/srv/irclogs.ubuntu.com/2017/04/23/#ubuntu-server.txt

=== MCMXI is now known as nineteeneleven
=== nineteeneleven is now known as MCMXI
=== JanC_ is now known as JanC
c0mradeWhat's the fix for the DCCP exploit Linux Kernal 4.4.0 for Ubuntu 16.04.2 LTS? I just downloaded the latest version and apparently it's vulnerable to that! :D09:31
ikoniac0mrade: the ubuntu maintainers will patch and maintain the kernel09:32
ikoniayou don't need to worry about that09:32
ikoniaand based on the fact that you are opening up your host to attack from everyone and then wondering why it's crashing all the time, I suggest you adjust your approach to security09:32
c0mradeikonia: It's not crashing all the time...09:33
c0mradeOnce you execute the exploit it does.09:33
c0mradeWhich means the latest available version for ubuntu-server available for people online is vulnerable to this attack.09:34
ikoniac0mrade> Who's crashing it for real?09:34
ikoniac0mrade: bottom line - just trust the ubuntu maintainers to patch and maintain the kernel, they know much better than you09:34
c0mradeikonia: I gave access to my box and am willing to give again, "stryngs" from ##security spent like an hour and couldn't get root or compromise the network.09:35
c0mradeI mean is there a fix available online?09:35
ikoniafix available on line....what are you talking about09:35
c0mradefix for this issue? like an update...09:35
c0mrade?09:35
ikoniac0mrade: the ubuntu developers and maintainers will patch and maintain the kernel for you09:36
ikoniaupdates will be pushed by the ubuntu maintainers, they know and understand bugs better than you09:36
c0mradeikonia: When, how? Will someone from them login to my system and do it? Or will I have to wait until further notice.09:36
ikoniac0mrade: the updates are released to the ubuntu pakage repos09:37
ikoniahave you actually checked if the ubuntu kernel has that vunerablilty ?09:37
c0mradeAre they already released? This issue has been for a while and it's a server edition distro, severity and impact should be as 'critical'.09:37
ikoniahave you actually checked if the ubuntu kernel has that vunerablilty ?09:37
c0mradeikonia: Yeah it does and it the exploit crashed the system, I have to manually reboot it, it freezes.09:38
ikoniahow do you know ?09:38
c0mradeBecause the exploit is in the home directory, being put by someone and ran by him, evertime he ran it, the system crashes and I can see all the kernel messages on the screen...09:38
ikoniac0mrade: you're giving access to your host to strangers on the internet who are crashing your box...and thats how you maintain security09:39
ikoniaactually look yourself09:39
ikonialook at the CVE - look if it impacts the ubuntu kernel you are using, find the CVE bug in launchpad and look at the fix status09:39
ikoniayour attitude to security is unacceptable and your expectation is unrealistic09:40
c0mradeikonia: It's a simple exploit, am talking about something else, dont worry about me and my insecurity. I'll handle that myself. My question is that ubuntu latest distro proved to be susceptible to a known exploit. It crashes the os.09:40
ikoniac0mrade: you have no idea of that09:40
ikoniaand you're not asking a question - you're making a statement that may or may not be true as you've not really checked it09:40
c0mradeikonia: I have 100% confirmed it now.09:43
ikoniahow09:43
c0mradeI ran the exploit and my system crashed.09:43
ikoniahow09:43
c0mradeHow what?09:43
ikoniahow did you run the exploit09:44
c0mrade./a.out09:44
c0mradeIt's a c file09:44
ikoniawhat does a.out do09:44
ikoniawhere did you get it ?09:44
c0mradeI gcc compiled it09:44
ikoniawhere did you get the source09:44
c0mradeSomeone uploaded it to my box.09:44
ikoniaunacceptable09:44
ikoniaagain - you're letting random strangers put software on your box09:44
ikoniathat is not how you judge security threats09:44
ikoniaand this channel will not respond to security issues verified in this way09:45
c0mradeikonia: That's not what our concern is now. Again don't worry about my security. I'll burn in hell why would you care? Again my concern is elsewhere now.09:45
ikoniayour "report" is not an acceptable test09:45
ikoniaI've told you how to verify the vunerability and risk09:45
ikoniaand you're just trusting random strangers on the net to give you random code to run on your host - unacceptable way to test09:46
c0mradeikonia: That's the exact real way for testing...09:46
c0mradeIt's the real world.09:46
ikoniano it's not09:46
ikoniaand that is so far from the real worl - it's un true09:46
c0mradeIn the real world there's no one caring about how would you test the system, how would you report an issue, a 0day is developed and tested.. That was a real world scenario.09:48
ikoniain the real world people do controlled verified tests09:48
ikonianot asking random strangers to upload code to their box09:48
c0mradeikonia: Not if it was a real attack.09:48
ikoniaenought09:48
ikoniaenough09:48
ikoniaI've told you how to verify the bug / risk09:48
ikoniado that - or do not ask again09:49
c0mradeikonia: Okay :)09:49
c0mradeUm it's not intended to crash the kernel but  to gain root, but the system crashes instead... https://www.exploit-db.com/exploits/41458/09:51
ikoniac0mrade: not what I said to do09:56
ikoniado that - or do not discuss it again09:56
c0mradeHere's the fix for it, how do I install that...10:03
c0mradehttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5edabca9d4cff7f1f2b68f0bac55ef99d9798ba410:03
c0mradeWhat's the most stable kernel for ubuntu 16.04.210:15
c0mradeI've got 4.4.0-62-generic10:16
c0mradeIs 4.8 the one?10:16
c0mradeLooking to run this: "sudo apt-get install linux-generic-hwe-16.04" the problem is that it wants to install some WiFi packages and thermald10:22
c0mradeWould it on a server edition?10:23
andolc0mrade: linux-virtual-hwe-16.04 is also an option10:42
c0mradeandol: What about the link I provided up above?10:44
c0mradehttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5edabca9d4cff7f1f2b68f0bac55ef99d9798ba410:44
c0mradeI just download it, unzip it and install it?10:45
andolc0mrade: The link regarding CVE-2017-6074?10:53
c0mradeYeah10:55
c0mradeI've posted it again above.10:55
c0mradehttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5edabca9d4cff7f1f2b68f0bac55ef99d9798ba410:55
andolYeah, but from what I can see it is already patched in the Ubuntu 16.04 kernel packages.10:56
andolhttps://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-6074.html10:57
c0mradeI've already downloaded the file, what's the next step?10:57
* andol has no idea what c0mrade is trying to accomplish10:58
c0mradeandol: read this10:58
c0mradehttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5edabca9d4cff7f1f2b68f0bac55ef99d9798ba410:58
c0mradesee you can download a file there.10:58
c0mradewhat does that file do when I download it, shouldn't it fix that bug?10:58
c0mradeIf it should, how do I install that thing10:58
andolYeah, you could use that patch to build a new kernel, but I have no idea why you would want that, since the regular Ubuntu kernels have already been patched for you.10:59
c0mradeif they've already been patched for me, what should I do now?11:00
c0mradewhat command should I issue to fix that11:00
andolThe same you would do for any other (kernel) security upgrade11:01
andolapt-get update11:01
andolapt-get dist-upgrade11:01
andolreboot11:01
c0mradeapt-get update already done11:01
c0mradeso apt-get dist-upgrade left11:01
ikoniac0mrade: I told you what to do11:01
ikoniaand I told you not to talk about it until you have done it11:02
c0mradeikonia: I am updating the system!11:02
c0mradeWhat am I doing wrong.........11:02
* andol reads a bit more backlog...11:02
ikoniaI told you to check if a.) that vunerablility had impacted the ubuntu kernel via the CVE reference and inclusion in the ubuntu kernel package b.) see if a fix had already been applied11:02
ikoniayou keep just doing / saying random things11:03
ikoniayou're whole basis for this conversation is because you let a stranger from the internet have full access to your machine and he gave you code that crashes your machine11:03
ikoniathis means NOTHING and is not a valid test11:03
c0mradeikonia: Full access? It was standard user!11:03
ikoniamap the CVE to the ubuntu package, then map any possible fix to an update included in the repos11:03
ikoniauntil you have done this - please stop discussing it11:04
c0mradeThere's no way I will give root.11:04
c0mradeIt's a standard unprivileged user.11:04
ikoniaplease stop discussing it11:04
ikoniayou let a stranger onto your machine and upload code and thats how you are now claiming this exploit11:04
ikoniaverify it how I told you - or stop discussing it11:04
c0mradeikonia: I am updating the system nevertheless, you can ignore my comment about the validity about this exploit. I want my system up to date, once am done I'll test that thing again and see.11:05
ikoniac0mrade: I told you at the start of your claim - the ubuntu maintainers will patch and maintain the kernel for you, they know better than you and updates will appear in the ubuntu repos11:06
ikoniawhy is your machine not up to date when I told you this at the very start of your exploit claims11:06
c0mradeikonia: Okay.11:06
c0mradeikonia: I've downloaded the ubuntu 16.04.2 lts from the official ubuntu website like a week ago and I thought it'll already have all the updates.11:07
ikoniac0mrade: no, as I TOLD YOU at the start, they will maintain it and push out packages to the reps11:07
ikoniarepos11:07
ikoniac0mrade: if you want to continue to use this channel - pay attention and stop with this silly time wasting attitude11:08
c0mradeOk.11:08
ikoniac0mrade: there will be no more warnings or discussion on your channel interactions, use the channel properly, with real problems and pay attention to the information given to you, or don't use it11:09
c0mradeikonia: Ok.11:10
[1]c0mrade.11:34
=== [1]c0mrade is now known as c0mrade
c0mrade.11:34
tomreync0mrade: with most irc clients, you can use the /ping command to ensure you are connected to an irc server / network11:39
c0mradetomreyn: I wasn't making sure of that.11:43
c0mradeI just regained my nickname.11:43
tomreyni see.11:47
hannaI have a machine that's running out of RAM and swapping, even though absolutely nothing seems to be using that memory.. the only clue I've gotten at all so far is that dmesg was full of NVRM: RmInitAdapter failed spam13:10
hannaI already unloaded the nvidia modules but the memory is still gone, apart from a hard reboot is there anything I can do to reclaim it?13:10
hannaI just rebooted it, I exhausted all ideas I had13:16
tomreynhanna: capture 'vmstat -s' and 'free -m' outputs when it happens again.13:25
tomreynalso "cat /proc/swaps"13:26
tomreynhanna: you can already check this now: cat /proc/sys/vm/swappiness13:27
tomreyncan we assume that you are running an fully patched system with an up to date kernel (not just installed but also running)?13:28
tomreynalso, which ubuntu release is this13:29
phpHey! One of my clients is having an issue with their server (Ubuntu 14.04). It boots but no longer accepts any SSH connections (Connection Refused).14:07
phpWe booted into their rescue OS (it's an OVH server, we used rescue-pro), mounted /dev/sda2 to /mnt, chrooted to that, then allowed port 22 via ufw. We also used update-rc.d to start SSH on boot.14:08
phpWhen we went back to the OS, SSH still wasn't accepting connections.14:08
phpIf anyone here has any ideas what could be the issue, please let me know. It's quite weird.14:09
dannysantosI have a home web server that is using freedns.afraid.org service for dynamic dns. Imagine my dns is alex.website.net and that is pointing to my home server. Does the traffic that goes to test.alex.website.net also reaches my home server?14:47
andoldannysantos: Not unless you explicitly configure it that way.14:53
dannysantosok, thank you andol15:03
drabphp: from the chroot you should have had acess to syslog from the previous run, ddi you check that?15:59
drabantyhing in there about ssh15:59
tomreynsyslog but also auth.log16:02
tomreynphp: ^16:02
phpdrab, damnit, forgot syslog16:03
tomreynalso make sure your client doesn't run a newer version which default to secure encryption / hashing mechanisms which old servers may no support, yet.16:03
tomreynphp: if you have OOB access to the server you can still access the log while the server is running16:04
tomreynphp: is it an OVH branded or soyoustart / kimsufi system?16:04
phptomreyn, kimsufi16:05
tomreynoh, most likely no OOB then16:05
phpNone of their services (ssh/apache/others I think) are listening on boot, which is strange.16:06
phpWaiting for rescue-pro again so I can check syslog16:06
tomreynyou or your customer are doing things wrong if you use those systems for business16:06
drabphp: ok then the problem is much deeper than ssh16:07
tomreyncould be a firewall issue16:07
phptomreyn, I uninstalled iptables and it still wasn't working16:14
tomreynokay, it was just a guess16:15
phpAlso, they're using this for personal use. Not a business-related server.16:15
tomreyn"sudo lsof -i :22" to ensure sshd is running / listening on port 2216:15
phpI can't get into the server to run commands like that16:16
tomreynright, sorry, i forgot you dont have oob16:16
phpWhich would be way easier if they picked SYS. SYS offers 24h/1w KVM16:17
tomreynas a costly add-on, which to install, can take a while, increasing your downtime. but i guess it wont matter for this system.16:18
phpHad they been able to get KVM, I would've had to charge them less and waste less of both of our time. :P16:18
phpI just wanna play games on the weekend :(16:18
tomreynthanks for reminding me - gonna play a gam enow ;)16:19
drabwhat's this game thing you speak of? :(16:20
drabjust finished building a new server and fans are spinning like crazy, don't get why16:20
drabsame build as the others16:20
phpdrab, games are weird things that has mathematical stuff going in the background to draw "pick-sells" or something to my screen?16:21
drabewww maths16:25
phptomreyn, https://gist.github.com/1DC/83e305aaa458c0168fd2c4671f1876a1 syslogs16:31
phphttps://gist.github.com/1DC/960a66dd0c949cade567586eb9eb5418 boot.log16:32
php^ potentially has the issue16:32
phpaskubuntu says not to worry about that one16:33
CarlFKphp: what is rtm?16:34
phpNo idea.16:34
draba more polite invite to reading the manual?16:34
phpI have my Google open, hold on. :P16:35
drabphp: where's the ssytem boot log part?16:35
phpdrab, hmm?16:35
CarlFKmy quick guess is the box has been hacked.   so shut it down, build a new one, restore backups, hope you don't put the exploit back in place.16:36
phpI might've found an issue!16:36
phphttp://i.imgur.com/yH9LOB1.png16:36
phpGonna remove that from fstab and see if it boots16:37
drabphp: that part of the log you pasted seems about right now16:39
drabsince you're saying that services aren't starting at boot what you should be pasting/looking at is the boot log part16:39
drabto see what happebned then, which maybe also has a hint about the fstab16:40
drabthe boot log saying everything OK is weird tho16:40
drabsince everything does not seem to be ok16:40
phpIssue fixed16:47
phpIt was their /dev/sda316:47
drabcool beans16:54
drabI wish my issue was fixed too...16:54
tomreyn'rtm' is OVH (the dedicated server hosting company's) 'real time monitor' https://github.com/wodim/ovh-rtm16:55
tomreyndrab: the game i played is in my host mask ( i don't want to advertise it here)16:57
CarlFKtomreyn: thanks.  kind like an back door.  maybe a back window ;)16:57
drabwith qemu, should I dance the hugepages dance? I'm not clear if it's important/recommend to set up hugepages at this point18:32
drabmost stuff I've read about qemu don't have it listed as steps/tunings on the host, but it seems to make quite a bit of sense18:32
drabaltho I'm unclear if it really makes most sense when you start to run a larger amount of instances Vs just one or two (my case since I'm mostly on lxd)18:33
drabsarnold: fwiw the other benefit I found of virtio-scsi is device naming, which are consistent with what you'd expect, ie /dev/sda18:40
drabthis makes stuff like preseeding qemu and pre-selecting devices a lot easier without having to maintain differences with qemu installs and using vdX18:40
CarlFKhttp://cdimage.ubuntu.com/releases/zesty/release/    "There are three images available, each for a different type of computer:    arm, ppc and s390x IBM System z18:47
CarlFKum.. where is x86_64?18:48
CarlFKI am looking for the zesty version of http://cdimage.debian.org/cdimage/stretch_di_rc3/amd64/iso-cd18:50
JanCCarlFK: http://releases.ubuntu.com/zesty/19:05
CarlFKJanC: thanks19:06
JanCCarlFK: that server has the official/supported releases; cdimage.u.c has "non-official" CD images19:09
ShaRoseanyone here use lxd with raw.idmap? It's not liking me very much at the moment.19:30
runelind_qwhich package contains lxc-attach?23:08
sarnoldlxc123:08
Posterrunelind_q: You can go to http://packages.ubuntu.com/, go down to the section that allows you to search the contents of a package and enter your file name of interest23:08
sarnoldor install apt-file; no webpages :)23:09
PosterThere's that too ;D23:09
runelind_qhrm, I wonder what value it is looking for with lxc-attach --name.  When I use the name in lxc list it says container not defined.23:14
sarnold"lxc list" is probably using lxd instead, in which case "lxc attach" may work better23:18
runelind_qhah, apparently it is a bug23:18
runelind_qattach is not an option of lxc23:18
runelind_qI have a CentOS container that won't let me ssh into it anymore.23:20
runelind_qrestarting doesn't fix it either. it was after I upgraded openssh23:21
rbasak"lxc exec foo bash"23:31

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!