On Thu, Jul 31, 2014 at 09:32:08PM -0700, Rusi Mody wrote:
>
> So now the question is:
>
> What is the 'modern' way of automatically doing 'modprobe pppoe'
> at boot/ifup time?
>
> Evidently something has changed that has made that stop happening...
Put it in /etc/modules. I hope that is still
On Friday, August 1, 2014 12:10:02 AM UTC+5:30, Rusi Mody wrote:
> After some recent upgrades (this is on jessie)
> auto starting of ppp has stopped working.
>
>
> So every time after booting I now have to run pppoeconf.
Some progress... and a different question:
Doing:
# pon dsl-provider
I g
On 07/31/2014 04:41 PM, pecon...@mesanetworks.net wrote:
Just how often do you have to poke at the keyboard? And
when you do poke at it, about how many key presses do you make before
you get the number of bits you requested?
Whenever I do a fresh system build, I use /dev/random to generate a 32
berenger.mo...@neutralite.org wrote:
> I have identified with lot of "find -name '*'" that the
> problem comes from the cache, and especially from apt-cacher-ng, but I think
> ...
I also use apt-cacher-ng but of late there is a problem that prevents
it from running its daily housecleaning routine
Brian wrote:
> Tony Baldwin wrote:
> > I have copied the muttrc for this account to
> > http://tonyb.myownsite.me/pages/muttrc.txt (password removed, of course).
> > Same muttrc on both the server and desktop.
> > mutt works perfectly with both accounts from the server, not from the
> > desktop.
S
On Thu, 31 Jul 2014 16:41:01 -0700
"" wrote:
> whatever experience you want to share.
use haveged, it feeds /dev/random with a reservoir.
--
Pazns: U don't know about the drawer method?
Pazns: U take your schoolbag, empty it in a drawer, close it,
hop! clean up done!
Zeeln: Yeah but my
As many of you know, /dev/random is a source of random bits that are
suitable for use in cryptographic analysis. The software supporting
/dev/random collects random time data from monitoring events that are
not generated by the functioning of the computer, but from something
like the keystroke time
On Thu, Jul 31, 2014 at 4:53 PM, Andrei POPESCU
wrote:
> On Jo, 31 iul 14, 20:13:23, JPT wrote:
>>
>> my self built system is dead because systemd installer does not check if
>> control groups are enabled BEFORE upgrading the package.
>>
>> Could someone take care so the installer checks current k
On Sun, Jul 27, 2014 at 9:18 PM, Joel Rees wrote:
> On Sun, Jul 27, 2014 at 7:47 PM, Tom H wrote:
>> On Thu, Jul 24, 2014 at 9:00 AM, Slavko wrote:
>>> Dňa Thu, 24 Jul 2014 13:00:24 +0100 Tom Furie
>>> napísal:
You are, of course, aware that testing and unstable are test platforms
>>>
On 7/31/2014 5:51 PM, Brian wrote:
> On Thu 31 Jul 2014 at 15:34:46 -0400, Jerry Stuckle wrote:
>
>> On 7/31/2014 3:09 PM, Brian wrote:
>>>
>>> The point of my remark was that malware can operate on port 25 so there
>>> is nothing to prevent it operating on port 587. I was actually agreeing
>>> wi
On Sun, Jul 27, 2014 at 9:52 AM, Pascal Hambourg wrote:
> Tom H a écrit :
>> On Thu, Jul 24, 2014 at 2:41 PM, Mickael MONSIEUR
>> wrote:
>>>
>>> post-up /sbin/route add 1.2.3.4 dev eth0
>>
>> your "route ..." syntax looks wrong to me.
>
> Not to me.
>
> zenith:~# /sbin/route add 1.2.3.4 dev eth0
On Thu 31 Jul 2014 at 23:53:01 +0300, Andrei POPESCU wrote:
> On Jo, 31 iul 14, 20:13:23, JPT wrote:
> > Hi,
> >
> > my self built system is dead because systemd installer does not check if
> > control groups are enabled BEFORE upgrading the package.
> >
> > Could someone take care so the instal
On Thu 31 Jul 2014 at 20:12:56 +0100, Mark Carroll wrote:
> Perhaps coincidentally, just rather recently I've noticed a change, with
> stable pinned at 600 and testing at 50:
I don't use pinning so don't appreciate the significance of this.
> root:/# apt-get upgrade
> Reading package lists... Do
On Thu 31 Jul 2014 at 15:34:46 -0400, Jerry Stuckle wrote:
> On 7/31/2014 3:09 PM, Brian wrote:
> >
> > The point of my remark was that malware can operate on port 25 so there
> > is nothing to prevent it operating on port 587. I was actually agreeing
> > with you when you said "Nothing".
>
> Y
On Jo, 31 iul 14, 20:13:23, JPT wrote:
> Hi,
>
> my self built system is dead because systemd installer does not check if
> control groups are enabled BEFORE upgrading the package.
>
> Could someone take care so the installer checks current kernel features?
Do you mean the Debian Installer? Does
On 7/31/2014 3:09 PM, Brian wrote:
> On Thu 31 Jul 2014 at 14:43:11 -0400, Jerry Stuckle wrote:
>
>> On 7/31/2014 12:47 PM, Brian wrote:
>>>
>>> One would expect the ISP's strategy to factor in the sophistication of
>>> malware. which is presumably sophisticated enough to be able to use port
>>> 2
Hello List,
On 31/07/14 19:33, Sven Hartge wrote:
> Jerome BENOIT wrote:
>> On 31/07/14 18:52, Henrique de Moraes Holschuh wrote:
>>> On Thu, 31 Jul 2014, Jerome BENOIT wrote:
>
I have a very naive question: how can we create a dev/log
socket, similar to `/dev/log', in a chroot jail ?
Brian writes:
> On Thu 24 Jul 2014 at 10:37:34 +, Alan Simpson-Vlach wrote:
>
>> Ever since a dist-upgrade that installed systemd and removed
>> sysvinit-core, I have been unable to get a display manager.
>
> The dist-upgrade would have more than this. You are using testing?
Perhaps coincide
On Thu 31 Jul 2014 at 14:43:11 -0400, Jerry Stuckle wrote:
> On 7/31/2014 12:47 PM, Brian wrote:
> >
> > One would expect the ISP's strategy to factor in the sophistication of
> > malware. which is presumably sophisticated enough to be able to use port
> > 25.
>
> Which is why many ISPs now bloc
On Thu, 31 Jul 2014 18:47:19 +0100
Brian wrote:
> On Thu 31 Jul 2014 at 17:37:21 +0100, Joe wrote:
>
>The preference is for
> > malware to use a primitive SMTP engine which is entirely separate
> > from the compromised system's email.
>
> I didn't know that. I don't envisage such an engine on m
On 7/31/2014 12:47 PM, Brian wrote:
> On Thu 31 Jul 2014 at 10:52:39 -0400, Jerry Stuckle wrote:
>
>> On 7/31/2014 10:37 AM, Brian wrote:
>>>
>>> The reason for doing it given is generally along the lines of:
>>>
>>>Much of the current use of port 25 is by computers that have been
>>>infec
Hi,
my self built system is dead because systemd installer does not check if
control groups are enabled BEFORE upgrading the package.
Could someone take care so the installer checks current kernel features?
(currently building new kernel, so hopefully it will be up again soon)
thanks,
JPT
-
After some recent upgrades (this is on jessie)
auto starting of ppp has stopped working.
So every time after booting I now have to run pppoeconf.
Any ideas?
--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debi
On Thu 31 Jul 2014 at 17:37:21 +0100, Joe wrote:
> On Thu, 31 Jul 2014 15:37:31 +0100
> Brian wrote:
>
> > What I do not understand is what prevents the malware (assuming it can
> > signicantly control the machine) from using the same authentication to
> > send spam as before. Isn't this back to
Jerome BENOIT wrote:
> On 31/07/14 18:52, Henrique de Moraes Holschuh wrote:
>> On Thu, 31 Jul 2014, Jerome BENOIT wrote:
>>> I have a very naive question: how can we create a dev/log socket,
>>> similar to `/dev/log', in a chroot jail ?
>> It can be done through bind mounts (refer to the mount
Hi,
On 31/07/14 18:52, Henrique de Moraes Holschuh wrote:
> On Thu, 31 Jul 2014, Jerome BENOIT wrote:
>> I have a very naive question:
>> how can we create a dev/log socket, similar to `/dev/log', in a chroot jail ?
>
> It can be done through bind mounts (refer to the mount(8) manpage) or by
> co
On Thu, 31 Jul 2014, Jerome BENOIT wrote:
> I have a very naive question:
> how can we create a dev/log socket, similar to `/dev/log', in a chroot jail ?
It can be done through bind mounts (refer to the mount(8) manpage) or by
configuring the log daemon to listen at the extra socket.
--
"One d
On Thu 31 Jul 2014 at 10:52:39 -0400, Jerry Stuckle wrote:
> On 7/31/2014 10:37 AM, Brian wrote:
> >
> > The reason for doing it given is generally along the lines of:
> >
> >Much of the current use of port 25 is by computers that have been
> >infected by malware and are sending spam wit
Hi.
On Thu, Jul 31, 2014 at 06:25:38PM +0200, Jerome BENOIT wrote:
>
>
> On 31/07/14 17:54, B wrote:
> > On Thu, 31 Jul 2014 17:46:08 +0200
> > Jerome BENOIT wrote:
> >
> >> how can we create a dev/log socket, similar to `/dev/log', in a
> >> chroot jail ?
> >
> > The least Linux deserves
On Thu, 31 Jul 2014 15:37:31 +0100
Brian wrote:
>
> What I do not understand is what prevents the malware (assuming it can
> signicantly control the machine) from using the same authentication to
> send spam as before. Isn't this back to square 1?
>
>
I would assume it can, if it operates yo
On 31/07/14 17:54, B wrote:
> On Thu, 31 Jul 2014 17:46:08 +0200
> Jerome BENOIT wrote:
>
>> how can we create a dev/log socket, similar to `/dev/log', in a
>> chroot jail ?
>
> The least Linux deserves from its users is them making at least
> a minimum of self researches about trivial que
On Wed, Jul 30, 2014 at 08:33:56PM +0200, Nemeth Gyorgy wrote:
> 2014-07-30 09:18 keltez?ssel, Joe ?rta:
> > Something else you might do now is to place temporary logging rules
> > before your 'DROP' rules, to confirm whether it is indeed iptables
> > which is blocking those packets. No logs, it's
On Thu, 31 Jul 2014 17:46:08 +0200
Jerome BENOIT wrote:
> how can we create a dev/log socket, similar to `/dev/log', in a
> chroot jail ?
The least Linux deserves from its users is them making at least
a minimum of self researches about trivial questions…
--
If ignorance is bliss, why aren't t
Hello List,
I have a very naive question:
how can we create a dev/log socket, similar to `/dev/log', in a chroot jail ?
Thanks in advance,
Jerome
--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Arch
Error messages indicate that my confirmation replies to debian-user-request are
not being recognized
and that one reason for non-recognition is that I am already subscribed. So if
see this don't respond.
My email system here was badly damaged in a reinstall of Wheezy recently,
mostly by fail att
On 7/31/2014 10:37 AM, Brian wrote:
> On Mon 28 Jul 2014 at 22:12:09 +0100, Joe wrote:
>
>> On Mon, 28 Jul 2014 18:16:23 +0100
>> Brian wrote:
>>
>>> Port 25 then becomes used only for incoming messages to be sent to
>>> domains the server is responsible for? If so, that doesn't appear any
>>> di
On Wed 30 Jul 2014 at 16:09:21 +0200, Alvaro Alonso Jiménez wrote:
> 2. I thought about including something in the late_command stage to update
> the sources.list accordingly (i.e. executing
>
> in-target echo >>
> /etc/apt/sources.list.d/custom.list
> in-target apt-get -o Acquire::Check-Valid-U
On Mon 28 Jul 2014 at 22:12:09 +0100, Joe wrote:
> On Mon, 28 Jul 2014 18:16:23 +0100
> Brian wrote:
>
> > Port 25 then becomes used only for incoming messages to be sent to
> > domains the server is responsible for? If so, that doesn't appear any
> > different from the present situation. For re
On Mon 28 Jul 2014 at 19:57:52 +0100, Brian wrote:
> On Mon 28 Jul 2014 at 20:16:08 +0200, Slavko wrote:
> > Dňa Mon, 28 Jul 2014 18:37:54 +0100 Brian
> > napísal:
> >
> > > Your observation that ISPs could also interfere with port 587 doesn't
> > > cheer me up. :)
> >
> > It is black side of t
On Mon 28 Jul 2014 at 19:16:08 -0400, Jerry Stuckle wrote:
> But they also are not in any violation of any RFC's. No RFC says they
> have to provide port 25 connectivity to your system.
This is substantiated in RFC 5068
http://tools.ietf.org/html/rfc5068
This document offers no recommenda
On Thursday 31 July 2014 15:24:03 berenger.mo...@neutralite.org wrote:
> Le 30.07.2014 23:16, David Baron a écrit :
> > This baby seems to start up for no reason, slowing whatever was being
> > done at
> > the time. Have to manually kill it.
> >
> > Somewhere to set its priorities, i.e. nice it?
>
Le 30.07.2014 23:16, David Baron a écrit :
This baby seems to start up for no reason, slowing whatever was being
done at
the time. Have to manually kill it.
Somewhere to set its priorities, i.e. nice it?
I'm wondering. Why are you using packagekit? I thought it was replaced.
Anyway, you can
On Mon, 28 Jul 2014 16:48:04 +0100
Darac Marjal wrote:
...
> encryption such as GPG. If you care about people seeing who you write
> to, then don't use e-mail.
Or use an anonymous remailer.
Celejar
--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject of "unsubscr
Dan Hitt:
>
> So . . . i'd like to get a laptop for my personal use, but of course
> running a free OS.
>
> Does this exist, with the two finger gesture use?
My Thinkpad X240 supports two-finger scrolling and a few other gestures.
J.
--
When standing at the top of beachy head I find the rocks
Hi,
When I start an atftpd daemon with "/usr/sbin/atftpd --port 69
--bind-address 10.10.10.2 --daemon /srv/tftp/" command, the TFTP
server listens on ephimeral port(58418 in this example) instead of
port 69:
# atftpd --version
atftp-0.7 (server)
# /usr/sbin/atftpd --port 69 --bind-address 10.10.1
Hello,
[ no need to CC me ]
On Wed, Jul 30, 2014 at 07:50:28PM +, Bonno Bloksma wrote:
> [...]
> > root@vz02:~# cciss_vol_status /dev/sda
> > /dev/sda: (Smart Array P420i) RAID 5 Volume 0 status: OK.
>
> But I get...
> linein:~# cciss_vol_status /dev/sda
> cciss_vol_status: /dev/sda: Unknown
46 matches
Mail list logo