[SOLVED] Re: [gentoo-user] jupyter notebook 500 : Internal Server Error

2020-06-27 Thread Valmor F. de Almeida



On 6/26/20 10:08 AM, Andreas K. Huettel wrote:

Am Donnerstag, 25. Juni 2020, 22:13:46 CEST schrieb Valmor de Almeida:

Hello,
I had to enable ~amd64 to emerge jupyter so I know this is bound for
problems. However, anyone there able to use jupyter notebooks in
gentoo?
No matter what notebook I try to open, I get the internal server error.
Thank you.

Try updating dev-python/nbconvert to a version newer than the stable one.

You probably did this the same way as me, keywording only what was really
necessary on an otherwise stable system. Problem is, notebooks have an
internal versioning, and nbconvert-5.2 doesn't support recent versions
anymore. After updating nbconvert things worked fine for me.

(Time to fix this, I know, but there's only so many hours in the day...)


Thank you. It worked!

--

Vamor

Here is some info for reference:

*  dev-python/jupyter
  Latest version available: 1.0.0-r2
  Latest version installed: 1.0.0-r2
  Size of files: 15 KiB
  Homepage:  https://jupyter.org
  Description:   Jupyter metapackage. Install all the Jupyter 
components in one go

  License:   BSD

*  dev-python/jupyter_client
  Latest version available: 5.2.3-r1
  Latest version installed: 5.2.3-r1
  Size of files: 266 KiB
  Homepage:  https://jupyter.org
  Description:   Jupyter protocol implementation and client libraries
  License:   BSD

*  dev-python/jupyter_console
  Latest version available: 6.1.0
  Latest version installed: 6.1.0
  Size of files: 28 KiB
  Homepage:  https://jupyter.org
  Description:   A terminal-based console frontend for Jupyter kernels
  License:   BSD

*  dev-python/jupyter_core
  Latest version available: 4.6.1-r1
  Latest version installed: 4.6.1-r1
  Size of files: 66 KiB
  Homepage:  https://jupyter.org
  Description:   Core common functionality of Jupyter projects
  License:   BSD

*  dev-python/nbconvert
  Latest version available: 5.6.1
  Latest version installed: 5.5.0
  Size of files: 687 KiB
  Homepage:  https://nbconvert.readthedocs.io/
  Description:   Converting Jupyter Notebooks
  License:   BSD

/etc/portage/package.accept_keywords/jupyter

dev-python/jupyter ~amd64
dev-python/jupyter_console ~amd64
dev-python/nbconvert ~amd64

/etc/portage/package.use/jupyter

net-libs/zeromq drafts
dev-python/PyQt5 gui svg widgets
x11-libs/libxkbcommon X
dev-libs/libpcre pcre16
dev-libs/libpcre2 pcre16

emerge jupyter

emerge =nbconvert-5.5.0





Re: [gentoo-user] What's with all these "acct-group" ebuilds recently?

2020-06-27 Thread Sid Spry
On Sat, Jun 27, 2020, at 5:43 AM, Rich Freeman wrote:
> But, as I said, using more uids/gids in general means having more
> separation.  In general it only increases security, with the caveat
> that it does potentially make auditing more complex.
> 

Android's security model is uid per app. This is about as effective you can get 
on a mostly stock kernel. There is essentially no isolation within a uid. It's 
also why it is very hard to use an Android phone for anything without rooting 
it.

If you look at the CVEs for Android they are typically rather benign, the more 
persistent issue is you constantly carry the device with you.



Re: [gentoo-user] What's with all these "acct-group" ebuilds recently?

2020-06-27 Thread Rich Freeman
On Fri, Jun 26, 2020 at 10:18 PM james  wrote:
>
> On 6/26/20 4:40 PM, Rich Freeman wrote:
> > Removing the group doesn't actually make things more secure, because
> > processes can use a gid even if it doesn't exist in /etc/groups.
> > Effectively any POSIX system has every uid/gid available even if there
> > is no /etc/passwd at all.
>
> And that is coded into the parts of the kernel, we cannot eliminate?
> Typical sploits?
>
> Curiously, a bit deeper explanation?

So, ultimately a uid/gid is just a number, and a field in a couple of
tables.  Inodes have them, and processes have them.  There might be
other things that have them that I'm not thinking of, but those are
probably the main two.

If a process wants to send signals to another process the uids have to
match, or it must have a capability to break this rule.  If a process
wants to read a file, the uid/gid/permissions/ACLs/etc must correspond
appropriately.  I'm sure there are a bunch of other system calls where
uids/gids matter as well.

The field that stores the IDs has a certain size, and thus any number
within the expressible range is valid.  You can't "get rid" of a UID
any more than you can ban the number 13.  However, since the logic is
based on matching it really doesn't matter much - if you launch a
process with a UID you intended to be "unused" it basically is
completely isolated as far as the filesystem and other processes go
since its UID doesn't match anything else (it could still touch world
read/writeable files, but that is true if it ran under a UID you
preferred that it use).

The files /etc/passwd and /etc/group are used by various system
programs to map these IDs to human-readable names, but they really
aren't part of how the kernel works.  Just about any command that can
take a username can take a user ID, and if you want to really drive
people crazy go ahead and try using numeric usernames (I believe the
IDs take precedence in command lines).

So, if you deleted /etc/{passwd,group,shadow} you could still have a
"perfectly working" linux userspace, but commands like login wouldn't
work as those use usernames and of course there would be no mapping to
passwords.  However init would still run as uid 0, and it could launch
processes with other uids, and those processes would have regular
filesystem behavior.  It wouldn't be POSIX and various things might
break, but you could have a name-less userspace just fine on linux.
The kernel itself never looks at /etc/shadow and so on - it just sees
numeric IDs.  Android is an example of an OS that makes some
substantial changes in userspace to how things like UIDs are
traditionally used (that, and the OOM killer).

Most things associated with users/groups in linux are conventions
implemented in userspace.

But, as I said, using more uids/gids in general means having more
separation.  In general it only increases security, with the caveat
that it does potentially make auditing more complex.

-- 
Rich