Re: [CentOS] AMD Ryzen and CentOS
On Fri, 30 Jun 2017 00:05:52 -0400 "Yves Bellefeuille" wrote: > James A. Peltier wrote: > > > While I can't assure you that upgrading to 7 will fix the problem, > > the likeliness that will work is at least 50% better being as 7 is > > based on a newer kernel. > > I've installed CentOS 7 with the latest kernel from elrepo (4.11.8), > and I can't get Grub to install. I think I'll have to conclude that it > really doesn't work with Ryzen. :-( I have a Desktop system With both Centos 6 and Centos 7 on it, and it works fine with my Ryzen 1700X cpu. Centos 6 preexisten on the system before I upgraded it to Ryzen, Centos 7 was installed with Ryzen. Never had any problems. Allan. ___ CentOS mailing list CentOS@centos.org https://lists.centos.org/mailman/listinfo/centos
[CentOS] rsync and cause/source of an empty file
We transfer files from a VAN provider at 15 minute intervals using rsync over ssh. The setup is somewhat complicated in that the VAN will not permit direct rsync access and so we establish the link via sshfs and then mount remote location as local. My question is, given the above conditions and the following rsync command: /usr/bin/rsync --chmod=o+r --chmod=g+w --itemize-changes --remove-sent-files --times /var/spool/imanet/pick_up/* /var/spool/imanet/drop_off Under what circumstances would a file containing data at the remote end (/var/spool/imanet/pick_up/) arrive at our end (/var/spool/imanet/drop_off) as an empty file? No transmission errors were logged and multiple files were transferred during the same session. All but one arrived with their contents intact. -- *** e-Mail is NOT a SECURE channel *** Do NOT transmit sensitive data via e-Mail Do NOT open attachments nor follow links sent by e-Mail James B. Byrnemailto:byrn...@harte-lyne.ca Harte & Lyne Limited http://www.harte-lyne.ca 9 Brockley Drive vox: +1 905 561 1241 Hamilton, Ontario fax: +1 905 561 0757 Canada L8E 3C3 ___ CentOS mailing list CentOS@centos.org https://lists.centos.org/mailman/listinfo/centos
[CentOS] C7 and spoofed MAC address
Got a problem: a user's workstation froze. He wound up rebooting, without calling me in first, so I dunno. But, and this is a show-stopper, when it came up, it came up with the firmware MAC, not the spoofed one. In /etc/sysconfig/network-scripts/ifcg-eth0, I've got the spoofed MAC address, and a UUID. In the grub.conf, I've got net.ifnames=0 biosdevname=0. But when I logged onto his machine, ip a showed eth0... but with the firmware MAC. And I'm wondering if it went to renew its IP address, and lost the spoofed MAC. That might explain his freezes. Anyway, does anyone have any idea if there's some networkmangler or systemd configuration that would force it to pay attention? Note that my hack to fix it was ifdown eth0/ifup eth0, and it's fine. mark ___ CentOS mailing list CentOS@centos.org https://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] ***SPAM*** [Fwd: CIA Outlaw Country attack against CentOS / Rhel (and Fedora?) Is this credible?]
On Fri, June 30, 2017 10:47 am, Dario Lesca wrote: > Do you know this? > Dario > > --- Messaggio inoltrato --- > Da: stan > Reply-to: Community support for Fedora users > > A: us...@lists.fedoraproject.org > Oggetto: CIA Outlaw Country attack against CentOS / Rhel (and Fedora?) > Is this credible? > Data: Thu, 29 Jun 2017 15:51:43 -0700 > > Wikileaks released a document about an attack against CentOS / Rhel. > > https://wikileaks.org/vault7/#OutlawCountry My taxpayer's money at work ;-) ...against me that is ;-( Valeri > > Here's the text, there are some docs there also. > > OutlawCountry > 29 June, 2017 > > Today, June 29th 2017, WikiLeaks publishes documents from the > OutlawCountry project of the CIA that targets computers running the > Linux operating system. OutlawCountry allows for the redirection of all > outbound network traffic on the target computer to CIA controlled > machines for ex- and infiltration purposes. The malware consists of a > kernel module that creates a hidden netfilter table on a Linux target; > with knowledge of the table name, an operator can create rules that > take precedence over existing netfilter/iptables rules and are > concealed from an user or even system administrator. > > The installation and persistence method of the malware is not described > in detail in the document; an operator will have to rely on the > available CIA exploits and backdoors to inject the kernel module into a > target operating system. OutlawCountry v1.0 contains one kernel module > for 64-bit CentOS/RHEL 6.x; this module will only work with default > kernels. Also, OutlawCountry v1.0 only supports adding covert DNAT > rules to the PREROUTING chain. > > > My first take is that this doesn't represent a very serious threat.  Do > you disagree? > ___ > users mailing list -- us...@lists.fedoraproject.org > To unsubscribe send an email to users-le...@lists.fedoraproject.org > -- > Dario Lesca > (inviato dal mio Linux Fedora 25 Workstation) > ___ > CentOS mailing list > CentOS@centos.org > https://lists.centos.org/mailman/listinfo/centos > Valeri Galtsev Sr System Administrator Department of Astronomy and Astrophysics Kavli Institute for Cosmological Physics University of Chicago Phone: 773-702-4247 ___ CentOS mailing list CentOS@centos.org https://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] [Fwd: CIA Outlaw Country attack against CentOS / Rhel (and Fedora?) Is this credible?]
On 30.06.2017 18:11, Yves Bellefeuille wrote: Do you know this? "For operational use, shell access is assumed, and root privileges are required." It's not much of a secret that you can mess with a system if you have root access... and in case you restart the box, this hack is gone :-) ___ CentOS mailing list CentOS@centos.org https://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] [Fwd: CIA Outlaw Country attack against CentOS / Rhel (and Fedora?) Is this credible?]
> Do you know this? "For operational use, shell access is assumed, and root privileges are required." It's not much of a secret that you can mess with a system if you have root access... Yves Bellefeuille ___ CentOS mailing list CentOS@centos.org https://lists.centos.org/mailman/listinfo/centos
[CentOS] [Fwd: CIA Outlaw Country attack against CentOS / Rhel (and Fedora?) Is this credible?]
Do you know this? Dario --- Messaggio inoltrato --- Da: stan Reply-to: Community support for Fedora users A: us...@lists.fedoraproject.org Oggetto: CIA Outlaw Country attack against CentOS / Rhel (and Fedora?) Is this credible? Data: Thu, 29 Jun 2017 15:51:43 -0700 Wikileaks released a document about an attack against CentOS / Rhel. https://wikileaks.org/vault7/#OutlawCountry Here's the text, there are some docs there also. OutlawCountry 29 June, 2017 Today, June 29th 2017, WikiLeaks publishes documents from the OutlawCountry project of the CIA that targets computers running the Linux operating system. OutlawCountry allows for the redirection of all outbound network traffic on the target computer to CIA controlled machines for ex- and infiltration purposes. The malware consists of a kernel module that creates a hidden netfilter table on a Linux target; with knowledge of the table name, an operator can create rules that take precedence over existing netfilter/iptables rules and are concealed from an user or even system administrator. The installation and persistence method of the malware is not described in detail in the document; an operator will have to rely on the available CIA exploits and backdoors to inject the kernel module into a target operating system. OutlawCountry v1.0 contains one kernel module for 64-bit CentOS/RHEL 6.x; this module will only work with default kernels. Also, OutlawCountry v1.0 only supports adding covert DNAT rules to the PREROUTING chain. My first take is that this doesn't represent a very serious threat. Do you disagree? ___ users mailing list -- us...@lists.fedoraproject.org To unsubscribe send an email to users-le...@lists.fedoraproject.org -- Dario Lesca (inviato dal mio Linux Fedora 25 Workstation) ___ CentOS mailing list CentOS@centos.org https://lists.centos.org/mailman/listinfo/centos
[CentOS] The case of C6, grub, and the missing menu
An important server accidentally got rebooted yesterday (ahem, shuffle). On boot, it insisited on an fsck. So I rebooted, intending to get to the grub boot menu, and tell it fastboot. Nope. In grub.ocnf, it's got timeout=5, but I'd see the std. POST, a blank for a very short time, then it would be booting. By repeatedly type "e" I got into the menu once or twice, but trying to edit a line, it would suddenly start typing 8.8.8.8... by itself (and no, the keyboard's just fine, thank you). The question is, why did it never offer me the menu? Everything looks normal to me in the grub.conf. mark ___ CentOS mailing list CentOS@centos.org https://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] icecc/icecream for CentOS 7
On Fri, Jun 30, 2017 at 11:59:53AM +0200, Danny Smit wrote: > I noticed that with CentOS 6 a iceream package was provided by the > epel repositories. With CentOS 7 this package is not included anymore. > Does anyone know if there is a chance it will be included in the epel > (or some other thirdparty) repository for CentOS 7 again? Or if there > is a better place to ask this question? If you'd like it to be packaged in EPEL, I suggest filing a Bugzilla ticket with the maintainers: https://apps.fedoraproject.org/packages/icecream/bugs/all Even better, you can volunteer to maintain it, if you're a package maintainer. -- Jonathan Billings ___ CentOS mailing list CentOS@centos.org https://lists.centos.org/mailman/listinfo/centos
[CentOS] CentOS-announce Digest, Vol 148, Issue 9
Send CentOS-announce mailing list submissions to centos-annou...@centos.org To subscribe or unsubscribe via the World Wide Web, visit https://lists.centos.org/mailman/listinfo/centos-announce or, via email, send a message with subject or body 'help' to centos-announce-requ...@centos.org You can reach the person managing the list at centos-announce-ow...@centos.org When replying, please edit your Subject line so it is more specific than "Re: Contents of CentOS-announce digest..." Today's Topics: 1. CEBA-2017:1609 CentOS 7 libguestfs BugFix Update (Johnny Hughes) 2. CEBA-2017:1603 CentOS 7 xmvn BugFix Update (Johnny Hughes) 3. CEBA-2017:1604 CentOS 7 chkconfig BugFix Update (Johnny Hughes) 4. CEEA-2017:1602 CentOS 7 conntrack-tools Enhancement Update (Johnny Hughes) 5. CEBA-2017:1605 CentOS 7 sssd BugFix Update (Johnny Hughes) 6. CEBA-2017:1607 CentOS 7 xfsprogs BugFix Update (Johnny Hughes) 7. CEBA-2017:1612 CentOS 7 ghostscript BugFix Update (Johnny Hughes) 8. CEBA-2017:1610 CentOS 7 pki-core BugFix Update (Johnny Hughes) 9. CEBA-2017:1617 CentOS 7 lvm2 BugFix Update (Johnny Hughes) 10. CEBA-2017:1613 CentOS 7 dracut BugFix Update (Johnny Hughes) 11. CEBA-2017:1606 CentOS 7 cyrus-imapd BugFix Update (Johnny Hughes) 12. CEBA-2017:1608 CentOS 7 pacemaker BugFix Update (Johnny Hughes) 13. CEBA-2017:1618 CentOS 7 gawk BugFix Update (Johnny Hughes) 14. CEBA-2017:1611 CentOS 7 python-dmidecode BugFix Update (Johnny Hughes) 15. CEBA-2017:1614 CentOS 7 python-rhsm BugFix Update (Johnny Hughes) 16. CESA-2017:1581 Important CentOS 7 freeradius Security Update (Johnny Hughes) 17. CESA-2017:1576 Important CentOS 7 mercurial Security Update (Johnny Hughes) 18. CESA-2017:1615 Important CentOS 7 kernel Security Update (Johnny Hughes) -- Message: 1 Date: Thu, 29 Jun 2017 17:07:35 + From: Johnny Hughes To: centos-annou...@centos.org Subject: [CentOS-announce] CEBA-2017:1609 CentOS 7 libguestfs BugFix Update Message-ID: <20170629170735.ga51...@n04.lon1.karan.org> Content-Type: text/plain; charset=us-ascii CentOS Errata and Bugfix Advisory 2017:1609 Upstream details at : https://rhn.redhat.com/errata/RHBA-2017-1609.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 3bc00ec8416dc71bf1edaae51a26d1cc2007b190f4652a640404590040aa7220 libguestfs-1.32.7-3.el7_3.3.x86_64.rpm d81045bdffdfcac4b9cba45334a29aea490ea81d059f71c2ceabf83be01ceabb libguestfs-bash-completion-1.32.7-3.el7_3.3.noarch.rpm 89cee59bdada188199c77fd53874606c73e5f3f8d55370c779cc2e581eb9b426 libguestfs-devel-1.32.7-3.el7_3.3.x86_64.rpm 82edf717ccf6e9a2900dd416865766a29e78ee7b3afa447c43751dec66a1fc77 libguestfs-gfs2-1.32.7-3.el7_3.3.x86_64.rpm 2d7ee1b8d0663e9f60c61be4bd17d1b805fbbc952511ba08f1c402b9ba088b18 libguestfs-gobject-1.32.7-3.el7_3.3.x86_64.rpm 4c71337fc5990e127162ed97b9001f193c0fdab8b49a7bbb6df501efd02840e5 libguestfs-gobject-devel-1.32.7-3.el7_3.3.x86_64.rpm 428a5b70671c7920169a4c282416688f1340280ac18f55c9a2d55ad85ec88919 libguestfs-gobject-doc-1.32.7-3.el7_3.3.noarch.rpm 8cd115bd590fa6106bac46f54a6f9559b5dfdd9962a2784c52c9e1a0a8b2cf90 libguestfs-inspect-icons-1.32.7-3.el7_3.3.noarch.rpm f6506c6b1f6f98d147d4a2534b915afb77a7d49bd74a66c751d1bdf9ea12393d libguestfs-java-1.32.7-3.el7_3.3.x86_64.rpm 8ef4aa48ceb034249d155d13fe5a700aaf361f9aa50706cb11f25ff0cb1dd67c libguestfs-java-devel-1.32.7-3.el7_3.3.x86_64.rpm 0c989fd195095d8faa42bd622030d90c45c1952285ac33a58cae22a7918df356 libguestfs-javadoc-1.32.7-3.el7_3.3.noarch.rpm 413ae6286b50c67a3161270e9892ea5427f3378da72b4fa8c2e84279255dfa0f libguestfs-man-pages-ja-1.32.7-3.el7_3.3.noarch.rpm 155e42548cf33428e1df8876183cc4e24d86afdf051e84d0ca588e4fbd3f730f libguestfs-man-pages-uk-1.32.7-3.el7_3.3.noarch.rpm f02e1a5dcec64e0084cb671a94071a25427784c65ae3cffb98900e816f2750a2 libguestfs-rescue-1.32.7-3.el7_3.3.x86_64.rpm 7046fe473764459192af471cbce20b4f0b992b95bb6c2224ea3d0645d9b35d71 libguestfs-rsync-1.32.7-3.el7_3.3.x86_64.rpm 83dcc680aeba317fa4996264c4c00dc786e462f7bfd29628cbe4c5217b62114b libguestfs-tools-1.32.7-3.el7_3.3.noarch.rpm 5ac63f85e510e29ef9d73835218e26f1086ed1e8ca2ca9553dfd6d25a701 libguestfs-tools-c-1.32.7-3.el7_3.3.x86_64.rpm a71b8252039fa2cc104153fa695c305b41bc78fb00f8fa00945c85cc494cc1c8 libguestfs-xfs-1.32.7-3.el7_3.3.x86_64.rpm e4876c5eb4ce821bb3b9e8d5bbd00902ebc90efd35031e4a2fcffba8606a49fa lua-guestfs-1.32.7-3.el7_3.3.x86_64.rpm e425044ab646df324799c0baeb0e243a4c6e28c55fcd4abd472822916633ad17 ocaml-libguestfs-1.32.7-3.el7_3.3.x86_64.rpm d5343890212ca10a1e4a218593ca00d13a1c559c861b373620923cbfc12b3cc2 ocaml-libguestfs-devel-1.32.7-3.el7_3.3.x86_64.rpm 833a761d994b7871b44663e2c29eac206da067ad2c6f1dc3bf85387f699a9ac9 perl-Sys-Guestfs-1.32.7-3.el7_3.3.x86_64.rpm
[CentOS] icecc/icecream for CentOS 7
Hello everyone, I'm looking for a way to install icecc/icecream on CentOS 7 for distributed builds, preferably like any other package rpm a repository. I already found some effort done by someone else to create an rpm package for CentOS 7 and published in a private repository : https://copr-be.cloud.fedoraproject.org/results/mbriza/Icecream/epel-7-x86_64/ This package already seem to work. However, if possible, I prefer a solution that is used/available for the whole world to use. I noticed that with CentOS 6 a iceream package was provided by the epel repositories. With CentOS 7 this package is not included anymore. Does anyone know if there is a chance it will be included in the epel (or some other thirdparty) repository for CentOS 7 again? Or if there is a better place to ask this question? -- Thanks, Danny ___ CentOS mailing list CentOS@centos.org https://lists.centos.org/mailman/listinfo/centos