Re: gthumb crash (after enabling vdpau?)

2018-04-10 Thread John Pilkington
On 10/04/18 06:04, Eyal Lebedinsky wrote: If anyone is interested, this is now on redhat bugzilla https://bugzilla.redhat.com/show_bug.cgi?id=1564794 HTH On 03/04/18 11:21, Eyal Lebedinsky wrote: I recently replaced my graphics card (with NVIDIA GT 710). A newer nvidia module was installed

Borgmatic

2018-04-10 Thread Patrick O'Callaghan
I've recently started experimenting with Borg as a deduplicating backup system ('dnf install borgbackup'). Think 'duplicity' on steroids. However there are many quite complex configuration options and a number of efforts exist to make things simpler for the average user, especially when setting up

Re: Borgmatic

2018-04-10 Thread Ed Greshko
On 04/10/18 19:30, Patrick O'Callaghan wrote: > I've recently started experimenting with Borg as a deduplicating > backup system ('dnf install borgbackup'). Think 'duplicity' on steroids. > However there are many quite complex configuration options and a number > of efforts exist to make things sim

Re: Borgmatic

2018-04-10 Thread Patrick O'Callaghan
On Tue, 2018-04-10 at 20:16 +0800, Ed Greshko wrote: > On 04/10/18 19:30, Patrick O'Callaghan wrote: > > I've recently started experimenting with Borg as a deduplicating > > backup system ('dnf install borgbackup'). Think 'duplicity' on steroids. > > However there are many quite complex configurati

Re: Borgmatic

2018-04-10 Thread Todd Zullinger
Patrick O'Callaghan wrote: > On Tue, 2018-04-10 at 20:16 +0800, Ed Greshko wrote: >> I don't know the "official or approved" process but looking in koji I see >> that >> Benjamin Pereto is doing all the builds and >> appears in the >> changelog. So, being the dummy I am I'd email him. :-) :-)

Re: Borgmatic

2018-04-10 Thread Patrick O'Callaghan
On Tue, 2018-04-10 at 11:53 -0400, Todd Zullinger wrote: > Patrick O'Callaghan wrote: > > On Tue, 2018-04-10 at 20:16 +0800, Ed Greshko wrote: > > > I don't know the "official or approved" process but looking in koji I see > > > that > > > Benjamin Pereto is doing all the builds and > > > appear

HW and SW threats: how to block?

2018-04-10 Thread home user via users
Good afternoon, background: In the past few months, I've seen a few articles on the internet about coin mining, also called cryptojacking. Seems that in a variety of ways, software can be loaded onto remote computers and then run to mine crypto-currency, often without the user knowing it. Thi

Re: HW and SW threats: how to block?

2018-04-10 Thread Rick Stevens
On 04/10/2018 12:18 PM, home user via users wrote: > Good afternoon, > > background: > In the past few months, I've seen a few articles on the internet about coin > mining, also called cryptojacking. Seems that in a variety of ways, software > can be loaded onto remote computers and then run to

Re: HW and SW threats: how to block?

2018-04-10 Thread Matthew Miller
On Tue, Apr 10, 2018 at 01:03:18PM -0700, Rick Stevens wrote: > I've never understood the underlying concept of bitcoin/xmr/whatever > mining. Currency (money) is usually tied, ultimately, to some physical > thing. This just seems nebulous. Are they using our systems to come up > with better crypto

Re: HW and SW threats: how to block?

2018-04-10 Thread Joe Zeff
On 04/10/2018 01:03 PM, Rick Stevens wrote: 4. Use a highly restrictive firewall. Mine's set up so that NOTHING unsolicited gets in except ssh from specific IPs and DNS responses. That's a good idea, but remember, DNS responses aren't unsolicited; they're replies to queries you sent out. 5

Re: HW and SW threats: how to block?

2018-04-10 Thread Rick Stevens
On 04/10/2018 01:11 PM, Matthew Miller wrote: > On Tue, Apr 10, 2018 at 01:03:18PM -0700, Rick Stevens wrote: >> I've never understood the underlying concept of bitcoin/xmr/whatever >> mining. Currency (money) is usually tied, ultimately, to some physical >> thing. This just seems nebulous. Are the

Re: HW and SW threats: how to block?

2018-04-10 Thread Rick Stevens
On 04/10/2018 01:22 PM, Joe Zeff wrote: > On 04/10/2018 01:03 PM, Rick Stevens wrote: >> 4. Use a highly restrictive firewall. Mine's set up so that NOTHING >> unsolicited gets in except ssh from specific IPs and DNS responses. >> > > That's a good idea, but remember, DNS responses aren't unsolici

Re: HW and SW threats: how to block?

2018-04-10 Thread Bruno Wolff III
On Tue, Apr 10, 2018 at 13:40:44 -0700, Rick Stevens wrote: True, but old DNS uses UDP and thus the responses aren't "related" to a given query (a stateful firewall couldn't necessarily determine that an incoming DNS UDP reply was solicited or not). I think related is fudged for UDP by noting

Re: HW and SW threats: how to block?

2018-04-10 Thread Rick Stevens
On 04/10/2018 02:03 PM, Bruno Wolff III wrote: > On Tue, Apr 10, 2018 at 13:40:44 -0700, >  Rick Stevens wrote: >> True, but old DNS uses UDP and thus the responses aren't "related" to a >> given query (a stateful firewall couldn't necessarily determine that an >> incoming DNS UDP reply was solici

Re: HW and SW threats: how to block?

2018-04-10 Thread Ed Greshko
On 04/11/18 07:27, Rick Stevens wrote: > I seem to recall the same thing, that iptables opens incoming UDP port > 53 for some period of time if it saw an outgoing UDP port 53 request. > And I, like you, can't recall what that period was--although I think > it was 60 seconds. That's still more than

Re: HW and SW threats: how to block?

2018-04-10 Thread Rick Stevens
On 04/10/2018 06:13 PM, Ed Greshko wrote: > On 04/11/18 07:27, Rick Stevens wrote: >> I seem to recall the same thing, that iptables opens incoming UDP port >> 53 for some period of time if it saw an outgoing UDP port 53 request. >> And I, like you, can't recall what that period was--although I thi

Re: HW and SW threats: how to block?

2018-04-10 Thread Ed Greshko
On 04/11/18 09:46, Rick Stevens wrote: > On 04/10/2018 06:13 PM, Ed Greshko wrote: >> On 04/11/18 07:27, Rick Stevens wrote: >>> I seem to recall the same thing, that iptables opens incoming UDP port >>> 53 for some period of time if it saw an outgoing UDP port 53 request. >>> And I, like you, can'

Re: HW and SW threats: how to block?

2018-04-10 Thread Ed Greshko
On 04/11/18 10:45, Ed Greshko wrote: > > Yes, conntrack is the module which controls this.  I believe you can modify > the time > by changing the value of /proc/sys/net/netfilter/nf_conntrack_udp_timeout or > maybe > nf_conntrack_udp_timeout_stream.  I'm guessing the former.  The little > docume

Re: HW and SW threats: how to block?

2018-04-10 Thread Gordon Messmer
On 04/10/2018 06:46 PM, Rick Stevens wrote: Yes, I probably didn't say it well. I was inferring that if an outgoing UDP destination port 53 request was sent, then I think the iptables conntrack plugin opens incoming UDP traffic with a source port of 53 for some period of time, since this was (the

Re: HW and SW threats: how to block?

2018-04-10 Thread jdow
On 20180410 18:46, Rick Stevens wrote: On 04/10/2018 06:13 PM, Ed Greshko wrote: On 04/11/18 07:27, Rick Stevens wrote: I seem to recall the same thing, that iptables opens incoming UDP port 53 for some period of time if it saw an outgoing UDP port 53 request. And I, like you, can't r

Re: gthumb crash (after enabling vdpau?)

2018-04-10 Thread Eyal Lebedinsky
On 03/04/18 11:21, Eyal Lebedinsky wrote: I recently replaced my graphics card (with NVIDIA GT 710). A newer nvidia module was installed kmod-nvidia-340xx-4.15.7-200 -> kmod-nvidia-390.42-1 I also enabled VDPAU which was incorrectly installed until now. I now have a failure of 'gthumb' [t