Hello, Jeff.
On Mon, Nov 09, 2015 at 08:26:27PM -0700, Jeff Smelser wrote:
> On Mon, Nov 9, 2015 at 6:38 PM, Michael Orlitzky wrote:
> > A major upgrade to OpenSSH is being stabilized:
> > https://bugs.gentoo.org/show_bug.cgi?id=18
> > The default of PermitRootLogin for sshd in the new v
On Tue, 10 Nov 2015 09:53:52 +, Alan Mackenzie wrote:
> By the way, anybody, what's the alternative to a password login when you
> need to login remotely as root?
key login, set "PermitRootLogin without-password" and add your public
keys to .ssh/authorized_keys
--
Neil Bothwick
WINDOWS: W
On 10/11/2015 11:53, Alan Mackenzie wrote:
Hello, Jeff.
On Mon, Nov 09, 2015 at 08:26:27PM -0700, Jeff Smelser wrote:
On Mon, Nov 9, 2015 at 6:38 PM, Michael Orlitzky wrote:
A major upgrade to OpenSSH is being stabilized:
https://bugs.gentoo.org/show_bug.cgi?id=18
The default o
On Tue, Nov 10, 2015 at 12:32 AM, Mike Gilbert wrote:
> On Mon, Nov 9, 2015 at 2:36 PM, Jarry wrote:
>> On 08-Nov-15 17:58, Mike Gilbert wrote:
>>> On Fri, Nov 6, 2015 at 12:19 PM, Jarry wrote:
I noted one strange thing today: It seems one of my servers lost "/"!
vs5-dns ~ #
On 11/09/2015 10:26 PM, Jeff Smelser wrote:
>
> The question is, why would you want root login? If your still using it,
> your doing it wrong.
Maybe, but your argument isn't convincing. How am I better off doing it
your way (what is your way)?
On 10/11/2015 16:47, Michael Orlitzky wrote:
> On 11/09/2015 10:26 PM, Jeff Smelser wrote:
>>
>> The question is, why would you want root login? If your still using it,
>> your doing it wrong.
>
> Maybe, but your argument isn't convincing. How am I better off doing it
> your way (what is your way)
On 11/10/2015 10:30 AM, Alan McKinnon wrote:
>> Maybe, but your argument isn't convincing. How am I better off doing it
>> your way (what is your way)?
>
> The most common way is to disallow all remote logins as root. Admins log
> in with their personal unpriv account using an ssh key. To become r
On Tuesday, November 10, 2015 10:58:48 AM Michael Orlitzky wrote:
> On 11/10/2015 10:30 AM, Alan McKinnon wrote:
> >> Maybe, but your argument isn't convincing. How am I better off doing it
> >> your way (what is your way)?
> >
> > The most common way is to disallow all remote logins as root. Admi
On 11/10/2015 11:13 AM, J. Roeleveld wrote:
>
> What would take longer?
> brute-forcing your root-password or a 4096 byte ssh key?
>
My password, by a lot. The password needs to be brute-forced over the
network, first of all.
And a 4096-bit public encryption key doesn't provide 4096 bits of
sec
On 11/10/2015 11:26 AM, Michael Orlitzky wrote:
> On 11/10/2015 11:13 AM, J. Roeleveld wrote:
>>
>> What would take longer?
>> brute-forcing your root-password or a 4096 byte ssh key?
>>
>
> My password, by a lot. The password needs to be brute-forced over the
> network, first of all.
I realized
Dear Gentoo users,
I'm building a new PC. I have a budget of ~$550-$650. No GPU, no special case
(I may use a card box), not even a hdd or ssd.
So, as you can see, it's pretty much "get the best CPU and mobo/ram that are
compatible with it". The problem is, which is the best one. By "best" I mean
On Tuesday 10 Nov 2015 17:47:08 Stanislav Nikolov wrote:
> Dear Gentoo users,
> I'm building a new PC. I have a budget of ~$550-$650. No GPU, no special
> case (I may use a card box), not even a hdd or ssd. So, as you can see,
> it's pretty much "get the best CPU and mobo/ram that are compatible wi
On 10/11/2015 17:58, Michael Orlitzky wrote:
> On 11/10/2015 10:30 AM, Alan McKinnon wrote:
>>> Maybe, but your argument isn't convincing. How am I better off doing it
>>> your way (what is your way)?
>>
>> The most common way is to disallow all remote logins as root. Admins log
>> in with their pe
On 11/10/2015 08:17 PM, Mick wrote:
> On Tuesday 10 Nov 2015 17:47:08 Stanislav Nikolov wrote:
>> Dear Gentoo users,
>> I'm building a new PC. I have a budget of ~$550-$650. No GPU, no special
>> case (I may use a card box), not even a hdd or ssd. So, as you can see,
>> it's pretty much "get the
On 11/10/2015 01:26 PM, Alan McKinnon wrote:
>
> I think you are approaching this problem from the wrong viewpoint. You
> have to assume an attacker has vastly more resources to bear on the
> problem than you have. Thanks to Amazon and the cloud, this is now a
> very true reality. Brute force atta
On 10/11/2015 20:37, Stanislav Nikolov wrote:
>
>
> On 11/10/2015 08:17 PM, Mick wrote:
>> On Tuesday 10 Nov 2015 17:47:08 Stanislav Nikolov wrote:
>>> Dear Gentoo users,
>>> I'm building a new PC. I have a budget of ~$550-$650. No GPU, no special
>>> case (I may use a card box), not even a hdd o
On Tue, Nov 10, 2015 at 11:55 AM, Michael Orlitzky wrote:
> On 11/10/2015 01:26 PM, Alan McKinnon wrote:
> >
> > I think you are approaching this problem from the wrong viewpoint. You
> > have to assume an attacker has vastly more resources to bear on the
> > problem than you have. Thanks to Amaz
On 11/10/2015 08:55 PM, Alan McKinnon wrote:
> On 10/11/2015 20:37, Stanislav Nikolov wrote:
>>
>> On 11/10/2015 08:17 PM, Mick wrote:
>>> On Tuesday 10 Nov 2015 17:47:08 Stanislav Nikolov wrote:
Dear Gentoo users,
I'm building a new PC. I have a budget of ~$550-$650. No GPU, no special
On 11/10/2015 02:00 PM, Jeff Smelser wrote:
>
> I guess from this your assuming that everyones passwords that have been
> hacked are god, birthdays and such?
>
Again: assume that I'm not an idiot, and that I know how to choose a
long, random password. It cannot be brute-forced. And if it could,
I am going to stop this convo. As soon as you say it cant be brute forced,
I am going to move on.
Good luck with that.
On Tue, Nov 10, 2015 at 12:17 PM, Michael Orlitzky wrote:
> On 11/10/2015 02:00 PM, Jeff Smelser wrote:
> >
> > I guess from this your assuming that everyones passwords that ha
On 2015-11-10 14:07, Stanislav Nikolov wrote:
On 11/10/2015 08:55 PM, Alan McKinnon wrote:
On 10/11/2015 20:37, Stanislav Nikolov wrote:
On 11/10/2015 08:17 PM, Mick wrote:
On Tuesday 10 Nov 2015 17:47:08 Stanislav Nikolov wrote:
Dear Gentoo users,
I'm building a new PC. I have a budget of
On 11/10/2015 09:17 PM, Michael Orlitzky wrote:
> On 11/10/2015 02:00 PM, Jeff Smelser wrote:
>> I guess from this your assuming that everyones passwords that have been
>> hacked are god, birthdays and such?
>>
> Again: assume that I'm not an idiot, and that I know how to choose a
> long, random
On 10/11/2015 21:07, Stanislav Nikolov wrote:
>
>
> On 11/10/2015 08:55 PM, Alan McKinnon wrote:
>> On 10/11/2015 20:37, Stanislav Nikolov wrote:
>>>
>>> On 11/10/2015 08:17 PM, Mick wrote:
On Tuesday 10 Nov 2015 17:47:08 Stanislav Nikolov wrote:
> Dear Gentoo users,
> I'm building a
On 11/10/2015 02:23 PM, Stanislav Nikolov wrote:
>>
> Are you sure you know how such keys work? An extremely 15 character
> password (Upper case, lower case, numbers, 8 more symbols) gives you
> ~4747561509943000 combinations. Just a simple 2048 bit
> key on the other hand (~180 of whi
On 11/10/2015 02:23 PM, Stanislav Nikolov wrote:
>
>
> On 11/10/2015 09:17 PM, Michael Orlitzky wrote:
>> On 11/10/2015 02:00 PM, Jeff Smelser wrote:
>>> I guess from this your assuming that everyones passwords that
>>> have been hacked are god, birthdays and such?
>>>
>> Again: assume that I'm
On 11/10/2015 09:25 PM, Michael Orlitzky wrote:
> On 11/10/2015 02:23 PM, Stanislav Nikolov wrote:
>> Are you sure you know how such keys work? An extremely 15 character
>> password (Upper case, lower case, numbers, 8 more symbols) gives you
>> ~4747561509943000 combinations. Just a s
On 11/10/2015 09:31 PM, Michael Orlitzky wrote:
> On 11/10/2015 02:23 PM, Stanislav Nikolov wrote:
>>
>> On 11/10/2015 09:17 PM, Michael Orlitzky wrote:
>>> On 11/10/2015 02:00 PM, Jeff Smelser wrote:
I guess from this your assuming that everyones passwords that
have been hacked are god
Again, your not understanding that brute force is not entirely how you
think it works. As a former employee of a large tech company. They are much
more cunning how they do it these days..
If you wanted to break into an account, would you really start with a and
work your way up?
Come on.
Accoun
On 11/10/2015 02:32 PM, Stanislav Nikolov wrote:
>
>
> On 11/10/2015 09:25 PM, Michael Orlitzky wrote:
>> On 11/10/2015 02:23 PM, Stanislav Nikolov wrote:
>>> Are you sure you know how such keys work? An extremely 15 character
>>> password (Upper case, lower case, numbers, 8 more symbols) gives y
Alan McKinnon wrote:
> On 10/11/2015 21:07, Stanislav Nikolov wrote:
>>
>> 8GB of RAM are waaay more than I use daily (several firefox tabs, nvim = 2Gb
>> max), I have a pretty fast SSD too. Even buying 8GB RAM and a brand new SSD,
>> I have > $450 left. Can I buy a AMD CPU that will get the job
Michael Orlitzky wrote:
> On 11/10/2015 11:13 AM, J. Roeleveld wrote:
> >
> > What would take longer?
> > brute-forcing your root-password or a 4096 byte ssh key?
> >
>
> My password, by a lot. The password needs to be brute-forced over the
> network, first of all.
>
> And a 4096-bit public e
On 11/10/2015 03:52 PM, waben...@gmail.com wrote:
>
> That's right. If an attacker has the full control over your machine
> then it doesn't make any difference.
>
> But if he can only see what you are typing, for example by a keylogger
> or by detecting the electromagentic radiation of your key
Michael Orlitzky wrote:
> On 11/10/2015 03:52 PM, waben...@gmail.com wrote:
> >
> > That's right. If an attacker has the full control over your machine
> > then it doesn't make any difference.
> >
> > But if he can only see what you are typing, for example by a
> > keylogger or by detecting th
On 11/10/2015 04:11 PM, waben...@gmail.com wrote:
>
> You can disable password login for that user on the server. Then he
> can only login via ssh key. Only with the knowledge of the root
> password it is not possible to gain root access to the server. An
> attacker also needs the ssh key. And wi
Michael Orlitzky wrote:
> On 11/10/2015 04:11 PM, waben...@gmail.com wrote:
>> You can disable password login for that user on the server. Then he
>> can only login via ssh key. Only with the knowledge of the root
>> password it is not possible to gain root access to the server. An
>> attacker als
On Mon, Nov 02, 2015 at 05:01:26PM -0800, Daniel Frey wrote:
> On 11/02/2015 04:46 PM, Philip Webb wrote:
> > 151101 Daniel Frey wrote:
> >> I had so many problems with hplip I stopped using it. I found another way
> >> to use my hp CP1025nw with foomatic and that works trouble-free.
> >
> > Don'
Dale wrote:
> Michael Orlitzky wrote:
> > On 11/10/2015 04:11 PM, waben...@gmail.com wrote:
> >> You can disable password login for that user on the server. Then
> >> he can only login via ssh key. Only with the knowledge of the root
> >> password it is not possible to gain root access to the ser
All my machines run gentoo / systemd / gnome3
On my older laptop when I plug in a data cd I get a popup suggesting
that I open it with files. All is well
On my newer laptop the disk spins up but no popup appears.
What must I configure?
On the old machine there is a directory /run/media/ with a
On Mon, Nov 09, 2015 at 08:38:20PM -0500, Michael Orlitzky wrote
> A major upgrade to OpenSSH is being stabilized:
>
> https://bugs.gentoo.org/show_bug.cgi?id=18
>
> The default of PermitRootLogin for sshd in the new version is
> "prohibit-password". If you typically log in to the root acco
Hello,
After doing a reset, I can't login.
on trying to enter password I get for a second a screen which
"This is gentoo unkown_domain", and then it get back to the login screen.
I login using tty (alt_ctrl+f1) and changed the user password, but on
trying to login again in the graphic logic, it ke
I was running and emerge -uDNavq world and accidentally closed the terminal
window.
I know the process ID as it is still running.
ps fax |grep emerge
-- 19131 pts/1 SN+ 4:03 | | \_ /usr/bin/python3.4 -b
/usr/lib/python-exec/python3.4/emerge -uDNavq world
Is there a way to ring it back to a t
Checkout app-misc/reptyr
On 11 November 2015 at 08:38, wrote:
> I was running and emerge -uDNavq world and accidentally closed the
> terminal window.
> I know the process ID as it is still running.
>
> ps fax |grep emerge
> -- 19131 pts/1 SN+ 4:03 | | \_ /usr/bin/python3.4 -b
> /usr/lib/python-
On Wednesday 11 Nov 2015 06:47:00 Alon Bar-Lev wrote:
> Checkout app-misc/reptyr
>
Also consider emerging within screen or tmux, so that you can re-attach the
terminal from any machine.
--
Regards,
Mick
signature.asc
Description: This is a digitally signed message part.
43 matches
Mail list logo