/srv/irclogs.ubuntu.com/2017/06/28/#ubuntu-server.txt

=== efm__ is now known as efm
=== med_ is now known as Guest39045
=== diplo_ is now known as diplo
=== JanC is now known as Guest24635
=== JanC_ is now known as JanC
DammitJimdo you guys know why I'm getting this message? WARNING: Security updates for your current Hardware Enablement Stack13:24
DammitJimended on 2016-08-0413:24
DammitJimbut when I run hwe-support-status --verbose13:24
DammitJimI get: Your Hardware Enablement Stack (HWE) is supported until April 2019.13:25
DammitJimdid I do something wrong when I upgraded the hwe?13:25
dpb1DammitJim: you get that on login?14:26
dpb1(in motd)14:26
DammitJimyes14:26
dpb1`lsb-release -d` shows?14:28
DammitJimack, I don't have that package installed14:29
DammitJimdo I really need to install it?14:29
dpb1err14:29
dpb1lsb_release -d14:29
DammitJimDescription:Ubuntu 14.04.5 LTS14:30
compdocyikes14:31
dpb1hrm14:32
dpb1hwe-support-status and the motd snippet are not agreeing here.14:32
dpb1DammitJim: did you just recently upgrade to the xenial hwe stack?14:32
dpb1(16.04)14:33
DammitJimright!14:36
DammitJimyes, I did it this morning14:36
DammitJimand I've been updating servers for a month now14:36
DammitJimand today is the first time that this happens (I've been using scripts)14:42
aadijoin channel #ubuntu15:05
dpb1DammitJim: good.  this feels like a simple bug in the motd update script15:29
dpb1"simple"15:29
dpb1DammitJim: I'm not sure what package installs that, or I would say "file a bug on this package".   perhaps someone else knows15:30
naccdpb1: install what?15:36
DammitJimok15:37
dpb1the motd.d that is printing WARNING: Security updates for your current Hardware Enablement Stack ended on 2016-08-0415:37
dpb1nacc: ^15:37
dpb1(14.04)15:37
naccupdate-notifier-common: /etc/update-motd.d/95-hwe-eol15:37
naccis that it?15:37
naccfrom src:update-notifier15:38
DammitJimwhat do I need to run?15:38
naccDammitJim: `apport-bug update-notifier-common` i think. Is this desktop or server?15:40
DammitJimserver15:41
naccDammitJim: i'm not sure what the bug reporting tool is on server, tbh, you can just file it on launchpad directly (against update-notifier)15:44
DammitJimok15:45
naccDammitJim: the script that is generating the motd message is: /usr/lib/update-notifier/update-motd-hwe-eol15:46
naccDammitJim: if you want to debug it a bit15:46
naccDammitJim: actually, hrm15:58
naccDammitJim: in my 16.04 lxd, i'm not actually seeing a hwe-support-status command (nor one in xenial's archives)15:58
naccDammitJim: can you do a `dpkg -S hwe-support-status` ?15:58
lachokdshello everyone16:09
lachokdsthis might be a bit odd of a question, but is there a way to directly upgrade a server instance from 8.04 to 16.04, that doesn't involve reinstalling?16:10
nacclachokds: no, you can't directly do it even when 8.04 was supported16:11
nacclachokds: you'd need to do 8.04 -> 10.04 -> 12.04 -> 14.04 -> 16.0416:11
nacc!eolupgrade | lachokds16:12
ubottulachokds: End-Of-Life is the time when security updates and support for an Ubuntu release stop, see https://wiki.ubuntu.com/Releases for more information. Looking to upgrade from an EOL release? See https://help.ubuntu.com/community/EOLUpgrades16:12
nacclachokds: but honestly, you're better off reinstalling, I'd say16:12
nacclachokds: that's a silly number of EOL upgrades before you even get to the supported state16:12
lachokdsthanks16:12
lachokdsactually yeah, I was trying to upgrade to 10.04 but then my whole system became unbootable16:13
lachokdsafter restoring from backups I was wondering what else I could do16:13
nacclachokds: how did you upgrade to 10.04? following the above?16:14
lachokdsyeah, I changed the sources.list file to point to old-releases.ubuntu.com and went from there16:14
nacclachokds: ah ok16:15
lachokdsI think it might have been that I chose the package maintainer's version for grub16:15
lachokdsdo you think I should try once again with the original grub version in the system?16:16
nacclachokds: i have no idea. my opinion is you've waiting far too long to do this update. You've been unsupported for years (at least 4 years?), and insecure as well. You might as well reinstall.16:16
geniiYou'd be much better off with a clean install to 16.0416:17
lachokdsnacc: I know, I just got the assignment to work on this server. I guess it's gonna be a very interesting conversation :-P16:19
nacclachokds: is this a production environment?16:19
lachokdsgenii: thanks16:19
lachokdsnacc: seems like so, though I don't really know why it wasn't upgraded before. Anyways, thanks!16:21
nacclachokds: that seems even worse, then, yeah ...16:21
dpb1nacc: seems like it's just trusty16:22
naccdpb1: yeah, so i think that could be the problem16:24
naccdpb1: something wasn't removed properly16:24
naccdpb1: as it shouldn't exist on xenial?16:24
dpb1nacc: feels very weird to me too16:25
naccdpb1: yeah, i'm not sure if that's intentional16:25
naccdpb1: and oddly it *does* exist on 17.1016:25
dpb1wth16:25
lachokdsdpb1: what ?16:25
nacclachokds: we're talking about DammitJim's issue from earlier16:25
lachokdssorry, I wasn't connected16:27
lachokdsmy apologies16:27
nacclachokds: np16:27
dpb1lachokds: sorry, multiple conversations going at a time. :)16:28
dpb1lachokds: I'm impressed you found an 8.04 server out there.  good luck. :)16:28
naccs/im/de/ :)16:29
dpb1nacc: lol16:29
lachokdsnacc: thanks, I guess (?) hehe :)16:30
Ssandyhello16:57
JPelletierHi, my Ubuntu Server is randomly freezing after Grub menu on reboot. Can I find a log somewhere to help me diagnose what happen? Nothing is logged in journalctl17:00
TafThorneDoes it show anything on the screen?17:07
TafThorneDoes hittign the Esc key make it show anything?17:07
TafThorneHave you tried going down to the Advanced options section ont he menu and booting with an older kernel ?17:07
JPelletierBlack screen, hitting ESC or shift do nothing. I've  tried with ubuntu 16.04.02 LTS (kernel 4.8) - Same issue17:08
DammitJimnacc... mine is on 14.0417:24
DammitJimdpkg -S hwe-support-status17:24
DammitJimupdate-manager-core: /usr/bin/hwe-support-status17:24
naccDammitJim: oh I'm sorry, I misread dpb1's comment (xenial hwe stack can mean two different things)17:24
naccDammitJim: in your case, you are on 14.04.5 now?17:24
DammitJimyes17:25
naccDammitJim: afaict, on trusty, the MOTD should match what `hwe-support-status` outputs... I suppose there is a window while the file is being updated ont he first boot17:26
DammitJimhhmmmm... maybe I should restart again?17:28
DammitJimexit17:29
naccDammitJim: if it's not too much hassle, that would be good to test, or you can just login again (in theory). I'm not sure when motd gets regenned17:30
dpb1he really restarted17:35
dpb1:)17:35
ahasenacknacc: just for kicks, I'm trying another merge: bind917:44
ahasenacknacc: something new: http://pastebin.ubuntu.com/24974070/17:44
ahasenacknacc: the commented pick lines17:45
ahasenackshould I leave them like that and only work on the rest?17:45
ahasenackthey all look like empty commits17:48
naccahasenack: it's referred to in wiki: 2.2.5.4 -- but i forgot to update the later portion at 2.3.217:48
ahasenackah, right17:48
naccfixing now17:49
ahasenackthx17:49
naccahasenack: added 2.3.2.317:50
ahasenacko/17:50
naccstgraber: just got the update to lxd on artful, now my containers won't start :)18:00
stgrabernacc: what error are you getting?18:01
naccstgraber: http://paste.ubuntu.com/24974162/18:01
naccstgraber: it creates it, but it's "STOPPED". Manually starting it works18:01
naccstgraber: i don't see a reboot request in /var/run/reboot-required, so I hadn't rebooted yet18:02
MasterphiHey guys, I'm getting this WARNING: The following packages cannot be authenticated! libexpat1 libgraphite2-3    should I proceed with the install?18:03
naccMasterphi: can you pastebin `apt-cache policy libexpat1 libgraphite2-3` ?18:04
Masterphiyah, right away18:04
Masterphinacc: https://pastebin.com/7i69mf6D18:05
naccMasterphi: that's debian not ubuntu18:05
Masterphiheh, right. This VM isn't ubuntu18:05
Masterphioops18:05
ahasenackdebian/patches/series must be the conflict champion18:15
naccahasenack: often, yes18:17
ahasenacknacc: do you prefer a certain order when decomposing a big change? debian/changelog order, or debian/patches/series order?18:17
naccahasenack: so it's one logical change that is in a bunch of places?18:18
ahasenackone logical change has two debian/patches18:18
ahasenackand they are not together in series18:18
ahasenacknacc: it's the CVE-2016-8864 fix: http://pastebin.ubuntu.com/24974239/18:19
ahasenackthey added a cve patch, and a fix for a regression in that patch as a separate patch18:19
ahasenackat the same time18:19
ahasenackand that 10.1ubuntu3 package wasn't even published it seems: https://launchpad.net/ubuntu/+source/bind9/1:9.10.3.dfsg.P4-10.1ubuntu318:20
nacchttps://launchpad.net/ubuntu/+source/bind9/+publishinghistory18:20
naccuse that --^18:20
ahasenacksuperseeded, deleted18:20
naccahasenack: the individual page reflects what is currently in the archive, iirc18:20
naccahasenack: as opposed to if it was ever published (as this one was)18:21
ahasenackthe dates are odd18:21
naccahasenack: i'm confused, the change that shoulud be in that bit of delta is only in rt43779.patch on my reading18:21
ahasenackboth patch files are there18:22
naccahasenack: let me look in the repo18:22
ahasenackdiff from previous, in lp: http://launchpadlibrarian.net/303851673/bind9_1%3A9.10.3.dfsg.P4-10.1ubuntu2_1%3A9.10.3.dfsg.P4-10.1ubuntu3.diff.gz18:22
ahasenackCVE-2016-8864.patch is added18:22
ahasenackas is rt43779.patch18:23
naccmdeslaur: --^ can you clarify?18:28
naccahasenack: it might be that it's really two changes, or since they were fixing CVE-2016-8864, and new this further fix was needed, but they hadn't published the CVE fix yet18:32
naccahasenack: just the changelog doesn't make that clear18:32
naccand ubuntu4 has a further fix18:32
mdeslaurhuh? it should be in ubuntu218:33
ahasenackand the one in ubuntu4 introduces no new patch, according to the changelog18:33
ahasenackI think what doesn't have a new cve number is the two regressions18:33
ahasenackmdeslaur: actually, according to https://www.ubuntu.com/usn/usn-3119-1/, the fix for CVE-2016-8864 should be in 1:9.10.3.dfsg.P4-10.1ubuntu1.1 (zesty) or 1:9.10.3.dfsg.P4-8ubuntu1.2 (xenial)18:35
ahasenackah18:35
ahasenack1:9.10.3.dfsg.P4-8ubuntu1.2 is what introduces the patch in the case of yakkety, for example18:35
ahasenacker18:35
ahasenackcopy&paste error18:35
ahasenackhttps://launchpad.net/ubuntu/+source/bind9/1:9.10.3.dfsg.P4-10.1ubuntu1.118:35
ahasenackman, sometimes I wished all packages had the ubuntu release number in them18:36
mdeslaurwait a sec, I'm confused now18:36
* mdeslaur looks18:36
ahasenacknacc: i don't see any ubuntuN.M in the rebase (http://pastebin.ubuntu.com/24974070/), all are ubuntuN, if that matters18:37
stgrabernacc: let me see18:39
ahasenackmdeslaur: we were wondering about the order of events, it looked like the fix for CVE-2016-8864 was added at the same time as one of its regression fixes  rt43779.patch18:39
naccahasenack: oh wait, a security update to xenial won't show up in the merge18:39
stgrabernacc: I'm sure it's got something to do with the random name, but we have a test for that and it's passing, so I'm kinda confused as to what's going on here :)18:40
naccstgraber: yeah. I can reboot if you think it'd fix it18:40
stgrabernacc: nope, got the same here18:40
naccstgraber: oh ok :)18:40
naccstgraber: that's reassuring at least :)18:40
stgrabernacc: looking into it now, I have a feeling it's going to be a very stupid issue18:40
mdeslaurahasenack, nacc: yes, it looks like zesty was missing CVE-2016-8864, and I added it at the same time as the other stuff, but forgot to add it to the changelog18:40
mdeslaurhttp://launchpadlibrarian.net/303851673/bind9_1%3A9.10.3.dfsg.P4-10.1ubuntu2_1%3A9.10.3.dfsg.P4-10.1ubuntu3.diff.gz18:41
ahasenackmdeslaur: and when you say "no CVE number", you mean no CVE number for the regression?18:41
stgrabernacc: we effectively rewrote the entire client code between 2.14 and 2.15, so that kind of regressions are unfortunately kinda expected... will update the testsuite18:41
mdeslauryes, for the regression fix18:41
ahasenackor no new cve patch? Or what?18:41
naccmdeslaur: yep, that makese sense18:41
ahasenackok18:41
naccahasenack: sorry, i see it's a fix in zesty (not zesty-security), so it's correct for it to merge18:42
naccahasenack: the N.M uploads won't typically show up in a merge, they aren't in artful's history18:42
stgrabernacc: sure enough, it's a stupid mistake... fixed18:42
naccstgraber: yep, i saw that in d/changelog, so figured it was a dogfood situation :)18:42
stgraberstgraber@castiana:~$ lxc launch ubuntu-daily:artful18:42
stgraberCreating the container18:42
stgraberContainer name is: rare-gopher18:42
stgraberStarting rare-gopher18:42
naccstgraber: i just happened to be heavily using lxd at the time :)18:42
stgrabernacc: if you use fixed names that'll work fine, it's just the logic to fetch the random name back from the daemon that's broken18:43
naccstgraber: cool, will adjust my flow for now18:43
stgrabernacc: will send a branch in a few minutes, once merged, I'll cherry-pick the fix in the package, so everything should be back to normal by tomorrow morning (unless adt takes forever)18:43
naccstgraber: great, thanks!18:44
naccstgraber: while i have you, is there a file limit to how many files can be pushed by `lxc file push` ?18:44
stgrabernacc: I don't think so. We don't have batch sending so we just do a request for each arg. That'd make the limit be the maximum number of args you can have on the cmdline18:45
naccstgraber: ok, i hit something funky with `lxc file push -r` as well ... but i'll debug it a bit more locally18:45
stgrabernacc: https://github.com/lxc/lxd/pull/346318:47
naccstgraber: great, thanks18:47
ahasenackman, are these bind9 patches big18:57
ahasenackscary stuff, that so much code had to be changed18:57
dpb1in perhaps the most mature product in the world18:58
ahasenack-rw-rw-r-- 1 andreas andreas 5,4K Jun 28 15:53 CVE-2017-3135.patch18:58
ahasenackand this is a regression patch in a *security* patch:18:58
ahasenack-rw-rw-r-- 1 andreas andreas  15K Jun 28 15:53 rt44318.patch18:58
ahasenackbut, setting the record straight, a lot of that is test changes18:59
ahasenackwhich is good18:59
ahasenackmdeslaur: hi, question: we skipped CVE-2016-2775 because it's in lwresd and that package is in universe?19:12
ahasenackmdeslaur: https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-2775.html19:12
ahasenackor that just means it's not as urgent, and it's still work in progress?19:12
mdeslaurahasenack: it means someone from the community has to contribute a debdiff and test it, etc.19:13
ahasenackok19:14
mdeslaurI may include it next time, I just keep forgetting19:14
ahasenackman, it's harder than I thought to read a conflict in a d/p file19:18
naccahasenack: right, because it's a conflict in diff19:19
ahasenackexactly19:19
ahasenackthe diff should be the same19:19
naccahasenack: you get used to it :)19:19
ahasenackI mean, the file is named the same :)19:19
ahasenackbut I want to be sure19:19
naccahasenack: md5sum it19:20
ahasenacknacc: how can I see the two files? git doesn't create .dotfile versions19:20
ahasenackboth added:      debian/patches/CVE-2016-2776.patch19:20
naccahasenack: i'm not sure i understand your question19:20
naccahasenack: but you can always do `git show <ref>:/path/to/file`19:20
ahasenackI want to quickly see the debian version of that file, and my version19:20
* ahasenack tries git show19:21
ahasenacknew/debian19:21
ahasenackright19:21
ahasenackworks19:21
ahasenackmuch metter19:22
ahasenackok, just a dep3 difference, and the usual @line numbers19:23
ahasenacknacc: hm, if you could spare a moment20:10
ahasenacknacc: http://pastebin.ubuntu.com/24974921/20:10
ahasenackdebian has that patch already20:10
ahasenackslightly different (dep3 header), and of course the series file has conflicts20:10
ahasenackhow do I drop our change in this case?20:10
ahasenackI could rebase --skip, but let's say I want to record this with some sort of commit20:13
* ahasenack thinks git checkout --ours on both files20:19
ahasenackthat it becomes an empty commit20:19
ahasenacks/that/then/20:27
naccahasenack: i'm here now20:37
naccahasenack: can we do a HO?20:37
ahasenacksure20:37
naccahasenack: use the standup one? just easier to discuss the code if we are looking at the same20:38
ahasenacknacc: standup, yep20:38
naccahasenack: omw20:38
naccahasenack: ORIG_HEAD20:45
naccahasenack: once all resolved, you'll run `git commit --allow-empty -c ORIG_HEAD`20:45
ahasenacknacc: after the empty commit, git rebase --continue is complaining about empty changes, and advising --skip21:04
naccahasenack: hrm, `git status` says nothing to commit?21:04
ahasenackhttp://pastebin.ubuntu.com/24975282/21:04
naccahasenack: ok, then maybe you do need to explicitly --skip it, sorry21:04
ahasenackyeah, status is empty21:05
ahasenackok21:05
ahasenack  (all conflicts fixed: run "git rebase --continue")21:05
ahasenackheh21:05
ahasenacknothing to commit, working directory clean21:05
ahasenackok21:05
Czr3hi.. Terminal must be at least 80 x 27. and i don't know how to solve this...21:11
ahasenackCzr3: what do you mean?21:13
Czr3i was installin asterisk 14 on debian 9, then when i used "make menuselect" it said  error: "terminal must be at least 80 x 27"..21:14
Czr3installing*21:14
dpb1debian 9?21:15
Czr3yeap D=21:15
* dpb1 points at name of channel. :)21:15
ahasenackpatch 6 out of 1221:25
ahasenackphew21:25
furkandoes anybody here have VMs running with QCOW2 disks under KVM with the discard=unmap setting? fstrim seems to work for me from within the VM, but the disk image size doesn't decrease21:26
furkani'm using pc-i440fx-xenial for the machine type, and virtio-scsi21:26
ahasenackthat patch for cve 2016 8864 was infamous it seems:21:27
ahasenackCVE-2016-8864.patch21:27
ahasenackCVE-2016-8864-regression2.patch21:27
ahasenackCVE-2016-8864-regression.patch21:27
ahasenackfurkan: I don't know what discard=unmap does, but regarding qcow2 image sizes, did you check with du and qemu-image info?21:28
ahasenackas opposed to ls, I mean21:28
sarnoldyou may need to repack the qcow2 I wouldn't expect them to magically shrink or pass through the holes to the OS21:28
furkandiscard=unmap enables TRIM on the guest, so it informs the hypervisor of blocks that have been deleted21:28
furkanso theoretically that's supposed to allow the image to shrink by itself21:29
furkanhttp://dustymabe.com/2013/06/11/recover-space-from-vm-disk-images-by-using-discardfstrim/21:29
furkanso when i run fstrim on the VM, it tells me that it's trimmed 3.8GB, but the image size stays the same21:31

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!