Re: [gentoo-user] KDE, sddm etc security. Plus LVM question.
On Sat, Mar 19, 2022 at 1:50 PM Dale wrote: > Another issue, ctrl+alt+L doesn't trigger xscreensaver but still > triggers KDE's screen saver. It can likely be fixed but the problem > above has to be fixed first. System Settings -> Workspace Behavior -> Screen Locking ?
Re: [gentoo-user] KDE, sddm etc security. Plus LVM question.
Dale wrote: > Peter Humphrey wrote: >> On Saturday, 19 March 2022 12:33:16 GMT Anna “CyberTailor” wrote: >>> On 2022-03-19 06:08, Dale wrote: Anna “CyberTailor” wrote: > The only secure lockscreen is XScreenSaver. > https://www.jwz.org/blog/2021/01/i-told-you-so-2021-edition/ I have that installed here. Question now is, is that what locks my screen or is KDE/sddm/something else doing that besides xscreensaver. From my poking around, I don't think I'm using xscreensaver. I'm trying to figure out how that works so I can get it to be used with KDE and any other GUI I use. Being able to use ctrl+alt=L would be a nice bonus. >>> Add a custom keybinding for Ctrl+Alt+L Ctrl+Alt+Lso it executes: >>> >>> xscreensaver-command --lock >> Ctrl+Alt+L locks the screen here, after logging in to Plasma via SDDM. I >> didn't set that myself, so it seems to be a default value. >> > > I think when I logout and back in, it may work better. I put in a > config file in KDE autostart and when I want to lock the screen, it > triggers xscreensaver instead of the usual KDE lock screen. That's the > theory anyway. I just finished my updates so I should be able to test > in a bit. > > The only downside, it activates the screensaver and locks the screen > when I'm watching videos right now. That may change when I logout and > back in to but right now, I had to stop xscreensaver. I tend to leave > the screen saver turned off anyway and just lock the screen when I want > it to power off the monitor etc. > > We'll know in a bit. I'll post updates in case someone else here wants > to switch or googles up this thread. > > Dale > > :-) :-) > OK. This isn't going well. It still goes into screen saver even tho I have it disabled completely in settings and does it after one minute even with smplayer actively playing a video. That's not going to work for me at all. Big time problem. Basically, all I want is to lock the screen when I tell it to lock. That's it. Another issue, ctrl+alt+L doesn't trigger xscreensaver but still triggers KDE's screen saver. It can likely be fixed but the problem above has to be fixed first. At the moment, I've taken xscreensaver out of the loop. Got some other stuff to deal with at the moment anyway. Got a new fishing rod and reel. :-D Dale :-) :-)
Re: [gentoo-user] KDE, sddm etc security. Plus LVM question.
On 19/03/2022 13:20, Dale wrote: I'm moving to encrypting some directories. To do that, I need a empty drive first to put encryption on. Then I can encrypt, move stuff that isn't encrypted then add drives back until everything that I want is encrypted. I'm assuming I can have one large logical volume that is encrypted across more than one drive. Right now, I have 3 drives for /home. I got space to remove one and then start encrypting and adding other drives to the encrypted stuff. I've got dm-integrity running over my bare partition. I guess you could use dm-security/luks. No reason why not. Then I use raid-5 over that to combine 3 3TB partitions into a 6TB device. Which has lvm on that. And then I have my other partitions (basically just /home) on top of that. So if I need more space I just add a new drive with dm-integrity, add that into my raid, and grow the raid, lvm, and my /home ... "simples", as the meerkats say ... Cheers, Wol
Re: [gentoo-user] KDE, sddm etc security. Plus LVM question.
Peter Humphrey wrote: > On Saturday, 19 March 2022 12:33:16 GMT Anna “CyberTailor” wrote: >> On 2022-03-19 06:08, Dale wrote: >>> Anna “CyberTailor” wrote: The only secure lockscreen is XScreenSaver. https://www.jwz.org/blog/2021/01/i-told-you-so-2021-edition/ >>> I have that installed here. Question now is, is that what locks my >>> screen or is KDE/sddm/something else doing that besides xscreensaver. >>> From my poking around, I don't think I'm using xscreensaver. I'm trying >>> to figure out how that works so I can get it to be used with KDE and any >>> other GUI I use. Being able to use ctrl+alt=L would be a nice bonus. >> Add a custom keybinding for Ctrl+Alt+L Ctrl+Alt+Lso it executes: >> >> xscreensaver-command --lock > Ctrl+Alt+L locks the screen here, after logging in to Plasma via SDDM. I > didn't set that myself, so it seems to be a default value. > I think when I logout and back in, it may work better. I put in a config file in KDE autostart and when I want to lock the screen, it triggers xscreensaver instead of the usual KDE lock screen. That's the theory anyway. I just finished my updates so I should be able to test in a bit. The only downside, it activates the screensaver and locks the screen when I'm watching videos right now. That may change when I logout and back in to but right now, I had to stop xscreensaver. I tend to leave the screen saver turned off anyway and just lock the screen when I want it to power off the monitor etc. We'll know in a bit. I'll post updates in case someone else here wants to switch or googles up this thread. Dale :-) :-)
Re: [gentoo-user] gentoo for a virtual server in the cloud?
If you want to save time (and probably money), compile packages into binary packages on another server and set the virtual server to only use binary. On Sat, Mar 19, 2022 at 5:51 AM n952162 wrote: > :thumbsup: Thank you. > > On 3/19/22 09:08, Matthias Hanft wrote: > > n952162 wrote: > >> You booted the minimal install ISO and went through the steps of > >> partitioning the disk, network, etc? > > Yes. Exactly the same way as I did for my server at home. > > > >> I was thinking that there were special drivers necessary for the virtual > >> devices offered by the platform. Maybe even proprietary > > Not in my case. The provider uses VMware for his virtual servers, > > and Gentoo didn't need any special drivers or something. > > > > Here's the output of "lspci": > > > > --- cut here --- > > > > 00:00.0 Host bridge: Intel Corporation 440BX/ZX/DX - 82443BX/ZX/DX Host > bridge (rev 01) > > 00:01.0 PCI bridge: Intel Corporation 440BX/ZX/DX - 82443BX/ZX/DX AGP > bridge (rev 01) > > 00:07.0 ISA bridge: Intel Corporation 82371AB/EB/MB PIIX4 ISA (rev 08) > > 00:07.1 IDE interface: Intel Corporation 82371AB/EB/MB PIIX4 IDE (rev 01) > > 00:07.3 Bridge: Intel Corporation 82371AB/EB/MB PIIX4 ACPI (rev 08) > > 00:07.7 System peripheral: VMware Virtual Machine Communication > Interface (rev 10) > > 00:0f.0 VGA compatible controller: VMware SVGA II Adapter > > 00:10.0 SCSI storage controller: Broadcom / LSI 53c1030 PCI-X Fusion-MPT > Dual Ultra320 SCSI (rev 01) > > 00:11.0 PCI bridge: VMware PCI bridge (rev 02) > > 00:15.0 PCI bridge: VMware PCI Express Root Port (rev 01) > > [the same for 00:15.0..7, 00:16.0..7, 00:17.0..7, and 00:18.0..7] > > 02:00.0 Ethernet controller: Intel Corporation 82545EM Gigabit Ethernet > Controller (Copper) (rev 01) > > > > --- cut here --- > > > > Gentoo could handle all this just out of the box. > > > > -Matt > > > >
Re: [gentoo-user] KDE, sddm etc security. Plus LVM question.
On Saturday, 19 March 2022 12:33:16 GMT Anna “CyberTailor” wrote: > On 2022-03-19 06:08, Dale wrote: > > Anna “CyberTailor” wrote: > > > The only secure lockscreen is XScreenSaver. > > > https://www.jwz.org/blog/2021/01/i-told-you-so-2021-edition/ > > > > I have that installed here. Question now is, is that what locks my > > screen or is KDE/sddm/something else doing that besides xscreensaver. > > From my poking around, I don't think I'm using xscreensaver. I'm trying > > to figure out how that works so I can get it to be used with KDE and any > > other GUI I use. Being able to use ctrl+alt=L would be a nice bonus. > > Add a custom keybinding for Ctrl+Alt+L Ctrl+Alt+Lso it executes: > > xscreensaver-command --lock Ctrl+Alt+L locks the screen here, after logging in to Plasma via SDDM. I didn't set that myself, so it seems to be a default value. -- Regards, Peter.
Re: [gentoo-user] wifi networks not seen by networkmanager
Thu Mar 17 09:30:09 2022 >>> net-wireless/wpa_supplicant-2.10-r1 is more-than-likely the problem. I had the same issue yesterday and eventually switched to iwd. There's also this thread in the forums regarding the same issue: https://forums.gentoo.org/viewtopic-t-1147741.html Hope that helps. On 3/18/22 05:34, Andrés Becerra Sandoval wrote: Yesterday after updating my work laptop, Networkmanager is not seeing my employer wifi network anymore. Luckily, there is another wifi network for guests that I am using. Has somebody seen a similar problem? My list of updates: Thu Mar 17 09:14:03 2022 >>> dev-libs/openssl-1.1.1n Thu Mar 17 09:14:10 2022 >>> x11-base/xorg-proto-2021.5 Thu Mar 17 09:14:49 2022 >>> sys-auth/elogind-246.10-r2 Thu Mar 17 09:15:34 2022 >>> dev-db/sqlite-3.38.1 Thu Mar 17 09:15:49 2022 >>> x11-libs/pixman-0.40.0 Thu Mar 17 09:15:59 2022 >>> dev-libs/fribidi-1.0.11 Thu Mar 17 09:16:06 2022 >>> dev-util/wayland-scanner-1.20.0 Thu Mar 17 09:17:21 2022 >>> dev-lang/python-3.10.3 Thu Mar 17 09:18:34 2022 >>> dev-lang/python-3.9.11 Thu Mar 17 09:18:41 2022 >>> dev-libs/wayland-1.20.0 Thu Mar 17 09:18:47 2022 >>> dev-libs/wayland-protocols-1.25 Thu Mar 17 09:19:00 2022 >>> media-libs/libglvnd-1.4.0 Thu Mar 17 09:19:11 2022 >>> x11-libs/libdrm-2.4.110 Thu Mar 17 09:19:22 2022 >>> x11-libs/libxkbcommon-1.4.0 Thu Mar 17 09:20:01 2022 >>> sys-fs/udev-249.9 Thu Mar 17 09:23:24 2022 >>> media-libs/mesa-22.0.0 Thu Mar 17 09:23:38 2022 >>> media-libs/libepoxy-1.5.9-r1 Thu Mar 17 09:24:18 2022 >>> dev-libs/glib-2.70.4 Thu Mar 17 09:24:26 2022 >>> x11-misc/shared-mime-info-2.1 Thu Mar 17 09:24:32 2022 >>> dev-util/desktop-file-utils-0.26-r1 Thu Mar 17 09:25:01 2022 >>> dev-libs/gobject-introspection-1.70.0 Thu Mar 17 09:25:18 2022 >>> x11-libs/gdk-pixbuf-2.42.6-r1 Thu Mar 17 09:26:09 2022 >>> media-libs/harfbuzz-4.0.1 Thu Mar 17 09:26:19 2022 >>> dev-libs/atk-2.36.0 Thu Mar 17 09:26:30 2022 >>> app-accessibility/at-spi2-core-2.42.0 Thu Mar 17 09:26:51 2022 >>> x11-libs/pango-1.50.5 Thu Mar 17 09:26:58 2022 >>> dev-util/gtk-update-icon-cache-3.24.31 Thu Mar 17 09:27:06 2022 >>> app-accessibility/at-spi2-atk-2.38.0 Thu Mar 17 09:27:13 2022 >>> dev-libs/libevdev-1.12.0 Thu Mar 17 09:27:20 2022 >>> net-misc/iputils-20210722-r1 Thu Mar 17 09:27:53 2022 >>> sys-apps/systemd-tmpfiles-249.9 Thu Mar 17 09:28:22 2022 >>> media-libs/gstreamer-1.20.1 Thu Mar 17 09:28:31 2022 >>> dev-lang/orc-0.4.31 Thu Mar 17 09:28:46 2022 >>> dev-libs/libsigc++-2.10.7 Thu Mar 17 09:28:54 2022 >>> dev-libs/libgudev-237-r1 Thu Mar 17 09:29:01 2022 >>> gnome-base/gsettings-desktop-schemas-41.0 Thu Mar 17 09:29:09 2022 >>> x11-misc/xkeyboard-config-2.35.1 Thu Mar 17 09:29:23 2022 >>> dev-libs/libuv-1.44.1 Thu Mar 17 09:29:34 2022 >>> dev-libs/json-glib-1.6.6-r1 Thu Mar 17 09:29:40 2022 >>> x11-libs/libxcvt-0.1.1 Thu Mar 17 09:29:48 2022 >>> dev-libs/jsoncpp-1.9.5 Thu Mar 17 09:30:09 2022 >>> net-wireless/wpa_supplicant-2.10-r1 Thu Mar 17 09:30:15 2022 >>> gui-libs/libwpe-1.12.0 Thu Mar 17 09:30:23 2022 >>> sys-apps/bubblewrap-0.6.1 Thu Mar 17 09:30:33 2022 >>> media-libs/graphene-1.10.6-r1 Thu Mar 17 09:31:02 2022 >>> media-libs/dav1d-0.9.2 Thu Mar 17 09:31:11 2022 >>> sys-fs/fuse-3.10.5 Thu Mar 17 09:31:45 2022 >>> sys-kernel/gentoo-sources-5.16.15 Thu Mar 17 09:31:51 2022 >>> app-misc/wayland-utils-1.0.0 Thu Mar 17 09:33:00 2022 >>> dev-lang/python-3.8.13 Thu Mar 17 09:33:11 2022 >>> dev-libs/libinput-1.20.0 Thu Mar 17 09:33:22 2022 >>> gnome-base/dconf-0.40.0 Thu Mar 17 09:33:33 2022 >>> media-libs/glu-9.0.2 Thu Mar 17 09:34:24 2022 >>> media-libs/gst-plugins-base-1.20.1 Thu Mar 17 09:35:30 2022 >>> dev-cpp/glibmm-2.66.2 Thu Mar 17 09:35:39 2022 >>> dev-cpp/cairomm-1.14.3 Thu Mar 17 09:35:48 2022 >>> dev-util/gtk-doc-1.33.2 Thu Mar 17 09:36:22 2022 >>> x11-base/xwayland-22.1.0 Thu Mar 17 09:36:32 2022 >>> gui-libs/wpebackend-fdo-1.12.0 Thu Mar 17 09:36:46 2022 >>> gnome-base/gnome-desktop-41.3 Thu Mar 17 09:36:55 2022 >>> x11-libs/libva-2.14.0 Thu Mar 17 09:37:36 2022 >>> media-libs/gst-plugins-good-1.20.1 Thu Mar 17 09:37:46 2022 >>> media-libs/gst-plugins-ugly-1.20.1 Thu Mar 17 09:38:34 2022 >>> media-libs/gst-plugins-bad-1.20.1 Thu Mar 17 09:39:26 2022 >>> x11-base/xorg-server-21.1.3-r1 Thu Mar 17 09:40:06 2022 >>> net-misc/openssh-8.9_p1-r2 Thu Mar 17 09:40:21 2022 >>> dev-cpp/atkmm-2.28.2 Thu Mar 17 09:40:36 2022 >>> dev-cpp/pangomm-2.46.2 Thu Mar 17 09:40:52 2022 >>> media-plugins/gst-plugins-cdparanoia-1.20.1 Thu Mar 17 09:41:21 2022 >>> media-plugins/gst-plugins-opus-1.20.1 Thu Mar 17 09:41:28 2022 >>> net-fs/sshfs-3.7.1 Thu Mar 17 09:41:36 2022 >>>
Re: [gentoo-user] KDE, sddm etc security. Plus LVM question.
Wols Lists wrote: > On 19/03/2022 08:03, Dale wrote: >> Howdy, >> >> I been thinking. Yea, that's dangerous. lol If I logout of KDE, or >> have the screen locked, ctrl+alt=L key sequence, how secure is that if I >> have good passwords that are virtually impossible to crack? My login >> manager is sddm. As a example, if someone breaks into my home, is there >> a easy way to get past that? I recall the old windoze 98 days where a >> certain key sequence would bypass the password prompt. Is there a way >> known to crooks and such that can bypass or easily defeat passwords? >> > I'm not aware of any such shortcuts. There are always bugs, and design > flaws, and I believe there is such a design flaw in X such that it's > POSSIBLE to bypass a screen-lock. > Well, I'm working on replacing this with xscreensaver. Sounds like it locks and means it. ;-) >> I'm aware that if a person boots up where no password is required, that >> will bypass, even as root if I recall correctly. I'm just looking for >> something that is even easier than that. >> > Actually, systemd is actively working on closing that hole ... I'm using openrc here. H. > >> Also, if I have a encrypted hard drive open and mounted and then cut off >> power, doesn't that disable the decryption for the drive? In other >> words, I pull the plug and someone powers it back up, the drive is >> encrypted again and requires a password. > > Yes. If you even so much as SUSPEND your system, it's considered a > serious bug for the encryption key to be flushed to disk - it has to > be wiped - and with no key decryption is no longer possible. OK. If the system is shutdown or plug pulled, hard drive locks up and requires the password to decrypt. Sounds good. I was fairly sure it would since it no longer has the device node that is decrypted. >> >> Also, I'm planning to reorganize and encrypt some more stuff here. I >> want to remove one hard drive from my home thingy. Is it really as easy >> as pvmove /dev/sdx the device I want to remove? From my understanding I >> need to reduce the file system first. Is that correct? I'm often >> amazed at how easy some things can be done with LVM. >> > I think you mean pvREmove and, provided you have sufficient unused > space in your PV greater or equal to the size of the drive, yes it > really is that simple. Of course, if you have LESS free space, LVM > will be unable to move everything off sdx and you're going to lose data. > > If you're planning to re-organise by adding larger disks, check out > whether LVM has the equivalent of "mdadm --replace ...", where md-raid > will move stuff on a running system. > > Cheers, > Wol > > The guide I'm looking at shows pvmove. This is what I'm looking at: https://tldp.org/HOWTO/html_single/LVM-HOWTO/#RemoveADisk If it doesn't scroll to it, it's section 13.5 Removing old disk. It says: pvmove /dev/hdb That's for old IDE but I guess it is the same for sd* drives. Maybe I'm looking at the wrong section? Sounds pretty easy. It doesn't even mention reducing the file system there but it does in another section. So, I assume I'd need to reduce the file system first, run that command and the next section's command to remove the drive itself and that's it. I'm moving to encrypting some directories. To do that, I need a empty drive first to put encryption on. Then I can encrypt, move stuff that isn't encrypted then add drives back until everything that I want is encrypted. I'm assuming I can have one large logical volume that is encrypted across more than one drive. Right now, I have 3 drives for /home. I got space to remove one and then start encrypting and adding other drives to the encrypted stuff. I wish it was to where my user password could do this as I login/unlock screen etc. Thing is, I have things running that need to access the drives even when the screen is locked. I don't think what I want is even possible there. Dale :-) :-)
Re: [gentoo-user] KDE, sddm etc security. Plus LVM question.
Wols Lists wrote: > On 19/03/2022 11:08, Dale wrote: >> I have that installed here. Question now is, is that what locks my >> screen or is KDE/sddm/something else doing that besides xscreensaver. >> From my poking around, I don't think I'm using xscreensaver. I'm >> trying >> to figure out how that works so I can get it to be used with KDE and any >> other GUI I use. Being able to use ctrl+alt=L would be a nice bonus. > > Try "Windows"-L. It works on my gentoo system here ... > > Cheers, > Wol > > . > Doesn't work here. I do have that key on my keyboard tho. Don't recall ever using it tho. May do something. lol Dale :-) :-)
Re: [gentoo-user] KDE, sddm etc security. Plus LVM question.
Anna “CyberTailor” wrote: > On 2022-03-19 06:08, Dale wrote: >> Anna “CyberTailor” wrote: >>> The only secure lockscreen is XScreenSaver. >>> https://www.jwz.org/blog/2021/01/i-told-you-so-2021-edition/ >> I have that installed here. Question now is, is that what locks my >> screen or is KDE/sddm/something else doing that besides xscreensaver. >> From my poking around, I don't think I'm using xscreensaver. I'm trying >> to figure out how that works so I can get it to be used with KDE and any >> other GUI I use. Being able to use ctrl+alt=L would be a nice bonus. > Add a custom keybinding for Ctrl+Alt+L so it executes: > > xscreensaver-command --lock > > I found a guide, it's in the man page to, here: https://www.jwz.org/xscreensaver/man1.html I scrolled down to the KDE bits and at points it got interesting because KDE moves files around. Anyway, he pointed to files that are installed by emerge which gets changed on update. He even admitted it would. So, I found the file in /home/dale/.config/kscreenlockerrc and I copied the original file in case I need to go back. That shouldn't be affected by updates. Everything else was fine in the instructions. I'm in the middle of stuff right now so I'll test it out later. I'll also need to research that keyboard shortcut. I remember seeing it in system settings somewhere. I think I changed a couple ages ago and it was pretty straight foreword. Thanks for the info. Dale :-) :-)
Re: [gentoo-user] KDE, sddm etc security. Plus LVM question.
On 19/03/2022 11:08, Dale wrote: I have that installed here. Question now is, is that what locks my screen or is KDE/sddm/something else doing that besides xscreensaver. From my poking around, I don't think I'm using xscreensaver. I'm trying to figure out how that works so I can get it to be used with KDE and any other GUI I use. Being able to use ctrl+alt=L would be a nice bonus. Try "Windows"-L. It works on my gentoo system here ... Cheers, Wol
Re: [gentoo-user] KDE, sddm etc security. Plus LVM question.
Anna “CyberTailor” wrote: > On 2022-03-19 03:03, Dale wrote: >> I been thinking. Yea, that's dangerous. lol If I logout of KDE, or >> have the screen locked, ctrl+alt=L key sequence, how secure is that if I >> have good passwords that are virtually impossible to crack? My login >> manager is sddm. As a example, if someone breaks into my home, is there >> a easy way to get past that? I recall the old windoze 98 days where a >> certain key sequence would bypass the password prompt. Is there a way >> known to crooks and such that can bypass or easily defeat passwords? > The only secure lockscreen is XScreenSaver. > https://www.jwz.org/blog/2021/01/i-told-you-so-2021-edition/ > > I have that installed here. Question now is, is that what locks my screen or is KDE/sddm/something else doing that besides xscreensaver. >From my poking around, I don't think I'm using xscreensaver. I'm trying to figure out how that works so I can get it to be used with KDE and any other GUI I use. Being able to use ctrl+alt=L would be a nice bonus. Thanks for that info. It gets me started. Dale :-) :-)
Re: [gentoo-user] KDE, sddm etc security. Plus LVM question.
On 19/03/2022 08:03, Dale wrote: Howdy, I been thinking. Yea, that's dangerous. lol If I logout of KDE, or have the screen locked, ctrl+alt=L key sequence, how secure is that if I have good passwords that are virtually impossible to crack? My login manager is sddm. As a example, if someone breaks into my home, is there a easy way to get past that? I recall the old windoze 98 days where a certain key sequence would bypass the password prompt. Is there a way known to crooks and such that can bypass or easily defeat passwords? I'm not aware of any such shortcuts. There are always bugs, and design flaws, and I believe there is such a design flaw in X such that it's POSSIBLE to bypass a screen-lock. I'm aware that if a person boots up where no password is required, that will bypass, even as root if I recall correctly. I'm just looking for something that is even easier than that. Actually, systemd is actively working on closing that hole ... Also, if I have a encrypted hard drive open and mounted and then cut off power, doesn't that disable the decryption for the drive? In other words, I pull the plug and someone powers it back up, the drive is encrypted again and requires a password. Yes. If you even so much as SUSPEND your system, it's considered a serious bug for the encryption key to be flushed to disk - it has to be wiped - and with no key decryption is no longer possible. Also, I'm planning to reorganize and encrypt some more stuff here. I want to remove one hard drive from my home thingy. Is it really as easy as pvmove /dev/sdx the device I want to remove? From my understanding I need to reduce the file system first. Is that correct? I'm often amazed at how easy some things can be done with LVM. I think you mean pvREmove and, provided you have sufficient unused space in your PV greater or equal to the size of the drive, yes it really is that simple. Of course, if you have LESS free space, LVM will be unable to move everything off sdx and you're going to lose data. If you're planning to re-organise by adding larger disks, check out whether LVM has the equivalent of "mdadm --replace ...", where md-raid will move stuff on a running system. Cheers, Wol
Re: [gentoo-user] gentoo for a virtual server in the cloud?
:thumbsup: Thank you. On 3/19/22 09:08, Matthias Hanft wrote: n952162 wrote: You booted the minimal install ISO and went through the steps of partitioning the disk, network, etc? Yes. Exactly the same way as I did for my server at home. I was thinking that there were special drivers necessary for the virtual devices offered by the platform. Maybe even proprietary Not in my case. The provider uses VMware for his virtual servers, and Gentoo didn't need any special drivers or something. Here's the output of "lspci": --- cut here --- 00:00.0 Host bridge: Intel Corporation 440BX/ZX/DX - 82443BX/ZX/DX Host bridge (rev 01) 00:01.0 PCI bridge: Intel Corporation 440BX/ZX/DX - 82443BX/ZX/DX AGP bridge (rev 01) 00:07.0 ISA bridge: Intel Corporation 82371AB/EB/MB PIIX4 ISA (rev 08) 00:07.1 IDE interface: Intel Corporation 82371AB/EB/MB PIIX4 IDE (rev 01) 00:07.3 Bridge: Intel Corporation 82371AB/EB/MB PIIX4 ACPI (rev 08) 00:07.7 System peripheral: VMware Virtual Machine Communication Interface (rev 10) 00:0f.0 VGA compatible controller: VMware SVGA II Adapter 00:10.0 SCSI storage controller: Broadcom / LSI 53c1030 PCI-X Fusion-MPT Dual Ultra320 SCSI (rev 01) 00:11.0 PCI bridge: VMware PCI bridge (rev 02) 00:15.0 PCI bridge: VMware PCI Express Root Port (rev 01) [the same for 00:15.0..7, 00:16.0..7, 00:17.0..7, and 00:18.0..7] 02:00.0 Ethernet controller: Intel Corporation 82545EM Gigabit Ethernet Controller (Copper) (rev 01) --- cut here --- Gentoo could handle all this just out of the box. -Matt
Re: [gentoo-user] gentoo for a virtual server in the cloud?
n952162 wrote: > > You booted the minimal install ISO and went through the steps of > partitioning the disk, network, etc? Yes. Exactly the same way as I did for my server at home. > I was thinking that there were special drivers necessary for the virtual > devices offered by the platform. Maybe even proprietary Not in my case. The provider uses VMware for his virtual servers, and Gentoo didn't need any special drivers or something. Here's the output of "lspci": --- cut here --- 00:00.0 Host bridge: Intel Corporation 440BX/ZX/DX - 82443BX/ZX/DX Host bridge (rev 01) 00:01.0 PCI bridge: Intel Corporation 440BX/ZX/DX - 82443BX/ZX/DX AGP bridge (rev 01) 00:07.0 ISA bridge: Intel Corporation 82371AB/EB/MB PIIX4 ISA (rev 08) 00:07.1 IDE interface: Intel Corporation 82371AB/EB/MB PIIX4 IDE (rev 01) 00:07.3 Bridge: Intel Corporation 82371AB/EB/MB PIIX4 ACPI (rev 08) 00:07.7 System peripheral: VMware Virtual Machine Communication Interface (rev 10) 00:0f.0 VGA compatible controller: VMware SVGA II Adapter 00:10.0 SCSI storage controller: Broadcom / LSI 53c1030 PCI-X Fusion-MPT Dual Ultra320 SCSI (rev 01) 00:11.0 PCI bridge: VMware PCI bridge (rev 02) 00:15.0 PCI bridge: VMware PCI Express Root Port (rev 01) [the same for 00:15.0..7, 00:16.0..7, 00:17.0..7, and 00:18.0..7] 02:00.0 Ethernet controller: Intel Corporation 82545EM Gigabit Ethernet Controller (Copper) (rev 01) --- cut here --- Gentoo could handle all this just out of the box. -Matt
[gentoo-user] KDE, sddm etc security. Plus LVM question.
Howdy, I been thinking. Yea, that's dangerous. lol If I logout of KDE, or have the screen locked, ctrl+alt=L key sequence, how secure is that if I have good passwords that are virtually impossible to crack? My login manager is sddm. As a example, if someone breaks into my home, is there a easy way to get past that? I recall the old windoze 98 days where a certain key sequence would bypass the password prompt. Is there a way known to crooks and such that can bypass or easily defeat passwords? I'm aware that if a person boots up where no password is required, that will bypass, even as root if I recall correctly. I'm just looking for something that is even easier than that. Also, if I have a encrypted hard drive open and mounted and then cut off power, doesn't that disable the decryption for the drive? In other words, I pull the plug and someone powers it back up, the drive is encrypted again and requires a password. Also, I'm planning to reorganize and encrypt some more stuff here. I want to remove one hard drive from my home thingy. Is it really as easy as pvmove /dev/sdx the device I want to remove? From my understanding I need to reduce the file system first. Is that correct? I'm often amazed at how easy some things can be done with LVM. Thanks to all for the thoughts. Dale :-) :-)