[00:25] aloini: ntpd or chrony [00:26] aloini: also, something is seriously wrong with whatever is writing to that media.log. It's 2 weeks ahead of time [00:27] Whatever is writing "media.log" is broken and not using RFC 3339 timestamp format. [00:28] The fact that timedatectl indicates "NTPSynchronized=yes" is usually sufficient. As long as the system is running for at least 6 minutes without a reboot, that will automatically get commited to the hardware clock. [00:30] That looks to me like you're running timesyncd's built in SNTP client, which is accurate to about 1 second. If you need better accuracy, or you expect targeted attacks, you can use ntpsec (full NTP), preferably with an NTS-capable NTP server. [00:31] What you've pasted so far looks like someone ran datefudge on whatever wrote media.log [00:34] Bleh, looks like if you want NTS right now you have to trust either Sweden or USA === ijohnson|lunch is now known as ijohnson === vlm_ is now known as vlm [07:30] Hi, I need to configure grub2 to ask for a login when you want to edit any of the menu entries, The only guides I could find requires you to use a username and password when the system boots. We are moving from Centos to Ubuntu so I'm a bit new to the Ubuntu way of things, was a simple excersize on grub that ships with Centos to achieve what I [07:30] needed. Is there a way in grub2 that ships with Ubuntu 20.04? [09:42] Hi guys, what is LimitMEMLOCK and the eefect of adjusting it in systemd on service? [11:19] Chr15P_1968: if you have a RHEL system around, look at /boot/grub/grub.cfg there [11:21] Hamidreza: "man systemd.directives" is the index; it will tell you which manpage covers LimitMEMLOCK. That happens to be a ulimit, so also see /etc/security/limits.conf [11:21] Hamidreza: in general LimitX= are not useful except to increase LimitNoFile= in rare cases. [11:21] Hamidreza: for actual security hardening, run "systemd-analyze security" and "systemd-analyze security my-cool-unit.service" [11:48] @twb, we are currently running centos VMs and protecting grub2 menu entries. https://paste.ubuntu.com/p/K3yzDyM8DM/ shows the steps I used. [11:49] if they're VMs don't bother with grub at all [11:49] just tell libvirtd the kernel and ramdisk to boot directly [11:50] I will look into it, how will you boot into rescue mode for example [11:51] http://ix.io/2PJ1 [11:51] Chr15P_1968: if you need rescue mode then you need access to edit the VM's boot options [11:51] Which if they have they can always just bypass grub anyway by adding an ISO [11:53] Chr15P_1968: anyway, the steps you pasted sound reasonable for ubuntu also [11:53] True [11:53] interesting that you are using EFI in VMs since currently that prevents snapshots in libvirtd [11:58] update_grub doesn't read 01_users file, I created the file. also grub2-setpassword isn't installed. Trying to see if I need to install a package that provided the tool [12:02] use apt-file to see if it has another package or name [12:03] re 01_users the path might be slightly different, I don't know offhand [12:03] I don't use grub myself so I don't know without digging and ICBF [12:11] twb, I know what is limitx but I don't know what is Memory lock (MEMLOCK) [12:12] Hamidreza: did you read the references I cited? [12:13] twb, Yes but it wasn't MEMLOCK in it [12:18] I can't understand what it will do? [13:12] Has the "alternate" installer for ubuntu server been deprecated? [13:14] kierank, https://discourse.ubuntu.com/t/server-installer-plans-for-20-04-lts/13631 [13:15] (effectively it was deprecared since 16.04 or so, 20.04 just finished that step) [13:15] hmm ok. It's very annoying as it turns on autoupdates by default [13:16] that has nothing to do with the installer [13:16] sure, but the alternate one didn't [13:17] I'm pretty sure it did [13:17] no, you get a choice [13:18] installing security updates automatically has been a default of apt and unattended-upgrades for a while already [13:18] and thats really not an installer option [13:19] In the alternate installer you get the choice of whether you want this or not [13:19] In any case, does it matter if it's an installer option or not? Server users will be customising their servers immediately after install anyway; otherwise what's the point of installing server? So just customise as you wish in the process you're already using after installation. [13:20] thats definitely a bug ... but since that installer isnt supported anyway, thats a moot point [13:20] We see sometimes kernels randomly updating in the field and dkms modules breaking [13:20] (if it would be supported i'm sure that option would have been removed) [13:21] and it's the fault of people using the new installer and having autoupdates on by default [13:21] and assuming the behaviour was like the old one [13:21] not really [13:21] its the fault of the dkms stuff breaking ... but surely not the fault of apt updating things [13:21] Regressions are bad and they shouldn't happen, so sorry about those. But I think you've got the wrong root cause here. It's *far worse* if users aren't installing security updates without realising that they're not. [13:22] file bugs about these issues and get them fixed ... [13:22] I'm reporting what is happening in the real world, if you don't like it that's not my fault. But you can't blame users for change in behaviour [13:22] (cf: linus rants about this) [13:22] Where did we blame users? [13:23] 14:19:43 In any case, does it matter if it's an installer option or not? Server users will be customising their servers immediately after install anyway; otherwise what's the point of installing server? So just customise as you wish in the process you're already using after installation. [13:23] you are nmot reporting anything ... you are complaining about the installer ... [13:23] How is that blaming users? [13:23] reporting bugs happens on launchpad 🙂 [13:23] I'm just saying that if you want to customise your installation, you have an opportunity to do so. [13:23] Because you assume the users now have to check quite complex config files for something that they had a choice of before [13:23] That's still not blaming users. [13:23] It is [13:24] The config files are quite complex and require multiple changes [13:24] Ubuntu makes decisions about defaults. That's part of what Ubuntu is. Part of the origin of Ubuntu is *not* asking users a bunch of questions. [13:24] Whereas in alternate, you had one option [13:24] It's entirely up to the Ubuntu project what the defaults should be, and what's appropriate to prompt during installation and what isn't. [13:24] It was clear-cut before, now you have to edit config files based on guesses from stackoverflow [13:24] It's fine that you have a difference of opinion on that, and debates about what the defaults should be are welcome. [13:24] great user epxerience [13:25] Not asking users a gazillion questions does make for a better user experience, yes. It's part of what gave Ubuntu early success over Debian. [13:25] If users disagree with defaults, there's usually a customisation option available. [13:25] changing behaviour without telling them is not helpful [13:26] Is there actually an official way to disable autoupdates on server [13:26] that doesn't involve stackoverflow guessing and incantations [13:26] Automatic security updates have been default in Ubuntu for many releases. [13:26] There has been no change in behaviour. [13:26] In the sense of what is default, anyway. [13:27] I don't know how to break this down to you: Before: clear option to turn them off in installer. After: ??? [13:27] Changing what set of questions get asked in the installer can be expected to happen from release to release anyway. [13:27] Go to stackoverflow and guess [13:27] until it breaks in production [13:27] because there is an edge case in another random config file [13:27] https://askubuntu.com/questions/1167314/disable-automatic-updates-ubuntu-18-04 [13:27] people are literally guessing [13:27] https://help.ubuntu.com/lts/serverguide/automatic-updates.html [13:27] goes nowhere [13:27] So we need a better answer there. [13:28] Blaming the users here is not helpful at all [13:28] who is blamingh users [13:28] In any case, turning off automatic updates without putting an alternative management solution in place is *a really bad thing to recommend that users do*. [13:28] 14:19:43 In any case, does it matter if it's an installer option or not? Server users will be customising their servers immediately after install anyway; otherwise what's the point of installing server? So just customise as you wish in the process you're already using after installation. [13:29] Assumes users can somehow understand how to disable autoupdates via telepathy [13:29] I don't think this conversation is being productive any more. [13:29] I think I've made my position clear. [13:29] No point in continuing. [13:29] Yes your point is "Blame the users" we get that [13:29] It is not. [13:29] They must somehow guess how to go back to the old behaviour [13:29] Please let me know the official way to disable autoupdates [13:29] That used to work in alternate? [13:31] You might be able to use "dpkg-reconfigure -plow unattended-upgrades" or something like that to see the old prompt and get the old behaviour. I would test that though. [13:31] QED [13:31] https://help.ubuntu.com/community/AutomaticSecurityUpdates [13:32] ogra: that's to turn them on [13:32] * ogra sighs and goes to do something useful instead [13:32] It was one option field in alternate, it's now a huge complex config file [13:32] with lots of edge cases [13:33] as I understand it, I've followed most of the online guides [13:33] but random packages were still being updated [13:34] rm -R /etc/apt [13:35] I think the way to do it is "systemctl disable --now apt-daily{,-upgrade}.{timer,service}" [13:35] But who knows, I'll only find out at 2am when things are broken [13:35] I wouldn't recommend that, as I think it'll also disable the motd message that informs you when security updates are available. [13:36] So please let me know the official way to do it as it used to work in alternate? [13:36] or just follow the guide i gave you above and call "sudo dpkg-reconfigure --priority=low unattended-upgrades" ... which gives you EXACTLY !!!!! what debian-installer could give you ... [13:36] I can file a ticket on launchpad but we'll rehash the same arguments [13:36] I already made a suggestion. [13:38] in either case, you should file a bug about the exact breakage you see with dkms pieces, so it can be fixed ... making ubuntu more insecure is *NOT* the solution [13:38] I have no idea how to reproduce said bug. Just wait for the next kernel update [13:38] If you install the kernel manually dkms works fine [13:38] Some DKMS breakages were a result of bug 1915051, which I'm just reviewing the fix for as it happens. [13:38] Bug 1915051 in dkms (Ubuntu Hirsute) "dkms-autopkgtest: Also select binary packages that depends on dkms for testing" [High, In Progress] https://launchpad.net/bugs/1915051 [13:39] So in a practical world the only way to fix this is to turn off autoupdates [13:39] It's how some DKMS packages skipped QA by accident. [13:39] I have this issue on 18.04 btw [13:41] Help to better document things that the community often want to do are welcome. Though IMHO any documentation on turning automatic updates off should come with a dire warning about getting an alternative solution in place to get security updates, as not doing so is completely irresponsible. [13:41] Help to fix regressions is also welcome. [13:43] I don't see us adding a prompt to the installer though. The best place to debate that is probably https://discourse.ubuntu.com/c/server/17, but ultimately it's a trade-off, a decision needs to be made, and so people on one side are going to be disappointed. That's no reason not to help with the above two points though. [13:46] I don't think I'm getting the same issue here [14:03] How do I simulate a kernel update that the auto updater would do as opposed to one that is done by the user? [14:06] I think you can just run "unattended-upgrades" [14:06] Perhaps with --dry-run if you want [14:06] I suppose if I install without internet connection I won't get updates the first time [14:07] then I could try doing an unattended upgrade as soon as I enable the connection [14:08] I think you want the following apt configs: APT::Periodic::Update-Package-Lists "0"; APT::Periodic::Unattended-Upgrade "0"; [14:08] I did that, it wasn't enough [14:09] Unattended-Upgrade::Allowed-Origins {}; ? [14:09] don't know [14:09] would be helpful for us to know what you tried to configure so far. [14:09] those two as stackoverflow says [14:09] and then I got an unexpected update [14:09] So I did "systemctl disable --now apt-daily{,-upgrade}.{timer,service}" [14:10] and that seems to stop things [14:10] But I would rather understand why dkms fails on auto update [14:10] but not on normal user prompted upgrade [14:10] As mentioned above, I do not think you should be disabling apt-daily.service / apt-daily.timer "Daily apt download activities" [14:11] Sure, I'm just trying to fix the problem now [14:11] To not be woken up in the early hours [14:11] The apt-daily-upgrade.service / apt-daily-upgrade.timer disablement might make sense, but I do not think you should be just out-right disabling them tbh. [14:11] Could just set up a Unattended-Upgrade::Package-Blacklist {}; [14:12] for your kernel and dkms concerns and then have a separate workflow for those. [14:13] For the previous point, if you are managing a fleet = just put appropriate configurations in your orchestration, and installer defaults do not matter. If you are managing just a few servers and do not have orchestration in place, then just reconfigure unattended-upgrades. [14:13] Actually wonder if you could just uninstall `unattended-upgrades` package, but hey. [14:14] No, seems like a bad idea. Anyhow. [14:23] I set up a trunk port to my machine that only allows vlans 1 and 20. the Native vlan is set to 100 and isn't actually a thing. Since untagged traffic won't get passed how do I tell ubuntu to use enp0s25.1 instead of enp0s25? [14:25] I can get in fine since ssh uses vlan 1 but if I try to run updates ubuntu tries to make requests over enp0s25 which is untagged and of course nothing happens. [14:28] dwigton: in netplan or in networkd? [14:29] twb: netplan [14:29] No idea about netplan, sorry [14:30] How do you do it in networkd? maybe the ideas will give me a clue? [14:31] Edit /etc/systemd/network/00-upstream.network and fiddle with VLANId= I think [14:32] Oh it's just VLAN= [14:32] I am tempted to try to give enp0s25 an id and see what happens. the worst is that I have to drag a monitor and keyboard to the "server" *cough* NUC to recover. [14:32] EgressUntagged=20 looks like the specific option you would want in systemd [14:33] dwigton: yeah I 100% hate devices that still don't have HTML5 BMCs [14:39] hmm. the netplan documentation is either horrible or I am dumb. [14:40] could be both! :-) [14:41] I was considering Ubuntu for its better secure boot <-> zfs integration, but took one look at netplan and just went "noooooope" [14:41] Too close to network-manager bricking wired interfaces back in 2010 === ijohnson is now known as ijohnson|lunch [20:06] Is anyone here familiar with MAAS ? [20:08] Try #maas [20:10] thank you [20:10] was unaware [20:13] Heh, seems to not be hight traffic, but thats ok I am patient [20:15] Yeah it might take a while [20:15] Ussat: it is always useful to "/msg alis help" on Freenode, and "/list help" on OFTC. [20:15] ya ya === StathisA_ is now known as StathisA === ijohnson|lunch is now known as ijohnson [20:31] * enyc meows [20:31] curious -- will ubuntu-server releases tend to include/defaust to kernel 5.4 LTS always ? [20:32] rather than HWE as per 20.04.2 desktop etc [20:32] ubuntu 30.04 will probably not default to that kernel ;) [20:33] enyc: I believe the server installers do default to the "ga" kernel and offer the hwe kernel as an option during install [20:37] RoyK: aah yes true [20:55] Ubuntu Server 20.04.2 was released with HWE as an option. [20:55] https://wiki.ubuntu.com/FocalFossa/ReleaseNotes#Installer [20:56] "Starting from Ubuntu Server 20.04.2 the ISO images can optionally boot the installer using the HWE kernel. In this case the installed system will automatically make use of the HWE stack." === hggdh changed the topic of #ubuntu-server to: Ubuntu Server discussion and support | For general (not server specific) support, try #ubuntu | IRC Guidelines: https://wiki.ubuntu.com/IrcGuidelines | home: https://wiki.ubuntu.com/ServerTeam | Docs and resources: https://ubuntu.com/server/docs