/srv/irclogs.ubuntu.com/2017/05/16/#ubuntu-server.txt

CarlenWhiteI'm having a mild panic over the whole ransomware shanagains.01:29
CarlenWhiteWhich doesn't apply to Ubuntu machines, of course. But I'm tasked to migrate a Ubuntu file server to Windows for future-proofed service which leaves me with that glaring cravat.01:30
pmatulisJust say 'No'02:15
sarnoldonce the system has been replaced by a windows machine, the original machine could be turned into a handy zfs storage target, and store snapshots from the windows machine02:17
sarnoldthat way when the botnets invade and encrypt all the things, you'll have snapshots to roll back to02:17
trippehthen again the main reason MS still ships SMBv1 enabled by default is due to crappy linux based devices requiring it ;-)02:19
sarnoldlol02:20
cpaelzergood morning05:37
sarnoldcpaelzer: isn't it too early? are you trying to take over pitti's spot of being awake entirely too soon? :)05:37
cpaelzeroh I'm actually here a while already sarnold05:38
sarnoldoh my :)05:38
cpaelzersarnold: it isn't that badwaking up 5am (homoe work) 6.15am (kids) ~7.xx (start) - that is not too early05:38
cpaelzerhomoe sounds interesting, but is just cleaning up and prepping kids food :-)05:39
sarnoldlol05:39
sarnoldpoor kids, that's also too early :)05:40
cpaelzersarnold: unless I want to shove them from bed to school instantly that is the time they need05:40
sarnoldlets hope the first hour or two is classes that don't matter much, hehe05:41
geekhelp me? https://bpaste.net/show/0a5a7299eea807:46
geekI am trying to allow remote access for my postgresql server07:46
sarnoldgeek: looks like it's bound to localhost rather than 192.168.0.100 or 0.0.0.007:49
andolgrep "listen_addresses" /etc/postgresql/*/main/postgresql.conf07:49
geekI did hostssl  all             all             0.0.0.0/0          md507:50
geekalso listen_addresses = "*"07:50
geekmaybe the hostssl is the problem, let me try host07:50
geeknmap only show port 2207:51
geekI did ufw allow 5432 already07:51
geekufw allow from 192.168.1.102 which is the ip that I am trying to connect07:52
sarnoldI don't think the firewall rules would influence which IP addresses it listens to07:53
geekmy conf https://bpaste.net/show/4e9f2edcd37507:57
sarnoldmaybe throw a gigantic error into the file and make sure that postgresqal refuses to start at all? just something to double-check that the two of you agree on which file to use to configure it :)07:59
adacHi guys, is it possible to reserve memory for the OS itself? If yes how?09:19
rbasakWhat do you mean by "the OS itself"?09:20
adacrbasak, there is one aplication that eats up all memory09:21
adachmm but maybe the better approach would be to limit the memory usage of that  app09:22
adacinstead of "reserve stuff for the OS itself" which is rather ah broad term as you say09:22
jamespagemwhahaha: I'm just pushing fixed versions of openstackclient + deps to pike-updates10:26
jamespageshould sync out in the next hour to the UCA10:27
mwhahahajamespage: ok since we use the openstack infra mirrors it'll probably be a bit longer. I'll let you know (they are still failing at the moment)13:47
jamespagemwhahaha: ack13:47
jgehey all good morning, I have an Ubuntu server with two nics facing two different networks, I'm setting up a default route for one of them and the other I'm doing a route after the system boots up, is this the correct way14:48
jge?14:48
jgeadding* a route14:49
geekanyone recommend me a good tutorial for setup ssl in posgresql?14:56
naccjge: is there a reason you can't setup default routes for both at boot?14:57
jgenacc: I could do that but I thought configuring multiple gateways was bad practice..15:00
qman__multiple gateways is fine but they won't "just work", there are a few ways to do it, setting up metrics, or configuring the kernel, etc15:03
qman__if you just set two gateways, you will have a bad time15:03
qman__for a specific route, the way I do it is in /etc/network/interfaces, I add "up ip route add ..." and "down ip route del ..." for the interface the route is on15:05
qman__jge: ^15:08
jgeyikes, I see what might be going on.. this is a remote server with two NICs one facing the management LAN and the other is to an upstream provider (internet).. the way we log into this box is through a VPN which lands on the management network, problem is that all VPN traffic is seeing as coming from a public IP so return traffic is probably being forced through my default gateway instead of the15:08
jgemanagement lan15:09
jgethis public IP being our office IP15:12
jgeso I can add a static route but this will create problems as this is also a webserver, so whenever anyone tries to access it from the office (no VPN) the box will route all return traffic through this static route out to the management LAN..15:13
jgedamn :(15:14
jgeqman__: if I specify a metric in a default route, would it try the lowest metric first then move on to the second? any other way I can have both responses (return traffic) go out to both gateways?15:30
jgeor that's a bad idea..15:30
jgeor I'm wondering if there's a way to tell the box to return traffic through the same interface it was requested from..15:33
qman__you have to tweak the kernel settings for that15:34
qman__https://unix.stackexchange.com/questions/4420/reply-on-same-interface-as-incoming15:34
=== dpawlik is now known as _danpawlik
=== _danpawlik is now known as danpawlik_absent
tomreynit sounds like the real issue you have therre is that requests tunnelling your site-to-site vpn end up as coming from a public ip address15:41
jgeqman__: that could be  a solution, thanks for that.. how would I make that rule and route persistent though?15:43
jgetomreyn: I know.. our server is colocated and the company who does it asks all clients to NAT interesting traffic to either a subnet they give you or your public IP15:44
jgeI guess we can change it but geez that will take days for them to do..15:45
naccUbuntu Server Bug Squashing Day #4 will be tmrw, here15:47
naccjust sent an e-mail to the server list re: the same15:47
CapprenticeHi where is the option to select the custom adapter. Here i want to select eth0,eth1 and eth2 for seperate bridge vmnet1,2 and 3. https://i.imgur.com/KR6bwYK.png16:09
geekI am able to connect through pgadmin3 but not with psql http://sprunge.us/UfOC  https://i.imgur.com/TMJegsm.png http://sprunge.us/QOYO?c++ I am setting up ssl in postgrs on ubuntu server16:12
=== JanC_ is now known as JanC
rbasaknacc: not sure about bug 165846917:13
ubottubug 1658469 in apache2 (Ubuntu) "mod_http2 is not available under Apache 2.4.23 / Ubuntu 17.04 xenial" [Low,Fix committed] https://launchpad.net/bugs/165846917:13
tewardrbasak: refer to -hardened and my mention about nghttp217:13
rbasaknacc: to my knowledge we've never added and then removed things to avoid putting things in an LTS.17:13
rbasakYeah I saw that, but nacc wasn't in that channel.17:13
tewardyep.17:14
tewardnacc: IIRC, the Security team had NACK'd http2 back in Xenial17:14
tewardat least nghttp217:14
rbasaknacc: if it's not good enough for an LTS, it's not good enough for a non-LTS release.17:14
teward(NGINX rolls their own implementation separate from nghttp2)17:14
tewardrbasak: any chance that upload to proposed can be NACK'd and rejected because of the MIR and nghttp2 contention?17:16
rbasakteward: let's see what nacc thinks. If we did decide to reverse this, we'd upload a revert to artful-proposed, and that's make any MIR moot.17:17
tewardmmkay.  Just thought I'd ask :)17:18
naccrbasak: yes, this was the plan with the security team17:31
naccrbasak: as in, we want it in 18.04 presumably, (another 2 years of no http/2 support seems less than ideal)17:32
naccrbasak: and 17.10 is an appropriate place to start staging it17:32
naccrbasak: if you want me to upload a version that again drops it, I can, but the whole point is for the MIR to be processed, one way or another17:32
naccrbasak: i guess i don't understand what you mean by "to my knowledge we've never added and then removed things"17:33
mdeslaurrbasak: nacc summed it up17:33
tewardnacc: I think one big concern will be https://bugs.launchpad.net/ubuntu/+source/nghttp2/+bug/1677958 unless we've confirmed it's been fixed17:41
ubottuLaunchpad bug 1677958 in nghttp2 (Ubuntu) "no SSL certificate verify " [Undecided,Confirmed]17:41
tewardlast update was the 3rd, code maintainer saying they confirmed the bug17:41
naccteward: i think i addressed that17:41
tewardand large text in the source code making a note insecure for production use17:42
nacclet me find the e-mail17:42
naccthe reported e-mailed me offline17:42
naccteward: that particular chunk of code is an example in their docs, iirc17:42
naccteward: and the automated 'static analysis' tool that perosn is using is dumb and doesn't know that17:42
naccteward: it's not part of nghttp's shipped libraries or binaries, afaict17:43
naccteward: the upstream response was: http://paste.ubuntu.com/24588157/17:44
tewardnacc: then i think bug triage needs done on that bug as 'It's not part of the standard code, so not a bug"17:44
tewardjust saying :)17:44
naccteward: i know17:44
naccteward: it's on my todo17:44
tewardin any case, if that's a non issue then the MIR reviewer will get the next say heh17:44
naccI'll just do it now17:44
teward... oh dear, i found a vulnerable system on my network...17:44
teward*disappears to fix it*17:44
SkittishtriggerIf one were to have two updated 16.04 servers. One being in use with some basic installs and a few extra and the other being a shiny, new, better and better server. Is there a built in migration functionality or a package that can be used to gather all installed data (installed packages, db files, installed web apps, etc) and transfer or mirror exactly what is on server A(old) to server B(New)?17:50
dasjoeI have heard about third-party tools for migrations like that, I do not know how well they work17:51
tewardSkittishtrigger: o dpm17:52
tewardoops17:52
tewardSkittishtrigger: I don't think there's any guaranteed-to-work tool for that17:52
dasjoeBut with both machines being somewhat alike I would try rsyncing / over to the new one's disks by using a live system, chrooting into the cloned system and letting grub reinstall itself17:52
tewardnormally I just backup the configs on server A, copy to Server B after backing up the distribution-default configs, and test from there to make things work17:52
dasjoePay attention to fstab and mdadm17:52
SkittishtriggerDang. I have been reading up and it seems everyone has an opinion on how to do it and whats best but no definitive answer for it.17:53
dasjoeSkittishtrigger: another popular answer would be "destroy old server, restore on new one from backup". Alternatively "have your configuration management reprovision everything on the new hardware"17:57
SkittishtriggerI was hoping there would be something using a script where you do movethisbox.sh and in the script it finds(greps, ls, w/e) all files, makes a list of all packages and versions, copies all databases, copies all configs, copies all user/www/srv files, and puts all this into a tar or zip with another script that auto installs it all.  Just cause I have hopes and don't want to do it manually. lmao18:02
SkittishtriggerOh well, guess I have to be all proper abou it. lol. Thank you both for your time and help.18:04
dasjoersync -aAXv --exclude={"/dev/*","/proc/*","/sys/*","/tmp/*","/run/*","/mnt/*","/media/*","/lost+found"} root@old-server:/ root@new-server:/mnt/rootfs/18:09
rbasaknacc: what if upstream don't declare it ready by 18.04?18:13
naccrbasak: we'll hold back the internet by not supporting http2 :)18:16
tewardnacc: I think the core issue is that it's still considered "experimental" by Apache18:17
tewardnot whether we're holding back the Internet or not18:18
tewardIIRC that was the original issue too18:18
naccright18:18
naccbut experimental in this case means the spec can change18:18
naccin any case, isn't this what  MIR would address?18:18
naccamongst other issues18:18
thatstevecenaHas anyone seen this SSL error on Ubuntu 14.04LTS - error:0407006A:rsa routines:RSA_padding_check_PKCS1_type_1:block type is not 01; error:04067072:rsa routines:RSA_EAY_PUBLIC_DECRYPT:padding check failed18:18
naccalso, people have been asking in the apache page about that status with no response18:18
thatstevecenaThey verison of OpenSSL that ships with 14.04 has left official support18:18
thatstevecenai cant figure out how the error is occuring, but the openssl library seems to be the logical choifce18:19
dasjoeNo, it's more likely a problem in your key file18:19
thatstevecenadasjoe: if i decrypt manually everything works18:20
dasjoeManually, as in with pen and paper?18:20
thatstevecenadasjoe: decryption also works for ~1 hour or more and then i just get pelted with that error18:20
thatstevecenasadjoe: no; im doing DKIM18:20
thatstevecenadasjoe, sorry18:20
thatstevecenaif i use online tools (any of them) all the decryption works fine18:21
naccteward: i'll ask apache2 folks18:21
JanCmanually on the same system?18:21
thatstevecenaJanC: no, third party sites. on the host system it works perfectly for a while. then something happens on the system & it just starts failing everyone18:22
JanCthat's really weird; memory issue or something?18:23
thatstevecenaim googling anything i can think of but nothing is getting me closer to an answer18:23
dasjoethatstevecena: memory gone bad?18:23
thatstevecenaJanC: now that i think of it maybe it is18:23
thatstevecenaor could be rather18:23
thatstevecenawe were looking to move to 16.04LTS anyways. i can grab fresh hardware & see if that fixed it18:24
thatstevecenafixes*18:24
thatstevecena(we're on 14.04LTS now)18:25
JanCdisk issue could in theory also be the issue, if it's flaky and sometimes returns corrupted data18:25
thatstevecenaJanC: very good points i hadnt though od18:26
thatstevecenaof*18:26
dasjoeI wouldn't consider disk issue if the process keeps running, I doubt it'd unload the key from RAM18:27
thatstevecenadasjoe: process yeah, keeps trucking right along18:28
JanCdepends on whether it forks workers or something like that18:28
thatstevecenait just goes from working to failure18:28
thatstevecenasadly its my only MTA so taking it offline to check anything isnt possible18:29
thatstevecenathis is all good though. ive been banging my head against this for about a week. its given me some new angles to think from18:31
thatstevecenaoh; something else this made me think of:18:33
thatstevecenawe're currently using Untangle for antispam. it works more like a packet sniffer than an appliance. it stands to reason that it could be causing issues too, no?18:33
tewardnacc: I think the HTTP/2 spec is pretty solid at this point, unless you're saying it's still under massive changes and revision (which it usually was doing)18:35
naccteward: no, the 'experimental' of mod_http2 is that mod_http2 itself isn't fixed yet18:35
naccteward: per their own text18:35
naccteward: it's not about http/2, it's about their implementation of what mod_http2 does18:35
tewardah, i mention because:18:36
teward[2017-05-16 14:18:26] <nacc> but experimental in this case means the spec can change18:36
tewardambiguity :p18:36
naccyeah, spec of mod_http218:36
naccsorry about that18:36
tewardnacc: ambiguity is the death of developers :)18:36
tewardno problem.18:36
naccteward: yep :)18:36
tewardnacc: if they don't even know what they all want to do with it yet, I'd consider it unfit for LTS, but it's ultimately not my call18:36
teward(nginx is more cared about than Apache by me heh)18:36
naccteward: right, but i can't know if they will stabilize it by 18.0418:37
naccteward: so that's what i'm trying to figure out18:37
tewardnacc: if they don't respond back, it may be safe to assume they don't even know heh18:37
naccteward: i think they're just reserving the right to change behavior still18:37
naccteward: also, the 'experimental' status in apache2 i think means taht between releases, interfaces/directives might change18:40
naccit's basically an out that they dont' have to stay BC18:40
thatstevecenathank you everyone. im going to go down the server rebuild path on newer hardware. i appreciate the help!18:49
=== vamiry_ is now known as vamiry
federicoaguirreHi people.!22:16
federicoaguirreI've a question22:16
federicoaguirrehow you protect against rnswr attack?22:16
sarnoldwhat's "rnswr"? google's no help22:23
federicoaguirresorry... ransomware.!22:24
tewardfedericoaguirre: backups, updated antivirus, patch all your systems, don't open suspicious links, sites, emails, attachments.22:25
tewardcommon sense protections22:25
tewardand backups in the off chance you *do* get hit so you don't lose all the data22:26
sarnolddisable password logins on ssh22:30
sarnolddon't use web-based control panels22:30
tewarddisable 'root' logon via SSH22:34
tewardbeat yourself against the wall when you do get crypto'd22:34
tewardwait... that's not a protection.22:34
tarpmanteward: well, maybe it protects against a recurrence. one hopes22:36
federicoaguirreThnks to all guys.!22:42
tewardtarpman: :P22:45

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!