/srv/irclogs.ubuntu.com/2017/01/20/#ubuntu-server.txt

cmh__Has anyone run into problems starting AppArmor on Xenial when there are a large number of profiles to load? It's been starting for ~2 hours, seems to be writing to /etc/apparmor.d/cache/usr.sbin.apache2. Kernel: 4.4.0-57-generic, Release: 16.04.1 LTS03:10
=== cmh__ is now known as cmh_
tyhickscmh_: hey - that's not a known issue03:12
tyhickscmh_: could you file a bug report?03:12
tyhickscmh_: what version of the apparmor package do you have installed?03:13
cmh_tyhicks: apparmor 2.10.95-0ubuntu2.503:16
tyhickscmh_: does `sudo apparmor_parser -Q /etc/apparmor.d/usr.sbin.apache2` complete? (shouldn't take more than a few seconds at the most)03:20
=== rxc is now known as Guest8537
cmh_tyhicks: adding the -v flag shows 'Addition succeeded for "Profile Name"' for the profiles.03:36
cmh_On another server (same Kernel/Release) it shows "Cached load succeeded for "/etc/apparmor.d/cache/usr.sbin.apache2"." ...03:37
cmh_hm03:37
=== giraffe is now known as Guest35314
=== PaulePan1er is now known as PaulePanter
=== lordieva- is now known as lordievader
=== lordievader is now known as Guest10438
zioprotohello all08:50
zioprotowhen is the next Horizon Newton package refresh gonna happen ? I am interested in this patch https://review.openstack.org/#/c/403160/08:51
zioprotoalso it is not clear to me08:52
zioprotowhen I do08:52
zioprotodebcheckout --git-track='*' horizon08:52
zioprotoand then I checkout stable/newton08:52
zioprotoit looks from the changelog that I am patching the yakkety tree08:52
zioprotothere are different git repos for xenial and yakkety ?08:52
zioprotoI understand openstack releases are in different git branches, but what about the target distro ?08:53
=== Guest10438 is now known as lordievader
lordievaderGood morning.08:56
=== thib_ is now known as thib
=== T-Co_ is now known as T-Co
zioprotojamespage: coreycb any of you here ?12:18
zioprotoAnyone has experience building Openstack Newton deb packages for Ubuntu Xenial ?12:51
coreycbzul, python-webob 1:1.6.2-2 synced from unstable13:04
coreycbzioproto, o/13:04
zulcoreycb: yippe skipee13:05
zulcoreycb: ill keep an eye on things13:05
zioprotocoreycb: hey there, did you read what I wrote earlier in the channel ?13:06
zioprotodebcheckout --git-track='*' horizon13:06
coreycbzioproto,  "I understand openstack releases are in different git branches, but what about the target distro ?"13:06
zioprotoyes13:06
zioprotowhen I see the changelog13:07
zioprotoin the debian folder13:07
zioprotoI see yakkety lines13:07
zioprotobut I am building for xenial13:07
coreycbzioproto, ok13:07
coreycbzioproto, first, yes we only have branches per openstack release13:07
zioprotookay. Now I am working on this repo git://git.launchpad.net/~ubuntu-server-dev/ubuntu/+source/horizon13:07
zioprotoI am in stable/newton13:08
coreycbzioproto, xenial corresponds to mitaka.  however it's also an LTS so we support the cloud archive for newton and ocata on xenial as well.13:08
zioprotook, so how do I make newton packages for xenial ?13:09
zioprotoI mean, I just write yakkety in the changelog ?13:09
zioprotoand then I build with sbuild-newton13:09
zioprotosbuild-newton -d xenial-amd64 -A ../horizon_10.0.1-0ubuntu2.dsc13:10
coreycbzioproto, that's correct13:10
coreycbzioproto, s/yakkety/xenial-newton/ though13:10
zioprotoversion number of the packages is the same across xenial and yakkety ?13:10
zioprotowait I did not understand where I have to replace s/yakkety/xenial-newton/13:11
coreycbzioproto, version numbers of the packages are the same on xenial and newton for any package in the cloud archive, IF you have the newton cloud archive enabled on xenial13:13
coreycbzioproto, here's the staging ppa for newton if you want to look through some packages: https://launchpad.net/~ubuntu-cloud-archive/+archive/ubuntu/newton-staging13:14
zioprotodeb http://ubuntu-cloud.archive.canonical.com/ubuntu xenial-updates/newton main"13:14
zioprotoI am using this one13:15
coreycbzioproto, it's likely the same for the most part.  packages get backported from yakkety to xenial-staging then promoted to xenial-proposed, then to xenial-updates13:16
zioprotook13:17
zioprotowe are changing the way we work here13:17
zioprotobefore we had VMs pointing to a internal deb13:18
zioprotorepo13:18
zioprotonow we build docker images13:18
zioprotoso I am trying to install my deb packages13:18
zioprotowith dpkg13:18
zioprotoif I have three deb files to install13:19
zioprotoopenstack-dashboard_10.0.1-0ubuntu2_all.deb openstack-dashboard-ubuntu-theme_10.0.1-0ubuntu2_all.deb python-django-horizon_10.0.1-0ubuntu2_all.deb13:20
zioprotoand they are not in a repo13:20
zioprotothey are just on my disk13:20
zioprotohow I install them correcttly13:20
zioprotoI always get deps problems13:20
zioprotobecause I cant install just 1 at the time13:20
hateballzioproto: dpkg -i *.deb ?13:24
zioprotook I fixed it !13:24
zioprotomaybe13:24
zioprotolooks like the problem13:25
zioprotowas that I was missing a apt-get update13:25
zioprotoin my script13:25
zioprotoso the repo was there13:25
zioprotobut not loaded13:25
zioprotothis xenial was still mitaka13:25
zioprotoopenstack-dashboard-ubuntu-theme depends on openstack-dashboard (= 3:10.0.1-0ubuntu2); however:13:26
zioproto  Package openstack-dashboard is not configured yet.13:26
zioprotoI think the problem is with openstack-dashboard13:28
zioprotothat fails the configuration step13:28
zioprotocoreycb: I get this error, there is your name here :) https://bugs.launchpad.net/horizon/+bug/164396413:30
ubottuLaunchpad bug 1643964 in horizon (Ubuntu) "compressing static assets fails with xstatic-bootswatch 3.3.7.0" [Undecided,Fix released]13:30
coreycbzioproto, are you using ocata?13:31
zioprotono13:32
zioprotoI get the same error13:32
zioprototrying to upgrade from13:32
zioprotoopenstack-dashboard (3:10.0.1-0ubuntu1)13:32
coreycbzioproto, did you build the package yourself?13:32
zioprototo my package13:32
zioprotoyes13:32
coreycbzioproto, did you create a new orig-xstatic.tar.gz?13:32
zioprotoI added a patch in debian/pachtes13:32
zioprotoyes I did13:32
coreycbzioproto, if so,don't13:32
zioprotoahhhhh13:33
zioprotoI should not ?13:33
zioprotothe procedure for horizon changed again ?13:33
coreycbzioproto, no13:33
coreycbzioproto, for ocata we'll regenerate orig-xstatic.tar.gz but for stable releases we don't, because it pulls down the latest xstatic libraries13:34
coreycbzioproto, which is probably fine most of the time but it caused you to hit this bug which we've only fixed in ocata13:34
zioprotoI am trying now13:37
zioprotogbp buildpackage -S -us -uc13:37
zioprotoand then build from the dsc file13:37
zioprotowithout calling any xstatic stuff13:37
zioprotobuild failed13:39
zioprotobecause the xstatic files are missing13:39
coreycbzioproto, use debuild with horizon13:44
coreycbzioproto, also you need the xstatic-orig tar13:44
coreycbzioproto, you can get it from the ppa above13:44
zioprotoso, I avoid to call ./debian/rules refresh-xstatic13:46
zioprotohttp://ppa.launchpad.net/ubuntu-cloud-archive/newton-staging/ubuntu/pool/main/h/horizon/horizon_10.0.1.orig-xstatic.tar.gz13:48
coreycbbeisner-afk, when you get in can you promote python-webob to ocata-proposed?13:48
coreycbzioproto, correct, just wget that13:49
zioprotook building at the moment13:50
zioprotoBuild success! but I guess no one in the world can build horizon packages for xenial-newton without knowing this issue !13:59
zioprotook but I still get this error14:00
zioprotoCommandError: An error occurred during rendering /usr/share/openstack-dashboard/openstack_dashboard/templates/horizon/_scripts.html: '\"../bower_components/respond/dest/respond.min.js\"' isn't accessible via COMPRESS_URL ('/horizon/static/') and can't be compressed14:00
zulcoreycb: yeah webob problems go away14:04
zioprotocoreycb: I was able to build the package and install it. But maybe the patch I was testing did not work14:32
zioprotothanks for the support14:32
coreycbzioproto, great, np14:34
=== wwalker_ is now known as wwalker
gymdudeI am wondering in linux/unix like os's what is the equivalent of local group/security policy gui in control panel  for  windows  is for linux16:12
gymdudeor unix16:13
gymdude...I know unix/linux like os's have samba , winbind , openldap , pam and many other security alternatives that model active directory for if on  a domain or local16:14
gymdudeWhat i am getting at is my main thing is can one in linux or unix os lock all administrators/ disable them16:15
gymdudeSo one cann't sudo or su to a higher privilage level every again like one can do for windows os's16:16
gymdude...At that point the only way to get complete control back to your unix or linux distro would be to have some password reset program like chntpw is to windows sam analogy16:17
gymdude...I hope you understand what i am talking about and somebody that knows something about this elaborate on it16:18
gymdude...And what would happen if one booted from a live usb and deleted the shadow and password files from the etc folder. When the person booted up again I always wondered that but haven't got around to trying it or have a spare HDD right at the moment16:26
joeliogymdude: You're mixing several things there.. there are attibutes on the filesystem for ownership and modes16:29
gymduderight so if you deleted the shadow and passwd files what would happen16:29
dr4c4ngymdude:16:30
joeliogymdude: you wouldn't be able to login16:30
dr4c4nhttps://www.cyberciti.biz/tips/recovering-deleted-etcshadow-password-file.html16:30
dr4c4nthe system would ask for maintenance root password16:30
gymdudefor login you don't have any users totally blank or not there and even if you did replace it with failed users you still have to get the ownership , modes , : : : parts of it correct to16:30
joeliodr4c4n: where would it get the password from if you've deleted /etc/{passwd,shadow} ?16:31
joelioyou boot into single user mode, or init bash - there's no password16:31
joeliogymdude: not following there16:32
joeliobasically PAM is the major system here that deals with the UID/GID mapping on the files16:33
joelionow PAM is a pluggable system, so there are many backend supported, like ldap, kerberos, sssd etc16:33
gymdudewait if one rebooted there machine with out a shadow or password file what would happen would the linux os recreate just the basic root user with blank password , ask you to create a user , throw a error no user to login with ?16:33
joelioyou need to go in single user and recreate the system for multi user16:34
joeliobooting into init=/bin/bash *literally* drops you into bash shell16:34
joelioas root16:34
gymdudeI get the software command you gave me can be used to recreate the barebones shadow or password files but that won't help you with all the other users , file attributes ,owners you have destroyed you have to create them all by hand / remember them thats if your lucky16:35
joeliogymdude: that's what backups are for.. but I'm not following what you're specifically trying to do :)16:35
gymdudeBut how can single user mode drop you into root you wiped root out because there is not users not even root because the password file is deleted16:36
joeliowhy not try it in a VM and find out16:36
gymdudeBut sure if it some how by dropping to single user mode gives you a root privilage then yes you should beable to addgroup,user, chown ,...etc to get what you want to some extent back16:37
joeliothat's what single user mode is, root16:37
joeliofull privilege16:37
joeliothere are different levels of init in unix, multi-user is one of them16:38
gymdudeSo if any linux distro one can drop to single user mode then how is protect root password or other things doing anything16:38
joeliophysical security, grub passwords, bios passwords etc etc16:38
joeliobasically if someone can reboot your systems and has physical access, then the game can be over anyway16:38
gymdudeOne could always drop to single user mode create a sudo user that has root privilage and do pretty much what they want16:39
joelioif you can drop to single user mode, games over already, why bother with a sudo user?16:39
ilivgymdude not if you restrain physical access to your machines16:39
joeliosecurity is like an onion, many layers16:40
ilivgymdude security can never be absolute. let that percolate in your mind for a moment.16:40
joelioyup16:40
joeliosecurity vs. usability -- pick your point16:40
joeliomost secure system is one turned off buried beneath 6 feet of concrete16:40
joelionot very usable though16:40
gymdudeOk well to get into single user mode you have to at least beable to customize the grub configuration files under boot which you cann't if you don't know the grub password or if you cann't privilage escalate to a user that can modify the /boot/grub files16:42
ilivgymdude there's also BIOS/EUFI password16:42
joelioand disk encryption, that requires unlocking16:43
gymdudeYa but bios passwords in general aren't a good idea or work for large companies because then they have to remember tons of different bios passwords. If they had them all the same one person leaking it would eventually have a bunch of people knowing it16:44
joeliono, not true, there are solutions for MDM fleet management16:45
gymdudeAnd also the fact that if one forgot the bios password your screwed just basically smash your machine its done16:45
joeliono, not ture16:45
joelio*true - reset BIOS with a jumper16:45
gymdude....Usually companies are more concerned not with that but with securing there os they put on ... they already know that one with bios access could boot from a live distro and reformat or reinstall a different os's16:46
gymdudeWell if the mobo had bios jumpers then why care about setting the password all a person would have to do is reset with the jumps defeating the purpose of the password16:48
joelioyea, it's just to stop walkby or maybe a random thief with no knowledge16:48
joelionothing in security is absolute16:48
gymdude... All i am saying is securing at the bios level is really not  a good way unless its a one shot thing where no jumpers or reset can be done16:48
joelioagain, it's an ensemble of security practices that help, not one specific thing16:49
gymdudeI get that one could make the motherboard to have a bios on a plug able bios pci like card so when the one shot is over they can just throw out the card and not the whole motherboard16:50
joeliowell, your bios is in an EEPROM, so technically you can do that anyway16:51
joelioit's 'puggable' in that sense16:52
gymdudeBut its integrated on the mobo so your really destroying the whole motherboard if you destroy the bios for it currently16:52
gymdudeThat is a way for company computers to go thru less issue and still secure a bios password not having to worry about leaking because they can uses many different passwords and not worrying about forgetting one because they can just order another replacement bios for the problemed machine that one for gets the password from time to time16:54
gymdude...Because lets face it if the company computers cann't boot live alternative os because a bios password is set that cann't be figured out how could anybody modify anything on that computer ever16:56
gymdude...Never mind they could also take out the sata hard drive and replace it with there own as well16:56
gymdudeSo in this respect bios securing isn't really worth it16:57
joeliosuer16:58
gymdude...So thats why companies just secure there computers/laptops os by disabling all there local admin's when the person is not on the domain. Which would prevent them from having enough privilage to change there local policy settings16:59
joeliomaybe in windows land17:02
joelioWhen we roll out laptops for users, they get admin privileges, but we also use dm-crypt17:03
joeliowe trust the users (mainly devs) to manage themselves, sudo on their own systems is fine17:04
joeliowe're just concerned about the data, hence encyption policies17:04
gymdudeYa makes sense. Curious on linux is there away to do the equivalent of disabling all root privilaged accounts17:06
gymdude Like in windows disabling all local admin accounts17:06
gymdudefor the sam file17:06
gymdudeit just be for the shadow or passwd /etc files i would imagine17:07
joelioon linux, the only user priveleged is root17:08
gymdudenot true there is different groups and privilage levels17:08
gymdudeassociated with them17:08
joeliodifferent levels of access, not full privilege.17:09
* joelio has been doing this 20 years17:09
gymdudeya but sudo users have full privilage as a root17:10
joeliono17:10
joeliosudo su -17:10
joelioyes,  but sudo is very granular17:10
joelioyou can choose a single command for example that a single user can run17:10
joeliolook in /etc/sudoers17:10
gymdudeya but by default its usually set up when you sudo you sudo to root privlage17:10
joeliono, that's just you assuming17:10
joeliosudo su -17:10
joelioputs you in full root as you're running su17:11
gymdudesu does to17:11
joeliosu *sets* the super user, but you need to run sudo to escalate up17:11
joeliotry and run su on a machine with no root password set17:11
gymdudeif i su i just become root i don't need sudo su17:11
joelioas I said, try that on ubuntu17:12
joeliothere is no password set for root, that's why during install it asks you for a user17:12
geniiDefault is no su, recommended is sudo -i for interactive, then exit when admin things are finished being done17:12
joeliono you can make it have a password, but default ubuntu has no password set17:12
greyollaHi. So normalling ones setting ethtool settings in the interfaces but I'm testing out libteamd/teaming interfaces. Is there any existing tools that will help manage just ethtool settings (vs me just applying them manually)?17:12
gymdudesuper user is root right17:13
greyollainterfaces file17:13
gymdudeya su you need a password which fails if its not set up because of /etc file setup17:13
joeliogreyolla: you can pass post-up commands in /etc/network/interfaces17:13
joeliothat'll allow you to set at boot/interface bring up time17:14
joeliogymdude: UID0 is root :D17:14
gymdudeya got you on that17:15
gymdudewhy is it though one can do sudo apt-get  and not sudo su first then apt-get install...etc17:15
greyollateamd requires that the interfaces be off before joining them to the team interfaces. Using the interfaces file / ifupdown seems to auto up them before applying the setting. Is there a way to specify not to bring up the interface but apply the changes still?17:15
joeliogreyolla: yes use manual17:16
gymdudeI am wondering sudo executes commands under a different user but how do you know which user it is executing under17:16
joeliogreyolla:    iface eth0 inet manual ---- kinda thing17:16
joeliogymdude: sudo also logs auth escallation as well, when you go full root you lose some of that logging17:17
gymdudeI could go sudo -u user1 apt-get install ... which would execute that command under user117:17
greyollaI can set it to manual but the settings do not apply until I add "auto eth0" which brings up the interface17:17
gymdudei guess i am wondering what sudo defaults to if no switches are used is it root user17:18
joeliogymdude: just vanilla sudo {thing} will execute thing as uid 0 *but* you'll retain stuff like SUDO_USER env vars etc17:19
joelioso you know what user is executing even though they are doing something as root17:19
gymdudewhat take precedence the env SUDO_USER being set to something other then root  which would make you have to do sudo -u root to get the equivalent of sudo17:20
joelioI'm not following, sorry17:21
gymdudeIf you set the SUDO_USER env to something does sudo uses that user by default other then 0 root user17:21
gymdudeby default when you do sudo17:21
joeliothe env vars are just used in whatever application needs them, they don't override the calling user from an ACL perspective17:23
joeliothey're just handlers so an app knows who's instantiated it17:23
gymdudeyes and that application could be for sudo itself17:24
gymdudeso you can only have one and only one root account and by disabling this would be like the equivalent of disabling all local administrators is that correct17:26
gymdudeso one only needs to disable root user17:26
joeliono17:27
joelioyou need uid 017:27
joeliothere is (generally) only one root user, the others all escalate their CAPS depending on what's set17:27
gymdudeBut if there is no root how can there be any uid 0 or person using it17:27
joeliouid0 == root17:28
joelioI'm going home now anyway, enjoy :)17:28
gymduderight17:28
tarpmangymdude: there has to be root. if you remove (or change) the definition of root in /etc/passwd your entire system will break17:28
gymdudeSo then how does one prevent all users from privilage escalation to uid017:29
tarpmangymdude: in any case, uid 0 is what's special. uid 0 is the superuser regardless of what name /etc/passwd assigns it17:29
joeliogymdude: they're not in the sudo group, or not set in sudoers17:29
joelioby default17:29
joelioyou have to add them to sudo (wheel) group or add them in sudoers17:29
joeliowhen you install ubuntu the user is added with sudo group membership automatically17:29
sypherThe default sudo group is named "sudo," not wheel. Wheel is a Red Hat/BSD-ism.17:30
joelioif you add a user manually, they're not added17:30
joelioyou have to gpasswd -a {user} sudo --- or add to /etc/sudoers etc17:30
joeliosypher: I know that17:30
* sypher shrugs. "Just being clear."17:30
gymdudeO ok so if i just adduser it won't beable to sudo to uid unless i add it to the group sudo or place the user in the sudoer file17:31
joelioexactamundo17:31
joelioyou'll get an error saying the user is not in the sudoers file17:32
joelioand it'll mail root (or whatever the admin email is set to) about the violation17:32
joeliosane defaults ftw17:32
gymdudeGot it now i see so then how is user 1 and user 2 which are in different none sudo groups have different privilages/access levels... is the file system storing the gid and uid exceptable to access the file or resource17:33
joeliothe filesystem has attributes for storing the file owner/group17:34
tarpmangymdude: yes. every file or directory has permissions for a specific user (the owner), a specific group (the owning group), and everyone else17:34
tarpmangymdude: see https://en.wikipedia.org/wiki/File_system_permissions#Traditional_Unix_permissions17:34
joelioin fact there are a lot of attrivutes it stores17:34
tarpmangymdude: and https://en.wikipedia.org/wiki/Modes_(Unix)17:34
gymdudeThis is for HDD resource how does the os keep track of memory blocks a user or group has access to . Because you have 2 main resources HDD and memory17:37
joelioCAPS17:37
gymdudeSince device drivers are controlled via files , programs thats taken care of by HDD resources17:37
joelioalong with loads of other ways :)17:37
joelio"Everything is a file"17:38
joeliodown the rabbit hole - http://man7.org/linux/man-pages/man7/capabilities.7.html17:38
gymdudeGDT , paging ,...etc doesn't take into account the user or group just weather the program itself stays with in its memory allocation/ memory resources17:39
gymdudeso if one can run the program it doesn't care what user or group ran it17:39
gymdudeSo what i am getting at is how can one user have permission to access memory and another user cann't access that same memory  or is that even ever considered17:40
joeliowell, the kernel manages some part, but the memory management will happen inside a program.. Hence why there are hacks like heartbleed.. bad memory management17:40
joelioand why rust is awesome17:41
joeliothere are 'mitigations' in the kernel which subert this, memory address randomisation, stack protection etc17:42
gymdude...well what i was wondering is they any way directly to restrict particular users or groups to certain memory17:42
joelio(ironic as I'm building grsec kernel atm too)17:42
joelioit's restircted by default17:42
gymdudeObviously indirectly thru program itself or file permissions17:42
joelionot sure what you mean by 'certain memory'17:43
sypherA user cannot access memory allocated by programs run by other users, with the obvious exception of root.17:43
gymdudethe memory manager at the kernel or user level doesn't care at a user or group level17:44
joeliounless it's a badly written program that reads/writes to an area of memory it shouldn't aka a hack17:44
gymdudeit only cares about if the block is marked shared , private,...etc17:44
tarpmangymdude: a process can only access its own memory. if it tries to access another process' memory, that's a segmentation fault.17:45
tarpmangymdude: is there something you're trying to figure out or accomplish that's leading you to all these questions? I have a feeling you're going in a particular direction, but I can't figure out what that direction is17:45
gymdudeya got that so its more securing users and groups thru file permissions then thru what user access memory17:45
gymdudeAnd the memory manager only cares to keep programs/process separate so they don't violate  one another17:46
joeliothere's no real 'memory manager' as it were too, malloc and stuff sure but not in the kernel, not in that sense anyway. Programs themselves manage their memory, depending on what language you use you may have to manage it, it could be manageg for you, it might use garbage collection etc etc17:47
tarpmanjoelio: there is absolutely a memory manager in the kernel, translating physical addresses to virtual ones and managing which pages are allocated to which processes17:48
gymdudein the task_struct of the kernel there is a memory substructure it uses but thats just to check if the task running can access this memory... is sharable block ,..etc17:48
joeliotarpman: I mean in the sense that gymdude was describing17:48
joeliotarpman: aware of that, otherwise how would KSM work ;)17:49
gymdudefs_struct is the substructure for what files the process uses , weather there locked ,..etc and the HDD file system contains the permissions/privilages for the user/groups for accessing/denying them17:49
gymdudeSo permissions and privilages are all part of the HDD drive nothing more17:50
joeliorigh17:50
gymduderegardless of what os's for the most part17:50
sypherThis is why physical access to a system can render the majority of security protections immediately moot.17:51
joeliorigh17:51
joelioright, time to go home, laters :)17:51
gymdudeunless of course they put more into a sub structure of the task_struct for process17:51
gymdudeat some point17:51
gymdudeeither way that wouldn't be worth it because you be chewing up memory at the same time as needing it stored on the HDD for permissions to be persistant over boot ups17:53
gymdudeso not really a point to put it in the task_struct for individual user or groups so much17:54
gymdude...That gets me to another point if you cann't get root privilages cann't you always boot a live cd and change the permission of the file you want to access without even having to mess with the passwd file or user anyway just change it to user 1 as owner instead of root on the HDD drive ...17:55
gymdudeprovided you know where on the ext 4 or so you need to change to do this17:56
tarpmanyes. as sypher said, physical access lets you do pretty much anything17:56
gymdudeequivalent of sudo chown  ... but directly modifying HDD bits17:56
tarpmanthat sounds like a lot of effort. I'd boot a liveCD/liveUSB and use chown :P17:57
tarpmanor use passwd and reset the root password, or, or, or, ...17:57
syphergymdude: I feel compelled to observe that you're going through an awful lot of effort to appear knowledgeable about disk and memory data structures, without even a basic understanding of how permissions are managed by the system itself. This seems... backwards.17:57
tarpmanindeed17:58
gymdudeya your right i am over complicating things17:59
syphergymdude: If I had a recommendation, it would be to set aside what you think you know about how these data structures function, and start at the foundations. Learn the operating system and how permissions and privileges are managed. Only then can you put the more advanced topics in the proper context.17:59
syphergymdude: To be clear, I'm not trying to offend or otherwise demean. I do, however, have a number of years' experience teaching these sorts of topics, and I don't want you to trip yourself up while you're trying to learn.18:00
gymdudethere managed by the file system driver program18:00
gymdudeand the ext4  file structure18:01
gymdudeor in general the file system driver and file structure18:01
gymdudeJust different file systems store the permissions and privilages in different ways i.e registers , databases , cluster fields for fat , ntfs MFT or directory entries18:02
gymdudejust over thinking it thanks18:03
geniiMight want to read http://tldp.org/HOWTO/html_single/Security-HOWTO/18:07
gymdudeAnd LSA secrets whas before the invention of syskey for encrypting the same either way one can obtain these with bkhive and other register scrubbing programs18:24
gymdudeBut i am curious if one has bitlocker or whole HDD encryption  How can one ever do password reset thru bkhive, chntpw ,...etc like programs18:25
syphergymdude: Without the key, you don't.18:25
gymdudebut wait whole drive encryption or bitlocker encryption doesn't encrypt the system partition and thats where the sam file is so one should beable to password rest a user without decrypting the data paritions18:29
gymdudeSo adds no additional difficulty in changing the sam or changing passwords for the user18:30
gymdudei would think18:30
gymdudekind of confused on this if the system files aren;t encrypted and its not at the bios level for decrypting the HDD then how is it going to provided any more security18:31
tarpmangymdude: maybe there's a channel for discussing bitlocker and windows security, but I don't think this is it18:32
gymdudeok last question if one did change the sam file with an encrypted drive  what would happen the partition isn't being encrypted just the data so the os should boot and you should beable to change the password to use the machine except it won't decrypt your other paritions18:33
gymdude...so you won't get the data but you should beable to get a usable working os's18:34
sarnoldif you want a usable working OS just stick in a USB stick or something18:34
gymdudetrue good point18:35
syphergymdude: None of this is on topic for this channel, so we're clear.18:35
gymdudebut was curious of that18:35
tarpmangymdude: depends entirely on which partitions you encrypt. if / and /home are on different partitions, and you encrypt /home but not /, then yes, you'd have a working system but no access to data18:35
asrockushola18:35
asrockushay algn canal de ubuntu server español ?18:35
sypherIf he's discussing SAM files, he's not talking about Ubuntu (or any Linux) anymore.18:35
tarpmangymdude: ... but in that case you'd also have a perfect opportunity to sneak in a rootkit or something. so IMO you want to encrypt everything, all of /18:35
sypher!es18:36
ubottuEn la mayoría de los canales de Ubuntu, se habla sólo en inglés. Si busca ayuda en español entre al canal #ubuntu-es; escriba " /join #ubuntu-es " (sin comillas) y presione intro.18:36
sarnoldasrockus: #ubuntu-es XD18:36
asrockussarnold muchas gracias !18:36
sarnoldde nada :D18:36
asrockusxD18:37
gymdudebut can you encrypt the system paritions as well thus the complete HDD and have the bios some how decrypt and encrypt the whole thing at boot up so its like boot up---> decrypt os system paritions   ---> decrypt data partitions/others --> run the os18:37
asrockusestoy tratando de configurar ubuntu server pero se me es muy complicado jajaja18:38
gymdudeBecause thats the only true way to stop password resets or any uses of that particular installment to the person that has the key18:38
syphergymdude: It doesn't decrypt it on the disk at all. Data read is decrypted in memory, data written is automatically encrypted on write.18:38
tarpmangymdude: not that I know of. every setup I've seen, you need the bootloader and /boot (kernel and initramfs) available and not encrypted18:38
tarpmangymdude: if you want to ensure no one has snuck a rootkit into your bootloader or kernel, you're looking at TPM and/or Secure Boot18:38
syphertarpman: Newer versions of grub support an encrypted /boot.18:38
tarpmansypher: nifty! noted, will look into that18:39
tarpmanso s/bootloader or kernel/bootloader/ above :)18:39
gymdudebut for going one level higher encrypting / that would take firmware or bios to do it18:39
gymdudejust curious if they have that18:39
tarpmangymdude: no, encrypting / does not require firmware support18:39
syphergymdude: No, it would take a bootloader, which is ... what I just said.18:39
gymdudeits definitely not need in most cases over kill just curious18:40
sypherIt's not overkill at all.18:40
syphergymdude: Where are you getting these opinions/observations?18:40
gymdudeNo i meant not / but the whole HDD when i said that so MBR and partition tables encrypted18:40
gymdudeto18:41
tomreynit's possible, but involves manual adjustments and it's easy to break it. http://www.pavelkogan.com/2014/05/23/luks-full-disk-encryption/18:41
tomreynthis is not with "secureboot" / TPM involved, though, though this may also be possible.18:42
gymdudeya i get you but i was think more local not thru a network resource just a whole internal HDD  being encrypted by itself standalone18:42
gymdudethat link isn't quiet that18:42
syphergymdude: It's recommended that you create one container partition for the encrypted data, then store everything else insite that container.18:42
sypherTrying to just encrypt a whole disk device is a recipe for something between aggravation and disaster.18:43
tomreyngymdude: if you're tlaking self-encrypting storage media (so, in hardware / drive / controlelr firmware), this would be something for ##hardware rather than here.18:44
gymdudeso you basically have grub unencrypted but password protected and the other paritions holding different os with data and system files or other thing completely encrypted18:44
gymdudeBut your still relying on the boot loader at the top level being unencrypted18:44
tarpmanwhich is why I was talking about secure boot - to ensure the boot loader stays trustworthy18:44
sypherThat's really the only good way to do it.18:45
gymdude... I want to know if there is away to complete encrypt that to and do the encryption / decryption of the boot loader from the bios or firmware level thus making it one layer more secure18:45
gymdudewhat does secure boot do18:45
tarpmanone layer more secure? one layer more fragile, more like18:45
tarpmangymdude: don't make me LMGTFY you.18:45
syphergymdude: You really are taking this to an extreme without understanding any of the components.18:46
tarpmangymdude: go away and read every single post on mjg59.dreamwidth.org and then come back and we can talk18:46
syphergymdude: And from the tone of the responses you're getting, I'm not the only one getting a bit annoyed by the fact that you're not doing your own homework/learning.18:46
gymdudeI just wondering if manufactures ever made one not it would be useful as much more for research18:46
sarnoldgymdude: many hard drives have variants that support on-disk encryption. Most people don't trust these drives entirelly because firmware authors have a tendency to suck at their jobs and write terrible firmware, but it is an option18:46
tarpmandon't get me wrong, I love talking about this stuff18:46
syphersarnold: 100% truth, there...18:47
syphertarpman: pm okay?18:48
tomreynthis discusses the "secure boot" process http://www.linuxjournal.com/content/take-control-your-pc-uefi-secure-boot18:48
tarpmansypher: yeah, I'll take the noise elsewhere. sorry.18:48
gymdudeO ya secure boot is the bios thing i am talking about to some extent18:51
tewardsarnold: ping19:25
tewardsarnold: http://paste.ubuntu.com/23834943/19:25
sarnoldteward: excellent! :D19:27
tewardsarnold: so we *know* it builds here right19:27
tewardso now I can work on the merge.19:27
teward... but not this weekend19:27
tewardgot plans19:28
tewardsarnold: so yes, at least the executable and such is all PIE/PIC enabled19:28
tewardbut I *did* have to compile it with -fPIC flags to make it obey for the module builds :/19:28
tewardsarnold: is there a reason dpkg-buildflags' CPPFLAGS or CFLAGS, when +pie is enabled in the hardening flags, that it ***doesn't*** put -fPIC into the flags?19:29
tewarda security-specific reason19:29
sarnoldteward: PIC forces a huge number of variable refernces through the global offset table. or procedure linkage table. Or something like that. It typically introduces a larger performance penalty.19:30
sarnoldteward: but there's possible changes afoot. see the huge thread here, and especially the paper https://sourceware.org/ml/libc-alpha/2016-12/msg00954.html19:31
ubottusourceware.org bug 2016 in libc "argp --help infloop, via ARGP_HELP_FMT envvar" [Normal,Reopened]19:31
sarnoldubottu: shush you got it wrong19:32
ubottusarnold: I am only a bot, please don't think I'm intelligent :)19:32
tewardsarnold: ah, OK.  I have no choice but to either enable PIC with PIE, or disable PIE altogether for the merge19:38
tewardand I presume you would rater PIE+PIC than -PIE19:38
sarnoldteward: absolutely19:38
tewardOK19:38
tewardwe'll add that to release notes then about the potential performance hit19:39
sarnoldit might be worth benchmarking it first :)19:39
tewardif I get it in before FF19:39
sarnoldx86 will probably suffer more than x86-6419:39
tewardsarnold: we already have this issue noted with +PIE since Xenial19:39
tewardand others19:39
tewardI don't have a choice here, though, on building.  It's either +PIE+PIC or -PIE.19:39
tewardperformance impacts aside19:40
teward(since most server installs I know of are 64bit, I'm less concerned about i386)19:40
tewardi think this was discussed a long while ago when we first got the request to turn on PIE on it19:40
tewardsarnold: I'm more inclined to just enable it and make a note there may be a performance impact, especially on 32bit.19:46
tewardsince +PIE+PIC is better than not having either19:46
tewardsarnold: at least, according to you.  If they get changes working that'd be great19:48
tewardto reduce that impact for fPIC, but apparently it's needed for nginx currently.19:48
sarnoldteward: works for me. typically if someone really cares about eeking out the last few percentages of performance, they'll recompile with their specific architecture in the compilation flags and use profile-driven optimizations anyway. they can do what they want with the pic/pie on their own systems. :D19:49
tewardyup19:50
tewardsarnold: that's the argument we made when we enabled PIE in the builds for Trusty or something19:51
teward'twas a feature request :P19:51
tewardbut got it approved19:51
sarnoldwoot19:51
tewardand we'll make sure to make a note in the release options19:51
tewards/options/notes/19:51
tewardthis weekend I have plans though so it's a "Not caring much" weekend :P19:51
sarnoldFF is still ages away, no real rush yet :)19:52
tewardsarnold: well, i have other obligations too, time wise19:53
tewardso :P19:53
tewardbut the *hard* part is done19:53
tewardthe PPA builds as-is are Debian, so I just have to add the Ubuntu delta to that19:53
tewardthough I think I found a critical install-from-scratch bug19:53
tewardso i have to test that further19:53
gymdudealso curious how does the andriod linux os on a phone do set it up so there is no root user?20:04
gymdudeLinked with the uid 020:04
tarpmangymdude: sounds like a question for #android20:04
gymdudebut its a general unix/linux os question20:05
tarpmanthis is #ubuntu-server, not #general-unix-linux-os-questions20:05
gymdudelike how to remove root20:05
Picior ##linux20:05
gymdudeobviously you cann't remove uid 0 but the username associated with it seems to be20:05
gymdudeso how do you disassociated any username with uid 020:06
gymdudeanother words20:06
tarpmanmy android phone certainly seems to have uid 0 named 'root'20:06
tarpman'id root' says uid=0(root) gid=0(root) groups=0(root)20:06
gymdudethat would answer my question in general for any unix/linux like os weather it be for a phone/embedded device or for a compute20:06
gymduder20:06
gymdudeSo then whats stopping you from rooting or sudo su to the root?20:07
tarpmanthere's definitely no sudo on my phone20:08
gymdudeIf you copy over a sudo program20:08
tarpmanand su - I don't think root has a password, and if it does I don't know it20:08
tarpmanif I copy over a sudo program, I have to be root in order to set the suid bit20:08
gymdudeYa so how does one copy over a sudo or any program and set it to an owner of root  uid 0  without actually being able to sudo chmod , chown ,..etc20:11
* lynorian wishes she understood what these flags were 20:12
tarpmanyou don't :) that's the whole point20:12
tarpmanlynxman: which ones? suid/sgid?20:12
tarpmanlynxman: excuse me20:12
tarpmanlynorian: ^20:12
lynoriantarpman, That was not in response to you sorry I was scrolled up20:13
gymdudeyou should beable to edit the sudoer and other files in /etc if you go from a live cd right20:14
tarpmangymdude: sure20:14
gymdudeO but these parititions are internal so you would kind of need an adb to connect to which is not at uid 0 privilage level anyway20:15
tarpmanright, adb doesn't give you a root shell unless the phone is already rooted/otherwise had 'adb root' enabled20:16
sypherHow is this related to Ubuntu server support?20:17
gymdudeso how does one enable adb root20:17
sypherPlease take this to offtopic.20:17
geniiAlternately, #android or #android-root20:17
sypheror that.20:17
gymdudewhy cann't you just leave the sudo , su programs on the sd card and change them to the right permission with your live cd distro20:19
gymdude...Why do they need to be executed under the internal paritions thru adb20:19
gymdudeshell20:19
gymdudein the first place20:19
sarnoldgymdude: man 8 mount -- look for nosuid20:21
gymdudeO wait the terminal your going to need to execute them in would need to be thru adb never mind. So the only true way is to fastboot to an image file ... then mount the imagine changing the permissions and reflash it20:21
sarnoldgymdude: of course modern androids also use selinux to further confine processes beyond the usual unix security model20:22
sypherGuys, please. This is off-topic for this channel. Please find a more suitable forum.20:22

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!