On Sat, Aug 01, 2015 at 02:12:54PM +0200, Anto wrote:
> Hello everybody,
>
> I don't usually get answers on this kind of basic questions, so I post it to
> keep the mailing list alive.
>
> I am trying to re-compile a package that I took from Debian sid. And I got
> the following error.
See www.c
> so I post it to keep the mailing list alive.
Odd. Normally people email mailing lists in order to get answers.
Since that wasn't your goal, let me disregard the rest of your mail and just
express my gratitude for caring about the list itself.
Thanks!
Timo
On Sat, 1 Aug 2015 05:13:46 -0400
Renaud (Ron) OLGIATI wrote:
> If I wanted my users to use sudo, I would install them *ubuntu...
:-)
Wait a minute. You can't do that.
* If I wanted my children to breath, I'd give them oxygen tanks.
* If I wanted to spend my money, I'd buy a Testerosa.
:-)
On Thu, 30 Jul 2015 18:59:31 +0200
tilt! wrote:
> Hi Jaromil!
>
> Jaromil wrote on 29/07/2015 at 19:44 CEST:
> > [...]
> > how I do it now? hardcode every single binary
> > that sudo is aloud to execute, full path
> > and locations that are only root writable.
> > that's a sudoers feature...
>
On Thu, 30 Jul 2015 09:18:16 -0400 (EDT)
Rob Owens wrote:
> Another reason not to give users wholesale access to the mount
> command is that they could then 'mount -o remount,rw' any filesystem
> that the administrator has mounted read-only. To protect against
> this, I think you probably need s
Le 30/07/2015 11:28, Rainer Weikusat a écrit :
Didier Kryn writes:
Le 29/07/2015 16:35, a...@gulbrandsen.priv.no a écrit :
Every last problem of sudo is taken seriously? Did you know that if
someone has limited access, e.g. the right to install standard
packages, then it is easy to leverage th
Le 01/08/2015 17:49, Isaac Dunham a écrit :
Alternately, you could write a wrapper that*always* mounts under
/media, and doesn't accept -t; it just takes a device name, creates an
equivalent name under /media, checks type and whether ntfs-3g is installed,
and passes a suitable type to mount (or
On Fri, Jul 31, 2015 at 10:47:29AM +0100, Rainer Weikusat wrote:
>
> A daemon process should only exist because it provides some important
> functionality with a real benefit for users of the system which cannot
> (reasonably) be provided in some other way, eg, by starting a program to
> perform a
Steve Litt wrote:
> http://www.troubleshooters.com/linux/xargs.htm
Funny, that I used xargs so many years without ever looking
at the man page. Thanks for publishing these examples!
--
Joel Roth
___
Dng mailing list
Dng@lists.dyne.org
https://maili
On Fri, Jul 31, 2015 at 07:12:05AM -0400, Steve Litt wrote:
> Someone mentioned that we have too many daemons and this shouldn't be
> one. If you want the thing to be *auto*mount instead of just "mount
> when I tell you to, or "search for possible mounts and tell me about
> them", it has to be a ba
Laurent Bercot writes:
> On 31/07/2015 11:47, Rainer Weikusat wrote:
>>
>> [example of a completely useless daemon process]
>>
>> But that's not a good reason for it being installed and running: A
>> daemon process should only exist because it provides some important
>> functionality with a real b
On Sat, Aug 01, 2015 at 08:49:55AM -0700, Isaac Dunham wrote:
> On Thu, Jul 30, 2015 at 10:39:22PM +0200, Didier Kryn wrote:
> > Isaac, your comment suggests me two questions:
> > One: is it really possible to mount a Fuse filesystem with 'mount' ? I
> > thought it could only be done with '
On Thu, Jul 30, 2015 at 10:28:30AM +0100, Rainer Weikusat wrote:
> Didier Kryn writes:
> > Le 29/07/2015 16:35, a...@gulbrandsen.priv.no a écrit :
> >> Every last problem of sudo is taken seriously? Did you know that if
> >> someone has limited access, e.g. the right to install standard
> >> packa
On Thu, Jul 30, 2015 at 10:39:22PM +0200, Didier Kryn wrote:
> Le 30/07/2015 01:09, Isaac Dunham a écrit :
> >I'm not sure where in the discussion this fits, but I thought I'd mention
> >it here:
> >Permitting all mount invocations via sudo does have a potential security
> >hole if your mount imple
Hello everybody,
I don't usually get answers on this kind of basic questions, so I post
it to keep the mailing list alive.
I am trying to re-compile a package that I took from Debian sid. And I
got the following error.
dh common-install-prehook-arch --parallel --with autotools-dev --with
a
IMHO automount for desktop is a helper for a user running some X
session. Usually that means that a single person is using this system.
So make him a helper which can do automount/autorun etc which helps
him on a daily basis. Helps him not the admin of the system. A simple
one which is a helper, n
If I wanted my users to use sudo, I would install them *ubuntu...
Cheers,
Ron.
--
Schroedinger thought inside the box.
-- http://www.olgiati-in-paraguay.org --
___
Dng ma
On 31/07/2015 11:47, Rainer Weikusat wrote:
But that's not a good reason for it being installed and running: A
daemon process should only exist because it provides some important
functionality with a real benefit for users of the system which cannot
(reasonably) be provided in some other way
N
Le 30/07/2015 01:30, Laurent Bercot a écrit :
I think most people wouldn't mind a pandemonium on their machine IF
they knew exactly what daemon is doing what, how many resources a
daemon consumes, and how to disable the ones they don't need.
Yes, it is mostly a question of book-keeping, a
If I was about to make a friendly for me Desktop, I would provide a
system service/library/daemon/whatever, where every application while
installing on the system could register (during installation) a set of
commands to be executed later with root privileges. And later ask for
execution of those
Hi
I've very interested to create to use Devuan as a base for my distro.
So I'm wonder whether live-build is also coming across from Debian?
Cheers
Ozi
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng
On Wed, 29 Jul 2015 19:44:44 +0200
Jaromil wrote:
> I mean: what would you suggest using for the
> "check a FIFO" bit you mention?
> pcre? perhaps very clean simple code?
> most code out there has too many features
> and is too ambitions to fulfill such a simple task
The first word is parsed to
Le 30/07/2015 01:09, Isaac Dunham a écrit :
On Thu, Jul 30, 2015 at 12:40:33AM +0200, Didier Kryn wrote:
I don't understand the preventions against sudo. It is just up to the
administrator to take care, like for everything.
Wether execution of the command is allowed by sudo, by a setu
On 30/07/15 03:34, Steve Litt wrote:
> Hi all,
>
> xargs is a gender-changer type program that adapts one program's stdout
> to the next program's command line arguments. It's extremely handy for
> shell scripting, but it can be tricky. I've written a short guide for
> xargs that shows how to get
Didier Kryn writes:
> Le 29/07/2015 16:35, a...@gulbrandsen.priv.no a écrit :
>> Every last problem of sudo is taken seriously? Did you know that if
>> someone has limited access, e.g. the right to install standard
>> packages, then it is easy to leverage that to get complete
>> access. Various pa
Hi Jaromil!
Jaromil wrote on 29/07/2015 at 19:44 CEST:
[...]
how I do it now? hardcode every single binary
that sudo is aloud to execute, full path
and locations that are only root writable.
that's a sudoers feature...
This is how I personally see it: In an ideal environment,
there were *no* t
Laurent Bercot writes:
[...]
>> I think I speak for most people here when I say we dislike
>> the quantity of undocumented daemons running
>> on on gnu/Linux desktop nowadays and
>> I hope we can trim that down with Devuan
>
> The real sticking point in what you just wrote is "undocumented".
>
I had JUST used Android adb as superuser so I thought for some reason
adb faithfully recreated the folder structure, but after seeing the
contents of a mysterious /data/ folder appearing in my root, it
quickly became clear any accidental human error isn't mine (not
pointing fingers at anyone, let's
- Original Message -
> From: "Isaac Dunham"
> I'm not sure where in the discussion this fits, but I thought I'd mention
> it here:
> Permitting all mount invocations via sudo does have a potential security
> hole if your mount implementation supports FUSE, as you can run an arbitrary
> com
This list has been dead for several days. Just checking . . .
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng
30 matches
Mail list logo