New DRAFT page - comments are invited.
http://wiki.centos.org/HowTos/Virtualization/VirtualBox/CentOSguest
Phil
___
CentOS-docs mailing list
CentOS-docs@centos.org
http://lists.centos.org/mailman/listinfo/centos-docs
Hi all,
I'm happy to announce a new tutorial!
https://alteeve.com/w/2-Node_Red_Hat_KVM_Cluster_Tutorial
This tutorial walks a user through the entire process of building a
2-Node cluster for making KVM virtual machines highly available. It uses
Red Hat Cluster services v3 and DRBD 8.3.12.
This is sweet, I am in need for doing something for a SMB and nothing is
out there that is affordable for small busineesses, will look into this.
On Tue, Jan 3, 2012 at 8:29 AM, Digimer li...@alteeve.com wrote:
Hi all,
I'm happy to announce a new tutorial!
On 01/03/2012 09:43 AM, Tom Bishop wrote:
This is sweet, I am in need for doing something for a SMB and nothing is
out there that is affordable for small busineesses, will look into this.
Feel free to ask if you have any questions. :)
--
Digimer
E-Mail: digi...@alteeve.com
Thanks! This is great - I've been planning and am half-way though creating such
a cluster, but I've been using Fedora15/16 as Centos6 wasn't out when I
started. Any idea if this will work with Fedora as a host OS, or does it have
to be RHEL/Centos?
-Original message-
To: CentOS
On 01/03/2012 10:20 AM, Clint Redwood wrote:
Thanks! This is great - I've been planning and am half-way though
creating such a cluster, but I've been using Fedora15/16 as Centos6
wasn't out when I started. Any idea if this will work with Fedora as a
host OS, or does it have to be
I have set up a kvm host and configured a standard clone
prototype for generating new guests. One persistent (pun
intended) annoyance when cloning is the behaviour of udev
with respect to the virtual network interface.
The prototype is configured with just eth0 having a
dedicated IP addr. When
Greetings,
- Original Message -
I have set up a kvm host and configured a standard clone
prototype for generating new guests. One persistent (pun
intended) annoyance when cloning is the behaviour of udev
with respect to the virtual network interface.
The prototype is configured
buenas tardes
my nombre es henry estoy iniciandome en servidores proxy, ya tengo construido
un servidor pero me gustaria administrar el ancho de banda para un cierto
numero de usuarios me podrias ayudar por favor.
Te recomendaría investigar un poco sobre squid + delay pools.
Y los usuarios puedes distinguirlos por host (lo mas sencillo), o por
usuario / grupo (ldap / winbind)
El 2 de enero de 2012 17:39, Henry Cussi henryc...@hotmail.com escribió:
buenas tardes
my nombre es henry estoy iniciandome
On 01/02/2012 03:39 PM, Henry Cussi wrote:
buenas tardes
my nombre es henry estoy iniciandome en servidores proxy, ya tengo
construido un servidor pero me gustaria administrar el ancho de banda
para un cierto numero de usuarios me podrias ayudar por favor.
claro, revisa el htb.init o el
On 1/2/2012 11:04 PM, Les Mikesell wrote:
On Tue, Jan 3, 2012 at 12:41 AM, Bennett Haseltonbenn...@peacefire.org
wrote:
Standard/non-standard isn't the point. The point is to control what an
app can do even if some unexpected flaw lets it execute arbitrary
code.
What's the scenario where
On 01/02/2012 10:48 PM, Bennett Haselton wrote:
True but I travel a lot and sometimes need to connect to the machines
from subnets that I don't know about in advance.
You could secure another system somewhere on the internet (could be a
$20/month virtual host), leave no pointers to your
Hello Craig,
On Mon, 2012-01-02 at 01:04 -0700, Craig White wrote:
Very often, a single user with a
weak password has his account cracked and then a hacker can get a copy
of /etc/shadow and brute force the root password.
This is incorrect. The whole reasoning behind /etc/shadow is to hide the
On Tue, Jan 3, 2012 at 11:08 AM, Leonard den Ottolander
leon...@den.ottolander.nl wrote:
Hello Craig,
On Mon, 2012-01-02 at 01:04 -0700, Craig White wrote:
Very often, a single user with a
weak password has his account cracked and then a hacker can get a copy
of /etc/shadow and brute force
On 3 January 2012 02:30, Bennett Haselton benn...@peacefire.org wrote:
In other words, when SELinux causes a problem, it can take hours or days
to find out that SELinux is the cause -- and even then you're not done,
because you have to figure out a workaround if you want to fix the
problem
On 01/03/12 1:14 AM, Rudi Ahlers wrote:
How does something like c99shell allow a local user (not root) to read
the /etc/shadow file?
presumably it uses a suid utility? i'm not familiar with c99shell, but
thats classically how you elevate privileges.
--
john r pierce
On 1/2/2012 11:01 PM, John R. Dennison wrote:
On Mon, Jan 02, 2012 at 10:41:15PM -0800, Bennett Haselton wrote:
Again, you don't have to take my word for it -- in the first 10 Google
hits of pages with people posting about the problem I ran into, none of
the people helping them, thought to
Greetings,
I have installed phpmyadmin on a Centos 6.2 box.
When I try to access it through http://localhost/phpmyadmin it is
giving me a 403 forbidden error
any clues?
TIA.
--
Regards,
Rajagopal
___
CentOS mailing list
CentOS@centos.org
Hello Rudi,
On Tue, 2012-01-03 at 11:14 +0200, Rudi Ahlers wrote:
How does something like c99shell allow a local user (not root) to read
the /etc/shadow file?
I do not vouch for every app that is written to break good security
practices. Try
$ ls -l /etc/shadow
If the tool you are using
centos-boun...@centos.org schrieb am 03.01.2012 10:55:43:
Rajagopal Swaminathan raju.rajs...@gmail.com
Gesendet von: centos-boun...@centos.org
03.01.2012 10:55
Bitte antworten an
CentOS mailing list centos@centos.org
An
CentOS mailing list centos@centos.org
Kopie
Thema
Greetings
On Tue, Jan 3, 2012 at 3:32 PM, Andreas Reschke
andreas.resc...@behrgroup.com wrote:
centos-boun...@centos.org schrieb am 03.01.2012 10:55:43:
Rajagopal Swaminathan raju.rajs...@gmail.com
Gesendet von: centos-boun...@centos.org
03.01.2012 10:55
Bitte antworten an
CentOS mailing
On 1/3/2012 12:50 AM, Nataraj wrote:
On 01/02/2012 10:48 PM, Bennett Haselton wrote:
True but I travel a lot and sometimes need to connect to the machines
from subnets that I don't know about in advance.
You could secure another system somewhere on the internet (could be a
$20/month virtual
From: Rajagopal Swaminathan raju.rajs...@gmail.com
I have installed phpmyadmin on a Centos 6.2 box.
When I try to access it through http://localhost/phpmyadmin it is
giving me a 403 forbidden error
any clues?
It says you don't have access rights...
How did you setup the access rights?
JD
On 01/03/12 1:55 AM, Rajagopal Swaminathan wrote:
When I try to access it throughhttp://localhost/phpmyadmin it is
giving me a 403 forbidden error
I'd look in /var/log/httpd/{access,error}_log
maybe `tail -f /var/log/httpd/*_log` in a shell window, then hit the
webpage and see what new
From: email builder emailbuilde...@yahoo.com
The only hints I can find seem to suggest to remove
perl-IO-Socket-INET6, but trying to do so using yum (I don't
want to start using another method of package management)
tells me that spamassassin is a dependency and will also be
removed -
On Jan 3, 2012, at 5:12, Rajagopal Swaminathan raju.rajs...@gmail.com wrote:
Greetings
On Tue, Jan 3, 2012 at 3:32 PM, Andreas Reschke
andreas.resc...@behrgroup.com wrote:
centos-boun...@centos.org schrieb am 03.01.2012 10:55:43:
Rajagopal Swaminathan raju.rajs...@gmail.com
Gesendet von:
On 01/03/2012 03:46 AM, Rajagopal Swaminathan wrote:
1. Can somebody suggest a way to select all packages while installing from
DVD?
you cant install everything from the DVD, since packages overlap and
conflict with each other. a %post of yum --skip-broken install \*; might
be your best bet.
On Tue, Jan 3, 2012 at 4:28 AM, Bennett Haselton benn...@peacefire.org wrote:
But assuming the attacker is targeting my production system, suppose
they find a vulnerability and obtain the ability to run commands as root
on the system. Then wouldn't their first action be to remove
Hi all,
I'm happy to announce a new tutorial!
https://alteeve.com/w/2-Node_Red_Hat_KVM_Cluster_Tutorial
This tutorial walks a user through the entire process of building a
2-Node cluster for making KVM virtual machines highly available. It uses
Red Hat Cluster services v3 and DRBD 8.3.12.
I encountered a couple of strange events with respect to
password authentication this morning. Two of our staff
were unable to login onto several systems using their
usual passwords. Both users had last logged in on these
hosts using their accounts and passwords on Friday past.
The two accounts
On Tuesday 03 January 2012 07:57:47 Les Mikesell wrote:
On Tue, Jan 3, 2012 at 4:28 AM, Bennett Haselton benn...@peacefire.org
wrote:
But assuming the attacker is targeting my production system, suppose
they find a vulnerability and obtain the ability to run commands as root
on the
Having been on vacation, I'm coming in very late in this
Les Mikesell wrote:
On Tue, Jan 3, 2012 at 4:28 AM, Bennett Haselton benn...@peacefire.org
wrote:
snip
OK but those are *users* who have their own passwords that they have
chosen, presumably. User-chosen passwords cannot be assumed
On Tue, Jan 3, 2012 at 9:31 AM, Marc Deop damnsh...@gmail.com wrote:
Openvpn runs over UDP. With the tls-auth option it won't respond to
an unsigned packet. So without the key you can't tell the difference
between a listening openvpn or a firewall that drops packets silently.
That is, you
James B. Byrne wrote:
I encountered a couple of strange events with respect to
password authentication this morning. Two of our staff
were unable to login onto several systems using their
usual passwords. Both users had last logged in on these
hosts using their accounts and passwords on
On Tue, Jan 3, 2012 at 12:48 AM, Bennett Haselton benn...@peacefire.org wrote:
You can also set up openvpn on the server and control ports like ssh to
only be open to you if you are using an openvpn client to connect to the
machine.
True but I travel a lot and sometimes need to connect to
On Tue, Jan 3, 2012 at 3:14 AM, Rudi Ahlers r...@softdux.com wrote:
Very often, a single user with a
weak password has his account cracked and then a hacker can get a copy
of /etc/shadow and brute force the root password.
This is incorrect. The whole reasoning behind /etc/shadow is to hide
On Tue, Jan 03, 2012 at 10:30:38AM -0500, James B. Byrne wrote:
I encountered a couple of strange events with respect to
password authentication this morning. Two of our staff
were unable to login onto several systems using their
usual passwords. Both users had last logged in on these
hosts
I have set up a kvm host and configured a standard clone
prototype for generating new guests. One persistent (pun
intended) annoyance when cloning is the behaviour of udev
with respect to the virtual network interface.
The prototype is configured with just eth0 having a
dedicated IP addr. When
James B. Byrne wrote:
I have set up a kvm host and configured a standard clone
prototype for generating new guests. One persistent (pun
intended) annoyance when cloning is the behaviour of udev
with respect to the virtual network interface.
The prototype is configured with just eth0 having
Send CentOS-announce mailing list submissions to
centos-annou...@centos.org
To subscribe or unsubscribe via the World Wide Web, visit
http://lists.centos.org/mailman/listinfo/centos-announce
or, via email, send a message with subject or body 'help' to
I have set up a kvm host and configured a standard clone
prototype for generating new guests. One persistent (pun
intended) annoyance when cloning is the behaviour of udev
with respect to the virtual network interface.
we experience this problem with VMware too.
The prototype is
On 01/03/2012 04:47 PM, m.r...@5-cent.us wrote:
Having been on vacation, I'm coming in very late in this
Les Mikesell wrote:
On Tue, Jan 3, 2012 at 4:28 AM, Bennett Haseltonbenn...@peacefire.org
wrote:
snip
OK but those are *users* who have their own passwords that they have
chosen,
On Tue, January 3, 2012 11:58, m.r...@5-cent.us wrote:
On the physical box, how many NICs are there?
There are two physical NICs. Eth0 is the WAN, Eth1 is the
LAN. The vm guests are supposed to only be accessible via
the WAN. The prototype is configured with only one NIC
connected to the
Ljubomir,
Ljubomir Ljubojevic wrote:
On 01/03/2012 04:47 PM, m.r...@5-cent.us wrote:
Having been on vacation, I'm coming in very late in this
Les Mikesell wrote:
On Tue, Jan 3, 2012 at 4:28 AM, Bennett Haseltonbenn...@peacefire.org
wrote:
snip
OK but those are *users* who have their
James B. Byrne wrote:
On Tue, January 3, 2012 11:58, m.r...@5-cent.us wrote:
On the physical box, how many NICs are there?
There are two physical NICs. Eth0 is the WAN, Eth1 is the
LAN. The vm guests are supposed to only be accessible via
the WAN. The prototype is configured with only
Whoops, sorry, thought this was offlist.
mark, not reading closely enough.
m.r...@5-cent.us wrote:
Ljubomir,
Ljubomir Ljubojevic wrote:
On 01/03/2012 04:47 PM, m.r...@5-cent.us wrote:
Having been on vacation, I'm coming in very late in this
Les Mikesell wrote:
On Tue, Jan 3,
On 1/3/2012 11:36 AM, Ljubomir Ljubojevic wrote:
On 01/03/2012 04:47 PM, m.r...@5-cent.us wrote:
Having been on vacation, I'm coming in very late in this
Les Mikesell wrote:
On Tue, Jan 3, 2012 at 4:28 AM, Bennett Haseltonbenn...@peacefire.org
wrote:
snip
OK but those are *users* who
On Jan 3, 2012 12:36 PM, Ljubomir Ljubojevic off...@plnet.rs wrote:
On 01/03/2012 04:47 PM, m.r...@5-cent.us wrote:
Having been on vacation, I'm coming in very late in this
Les Mikesell wrote:
On Tue, Jan 3, 2012 at 4:28 AM, Bennett Haseltonbenn...@peacefire.org
wrote:
snip
OK
Bennett Haselton wrote:
mark wrote:
snip
1. How will you generate truly random? Clicks on a Geiger counter?
There is no such thing as a random number generator.
snip
That there are 10^21 possible random 12-character alphanumeric passwords
-- making it secure against brute-forcing -- is a
On 1/3/2012 12:31 PM, Pete Travis wrote:
On Jan 3, 2012 12:36 PM, Ljubomir Ljubojevicoff...@plnet.rs wrote:
On 01/03/2012 04:47 PM, m.r...@5-cent.us wrote:
Having been on vacation, I'm coming in very late in this
Les Mikesell wrote:
On Tue, Jan 3, 2012 at 4:28 AM, Bennett
On 1/3/2012 12:32 PM, m.r...@5-cent.us wrote:
Bennett Haselton wrote:
mark wrote:
snip
1. How will you generate truly random? Clicks on a Geiger counter?
There is no such thing as a random number generator.
snip
That there are 10^21 possible random 12-character alphanumeric passwords
--
Le 2012-01-03 03:35, fakessh a écrit :
Le 2012-01-03 02:44, Ljubomir Ljubojevic a écrit :
On 01/03/2012 02:33 AM, fakessh wrote:
Le 2012-01-03 02:21, Ljubomir Ljubojevic a écrit :
On 01/03/2012 02:15 AM, fakessh @ wrote:
Le mardi 03 janvier 2012 à 02:02 +0100, fakessh a écrit :
Le
Le 2012-01-03 22:14, fakessh a écrit :
Le 2012-01-03 03:35, fakessh a écrit :
Le 2012-01-03 02:44, Ljubomir Ljubojevic a écrit :
On 01/03/2012 02:33 AM, fakessh wrote:
Le 2012-01-03 02:21, Ljubomir Ljubojevic a écrit :
On 01/03/2012 02:15 AM, fakessh @ wrote:
Le mardi 03 janvier 2012 à
Here's the qualifying statement I made, in an attempt to preempt pedantic
squabbles over my choice of arbitrary figures and oversimplified math:
I am not a statistician, but
Here is a statement intended to startle you into re-examining your position:
Simplistic probability puts the odds of
On Sunday, January 01, 2012 06:27:32 PM Bennett Haselton wrote:
(I have already practically worn out my keyboard explaining the math behind
why I think a 12-character alphanumeric password is secure enough :) )
Also see:
https://lwn.net/Articles/369703/
Bennett Haselton wrote:
On 1/3/2012 12:32 PM, m.r...@5-cent.us wrote:
Bennett Haselton wrote:
mark wrote:
snip
1. How will you generate truly random? Clicks on a Geiger counter?
There is no such thing as a random number generator.
snip
To date, *nobody* on this thread has ever responded
On 1/3/2012 2:04 PM, Lamar Owen wrote:
On Tuesday, January 03, 2012 03:24:34 PM Bennett Haselton wrote:
That there are 10^21 possible random 12-character alphanumeric passwords
-- making it secure against brute-forcing -- is a fact, not an opinion.
To date, *nobody* on this thread has ever
On Tue, 2012-01-03 at 11:52 -0500, James B. Byrne wrote:
I have set up a kvm host and configured a standard clone
prototype for generating new guests. One persistent (pun
intended) annoyance when cloning is the behaviour of udev
with respect to the virtual network interface.
The prototype
On 1/3/2012 2:10 PM, Pete Travis wrote:
Here's the qualifying statement I made, in an attempt to preempt pedantic
squabbles over my choice of arbitrary figures and oversimplified math:
I am not a statistician, but
Here is a statement intended to startle you into re-examining your position:
On Tue, Jan 3, 2012 at 5:12 PM, Bennett Haselton benn...@peacefire.org wrote:
The critical thing to remember is that in key auth the authenticating key
never leaves the client system, rather an encrypted 'nonce' is sent (the
nonce is encrypted by the authenticating key), which only the
On 1/3/2012 2:13 PM, Lamar Owen wrote:
On Sunday, January 01, 2012 06:27:32 PM Bennett Haselton wrote:
(I have already practically worn out my keyboard explaining the math behind
why I think a 12-character alphanumeric password is secure enough :) )
Also see:
https://lwn.net/Articles/369703/
On 1/3/2012 4:21 PM, Les Mikesell wrote:
On Tue, Jan 3, 2012 at 5:12 PM, Bennett Haseltonbenn...@peacefire.org
wrote:
The critical thing to remember is that in key auth the authenticating key
never leaves the client system, rather an encrypted 'nonce' is sent (the
nonce is encrypted by
Le 2012-01-04 01:48, Ljubomir Ljubojevic a écrit :
On 01/03/2012 10:14 PM, fakessh wrote:
So I think do a post on the bugtracker of elrepo to ask
the creation of a new kmod-*
So I tried to compile the driver provided
in [1]
module appears to load properly
When you run lspci -v, it shows
Greetings.
I am running vmware fusion 4.1.1 on a OSX host. Centos6.2 is a guest.
The box is a macbook laptop running leopard.
Before upgrading to 6.2, the display auto-resize (or auto-fill) was
working fine. After 6.2, it has stopped working.
Centos is fully updated to 6.2. I have tried to
On Tue, Jan 3, 2012 at 5:13 PM, Peter Larsen
plar...@famlarsen.homelinux.com wrote:
Is there no way to alter udev's behaviour? Is udev even
needed on a server system using virtual hardware?
Altering the rules file not a big deal in itself but it
adds needless busywork when setting up a new
Somebody in Oracle told me, they need one year to test, I'm not sure,
it's true or not.
At 2012-01-02 Mon 09:46 -0600,Johnny Hughes wrote:
On 01/01/2012 06:07 PM, Christopher J. Buckley wrote:
On 29 December 2011 19:15, Johnny Hughes joh...@centos.org wrote:
They can't very well (at least
On Tue, Jan 3, 2012 at 6:49 PM, Bennett Haselton benn...@peacefire.org wrote:
Of the compromised machines on the Internet, what proportion do you
think were hacked via MITM-and-advanced-crypto, compared to exploits in
the services?
Proportions don't matter. Unless you have something
On Wed, Jan 4, 2012 at 11:40 AM, Les Mikesell lesmikes...@gmail.com wrote:
Do you lock your doors or just leave them open because anyone who
wants in can break a window anyway?
Hi Benneth,
In conclusion, IMHO, I think you are worried too much :)
Don't be afraid just because it's a dangerous
Greetings,
On Tue, Jan 3, 2012 at 4:40 PM, John R Pierce pie...@hogranch.com wrote:
On 01/03/12 1:55 AM, Rajagopal Swaminathan wrote:
When I try to access it throughhttp://localhost/phpmyadmin it is
giving me a 403 forbidden error
I'd look in /var/log/httpd/{access,error}_log
maybe `tail
Greetings,
On Tue, Jan 3, 2012 at 5:17 PM, John Broome jbro...@gmail.com wrote:
On Jan 3, 2012, at 5:12, Rajagopal Swaminathan raju.rajs...@gmail.com wrote:
Greetings
On Tue, Jan 3, 2012 at 3:32 PM, Andreas Reschke
andreas.resc...@behrgroup.com wrote:
centos-boun...@centos.org schrieb am
Greetings,
On Tue, Jan 3, 2012 at 10:22 AM, Les Mikesell lesmikes...@gmail.com wrote:
Trac is packaged in the EPEL repository, and an only slightly outdated
subversion is in the base distribution. Redmine and git might be more
fashionable these days.
Thanks Les.
I _did_ install trac from
Greetings,
On Tue, Jan 3, 2012 at 7:24 PM, Karanbir Singh mail-li...@karan.org wrote:
On 01/03/2012 03:46 AM, Rajagopal Swaminathan wrote:
1. Can somebody suggest a way to select all packages while installing from
DVD?
you cant install everything from the DVD, since packages overlap and
On 01/03/12 7:57 PM, Rajagopal Swaminathan wrote:
[Wed Jan 04 09:21:52 2012] [error] [client ::1] client denied by server
configuration: /usr/share/phpmyadmin
that says it all right there.
::1 is the ipv6 localhost. you probably allowed 127.0.0.1 but not ::1
you should.
--
john r pierce
Greetings,
On Wed, Jan 4, 2012 at 9:36 AM, John R Pierce pie...@hogranch.com wrote:
On 01/03/12 7:57 PM, Rajagopal Swaminathan wrote:
[Wed Jan 04 09:21:52 2012] [error] [client ::1] client denied by server
configuration: /usr/share/phpmyadmin
that says it all right there.
::1 is the ipv6
If attack A is 1,000 times more likely
to work than attack B, you don't think it's more important to guard
against attack A?
It's not either/or here. You could be the guy who gets hit by lightning.
I'm not sure I entirely agree with you there Les.
I'm not going to delve into the
The /etc/shadow file has fields that control account login properties. The
following is out of the man file for /etc/shadow:
struct spwd {
char *sp_namp; /* user login name */
char *sp_pwdp; /* encrypted password */
long sp_lstchg; /* last
Good morning all,
I currently have a website that was written in ASP back in 1999. The
system is currently running Windows 2003 Server with MsSQL. Before
everyone flames me for being in the wrong place, I was wondering if
there is a way to allow centos to run old ASP code? I know years ago
78 matches
Mail list logo