[00:26] <thor77> i added the universe-repos to my sources.list to install swig3.0 but it still doesn't work after sudo apt-get update, what's wrong?
[00:26] <thor77> paste of my sources.list is following
[00:26] <ikonia> !info swig3.0
[00:26] <thor77> http://pastie.org/private/otpc5oigb3dkbxpxkjbjq
[00:27] <ikonia> thor77: can you pastebin the output of "sudo apt-get update" please.
[00:28] <thor77> http://pastie.org/private/rqvqycqikkoqebqka1loa
[00:31] <ikonia> and now apt-cache search swig please
[00:32] <thor77> http://pastie.org/private/ph6zivoo71njrlk917oewq
[00:32] <thor77> only swig and swig2.0 :/
[00:32] <thor77> looks like there was an error adding the universe-repo
[00:32] <ikonia> where ?
[00:33] <thor77> _i_ think there was an error
[00:33] <ikonia> ahhhh hang on
[00:33] <ikonia> !info swig3.0 trusty
[00:34] <ikonia> yeah, it's not in trusty
[00:34] <thor77> :O
[00:34] <ikonia> it's in utopic
[00:34] <thor77> what can i do now?
[00:34] <ikonia> thats why you can't see it
[00:34] <ikonia> sorry, missed that you where not on the current release
[00:36] <thor77> http://img.thor77.org/22-12-14_01-36.png its the latest available at my hoster :(
[00:37] <ikonia> 14.04 should have it
[00:37] <ikonia> ahh wait
[00:37] <ikonia> no it doesn't
[00:37] <ikonia> sorry
[00:37] <ikonia> utopic is the first to get it
[00:38] <thor77> i have 14.04 installed
[00:38] <ikonia> yeah, and it doesn't have it
[00:38] <thor77> yes
[00:38] <thor77> what can i do know?
[00:38] <ikonia> so 14.10 is the first
[00:41] <thor77> the only option is begging my server-provider to provide 14.10 images?
[00:42] <ikonia> realistically
[00:42] <ikonia> if you want to use stable supported repos
[00:42] <thor77> :/
[00:43] <thor77> can i download this package somewhere?
[00:43] <thor77> i think i only need this one
[00:51] <thor77> uhm, okey, i will start begging at my hoster to provide me a 14.10 image, thanks for your help ikonia :)
[01:17] <teward> thor77: i could try and backport the package - it'd be in a ppa and i cant guarantee functionality but...
[02:29] <kasad> aloha
[03:56] <stbaby> rabbitmq
[05:43] <LucidGuy> I have a linux server with an xfs filesystem thats access by both windows clients and linux nfs clients.  Does this mean that each file/directory contains both windows ACL and Linux ownership/permission information?
[09:16] <lordievader> Good morning.
[09:54] <thor77> yey, begging was successfull, i got an 14.10 image \o/
[14:57] <esde> i've got 14.04 in read-only mode, logged in as a non-root user. im at a remote location currently. is there any hope for rebooting the machine or will i need to wait until i can physically reset the machine? (i can't switch user to root or use sudo)
[15:12] <ikonia> esde: sudo reboot should still work
[15:12] <ikonia> it doesn't require any write access apart from the securiy log which it should just warn on
[15:14] <esde> http://pastebin.com/7znUhpJZ
[16:19] <esde> ikonia, ^
[16:19] <ikonia> what ?
[16:23] <hariom> Hi, I am trying to create an upstart script on my remote server (on cli, no GUI). When I check the syntax using init-checkconfig I get this error: ERROR: failed to ask Upstart to check conf file
[17:28] <LarsN> kirkland`: I have an orange box, and I'm having a small problem I hoped you could help me with.  Two of the 10 nodes aren't responding to the out of band tools.  one of them (node 7) powers on on AC restore, and since it doesn't respond out of band I can't power it off.
[17:29] <LarsN> node 4 doesn't appear to be powering on (but  also isn't responding to the Out of band bits)
[17:29] <LarsN> based on LEDs on the front of the chassis.
[17:57] <MagicMystic> has NTP been updated for 14.04?
[17:57] <MagicMystic> just saw the post about it...
[18:07] <Pici> MagicMystic: I just ran an update a few hours ago and got it.
[18:09] <MagicMystic> Pici: let the upgrade process begin! Just updated on 2 of 4 machines :-(
[18:13] <LarsN> Is that NTP update "security" related?
[18:14] <LarsN> is there a bulletin someone can point me at please?
[18:14] <patdk-lap> do people not bother to read?
[18:15] <LarsN> patdk-lap: I'd be happy to read.  I however don't read every page on the internet.
[18:16] <LarsN> I guess I'll add http://www.ubuntu.com/usn/ to the list of daily pages
[18:18] <MagicMystic> i don't read that's what #ubuntu-server i sfor :-P
[18:20] <LarsN> for the most part, I pay the junior guys to read for me. ;)
[18:21] <LarsN> looks like my nodes will all update between 23:00 and 01:00 tonight.
[18:21] <LarsN> and firewall rules should prevent any badness between then and now.
[18:25] <MagicMystic> so many of the issues seem theoretical...the chances of my little machines getting hit seem small
[18:25] <MagicMystic> seem like someone attempting the attack would go after bigger fish
[18:26] <MagicMystic> nonetheless, upgrading is a good idea
[18:26] <patdk-lap> well, ubuntu sends out email alerts for all security updates
[18:26] <patdk-lap> and it's posted
[18:26] <patdk-lap> and well, kindof all over the place
[18:27] <MagicMystic> patdk-lap: yeah...saw it first posted on ars a couple days ago or was it yesterday
[18:27] <patdk-lap> ars?
[18:27] <LarsN> I first saw it posted by MagicMystic about 30 minutes ago, above.
[18:27] <LarsN> ars technica.
[18:27] <patdk-lap> dunno, been posted all over the place, first saw it on the ntp mailing list
[18:28] <LarsN> I can't join any more lists. they all get the same level of attention, which is filtered to another folder that hasn't been looked at in months.
[18:28] <patdk-lap> same here, but attempts to read daily :)
[18:28] <LarsN> that's what the Junior guys are for ;)
[18:28] <patdk-lap> though, the unread count going up fast, is normally a given it needs to be read
[18:28] <patdk-lap> or a flamewar
[19:24] <thor77> i forgot to check the "install openssh server"-option on installation of my ubuntu-server, how can i reproduce it after installation?
[19:26] <bekks> thor77: "sudo apt-get install openssh-server"
[19:27] <thor77> it doesn't do anythin else?
[19:28] <bekks> Hmm?
[19:28] <thor77> i think it could be it would configure smth
[19:29] <bekks> Thats done by installing it.
[19:48] <iman> Hi, is that possible to close root user in ubuntu server, because every day i see a lot of logs hackers are trying to my server with root user and different password
[19:48] <LarsN> iman: by default the root user doesn't have a password, and can't be accessed.
[19:49] <LarsN> iman: you can further improve security by disabling password auth in ssh.  (/etc/ssh/sshd_config) and installing/configuring something like fail2ban or denyhosts
[19:49] <LarsN> disabling password auth would require you to use ssh keys to log in remotely
[19:51] <iman> LarsN: I have another username as root and i dont use root at all, can i do "sudo passwd -l root" ?
[19:52] <LarsN> iman: unless I'm mistaken, that's the default state of the root users's password.
[19:52] <LarsN> user's...
[19:52] <bekks> iman: By default, you dont need to do that, because that would make using sudo impossible.
[19:52] <bekks> LarsN: You are mistaken :) The root account is not locked, but it has no password "only". :)
[19:53] <LarsN> bekks: rgr, yeah I opened man passwd, AFTER i typed that
[19:53] <LarsN> you verified, before I got back here.
[19:54] <dasjoe> bekks: locking the root account doesn't make sudo impossible by default, only if sudo always asks for the root user's password
[19:54] <LarsN> the default state for user root however, is a "passwd -d"
[19:54] <bekks> dasjoe: Locking the root user would mean that you cant get a root environment anymore, wouldnt it?
[19:55] <bekks> dasjoe: So that effectively makes using sudo impossible.
[19:55] <LarsN> bekks: the passwd -l just locks the password, not the account.
[19:55] <LarsN> at least as I read the man page.
[19:55] <dasjoe> bekks: afaik "locking" only means setting the /etc/passwd password field to x, which disables the password but not the account
[19:55] <dasjoe> You can still log in via key files
[19:55] <dasjoe> Or by using sudo when configured to ask for the sudoing user's password
[19:56] <bekks> I have to test that out, for my own curiousity :)
[19:56] <LarsN> iman: for your underlying problem of brute force attempts against ssh.  the two things I'd suggest are.  1: set password login to false in sshd_config
[19:56] <LarsN> and 2: turn on either fail2ban or denyhosts
[19:56] <dasjoe> bekks: I'm pretty sure, as somebody locked my account on a box but forgot to remove my authorized_keys file
[19:56] <LarsN> this will help secure ALL the user's accounts against brute force.
[23:21] <davidbowlby> hello all
[23:23] <davidbowlby> I have a 14.04.1 LTS server that has a drive going bad and apparently I set it up to use LVM.  I'm trying to migrate the data (fully bootable move would be nice) to a smaller drive.  I've confirmed I'm nowhere near the space limit of the new drive, but since it's LVM, I'm afraid of missing something.  I have already created partitions, but am kinda clueless on what to do next.
[23:23] <davidbowlby> if they were the same size I would just DD it
[23:46] <dasjoe> davidbowlby: mount the old and new partitions, then rsync the data over?
[23:57] <moonlight> anyone used kernel 3.18.1 on ubuntu server 14.04.1 lts?
[23:58] <moonlight> http://www.yourownlinux.com/2014/12/how-to-install-linux-kernel-3-18-1-in-linux.html
[23:59] <moonlight> i tried it but when i noticed, kern.log and syslog files grow in size