[01:24] <querulant> moin, alle sprachen auf diesem kanal ?
[01:24] <arraybolt3> querulant: Heya! You've reached the English Ubuntu support channel. You probably want the German one.
[01:24] <arraybolt3> !de | querulant
[01:25] <arraybolt3> Hope that's helpful!
[01:27] <querulant> aha, vielen dank. also wie früher. hab 10 jahre keinen rechner mehr angefasst, muss mich also neu orientieren und einleben :)
[01:30] <sarnold> willkommen zureuck :)
[01:31] <querulant> danke.
[01:38] <querulant> waren das nicht eigentlich kanäle auf freenode?
[01:39] <sarnold> yeah, but freenode imploded
[01:39] <arraybolt3> sarnold: TIL you speak german
[01:40] <sarnold> arraybolt3: unfortunately it's much worse now :( I used to be pretty good at it
[01:41] <querulant> ok, thanks. than i can stop the reserch :)
[02:47] <blei> i wanna stamp the top right corner of every page of a pdf with the year but i cant figure it out the text is always blurry
[07:10] <aiena> In ubuntu with Alt+F2 how do I execute a shell script vs opening it in the text editor?
[07:22] <Bashing-om> aiena: Have you mafe the script "executable" > chmod ?
[07:22] <Bashing-om> made*
[07:23] <aiena> the script is executable but alt+f2 opens the text editor running it in a terminal emulator launches it.
[07:23] <aiena> A workaround I found is making a .desktop file launch the script
[07:23] <aiena> But wondering if I could get by without it.
[07:24] <aiena> using the .desktop method I press the show applications and search and launch which works too but differently
[10:38] <tuxinator> Somebody using systemd-homed for per user home directory encryption? Anybody using systemd-homed on 22.04 ?
[11:23] <LuckyMan> Have the glib bugs been fixed?
[11:41] <geirha> you mean glibc? you can check    apt changelog libc6   and see if it mentions the cve numbers
[11:43] <geirha> I'm currently on 22.04 with glibc 2.35. The new vulnerabilities are in glibc 2.36 and newer I think
[11:43] <pagios> : hello all, anyone installed a pppoe server on ubuntu  ? which software is easiest ? want t o connect mikrotik client to it
[11:53] <bjorkintosh> why do I need to enable ubuntu pro to install updates for a LTS?
[11:53] <bjorkintosh> whatever happened to just running apt to update?
[11:55] <lotuspsychje> bjorkintosh: see bug #2047778
[11:55] -ubottu:#ubuntu- Bug 2047778 in update-manager (Ubuntu) "Software Updater unable to cancel Ubuntu Pro upgrade" [Undecided, Confirmed] https://launchpad.net/bugs/2047778
[11:56] <ravage> the easy fix it to enable pro 🙂
[11:56] <bjorkintosh> ravage, but if I wanted M$, I'd have installed their adware!
[11:56] <bjorkintosh> this is sacred ground :-|
[11:57] <ravage> you still get all updates via apt with pro
[11:57] <ravage> not sure what this has to do with microsoft
[11:59] <bjorkintosh> ravage, does pro not require registering with ubuntu?
[11:59] <ravage> !pro | bjorkintosh
[11:59] <ravage> hmm
[11:59] <ravage> !pro | bjorkintosh
[12:00] <ravage> no bot around? cant see it from my matrix bridge
[12:00] <bjorkintosh> ubottu's around.
[12:00] <ravage> !pro
[12:00] <bjorkintosh> #pro ?
[12:00] <ravage> https://discourse.ubuntu.com/t/ubuntu-pro-faq/34042
[12:00] <lotuspsychje> !ubuntupro
[12:01] <lotuspsychje> ubottu needs a reboot perhaps
[12:01] <ravage> thats the FAQ. read it and decide yourself
[12:01] <ravage> if you dont want to use pro wait for the bugfix in the updater
[12:02] <bjorkintosh> lotuspsychje, maybe it isn't registered for pro updates.
[12:02] <bjorkintosh> ravage, thank you. I'll wait.
[12:03] <bjorkintosh> last update rendered my device inoperable.
[12:09] <FKAShinobi> I have a service that is timing out occasionally on the loopback address. CPU and memory seem to be available. Could this really be a networking issue on the loopback?
[13:14] <BluesKaj> Hi all
[14:43] <sem> Hey BluesKaj
[14:47] <BluesKaj> hey sem
[15:29] <tuxinator> Somebody using systemd-homed for per user home directory encryption? Anybody using systemd-homed on 22.04 ?
[15:34] <leftyfb> tuxinator: I don't think it's supported in Ubuntu 22.04
[15:35] <leftyfb> I determined that by the lack of any package including the homectl binary
[15:40] <CosmicDJ> tuxinator: I have my $HOME encrypted with fscrypt on mantic, it's decrypted when I enter my login password using PAM
[15:42] <ioria> https://packages.ubuntu.com/mantic/amd64/systemd-homed/filelist
[15:42] <leftyfb> ioria: 22.04
[15:42] <ioria> ah, no way then
[15:43] <JordiGH> How do you get security upgrades without Ubuntu Paid?
[15:44] <leftyfb> :/
[15:44] <leftyfb> JordiGH: Ubuntu is free
[15:46] <JordiGH> leftyfb: Okay, how do I get free security upgrades?
[15:47] <leftyfb> !update | JordiGH
[15:47] <leftyfb> JordiGH: sudo apt upgrade
[15:47] <leftyfb> JordiGH: or with the desktop, a window should pop up periodically showing you updates and allowing you to update them
[15:48] <JordiGH> leftyfb: It's asking me to pay or signup for something in order to get security upgrades.
[15:48] <leftyfb> !pro | JordiGH
[15:48] <leftyfb> hm, ubottu broken?
[15:48] <itu> how to not open new instance of hexchat when clicking to the icon in left dashboard
[15:49] <leftyfb> JordiGH: https://discourse.ubuntu.com/t/ubuntu-pro-faq/34042
[15:49] <leftyfb> JordiGH: that is Ubuntu pro. You can subscribe for free here: https://ubuntu.com/pro/subscribe
[15:50] <JordiGH> Okay, if I don't want to subscribe, I'm still not getting security upgrades?
[15:50] <JordiGH> That FAQ is tl;dr
[15:50] <leftyfb> JordiGH: if you read the article, it explains your question perfectly
[15:50] <JordiGH> It's way too long.
[15:50] <leftyfb> JordiGH: you will still get security updates without subscribing to pro
[15:51] <JordiGH> So why is it saying it's not doing security upgrades?
[15:51] <leftyfb> it's not
[15:52] <JordiGH> Ugh, it's a simple question: how do I get those security upgrades without Ubuntu Pro?
[15:52] <JordiGH> Answer: this is how
[15:52] <JordiGH> Altenrative answer: you cannot
[15:52] <leftyfb> you don't
[15:52] <JordiGH> Okay, thanks.
[15:52] <messi> hola
[15:52] <messi> hola
[15:52] <messi> holaaaaaaaaaa
[15:53] <leftyfb> JordiGH: Ubuntu pro is Canonical (commercial business) doing security updates to what are normally community maintained packages. If the community maintainer hasn't updated the package, then Canonical might as part of the Pro subscription.
[15:54] <JordiGH> This is some of the dumbest things Marky Mark has done.
[15:54] <leftyfb> JordiGH: that doesn't mean you won't get the updates. It just might mean you have to wait longer for the maintainer to update their package. Maybe.
[15:54] <JordiGH> "Hey, we know how to make sure you don't get pwned, but you have to give us stuff to not get pwned? Don't wanna do it? Get pwned, n00b!"
[15:54] <leftyfb> JordiGH: It sounds like you still don't understand what pro is and don't seem to have an interest in understanding. Good luck
[15:55] <JordiGH> I am working at a company. I don't qualify for the free thing.
[15:55] <leftyfb> JordiGH: that's not necessarily true
[15:55] <JordiGH> If I want to keep this thing secure, I'm going to have to go through some internal bureaucracy to pay for it.
[15:55] <JordiGH> In the meantime, my computer has known vulns.
[15:55] <leftyfb> JordiGH: again, that's not necessarily true
[15:55] <JordiGH> This is dumb, Mark.
[15:56] <JordiGH> sabdfl come back to IRC you coward
[15:56] <leftyfb> also, this is for community packages. Not typically ones tha you'll be using in an enterprise environment
[15:56] <leftyfb> JordiGH: knock it off
[16:00] <JordiGH> leftyfb: Also, obscuring all this with a wall of text of corporate-sounding PR nonsense is infuriating.
[16:00] <leftyfb> JordiGH: or you could read the article I posted to get a better understanding of what Pro is and isn't
[16:01] <JordiGH> I understand now what it is. Maybe pay for security fixes, or do nothing and live with known vulns.
[16:01] <JordiGH> It's damn near extorsion.
[16:01] <leftyfb> JordiGH: do you know what community packages are?
[16:01] <JordiGH> The Debian packages that Ubuntu cares less about.
[16:02] <ioria> kinda :)
[16:02] <leftyfb> they are packages maintained by the community. Not Canonical
[16:02] <JordiGH> By Debian.
[16:02] <JordiGH> Not "the community".
[16:02] <leftyfb> false
[16:03] <JordiGH> Debian has a well-architected structure.
[16:03] <JordiGH> Okay, fine, you can also patch downstream in Ubuntu, but mostly you don't
[16:03] <leftyfb> The vast majority of packages in Ubuntu are directly from Debian. That doesn't make them community packages
[16:04] <ioria> as i remember the subscript is for free JordiGH
[16:04] <JordiGH> ioria: Depends who you are. I'm pretty sure I don't qualify.
[16:04] <ioria> ho
[16:05] <leftyfb> JordiGH: it depends
[16:05] <JordiGH> We're a large company with more than 50 users. I could lie, I guess. Maybe that's ethical given the circumstances, but then my coworkers would be living with vulns instead.
[16:06] <JordiGH> Well, medium company, really. Less than one kilousers.
[16:07] <leftyfb> JordiGH: Canonical is updating packages belonging to someone else. Packages it doesn't maintain. For the betterment of it's users. For a cost. The rest of the entire OS from Ubuntu is free
[16:08] <leftyfb> JordiGH: before Pro, nobody seemed to care that these packages weren't updated by their maintainers and installed them anyway. Where was the outrage then?
[16:09] <leftyfb> that said, it's really really annoying the way Canonical is now bringing it to light in the manner they are. There's lots of discussions on how this could be done in a less intrusive and less alarming way
[16:10] <leftyfb> (but also, not always at a cost)
[16:10] <JordiGH> leftyfb: Dude, it doesn't matter. It's fucking sleazy to say "I know how to make sure you don't get pwned, but you have to pay." It's up there with "nice OS you got there. 'Twould be a shame if you got a ransomware attack on that."
[16:11] <arraybolt3> !language | JordiGH
[16:11] <leftyfb> JordiGH: ok, feel free to file a bug. Let us know if you have any actual support questions. If you'd like to discuss further, please /join #ubuntu-offtopic
[16:11] <JordiGH> I wonder how long until that happens. It's a huge exposure vector. The vulns are exposed but because they're quasi-paywalled, a bunch of people will get attcked.
[16:12] <arraybolt3> JordiGH: If you'd like to do all that work for free and give it away, you're more than welcome to :)
[16:13] <JordiGH> I'm not against money. Hell, I love money. It's great to get paid. Everyone should get paid. But Mark chose a very bad way to get paid.
[16:14] <leftyfb> JordiGH: feel free to discuss further in #ubuntu-offtopic. This channel is for Ubuntu support questions. Not to rant and argue.
[16:14] <JordiGH> k I'll stfu
[16:24] <pavlos> #ansible
[16:29] <FKAShinobi> I have a service that is often timing out on 127.0.0.1. How do I tell if that is network related or for some other reason?
[16:30] <lotuspsychje> elaborate a bit FKAShinobi
[16:30] <leftyfb> FKAShinobi: can you pastebin the exact error message and maybe explain what service?
[16:37] <FKAShinobi> lotuspsychje leftfb: https://paste.debian.net/1305892/     The service is unbound.
[16:37] <leftyfb> FKAShinobi: that means you don't have a resolver listening on localhost or it's blocked
[16:38] <leftyfb> at port 5335
[16:40] <FKAShinobi> leftyfb: When the command is issued the first attempt it makes times out, then it does not. The service is enabled and active on port 5335
[16:41] <leftyfb> FKAShinobi: look through the unbound logs
[16:42] <leftyfb> FKAShinobi: I would suggest maybe asking for more help with unbound in #unbound. The people there should be pretty well versed and experienced with unbound
[16:43] <FKAShinobi> leftyfb: fair enough. I was trying to determine if it was an appication issue or a networking issue. Do you know if the loopback address can ever timeout due to networking reasons?
[16:44] <leftyfb> FKAShinobi: not likely unless you have blocked it or messing with it in some way with firewall rules
[16:45] <FKAShinobi> leftyfb: Thanks
[16:45] <AmeliaMonaldo> Come to Tel.gram if you have free sex with me >> @mariyaccxx
[16:46] <leftyfb> tomaw: ^
[18:02] <Patrick_> I uninstalled a snap with the snap gui application and data belonging to that snap was automatically compressed with gzip. Does anyone know where that gzip file is stored?
[18:16] <Patrick_> I figured it out. snapshots are saved in /var/lib/snapd/snapshots
[18:16] <tupni> nice
[18:16] <Patrick_> that's something to be mindful of, since sometimes an app can have a large amount of data
[18:16] <tupni> make a backup in case some cleaning-agent scrubs it away
[18:16] <Patrick_> I wanted it gone
[18:17] <tupni> oh ok
[18:18] <Patrick_> `snap saved` to list snapshots. `snap forget <set_number>` to delete it.
[18:22] <MasNeoTek> irc://irc.artikanet.org/GALAXY
[18:22] <tupni> beriddance to those files and glad you figured it out, Patrick_
[21:10] <AmeliaMonaldo> https://bdcash1.scaletrk.com/click?o=2030&a=6309
[22:37] <luciano_> salve
[22:38] <luciano_> someone speaks italian here?
[22:39] <leftyfb> !it | luciano_
[22:39] <leftyfb> hm
[22:40] <luciano_> perfetto
[22:40] <leftyfb> luciano_: you can try #ubuntu-it
[22:40] <luciano_> questo è un forum di sviluppatori ubuntu? vorrei pubblicare un'app sui repository di Ubuntu
[22:40] <luciano_> i understand
[22:40] <luciano_> sorry