Re: partition reporting full, but not

2024-02-19 Thread Keith Bainbridge



On 20/2/24 18:11, Keith Bainbridge wrote:


On 19/2/24 14:20, Keith Bainbridge wrote:


On 19/2/24 10:26, Keith Bainbridge wrote:


On 18/2/24 14:49, Keith Bainbridge wrote:


On 18/2/24 07:34, debian-u...@howorth.org.uk wrote:

Keith Bainbridge  wrote:

Yes the / partitions are btrfs


So the apparently missing space is perhaps taken up by btrfs 
snapshots.




Seems to be the prime suspect.   If that's the case, btrfs is NOT 
hard- linking the snapshots as timeshift claims it does. The only 
way to check is install on ext4 and compare. I have saves enough 
free space to do this.


My effort to date is to move my home to /mnt/data and sim-link it 
into / home. df is now showing 2.3GB free on /.  df showed /home as 
2.2GB yesterday.  At least there is a little space to play with; and 
give me time to consider. A fresh install may be worth checking in 
snapshots are as big as this all makes them look.


a few brief answer to other comments will follow



So later yesterday afternoon I created a new snapshot with no obvious 
change is free space.


I then update/upgrade.   The initial attempt told me
63 upgraded, 3 newly installed, 0 to remove and 0 not upgraded.
Need to get 337 MB of archives.
After this operation, 473 MB of additional disk space will be used.
Do you want to continue? [Y/n]

But the 3 kernel related packages failed to install a couple of 
times. When I finally figured I should check space, there was none.   
I rolled back to prior to the upgrade, but still no free space.


I said sometime in this thread that timeshift (and BiT) use hard 
links to create progressive copies of the system. The more I think 
about how hard links reportedly work, I reckon it can't be simply 
hard links.


So I'm starting a new thread on that topic.




So I'm back to see some more helpful hints. Thanks folk

I am convinced that the missing space is used by btrfs snapshot 
process. But WHY is the used space reporting on my daily driver LESS 
than that on the spare machine  29G vs 35G? The original install was 
the same .iso   Ah well


I could add some of the spare space the the / partition, but how much? 
Play safe and use the lot, making it 60G compared to 63G on my daily 
driver. (And create some free space off the data partition before it's 
too late.)


Just as well I have time on my hands

Again, thanks to all for your suggestions



I am sure I saw a response to comment of mine, where I was misunderstood 
in the numbers I quoted for used space on my daily driver - 29G; and the 
space used by the problem machine - 35G.  There was a suggestion that I 
had not updated it as often as daily driver.    I had kept problem box 
as up to date as daily until a few days ago when it refused to update 
due to lack of space. This is when I discovered I had a problem. It is 
switched off at present, pending my deciding whether to expand / 
partition or re-install on the free space on ext4.   I will delete a few 
snapshots before I proceed, just to see what happens - I'll do that 
shortly, in fact, now I can see that it may have a bigger affect than I 
figured.


Now a minor amendment to my last note, where deleting snapshots has haad 
no bearing on used space.  Before I started, df reported 28G used, 
compared to 29G used yesterday. Remember my home is sym-linked from 
another partition. du is reporting /home is 3M which is the original / 
home/keith and re-named to keep it handy IN CASE I need it some day - 
like when I did some major surgery on that data partition the other 
week.  I'm trying to say that nothing I've done overnight has changed 
used space.  There were no packages to upgrade today.


df is now reporting 27G used on /   confirming btrfs seems to take time 
to reflect changes in snapshots.


Back later.




Back. On booting up problem machine I was greeted with warnings in disk 
space low on /. I generally don't log into desktop on this machine. 
Deleted 4 snapshots. df immediately reported used space 33G (down from 
35G) and free space 2.9G, up from ~200M at login.  I don't think I've 
EVER seen used space and free space equal size before.


I rebooted just to see if anything changed. 10 mins later df is still 
reporting

Size  Used Avail Use% Mounted on
36G   33G  2.9G  92% /


apt update/upgrade gave me
63 upgraded, 3 newly installed, 0 to remove and 0 not upgraded.
Need to get 337 MB of archives.


which I reckon is what I got yesterday after I moved my home to my data 
partition and


Quoted from 19Feb at 10:26  (UTC 18Feb at 23:26):
I then update/upgrade.   The initial attempt told me
63 upgraded, 3 newly installed, 0 to remove and 0 not upgraded.
Need to get 337 MB of archives.
After this operation, 473 MB of additional disk space will be used.
Do you want to continue? [Y/n]

But the 3 kernel related packages failed to install a couple of times. 
When I finally figured I should check space, there was none.   I rolled 
back to prior to the upgrade, but still no free space.


And earlier:My 

utilisation de nis et nfs pour un réseau de 32 postes

2024-02-19 Thread olivier

Bonjour,

J'ai un réseau totalement avec débian 11 (que je compte mettre à jour 
avec la version 12), constitué d'un serveur avec deux cartes réseau, 
l'une reliée à l’extérieur par la fibre (DHCP) et l'autre carte (Adresse 
IP fixe 192.168.200.0) reliée à un switch. Ce switch est relié à 32 
postes (avec IP fixe de 192.168.200.10 à 192.168.200.50, adresse de la 
passerelle 192.168.200.0, masque de sous réseau 255.255.255.0).


Les 32 postes sont utilisés par une classe d'élèves. J'ai 200 élèves à 
gérer, donc 200 profil différent.


Pour que chaque poste accède à internet, j'ai fais

iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE

Est ce judicieux ?

J'ai essayé avec NIS avec debian 11, l'authentification à l'air de bien 
fonctionner. Pour l'authentification, NIS est il bien adapté pour ce 
genre de configuration ?


Par contre au niveau de l'export (NFS), cela rame un peu (je me rend 
compte que j'exporte l'ensemble du home serveur sur tous les clients et 
non celui uniquement de l'utilisateur). Comment faire pour exporter sur 
la machine cliente uniquement le profil de l'utilisateur et non tous les 
utilisateurs ?


Sur le serveur, j'ai mis à la fin dans le fichier /etc/exports

/home/NFS_Partage 192.168.200.1/24(rw,sync,no_subtree_check)
mais j'hésite avec

/home/NFS_Partage 
192.168.0.0/24(rw,all_squash,anonuid=1000,anongid=1000,sync,no_subtree_check)


Sur le client, j'ai mis à la fin dans le fichier fstab

DomaineNFS:/home/NFS_Partage /home nfs defaults    0 0

On m'a parlé de LDAP, mais je ne sais pas trop comment m'y prendre. Est 
il préférable d'utiliser LDAP ou NIS pour l'authentification ? Existe il 
un petit manuel simple pour créer 200 utilisateurs.


Mon réseau fonctionne, mais rame beaucoup au delà de 4 utilisateurs ? et 
je n'arrive pas à trouver une solution.


Un grand merci pour votre aide.

Olivier





Re: Timer doing apt update

2024-02-19 Thread Erwan David

Le 20/02/2024 à 01:58, Andy Smith a écrit :

Hi,

On Mon, Feb 19, 2024 at 08:35:18PM +0100, Erwan David wrote:

Sorry il was packagekit, I made a mistake while writing.

If it's packagekit then isn't it going to be some part of your
desktop environment? Which desktop environment are you using?

GNOME will download updates and prompt you to install. To disable this open
"GNOME software",m burger menu, "Update Preferences".

The default behaviour of GNOME Software is to only download upgrades when on an
unmetered connection so if you are using GNOME and this is what is happening,
then as Max says telling NetworkManager that your connection is metered should
stop it.


I disable the timers, thanks

I don't think it's any of the systemd timers or unattended-upgrades.

Thanks,
Andy

I use KDE, and I do not know wether discover does an update by itself. I 
do not thind any setting about this


--
Erwan David



Re: Timer doing apt update

2024-02-19 Thread Erwan David

Le 20/02/2024 à 03:20, Max Nikulin a écrit :

On 20/02/2024 02:35, Erwan David wrote:

Le 19/02/2024 à 18:00, Max Nikulin a écrit :

    systemctl disable --now apt-daily.timer apt-daily-upgrade.timer

Perhaps it is possible to write a script that will respect 
connection.metered property set by NetworkManager.


I disable the timers, thanks


To avoid confusion, these timers are from the apt package, not from 
unattended-upgrades. So they are active on most Debian hosts. Desktop 
environments may display notifications after actions initiated by 
these timers. Likely desktop environments may do more, e.g. to query 
GNOME application shop for updates and initiate more frequent updates.



I'll have a look at connection.metered


Out of curiosity I have queried https://codesearch.debian.net. It 
seems, apt has no notion of metered connection. Perhaps the effect can 
be achieved by adding to unit configuration some Condition* mentioned 
in systemd.directives(7)


https://stackoverflow.com/questions/43228973/detect-if-current-connection-is-metered-with-networkmanager 



busctl get-property \
  org.freedesktop.NetworkManager \
  /org/freedesktop/NetworkManager \
  org.freedesktop.NetworkManager Metered


It would also require to configure NetworkManager to set this correctly. 
Eg When I use USB tethering. (same NetworkManager connexion may be used 
at different places, without any way to simply detect this, when you do 
not use Wifi)


--
Erwan David



Re: partition reporting full, but not

2024-02-19 Thread Felix Miata
Keith Bainbridge composed on 2024-02-20 17:45 (UTC+1100):

> I just removed 3 snapshots from my daily driver with no change in used 
> space reported by df

df doesn't know how to calculate freespace on btrfs. You need to be typing

btrfs filesystem df

if you have not aliased df to btrfs filesystem df.
-- 
Evolution as taught in public schools is, like religion,
based on faith, not based on science.

 Team OS/2 ** Reg. Linux User #211409 ** a11y rocks!

Felix Miata



Re: Banning a user from posting to Debian lists

2024-02-19 Thread Charles Kroeger
just checking

-- 
CK



Re: Erreur nvidia suite upgrade noyau 6.1.0-18

2024-02-19 Thread Nicolas

Salut,

J'avais eu un problème similaire. Sur je ne sais plus quel forum, on 
préconisait de passer au kernel 6.5.0 via les dépôts backports. Je l'ai 
fait et les paquets kenel et nvidia se sont bien isntallés et compilés.


Pour passer par les backports j'ai ajouter cette ligne dans 
/etc/apt/sources.list
deb http://ftp.fr.debian.org/debian/ bookworm-backports main non-free 
contrib non-free-firmware


J'espère que ça vous aidera.

Le 19/02/2024 20:42, ajh-valmer a écrit :

On Monday 19 February 2024 19:17:22 Patrick ZAJDA wrote:
et epsilon 

Merci :


La mise à jour est déjà disponibles sur les dépôts officiels, si
bookworm-updates est bien dans les listes de sources alors la version
525.147.05-7~deb12u1 devrait être disponible à l'installation


Il semblerait que la mise à jour du kernel 6.1.0-18-amd64,
ne concerne que la version Debian SID.
J'ai retenté un apt update  => apt upgrade en vain,
c'est un échec, ma Debian-12 refuse de dépasser le noyau 6.1.0-17-amd64 
:

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1062932

Pour la partie drivers Nvidia :
https://lists.debian.org/debian-stable-announce/2024/02/msg2.html
The following packages have been updated to correct the problem:
Source package Fixed version
nvidia-graphics-drivers525.147.05-7~deb12u1
nvidia-graphics-drivers-tesla  525.147.05-7~deb12u1
nvidia-graphics-drivers-tesla-470  470.223.02-4~deb12u1
nvidia-settings525.147.05-1~deb12u1

Je ne peux rien tester tant que je ne peux upgrader.

Bonne soirée.


> $ apt policy nvidia-driver
> nvidia-driver:
> Installé : 525.147.05-7~deb12u1
> Candidat : 525.147.05-7~deb12u1
>Table de version :
>*** 525.147.05-7~deb12u1 500
> 500 https://deb.debian.org/debian bookworm-updates/non-free
> amd64 Packages
> 100 /var/lib/dpkg/status
> 525.147.05-4~deb12u1 500
>  500 https://deb.debian.org/debian bookworm/non-free amd64 Packages


--
Nicolas
+ nico...@noisyspoon.net



Re: partition reporting full, but not

2024-02-19 Thread Keith Bainbridge



On 19/2/24 14:20, Keith Bainbridge wrote:


On 19/2/24 10:26, Keith Bainbridge wrote:


On 18/2/24 14:49, Keith Bainbridge wrote:


On 18/2/24 07:34, debian-u...@howorth.org.uk wrote:

Keith Bainbridge  wrote:

Yes the / partitions are btrfs


So the apparently missing space is perhaps taken up by btrfs snapshots.



Seems to be the prime suspect.   If that's the case, btrfs is NOT 
hard- linking the snapshots as timeshift claims it does. The only way 
to check is install on ext4 and compare. I have saves enough free 
space to do this.


My effort to date is to move my home to /mnt/data and sim-link it 
into / home. df is now showing 2.3GB free on /.  df showed /home as 
2.2GB yesterday.  At least there is a little space to play with; and 
give me time to consider. A fresh install may be worth checking in 
snapshots are as big as this all makes them look.


a few brief answer to other comments will follow



So later yesterday afternoon I created a new snapshot with no obvious 
change is free space.


I then update/upgrade.   The initial attempt told me
63 upgraded, 3 newly installed, 0 to remove and 0 not upgraded.
Need to get 337 MB of archives.
After this operation, 473 MB of additional disk space will be used.
Do you want to continue? [Y/n]

But the 3 kernel related packages failed to install a couple of times. 
When I finally figured I should check space, there was none.   I 
rolled back to prior to the upgrade, but still no free space.


I said sometime in this thread that timeshift (and BiT) use hard links 
to create progressive copies of the system. The more I think about how 
hard links reportedly work, I reckon it can't be simply hard links.


So I'm starting a new thread on that topic.




So I'm back to see some more helpful hints. Thanks folk

I am convinced that the missing space is used by btrfs snapshot process. 
But WHY is the used space reporting on my daily driver LESS than that on 
the spare machine  29G vs 35G? The original install was the same .iso 
  Ah well


I could add some of the spare space the the / partition, but how much? 
Play safe and use the lot, making it 60G compared to 63G on my daily 
driver. (And create some free space off the data partition before it's 
too late.)


Just as well I have time on my hands

Again, thanks to all for your suggestions



I am sure I saw a response to comment of mine, where I was misunderstood 
in the numbers I quoted for used space on my daily driver - 29G; and the 
space used by the problem machine - 35G.  There was a suggestion that I 
had not updated it as often as daily driver.I had kept problem box 
as up to date as daily until a few days ago when it refused to update 
due to lack of space. This is when I discovered I had a problem. It is 
switched off at present, pending my deciding whether to expand / 
partition or re-install on the free space on ext4.   I will delete a few 
snapshots before I proceed, just to see what happens - I'll do that 
shortly, in fact, now I can see that it may have a bigger affect than I 
figured.


Now a minor amendment to my last note, where deleting snapshots has haad 
no bearing on used space.  Before I started, df reported 28G used, 
compared to 29G used yesterday. Remember my home is sym-linked from 
another partition. du is reporting /home is 3M which is the original 
/home/keith and re-named to keep it handy IN CASE I need it some day - 
like when I did some major surgery on that data partition the other 
week.  I'm trying to say that nothing I've done overnight has changed 
used space.  There were no packages to upgrade today.


df is now reporting 27G used on /   confirming btrfs seems to take time 
to reflect changes in snapshots.


Back later.

--
All the best

Keith Bainbridge

keith.bainbridge.3...@gmail.com
+61 (0)447 667 468

UTC + 10:00



Re: sshd Match regel

2024-02-19 Thread Gijs Hillenius
On 19 February 2024 18:26 Rik Theys, wrote:

> Beste,
>
> On Mon, Feb 19, 2024 at 5:53 PM Gijs Hillenius  wrote:
>
>>
>>
>> Iets als, onderaan sshd_config dit:
>>
>> ,
>> | Match User webcams
>> | PubkeyAcceptedKeyTypes ssh-rsa,ssh-dss
>> `
>>
>> ssh lijkt dat te willen snappen. Desondanks verschijnt dezelfde
>> foutmelding in auth.log. De clients bevestigen: "unable to exchange
>> encryption keys."
>>
>> Als ik op de server doe:
>>
>> ssh localhost -Q HostKeyAlgorithms
>>
>>
>> daar zie ik toch ssh-dss en ssh-rsa staan.
>>
>> Maar ... niet de "oude"?
>>
>> Wie heeft een tip
>>
>>

> De -Q optie geeft een lijst van ondersteunde algorithms, daarom niet
> degene die actief zijn? Ik zou eens proberen met een Match op het IP
> adres ipv de gebruikersnaam. Mogelijk is de uitwisseling van de
> gebruikersnaam pas na het tot stand komen van de encryptie?

Ow! dank voor het meedenken, dat helpt.

Idd, ik zie in de ssh logs niet die username.

Maar

,
| Match Address 192.168.123.42
|   PubkeyAcceptedKeyTypes ssh-rsa,ssh-dss
`

geeft helaas dezelfde melding in de log.




Re: partition reporting full, but not

2024-02-19 Thread Keith Bainbridge



On 19/2/24 13:00, Max Nikulin wrote:

On 19/02/2024 06:26, Keith Bainbridge wrote:


So later yesterday afternoon I created a new snapshot with no obvious 
change is free space.


Effect of snapshots is delayed. When you remove a file that does not 
belong to any snapshot, some disk space is reclaimed. However to restore 
a file (even a removed later) from a snapshot, it must be stored 
anywhere. That is why snapshots consume disk space.


Try to remove unnecessary snapshots. I have no idea if btrfs requires 
additional maintenance.




I just removed 3 snapshots from my daily driver with no change in used 
space reported by df


Mindful of the fact that somebody considers it may take time to reflect 
changes within the snapshots, I'll check again tomorrow morning



--
All the best

Keith Bainbridge

keith.bainbridge.3...@gmail.com
+61 (0)447 667 468

UTC + 10:00



Re : Comment remplacer l'utilisateur root pour utiliser le service cron ?

2024-02-19 Thread k6dedijon
Bonjour,
Je découvre ce fil de discussion.
Je ne comprends pas que l'on puisse encore travailler avec CRON.
Alors que ANACRON est indépendant de la période de fonctionnement du PC.

Peut-etre que vous pourriez trouver une piste de solution dans l'article de Léa 
Linux espliquant les fonctionalités de at, cron et anacron.
https://lea-linux.org/documentations/Programmation_de_travaux_avec_at_cron_anacron

Bon courage
Cassis


- Mail d'origine -
De: Bernard Bass 
À: Liste Debian 
Envoyé: Sun, 18 Feb 2024 00:32:25 +0100 (CET)
Objet: Comment remplacer l'utilisateur root pour utiliser le service cron ?

Bonjour,

Voilà ma question : Comment remplacer l'utilisateur root pour utiliser 
le service cron ?

##
##

Utiliser cron et crontab sur Debian 12.
Un utilisateur sudoer est créé pour utiliser sudo et administrer le système.
*L'utilisateur root a été désactivé sur le système Debian et le mot de 
passe est forcé pour expirer.*

Des erreurs s'affichent dans journalctl, les tâches cron de 
l'utilisateur root ne sont pas lancées :

*SERVEUR cron : Authentication failure
Password root of that user should be expried.*

Le compte utilisateur root est verrouillé et le mot de passe est forcé 
pour expirer, il ne peut être utilisé pour lancer des tâches cron.

*COMMENT CREER UN UTILISATEUR POUR REMPLACER ROOT ET UTILISER SA CRONTAB ?*

Créer un utilisateur pour remplacer root :
sudo adduser gestionnaire
sudo bash
echo "gestionnaire ALL=(ALL) ALL" >> /etc/sudoers
echo "gestionnaire ALL=(ALL) NOPASSWD:ALL" >> /etc/sudoers

Ajouter gestionnaire au groupe cron :
gpasswd -a gestionnaire cron

Lorsque un utilisateur est ajouté au groupe cron, se déconnecter et se 
reconnecter pour rendre l'ajout au groupe effectif.

*Comment faire comprendre au système qu'il faut utiliser le nouvel 
utilisateur pour lancer les tâches cron du système ?*

*( la crontab de l'utilisateur sudoer, la crontab de l'utilisateur 
gestionnaire, les tâches cron.daily . , les tâches des services dans 
le dossier cron.d )
*

##
##






La recherche actuelle :

*( Les tâches cron.daily . , les tâches des services dans le dossier 
cron.d ne fonctionnent pas **" cron **: **Authentication failure " **)
*

##

Utiliser cron et crontab sur Debian 12.
Un utilisateur sudoer est créé pour utiliser sudo et administrer le système.

L'utilisateur root a été désactivé sur le système Debian et le mot de 
passe est forcé pour expirer.

Des erreurs s'affichent dans journalctl, les tâches cron de 
l'utilisateur root ne sont pas lancées.

##

sudo journalctl -p err
févr. 11 16:25:01 SERVEUR CRON[874565]: pam_unix(cron:account): account 
root has expired (account expired)
*févr. 11 16:25:01 SERVEUR cron[874565]: Authentication failure 
*
sudo[874537]: pam_unix(sudo:session): session closed for user root

Le compte utilisateur root est verrouillé et ne peut être utilisé pour 
lancer des tâches cron.
*Password root of that user should be expried. 
*

##

*COMMENT CREER UN UTILISATEUR ROOT POUR REMPLACER ROOT ET UTILISER SA 
CRONTAB ? *
Comment exécuter une commande exigeant un plus haut niveau de permission 
(root ou racine) ?


Créer un utilisateur pour remplacer root :
sudo adduser gestionnaire
sudo bash
echo "gestionnaire ALL=(ALL) ALL" >> /etc/sudoers
echo "gestionnaire ALL=(ALL) NOPASSWD:ALL" >> /etc/sudoers

Ajouter gestionnaire au groupe cron :
gpasswd -a gestionnaire cron
Lorsque un utilisateur est ajouté au groupe cron, se déconnecter et se 
reconnecter pour rendre l'ajout au groupe effectif.

*Comment faire comprendre au système qu'il faut utiliser gestionnaire 
pour lancer les tâches cron ?*
...
...


##

sudo systemctl stop cron
sudo systemctl start cron
sudo systemctl restart cron

# Identifier les processus cron :
sudo systemctl status cron
# Arrêter un processus cron :
sudo kill PID


Re: Timer doing apt update

2024-02-19 Thread Greg Wooledge
On Tue, Feb 20, 2024 at 03:56:49AM +, Andy Smith wrote:
> On Mon, Feb 19, 2024 at 10:21:24PM -0500, Greg Wooledge wrote:
> > Does anyone know when these things changed, and why on earth nobody
> > knew about it?!  Did I miss a section in the release notes or something?
> 
> Why are you shocked by this? Most of it is disabled by default (no
> update / upgrade / unattended-upgrade). You have to set things like
> APT::Periodic::Update-Package-Lists to 1.
> 
> It's been there since Debian 9 (stretch) IIRC.
> 
> The handbook has stuff about it.
> 
> https://debian-handbook.info/browse/stable/sect.regular-upgrades.html

According to this page, the configuration is in
/etc/apt/apt.conf.d/10periodic (which does not exist on my system).

Also according to this page, there is a script in
/usr/lib/apt/apt.systemd.daily which describes the configuration
variables (this script does exist).

According to the /usr/lib/apt/apt.systemd.daily script, the
/etc/apt/apt.conf.d/10periodic file has to be created if you want to
change the defaults.  OK.

Also according to that script, the default values are listed in the
comments of said script.

These comments include:

#  APT::Periodic::Enable "1";
#  - Enable the update/upgrade script (0=disable)

which, if I'm reading this correctly, says that this thing is enabled
by default.  "This thing" being an "update/upgrade script".  Whatever
that means.

The comments also include:

#  APT::Periodic::Update-Package-Lists "0";
#  - Do "apt-get update" automatically every n-days (0=disable)
#
#  APT::Periodic::Download-Upgradeable-Packages "0";
#  - Do "apt-get upgrade --download-only" every n-days (0=disable)

I'm not sure how to interpret this combination of things.  Do these
default settings mean "the update/upgrade script will run, but it won't
actually do anything"?



Re: Timer doing apt update

2024-02-19 Thread Andy Smith
Hi,

On Mon, Feb 19, 2024 at 10:21:24PM -0500, Greg Wooledge wrote:
> Does anyone know when these things changed, and why on earth nobody
> knew about it?!  Did I miss a section in the release notes or something?

Why are you shocked by this? Most of it is disabled by default (no
update / upgrade / unattended-upgrade). You have to set things like
APT::Periodic::Update-Package-Lists to 1.

It's been there since Debian 9 (stretch) IIRC.

The handbook has stuff about it.

https://debian-handbook.info/browse/stable/sect.regular-upgrades.html

Thanks,
Andy

-- 
https://bitfolk.com/ -- No-nonsense VPS hosting



Re: red SATA cables "notoriously bad"?

2024-02-19 Thread gene heskett

On 2/19/24 22:15, Andy Smith wrote:

Hi,

On Mon, Feb 19, 2024 at 10:06:23PM -0500, gene heskett wrote:

Andy, look at that CET after my name in the sig, that stands for Certified
Electronics Tachnician.


There isn't a polite way to say this really but unfortunately I am
unable to take you seriously as you've posted so many outright
incorrect assertions to this mailing list in the past.

I can list off my qualifications and experience and still be told
pretty often that I don't know what I am talking about, and sometimes
I probably don't, so let's leave it at that.

Regards,
Andy


Thats a good way to cap this Andy, thanks. stay well.

Cheers, Gene Heskett, CET.
--
"There are four boxes to be used in defense of liberty:
 soap, ballot, jury, and ammo. Please use in that order."
-Ed Howdershelt (Author, 1940)
If we desire respect for the law, we must first make the law respectable.
 - Louis D. Brandeis



Re: red SATA cables "notoriously bad"? (Was Re: Orphaned Inode Problem)

2024-02-19 Thread jeremy ardley



On 20/2/24 08:48, Andy Smith wrote:

Hi,

On Mon, Feb 19, 2024 at 04:12:44PM -0300, Eike Lantzsch ZP5CGE / KY4PZ wrote:

The notorious red SATA cables - I threw them out long ago. The red
pigment eats up the fine copper threads, changing the impedance of the
cable and eventually making false contact before failing completely.

I've never heard of this. I did a bit of searching around and all I
can find is assertions that cable colour doesn't matter for SATA. I
can't seem to find anything about red pigment damaging the copper.
Have you got a reference so I can learn more?



I find it unlikely that the color of the outer sheath of a cable affects 
the conductors as they have their own individual sheaths usually of a 
different material to the sheath.


It's possible that some manufacturer made cables with faulty individual 
insulation and their brand used a red outer sheath. In that case the 
color of the sheath correlates with faulty cables but is not the cause 
of the faulty cables.




Re: Timer doing apt update

2024-02-19 Thread Greg Wooledge
On Tue, Feb 20, 2024 at 09:20:11AM +0700, Max Nikulin wrote:
> > >     systemctl disable --now apt-daily.timer apt-daily-upgrade.timer

> To avoid confusion, these timers are from the apt package, not from
> unattended-upgrades. So they are active on most Debian hosts.

Holy crap... when did this happen?

I tried looking on salsa and it looks like the 1.8.y branch has these
files, but the jessie branch does not.  But I don't know where the
"preset: enabled" thing comes from.  So maybe the files were there but
not enabled by default until recently?  Maybe?

Does anyone know when these things changed, and why on earth nobody
knew about it?!  Did I miss a section in the release notes or something?



Re: red SATA cables "notoriously bad"?

2024-02-19 Thread Andy Smith
Hi,

On Mon, Feb 19, 2024 at 10:06:23PM -0500, gene heskett wrote:
> Andy, look at that CET after my name in the sig, that stands for Certified
> Electronics Tachnician.

There isn't a polite way to say this really but unfortunately I am
unable to take you seriously as you've posted so many outright
incorrect assertions to this mailing list in the past.

I can list off my qualifications and experience and still be told
pretty often that I don't know what I am talking about, and sometimes
I probably don't, so let's leave it at that.

Regards,
Andy

-- 
https://bitfolk.com/ -- No-nonsense VPS hosting



Re: red SATA cables "notoriously bad"?

2024-02-19 Thread gene heskett

On 2/19/24 20:29, Andy Smith wrote:

Hello,

On Mon, Feb 19, 2024 at 08:16:49PM -0500, Felix Miata wrote:

I've never heard of this. I did a bit of searching around and all I
can find is assertions that cable colour doesn't matter for SATA. I
can't seem to find anything about red pigment damaging the copper.
Have you got a reference so I can learn more?


Don't you ever read Gene Heskett posts?


Ah I see:

 https://lists.debian.org/debian-user/2023/06/msg00103.html

 Stefan: Can you point to any evidence?

 Gene: Just my own life [segue to story from 1970]

The usual story.

Yeah I skipped that thread the first time around owing to its
subject line containing "urban legends".


consider searching this very list's archives.


Moments of my life I will never get back, and no more authoritative
sources unfortunately!

Thanks,
Andy

Andy, look at that CET after my name in the sig, that stands for 
Certified Electronics Tachnician.  We teach EE's which there are 1000's 
of compared to us, what their profs didn't teach them before issuing 
that sheepskin they hang on the office wall. I'm also a 1st phone, an 
easy test I didn't crack a book for. And I was familiar enough, having 
made a living from electronics for 20+ year including the physics of 
klystrons when I saw the notice that the test was available so I walked 
into the profs classroom and laid my fee for the test on his desk. 
Allocated 4 hours, I handed it back to him in 45 minutes. Of 125 
questions, I blacked the right box on 123. He I found had been teaching 
that course for 5 years, I was the first that passed it. Registered as 
NB-116. 20 some years later I checked to see how many had passed since, 
they were up to NB-122. That's telling indeed.


Now I'm in my 90th year, and with a fading short term memory and a pita 
on this list, but I'm still here till I miss roll call some morning.


Take care and stay well ANDY.

Cheers, Gene Heskett, CET.
--
"There are four boxes to be used in defense of liberty:
 soap, ballot, jury, and ammo. Please use in that order."
-Ed Howdershelt (Author, 1940)
If we desire respect for the law, we must first make the law respectable.
 - Louis D. Brandeis



Re: red SATA cables "notoriously bad"? (Was Re: Orphaned Inode Problem)

2024-02-19 Thread gene heskett

On 2/19/24 19:49, Andy Smith wrote:

Hi,

On Mon, Feb 19, 2024 at 04:12:44PM -0300, Eike Lantzsch ZP5CGE / KY4PZ wrote:

The notorious red SATA cables - I threw them out long ago. The red
pigment eats up the fine copper threads, changing the impedance of the
cable and eventually making false contact before failing completely.


I've never heard of this. I did a bit of searching around and all I
can find is assertions that cable colour doesn't matter for SATA. I
can't seem to find anything about red pigment damaging the copper.
Have you got a reference so I can learn more?

Thanks,
Andy


Andy, I am the source of that red cable story. Actually it is not 
technically a red but a magenta that fluoresces reddish to get that 
brightness.  And my history with early failure of cables that used that 
dye to color the insulation goes back to the 1970's when the majority of 
the CB radios sold were from japan, not china.  Microphone cables that 
included a push to talk start failing quite rapidly, The hot red wire 
was used for that about 99% of the time..Open up the plug or the 
microphone, the red wire had come unsoldered or broken off, attempt to 
strip it back to good wire wasn't possible. there was no good copper 
left anyplace in the cable. Cut an inch of it off where there should 
have been copper, grab it by the end with suture clamps and thump it 
with a pencil over white copy paper and shake the copper out of it as a 
reddish, face powder fine dust, the copper had been I assume made into 
copper oxide. It took every good tech in the country to start returning 
mike cables back to the makers as defective before they got the message 
that that die was poison. That took about 9 months before we could order 
replacement cable specifing that they would be returned for credit if we 
found any 'hot" red in the cables they were selling us. The shortage at 
the time forced them to ship whatever they had I guess.  If you goto 
Loews or any electrical supply where they have to sell NEC approved 
cabling, you will NOT see that red on any wire on the shelf or in the 
rack. Then about the time sata came out, they found a new market for 
that plastic dye, and sure as heck, we had cabling problems out the yang 
in about 3 years. If you have that hot red wire anyplace in you 
computer, it will fail, order more cables.  Tan, Black, Yellow, but not 
hot red.  And sleep better knowing that time bomb has gone out with the 
trash.


Cheers, Gene Heskett, CET.
--
"There are four boxes to be used in defense of liberty:
 soap, ballot, jury, and ammo. Please use in that order."
-Ed Howdershelt (Author, 1940)
If we desire respect for the law, we must first make the law respectable.
 - Louis D. Brandeis



Re: Timer doing apt update

2024-02-19 Thread Max Nikulin

On 20/02/2024 02:35, Erwan David wrote:

Le 19/02/2024 à 18:00, Max Nikulin a écrit :

    systemctl disable --now apt-daily.timer apt-daily-upgrade.timer

Perhaps it is possible to write a script that will respect 
connection.metered property set by NetworkManager.


I disable the timers, thanks


To avoid confusion, these timers are from the apt package, not from 
unattended-upgrades. So they are active on most Debian hosts. Desktop 
environments may display notifications after actions initiated by these 
timers. Likely desktop environments may do more, e.g. to query GNOME 
application shop for updates and initiate more frequent updates.



I'll have a look at connection.metered


Out of curiosity I have queried https://codesearch.debian.net. It seems, 
apt has no notion of metered connection. Perhaps the effect can be 
achieved by adding to unit configuration some Condition* mentioned in 
systemd.directives(7)


https://stackoverflow.com/questions/43228973/detect-if-current-connection-is-metered-with-networkmanager

busctl get-property \
  org.freedesktop.NetworkManager \
  /org/freedesktop/NetworkManager \
  org.freedesktop.NetworkManager Metered



Re: red SATA cables "notoriously bad"?

2024-02-19 Thread Felix Miata
Andy Smith composed on 2024-02-20 01:29 (UTC):

> On Mon, Feb 19, 2024 at 08:16:49PM -0500, Felix Miata wrote:

>>> I've never heard of this. I did a bit of searching around and all I
>>> can find is assertions that cable colour doesn't matter for SATA. I
>>> can't seem to find anything about red pigment damaging the copper.
>>> Have you got a reference so I can learn more?

>> Don't you ever read Gene Heskett posts?

> Ah I see:

> https://lists.debian.org/debian-user/2023/06/msg00103.html

> Stefan: Can you point to any evidence?

> Gene: Just my own life [segue to story from 1970]

> The usual story.

Gene's been around quite a while, working electronics longer than most of us 
have
lived, likely finished his schooling and went to work before Roosevelt died.

> Yeah I skipped that thread the first time around owing to its
> subject line containing "urban legends".

>> consider searching this very list's archives.

> Moments of my life I will never get back, and no more authoritative
> sources unfortunately!

My experience with that particular color cables matches Gene's. Cut one open, 
and
out comes a powdery substance instead of clean copper strands. I think most for
gen 1.0 SATA 2 decades ago, so there shouldn't be many still around bogging down
3.0 drives.
-- 
Evolution as taught in public schools is, like religion,
based on faith, not based on science.

 Team OS/2 ** Reg. Linux User #211409 ** a11y rocks!

Felix Miata



Re: red SATA cables "notoriously bad"?

2024-02-19 Thread Andy Smith
Hello,

On Mon, Feb 19, 2024 at 08:16:49PM -0500, Felix Miata wrote:
> > I've never heard of this. I did a bit of searching around and all I
> > can find is assertions that cable colour doesn't matter for SATA. I
> > can't seem to find anything about red pigment damaging the copper.
> > Have you got a reference so I can learn more?
> 
> Don't you ever read Gene Heskett posts?

Ah I see:

https://lists.debian.org/debian-user/2023/06/msg00103.html

Stefan: Can you point to any evidence?

Gene: Just my own life [segue to story from 1970]

The usual story.

Yeah I skipped that thread the first time around owing to its
subject line containing "urban legends".

> consider searching this very list's archives.

Moments of my life I will never get back, and no more authoritative
sources unfortunately!

Thanks,
Andy

-- 
https://bitfolk.com/ -- No-nonsense VPS hosting



Re: red SATA cables "notoriously bad"?

2024-02-19 Thread Felix Miata
Andy Smith composed on 2024-02-20 00:48 (UTC):

> On Mon, Feb 19, 2024 at 04:12:44PM -0300, Eike Lantzsch ZP5CGE / KY4PZ wrote:

>> The notorious red SATA cables - I threw them out long ago. The red
>> pigment eats up the fine copper threads, changing the impedance of the
>> cable and eventually making false contact before failing completely.

> I've never heard of this. I did a bit of searching around and all I
> can find is assertions that cable colour doesn't matter for SATA. I
> can't seem to find anything about red pigment damaging the copper.
> Have you got a reference so I can learn more?

Don't you ever read Gene Heskett posts? I expect he'll be chiming in on this one
shortly While you wait, consider searching this very list's archives.
-- 
Evolution as taught in public schools is, like religion,
based on faith, not based on science.

 Team OS/2 ** Reg. Linux User #211409 ** a11y rocks!

Felix Miata



Re: Erreur nvidia suite upgrade noyau 6.1.0-18

2024-02-19 Thread Michel Verdier
Le 19 février 2024 ajh-valmer a écrit :

> Il semblerait que la mise à jour du kernel 6.1.0-18-amd64,
> ne concerne que la version Debian SID.

Tu as ça ici :
https://packages.debian.org/bookworm/linux-image-6.1.0-18-amd64
https://metadata.ftp-master.debian.org/changelogs//main/l/linux-signed-amd64/linux-signed-amd64_6.1.76+1_changelog



Re: Timer doing apt update

2024-02-19 Thread Andy Smith
Hi,

On Mon, Feb 19, 2024 at 08:35:18PM +0100, Erwan David wrote:
> Sorry il was packagekit, I made a mistake while writing.

If it's packagekit then isn't it going to be some part of your
desktop environment? Which desktop environment are you using?

GNOME will download updates and prompt you to install. To disable this open
"GNOME software",m burger menu, "Update Preferences".

The default behaviour of GNOME Software is to only download upgrades when on an
unmetered connection so if you are using GNOME and this is what is happening,
then as Max says telling NetworkManager that your connection is metered should
stop it.

> I disable the timers, thanks

I don't think it's any of the systemd timers or unattended-upgrades.

Thanks,
Andy

-- 
https://bitfolk.com/ -- No-nonsense VPS hosting



red SATA cables "notoriously bad"? (Was Re: Orphaned Inode Problem)

2024-02-19 Thread Andy Smith
Hi,

On Mon, Feb 19, 2024 at 04:12:44PM -0300, Eike Lantzsch ZP5CGE / KY4PZ wrote:
> The notorious red SATA cables - I threw them out long ago. The red
> pigment eats up the fine copper threads, changing the impedance of the
> cable and eventually making false contact before failing completely.

I've never heard of this. I did a bit of searching around and all I
can find is assertions that cable colour doesn't matter for SATA. I
can't seem to find anything about red pigment damaging the copper.
Have you got a reference so I can learn more?

Thanks,
Andy

-- 
https://bitfolk.com/ -- No-nonsense VPS hosting



Re: Re: GRUB lost graphical terminal mode

2024-02-19 Thread Borden
> On 18 Feb 2024 21:28 +0100, from borde...@tutanota.com (Borden):
> > what the default is when neither of those are set (which doesn't
> > work). Is this another "undocumented feature" of GRUB?
> 
> Would you be willing to post your /boot/grub/grub.cfg for a setup where you 
> get the blank screen GRUB?

Yeah, I probably should have opened with that. Sorry:

```
# If you change this file, run 'update-grub' afterwards to update
# /boot/grub/grub.cfg.
# For full documentation of the options in this file, see:
#   info -f grub -n 'Simple configuration'

GRUB_DEFAULT=0
GRUB_TIMEOUT=5
GRUB_DISTRIBUTOR=`lsb_release -i -s 2> /dev/null || echo Debian`
GRUB_CMDLINE_LINUX_DEFAULT=""
GRUB_CMDLINE_LINUX=""

# If your computer has multiple operating systems installed, then you
# probably want to run os-prober. However, if your computer is a host
# for guest OSes installed via LVM or raw disk devices, running
# os-prober can cause damage to those guest OSes as it mounts
# filesystems to look for things.
GRUB_DISABLE_OS_PROBER=false

# Uncomment to enable BadRAM filtering, modify to suit your needs
# This works with Linux (no patch required) and with any kernel that obtains
# the memory map information from GRUB (GNU Mach, kernel of FreeBSD ...)
#GRUB_BADRAM="0x01234567,0xfefefefe,0x89abcdef,0xefefefef"

# Uncomment to disable graphical terminal
#GRUB_TERMINAL=console

# The resolution used on graphical terminal
# note that you can use only modes which your graphic card supports via VBE
# you can see them in real GRUB with the command `vbeinfo'
#GRUB_GFXMODE=640x480

# Uncomment if you don't want GRUB to pass "root=UUID=xxx" parameter to Linux
#GRUB_DISABLE_LINUX_UUID=true

# Uncomment to disable generation of recovery mode menu entries
#GRUB_DISABLE_RECOVERY="true"

# Uncomment to get a beep at grub start
#GRUB_INIT_TUNE="480 440 1"
```

For what it's worth, my graphics adapter is an ancient Intel HD 4000 series 
processor (Ivy Bridge era). It's possible that my card is dying or no longer 
supported. It's just a pain that it worked a few weeks ago and now it doesn't. 
It would be nice to know why.



Re: Erreur nvidia suite upgrade noyau 6.1.0-18

2024-02-19 Thread ajh-valmer
On Monday 19 February 2024 19:17:22 Patrick ZAJDA wrote:
et epsilon 

Merci :
 
> La mise à jour est déjà disponibles sur les dépôts officiels, si 
> bookworm-updates est bien dans les listes de sources alors la version 
> 525.147.05-7~deb12u1 devrait être disponible à l'installation

Il semblerait que la mise à jour du kernel 6.1.0-18-amd64,
ne concerne que la version Debian SID.
J'ai retenté un apt update  => apt upgrade en vain,
c'est un échec, ma Debian-12 refuse de dépasser le noyau 6.1.0-17-amd64 :
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1062932

Pour la partie drivers Nvidia :
https://lists.debian.org/debian-stable-announce/2024/02/msg2.html
The following packages have been updated to correct the problem:
Source package Fixed version
nvidia-graphics-drivers525.147.05-7~deb12u1
nvidia-graphics-drivers-tesla  525.147.05-7~deb12u1
nvidia-graphics-drivers-tesla-470  470.223.02-4~deb12u1
nvidia-settings525.147.05-1~deb12u1

Je ne peux rien tester tant que je ne peux upgrader.

Bonne soirée.

> > $ apt policy nvidia-driver
> > nvidia-driver:
> > Installé : 525.147.05-7~deb12u1
> > Candidat : 525.147.05-7~deb12u1
> >Table de version :
> >*** 525.147.05-7~deb12u1 500
> > 500 https://deb.debian.org/debian bookworm-updates/non-free 
> > amd64 Packages
> > 100 /var/lib/dpkg/status
> > 525.147.05-4~deb12u1 500
> >  500 https://deb.debian.org/debian bookworm/non-free amd64 Packages



Re: Timer doing apt update

2024-02-19 Thread Erwan David

Le 19/02/2024 à 18:00, Max Nikulin a écrit :

On 19/02/2024 14:35, Erwan David wrote:


After each boot, the equivalent of apt update is automatically done 
in background, through policykit (apt database is locked by 
policykitd). So I think there is a timer triggroing this. I'd like to 
disable this when my laptop is on expensive link (eg 4G link, or 
abroad). So I'd like to disable this timer, but I did not find it. If 
someone knws better than me...


Perhaps I missed something since I have no idea why policykit (or 
polkit?) is involved.


You may disable apt timers

    systemctl disable --now apt-daily.timer apt-daily-upgrade.timer

Perhaps it is possible to write a script that will respect 
connection.metered property set by NetworkManager.




Sorry il was packagekit, I made a mistake while writing.

I disable the timers, thanks

I'll have a look at connection.metered



Re: Upgrade to Bookworm, now GNOME keyring dies--no access to stored SSH key passwords

2024-02-19 Thread Nate Bargmann
Well, it appears like most things in life this one was self inflicted.
郎

Yesterday I was working on another project and to verify something was
occurring the 'strace' utility was recommended.  It dawned on me that
this could help me get a clue as to what was happening to the
gnome-keyring-daemon.  Using strace attached to the PID of the daemon
after a reboot showed it was getting the SIGTERM signal at exactly the
top of the hour.  What?!!

After seeing this twice this morning I recalled that I have a cron entry
to kill the 'rec' program.  This was to break up audio files into hourly
segments when recording an amateur radio event.  This was the cron
command:

# Rotate sound recorder files
00 * * * * /usr/bin/pkill -f rec > /dev/null 2> /dev/null

On a hunch I commented that line and Voila! the daemon ran through the
next hour change and is still running as expected.  The man page states
that the '-f' option matches against the full command line, not just the
process name.  So, looking at the gnome-keyring-daemon command line:

   1857 ?SLsl   0:00 /usr/bin/gnome-keyring-daemon --foreground 
--components=pkcs11,secrets --control-directory=/run/user/1000/keyring

I see that the 'rec' in 'directory' provided the match!  Confirmed with
pgrep:

$ pgrep -f rec
1857

It looks like the solution for the future will be to change the cron
line to:

00 * * * * /usr/bin/pkill -f /usr/bin/rec > /dev/null 2> /dev/null

When I want to use it next in order to protect other processes.

I certainly hope this is resolved.  OTOH, it forced me to recall a
number of passwords!  藍

- Nate

-- 
"The optimist proclaims that we live in the best of all
possible worlds.  The pessimist fears this is true."
Web: https://www.n0nb.us
Projects: https://github.com/N0NB
GPG fingerprint: 82D6 4F6B 0E67 CD41 F689 BBA6 FB2C 5130 D55A 8819



signature.asc
Description: PGP signature


Re: Orphaned Inode Problem

2024-02-19 Thread Eike Lantzsch ZP5CGE / KY4PZ
On Montag, 19. Februar 2024 14:20:52 -03 to...@tuxteam.de wrote:
> On Mon, Feb 19, 2024 at 10:02:10AM -0500, Stephen P. Molnar wrote:
> > I am running up to date Bookworm on my Debian platform:
> >
> > Processor   AMD FX(tm)-8320 Eight-Core Processor
> > Memory  8026MB (5267MB used)
> > Machine TypeDesktop
> > Operating SystemDebian GNU/Linux 12 (bookworm)
> >
> > I have been plagued with orphaned inodes. Last night the problem
> > cane to a head. When I reboot the computer, after an orphaned inode
> > incident created stop, it got as far as the user login. After the
> > return I got the Windows infamous blue screen. Restarting produced
> > the same problem.
> >
> > Fortunately, I have another SSD used to test Bookworm, before
> > updating on the SSD that is having the problem. I can access the
> > problem drive and am in the process of backing up files.
> >
> > I ran sudo e2fsck -f/dev/sdc1 and got:
> >
> > Script started on 2024-02-19 08:15:52-05:00 [TERM="xterm-256color"
> > TTY="/dev/pts/0" COLUMNS="100" LINES="24"]
> > [?2004h(base) ]0;comp@AbNormal:
> > ~comp@AbNormal:~$ sudo e2fsck -f
> > /dev/sdc1lcaomosudo e2fsck -f
> > /dev/sdc1 [?2004l
> > [sudo] password for comp:
> > e2fsck 1.47.0 (5-Feb-2023)
> > Pass 1: Checking inodes, blocks, and sizes
> > Pass 2: Checking directory structure
> > Pass 3: Checking directory connectivity
> > /lost+found not found.  Create? yes
> > Pass 4: Checking reference counts
> > Pass 5: Checking group summary information
> >
> > /dev/sdc1: * FILE SYSTEM WAS MODIFIED *
> > /dev/sdc1: 7982363/121577472 files (0.3% non-contiguous),
> > 421959365/486307328 blocks
> > [?2004h(base) ]0;comp@AbNormal:
> > ~comp@AbNormal:~$ [?2004l
> >
> > Comments and suggestions will be appreciated.
>
> This session doesn't show anything to worry about. As far as fsck
> is concerned, the file system looks clean. Back up its contents as
> quickly as you can and treat the disk with suspicion. There are
> other candidate suspects for file system corruption (flaky power
> supply, software doing silly things, kernel bugs, loose cables),
> but the disk would be the pirmary.
>
> Cheers

Just as an aside note:
The notorious red SATA cables - I threw them out long ago. The red
pigment eats up the fine copper threads, changing the impedance of the
cable and eventually making false contact before failing completely.
Of course this does not apply to NVME SSDs.

--
Eike Lantzsch KY4PZ / ZP5CGE





Re: Erreur nvidia suite upgrade noyau 6.1.0-18

2024-02-19 Thread Patrick ZAJDA



Le 19/02/2024 à 15:13, ajh-valmer a écrit :

On Saturday 17 February 2024 10:49:04 Patrick ZAJDA wrote:
Quoi qu'il en soit, une mise à jour a été publié dans bookworm-updates

(SUA 252-1) pour corriger le problème de compilation lors de la mise à
jour vers le kernel 6.1.0-18.
apt update puis apt upgrade devrait donc pouvoir se passer sans
problème, à la limite un apt -f install si ça ne passe vraiment pas.

Je n'ai pas vu qu'une mise à jour a été publiée dans bookworm-updates,
(SUA 252-1) correctif de compilation, mise à jour vers le kernel 6.1.0-18.
Ou s'agit-il d'une opération de mise à jour en cours ?




https://lists.debian.org/debian-stable-announce/2024/02/msg2.html

La mise à jour est déjà disponibles sur les dépôts officiels, si 
bookworm-updates est bien dans les listes de sources alors la version 
525.147.05-7~deb12u1 devrait être disponible à l'installation



$ apt policy nvidia-driver
nvidia-driver:
  Installé : 525.147.05-7~deb12u1
  Candidat : 525.147.05-7~deb12u1
 Table de version :
 *** 525.147.05-7~deb12u1 500
    500 https://deb.debian.org/debian bookworm-updates/non-free 
amd64 Packages

    100 /var/lib/dpkg/status
 525.147.05-4~deb12u1 500
    500 https://deb.debian.org/debian bookworm/non-free amd64 Packages



--
Patrick ZAJDA

Re: Orphaned Inode Problem

2024-02-19 Thread tomas
On Mon, Feb 19, 2024 at 12:30:30PM -0500, Stephen P. Molnar wrote:

[...]

> Thanks for he reply. It's somewhat reassuring.
> 
> According to my logs the box had its' last major  last upgrade in 2014, so I
> shouldn't be too surprised.
> 
> My backup is underweight and should be done sometime tomorrow.  I have a 2
> TB HDD I'm going to use for the new install.

Fingers crossed...

Cheers
-- 
t


signature.asc
Description: PGP signature


Re: Orphaned Inode Problem

2024-02-19 Thread Stephen P. Molnar



On 02/19/2024 12:20 PM, to...@tuxteam.de wrote:

On Mon, Feb 19, 2024 at 10:02:10AM -0500, Stephen P. Molnar wrote:

I am running up to date Bookworm on my Debian platform:

Processor   AMD FX(tm)-8320 Eight-Core Processor
Memory  8026MB (5267MB used)
Machine TypeDesktop
Operating SystemDebian GNU/Linux 12 (bookworm)

I have been plagued with orphaned inodes. Last night the problem cane to a
head. When I reboot the computer, after an orphaned inode incident created
stop, it got as far as the user login. After the return I got the Windows
infamous blue screen. Restarting produced the same problem.

Fortunately, I have another SSD used to test Bookworm, before updating on
the SSD that is having the problem. I can access the problem drive and am in
the process of backing up files.

I ran sudo e2fsck -f/dev/sdc1 and got:

Script started on 2024-02-19 08:15:52-05:00 [TERM="xterm-256color"
TTY="/dev/pts/0" COLUMNS="100" LINES="24"]
[?2004h(base) ]0;comp@AbNormal:
~comp@AbNormal:~$ sudo e2fsck -f
/dev/sdc1lcaomosudo e2fsck -f /dev/sdc1
[?2004l
[sudo] password for comp:
e2fsck 1.47.0 (5-Feb-2023)
Pass 1: Checking inodes, blocks, and sizes
Pass 2: Checking directory structure
Pass 3: Checking directory connectivity
/lost+found not found.  Create? yes
Pass 4: Checking reference counts
Pass 5: Checking group summary information

/dev/sdc1: * FILE SYSTEM WAS MODIFIED *
/dev/sdc1: 7982363/121577472 files (0.3% non-contiguous),
421959365/486307328 blocks
[?2004h(base) ]0;comp@AbNormal:
~comp@AbNormal:~$ [?2004l

Comments and suggestions will be appreciated.

This session doesn't show anything to worry about. As far as fsck
is concerned, the file system looks clean. Back up its contents as
quickly as you can and treat the disk with suspicion. There are
other candidate suspects for file system corruption (flaky power
supply, software doing silly things, kernel bugs, loose cables),
but the disk would be the pirmary.

Cheers

Thanks for he reply. It's somewhat reassuring.

According to my logs the box had its' last major  last upgrade in 2014, 
so I shouldn't be too surprised.


My backup is underweight and should be done sometime tomorrow.  I have a 
2 TB HDD I'm going to use for the new install.


--
Stephen P. Molnar, Ph.D.
https://insilicochemistry.net
(614)312-7528 (c)
Skype:  smolnar1



Re: sshd Match regel

2024-02-19 Thread Rik Theys
Beste,

On Mon, Feb 19, 2024 at 5:53 PM Gijs Hillenius  wrote:

>
>
> Iets als, onderaan sshd_config dit:
>
> ,
> | Match User webcams
> | PubkeyAcceptedKeyTypes ssh-rsa,ssh-dss
> `
>
> ssh lijkt dat te willen snappen. Desondanks verschijnt dezelfde
> foutmelding in auth.log. De clients bevestigen: "unable to exchange
> encryption keys."
>
> Als ik op de server doe:
>
> ssh localhost -Q HostKeyAlgorithms
>
>
> daar zie ik toch ssh-dss en ssh-rsa staan.
>
> Maar ... niet de "oude"?
>
> Wie heeft een tip
>
>
> De -Q optie geeft een lijst van ondersteunde algorithms, daarom niet
degene die actief zijn?
Ik zou eens proberen met een Match op het IP adres ipv de gebruikersnaam.
Mogelijk is de uitwisseling van de gebruikersnaam pas na het tot stand
komen van de encryptie?

Mvg,
Rik


Re: Orphaned Inode Problem

2024-02-19 Thread tomas
On Mon, Feb 19, 2024 at 10:02:10AM -0500, Stephen P. Molnar wrote:
> I am running up to date Bookworm on my Debian platform:
> 
> Processor AMD FX(tm)-8320 Eight-Core Processor
> Memory8026MB (5267MB used)
> Machine Type  Desktop
> Operating System  Debian GNU/Linux 12 (bookworm)
> 
> I have been plagued with orphaned inodes. Last night the problem cane to a
> head. When I reboot the computer, after an orphaned inode incident created
> stop, it got as far as the user login. After the return I got the Windows
> infamous blue screen. Restarting produced the same problem.
> 
> Fortunately, I have another SSD used to test Bookworm, before updating on
> the SSD that is having the problem. I can access the problem drive and am in
> the process of backing up files.
> 
> I ran sudo e2fsck -f/dev/sdc1 and got:
> 
> Script started on 2024-02-19 08:15:52-05:00 [TERM="xterm-256color"
> TTY="/dev/pts/0" COLUMNS="100" LINES="24"]
> [?2004h(base) ]0;comp@AbNormal:
> ~comp@AbNormal:~$ sudo e2fsck -f
> /dev/sdc1lcaomosudo e2fsck -f /dev/sdc1
> [?2004l
> [sudo] password for comp:
> e2fsck 1.47.0 (5-Feb-2023)
> Pass 1: Checking inodes, blocks, and sizes
> Pass 2: Checking directory structure
> Pass 3: Checking directory connectivity
> /lost+found not found.  Create? yes
> Pass 4: Checking reference counts
> Pass 5: Checking group summary information
> 
> /dev/sdc1: * FILE SYSTEM WAS MODIFIED *
> /dev/sdc1: 7982363/121577472 files (0.3% non-contiguous),
> 421959365/486307328 blocks
> [?2004h(base) ]0;comp@AbNormal:
> ~comp@AbNormal:~$ [?2004l
> 
> Comments and suggestions will be appreciated.

This session doesn't show anything to worry about. As far as fsck
is concerned, the file system looks clean. Back up its contents as
quickly as you can and treat the disk with suspicion. There are
other candidate suspects for file system corruption (flaky power
supply, software doing silly things, kernel bugs, loose cables),
but the disk would be the pirmary.

Cheers
-- 
t


signature.asc
Description: PGP signature


Banning a user from posting to Debian lists

2024-02-19 Thread Andrew M.A. Cater
[Also posted to commun...@debian.org / listmas...@lists.debian.org]

Subject: Banning of a user from posting to Debian lists
===

As noted in the monthly FAQ, among the events that can take place on Debian
lists as a result of breach of the Debian Code of Conduct is a temporary or
permanent ban from the mailing lists (and other official Debian resources).

Following  a last attempt to reach out and further consideration, it has been
requested to ban Sophie / Michael from the Debian-user mailing lists and other
resoures.

The mailing list threads have gone on for some years with no resolution and no
improvement in engagement with others: taken as a whole, this amounts to
misusing the goodwill of those on the list and, potentially, a misuse of
Debian resources overall.

Such decisions are taken rarely: this is an unusual event. As ever, it is
requested that people continue to behave according to the standards expressed
in the Debian Code of Conduct - being considerate and constructive and helpful
to others.

You should appreciate that this decision as final: as ever, the 
Community Team is there to discuss conduct in Debian channels.

With every good wish, as ever,

Andrew Cater
(amaca...@debian.org)

For the Community Team



Re: Timer doing apt update

2024-02-19 Thread Max Nikulin

On 19/02/2024 14:35, Erwan David wrote:


After each boot, the equivalent of apt update is automatically done in 
background, through policykit (apt database is locked by policykitd). So 
I think there is a timer triggroing this. I'd like to disable this when 
my laptop is on expensive link (eg 4G link, or abroad). So I'd like to 
disable this timer, but I did not find it. If someone knws better than 
me...


Perhaps I missed something since I have no idea why policykit (or 
polkit?) is involved.


You may disable apt timers

systemctl disable --now apt-daily.timer apt-daily-upgrade.timer

Perhaps it is possible to write a script that will respect 
connection.metered property set by NetworkManager.




Re: sudo udisksctl

2024-02-19 Thread Max Nikulin
David, feel free to stop discussion if you find me annoying. My problem 
in some sense is close to your one and I am trying to figure out if 
missed some udisks feature and the result is some inconvenience.


On 19/02/2024 11:26, David Wright wrote:

On Sun 18 Feb 2024 at 12:41:29 (+0700), Max Nikulin wrote:

On 18/02/2024 11:40, David Wright wrote:

$ udisksctl unlock --block-device /dev/disk/by-partlabel/Nokia01



When sudo is
involved, I still do not see any advantage of udisk[s]ctl over
"cryptsetup open".


I'd be more worried about disadvantages. About the only difference
I see is that   cryptsetup open   requires a name.


I find it convenient to have a meaningful name in /dev/mapper in 
addition to /dev/dm-X. So I would not call it pure disadvantage.



As third option, if I remember it correctly, pmount


That would be pointless for me. After udev creates correctly-named
mountpoints using my rules, entries in fstab set the appropriate
flags for each individual device. That contradicts the expressed main
purpose of pmount: "permits normal users to mount removable devices
without a matching /etc/fstab entry." — precisely what I don't want.


I consider pmount as a tool does not need separate unlock and mount 
commands, so a shell function becomes unnecessary. In respect to 
permissions (for removable drives) it acts as a substitute for sudo.


I expected that you need to mount a partition under /media into the 
directory with name taken from filesystem LABEL. If so then udisksd can 
do it and /etc/fstab entry is unnecessary. You anyway added an udev 
rule. The following one should change mountpoint from 
/media/$USER/lulu01 to /media/lulu01


SUBSYSTEM=="block", ENV{ID_FS_LABEL}=="lulu01", 
ENV{UDISKS_FILESYSTEM_SHARED}="1"


It seems that mixing of udisksctl and non-udisksctl commands cat be avoided.



sshd Match regel

2024-02-19 Thread Gijs Hillenius


Hoi

Ik heb sinds een inbraak in 2019 enige simpele (zelfgebouwde) embedded
webcameraatjes draaien. Put, koe, inderdaad. Maar dat terzijde.

Nou blijken die cameraatjes sinds enige tijd alweer hun filmpjes niet te
kopieren naar de file server op zolder.

Op die server Debian stable, draait openssh 1:9.2p1-2+deb12u2, en de
logs laten zien:

no matching host key type found. Their offer: ssh-rsa,ssh-dss [preauth]

ssh dus te oud, op die webcammetjes. Updaten van die cammetjes dat
blijkt een heel gedoe.. en... nou leek het me voor de korte termijn een
oplossing om op de ssh server voor de webcammetjes een uitzondering te
maken.

Iets als, onderaan sshd_config dit:

,
| Match User webcams
| PubkeyAcceptedKeyTypes ssh-rsa,ssh-dss
`

ssh lijkt dat te willen snappen. Desondanks verschijnt dezelfde
foutmelding in auth.log. De clients bevestigen: "unable to exchange
encryption keys."

Als ik op de server doe:

ssh localhost -Q HostKeyAlgorithms
ssh-ed25519
ssh-ed25519-cert-...@openssh.com
sk-ssh-ed25...@openssh.com
sk-ssh-ed25519-cert-...@openssh.com
ecdsa-sha2-nistp256
ecdsa-sha2-nistp256-cert-...@openssh.com
ecdsa-sha2-nistp384
ecdsa-sha2-nistp384-cert-...@openssh.com
ecdsa-sha2-nistp521
ecdsa-sha2-nistp521-cert-...@openssh.com
sk-ecdsa-sha2-nistp...@openssh.com
sk-ecdsa-sha2-nistp256-cert-...@openssh.com
webauthn-sk-ecdsa-sha2-nistp...@openssh.com
ssh-dss
ssh-dss-cert-...@openssh.com
ssh-rsa
ssh-rsa-cert-...@openssh.com
rsa-sha2-256
rsa-sha2-256-cert-...@openssh.com
rsa-sha2-512
rsa-sha2-512-cert-...@openssh.com

ssh localhost -Q sig
ssh-ed25519
sk-ssh-ed25...@openssh.com
ecdsa-sha2-nistp256
ecdsa-sha2-nistp384
ecdsa-sha2-nistp521
sk-ecdsa-sha2-nistp...@openssh.com
webauthn-sk-ecdsa-sha2-nistp...@openssh.com
ssh-dss
ssh-rsa
rsa-sha2-256
rsa-sha2-512


daar zie ik toch ssh-dss en ssh-rsa staan.

Maar ... niet de "oude"?

Wie heeft een tip


Dank

G




Orphaned Inode Problem

2024-02-19 Thread Stephen P. Molnar

I am running up to date Bookworm on my Debian platform:

Processor   AMD FX(tm)-8320 Eight-Core Processor
Memory  8026MB (5267MB used)
Machine TypeDesktop
Operating SystemDebian GNU/Linux 12 (bookworm)

I have been plagued with orphaned inodes. Last night the problem cane to 
a head. When I reboot the computer, after an orphaned inode incident 
created stop, it got as far as the user login. After the return I got 
the Windows infamous blue screen. Restarting produced the same problem.


Fortunately, I have another SSD used to test Bookworm, before updating 
on the SSD that is having the problem. I can access the problem drive 
and am in the process of backing up files.


I ran sudo e2fsck -f/dev/sdc1 and got:

Script started on 2024-02-19 08:15:52-05:00 [TERM="xterm-256color" 
TTY="/dev/pts/0" COLUMNS="100" LINES="24"]
[?2004h(base) ]0;comp@AbNormal: 
~comp@AbNormal:~$ sudo e2fsck -f 
/dev/sdc1lcaomosudo e2fsck -f /dev/sdc1

[?2004l
[sudo] password for comp:
e2fsck 1.47.0 (5-Feb-2023)
Pass 1: Checking inodes, blocks, and sizes
Pass 2: Checking directory structure
Pass 3: Checking directory connectivity
/lost+found not found.  Create? yes
Pass 4: Checking reference counts
Pass 5: Checking group summary information

/dev/sdc1: * FILE SYSTEM WAS MODIFIED *
/dev/sdc1: 7982363/121577472 files (0.3% non-contiguous), 
421959365/486307328 blocks
[?2004h(base) ]0;comp@AbNormal: 
~comp@AbNormal:~$ [?2004l


Comments and suggestions will be appreciated.

Thanks in advance.

--
Stephen P. Molnar, Ph.D.
https://insilicochemistry.net
(614)312-7528 (c)
Skype:  smolnar1



Re: Erreur nvidia suite upgrade noyau 6.1.0-18

2024-02-19 Thread ajh-valmer
On Saturday 17 February 2024 10:49:04 Patrick ZAJDA wrote:
> Le paquet linux-image-6.1.0-18 ne serait-il pas toujours installé ? :
Merci.
Oui, linux-image-6.1.0-18 est bien purgé.

> Quoi qu'il en soit, une mise à jour a été publié dans bookworm-updates 
> (SUA 252-1) pour corriger le problème de compilation lors de la mise à 
> jour vers le kernel 6.1.0-18.
> apt update puis apt upgrade devrait donc pouvoir se passer sans 
> problème, à la limite un apt -f install si ça ne passe vraiment pas.

Je n'ai pas vu qu'une mise à jour a été publiée dans bookworm-updates,
(SUA 252-1) correctif de compilation, mise à jour vers le kernel 6.1.0-18.
Ou s'agit-il d'une opération de mise à jour en cours ?

Hélas, j'ai bien fait tout ça, mais toujours impossible de passer du 
noyau 6.1.0-17 vers 6.1.0-18, ainsi qu'un (dist)(full)-upgrade.

Bonne journée.



Re: how to downgrade nvidia-graphics-drivers packages?

2024-02-19 Thread Dan Ritter
Harald Dunkel wrote: 
> Hi folks,
> 
> Looking at a set of installed binary packages built from the same source
> package, I would like to keep the version numbers consistent. There might
> be exceptions, but in general you won't like to mix unstable and experimental
> binary packages from the nvidia-graphics-drivers, for example.
> 
> Question is, how can I tell apt to avoid mixing version numbers?

If they come from different repositories (i.e. backports,
unstable, experimental) you can set priorities in
/etc/apt/preferences.d/ -- read the man page for
apt_preferences, because it's not intuitive.

Package: *
Pin: release a=bookworm
Pin-Priority: 900

Package: *
Pin: release a=bookworm-backports
Pin-Priority: 50

Or you can set things per-package by name, or a variety of other
mechanisms.

-dsr-



Re: Hard links - How do they work

2024-02-19 Thread Dan Ritter
Keith Bainbridge wrote: 
> As promised:
> I said sometime in this thread that timeshift (and Back in Time) use hard
> links to create progressive copies of the system. The more I think about how
> hard links reportedly work, I reckon it can't be simply hard links.
> 
> So I'm starting a new thread on that topic.
> 
> My understanding is that a hard link (ln with no option) will list the file
> in another directory, but the file remains the same no matter where I may
> edit it.I use cp -lru as a quick and dirty way to protect me against
> accident deleting a file. (Sym-link doesn't give that protection, but does
> allow me to keep my home on a separate partition so that a fresh install is
> a LOT easier; but that is another topic)

A hard link is a name for a file -- it points to the first inode. Most
files only have one name, but they can have many. Hard links can be in
many directories, but must stay on the same filesystem. If you
mv the file by any of its links on the same filesystem, all the
links remain valid. When the last name for a file is deleted,
the file is deleted. Now you know why deleting a file is
sometimes called "unlinking".

A symbolic link is a tiny file that contains a path to a file.
The kernel reads the path, then looks for the substitute file.
This can fail. But -- it can cross filesystems, even filesystems
of completely different types. If you move the symbolic link, it
continues to point to the same path. If you move the referenced
file, the symbolic links are no longer valid.


> Snapshots reportedly hard link the directory/ies (generally means /  but not
> limited ). a new snapshot copies the latest set and then updates any new
> files in the base.The more I try to visualise that process the more I
> reckon there must be more to it

"snapshot" is not a single definition; the software you are using
produces different results.

rsnapshot/rsync, lvm, btrfs and zfs, for example, each use completely
different mechanisms with different semantics.

It looks like timeshift uses either rsync or btrfs snapshots,
and backintime uses rsync, so first you would need to define which of those you 
are using
and in what mode.

-dsr-



how to downgrade nvidia-graphics-drivers packages?

2024-02-19 Thread Harald Dunkel

Hi folks,

Looking at a set of installed binary packages built from the same source
package, I would like to keep the version numbers consistent. There might
be exceptions, but in general you won't like to mix unstable and experimental
binary packages from the nvidia-graphics-drivers, for example.

Question is, how can I tell apt to avoid mixing version numbers?

Regards
Harri



Re: partition reporting full, but not

2024-02-19 Thread debian-user
David Christensen  wrote:
> On 2/18/24 19:20, Keith Bainbridge wrote:
> > I am convinced that the missing space is used by btrfs snapshot
> > process.  
> 
> 
> Perhaps.  But, are you re-balancing your btrfs file systems regularly?
> 
> https://manpages.debian.org/bookworm/btrfs-progs/btrfs-balance.8.en.html

But does balancing a btrfs system actually recover any space? I think
not. It's eternally moving the deckchairs on the Titanic. (though with
a more useful purpose)

I'd recommend installing snapper if you haven't already.
https://wiki.archlinux.org/title/Snapper is helpful for using it.

 



Re: partition reporting full, but not

2024-02-19 Thread DdB
Am 19.02.2024 um 04:20 schrieb Keith Bainbridge:
> I am convinced that the missing space is used by btrfs snapshot process.

First off: I am not a btrfs user (and will never be, i might add).
I am using zfs since many years, and - although i read an awful lot of
documentation beforehand, and played around with it quite a bit, i had
to learn a couple of lessons "the hard way".

To me, what i am inferring from your mails, are a couple of conceptual
misundestandings of what a COW-filesystem is, and how to best make use
of it. Especially the time-machine using snapshots and hardlinks seems
very kinky to me.

I am using zfs somewhat in a similar way, but it took me some years to
set it up in a good way. Apart from a warning and the usual RTFM, i do
not have much to offer. Except maybe for this: Snapshots hold space,
they are not like hardlinks. (although one can snapshot hardlinks ;-) )

Once, some older filesystem state is snapshotted, its space is taken
until the snapshot gets destroyed/removed. This can lead to situations,
where a device is full, but in order to free some space, deleting files
will NOT help, because in order to do so, a change in the directory
needs to be made, but there may not be the room to create a copy of it
in the first place.
And deleting files from a snapshot is not feasable (at least not in zfs).

To my eyes, your handling of the system looks somewhat risky and not
well planned. You may go on this way, as long as you consider the whole
thing as being part of a longish learning session. But do not trust
important data being safe this way!

just my 2 cents



Re: Timer doing apt update

2024-02-19 Thread Anssi Saari
Erwan David  writes:

> Hello,
>
> After each boot, the equivalent of apt update is automatically done in
> background, through policykit (apt database is locked by
> policykitd). So I think there is a timer triggroing this. I'd like to
> disable this when my laptop is on expensive link (eg 4G link, or
> abroad). So I'd like to disable this timer, but I did not find it. If
> someone knws better than me...

If you're using the package unattended-upgrades (I'm not sure it ties to
policykitd), then there are instructions in the Debian wiki at
https://wiki.debian.org/UnattendedUpgrades#Modifying_download_and_upgrade_schedules_.28on_systemd.29

The timers in question are apt-daily.timer and apt-daily-upgrade.timer.

Come to think of it, just running apt update shouldn't generate much
traffic.