[CentOS] Kernel version in CentOS 7 pxeboot images

2016-05-09 Thread Jeff White
I have a number of machines which PXE boot using the images provided by 
CentOS here:


http://mirror.centos.org/centos/7/os/x86_64/images/pxeboot/

That gives the machines kernel 3.10.0-327.el7.x86_64.  I would like to 
move to a newer kernel as I'm seeing a serious I/O problem which I 
suspect is a kernel bug.  I thought that would be as easy as grabbing 
the files from here:


http://mirror.centos.org/centos/7.2.1511/os/x86_64/images/pxeboot/

... but that's not the case, those are the same exact files as the 
earlier ones.  These machines always PXE boot, they have no OS installed 
to their local disk.  Instead their root filesystem is on an NFS 
server.  So this is not PXE+kickstart or other provisioning system, just 
PXE then mount an NFS export for its root filesystem.


So, how would one go about creating a new vmlinuz and initrd.img the 
same way that the ones shown above were built, except with a newer 
kernel?  Also, what is upgrade.img?


--
Jeff White
HPC Systems Engineer
Information Technology Services - WSU

___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Upgrade tool for 6 to 7 migration

2016-05-09 Thread Johnny Hughes
On 05/09/2016 06:15 PM, Johnny Hughes wrote:
> On 05/09/2016 05:21 PM, Jerry Geis wrote:
>> Is the https://wiki.centos.org/TipsAndTricks/CentOSUpgradeTool
>> still not recommend?
>>
>> Is there a expected time when it will be working?
> 
> 
> I personally would never do an in place upgrade on a production machine.
>  Call it a personal bias.
> 
> The versions we have released do not work .. there are updates that need
> to be refactored and rolled in.
> 
> There are several upgrades to the tool, and I expect there will be
> another set shortly before or just after the 6.8 release.
> 
> Here are the tools used:
> 
> Pre Upgrade Assistant:
> https://git.centos.org/summary/?r=rpms/preupgrade-assistant
> 
> Upgrade Tool:
> https://git.centos.org/summary/?r=rpms/redhat-upgrade-tool
> 

I forgot the Preupgrade Assistant Contents:

https://git.centos.org/summary/rpms!preupgrade-assistant-contents

> openscap:
> http://vault.centos.org/6.7/os/Source/SPackages/openscap-1.0.10-3.el6.centos.src.rpm
> 
> As you can see, there have been several updates since the last time an
> update was rolled in (4 updates to the c6 upgrade tool, 6 upgrades to
> the preupgrade-assistant.)  The openscap might be OK as is, not 100% sure.
> 
> These packages were supposed to be community maintained, but no one has
> done the work to try to keep this updated.  I can TRY to do this (but
> not for a while), but it would be better if someone from the community
> would do it.
> 
> Thread concerning the initial tool patches:
> https://lists.centos.org/pipermail/centos-devel/2014-July/011558.html
> 
> NOTE: The patches are scrubbed from the list, but if you have archives
> of the email, they are attached to the actual mails.  The are also in
> git.centos.org now.
> 
> Another thread:
> 
> https://lists.centos.org/pipermail/centos-devel/2014-July/011632.html
> 
> and another:
> 
> https://lists.centos.org/pipermail/centos-devel/2015-October/013898.html
> 
> So, what we need is someone from the community to maintain this.  Is
> there anyone who will take a look and refactor the patches and test?
> This would be done on the centos-devel mailing list.  If you will
> maintain it .. the info is in git.centos.org, format the patches as 'git
> am' patches and I will work with you to get them into git and the
> packages built.
> 
> If we can't get someone, then I will try to do it when I have time, but
> it is not something that is a high priority and it has to come after my
> other work.  I don't know when I can get to it.





signature.asc
Description: OpenPGP digital signature
___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Upgrade tool for 6 to 7 migration

2016-05-09 Thread Johnny Hughes
On 05/09/2016 05:21 PM, Jerry Geis wrote:
> Is the https://wiki.centos.org/TipsAndTricks/CentOSUpgradeTool
> still not recommend?
> 
> Is there a expected time when it will be working?


I personally would never do an in place upgrade on a production machine.
 Call it a personal bias.

The versions we have released do not work .. there are updates that need
to be refactored and rolled in.

There are several upgrades to the tool, and I expect there will be
another set shortly before or just after the 6.8 release.

Here are the tools used:

Pre Upgrade Assistant:
https://git.centos.org/summary/?r=rpms/preupgrade-assistant

Upgrade Tool:
https://git.centos.org/summary/?r=rpms/redhat-upgrade-tool

openscap:
http://vault.centos.org/6.7/os/Source/SPackages/openscap-1.0.10-3.el6.centos.src.rpm

As you can see, there have been several updates since the last time an
update was rolled in (4 updates to the c6 upgrade tool, 6 upgrades to
the preupgrade-assistant.)  The openscap might be OK as is, not 100% sure.

These packages were supposed to be community maintained, but no one has
done the work to try to keep this updated.  I can TRY to do this (but
not for a while), but it would be better if someone from the community
would do it.

Thread concerning the initial tool patches:
https://lists.centos.org/pipermail/centos-devel/2014-July/011558.html

NOTE: The patches are scrubbed from the list, but if you have archives
of the email, they are attached to the actual mails.  The are also in
git.centos.org now.

Another thread:

https://lists.centos.org/pipermail/centos-devel/2014-July/011632.html

and another:

https://lists.centos.org/pipermail/centos-devel/2015-October/013898.html

So, what we need is someone from the community to maintain this.  Is
there anyone who will take a look and refactor the patches and test?
This would be done on the centos-devel mailing list.  If you will
maintain it .. the info is in git.centos.org, format the patches as 'git
am' patches and I will work with you to get them into git and the
packages built.

If we can't get someone, then I will try to do it when I have time, but
it is not something that is a high priority and it has to come after my
other work.  I don't know when I can get to it.

Thanks,
Johnny Hughes







signature.asc
Description: OpenPGP digital signature
___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Upgrade tool for 6 to 7 migration

2016-05-09 Thread John R Pierce

On 5/9/2016 3:21 PM, Jerry Geis wrote:

Is thehttps://wiki.centos.org/TipsAndTricks/CentOSUpgradeTool
still not recommend?

Is there a expected time when it will be working?


7 is *so* different than 6 in *so* many ways that I would /never/ 
recommend an automatic update.


--
john r pierce, recycling bits in santa cruz

___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


[CentOS] Upgrade tool for 6 to 7 migration

2016-05-09 Thread Jerry Geis
Is the https://wiki.centos.org/TipsAndTricks/CentOSUpgradeTool
still not recommend?

Is there a expected time when it will be working?

Thanks,

Jerry
___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Internal RAID controllers question

2016-05-09 Thread Warren Young
On May 9, 2016, at 12:46 PM, Valeri Galtsev  wrote:
> 
> On Mon, May 9, 2016 1:14 pm, Gordon Messmer wrote:
>> On 05/09/2016 11:01 AM, Valeri Galtsev wrote:
>>> Thanks Gordon! Yes, I know, ZFS, of course. I hear it as you definitely
>>> will use zfs for "bricks" of distributed file system, right?
>> 
>> I don't think its use case is limited to
>> that.  There aren't many spaces where I think you *shouldn't* plan to
>> use reliable filesystems (ZFS, btrfs, ReFS).
> 
> For distributed file system "brick" boxes ZFS
> (btrfs,...) may be a must, but only if distributed filesystem doesn't have
> its own mechanism ensuring file integrity, right?

No.  ZFS is superior to RAID in many respects, which makes it valuable for any 
situation where you care about data integrity, even on a desktop PC.

ObWarStory:

I have a ZFS pool on my desktop PC at home.  That pool is composed of two 
2-disk mirrors, which makes it kind of like RAID 10.  Each mirror is in a 
separate external Thunderbolt disk enclosure.  

One of those enclosures started to fail, so I removed both of the raw drives 
and put them into some cheap USB single-drive enclosures I had on hand.

That’s lesson #1: ZFS doesn’t care which bus or controller your drives are on.  
It doesn’t even care about the OS type or CPU type.  As long as the target 
system supports the features enabled on the ZFS vdev the drive came from, ZFS 
will happily attach the drives.

Because the failing enclosure made me nervous about the state of the data on 
the raw drives, I ran a ZFS scrub operation.  This is similar to the “verify” 
feature of a good hardware RAID controller, except that because ZFS adds a 
cryptographically strong hash to every stripe it writes, it can detect every 
problem a hardware RAID controller plus several others.

That’s lesson #2: ZFS scrub beats the pants off RAID verify.  This has nothing 
to do with distributed storage or bricks or anything else.  It is purely about 
data integrity.  Of all the storage you manage, which percentage of that do you 
not care about data integrity?

Hours into that scrub operation, I started to see errors!  Glad I scrubbed the 
pool, right?  But no worry, ZFS fixed each error.  I had no worry that there 
were undetectable errors, due to the cryptographically-strong hashes used on 
each block. Not only that, ZFS told me which files the errors affected, so I 
could test those files at the userspace level, to make sure ZFS’s repairs did 
the right thing.

That’s lesson #3: integrating your disk redundancy and checksumming with the 
filesystem has tangible benefits.  Hardware RAID controllers can’t tell you 
which files a given stripe belongs to.

A few hours further along, the scrub operation’s error counts started spiking.  
A lot.  Like millions of errors.  Was the hard drive dying?  No, it turned out 
to be one of the USB disk enclosures.  (Yes, it was a bad week at Warren Young 
Galactic HQ.  A certain amount of heart palpitations occurred.)  Was the scrub 
operation scribbling all over my disks?

No, and that’s lesson #4: A hardware RAID controller will refuse to return bad 
blocks in the middle of a file, but if ZFS encounters an unrecoverable error in 
the middle of a file, that file simply disappears from the filesystem.  (To 
those who think half a file is better than no file, that’s what backups are 
for.)  If ZFS lets you open a file it has reported errors on, it’s fixed the 
problem already.  You don’t have to verify the file byte-by-byte because ZFS 
scrub already did that.

After all this agida, I bought a new 2-disk enclosure with new disks and added 
those disks to the failing mirror, temporarily turning the 2-way mirror to a 
4-way mirror.  This let me replicate the failing disks onto the fresh disks in 
a secure way.  I knew that if ZFS finished resilvering that mirror, that I 
could safely drop the original pair of drives and know — in a 
cryptographically-strong way — that the new disks had an *exact* copy of the 
original disks’ data, even if one drive or the other failed to return correct 
data.

That’s lesson #4: A typical hardware RAID version of that scheme would use a 
2-disk controller, which means you’d have to swap out one of the disks for a 
fresh one, temporarily dropping to zero redundancy.  The flexibility to add 
disks to a pool independent of physical connection means I never lost any 
redundancy.  Even in the worst possible case with half the stripes on each 
disks bad, as long as those stripes zippered together, I could always recover 
each stripe during the resilver operation.

After resilvering the problem mirror, I dropped the two original disks out of 
the pool, returning the vdev to a 2-way mirror.  A subsequent scrub turned up 
*zero* problems.

And that’s lesson #5: even in the face of failing hardware, ZFS will often keep 
your data safe long enough for you to migrate the data.  It doesn’t kick whole 
drives out of the pool at the first hint of a 

[CentOS] CentOS 7.2 Installation - Anaconda Installer Security Policy Configuration

2016-05-09 Thread Michael Duvall
The Anaconda installer now provides a "Security Policy", although
selecting any of the available profiles does not seem to have much
effect on the overall installation.  Has anyone here had any success
with using the kickstart file that is installed when "Pre-release Draft
STIG for CentOS Linux 7 Server" profile is selected?  The upstream
vendor's security guide doesn't seem to offer much guidance.  All
accounts of trials and tribulations are appreciated.  My goal is to
install/verify (or as close as I can get to it) a STIG compliant CentOS
7.2 distribution.

Thanks!
Michael Duvall

___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Internal RAID controllers question

2016-05-09 Thread Gordon Messmer

On 05/09/2016 11:46 AM, Valeri Galtsev wrote:

Yes, ZFS, and thanks a lot! For distributed file system "brick" boxes ZFS
(btrfs,...) may be a must, but only if distributed filesystem doesn't have
its own mechanism ensuring file integrity, right?



Ignore distributed filesystems for a moment.  Is there any application 
for which want to allow your computer to silently corrupt your data?  My 
email archive consists of messages in individual files (Maildir), and 
I'd like to ensure that bits don't flip.  I'd like to ensure that bits 
don't flip in my music files, creating noise during playback (one 
corrupt sample could end up being pure noise played back at maximum volume).


Even for very basic, relatively unimportant purposes, I want my data in 
a reliable filesystem.


___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] C6 Firefox 45.1 segmentation faults

2016-05-09 Thread Robert Arkiletian
Ah did a yum clean all and I see them now. Thank you Nux! from all of
us using your great repo.

On Mon, May 9, 2016 at 11:50 AM, Nux!  wrote:
> Robert,
>
> Funny you should ask, I have pushed them out a few hours ago. Enjoy.
>
> --
> Sent from the Delta quadrant using Borg technology!
>
> Nux!
> www.nux.ro
>
> - Original Message -
>> From: "Robert Arkiletian" 
>> To: "CentOS mailing list" 
>> Sent: Monday, 9 May, 2016 17:29:07
>> Subject: Re: [CentOS] C6 Firefox 45.1 segmentation faults
>
>> On Wed, May 4, 2016 at 7:38 AM, Nux!  wrote:
>>> Ok, managed to rebuild most the stuff; had to retire gstreamer-vaapi though.
>>>
>>> yum --enablerepo=nux-dextop-testing update
>>>
>>> Should fix the Firefox issue, let me know if it causes any problems or other
>>> requests.
>>>
>>
>> Any ETA when these updates will make it out of nux testing?
>> ___
>> CentOS mailing list
>> CentOS@centos.org
>> https://lists.centos.org/mailman/listinfo/centos
> ___
> CentOS mailing list
> CentOS@centos.org
> https://lists.centos.org/mailman/listinfo/centos
___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] C6 Firefox 45.1 segmentation faults

2016-05-09 Thread Nux!
Robert,

Funny you should ask, I have pushed them out a few hours ago. Enjoy.

--
Sent from the Delta quadrant using Borg technology!

Nux!
www.nux.ro

- Original Message -
> From: "Robert Arkiletian" 
> To: "CentOS mailing list" 
> Sent: Monday, 9 May, 2016 17:29:07
> Subject: Re: [CentOS] C6 Firefox 45.1 segmentation faults

> On Wed, May 4, 2016 at 7:38 AM, Nux!  wrote:
>> Ok, managed to rebuild most the stuff; had to retire gstreamer-vaapi though.
>>
>> yum --enablerepo=nux-dextop-testing update
>>
>> Should fix the Firefox issue, let me know if it causes any problems or other
>> requests.
>>
> 
> Any ETA when these updates will make it out of nux testing?
> ___
> CentOS mailing list
> CentOS@centos.org
> https://lists.centos.org/mailman/listinfo/centos
___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Internal RAID controllers question

2016-05-09 Thread Valeri Galtsev

On Mon, May 9, 2016 1:14 pm, Gordon Messmer wrote:
> On 05/09/2016 11:01 AM, Valeri Galtsev wrote:
>> Thanks Gordon! Yes, I know, ZFS, of course. I hear it as you definitely
>> will use zfs for "bricks" of distributed file system, right?
>
>
> You could, I suppose, but I don't think its use case is limited to
> that.  There aren't many spaces where I think you *shouldn't* plan to
> use reliable filesystems (ZFS, btrfs, ReFS).

Yes, ZFS, and thanks a lot! For distributed file system "brick" boxes ZFS
(btrfs,...) may be a must, but only if distributed filesystem doesn't have
its own mechanism ensuring file integrity, right?

Valeri


Valeri Galtsev
Sr System Administrator
Department of Astronomy and Astrophysics
Kavli Institute for Cosmological Physics
University of Chicago
Phone: 773-702-4247

___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


[CentOS-announce] CESA-2016:0726 Important CentOS 7 ImageMagick Security Update

2016-05-09 Thread Johnny Hughes

CentOS Errata and Security Advisory 2016:0726 Important

Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-0726.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

x86_64:
b2a8db29fe7b4fed1c7b9378359d4c88a01211bed166e3ff5add087615b77df9  
ImageMagick-6.7.8.9-13.el7_2.i686.rpm
d068e1c6d31b60033be4c8205309f9a5c1420019fe6bae641aa7b6c553aa127d  
ImageMagick-6.7.8.9-13.el7_2.x86_64.rpm
6939732c18e646c7ba7d289d95828b3f74172e9c004d9e512310cd3e7476c23e  
ImageMagick-c++-6.7.8.9-13.el7_2.i686.rpm
2e50209e93c304321cb577f7e11d44dd539118b31bca513cdf61443caba34fb4  
ImageMagick-c++-6.7.8.9-13.el7_2.x86_64.rpm
554809e95be406955a731c317a6f935f4f82558532c57dccf58116fed22d26f4  
ImageMagick-c++-devel-6.7.8.9-13.el7_2.i686.rpm
c578b58a366f5f381b78293dc72912c8b0b31ef9054f554658dcea653dcd6dab  
ImageMagick-c++-devel-6.7.8.9-13.el7_2.x86_64.rpm
2f30e966f0ee5bf8fe62501f05c68823a8f967918ebd0ac311c40c671fbfade7  
ImageMagick-devel-6.7.8.9-13.el7_2.i686.rpm
d99df1ef40cf16a8e3959a4aeeb61c344ee2e8b868354c39001113ac6b70d9c6  
ImageMagick-devel-6.7.8.9-13.el7_2.x86_64.rpm
a7e225d874a23b4b8beee504b36b7ea7c4c7d11799e0eabea3a63fe0a1efcd31  
ImageMagick-doc-6.7.8.9-13.el7_2.x86_64.rpm
60661e05092b8494bb876eff3e61d5b31b303890ad6713967252fb8078c5e2b8  
ImageMagick-perl-6.7.8.9-13.el7_2.x86_64.rpm

Source:
e4ed13a3eb5d110d9131d65327d8190839bc22c779c472d355d0d7ce7af10cd2  
ImageMagick-6.7.8.9-13.el7_2.src.rpm



-- 
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #cen...@irc.freenode.net
Twitter: @JohnnyCentOS

___
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce


[CentOS-announce] CESA-2016:0726 Important CentOS 6 ImageMagick Security Update

2016-05-09 Thread Johnny Hughes

CentOS Errata and Security Advisory 2016:0726 Important

Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-0726.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

i386:
9927fd325b74569be047a6764c1d7cf869b3d1025d23a457359e6e717aca7f7f  
ImageMagick-6.7.2.7-4.el6_7.i686.rpm
8a047d350978287a19487f84f2957e234acb90c2f848ea7f501f06b622ed3490  
ImageMagick-c++-6.7.2.7-4.el6_7.i686.rpm
3bbf614460cf0b3d5aba00d191c3dec52e739a4435652f4a2bd73d205a2017bf  
ImageMagick-c++-devel-6.7.2.7-4.el6_7.i686.rpm
a10d5765d6dd94177fb308c647b4450b3e8ec798a3a9128e29b22f49242486d7  
ImageMagick-devel-6.7.2.7-4.el6_7.i686.rpm
fb886cacd41e0148a70c76a8777f825928418a257295b235120f10c59838096b  
ImageMagick-doc-6.7.2.7-4.el6_7.i686.rpm
832476e5b7b7e05727bd0985d5c9712fb7b8a4971fd74ee7b04a880e64f81891  
ImageMagick-perl-6.7.2.7-4.el6_7.i686.rpm

x86_64:
9927fd325b74569be047a6764c1d7cf869b3d1025d23a457359e6e717aca7f7f  
ImageMagick-6.7.2.7-4.el6_7.i686.rpm
369a736262ae06bb836fe5c5969f8f54b7617b360671daf8754328fb2a9ca232  
ImageMagick-6.7.2.7-4.el6_7.x86_64.rpm
8a047d350978287a19487f84f2957e234acb90c2f848ea7f501f06b622ed3490  
ImageMagick-c++-6.7.2.7-4.el6_7.i686.rpm
4acc2bc7ec94428a27d4bd8e90eb30992dcdacf442832a94900fafdee2bba161  
ImageMagick-c++-6.7.2.7-4.el6_7.x86_64.rpm
3bbf614460cf0b3d5aba00d191c3dec52e739a4435652f4a2bd73d205a2017bf  
ImageMagick-c++-devel-6.7.2.7-4.el6_7.i686.rpm
a03fe5caeda8b2b3fac19f667c7e8350c02254ec87348ef1a151e849ae089fee  
ImageMagick-c++-devel-6.7.2.7-4.el6_7.x86_64.rpm
a10d5765d6dd94177fb308c647b4450b3e8ec798a3a9128e29b22f49242486d7  
ImageMagick-devel-6.7.2.7-4.el6_7.i686.rpm
8e0fbfe3affcc5f17ecb3073fca57f983b8ea2c2743adcdad384bba29928924b  
ImageMagick-devel-6.7.2.7-4.el6_7.x86_64.rpm
190d9f774cec3c009c6d3951e4994e593d923c4f016651a5330f42dc2c0a1657  
ImageMagick-doc-6.7.2.7-4.el6_7.x86_64.rpm
6a965e6643de5e0c94036383af7901290fa2734308e9772eed371ca5bb160207  
ImageMagick-perl-6.7.2.7-4.el6_7.x86_64.rpm

Source:
c4aebf2997a43af87c792a7face16c8f259a251394d7738193a2f4151ea542ec  
ImageMagick-6.7.2.7-4.el6_7.src.rpm



-- 
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #cen...@irc.freenode.net
Twitter: @JohnnyCentOS

___
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce


Re: [CentOS] Internal RAID controllers question

2016-05-09 Thread Gordon Messmer

On 05/09/2016 11:01 AM, Valeri Galtsev wrote:

Thanks Gordon! Yes, I know, ZFS, of course. I hear it as you definitely
will use zfs for "bricks" of distributed file system, right?



You could, I suppose, but I don't think its use case is limited to 
that.  There aren't many spaces where I think you *shouldn't* plan to 
use reliable filesystems (ZFS, btrfs, ReFS).


___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Internal RAID controllers question

2016-05-09 Thread Gordon Messmer

On 05/08/2016 06:51 PM, Valeri Galtsev wrote:

In the
past LSI would be my definite second choice, and 3ware was winning me only
by their transparent web interface.



3ware had a much more pleasant web UI and CLI, but their hardware was 
terribly unreliable and their performance was pretty awful, too.


Today, your options with hardware controllers are mostly LSI with its 
gawd-awful management software, or Adaptec, or Areca.  I rarely see the 
latter controllers anywhere.  They tend to be less expensive than LSI, 
but they don't benchmark as well, and their smaller market share may 
fuel doubt about their future prospects.


And that, I think, underscores a larger point that people try to make in 
these conversations, which is: There is no rational case to group 
hardware RAID controllers together and discuss them exclusively.  There 
are pros and cons to each specific product family and no single quality 
that disqualifies discussion of other options.  That is, the differences 
between an LSI card and an Adaptec card are no less significant than the 
differences between an LSI RAID array and a software defined array.


My take is this: RAID should not be part of your long-term planning.  
Everything that's not SAN is moving to software defined storage.  
Microsoft is moving to Storage Spaces.  The UNIX world is moving toward 
ZFS and btrfs.  There are a number of reasons, including hierarchical 
storage and hybrid storage.  Most significant in my opinion though is 
that while most RAID type can detect spontaneous bit flips, they cannot 
repair them.  You may not use ZFS or btrfs today, but you should 
definitely be looking at these, long term.


___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] CentOS-6.7 problem updating kernel

2016-05-09 Thread James B. Byrne

On Mon May 9 2016 15:24:20 UTC, Jonathan Billings wrote:
>
>>On Mon, May 9, 2016 10:26, James B. Byrne wrote:
>>
>> Any ideas as to what happened and how to fix it?
>>
>
> It looks like your package update was interrupted by a
> SIGHUP signal (that's what the Hangup is from).  The
> %posttrans scriptlet for the kernel package was interrupted
> by the SIGHUP signal.  No idea what might have broken, but
> I'd suggest reinstalling that package
> 'yum resintall kernel-2.6.32-573.26.1.el6.x86_64'
> and make sure it worked.

Thank you.

I have reinstalled the kernel package as instructed and will reboot
the system after close of business today to see if that clears things
up.


-- 
***  e-Mail is NOT a SECURE channel  ***
Do NOT transmit sensitive data via e-Mail
 Do NOT open attachments nor follow links sent by e-Mail

James B. Byrnemailto:byrn...@harte-lyne.ca
Harte & Lyne Limited  http://www.harte-lyne.ca
9 Brockley Drive  vox: +1 905 561 1241
Hamilton, Ontario fax: +1 905 561 0757
Canada  L8E 3C3

___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


[CentOS] CentOS-6.5 - CD/DVD does not sense media

2016-05-09 Thread James B. Byrne
I dealing with problem 1 - see previous message - I set about creating
a live DVD on my development system.  Now I find that I cannot seem to
mount a medium in that drive.  wodim --devices reports it as present
and so does cdrecode.  I can use the eject utility to toggle the tray
open and closed.  But when I load a blank dvd or cd in that unit I get
nothing on my desktop - in other words I am not getting an auto mount,
and I cannot do anything with dd to that dev either.

wodim --devices
wodim: Overview of accessible drives (1 found) :

 0  dev='/dev/scd0' rwrw-- : 'HL-DT-ST' 'DVD-RAM GH22NS30'


cdrecord -inq
Device was not specified. Trying to find an appropriate drive...
Detected CD-R drive: /dev/cdrw
Using /dev/cdrom of unknown capabilities
Device type: Removable CD-ROM
Version: 5
Response Format: 2
Capabilities   :
Vendor_info: 'HL-DT-ST'
Identification : 'DVD-RAM GH22NS30'
Revision   : '1.01'
Device seems to be: Generic mmc2 DVD-R/DVD-RW.


But cdrecord says that their is no media present although I have
empirically determined that a blank dvd is in fact loaded into the
device:

cdrecord -load
wodim: Operation not permitted. Warning: Cannot raise RLIMIT_MEMLOCK
limits.Device was not specified. Trying to find an appropriate
drive...
Detected CD-R drive: /dev/cdrw
Using /dev/cdrom of unknown capabilities
Device type: Removable CD-ROM
Version: 5
Response Format: 2
Capabilities   :
Vendor_info: 'HL-DT-ST'
Identification : 'DVD-RAM GH22NS30'
Revision   : '1.01'
Device seems to be: Generic mmc2 DVD-R/DVD-RW.
Using generic SCSI-3/mmc   CD-R/CD-RW driver (mmc_cdr).
Driver flags   : MMC-3 SWABAUDIO BURNFREE
Supported modes: TAO PACKET SAO SAO/R96P SAO/R96R RAW/R16 RAW/R96P
RAW/R96R
Errno: 5 (Input/output error), test unit ready scsi sendcmd: no error
CDB:  00 00 00 00 00 00
status: 0x2 (CHECK CONDITION)
Sense Bytes: 70 00 02 00 00 00 00 0A 00 00 00 00 3A 01 00 00
Sense Key: 0x2 Not Ready, Segment 0

Sense Code: 0x3A Qual 0x01 (medium not present - tray closed) Fru 0x0

Sense flags: Blk 0 (not valid)
cmd finished after 0.000s timeout 40s
wodim: No disk / Wrong disk!

Any ideas as to what is happening here?

-- 
***  e-Mail is NOT a SECURE channel  ***
Do NOT transmit sensitive data via e-Mail
 Do NOT open attachments nor follow links sent by e-Mail

James B. Byrnemailto:byrn...@harte-lyne.ca
Harte & Lyne Limited  http://www.harte-lyne.ca
9 Brockley Drive  vox: +1 905 561 1241
Hamilton, Ontario fax: +1 905 561 0757
Canada  L8E 3C3

___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Internal RAID controllers question

2016-05-09 Thread Valeri Galtsev

On Mon, May 9, 2016 11:12 am, Gordon Messmer wrote:
> On 05/08/2016 06:20 PM, John R Pierce wrote:
>> there are really only two choices today, Adaptec and Avago (formerly
>> LSI, they also control the former Areca product line).
>
> I don't believe that is correct.  LSI acquired 3ware, and Avago acquired
> LSI.  So, Avago owns the 3ware and LSI technology, but Adaptec and Areca
> are still competitors.
>
>> Whoops, Avago is now Broadcom, a company I like even less for broken
>> closed source firmware and total lack of hardware documentation.
>
>
> If it makes you feel any better, Avago acquired Broadcom, not the other
> way around.  I would expect Avago's culture to be the dominant one, and
> watch for changes in Broadcom's firmware and documentation practices.

Sounds good. I've heard good predictions about LSI (most notably by
Digimer and John, and now Gordon sounds really encouraging). How about
Areca? They seem to have support for 4kn drives, are they going to be
another option for us, hardware RAID people? Their creatures were pretty
good so far in my book...


I do my best to stay away from those who ever released "fakeraid" chips
(or "software RAID"), the ones relying of "driver" (read: your system and
CPU processing RAID functions). Meaning here adaptec ;-(
If I were to do RAID without dedicated RAID card, just export me the
drives, and my system has all necessary for that.


Thanks a lot for all your insights!

Valeri


Valeri Galtsev
Sr System Administrator
Department of Astronomy and Astrophysics
Kavli Institute for Cosmological Physics
University of Chicago
Phone: 773-702-4247

___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


[CentOS-announce] CESA-2016:0724 Important CentOS 7 qemu-kvm Security Update

2016-05-09 Thread Johnny Hughes

CentOS Errata and Security Advisory 2016:0724 Important

Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-0724.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

x86_64:
846cfb9241de92a0e5b9d97817ad29c8bb9f3c9aa1353cc1ce1b30585c5ef8f1  
libcacard-1.5.3-105.el7_2.4.i686.rpm
0a8b2b9f8e975d4ef114b32604570ed39eb90121d46ae4693ed1562044f5826a  
libcacard-1.5.3-105.el7_2.4.x86_64.rpm
9c64d1ae730de8ea9767833b6e4a7923a87118166160a5a7dbe5fb06a87c756a  
libcacard-devel-1.5.3-105.el7_2.4.i686.rpm
efa6701e687a74376e0dea22d9078e8347df8d9b494270175cc1633b6a8884aa  
libcacard-devel-1.5.3-105.el7_2.4.x86_64.rpm
b55a00ab999512102c5a8b37a61662df10b5c0ba2482705f462a92b1af6089a2  
libcacard-tools-1.5.3-105.el7_2.4.x86_64.rpm
03acd54102faeabfb7821fb476617f94a818c84fb59d0ea16ecdbe53ced52b8e  
qemu-img-1.5.3-105.el7_2.4.x86_64.rpm
069a89fe852b1416b715c296b24b38d349b62128076497564bbcf12cb100a203  
qemu-kvm-1.5.3-105.el7_2.4.x86_64.rpm
5bddf9f748929676bf2b502e0813e084e20b799474558dad24d522c4e4ef32d8  
qemu-kvm-common-1.5.3-105.el7_2.4.x86_64.rpm
7e798ebafcea63fafed77f595505e4de46d93a15fe51f825c395a56728e02fb7  
qemu-kvm-tools-1.5.3-105.el7_2.4.x86_64.rpm

Source:
387ca0a04bd3b4e8f81ed89b4a95e783007ce862576ba0203c2662c487e58a41  
qemu-kvm-1.5.3-105.el7_2.4.src.rpm



-- 
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #cen...@irc.freenode.net
Twitter: @JohnnyCentOS

___
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce


Re: [CentOS] C6 Firefox 45.1 segmentation faults

2016-05-09 Thread Robert Arkiletian
On Wed, May 4, 2016 at 7:38 AM, Nux!  wrote:
> Ok, managed to rebuild most the stuff; had to retire gstreamer-vaapi though.
>
> yum --enablerepo=nux-dextop-testing update
>
> Should fix the Firefox issue, let me know if it causes any problems or other 
> requests.
>

Any ETA when these updates will make it out of nux testing?
___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


[CentOS-announce] CESA-2016:0723 Critical CentOS 7 java-1.6.0-openjdk Security Update

2016-05-09 Thread Johnny Hughes

CentOS Errata and Security Advisory 2016:0723 Critical

Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-0723.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

x86_64:
baaf85167e613fa3911ce72d225d0d4d72b28966f30032002e57770dc79a90c7  
java-1.6.0-openjdk-1.6.0.39-1.13.11.0.el7_2.x86_64.rpm
635335b8441e99ff63d2e2830b109c554bee21559e930cc2ab13c4f33c36420d  
java-1.6.0-openjdk-demo-1.6.0.39-1.13.11.0.el7_2.x86_64.rpm
3779025d57099237b1230b303dd857fee2a58f1c166a02dea4686037b8b45a6a  
java-1.6.0-openjdk-devel-1.6.0.39-1.13.11.0.el7_2.x86_64.rpm
91c5950396900fa3c4fcb83abdcb558ab401da7a9df428583b4b9e5811eb5d81  
java-1.6.0-openjdk-javadoc-1.6.0.39-1.13.11.0.el7_2.x86_64.rpm
a197021122b770710aa518ed1cfe65db24450ba9beb05ca1519a59320081931e  
java-1.6.0-openjdk-src-1.6.0.39-1.13.11.0.el7_2.x86_64.rpm

Source:
e0220b0ccf31771e35847ddb92070cb972d6d4658b51ce48d76881d72ae0aa76  
java-1.6.0-openjdk-1.6.0.39-1.13.11.0.el7_2.src.rpm



-- 
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #cen...@irc.freenode.net
Twitter: @JohnnyCentOS

___
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce


[CentOS-announce] CESA-2016:0723 Critical CentOS 5 java-1.6.0-openjdk Security Update

2016-05-09 Thread Johnny Hughes

CentOS Errata and Security Advisory 2016:0723 Critical

Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-0723.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

i386:
36e25b70ced8e7761fb2c8a54780bbe65df642bb06e29ff366e48cfe4e18ecb0  
java-1.6.0-openjdk-1.6.0.39-1.13.11.0.el5_11.i386.rpm
ca430885b7b50d5ee059e078dc87b356b4be076502a5a14a9700c7252ac369df  
java-1.6.0-openjdk-demo-1.6.0.39-1.13.11.0.el5_11.i386.rpm
d0b6acf2e1a3e8e8fa4f304058aeff951ee5012e92c526b0443a3faa256640f1  
java-1.6.0-openjdk-devel-1.6.0.39-1.13.11.0.el5_11.i386.rpm
c0f638d1d21ed240a1db1f3245e98c79d719a6f37be977c72fe6f8f45cec02a0  
java-1.6.0-openjdk-javadoc-1.6.0.39-1.13.11.0.el5_11.i386.rpm
3abc1bf9db9f917ebfff5bcece0794e48eafa977b5ef009a94a34abe646a1e29  
java-1.6.0-openjdk-src-1.6.0.39-1.13.11.0.el5_11.i386.rpm

x86_64:
baad834955029d7ea3829e3ea1f5b3ecf9a2e56b71cbb8d6f972dcbadcf960ee  
java-1.6.0-openjdk-1.6.0.39-1.13.11.0.el5_11.x86_64.rpm
d717997de759ef40154352f200ca1bb593fb031217b326b738f77004b32bf47d  
java-1.6.0-openjdk-demo-1.6.0.39-1.13.11.0.el5_11.x86_64.rpm
0cc759a6a4ca4aad7614b825ffccde9a02784ac7537ad54f7a44490cb44f5382  
java-1.6.0-openjdk-devel-1.6.0.39-1.13.11.0.el5_11.x86_64.rpm
d8c6d345a2c73c7d055f6833244599b48d932407cb748151ac5a9b52f7a071b1  
java-1.6.0-openjdk-javadoc-1.6.0.39-1.13.11.0.el5_11.x86_64.rpm
ee11396c168b9a47028eaeaba5842be9837261c2731efbf8b3d7f43c74270a1f  
java-1.6.0-openjdk-src-1.6.0.39-1.13.11.0.el5_11.x86_64.rpm

Source:
38436a18238d6215be1e3a204404d9e297a59250dfdd7b8150de657a233f37ec  
java-1.6.0-openjdk-1.6.0.39-1.13.11.0.el5_11.src.rpm



-- 
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #cen...@irc.freenode.net
Twitter: JohnnyCentOS

___
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce


Re: [CentOS] Internal RAID controllers question

2016-05-09 Thread Gordon Messmer

On 05/08/2016 06:20 PM, John R Pierce wrote:
there are really only two choices today, Adaptec and Avago (formerly 
LSI, they also control the former Areca product line).


I don't believe that is correct.  LSI acquired 3ware, and Avago acquired 
LSI.  So, Avago owns the 3ware and LSI technology, but Adaptec and Areca 
are still competitors.


Whoops, Avago is now Broadcom, a company I like even less for broken 
closed source firmware and total lack of hardware documentation. 



If it makes you feel any better, Avago acquired Broadcom, not the other 
way around.  I would expect Avago's culture to be the dominant one, and 
watch for changes in Broadcom's firmware and documentation practices.



___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] access denied from windows changing security setting when i use a folder connected to a fake drive made with dd

2016-05-09 Thread Gordon Messmer

On 05/08/2016 12:03 PM, nikos sarantopoulos wrote:

but what permissions i should set to this image
connected to a loop device



Ignore the fact that the filesystem is on a loopback device.  You will 
set permissions exactly the same way you would for any other directory.  
Generally: create a group of users in Samba AD, add the appropriate 
Samba AD users to the group, allow the group read/write access to the 
directory, and set the SGID bit so that group ownership is inherited 
from the parent directory.


___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] access denied from windows changing security setting when i use a folder connected to a fake drive made with dd

2016-05-09 Thread Gordon Messmer

On 05/08/2016 12:09 PM, nikos sarantopoulos wrote:

i join windows workstations from the computer with the properties and
switching it to a domain giving after the credentials of the Administrator
and the password of the Administrator to join the active directory domain



Again, how did you create users in the Samba AD domain?  Are you logging 
in to Windows using those AD user accounts?


___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


[CentOS-announce] CESA-2016:0723 Critical CentOS 6 java-1.6.0-openjdk Security Update

2016-05-09 Thread Johnny Hughes

CentOS Errata and Security Advisory 2016:0723 Critical

Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-0723.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

i386:
0c6fe06779a1d4d859ebdb30ed512fd057a502fb78449e4955e8e2414868159a  
java-1.6.0-openjdk-1.6.0.39-1.13.11.0.el6_7.i686.rpm
0c8ac26c02b3543e4198b1da0879b7102d4f85e4ba8dc075631d056908a7c262  
java-1.6.0-openjdk-demo-1.6.0.39-1.13.11.0.el6_7.i686.rpm
2e4b7a98603e139a0b56013225b59a73c82084648b43e5a46e89eaaa342cb276  
java-1.6.0-openjdk-devel-1.6.0.39-1.13.11.0.el6_7.i686.rpm
dedfe6741e0c5c613de3262d2f0ed8a54ddc9e73ae655a454810a962cf8e4511  
java-1.6.0-openjdk-javadoc-1.6.0.39-1.13.11.0.el6_7.i686.rpm
9d639666508200cecd87544bd5d5423bc2521e9ff5fe9144eaa3a347e08203f9  
java-1.6.0-openjdk-src-1.6.0.39-1.13.11.0.el6_7.i686.rpm

x86_64:
3b44a05ecc8050d3b820ea9b7dd994fe2c4a130566a8fb9899091a62ecac47ee  
java-1.6.0-openjdk-1.6.0.39-1.13.11.0.el6_7.x86_64.rpm
93b4ad4e1f2c8ea60df8d051d00e2f8d1ecbf564bd61433461ea951ae4a61ee8  
java-1.6.0-openjdk-demo-1.6.0.39-1.13.11.0.el6_7.x86_64.rpm
c1b3018264498d8473fd72d9ef40508d6a50b028d515cd05a09b1f6b32902e03  
java-1.6.0-openjdk-devel-1.6.0.39-1.13.11.0.el6_7.x86_64.rpm
06fb01d701b208562762f42ed91a377b647f5299b0433d0a9296491e49078959  
java-1.6.0-openjdk-javadoc-1.6.0.39-1.13.11.0.el6_7.x86_64.rpm
e69695441facf02fcc2ed64c7dbc85c0b26dc202b4a63a01905b4ff4d4cd0c1a  
java-1.6.0-openjdk-src-1.6.0.39-1.13.11.0.el6_7.x86_64.rpm

Source:
994496b319bb30306845bcc36c3657c602a01e0dab2cb029dec8b6d6528b3d56  
java-1.6.0-openjdk-1.6.0.39-1.13.11.0.el6_7.src.rpm



-- 
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #cen...@irc.freenode.net
Twitter: @JohnnyCentOS

___
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce


Re: [CentOS] CentOS-6.7 problem updating kernel

2016-05-09 Thread Jonathan Billings
On Mon, May 09, 2016 at 10:26:06AM -0400, James B. Byrne wrote:
>
> We have four identical hardware system.  On one of them the most
> recent kernel update yields this error:
> 
> # yum history info 332
> [...]
> Scriptlet output:
>1 error: %posttrans(kernel-2.6.32-573.26.1.el6.x86_64) scriptlet
> failed, signal 1
>2 /sbin/dracut: line 1:  7063 Hangup  ! ( umask
> 077; cd "$initdir"; find . | cpio -R 0:0 -H newc -o --quiet | $gzip
> -9 > "$outfile" )
> history info
> 
> 
> Any ideas as to what happened and how to fix it?

It looks like your package update was interrupted by a SIGHUP signal
(that's what the Hangup is from).  The %posttrans scriptlet for the
kernel package was interrupted by the SIGHUP signal.  No idea what
might have broken, but I'd suggest reinstalling that package 'yum
resintall kernel-2.6.32-573.26.1.el6.x86_64' and make sure it worked.

A HUP signal is often sent when the terminal closes.  Perhaps you were
running the update over SSH and disconnected prematurely?  Or your
configuration management was interrupted?  

-- 
Jonathan Billings 
___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


[CentOS-virt] New Xen-44 update for XSA-179

2016-05-09 Thread Johnny Hughes
There are new Xen-44 packages for XSA-179 in the testing repo based on
xen-4.4.4-4.el6.src.rpm

If you are using the xen-44 branch, please test and report issues to
this list.

Thanks,
Johnny Hughes



signature.asc
Description: OpenPGP digital signature
___
CentOS-virt mailing list
CentOS-virt@centos.org
https://lists.centos.org/mailman/listinfo/centos-virt


[CentOS] Samba problem

2016-05-09 Thread ploppy ploppy
Hi everybody,

I have to mount a DNS backend on Samba 4. I made a lot of search but all
send me to "samba-tool" which will allow me to create the dns backend. I
wonder if "samba-tool" is absent in the samba package ?  :s

If anyone have a piece of answer, it will be very kind.

Thank you
___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


[CentOS] CentOS-6.7 problem updating kernel

2016-05-09 Thread James B. Byrne
We have four identical hardware system.  On one of them the most
recent kernel update yields this error:

# yum history info 332
Loaded plugins: etckeeper, fastestmirror, priorities
Transaction ID : 332
Begin time : Wed May  4 10:21:07 2016
Begin rpmdb: 831:9ef9185577e3d2adb2d1ff0045619e1e0d9ed23a
User   : root 
Return-Code: ** Aborted **
Command Line   : update -y
Transaction performed with:
Installed rpm-4.8.0-47.el6.x86_64   @base
Installed yum-3.2.29-69.el6.centos.noarch   @base
Installed yum-metadata-parser-1.1.2-16.el6.x86_64   @base
Installed yum-plugin-fastestmirror-1.1.30-30.el6.noarch @base
Packages Altered:
 ** Updated initscripts-9.03.49-1.el6.centos.4.x86_64  @updates
Update  9.03.49-1.el6.centos.5.x86_64  installed
 ** Erase   kernel-2.6.32-573.7.1.el6.x86_64   @updates
Install kernel-2.6.32-573.26.1.el6.x86_64  installed
 ** Updated kernel-firmware-2.6.32-573.22.1.el6.noarch @updates
Update  2.6.32-573.26.1.el6.noarch installed
 ** Updated kernel-headers-2.6.32-573.22.1.el6.x86_64  @updates
Update 2.6.32-573.26.1.el6.x86_64  installed
 ** Updated perf-2.6.32-573.22.1.el6.x86_64@updates
Update   2.6.32-573.26.1.el6.x86_64installed
Scriptlet output:
   1 error: %posttrans(kernel-2.6.32-573.26.1.el6.x86_64) scriptlet
failed, signal 1
   2 /sbin/dracut: line 1:  7063 Hangup  ! ( umask
077; cd "$initdir"; find . | cpio -R 0:0 -H newc -o --quiet | $gzip
-9 > "$outfile" )
history info


Any ideas as to what happened and how to fix it?

-- 
***  e-Mail is NOT a SECURE channel  ***
Do NOT transmit sensitive data via e-Mail
 Do NOT open attachments nor follow links sent by e-Mail

James B. Byrnemailto:byrn...@harte-lyne.ca
Harte & Lyne Limited  http://www.harte-lyne.ca
9 Brockley Drive  vox: +1 905 561 1241
Hamilton, Ontario fax: +1 905 561 0757
Canada  L8E 3C3

___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


[CentOS] CentOS-announce Digest, Vol 135, Issue 3

2016-05-09 Thread centos-announce-request
Send CentOS-announce mailing list submissions to
centos-annou...@centos.org

To subscribe or unsubscribe via the World Wide Web, visit
https://lists.centos.org/mailman/listinfo/centos-announce
or, via email, send a message with subject or body 'help' to
centos-announce-requ...@centos.org

You can reach the person managing the list at
centos-announce-ow...@centos.org

When replying, please edit your Subject line so it is more specific
than "Re: Contents of CentOS-announce digest..."


Today's Topics:

   1. CESA-2016:0722 Important CentOS 7 openssl Security Update
  (Johnny Hughes)


--

Message: 1
Date: Mon, 9 May 2016 08:40:50 +
From: Johnny Hughes 
To: centos-annou...@centos.org
Subject: [CentOS-announce] CESA-2016:0722 Important CentOS 7 openssl
Security Update
Message-ID: <20160509084050.ga47...@n04.lon1.karan.org>
Content-Type: text/plain; charset=us-ascii


CentOS Errata and Security Advisory 2016:0722 Important

Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-0722.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

x86_64:
5e3c51d681fee532d012c93a5a112885667e775e93ef290d45d8049fcd801d75  
openssl-1.0.1e-51.el7_2.5.x86_64.rpm
4b74997828abc8b7272bf326f48eea929caaf8708196fca145b547ef467d2489  
openssl-devel-1.0.1e-51.el7_2.5.i686.rpm
6230b86f09b6eac63d2445b2ad1c0b2db6bc0500d678ce945ff791ca12f3a679  
openssl-devel-1.0.1e-51.el7_2.5.x86_64.rpm
2c0da28ab356f44800b68fffd8bdd6e77d7bea9cf2360976b6d150e6e4394e4d  
openssl-libs-1.0.1e-51.el7_2.5.i686.rpm
fa7add3a3f2c6c024359c6b031b0e71dad7ff59422786b27ffbff479413936e0  
openssl-libs-1.0.1e-51.el7_2.5.x86_64.rpm
b08aa6e4d8d1b10f2b3d6e3b06e0ab0bcb3a7ba7990f8ca9a454697fafd6fdfe  
openssl-perl-1.0.1e-51.el7_2.5.x86_64.rpm
757101009b96ace47e31a87390da9a731a3be8fa768f5791b26a5cbeff41297c  
openssl-static-1.0.1e-51.el7_2.5.i686.rpm
97d662ed69a95e9d919404f10034f17ced2e19e3024567560924743723de532f  
openssl-static-1.0.1e-51.el7_2.5.x86_64.rpm

Source:
caa1e4aa799629d23f63083c906ee7f37d8db7de81585bd5ce7cb8a444749657  
openssl-1.0.1e-51.el7_2.5.src.rpm



-- 
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #cen...@irc.freenode.net
Twitter: @JohnnyCentOS



--

___
CentOS-announce mailing list
centos-annou...@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce


End of CentOS-announce Digest, Vol 135, Issue 3
***
___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Firefox 45.1.0 stability

2016-05-09 Thread John Hodrien

On Fri, 6 May 2016, Nux! wrote:


Guys if you are using my repo on CentOS 6 then the new Firefox might not
like the old ffmpeg I ship.

There is new and apparently working stuff in my testing repo; try to upgrade
and see if that solves the problem.  Feedback welcome so I can move the
testing packages in the main repo sooner, rather than later.

yum --enablerepo=nux-dextop-testing update ffmpeg


On the test pages I had problems with, the crash is gone, and h264 video
playback works fine.

I've not seen any new problems.

jh
___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


[CentOS-announce] CESA-2016:0722 Important CentOS 7 openssl Security Update

2016-05-09 Thread Johnny Hughes

CentOS Errata and Security Advisory 2016:0722 Important

Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-0722.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

x86_64:
5e3c51d681fee532d012c93a5a112885667e775e93ef290d45d8049fcd801d75  
openssl-1.0.1e-51.el7_2.5.x86_64.rpm
4b74997828abc8b7272bf326f48eea929caaf8708196fca145b547ef467d2489  
openssl-devel-1.0.1e-51.el7_2.5.i686.rpm
6230b86f09b6eac63d2445b2ad1c0b2db6bc0500d678ce945ff791ca12f3a679  
openssl-devel-1.0.1e-51.el7_2.5.x86_64.rpm
2c0da28ab356f44800b68fffd8bdd6e77d7bea9cf2360976b6d150e6e4394e4d  
openssl-libs-1.0.1e-51.el7_2.5.i686.rpm
fa7add3a3f2c6c024359c6b031b0e71dad7ff59422786b27ffbff479413936e0  
openssl-libs-1.0.1e-51.el7_2.5.x86_64.rpm
b08aa6e4d8d1b10f2b3d6e3b06e0ab0bcb3a7ba7990f8ca9a454697fafd6fdfe  
openssl-perl-1.0.1e-51.el7_2.5.x86_64.rpm
757101009b96ace47e31a87390da9a731a3be8fa768f5791b26a5cbeff41297c  
openssl-static-1.0.1e-51.el7_2.5.i686.rpm
97d662ed69a95e9d919404f10034f17ced2e19e3024567560924743723de532f  
openssl-static-1.0.1e-51.el7_2.5.x86_64.rpm

Source:
caa1e4aa799629d23f63083c906ee7f37d8db7de81585bd5ce7cb8a444749657  
openssl-1.0.1e-51.el7_2.5.src.rpm



-- 
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #cen...@irc.freenode.net
Twitter: @JohnnyCentOS

___
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce