IRC log for #devuan on 20170828

00:02.44*** join/#devuan matlock (~matlock@user-24-214-145-29.knology.net)
00:12.33*** join/#devuan koris (~koris@185.65.134.111)
00:14.57*** join/#devuan earthnative (~nemo@59.167.208.146)
00:34.08*** join/#devuan specing (~specing@unaffiliated/specing)
00:35.30*** join/#devuan JohnTheRipper (~JohnTheRi@2.229.193.226)
00:35.32*** join/#devuan saptech (~saptech@unaffiliated/saptech)
00:42.50*** join/#devuan JohnTheRipper (~JohnTheRi@2.229.193.226)
00:59.38*** join/#devuan justinsm (~justinsm@82-69-63-196.dsl.in-addr.zen.co.uk)
01:02.14*** join/#devuan nighty- (~nighty@kyotolabs.asahinet.com)
01:03.39*** join/#devuan XuR (~quassel@ip70-188-216-108.ph.ph.cox.net)
01:34.47*** join/#devuan Humpelstilzchen (erik@x4e32a7c9.dyn.telefonica.de)
02:09.30*** join/#devuan rdav (~rdav@61.181.148.122.sta.dodo.net.au)
02:09.49*** join/#devuan noordinaryspider (~noordinar@41.185.17.106)
02:13.01*** join/#devuan Hoshpak (~Hoshpak@p200300C90BC78400E9B9209A24436626.dip0.t-ipconnect.de)
03:36.03*** join/#devuan jathan (~jathan@189.216.204.127)
04:02.24*** join/#devuan zyliwax (~zyliwax@unaffiliated/zyliwax)
04:36.38*** join/#devuan jathan (~jathan@189.216.204.127)
04:54.13*** join/#devuan jathan (~jathan@189.216.204.127)
05:36.45*** join/#devuan ferdy- (~ferdy@funtoo/contrib/ferdy-)
05:42.34*** join/#devuan tokage (~tokage@fsfe/tokage)
05:48.23*** join/#devuan tsuggs (~tsuggs@adsl-074-171-024-060.sip.int.bellsouth.net)
06:37.33*** join/#devuan Pali (~pali@Maemo/community/contributor/Pali)
06:52.44*** join/#devuan ferdy- (~ferdy@funtoo/contrib/ferdy-)
07:03.11*** join/#devuan romo (~romo@unaffiliated/romo)
07:05.26*** join/#devuan JohnnyRun (~gianni@net94-124-67-2.static.bb.mainsoft.it)
07:12.03*** join/#devuan Kizano (markizano@2600:3c00::f03c:91ff:fec8:382d)
07:15.04*** join/#devuan Besnik_b (~Besnik@ppp-94-66-221-90.home.otenet.gr)
07:46.29ddgI am experiencing huge memory usage from qupzilla, any ideas why? <<< fresh installed after new devuan install...
07:47.30*** join/#devuan PnUic (~androirc@46.231.35.210)
07:51.04*** join/#devuan thaller (~thaller@2.43.142.111)
07:58.17*** join/#devuan freemangordon_ (~ivo@195.128.225.2)
07:58.18*** join/#devuan mf (~yaaic@x52716adb.dyn.telefonica.de)
08:05.00*** join/#devuan bozonius (~bozonius@c-73-90-84-55.hsd1.ca.comcast.net)
08:05.02*** join/#devuan koris (~koris@185.65.134.111)
08:05.38bozoniusdoes devuan support hotpluggable drives?
08:06.25bozoniusMy devuan 1.0 VM has started having intermittent freezes since I changed the drives to hotpluggable.  I just switched them back to non-hotpluggable and wait to see what happens
08:06.32bozoniusthanks
08:07.18bozoniusbtw, nothing else changed, other than my adding a new virtual drive.  At that time, I changed all the drives to hotpluggable.
08:08.51*** join/#devuan ferdy- (~ferdy@funtoo/contrib/ferdy-)
08:11.26*** join/#devuan s_kunk (~s_kunk@unaffiliated/s-kunk/x-5139101)
08:15.58bozoniuswell, nevermind.  It just froze again.   So it isn't the hotplug ability causing the freeze, apparently.
08:17.19bozoniusNow I am wondering what could be suddenly causing these freezes?   I haven't done anything to either VBox host or the Devuan client configuration, though I may have run update/upgrade recently, before the last boot sometime.
08:17.40bozoniusIt won't be ping'd.
08:20.07bozoniusand I don't have ssh set up though I doubt that would work either.  It seems to be completely hung/frozen.
08:34.16bozoniusI see some curious errors in the vbox log, so I'll try to see if that may be the source of the freeze.
08:42.16*** join/#devuan Drugo (~Drugo@62-11-1-95.dialup.tiscali.it)
08:46.13bozoniusturns out these errors also happen on my Ubuntu VM, and it is not having these freezes
08:46.34bozoniusso this appears to be Devuan specific (but could be a vbox issue, idk)
08:48.06bozoniusthe only packages installed or upgraded since these freezes began was the newest Chrome browser and ntptrace.  Other than that, no changes to packages.
08:57.38*** join/#devuan fugitive_ (~fugitive@95.211.147.186)
09:03.06*** join/#devuan ferdy- (~ferdy@funtoo/contrib/ferdy-)
09:03.59*** join/#devuan JotaMG (~chatozill@5.109.249.5.rev.vodafone.pt)
09:16.39*** join/#devuan PnUic (~androirc@46.231.35.210)
09:28.21debdogbozonius: prolly updating the kernel fixes it
09:29.16bozoniusdebdog:  Thanks.  What kernel version do I need?
09:29.55bozoniusI ran "apt-get update" and "apt-get upgrade" and got no updates.
09:30.06debdogsorry, not into hotplugging stuff. you'll have to check release notes or just use the latest
09:30.12debdogwelll.
09:30.16debdog*wel...
09:30.19debdogdang
09:30.26debdoglet me get coffee first :P
09:30.30debdogwell...
09:30.31bozoniusoh, I backed that out -- no more hotplugging, but that made no difference.  It still freezes.
09:30.40bozoniuslol.  go... get your coffee
09:31.18debdogby updating I meant compile one
09:31.40bozoniusI've never had to build a kernel for this sort of thing before.  Wow, if so.
09:32.03bozoniusbut forget hotplugging; that's a non-op here
09:34.03bozoniusI'll come back to this in the AM after some sleep.  Thanks for help, debdog.
09:36.34debdogbozonius: Jessies kernel is quite old by now. it is very likely since then the kernel advanced the hotplugging as well as VM-guest code
09:50.14*** join/#devuan reetp (~john@239.red-80-59-216.staticip.rima-tde.net)
09:52.46debdog*Jessie's
09:54.09*** join/#devuan fugitive_ (~fugitive@95.211.147.186)
10:09.32*** join/#devuan Nefertiti (~Nefertiti@unaffiliated/nefertiti)
10:23.28*** join/#devuan eliasr (uid27497@gateway/web/irccloud.com/x-emcpqvjazfkimovl)
10:40.15*** join/#devuan godbed (~Wowbagger@HSI-KBW-078-042-157-153.hsi3.kabel-badenwuerttemberg.de)
11:03.04*** join/#devuan fugitive_ (~fugitive@95.211.147.186)
11:10.13*** join/#devuan Infiltrator (~Infiltrat@unaffiliated/infiltrator)
11:12.39*** join/#devuan justinsm (~justinsm@82-69-63-196.dsl.in-addr.zen.co.uk)
11:36.51*** join/#devuan debdog (~debdog@ip-37-201-6-177.hsi13.unitymediagroup.de)
11:37.58*** join/#devuan ferdy- (~ferdy@funtoo/contrib/ferdy-)
11:44.44*** join/#devuan freedomrun (~freedomru@unaffiliated/freedomrun)
11:44.59*** join/#devuan peetaur (~peter@p200300E10BC056001E1B0DFFFE9F7A09.dip0.t-ipconnect.de)
12:00.39*** join/#devuan nighty- (~nighty@s229123.ppp.asahi-net.or.jp)
12:06.55*** join/#devuan ffernand (ffernand@devworker.com)
12:09.55*** join/#devuan fugitive_ (~fugitive@91-150-111-168.dynamic.isp.telekom.rs)
12:28.53*** join/#devuan debdog (~debdog@ip-37-201-6-177.hsi13.unitymediagroup.de)
12:44.13*** join/#devuan XuR (~quassel@ip70-188-216-108.ph.ph.cox.net)
13:08.14*** join/#devuan Katnija (~KittenGNU@208.209.9.46.customer.cdi.no)
13:11.07*** join/#devuan konsolebox (~konsolebo@110.54.223.68)
13:25.27*** join/#devuan debdog (~debdog@2a02:8070:4182:a200:7a24:afff:fe8a:d04d)
13:35.03*** join/#devuan Drugo (~Drugo@62-11-1-95.dialup.tiscali.it)
13:40.37*** join/#devuan KittenNIX (~KittenGNU@208.209.9.46.customer.cdi.no)
13:42.42*** join/#devuan TemporalBeing (~Ben_Meyer@72.32.180.178)
13:44.33*** join/#devuan system16 (~system16@unaffiliated/system16)
13:45.42system16who is preauth?
13:45.55system16quit trying to connect to my server
13:46.15fsmithreddid you check where the ip address is from?
13:46.54system16no
13:47.03system16im on it
13:47.05fsmithredwhois <ip-address>
13:48.59system16hmm two ip s
13:49.10fsmithred?
13:49.27fsmithredtwo different attempts with same name and different addresses?
13:50.03system16country cn
13:50.19system16this isnt me
13:50.20*** join/#devuan debdog (~debdog@2a02:8070:4182:a200:7a24:afff:fe8a:d04d)
13:50.34fsmithredyou're not in China?
13:50.34system16its china
13:50.44system16no
13:50.45fsmithredseveral ways to deal with this
13:51.00system16maybe its my apt mirror?
13:51.04fsmithred1. fail2ban or the other one whose name escapes me
13:51.10fsmithredare you near there?
13:51.27system16kinda
13:51.33fsmithredand were you running the package manager at that time?
13:51.37fsmithredwait
13:51.42fsmithredpackage manager won't use ssh
13:52.25system16idk i think djph configured my mirro
13:52.29system16r
13:52.32system16in asia
13:52.53fsmithredyou would have had to given him a login name
13:52.58fsmithreddoes it match that name?
13:53.06fsmithredand was it a successful login?
13:53.19system16no
13:53.31system16i didnt give anyone a login name
13:54.02system16cncgroup
13:54.11fsmithredthen how did djph log in?
13:54.29system16i gave him a account
13:54.38system16but i deleted it afterr 5 min
13:54.41fsmithredthat account had to have a login name
13:54.44fsmithredoh, ok
13:55.28system16how can i know if that person connected to my server ?
13:55.46system16failed attempt ?
13:57.12fsmithredit will say that they connected
13:57.23system16where?
13:57.31fsmithredin the auth.log
13:57.41system16last thing in that log is disconnected
13:58.30fsmithredon an ssh connection?
13:59.02*** join/#devuan polocho (~polocho@89.141.233.231.dyn.user.ono.com)
13:59.02system16in less/var/log/auth.log
13:59.18fsmithredyeah, but that logs all kinds of auths
13:59.25fsmithredif you su to root it gets logged
13:59.34fsmithredif you connect by ssh it gets logged
13:59.38fsmithredetcetera
13:59.47fsmithredread the whole line and it will tell you
13:59.52system16i mean is this a person trying to steal my data?
14:01.59fsmithredAccepted password for user from 192.168.1...
14:02.05fsmithredthat's a normal login
14:02.26fsmithredin your case, the ip address was from china instead of from across the room (my case)
14:02.40fsmithredand the login name is really "user"
14:02.40system16preauth is me?
14:02.58fsmithrednot sure what that means
14:03.04fsmithredit's not a user name
14:03.41system16should i e-mail him ?
14:03.48fsmithredfuck, no!
14:04.01system16y?
14:04.12fsmithredif they only tried one user name, it was probably a mistake
14:04.28fsmithredif they tried a bunch of different names, they were trying to hack you.
14:04.36system16once ?
14:04.41fsmithredin neither case do you need to contact them
14:04.50fsmithredwhat are you asking?
14:04.50system164 disconnected messages from preauth
14:05.04fsmithreddid they succeed in loggin in?
14:05.08system16idk
14:05.13fsmithredread the log
14:05.16system16thats my question
14:05.26fsmithred"Accepted password"
14:05.44fsmithred"session opened for..."
14:06.00fsmithredand they would have used a valid user name
14:06.11system16in auth.log?
14:06.12fsmithredand account on your computer that really exists
14:06.14fsmithredyes
14:06.41fsmithredless /var/log/auth.log
14:07.04fsmithredand then /ssh to search
14:07.06system16ok
14:07.39fsmithredalso, not related... Doc said we should have told you about two things...
14:07.58system16?
14:08.00fsmithredTAB will auto-complete what you're typing in a terminal
14:08.29fsmithredand if it stops before completing to the end, hit TAB again and it will show you what possible matches exist
14:08.50fsmithredthen you type another letter or two (whatever makes it unique) and TAB again to complete it
14:09.08fsmithredother thing was the most important command to know...
14:09.10fsmithredman
14:09.16fsmithredman <command>
14:09.29fsmithredto see the manual for <command> that you want to know about
14:11.21fsmithredback in five minutes. Look for what i said to look for in the log.
14:13.53*** join/#devuan menip (~menip@c-73-53-122-132.hsd1.wa.comcast.net)
14:17.29system16lots of people tried connecting to my server....ukrain...
14:18.23system16i  think he/she failed
14:19.53system16failed password from ......
14:20.16fsmithredcorrect
14:20.38system16u want the ip?
14:20.40fsmithreddid they try three times?
14:20.47system16too many
14:21.00fsmithreddid they try different names?
14:21.40system16it says disconnecting from the.ip.
14:21.51system16because too many invalid passwords
14:22.08system16one is from china the other one is from ukrain
14:22.23fsmithredok, so two people tried to get in
14:22.32fsmithredbut each only tried one username?
14:22.55fsmithredor is there a whole series of attempts from each ip?
14:23.10fsmithredattemps using different usernames, I mean
14:23.35system16<PROTECTED>
14:23.51djphautomated bots trying to break in.  Happens with a server on the internet
14:23.54fsmithredwith different usernames each time?
14:24.45system16ok i am turning my server off
14:24.50system16it happened last night
14:24.54system16when i was asleep
14:25.02fsmithredyeah, it'll probably happen almost every day
14:25.21fsmithredinstall either fail2ban or denyhosts
14:25.40fsmithredthat will block anyone who tries too many times
14:25.45djph^ that
14:26.00system16why r they trying to access my server??
14:26.02djphmaybe swap over to key-based auth
14:26.03fsmithredother thing you can do is change the ssh port in the router
14:26.06system16i am a normal user
14:26.08djphbecause it's on the internet
14:26.17fsmithredsystem16, they are criminal hackers - it's their job to break in
14:26.35system16am i in danfer?
14:26.35djphor script kiddies thinking they're good
14:26.41system16danger*
14:26.48fsmithrednot a lot of danger, no
14:26.57fsmithredthey're going for the easy targets
14:27.13fsmithredso don't make it easy
14:27.19djphlong as you have a decent password (or better yet, use key auth), you're not "an easy target"
14:27.44system1611 character password
14:28.02fsmithredif you're not a bank or big corp that they specifically want to get into, they're not going to spend more than a few seconds trying.
14:28.21system16how to activate anti a$$holes thing ?
14:28.24fsmithred11 is still good
14:28.28djph11 is okay
14:28.40fsmithredinstall fail2ban or denyhosts and read how to configure
14:28.47djph^that
14:28.58system16apt-get install free2ban?
14:29.06fsmithredfail not free
14:29.18system16:)
14:29.29*** join/#devuan IoFran (~Thunderbi@189.231.38.189)
14:30.17fsmithredlooks like fail2ban requires a running firewall
14:30.36fsmithreddenyhosts does not, but it warns that it doesn't do ipv6
14:30.37system16cncgroup
14:30.47fsmithredwhat's that?
14:30.52system16i am on ipv4
14:31.06system16https://krebsonsecurity.com/tag/china169-bj-cncgroup/
14:31.15fsmithreddenyhosts will put the bad ip address in /etc/hosts.deny
14:31.36system16shit
14:31.56system16i am under attack by cncgroup attackers
14:32.09system16i was*
14:32.35fsmithredI have to go
14:32.47system16ok
14:32.55system16djph i am worried
14:33.01*** join/#devuan aitor (~aitor@218.red-88-11-76.dynamicip.rima-tde.net)
14:33.05fsmithredno time to read the article, but check to see if they got in through ssh. They probably found another way in.
14:33.10system16all my personal things r in my server
14:33.21fsmithredbbl
14:33.41djphyou were under attack by an automated bot that scans everything.  Prior to opening the port on your router, it was the router that was getting hit.
14:33.58system16so i am safe?
14:34.38djphsystem16: "safe(tm)".  Have a good password, don't use "standard" usernames (root, test, user, etc.), have a decent password (11 chars from what you said) ...
14:34.50system16test111
14:34.53djph... oops ... said the password bit twice
14:35.08system16its not my password
14:35.25djphmaybe kill "test111" and come up with a more unique username.
14:35.37system16whats the command for that?
14:35.41djphmaybe move to key-based authentication, and deny password-based auth
14:35.54djphas root --> adduser newusername
14:36.06system16adduser?
14:36.11djph(where "newusername" is the username you want to add)
14:36.20system16all my files r in test111
14:36.35system16idk how to cut them to my new user
14:36.47system16u know cut in windows
14:36.55djphas root, mv /home/test111 /home/newuser
14:37.21djphthen chown -R newuser:newuser /home/newuser
14:37.33system16<PROTECTED>
14:37.40system16i cant use file zilla?
14:37.48djphwhy bother?
14:38.01djphyou have direct access to the box, you can jsut do everything right on there
14:38.05system16chown ?
14:38.16system16but i have to wait
14:38.26aitorhi
14:38.44djphchown => CHange OWNer
14:38.47djphhey aitor
14:39.10aitorhey
14:39.14system16i said to my friends to access my server and copy-paste a file (they r not from those contries....
14:39.29djphso if you move everything from /home/testuser to /home/newuser ... it'll all still be owned by "testuser".  You have to change the owner to "newuser" for that
14:39.50system16ok
14:40.03*** join/#devuan ferdy- (~ferdy@funtoo/contrib/ferdy-)
14:40.48*** join/#devuan bill-auger (~quassel@75-138-187-221.dhcp.oxfr.ma.charter.com)
14:42.08system16oh
14:42.52system16recived a disconnect from 185.165.29.157: 11: bye bye [preauh]
14:43.43system16auth*
14:45.03*** join/#devuan mn3monic (~xxwa@unaffiliated/mn3monic)
14:45.06bozoniusmy anacron jobs have not been run in a week.   Somehow it must have become disabled.  How to re-enable it?
14:45.37djphsystem16: means that someone from 185.x.x.x tried connecting, then hung up
14:45.42*** join/#devuan PnUic (~androirc@91.252.62.65)
14:46.06system16so they didnt connect sucsessfully?
14:46.09djphno
14:46.30system16i have their address
14:46.34djphthe only way for someone to connect successfully to your system is (1) they have the right username, and (2) they have the right password
14:46.45djphso?
14:46.47system16whois their.ip
14:46.53djphso
14:46.54djph?
14:47.00system16report to police?
14:47.01djphno
14:47.19system16for trying to break in?
14:47.28djphno
14:47.31djphyou're overreacting
14:48.07djphdo you call the cops every time someone knocks on your front door / rings your doorbell?
14:48.37system16yes if they use force like 4 years ago
14:48.37Lydia_KThere are lots of bots/scripts out there that try to log into any machine they can find with predictable username/password combinations.
14:48.55djph"using force" is not "knocked on your front door"
14:48.56system16somebody tried to break in 4 years ago
14:49.52djphI'm talkin' about people like girl scouts / boy scouts / church groups / salesmen / etc. who you don't know and who come knocking trying to sell you stuff / get you involved in the community / whatever.
14:50.14system16and i dont want that in online world....again
14:50.35system16so its not a bot related to me?
14:50.50system16like ssh bot trying to help me?
14:51.56system16service bot? i am asking this because the word auth is used in auth.log too
14:52.00djphit's just a bot scanning the ports, and knocking.  that's it.  it's not "immediately" someone trying to break in (same as say girl scouts) ...
14:52.30djphthe only log that tracks that is "auth.log" you're reading too much into filenames / words in the logs
14:53.10system16so its not friendly ? (not a service bot?)
14:53.29DocScrutinizer05system16: trying to connect is perfectly legal and a usual recurring thing to happen whever you are in internet
14:53.41system16whats their goal ? scare people ?
14:54.00djphit's no different that if you put a notebook on a table next to your front door, and called it "auth.log".  Then wrote in it "girl scout - didn't let in. bought cookies" / "girlfriend - let in" / "crazy cat lady - didn't let in" / "brother - let in" / [...]
14:54.05system16just making sure my private data remains private <DocScrutinizer05>
14:54.07DocScrutinizer05ghaha, no, they don't expect to scare anybody with that, they don't know you are
14:54.18*** join/#devuan telst4r (~telstar@a91-153-137-214.elisa-laajakaista.fi)
14:54.18*** join/#devuan telst4r (~telstar@fsf/member/telst4r)
14:55.07djphsystem16: the idea of the internet is that it's "public" -- same as your front door.
14:55.20djphsystem16: anyone who feels like it can walk up and knock
14:55.38system16but +4 times ?
14:56.23system16oh and i see bunch of people trying to be a root>....interesting
14:56.26DocScrutinizer05there WILL be brute force attempts to break in, you better ignore them to stay with sane mind. Just make sure you sue a good password and a unique user name (NOT "root", "admin", "test", "mysql", whatever, there's a long list of user names you should NOT allow login from outside)
14:56.47djph'root' is a common username.
14:56.55djphit's one that everyone tries with ssh
14:57.01system16ps4-967?
14:57.07DocScrutinizer05yes, and you regularly do NOT allow ssh login for root
14:57.10djphsame as say "anonymous" for a FTP server
14:57.15*** join/#devuan debdog (~debdog@2a02:8070:4182:a200:7a24:afff:fe8a:d04d)
14:57.28DocScrutinizer05actually that's a default setting for sshd
14:57.34system16is there any GUI way to detect this kind of things?
14:57.40DocScrutinizer05norootlogin=yes, or somesuch
14:57.59system16i cant deny or allow things
14:58.09DocScrutinizer05o,O
14:58.39DocScrutinizer05see what Lydia_K said
14:58.47system16if the password matches they will connect if not they wont
14:59.09djphDocScrutinizer05: default for sshd is "AllowRootLogin = without-password" (i.e. with SSH Keys ONLY)
14:59.38DocScrutinizer05no, you can deny accounts to log in at all, or just restrict login to certain access methods, excluding for example ssh login
14:59.51system16and how?
15:01.06DocScrutinizer05I set all my servers to not allow password login at all, only ssh-key. I move prot from 22 to some upper portrange like 21212, and I disallow root login generally
15:01.18djphnear all accounts are blocked by default (they're "non-login" accounts).  The exceptions being root, and user accounts that you create.  However, root is denied ssh logins
15:01.59DocScrutinizer05s/prot/port/
15:02.29djphchanging the default ports really doesn't do much though - I mean, sure it'll stop the most basic of scripts; but these days, determined types hit everything :/
15:02.36DocScrutinizer05it does
15:02.55DocScrutinizer05reduces spam from skiddies briteforcing my servers by 99%
15:03.03system16djph i am confused it says sftp not ssh
15:03.19DocScrutinizer05I love clean syslogs
15:03.26djphSFTP is "ftp over ssh" -- close enough
15:03.37system16so its not ssh
15:03.42djphDocScrutinizer05: I just block all of asia, did the same thing
15:03.44DocScrutinizer05it basically is
15:03.52DocScrutinizer05hehe nice
15:03.57djphsystem16: it's a ssh tunnel wrapping ftp ... it's the same thing
15:04.24system16transfer file protocol?
15:04.31DocScrutinizer05man sftp
15:04.36djphis too lazy to mess with standard ports -- 21,22,25,80,443, etc...
15:05.11DocScrutinizer05if I open those, then only to place honeypots in there ;-)
15:05.18djphsftp --> ssh file transfer protocol (IIRC -- might be "secure file transfer protocol", as with ssh => "secure shell" / scp => "secure copy"_
15:05.20system16oh and my friends said i need to pay for a static ip is this true?
15:05.28DocScrutinizer05yes
15:05.37djphsystem16: no. just use a service like no-ip / dyndns
15:05.40DocScrutinizer05google dyndns though
15:05.49system16ok i have to go bye
15:05.58DocScrutinizer05system16: check man
15:06.04DocScrutinizer05the command
15:06.21DocScrutinizer05and check what happens when you press TAB key, twice
15:06.50DocScrutinizer05the two best features of linux
15:07.12DocScrutinizer05ma<TAB>
15:07.17*** join/#devuan g4570n (~g4570n@host2.190-228-106.telecom.net.ar)
15:07.21*** join/#devuan AntoFox (~Thunderbi@dynamic-adsl-78-12-41-232.clienti.tiscali.it)
15:07.32DocScrutinizer05man sf<TAB>
15:07.34telst4rman man
15:07.36DocScrutinizer05<TAB>
15:08.26DocScrutinizer05yeah, start with `man man`
15:08.29AntoFoxo/
15:11.46aitor\o
15:12.07DocScrutinizer05system16: you asked "how did you learn about all those commands?" - I did by reading manpages (man man ...) for days and weeks
15:13.27DocScrutinizer05(well, actually that's not exactly correct. Back when I got me *books* with all the manpages in them)
15:15.25telst4rbooks were nice. and then there came the internet. But basically, reading a lot of stuff and trying a lot of stuff.
15:19.29Lydia_Ksystem16: Playing around with things, breaking stuff, talking to people, trying new things, those are the best way to learn all this. You'll be surprised how quickly it becomes second nature.
15:19.33DocScrutinizer05first I had those 3 or 4 red paperback books with all the manpages in them, from university. Much later (several years) I got me the awesome book box with the official NeXTstep docs
15:19.33Lydia_KOh, he's gone.
15:19.34*** join/#devuan leafwiz (~leafwiz@204.51-174-97.customer.lyse.net)
15:21.38DocScrutinizer05then shortly after that (some 3 years or somesuch) linux emerged and dwarfed minix etc
15:22.39DocScrutinizer05finally it was possible to run a 'true unix' on your home computer
15:25.54*** join/#devuan debdog (~debdog@ip-37-201-6-177.hsi13.unitymediagroup.de)
15:27.13*** join/#devuan Kruppt (~Kruppt@104.169.28.12)
15:34.23telst4rthat's quite heavy. I was on the platform of the 90's that time. OS/2.
15:37.20*** join/#devuan noordinaryspider (~noordinar@134.19.187.45)
15:38.48*** join/#devuan IoFran (~Thunderbi@189.231.38.189)
15:40.03*** join/#devuan fugitive (~fugitive@91-150-111-168.dynamic.isp.telekom.rs)
15:53.42*** join/#devuan debdog (~debdog@2a02:8070:4182:a200:7a24:afff:fe8a:d04d)
16:12.41*** join/#devuan noordinaryspider (~noordinar@41.185.17.106)
16:19.27*** join/#devuan debdog (~debdog@2a02:8070:4182:a200:7a24:afff:fe8a:d04d)
16:24.33DocScrutinizer05my primary OS of that time: Amiga Workbench
16:25.55DocScrutinizer05IBM PC only in case of emergency, and then in emulator
16:26.09telst4rOoh :)
16:26.13telst4rrespect.
16:28.06*** join/#devuan KittenNIX (~KittenGNU@208.209.9.46.customer.cdi.no)
16:30.49*** join/#devuan system16 (~system16@unaffiliated/system16)
16:30.58system16ok im back
16:31.16system16what happenes when they gain access to my server ?
16:31.58system16steal data or just some kids saying :i hacked ur server i am goo in pc...
16:32.16Lydia_K98% chance it'll be used to send spam mail.
16:32.20Lydia_Kspam mail = money
16:32.50Lydia_KBut if you have a strong password you'll be fine.
16:32.53system16huh that bot/ guy tried again at 17:00
16:33.23Lydia_KAlmost certainly a bot, no human does that manually.
16:33.23system16recived disconnect means he/it didnt enter the correct password ?
16:33.36Lydia_KIf you want to feel safer take a look at this: http://denyhosts.sourceforge.net/
16:34.06system16ip changes but port stays at 11 interesting...
16:34.56system16i prefer downloading it using apt can u say the command?
16:35.23system16i am using devuan with no gui
16:36.52system16lydia_k its 9 years old u sure about this program/
16:38.26Lydia_Kdenyhosts is just a simple script to watch your ssh logs and block IPs based on failed logins and such. It's not needed to change in a very long time.
16:38.40Lydia_KI'm sure there are others that do the same thing
16:38.49Lydia_Kfeel free to look around and pick one you like :)
16:40.06Lydia_KBRB, lunch!
16:42.23unixmansystem16, Lydia_K, here is one I have been considering - http://www.digitalmages.com/projects/autofwd/
16:43.51*** join/#devuan ferdy- (~ferdy@funtoo/contrib/ferdy-)
16:44.29system16hey one of them is a hosting company .... they r trying to send me ads?
16:45.15djphno, you're just checking an IP address part of a larger range that happens to be owned by a hosting company
16:45.23jonadabLydia_K: So like fail2ban, basically.
16:45.31*** join/#devuan debdog (~debdog@2a02:8070:4182:a200:7a24:afff:fe8a:d04d)
16:47.27system16its downloading
16:47.32system16fail3safe
16:47.50system16fail2ban*
16:47.56system16done
16:48.16system16no confi required? it works out of the box?
16:50.10system16config*
16:52.31*** join/#devuan Pali (~pali@Maemo/community/contributor/Pali)
16:53.49fsmithredman fail2ban
16:54.59DocScrutinizer05man fai<TAB>  ;-)
16:55.16DocScrutinizer05and worst case:  apropos fail2ban
16:55.22fsmithredyes
16:55.31system16i guess no configuring is not required
16:55.39DocScrutinizer05usually not
16:55.48fsmithredreallt?
16:55.50system16sorry this keyboard has some problems
16:56.12DocScrutinizer05well, not much
16:56.38system16virtual servers ? thats not good
16:56.46DocScrutinizer05huh?
16:56.53system16actual server is better
16:57.12system16almashosting.com       <<it was in whois
16:59.08*** join/#devuan litefem1 (~fag86693@ip-89-103-237-191.net.upcbroadband.cz)
16:59.53DocScrutinizer05you are on a sure road to insanity, trying to find out about _who_ tested your server
17:00.32DocScrutinizer05there are even university projects mass scanning the internet to estimate how many vulnerable machines are out there
17:01.27DocScrutinizer05make sure your server is secure, forget about the "attacks"
17:01.32system16ok
17:01.59DocScrutinizer05fail2ban-client status
17:03.19telst4ryou should take a look on fail2ban's configs. Like, how many failed login tries will result in how long bantime and so.
17:04.31system16number of jail 1
17:07.18DocScrutinizer05so one rule/jail is active in your fail2ban
17:08.00system16jail list :ssh
17:11.42*** join/#devuan peetaur (~peter@p200300E10BC056001E1B0DFFFE9F7A09.dip0.t-ipconnect.de)
17:12.16*** join/#devuan eracc_lappy (~Captalist@unaffiliated/eracc)
17:23.16system16djph can u try connecting to my server again?
17:23.37*** join/#devuan JotaMG (~chatozill@5.109.249.5.rev.vodafone.pt)
17:24.22djphif you want ... pm me the IP again
17:32.33system16djph..the app broke something'
17:33.09system16but i can connect with ipv4 using filezilla
17:39.40*** join/#devuan Katnija (~KittenGNU@208.209.9.46.customer.cdi.no)
17:47.59*** join/#devuan xes (~xes@unaffiliated/xes)
17:53.08*** join/#devuan jathan (~jathan@fixed-187-190-159-133.totalplay.net)
18:01.12*** join/#devuan bozonius (~bozonius@c-73-90-84-55.hsd1.ca.comcast.net)
18:01.17*** join/#devuan AntoFox (~Thunderbi@dynamic-adsl-78-12-41-232.clienti.tiscali.it)
18:03.40*** join/#devuan Ltem (~ltem@h081217057026.dyn.cm.kabsi.at)
18:03.48*** join/#devuan debdog (~debdog@2a02:8070:4182:a200:7a24:afff:fe8a:d04d)
18:05.51*** join/#devuan jathan (~jathan@fixed-187-190-159-133.totalplay.net)
18:11.20*** join/#devuan Kruppt (~Kruppt@104.169.28.12)
18:16.51*** join/#devuan atrapado_ (~atrapado@unaffiliated/atrapado)
18:31.51*** join/#devuan Akuli (~Akuli@mobile-access-5d6a95-83.dhcp.inet.fi)
18:43.20DocScrutinizer05can connect when using correct IP addr
18:45.00DocScrutinizer05the app broke nothing
18:48.27DocScrutinizer05wasted 90 min to find out there's actually a thing like ephemeral IP addresses
18:53.50DocScrutinizer05http://wstaw.org/m/2017/08/28/plasma-desktopYg2395.png
18:54.29system16sorry for wasting 90 min of ur life
19:03.26DocScrutinizer05https://www.noip.com/free
19:03.59bozoniuswhy does devuan supply virtualbox guest additions rather than having the user build them from the CD, as I do for most other distros?
19:04.27bozonius(strangely, it actually eliminates a bug, but I don't get why; I'm using the latest GA CD image!)
19:04.48bozoniusdoes devuan make any changes to the source of the GA's?  Just curious
19:05.51DocScrutinizer05no changes afaik
19:06.11*** join/#devuan pillepalle (~Thunderbi@5.146.73.225)
19:06.46bozoniusThanks, doc.  Interesting, the version I built manually from the CD was generating a bug -- it was trying to access Host Time clock, even though I had disabled this for my Devuan VM!
19:07.20bozoniusfor some reason, the same source that was used to build both versions (CD-built and Devuan-built) seem to produce different results!
19:11.33*** join/#devuan AntoFox (~Thunderbi@dynamic-adsl-78-12-41-232.clienti.tiscali.it)
19:13.12bozoniusHmmm...  I wonder if merely building the GAs causes this difference -- maybe the build looks at whether the HostTime feature is enabled or not and builds the GAs accordingly.
19:13.41bozoniusIf the GAs are built by the apt-get mechanism, which I think they are, then this would make sense.
19:31.00*** join/#devuan mf (~yaaic@p200300C613C93D0098C9B4719D6739F3.dip0.t-ipconnect.de)
19:41.29DocScrutinizer05bozonius: this sounds like a worthwhile subject to investigate further. I have no clue about the topic but I think devuan should provide 'the right thing' or not provide it at all. Could you please share any further findings?
19:41.52bozoniussure.
19:42.55bozoniusRight now, I'm stress-testing my Devuan VM to see if it freezes again.  But it was freezing after only a few minutes, maybe up to 20 or so,  but it has now been running almost 2 hours since the last boot without a freeze...
19:44.04bozoniusMainly, I'm just wondering why devuan supplies the GAs -- convenience?   Or maybe they figure people will struggle figuring out which packages and headers they need
19:44.35DocScrutinizer05no idea, it's maybe just a side effect of how amprolla works
19:44.41DocScrutinizer05~pkhs
19:44.49DocScrutinizer05!pkgs
19:44.56DocScrutinizer05damn
19:45.02DocScrutinizer05!packages
19:45.10DocScrutinizer05!ping
19:45.10infobot1 packet transmitted, 1 packet received, 0.0% packet loss
19:45.25DocScrutinizer05:-S
19:47.02DocScrutinizer05!pkgs
19:47.02infobot#devuan packagelist is, like, on our gitlab's group https://git.devuan.org/groups/devuan-packages
19:47.29*** join/#devuan pillepalle (~Thunderbi@5.146.73.225)
19:48.10DocScrutinizer05can't find guest additions in devuan specific packages
19:48.46DocScrutinizer05so be mere logic it must be a package drawn from debian
19:51.52bozoniuscontrib
19:52.23bozoniushave to add contrib to the source list then update
20:03.32*** join/#devuan konsolebox (~konsolebo@112.198.118.187)
20:03.52bozoniusoh, you mean ones not ported from debian, got it now
20:07.03DocScrutinizer05yes, a package genuinely built on, and drawn in binary form from debian
20:10.52bozoniusah, so whatever is going on would be in debian's bailiwick
20:13.24DocScrutinizer05yep
20:13.53DocScrutinizer05however if that's "wrong" then devuan can correct it
20:16.34DocScrutinizer05or whoever wants to could open a ticket against guest additions in debian
20:17.15bozoniusso I could ask over at #debian
20:18.08DocScrutinizer05of course you should pull the package from genuine debian and test in a debian environment/system before you expose yourself to hate from debian devels
20:18.23bozoniusbut it does appear that the GAs are built when the package is installed
20:18.32bozonius(yeah I was thinking that also)
20:18.34bozonius:D
20:18.43DocScrutinizer05oooh, that's very special then
20:19.05DocScrutinizer05onviously the build environment is devuan and not debian then
20:19.35DocScrutinizer05so yes, this *might* be a bug against devuan indeed
20:19.39bozoniusthe GA's have to be built against the environment they will run in
20:19.42bozoniusmaybe
20:19.46bozoniusor maybe not a bug at all
20:20.09bozoniusI changed the "hardware" environment
20:20.12DocScrutinizer05when it blows chunks it is a bug :-D
20:20.33bozoniusso the package build will pick up the specific params of my "HW" environment
20:20.45bozoniuswell, that's true
20:20.51bozoniusit really did blow chunks
20:21.04DocScrutinizer05when the package drawn from debian expects a build environment that's not available on devuan, then devuan needs to fix that package
20:22.14bozoniuswell now wait...
20:22.59bozoniusI originally built the GA's from the CD, and things were honky-dory as far as the GA's and happiness in the Devuan environment
20:23.01bozoniusTHEN
20:23.33bozoniusI changed the Vbox virtual hardware/drivers to not use the Host Clock
20:23.43bozoniusbut did not rebuild the CD sources
20:24.04DocScrutinizer05hmm, hist clock smells like systemd dependency
20:24.11DocScrutinizer05host*
20:24.42bozoniusnor did the GAs ever get rebuilt upon reboot
20:25.08DocScrutinizer05considering how systemd has his grubby fingers in about everything related to time keeping
20:25.19bozoniusnor did I even reboot for some time after changing the vbox env
20:26.41DocScrutinizer05then OTOH I'd guess guest extensions are more about host than about guest system, no?
20:26.50bozoniusso without dkms support, I was running the GAs after the reboot that were built against a different env (clock)
20:27.01bozoniusit's both actually
20:27.05bozoniusbut you are right
20:27.55bozoniusthe host env can have some impact, but the guests are largely insulated.   My hosting platform is CentOS 6 (systemd does not arrive until C7)
20:28.12bozoniusand, of course, Devuan has none of that silliness.
20:28.52bozoniusThis is a sorta-kinda operator error in a way...
20:29.14DocScrutinizer05so you're running GAs that are built for both host and guest with systemd, and still neither has systemd in your setup? :->
20:29.15bozoniusSadly, the CD source build does not demand that you install DKMS.
20:29.28bozoniuseh, no
20:29.44bozoniusGAs are built for the guest
20:30.15DocScrutinizer05toldya I have no damn clue about that stuff :-)
20:30.15bozoniusno changes are made for the host, though the way the GAs interact with the host certainly could be impacted
20:30.19bozoniusnp
20:30.23bozoniusI think I do.
20:30.29bozoniusI've been using Vbox for years now
20:30.36bozoniussince about V3 or so
20:30.53bozoniusand I'd experimented with earlier versions before that, but not seriously
20:31.27bozoniusjust fyi, Doc, there are other distros that provide the GAs in packaged form.  2 I know of are Mageia and Alpine
20:32.05bozoniusAlpine because its MUSL C, not GNU C, and some changes are necessary to accomodate the MUSL lib env
20:32.27bozoniusfor Mageia, I forget now, but a user there explained it to me once.
20:32.37DocScrutinizer05I recall last time I downloaded them via a menu entry inside VB
20:32.40bozoniusright
20:32.46bozoniusthat's what I mean by the CD build
20:33.16bozoniusit's not a download per se, but actually the build of the GAs from that CD image
20:33.32DocScrutinizer05aaah right, rings a bell
20:33.39bozoniusyou have to make sure you have the headers and dev libs for your kernel
20:33.54bozonius(I can hear the "ding" from here, Doc)
20:34.04bozoniussounds like you've done it a time or so
20:34.41bozoniusBUT
20:34.53bozoniusHere's how I got bitten by all this in the case at hand
20:35.28DocScrutinizer05starts the recording
20:35.33bozoniusBecause I did not have DKMS installed (the CD build does not require it), when I rebooted after changing the VM's environment
20:36.41bozoniusI was then running mis-matched GAs for the now-changed environment.   Or maybe even before the reboot b/c actually you can change those particular params on the fly
20:37.06bozoniusdisabling Use Host Clock and Use TSC Timer
20:37.15DocScrutinizer05help me out, what's DKMS?
20:37.18bozoniusI think this covers my "bug"
20:37.25bozoniusOh.  OK.
20:37.39bozoniusDynamic Kernel Make System (I think)
20:37.52DocScrutinizer05o.O
20:38.04bozoniuseach time you boot, DKMS checks for any loadable kernel mods that need to be rebuilt
20:38.24DocScrutinizer05yikes
20:38.25bozoniussuch as after a kernel upgrade, but possibly for other reasons
20:38.29bozonius?
20:38.36bozoniusno, it's really a great feature
20:38.45bozoniuswithout it, you could get bitten like I just did
20:38.58DocScrutinizer05hmm, sounds like prone to outsmart itself
20:39.20bozoniusgo on... ?
20:39.20*** join/#devuan pillepalle (~Thunderbi@5.146.73.225)
20:39.41DocScrutinizer05I prefer to explicitly update my kernels and lernel modules
20:39.44bozoniusI will remove it from all my domains, real and virtual, if you can tell me how
20:39.54bozoniussure
20:39.55bozoniusbut
20:40.13bozoniusDoc, what if you update the kernel but forget to update the modules?
20:40.21DocScrutinizer05I also guess rkhunter will not be amused
20:40.45bozoniusOr what if you unintentionally  update the kernel on a general update (gets pulled along with other updates)
20:40.52DocScrutinizer05when I update kernel but forget the modules, I hope somebody will shoot me ;-)
20:40.59bozoniusI think rkhunter tolerates it somehow
20:41.14bozoniusHas anyone shot you so far?
20:41.15bozoniusNo.
20:41.21bozoniusSo that's why DKMS is there
20:41.28bozoniusto spare you that pain!
20:41.46DocScrutinizer05sounds like ... systemd rationale
20:41.50bozoniusI don't mean to sound like the DKMS fanboy
20:42.05bozoniusI knew this was going to happen...
20:42.22*** join/#devuan rick8024 (~andreas@p5B0A1F21.dip0.t-ipconnect.de)
20:42.27bozoniusLOL
20:42.33DocScrutinizer05"don't worry if you don't understand it, we take care for you anyway so you don't need to understand how it works"
20:42.48bozoniusMakefiles?
20:42.56DocScrutinizer05updates
20:43.11bozoniusUnless you study them in great depth, you don't always know every last thing they do
20:43.23bozoniusthat's all DKMS is doing really
20:43.38bozoniusno hand-waving or anything, AFAIK
20:43.47DocScrutinizer05I know I need a consistent set of kernel plus modules, and when I mess up, I keep a fallback jernel to boot from
20:44.21bozoniusDKMS is just a kind of makefile tool, that's all.
20:44.38DocScrutinizer05though honestly I never seen a kernel update coming without the modules, ever
20:45.16DocScrutinizer05since the maintainers also know they are one package
20:45.24bozoniusgood point, but at least in the case of the vbox GA's, they can't come with the kernel update
20:45.43bozoniusfor one thing, they can (and usually do) change more frequently than kernel updates
20:46.12bozoniusunless you think the kernel devs and packagers need more work to do
20:46.18bozoniusbbs
20:46.22bozonius(food)
20:46.44fsmithredjust got back, and I don't have time to read the whole scrollback, but my understanding is that the virtualbox in repo is completely FOSS and the one from oracle is not.
20:50.36*** join/#devuan matlock (~matlock@user-24-214-145-29.knology.net)
20:53.15DocScrutinizer05fsmithred: read from ``[2017-08-28 Mon 22:35:27] * DocScrutinizer05 starts the recording´´  to ``[2017-08-28 Mon 22:38:46] <bozonius> without it, you could get bitten like I just did´´
20:57.44*** join/#devuan matlock (~matlock@user-24-214-145-29.knology.net)
21:00.34fsmithredsome stuff doesn't work if you don't have dkms. I think vbox is one of them.
21:01.36DocScrutinizer05possible. So I'd suggest vbox depends on them and invokes them explicitly when needed. I strictly do not want any automatism updating my kernel modules of my productive systems without my consent
21:02.28fsmithredI've only ever noticed it when installing something
21:02.31*** join/#devuan tarbz2 (~Thunderbi@181.44.164.227)
21:04.47DocScrutinizer05tbh I can't even figure how compiling kernel modules on the fly **during boot** could possibly work
21:05.08DocScrutinizer05during install, sure.
21:05.14FrostyByteswhy not? there was even a project to compile the entire kernel at boot
21:05.26DocScrutinizer05headdesks
21:05.36FrostyBytesusing a compiler much faster than gcc of course
21:12.33fsmithredone could boast about 45-minute boot times?
21:13.17fsmithredwhy do that? Is a fresh compile any different from one that was done last week?
21:33.15*** join/#devuan Mr_Pan (~Mr_Pan@unaffiliated/mr-pan/x-4457432)
21:36.48*** join/#devuan mf (~yaaic@p200300C613C93D0038EC10CE25162D32.dip0.t-ipconnect.de)
21:37.57*** join/#devuan polocho (~polocho@89.141.233.231.dyn.user.ono.com)
21:44.05matlocknot exactly an entirely new kernel rebuild but openbsd is getting unique kernels with each reboot https://www.bleepingcomputer.com/news/security/openbsd-will-get-unique-kernels-on-each-reboot-do-you-hear-that-linux-windows/
21:48.29*** join/#devuan TemporalBeing (~Ben_Meyer@172-6-231-225.lightspeed.tukrga.sbcglobal.net)
21:57.55*** join/#devuan chomwitt (~chomwitt@2a02:587:dc0e:9300:7058:b2cc:2d54:a660)
21:58.49*** join/#devuan justinsm (~justinsm@82-69-63-196.dsl.in-addr.zen.co.uk)
22:08.59*** join/#devuan aitor (~aitor@218.red-88-11-76.dynamicip.rima-tde.net)
22:09.02aitorhi
22:11.42golinuxho
22:12.18golinuxfsmithred: is off eating cake and ice cream
22:12.28aitorthe boot process with vdev delays some seconds due to the following message:
22:12.52aitorfailed to load ath3k-1.fw
22:13.28aitorit's a bluetooth driver: https://wireless.wiki.kernel.org/en/users/drivers/ath3k
22:15.03aitori built the kernel with:
22:15.04aitorCONFIG_BT_HCIUART_ATH3K=y
22:15.14aitorCONFIG_BT_ATH3K=m
22:16.50aitorgolinux: fsmithred is always hungry
22:18.48*** join/#devuan greenjeans (~greenjean@104.235.205.1)
22:24.22*** join/#devuan polocho (~polocho@89.141.233.231.dyn.user.ono.com)
22:32.16*** join/#devuan bozonius (~bozonius@c-73-90-84-55.hsd1.ca.comcast.net)
22:33.27bozoniussorry, we keep losing power here
22:36.06bozoniusfsmithred:  You should also notice a recompile when you update the kernel and reboot -- dkms is set to run at boot time and will recompile any modules that need updates
22:36.16bozoniusthere may be other instances as well
22:36.29bozoniusit is not strictly related to installation necessarily
22:39.06*** join/#devuan barrett9h (~doti@179.55.105.224)
22:39.08*** join/#devuan crayxmp (~crayxmp@LFbn-LIL-1-472-87.w81-49.abo.wanadoo.fr)
22:40.29golinuxaitor: I also eat all day long.
22:43.45aitorgolinux: your armadillo also eat all day long...
22:43.58aitorlettuces an leeks
22:44.41golinuxNo the eat grubs etc.
22:44.45golinuxthey
22:51.57unixmanMMMmmm, grubs. Buttery flavor when toasted. :)
22:52.20aitori thought that devuan-sdk and live-sdk were the same project, but now i see that they are not
23:12.03gnarfacefsmithred: as i understand it they just jack with the order the modules are included in the binary, to sabotage the reliability of stack-smashing attacks and the like
23:12.52gnarfaceso you can't smash the stack in the same place anymore on machines running the same versions of everything
23:14.07gnarfacefsmithred: probably useless for home, but for large deployments of otherwise completely homogeneous software&hardware this could be a critical step in long-term security from data fuzzing?
23:14.26gnarfacethat's my vague understanding of the justifications anyway
23:14.50*** join/#devuan g4570n (~g4570n@host2.190-228-106.telecom.net.ar)
23:16.20gnarfaceDocScrutinizer05: ^
23:16.25gnarface(re, openbsd)
23:21.28bozoniusgnarface, how does an attacker smash the stack of anything if they cannot somehow first get access to an account on the system?   That's the part that puzzles me.
23:22.33bozonius(In fact, this has been puzzling me for a couple of years since I learned of stack smashing)
23:23.48gnarfacebozonius: i don't really know.  i'm just parroting what i remember from the article when they started doing this months (years?) ago.  this may be more for virtual servers where they ARE giving out shell accounts, or doing other things where it's expected users might be uploading their own binaries.  the use case also seemed to imply that the machines are expected to be rebooted semi-regularly
23:24.58bozoniusIf users want to upload their own binaries just to turn around and smash them... ???  Or am I missing something?
23:25.25*** join/#devuan Olufunmilayo (~Olufunmil@unaffiliated/olufunmilayo)
23:25.56gnarfaceimagine you're a hosting provider with enough 5$/month customers that you couldn't hope to meet them all face-to-face or do any sort of reliable background checks or other judgement of their character
23:26.05bozoniussure.
23:26.12bozoniusstill doesn't make sense though
23:26.15bozoniusbut go ahead
23:26.22gnarfacethe vast majority of them will be harmmless fools
23:26.41gnarfacebut a small percentage of them will be actively evil, and trying to jailbreak themselves out of the virtual container to get into their peer's containers
23:27.01bozoniusso they are sharing binaries across containers?
23:27.20gnarfaceno, but the containers share hardware
23:27.37bozoniusis this like rowhammer?
23:27.38gnarfacewith some types of containers, all guests on a single machine share one kernel instance even
23:28.02bozoniusoh, yeah, I know about that -- I've been wondering about the security of that architecture, sharing kernels
23:28.25gnarfaceit's not quite like rowhammer, where it's taking advantage of a physical vulnerability in the hardware, it's more a low-level logical vulnerability in the way CPUs execute instructions
23:28.33bozoniusI don't think containers are the right solution for $5/month subscribers who you don't know well
23:28.49bozoniusI haev taken 2 classes in Unix internals
23:29.04bozoniusone was 2 weeks, on an Amdahl UTS mainframe
23:29.16gnarfacei don't disagree, but nonetheless it's popular because dedicated hardware is prohibitively expensive still
23:29.22bozoniusI am aware how the kernel works, but it is also very very secure
23:30.08bozoniuswhen I've had "shared" hosting, I still got my own kernel and operating system, my own physical memory, and a certain slice of the CPU's time (depending on how much I paid)
23:30.22bozoniusso this worry over shared binaries would be effectively nil
23:30.35bozoniusbut containers, that's wholly different, yes
23:30.41gnarfacegcc has some sort of stack randomization built-in as a way to defend against stack smashing too, but the problem is that if everyone is taking a copy of just ONE build of something, the stack is not so random anymore...
23:31.01bozoniusand why I would never consider parceling out hosting on a weak container basis
23:31.16gnarfaceso this idea allows for a random stack that's also heterogeneous across identical versions of given software
23:31.35bozoniusyeah, I understand the preventatives
23:32.04bozoniusI was just curious what sort of environment would permit such intrusion that could lead to disaster.  You have answered my question.
23:32.19gnarfacethe shared hosting you're talking about is like the way kvm/zen does it.  the problem with that is the static memory and storage allocation isn't very flexible; doesn't scale down well
23:32.21bozoniusIt all revolves around containers that are shared by people who might not be trustworthy.
23:32.57bozoniusstatic memory?   It's all dynamic on *nix systems, afaik
23:33.09gnarfaceyea, as far as i know... but i guess in theory someone could find a vulnerable daemon considered reputable and widely distributed too...
23:33.26gnarfacewell, last i set up kvm you have to give it a static slice of memory
23:33.28bozoniusbut that goes beyond just stack smashing.
23:34.10bozoniusUTS was just one OS you could run on Amdahl mainframe (a clone of IBM 370)
23:34.16gnarfacewith bsd jails and for example, my favorite, linux-vservers, the host machine has one kernel that just hides memory used by other guests
23:34.30bozoniusand they shared the CPUs across "domains" (UTS, MVS, etc)
23:34.36bozoniusvery much like Xen
23:35.05bozoniusright, that approac is more appropriate for hosted services to anonymous users with money
23:35.07*** join/#devuan justinsm (~justinsm@82-69-63-196.dsl.in-addr.zen.co.uk)
23:35.35gnarfacei'm not saying it's perfect, but it's better than the old form of shared hosting where everyone gets a shell account directly on the host, and virtualization is limited to apache virtualserver directory rewrites
23:35.44bozoniusoh no
23:35.46gnarface(which bluehost and dreamhost STILL DO)
23:35.50bozoniusnot what I am talkig about at all
23:35.56bozoniusthe hosting I had was more like Vbox
23:36.21bozoniusI had my own domain, although the /bin and /usr/bin might have been mounted ro from some server onthe local net
23:36.29bozonius*on the
23:37.07bozoniussorry that was /var (keep forgetting I'm on irc)
23:37.19bozoniusdang
23:37.35bozoniusI mean /var and /home were "private" to your domain, not shared with anyone else
23:38.13bozoniusat least, that's how they seemed to me.  And, yeah, I've had bluehost (briefly, too many restrictions)
23:39.04bozoniusdreamhost was anything but a dream
23:39.38bozoniusmore of a nightmare in the end, actually.  They damaged my domain  by terminating a long process (by their accounting) causing severe and permanent database damage
23:39.53bozoniusthey didn't give a, a, whatchmacallit
23:40.39bozoniusI just don't get how some of these attacks actually work.  I mean, apparently they DO work, but there is some missing thing they don't say about them.
23:41.15bozoniusgotta go make dinner now...  bbl (sorry for all the chatter)
23:52.59*** join/#devuan mn3monic (~xxwa@unaffiliated/mn3monic)
23:53.44*** join/#devuan Xenguy (~Xenguy@unaffiliated/xenguy)

Generated by irclog2html.pl Modified by Tim Riker to work with infobot.