Re: [techtalk] mail format (was re: ftp for non users)
> This is hardly technical...but...it borders on rule-boundedness to me. > But still not that close to be unbearable. So either I mistimed > majordomo or it didn't go thru. So I am still here. And I will probably > always be leftie anti-authoritarian me. Same as you will be you. I spent > too much time in the underground publishing universe for everything to > be pretty and perfect.. And yeah I pop off...So I want it rest and hope > it all calms down. > > Thanks and have Fun, > Sends Steve Hmm...I'm pretty anti-authoritarian, but you always know who the boss is - would you go against what your boss said (be it an underground mag or otherwise? There are limits to everything that is done, no matter what it is...know the limits. > > P.S. Obligatory technical comment... Shell accounts should be the > default perhaps with lots of -i > protection. and I want to run traceroute and ping when I need to do so. > I worry that things are getting too snarlsome and un-needed > restrictions are being applied. It could be just me. > ping and traceroute I have seen disabled due to security holes (buffer overruns causing root access to those that know how). If a security hole is known. Quick fix: remove the SUID bit - long term fix...get a version that isn't broken. When I was at Uni, the admin's disabled the suid bit on "ps" due to a buffer overrun hole...meant ps -ef did naff all but show your own processes. Shell accounts are huge security holes: I've worked in both camps: as an administrator, you don't want you're users causing you hassle, so you limit what they do. As a user, you try and circumvent all root's restrictions. It's fun having running battles with admins... :) Computer Services at Uni ended up leaving me alone after deciding I was mostly harmless ... :) Chris... ps, apologies if I've covered anything already said...I've only just got round to carrying myself from grrltalk over to both issues & techtalk :) -- @}-,'-- Chris Johnson --'-{@ / "(it is) crucial that we learn the difference / [EMAIL PROTECTED] \ / between Sex and Gender. Therein lies the key / \ / to our freedom" -- LB / www.nccnet.co.uk/~sixie \ [EMAIL PROTECTED] http://www.linuxchix.org
Re: [techtalk] Re: meta-stuff
> > But since this is techtalk, and since we seem to be discussing > > etiquette, is there any real reason why Reply-To is set to the > > list? There's an article detailing reasons why it can be a bad > > idea at http://www.unicom.com/pw/reply-to-harmful.html > > I have read the article at that link a couple of times now, and in the > early days of LinuxChix I made the decision to leave the reply-to to the > list because there were only a few of us here, and conversations kept > drifting off the list into the nether-regions that are "offlist". > One thing I will note: the group reply the author of the page mentions in Elm, will group reply, yes. But it usually ends up giving the original author two copies (one direct, the other from the list). I've been on some lists where people weren't overly happy by this. One list in particular had most of the users keep posting reminders ("I'm on the list - no need to cc me"). I can get around the problem with my mailer (I use exmh 2.0.2) - I'll work out how to add a third option to look at the headers and potentially use the "Sender:" header, if I know I can trust it. It's not what the header is there for, I know, but if it minimises duplicates, I'll use it. Most (all?) other mail programs will have Elm's behaviour. I myself do find it annoying...if you do a group reply to a reply that someone sent you where you were Cc'd from the list, then you'll get a duplicate of your own mail back on your machine (the list, and your Cc). Manually editing the headers is then the way to fix it. There is no perfect solution though - it's one or the other. I'm raising this as a point of interest. I'll go along with whatever the final decision is though without a problem :) Chris... -- @}-,'-- Chris Johnson --'-{@ / "(it is) crucial that we learn the difference / [EMAIL PROTECTED] \ / between Sex and Gender. Therein lies the key / \ / to our freedom" -- LB / www.nccnet.co.uk/~sixie \ [EMAIL PROTECTED] http://www.linuxchix.org
Re: [techtalk] HTML (and CDROM question)
Umm...blinking? I see no blink...and I've ran "less" of the email to make sure my mail program ain't masking it out... Chris... > Okay I've had it. This last email is blinking all over my console. > > I'm outta here. > -- @}-,'-- Chris Johnson --'-{@ / "(it is) crucial that we learn the difference / [EMAIL PROTECTED] \ / between Sex and Gender. Therein lies the key / \ / to our freedom" -- LB / www.nccnet.co.uk/~sixie \ [EMAIL PROTECTED] http://www.linuxchix.org
Re: [techtalk] X Display
> > I use XDM on my system. When I login and try to "su - localuser" in > a xterm, I get the following message: > > /dev/ttypc: Operation not permitted > The 2nd part of your question seems to be answered by later mails - this first part however hasn't - but do not be alarmed, it's safe enough and can be ignored. It's caused simply because you're doing an su. When you logged in initially say, for example, as user "mary", the ownership if that terminal, ttypc, was set to mary. When you su, the routines attempt to chown(2) the terminal to the user you have su'd to. As this is tried after su has setuid(2)'d down to the new user. Hence 'Operation not permitted'. The only time the chown(2) would work is if you su'd to root. It's nothing to be worry you - the only commands it will affect are ones like 'mesg', which will refuse to work. (mesg toggles the group write (sometimes the world write as well) permissions on the terminal device so you can recieve or refuse write(1)'s or talk(1)'s. At least, that's as I understand it (it happens on Solaris 2.6 as well -- couldn't work it out -- this is what I finally decided it was :) It may be more than chown(2) - eg, ioctl's, chmod's or whatever - it's simply because it's changed user before it attempts to manipulate the terminal device). I can't replciate the problem on my machine (Kernel 2.2.12; SuSE 6.2), so can't strace it to prove this. *If* I get the time at work (doubtful, yet possible), I can run su through truss on the Solaris boxes to confirm/deny this. Chris... -- @}-,'-- Chris Johnson --'-{@ / "(it is) crucial that we learn the difference / [EMAIL PROTECTED] \ / between Sex and Gender. Therein lies the key / \ / to our freedom" -- LB / www.nccnet.co.uk/~sixie \ [EMAIL PROTECTED] http://www.linuxchix.org
Re: [techtalk] Code Snippit - Nifty.
I'm slowly decoding this - it's actually not too bad. It shows the power (and potential complexity) of the ?: operator. It's also showing recursion of main(). It's also showing main() to have non-standard arguments (ie, instead of: main (int argc, char **argv, char **envp) it uses: main (int t, int _, char *a) Where t, _, and a I haven't (yet) worked out precisely what they do :) 't' and '_' control the decoding of the message string, where 'a' is a pointer into them message string. On initialisation, t = 1 (it is essentially argc, and a program with no parameters has argc set to 1). The only left to work out, really, is the encryption of the string. Got a few clues from observation, but rest I need to work out :) Chris... > Completely benign, with fun output. Ouch at the obfuscation. Courtesy > of my kid brother. > > -Ian > > #include > int main(int t,int _,char *a) > {return!0 main(-86, 0, a+1 )+a)):1,t<_?main(t+1, _, a ):3,main ( -94, -27+t, a > )&&t == 2 ?_<13 ?main ( 2, _+1, "%s %d %d\n" ):9:16:t<0?t<-72?main(_, > t,"@n'+,#'/*{}w+/w#cdnr/+,{}r/*de}+,/*{*+,/w{%+,/w#q#n+,/#{l,+,/n{n+\ > ,/+#n+,/#;#q#n+,/+k#;*+,/'r :'d*'3,}{w+K w'K:'+}e#';dq#'l q#'+d'K#!/\ > +k#;q#'r}eKK#}w'r}eKK{nl]'/#;#q#n'){)#}w'){){nl]'/+#n';d}rw' i;# ){n\ > l]!/n{n#'; r{#w'r nc{nl]'/#{l,+'K {rw' iK{;[{nl]'/w#q#\ > n'wk nw' iwk{KK{nl]!/w{%'l##w#' i; :{nl]'/*{q#'ld;r'}{nlwb!/*de}'c \ > ;;{nl'-{}rw]'/+,}##'*}#nc,',#nw]'/+kd'+e}+;\ > #'rdq#w! nr'/ ') }+}{rl#'{n' ')# }'+}##(!!/") > :t<-50?_==*a ?putchar(a[31]):main(-65,_,a+1):main((*a == '/')+t,_,a\ > +1 ):0 i@bK'(q)-[w]*%n+r3#l,{}:\nuwloca-O;m .vpbks,fxntdCeghiry"),a+1);} > > > -- > wow, this is kinda nifty. the Win98 protocol stack is like a chinese puzzle, >twist and turn in the right places, and it pops right off. >-Seen on EFNet IRC > > > > > [EMAIL PROTECTED] http://www.linuxchix.org > -- @}-,'-- Chris Johnson --'-{@ / "(it is) crucial that we learn the difference / [EMAIL PROTECTED] \ / between Sex and Gender. Therein lies the key / \ / to our freedom" -- LB / www.nccnet.co.uk/~sixie \ [EMAIL PROTECTED] http://www.linuxchix.org
Re: [techtalk] Re: X Display
> > The second problem is a little bit trickier. Although, the "xhost + name" > helped, the problem was with the DISPLAY number. I was using VNC server which > had a different display number. Once the SUed user exported the DISPLAY > number of VNC, then the user could start any X application. > > Thanks again for all the help. > > Subba Rao > [EMAIL PROTECTED] > http://pws.prserv.net/truemax/ > > => Time is relative. Here is a new way to look at time. <= > http://www.smcinnovations.com > > > [EMAIL PROTECTED] http://www.linuxchix.org > Yep - biff would cause the problem -- biff toggles the execute bit on the terminal, and uses it as a flag. If you've su'd, then chown will fail :) Well spotted ... forgot about biff... :) Chris... -- @}-,'-- Chris Johnson --'-{@ / "(it is) crucial that we learn the difference / [EMAIL PROTECTED] \ / between Sex and Gender. Therein lies the key / \ / to our freedom" -- LB / www.nccnet.co.uk/~sixie \ [EMAIL PROTECTED] http://www.linuxchix.org
Re: [techtalk] Code Snippit - Nifty.
I got bored...there's nothing much to do in this neck of the woods :) Seemed like a good idea at the time, and anyhow - I've got a cold so I'm not thinking straight...[1] :) Chris... [1] and pigs might fly :) Ian wrote... > > *points* GEEK! > > :) > -- @}-,'-- Chris Johnson --'-{@ / "(it is) crucial that we learn the difference / [EMAIL PROTECTED] \ / between Sex and Gender. Therein lies the key / \ / to our freedom" -- LB / www.nccnet.co.uk/~sixie \ [EMAIL PROTECTED] http://www.linuxchix.org
Re: [techtalk] Broad techtalk question...Image processing and Digital Cameras
Well, using gphoto (www.gphoto.org), I can use my digi camera quite happily (Olympus Camedia C420L). With a little wrapper and patience, you cn turn your digi camera into a webcam as well using gphoto :) Chris... > > > Has anyone interfaced any sort of digital camera to linux. Are there pre-written >drivers written, or is > that a write your own sort of thing. Any info would be appreciated, or experiences. >Either using the > serial or the USB port. > > Thanks, > Have Fun, > Sends Steve > > > > > [EMAIL PROTECTED] http://www.linuxchix.org > -- @}-,'-- Chris Johnson --'-{@ / "(it is) crucial that we learn the difference / [EMAIL PROTECTED] \ / between Sex and Gender. Therein lies the key / \ / to our freedom" -- LB / www.nccnet.co.uk/~sixie \ [EMAIL PROTECTED] http://www.linuxchix.org
Re: [techtalk] Code Snippit - Nifty.
The Wiretap gopher (which I need to dig the address out for - used to me wiretap.spies.com, but it moved...can't remember where to though) has (or used to, last time I looked - two or more years ago!) a whole bunch of obsifucated (sp!) C code in relation to compettions years ago. If anyones interewsted, I'll see if I can dig out where it [wiretap] is now :) Chris... > Yeah and I think there is an obsfucated C code contest somewhere > he could enter it into. Along with the n ways to do a+b in C. :) > > > Have Fun, > Sends Steve > -- @}-,'-- Chris Johnson --'-{@ / "(it is) crucial that we learn the difference / [EMAIL PROTECTED] \ / between Sex and Gender. Therein lies the key / \ / to our freedom" -- LB / www.nccnet.co.uk/~sixie \ [EMAIL PROTECTED] http://www.linuxchix.org
Re: [techtalk] DVD-ROM on Linux?
> Hello, > > I was wondering if Linux has support drivers for DVD CD-ROM. I have the DVD-ROM, > but cannot use it for anything else other than data CDs and music CDs. > > Thank you in advance. > > Subba Rao > [EMAIL PROTECTED] > http://pws.prserv.net/truemax/ Check www.kernel.dk - I seem to recall some patches to add DVD ioctl()'s to the kernel. Would check myself, but I'm reading this offline :) Chris... -- @}-,'-- Chris Johnson --'-{@ / "(it is) crucial that we learn the difference / [EMAIL PROTECTED] \ / between Sex and Gender. Therein lies the key / \ / to our freedom" -- LB / www.nccnet.co.uk/~sixie \ [EMAIL PROTECTED] http://www.linuxchix.org
Re: [techtalk] winmodem sound driver
> A real waste of processor cycles?? How so?? you make it sound as if > running a driver for a winmodem is not a good thing to do, could you > please explain? > As Kelly has said, many winmodem's don't have a DSP...if you've not seen the maths for DSP, then you're lucky :) DSP can get *very* scary and very involved. For modem work it isn't too bad, but it's still a fair chunk. Most DSP on computers is done through FFT's (fast fourier transforms) - which essentially is how to do Fourier Transforms with matrices. Off-loading the DSP onto the CPU probably isn't a good thing - I defeinately wouldn't want to do it on anything that is a critical system, especially time-critical - though it is perfectly feasiable to do it. For Winnmodem's on Linux though, some information can be found at www.linmodem.org Chris... -- @}-,'-- Chris Johnson --'-{@ / "(it is) crucial that we learn the difference / [EMAIL PROTECTED] \ / between Sex and Gender. Therein lies the key / \ / to our freedom" -- LB / www.nccnet.co.uk/~sixie \ [EMAIL PROTECTED] http://www.linuxchix.org
Re: [techtalk] winmodem sound driver
> ewww, this really does sound bad, So you're saying I'd be better off to slap in >an old USR 28800, than i would be to install a driver for my 56k winmodem? > Not really...a 56k modem is better anyday :) But there may be slight performance loss on the machine. Of how much, I don't know, as I've never used a winmodem, but I wouldn't imagine it'd be huge (else winmodem's wouldn't have took off in the first place). Chris... -- @}-,'-- Chris Johnson --'-{@ / "(it is) crucial that we learn the difference / [EMAIL PROTECTED] \ / between Sex and Gender. Therein lies the key / \ / to our freedom" -- LB / www.nccnet.co.uk/~sixie \ [EMAIL PROTECTED] http://www.linuxchix.org
Re: [techtalk] POP mail
> > I don't know exactly how it works, but secure pop provides for a secure > mechanism of transmitting these data items, and possibly the content of > the mail comming back to you. > I'm not sure if there is a totally encrypted POP session, but usernames and passwords can be hidden using APOP. APOP is a replacement for user/pass authentication and works as follows. When you connect to the POP server, it will reply with a unique identier as follows: $ telnet pophost 110 Connected to pophost Escape character is '^]'. +OK random text <2297.945296254@pophost> That long string between the <> is essentially the session key. Broken down it is 'pid.timestamp@hostname'. The POP client, if it has been told to use APOP, will take this key, create an MD5 hash of the password (known as the 'secret', rather than password) and sends to the server a line along the lines of: APOP sixie A3E44624C100D7b835C7DEA24B The POP server knows the session key it sent, and, after the arrival of the APOP command, can create the same MD5 hash locally. If the hashes match, then authentication is accepted, else it's a big no, and the authentication has to start again. After successful authentication however, its normal POP, with RCPT, LIST, DELE and the rest - all unencrypted (so a snooper can still read all your email). You may need to check with your service provider wheather APOP is supported. Even though you have the <> indentifier may not be a gurantee - sometimes a seperate database needs to be kept, as /etc/passwd cannot be used (/etc/passwd and /etc/shadow contain one way encoded passwords - to generate the MD5 hash, you need plaintext passwords. You can't get (realistically) the plaintext from /etc/passwd, unless you feel like a potential 1 month wait to login as Crack is ran against your password). Chris... -- @}-,'-- Chris Johnson --'-{@ / "(it is) crucial that we learn the difference / [EMAIL PROTECTED] \ / between Sex and Gender. Therein lies the key / \ / to our freedom" -- LB / www.nccnet.co.uk/~sixie \ [EMAIL PROTECTED] http://www.linuxchix.org
Re: [techtalk] Converting PMMail files to Maildir or mbox format
For Maildir (assuming you have a Maildir setup), just rename all the files .. and put them in Maildir/new. You may be able to get away with making up ; you can make up; is just you're machine name. So a good script may be: #!/bin/sh timestamp=945801478 for i in *.MSG do timestamp=`expr $timestamp + 1` mv $i $timestamp.$$.`hostname` done ## Script end For mbox, its more tricky. Essentially you just concatenate all the files together, but you need to make sure: 1. There is a blank line between each message 2. The first line of each message reads: "From ", eg: From [EMAIL PROTECTED] Tue Dec 21 18:40:44 1999 this is *independant* of the From: header. A small script may be able to do this by stripping the information out of the Date: and From: headers. I could write one, but I'm going to leave that as an exercise for the reader :) Not certain, but I think the date part of the From line is fussy about the format, so best keep the format shown in the example above. Chris... -- @}-,'-- Chris Johnson --'-{@ / "(it is) crucial that we learn the difference / [EMAIL PROTECTED] \ / between Sex and Gender. Therein lies the key / \ / to our freedom" -- LB / www.nccnet.co.uk/~sixie \ [EMAIL PROTECTED] http://www.linuxchix.org
Re: [techtalk] POP mail security
Try looking up about APOP authentication. Not all POP servers support it though, and I don't know what mail client support for APOP is like, but I think fetchmail is quite happy with it. APOP takes your username and password, and creates and md5 hash of the password and a timestamp returned by the pop server, and sends the hash over the wire. The password is never sent plain. Chris... > > All my users use fetchmail to get mail from my ISP's POP server. > For lack of resources, I cannot put a pop server on my box. > > What is the best way to protect my users passwords from being sniffed? > Can a user use an encrypted tunnel to send the userid and password to > the pop server? > > Any pointers and experiences appreciated. > > Thank you in advance. > > Subba Rao > [EMAIL PROTECTED] > http://pws.prserv.net/truemax/ > > => Time is relative. Here is a new way to look at time. <= > http://www.smcinnovations.com > > > [EMAIL PROTECTED] http://www.linuxchix.org > -- @}-,'-- Chris Johnson --'-{@ / "(it is) crucial that we learn the difference / [EMAIL PROTECTED] \ / between Sex and Gender. Therein lies the key / \ / to our freedom" -- LB / www.nccnet.co.uk/~sixie \ [EMAIL PROTECTED] http://www.linuxchix.org
[techtalk] cak-handed mouse in X ?
Okay...still no joy with this after some searching through manpages and howto's...does anyone have an idea how to change a right handed mouse to a left handed mouse? (ie, reverse the left and right mosue buttons)...recently been able to reorganise my desk and move the mouse to my left hand (which is where I prefer it ... it causes less discomfort). Windows has this nice little "reverse mouse buttons" check box...damned if I can find owt in the XF86Config man page, the XF86Setup program, or doing a zgrep through the howto's I have. If there is no way, I may just grab the source and hack a mod in (not what I really want to do, but if it comes to it, I'll probably do so). Thanks :) Chris... -- @}-,'-- Chris Johnson --'-{@ / "(it is) crucial that we learn the difference / [EMAIL PROTECTED] \ / between Sex and Gender. Therein lies the key / \ / to our freedom" -- LB / www.nccnet.co.uk/~sixie \ ___ techtalk mailing list [EMAIL PROTECTED] http://www.linux.org.uk/mailman/listinfo/techtalk
[techtalk] cak-handed mice: resolved!
It's a case of RTFM... :) Found the answer in the FAQ...it says to plonk: xmodmap -e "pointer = 3 2 1" in .xsession/.xinitrc (or type at a prompt)...and yep, it works :) woohoo :) Chris... -- @}-,'-- Chris Johnson --'-{@ / "(it is) crucial that we learn the difference / [EMAIL PROTECTED] \ / between Sex and Gender. Therein lies the key / \ / to our freedom" -- LB / www.nccnet.co.uk/~sixie \ ___ techtalk mailing list [EMAIL PROTECTED] http://www.linux.org.uk/mailman/listinfo/techtalk
[techtalk] Wine & CD-Roms ...
Okay - I've got to "head meets wall" stage with this - I have a copy of Microsoft Autoroute '98 ... I don't know if its known much outside the UK - it's essentially a route planning program when your driving. Microsoft bought the rights for Autoroute from the company that originally made it...anyhow, that's by the by. What i'm tryting to do is get it to run under Wine. Now, I can install it with wine, no problem , follow the familier wizard through quite happily. The main problem I have is that it requires the CD in order to run. Herein is the problem: CD in, mounted, accessible (I just installed from it), yet when it runs it cannot find it. I dunno if its looking for anything "special" (low-level hardware stuff, sector checking?), but the program ain't for having it - keeps saying "it's not there!". Similarly, its nowt to do with the fact it was installed from linux. Originally it was installed from Windows and gave the same problem (so I wondered if a reinstall would sort out potential "registry" problems). Anyhow...either way, it doesn't work. :( In a similar vien someone on another linux list is having similar problems with the Encyclopedia Brittanica CD... :-/ Has anyone had success running something under wine that also requires the CD to run ? Thanks, Chris... -- @}-,'-- Chris Johnson --'-{@ / "(it is) crucial that we learn the difference / [EMAIL PROTECTED] \ / between Sex and Gender. Therein lies the key / \ / to our freedom" -- LB / www.nccnet.co.uk/~sixie \ ___ techtalk mailing list [EMAIL PROTECTED] http://www.linux.org.uk/mailman/listinfo/techtalk
Re: [techtalk] Really lame question
> > Hi, grrls ;-) > > I have a really _basic_ and lame question! > I need to lauch two programs, and they need > to behave like this; > > * start program 1 > * start program 2 > * use program 2 > * exit program 2 manually > * program 1 should exit automatically > #!/bin/sh program1 & prog=$! program2 kill $prog Should do the job :) The $! returns the pid of the last process started, which is often handy when combined with 'wait' or 'kill' :) Chris... -- @}-,'-- Chris Johnson --'-{@ / "(it is) crucial that we learn the difference / [EMAIL PROTECTED] \ / between Sex and Gender. Therein lies the key / \ / to our freedom" -- LB / www.nccnet.co.uk/~sixie \ ___ techtalk mailing list [EMAIL PROTECTED] http://www.linux.org.uk/mailman/listinfo/techtalk
Re: [techtalk] help with sorting text in a file
Gene wrote: > > Try this ... > > cat file | grep 'QAA' | sed s/^.*QAA/QAA/ | sed s/:.*$// > > That's paraphrased, and I know there is a shorter way of doing it, > but that should get the job done. Basically, it gets all the lines > with QAA in them, then removes the text either side of the > QAAn code. The "cat file" can be replaced with the actual > output command, if the output is being filtered direct. > A shorter way would be: grep 'QAA' file | sed -e 's/^.*QAA/QAA/ -e s/:.*$// But to cut it even more, grep 'QAA' file | sed 's/^.*\(QAA[0-9]*\):.*$/\1/' As mentioned below by Gene though, cut and awk will to the job just as admirably :) What the sed is doing is seeking for all patterns containing QAA followed by a bunch of numbers. As the pattern for this 'QAA[0-9]*' has been surrounded by parathensis (which have been escaped), sed assigns any match a place number. As it's the first place holder (actually, the only one in this RE), it's given the number 1. This is referenced in the replace string as \1. The '^.*' and ':.*$' portions of the RE are there for completeness to make sure the entire line is covered. But cut (ie "grep 'QAA' file | cut -d: -f4"), as mentioned by Gene below, is probably a nicer way (its certainly less expensive in terms of CPU load). One final way - potentially overkill, but I'll show it here anyhow, is to use the shells own functions to split the string and do the job of 'cut', vis-a-vis this shell script: #!/bin/sh IFS=':' grep 'QAA' $1 | while read date min sec id junk do echo $id done This technique is very useful if you want to parse a file into seperate compenents (eg a config file) without the need for huge chunks of 'cut', 'sed', or 'awk' as the line is split into variables at the start of each loop *by the shell*. note in all these cases, I've avoided using 'cat' as it's a wasted resource if your piping it straight into another command. Unless you concatenate files, cat can be replaced either by: command args file or command args < file Just my 2p :) Chris... Gene continued to write: > > You can do just about any filtering with grep, sed, and regular > expressions. > > Cut will work also, and probably produces a shorter line. You can > also replace the 2 sed's with an 'awk', if you know awk syntax ... > > grep 'QAA' file | awk '{FS=":"; print $NF-1}' > > Also paraphrased, since I'm not near Linux/UNIX at the moment. > > Gene Dolgner > > -- @}-,'-- Chris Johnson --'-{@ / "(it is) crucial that we learn the difference / [EMAIL PROTECTED] \ / between Sex and Gender. Therein lies the key / \ / to our freedom" -- LB / www.nccnet.co.uk/~sixie \ ___ techtalk mailing list [EMAIL PROTECTED] http://www.linux.org.uk/mailman/listinfo/techtalk
Re: [techtalk] yet another solaris question ...
> Hi chix! > > While we're discussing the passwd file, i have a problem. I didn't > really know another way to set my PATH automatically other than > appending it to my shell line in my passwd file, like this: > > jellhead:x:100:1::/export/home/jellhead:/usr/local/bin/tcsh;setenv > PATH /usr/sbin:/usr/bin:/usr/local/bin:/usr/ccs/bin > > This worked for me in linux in the past, but my Solaris Sparc server > doesn't like it (i can't log in as jellhead anymore). Does anyone > know a good alternative? I've considered a few other things, but i'm > a little intimidated by this funky Solaris box ... Wibble ... not seen this before -- bad practice :) Okay... you need to modify any of: /etc/profile- Global settings for ksh, sh (and bash?) /etc/csh.cshrc - Global settings for csh, tcsh $HOME/.profile - User settings for ksh, sh $HOME/.cshrc- User settings for csh, tcsh Now -- as you're using tcsh, take your pick of .cshrc or /etc/cshrc ... the line you want to do would be: setenv PATH ${PATH}:/new/path/here:/another/new/path/here:/and/so/on basically, each path is seperated by a colon. The first reference to ${PATH} ensures any existing path remains. If you want to set it from scratch, feel free to ignore it :) > > # begin horror story > Last time i made changes to my passwd file on this server, i decided i > was really, really tired of using sh, so i decided to set my SHELL in > the passwd file to /usr/local/bin/tcsh. Unfortunately i mistyped the > path, and it was after i *saved the file and logged off* and tried to > log back in using my new settings that i discovered NO ONE HAS ROOT > ACCESS TO THE THING ANYMORE!! We had to go over to the rack (this is > a Sun Netra1) and boot the thing off the CD to fix it. Luckily the > sysadmins involved (i'm not the sysadmin, i'm the webmaster) didn't > give me *too* hard of a time :-) > # end horror story > One hint -- in general, changing the shell for root is a bad thing...some Unixes don't like it, as some tools assume the root shell will be /bin/sh (cron is one example). Now, you didn't say which shell you were changing, but it sounds like the root shell. If you want to use another shell as root, either start it manually when you log in, or in /.profile get that to start your preferred shell...eg, exec /bin/ksh Using exec will force the shell to replace the currently executing shell in userspace, so you don't need to type exit twice to logout :) It leaves /etc/passwd alone and is then kinder to fussy apps. Also place any shells used as login shells in /etc/shells...this ensures things like ftpd don't complain. :) Chris... :) -- @}-,'-- Chris Johnson --'-{@ / "(it is) crucial that we learn the difference / [EMAIL PROTECTED] \ / between Sex and Gender. Therein lies the key / \ / to our freedom" -- LB / www.nccnet.co.uk/~sixie \ ___ techtalk mailing list [EMAIL PROTECTED] http://www.linux.org.uk/mailman/listinfo/techtalk
Re: [techtalk] Hello from a Newbie!
> Now for my Query > > I would like to restrict telnet access to my computer to only a few IP > addresses. In order to do this I edited the hosts.deny fill with ALL:ALL, > and the hosts.allow file with the IP adresses which I wanted to allow > access. Unfortunately this doesn't seem to work. Is there another way > to restrict access? If there is how do I do it? > Part of me is still suprised hosts.deny is still in existance -- most (all?) linux dists these days ship with TCP wrappers that support extra options (man host_options(5)). These options make hosts.deny redundant and mean you have only one file to manage ... :) So, in your case, you could have: ALL: : ALLOW ALL: : ALLOW ALL: ALL: DENY in hosts.allow, and delete hosts.deny. you can even have login banners put on screen (see the "banners" keyword). I tend to use this as the last rule in hosts.allow: ALL:ALL:rfc931 10: banners /etc/access/denied: spawn (/etc/access/bin/deny_log %a %h %u %d &): DENY Which, for every service on every incoming address (unless an earlier rule matched it), it attempts an ident lookup (10 second timeout), displays a banner that says summat like "access denied", and spawns a trap door shell script that mails me before denying access. Very powerful additions... :) Chris... -- @}-,'-- Chris Johnson --'-{@ / "(it is) crucial that we learn the difference / [EMAIL PROTECTED] \ / between Sex and Gender. Therein lies the key / \ / to our freedom" -- LB / www.nccnet.co.uk/~sixie \ ___ techtalk mailing list [EMAIL PROTECTED] http://www.linux.org.uk/mailman/listinfo/techtalk
Re: [techtalk] yet another solaris question ...
Magni wrote: > An alternative to start another shell when logging in, is to make an > alternative root-user, feks. roottsch with tcsh as shell. This means you > have to keep an eye on logins from two users (I presume you keep an eye > on when and from where root is logging in..), but the advantage is that > advantage is also that you may want to run shell commands from a central > server on all your boxes of different OS and since different OS tends to > have different root shells the command will often fail if root on remote > box has fex. csh as shell. So making a rootbash on all the servers and > then send the commands to this user may be nice. > (Of course this isn't really necessary for normal "home computer users", > but it's really nice in an environment with 4+ OSes.) As an addenum to this :) If you do this, you may, if it suits your environment, give root a locked password ... this won't cause any problems for people logging in as root because you've set up rootbash, roottcsh or whatever. Okay, you still need to keep an eye for root logins, but to a lesser extent. *BUT* if you do see a root login, it's probably an indication someone has broken into your box...so it could work as a vague security alert :) Chris... -- @}-,'-- Chris Johnson --'-{@ / "(it is) crucial that we learn the difference / [EMAIL PROTECTED] \ / between Sex and Gender. Therein lies the key / \ / to our freedom" -- LB / www.nccnet.co.uk/~sixie \ ___ techtalk mailing list [EMAIL PROTECTED] http://www.linux.org.uk/mailman/listinfo/techtalk
[techtalk] Network i/f bonding ... EQL ?
Hiya, At work, we have this nice shiny 4-port network card (Phobos P430), which *does* come with drivers, but damned if I can get them working (a mix of undefined symbols and wrong kernel versions - build for 2.2.5 uni-processor, and we have a 2.2.14 2-proc SMP system). So I've given up trying to get the damn thing working (which means we lose funky channel-bonding functionality). However Phobos have provided a generic tulip driver, which does work, but we now have eth1 through to eth4. (eth0 is yet another network card which we can ignore for the time being). Now is it possible to bond eth1 through eth4 together and hide them on a single IP address to give essentially a 400MBps backbone. This is hooking into a cisco switch, so there shouldn't be any problems with that side of things (according yo our network bod). I've looked at the EQL driver, but that's written for serial lines. Does anyone know if it'd work on normal ethernet interfaces? Failing that, is there any way that the four lines can be bonded together to create a single logical network interface? This is tonights web-trawl...but any other information would be welcome :) Thanks, Chris... -- @}-,'-- Chris Johnson --'-{@ / "(it is) crucial that we learn the difference / [EMAIL PROTECTED] \ / between Sex and Gender. Therein lies the key / \ / to our freedom" -- LB / www.nccnet.co.uk/~sixie \ ___ techtalk mailing list [EMAIL PROTECTED] http://www.linux.org.uk/mailman/listinfo/techtalk
[techtalk] Ethernet bonding [Resolved]
Okay - a few minutes searching with google (gotta live that search engine) found a patch bonding-0.2.tar.gz which looks like it'll do the job quite nicely. If anyone is interested, http://pdsf.nersc.gov/linux/ It also looks like its standard in 2.2.15 and higher. Chris... -- @}-,'-- Chris Johnson --'-{@ / "(it is) crucial that we learn the difference / [EMAIL PROTECTED] \ / between Sex and Gender. Therein lies the key / \ / to our freedom" -- LB / www.nccnet.co.uk/~sixie \ ___ techtalk mailing list [EMAIL PROTECTED] http://www.linux.org.uk/mailman/listinfo/techtalk
[techtalk] Netscape - Illegal Instruction
Hiya, On a friends machine, Netscape (various versions of 4.x have been used) always crashes with an Illegal Instruction...and a core dump. It happened on with SuSE 6.1, so lasy night, he blew it away and stuck RedHat 6.2 on - and its still crashing with illegal instruction whenever the netscape window is focused. At the moment we can't get past the license aggreement page move mouse into window - "Illegal Instruction (core dumped)". This happens when using either WindowMaker (built after the installation) or Enlightenment (Gnome - supplied by RedHat). It also looks as if WPrefs, from WindowMaker (currently 0.62.1 - but other versions failed as well) also Illegal Intructions...and earlier, whilst building WindowMaker, cc1 [egcs-2.91.66] received an Illegal Instruction when trying to build one particular file (which didn't happen after a reboot and a reconfig almost from start). EGCS hasn't caused any other problems though - qmail, windowmaker libs have all been fine now. Answers on a postcard? Thanks, Chris... -- @}-,'-- Chris Johnson --'-{@ / "(it is) crucial that we learn the difference / [EMAIL PROTECTED] \ / between Sex and Gender. Therein lies the key / \ / to our freedom" -- LB / www.nccnet.co.uk/~sixie \ ___ techtalk mailing list [EMAIL PROTECTED] http://www.linux.org.uk/mailman/listinfo/techtalk
Re: Not using Netscape (was Re: [techtalk] Re: SMP on Linux (lock ups))
> The new builds of Mozilla are getting very good. I've switched to it as my > standard browser now. Check out a new nightly build. It also has a full > featured IMAP mail client. > > Jason I've found Mozilla to run dog slow on my machine (P200MMX; 64MB RAM) ... has its speed improved in the newer builds? Chris... -- @}-,'-- Chris Johnson --'-{@ / "If not for me then, do it for yourself. / [EMAIL PROTECTED]\ / If not for me, then do it for the world" / www.nccnet.co.uk/~sixie \ / -- Stevie Nicks / \ ___ techtalk mailing list [EMAIL PROTECTED] http://www.linux.org.uk/mailman/listinfo/techtalk
Re: Not using Netscape (was Re: [techtalk] Re: SMP on Linux (lock ups))
> Depends what 'slow' you mean. We have just graduated from a 28.8k modem > to cablemodem (woo!). So everything on the net seems incredibly fast now! > (Except sourceforge, but that's now usable rather than impossible.) > It now takes me a few minutes to download a nightly mozilla instead of > a few hours (I jest not) so I have been doing so. > The sort of slow I had was slow response and general sluggishness of the UI. However having last night downloaded the nightly build, I'm quite pleseantly suprised ... it's actually running at a usable speed... :) Maybe there is hope for Mozilla after all ... (I'd come close to writing it off due to its UI performance issues). Chris... -- @}-,'-- Chris Johnson --'-{@ / "If not for me then, do it for yourself. / [EMAIL PROTECTED]\ / If not for me, then do it for the world" / www.nccnet.co.uk/~sixie \ / -- Stevie Nicks / \ ___ techtalk mailing list [EMAIL PROTECTED] http://www.linux.org.uk/mailman/listinfo/techtalk