=== TheMaster is now known as Unit193 [03:57] rww: I don't like that e guy, he ought to be quieted forever. [03:57] quite [10:57] tigefa: hi, how can we help you? [10:58] pub key archive can't auten [10:59] tigefa: this is not a technical support channel [11:00] ouh ok [11:02] if you read the topic it should be clear in which channel you have come in. [11:04] tigefa: if there is nothing else please part this channel. thanks [15:51] @mark #ubuntu benzhninja just pasted some link and went off [15:51] The operation succeeded. [15:53] he just hit at least 5 other channels with that [16:19] !usn [16:19] Please see http://www.ubuntu.com/usn for information about Ubuntu security updates. [16:19] ahh, i see what you did there :) [16:20] :) [17:27] bazhang, noooooooooooooooo waaaaaaaaaaaaaaaaaaaaa [17:28] rly? [17:28] bazhang, noooooooooooooooo waaaaaaaaaaaaaaaaaaaaa [17:28] !ops [17:29] ESource: can we help you?> [17:29] yes [17:40] HIIIIIIIIIIIIIIIIIIIII [17:40] bazhang, noooooooooooooo waaaaaaaaaaaaaaaaa [17:57] Hm. [18:19] well, reading his first words in #u: does ubuntu still contain spyware in it by default? and his swearing and insulting and that he is using mint i think his intentions are quite clear [18:19] To keep running Mint but pretending he's on Ubuntu so he can try sneaking support from us? [18:20] ofc [18:38] LinStatSDR called the ops in #ubuntu-offtopic () [18:39] I think we should shut down the internet for a few days whilst this problem is sorted out [18:39] @random panic run [18:39] panic [18:40] @comment 64186 trolling [18:40] hm [18:40] @login [18:40] The operation succeeded. [18:40] @comment 64186 trolling [18:40] Comment added. [18:40] yay [18:41] I'll get the hang of these bots one day :D [18:41] ♥ [18:41] wtf? < checks backscroll> === tigefa is now known as Guest23339 [19:30] at least that shellstorm issue bring a lot of users to upgrade their EOL devices [19:32] How much of an issue is it on default Ubuntu systems> Reading http://www.theregister.co.uk/2014/09/24/bash_shell_vuln/ it suggests that Ubuntu & Debian based distro's using Dash aren't at risk [19:33] depends on whether your applications are using /bin/sh or /bin/bash [19:33] and some of the potential vectors (e.g. ssh with limited access to commands) wouldn't default to dash on Ubuntu [19:34] but I think it's a bit hyped up. media likes to do that since heartbleed got them so many ad views [19:35] If I run echo $SHELL I get /bin/bash [19:35] Ubuntu and Debian point /bin/sh to dash. user shells default to bash. [19:37] someone posted this to /r/ubuntu: https://gist.github.com/EricChiang/561938e125b809f4e91c [19:37] what the hell [20:18] !shellshock [20:18] A fix for the recent Bash vulnerability (CVE-2014-6271) has been pushed to Ubuntu repositories. See http://www.ubuntu.com/usn/usn-2362-1/ and http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-6271.html for more information. [20:19] rww: ----^ [20:36] hi! [20:37] hi [20:37] how can we help you? [20:37] maybe I am in the wrong channel [20:40] bye [20:40] yep, i think so. this is the operators channel [22:50] Unit193: there are two CVEs for this, and one of them only just got pushed out now [22:50] http://www.ubuntu.com/usn/usn-2363-1/ [22:50] Indeed, just saw the other one get pushed. [22:51] !shellshock [22:51] A fix for the recent Bash vulnerability (CVE-2014-6271) has been pushed to Ubuntu repositories. See http://www.ubuntu.com/usn/usn-2362-1/ and http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-6271.html for more information. [22:54] !no, shellshock is Ubuntu has released security updates for both recent bash vulnerabilities for all currently-supported versions of Ubuntu. Use your preferred package manager to apply all pending updates. See http://www.ubuntu.com/usn/usn-2362-1/ and http://www.ubuntu.com/usn/usn-2363-1/ for more information. [22:54] I'll remember that rww [22:54] !shellshock [22:54] Ubuntu has released security updates for both recent bash vulnerabilities for all currently-supported versions of Ubuntu. Use your preferred package manager to apply all pending updates. See http://www.ubuntu.com/usn/usn-2362-1/ and http://www.ubuntu.com/usn/usn-2363-1/ for more information. [22:58] tsimpson: CVE detection on ubottu is annoying as heck :( [23:01] heyyyyyyy Unit193 [23:01] do you feel like being awesome [23:02] Not likely, what's up? [23:02] Unit193: if you made one of your bots detect people with connection/whatever problems that are joining and quit/parting rapidly that would be amazing [23:02] Ruby in #defocus can do something similar I think [23:03] or does yours do that and I wanted it in #defocus. hrm. [23:03] like "(Max SendQ exceeded)" quits [23:03] rww: See -monitor, one generally does, just in debug mode. That feature hasn't been exactly fine tuned, but meh. [23:03] yep [23:04] Unit193: what message does it give for that? [23:04] /lastlog fix_your wil get it. [23:05] irclogs/freenode/#ubuntu-ops-monitor/#ubuntu-ops-monitor-2014-09-23.log:12:41:21 -Drone`:#ubuntu-ops-monitor- [#ubuntu] debug d *!*@24.124.35.240$##fix_your_connection 1800 cycle detected [23:05] is that it? [23:05] Yep. [23:05] awesome. thank you <3 === bazhang_ is now known as bazhang [23:05] Sure thing. [23:05] it's only happened once since I started being in there again, hence me not noticing :) [23:06] And of course, feel free to ping me if you think of how it should be fine tuned. Poke others to actually enable it though. :P [23:09] i just poke everyone at random :3 [23:42] Steve Jobs is burning in hell! [23:42] this is to everyone, don't be like steve jobs and go to hell, today is the day of salvation, repent and turn to god and recieve his mercy [23:43] !ops [23:52] MRDONKEY: That's about enough of that in various channels, please. [23:52] QuinnyPig, by what authoirty do you have to tell me that?