrcanus /dropkick19:06
hyrcanusthey should have kept the name shmfs19:17
hyrcanushttps://rwmj.wordpress.com/2012/09/12/tmpfs-considered-harmful/19:25
hyrcanusso lets fix devuan guys19:26
hyrcanusand restore a sane /tmp19:26
hyrcanusthat means not allowing lunatics to lead you19:27
fluffywolfis there something wrong with /tmp?19:27
hyrcanusso who in debian or devuan decided to put /tmp in ram19:53
hyrcanusand shouted down all the sane opposition19:53
gnarfaceis this in chimaera?19:54
gnarfaceor is this with the live image?19:55
gnarfaceor auto-partitioning or something?19:55
gnarfacewhere exactly are you alleging the default changed?19:56
hyrcanusthis was a long time ago gnarface19:57
hyrcanuswe really should figure out who was for it19:57
gnarfacei never use the auto-partitioner so it isn't something i've seen19:57
hyrcanus /tmp is supposed to be a partition on a hard drive, not ram19:57
fluffywolf/tmp in ram sounds fine to me.  it's been like that for a very long time.19:58
gnarfacei sometimes put it in ram for certain hardware (raspberry pi with only flash storage for example)19:58
hyrcanusmaybe it's a remnant from the ubuntu i converted from.  anyway yeah19:58
fluffywolfdebian always wiped the partition on boot back when it was a partition19:58
gnarfacenot always, they started doing it in like sarge or etcher i think19:59
gnarfacebut i think it's supposed to be wiped19:59
gnarfacebsd always wiped it19:59
fluffywolfit's been long enough that I don't remember when it changed.  :)19:59
fluffywolfhaving it in ram seems like a perfectly good default.19:59
hyrcanusnow i remember when they started pushing this19:59
fluffywolfwhat advantage to having it on disk is so important to you?20:00
gnarfaceyou're supposed to use /var/tmp if you want it to persist, though i think for some reason i remember hearing they started flushing that one too anyway now or symlinked them together or some shit20:00
fluffywolfif you were counting on it persisting across reboots, that is very, very much not what /tmp is or has ever been for.20:01
hyrcanusthis is a fine example of how corrupting the word / label of a thing can lead to lots of confusion and harm down the road20:01
fluffywolfwhat confusion or harm has occured?20:02
hyrcanusramfs, shmfs were sensible, emphasizing the qualitative difference in the nature of it20:02
hyrcanus'tmpfs' obscures the important distinction, confuses people, makes them think it's "for temporary files"20:02
fluffywolfagain, what confusion or harm has occured?  a real example of a non-idiotic situation where this is a problem.20:03
gnarfaceeh, i don't disagree but i don't see that it's a big deal either20:03
fluffywolfof course it makes them think it's for temporary files.  that's because it's for temporary files.  this is the opposite of confusing?20:03
gnarfacei remember being briefly confused about it but not past when someone explained to me how it works; after that the name didn't really matter to me20:04
fluffywolflet me guess, you came up with some broken use case where you expected /tmp to persist over a reboot, and it didn't work, and now it's the entire rest of the world's problem?20:04
gnarfacehehe /usr/local/var/tmp20:05
fluffywolfit's been tempfs since kernel 2.4 apparently.  you'd think if it were some major problem, someone would have noticed by now.20:05
fluffywolftmpfs20:05
fluffywolfit's been literally more than 20 years.20:07
fluffywolfbbl, time for work20:07
rwpI use /tmp tmpfs but there are situations where it is problematic due to the way /tmp might be used.20:08
rwpEngineering applications sometimes write HUGE files into /tmp that exceed all working space.  Couple that with Linux memory overcommit and the OOM Killer and that is a problem.20:09
rwpBut technical users like that are free to make sweeping customizations as needed to support their workflow.  I always disable Linux memory overcommit for example.20:10
fluffywolftmpfs won't use more than half of ram and will swap if needed, I believe.  but, for odd use cases, it's trivial to make it a directory or partition.20:10
fluffywolfbbl20:10
rwpLater! :-)20:10
rwpAlso the Linux distribution default has been to purge /tmp on boot for literally decades.  Some people disable it.  But purging avoids some class of problems since /tmp is used for system stuff that becomes stale on a reboot.20:12
rwpTherefore /var/tmp has become the Linux system location for persistent storage.  Meaning in mutt I set tmpdir="/var/tmp" to avoid losing my compose mail if the system crashes.20:13
rwpThis is all outside of whether /tmp is a tmpfs or not.  But given a purge of /tmp on boot then making it a tmpfs isn't awful.20:13
DPAI have PCs where I mount tmp, and I have some where I forgot. In most cases, it doesn't matter. On my linux phone, I make it a tmpfs, because I want to prolong the lifetime of the internal non-replacable emmc. And in my PXE environment, I use a readonly NFS as root, so I need tmpfs there too.20:14
hyrcanusdo you also disable the OOM killer in sysctl.conf rwp?20:14
hyrcanuswhen you disable overcommit20:15
rwpRight DPA.  It's one of those complex problems that needs good understanding of the ram versus disk versus updated flush tradeoffs.20:15
rwpYes hyrcanus I disable overcommit in /etc/sysctl.d/vm.conf with "vm.overcommit_memory = 2" there.20:16
hyrcanusdo you also set vm.oom-kill = 0 rwp?20:16
rwpAnd then programs get failures from fork() and malloc() which they can handle, rather than having the kernel OOM Killer try to guess what to do.20:17
rwphyrcanus, I do not set vm.oom-kill = 0 since I don't think vm.oom-kill is a valid setting on any kernel I use.  Did you make a typo there?20:23
zeronHey guys! I'd like to report something that MIGHT be a bug: installing a barebones system from Chimaera netinstall.iso sith expert install creates an incomplete sources.list file -- it does not include the main repo `deb http://deb.devuan.org/merged chimaera` -- it's just isn't there. All the others are present -- chimaera-updates, chimaera-security and even chimaera-backports, but not the main one.20:25
zeronWithout this repo nothing can be installed -- tasksel isn't working, DE uninstallable, even aptitude could not be installed. I had to manually add `deb http://deb.devuan.org/merged chimaera main` to the sources in order for it to work. Now I can install stuff.20:27
hyrcanusthanks rwp.  i didn't make a typo.20:28
rwpzeron, That does sound frightening!  During the installation there is a dialog that asks about setting up sources.list, which then stores the answer as a debconf thing.  Let me look that up...20:28
rwpzeron, Which installer image did you use?  (There are several possible.)20:30
zeronI was using devuan_chimaera_4.0.beta-20210927_amd64_netinstall.iso20:32
rwpzeron, Thanks! I am going to try it now and see if I can reproduce it.20:34
rwpUnfortunately the folks who I think really need to look are not in the channel at the moment.20:34
zeronDuring the installation there was a question of whther to use deb.devuan.org or pkgmaster.-something...  But no other question relating to sources.20:34
rwpJust as background there pkgmaster is the master so please avoid hits there if possible (I don't know why they even offer it as a choice) and deb.devuan.org is the mirror network.20:35
zeron@rwp, but you can pass this information on to those who need to know it? I have to go offline.20:36
rwpThanks for the report zeron!  I'll try to reproduce it and pass it along later when the-ones-who-know come online.20:36
zeronWhen I opened sources.list it was the pkgmaster that was listed. I changed it to deb.devuan.org.20:36
zeronThanks!20:37
golinuxPosting a note about the repos now.20:51
rwpgolinux, I note that devuan_chimaera_4.0.beta-20210927_amd64_netinstall.iso has been superseded by devuan_chimaera_4.0.beta-20211004_amd64_netinstall.iso already.20:58
golinuxrwp . . . I just put a note for rrq to check the issues mentioned above.  IIUC new isos are generated every Monday.21:05
rwpgolinux, I just ran through a basic install using devuan_chimaera_4.0.beta-20211004_i386_netinstall.iso and resulted in this https://paste.debian.net/plain/1214655 sources.list file.21:19
rwpAt the sources dialog I selected deb.devuan.org not pkgmaster but pkgmaster still appeared for the security lines.21:20
rwpI am imagining that someone saw "security" upgrades and thought _avoid all mirrors_.  But is that a good or bad thing here?21:22
golinuxI have posted these notes for rrq21:26
rwpAnyway...  As such I am unable to reproduce the issue reported by zeron.  I did have sources.list entries with the main repo and specifically tried tasksel since that was mentioned and it worked.21:26
golinuxReally appreciate your testing.  That was above and beyond!21:26
rwpI have been meaning to spend more time on chimaera installation.  I have a couple of upgraded systems.  But haven't been working through the installer for it.21:27
rwpInteresting that while at tasksel I unselected all to install only the basics (to speed things along) no desktop and I do not have either wicd or network-manager installed.21:28
rwpIt's installed ifupdown and that has DHCP'd okay no problem.  But from the reports I had expected NM to have been installed.21:28
rwpI guess that is only pulled in if a DE is selected for installation.21:29
rwphttps://paste.debian.net/plain/1214656 shows that if I install the default DE then network-manager is pulled in.21:30
rwpSo far everything looks to be all correct, other than using pkgmaster for security which is debatable good or bad.21:31
rwpI'll note that I did the install in a VM and that was why I selected the 386 iso as the result is smaller RAM footprint than the amd64 image.21:32
rwpI usually install small VMs as 386 and install bare metal as amd64.21:32
rwpAs an experiment I logged into this new pristine chimaera VM using ssh.  Then did "apt-get install connman" which I considered a dangerous action over ssh.22:47
rwpEverything installed okay up until "Starting Connection Manager:" appeared.  At that point it re-DHCP'd a new address.  Which of course hung the ssh connection.22:48
rwpI was able to then ssh back in using the new IP address.  Everything seemed okay at that point and connmand and dhclient is running.22:48
rwpAlong with wpa_supplicant too.  Which is odd as there is no WiFi devices on this system.  So I wonder what wpa_supplicant would do in that case.22:49

Generated by irclog2html.py 2.17.0 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!