/srv/irclogs.ubuntu.com/2017/05/19/#ubuntu-server.txt

smosernacc, here.00:55
=== krupke_ is now known as krupke
=== JanC is now known as Guest104
=== JanC_ is now known as JanC
cpaelzergood morning05:29
=== chmurifree is now known as chmuri
=== Olufunmilayo is now known as Adderall-OFC
=== Adderall-OFC is now known as Adderall
=== Adderall is now known as Olufunmilayo
=== ren0v0_ is now known as ren0v0
webnar_@ppetraki Hi07:32
webnar_the Raid still works without issues07:33
webnar_So indeed it looks like a bug in Ubuntu server 16.0407:34
joy-ictHi there :-) I'm looking for some help with setting up a forwarding dns07:41
joy-ictI want to use Moodle and Suitecrm outside the office. But the only things i can run outside now are SSH and Webmin07:41
=== _dpawlik is now known as dpawlik
coreycbjamespage: when you get a moment can you promote newton-staging to newton-proposed?12:13
=== Impaloo97 is now known as Impaloo
aaronrcpaelzer: happy to help further with the proposed verification of https://bugs.launchpad.net/ubuntu/+source/nagios3/+bug/1686768 when it gets to that stage. i'll continue to monitor the bug, and will check in here to find out what i need to do when the time comes13:39
ubottuLaunchpad bug 1686768 in nagios3 (Ubuntu Zesty) "Restricted contacts can see servers that do not belong to them" [Medium,Fix committed]13:39
DammitJimhave you guys disabled SMBv1 on all your linux systems?14:06
DammitJimsomeone just came to me telling me we need to disable it on all of our Linux systems because of the wanna Crypto vulnerability14:06
DammitJimhow true is this? or where should I go to get the truth?14:06
azidhakai don't think samba is vulnerable14:07
DammitJimdammit... it's so hard to find answers to these questions from a reliable source14:09
DammitJimazidhaka, nothing against you. I appreciate that at least you replied14:09
DammitJimbut I need something to backup my answers so that the company doesn't send me to update all my linux machines14:10
DammitJimI have other projects that need to get done and I don't know that this is a real critical problem at this time14:10
dpb1DammitJim: did they point you to a CVE?14:11
DammitJimno, this is more of an: I read a blog and they said you need to disable SMBv114:12
DammitJimnow, since they have posed the question, I have to show that it's not necessary14:12
DammitJimdoes that make sense?14:12
tewardDammitJim: does https://www.cyberciti.biz/faq/how-to-configure-samba-to-use-smbv2-and-disable-smbv1-on-linux-or-unix/ help?14:13
DammitJimteward, actually I think that's the article they read14:13
tewardDammitJim: ultimately CIFS / SMB will default to trying version 2.0 or 3.0 and fall back to 1.0 iirc.  That said, if you have older servers (Win 2k3) or servers which aren't new enough to support SMBv2 then, that's out of the scope of what you can do14:13
tewardDammitJim: that's... not an article, that's a how-to14:14
tewardand that only applies to Samba servers14:14
DammitJimbut I don't know who told this guy that he needs to disable SMBv1 because of wanna crypto14:14
tewardnot Samba clients on Linux devices14:14
DammitJimmake sense?14:14
azidhakaDammitJim: the samba vulnerabilites are listed here: https://www.cvedetails.com/vulnerability-list/vendor_id-102/Samba.html14:14
tewardDammitJim: because SMBv1 *is* ancient and vulnerable and should be disabled except for absolutely critical legacy support of things14:14
DammitJimagain, I am just trying to figure out if I need to disable SMBv1 because of wanna crypto or because of it being OLD and vulnerable in general14:15
DammitJimdoes that make sense?14:15
tewardDammitJim: stop saying "does that make sense"14:15
tewardit's irritating14:15
tewardyes, it does make sense.  you should disable for BOTH reasons14:15
DammitJimbecause if it is because of wanna crypto, I have to drop everything and disable SMBv1 on all my servers right now (test first)14:15
tewardand patch all Windows 7 systems.14:15
azidhakaDammitJim: if you have old clients which require smbv1, do not disable it14:15
tewardwindows 7 / 8 / xp systems *14:15
DammitJimbut if it is just because of it being old and vulnerable, I can table that and deteremine where it falls in my schedule of things14:15
azidhakaDammitJim: i wouldn't unless it vulnerable14:16
DammitJimyeah, windows server/workstations patching is in progress14:16
DammitJimteward, I'll stop saying "does that make sense"14:16
DammitJim;)14:16
tewardDammitJim: unless your LInux systems are running Wine, then, you shouldn't disable SMBv1 unless it's absolutely necessary to disable it.14:16
tewardWannaCrypt won't hurt your Linux boxes unless you've got Wine, and unless your SMB servers are internet facing directly I'd be a little less concerned14:16
DammitJimok, so it seems the consensus is that disabling SMBv1 doesn't have much to do with WannaCrypt14:16
azidhakaDammitJim: in linux14:17
teward^ that14:17
tewardDammitJim: in Windows it's a different story14:17
DammitJimthanks azidhaka ... in linux14:17
DammitJimright14:17
DammitJimok, thanks! I'll tell the group that asked me this question that the how to they found makes it sound like wannacrypt and SMBv1 are related but in reality they aren't14:17
tewardwell14:17
DammitJimthanks guys!14:17
tewardDammitJim: that's not entirely accurate either14:18
DammitJimuh oh14:18
azidhakaDammitJim: SMBv1 was vulnerable in Windows, is not vulnerable in Linux14:18
azidhakaDammitJim: disable it or patch all your windowses and leave the linuxes alone :)14:19
tewardazidhaka: The question is two-fold.14:19
tewarderm14:19
tewardDammitJim: ^14:19
tewardQuestion 1: Is SMBv1 vulnerable in Linux?  Question 2: Is SMBv1 vulnerable to WannaCrypt in Windows?14:19
tewardAnd Question 3: Is SMBv1 vulnerable to WannaCrypt in Linux14:19
DammitJimyes, I am trying to address question 314:20
tewardAnswer to #1: No, not really.  Answer to #2: Absolutely, patch all windows systems and disable SMBv1 on the client systems14:20
tewardAnswer to #3: Not really.  Just don't run Wine on linux systems.14:20
DammitJimit's all in the context of: Do I need to disable SMBv1 on all my linux systems because of wanna cry14:20
DammitJimand the answer is NO14:20
DammitJimthank you!14:21
tewardDammitJim: read https://askubuntu.com/questions/914623/what-is-the-wanna-cry-ransomwares-possible-impact-on-linux-users14:21
DammitJimoh, also know that we don't use wine14:21
DammitJimwe drink it ;)14:21
tewardultimately you have your answer.  So long as you patch your Windows systems and servers and install the security updates regularly14:21
tewardbecause there's other nasties that get patched regularly you need to patch against :p14:22
DammitJimyeah, I am trying to get our group on a schedule for patching different o/s in a regular basis14:22
DammitJimI got interrogated about: do you read all the release updates at all times to know if we need to patch our systems?14:22
DammitJimif someone can tell me how one can do that, please let me know!14:22
tewardunattended-upgrades for Linux systems, exclude the Linux packages, set to run daily, don't force reboot14:22
tewardemail a given email address on the network when completed.14:23
tewardunattended-upgrades is what keeps the mail server and a few other servers at the one workplace i work with up to date with security updates14:23
tewardwe patch the rest for bugs monthly14:23
Ussatteward, if you use unattended, I assume you test first, on a test system....14:24
tewardOn six systems, yes.14:26
tewardTHat said, the only things that we really just need patched are the kernel and a few other things, we disable all other updates.  Security-only, and those go through some pretty thorough tests, as I understand those security releases/updates.14:26
tewardsarnold: ^ cc14:26
tewardthe only other thing we'd worry about is nginx, but that's usually patched within a day of me seeing a patch heh14:26
tewardsince I help the security team sometimes with that :)14:27
DammitJimteward, how do you test that the updates aren't breaking something?14:34
tewardi have a test environment running the same services as production does, and a test suite that tests functionality every day an hour after updates complete.  If nothing fails, that doesn't issue a "Don'tUpdate" notice to the production systems14:37
tewardlots of custom code14:37
=== dpawlik is now known as _dpawlik
naccsmoser: do you think it's reasonable (UX) to have `git ubuntu add-remote` only work with an explicit directory or from the current directory? (then we can derive, e.g., the srcpkg and such)15:24
smosernacc, that seems fine to me.15:37
smoseradd-remote user ?15:37
smoseryou mean15:37
naccsmoser: yeah15:37
smosergit-ubuntu add-remote <thing>15:37
naccsmoser: so you'd only need to add the lp-user you want to add the remote of15:37
naccsmoser: we'd figure out everything else15:38
smoseri was thinkign <thing> could be a full remote, but then it takes a name too15:38
smoseri think its sane.15:38
naccsmoser: oh true, it could be -- although, imo, adding a remote with a full url is a better task for `git` itself :)15:38
smosergit ubuntu add-remote <user> [name-if-different]15:38
smoserbut i think it should be remote-add15:39
smoserright ?15:39
smoseras that is gwhat it is to git15:39
smosergit remote add <name> <url>15:39
naccsmoser: hrm, true15:39
smosergit ubuntu remote-add <user> [url]15:40
smoserthat follows pretty easily dont you think ?15:40
smoserif you give it url, it just calls git add remote15:40
smoserexcept fdor the case where you dont want your name the same as the user i guess.15:41
smoser:-(15:41
naccsmoser: yeah, but then i need to check the input for a url15:41
naccsmoser: your 'name' meaning the remote's name?15:41
smoserwell, you need both remote name and user15:41
smoserright ?15:41
naccright, we curently make them the same15:41
naccwe can take a remote-name as an optional parameter15:41
naccor a flag, even15:42
smoseri think its probably reasonable to want to change the name15:42
smoser(ie, for that ~ubuntu user)15:42
smosergit ubuntu remote-add [--remote-name=name] user [url]15:42
naccsmoser: oh good point , i usually change racb to robie :)15:42
naccsmoser: yep15:42
smoser remote name is user by default15:42
naccsmoser: thanks! that's good!15:42
smoser if url is provided, then it just goes onto git remote add15:43
naccsmoser: yep15:43
naccsmoser: cool, thanks!15:43
smoserswitfching location15:43
=== pavlushka is now known as Guest4608
=== Guest612 is now known as db`
=== pavlushka_ is now known as pavlushka
sarnoldDammitJim: we publish USNs to https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce and https://www.ubuntu.com/usn/ -- and we're trying to get the hang of https://twitter.com/ubuntu_sec but no promises there17:33
DammitJimthanks sarnold!17:48
DammitJimsarnold, this is different than lists.ubuntu.com mailing lists, right?17:48
masonazidhaka: That's on lists.ubuntu.com.17:48
masonDammitJim: *17:49
masonNot sure how tab pulled up azidhaka.17:49
DammitJimI say that because I had forgotten that I have some kind of account and get the email every first of the month telling me what my password is LOL17:49
sarnold"gee thanks mailman"17:51
sarnoldhehe17:51
DammitJimwhat I mean, though is that the link you posted seems to be a separate subscription?17:51
DammitJimor can I just add that subscription to my account?17:52
sarnold'separate' to what? there's a billion lists hosted there..17:52
DammitJimmeaning... if I go to my Membership configuration page17:53
sarnoldiirc there's a button in one of the mailman fields for allowing you to turn off the monthly password reminders 'globally', but they're for the most part all independent from each other17:53
DammitJimI don't see an option to get security subscriptions ? I'm blind17:53
DammitJimand you are right, there is an option to NOT get your password17:53
DammitJimoh, interesting... so I guess my account is just for the ubuntu-us-fl mailing list17:54
DammitJimnothing to do with getting security announcements....17:54
DammitJimman, patching is a neverending story, isn't it?17:55
masonDammitJim: You can just subscribe to the security list. It's a plain vanilla Mailman.17:56
masonI subscribed, and it yelled at me because I was already subscribed.17:56
DammitJimLOL17:57
DammitJimI"m going to shut up now17:57
sarnoldDammitJim: never-ending.. you have no idea.17:57
DammitJim:D17:57
masonPatching makes my cold heart warm.17:58
sarnoldDammitJim: it's insanely demoralizing to have new issues reported against a packaage just when you're about to release updates for it for older issues..17:58
DammitJimhahaha... I don't have a problem patching a system17:58
DammitJimI have a problem testing all the systems after the patch17:58
masonTrue, doing things right is a beast.17:58
DammitJimI don't know why, but the company where I work wants all applications that we use on that server tested in a sandbox before the patch17:59
masonContainers will save us.17:59
masonheh17:59
DammitJimmason, I'd like to think that ;)17:59
masonDo you do dev → qa → prod and the sandbox is one of the first two?17:59
DammitJimsandbox is kinda like dev17:59
masonI'm a fan of organized promotion. That said, I don't do it for my home set-up, and I'm not an admin any more, so I've grown lax.17:59
DammitJimwe've moved away from the dev being managed by my team and dev is more what the developers maintain, which is kinda nice18:00
DammitJimwhat do you do now, mason ?18:00
masonDammitJim: Technical Account Manager18:00
DammitJimI'm starting to get tired of the admin role18:00
DammitJimbut heck, I have a job, so I shouldn't complain18:01
masonBeing a TAM's like being an admin, but more use of soft skills, and issues don't follow me into evenings and weekends.18:01
masonYar.18:01
DammitJimLOL18:01
DammitJimthat's 1 of them... it gets in the way of my family life...18:01
masonBefore I became a TAM, I was an admin, and right before I took the offer for my current job, I had an on-call week where I got four hours of sleep, once, during my on-call week. That was the peak of sleep, and most sleep periods were much shorter. Made it easy to accept the offer.18:02
sarnoldDammitJim: definitely if you can put together enough of your environment in a VM or something, it can save some hassles. we do our best but mistakes happen, and, like you, it's quite difficult to test everything.18:02
DammitJimanyways, thanks for the info. I'm trying to assign someone in my team to review the security updates on a daily/weekly basis so we know if we need to accelerate patching for a system18:02
masonDammitJim: The list will be useful, and you probably already use something like apticron.18:03
mason...or something centralized that does that.18:03
DammitJimsarnold, man, thanks for speaking from the heart. I know you guys are doing your best and I don't have anything about patches. it's just that sometimes developers and even admins make mistakes in putting configs where they shouldn't be and then an update (that needs to really fix something) changes how something works and then the developed app no longer works18:03
masonDammitJim: Do you use Ansible or Puppet or similar?18:04
DammitJimthe hard part about the list is really understanding the impact or severity to determine if we need to go through the patching cycle18:04
DammitJimI use salt, so with that respect, things can be fixed quickly18:04
masonThe whole cfengine-inspired trusted repository with admins only accessing the repo through version control is hugely good.18:04
masonkk18:05
DammitJimbut that's not the problem... the problem is time spent testing and guess who ends up having to test? the support team18:05
DammitJimand letting the customers know that there will be an outage18:05
DammitJimI'll be honest in saying that in other companies, I patched w/o testing and this wasn't as much of an issue... out of patching hundreds of times, we probably only had an issue once18:06
masonRedundancy can help with outages, especially if your platform is using a stable API and you're just fixing bugs.18:06
DammitJimyeah!18:06
DammitJimdo you guys have someone on your team that reads the security releases on a daily basis?18:07
DammitJimhow do you determine if the patch needs to be applied ASAP?18:07
DammitJimI wanna say for Ubuntu servers, I patch every quarter *cringes*18:07
masonIn admin teams I've been on, I tend to do that regardless of any formal activity. Varies a lot formally.18:08
DammitJimyeah, very subjective, right?18:08
sarnoldDammitJim: we don't really judge -severity- since that can vary wildly from site to site. we do prioritize the order in which we work through the CVEs; here's the criteria we use http://bazaar.launchpad.net/~ubuntu-security/ubuntu-cve-tracker/master/view/head:/README#L19118:09
masonOh, you mean sarnold and the Canonical security team. Sorry for the noise. Heh.18:09
DammitJimno, I meant exactly what sarnold just said... for my company, how do I determine the severity of the security problem for which a fix has been released18:10
sarnoldDammitJim: most of us do take most weekends :)18:10
DammitJimI'd drive myself nuts learning every single issue and understanding how it impacts me18:10
sarnoldbut tracking CVEs is almost a full-time position for us18:10
masonGods, just reading the security-lists is a ton of work, let alone parsing for applicability.18:11
DammitJimright... that's my challenge, but it's a good one and one that needs to be dealt with18:11
DammitJimthis week when this whole thing about WannaCry came out18:12
DammitJimI didn't know what to say about patching when I was asked about it18:12
DammitJimwhy haven't you guys patched the Windows servers?18:12
DammitJimwell, we are in a 3 month cycle and we haven't gotten around to it since we patched back in March18:13
DammitJimoh, you need to patch them... sure, that's the plan18:13
DammitJimI'm digressing.... I'm going to stop18:13
DammitJimI hope you guys have a great Friday, though!18:13
masonDammitJim: You too!18:15
DammitJimI'm not going anywhere, just trying to keep the channel on-topic ;)18:23
naccrbasak: i assume you're not around?18:56

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!