managed by you
in the config directory.
Even though you have set the topic as 'solved', I'm willing to take a
look at your config directory to see where the issue is coming from.
Please send:
* Your 'lb config ' command line
* The output of 'lb --version'
Am Mittwoch, 5. März 2025, 18:53:07 CET schrieb Matthias Böttcher:
> Hi Hans,
>
> maybe this caused your problem:
> Nov 06, 2024
> Commit 30d39f81 "lb config: --distribution defaults to testing"
> https://salsa.debian.org/live-team/live-build/-/commit/30d39f812e41eb81928a0
> fe1f3a4f686eb30dfa
Hi Hans,
maybe this caused your problem:
Nov 06, 2024
Commit 30d39f81 "lb config: --distribution defaults to testing"
https://salsa.debian.org/live-team/live-build/-/commit/30d39f812e41eb81928a0fe1f3a4f686eb30dfa9
Bye
Matthias
I believe, the problem is been caused by wrong informations
in /var/lib/dpkg/info from the native installed debian/stable, where I qant to
build it.
ALL *.postinst files are pointing to trixie and not to bookworm (although, the
installed packages are all from bookworm).
So, with the view on t
Hi Hans,
which version of lb are you using?
I am using the version from the Debian package live-build from "bookworm":
$ lb --version
20230502
The first thing I learned with that version from "bookworm" was that I
had to set all config directives regarding the distribution to
"bookworm" bec
On Mon 03 Mar 2025 at 22:24:57 (+0100), Hans wrote:
> So, I rechecked.
>
> After purging everything and building again, I checked the chroot. And what
> did I find?
>
> A lot of entries with "trixie" in */chroot/var/lib/dpkg/info which are mostly
> "*.postinst" files.
>
> Where are they comin
So, I rechecked.
After purging everything and building again, I checked the chroot. And what
did I find?
A lot of entries with "trixie" in */chroot/var/lib/dpkg/info which are mostly
"*.postinst" files.
Where are they coming from? These are all from installed packages, but all
packages shoul
Am Montag, 3. März 2025, 19:05:19 CET schrieben Sie:
Hi Matthias,
> Am Mo., 3. März 2025 um 13:32 Uhr schrieb Hans :
>
> At first my advice: please try debian-l...@lists.debian.org
>
done!
> My way to build debian live is not with git but according to
>
> https://live-team.pages.debian.net/li
On Mon, 3 Mar 2025 09:40:35 -0500
Jeffrey Walton wrote:
> On Mon, Mar 3, 2025 at 7:32 AM Hans wrote:
> >
> > I believe, that one of the following packages needs the missing
> > package. Please see the last output (sorry, it is bit longer):
>
> Something looks a bi
Am Mo., 3. März 2025 um 13:32 Uhr schrieb Hans :
At first my advice: please try debian-l...@lists.debian.org
My way to build debian live is not with git but according to
https://live-team.pages.debian.net/live-manual/html/live-manual/index.en.html
Usually I start with "sudo lb clean" and then
On Mon, Mar 3, 2025 at 7:32 AM Hans wrote:
>
> I believe, that one of the following packages needs the missing package.
> Please see the last output (sorry, it is bit longer):
Something looks a bit off:
$ apt-cache rdepends grub-efi-amd64-unsigned
E: No packa
So, tried agian without the */packages-lists/mylist.list.chroot and without
any added packages at */packages.chroot = same issue again.
This excludes the cause by any changes from me or by any added packages.
It is proven, the issue is in the live-build environment itself.
Hans
Good idea, Matthias, so I rechecked. There are only two packages in
packages.chroot in the last build I sent the output from.
These were "kali-undercover_2023" and "rustdesk-1.3.7". In both I checked the
"control" file, but none of them pointed to or named "grub-efi-amd64-*".
But to clear thi
On 2025-03-03 David Wright wrote:
> On Sun 02 Mar 2025 at 20:32:24 (+0100), Hans wrote:
>
> > The only thing I got, was the message from "lb build", that a ncessary
> > package
> > could not be downloaded. And the necessary package was named
> > "grub-efi-amd64-
> > unsigned".
>
> That suggests t
Hello again,
I believe, that one of the following packages needs the missing package. Please
see the last
output (sorry, it is bit longer):
Building dependency tree... Done
Reading state information... Done
The following additional packages will be installed
On Sun 02 Mar 2025 at 20:32:24 (+0100), Hans wrote:
> The only thing I got, was the message from "lb build", that a ncessary
> package
> could not be downloaded. And the necessary package was named "grub-efi-amd64-
> unsigned".
That suggests to me (with no experience of this) that its a script
ase excuse, I am not able to give any more information at the moment.
Best
Hans
> Presumably you meant "remove the dependency /on/ the missing
> package". Can you help us by /naming/ the package that depends
> on grub-efi-amd64-unsigned.
>
> Cheers,
> David.
On Sun 02 Mar 2025 at 17:44:37 (+0100), Hans wrote:
> So my idea was just to write to the live-file-maintainers, to ask them, to
> remove the dependency of the missing package in theire configurations or
> point
> it to another package, i.E. grub-efi-amd64-signed.
Presumably you m
ng it from testing will force to add
lots of other packages from testing, too. This is a lot of work and a big
chance, to make mistakes.
So my idea was just to write to the live-file-maintainers, to ask them, to
remove the dependency of the missing package in theire configurations or point
it
possible to build debian-live/stable (bookworm). The
> reason is a
> > > missing package in bookworm: grub-efi-amd64-unsigned.
> > >
> > > I rechecked and yes, it is no more in bookworm.
> >
> > Hi Hans,
> >
> > I'm sorry, but here are debian us
- shim-signed depends on grub-efi-amd64-bin
>
> > Dear maintainers,
> >
> > it is no more possible to build debian-live/stable (bookworm). The reason
> > is a
> > missing package in bookworm: grub-efi-amd64-unsigned.
> >
> > I rechecked and yes, it
> Dear maintainers,
>
> it is no more possible to build debian-live/stable (bookworm). The reason is a
> missing package in bookworm: grub-efi-amd64-unsigned.
>
> I rechecked and yes, it is no more in bookworm.
Hi Hans,
I'm sorry, but here are debian users, not maintaine
Dear maintainers,
it is no more possible to build debian-live/stable (bookworm). The reason is a
missing package in bookworm: grub-efi-amd64-unsigned.
I rechecked and yes, it is no more in bookworm. Of course, I could download it
as single package and put it in packages.chroot, but there are a
On Sun, 14 Mar 2021 21:20:39 -0400
Jude DaShiell wrote:
> Why is frobtads missing from debian repositories? The frobtads package
> makes it possible for those living outside of g.u.i. land to play tads
> games on the console.
frobtads is in Debian non-free, in Sid and Jessie:
https://packages
On Sun, Mar 14, 2021 at 21:20:39 -0400, Jude DaShiell wrote:
> Why is frobtads missing from debian repositories?
Looking at the tracker, the package is held back by "failure to build from
source" bugs, which are considered RC critical:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=836934
h
Why is frobtads missing from debian repositories? The frobtads package
makes it possible for those living outside of g.u.i. land to play tads
games on the console.
Michael Biebl wrote:
> Am 21.03.2015 um 17:36 schrieb tandread:
> > but a later "apt-get --ignore-missing" insists
> > on fetching what mysql-* was dpkg-purged
> >
> > I have tried a semi-fix of getting a
> > "--get-selections", adding the purged packages
> > as "hold" and doing a "--set-selection
On 2015-03-21, tandread wrote:
> dear debian users,
>
> I really need to have a program compiled from source
> (that is, a src dir, not a debian source package)
> Let's say, the mysql server source distribution
>
> I can remove the mysql-* deb packages with
> "dpkg --purge --force-depends"
> (I k
Am 21.03.2015 um 17:36 schrieb tandread:
> dear debian users,
>
> I really need to have a program compiled from source
> (that is, a src dir, not a debian source package)
> Let's say, the mysql server source distribution
>
> I can remove the mysql-* deb packages with
> "dpkg --purge --force-depe
dear debian users,
I really need to have a program compiled from source
(that is, a src dir, not a debian source package)
Let's say, the mysql server source distribution
I can remove the mysql-* deb packages with
"dpkg --purge --force-depends"
(I know this causes dangling lib*.so dependencies,
On 1/27/14, Brian wrote:
> On Mon 27 Jan 2014 at 09:52:03 +1100, Zenaan Harkness wrote:
>
>> On 1/27/14, Brian wrote:
>> >
>> > And if you comment out file:/// sources and uncomment the iiNet
>> > sources?
>> > No updating, of course.
>>
>> Package descriptions show again; similarly if I have bot
On Mon 27 Jan 2014 at 09:52:03 +1100, Zenaan Harkness wrote:
> On 1/27/14, Brian wrote:
> >
> > And if you comment out file:/// sources and uncomment the iiNet sources?
> > No updating, of course.
>
> Package descriptions show again; similarly if I have both sources uncommented.
We'll have
A=
On 1/27/14, Brian wrote:
> On Sun 26 Jan 2014 at 20:39:42 +1100, Zenaan Harkness wrote:
>
>> OK, /var/lib/apt/lists/ currently contains the Translation-en files
>> for _both_ my Internet/iiNet sources entry, _and_ my local file:///
>> repo entry.
>>
>> Now, when I change the sources.list to point
On Sun 26 Jan 2014 at 20:39:42 +1100, Zenaan Harkness wrote:
> OK, /var/lib/apt/lists/ currently contains the Translation-en files
> for _both_ my Internet/iiNet sources entry, _and_ my local file:///
> repo entry.
>
> Now, when I change the sources.list to point to local file:///
> sources, comm
CC'ing de...@lists.debian.org
On Sun, Jan 26, 2014 at 08:39:42PM +1100, Zenaan Harkness wrote:
>
> Now, when I change the sources.list to point to local file:///
> sources, commenting out the iiNet sources, and _not_ doing an apt-get
> update, then package long descriptions disappear! Even thoug
TADA! Repeatability:
On 1/26/14, Zenaan Harkness wrote:
> On 1/26/14, Brian wrote:
>> On Sun 26 Jan 2014 at 04:52:10 +1100, Zenaan Harkness wrote:
>>
>>> I'm currently home and running on local repo.
>>
>> With
>>deb ftp://ftp.iinet.net.au/debian/debian sid main contrib non-free
>>
>> as the
On 1/26/14, Brian wrote:
> On Sun 26 Jan 2014 at 04:52:10 +1100, Zenaan Harkness wrote:
>
>> I'm currently home and running on local repo.
>
> With
>deb ftp://ftp.iinet.net.au/debian/debian sid main contrib non-free
>
> as the only line in sources.list do you have
>ftp.iinet.net.au_debian_
On Sun 26 Jan 2014 at 04:52:10 +1100, Zenaan Harkness wrote:
> I'm currently home and running on local repo.
With
deb ftp://ftp.iinet.net.au/debian/debian sid main contrib non-free
as the only line in sources.list do you have
ftp.iinet.net.au_debian_debian_dists_sid_main_i18n_Translation
On 1/26/14, Brian wrote:
> On Sun 26 Jan 2014 at 03:03:05 +1100, Zenaan Harkness wrote:
>
>> Why would the Translation-en file disappear when I use the
>> Internet-based sources.list entry?
>
> What is the output of 'ls -l /var/lib/apt/lists/'?
$ ls -l /var/lib/apt/lists/
total 55204
-rw-r- 1
On Sun 26 Jan 2014 at 03:03:05 +1100, Zenaan Harkness wrote:
> Why would the Translation-en file disappear when I use the
> Internet-based sources.list entry?
What is the output of 'ls -l /var/lib/apt/lists/'?
--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject of
On 1/26/14, Brian wrote:
> On Sat 25 Jan 2014 at 23:32:19 +1100, Zenaan Harkness wrote:
>
>> Any pointers appreciated,
>
> The output you got would be obtained if the Translation-en file for main
> in /var/lib/apt/lists/ was missing.
When I change to Internet-based sources.list entry, the long
de
On Sat 25 Jan 2014 at 23:32:19 +1100, Zenaan Harkness wrote:
> Any pointers appreciated,
The output you got would be obtained if the Translation-en file for main
in /var/lib/apt/lists/ was missing.
--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject of "unsubscribe
Here's my (sid, not wheezy :) sources.list only line:
deb ftp://ftp.iinet.net.au/debian/debian sid main contrib non-free
This is temporary, normally I run off a usb which houses my local
repo, so that line normally looks like a deb file:///... type line.
Having made this change, I no longer have
On Mi, 18 dec 13, 13:11:30, Tom H wrote:
>
> At home, people can run "sudo bash" (or more appropriately, "sudo -s"
> or "sudo -i") but we can't do that at my current job or other at my
> previous jobs.
Is this requirement for logging purposes?
Kind regards,
Andrei
--
http://wiki.debian.org/FAQs
On Sat, Dec 14, 2013 at 10:25 AM, Gian Uberto Lauri
wrote:
>> On 14/dic/2013, at 09:09, Nemeth Gyorgy wrote:
>> 2013-12-13 17:22 keltezéssel, John Hasler írta:
...must have successfully authenticated
to execute a sudo command once
>>>
>>> Within the last 15 minutes.
>>
>> ... from
On Fri, Dec 13, 2013 at 4:50 PM, Gian Uberto Lauri wrote:
> Tom H writes:
>> In the corporate environments where I work, we are about 70 sysadmins
>> in my location and about half as much in another. We all sudo to root
>> on our more or less 11,000 systems. So by your reckoning we have 100
>> c
On Mon, Dec 16, 2013 at 7:40 PM, Gian Uberto Lauri wrote:
> Joel Rees writes:
> > On Wed, Dec 11, 2013 at 5:39 PM, Gian Uberto Lauri wrote:
> > > [...]
> > > Maybe I failed expressing that I am not completely against sudo, there
> > > are several good sudo usages and even "caching" the authen
On Wed, Dec 11, 2013 at 8:28 PM, Chris Bannister
wrote:
> On Tue, Dec 10, 2013 at 11:50:00PM +0100, Gian Uberto Lauri wrote:
>>
>> What makes root special is not the name but the numerical user id and group
>> id, bot set to zero. See /etc/passwd.
>
> Don't you have to be logged in to do that?
S
Joel Rees writes:
> On Wed, Dec 11, 2013 at 5:39 PM, Gian Uberto Lauri wrote:
> > [...]
> > Maybe I failed expressing that I am not completely against sudo, there
> > are several good sudo usages and even "caching" the authentication has
> > its very legitimate uses, and the -k and -K flags h
On Wed, Dec 11, 2013 at 5:39 PM, Gian Uberto Lauri wrote:
> [...]
> Maybe I failed expressing that I am not completely against sudo, there
> are several good sudo usages and even "caching" the authentication has
> its very legitimate uses, and the -k and -K flags help a lot in this,
> even if some
On Wed, Dec 11, 2013 at 02:13:18PM +0100, Gian Uberto Lauri wrote:
> Chris Bannister writes:
>
> > This is in a tty, so don't know what will happen in an xterm or other
> > virtual terminal.
>
> The virtual terminals usually honour ANSI escape sequences. For sure
> xterm, the rxvt family and th
The same terminal or the same shell?
--
Gian Uberto Lauri
Messaggio inviato da un tablet
> On 14/dic/2013, at 09:09, Nemeth Gyorgy wrote:
>
> 2013-12-13 17:22 keltezéssel, John Hasler írta:
>>> ...must have successfully authenticated
>>> to execute a sudo command once
>>
>> Within the last 15
2013-12-13 17:22 keltezéssel, John Hasler írta:
>> ...must have successfully authenticated
>> to execute a sudo command once
>
> Within the last 15 minutes.
... from the same terminal. Don't forget this criteria because it is
important.
--
--- Friczy ---
'Death is not a bug, it's a feature'
Tom H writes:
> On Thu, Dec 12, 2013 at 9:40 AM, Gian Uberto Lauri wrote:
> > Bob Proulx writes:
> >>
> >> Right. Because normal users can't change the system time.
> >
> > Sorry, wrong. With 'folk ALL=(ALL) ALL', user folk can run as root ANY
> > program including 'date -s'. Or at least '
Tom H writes:
> In the corporate environments where I work, we are about 70 sysadmins
> in my location and about half as much in another. We all sudo to root
> on our more or less 11,000 systems. So by your reckoning we have 100
> critical accounts but that's not how our internal and external
Tom H writes:
> ...must have successfully authenticated
> to execute a sudo command once
Within the last 15 minutes.
> ...and it must be possible for users to modify the system time without
> entering a password."
Which is, of course, not the case on Debian.
--
John Hasler
jhas...@newsguy.com
On Thu, Dec 12, 2013 at 9:40 AM, Gian Uberto Lauri wrote:
> Bob Proulx writes:
>>
>> Right. Because normal users can't change the system time.
>
> Sorry, wrong. With 'folk ALL=(ALL) ALL', user folk can run as root ANY
> program including 'date -s'. Or at least 'sudo bash', and then live
> happy w
On Wed, Dec 11, 2013 at 10:56 PM, Ralf Mardorf
wrote:
>
> http://www.paritynews.com/2013/03/05/762/sudo-authentication-bypass-vulnerability-emerges/
>
> But note! The Chaos Computer Club does publish howtos using sudo on
> Linux: http://muc.ccc.de/uberbus:ubd
>
> I don't think the Chaos Computer C
On Tue, Dec 10, 2013 at 7:59 AM, Gian Uberto Lauri wrote:
> Tom H writes:
>> On Mon, Dec 9, 2013 at 8:09 AM, Gian Uberto Lauri wrote:
>>> If some users needed to have the root power for a small set of
>>> operation, then sudo would give them that extact power, no more no
>>> less.
>>>
>>> What
Bob Proulx writes:
> Gian Uberto Lauri wrote:
> > Bob Proulx writes:
> > > How would this be accomplished? (Answer cannot contain a use of sudo!
> > > No circular logic please.)
> > > ...
> > > Right. Because normal users can't change the system time.
> >
> > Sorry, wrong. With 'folk A
Gian Uberto Lauri wrote:
> Bob Proulx writes:
> > How would this be accomplished? (Answer cannot contain a use of sudo!
> > No circular logic please.)
> > ...
> > Right. Because normal users can't change the system time.
>
> Sorry, wrong. With 'folk ALL=(ALL) ALL', user folk can run as root AN
On Thu, 2013-12-12 at 22:14 +0900, Osamu Aoki wrote:
> 'sudo sh' is as easy on finger (no shift) and do not feel as bad.
Doesn't it have any side-effects?
I wonder about the prompt of an Arch Linux install.
[rocketmouse@archlinux ~]$ ls -l /bin/sh
lrwxrwxrwx 1 root root 4 Aug 25 14:06 /bin/sh
On Thu, 12 Dec 2013 22:14:50 +0900
Osamu Aoki wrote:
> On Sun, Dec 08, 2013 at 09:09:53PM -0500, Neal Murphy wrote:
> > On Sunday, December 08, 2013 07:27:41 PM Andrei POPESCU wrote:
> > > On Du, 08 dec 13, 19:14:49, Neal Murphy wrote:
> > > > For me, I usually set up 'sudo su'
> > >
> > > sudo
On Sun, Dec 08, 2013 at 09:09:53PM -0500, Neal Murphy wrote:
> On Sunday, December 08, 2013 07:27:41 PM Andrei POPESCU wrote:
> > On Du, 08 dec 13, 19:14:49, Neal Murphy wrote:
> > > For me, I usually set up 'sudo su'
> >
> > sudo has the '-s' and '-i' switches, why mix with 'su'?
> >
> > Kind re
On 12/12/13 11:43, Gian Uberto Lauri wrote:
Iain M Conochie writes:
> > I got it about 20 years ago. Is it enough?
> Mayeb - just maybe ;)
Indeed, never be sure! :)
> > You say it. It is not bullet proof. The bullet has already pierced the
> > target once. Therefore it may happen again
Iain M Conochie writes:
> > I got it about 20 years ago. Is it enough?
> Mayeb - just maybe ;)
Indeed, never be sure! :)
> > You say it. It is not bullet proof. The bullet has already pierced the
> > target once. Therefore it may happen again.
> May - but not assured.
Indeed. You usually p
On 12/12/13 08:20, Gian Uberto Lauri wrote:
Iain M Conochie writes:
> On 11/12/13 08:01, Gian Uberto Lauri wrote:
> > > Encrypt your hard disk.
> >
> > Hoping that the encryption you use has no backdoor.
> You do understand what the peer review process is right?
I got it about 20 yea
On Thu, 2013-12-12 at 10:40 +0100, Gian Uberto Lauri wrote:
> sudo date 2101
>
> and feel younger ;)
That's a shoddy trick. I always wonder about that man:
"Foreman said he had no plans to resume his career as a boxer, but then
announced in February 2004 that he was training for one more com
Bob Proulx writes:
> Right. Because normal users can't change the system time.
Sorry, wrong. With 'folk ALL=(ALL) ALL', user folk can run as root ANY
program including 'date -s'. Or at least 'sudo bash', and then live
happy with a shell executed with the root id.
If your /etc/sudoers contains
Ralf Mardorf writes:
> http://www.paritynews.com/2013/03/05/762/sudo-authentication-bypass-vulnerability-emerges/
The attack described in the post is the kind of hijack I thought
about.
> But note! The Chaos Computer Club does publish howtos using sudo on
> Linux: http://muc.ccc.de/uberbus:ubd
Iain M Conochie writes:
> On 11/12/13 08:01, Gian Uberto Lauri wrote:
> > > Encrypt your hard disk.
> >
> > Hoping that the encryption you use has no backdoor.
> You do understand what the peer review process is right?
I got it about 20 years ago. Is it enough?
> Although not a
> magic
Ralf Mardorf writes:
> On Wed, 2013-12-11 at 15:33 +0100, Gian Uberto Lauri wrote:
> > > You need to inform yourself, to know that there's a callback for
> > > the danger to life baby bottle.
> >
> > Ouch, InsufficentEnglishSkillException! Could you help me please :)
>
> Assumed a bab
Ralf Mardorf wrote:
> http://www.paritynews.com/2013/03/05/762/sudo-authentication-bypass-vulnerability-emerges/
In the article:
... it must be possible for users to modify the system time without
entering a password.
How would this be accomplished? (Answer cannot contain a use of sudo!
No
http://www.paritynews.com/2013/03/05/762/sudo-authentication-bypass-vulnerability-emerges/
But note! The Chaos Computer Club does publish howtos using sudo on
Linux: http://muc.ccc.de/uberbus:ubd
I don't think the Chaos Computer Club folks would write a howto using
sudo, if sudo would be a securi
On Wed 11 Dec 2013 at 21:04:48 +0100, Gian Uberto Lauri wrote:
> Gentleman, the exploits are unknown to you, not to the black market
> that supplies those investing in "not perfectly legitimate software".
> Should I quote stuxnet one more time or you took the time to read how
> it reached it's not
On 11/12/13 08:01, Gian Uberto Lauri wrote:
> Encrypt your hard disk.
Hoping that the encryption you use has no backdoor.
You do understand what the peer review process is right? Although not a
magic bullet, it can help weed this out.
Choose a *very* good password.
For the encryption, I
Gentleman, the exploits are unknown to you, not to the black market that
supplies
those investing in "not perfectly legitimate software". Should I quote stuxnet
one more time or you took the time to read how it reached it's
not-network-connected intended targets?
--
Gian Uberto Lauri
Messaggi
On Wed, 2013-12-11 at 15:33 +0100, Gian Uberto Lauri wrote:
> > You need to inform yourself, to know that there's a callback for
> > the danger to life baby bottle.
>
> Ouch, InsufficentEnglishSkillException! Could you help me please :)
Assumed a baby bottle does poison the milk, because the
On Wed 11 Dec 2013 at 09:11:56 +0100, Gian Uberto Lauri wrote:
> Brian writes:
>
> > We do not worry about serious, unpublicised exploits. Their existance is
> > of little consquence for your argument as your "attackers" would not
> > know about them.
>
> Are you kidding?
About attackers bei
Ralf Mardorf writes:
> On Wed, 2013-12-11 at 14:07 +0100, Gian Uberto Lauri wrote:
> > It happens that appliances are called back by manufacturers due safety
> > issues.
>
> Debian and other distros provide security updates _and_ much more
> important, analog to a product callback, homepages
On Wed, 2013-12-11 at 14:07 +0100, Gian Uberto Lauri wrote:
> It happens that appliances are called back by manufacturers due safety
> issues.
Debian and other distros provide security updates _and_ much more
important, analog to a product callback, homepages with news about the
distro. You need t
Chris Bannister writes:
> This is in a tty, so don't know what will happen in an xterm or other
> virtual terminal.
The virtual terminals usually honour ANSI escape sequences. For sure
xterm, the rxvt family and the libvte-based ones do.
But with virtual terminals you can do something like hav
Ralf Mardorf writes:
> On Wed, 2013-12-11 at 09:39 +0100, Gian Uberto Lauri wrote:
> > Let's suppose that Debian+Ubuntu get the largest share of the
> > installed end user desktops.
>
> The tendency is that seemingly newbies start using pre-build Linux
> environments and use Linux as they wo
Chris Bannister writes:
> On Tue, Dec 10, 2013 at 11:50:00PM +0100, Gian Uberto Lauri wrote:
> >
> > What makes root special is not the name but the numerical user id and
> > group id, bot set to zero. See /etc/passwd.
>
> Don't you have to be logged in to do that?
Gentleman???
I was si
On Tue, Dec 10, 2013 at 11:11:34PM +, Lisi Reisz wrote:
> On Tuesday 10 December 2013 06:39:17 Tom H wrote:
> > You can't trust yourself with sudo but you can trust yourself with
> > su or login root access...
>
> I have to make a conscious effort to become root. This reduces the
> risk that
On Wed, 2013-12-11 at 09:39 +0100, Gian Uberto Lauri wrote:
> Let's suppose that Debian+Ubuntu get the largest share of the
> installed end user desktops.
The tendency is that seemingly newbies start using pre-build Linux
environments and use Linux as they would use Windows, IOW without
self-respo
On Tue, Dec 10, 2013 at 11:50:00PM +0100, Gian Uberto Lauri wrote:
>
> What makes root special is not the name but the numerical user id and group
> id, bot set to zero. See /etc/passwd.
Don't you have to be logged in to do that?
The issue was that there would be only one exploitable account, i
Ralf Mardorf writes:
> On Di, 2013-12-10 at 23:54 +0100, Gian Uberto Lauri wrote:
> > Clever attacks manifest themselves a long time after the "infection" in
> > order
> > to poison backups. And backup media may fail when they are most needed.
> > That's an effect of Murphy's law :).
>
> R
Brian writes:
> We do not worry about serious, unpublicised exploits. Their existance is
> of little consquence for your argument as your "attackers" would not
> know about them.
Are you kidding?
> If what you are referring to is what I think it is then no machines were
> ever harmed. Not
> Encrypt your hard disk.
Hoping that the encryption you use has no backdoor.
> Choose a *very* good password.
For the encryption, I suppose. That once one has his hands on the
hardware there is no user/prom/bios password stopping his intrusion.
> Unless they are a honey trap - and then you
On Di, 2013-12-10 at 23:54 +0100, Gian Uberto Lauri wrote:
> Clever attacks manifest themselves a long time after the "infection" in order
> to poison backups. And backup media may fail when they are most needed.
> That's an effect of Murphy's law :).
Read about my backup strategy below. Only one
On Tue 10 Dec 2013 at 23:50:00 +0100, Gian Uberto Lauri wrote:
>
>
> > On 10/dic/2013, at 20:46, Brian wrote:
>
> > Quite possibly this is a technique which is tried but, in a default
> > install, Debian does not provide any faulty services.
> >
>
> You are never sure about not-yet publicize
On Tuesday, December 10, 2013 05:56:24 PM Lisi Reisz wrote:
> On Tuesday 10 December 2013 16:50:54 Nate Bargmann wrote:
> > I presume that entering a password in those fields results in root
> > having its own password and the first user account not being a
> > member of the sudo group.
>
> That i
On Tuesday 10 December 2013 06:39:17 Tom H wrote:
> You can't trust yourself with sudo but you can trust yourself with
> su or login root access...
I have to make a conscious effort to become root. This reduces the
risk that I will accidentally do something extra foolish. I do not
have root lo
Clever attacks manifest themselves a long time after the "infection" in order
to poison backups. And backup media may fail when they are most needed.
That's an effect of Murphy's law :).
--
Gian Uberto Lauri
Messaggio inviato da un tablet
> On 10/dic/2013, at 21:54, Ralf Mardorf wrote:
>
>> On
> On 10/dic/2013, at 20:46, Brian wrote:
> Quite possibly this is a technique which is tried but, in a default
> install, Debian does not provide any faulty services.
>
You are never sure about not-yet publicized exploits.
And some time ago there was a problem with sone ssh code that
should
On Tuesday 10 December 2013 16:50:54 Nate Bargmann wrote:
> I presume that entering a password in those fields results in root
> having its own password and the first user account not being a
> member of the sudo group.
That is what I assumed, but as a result of this thread I just tested.
I have
On Di, 2013-12-10 at 21:44 +, Brian wrote:
> On Tue 10 Dec 2013 at 15:32:57 -0600, Nate Bargmann wrote:
>
> > I was guessing that it refered to Display 0:0 of the X server as the
> > discussion centered on running X as root at one point.
>
> May I withdraw my "More than likely"? There has to
On Tue 10 Dec 2013 at 15:32:57 -0600, Nate Bargmann wrote:
> I was guessing that it refered to Display 0:0 of the X server as the
> discussion centered on running X as root at one point.
May I withdraw my "More than likely"? There has to be a time when the
guessing has to cease,
--
To UNSUBSCR
I was guessing that it refered to Display 0:0 of the X server as the
discussion centered on running X as root at one point.
- Nate
--
"The optimist proclaims that we live in the best of all
possible worlds. The pessimist fears this is true."
Ham radio, Linux, bikes, and more: http://www.n0nb.
1 - 100 of 172 matches
Mail list logo