Re: Shockwave Flash has crashed.

2014-09-26 Thread Javier Silva
2014-09-23 21:08 GMT+02:00 Jordi Boixader (Idroj) id...@bergueda.org: Hola, Des de fa unes setmanes, que els navegadors Google Chrome i Chromium em donen l'error Shockwave Flash has crashed. tinc la Debian 7.6 Wheezy x86_64 M'ho fa a diferents pagines, Facebook, algun video de YouTube (no

Scopri la classe di Range Rover

2014-09-26 Thread Invito Land Rover
Aggiungi mn...@sender.permission-dem.it alla tua rubrica [Versione web](http://sender.permission-dem.it/nl/link?c=27b4rd=4cih=28bkj5oap6djikbbpt98bkk76qi=4l1n=4cjp=T301800627s=wvsn=4cj)

Re: Linux et Unix affectés par une faille critique dans Bash

2014-09-26 Thread JUPIN Alain
Le 25/09/2014 22:24, andre_deb...@numericable.fr a écrit : La vulnérabilité pourrait constituer une plus grande menace que Heartbleed

Re: Linux et Unix affectés par une faille critique dans Bash

2014-09-26 Thread Charles Plessy
Le Fri, Sep 26, 2014 at 07:56:06AM +0200, JUPIN Alain a écrit : Non ce n'est pas un hoax ! Sur wheezy, la mise à jour a été publiée (bash a été mis à jour lors de l'update/upgrade) Par contre, pas de mise à jour pour squeeze (oui je sais elle est obsolète) Bonne nouvelle: bash

Re: Linux et Unix affectés par une faille critique dans Bash

2014-09-26 Thread Daniel Huhardeaux
Le 26/09/2014 08:11, Charles Plessy a écrit : Le Fri, Sep 26, 2014 at 07:56:06AM +0200, JUPIN Alain a écrit : Non ce n'est pas un hoax ! Sur wheezy, la mise à jour a été publiée (bash a été mis à jour lors de l'update/upgrade) Par contre, pas de mise à jour pour squeeze (oui je sais elle est

Re: Linux et Unix affectés par une faille critique dans Bash

2014-09-26 Thread Frédéric MASSOT
Le 26/09/2014 10:03, Daniel Huhardeaux a écrit : Le 26/09/2014 08:11, Charles Plessy a écrit : Le Fri, Sep 26, 2014 at 07:56:06AM +0200, JUPIN Alain a écrit : Non ce n'est pas un hoax ! Sur wheezy, la mise à jour a été publiée (bash a été mis à jour lors de l'update/upgrade) Par contre, pas de

Re: Linux et Unix affectés par une faille critique dans Bash

2014-09-26 Thread Francois Lafont
Bonjour, Le 25/09/2014 22:24, andre_deb...@numericable.fr a écrit : La vulnérabilité pourrait constituer une plus grande menace que Heartbleed

Re: Linux et Unix affectés par une faille critique dans Bash

2014-09-26 Thread andre_debian
On Friday 26 September 2014 07:56:06 JUPIN Alain wrote: env x='() { :;}; echo vulnerable' bash -c 'echo hello' J'ai upgradé bash et relancé, tapé la commande ci-dessus et j'ai ce message de warning : bash: warning: x: ignoring function definition attempt bash: erreur lors de l'import de la

Re: Linux et Unix affectés par une faille critique dans Bash

2014-09-26 Thread David Guyot
Bonjour, tout le monde. Ce message d'erreur signifie, à mon sens, que Bash a détecté ta tentative de création de fonction par une variable d'environnement et l'a rejetée. Ça prouve que le correctif est appliqué chez toi. Cordialement. Le vendredi 26 septembre 2014 à 11:16 +0200,

Re: Linux et Unix affectés par une faille critique dans Bash

2014-09-26 Thread admini
Le 26/09/2014 11:16, andre_deb...@numericable.fr a écrit : On Friday 26 September 2014 07:56:06 JUPIN Alain wrote: env x='() { :;}; echo vulnerable' bash -c 'echo hello' J'ai upgradé bash et relancé, tapé la commande ci-dessus et j'ai ce message de warning : bash: warning: x: ignoring

Re: Linux et Unix affectés par une faille critique dans Bash

2014-09-26 Thread Sébastien NOBILI
Bonjour, Le vendredi 26 septembre 2014 à 11:03, Frédéric MASSOT a écrit : Sur un serveur web, est-ce que le fait d'avoir le lien /bin/sh vers dash empêche ce type d'attaque ou limite l'attaque à certain CGI mal écrit ? Si tous les CGI utilisent « /bin/sh », alors pas de problème. En revanche,

Re: Linux et Unix affectés par une faille critique dans Bash

2014-09-26 Thread Belaïd
bonjour, Le 26 sept. 2014 11:25, admini adm...@freeatome.com a écrit : Le 26/09/2014 11:16, andre_deb...@numericable.fr a écrit : On Friday 26 September 2014 07:56:06 JUPIN Alain wrote: env x='() { :;}; echo vulnerable' bash -c 'echo hello' J'ai upgradé bash et relancé, tapé la commande

Re: Linux et Unix affectés par une faille critique dans Bash

2014-09-26 Thread Belaïd
bonjour, la nouvelle mise à jour bash 4.2+dfsg-0.1+deb7u3 a vue le jour hier soir vers 23h30 Le 26 sept. 2014 11:25, admini adm...@freeatome.com a écrit : Le 26/09/2014 11:16, andre_deb...@numericable.fr a écrit : On Friday 26 September 2014 07:56:06 JUPIN Alain wrote: env x='() { :;}; echo

Re: Linux et Unix affectés par une faille critique dans Bash

2014-09-26 Thread Frédéric MASSOT
Le 26/09/2014 11:44, Sébastien NOBILI a écrit : Bonjour, Le vendredi 26 septembre 2014 à 11:03, Frédéric MASSOT a écrit : Sur un serveur web, est-ce que le fait d'avoir le lien /bin/sh vers dash empêche ce type d'attaque ou limite l'attaque à certain CGI mal écrit ? Si tous les CGI utilisent

Re: Linux et Unix affectés par une faille critique dans Bash

2014-09-26 Thread Yves Rutschle
On Fri, Sep 26, 2014 at 11:10:53AM +0200, Francois Lafont wrote: Perso, même si c'est vraiment une grosse faille, ça me semble moins grave que Heartbleed. Ça se discute, les effets n'étant pas le même... Par exemple, ici il va falloir mettre à jour les serveurs: c'est lourd, mais on sait

RE: Linux et Unix affectés par une faille critique dans Bash

2014-09-26 Thread valentin OVD
Le fix du CVE-2014-6272 n'est pas complet. Faut attendre le fix complet... -- ovd valentin@live.fr De : Frédéric MASSOTmailto:frede...@juliana-multimedia.com Envoyé : ‎26/‎09/‎2014 12:17 À :

Re: Linux et Unix affectés par une faille critique dans Bash

2014-09-26 Thread daniel huhardeaux
Le 26/09/2014 12:26, valentin OVD a écrit : Le fix du CVE-2014-6272 n'est pas complet. Faut attendre le fix complet... C'est le CVE-2014-6271 Le second est sorti depuis plus de 12h, c'est le CVE-2014-7169 -- ovd valentin@live.fr

Re: Linux et Unix affectés par une faille critique dans Bash

2014-09-26 Thread Vincent Lefevre
On 2014-09-26 11:10:53 +0200, Francois Lafont wrote: Perso, même si c'est vraiment une grosse faille, ça me semble moins grave que Heartbleed. Je suis d'accord. Je vais peut-être dire des bêtises (auquel cas je serais ravi d'avoir des explications) mais il me semble que si l'on prend

Re: Linux et Unix affectés par une faille critique dans Bash

2014-09-26 Thread Vincent Lefevre
On 2014-09-26 11:44:05 +0200, Sébastien NOBILI wrote: Le vendredi 26 septembre 2014 à 11:03, Frédéric MASSOT a écrit : Sur un serveur web, est-ce que le fait d'avoir le lien /bin/sh vers dash empêche ce type d'attaque ou limite l'attaque à certain CGI mal écrit ? Si tous les CGI utilisent

Re: Linux et Unix affectés par une faille critique dans Bash

2014-09-26 Thread Vincent Lefevre
On 2014-09-26 11:33:50 +0200, Yves Rutschle wrote: On Fri, Sep 26, 2014 at 11:10:53AM +0200, Francois Lafont wrote: Perso, même si c'est vraiment une grosse faille, ça me semble moins grave que Heartbleed. Ça se discute, les effets n'étant pas le même... Par exemple, ici il va falloir

Re: Linux et Unix affectés par une faille critique dans Bash

2014-09-26 Thread Sébastien NOBILI
Le vendredi 26 septembre 2014 à 12:45, Vincent Lefevre a écrit : Ou ceux qui exécutent un programme menant indirectement à l'exécution de bash, puisque l'environnement est hérité. grep /bin/bash /bin/* /usr/bin/* peut donner une idée de ce qui ne doit pas être exécuté (directement ou

Re: Linux et Unix affectés par une faille critique dans Bash

2014-09-26 Thread Philippe Gras
Le 26 sept. 14 à 11:44, Sébastien NOBILI a écrit : Bonjour, Le vendredi 26 septembre 2014 à 11:03, Frédéric MASSOT a écrit : Sur un serveur web, est-ce que le fait d'avoir le lien /bin/sh vers dash empêche ce type d'attaque ou limite l'attaque à certain CGI mal écrit ? Si tous les CGI

Re: Linux et Unix affectés par une faille critique dans Bash

2014-09-26 Thread Francois Lafont
Merci pour vos réponses. Effectivement je me trompais. Si j'ai bien compris, le problème n'est pas le fait qu'un attaquant (via le web, je me plaçais dans cette hypothèse) puisse *créer* une variable d'environnement particulière qu'un processus local bash utilisera ensuite. Le problème n'est pas

Re: Linux et Unix affectés par une faille critique dans Bash

2014-09-26 Thread daniel huhardeaux
Le 26/09/2014 15:12, Philippe Gras a écrit : Le 26 sept. 14 à 11:44, Sébastien NOBILI a écrit : Bonjour, Le vendredi 26 septembre 2014 à 11:03, Frédéric MASSOT a écrit : Sur un serveur web, est-ce que le fait d'avoir le lien /bin/sh vers dash empêche ce type d'attaque ou limite l'attaque à

Re: Linux et Unix affectés par une faille critique dans Bash

2014-09-26 Thread David Guyot
Le vendredi 26 septembre 2014 à 16:38 +0200, daniel huhardeaux a écrit : Ah ? Si tu gères des serveurs web je te propose de faire un simple cat fichier log serveur web|grep () { et de compter le nombre de tentatives d'accès comme par exemple 89.207.135.125 - - [25/Sep/2014:12:06:47 +0200]

Re: Linux et Unix affectés par une faille critique dans Bash

2014-09-26 Thread Philippe Gras
Le 26 sept. 14 à 16:45, David Guyot a écrit : Le vendredi 26 septembre 2014 à 16:38 +0200, daniel huhardeaux a écrit : Ah ? Si tu gères des serveurs web je te propose de faire un simple cat fichier log serveur web|grep () { et de compter le nombre de tentatives d'accès comme par exemple

Re: Linux et Unix affectés par une faille critique dans Bash

2014-09-26 Thread Dominique Asselineau
Philippe Gras wrote on Fri, Sep 26, 2014 at 05:32:58PM +0200 Le 26 sept. 14 à 16:45, David Guyot a écrit : Le vendredi 26 septembre 2014 à 16:38 +0200, daniel huhardeaux a écrit : Ah ? Si tu gères des serveurs web je te propose de faire un simple cat fichier log serveur web|grep () { et

Conseils sur l'utilisation de tc (traffic control)

2014-09-26 Thread Olivier
Bonjour, Voici le schema logique de mon installation (pour une résidence hôtelière): Modem xDSL --- xN --- Routeur Wheezy ---xM--- Points d'accès WiFi ---xP--- PC, Smartphones J'ai 5 à 7 modems ADSL (soit 50Mb/s de download théorique), 20 à 30 points d'accès WiFi et 100 utilisateurs instantanés.

Re: Linux et Unix affectés par une faille critique dans Bash

2014-09-26 Thread David Pinson
Le 26/09/2014 11:16, andre_deb...@numericable.fr a écrit : On Friday 26 September 2014 07:56:06 JUPIN Alain wrote: env x='() { :;}; echo vulnerable' bash -c 'echo hello' J'ai upgradé bash et relancé, tapé la commande ci-dessus et j'ai ce message de warning : bash: warning: x: ignoring

Re : Linux et Unix affectés par une faille critique dans Bash

2014-09-26 Thread nicolas . patrois
Le 26/09/2014 20:34:42, David Pinson a écrit : C'est parfait car c'est patché ! J’ai mis à jour ce matin et pas redémarré mes sessions. J’ai la même sortie. nicolas patrois : pts noir asocial -- RÉALISME M : Qu'est-ce qu'il nous faudrait pour qu'on nous considère comme des humains ? Un

Re: Linux et Unix affectés par une faille critique dans Bash

2014-09-26 Thread admini
pendant ce temps ca scanne sévère: () { :;}; /bin/bash -c \echo testing9123123\; /bin/uname -a je vois ça sur mon site de production. -- Lisez la FAQ de la liste avant de poser une question : http://wiki.debian.org/fr/FrenchLists Pour vous DESABONNER, envoyez un message avec comme objet

Re: Linux et Unix affectés par une faille critique dans Bash

2014-09-26 Thread Philippe Gras
Zut ! ~# env X=() { :;} ; echo busted /bin/sh -c echo completed busted completed ~# env X=() { :;} ; echo busted `which bash` -c echo completed busted completed Par contre dans mes logs, je n'ai que des trucs comme ça : 142.4.195.183 - - [26/Sep/2014:00:59:39 +0200] POST /cgi-bin/php/%63%

Après upgrade, Iceweasel ne se lance plus

2014-09-26 Thread andre_debian
Après un upgrage de Wheezy, suite au correctif de bash, Iceweasel ne se lance plus : $ iceweasel Error: Platform version '17.0.10' is not compatible with minVersion = 17.0.9 maxVersion = 17.0.9 La version 17.0.10 ne semble pas acceptée. Merci d'un conseil. André -- Lisez la FAQ de la liste

Re: Linux et Unix affectés par une faille critique dans Bash

2014-09-26 Thread Vincent Lefevre
On 2014-09-26 16:38:00 +0200, daniel huhardeaux wrote: Ah ? Si tu gères des serveurs web je te propose de faire un simple cat fichier log serveur web|grep () { et de compter le nombre de tentatives d'accès comme par exemple Et même: grep '() *{' J'en ai eu 3 le 25 septembre. Et comme j'ai

Re: Linux et Unix affectés par une faille critique dans Bash

2014-09-26 Thread Frederic MASSOT
Le 26/09/2014 20:34, David Pinson a écrit : Le 26/09/2014 11:16, andre_deb...@numericable.fr a écrit : On Friday 26 September 2014 07:56:06 JUPIN Alain wrote: env x='() { :;}; echo vulnerable' bash -c 'echo hello' J'ai upgradé bash et relancé, tapé la commande ci-dessus et j'ai ce message de

Configurar Dovecot

2014-09-26 Thread Josu Lazkano
Hola, es la primera vez que escribo en la lista, aunque la leo desde hace tiempo. Estoy configurando un servidor de correo y tengo varias dudas con Dovecot. He seguido esta guia: https://www.digitalocean.com/community/tutorials/how-to-set-up-a-postfix-e-mail-server-with-dovecot Esta es la

Re: off topic calculadora de subredes

2014-09-26 Thread Antonio Trujillo Carmona
El jue, 25-09-2014 a las 16:24 -0400, Ariel Alvarez escribió: hola lista alguien sabe de algun sitio donde pueda descargar alguna utilidad para calcular subredes? se que existen muchos sitios donde aparece esta utilidad online pero me hace falta tener alguna utilidad para utilizarla en

Re: Imagen personalizada con live-build

2014-09-26 Thread oseargent...@gmail.com
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 El 25/09/14 22:04, Francisco Del Roio escribió: Hola, El 24/09/2014 a las 11:27 a.m., Camaleón escribió: El Tue, 23 Sep 2014 22:22:47 -0300, Francisco Del Roio escribió: (...) No tengo mucha experiencia con la generación de estos sistemas

Re: Imagen personalizada con live-build

2014-09-26 Thread Atilio
Hola te recomiendo mirar lihuen.linti.unlp.edu.ar y ver su repo que ya han estado trabajando con lives customizados. slds. El 26 de septiembre de 2014, 7:43, oseargent...@gmail.com oseargent...@gmail.com escribió: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 El 25/09/14 22:04, Francisco

Re: Bash vulnerable

2014-09-26 Thread Camaleón
El Thu, 25 Sep 2014 20:01:02 +0200, Angel Vicente escribió: El Thu, 25 Sep 2014 14:33:57 + (UTC) Camaleón noela...@gmail.com escribió: El Thu, 25 Sep 2014 16:28:34 +0200, Gerardo Diez García escribió: Sí. Su referencia es: CVE-2014-6271 Hablan de ella por ejemplo en Hispasec [1] o

Re: off topic calculadora de subredes

2014-09-26 Thread Camaleón
El Thu, 25 Sep 2014 16:24:01 -0400, Ariel Alvarez escribió: hola lista alguien sabe de algun sitio donde pueda descargar alguna utilidad para calcular subredes? se que existen muchos sitios donde aparece esta utilidad online pero me hace falta tener alguna utilidad para utilizarla en entornos

Re: Configurar Dovecot

2014-09-26 Thread Camaleón
El Fri, 26 Sep 2014 10:39:20 +0200, Josu Lazkano escribió: Hola, es la primera vez que escribo en la lista, aunque la leo desde hace tiempo. Pues bienvenido :-) Estoy configurando un servidor de correo y tengo varias dudas con Dovecot. He seguido esta guia:

Re: Configurar Dovecot

2014-09-26 Thread nadie
https://github.com/gurumelo/postfixdovecotmariadbdebian7 apt-get update apt-get install git git clone https://github.com/gurumelo/postfixdovecotmariadbdebian7.git cd postfixdovecotmariadbdebian7 bash correo.sh El 26/09/14 10:39, Josu Lazkano escribió: Hola, es la primera vez que escribo en la

Rotación de log en squid3

2014-09-26 Thread Lietzan Mota Rosabales
Buenos dias: Tengo squid3 y uso para generar los reportes de navegación el Sarg, el problema es que de momento dejaron de rotar los log del squid, por ejemplo, en las mañanas el sarg me genera el reporte pero el acces.log desaparece y todo el que navega no deja trazas y para que aparezca este

Re: Rotación de log en squid3

2014-09-26 Thread Camaleón
El Fri, 26 Sep 2014 16:08:48 +0100, Lietzan Mota Rosabales escribió: Buenos dias: Mejores hubieran sido si el correo hubiera salido sin ese formato html que ha generado tu cliente de correo :-( Tengo squid3 y uso para generar los reportes de navegación el Sarg, el problema es que de momento

Re: Bash vulnerable

2014-09-26 Thread Eduardo Rios
El 26/09/14 a las 15:32, Camaleón escribió: El Thu, 25 Sep 2014 20:01:02 +0200, Angel Vicente escribió: En Debian hay un parche desde ayer: https://www.debian.org/security/2014/dsa-3032 Para testing todavía no hay ¿no? 0 A testing y sid no les afecta ese parche. CVE-2014-6271

sobre bind9

2014-09-26 Thread Ariel Alvarez
hola lista tengo una duda y quisiera saber si es posible hacer lo que les expongo a continuación: Como pudiera lograr que en las zonas de mi dns tanto directa como inverza se auto generen las entradas de las estaciones de trabajo? es decir no tener que entrarlas manualmente. gracias de

Re: Rotación de log en squid3

2014-09-26 Thread Lietzan Mota Rosabales
uso logrotate El Viernes 26 de septiembre de 2014 11:27, Camaleón noela...@gmail.com escribió: El Fri, 26 Sep 2014 16:08:48 +0100, Lietzan Mota Rosabales escribió: Buenos dias: Mejores hubieran sido si el correo hubiera salido sin ese formato html que ha generado tu cliente de correo

Scopri la classe di Range Rover

2014-09-26 Thread Invito Land Rover
Aggiungi mn...@sender.permission-dem.it alla tua rubrica [Versione web](http://sender.permission-dem.it/nl/link?c=25nkid=4cih=3gn5v1tu068p6pfupnn9vl8ojhi=4l1n=4cjp=T301800627s=wvsn=4cj)

Falha Bash

2014-09-26 Thread Marcelo
Srs, Como atualizo o bash em servidores Debian version 5.0.10 e 6.0.10 ? Obrigado, Marcelo -- To UNSUBSCRIBE, email to debian-user-portuguese-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive:

Re: Falha Bash

2014-09-26 Thread Fábio Rabelo
5.0.qualquer coisa o Sr. não atualiza ! A versão 5 do Debian já não é mantida a algum tempo No 6 ou 7 : apt-get update apt-get upgrade A versão corrigida o Bash já está no repositório desde ontém . Fábio Rabelo 2014-09-26 8:59 GMT-03:00 Marcelo msala...@gmail.com: Srs, Como

Re: Falha Bash

2014-09-26 Thread Henrique de Moraes Holschuh
On Fri, 26 Sep 2014, Marcelo wrote: Como atualizo o bash em servidores Debian version 5.0.10 e 6.0.10 ? 6.0: Ative o uso do squeeze-lts: https://wiki.debian.org/LTS/Using https://wiki.debian.org/LTS/Development https://wiki.debian.org/LTS Não sei se a segunda atualização de segurança já está

Re: Systemd resources

2014-09-26 Thread Erwan David
Le 25/09/2014 23:11, Andrei POPESCU a écrit : On Jo, 25 sep 14, 21:38:07, James Allsopp wrote: Hi, I'm really cynical about the Systemd concept, but if it looks like it's happening anyway, could we start making a list of recommended tutorials on using it. It would help if people recommending

Re: 2 fork or ~2 fork

2014-09-26 Thread Gregory Smith
First: I hope you are correct. Indeed, it doesn't have solely to do with init, but this init change to systemd is the straw that brings everything to the fore. There is the disregard of the users of debian (who are not just users but programmers in various free software projects), a betrayal of

Re: Can't We Have Another Vote for Systemd (Coup)

2014-09-26 Thread Gregory Smith
Club or not, common law criminal fraud applies. On Thu, Sep 25, 2014 at 9:01 PM, Ric Moore wayward4...@gmail.com wrote: On 09/25/2014 02:25 PM, Joel Roth wrote: I would say that systemd takeover of major Linux distributions and of Debian in particular would be a perfect subject for

Re: Can't We Have Another Vote for Systemd (Coup)

2014-09-26 Thread Gregory Smith
The mailing list operator has threatened to ban me from the mailing list because I posted systemd critical opinions which explain precisely what has occured in debian. This is the debian coup's modus operandi. They see criticism and then silence it. People keep sending mails to the list but they

Re: Can't We Have Another Vote for Systemd (Coup)

2014-09-26 Thread Gregory Smith
Debian was not created as a doacracy of package maintainers, that is a falsehood that the coupists keep repeating. Debian was created as a universal operating system for the users. Just as the Free Software movement itself was created NOT for the developers and package maintainers of the software

Re: Can't We Have Another Vote for Systemd (Coup)

2014-09-26 Thread Lisi Reisz
On Friday 26 September 2014 07:27:42 Gregory Smith wrote: The mailing list operator has threatened to ban me from the mailing list Good -- To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive:

Re: Can't We Have Another Vote for Systemd (Coup)

2014-09-26 Thread Lisi Reisz
On Friday 26 September 2014 07:24:14 Gregory Smith wrote: Club or not, common law criminal fraud applies. Which jurisdiction? -- To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive:

Re: security camera software/RPi

2014-09-26 Thread ken
From what I've read, some have set up such a system on a Raspberry Pi running a version of Debian called Raspbian. An RPi can be had in the US for $30-40 and a camera which plugs into a dedicated port on the card for about $50 (though I haven't checked prices for months). The Raspberry Pi

Re: security camera software

2014-09-26 Thread ken
On 09/25/2014 11:03 PM Scott Ferguson wrote: On 26/09/14 01:48, Rob Owens wrote: - Original Message - From: Scott Fergusonscott.ferguson.debian.u...@gmail.com I've been using motion for a few years and highly recommend it. Lightweight[*1], simple, and reliable. Minimal configuration

Re: Challenge to you: Voice your concerns regarding systemd upstream

2014-09-26 Thread Andrei POPESCU
On Jo, 25 sep 14, 15:15:36, koanhead wrote: On 09/25/2014 03:30 AM, martin f krafft wrote: ... the Universal Operating System should also cater to non-desktops. And not only to other-than-desktop, but also to ports and architectures other than i386/amd64. I don't have a problem with

Re: Challenge to you: Voice your concerns regarding systemd upstream

2014-09-26 Thread Andrei POPESCU
On Vi, 26 sep 14, 01:58:44, lee wrote: Again, I consider it to be totally futile to try to convince the makers of systemd to fix the issues it brings about. They cannot be unaware of them, so obviously they don't want to fix them. I've seen for myself that they don't want to fix even

Re: security camera software/RPi

2014-09-26 Thread Paul Lewis
On 26/09/14 08:28:02, ken wrote: From what I've read, some have set up such a system on a Raspberry Pi running a version of Debian called Raspbian. An RPi can be had in the US for $30-40 and a camera which plugs into a dedicated port on the card for about $50 (though I haven't

Re: security camera software/RPi

2014-09-26 Thread Andrei POPESCU
On Vi, 26 sep 14, 09:05:32, Paul Lewis wrote: In this case I have a Trendnet IP camera which will write to an NFS share. I was looking for a server device that would be quieter and consume less power than a conventional machine that I might be able to run in a headless configuration. The

Re: Can't We Have Another Vote for Systemd

2014-09-26 Thread Andrei POPESCU
On Jo, 25 sep 14, 16:04:11, agronomo wrote: Do you have the link to TC vote Andrei? Please. https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=727708 The vote itself starts here: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=727708#6236 (yes, that's message 6236, out of 7620) If you

Re: 2 fork or ~2 fork (off)

2014-09-26 Thread Scott Ferguson
A lot of fact-free noise, fury and nonsense. On 26/09/14 16:14, Gregory Smith wrote: First: I hope you are correct. Indeed, it doesn't have solely to do with init, but this init change to systemd is the straw that brings everything to the fore. English please. There is the disregard

Re: Challenge to you: Voice your concerns regarding systemd upstream

2014-09-26 Thread Martin Steigerwald
Am Freitag, 26. September 2014, 01:58:44 schrieb lee: Or to *help*. Make a logind that does not depend on systemd. Offer it to the upstreams that need it. I'm sure it would be ignored or rejected --- even if I had the knowledge to make anything like that and was able to keep up

Re: PuTTY tips for Debian users

2014-09-26 Thread Stephen Powell
On Thu, 25 Sep 2014 17:39:39 -0400 (EDT), Nate Bargmann wrote: Good tips all around. Only thing is that I stopped using screen in favor of tmux a few years ago. The biggest aggravation is the loss of translation of keys, such as Ctl-left, Ctl-right, etc. (connecting from another Debian

systemd and server use (was: Re: Challenge to you: Voice your concerns regarding systemd upstream)

2014-09-26 Thread Martin Steigerwald
Hi! Am Donnerstag, 25. September 2014, 22:53:09 schrieb The Wanderer: On 09/25/2014 at 06:09 AM, martin f krafft wrote: But dependency creep is unfortunately nothing new ever since we declared next year the Year of Linux of the Desktop and forgot that the Universal Operating System should

Re: Challenge to you: Voice your concerns regarding systemd upstream

2014-09-26 Thread Martin Steigerwald
Am Freitag, 26. September 2014, 10:43:14 schrieb Andrei POPESCU: On Vi, 26 sep 14, 01:58:44, lee wrote: Again, I consider it to be totally futile to try to convince the makers of systemd to fix the issues it brings about. They cannot be unaware of them, so obviously they don't want to fix

Re: security camera software

2014-09-26 Thread Scott Ferguson
On 26/09/14 17:44, ken wrote: On 09/25/2014 11:03 PM Scott Ferguson wrote: On 26/09/14 01:48, Rob Owens wrote: - Original Message - From: Scott Fergusonscott.ferguson.debian.u...@gmail.com I've been using motion for a few years and highly recommend it. Lightweight[*1], simple, and

Re: Suggestions? A small webserver for file upload

2014-09-26 Thread softwatt
Checkout HFS + Wine. http://www.rejetto.com/hfs/ signature.asc Description: OpenPGP digital signature

Re: About dependency creep

2014-09-26 Thread Peter Nieman
On 25/09/14 18:16, Martin Steigerwald wrote: The KDE project has spent *years* of development to reduce dependency creep. I don't think KDE is the problem here. I don't remember ever having run into a situation where installing a non-DE package resulted in KDE components being pulled in. But

Re: Suggestions? A small webserver for file upload

2014-09-26 Thread Julien boooo
Well Lighttpd is pretty easy to use : http://www.lighttpd.net/ 2014-09-26 12:47 GMT+02:00 softwatt softw...@gmx.com: Checkout HFS + Wine. http://www.rejetto.com/hfs/

Re: Bash Code Injection Vulnerability via Specially Crafted Environment Variables (CVE-2014-6271)

2014-09-26 Thread The Wanderer
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 09/25/2014 at 11:16 AM, The Wanderer wrote: On 09/24/2014 at 04:52 PM, Steve Litt wrote: Hi everyone, Bash Code Injection Vulnerability via Specially Crafted Environment Variables (CVE-2014-6271)

Re: Suggestions? A small webserver for file upload

2014-09-26 Thread Alex Mestiashvili
On 09/24/2014 03:53 PM, Ron Leach wrote: List, good afternoon, What package would list members suggest for a small webserver that would enable co-workers to upload files to us? We exchange files with people we work with through email and attachments - that normally works well. During a

Re: Can't We Have Another Vote for Systemd (Coup)

2014-09-26 Thread The Wanderer
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 09/26/2014 at 02:27 AM, Gregory Smith wrote: The mailing list operator has threatened to ban me from the mailing list because I posted systemd critical opinions which explain precisely what has occured in debian. This is the debian coup's

24/7 servers and FSCK

2014-09-26 Thread Muhammad Yousuf Khan
hello all, i have several debian server and they are up 24/7. even i have a server which is up for 1.5 years. without restart. now i know when ever i restart this for the maintenance it will run the fsck to check the disk. which is fine and i have heard that it is very important to run on boot

Re: 24/7 servers and FSCK

2014-09-26 Thread Jonathan Dowland
On Fri, Sep 26, 2014 at 05:51:50PM +0500, Muhammad Yousuf Khan wrote: i have several debian server and they are up 24/7. even i have a server which is up for 1.5 years. without restart. snip or i can cron job the task once every moth or two is this a good idea. You generally can't fsck

Re: 24/7 servers and FSCK

2014-09-26 Thread David Guyot
Hello, there. If you run fsck on a mounted filesystem, fsck will not do anything, except if you ask it to run without correcting anything — in fact, if my memory serves me well, even a read-only check will likely fail because of the filesystem changes made by processes as fsck works on it. The

Re: 24/7 servers and FSCK

2014-09-26 Thread Gary Dale
On 26/09/14 08:51 AM, Muhammad Yousuf Khan wrote: hello all, i have several debian server and they are up 24/7. even i have a server which is up for 1.5 years. without restart. now i know when ever i restart this for the maintenance it will run the fsck to check the disk. which is fine and

Re: [OT] SSH Server for Android

2014-09-26 Thread Vincent Lefevre
On 2014-09-22 18:05:00 +, Eduardo M KALINOWSKI wrote: I've used this one (mostly for copying files): https://play.google.com/store/apps/details?id=berserker.android.apps.sshdroid The last time I tried SSHDroid, it automatically started a server with the default root password admin! So,

Thanks for your mail

2014-09-26 Thread Rajavel
Thanks for your mail. Please keep on listening to Love Guru, only on Radio City 91.1FM, Monday to Saturday - 9pm to 1am. You can listen to Love Guru, from any part of the world through, Radio City Tamil web radio. The link is available in www.planetradiocity.com. Love the Love... with loads

Re: PuTTY tips for Debian users

2014-09-26 Thread Jonathan Dowland
Hi Stephen, I've enjoyed reading your well-written and thoroughly researched posts. Have you considered putting them somewhere else, e.g. the Debian wiki? One point: On Wed, Sep 24, 2014 at 10:11:41PM -0400, Stephen Powell wrote: One of the things I recommended was setting the terminal type

Re: Suggestions? A small webserver for file upload

2014-09-26 Thread softwatt
On 09/26/2014 03:24 PM, Alex Mestiashvili wrote: It sounds to me like a good use case for retroshare or owncloud. The last one is available in debian as package and has a good community as far as i know. Yes, those do the job. But if only some simple file sharing is needed, both are

Re: 24/7 servers and FSCK

2014-09-26 Thread Scott Ferguson
On 26/09/14 22:51, Muhammad Yousuf Khan wrote: hello all, i have several debian server and they are up 24/7. even i have a server which is up for 1.5 years. without restart. now i know when ever i restart this for the maintenance it will run the fsck to check the disk. which is fine and

Re: Debian/Linux equivalent of RDP session / remote X11 session

2014-09-26 Thread Rusi Mody
On Monday, September 22, 2014 1:50:02 AM UTC+5:30, Paul van der Vlis wrote: op 21-09-14 14:33, lee schreef: Hi, what's the Debian or Linux equivalent to MS Windows terminal server sessions through the remote desktop thing they have? I would like to be able to let a user work remotely in

Re: Suggestions? A small webserver for file upload

2014-09-26 Thread Scott Ferguson
On 26/09/14 23:55, softwatt wrote: On 09/26/2014 03:24 PM, Alex Mestiashvili wrote: It sounds to me like a good use case for retroshare or owncloud. The last one is available in debian as package and has a good community as far as i know. Yes, those do the job. But if only some simple file

Re: [OT] SSH Server for Android

2014-09-26 Thread tv.deb...@googlemail.com
On 26/09/2014 16:24, Vincent Lefevre wrote: On 2014-09-22 18:05:00 +, Eduardo M KALINOWSKI wrote: I've used this one (mostly for copying files): https://play.google.com/store/apps/details?id=berserker.android.apps.sshdroid The last time I tried SSHDroid, it automatically started a server

Re: DNS Resolution and Short Names with Dots

2014-09-26 Thread Pascal Hambourg
Mark Kamichoff a écrit : If the change is in libc, it appears to be between 2.19-4 and 2.19-7. http://metadata.ftp-master.debian.org/changelogs//main/g/glibc/glibc_2.19-11_changelog .. doesn't seem to indicate any resolver / DNS changes between those versions, though. I'll continue to

Re: syslog messages flooding the console

2014-09-26 Thread John Magolske
* Darac Marjal mailingl...@darac.org.uk [140924 07:37]: On Tue, Sep 23, 2014 at 05:55:22PM -0700, John Magolske wrote: After a recent `aptitude dist-upgrade` I'm getting syslog messages flooding the console, pages pages of Asset Found stuff like: Message from syslogd@mymachine at Sep 23

Re: Can't We Have Another Vote for Systemd (Coup)

2014-09-26 Thread Miles Fidelman
Joel Roth wrote: On Thu, Sep 25, 2014 at 05:01:03PM -0400, Ric Moore wrote: On 09/25/2014 02:25 PM, Joel Roth wrote: I would say that systemd takeover of major Linux distributions and of Debian in particular would be a perfect subject for Groklaw. How so?? Legally, Debian has the legal

Re: Challenge to you: Voice your concerns regarding systemd upstream

2014-09-26 Thread Miles Fidelman
Martin Steigerwald wrote: Am Donnerstag, 25. September 2014, 01:45:50 schrieb lee: Martin Steigerwald mar...@lichtvoll.de writes: Am Montag, 22. September 2014, 23:50:46 schrieb lee: Martin Steigerwald mar...@lichtvoll.de writes: Do you really think they will be able to prevent all the other

Re: Let's have a vote!

2014-09-26 Thread Miles Fidelman
Martin Read wrote: On 25/09/14 15:42, Rob Owens wrote: I agree that let's wait until we have a good init to move to should have been more seriously considered, but for some reason people were in a big hurry to make a move. The vote held was What should the default init system *in jessie*

Re: 'motion' does not save movies, only still pics

2014-09-26 Thread Rob Owens
- Original Message - From: Scott Ferguson scott.ferguson.debian.u...@gmail.com On 26/09/14 00:12, Rob Owens wrote: One thing that may be a factor in my case is that my test webcam is very slow. I am only getting one picture every 2 or 3 seconds when motion is detected. I have

Re: Thanks for your mail

2014-09-26 Thread Doug
On 09/26/2014 09:13 AM, Rajavel wrote: Thanks for your mail. Please keep on listening to Love Guru, only on Radio City 91.1FM, Monday to Saturday - 9pm to 1am. You can listen to Love Guru, from any part of the world through, Radio City Tamil web radio. The link is available in

bash vulnerability jessie

2014-09-26 Thread Harry Putnam
After an `aptitude full-upgrade' this morning. I still get the `VULNERABLE' answer to `x='() { :;}; echo VULNERABLE' bash -c :' I hope that is the correct string... (extracted while googling on vulnerability) I did ssh to my user from the same shell I ran aptitude in to make sure I had a new

Re: Thanks for your mail

2014-09-26 Thread Lisi Reisz
On Friday 26 September 2014 16:53:56 Doug wrote: On 09/26/2014 09:13 AM, Rajavel wrote: I wouldn't listen to that garbage if it was the only radio station in the world! Must you reply to spam. :-( It makes life harder for the filters. Lisi -- To UNSUBSCRIBE, email to

Re: bash vulnerability jessie

2014-09-26 Thread Lisi Reisz
On Friday 26 September 2014 16:56:05 Harry Putnam wrote: After an `aptitude full-upgrade' this morning. I still get the `VULNERABLE' answer to `x='() { :;}; echo VULNERABLE' bash -c :' I hope that is the correct string... (extracted while googling on vulnerability) I did ssh to my user

  1   2   >