[00:12] any vmlinuz or initrd gurus out there? I feel like mine might be corrupted and thats why i cant boot [02:29] how can i search for "Failed launched: No such file or directory" in *.log files in ssh? === thesheff17 is now known as thesheff17_ [04:10] yofun: grep === akashj87_ is now known as akashj87 [15:05] Hi guys trying to incease the ulimt on ubuntu for a tomcat user I created [15:06] ulimit -n for this users hows 1024 [15:06] but when I cat /proc/sys/fs/file-max the limit is set to 599191 [15:20] If I have, let's say, 10 servers that I want to control over SSH from a remote location, would it be more secure to have 1 server act as a key server which I access over the internet, and then after connecting to the key server, port forward to the other 9 servers OR simply carry keys for all 10 servers and connect to each one independantly? [15:25] well, if that one server is compromised, the attacker will have full access to the others ;) [15:26] Exactly my concern. [15:26] So you would agree it would be better to have each server accessed independantly? [15:26] maybe [15:26] but if you have a common ssh server, you can close ssh from the net from the others [15:26] not sure what's best [15:28] Theoretically couldn't I run clusterSSH to shutdown all 10 servers at the same time? [15:29] Ofcourse I'd need to be local to bring them all back online, but in an emergency situation where security rather then accessibility is the concern, that should work? [15:31] if an attacker gets root, he or she probably won't shut down the systems but rather plant a rootkit there [15:31] I guess a common login server should be easier to manage [15:31] then setup the others to block ssh access from the net [15:31] setup the login server with denyhosts/fail2ban/something [15:32] and make sure it's updated regularly, and not running any other services [15:34] Exactly my thinking [15:35] Whatever the setup for security was on the key server I was going to install on each of the 10 servers independantly if I didn't bother going with the key server [15:35] And then I hoped to manage them over cluster SSH [15:35] So yeah, fail2ban, SSHkeys with no password access, standard stuff [15:36] denyhosts may be better - supports distributed ban lists [15:36] mm [15:40] 1 last question - Since this is my first time having to remote SSH to my servers, I can normally run clusterSSH on a Ubuntu desktop which has a GUI, however, I am travelling with a Windows laptop. If I connect by SSH to the key server, with Putty, can I run clusterSSH in the terminal because all references I can find to it online mention the opening of a terminal for each server with 1 terminal acting as the main, [16:00] Sorry, does Cluster SSH work over a Putty terminal? [16:00] Assumably if I connect to a key server with ClusterSSH installed [17:26] http://paste.ubuntu.com/5681058/ <-- nice drive size [17:27] nice [17:27] seems a disk died :) [18:25] Trying to ping INTO server, noticed shorewall is installed, is there a quick way to disable this for testing? [18:35] Jeruvy: iptables -F INPUT [18:35] or something [18:39] RoyK thank you that worked. [18:40] I see I'm going to have to brush up on this. Cheers! === hachre_ is now known as hachre [19:54] Hello! I have a VPS , Can I know if other users are using Tunnels and browsing websites using socks proxy through it? [19:57] User Capacity: 600,332,565,813,390,450 bytes [600 PB] === ToBeFree is now known as matjohnson === matjohnson is now known as ToBeFree [22:51] How can I make the tftpd-hpa service start on boot? I edited /etc/default/tftpd-hpa to include 'RUN_DAEMON="yes"' but this does not resolve my issue. === racedo` is now known as racedo