/srv/irclogs.ubuntu.com/2012/10/11/#ubuntu-server.txt

uvirtbotNew bug: #1065320 in nova (main) "/var/lib/nova/volumes is owned by root after Folsom upgrade" [Undecided,New] https://launchpad.net/bugs/106532000:16
=== guampa|2 is now known as guampa
=== cpg is now known as cpg|away
uvirtbotNew bug: #1064735 in maas "maas-cli tag commands needs help " [Undecided,Confirmed] https://launchpad.net/bugs/106473500:46
uvirtbotNew bug: #1064737 in maas "Adding a new tag with empty string as the definition parameter causes maas-cli to hang" [Undecided,Confirmed] https://launchpad.net/bugs/106473700:46
Iskorptix_hi, whats the default version of perl in latest ubuntu server ?00:52
ironhalik_Hello00:53
bigjoolshttps://launchpad.net/ubuntu/+source/perl00:53
ironhalik_I am using Ubuntu Server 12.04, and the notification about updates, when you login via ssh, seems to be missing00:53
Iskorptix_bigjools thanks00:54
sarnoldis pam_motd.so still in your /etc/pam.d/* configs?00:54
ironhalik_sarnold: nope00:55
sarnoldironhalik_: in my /etc/pam.d/sshd:00:56
sarnold# Print the message of the day upon successful login.00:56
sarnoldsession    optional     pam_motd.so # [1]00:56
sarnold(yes, even with # [1] -- no idea what that refers to)00:56
ironhalik_hmm, isn't it provided by landscape?00:57
ScottKNo00:57
ironhalik_I remeber landscape having something to do with the motd displaying packages that needed updating00:58
sarnoldlandscape provides a similar buyt different display01:03
=== shantorn_ is now known as shantorn
patdk-lapironhalik_, you mean, /usr/lib/update-notifier/update-motd-updates-available01:05
patdk-lapdefently not part of landscape01:05
ironhalik_ah, then I was thinking about the load, etc info01:06
uvirtbotNew bug: #1065331 in dbconfig-common (main) "variables defined in maintanier script overriden by global config" [Undecided,New] https://launchpad.net/bugs/106533101:06
patdk-lapironhalik_,  /usr/lib/update-notifier/update-motd-cpu-checker01:06
patdk-lapoh opps, not that one :)01:06
ironhalik_patdk-lap: either way, the info about new packages is not showing01:06
patdk-lapwell, then your missing update-notifier01:07
patdk-lapor update-motd01:07
ironhalik_nah, I've got update-motd01:07
ironhalik_does update-notifier really requires 193 packages :>01:08
ironhalik_?01:08
patdk-lapif you install the gui one01:08
ironhalik_Hmm, dunno - I tried out ubuntu server on a VM, it had a nice update notification01:09
ironhalik_(the default image from ubuntu.com)01:09
ironhalik_on my VPS, its lacking it01:09
patdk-lapI always use minimal/jeos install, so I never have it01:11
ironhalik_I kinda liked it :)01:11
patdk-laplikely you just need update-motd and update-notifier-common01:11
ironhalik_ah, finally!01:12
ironhalik_had update-motd, needed update-notifier-common01:12
ironhalik_thanks guys!01:12
=== ironhalik_ is now known as ironhalik
Iskorptix_hi, how I can enable root login over ssh ? PermitRootLogin yes is not enough in sshd config02:13
Iskorptix_I know I shouldn't be doing that, but I need it to be enabled02:14
qman__it is enabled by default, but root doesn't have a password by default02:14
qman__to log in as root over SSH, use SSH keys02:14
qman__you should not under any circumstance allow root login with a password, that's just asking for a bot to break in02:15
uvirtbotNew bug: #1065055 in maas (main) "celeryconfig_cluster.py imports utility method from maas (import_settings)" [Undecided,In progress] https://launchpad.net/bugs/106505502:16
sarnoldqman__++02:19
qman__I usually turn off root login altogether as a failsafe, but using good keys and keeping those keys secured is reasonably safe02:20
qman__allowing password authentication, no matter how good your passwords are, is not very safe at all02:21
qman__because it only takes one mistake to accidentally set that password to something weak or to leak it out somehow02:21
qman__and it's a one-factor attack, the username is known02:22
qman__if you prevent root from logging in, you've increased the difficulty02:22
qman__because the attacker has to know your user name too02:22
qman__admittedly not the most secure information, but an unknown is an unknown02:22
Iskorptix_qman__ agree, but machine is not visible to the internet, so its safe02:25
Iskorptix_anway, thanks02:26
qman__it's still bad practice and you shouldn't do it02:26
qman__even if it isn't now, it could be later, or it could be reachable and you just don't know it02:26
Iskorptix_well, I used to think like that, but recently come to conclusion, that machines should make life easier, not harder02:26
qman__keys are easier than passwords02:26
Iskorptix_sometimes its good to use passwords02:26
sarnoldkeys are _way_ easier than passwords02:27
sarnoldfaster02:27
sarnoldmore reliable02:28
sarnoldsafer02:28
sarnoldless hassle02:28
sarnoldkeys++ :)02:28
qman__generate keys, add your public key to /root/.ssh/authorized_keys, done02:29
Iskorptix_from operator view yes, but not from the user02:29
sarnoldoh yes, they're also far easier to audit after the faact :)02:29
sarnoldIskorptix_: heh, even on my blackberry, keys are easier. :)02:29
qman__but they are easier02:29
Iskorptix_one simple example02:29
qman__and anybody who doesn't think so really has no business using root access02:30
Iskorptix_or you know what, I think this discussion is going nowhere, not worth time waste ;)02:30
sarnoldperhaps, you're not about to convince me that passwords are better :) I've been there, gave that up eight years ago.02:31
qman__keys have limitations, in that you have to have them with you to gain access02:32
qman__but that's a _good_ limitation02:32
qman__you don't want to log into your system from just any random machine02:32
sarnoldnot without otpw or something02:33
qman__if you think for even a second that that random hotel kiosk isn't keylogging you, you're sorely mistaken02:33
qman__yeah02:33
qman__OTP is the exception to that, but that's not easy to set up02:33
qman__if a machine is trustworthy, it's under your control or the control of someone you trust, and distributing keys to it or using them from a flash drive is simple and easy to do02:34
Iskorptix_one thing I know for sure is that there is no better replacement for authentication than radius02:36
Iskorptix_passwords, keys or anything else is just beyond that02:36
qman__that's fine for user logins, but you're talking about root02:36
Iskorptix_not sure what you mean ?02:38
qman__root doesn't belong in your centralized auth system02:38
qman__he's the local admin on each machine02:38
Iskorptix_ok, I would allow root access from the specific hosts ?02:40
Iskorptix_or, not sure would be wrong if I would allow direct root login from anywhere within the network if I would know that network is invisible to others02:41
qman__well, in a good setup, you'd only allow root access when absolutely necessary, like in a cluster02:41
qman__and you'd use sudo or su and a standard user account for admin purposes02:42
Iskorptix_sude is waste of time imho, not sure why debian flawors using it, but anyway, thats my oppinion02:42
pmp6nlHello, what is a match block?02:42
Iskorptix_if someone already got single user access and trying to gain root, one day he will succed02:42
Iskorptix_is just a matter of time02:42
sarnoldpmp6nl: from sshd_config ?02:43
Iskorptix_better think of "how to prevent bad guys inside network" not just how to secure root02:43
pmp6nlsarnold, yes02:43
sarnoldIskorptix_: :)02:43
qman__securing the network is important, but it's also important to secure in depth02:45
qman__allowing root access directly is forfeiting that layer of protection02:45
qman__you're putting all your eggs in one basket02:45
Iskorptix_you are looking into this from very short perspective02:45
qman__also, by using a non-root user and sudo, they have to guess two things, not just one02:45
Iskorptix_have you ever managed systems with lots of users ?02:46
qman__plenty02:46
Iskorptix_doesn't look so02:46
qman__we have over 2200 machines in our systems02:46
qman__at work02:46
Iskorptix_what I'm trying to say, is that you should look into this from broader view, not just than "how to keep root safe"02:47
Iskorptix_a good example could be two factor auth02:47
Iskorptix_and problem with root password is "relatively" shorted02:48
qman__keeping root safe is paramount to keeping your systems secure02:48
qman__and by not allowing root to log in, you're gaining almost as much as a two factor auth02:48
Iskorptix_you said that you have 2200 machines in your system02:48
Iskorptix_ok, I believe you02:48
ScottKAlso if you use sudo, you get a log of who did what as root, which is very important when doing an autopsy on a multi-user system.02:48
Iskorptix_how many users accessing/managing such systems ?02:49
qman__you can also manage root access in an easy way with sudo02:49
qman__I don't actually know, going to guess about 300002:49
Iskorptix_ok what happens when one or more than one user will become evil and will try to access protected data02:50
Iskorptix_will you get noticed about that ?02:50
qman__the file security isn't that tight on most of them02:51
qman__we can, however, look back at who did what, when, if asked02:51
pmp6nlHello, I am trying to use unison to sync ubuntu server with ubuntu desktop.  unison keeps timing out (scanning takes too long?) Any ideas?02:52
Iskorptix_yeah, you will only find if user is pretty much short of unix systems02:52
Iskorptix_but if the "right" person will join your company, gain your trust and you give him root02:52
Iskorptix_you systems will be compromised and you wont get noticed about that02:53
Iskorptix_so concluding about what I'm arguing here is02:53
qman__you're arguing that by not securing root you're somehow defending yourself against corporate espionage02:53
qman__not following the logic there, to be honest02:53
qman__our systems don't do much to guard data over what's typical, but they have very good logging02:54
qman__and we have good backups02:55
qman__there's room for improvement, but keeping good practices is important to move in the right direction02:55
Iskorptix_simply I just saying that securing root is not enough, you should think about more security countermeasures02:55
qman__of course it isn't enough alone02:56
qman__but not securing root is like leaving your front door open02:56
Iskorptix_well, if you believe that loging and backups will save you against disaster, than I don't have to say much here02:56
qman__they don't avert disaster, they're for disaster recovery02:56
qman__and disaster recovery comes before averting disaster on the priority list02:57
Iskorptix_there are so many ways to breach the system, that only limit is the imagination02:57
Iskorptix_and backups and logs wont save your seat in plane02:57
qman__you can't prevent all disasters, but you can prepare for them02:58
qman__and keeping good backups and logs is easier than fixing every possible hole02:58
qman__so yes, backups and logs come first02:58
Iskorptix_that is why large corporations have dedicated people who work only on security within corporation, starting with employes and ending with everyone else02:58
qman__this is basic operating principle02:58
qman__you've picked the wrong person to lecture on security02:59
Iskorptix_[05:58:18] <qman__> you can't prevent all disasters, but you can prepare for them02:59
Iskorptix_that is just wrong, if you follow this then basically you do not know from where it comes02:59
qman__that's just a fact of life, things happen02:59
qman__you can't stop everything02:59
Iskorptix_so as I said earlier, if the right man is hired to compromise your system and if one of the job options is to delete everything02:59
qman__that doesn't mean you shouldn't try03:00
Iskorptix_then you are doomed03:00
qman__but you can't stop everything, and you have to be prepared for that situation03:00
Iskorptix_you can stop, if you do not know how, then its your problem03:00
Iskorptix_end of story.03:00
pmp6nlShould I be worried about:03:00
pmp6nlvar/log/auth.log:Oct  7 07:44:31 bison sshd[23288]: reverse mapping checking getaddrinfo for 115.1103:00
pmp6nl3.148.214.static-pune.vsnl.net.in [115.113.148.214] failed - POSSIBLE BREAK-IN ATTEMPT!03:00
qman__pmp6nl, only if you have a whole bunch of them03:01
pmp6nlqman__, I do, at least a few dozen03:01
qman__in which case you should implement some measure to restrict it, like fail2ban or -m recent on your firewall03:01
pmp6nlqman__, I have fail2ban installed.  I will look up -m?03:02
qman__pmp6nl, it's a module for iptables, the recent module, which can slow down incoming connections03:02
qman__but fail2ban should be plenty03:02
qman__make sure your passwords are strong, or preferrably, use keys instead03:02
pmp6nlqman__, I am using keys and no root.  I dont know if I configured fail2ban -- does that need much configuration?03:03
qman__no, the stock configuration is fine03:03
qman__it will allow a few attempts, then stop them03:03
Iskorptix_qman__, don't be upset, it just looks that you are looking into security thing that you have already lost a war03:03
Iskorptix_for example me, I love full control of things03:03
qman__the idea is to not allow nearly enough attempts to actually break in03:03
Iskorptix_starting from the first packet which comes within the network03:03
pmp6nlqman__, ok.  Should I still see all of those attempts in the log, even though i have fail2ban installed03:04
qman__Iskorptix_, it's impossible to defend against every possible attack03:04
Iskorptix_and if you have systems which has more users than you, then you should only use the things which fit the best, not only partially03:05
qman__not all possible attacks are even known, many are not possible to defend against, and many your users simply will not tolerate the defense of03:05
Iskorptix_qman__, can you imagine how people would react during job interview if candidate would answer with such pessimism ?03:06
qman__that is not an excuse to ignore best practices03:06
qman__it's not pessimism, it's fact03:06
Iskorptix_how can you know its a fact ?03:06
qman__your denying it shows your level of ignorance when it comes to security03:06
qman__pmp6nl, you should still see around 5-10 per attacker03:06
qman__but then they should stop after that03:07
Iskorptix_its not me, but its you03:07
Iskorptix_how you think most bussiest and largest internet systems keep running for years with being hacked ?03:07
Iskorptix_they thinked about every possible way of breach03:07
Iskorptix_simple as that03:07
qman__Iskorptix_, it's simple fact, new vulnerabilites are discovered daily; therefore, they were unknown the previous day, and therefore not defendable03:08
sarnoldIskorptix_: honestly, qman__'s "not all possible attacks are even known" shows that he's paid attention to the last two decades of security :)03:08
qman__as new vulnerabilites are discovered, they take time to fix03:08
qman__meaning known, but not defendable03:08
qman__and some vulnerabilies are by design in software your users need03:08
Iskorptix_vulnerabilites only dicovered if code is bad, but if code is ok, then there is no vulnerabilites03:08
qman__and therefore cannot be fixed03:08
sarnoldooof, never seen such head-in-the-sand-ism...03:09
qman__yeah03:09
qman__security, not just computer security, all security, is a matter of risk calculation03:09
sarnoldqman__: btw, you may like to investigate pam_apparmor; it's not quite the tool I'd like it to be, yet, but it may help with locking users down to a subset of data...03:09
qman__defend well enough that most attacks will not succeed03:09
qman__and prepare to deal with a successful attack03:10
qman__because it will happen eventually03:10
sarnoldayup.03:11
sarnoldsee kernel.org.03:11
sarnoldshoulda been tight and good. small user base. constrained needs..03:11
pmp6nlqman__, I saw way more than that: http://pastebin.com/JKiBWTLa03:12
qman__pmp6nl, yeah, looks like your fail2ban either isn't working or is set a bit too lax03:13
qman__check if it's enabled using sudo iptables -L03:13
qman__you should see a fail2ban chain03:13
pmp6nlqman__, http://pastebin.com/8YEyq2Nk03:14
qman__yeah, definitely enabled03:15
pmp6nlok, do I need to change anything?03:15
qman__doesn't look to me like anything to worry about, check the fail2ban log, I think /var/log/fail2ban03:16
qman__it looks like that client opened a bunch of connections before authenticating to get more attempts in03:17
qman__even so, with that number of attempts, it'd take decades to brute force03:17
qman__you could adjust the fail2ban settings, or implement the recent module to further reduce that attack03:18
qman__but unless it looks like that all the time, with new attacks every few minutes every day, I wouldn't worry about it too much03:18
pmp6nlqman__, ok thanks. The log file looks like http://pastebin.com/ke1QdEnW03:21
qman__hmm, that doesn't look good03:22
qman__it was working but then it started producing errors03:22
pmp6nlqman__, any way to fix it?03:23
qman__oh, that error is in stopping, not starting03:24
qman__looks like it's working, it was just restarted a few times, probably a bug in the stopping portion03:24
pmp6nlok thanks qman__  ... do you know anything about unison03:24
qman__rebooted or restarted fail2ban or your firewall recently?03:24
qman__no, I don't03:25
pmp6nlqman__, I think I may have.  I was having some ssh issue and running through a few things03:25
qman__ok, makes sense then03:25
qman__judging by that log, you may want to increase the ban time03:25
qman__looks like the same hosts are getting banned and unbanned a lot, so increasing that ban time would reduce the number03:26
qman__but, it's doing its job03:26
pmp6nlhow do I increase the ban time?03:26
qman__should be a config file for fail2ban in /etc somewhere with those parameters03:26
qman__namely maxretry = 6, findtime = 600, and bantime = 120003:27
qman__I'd increase the bantime to 2400 or 360003:28
pmp6nlok thanks. I will take a look.  Appreciate help!03:28
=== n0ts_off is now known as n0ts
=== chincloud is now known as Guest10796
uvirtbotNew bug: #1065372 in qemu-kvm (main) "kvm not working on my 64bit Vista64 Ultimate vm.  I am assuming it is my cpu that can't handle the hardware virtualization" [Undecided,New] https://launchpad.net/bugs/106537204:31
=== cpg|away is now known as cpg
=== chilicuil is now known as chilicui1
=== dendrobates is now known as dendro-afk
=== smb` is now known as smb
henkjanhmm, augeas lense for sysctl does not include /etc/sysctl.d/*07:43
henkjannot in precise, but even not in quantal07:43
=== mcclurmc_away is now known as mcclurmc
AdvoWorkjust booted my brand new ubuntu server,and it came up like: login: init: plymouth-splash main process (442) terminated with status 1   any ideas please?09:09
thierry_good moning everyone!09:22
thierry_i've a question please! i need to disable login on start for my ubuntu-server09:22
thierry_so that i can get the shell command right away on start!09:23
=== doko_ is now known as doko
=== uksysadmin is now known as itarchitectkev
=== n0ts is now known as n0ts_off
DavieyI love the fact we install language-pack-gnome-en on precise. :/10:09
RoyKon server?10:09
* RoyK diverts Daviey to https://bugs.launchpad.net/10:10
DavieyRoyK: I've added that to my bookmarks. Thanks.10:10
koolhead17Daviey: :P10:11
jamespagezul, bug 1062160 worthy of attention for quantal?10:45
uvirtbotLaunchpad bug 1062160 in python-swiftclient "python-swiftclient fails install if the swift package is installed" [High,Confirmed] https://launchpad.net/bugs/106216010:45
DavieyFAILURE is not a package install option !10:55
=== cpg is now known as cpg|away
UlfrHello all, I suspect Squid is the cause of a major bug I've been experiencing and I'm not at all sure how to go about troubleshooting it. Any advice?11:10
zuljamespage: yep11:23
jamespagezul, you ok to pickup?11:23
zuljamespage:  yep after i wake up :)11:24
blackdexHello there11:25
blackdexwhy is anacron not installed by default on server edition but is on desktop editons???11:25
patdk-lapblackdex, cause you did something strange?11:27
patdk-lapit's installed on all of my servers, and I normally use the minimal install setting11:27
blackdexnope.. just a default install of ubuntu server 12.04 LTS11:27
blackdexi have it on multiple servers11:27
patdk-lapoh wait11:28
blackdexnow the /etc/cron.daily etc.. didn't run11:28
patdk-lapit doesn't install anacron for me, but cron11:28
blackdexok.. so it's not just me then :P11:28
patdk-lapmy daily does run though11:29
blackdexhmm11:29
blackdexin /etc/crontab there stands this11:29
blackdex25 6    * * *   root    test -x /usr/sbin/anacron || ( cd / && run-parts --report /etc/cron.daily )11:29
blackdexbut that doesn't seems to work11:30
blackdexstrange11:30
patdk-lapI have the same11:30
patdk-lapand in my /etc/cron.daily I have stuff that updates files from the net11:30
blackdexit looks like it should run11:30
patdk-lapand those files are updates daily, just checked11:31
blackdexstrange11:31
patdk-lap2012-10-11 06:5311:31
patdk-lapin fact, happened just alittle bit ago :)11:31
patdk-lapyou sure the script you put in there runs ok? without a user shell?11:32
patdk-lapah, that is why it isn't installed11:34
patdk-lapanacron runs the /etc/cron.* stuff if the system is powered off11:34
patdk-lapsince servers normally never poweroff, it's not really needed11:34
patdk-lapbut it makes sure they run on desktops/laptops that are normally powered off during the time it would normally run those things11:35
AlexOHey, I'm trying to open the 3306 port in order to acce to mysql from outside so I did : "iptables -A INPUT -p tcp --dport 3306 -j ACCEPT" but the port is still "closed" When i'm trying to connect using telnet on 3306 I get connection Refused any ideas?11:35
patdk-lapalex0, normally -A won't help11:36
patdk-lap-I would, if it's really a firewall issue11:36
patdk-lapbut more likely mysql isn't listening on your external ip11:36
blackdexah.. hmmmm11:36
AlexO-I is the interface right?11:36
patdk-lapdid you check netstat?11:36
blackdexwell thx11:37
AlexOpatdk-lap: Yep he's listening11:37
AlexOit*11:37
patdk-lapto what ip?11:37
AlexO0.0.0.011:37
patdk-lapand a dump of, iptables -L INPUT -nv11:37
AlexOpatdk-lap:  0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            tcp dpt:330611:39
patdk-lapthat is the only line?11:39
patdk-lapI don't see the headers or anything11:39
patdk-lapplus, not the first two columns say 0, nothing matched that11:40
patdk-lapso the packets never arrived, or the other rules you didn't paste, blocked it11:40
AlexOpatdk-lap: Sorry i though you just need that line, http://pastebin.com/Ban1WWaY11:42
AlexO^ The whole thing11:42
uvirtbotAlexO: Error: "The" is not a valid command.11:42
patdk-lapdefault is accept, so it's not set to block anything anyways11:47
patdk-laplooks like the packets never arrive11:47
AlexOthat's strange :/11:47
AlexOpatdk-lap: I really don't get why it isn't working, this morning it was working, I did a nap, woke up and it's not working anymore (I mean I was able to connect to the base from outside telnet etc)12:00
=== dendro-afk is now known as dendrobates
craigwCan SELinux be easily installed on Ubuntu?12:58
jcastro_it's in universe13:00
craigwCan I enable universe for just that package?13:02
jcastro_enable it, install it, and then turn it off I guess13:03
craigwHa, I hadn't thought of that, thanks13:04
AdvoWorkI've just done cat /etc/passwd and i see testuser has id/gid of 1000 and postfix has id/gid of 1001. How can i swap these around? Trying to match them to another server.13:21
zuljamespage: ping13:21
zuljamespage:  this should be ok for swift right? http://pastebin.ubuntu.com/1273189/13:25
jamespagezul: looking13:26
jamespagezul: make it less that the version that the rejig happened in rather than less than or equal to the previous version13:27
jamespagethat way if we have todo a SRU upgrades still work13:27
zuljamespage: so "<" ?13:28
jamespage swift (< 1.7.4-0ubuntu1)13:28
jamespageeven better would be the first version where this change happened13:29
jamespagebut that may be lost13:29
* jamespage looks13:29
=== n0ts_off is now known as n0ts
zuljamespage: looks like 1.6.0-0ubuntu113:30
uvirtbotNew bug: #996088 in bind9 (main) "Bind is not configured correctly on upgrade (resolvconf integration)" [Medium,Confirmed] https://launchpad.net/bugs/99608813:31
uvirtbotNew bug: #1065506 in linux-meta-lts-backport-oneiric (main) "rtlwifi/rtl8712u.bin firmware missing from oneiric backport to 10.04" [Undecided,New] https://launchpad.net/bugs/106550613:31
jamespagezul, I concur so swift (< 1.6.0-0ubuntu1)13:32
zuljamespage: ack13:32
jamespagezul, I think you might want Replaces/Breaks rather than Replaces/Conflicts as well13:33
zuljamespage: done13:34
jamespagezul, you might wanna test that - I can never remember13:34
jamespagezul: << is the correct syntax as well13:35
zuljamespage: yeah going to test it first13:36
jamespagezul, go-oh13:37
zuljamespage: looks like we are good13:48
=== n0ts is now known as n0ts_off
zuljamespage/Daviey: http://paste.ubuntu.com/1273255/13:56
lunaphyte_hi.  i'd like to enable core dumps for dovecot, but the things i've tried so far [ulimit -c unlimited and modifying limits.conf] don't seem to have worked.  how can i do this?14:09
lunaphyte_ah, figured it out.14:21
lunaphyte_setting ulimit -c unlimited in /etc/init/dovecot.conf seemed to get me what i'm after.14:28
=== kInOzAwA1 is now known as kInOzAwA
jstephanhi there, trying to do a do-release-upgrade runs into "proxy ' ' looks invalid" has someone an idea how to fix that15:34
RoyKjstephan: echo \"$http_proxy\"15:40
RoyKor env|grep http_proxy15:40
RoyKperhaps that is set15:40
jstephanah, got it, apt.conf has ist set empty15:40
=== MagicFab is now known as Guest68405
=== dendrobates is now known as dendro-afk
=== dendro-afk is now known as dendrobates
Subhranshu_Hi All,16:15
Subhranshu_I am struggling with strange issue here regaing WUBI and XEN16:15
Subhranshu_i am having dual boot ubuntu 12.04 x86_64 with win7 using wubi16:16
Subhranshu_and i have just installed Xen on it16:16
Subhranshu_but it just do not boot in with xeb 4.116:16
Subhranshu_XEN16:16
Subhranshu_and i cant either see menu.lst16:16
Subhranshu_Please suggest if some one know anything abt it16:17
Subhranshu_If some one could please suggest something that would be great help16:19
Subhranshu_please help16:19
Subhranshu_please sugets16:22
sarnoldSubhranshu_: you haven't really said anything that anyone could use to debug your problem... you may wish to describe your setup and what specifically you changed between working -> non-working...16:24
Subhranshu_xm list ERROR:  Can't find hypervisor information in sysfs!16:26
Subhranshu_this is the error which i am getting16:26
Subhranshu_when i boot into ubuntu post installation16:26
sarnoldare you confident you're running inside xen? or is sysfs not mounted?16:26
Subhranshu_see that is what the case is im not getting xen option on boot loader, i have tried this page https://help.ubuntu.com/community/XenProposed16:28
=== dendrobates is now known as dendro-afk
=== dendro-afk is now known as dendrobates
=== mcclurmc is now known as mcclurmc_away
gholmssoren: Any chance I could get uvirtbot to not snarf the bug links that eucabot sends to the channel?17:00
uvirtbotNew bug: #1065589 in lxc (universe) ""initctl list" shows 11974 instances of network-interface-security after two days of uptime" [Undecided,New] https://launchpad.net/bugs/106558917:16
hallynyeah that could be bad18:00
uvirtbotNew bug: #1065628 in qemu-kvm (main) "pci device not reset (passthrough)" [Undecided,New] https://launchpad.net/bugs/106562818:42
=== dendrobates is now known as dendro-afk
=== dendro-afk is now known as dendrobates
uvirtbotNew bug: #1062671 in cloud-utils "ubuntu-cloudimg-query in precise cannot query for quantal" [Medium,Triaged] https://launchpad.net/bugs/106267119:26
_0x783czarquestion, I'm trying to install an imap extension for php.  This extension fails it's configure command because it says that it needs to know where the Kerberos install prefix is.  I was wondering if anyone knows where I might look for this.19:35
sarnold_0x783czar: are you using kerberos? if not, better look for a way to disable kerberos support, maybe ./configure --without-kerberos or something simila19:39
sarnold_0x783czar: if you do need kerberos support, probably you'll need to install either libkrb5-dev or krb5-multidev or heimdal-dev or heimdal-multidev -- depending upon the details of your site19:40
_0x783czarsarnold: heimdal-dev seems to have provided the needed dependecy, thanks.  I hit another error with signatures, but that got me past that point, thanks!19:44
stgraberhallyn: what happens if you configure an interface and move it to another netns, does the config stick?19:59
stgraber(trying to figure out whether moving gives us the same as unplug/replug or if it's different)19:59
stgraberin the case where everything is flushed and you get a blank config, then it'd make sense for the kernel to emit net-device-remove. If the config sticks, then I'm not sure as you clearly don't want an interface to send you net-device-added with a pre-existing config (as that'd make ifupdown and likely some other things to fail)20:00
hallynstgraber: i don't think that's the right thing to consider.  Rather, uevents are sent over netlink sockets which are only valid (i believe - though this may have changed) in initial netns20:01
hallynof course this could be seen as another side-effect of lack of devicens20:02
hallynso anyway, since uevents are sent over a netlink socket in some namespace, if a nic is moved to another ns, a -removed should be sent to the one and -added to the other20:02
hallynyes, the config may stick - but it's up to the target to decide whether to keep it in my opnion20:03
hallynbc in plenty of cases, the nic will be unconfigured, or configured wrongly20:03
hallynmost cases i'd say20:03
hallynand so the target will want to be told it has this new nic which it should configure20:03
hallynanyway for now we can certainly fake it in lxc,20:03
hallynbut i think we need a deeper discussion with kernel folks20:04
hallyni'll send out an email20:05
stgraberhallyn: ok. anyway, time for my flight. ttyl20:07
hallynstgraber: have a good flight!  ttyl20:07
sorengholms: I'm not sure I can make it ignore stuff from a specific user.20:21
sorenbrb20:21
gholmssoren: It's a supybot, right?  Do you suppose its global ignore list would work with that plugin?20:22
=== Ursinha-afk is now known as Ursinha
=== cpg|away is now known as cpg
uvirtbotNew bug: #1065714 in vsftpd (main) "vsftpd 2.3.5 needs allow_writeable_chroot option" [Undecided,New] https://launchpad.net/bugs/106571420:51
=== santegoeds is now known as tdc
=== Ursinha is now known as mariazinha
=== lifeless_ is now known as lifeless
=== cpg is now known as cpg|away
=== cpg|away is now known as cpg

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!