[05:37] how do I roll back to the pervious server version after installing an update === Ham62_ is now known as Ham62 [05:38] I had a server running 12.04 fine and it kept nagging me to update so I just finished the update to 14.04 and after it booted into the login screen the entire display is just white with little black outlines where text is supposed tobe [05:38] I can't read anything so I want to roll back to 12.04 so at least the local terminal is usable [05:40] this is what I get when it boots: https://i.imgur.com/BKvV5yq.jpg [05:40] I typed in the username and password at the top and this is the greeting message with the bash prompt on the bottom [05:41] I don't have any GUI or anything installed this is just running on the text mode [05:45] Ham62: 12.04 is end of life [05:45] 14.04 has brought the end of usability to my system so I think that I don't have much choice [05:46] Ham62: its not a good idea to upgrade from an eol version, would you still trust it? [05:46] I don't need the latest security updates and everythign I'm just using it on my LAN [05:47] Ham62: also, 14.04 will be eol soon too [05:47] Ham62: would be wise backing up your data and start fresh 16.04 or 18.04 [05:48] you think that doing further updates would fix the video issues going 12 -> 14? [05:49] Ham62: you just said your on inside lan? sno not connected to internet? [05:49] it has internet but it has nothing ported forward [05:50] Ham62: then its not wise to upgrade from eol [05:50] !eolupgrade [05:50] End-Of-Life is the time when security updates and support for an Ubuntu release stop, see https://wiki.ubuntu.com/Releases for more information. Looking to upgrade from an EOL release? See https://help.ubuntu.com/community/EOLUpgrades [05:50] but its your system Ham62 we can only advice [05:51] my media center PC on my TV is still running XP and has no issues it's not going to become part of a massive botnet just from having a connection behind a firewall [05:52] Ham62: a firewall isnt a 100% proof of not getting exploited [05:53] if no one is connecting into you you won't get exploited [05:53] if there is no access point for them to exploit you you can't be exploited [05:54] and I'm not running a web browser or anything connecting to other sites so it won't get malware that way [05:55] Ham62: what makes you so sure nobody connects you on your EOL server? [05:56] because I have nothing ported forward [05:56] there is no way to access this system from outside the LAN [05:56] Ham62: you receive updates to your server right [05:56] when I tell it to [05:56] so your connected [05:56] this is the first time installing an update to it in 2 years [05:57] !usn [05:57] Please see https://usn.ubuntu.com/ for information about recent Ubuntu security updates. [05:57] check how many exploits out there on eol versions [05:58] I see lots of exploits for escaping a virtual machine [05:58] which 1) requires running the native code on the VM and 2) having a VM installed [05:58] and PHP vulnerablility which again you need to be running a PHP server ported forward [05:59] listen im not gonna kee argue, i advice you a fresh 16.04 or 18.04 [06:00] if you decide upgrading to 14.04, in a month its also eol and youl need to upgrade to 16.04 anyway [07:48] Good morning [08:11] Who would be the person to talk to about debugging incorrect systemd configurations? [08:12] As in, figuring out why systemd reports things like: Failed with result 'exit-code' [08:13] or: -- The result is RESULT. [08:17] coreycb: thank you for the testing [08:28] kstenerud: depends on the package, perhaps start with a bugreport [08:29] it's with corosync, which I'm taking over. But first I need to debug why the service fails to start [08:29] but it looks like systemd is getting faked info in the result codes, which makes this difficult to debug [08:30] or it can't tell because it's a forking service [08:30] ideally with sd, wherever possible daemons should run as Type=simple or notify if it supports that [08:31] that's why I said start with the package, as I've seen packages with forking type where it shouldn't have been. nginx, redis just to name the two recent examples. and hell, redis even supports notify [08:32] hmm looks like it's type notify [08:34] I guess the service is not informing systemd properly then. is there a specifc application log? [08:35] there is, but it's empty [08:36] are there any confinements? ProtectSystem= ? seccomp fileters? disable temporarily all confinements? [08:36] uhh... sorry where would I find those? [08:36] in the service unit file [08:38] Nothing like that I can see: https://pastebin.ubuntu.com/p/YvTDpTXVdq/ [08:40] kstenerud: can you pastebin the output of journalctl -xe right after you attemp to start it and it fails? [08:41] sure hang on [08:42] google can't seem to find any mention of it supporting systemd notify. usually daemons have a config option you can flip to tell them they're run under systemd and they should enable the notify API, I don't see that for corosync [08:43] https://pastebin.ubuntu.com/p/TMfRKMgYrk/ [08:44] kstenerud: try Type=simple. that -f in the unit means "start application in foreground". Maybe it just does not support the notify api [08:44] ok let's see... [08:47] wow! It was just that??? Crazy. It works now [08:49] thanks! [08:53] you're welcome. it'd be wise to get yourself acquainted with systemd manuals and documentation if you're gonna maintain packages like that. use the systemd.directives(7) manapge as reference point for all the config directives [08:59] ok, thanks [13:30] Hi. I have a django server running correctly as I see. But in the log I see some errors: [13:30] [Thu Mar 07 13:54:57.251327 2019] [wsgi:error] [pid 6129] Not Found: / [13:30] [Thu Mar 07 13:54:57.617238 2019] [wsgi:error] [pid 6129] Forbidden: /quest/ [13:30] [Thu Mar 07 16:50:07.829690 2019] [wsgi:error] [pid 6129] Not Found: /favicon.ico [13:30] [Thu Mar 07 16:55:09.896277 2019] [wsgi:error] [pid 6129] Forbidden: /quest/ [13:30] [Thu Mar 07 16:55:09.898376 2019] [wsgi:error] [pid 6129] Not Found: / [13:31] Ignoring favicon.ico, I don't know about the others [13:32] siavoshkc: looks like a scan for vulnerabilities [13:32] yup [13:32] Who is scanning? [13:32] We see that wen our infosec scans also [13:32] "the internet" [13:32] So its noise [13:34] My security is rock solid. [13:36] Thats what is normally said right before a hack [13:37] God Himself could not sink this ship. [13:43] "Titanic Baby" [13:43] siavoshkc: How do you know your security is rock solid if you don't understand what you see in those logs? [13:43] just stop with the logic leftyfb [14:03] cpaelzer: confused by the posgres MRE. I thought we concluded that we wouldn't revert the ABI change as it's a "produces bad data" bug otherwise? [14:05] Is this a different ABI change? What happened to the one we previously discussed? [14:06] leftyfb: Good question. [14:18] rbasak: I stated that in the bug, the "(potentially) produces bad data" change wasn't the ABI changing rename [14:19] I only found that when sitting down and trying to prepare the checks for the extensions [14:19] Ah [14:19] I read your comment 19, but I couldn't find anything referring to the bad data bug. [14:20] let me check which one #19 was [14:21] rbasak: yeah the "other" change - that one about the client_min_messages would have a chance to cause bad data [14:21] rbasak: which is not the ABI one [14:21] rbasak: but, that client_min_messages has to be used incorrectly to cause that problem [14:21] rbasak: unfortunately comments are immutable so we have a bunch of misleading comments collected over the time we worked on this :-/ [14:22] rbasak: the bug description should have the most current and most reasonable description [14:22] rbasak: I made sure I mentioned all that in Regression potential [14:22] in fact let me add something very important that I thought about last night [14:23] cpaelzer: which bit of the regression potential refers to the bad data bug? [14:25] rbasak: adding that as well more clearly [14:28] rbasak: updated the description again to hopefully be even better now [14:30] rbasak: the important bit I added on my own is the fact that by our choices we don't CHANGE anything on the two debated commits [14:31] we take the MRE minus those two [14:31] which makes the MRE less regression-likely [14:38] cpaelzer: got time for a HO please? I'm still confused - trying to correct my old understanding with the corrections I think. A HO will probably be quickest. [14:39] rbasak: I'm in one already, I'll ping you once I'm ready [14:39] ack [14:48] sahid: i've uploaded cinder, nova and swift to the bionic unapproved queue for bug 1818069 where they're awaiting review by the sru team: https://launchpad.net/ubuntu/bionic/+queue?queue_state=1&queue_text= [14:48] bug 1818069 in swift (Ubuntu Bionic) "[SRU] queens stable releases" [High,Triaged] https://launchpad.net/bugs/1818069 [14:48] also pushed to https://code.launchpad.net/~ubuntu-server-dev/+git [14:48] thanks for those [14:50] coreycb: thanks [16:15] cpaelzer: I added X-Python3-Version: 3.7 to d/control [16:15] cpaelzer: the XS- variant is for python 2 only [16:15] I still get the warning about ${python3:Versions} being unused, well, it's really ununsed [16:16] your suggestion was to add it like X-Python3-Version: ${python3:Versions} (you mentioned the XS- variant, though) [16:16] right now, I think ${python3:Versions} expands to 3.7 only, or something like >= 3.7, < 3.8 (have to check) [16:17] I didn't find the text "python3:Versions" in the dh_python manpage, nor in https://www.debian.org/doc/packaging-manuals/python-policy/ch-module_packages.html [16:17] rbasak: do you know something about that? [16:17] the warning we are talking about is: [16:17] dpkg-gencontrol: warning: package python3-tdb: substitution variable ${python3:Versions} unused, but is defined [16:19] ahasenack: where's the source please? [16:19] rbasak: https://code.launchpad.net/~ahasenack/ubuntu/+source/tdb/+git/tdb/+ref/disco-tdb-1.3.18 [16:20] I didn't commit the "X-Python3-Version: 3.7" change to d/control [16:20] but it's literally that line [16:20] ahasenack: I haven't found the string in the man page either [16:21] ahasenack: I only got there by grepping through all kind of packages and seeing them use it at that attribute [16:21] I see [16:21] my single example on my disk: [16:21] apparmor/apparmor/debian/control:XS-Python-Version: ${python3:Versions} [16:22] ahasenack: http://paste.ubuntu.com/p/kmxSdrYwyP/ [16:22] that is even incorrect, the policy says to use X-Python3-Version for python3 [16:22] yep [16:23] that would be http://paste.ubuntu.com/p/NKvgnfqKdm/ [16:23] and http://paste.ubuntu.com/p/CmxKBsvQ9n/ [16:24] "Similarly, the optional fields X-Python-Version or XS-Python-Version were used to specify the versions of Python 2 supported by the source package. They are obsolete and can be removed now that only Python 2.7 is supported." [16:24] at least that grep showed them being used for python2 [21:40] ahasenack: uhm [21:40] the Debian bug? I doubt it'll be acted on [21:40] AIUI, we shouldn't be updating units to *specifically* target network-online.target [21:40] wrt https://bugs.launchpad.net/ubuntu/+source/nginx/+bug/1818574 [21:41] Launchpad bug 1818574 in nginx (Ubuntu) "Nginx cannot bind static IPv6 address on boot" [Low,Triaged] [21:41] ahasenack: and the workaround AFAICT is to bind to all v6 *and* the IP they specifically want; at least, per Maxim's suggestions on that thread for workarounds [21:41] ahasenack: and network-online.target *might* not solve the issue, necessarily, AIUI because 'network online' isn't clearly defined either. [21:42] teward: I tried binding to all IPs (listen [::]:443...; + listen [2001::...]:443...;) and it didn't work. Have you tried what Maxim suggested? [21:43] I was kind of surprised that NGINX didn't support IP_FREEBIND [21:43] but maybe I'm doing it wrong [21:45] as soon as I add the 2001::... IP to an interface, nginx is happy again [21:46] sdeziel: not recently i haven't checked. Her'es a question, does Apache support IP_FREEBIND as well? [21:46] if *they* don't then the question is "Why should NGINX" (from NGINX's perspective) [21:47] if none of them support it then the question is why not? [21:47] teward: because it's really handy in HA setups [21:49] sdeziel, on ipv4 I had to enable nonlocal_bind in sysctl. Perhaps there's a similar option? [21:49] This was for HAProxy + keepalived [21:50] lordcirth__: yeah, I think the sysctl key make it works for v4 but I haven't tested [21:51] lordcirth__: apache2 is happy binding a non-existent v4 once the sysctl is turned on [21:51] sdeziel: but not without that set in sysctl? [21:52] Without that set, the kernel will reject the syscall. Program doesn't get a choice. [21:52] teward: nope and I couldn't find a way to tell Apache to explicitly use IP_FREEBIND [21:52] if kernel is 4.3+, then in theory net.ipv6.ip_nonlocal_bind would exist. [21:52] sdeziel: then that's probably why NGINX isn't using it - nobody is. [21:53] lordcirth__: see my sysctl message two lines up [21:53] Yeah I saw it, thanks [21:53] sdeziel: test if setting net.ipv6.ip_nonlocal_bind lets Apache or NGINX bind to nonexistent v6? [21:53] It exists on my 18.04 machine [21:53] i'm currently on my commute so I cna't pull an image down for lxd/ [21:53] to do testing [21:53] teward: wow, I wasn't aware of that sysctl, works with Apache [21:53] sdeziel: Google Is My Friend! [21:53] *shot* [21:54] (found it at https://serverfault.com/questions/236626/how-to-bind-a-non-local-ipv6-address) [21:54] Btw, sysctl variables set in LXC don't persist properly in 16.04 [21:54] They do in 18.04, though [21:54] lordcirth__: LXC or LXD? [21:54] and I have an 18.04 host and use 18.04 containers usually ;) [21:54] It's a systemd version thing [21:54] So probably both [21:54] ah [21:54] that darned systemd evil! [21:54] :P [21:54] teward: and it also works with NGINX [21:55] sdeziel: i'm not yet willing to suggest that we change sysctl but I'll propose that as a workaround [21:55] I hacked it into an 'up' line in eth1.cfg :P But now that's gone, yay [21:55] teward: yeah, that's opt-in behavior IMHO too [21:55] Why wouldn't you change sysctl? [21:55] Or do you mean by default in Ubuntu? [21:55] lordcirth__: i mean by default [21:55] sdeziel: this is also why I'm not a huge fan of IP_FREEBIND because this sounds a lot like 'opt-in' behavior [21:56] not 'should be default' behavior [21:56] teward: would make good, ExecStartPre lines [21:56] HA isn't exactly a common setup. [21:56] Ah, yeah I think normally I would want things to fail if I mess up their IP config, not silently do nothing [21:56] sdeziel: example of such lines? so I can add examples [21:56] teward: sec [22:00] teward: https://paste.ubuntu.com/p/gvCcP7JxZY/ [22:00] teward: as for nginx and IP_FREEBIND, I would have assume it was just another listen arg that needed to be added [22:03] sdeziel: possibly. I've opened a Trac ticket upstream, to get reasoning, but I'm pretty sure it's easier to, on an as-needed basis, set the proper sysctl rules on individual systems/servers rather than rely on NGINX implementing it [22:04] that said, my focus recently has been work related things and working on my coredev application. [22:11] teward: good luck on that coredev application! [22:11] it ain't filed yet :p [22:11] (est. 3 weeks out at most from filing the application officially) [23:00] Guys, I am looking to find a good distro to build a webserver on, and due to recent privacy issues (Cannonical deciding to collect info and share with third parties without concent) have been hesitant to try Ubuntu. Are there such issues on the server products? Also does Ubuntu offer a Virtulization server, as in full-on web interface LXE/KVM management like Antsle and RedHat Virtulization [23:00] Server? Thanks [23:03] The_Actor: do you have pointers to info collection done without consent? [23:05] The_Actor: I think that's largely historical. [23:06] sdeziel: I suspect he means the Amazon search results from 14.04. [23:06] Or... whatever version it was. [23:06] so much for recent [23:06] I'm just guessing. [23:07] Which wasn't "collecting information" even then, it just forwarded search results to Amazon and displayed relevant results in the Unity menu, and had an option to be disabled. [23:07] I mean it forwarded search "queries" to Amazon [23:08] sdeziel: I dont understand the question "do you have pointers to info collection done without consent?" [23:08] The_Actor: He was confused because the issue is somewhat historical at this point. [23:08] The_Actor: which privacy issues are your referring to? [23:09] Dude, internet.......basically toss privacy out the window [23:10] And then there's stuff like popcon. [23:11] I recently saw a video on YouTube by somone reviewing Ubuntu, he stated that desktop search results and part of the index are sent to Canonical. A later video I saw Richard Stallman making noise that Ubuntu is sharing this with third parties . . . [23:12] The_Actor: OK so that confirms what mason was saying, that's old, not really controversial (if you ask me) and desktop only [23:12] I see [23:13] who knew that using the 'search amazon' feature would send search queries to amazon :) [23:14] So I am trying to decide between building an LXE Ununtu Server Image or an LXE SUSE image for a webserver platform. Is there anything that would give Ubuntu a clear advantage over SUSE? [23:14] what a crazy time to be alive [23:17] Would there be any advantages to say managing Apache on Ububtu, or perhaps good security profiles? [23:18] both ubuntu and opensuse have apparmor [23:21] No clear winner then? [23:21] depends upon whether you prefer apt or zypper, deb or rpm, other packaged tools, etc. [23:22] I guess I would want whichever is cleaner and has less of a history of destroying a working system [23:22] The_Actor: best is probably to try both [23:22] maybe [23:23] cause clearly asking in here will come with a certain bias... [23:23] from personal experience, I've had one reiserfs3 tree destroyed on suse, and one 16.04 -> 18.04 upgrade go poorly (but recoverable). advantage to ubuntu there. :) [23:23] ubuntu LTS may have a longer free support life. [23:23] *lifecycle [23:24] I just need something with a clear cut guide that sticks to the distros standards so I dont have large gaping security holes on a public facing test webserver [23:25] opensuse leap "is expected to be maintained for at least 36 months, until the next major version of Leap is available", ubuntu LTS releases get security + bug fixes for 5 years [23:26] Good point. Is Ubuntu LTS commonly used as a Webserver OS? [23:26] there are many web servers which run on ubuntu. [23:28] Interesting . . . Do you know of any web hosting business who use Ubuntu LTS? [23:28] I thought it was mostly a RedHat, SUSE, and CloudLinux [23:29] the last numbers I've seen suggested roughly 60% of the workload on the major cloud platforms is ubuntu [23:29] wow [23:29] millions of ubuntu machines come and go every day [23:30] red hat certainly owns US federal contracting [23:30] suse does great in europe [23:31] Are there any specific management tools that make Ubuntu diffrent? [23:32] Red Hat is in a lot of the infrastructure. Then you can run anything atop it, and that tends to include a lot of Ubuntu. [23:32] As I understand it. [23:32] I see [23:32] maas is great for managing fleets of bare boxes; juju for orchestrating workloads on various clouds; landscape for per-server views; lxd for container-based hypervisor kinds of things.. [23:33] of course you can probably run lxd on rhel or sles too; I'm less sure about juju and maas [23:33] Is there a Web Based LXD / KVM management system? [23:33] I haven't heard of Juju before. Is it equivalent to OpenShift? [23:33] mason: give me a second to learn about openshift :) [23:33] Ah, it is. [23:33] sarnold: Both Kubernetes. [23:34] mason: juju's not specific to kubernetes.. or at least it wasn't last time I used it :) heh [23:34] mason: cool, thanks [23:34] Ah, I'll have to learn more then. New to me. [23:35] mason: we'll use juju twice on a single cloud, even :) once with maas as the provider, to stand up the openstack cluster, and then again using openstack as the provider, to run the workloads on the cloud :) [23:36] Ah, cool.