Re: [CentOS-docs] Broadcom's BCM4311-, BCM4312-, BCM4321-, and BCM4322-based hardware install manual
Mathieu Baudier wrote: OK then, I'll take your sillence as an approval of the manual and remove the DRAFT tag and move it to *Making Wireless work on your laptop (or desktop) *So if anyone has any final suggestions or comments I'd be happy to hear it before this goes official. Sorry, for not testing sooner. I took some time this morning and could update my driver using the latest kernel update! Here are my comments: 1. There is a typo in: mkdir -P /usr/local/src/hybrid-wl mkdir takes the -p option (lower case) 2. I could not perform: modprobe wl.ko but: insmod wl.ko works 3. I did not need to define all the aliases, neither remove all b43 stuff (I'm on a CentOS x86_64) Since I prefer not to diverge too much from the base system, I left it like that. 4. Interestingly I tried to define TYPEDEF_BOOL via the command line (which would avoid the modification of the files): make -C /lib/modules/`uname -r`/build/ M=$BUILD_DIR MODFLAGS=-DTYPEDEF_BOOL It builds without error, and the module can be inserted, but then it is not working (wlan networks are not found) More generally my question would be: if we would automate this procedure in a RPM (including the download from Broadcom website), would it count as redistribution?? Please find below for reference the script and patch I used for my testing. (please note: that the module is built in a temporary directory in order to keep the source directory read-only) Thanks for the hard work! Mathieu ## ## broadcom.sh ## #!/bin/sh WL_VERSION=v5.10.91.9.3 WL_ARCH=x86_64 SRC_DIR=/usr/local/src/broadcom-hybrid-wl-$WL_ARCH-$WL_VERSION BUILD_DIR=/tmp/wlbuild # Step 1: Prerequisites sudo /sbin/lspci | grep Broadcom sudo yum install kernel-headers kernel-devel gcc # Step 2: Retrieve sources sudo mkdir -p $SRC_DIR sudo cp -v broadcom-wl.patch $SRC_DIR cd /tmp wget -N http://www.broadcom.com/docs/linux_sta/hybrid-portsrc-$WL_ARCH-$WL_VERSION.tar.gz cd $SRC_DIR sudo tar -xzf /tmp/hybrid-portsrc-$WL_ARCH-$WL_VERSION.tar.gz # Step 3: Build as unprivileged user mkdir $BUILD_DIR cp -r $SRC_DIR/* $BUILD_DIR cd $BUILD_DIR #make -C /lib/modules/`uname -r`/build/ M=$BUILD_DIR MODFLAGS=-DTYPEDEF_BOOL patch -Np1 $SRC_DIR/broadcom-wl.patch make -C /lib/modules/`uname -r`/build/ M=`pwd` strip --strip-debug $BUILD_DIR/wl.ko # Step 4a: Check that the new module can be loaded #sudo /sbin/rmmod bcm43xx #sudo /sbin/rmmod b43 #sudo /sbin/rmmod b43legacy #sudo /sbin/rmmod ndiswrapper #sudo /sbin/modprobe ieee80211_crypt_tkip #sudo /sbin/rmmod wl sudo /sbin/insmod $BUILD_DIR/wl.ko #sudo /sbin/service NetworkManager restart # Step 4b: Install sudo cp -v $BUILD_DIR/wl.ko /lib/modules/`uname -r`/extra/ sudo /sbin/depmod $(uname -r) sudo /sbin/modprobe wl #sudo /sbin/service NetworkManager restart # Clean up rm -vf /tmp/hybrid-portsrc-*.tar.gz rm -rf $BUILD_DIR ## ## broadcom-wl.patch ## diff -Naur hybrid-portsrc/src/include/typedefs.h hybrid-portsrc-mod/src/include/typedefs.h --- hybrid-portsrc/src/include/typedefs.h 2009-09-16 00:25:27.0 +0200 +++ hybrid-portsrc-mod/src/include/typedefs.h 2009-12-23 12:32:15.0 +0100 @@ -65,11 +65,11 @@ #ifdef USE_TYPEDEF_DEFAULTS #undef USE_TYPEDEF_DEFAULTS - +/* #ifndef TYPEDEF_BOOL typedef unsigned char bool; #endif - +*/ #ifndef TYPEDEF_UCHAR typedef unsigned charuchar; #endif ___ CentOS-docs mailing list CentOS-docs@centos.org http://lists.centos.org/mailman/listinfo/centos-docs Thanks for the correction (with the 'mkdir')! I've made the change and updated the Making wireless work page with the new manual... Curious that you have to use 'insmod' to load the module, instead 'modprobe'. Funny thing is that I've been using the same procedure every time after upgrading the kernel on the same /CentOS 5.3-5.4 x86_64/ since August... when I first installed this driver, and as far as I recall, modprobe always worked. The excerpt from the 'modprobe' manual states: /*insmod* is a trivial program to insert a module into the kernel: if the filename is a hyphen, the module is taken from standard input. Most users will want to use modprobe(8) instead, which is cleverer. /In the event we see some more users experiencing this issue, it would surely be a good idea to add the note to the manual. The draft will be removed from my CentOS Wiki home page shortly. -- *Srdacan pozdrav,* *Milos Blazevic* Cert. No: 605008720421478 Email: milos.blaze...@sbb.rs mailto:milos.blaze...@sbb.rs Tel: 064/301 45 78 ___ CentOS-docs mailing list CentOS-docs@centos.org http://lists.centos.org/mailman/listinfo/centos-docs
Re: [CentOS-es] problemas con xen
On 12/23/2009 09:17 PM, ces can wrote: Saludos: Tengo un problema con xen, lo que pasa es que tengo servidores paravirtualizados dentro de un servidor HP PRoliant ML350 tiene 3 GB de memoria estos servidores estan por lo menos como 3 meses sin apagar(me refiero a los paravirtualizados especificamente) pero cuando los reinicio se que da en la parte que dice Buscando nuevo hardware , para que pueda iniciar correctamente tengo que reiniciar el servidor fisico que los contiene, esa es la unica manera que he podido hacerlos iniciar correctamente, por favor si alguien me puede ayudar. hola, prueba deshabilitar el kudzu en las máquinas virtuales, para evitar que busque nuevo hardware, pero en principio esto no debería ocurrir. sauldos epe Gracias. _ Invite your mail contacts to join your friends list with Windows Live Spaces. It's easy! http://spaces.live.com/spacesapi.aspx?wx_action=createwx_url=/friends.aspxmkt=en-us ___ CentOS-es mailing list CentOS-es@centos.org http://lists.centos.org/mailman/listinfo/centos-es ___ CentOS-es mailing list CentOS-es@centos.org http://lists.centos.org/mailman/listinfo/centos-es
Re: [CentOS-es] Ayuda con chpasswd
On 12/23/2009 01:23 PM, Rolando Arteaga Lamar wrote: 2009/12/22 Rolando Arteaga Lamar roly08...@cha.jovenclub.cu: Hola listeros, necesito implementar este script en mi trabajo. Este script es para cambiar la contraseña via web al servidor squid. Yo compilo el el programa chpasswd no hay que compilarlo, viene en centos, le uso para varios fines sin necesidad de esto saludos epe ___ CentOS-es mailing list CentOS-es@centos.org http://lists.centos.org/mailman/listinfo/centos-es
[CentOS] attack
Hi, My server is under attack allows the attacker to abuse of a php script of a vhost. How can I find what is the script. Regards, maverh ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] attack
From: Manu Verhaegen mav...@telenet.be My server is under attack allows the attacker to abuse of a php script of a vhost. How can I find what is the script. Could you be more specific...? Anything in the log files? JD ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] attack
Anything from the accesslogs? 2009/12/24 Manu Verhaegen mav...@telenet.be Hi, My server is under attack allows the attacker to abuse of a php script of a vhost. How can I find what is the script. Regards, maverh ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] attack
On Thu, 2009-12-24 at 11:31 +, Manu Verhaegen wrote: Hi, My server is under attack allows the attacker to abuse of a php script of a vhost. How can I find what is the script. Regards, maverh Hi Maverh, I know this may sound like a silly question but how do you know your server is under attack ? As others have advised, have you checked your logs on the server ? What are you running that's being attacked ? /var/log/httpd /var/log/messages Regards, Pete. ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] attack
Triying find to what are users running on spacific command, you should using top or ps or netstat please read the manual how to use it. After all and you get some info unpluge your server from internet, see what log says. --Original Message-- From: Manu Verhaegen Sender: centos-boun...@centos.org To: centos@centos.org ReplyTo: CentOS mailing list Subject: [CentOS] attack Sent: Dec 24, 2009 6:31 PM Hi, My server is under attack allows the attacker to abuse of a php script of a vhost. How can I find what is the script. Regards, maverh ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos Warm regards, David - ./nobody ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] attack
Hi, We have plesk running, i have running logwatch and i have found a IP adress. I have add it in the IP table to block it then the attack is solved. We see a lot of outgouing emails a php script is used for sending many emails possible stored in the database. I have use the following command grep 'ipadres' /var/www/vhosts/*/statistics/logs/access_log grep 'ipadres' /var/log/httpd/access.log it do not find any record. Regards, Manu Verhaegen -Oorspronkelijk bericht- Van: centos-boun...@centos.org [mailto:centos-boun...@centos.org] Namens Pete Verzonden: donderdag 24 december 2009 12:45 Aan: CentOS mailing list Onderwerp: Re: [CentOS] attack On Thu, 2009-12-24 at 11:31 +, Manu Verhaegen wrote: Hi, My server is under attack allows the attacker to abuse of a php script of a vhost. How can I find what is the script. Regards, maverh Hi Maverh, I know this may sound like a silly question but how do you know your server is under attack ? As others have advised, have you checked your logs on the server ? What are you running that's being attacked ? /var/log/httpd /var/log/messages Regards, Pete. ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] attack
at the moment everiting is solved i have block the IP adress but i d'ont have found the script - Oorspronkelijk bericht - Van : da...@pnyet.web.id [mailto:da...@pnyet.web.id] Verzonden : donderdag , december 24, 2009 01:07 PM Aan : 'CentOS mailing list' Onderwerp : Re: [CentOS] attack Triying find to what are users running on spacific command, you should using top or ps or netstat please read the manual how to use it. After all and you get some info unpluge your server from internet, see what log says. --Original Message-- From: Manu Verhaegen Sender: centos-boun...@centos.org To: centos@centos.org ReplyTo: CentOS mailing list Subject: [CentOS] attack Sent: Dec 24, 2009 6:31 PM Hi, My server is under attack allows the attacker to abuse of a php script of a vhost. How can I find what is the script. Regards, maverh ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos Warm regards, David - ./nobody ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] attack
-Original Message- From: centos-boun...@centos.org [mailto:centos-boun...@centos.org] On Behalf Of Manu Verhaegen Sent: Thursday, December 24, 2009 7:04 AM To: CentOS mailing list Subject: Re: [CentOS] attack at the moment everiting is solved i have block the IP adress but i d'ont have found the script So you are the attacker. Happened to me a couple weeks ago. Check your tmp directory and subdirectory for std, udp.pl. Also check /etc/passwd and /etc/shadow for unusual users. Should be at the very bottom of those files. ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] Inquiry:yum?
On Thu, Dec 24, 2009 at 1:58 AM, hadi motamedi motamed...@gmail.com wrote: Thank you very much for your kind contineous support . At last , I have yum on my client . Now please run a 'yum update' as you have several packages with known, published security vulnerabilities including your kernel, and udev. Doing this will take you to 5.4 and will require a reboot to load the new kernel. -- During times of universal deceit, telling the truth becomes a revolutionary act. George Orwell ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] attack
Hello On 12/24/2009 12:01 PM, Manu Verhaegen wrote: We have plesk running, i have running logwatch and i have found a IP adress. I have add it in the IP table to block it then the attack is solved. We see a lot of outgouing emails a php script is used for sending many emails possible stored in the database. you also have a broken email client, what are the chances that you could: a) find an email client that preserves thread sanity b) refrain from topposting unless absolutely necessary -- Karanbir Singh London, UK| http://www.karan.org/ | twitter.com/kbsingh ICQ: 2522219 | Yahoo IM: z00dax | Gtalk: z00dax GnuPG Key : http://www.karan.org/publickey.asc ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] attack
Hi, i have Check my tmp directory and subdirectorys for std, udp.pl no file exist. Also i have check /etc/passwd and /etc/shadow for unusual users. regards -Oorspronkelijk bericht- Van: centos-boun...@centos.org [mailto:centos-boun...@centos.org] Namens Thomas Dukes Verzonden: donderdag 24 december 2009 13:08 Aan: 'CentOS mailing list' Onderwerp: Re: [CentOS] attack -Original Message- From: centos-boun...@centos.org [mailto:centos-boun...@centos.org] On Behalf Of Manu Verhaegen Sent: Thursday, December 24, 2009 7:04 AM To: CentOS mailing list Subject: Re: [CentOS] attack at the moment everiting is solved i have block the IP adress but i d'ont have found the script So you are the attacker. Happened to me a couple weeks ago. Check your tmp directory and subdirectory for std, udp.pl. Also check /etc/passwd and /etc/shadow for unusual users. Should be at the very bottom of those files. ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] Inquiry:yum? - hijack
Barry Brimer wrote: I tried for the other engaged rpm packages one-by-one . But at last , only the following one remained as unresolved : [r...@mss-1 tmp]# rpm -Uvh yum-fastestmirror-1.1.16-13.el5.centos.noarch.rpm warning: yum-fastestmirror-1.1.16-13.el5.centos.noarch.rpm: Header V3 DSA signature: NOKEY, key ID e8562897 error: Failed dependencies: yum = 3.0 is needed by yum-fastestmirror-1.1.16-13.el5.centos.noarch Can you please let me know why it does not come to an end ? What is the output of lsb_release -a ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos Forgive me for thread stealing - lsb 3.1 is the current CentOS supported version. I have some postscript / cups / printer drivers that insist on lsb 3.2 - anyone know if this is possible? TIA Rob attachment: rkampen.vcf___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] attack
Hi, i have Check my tmp directory and subdirectorys for std, udp.pl no file exist. Also i have check /etc/passwd and /etc/shadow for unusual users. regards Manu, forgive me if i missed it when i deleted several of the posts in the thread yet how hard is it to check all the pertinent logfiles? unless this is a very sophisticated compromise that hides, moves, or deletes things, or the management system is trash, the info you need is typically in one or more of the various logfiles on the system something as simple man less less /var/log/httpd/access_log less /var/log/httpd/error_log replace appropriate logfile names as necessary... in general, there are many you can look at to gain some wisdom... - rh ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] attack
Obviously, if you are running several vhosts and plesk you likely have other logs to check. Also, one can usually see the origin of the mail injection in the maillog (e.g. complaints about setting to an unsafe sender) or in the outgoing messages. At runtime you can see the connects with full URLs on the apache status page. Kai -- Kai Schätzl, Berlin, Germany Get your web at Conactive Internet Services: http://www.conactive.com ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
[CentOS] cups and LSB 3.2; was: Inquiry:yum? - hijack
On Thu, 24 Dec 2009, Rob Kampen wrote: Forgive me for thread stealing - lsb 3.1 is the current CentOS supported version. I have some postscript / cups / printer drivers that insist on lsb 3.2 - anyone know if this is possible? TIA Rob This (LSB 3.2 -- last in the 3 series) is not really bleeding edge [LSB 4 just got its first refresh in the 4 series, 4 having been out about a year], but the LSB intentionally lags to get a superset of distributions observed practice in Linux, rather than pushing development The printer driver folks are pushing (Apple 'bought' cups a couple years back and are pushing) new versions -- consider this: Date: Thu, 17 Dec 2009 15:10:42 From: Till Kamppeter till.kamppe...@elided To: lsb-disc...@lists.linux-foundation.org, Subject: lsb-di] Uplift to OPVP 1.0 in LSB 4.1? Hi, at OpenPrinting we are currently approving OpenPrinting Vector (OPVP) as official standard, and so the question came up on which version of OPVP are we in the printing requirements of the LSB and whether we can uplift to 1.0 if needed/possible. In Ghostscript OPVP 1.0 was introduced with the 8.63 release in the beginning of August 2008. Do all the enterprise distros under consideration of the LSB already ship Ghostscript 8.63? If so, I suggest that we uplift to OPVP 1.0. and frankly this will cause pain as ISV's and enterprise distributions are really not set up to 'chase' development [not economically justifiable, as it explodes the 'support matrix']. Both Linux Standards Base, and Open Printing are housed at the Linux Foundation presently, but it is not a good fit as they have conflicting mandates as to pushing A grand total of ZERO applications have certified to 3.2 http://ldn.linuxfoundation.org/lsb/certified/applications?filter0=**ALL**filter1=3721 and the same number to 4.0. That said there is exactly ONE under 3.1 I count 17 distributions certified under LSB 3.1, one under 3.2, and five to 4.0 ... NOT including RHEL for the last two items. While there has been much talk talk from the LF representatives about 'privately engaging' CentOS' upstream, and my sporadic efforts to drag the issues into the feeder Fedora space attention, frankly there is nothing much to show for it so far. One has to ask if the LSB is even relevant. I would note that with minimal changes, CentOS 5 can be made to pass (with minimal exemptions) the LSB 4 test suite in trials, and that CentOS 4.2 is used in day to day testing at the LSB's test boxes, the disinterest in certifying to the LSB at CentOS' upstream is similarly not publicly obvious. Really and truly, until large entity, commercial purchasing agents of enterprise Linux distributions start to insert a clause like: The provided software from the Provider shall at all times during the life of this contract conform to the then current Linux Standards Base then-current standard, and be noted as so certified at the the Linux Standards Base website. There shall be a 'recertification window' of six months following each LSB release and each 'point update' or 'refresh' of the same. The failure to maintain such certifications shall constitue a tender of a 'non-confoming' performance and goods under this contract, and if permitted to remain uncured for thirty days after notice from Purchaser to Provider, shall give rise to remedies to the Purchaser hereunder. The LSB 'carrot' of interoperability is unappealing to a Distribution, as all it does is make an offering 'less sticky' and permit easier transitions away and substitutions. As the Enterprise Linux market share leader in many segments, CentOS' upstream has an incentive to ignore 'chasing' the LSB certifications. The tried and true method to solve this is to back build from other's later released sources (hopefully already packaged -- I see Oracle's EL in there and those sources should build on CentOS); failing that, solving the Fedora/RawHide chain _may_ be possible, but as Fedora seeks to be very fast moving, they unavoidably avoid providing huge dependency chains. Perhaps I should start a sub-project to try to carve away the GUI 'Fedora fluff' in packaging from the TUI server 'meat and potatos' with some sub-packaging breaks and alternatives. ;) -- Russ herrold herrold at owlriver dot com ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] attack
Hi, i ame checking this thanks, Manu -Oorspronkelijk bericht- Van: centos-boun...@centos.org [mailto:centos-boun...@centos.org] Namens Kai Schaetzl Verzonden: donderdag 24 december 2009 15:32 Aan: centos@centos.org Onderwerp: Re: [CentOS] attack Obviously, if you are running several vhosts and plesk you likely have other logs to check. Also, one can usually see the origin of the mail injection in the maillog (e.g. complaints about setting to an unsafe sender) or in the outgoing messages. At runtime you can see the connects with full URLs on the apache status page. Kai -- Kai Schätzl, Berlin, Germany Get your web at Conactive Internet Services: http://www.conactive.com ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] [OT] Urgent request
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 tdu...@sc.rr.com wrote: mark We have been searching the internet since Tuesday. We have already tried installing a video card, that didn't work. The beeps at start up indicate to check the video ram. It will boot and run if we put it in another pc. The server is running c-sytems software on a sco operating system. They tell us we can't pull the hard drive and move it to another pc - something about a bug causing it to lose data. I've been running linux systems since the late 80's. I have never heard of this but then, I have never run a sco system either. ^^^ I can't believe nobody commented about this yet... ;o) Linux didn't exist until 1991, so it would have been quite the feat to be running it in the 1980's indeed. ;o) I can't believe everyone let that slip by... ;o) Merry Christmas! - -- Mike A. Harris Website: http://mharris.ca Google Wave: mike.andrew.harris - at - googlewave.com https://identi.ca/mharris | https://twitter.com/mikeaharris -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.5 (GNU/Linux) iD8DBQFLM4Id4RNf2rTIeUARAjGwAJ9DwO7c2USU3Xan2y3vy9iViNfoTQCgl7PD +uyJGTHnAFhSi/FOa5xw4Z8= =Xuql -END PGP SIGNATURE- ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
[CentOS] environment-modules
We've got a developer here who needs to use both java and openjdk. I was giving her sudo for alternatives, but my manager would prefer that I look into environment-modules. I've installed it, and I see it comes with configurations for cvs and info... but nothing for java, and the man pages doesn't seem to offer info on creating one. Does anyone have a pointer to a howto, or maybe even a sample one? Thanks in advance. mark ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] attack
http://www.atomicorp.com/wiki/index.php/Atomic_Secured_Linux Wraps a lot of good stuff together for a plesk web server on CentOS. Won't help much if you are already compromised, but it would be a good addition. -Andy On Thu, 2009-12-24 at 12:01 +, Manu Verhaegen wrote: Hi, We have plesk running, i have running logwatch and i have found a IP adress. I have add it in the IP table to block it then the attack is solved. We see a lot of outgouing emails a php script is used for sending many emails possible stored in the database. I have use the following command grep 'ipadres' /var/www/vhosts/*/statistics/logs/access_log grep 'ipadres' /var/log/httpd/access.log it do not find any record. Regards, Manu Verhaegen -Oorspronkelijk bericht- Van: centos-boun...@centos.org [mailto:centos-boun...@centos.org] Namens Pete Verzonden: donderdag 24 december 2009 12:45 Aan: CentOS mailing list Onderwerp: Re: [CentOS] attack On Thu, 2009-12-24 at 11:31 +, Manu Verhaegen wrote: Hi, My server is under attack allows the attacker to abuse of a php script of a vhost. How can I find what is the script. Regards, maverh Hi Maverh, I know this may sound like a silly question but how do you know your server is under attack ? As others have advised, have you checked your logs on the server ? What are you running that's being attacked ? /var/log/httpd /var/log/messages Regards, Pete. ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] [OT] Urgent request
Mike A. Harris mhar...@mharris.ca wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 tdu...@sc.rr.com wrote: mark We have been searching the internet since Tuesday. We have already tried installing a video card, that didn't work. The beeps at start up indicate to check the video ram. It will boot and run if we put it in another pc. The server is running c-sytems software on a sco operating system. They tell us we can't pull the hard drive and move it to another pc - something about a bug causing it to lose data. I've been running linux systems since the late 80's. I have never heard of this but then, I have never run a sco system either. ^^^ I can't believe nobody commented about this yet... ;o) Linux didn't exist until 1991, so it would have been quite the feat to be running it in the 1980's indeed. ;o) I can't believe everyone let that slip by... ;o) Merry Christmas! Someone did and I meant the 90's ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] attack
Hi, I'm have a repo with many security tools.. if you can test... i'm upload a few packages from fedora, other sources, and created by me.. http://flexbox.sourceforge.net/centos/5/i386/flexbox-release-1-1.noarch.rpm Try to install sectool, and verify your system.. You can try to use fail2ban for list maillog, and blacklists ips... I'm using fail2ban+shorewall+ipset Fernando. On Thu, 24 Dec 2009 14:48:30 + Manu Verhaegen mav...@telenet.be wrote: Hi, i ame checking this thanks, Manu -Oorspronkelijk bericht- Van: centos-boun...@centos.org [mailto:centos-boun...@centos.org] Namens Kai Schaetzl Verzonden: donderdag 24 december 2009 15:32 Aan: centos@centos.org Onderwerp: Re: [CentOS] attack Obviously, if you are running several vhosts and plesk you likely have other logs to check. Also, one can usually see the origin of the mail injection in the maillog (e.g. complaints about setting to an unsafe sender) or in the outgoing messages. At runtime you can see the connects with full URLs on the apache status page. Kai -- Kai Schätzl, Berlin, Germany Get your web at Conactive Internet Services: http://www.conactive.com ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos -- Fernando Hallberg ferna...@flexdigital.com.br Flex Digital Soluções em Redes de Dados http://www.flexdigital.com.br ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] [OT] Urgent request
Mike A. Harris wrote: Linux didn't exist until 1991, so it would have been quite the feat to be running it in the 1980's indeed. ;o) Nonsense. My time machine runs Linux. -- Corey / KB1JWQ Member, Bermuda Triangle Expeditionary Force, 2003-1944 ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] environment-modules
m.r...@5-cent.us wrote: We've got a developer here who needs to use both java and openjdk. I was giving her sudo for alternatives, but my manager would prefer that I look into environment-modules. I've installed it, and I see it comes with configurations for cvs and info... but nothing for java, and the man pages doesn't seem to offer info on creating one. Does anyone have a pointer to a howto, or maybe even a sample one? install openjdk uia standard centos 5.x rpms, install Sun Java to /usr/java/jdk-whatever via the Sun tarball. if you put /usr/java/jdk-whatever/bin first in the path, you'll be using the Sun java. if you take it out of the path, you will be using the default distribution openjdk. On som eof our development systems we have 3-4 different versions of Sun java we manage this way. ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] environment-modules
m.r...@5-cent.us wrote: We've got a developer here who needs to use both java and openjdk. I was giving her sudo for alternatives, but my manager would prefer that I look into environment-modules. I've installed it, and I see it comes with configurations for cvs and info... but nothing for java, and the man pages doesn't seem to offer info on creating one. Does anyone have a pointer to a howto, or maybe even a sample one? install openjdk uia standard centos 5.x rpms, install Sun Java to /usr/java/jdk-whatever via the Sun tarball. Already did that (btw, Sun doesn't give you a tarball, they give you a self-extracting .bin). if you put /usr/java/jdk-whatever/bin first in the path, you'll be using the Sun java. if you take it out of the path, you will be using the default distribution openjdk. I'm trying to provide a simple method for switching between the two, and I don't have any guarantee that someone *other* than this developer, who seems knowledgeable, will have to do the same thing. I reiterate: does anyone have any examples for a modulefile for java? mark ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] environment-modules
m.r...@5-cent.us wrote: if you put /usr/java/jdk-whatever/bin first in the path, you'll be using the Sun java. if you take it out of the path, you will be using the default distribution openjdk. I'm trying to provide a simple method for switching between the two, and I don't have any guarantee that someone *other* than this developer, who seems knowledgeable, will have to do the same thing. I reiterate: does anyone have any examples for a modulefile for java? lets assume that at profile time, the sun java is -not- in the path, and the usual /usr/bni stuff is. in pseudocode as I'm a little too fried/tired to work out the real code and I haven't been coding sh/bash scripts in a few months so it all blurs together... put this as /usr/local/bin/jset or something export PATH,BASEPATH if not exists $BASEPATH then BASEPATH=$PATH switch $1: case openjdk: PATH=$BASEPATH break; case sun: PATH=/path/to/sun/jdk/bin:$BASEPATH break; case somethign else: PATH=/path/to/something/else:$BASEPATH break; default: echo Usage: $0 {sun|openjdk|somethingelse} break endswitch; this is the old school brute force method, doesn't rely on any external magic other than a sane initial PATH ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
[CentOS] kvm-shell
Hi, I don't know if that already exists somewhere ... I've written it for me and wanted to share it with you. It's minimal kvm shell for end users - it allows them to start/stop/reboot their own kvm guests. http://www.michael-kress.de/2009/12/kvm-shell/ kvm-shell should run on all platforms. Have fun. Regards Michael -- Michael Kress, kr...@hal.saar.de ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos