Re: Alpine 6.26 - can't stop it wanting to save the password.

2024-05-28 Thread Tim Woodall
On Mon, 27 May 2024, Curt wrote: On 2024-05-26, Tim Woodall wrote: Anyone got any ideas how to disable this? If you have ~/.alpine.passfile apparently it will keep asking, but maybe you don't, in which case I'm stumped. Thanks, no that file doesn't exist. I'm a bit stumped too - and

Re: Alpine 6.26 - can't stop it wanting to save the password.

2024-05-27 Thread Curt
On 2024-05-26, Tim Woodall wrote: > > Anyone got any ideas how to disable this? > > If you have ~/.alpine.passfile apparently it will keep asking, but maybe you don't, in which case I'm stumped.

Alpine 6.26 - can't stop it wanting to save the password.

2024-05-26 Thread Tim Woodall
I start alpine with the following alias alias pine='alpine -p \{imap202.home.woodall.me.uk/norsh/tls/user=tim\}remote_pinerc' and after entering my password I get: Preserve password on DISK for next login? [y]: I don't want to do this. My googling suggested that I could set [X

Create a password for Careline Support

2024-05-23 Thread TNG eWallet Careline
Welcome to TNG eWallet Careline Support! We have received your inquiry and happy to assist you. In order for us to assist you further, please sign up an account by clicking the link at the bottom of this email. Upon signed up, a ticket number will be sent to you in a separate email and our

Re: Debian, Postfix, Dovecot, MySQL, and argon2 password hashing scheme?

2024-04-25 Thread Marco Moock
Am 25.04.2024 schrieb David Mehler : > Since changing systems to Debian 12.5 I can't send, though checking > the password with a manual login to Dovecot works fine. Sending mails is SMTP and therefore postfix on your machine. It can use PAM for auth. Do you use PAM?

Debian, Postfix, Dovecot, MySQL, and argon2 password hashing scheme?

2024-04-24 Thread David Mehler
Hello, I have a quick question. Can Debian, and/or it's Postfix/Dovecot/MySQL/MariaDB packages support the argon2 password hashing scheme? I had a previously-working e-mail setup on a *BSD system, utilizing the argon2ID scheme with Dovecot, Postfix, and MySQL. Since changing systems

Re: Root password strength

2024-03-23 Thread Michael Kjörling
On 22 Mar 2024 20:01 -0400, from ler...@gmail.com (Lee): > The IPv4 address space is only 32 bits long. Scanning 2^32 = about > 4,000,000,000 addresses for an open port is easily doable. > The IPv6 address space is a bit harder... Let's just say that 7/8th > of the IPv6 address space is

Re: Root password strength

2024-03-23 Thread Michael Kjörling
On 22 Mar 2024 17:26 +0500, from avbe...@gmail.com (Alexander V. Makartsev): >     This is because of how IPv4 network address translation (NAT) works, to > allow multiple LAN hosts to connect to Internet with single IP address > assigned by Internet Service Provider (ISP). A NAT router might

Re: Root password strength

2024-03-22 Thread Lee
On Fri, Mar 22, 2024 at 9:02 AM Jan Krapivin wrote: > > The thing that bothers me are words: "any computer (and a fortiori any > server) connected to the Internet is regularly targeted by automated > connection attempts" Change it to "any computer (and a fortiori any server) >>using IPv4 and

Re: Root password strength

2024-03-22 Thread Alexander V. Makartsev
On 22.03.2024 14:57, Jan Krapivin wrote: чт, 21 мар. 2024 г. в 22:34, Alexander V. Makartsev : This conclusion seems less than optimal to me. By condemning yourself to type 12+ character password every time you 'sudo' would really hurt accessibility and usability of your home

Re: Root password strength

2024-03-22 Thread Joe
On Fri, 22 Mar 2024 12:57:20 +0300 Jan Krapivin wrote: > чт, 21 мар. 2024 г. в 22:34, Alexander V. Makartsev > : > > > This conclusion seems less than optimal to me. > > By condemning yourself to type 12+ character password every time you > > 'sudo' would really hurt

Re: Root password strength

2024-03-22 Thread Jan Krapivin
чт, 21 мар. 2024 г. в 22:34, Alexander V. Makartsev : > This conclusion seems less than optimal to me. > By condemning yourself to type 12+ character password every time you > 'sudo' would really hurt accessibility and usability of your home computer > and for no good reason. >

Re: Root password strength

2024-03-21 Thread Alexander V. Makartsev
On 20.03.2024 20:28, Jan Krapivin wrote: I must mention that "32 characters" is only my guess. In the Handbook it is said: "The root user's password should be long (12 characters or more) and impossible to guess." Also, i must again say that in my case we speak just

Re: Root password strength

2024-03-21 Thread Curt
> > You don't need a threat model to understand why writing a password on a > paper is generally a bad practice. > > But since you invest this much energy on defending a bad practice, I'll > let you keep the trend alone. > I have written down key passwords which I keep in

Re: Root password strength

2024-03-20 Thread Lee
On Wed, Mar 20, 2024 at 3:50 PM Pierre-Elliott Bécue wrote: > > De : Lee > À : Pierre-Elliott Bécue > Cc : Debian Users ML > Date : 20 mars 2024 20:40:52 > Objet : Re: Root password strength > > > On Wed, Mar 20, 2024 at 1:47 PM Pierre-Elliott Bécue wrote: > >

Re: Root password strength

2024-03-20 Thread Jeffrey Walton
On Wed, Mar 20, 2024 at 2:34 PM Pierre-Elliott Bécue wrote: > > Jeffrey Walton wrote on 20/03/2024 at 19:16:16+0100: > > [...] > >> Noone asks someone to remember more than two or three passwords. The > >> rest belongs to a password manager. > > > >

Re: Root password strength

2024-03-20 Thread Pierre-Elliott Bécue
De : Lee À : Pierre-Elliott Bécue Cc : Debian Users ML Date : 20 mars 2024 20:40:52 Objet : Re: Root password strength > On Wed, Mar 20, 2024 at 1:47 PM Pierre-Elliott Bécue wrote: >> >> Brad Rogers wrote on 20/03/2024 at 18:39:30+0100: >>> On Wed, 20 Mar 2024 1

Re: Root password strength

2024-03-20 Thread Lee
On Wed, Mar 20, 2024 at 1:47 PM Pierre-Elliott Bécue wrote: > > Brad Rogers wrote on 20/03/2024 at 18:39:30+0100: > > On Wed, 20 Mar 2024 17:09:31 +0100 > > Pierre-Elliott Bécue wrote: > > > > Hello Pierre-Elliott, > > > >>Most of the tim

Re: Root password strength

2024-03-20 Thread Pierre-Elliott Bécue
John Hasler wrote on 20/03/2024 at 19:35:42+0100: > Pierre-Elliott Bécue writes: >> My home sees plenty different people coming in. Some I trust, some I >> trust less. Also videocalls is a nice way to get a paper password >> recorded (and yes it happens). > > I keep m

Re: Root password strength

2024-03-20 Thread John Hasler
tomas writes: > Actually, I use between pwgen -n 8 (user pw) and pwgen -n 16 (LUKS > encryption). -n is the default for pwgen. Note that this slightly reduces the size of the search space. Unfortunately many sites require it. > I memorize the most important of them. I memorize the ones I use

Re: Root password strength

2024-03-20 Thread Pierre-Elliott Bécue
a rather bad cybersecurity approach. > > I use password generators and vaults for all my passwords. Nothing > wrong with my cyber-security. When you state that something like "writing down" a password is reasonable in one's home as if this actual home were a heaven of safety, I b

Re: Root password strength

2024-03-20 Thread John Hasler
Pierre-Elliott Bécue writes: > My home sees plenty different people coming in. Some I trust, some I > trust less. Also videocalls is a nice way to get a paper password > recorded (and yes it happens). I keep my passwords in a small book the size of a passport and I secure it the same way

Re: Root password strength

2024-03-20 Thread Pierre-Elliott Bécue
03/2024 at 16:58:01+0100: >> >> >> >> >> >> > Pierre-Elliott Bécue writes: >> >> >> >> A phrase you will easily remember but that would be hardcore to >> >> >> >> guess >> >> >> >> t

Re: Root password strength

2024-03-20 Thread Brad Rogers
On Wed, 20 Mar 2024 18:46:04 +0100 Pierre-Elliott Bécue wrote: Hello Pierre-Elliott, >You have a rather bad cybersecurity approach. I use password generators and vaults for all my passwords. Nothing wrong with my cyber-security. Also note that I put 'written down' in single quo

Re: Root password strength

2024-03-20 Thread Pierre-Elliott Bécue
Michael Kjörling <2695bd53d...@ewoof.net> wrote on 20/03/2024 at 19:04:10+0100: > On 20 Mar 2024 18:46 +0100, from p...@debian.org (Pierre-Elliott Bécue): >>>> Most of the time, writing down a password is a very bad idea. >>> >>> Not in your own home.

Re: Root password strength

2024-03-20 Thread Jeffrey Walton
writes: > >> >> >> A phrase you will easily remember but that would be hardcore to guess > >> >> >> through social engineering is perfect. > >> >> > > >> >> > Better is a random string that you write down. When peo

Re: Root password strength

2024-03-20 Thread Michael Kjörling
On 20 Mar 2024 17:07 +0100, from p...@debian.org (Pierre-Elliott Bécue): > Let's stop to overcomplexify, the best course of action for passwords > you need to remember are passphrases, and to this matter, Randall nailed > the matter properly. If you're referring to https://xkcd.com/936/ I believe

Re: Root password strength

2024-03-20 Thread Michael Kjörling
On 20 Mar 2024 18:46 +0100, from p...@debian.org (Pierre-Elliott Bécue): >>> Most of the time, writing down a password is a very bad idea. >> >> Not in your own home. And in any event, it depends where one keeps that >> 'written down' password. >> >> A

Re: Root password strength

2024-03-20 Thread tomas
On Wed, Mar 20, 2024 at 11:02:41AM -0500, John Hasler wrote: > Use one of the password generating programs such as pwgen to produce a > 12 character random password. Write it down. Actually, I use between pwgen -n 8 (user pw) and pwgen -n 16 (LUKS encryption). I memorize the most imp

Re: Root password strength

2024-03-20 Thread Pierre-Elliott Bécue
Brad Rogers wrote on 20/03/2024 at 18:39:30+0100: > On Wed, 20 Mar 2024 17:09:31 +0100 > Pierre-Elliott Bécue wrote: > > Hello Pierre-Elliott, > >>Most of the time, writing down a password is a very bad idea. > > Not in your own home. And in any event, it depends wher

Re: Root password strength

2024-03-20 Thread Pierre-Elliott Bécue
eering is perfect. >> >> > >> >> > Better is a random string that you write down. When people try to >> >> > generate phrases that meet those requirements they usually fail. >> >> >> >> Writing down a password is a ba

Re: Root password strength

2024-03-20 Thread Brad Rogers
On Wed, 20 Mar 2024 17:09:31 +0100 Pierre-Elliott Bécue wrote: Hello Pierre-Elliott, >Most of the time, writing down a password is a very bad idea. Not in your own home. And in any event, it depends where one keeps that 'written down' password. And if it *does* become an issue at h

Re: Root password strength

2024-03-20 Thread Jeffrey Walton
When people try to > >> > generate phrases that meet those requirements they usually fail. > >> > >> Writing down a password is a bad idea. > > > > I don't think that's true anymore. The threat being mitigated is the > > network attacker. The netw

Re: Root password strength

2024-03-20 Thread Pierre-Elliott Bécue
John Hasler wrote on 20/03/2024 at 17:21:20+0100: > Pierre-Elliott Bécue writes: >> Writing down a password is a bad idea. > > Why? Because anyone falling on the paper with the password can do a lot of harm. Because you can't control what this paper will become with certainty, wh

Re: Root password strength

2024-03-20 Thread Pierre-Elliott Bécue
member but that would be hardcore to guess >> >> through social engineering is perfect. >> > >> > Better is a random string that you write down. When people try to >> > generate phrases that meet those requirements they usually fail. >> >> Writing dow

Re: Root password strength

2024-03-20 Thread Max Nikulin
On 20/03/2024 23:19, Jeffrey Walton wrote: The network attacker cannot (yet) reach through a monitor and read a sticky note. It may be visible during a video call performed from a smartphone.

Re: Root password strength

2024-03-20 Thread John Hasler
Pierre-Elliott Bécue writes: > Writing down a password is a bad idea. Why? -- John Hasler j...@sugarbit.com Elmwood, WI USA

Re: Root password strength

2024-03-20 Thread Jeffrey Walton
rfect. > > > > Better is a random string that you write down. When people try to > > generate phrases that meet those requirements they usually fail. > > Writing down a password is a bad idea. I don't think that's true anymore. The threat being mitigated is the network

Re: Root password strength

2024-03-20 Thread Pierre-Elliott Bécue
John Hasler wrote on 20/03/2024 at 17:02:41+0100: > Use one of the password generating programs such as pwgen to produce a > 12 character random password. Write it down. Most of the time, writing down a password is a very bad idea. -- PEB signature.asc Description: PGP signature

Re: Root password strength

2024-03-20 Thread Pierre-Elliott Bécue
nerate phrases that meet those requirements they usually fail. Writing down a password is a bad idea. Managing passwords through a password-store (eg pass, keepassxc, whatever tool you prever) is a great idea, but you first need to unlock your disk that hopefully you encrypted and then your ses

Re: Root password strength

2024-03-20 Thread John Hasler
Use one of the password generating programs such as pwgen to produce a 12 character random password. Write it down. -- John Hasler j...@sugarbit.com Elmwood, WI USA

Re: Root password strength

2024-03-20 Thread Michael Kjörling
On 20 Mar 2024 10:58 -0500, from j...@sugarbit.com (John Hasler): >> A phrase you will easily remember but that would be hardcore to guess >> through social engineering is perfect. > > Better is a random string that you write down. When people try to > generate phrases that meet those

Re: Root password strength

2024-03-20 Thread John Hasler
Pierre-Elliott Bécue writes: > A phrase you will easily remember but that would be hardcore to guess > through social engineering is perfect. Better is a random string that you write down. When people try to generate phrases that meet those requirements they usually fail. -- John Hasler

Re: Root password strength

2024-03-20 Thread Pierre-Elliott Bécue
about 3.6*10^38 > _years_ to go through. A widely agreed-upon figure for the age of the > universe is around 1.4*10^10 years. Therefore such a password would > take, very roughly, 10^28 times the age of the universe to brute > force. > > Of course, with only 32 characters actually c

Re: Root password strength

2024-03-20 Thread Jan Krapivin
I must mention that "32 characters" is only my guess. In the Handbook it is said: "The root user's password should be long (12 characters or more) and impossible to guess." Also, i must again say that in my case we speak just about a humble home desktop, without a "&

Re: Root password strength

2024-03-20 Thread Michael Kjörling
rs), 32 characters is equivalent to about 203 bits. (82^32 ~ 2^203 or, expressed differently, log_2(82^32) ~ 203.) At a rate of 2^50 guesses per second, that will take about 3.6*10^38 _years_ to go through. A widely agreed-upon figure for the age of the universe is around 1.4*10^10 years. Therefore suc

Re: Root password strength

2024-03-20 Thread Pierre-Elliott Bécue
Jan Krapivin wrote on 19/03/2024 at 15:42:55+0100: > I read Debian Administrator's handbook now. And there are such words: > > The root user's password should be long (12 characters or more) and > impossible to guess. Indeed, any computer (and a fortiori any server)

Re: Root password strength

2024-03-20 Thread tomas
. It is wise to avoid gratuitous rotation schemes. I will be the last ne to advocate any gratuitous rotation scheme (key or password or anything). My point is giving users enough wits and power (and competent help) to make good decisions and to implement them. If my laptop gets stolen, I'll definit

Re: Root password strength

2024-03-20 Thread Jeffrey Walton
On Wed, Mar 20, 2024 at 7:03 AM Michael Kjörling <2695bd53d...@ewoof.net> wrote: > > On 20 Mar 2024 15:46 +0800, from jeremy.ard...@gmail.com (jeremy ardley): > > Regarding certificates, I issue VPN certificates to be installed on each > > remote device. I don't use public key. > > What exactly is

Re: Root password strength

2024-03-20 Thread Dan Ritter
jeremy ardley wrote: > > On 20/3/24 19:03, Michael Kjörling wrote: > > On 20 Mar 2024 15:46 +0800, fromjeremy.ard...@gmail.com (jeremy ardley): > > > [users are locked out from uploading their public key using ssh-copy-id] > > So the private keys aren't private, thereby invalidating a lot of >

Re: Root password strength

2024-03-20 Thread Michael Kjörling
On 20 Mar 2024 12:17 +0100, from to...@tuxteam.de: >>> For ssh use I issue secret keys to each user and maintain matching public >>> keys in LDAP servers [...] > >> So the private keys aren't private, thereby invalidating a lot of >> assumptions inherent in public key cryptography. > > We are

Re: Root password strength

2024-03-20 Thread Michael Kjörling
On 20 Mar 2024 19:21 +0800, from jeremy.ard...@gmail.com (jeremy ardley): >>> Regarding certificates, I issue VPN certificates to be installed on each >>> remote device. I don't use public key. >> >> What exactly is this "certificate" that you speak of? In typical >> usage, it means a public key

Re: Root password strength

2024-03-20 Thread jeremy ardley
On 20/3/24 19:03, Michael Kjörling wrote: On 20 Mar 2024 15:46 +0800, fromjeremy.ard...@gmail.com (jeremy ardley): Regarding certificates, I issue VPN certificates to be installed on each remote device. I don't use public key. What exactly is this "certificate" that you speak of? In typical

Re: Root password strength

2024-03-20 Thread tomas
On Wed, Mar 20, 2024 at 11:03:16AM +, Michael Kjörling wrote: > On 20 Mar 2024 15:46 +0800, from jeremy.ard...@gmail.com (jeremy ardley): > > Regarding certificates, I issue VPN certificates to be installed on each > > remote device. I don't use public key. > > What exactly is this

Re: Root password strength

2024-03-20 Thread Michael Kjörling
On 20 Mar 2024 15:46 +0800, from jeremy.ard...@gmail.com (jeremy ardley): > Regarding certificates, I issue VPN certificates to be installed on each > remote device. I don't use public key. What exactly is this "certificate" that you speak of? In typical usage, it means a public key plus some

Re: Root password strength

2024-03-20 Thread jeremy ardley
On 20/3/24 13:32, to...@tuxteam.de wrote: How will a "VPN" with a "certificate" (whatever that means in this > context) be more secure than a SSH (assuming key pair authentication, > not password)? > > They are doing the same dance (key exchange, ke

Re: Root password strength

2024-03-20 Thread tomas
ed in sshd via pam. > > > > How will a "VPN" with a "certificate" (whatever that means in this context) > > be more secure than a SSH (assuming key pair authentication, not password)? > > This may be more theoretical, but... IPSec uses > Encrypt-then-A

Re: Root password strength

2024-03-20 Thread Jeffrey Walton
xt) > be more secure than a SSH (assuming key pair authentication, not password)? This may be more theoretical, but... IPSec uses Encrypt-then-Authenticate (EtA), which is provably secure under random models. In fact, I believe IPSec is IND-CCA2 secure (Ciphertext Indistinguishability), which is a str

Re: Root password strength

2024-03-19 Thread tomas
> further enhancement of security is to use 2-factor authentication - which is > supported in sshd via pam. How will a "VPN" with a "certificate" (whatever that means in this context) be more secure than a SSH (assuming key pair authentication, not password)? They are doing the

Re: Root password strength

2024-03-19 Thread debian-user
Michael Kjörling <2695bd53d...@ewoof.net> wrote: > For most values of "you", most attackers don't care about _your_ > account, or _your_ system; they care about _any_ account, or _any_ > system. Actually targeted attacks do happen, but very rarely compared > to what might be thought of as

Re: Root password strength

2024-03-19 Thread jeremy ardley
On 19/3/24 23:02, Greg Wooledge wrote: On Tue, Mar 19, 2024 at 05:42:55PM +0300, Jan Krapivin wrote: The root user's password should be long (12 characters or more) and impossible to guess. Indeed, any computer (and a fortiori any server) connected to the Internet is regularly targeted

Re: Root password strength

2024-03-19 Thread Greg Wooledge
On Tue, Mar 19, 2024 at 03:49:06PM +, debian-u...@howorth.org.uk wrote: > Dan Ritter wrote: > > Check whether you are running ssh: > > > > /sbin/service ssh status > > It's not called ssh; it is sshd > Also nowadays it's more usual to say > > $ systemctl status sshd On Debian, the

Re: Root password strength

2024-03-19 Thread Michael Kjörling
On 19 Mar 2024 17:42 +0300, from daydreamer199...@gmail.com (Jan Krapivin): > The thing is my password is very easy now, and i haven't thought about > *"automated > connection attempts"*, that sounds rather... scary? My password is easy > because i am not afraid of

Re: Root password strength

2024-03-19 Thread debian-user
Dan Ritter wrote: > Jan Krapivin wrote: > > I read Debian Administrator's handbook now. And there are such > > words: > > > > The root user's password should be long (12 characters or more) and > > impossible to guess. > ... > > > > The thin

Re: Root password strength

2024-03-19 Thread Kamil Jońca
Greg Wooledge writes: > On Tue, Mar 19, 2024 at 05:42:55PM +0300, Jan Krapivin wrote: >> The root user's password should be long (12 characters or more) and >> impossible to guess. Indeed, any computer (and a fortiori any server) >> connected to the Internet is regularly

Re: Root password strength

2024-03-19 Thread Marco Moock
Am Tue, 19 Mar 2024 17:42:55 +0300 schrieb Jan Krapivin : > The thing is my password is very easy now The simplest thin is to change that now. , and i haven't thought about *"automated connection attempts"*, > that sounds rather... scary? Those attempts happen if a server so

Re: Root password strength

2024-03-19 Thread Dan Ritter
Jan Krapivin wrote: > I read Debian Administrator's handbook now. And there are such words: > > The root user's password should be long (12 characters or more) and > impossible to guess. ... > The thing is my password is very easy now, and i haven't thought about > *"

Re: Root password strength

2024-03-19 Thread Greg Wooledge
On Tue, Mar 19, 2024 at 05:42:55PM +0300, Jan Krapivin wrote: > The root user's password should be long (12 characters or more) and > impossible to guess. Indeed, any computer (and a fortiori any server) > connected to the Internet is regularly targeted by automated connection &

Re: Root password strength

2024-03-19 Thread Jan Krapivin
~$ /sbin/service ssh status* *Unit ssh.service could not be found.* *@deb:~$ sudo /sbin/service ssh status* *[sudo] password for ***: * *Unit ssh.service could not be found.*

Re: Root password strength

2024-03-19 Thread Jan Krapivin
> Do you have some kind of remote access enabled or do you intend to in > the near future? > No and no. Its just a simple home PC. > > If not, then you do not need to worry. Even less if you have a firewall > to block any service that might appear by mistake. > I have UFW (gufw) enabled.

Re: Root password strength

2024-03-19 Thread Nicolas George
Jan Krapivin (12024-03-19): > The thing is my password is very easy now, and i haven't thought about > *"automated > connection attempts"*, that sounds rather... scary? My password is easy > because i am not afraid of direct physical access to the computer. Hi. Do you ha

Root password strength

2024-03-19 Thread Jan Krapivin
I read Debian Administrator's handbook now. And there are such words: The root user's password should be long (12 characters or more) and impossible to guess. Indeed, any computer (and a fortiori any server) connected to the Internet is regularly targeted by automated connection attempts

Re: Debian 12 live cd username and password problem

2024-03-05 Thread Jeffrey Walton
On Tue, Mar 5, 2024 at 11:30 AM Jeffrey Walton wrote: > > On Tue, Mar 5, 2024 at 11:22 AM genti pp wrote: > > > > I want to install debian 12 but I need to try it first. > > Having Debian 12 live iso it asks me for username and password. Please tell > > me the corr

Re: Debian 12 live cd username and password problem

2024-03-05 Thread Махно
Hello. Default login and password for the Debian live is user / live 2024-03-05, an, 18:22 genti pp rašė: > > Hello! > I want to install debian 12 but I need to try it first. > Having Debian 12 live iso it asks me for username and password. Please tell > me the correct username

Re: Debian 12 live cd username and password problem

2024-03-05 Thread Jeffrey Walton
On Tue, Mar 5, 2024 at 11:22 AM genti pp wrote: > > I want to install debian 12 but I need to try it first. > Having Debian 12 live iso it asks me for username and password. Please tell > me the correct username and password so I can try it. I usually use 'sudo su -' from the

Re: Debian 12 live cd username and password problem

2024-03-05 Thread Kushal Kumaran
On Tue, Mar 05 2024 at 02:28:08 PM, genti pp wrote: > Hello! > I want to install debian 12 but I need to try it first. > Having Debian 12 live iso it asks me for username and password. Please tell > me the correct username and password so I can try it. > Thank you in advance!

Debian 12 live cd username and password problem

2024-03-05 Thread genti pp
Hello! I want to install debian 12 but I need to try it first. Having Debian 12 live iso it asks me for username and password. Please tell me the correct username and password so I can try it. Thank you in advance!

Re: Fwd: Openstack images default password

2024-02-06 Thread Оксана Патакі
. 2024 kl 14:12 skrev Оксана Патакі >: > > > > yes login is debian but he need password and i dont use ssh > > > > вт, 6 лют. 2024, 06:44 користувач Luna Jernberg > пише: > >> > >> -- Forwarded message - > >> Från: Joost van B

Re: Fwd: Openstack images default password

2024-02-06 Thread Оксана Патакі
yes login is debian but he need password and i dont use ssh вт, 6 лют. 2024, 06:44 користувач Luna Jernberg пише: > -- Forwarded message - > Från: Joost van Baal-Ilić > Date: tis 6 feb. 2024 kl 06:31 > Subject: Re: Fwd: Openstack images default password > To

Re: Fwd: Openstack images default password

2024-02-06 Thread Luna Jernberg
: > > yes login is debian but he need password and i dont use ssh > > вт, 6 лют. 2024, 06:44 користувач Luna Jernberg пише: >> >> -- Forwarded message - >> Från: Joost van Baal-Ilić >> Date: tis 6 feb. 2024 kl 06:31 >> Subject: Re: Fwd: Ope

Fwd: Fwd: Openstack images default password

2024-02-05 Thread Luna Jernberg
-- Forwarded message - Från: Joost van Baal-Ilić Date: tis 6 feb. 2024 kl 06:31 Subject: Re: Fwd: Openstack images default password To: Luna Jernberg Hi Luna, off-list reply (feel free to quote me): i don't think our openstack images come with a default password; they do

Re: Openstack images default password

2024-02-05 Thread Оксана Патакі
У меня есть вопрос а почему А пароль не Откуда взять потому что я просто взял образ АРМ 64 хотел запустить на qemu

Re: Playing a sound when initrd wants a password

2024-01-28 Thread Max Nikulin
On 28/01/2024 00:07, Curt wrote: (Anyway, this is what my personal robot explained to me and may be subject to imperfection and error.) I find it over-sophisticated and, being put after the recipe, extremely unfriendly to those who get it in search engine results. Unfortunately bootup(7) is

Re: Playing a sound when initrd wants a password

2024-01-28 Thread Stefan Monnier
[ Sorry, didn't read the actual post, just answering the Subject: ] What makes you think initrd will be satisfied with a sound? Stefan 

Re: Playing a sound when initrd wants a password

2024-01-27 Thread Nicolas George
at is almost what I want, but the small gap is blocking: cryptsetup might ask for the password several times (if the user types it wrong), and the sound must be played again too in that case. Regards, -- Nicolas George

Re: Playing a sound when initrd wants a password

2024-01-27 Thread Nicolas George
Curt (12024-01-27): > (Anyway, this is what my personal robot explained to me and may be subject to > imperfection and error.) I started explaining all the ways this answer is obviously nonsensical, but I got fed up and deleted it. If I wanted the answers from a stupid AI, I could have asked

Re: Playing a sound when initrd wants a password

2024-01-27 Thread Geert Stappers
xecution context parameters that are not native to the service manager into dynamically generated unit files, symlinks or unit file drop-ins, so that they can extend the unit file hierarchy the service manager subsequently loads and operates on. > > And what should I put in the time

Re: Playing a sound when initrd wants a password

2024-01-27 Thread Curt
uess that path should've been /usr/local/lib/systemd/system-generators/*. https://manpages.debian.org/testing/systemd/systemd.generator.7.en.html > And what should I put in the timer file to express “when a password is > asked”? > In fact, what relation do you see between a timer and c

Re: Playing a sound when initrd wants a password

2024-01-26 Thread David Wright
On Fri 26 Jan 2024 at 16:13:26 (+0100), Nicolas George wrote: > Hi. > > Yet another strange question. Is there a supported¹ way to have > cryptsetup play a specific sound when it asks the password for the root > partition from the initrd? > > I think brttty (braill

Re: Playing a sound when initrd wants a password

2024-01-26 Thread Nicolas George
Curt (12024-01-26): > A play-sound.timer unit file in /usr/lib/systemd/system-generators/initrd > directory. I see no mention of this directory on the web. Where did yo find the idea of using it, I want to check the doc. And what should I put in the timer file to express “when a pa

Re: Playing a sound when initrd wants a password

2024-01-26 Thread Curt
On 2024-01-26, Nicolas George wrote: > Curt (12024-01-26): >> I guess a systemd timer unit constitutes a hack. > > A systemd timer in the initrd? Can you elaborate? > A play-sound.timer unit file in /usr/lib/systemd/system-generators/initrd directory. A play-sound.service file in the same

Re: Playing a sound when initrd wants a password

2024-01-26 Thread Nicolas George
Curt (12024-01-26): > I guess a systemd timer unit constitutes a hack. A systemd timer in the initrd? Can you elaborate? -- Nicolas George

Re: Playing a sound when initrd wants a password

2024-01-26 Thread Curt
On 2024-01-26, Nicolas George wrote: > Hi. > > Yet another strange question. Is there a supported¹ way to have > cryptsetup play a specific sound when it asks the password for the root > partition from the initrd? > > I think brttty (braille) is already running at th

Playing a sound when initrd wants a password

2024-01-26 Thread Nicolas George
Hi. Yet another strange question. Is there a supported¹ way to have cryptsetup play a specific sound when it asks the password for the root partition from the initrd? I think brttty (braille) is already running at this point (no occasion to test yet), but a recognizable sound would be something

Re: systemd-boot not asking password, not resuming from hibernate

2024-01-07 Thread Richard Rosner
On 07.01.24 18:07, David Wright wrote: On Sat 06 Jan 2024 at 20:04:57 (+0100), Richard Rosner wrote: I just tried out systemd-boot. What I noticed, it doesn't ask for my decryption password to decrypt both my LUKS2 encrypted root and swap partition. This kinda defeats the purpose of encrypted

Re: systemd-boot not asking password, not resuming from hibernate

2024-01-07 Thread David Wright
On Sat 06 Jan 2024 at 20:04:57 (+0100), Richard Rosner wrote: > I just tried out systemd-boot. What I noticed, it doesn't ask for my > decryption password to decrypt both my LUKS2 encrypted root and swap > partition. This kinda defeats the purpose of encrypted drives. How do > I have

systemd-boot not asking password, not resuming from hibernate

2024-01-06 Thread Richard Rosner
I just tried out systemd-boot. What I noticed, it doesn't ask for my decryption password to decrypt both my LUKS2 encrypted root and swap partition. This kinda defeats the purpose of encrypted drives. How do I have systemd-boot forget and never again remember my credentials

Problems with password entry [WAS Re: Debian 12.4.0]

2023-12-16 Thread Andrew M.A. Cater
On Sun, Dec 17, 2023 at 01:39:34AM +0100, Kevin Price wrote: > Am 14.12.23 um 23:01 schrieb David Sawyer: > > I use the password that I wrote down it is not accepted. > > Keyboard layout? We've seen that with the kernel that comes with 12.4.0. > -- Hi Kevin, There is no

Re: zfs load-key on boot randomly reports wrong password if I type too fast

2023-12-11 Thread cen
That is a good pointer, I will start experimenting with kdbrate and see if anything improves. I did come up with the following contraption which helps at least seeing what is going on and so far it seems that the password is 1 char short on invalid attempt and it is usually the last char

Re: zfs load-key on boot randomly reports wrong password if I type too fast

2023-12-08 Thread David Wright
> RemainAfterExit=yes > ExecStart=/usr/sbin/zfs load-key -a > StandardInput=tty-force > > [Install] > WantedBy=zfs-mount.service > > > I have a very weird issue that.. if I type too fast the password is > wrong. I know this sounds weird but it's true.. > > I

  1   2   3   4   5   6   7   8   9   10   >