=== umask078 is now known as umask077 === falcojr1 is now known as falcojr === Napsterbater is now known as Guest87745 === Napsterbater_ is now known as Napsterbater === Napsterbater is now known as Guest32914 === Napsterbater_ is now known as Napsterbater [07:24] Good morning [14:22] cpaelzer: regarding 1893753. no i havent made any plans to uograde because E:BUSY - theres also an additional dependency it needs packaged first. I dont see this reported in Debian so maybe we need to check there too to see how they want to handle? [14:23] because more deltas is... meh [15:59] who could i inform that ns1 doesn't have a AAAA record? [16:01] ns1 from which domain? [16:02] ns1,2,3.canonical.com. tried to lookup via whois, but it's privacy guard. [16:03] ah, right, none of those seems to have AAAA [16:03] maybe the IS team? [16:10] um, isn't this By Design? [16:10] sdeziel: ^ [16:10] to my knowledge NONE of the Canonical infra has v6 on it [16:10] so no AAAA records is By Design [16:11] canonical.com has AAAA [16:11] well [16:12] xibalba: i can confirm the records exist [16:12] so [16:13] the NS1 server doesnt, so my ipv6 only resolver can't get the AAAA records for ubuntu.com, etc.. [16:13] xibalba: you never stated the *domain* you were working with [16:13] state that in #canonical-sysadmin [16:13] andonly there now [16:37] Is there a way for me to have the output print to a file and to my screen? [16:37] for example this command md5deep -r * > md5.txt [16:39] MIF, try the script command [16:39] the what? [16:39] which script [16:39] - /usr/bin/script [16:40] /bin/md5deep [16:41] is that what you where looking for? [16:44] no, lookup the command called 'script' [16:44] type 'man script' on your terminal [16:44] ok? [16:44] that will print your standard terminal output to your screen and to a file [16:44] https://askubuntu.com/questions/625224/how-to-redirect-stderr-to-a-file [16:45] Is probably more the solution required [16:46] thanks [16:46] (sorry, wrong chan. But thanks for all the good work everyone :) ) [16:47] MIF sounds like you want "tee" [16:47] The "script" command is more of a fake shell which can record all the commands and output of the commands [16:47] so this genii? md5deep -r * >md5.txt 2>&1 [16:47] MIF: Yes [16:48] when I run that it dose not print it out, just to the file [16:51] I got it [16:51] I just had to flip the order around [16:51] to make it md5deep -r * >&1 2>md5.txt [16:51] I figured if you studied the answer givent here, it would occur to you [16:51] given there, rather [16:52] thank you for your help [16:56] Glad to assist [16:58] after me running that it only printed the errors so I just had to so a normal md5deep -r * >md5.txt then just tail the file [19:55] whats the proper way to persist iptables config between reboots? [19:56] xibalba: apt install iptables-persistent [19:58] thank you [19:58] yw === denningsrogue4 is now known as denningsrogue === denningsrogue1 is now known as denningsrogue === guillaumedsde02 is now known as guillaumedsde0 [23:38] is there a way to hide from an attack on AWS on an Ec2 instance where I am root, but the account is controlled by someone else (who can clone the instance, or shutdown the instance etc)? [23:39] wat ? [23:50] Ussat, what is not clear on my question? [23:50] if you are root, you are in control. [23:51] I didn't understand it at all [23:51] the 'but the account is controlled by someone elseĀ“ is weird [23:51] and "hide from" ? [23:51] are you legally owner? [23:57] I assume the AWS account is controlled by someone else [23:57] and that person isn't easily reachable maybe [23:59] oerheks, There is a client of mine that owns an AWS account - I am root on one of the machines they created for me. I am root on the machine. [23:59] I would like to encrypt/hide everything I do from the AWS account. The AWS account owner has the ability to clone the machine, shutdown the machine. Almost like having physical access to the machine.