Re: [gentoo-user] Re: FYI: Daily / weekly / monthly cron jobs run twice on DST - non-DST transition

2017-11-07 Thread Mick
On Monday, 6 November 2017 23:11:44 GMT Rich Freeman wrote:
> On Mon, Nov 6, 2017 at 10:45 AM, Ian Zimmerman  wrote:
> > On 2017-11-05 17:17, Rich Freeman wrote:
> >> Distros will always have to do integration work, and that is fine.
> >> That is the role of a distro.  And sometimes distros have to roll
> >> their own tools when they just aren't available.  Once upon a time
> >> service managers fell into that category.  Now this is less the case.
> > 
> > What's a service manager?
> 
> Easiest way to explain it is to give examples.  Openrc, systemd,
> runit, and upstart are all service managers.  I'd argue that sysvinit
> is also a service manager but nobody really uses it as one unless you
> count getty as a service.
> 
> A service manager is a program used to manage the daemons running on a
> system.
> > Is making cron care about missed jobs service
> > management, but running daily/weekly/monthly jobs isn't?
> 
> Cron is generally not considered a service manager though there is
> some overlap since it does manage jobs.  I wouldn't make any
> distinction in this regard to how it handles missed jobs.  Those are
> just features that a cron implementation can have or lack.
> 
> It is like arguing about whether sh, dash, or bash are shells on the
> basis of the features they provide.  They're all shells, but at the
> same time we can acknowledge that they have different feature sets.

Apologies for prolonging this exhaustive and exhausting thread, but what is 
the Gentoo suggested cron application for a non-24-7 desktop these days?  I'm 
still using sys-process/vixie-cron because I guess that's what was de rigueur 
at the time I installed this system, although on other desktop PCs I run sys-
process/cronie.

-- 
Regards,
Mick

signature.asc
Description: This is a digitally signed message part.


Re: [gentoo-user] Re: FYI: Daily / weekly / monthly cron jobs run twice on DST - non-DST transition

2017-11-07 Thread Neil Bothwick
On Tue, 07 Nov 2017 08:48:22 +, Mick wrote:

> Apologies for prolonging this exhaustive and exhausting thread, but
> what is the Gentoo suggested cron application for a non-24-7 desktop
> these days?  I'm still using sys-process/vixie-cron because I guess
> that's what was de rigueur at the time I installed this system,
> although on other desktop PCs I run sys- process/cronie.

According to virtual/cron, cronie

RDEPEND="|| ( sys-process/cronie
sys-process/vixie-cron
sys-process/bcron
sys-process/dcron
sys-process/fcron
sys-process/systemd-cron )"


-- 
Neil Bothwick

EASY TO INSTALL = Difficult to install, but instruction manual has
pictures.


pgp5PRBHlNCKu.pgp
Description: OpenPGP digital signature


[gentoo-user] Compilation error mpv / libav

2017-11-07 Thread tuxic
Hi,

I got a couple of depending compilation errors...

Top of the stack seems to a problem with mpv / libav.

From the build.lg:

Setting top to   : 
/var/tmp/portage/media-video/mpv-/work/mpv- 
Setting out to   : 
/var/tmp/portage/media-video/mpv-/work/mpv-/build 
Checking for waf version in 1.8.4-2.0.0  : ok 
Checking for program 'cc': x86_64-pc-linux-gnu-gcc 
Checking for program 'pkg-config': x86_64-pc-linux-gnu-pkg-config 
Checking for program 'ar': x86_64-pc-linux-gnu-ar 
Checking for program 'rst2html'  : /usr/bin/rst2html.py 
Checking for program 'rst2man'   : /usr/bin/rst2man.py 
Checking for program 'rst2pdf'   : /usr/bin/rst2pdf 
Checking for program 'windres'   : not found 
Checking for program 'perl'  : /usr/bin/perl 
Checking for 'gcc' (C compiler)  : x86_64-pc-linux-gnu-gcc 
Detected target OS:  : os-linux 
Checking for compiler flags -Werror=implicit-function-declaration : yes 
Checking for compiler flags -Wno-error=deprecated-declarations: yes 
Checking for compiler flags -Wno-error=unused-function: yes 
Checking for compiler flags -Wempty-body  : yes 
Checking for compiler flags -Wdisabled-optimization   : yes 
Checking for compiler flags -Wstrict-prototypes   : yes 
Checking for compiler flags -Wno-format-zero-length   : yes 
Checking for compiler flags -Werror=format-security   : yes 
Checking for compiler flags -Wno-redundant-decls  : yes 
Checking for compiler flags -Wvla : yes 
Checking for LGPL (version 2.1 or later) build: disabled 
Checking for GPL (version 2 or later) build   : yes 
Checking for internal audio filter chain  : yes 
Checking for mpv CLI player   : yes 
Checking for shared library   : disabled 
Checking for static library   : disabled 
Checking for static build : disabled 
Checking for whether to include binary compile time   : yes 
Checking for whether to optimize  : disabled 
Checking for whether to compile-in debugging information  : disabled 
Checking for manpage generation   : yes 
Checking for html manual generation   : yes 
Checking for pdf manual generation: yes 
Checking for dynamic loader   : yes 
Checking for C plugins: yes 
Checking for zsh completion   : yes 
Checking for inline assembly (currently without effect)   : yes 
Checking for test suite (using cmocka): disabled 
Checking for generate a clang compilation database: disabled 
Checking for compiler support for noexecstack : yes 
Checking for linker support for --nxcompat --no-seh --dynamicbase : no 
Checking for -lm  : yes 
Checking for MinGW: os-win32 
not found 
Checking for POSIX environment: yes 
Checking for Android environment  : disabled 
Checking for development environment  : yes 
Checking for Universal Windows Platform   : disabled 
Checking for win32 desktop APIs   : os-win32 
not found 
Checking for internal pthread wrapper for win32 (Vista+)  : posix found 
Checking for POSIX threads: yes 
Checking for GNU C extensions : yes 
Checking for stdatomic.h  : yes 
Checking for stdatomic.h support or slow emulation: yes 
Checking for linking with -lrt: yes 
Checking for iconv: yes 
Checking for w32/dos paths: os-win32 
not found 
Checking for termios  : yes 
Checking for shm  : yes 
Checking for nanosleep: yes 
Checking for spawnp()/kill() POSIX support: yes 
Checking for spawnp()/kill() Android replacement  : 
posix-spawn-native found 
Checking for any spawnp()/kill() support  : yes 
Checking for Windows pipe support

Re: [gentoo-user] Compilation error mpv / libav

2017-11-07 Thread R0b0t1
On Tue, Nov 7, 2017 at 7:01 PM,   wrote:
> Hi,
>
> I got a couple of depending compilation errors...
>
> Top of the stack seems to a problem with mpv / libav.
>
> From the build.lg:
>
> Setting top to   : 
> /var/tmp/portage/media-video/mpv-/work/mpv-
> Setting out to   : 
> /var/tmp/portage/media-video/mpv-/work/mpv-/build
> Checking for waf version in 1.8.4-2.0.0  : ok
> Checking for program 'cc': x86_64-pc-linux-gnu-gcc
> Checking for program 'pkg-config': x86_64-pc-linux-gnu-pkg-config
> Checking for program 'ar': x86_64-pc-linux-gnu-ar
> Checking for program 'rst2html'  : /usr/bin/rst2html.py
> Checking for program 'rst2man'   : /usr/bin/rst2man.py
> Checking for program 'rst2pdf'   : /usr/bin/rst2pdf
> Checking for program 'windres'   : not found
> Checking for program 'perl'  : /usr/bin/perl
> Checking for 'gcc' (C compiler)  : x86_64-pc-linux-gnu-gcc
> Detected target OS:  : os-linux
> Checking for compiler flags -Werror=implicit-function-declaration : yes
> Checking for compiler flags -Wno-error=deprecated-declarations: yes
> Checking for compiler flags -Wno-error=unused-function: yes
> Checking for compiler flags -Wempty-body  : yes
> Checking for compiler flags -Wdisabled-optimization   : yes
> Checking for compiler flags -Wstrict-prototypes   : yes
> Checking for compiler flags -Wno-format-zero-length   : yes
> Checking for compiler flags -Werror=format-security   : yes
> Checking for compiler flags -Wno-redundant-decls  : yes
> Checking for compiler flags -Wvla : yes
> Checking for LGPL (version 2.1 or later) build: disabled
> Checking for GPL (version 2 or later) build   : yes
> Checking for internal audio filter chain  : yes
> Checking for mpv CLI player   : yes
> Checking for shared library   : disabled
> Checking for static library   : disabled
> Checking for static build : disabled
> Checking for whether to include binary compile time   : yes
> Checking for whether to optimize  : disabled
> Checking for whether to compile-in debugging information  : disabled
> Checking for manpage generation   : yes
> Checking for html manual generation   : yes
> Checking for pdf manual generation: yes
> Checking for dynamic loader   : yes
> Checking for C plugins: yes
> Checking for zsh completion   : yes
> Checking for inline assembly (currently without effect)   : yes
> Checking for test suite (using cmocka): disabled
> Checking for generate a clang compilation database: disabled
> Checking for compiler support for noexecstack : yes
> Checking for linker support for --nxcompat --no-seh --dynamicbase : no
> Checking for -lm  : yes
> Checking for MinGW: os-win32 
> not found
> Checking for POSIX environment: yes
> Checking for Android environment  : disabled
> Checking for development environment  : yes
> Checking for Universal Windows Platform   : disabled
> Checking for win32 desktop APIs   : os-win32 
> not found
> Checking for internal pthread wrapper for win32 (Vista+)  : posix 
> found
> Checking for POSIX threads: yes
> Checking for GNU C extensions : yes
> Checking for stdatomic.h  : yes
> Checking for stdatomic.h support or slow emulation: yes
> Checking for linking with -lrt: yes
> Checking for iconv: yes
> Checking for w32/dos paths: os-win32 
> not found
> Checking for termios  : yes
> Checking for shm  : yes
> Checking for nanosleep: yes
> Checking for spawnp()/kill() POSIX support: yes
> Checking for spawnp()/kill() Android replacement  : 
> posix-spawn-native found
> Chec

Re: [gentoo-user] Compilation error mpv / libav

2017-11-07 Thread tuxic
On 11/07 07:38, R0b0t1 wrote:
> On Tue, Nov 7, 2017 at 7:01 PM,   wrote:
> > Hi,
> >
> > I got a couple of depending compilation errors...
> >
> > Top of the stack seems to a problem with mpv / libav.
> >
> > From the build.lg:
> >
> > Setting top to   : 
> > /var/tmp/portage/media-video/mpv-/work/mpv-
> > Setting out to   : 
> > /var/tmp/portage/media-video/mpv-/work/mpv-/build
> > Checking for waf version in 1.8.4-2.0.0  : ok
> > Checking for program 'cc': x86_64-pc-linux-gnu-gcc
> > Checking for program 'pkg-config': x86_64-pc-linux-gnu-pkg-config
> > Checking for program 'ar': x86_64-pc-linux-gnu-ar
> > Checking for program 'rst2html'  : /usr/bin/rst2html.py
> > Checking for program 'rst2man'   : /usr/bin/rst2man.py
> > Checking for program 'rst2pdf'   : /usr/bin/rst2pdf
> > Checking for program 'windres'   : not found
> > Checking for program 'perl'  : /usr/bin/perl
> > Checking for 'gcc' (C compiler)  : x86_64-pc-linux-gnu-gcc
> > Detected target OS:  : os-linux
> > Checking for compiler flags -Werror=implicit-function-declaration : yes
> > Checking for compiler flags -Wno-error=deprecated-declarations: yes
> > Checking for compiler flags -Wno-error=unused-function: yes
> > Checking for compiler flags -Wempty-body  : yes
> > Checking for compiler flags -Wdisabled-optimization   : yes
> > Checking for compiler flags -Wstrict-prototypes   : yes
> > Checking for compiler flags -Wno-format-zero-length   : yes
> > Checking for compiler flags -Werror=format-security   : yes
> > Checking for compiler flags -Wno-redundant-decls  : yes
> > Checking for compiler flags -Wvla : yes
> > Checking for LGPL (version 2.1 or later) build: disabled
> > Checking for GPL (version 2 or later) build   : yes
> > Checking for internal audio filter chain  : yes
> > Checking for mpv CLI player   : yes
> > Checking for shared library   : disabled
> > Checking for static library   : disabled
> > Checking for static build : disabled
> > Checking for whether to include binary compile time   : yes
> > Checking for whether to optimize  : disabled
> > Checking for whether to compile-in debugging information  : disabled
> > Checking for manpage generation   : yes
> > Checking for html manual generation   : yes
> > Checking for pdf manual generation: yes
> > Checking for dynamic loader   : yes
> > Checking for C plugins: yes
> > Checking for zsh completion   : yes
> > Checking for inline assembly (currently without effect)   : yes
> > Checking for test suite (using cmocka): disabled
> > Checking for generate a clang compilation database: disabled
> > Checking for compiler support for noexecstack : yes
> > Checking for linker support for --nxcompat --no-seh --dynamicbase : no
> > Checking for -lm  : yes
> > Checking for MinGW: 
> > os-win32 not found
> > Checking for POSIX environment: yes
> > Checking for Android environment  : disabled
> > Checking for development environment  : yes
> > Checking for Universal Windows Platform   : disabled
> > Checking for win32 desktop APIs   : 
> > os-win32 not found
> > Checking for internal pthread wrapper for win32 (Vista+)  : posix 
> > found
> > Checking for POSIX threads: yes
> > Checking for GNU C extensions : yes
> > Checking for stdatomic.h  : yes
> > Checking for stdatomic.h support or slow emulation: yes
> > Checking for linking with -lrt: yes
> > Checking for iconv: yes
> > Checking for w32/dos paths: 
> > os-win32 not found
> > Checking for termios  : yes
> > Checking for shm  : yes
> > Checking for nanosleep

Re: [gentoo-user] Compilation error mpv / libav

2017-11-07 Thread John Campbell
On 11/07/2017 05:01 PM, tu...@posteo.de wrote:
> Hi,
> 
> I got a couple of depending compilation errors...
> 
> Top of the stack seems to a problem with mpv / libav.
> 
> Is there any known fix for that?
> 
> Thanks a lot for any help in advance! :)

I've got mpv- installed.  I'm pretty sure you need to move to
ffmpeg- as well.

Also, libav and ffmpeg are mutually exclusive.  You can have one, but
not the other.



Re: [gentoo-user] Compilation error mpv / libav

2017-11-07 Thread tuxic
On 11/07 07:21, John Campbell wrote:
> On 11/07/2017 05:01 PM, tu...@posteo.de wrote:
> > Hi,
> > 
> > I got a couple of depending compilation errors...
> > 
> > Top of the stack seems to a problem with mpv / libav.
> > 
> > Is there any known fix for that?
> > 
> > Thanks a lot for any help in advance! :)
> 
> I've got mpv- installed.  I'm pretty sure you need to move to
> ffmpeg- as well.
> 
> Also, libav and ffmpeg are mutually exclusive.  You can have one, but
> not the other.
> 

I installed ffmpeg- and it compiles fines.

Everything else failed again (for example mpv-).

Why does an update of already ok installed applications
break something in parts because the installation
has components, which are mutually exclusive?
They weren't before (whichout the update everythong was fine...)

Cheers
Meino




Re: [gentoo-user] Compilation error mpv / libav

2017-11-07 Thread John Campbell

> I installed ffmpeg- and it compiles fines.
> 
> Everything else failed again (for example mpv-).
> 
> Why does an update of already ok installed applications
> break something in parts because the installation
> has components, which are mutually exclusive?
> They weren't before (whichout the update everythong was fine...)

I've been periodically fighting with mpv and ffmpeg for various reasons
for quite some time.  Which is why I've been pushed into running live
versions of both.  Version bumps on ebuilds that fail version checks
(like this one) is my first line of defence.

The reason live rebuilds keep breaking even though they're installed it
the upstream developers change to library requirements and flags without
telling anyone.

There's a bug report about this at https://bugs.gentoo.org/635650 which
seems to offer several solutions and satisfies none...  It looks like
the decision at present is "wait and hope it gets fixed upstream"



[gentoo-user] Linux USB security holes.

2017-11-07 Thread Dale
Howdy,

I ran up on this link.  Is there any truth to it and should any of us
Gentooers be worried about it?

http://www.theregister.co.uk/2017/11/07/linux_usb_security_bugs/ 

Isn't Linux supposed to be more secure than this??

Dale

:-)  :-) 



Re: [gentoo-user] Linux USB security holes.

2017-11-07 Thread Adam Carter
On Wed, Nov 8, 2017 at 4:08 PM, Dale  wrote:

> Howdy,
>
> I ran up on this link.  Is there any truth to it and should any of us
> Gentooers be worried about it?
>

Its sensible to think of anything that's been assigned a CVE number as
real.

>
> http://www.theregister.co.uk/2017/11/07/linux_usb_security_bugs/
>
> Isn't Linux supposed to be more secure than this??


It is what it is.


Re: [gentoo-user] Linux USB security holes.

2017-11-07 Thread R0b0t1
On Tue, Nov 7, 2017 at 11:08 PM, Dale  wrote:
> Howdy,
>
> I ran up on this link.  Is there any truth to it and should any of us
> Gentooers be worried about it?
>
> http://www.theregister.co.uk/2017/11/07/linux_usb_security_bugs/
>
> Isn't Linux supposed to be more secure than this??
>

In theory. There was no comment on the existence of such bugs in the
Windows driver stack, but they likely exist. However, note:

"The impact is quite limited, all the bugs require physical access to
trigger," said Konovalov. "Most of them are denial-of-service, except
for a few that might be potentially exploitable to execute code in the
kernel."

Which is typically what one should expect from bugs discovered by fuzzing.

These are issues which should be fixed, but keep in mind that there
has been (and still is) lots of kernel development that focuses on
isolating the kernel from itself. The reporting of these bugs will
likely be used to make those mechanisms even better.


To compare, here is an "exploit" discovered in a monitor:
https://github.com/RedBalloonShenanigans/MonitorDarkly.

The prerequisites include having debug access to the monitor's
controller. Personally I am surprised this was presented at DefCon as
it does not really seem appropriate. At least the articles covering
the code should be reworded - it's exploiting the monitor almost the
same way you can exploit a car by driving it.

More and more security releases are starting to look like the above,
as the researchers and authors clamor for notability, which is
increasingly hard to find. I think the article you found strikes a
middle ground - the exploits are relevant in practice, but take a lot
of work to use.

Cheers,
 R0b0t1



Re: [gentoo-user] Compilation error mpv / libav

2017-11-07 Thread R0b0t1
On Tue, Nov 7, 2017 at 11:04 PM, John Campbell  wrote:
>
>> I installed ffmpeg- and it compiles fines.
>>
>> Everything else failed again (for example mpv-).
>>
>> Why does an update of already ok installed applications
>> break something in parts because the installation
>> has components, which are mutually exclusive?
>> They weren't before (whichout the update everythong was fine...)
>
> I've been periodically fighting with mpv and ffmpeg for various reasons
> for quite some time.  Which is why I've been pushed into running live
> versions of both.  Version bumps on ebuilds that fail version checks
> (like this one) is my first line of defence.
>
> The reason live rebuilds keep breaking even though they're installed it
> the upstream developers change to library requirements and flags without
> telling anyone.
>
> There's a bug report about this at https://bugs.gentoo.org/635650 which
> seems to offer several solutions and satisfies none...  It looks like
> the decision at present is "wait and hope it gets fixed upstream"
>

With Gentoo that is usually the most expedient solution, cost of time
considering.



Re: [gentoo-user] Linux USB security holes.

2017-11-07 Thread J. Roeleveld
On 8 November 2017 06:08:21 GMT+01:00, Dale  wrote:
>Howdy,
>
>I ran up on this link.  Is there any truth to it and should any of us
>Gentooers be worried about it?
>
>http://www.theregister.co.uk/2017/11/07/linux_usb_security_bugs/ 
>
>Isn't Linux supposed to be more secure than this??
>
>Dale
>
>:-)  :-) 

From what I read, you need physical access.
And I am not certain what you need to do to the firmware on the USB device to 
trigger this.

--
Joost 
-- 
Sent from my Android device with K-9 Mail. Please excuse my brevity.



Re: [gentoo-user] Linux USB security holes.

2017-11-07 Thread Dale
Dale wrote:
> Howdy,
>
> I ran up on this link.  Is there any truth to it and should any of us
> Gentooers be worried about it?
>
> http://www.theregister.co.uk/2017/11/07/linux_usb_security_bugs/ 
>
> Isn't Linux supposed to be more secure than this??
>
> Dale
>
> :-)  :-) 
>


To reply to all that posted so far.  I did see that it requires physical
access, like a lot of other things.  Once a person has physical access,
there are a number of things that can go wrong. 

It does seem to be one of those things that while possible, has anyone
been able to do it in the real world and even without physical access? 
Odds are, no. 

Still, all things considered, Linux is pretty secure.  BSD is more
secure from what I've read but Linux is better than windoze. 

Dale

:-)  :-) 



Re: [gentoo-user] Linux USB security holes.

2017-11-07 Thread R0b0t1
On Wed, Nov 8, 2017 at 12:02 AM, Dale  wrote:
> Dale wrote:
>> Howdy,
>>
>> I ran up on this link.  Is there any truth to it and should any of us
>> Gentooers be worried about it?
>>
>> http://www.theregister.co.uk/2017/11/07/linux_usb_security_bugs/
>>
>> Isn't Linux supposed to be more secure than this??
>>
>> Dale
>>
>> :-)  :-)
>>
>
>
> To reply to all that posted so far.  I did see that it requires physical
> access, like a lot of other things.  Once a person has physical access,
> there are a number of things that can go wrong.
>
> It does seem to be one of those things that while possible, has anyone
> been able to do it in the real world and even without physical access?
> Odds are, no.
>

The most widely publicized example is STUXNET. There are also reports
that malicious USB keys with driver-level exploits are sometimes used
for industrial espionage.

The key point being that in either case, someone is spending a lot of
money to research and set up a plausible attack.

> Still, all things considered, Linux is pretty secure.  BSD is more
> secure from what I've read but Linux is better than windoze.
>
> Dale
>
> :-)  :-)
>



Re: [gentoo-user] Linux USB security holes.

2017-11-07 Thread R0b0t1
On Wed, Nov 8, 2017 at 12:10 AM, R0b0t1  wrote:
> On Wed, Nov 8, 2017 at 12:02 AM, Dale  wrote:
>> Dale wrote:
>>> Howdy,
>>>
>>> I ran up on this link.  Is there any truth to it and should any of us
>>> Gentooers be worried about it?
>>>
>>> http://www.theregister.co.uk/2017/11/07/linux_usb_security_bugs/
>>>
>>> Isn't Linux supposed to be more secure than this??
>>>
>>> Dale
>>>
>>> :-)  :-)
>>>
>>
>>
>> To reply to all that posted so far.  I did see that it requires physical
>> access, like a lot of other things.  Once a person has physical access,
>> there are a number of things that can go wrong.
>>
>> It does seem to be one of those things that while possible, has anyone
>> been able to do it in the real world and even without physical access?
>> Odds are, no.
>>
>
> The most widely publicized example is STUXNET. There are also reports
> that malicious USB keys with driver-level exploits are sometimes used
> for industrial espionage.
>
> The key point being that in either case, someone is spending a lot of
> money to research and set up a plausible attack.
>
>> Still, all things considered, Linux is pretty secure.  BSD is more
>> secure from what I've read but Linux is better than windoze.
>>
>> Dale
>>
>> :-)  :-)
>>

I suppose I should add that once the basic work has been done for an
exploit like this it will have great reproducibility. But at that
level you are (usually) talking about very well funded actors, and one
should also be worried about controller-level exploits that would be
much harder to discover from an operating system.

If you can't surround your computer with trustworthy armed guards,
assume you suffer from a serious vulnerability based on the
preliminary work the article is talking about.

Rainbows and Sunshine,
 R0b0t1



Re: [gentoo-user] Linux USB security holes.

2017-11-07 Thread Dale
R0b0t1 wrote:
> On Wed, Nov 8, 2017 at 12:10 AM, R0b0t1  wrote:
>> On Wed, Nov 8, 2017 at 12:02 AM, Dale  wrote:
>>> Dale wrote:
 Howdy,

 I ran up on this link.  Is there any truth to it and should any of us
 Gentooers be worried about it?

 http://www.theregister.co.uk/2017/11/07/linux_usb_security_bugs/

 Isn't Linux supposed to be more secure than this??

 Dale

 :-)  :-)

>>>
>>> To reply to all that posted so far.  I did see that it requires physical
>>> access, like a lot of other things.  Once a person has physical access,
>>> there are a number of things that can go wrong.
>>>
>>> It does seem to be one of those things that while possible, has anyone
>>> been able to do it in the real world and even without physical access?
>>> Odds are, no.
>>>
>> The most widely publicized example is STUXNET. There are also reports
>> that malicious USB keys with driver-level exploits are sometimes used
>> for industrial espionage.
>>
>> The key point being that in either case, someone is spending a lot of
>> money to research and set up a plausible attack.
>>
>>> Still, all things considered, Linux is pretty secure.  BSD is more
>>> secure from what I've read but Linux is better than windoze.
>>>
>>> Dale
>>>
>>> :-)  :-)
>>>
> I suppose I should add that once the basic work has been done for an
> exploit like this it will have great reproducibility. But at that
> level you are (usually) talking about very well funded actors, and one
> should also be worried about controller-level exploits that would be
> much harder to discover from an operating system.
>
> If you can't surround your computer with trustworthy armed guards,
> assume you suffer from a serious vulnerability based on the
> preliminary work the article is talking about.
>
> Rainbows and Sunshine,
>  R0b0t1
>
>


I've considered encrypting my stuff.  I'm talking locked down from power
up all the way through.  Those who have been on this list a while and
know me, they know that would be a disaster.  If anything could go wrong
with it, it would. 

While I try to be secure, I'm not going nuts over it.  I do lock my
screen if I leave and sometimes even logout but I don't put hand
grenades and other booby traps around it.  Heck, if I did, I'd likely
trip up and hurt myself.  Ooops!!

I guess I'll just kept my top secret stuff in my head.  ;-) 

Dale

:-)  :-) 



[gentoo-user] Re: Compilation error mpv / libav

2017-11-07 Thread Nikos Chantziaras

On 08/11/17 05:51, tu...@posteo.de wrote:

I installed ffmpeg- and it compiles fines.

Everything else failed again (for example mpv-).

Why does an update of already ok installed applications
break something in parts because the installation
has components, which are mutually exclusive?
They weren't before (whichout the update everythong was fine...)


With mpv, I'd recommend using their own build system if you want the 
current git version of mpv. It compiles ffmpeg too and uses it 
privately, which frees you from the burden of having to emerge 
ffmpeg- and break other packages that rely on ffmpeg.


If the mpv ebuild has a "bundled-ffmpeg' USE flag, we would be fine. But 
since it doesn't, it's recommended to not use Gentoo's mpv ebuild and 
instead build it manually. Fortunately, mpv's build script is easy to 
use. You just run it from time to time and it will get you a build from 
latest git using latest ffmpeg.