Re: How do I permanently disable unattended downloads of software/security updates?

2021-05-25 Thread Stella Ashburne
I had already done that long before I posted my original question in this 
mailing list.


> Sent: Wednesday, May 26, 2021 at 9:50 AM
> From: "Jeremy Ardley" 
> To: debian-user@lists.debian.org
> Subject: Re: How do I permanently disable unattended downloads of 
> software/security updates?
>
>
> On 26/5/21 9:38 am, Stella Ashburne wrote:
> > Thanks for your reply, Keith.
> >
> > I'm sorry if my original question is ambiguous.
> >
> > Here's what I wish to happen:
> >
> > 1. My OS stops downloading software and security updates silently in the 
> > background. It's called automatic downloads, am I right? I wish it to stop.
> > 2. Debian stops giving me notifications that there are software updates
> available for download.
> >
> > I have removed/deleted 50unattended-upgrades. It's obvious that such an
> action hasn't achieved its goals; hence my original post.
> >
> >
> In my system using the GUI I have System/Control Centre If I open that I
> see 'Software and Updates'
>
> On the updates tab I have none of the option boxes ticked.
>
> The system pops up warnings on the GUI but no automatic download and
> install
>
> --
> Jeremy
>
>



Re: How do I permanently disable unattended downloads of software/security updates?

2021-05-25 Thread Stella Ashburne
Thanks for your reply, Keith.

I'm sorry if my original question is ambiguous.

Here's what I wish to happen:

1. My OS stops downloading software and security updates silently in the 
background. It's called automatic downloads, am I right? I wish it to stop.
2. Debian stops giving me notifications that there are software updates 
available for download.

I have removed/deleted 50unattended-upgrades. It's obvious that such an action 
hasn't achieved its goals; hence my original post.



> Sent: Wednesday, May 26, 2021 at 7:24 AM
> From: "Keith Bainbridge" 
> To: "Stella Ashburne" 
> Cc: "Kenneth Parker" , "Debian Users" 
> 
> Subject: Re: How do I permanently disable unattended downloads of 
> software/security updates?
>
>
> On Tue, 25 May 2021 22:48:06 +0200  Stella Ashburne 
> wrote:
>
> >>And yes, I manually perform "sudo apt update" and "sudo apt upgrade"
> >>about twice a day.
>
>
>
> Good Morning Stella
>
> If you are upgrading this often, why not get the bulk of the packages
> downloaded ready to install?   I do that much via cron.
>
> Or did the original question imply that the background operation is
> also installing the new packages? That I would want stopped, and is
> probably why I have not investigated auto upgrades.
>
> Maybe I'm missing something else.
>
>
>
> All the best
>
> Keith Bainbridge
>
> keith.bainbridge.3...@gmail.com
> 0447 667 468
>
>



Re: How do I permanently disable unattended downloads of software/security updates?

2021-05-28 Thread Stella Ashburne
Hello,

Thanks for your help and time. I really appreciate it.

> Sent: Friday, May 28, 2021 at 8:06 PM
> From: "Greg Wooledge" 
> To: debian-user@lists.debian.org
> Subject: Re: How do I permanently disable unattended downloads of 
> software/security updates?
>
> More likely, it was brought in as a recommendation by some desktop
> environment.  One may use "aptitude why unattended-upgrades" to find
> out why it was installed, or more properly, why it's not being marked
> for autoremoval at the current moment.

I'm very certain that I didn't install it manually. In fact, during 
installation of Debian, I specifically chose the option to not upgrade/update 
software automatically.

The package "unattended-upgrades" might have been installed automatically 
because I installed a minimal Gnome desktop environment (I quite like using 
Gnome.)

Question: Instead of using "aptitude why unattended-upgrades" command, can I 
use "apt why unattended-upgrades"? I was told many years ago that the command 
"aptitude" was deprecated.

> However, if the package is marked as a *dependency* of some desktop
> environment, rather than simply a recommendation, then purging the
> undesired package may also try to remove the desktop environment
> metapackage.  And some people panic when that happens, because they
> don't understand that a metapackage is not critically important.

Question: What command can I type in a terminal to find out if the package 
"unattended-upgrades" is a *dependency* of some other packages?

Yeah, I do panic when any metapackage of my Gnome desktop environment is 
removed. Why? My knowledge of computing and Debian is elementary.

Question: What do you mean by "a metapackage is not critically important"? 
Would you like to elaborate please?

>
> (And then it gets even more complicated when you consider autoremove,
> because removing the placeholder metapackage may free up various other
> pieces of the desktop environment -- ones that actually *do* something --
> to be marked for autoremoval.  And that's not desired.)

Thanks for your explanation.
>
> (Personally I solve all of that by disabling autoremoval.  But that's
> just me, and most people seem to like it.)

I wish to improve my knowledge of computing. How do I disable autoremove? What 
is the command to be typed in a terminal?



Re: How do I permanently disable unattended downloads of software/security updates?

2021-05-28 Thread Stella Ashburne
Hello,

Thanks for your help and time. I really appreciate it.

> Sent: Saturday, May 29, 2021 at 2:51 AM
> From: "Greg Wooledge" 
> To: debian-user@lists.debian.org
> Subject: Re: How do I permanently disable unattended downloads of 
> software/security updates?
>
> > Question: What do you mean by "a metapackage is not critically important"? 
> > Would you like to elaborate please?
>
> Take a look at "apt show gnome", for example.
>
> On bullseye, on my platform, the package "gnome" (which is a metapackage)
> has an Installed-Size of 35.8 kB.  It doesn't contain any software.  All
> it really contains are Depends: and Recommends: and Suggests: lines.  If
> you install this package, it will bring in a whole bunch of new packages
> (unless you already installed GNOME, in which case it may do nothing).
>
> Once all of those packages are installed, you can go ahead and remove
> the package named "gnome".  It doesn't do anything.  It's just a metapackage.

Thank you for explaining why a metapackage is not critically important. I'm a 
bit wiser now :)

> Well... OK, I'll tell you how I did it.  It's easily reversible, so it
> won't hurt you.
>
> I did it by creating the file /etc/apt/apt.conf.d/99local with the
> following content (one line):
>
> APT::NeverAutoRemove ".";
>
> What this configuration file does is define a regular expression that
> matches every package, and then tells apt never to autoremove any package
> that matches that regular expression.
>
> If you want to go back to normal, simply remove that file.

Thank you very much for your example.

Best wishes.



Re: How do I permanently disable unattended downloads of software/security updates?

2021-05-28 Thread Stella Ashburne
Hello,

> Sent: Friday, May 28, 2021 at 7:43 PM
> From: l0f...@tuta.io
> To: "Debian User" 
> Subject: Re: How do I permanently disable unattended downloads of 
> software/security updates?
>
> 
> unattended-upgrades is not installed by default, so you installed that 
> package at some point because you were interested in applying upgrades 
> automatically.

I'm sorry but your understanding is incorrect. I'm sure I've never installed it 
at any point in the course of using Debisn. I remember very clearly that when I 
first installed Debian on my machine, I did specify that I didn't want 
automatic upgrades.

> Now, you are not interested anymore. So you have chosen to delete the 
> configuration file /etc/apt/apt.conf.d/50unattended-upgrades and disabled the 
> systemd service unattended-upgrades.

I've never wanted upgrades/updates to be automatic.

> No I don't have it, it's installed with the optional package 
> "unattended-upgrades".

I'm very certain that I didn't install the package "unattended-upgrades". My 
knowledge of computing and Debian is elementary so much so that I'd never 
install packages that seem weird or alien to me.

> 
> Strictly speaking, /etc/apt/apt.conf.d/50unattended-upgrades is a file, not a 
> package.
> A package is a combination of files provided for your Debian distribution.
> I just wanted to make sure you didn't talk about removing the 
> "unattended-upgrades" package.

Thanks for your explanation.

> 
> By the way, I think you should not have deleted that file. That's somewhat 
> dirty.

I still have that file because I'd moved it to my removable backup drive. 
Should I restore it? What do you think?

> If you want to make a pause with a package, just stop it and disable it (or 
> tweak the configuration file so there is no real action processed).

Just so you know, my knowledge of Debian and computing is basic/elementary 
(meaning, I don't know how to tweak configuration files...).

> 
> If you are sure not to use some optional package, then remove or even purge 
> it.

You suggest that I purge the optional package "unattended-upgrades" What 
happens if that package is a dependency of some other packages? What commands 
can I type to show that the package "unattended=upgrades" is or isn't a 
dependency of some other packages?

Thanks for your help and time. I really appreciate it.

Best regards.



Re: How do I permanently disable unattended downloads of software/security updates?

2021-05-28 Thread Stella Ashburne
Hi

Thanks for your help and time. I really appreciate it.

> Sent: Friday, May 28, 2021 at 8:05 PM
> From: l0f...@tuta.io
> To: "Debian User" 
> Subject: Re: How do I permanently disable unattended downloads of 
> software/security updates?
>
> Correction: I meant if you still have updates/upgrades, then it shouldn't be 
> because of package unattended-upgrades. So you would have to dig somewhere 
> else...

Oh my God, are you telling me that we are not done with this "whatever thing 
you may call it"? I thought I could close this matter..lol

Based on your vast experience of using Linux in general and Debian in 
particular, can you think of any other packages or files that could download 
software and security updates silently in the background?

Best regards.



Re: How do I permanently disable unattended downloads of software/security updates?

2021-06-02 Thread Stella Ashburne
Hi

Thanks for your help and time. I really appreciate it.

> Sent: Wednesday, June 02, 2021 at 7:49 PM
> From: l0f...@tuta.io
> To: "Debian User" 
> Subject: Re: How do I permanently disable unattended downloads of 
> software/security updates?
>
> What about the following commands?
>
> cat /etc/anacrontab
> systemctl list-timers
>
Output of cat /etc/anacrontab

# /etc/anacrontab: configuration file for anacron

# See anacron(8) and anacrontab(5) for details.

SHELL=/bin/sh
PATH=/usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin
HOME=/root
LOGNAME=root

# These replace cron's entries
1   5   cron.daily  run-parts --report /etc/cron.daily
7   10  cron.weekly run-parts --report /etc/cron.weekly
@monthly15  cron.monthlyrun-parts --report /etc/cron.monthly


Output of systemctl list-timers


NEXT LEFT  LAST PASSED
Wed 2021-06-02 16:24:55 GMT  4min 34s left n/a  n/a
Thu 2021-06-03 00:00:00 GMT  7h left   Wed 2021-06-02 16:10:36 GMT  9min ago
Thu 2021-06-03 00:00:00 GMT  7h left   Wed 2021-06-02 16:10:36 GMT  9min ago
Thu 2021-06-03 00:39:22 GMT  8h left   Wed 2021-06-02 16:10:36 GMT  9min ago
Thu 2021-06-03 06:40:44 GMT  14h left  Wed 2021-06-02 07:43:04 GMT  8h ago
Thu 2021-06-03 07:30:43 GMT  15h left  Thu 2021-06-03 00:10:06 GMT  7h left

6 timers listed.
Pass --all to see loaded but inactive timers, too.



Re: How do I permanently disable unattended downloads of software/security updates?

2021-06-02 Thread Stella Ashburne
Hi

Thanks for your help and time. I really appreciate it.

> Sent: Wednesday, June 02, 2021 at 3:01 PM
> From: l0f...@tuta.io
> To: "Debian User" 
> Subject: Re: How do I permanently disable unattended downloads of 
> software/security updates?
>
> NB: You do not need `sudo` here.
>
Noted.

> Can you provide us with the output of the following commands?
>
Output of crontab -l

No crontab for username


Output of sudo crontab -l

No crontab for root


Output of cat /etc/crontab

# /etc/crontab: system-wide crontab
# Unlike any other crontab you don't have to run the `crontab'
# command to install the new version when you edit this file
# and files in /etc/cron.d. These files also have username fields,
# that none of the other crontabs do.

SHELL=/bin/sh
PATH=/usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin

# Example of job definition:
# . minute (0 - 59)
# |  .- hour (0 - 23)
# |  |  .-- day of month (1 - 31)
# |  |  |  .--- month (1 - 12) OR jan,feb,mar,apr ...
# |  |  |  |  . day of week (0 - 6) (Sunday=0 or 7) OR 
sun,mon,tue,wed,thu,fri,sat
# |  |  |  |  |
# *  *  *  *  * user-name command to be executed
17 ** * *   rootcd / && run-parts --report /etc/cron.hourly
25 6* * *   roottest -x /usr/sbin/anacron || ( cd / && run-parts 
--report /etc/cron.daily )
47 6* * 7   roottest -x /usr/sbin/anacron || ( cd / && run-parts 
--report /etc/cron.weekly )
52 61 * *   roottest -x /usr/sbin/anacron || ( cd / && run-parts 
--report /etc/cron.monthly )
#


Output of ls -l /etc/cron.*

/etc/cron.d:
total 4
-rw-r--r-- 1 root root 285 May 19  2019 anacron

/etc/cron.daily:
total 32
-rwxr-xr-x 1 root root  311 May 19  2019 0anacron
-rwxr-xr-x 1 root root 1478 May 12  2020 apt-compat
-rwxr-xr-x 1 root root  355 Dec 29  2017 bsdmainutils
-rwxr-xr-x 1 root root  384 Dec 31  2018 cracklib-runtime
-rwxr-xr-x 1 root root 1187 Apr 19  2019 dpkg
-rwxr-xr-x 1 root root  377 Aug 28  2018 logrotate
-rwxr-xr-x 1 root root 1123 Feb 10  2019 man-db
-rwxr-xr-x 1 root root  249 Sep 27  2017 passwd

/etc/cron.hourly:
total 0

/etc/cron.monthly:
total 4
-rwxr-xr-x 1 root root 313 May 19  2019 0anacron

/etc/cron.weekly:
total 8
-rwxr-xr-x 1 root root 312 May 19  2019 0anacron
-rwxr-xr-x 1 root root 813 Feb 10  2019 man-db


Output of dpkg -l | grep -i apt

ii  apt   1.8.2.3   
  amd64commandline package manager
ii  apt-config-icons  0.12.5-1  
  all  APT configuration snippet to enable icon downloads
ii  apt-listchanges   3.19  
  all  package change history notification tool
ii  apt-utils 1.8.2.3   
  amd64package management related utility programs
ii  laptop-detect 0.16  
  all  system chassis type checker
ii  libapt-inst2.0:amd64  1.8.2.3   
  amd64deb package format runtime library
ii  libapt-pkg5.0:amd64   1.8.2.3   
  amd64package management runtime library
ii  libatk-adaptor:amd64  2.30.0-5  
  amd64AT-SPI 2 toolkit bridge
ii  libmjpegutils-2.1-0   1:2.1.0+debian-5  
  amd64MJPEG capture/editing/replay and MPEG encoding toolset (library)
ii  libmpeg2encpp-2.1-0   1:2.1.0+debian-5  
  amd64MJPEG capture/editing/replay and MPEG encoding toolset (library)
ii  libmplex2-2.1-0   1:2.1.0+debian-5  
  amd64MJPEG capture/editing/replay and MPEG encoding toolset (library)
ii  libopencore-amrnb0:amd64  0.1.3-2.1+b2  
  amd64Adaptive Multi Rate speech codec - shared library
ii  libopencore-amrwb0:amd64  0.1.3-2.1+b2  
  amd64Adaptive Multi-Rate - Wideband speech codec - shared library
ii  libpcap0.8:amd64  1.8.1-6   
  amd64system interface for user-level packet capture
ii  python-apt-common 1.8.4.3   
  all  Python interface to libapt-pkg (locales)
ii  python3-apt   1.8.4.3   
  amd64Python 3 interface to libapt-pkg
ii  synaptic  0.84.6
  amd64Graphical package manager
ii  task-laptop   3.53  
  all  laptop



Re: How do I permanently disable unattended downloads of software/security updates?

2021-05-29 Thread Stella Ashburne
Hello Andrei

Thank you for your advice and time. I really appreciate it.

> Sent: Saturday, May 29, 2021 at 2:49 PM
> From: "Andrei POPESCU" 
> To: debian-user@lists.debian.org
> Subject: Re: How do I permanently disable unattended downloads of 
> software/security updates?
>
> Removing files belonging to a package is typically frowned upon, as this
> can under specific circumstances be like pulling the rug from underneath
> a package (or worse, APT/dpkg).

Oops. I removed/deleted the file 50unattended-upgrades located in 
/etc/apt/apt.conf.d/
>
> In the case of configuration files (basically everything that is under
> /etc and a few other places) it can cause unexpected or even unsafe
> behaviour as the software might revert to built-in defaults that could
> be wrong for your system.

I suppose 50unattended-upgrades is a configuration file?

Best regards.



Re: How do I permanently disable unattended downloads of software/security updates?

2021-05-30 Thread Stella Ashburne
Hi Greg,

> Sent: Saturday, May 29, 2021 at 8:58 PM
> From: "Greg Wooledge" 
> To: debian-user@lists.debian.org
> Subject: Re: How do I permanently disable unattended downloads of 
> software/security updates?
>
> tasksel will also perform an autoremove for you without asking you.
> It was after this happened to me that I investigated how to disable
> apt's autoremove feature.
>

Thanks for your observation about tasksel and autoremove.

About the only time that I encountered tasksel was during the installation of 
Debian.

Since you mentioned tasksel in your reply, how do you invoke tasksel? Do you 
just type tasksel in a terminal?



Re: How do I permanently disable unattended downloads of software/security updates?

2021-05-30 Thread Stella Ashburne
Hi Andrei

> Sent: Saturday, May 29, 2021 at 3:06 PM
> From: "Andrei POPESCU" 
> To: debian-user@lists.debian.org
> Subject: Re: How do I permanently disable unattended downloads of 
> software/security updates?
>
> aptitude was deprecated for some very specific uses only (in particular
> dist-upgrades), not because it couldn't do them, but because APT found
> better solutions. It also didn't help that development of aptitude was
> stopped for a while.

Yeah, I remember somewhat clearly that someone in www.reddit.com/r/debian 
advised me to use "sudo apt upgrade" instead of aptitude because with the 
former, I can see the green-colored progress bar during the installation of 
packages.

>
> In this particular case, apt doesn't have a 'why' command, hence the
> suggestion to use aptitude instead.
>

Thanks for your advice and time. I really appreciate it.

Best regards.




Re: How do I permanently disable unattended downloads of software/security updates?

2021-05-30 Thread Stella Ashburne
Hi

> Sent: Sunday, May 30, 2021 at 7:00 PM
> From: to...@tuxteam.de
> To: "Stella Ashburne" 
> Cc: "Greg Wooledge" , debian-user@lists.debian.org
> Subject: Re: How do I permanently disable unattended downloads of 
> software/security updates?
>
> Not Greg here, but... yes, you can do that. And there's even a man
> page :)

Thanks for your reply.

Best wishes.



Re: How do I permanently disable unattended downloads of software/security updates?

2021-05-30 Thread Stella Ashburne
Hi

Thanks for your help and time. I really appreciate it.

> Sent: Saturday, May 29, 2021 at 5:29 PM
> From: l0f...@tuta.io
> To: "Debian User" 
> Subject: Re: How do I permanently disable unattended downloads of 
> software/security updates?
>
> NB: You can still filter `apt-cache rdepends` results with some other 
> switches like `--no-pre-depends`,  `--no-recommends`,  `--no-suggests`,  
> `--no-conflicts`,  `--no-breaks`, `--no-replaces` and `--no-enhances`.

Thanks for the above tip.

Can I do something like the following using your above filters?

sudo apt rdepends  --no-recommends
sudo apt rdepends  --no-suggests


> 
> As said Socrates: "I know that I do not know.". It happens everyday for me ;p
>

I think you're being modest. You know so much more than me.

> Back to your question, here are other suggestions I can think about:
> * cron-apt
> * apticron (its goal is only to send notifications by emails but it certainly 
> triggers `apt update` to do that. So maybe this update triggers some other 
> things from your side as well, like widgets...)
> * widgets/applets for your favorite desktop environment (I can't help you, I 
> don't use any...)

My knowledge of computing, Linux and Debian is elementary and hence I won't 
know how to set up a cron-apt or use apticron.

Question: Is it a prerequisite (pre-condition) that to set up a cron job to 
download updates at a fixed time every day, the OS must have the installed 
package "unattended-upgrades"?

> 
> NB: If not explicitely mentioned by a debian-user poster, most of the time 
> (s)he is a subscriber of this mailing-list. At least I am, so you can omit my 
> email address in each of your answers (I'm currently receiving all your 
> emails twice) ;)
>

I apologize if I have caused inconvenience to you and shall remember to remove 
your email address when I reply to yours.

Best regards.



Re: How do I permanently disable unattended downloads of software/security updates?

2021-05-27 Thread Stella Ashburne
Hi

> Sent: Friday, May 28, 2021 at 4:09 AM
> From: l0f...@tuta.io
> To: "Debian User" 
> Subject: Re: How do I permanently disable unattended downloads of 
> software/security updates?
>
> What you call "package" is actually a simple file right?

Yes, it is a file that contains a lot of programming code or what you would 
call scripting language. The default path is /etc/apt/apt.conf.d/. I guess 
every one who installs Debian 10.9 should have it too, yourself included.

> But the service is still currently running right?

I don't know how to answer your question because my knowledge of computing and 
Linux is basic/elementary.

> systemctl status unattended-upgrades

Below is the result:

unattended-upgrades.service - Unattended Upgrades Shutdown
   Loaded: loaded (/lib/systemd/system/unattended-upgrades.service; disabled; ve
   Active: inactive (dead)
 Docs: man:unattended-upgrade(8)


> Can you provide us with the following command results?
> 
> cat /etc/apt/apt.conf.d/10periodic

Below is the result of cat /etc/apt/apt.conf.d/10periodic

APT::Periodic::Download-Upgradeable-Packages "0";
APT::Periodic::Unattended-Upgrade "0";


> cat /etc/apt/apt.conf.d/00aptitude

Below is the result of cat /etc/apt/apt.conf.d/00aptitude

Aptitude::Get-Root-Command "sudo:/usr/bin/sudo";


> You confirm that you never ran something like the following?
> 
> sudo apt remove unattended-upgrades
> sudo apt purge unattended-upgrades

Yes, I confirm that I have never issued the following one of two commands, viz.:

sudo apt remove unattended-upgrades
sudo apt purge unattended-upgrades

The reason is that I find it too drastic a step. I chose to disable by doing 
sudo systemctl disable unattended-upgrades. I did delete the package called 
50unattended-upgrades (as mentioned in my original post.)


> What give you the next commands please?
> 
> apt-config dump | grep -i unatt

Below is the result of apt-config dump | grep -i unatt

APT::Periodic::Unattended-Upgrade "0";

> apt-config dump | grep -i APT::Periodic

Below is the result of apt-config dump | grep -i APT::Periodic

APT::Periodic "";
APT::Periodic::Download-Upgradeable-Packages "0";
APT::Periodic::Unattended-Upgrade "0";


> NB: Have you rebooted and observed the same behavior since your posts?

After rebooting, I have no opportunity to observe the same behavior since my 
posts because there are no software/security updates that are relevant to my 
Debian system at the time of writing this email. Based on my past experience, 
Debian only downloads software/security updates for my kernel and the installed 
packages. The installed packages on my system are minimal. I'll have to wait 
patiently for the next software/security updates for my installed packages.

Thank you for your time and help. I really appreciate it.

Best regards.



Re: How do I permanently disable unattended downloads of software/security updates?

2021-06-02 Thread Stella Ashburne
Hi Reco

Thanks for your help and time. I really appreciate it.

> Sent: Thursday, June 03, 2021 at 12:33 AM
> From: "Reco" 
> To: debian-user@lists.debian.org
> Subject: Re: How do I permanently disable unattended downloads of 
> software/security updates?
>
> The most important parts of "systemctl list-timers" (your problem
> considered) are UNIT and ACTIVATES columns, and your result lacks them
> for some reason.
>
What does "your result lacks them for some reason" mean? Could you elaborate it 
please?

Stella



Re: How do I permanently disable unattended downloads of software/security updates?

2021-06-02 Thread Stella Ashburne
Hi Tom

Thanks for your help and time. I really appreciate it.
 
 
Sent: Thursday, June 03, 2021 at 3:53 AM
From: "Tom Browder" 
To: "Stella Ashburne" 
Cc: debian-user@lists.debian.org
Subject: Re: How do I permanently disable unattended downloads of 
software/security updates?

 
How did you get the installation originally? Was it from a fresh install of 
Buster or an upgrade from 9 or older version?
 
-Tom

It was a fresh installation. I never do upgrades from Debian Stretch (a.k.a. 
version 9) and always choose Expert Install (without GUI).

On a different topic, I noticed that you composed your email with HTML 
formatting. I didn't know it is allowed by Debian User Mailing List. I remember 
a few years ago, if one were to send an email to said mailing list, the former 
would never be published. At that time, all emails must be in plain text 
format. When did said mailing list accept emails that are HTML formatted?



Re: [Openvpn-users] surf the internet through openvpn

2021-06-05 Thread Stella Ashburne
Hi guys,

This mailing list is for discussions concerning Debian.

For discussions on specific topics such as openvpn, please post your questions 
on https://forums.openvpn.net/ or https://www.reddit.com/r/OpenVPN/
 


Sent: Saturday, June 05, 2021 at 7:04 AM
From: "Bonno Bloksma" 
To: "debian-user list" 
Cc: "Fermin Francisco" 
Subject: Re: [Openvpn-users] surf the internet through openvpn

Please keep the discussion on the list.
And sorry for top posting, this client refuses todo otherwise :-(
 
Make sure traffic coming from the openvpn client can indeed access the 
internet, test with ping.  If that does not work solve that problem first. Look 
at routing and NAT on your openvpn server.
 
Once that works try what happens with a browser, go to whatismyip.com or a 
similar website. The client ip the website sees should the ip of your openvpn 
server.
If ping works but http(s) does not you probably have a firewall issue.
 
If that works then SMTP should work as well as long as the receiving server has 
no problem with the discrepency in the ip number, hostname and PTR record.
 

Bonno Bloksma (mobile)
 
 Op 4 jun. 2021 om 22:01 heeft Fermin Francisco  het volgende 
geschreven:
 


Hi!
My problems are two:
 
After I putted the push "redirect-gateway local def1" in server conf file.
 
1. OpenVPN Linux's clients can't surf into the internet (Windows clients can 
surf into the internet), but can connect to remote software.
2. SMTP cannot worked (Thunderbird).
 
 
Sorry, my english is not good.
 
 
José Fermín Francisco Ferreras Registered User #579535 (LinuxCounter.net)
 
 

El viernes, 4 de junio de 2021 02:05:40 a. m. AST, Bonno Bloksma 
 escribió:
 
 

Hello

> How can I make openvpn clients (Linux clients) surf the internet through 
> openvpn using the public ip of the openvpn server

The client config should contain the line
redirect-gateway local def1

This will let OpenVpn add some lines to you routing table that make sure that:
- your client can still reach the OpenVPN server via the normal internet 
connection.
- All other traffic will leave the client via the openVPN tunnel.

Make sure the routing on your openVPN server and your firewall are set up 
correctly.

>(the openvpn server is on Windows)? And also that emails using Thunderbird can 
>work with this method (that emails can enter and leave without problems).
This is just routing via another node, it has no influence on the protocol as 
the client still initiates all traffic sessions.

Ps. If you want you can push the line from the servers if you want to have it 
configures on all clients.

Bonno Bloksma
 



Re: How do I permanently disable unattended downloads of software/security updates?

2021-06-04 Thread Stella Ashburne
Hi Thomas

Thank you for your help and time. I really appreciate it.

> Sent: Friday, June 04, 2021 at 10:23 AM
> From: "Thomas D. Dean" 
> To: debian-user@lists.debian.org
> Subject: Re: How do I permanently disable unattended downloads of 
> software/security updates?
>
> I have the same problem.

OK, but do you use Ubuntu or Debian or both?
>
> I saw this in: https://askubuntu.com/questions/1038923
>
> sudo systemctl disable apt-daily.service
> sudo systemctl disable apt-daily.timer
>
> sudo systemctl disable apt-daily-upgrade.timer
> sudo systemctl disable apt-daily-upgrade.service
>
A poster named l0f...@tuta.io replied to me via this mailing list yesterday and 
below is what he wrote (verbatim):

"Cannot remember if you have Gnome installed but you should have a look at 
https://unix.stackexchange.com/a/594287, especially ALL the associated comments 
(click on "Show 7 more comments")."

When I did a *fresh* minimal install of Debian about two years ago, I didn't 
install the whole Gnome DE. Instead, I installed the following packages: xorg 
gnome-core gnome-tweak-tool synaptic file-roller gedit

A few days ago, after reading replies from some posters, I purged the package 
called unattended-upgrades. I don't know how and when it was installed in the 
first place. You see, about two years I chose the option Expert Install 
(without GUI) and during the installation process, I chose the option to not 
install updates automatically.

After reading what was written in the page 
(https://unix.stackexchange.com/a/594287), I disabled the package called 
PackageKit today. Only time will tell if said step works.

By the way, does Ubuntu use the full or stripped-down version of Gnome Desktop 
Environment?

*fresh* = not upgraded from Debian Stretch



Re: Unexplained freezes and crashes, nothing in /var/log/messages

2021-06-04 Thread Stella Ashburne
Hi David

> Sent: Friday, June 04, 2021 at 10:27 AM
> From: "David Wright" 
> To: debian-user@lists.debian.org
> Subject: Re: Unexplained freezes and crashes, nothing in /var/log/messages
>
> It's just a home-grown program that's started from .xsession.
> It sets the X background colour in a loop, with excessive
> temperatures taking priority over power indications.
>
Is your program proprietary? If it isn't, would you like to share it with me?



Re: How do I permanently disable unattended downloads of software/security updates?

2021-06-04 Thread Stella Ashburne
Hi Thomas

> Sent: Friday, June 04, 2021 at 6:02 PM
> From: "Thomas D. Dean" 
> To: debian-user@lists.debian.org
> Subject: Re: How do I permanently disable unattended downloads of 
> software/security updates?
>
> I use Ubuntu.  I removed the ubuntu desktop and installed vanilla gnome.
> Google:
> 'Converting Ubuntu 20.04 LTS to Vanilla Gnome3'

According to the website "The 8 Best Ubuntu Desktop Environments (20.04 Focal 
Fossa Linux)" 
[https://linuxconfig.org/the-8-best-ubuntu-desktop-environments-20-04-focal-fossa-linux],
 Ubuntu 20.04 LTS comes with the default Gnome 3.36 desktop.
>
> After I disabled timers, I rebooted.  apt-update && apt-upgrade.  After
> that I had one popup  that said I had upgrades pending.  The apt timer
> was set to expire in 3 hours...

See...you'd an automatic download of updates.



Re: How do I permanently disable unattended downloads of software/security updates?

2021-06-03 Thread Stella Ashburne
Hi,

Thanks for your help and effort. I really appreciate it.

> Sent: Thursday, June 03, 2021 at 4:02 AM
> From: l0f...@tuta.io
> To: "Debian User" 
> Subject: Re: How do I permanently disable unattended downloads of 
> software/security updates?
>
> Cannot remember if you have Gnome installed but you should have a look at 
> https://unix.stackexchange.com/a/594287, especially ALL the associated 
> comments (click on "Show 7 more comments").

After I have done a fresh minimal install of Debian, I installed the following 
packages:

xorg gnome-core gnome-tweak-tool synaptic gedit gdebi file-roller

As you can see from the above, I did not install the full Gnome desktop 
environment.

The link that you gave me leads to the post in which the description of the 
problem is similar to my issue. It contains helpful information and I have 
taken action based on what the contributors had written. I have disabled 
PackageKit. I have not purged gnome-software as advised by the contributor in 
said post. Why? I am afraid that purging gnome-software may cause my operating 
system to become unusable.

I shall keep you informed if after disabling PackageKit, automatic downloads of 
software/security updates still take place.



Re: How do I permanently disable unattended downloads of software/security updates?

2021-06-03 Thread Stella Ashburne
Hi

Thanks for your help and time. I really appreciate it.

> Sent: Thursday, June 03, 2021 at 3:03 AM
> From: "Linux-Fan" 
> To: debian-user@lists.debian.org
> Subject: Re: How do I permanently disable unattended downloads of 
> software/security updates?
>

> > Anyway, I suspect that the OP might find some useful information from
> > this command:
> >
> > systemctl list-timers | grep apt

Below is the output of systemctl list-timers | grep apt

Thu 2021-06-03 20:29:30 GMT  9h leftThu 2021-06-03 09:18:00 GMT  1h 17min 
ago apt-daily.timer  apt-daily.service
Fri 2021-06-04 06:51:16 GMT  20h left   Thu 2021-06-03 09:18:00 GMT  1h 17min 
ago apt-daily-upgrade.timer  apt-daily-upgrade.service

>
> I am leaning towards the "DE explanation" -- that the upgrades are not
> caused by APT's own mechanisms but rather triggered by some DE through
> opaque means not visible in cron or systemd timers. I am not sure how I
> would go about identifying the cause there, except for checking the GUI
> configuration that all related options are turned off?
>
One of the posters provided me a link to the post in Unix StackExchange: 
https://unix.stackexchange.com/a/594287 and I have followed the instructions to 
disable PackageKit.

By the way, when I did a fresh minimal install of Debian Buster without 
installing the full Gnome DE about two years ago, I also installed the 
following packages: xorg gnome-core gnome-tweak-tool synaptic gedit gdebi 
file-roller



How do I permanently disable unattended downloads of software/security updates?

2021-05-25 Thread Stella Ashburne
My OS is Debian 10.9 and has the kernel version:

Linux localhost 5.10.0-0.bpo.5-amd64 #1 SMP Debian 5.10.24-1~bpo10+1 
(2021-03-29) x86_64 GNU/Linux

1. I have already configured the OS not to download software updates 
automatically by using the widget "Software & Updates". Click the URL below to 
see a screenshot of the Software Updates:

https://ibb.co/bs7pF9q

2. I deleted the file 50unattended-upgrades located in /etc/apt/apt.conf.d/

In spite of the above two actions, Debian 10.9 still downloads software and 
security updates for me automatically in the background. Could someone help me 
with a fix that really works?

Thanks.

Marcello



Re: How do I permanently disable unattended downloads of software/security updates?

2021-05-27 Thread Stella Ashburne
> Sent: Wednesday, May 26, 2021 at 8:23 PM
> From: l0f...@tuta.io
> To: "Debian User" 
> Subject: Re: How do I permanently disable unattended downloads of 
> software/security updates?
>
> Hi,
>
> Can you type the following commands in a terminal and give us the results 
> please (use `sudo` if necessary)?
>
> ls -al /etc/apt/apt.conf.d/
> dpkg -l | grep -i unattended-upgrades
> cat /lib/systemd/system/apt-daily.timer
> cat /etc/systemd/system/apt-daily.timer.d/override.conf
>
> Best regards,
> l0f4r0

Hi

Thanks for your reply and offer of help.

Before I provide you the answers, please note that I had removed/deleted the 
package called 50unattended-upgrades in /etc/apt/apt.conf.d/ before my original 
post in this mailing list.

Secondly, according to a reply that I received prior to your response, I issued 
the command

sudo systemctl diaable unattended-upgrades

Please find below the results of what you had asked me to do:

ls -al /etc/apt/apt.conf.d/

total 56
drwxr-xr-x 2 root root 4096 Apr 23 04:45 .
drwxr-xr-x 7 root root 4096 Apr 23 04:45 ..
-rw-r--r-- 1 root root   49 Sep  8  2020 00aptitude
-rw-r--r-- 1 root root   82 Sep  8  2020 00CDMountPoint
-rw-r--r-- 1 root root   40 Sep  8  2020 00trustcdrom
-rw-r--r-- 1 root root 1018 May 12  2020 01autoremove
-r--r--r-- 1 root root 3636 Apr 17 15:17 01autoremove-kernels
-rw-r--r-- 1 root root   89 Apr 10 07:12 10periodic
-rw-r--r-- 1 root root  202 Mar 17  2019 20listchanges
-rw-r--r-- 1 root root 1040 Mar  2  2019 20packagekit
-rw-r--r-- 1 root root 2592 Jan 26  2019 50appstream
-rw-r--r-- 1 root root  435 Jan 26  2019 60icons
-rw-r--r-- 1 root root  182 Feb 26  2019 70debconf
-rw-r--r-- 1 root root   32 Apr 17 15:17 99synaptic



dpkg -l | grep -i unattended-upgrades

ii  unattended-upgrades  1.11.2   all  automatic installation of security 
upgrades



cat /lib/systemd/system/apt-daily.timer

[Unit]
Description=Daily apt download activities

[Timer]
OnCalendar=*-*-* 6,18:00
RandomizedDelaySec=12h
Persistent=true

[Install]
WantedBy=timers.target



cat /etc/systemd/system/apt-daily.timer.d/override.conf

cat: /etc/systemd/system/apt-daily.timer.d/override.conf: No such file or 
directory



Re: How do I permanently disable unattended downloads of software/security updates?

2021-05-25 Thread Stella Ashburne
Thanks Kenneth for your reply.

Your suggestion that I "apt-get purge unattended-upgrades" is intended to be a 
one-off operation or must I perform it each time I log into my OS?
 
And yes, I manually perform "sudo apt update" and "sudo apt upgrade" about 
twice a day.

Marcello
 
 

Sent: Wednesday, May 26, 2021 at 3:05 AM
From: "Kenneth Parker" 
To: "Debian Users" 
Subject: Re: How do I permanently disable unattended downloads of 
software/security updates?

 

On Tue, May 25, 2021, 1:25 PM Stella Ashburne 
mailto:rewe...@gmx.com]> wrote:My OS is Debian 10.9 and has 
the kernel version:

Linux localhost 5.10.0-0.bpo.5-amd64 #1 SMP Debian 5.10.24-1~bpo10+1 
(2021-03-29) x86_64 GNU/Linux

1. I have already configured the OS not to download software updates 
automatically by using the widget "Software & Updates". Click the URL below to 
see a screenshot of the Software Updates:

https://ibb.co/bs7pF9q[https://ibb.co/bs7pF9q]

2. I deleted the file 50unattended-upgrades located in /etc/apt/apt.conf.d/

In spite of the above two actions, Debian 10.9 still downloads software and 
security updates for me automatically in the background. Could someone help me 
with a fix that really works?
 

 
One step I have taken is "apt-get purge unattended-upgrades". 
 
That said, I regularly update and upgrade my systems. 

Thanks.

Marcello
 
Good luck! 
 
Kenneth Parker 

 



Re: How do I permanently disable unattended downloads of software/security updates?

2021-05-25 Thread Stella Ashburne
Thanks for your reply.

No, I haven't tried clearing the apt cache and shall let you know if my OS 
downloads software/security updates in the background.

By the way, is there a method to suppression notification of new software 
and/or security updates? (I assume that if I can receive notifications of 
software/security updates, it means that my OS is communicating with Debian 
servers in the background, without my knowledge. I don't like that.)



> Sent: Wednesday, May 26, 2021 at 1:29 AM
> From: "Polyna-Maude Racicot-Summerside" 
> To: "Stella Ashburne" 
> Subject: Re: How do I permanently disable unattended downloads of 
> software/security updates?
>
> Have you tried clearing the apt cache (/var/cache/apt/archives/)
> and see if you really get download or if it's just notification ?
>
> On 2021-05-25 1:25 p.m., Stella Ashburne wrote:
> > My OS is Debian 10.9 and has the kernel version:
> >
> > Linux localhost 5.10.0-0.bpo.5-amd64 #1 SMP Debian 5.10.24-1~bpo10+1 
> > (2021-03-29) x86_64 GNU/Linux
> >
> > 1. I have already configured the OS not to download software updates 
> > automatically by using the widget "Software & Updates". Click the URL below
> to see a screenshot of the Software Updates:
> >
> > https://ibb.co/bs7pF9q
> >
> > 2. I deleted the file 50unattended-upgrades located in /etc/apt/apt.conf.d/
> >
> > In spite of the above two actions, Debian 10.9 still downloads software
> and security updates for me automatically in the background. Could someone 
> help me with a fix that really works?
> >
> > Thanks.
> >
> > Marcello
> >
>
> --
> Polyna-Maude R.-Summerside
> -Be smart, Be wise, Support opensource development
>
>



Re: How do I permanently disable unattended downloads of software/security updates?

2021-05-25 Thread Stella Ashburne
Hi Greg

By the way, is there a method to suppression notification of new software 
and/or security updates? (I assume that if I can receive notifications of 
software/security updates, it means that my OS is communicating with Debian 
servers in the background, without my knowledge. I don't like that.)


> Sent: Wednesday, May 26, 2021 at 4:51 AM
> From: "Greg Wooledge" 
> To: debian-user@lists.debian.org
> Subject: Re: How do I permanently disable unattended downloads of 
> software/security updates?
>
> On Tue, May 25, 2021 at 10:48:06PM +0200, Stella Ashburne wrote:
> > Thanks Kenneth for your reply.
> > 
> > Your suggestion that I "apt-get purge unattended-upgrades" is intended to 
> > be a one-off operation or must I perform it each time I log into my OS?
> >  
> > And yes, I manually perform "sudo apt update" and "sudo apt upgrade" about 
> > twice a day.
> 
> 
> Anything you do with apt-get, apt or dpkg (or any other package management
> tool) is permanent.
> 
> The only things in this realm that *aren't* permanent are stopping or
> starting a service, e.g. "systemctl stop foobar".  Those operations do
> not affect the state of the system at the next boot.  (For that, you
> would use enable, disable, mask, or unmask, all of which are permanent.)
> 
>



Re: How do I permanently disable unattended downloads of software/security updates?

2021-05-25 Thread Stella Ashburne
Thanks Charles for your reply.

Your suggestion "apt purge unattended-upgrades" implies that my 
deletion/removal of the file 50unattended-upgrades is insufficient. Is that 
correct?

I shall feedback to you if your suggestion works.

By the way, is there a method to suppression notification of new software 
and/or security updates? (I assume that if I can receive notifications of 
software/security updates, it means that my OS is communicating with Debian 
servers in the background, without my knowledge. I don't like that.)

Marcello



> Sent: Wednesday, May 26, 2021 at 3:14 AM
> From: "Charles Curley" 
> To: "Debian Users" 
> Subject: Re: How do I permanently disable unattended downloads of 
> software/security updates?
>
> On Tue, 25 May 2021 19:25:01 +0200
> Stella Ashburne  wrote:
>
> > 2. I deleted the file 50unattended-upgrades located
> > in /etc/apt/apt.conf.d/
> >
> > In spite of the above two actions, Debian 10.9 still downloads
> > software and security updates for me automatically in the background.
> > Could someone help me with a fix that really works?
>
> Well, you could run:
>
> apt purge unattended-upgrades
>
> Somewhat less drastic:
>
> systemctl [stop|disable] unattended-upgrades
>
> (Both, of course, as root.)
>
> --
> Does anybody read signatures any more?
>
> https://charlescurley.com
> https://charlescurley.com/blog/
>
>



Re: How do I permanently disable unattended downloads of software/security updates?

2021-06-01 Thread Stella Ashburne
Hi

> Sent: Tuesday, June 01, 2021 at 9:26 PM
> From: "Joe" 
> To: debian-user@lists.debian.org
> Subject: Re: How do I permanently disable unattended downloads of 
> software/security updates?
>
First of all, id you surf using the link to the screenshot? Here's the URL 
again: https://ibb.co/5xP7r5t

The screenshot shows that my OS surreptitiously downloads the software/security 
updates without my manual intervention. This is not what I want and is the 
subject of my original post.



Re: How do I permanently disable unattended downloads of software/security updates?

2021-06-01 Thread Stella Ashburne
Hi

> Sent: Tuesday, June 01, 2021 at 9:39 PM
> From: "Reco" 
> To: debian-user@lists.debian.org
> Subject: Re: How do I permanently disable unattended downloads of 
> software/security updates?
>
As you can see from the screenshot, my OS has surreptitiously downloaded 
software/security updates without my manual intervention. This behavior is not 
what I like and it's the subject of my original post.

>
> The devil is in the details, as they say.
> "sudo apt upgrade" shows that it does not need to download anything,
> because:
>
> > > username@localhost:~$ sudo apt upgrade
> ...
> > > Need to get 0 B/20.2 MB of archives.
>
Exactly. The notification about software updates being available was the first 
thing that popped up on my OS (see screenshot: https://ibb.co/5xP7r5t). This 
was confirmed by the message "Need to get 0 B/20.2 MB of archives".

> I'm curious what will be shown in this configuration by:
>
> apt-config dump | grep Periodic
>
One kind person has already asked me for the output of

apt-config dump | grep -i APT::Periodic

Below is the output of the above command:

APT::Periodic "";
APT::Periodic::Download-Upgradeable-Packages "0";
APT::Periodic::Unattended-Upgrade "0";



Re: How do I permanently disable unattended downloads of software/security updates?

2021-06-01 Thread Stella Ashburne
Hi

> Sent: Friday, May 28, 2021 at 8:05 PM
> From: l0f...@tuta.io
> To: "Debian User" 
> Subject: Re: How do I permanently disable unattended downloads of 
> software/security updates?
>
> 28 mai 2021, 13:43 de l0f...@tuta.io:
>
> > I think you won't update/upgrade automatically anymore (by the way you say 
> > you haven't noticed this behavior so far), but time will confirm.

Time has indeed confirmed my worst fears. Today June 1, 2021 in fact...

> Correction: I meant if you still have updates/upgrades, then it shouldn't be 
> because of package unattended-upgrades. So you would have to dig somewhere 
> else...
>

Automatic downloads of software/security downloads took place today, June 1, 
2021.

Please click the link to the screenshot: https://ibb.co/5xP7r5t

Please see below for the details:

username@localhost:~$ sudo apt update
[sudo] password for username:
Hit:1 http://security.debian.org/debian-security buster/updates InRelease
Hit:2 http://security.debian.org buster/updates InRelease
Hit:3 https://deb.debian.org/debian buster InRelease
Hit:4 https://deb.debian.org/debian buster-updates InRelease
Hit:5 https://deb.debian.org/debian buster-backports InRelease
Reading package lists... Done
Building dependency tree
Reading state information... Done
4 packages can be upgraded. Run 'apt list --upgradable' to see them.

username@localhost:~$ sudo apt list --upgradable
Listing... Done
gir1.2-javascriptcoregtk-4.0/stable,stable 2.32.1-1~deb10u1 amd64 [upgradable 
from: 2.30.6-1~deb10u1]
gir1.2-webkit2-4.0/stable,stable 2.32.1-1~deb10u1 amd64 [upgradable from: 
2.30.6-1~deb10u1]
libjavascriptcoregtk-4.0-18/stable,stable 2.32.1-1~deb10u1 amd64 [upgradable 
from: 2.30.6-1~deb10u1]
libwebkit2gtk-4.0-37/stable,stable 2.32.1-1~deb10u1 amd64 [upgradable from: 
2.30.6-1~deb10u1]
username@localhost:~$

username@localhost:~$ sudo apt upgrade
Reading package lists... Done
Building dependency tree
Reading state information... Done
Calculating upgrade... Done
The following NEW packages will be installed:
  xdg-desktop-portal xdg-desktop-portal-gtk
The following packages will be upgraded:
  gir1.2-javascriptcoregtk-4.0 gir1.2-webkit2-4.0 libjavascriptcoregtk-4.0-18
  libwebkit2gtk-4.0-37
4 upgraded, 2 newly installed, 0 to remove and 0 not upgraded.
Need to get 0 B/20.2 MB of archives.
After this operation, 5,118 kB of additional disk space will be used.
Do you want to continue? [Y/n]

If you guys notice, 20.2MB of updates have been automatically downloaded in the 
background (without my manual intervention).

I appreciate your help in this matter.

Best wishes.



Re: which command can show if usb 3.0 is used

2021-05-30 Thread Stella Ashburne
Hi

> Sent: Monday, May 31, 2021 at 8:36 AM
> From: "Jude DaShiell" 
> To: "Long Wind" , "Debian-user Mailing List" 
> 
> Subject: Re: which command can show if usb 3.0 is used
>
> First disconnect the disk; next run lsblk >lsblk.old, next connect the
> disk, next run lsblk >lsblk.new.  Finally do a diff on lsblk.old lsblk.new
> and see if something shows up in lsblk.new that isn't in lsblk.old.
>
Can I do a diff using the following command in a terminal?

diff -c lsblk.old lsblk.new



Re: thunderbird

2021-05-30 Thread Stella Ashburne
Hello

> Sent: Monday, May 31, 2021 at 2:29 AM
> From: "fxkl47BF" 
> To: "debian-user@lists.debian.org" 
> Subject: thunderbird
>
> what are your thoughts of thunderbird.
>
Thunderbird appears to have many, many security vulnerabilities based on the 
fact that in any calendar month, security updates are availalbe for downloads 
from Debian.



Re: How do I permanently disable unattended downloads of software/security updates?

2021-06-03 Thread Stella Ashburne
Hi Tom

> Sent: Friday, June 04, 2021 at 4:18 AM
> From: "Tom Browder" 
> To: "Stella Ashburne" 
> Cc: "debian-user mailing list" 
> Subject: Re: How do I permanently disable unattended downloads of 
> software/security updates?
>
>
> Unfortunately I mostly use email from my iPad (gmail app) and I
> haven't found a way to get plain text on it like one can from a real
> computer. Sometimes I go to my Linux laptop and force plain text, but
> normally I try to strip out what I can.
>

Don't get me wrong Tom. I'm perfectly fine with receiving emails in HTML 
format. It's just that a few years ago, when I sent emails with HTML 
formatting, Debian User Mailing List rejected them outright. It took me quite a 
while - about at least two months - trying to figure out why my sent 
HTML-formatted emails were rejected.

> This time i'm replying from my laptop so it **should** be plain text.
>
I am OK as long as Debian User Mailing List now accepts HTML-formatted emails.

Stella



Re: Unexplained freezes and crashes, nothing in /var/log/messages

2021-06-03 Thread Stella Ashburne
Hi David

> Sent: Friday, June 04, 2021 at 5:12 AM
> From: "David Wright" 
> To: debian-user@lists.debian.org
> Subject: Re: Unexplained freezes and crashes, nothing in /var/log/messages
>
>
> My own monitoring program logs the temperature (and battery)
> every six seconds.
>
I'm curious: what's the name of your monitoring program? Is it available for 
download and installation from Debian's official repos?

Stella



Re: How do I permanently disable unattended downloads of software/security updates?

2021-06-03 Thread Stella Ashburne
Hi Greg

> Sent: Thursday, June 03, 2021 at 9:55 AM
> From: "Greg Wooledge" 
> To: debian-user@lists.debian.org
> Subject: Re: How do I permanently disable unattended downloads of 
> software/security updates?
>
>
> I gave some alternatives that will reveal more information.  Replies to
> my reply elaborated further still.
>
Output of systemctl list-timers | grep apt

Thu  2021-06-03 20:29:30 GMT  9h leftThu 2021-06-03 09:18:00 GMT  1h 17min 
ago apt-daily.timer  apt-daily.service
Fri  2021-06-04 06:51:16 GMT  20h left   Thu 2021-06-03 09:18:00 GMT  1h 17min 
ago apt-daily-upgrade.timer  apt-daily-upgrade.service



Re: How do I get back the GRUB menu with the blue background?

2021-07-04 Thread Stella Ashburne
Hi

> Sent: Sunday, July 04, 2021 at 12:01 PM
> From: "David" 
> To: "debian-user mailing list" 
> Subject: Re: How do I get back the GRUB menu with the blue background?
>
>
> As I mentioned, I do not know GPT and UEFI systems.

It's off-topic; I am curious why you do not use GPT/UEFI/Secure Boot? Secure 
Boot has been supported since Debian Buster.

> However, I would expect that after you have successfully
> discovered where grub finds the grub file directory, and the
> kernel file and the initrd image, then it should be possible to
> execute a manual sequence of commands at the grub prompt like:
>
> grub> insmod part_gpt
> grub> insmod ext2
> grub> linux ... root= ...
> grub> initrd ...
> grub> boot
>
> That should boot into your installation. After that you will need to
> run 'grub-install', see below.
>
> If the insmod commands fail, that can mean the value of
> 'prefix' is incorrect. If you specify the full path that grub uses
> to refer to each file, then it isn't necessary to specify 'root'
> variable.
>
What did you mean by "prefix"? Would you like to elaborate?

> Doing that, grub should attempt to boot the specified files, perhaps
> giving further error messages as a clue to what might be
> wrong. Did you try this method?
>
No, I didn't.
>
> Yes I am aware of that method which can succeed. However
> I think you need to also run 'grub-install' in that situation to fix your
> problem, because 'update-grub' merely regenerates a grub.cfg file
> somewhere.
>
Thanks for your tip. I shall try it.
>
> You should check that target device and boot directory used
> by 'grub-install' are correct.
>
How do I go about doing it?

> Perhaps use -v and --boot-directory
> options to make sure that 'grub-install'
> does not reference anything inside your encrypted partition.
>
I don't know how to use the -v and --boot-directory options. Would you like to 
show me please?
>
>
> Without seeing the commands, I don't know what this refers to
> or why you would hold this view.
>
Sorry for the confusion. I looked up some Youtube video clips to see if they 
could provide me some tips on how to fix my issue.



Re: How do I get back the GRUB menu with the blue background?

2021-07-04 Thread Stella Ashburne
Hi

> Sent: Sunday, July 04, 2021 at 2:42 PM
> From: "deloptes" 
> To: debian-user@lists.debian.org
> Subject: Re: How do I get back the GRUB menu with the blue background?
>
>
> I had similar issue on some of the machines. Try with the bios boot from
> device (some F key).
>
Thanks for your suggestion. However it didn't work



Unidentified subject!

2021-07-01 Thread Stella Ashburne
The partition table scheme is GPT and UEFI with Secure Boot is enabled. I do 
not use legacy BIOS with master boot record.

Below is the partition layout of my SDD:

536.9MB EFI system partition (ESP)
511.7MB /boot (unencrypted)
100GB encrypted logical volumes (contains 99GB of / partition, 1GB of swap 
area.Debian Buster was installed on this partition)
16MB Microsoft reserved area (automatically created by Microsoft Windows' 
installer)
100GB Microsoft Windows 10

1. Debian Buster's 64bit installer (version 10.10) was used to create the EFI 
System Partition (ESP), the /boot partition and the encrypted logical volumes. 
Installation was successful and I was able to boot into the GRUB menu with a 
blue background. It had an entry named Debian GNU/Linux.

2. Next I installed Microsoft Windows 10 and the installation was successful.

3. I rebooted into Debian and used sudo os-prober to add the Microsoft Windows' 
entry to GRUB followed by sudo update-grub

4. Dual-boot of Debian and Windows was possible

Problem(s) happened after I did the following:

5. With a USB stick containing the latest weekly build of Debian Testing 
(Bullseye), I booted into the Debian's installer screen and deleted the 100GB 
encrypted logical volumes.

6. As a result, 100GB of free space was made available. I configured it to have 
two encrypted logical volumes: 99GB of the / partition, 1GB of swap area.

7. Debian Testing was installed on the 100GB partition. Installation was 
successful.

8. However, I am now unable to boot into the GRUB menu with the blue 
background. Instead all I have is a black screen with the word grub> _ (The 
underscore is actually the position of the cursor)

After reading some stuff on the internet, please tell me if my understanding of 
the following is correct:

Grub's UEFI Stub is located in EFI System Partition (ESP) while its second 
stage modules are in the /boot partition. /boot also contains Grub's config 
file. It would appear that the bootloader in ESP is not updated to match the 
modules in the /boot partition or it could be that /boot/grub/grub.cfg is 
missing.

Below's my attempt at getting back the Grub menu with the blue background:

A. I used Debian Bullseye's weekly installer to boot up my machine and chose 
Rescue mode.

B. After entering the encrypted passphrase, below were some relevant messages 
on the screen:

[beginning of message]
Enter a device you wish to use as your root file system.

Device to use as root file system:

/dev/perfect-vg/root
/dev/perfect-vg/swap
/dev/dm-1
/dev/dm-2
/dev/mapper/sda3_crypt
/dev/sda1
/dev/sda2
etc, etc
Assemble a RAID system
Do not use a root file system
[end of message]

I highlighted /dev/sda1 and pressed Enter.

I was given four choices one of which was to Execute a shell in the installer 
environment. I highlighted it and pressed Enter.

There was a message on the screen stating that /dev/sda1 would be mounted as 
"/target", that the tools of the installer environment would be available for 
use and that I could use chroot to "chroot /target".

There was a small grey box at the bottom of the screen.

I tried the following options:


~# "chroot /target"
/bin/sh: "chroot /target" not found



~# chroot /target
chroot: can't execute "/bin/sh". No such file or directory



~# apt install --reinstall grub-efi
/bin/sh: apt: not found



I am stuck with the above as my technical knowledge of Linux is limited and 
appreciate your help with the above matter.



How do I get back the GRUB menu with the blue background?

2021-07-01 Thread Stella Ashburne
The partition table scheme is GPT and UEFI with Secure Boot is enabled. I do 
not use legacy BIOS with master boot record.

Below is the partition layout of my SDD:

536.9MB EFI system partition (ESP)
511.7MB /boot (unencrypted)
100GB encrypted logical volumes (contains 99GB of / partition, 1GB of swap 
area.Debian Buster was installed on this partition)
16MB Microsoft reserved area (automatically created by Microsoft Windows' 
installer)
100GB Microsoft Windows 10

1. Debian Buster's 64bit installer (version 10.10) was used to create the EFI 
System Partition (ESP), the /boot partition and the encrypted logical volumes. 
Installation was successful and I was able to boot into the GRUB menu with a 
blue background. It had an entry named Debian GNU/Linux.

2. Next I installed Microsoft Windows 10 and the installation was successful.

3. I rebooted into Debian and used sudo os-prober to add the Microsoft Windows' 
entry to GRUB followed by sudo update-grub

4. Dual-boot of Debian and Windows was possible

Problem(s) happened after I did the following:

5. With a USB stick containing the latest weekly build of Debian Testing 
(Bullseye), I booted into the Debian's installer screen and deleted the 100GB 
encrypted logical volumes.

6. As a result, 100GB of free space was made available. I configured it to have 
two encrypted logical volumes: 99GB of the / partition, 1GB of swap area.

7. Debian Testing was installed on the 100GB partition. Installation was 
successful.

8. However, I am now unable to boot into the GRUB menu with the blue 
background. Instead all I have is a black screen with the word grub> _ (The 
underscore is actually the position of the cursor)

After reading some stuff on the internet, please tell me if my understanding of 
the following is correct:

Grub's UEFI Stub is located in EFI System Partition (ESP) while its second 
stage modules are in the /boot partition. /boot also contains Grub's config 
file. It would appear that the bootloader in ESP is not updated to match the 
modules in the /boot partition or it could be that /boot/grub/grub.cfg is 
missing.

Below's my attempt at getting back the Grub menu with the blue background:

A. I used Debian Bullseye's weekly installer to boot up my machine and chose 
Rescue mode.

B. After entering the encrypted passphrase, below were some relevant messages 
on the screen:

[beginning of message]
Enter a device you wish to use as your root file system.

Device to use as root file system:

/dev/perfect-vg/root
/dev/perfect-vg/swap
/dev/dm-1
/dev/dm-2
/dev/mapper/sda3_crypt
/dev/sda1
/dev/sda2
etc, etc
Assemble a RAID system
Do not use a root file system
[end of message]

I highlighted /dev/sda1 and pressed Enter.

I was given four choices one of which was to Execute a shell in the installer 
environment. I highlighted it and pressed Enter.

There was a message on the screen stating that /dev/sda1 would be mounted as 
"/target", that the tools of the installer environment would be available for 
use and that I could use chroot to "chroot /target".

There was a small grey box at the bottom of the screen.

I tried the following options:


~# "chroot /target"
/bin/sh: "chroot /target" not found



~# chroot /target
chroot: can't execute "/bin/sh". No such file or directory



~# apt install --reinstall grub-efi
/bin/sh: apt: not found



I am stuck with the above as my technical knowledge of Linux is limited and 
appreciate your help with the above matter.



Re: How do I get back the GRUB menu with the blue background?

2021-07-10 Thread Stella Ashburne
Hi David

> Sent: Monday, July 05, 2021 at 4:52 AM
> From: "David Wright" 
> To: debian-user@lists.debian.org
> Subject: Re: How do I get back the GRUB menu with the blue background?
>
> 
> I find the Grub installation prompts in the d-i very confusing.
> I'm wondering whether your process incorrectly updated grub.cfg
> in the ESP on the SSD.
> 

I suspected it too because when I installed Debian Testing, I didn't delete 
both the ESP and /boot partitions that were created by Debian Buster. As a 
result, after installing Debian Testing successfully and rebooting my machine, 
there was no blue GRUB menu.

> Bear in mind there are two grub.cfg files.

Where are their locations?

> The
> second one is the familiar one, so I just give the head:
> 
> # cat /boot/efi/EFI/debian/grub.cfg

When I issued the above command at the grub> prompt, the response was 'file 
/boot/efi/EFI/debian/grub.cfg' not found.

> (I only encrypt /Home and swap.) I'm wondering whether your first
> grub.cfg is pointing to the USB stick that you used in the
> installation. That would be simple to check.

No. If you're using UEFI and the partition table scheme is gpt, Debian 10's 
installer detects that your SSD is using EFI, there's a message on the screen 
that asks "Force EFI installation to a removable media? Yes or No". My response 
is always "No".

> 
> If this guess, is correct, it might be possible to confirm it
> if you get these symptoms:
> 
> . Booting with the internal drive only: GRUB> prompt.
> . Booting with the USB stick inserted: something else appears,
>   a blue Grub menu, or a Debian installer splash screen,
>   or even Windows.

I did what you suggested by first inserting the USB stick that contains Debian 
10's installer and booting up my machine. There's no blue GRUB menu, 
whatsoever

> 
> Of course, the second scenario can only work if the USB's UUID
> hasn't been recreated by further uses.

Yes, I'm aware of that fact
> 
> ¹ With encrypted systems, you have to bear in mind what can be seen
>   outside and inside the container. This is easy to distinguish
>   with only /home encrypted, as you can inspect things with the
>   normal system tools.

My LUKS-encrypted partition consists of / and swap area. I assume the / 
contains /home, /var, /usr, etc...

Best wishes.



Re: How do I get back the GRUB menu with the blue background?

2021-07-10 Thread Stella Ashburne
Attention: David

Hello,

I wish to add some info that might be of interest to you:

grub> ls (hd0,gpt1)/
efi/

Note: (hd0,gpt1) contains ESP (EFI System Partition)

grub> ls (hd0,gpt2)/
lost+found/ efi/ config-4.19.0.17-amd64 vmlinuz-4.19.0.17-amd64 grub/ 
System.map-4.19.0.17-amd64 initrd.img-4.19.0.17-amd64

Note: (hd0,gpt2) is the /boot partition

The version of the kernel in Debian Testing is 5.10.0-7-amd64 whereas that of 
Debian Buster is 4.19.0.17-amd64.

I'm surprised that even though installation of Debian Testing was successful, 
the version of config-, vmlinuz- System.map and initrd.img- in grub is of the 
older Debian Buster.

Do you think the problem of the missing GRUB menu can be fixed if the older 
version of config-, vmlinuz- System.map and initrd.img- can replaced with those 
of Debian Testing? What do you think?

Best regards



Re: How do I get back the GRUB menu with the blue background?

2021-07-10 Thread Stella Ashburne
Hello David

I didn't expect a rather lengthy reply from you.

> Sent: Tuesday, July 06, 2021 at 9:29 AM
> From: "David" 
> To: "debian-user mailing list" 
> Subject: Re: How do I get back the GRUB menu with the blue background?
>
>
> grub> echo "$prefix"
>
The reply is (hd0,gpt1)/boot/grub

>
> 6) Perhaps something else is broken, but attempting
> to boot from the grub> prompt will help to diagnose that.
> That is certain, and straightforward. I have given you
> the steps to try, but you have not yet reported trying it.
>
Frankly, I don't know the exact commands to type to boot from the grub> prompt.

> 7) Inside grub, the 'prefix' variable defines where
> grub finds its own code. That appears to be correct,
> otherwise you would see grub_rescue> prompt.
>
What command can I type at the grub> prompt to look inside grub so as to see 
the "prefix" variable?

>
> 9) I suppose you can use a rescue environment and
> chroot to boot your system, but it seems unnecessary
> unless you can't boot any other way. But if you have a
> broken initrd, you will need to do this.
>
How can I tell if I've a broken initrd?

> 10) Once booted, you will need to 'grub-install' to fix
> the problem of grub.cfg not being found. Because grub
> currently can't find any grub.cfg, you need to make sure
> that the new one is installed to the correct location, which
> needs to be outside your encrypted partition.

Thanks for the mini-tutorial.

> I would not
> be surprised if the /boot in your new installation is not the
> same as your boot partition, you should check that.
> Check your mountpoints. Does 'lsblk -f' show the boot
> partition is mounted at /boot?
>
After typing lsblk -f at the grub> prompt, the error message was can't find 
command 'lsblk'

> Run 'grub-install -v '
> and look for output like:
>   grub-install: info: setting the root device to 
>
After typing grub-install -v (hd0,gpt2), the error message was can't find 
command 'grub-install'

> Make sure  is your unencrypted boot partition.
> If it isn't, run 'grub-install' again with the '--boot-directory' option
> pointing to your boot partition.
> Read 'man grub-install' for documentation of its options.
>
(hd0,gpt2) is my un-encrypted boot partition

> a) Can you boot from grub> prompt?
>
No

> b) At grub>, can you check the value of $root to discover
> where it is looking for grub.cfg? grub> echo "$root"
>
hd0,gpt1

> c) At grub>, can you find grub.cfg anywhere by the
> tab-completion method I described in a prior message?
> Where?

At the grub> prompt, I typed gr and pressed the TAB key. There was no output or 
suggestions.

>
> d) After booting somehow, if you run 'grub-install -v', what
> root device does it use to to save the files that it updates,
> as explained above?

I'm unable to boot (frankly what commands to type to boot at the grub> prompt ?)

>
> e) If you reboot after running 'grub-install', does it work?
>
Unable to answer your question (e) because of (d)

> f) Is the value of '$root' above the same location that
> 'grub-install' writes to by default? If not, use its
> '--boot-directory' option.
>
Unable to answer your question (f) because of (d)



Re: How do I get back the GRUB menu with the blue background?

2021-07-04 Thread Stella Ashburne
Hi

> Sent: Friday, July 02, 2021 at 8:58 AM
> From: "deloptes" 
> To: debian-user@lists.debian.org
> Subject: Re: How do I get back the GRUB menu with the blue background?
>
>
> As this is a fresh installation, why don't you just wipe everything linux
> partitions and install again the way you want it.
>
That was what I did. But I wish to learn how to repair GRUB in a 
non-destructive way.

> Alternatively boot into a usb or live cd or installer, mount the volumes and
> chroot into (there are many howtos)
>
> I use something like following where SYSTEM is the target ppath
>
> mount --make-unbindable -obind /proc/ $SYSTEM/proc/ && \
> mount --make-unbindable -obind /dev/ $SYSTEM/dev/ && \
> mount --make-unbindable -obind /dev/pts $SYSTEM/dev/pts && \
> mount --make-unbindable -obind /run $SYSTEM/run && \
> mount --make-unbindable -obind /sys $SYSTEM/sys/ && \
>
> chroot $SYSTEM su -
>
> when you are there reinstall grub and run update-grub
>
I discovered that reinstalling GRUB and then ran update-grub didn't help at 
all. The issue still persists. With my limited technical knowledge, the only 
way for me to get back the GRUB menu with the blue background is to reinstall 
Debian.



Re: How do I get back the GRUB menu with the blue background?

2021-07-04 Thread Stella Ashburne
Hi David

> Sent: Friday, July 02, 2021 at 10:49 AM
> From: "David" 
> To: "Stella Ashburne" 
> Cc: "debian-user mailing list" 
> Subject: Re: How do I get back the GRUB menu with the blue background?
>
> I see that you've not had any replies, so I'll attempt to assist.

That's very kind of you :)
>
> Thank you for making some effort to provide a detailed
> description of your situation.
>
> Please note that I have several questions (1, 2, 3) interleaved
> below, followed by some suggestions at the end.
>
> On Thu, 1 Jul 2021 at 23:20, Stella Ashburne  wrote:
>
>
> 1) Do you mean "SSD". If not, what is SDD?
>
Yes, I meant to type SSD. It was a typo.

> There's a couple of things that might have gone wrong here.
> Exactly what is unclear at this stage.
>
> 2) Can you tell us, during your step 7, what instructions did you
> give to the installer at the "install a boot loader" stage?

No specific instructions were given to the installer at the "install a boot 
loader" stage. I just accepted the default. If I remember correctly, the 
installer of Debian Stretch asked the user to specify the exact location that 
the boot loader was to be installed. With Debian Buster's installer, there was 
no need to specify your preferred location.

>
> 3) And during the partitioning stages, can you tell us which existing
> devices (LUKS, LVM) did you attempt to reuse unchanged, and which
> did you recreate?
>
I deleted the entire 100GB of encrypted volumes (LUKS, LVM), meaning none of 
the encrypted logical volumes was reused.

> >From my own experience, attempting to install into a pre-existing
> LVM logical volume on a LUKS physical volume, I did once see some
> unexpected failures. This might have been my error, or perhaps
> the installer might have some buggy behaviour in this kind of
> situation. I have not had time to investigate properly.
>
Thanks for sharing your experience with me.

> If, in the installer, you were to start again from the device
> partition, and freshly create the LUKS device and the LVM
> logical volumes from scratch, then I would expect that to work.

No it didn't; hene my original post. To the best of my knowledge, the 
bootloader's files are not installed on encrypted volumes for obvious reasons.

>
>
> I suggest to boot as you describe above (your step #8) until you reach
> the 'grub>' prompt. This is actually a very useful prompt but you
> need to know some tricks to use it. So begin by reading this page:
> https://www.gnu.org/software/grub/manual/grub/html_node/Naming-convention.html#Naming-convention
>
Thanks for the link, David.
>
> You can use this method to try to find which device
> and directory contains your grub directory. It will
> look something like (hd0,msdos1)/grub and will
> contain the grub files including your grub.cfg menu.
> You could then use grub's 'cat' command to inspect
> the UUIDs it is attempting to use. However that's
> probably not useful at this time.

I know where GRUB's files are located, viz. in ESP (EFI System Partition) and 
the /boot partition.
>
> When you find your grub.cfg, that is progress, and you
> can try booting from that menu.
> grub> configfile (hd0,msdos1)/path/to/grub.cfg
>
It didn't work. Your tip can be found in Youtube video clips.

> However I expect that will not succeed,
> because the default grub.cfg by default uses UUID to
> identify all devices. And because you reinstalled (your
> step #7) you probably have different UUIDs now.
>
I suspect that the GRUB files in either ESP or /boot are messed up and their 
corresponding modules don't match.

>
> The easier scenario will be that we just need to persuade
> grub to boot, and then you can run grub-install. Things will
> be more difficult if the installer has not properly initialised
> your initrd for LUKS.

Did you know that Debian Buster's installer has a feature called Rescue Mode. I 
made use of it to chroot into /target followed by running apt install 
--reinstall grub-efi and update-grub. It didn't work. As stated earlier, I 
guess the file and modules are messed up in the ESP and /boot partition.

> The other approach is for you to do a complete repeat of
> your step 7, and this time create all device manager layers
> from scratch as I explained above.
>
> That approach might be simpler for everyone, but less educational.
>
I totally agree with you. That's why I post my request for help so that I can 
learn how to fix it. Oh by the way, Youtube video clips that show how to fix 
GRUB issues aren't useful in my case.

> Let us know how you go. Please be sure to reply to the
> list, not me personally, because I am subscribed. Thanks.
>
Understood.



Re: How do I mount the USB stick containing the installer in Rescue Mode?

2021-07-15 Thread Stella Ashburne
Hi guys,

There's a typo in my original post. Thanks to Reco for pointing it out to me.

> Sent: Thursday, July 15, 2021 at 9:43 AM
> From: "Stella Ashburne" 
> To: "debian-user mailing list" 
> Subject: How do I mount the USB stick containing the installer in Rescue Mode?
>
>
> When asked if I wanted to mount the separate /boot/efi partition, I entered 
> No.
>
> Next, I entered Executive a shell in /dev/perfect-vg/root
>

CORRECTION: Execute a shell in /dev/perfect-vg/root



How do I mount the USB stick containing the installer in Rescue Mode?

2021-07-15 Thread Stella Ashburne
Debian Bullseye's installer is on a USB stick and I used it to boot into Rescue 
Mode. If it's of any relevance, the partition table type is GPT, with 
UEFI+Secure Boot enabled.

After booting into Rescue Mode and filling out the required details onscreen, I 
chose /dev/perfect-vg/root as the device to use as root file system. If you may 
recall, the volume group perfect-vg is LUKS-encrypted.

When asked if I wanted to mount the separate /boot/efi partition, I entered No.

Next, I entered Executive a shell in /dev/perfect-vg/root

I typed the command nano /etc/apt/sources.list and commented out all the lines 
therein.

I added the the following line:

deb [trusted=yes] file:/media/myusb bullseye main

I saved the sources.list file.

I created a directory called /media/myusb and issued the following command to 
mount the USB stick to it:

mount /dev/sdb1 /media/myusb

The error message is:

mount: /media/myusb: /dev/sdb1 already mounted or mount point busy

Below are the results of cat /etc/fstab

  

/dev/mapper/perfect--vg-root   /  ext4 errors-remount-ro   0   1
/boot/efi was on /dev/sda1 during installation
UUID=A30E-2C33/boot/efi vfatumask=0077  0  1
/dev/mapper/perfect--vg-swapnone   swapsw   0  0
/dev/sr0  /media/cdrom0 udf, iso9660 user, noauto   0  0
/media/myusb

I appreciate your help in this matter.



Re: How do I mount the USB stick containing the installer in Rescue Mode?

2021-07-15 Thread Stella Ashburne
Hi

> Sent: Thursday, July 15, 2021 at 9:55 AM
> From: "Reco" 
> To: debian-user@lists.debian.org
> Subject: Re: How do I mount the USB stick containing the installer in Rescue 
> Mode?
>
>   Hi.
>
> On Thu, Jul 15, 2021 at 11:43:26AM +0200, Stella Ashburne wrote:
> > Next, I entered Executive a shell in /dev/perfect-vg/root
>
> It's Superuser shell actually, not Supervisor/Executive one.
>
Thanks for pointing out my typo.
>
> Something has mounted your device elsewhere already.

I guess that when I used the USB-installer to boot my machine into Rescue Mode, 
the USB stick is mounted, yes?

> A usual thing with the modern desktop environments.
> Check the output of "mount" and "df -Th" and /dev/sdb1 will probably be
> there. I'd like to see the output of these commands too, btw.
>
Output of mount is

root@perfect:/# mount
/dev/mapper/perfect--vg-root on / type ext4 (rw,relatime)
devtmpfs on /dev type devtmpfs 
(rw,relatime,size=8137669k,nr_inodes=2034417,mode=755)
proc on /proc type proc (rw,relatime)
sysfs on /sys type sysfs (rw,relatime)
tmpfs on /run type tmpfs (rw,nosuid,relatime,size=1629756k,mode=755)
root@perfect:/#

Output of dh -Th is

root@perfect:/# df -Th
FilesystemTypeSizeUsedAvailUse%   Mounted on
/dev/perfect-vg/root  ext436G 773M33G  3% /
devtmpfs  devtmpfs   7.8G0   7.8G  0% /dev
tmpfs tmpfs  1.6G  96K   1.6G  1% /run
root@perfect:/#

> If these are the full contents of /etc/fstab, it's incorrect.
> In addition to the mountpoint you should specify a block device (or its
> equivalent), filesystem type, mount points, dump/pass and that's the
> least.

Thanks for the mini instruction. I really appreciate it.

> I.e. this line is wrong:
>
> /media/myusb
>
> This line is correct:
>
> /dev/sdb1 /media/usb auto defaults,nofail 0 0
>
> "nofail" is really needed for removable devices, because whoever
> designed systemd made an "interesting" decision to halt the boot process
> (i.e. host is inaccessible by network, console access only) even if a
> single filesystem mentioned in fstab fails to mount.
> You may want to add "noauto" as well, see fstab(5).
>
I read fstab(5). Unfortunately such man pages don't contain examples to 
illustrate the arguments and options.
>
>



iwd: Using iwd to connect to a wireless network (Part 1 - Connection status show OK but unable to surf the net)

2021-09-28 Thread Stella Ashburne
Based on ArchLinux's tutorial on using iwd to connect to a wireless network 
(https://wiki.archlinux.org/title/Iwd), I managed to connect to my wireless 
routeror so I thought :(

Below are the relevant outputs:

In Terminal #1

username@hostname:~$ iwctl
[iwd]# device   wlan0   show

  Device: wlan0*

  Settable Property  Value

   Name  wlan0
  *Mode  station
  *Powered   on
   Address   2b:ef:4d:33:c2:e5
   Adapter   phy0




[iwd]# station wlan0 show
 Station: wlan0*

  Settable  PropertyValue

Scanningno
State   connected
Connected network   Stella-Network
ConnectedBss2b:ef:6a:20:ac:18
Frequency   2412
SecurityWPA2-Personal
RSSI-47  dBm
AverageRSSI -47  dBm
TxMode  802.11n
TxMCS   7
TxBitrate   15   Kbit/s
RxBitrate   1000 Kbit/s


The asterisk to the right of the word wlan0 is always blinking.

In Terminal #2

username@hostname:~$ sudo apt update

Result: sudo apt update is unable to update the repositories specified in 
/etc/apt/sources.list. I tried to use Firefox to browse the internet to no 
avail.

I appreciate your help in this matter. Thanks.




Re: iwd: Using iwd to connect to a wireless network (Part 1 - Connection status show OK but unable to surf the net)

2021-09-29 Thread Stella Ashburne
Hi Dan

> Sent: Thursday, September 30, 2021 at 3:09 AM
> From: "Dan Ritter" 
> To: "Stella Ashburne" 
> Cc: "debian-user mailing list" 
> Subject: Re: iwd: Using iwd to connect to a wireless network (Part 1 - 
> Connection status show OK but unable to surf the net)
>
> Stella Ashburne wrote:
> > Hi Dan
> >
> > Setting static IP address in network configuration
> > Add the following section to /var/lib/iwd/network.type file. For example:
> >
> > /var/lib/iwd/spaceship.psk
> > [IPv4]
> > Address=192.168.1.10
> > Netmask=255.255.255.0
> > Gateway=192.168.1.1
> > Broadcast=192.168.1.255
> > DNS=192.168.1.1
> >
> > In the above example the broadcast IP is 192.168.1.255.
> >
> > Question: Does the fourth octet have to be 255?
>
> Technically, no. In practice, you are unlikely to see anything
> else unless you are configuring point-to-point router links.
>
Just to confirm that I understood your statement correctly: can I omit the line 
Broadcast=192.168.1.255 in the file spaceship.psk?



Re: iwd: Using iwd to connect to a wireless network (Part 1 - Connection status show OK but unable to surf the net)

2021-09-29 Thread Stella Ashburne
> Sent: Thursday, September 30, 2021 at 3:36 AM
> From: "Greg Wooledge" 
> To: debian-user@lists.debian.org
> Subject: Re: iwd: Using iwd to connect to a wireless network (Part 1 - 
> Connection status show OK but unable to surf the net)
>
> [.}
>
> It's also worth pointing out that these bitwise operations are *lightning*
> fast for computers to do.  They're extremely efficient.  CPUs have
> dedicated circuitry to do them.
>
Thanks Greg for the detailed tutorial on what netmask is and does.

> Let's get back to Debian for a moment.
>
> Debian doesn't use "iwd" (whatever that is) to configure network
> interfaces.  Whatever created this file, it's not being used.
>
Oh.

> Debian uses /etc/network/intefaces, which is a file documented by
> the man page interfaces(5).  Any interface that's correctly defined in
> this file will be configured by it.
>
I confirm that /etc/network/interfaces has been correctly configured because I 
am able to use a wired LAN connection to sudo apt upgrade and what not.

> If network-manager (NM) is installed, it will try to configure any
> interfaces that are *not* defined in /etc/network/interfaces.  On some
> systems, this means NM is the primary means of configuring interfaces.
> On others, it may only do the wireless interfaces, while /e/n/i does
> the ethernet ones.  On still other systems, NM might do nothing, or it
> might not even be installed at all.
>
Thanks again for the detailed explanation about what NM does. However according 
to the tutorials that I read on the internet, NM and wpasupplicant must be 
uninstalled prior to installing the package iwd.

> Debian also allows you to configure interfaces using some crazy systemd
> thing.  This isn't done by any of the supported installation task sets.
>
What did you mean by "installation task sets"? Did you mean the tasksel stage 
of the installation process where we get to choose to install a Gnome DE, KDE 
DE, LXQT DE etc?



Re: iwd: Using iwd to connect to a wireless network (Part 1 - Connection status show OK but unable to surf the net)

2021-09-29 Thread Stella Ashburne
Hi Dan

> Sent: Wednesday, September 29, 2021 at 10:08 PM
> From: "Dan Ritter" 
> To: "Stella Ashburne" 
> Cc: "debian-user mailing list" 
> Subject: Re: iwd: Using iwd to connect to a wireless network (Part 1 - 
> Connection status show OK but unable to surf the net)
>
>
> You are using Debian, right?
>
>
Yes I do. In fact Debian 11/Bullseye is my distro.
>
> Different distros do things differently.
>
Based on my experience with using ArchLinux's tutorials, I have been able to 
get all of my stuff done on Debian without problems. After all both are Linux 
distros. It's not like one of them belongs to *BSD family while the other 
belongs to Linux family.
>
>
> I have no experience using 'iwd', so what I mean is that I
> cannot spot a problem in your config.
>
Let's have a look at ArchLinux's wiki's example 
(https://wiki.archlinux.org/title/Iwd) which I reproduce here:

Setting static IP address in network configuration
Add the following section to /var/lib/iwd/network.type file. For example:

/var/lib/iwd/spaceship.psk
[IPv4]
Address=192.168.1.10
Netmask=255.255.255.0
Gateway=192.168.1.1
Broadcast=192.168.1.255
DNS=192.168.1.1

In the above example the broadcast IP is 192.168.1.255.

Question: Does the fourth octet have to be 255?

> > > then it should assign
> > > 192.168.0.30.115 to wlan0 and
> > >
> > > ip addr show
> > >
> > > should show that assignation. Does it?
> > >
> > No, it doesn't.
>
> Then iwd is not setting up your interface, or your config is
> wrong.
>
Oh dear! This is bad news :(



Re: iwd: Using iwd to connect to a wireless network (Part 1 - Connection status show OK but unable to surf the net)

2021-09-30 Thread Stella Ashburne
Hi

> Sent: Thursday, September 30, 2021 at 2:29 PM
> From: to...@tuxteam.de
> To: debian-user@lists.debian.org
> Subject: Re: iwd: Using iwd to connect to a wireless network (Part 1 - 
> Connection status show OK but unable to surf the net)
>
> I don't know about iwd specifically, but given address and
> netmask it should be able to reasonably infer a default
> broadcast. So I'd say "yes, but ask iwd" ;-)
>
Somehow I managed to find out the email addresses of the developers of iwd (who 
are all from Intel).

Do you think any one of them will reply to my email? It's a long shot, I know.



Re: iwd: Using iwd to connect to a wireless network (Part 1 - Connection status show OK but unable to surf the net)

2021-09-30 Thread Stella Ashburne
Oh dear! Oh dear!

> Sent: Thursday, September 30, 2021 at 1:22 PM
> From: "David Wright" 
> To: debian-user@lists.debian.org
> Subject: Re: iwd: Using iwd to connect to a wireless network (Part 1 - 
> Connection status show OK but unable to surf the net)
>
> > [IPv4]
> > Address=192.168.30.115
> > Netmask=255.255.255.0
> > Gateway=192.168.30.1
> > Broadcast=192.168.30.255
> > DNS=8.8.8.8
>
>
> It's claimed that iwd can do DHCP itself. For this, you'd drop
> the [IPv4] paragraph above, and instead put
>
> [General]
> EnableNetworkConfiguration=true
>
> into /etc/iwd/main.conf (create if necessary).
>
Per your suggestion, I created a file main.conf in /etc/iwd/ and typed in the 
words:

[General]
EnableNetworkConfiguration=true

and saved it.

Next I removed the following lines from /var/lib/iwd/whitecollar.psk as you 
have suggested:

[IPv4]
Address=192.168.30.115
Netmask=255.255.255.0
Gateway=192.168.30.1
Broadcast=192.168.30.255
DNS=8.8.8.8

and saved the changes.

After a reboot, I typed the following word at the command prompt:

iwctl

Next, I typed

station wlan0 show

The output was: No device found





Re: iwd: Using iwd to connect to a wireless network (Part 1 - Connection status show OK but unable to surf the net)

2021-09-30 Thread Stella Ashburne
Hola David


> Sent: Thursday, September 30, 2021 at 1:22 PM
> From: "David Wright" 
> To: debian-user@lists.debian.org
> Subject: Re: iwd: Using iwd to connect to a wireless network (Part 1 - 
> Connection status show OK but unable to surf the net)
>
> 
> So the WiFi's SSID is whitecollar (all lower case)?
> 
Si Señor

> > [Security]
> > PreSharedKey=a long string of alphanumeric characters
> > Passphrase=aquickbrownfoxjumpsoverthelazydog
> 
> I take it that you edited in the passphrase, and iwd wrote
> the PreSharedKey into the file itself?
> 
Yes, before I submitted my post to lists.debian.org, I changed my passphrase to 
aquickbrownfoxjumpsoverthelazydog

> > [IPv4]
> > Address=192.168.30.115
> > Netmask=255.255.255.0
> > Gateway=192.168.30.1
> > Broadcast=192.168.30.255
> > DNS=8.8.8.8
> 
> Where did you get the number 115 from?
> 
My dear David, I plucked it out of thin air. Mea culpa, mea maxima culpa?? I 
could have just typed 130 instead of 115.

> It's claimed that iwd can do DHCP itself. For this, you'd drop
> the [IPv4] paragraph above, and instead put
> 
> [General]
> EnableNetworkConfiguration=true
> into /etc/iwd/main.conf (create if necessary).
>
Yes, I think ArchLinux's wiki mentions that starting with iwd's version 0.9, 
the latter can do DHCP...

> > Please note that I have disabled IPv6 by adding the line
> > 
> > GRUB_CMDLINE_LINUX_DEFAULT="ipv6.disable=1 quiet"
> > 
> > to /etc/default/grub
> 
> It's claimed that iwd only configures IPv6 if you have
> 
> [Network]
> EnableIPv6=true
> 
> in /etc/iwd/main.conf.
> 
That's absolutely correct. In fact according to the same ArchLinux's wiki, with 
iwd, support for IPv6 is disabled by default.



Re: iwd: Using iwd to connect to a wireless network (Part 2 - DNS managers)

2021-09-30 Thread Stella Ashburne
Hi David

Happy to hear from you again.

> Sent: Thursday, September 30, 2021 at 1:38 PM
> From: "David Wright" 
> To: debian-user@lists.debian.org
> Subject: Re: iwd: Using iwd to connect to a wireless network (Part 2 - DNS 
> managers)
>
>
> My usual strategy is to let the Debian installer set the dns server to
> IP address of the router, and configure the router to query 8.8.8.8/1.1.1.1.
> It's not ideal if you have a router that doesn't "belong" to you,
> ie that you can't configure yourself.
>
In the past I used to let the Debian installer set the DNS resolver for me. But 
you know what? When I did that, I found out that Debian added 192.163.1.1 as 
one of the DNS resolvers. This was and is a No!No! for me because of possible 
DNS leaks when I used a commercial VPN provider.

Nowadays before I launch the Debian installer in commandline (Expert mode), 
I'll plug the LAN cable out from the RJ45 port and when the installer asks if I 
wish to have auto networking configuration enabled, I just click No. Thereafter 
I enter the IP addresses of my preferred DNS resolvers that are hosted by 
privacy-conscious folks.

> Resolvconf squirrels that original address away in
> /etc/resolvconf/resolv.conf.d/original so that it can revert to it
> after you have left other networks/VPNs etc. So I guess that, at
> worst, you can just write in whatever you want into that file.
> Check it is still there after the next boot, and also check
> /etc/resolv.conf (which is a symlink) to make sure that it used it ok.
>
Thanks for the reminder and last I checked /etc/resolv.conf is still there.



Re: iwd: Using iwd to connect to a wireless network (Part 2 - DNS managers)

2021-09-30 Thread Stella Ashburne
Hi Reco

Thanks for sharing your experience with me.

> Sent: Thursday, September 30, 2021 at 9:52 PM
> From: "Reco" 
> To: debian-user@lists.debian.org
> Subject: Re: iwd: Using iwd to connect to a wireless network (Part 2 - DNS 
> managers)
>
>
> The limitation of update-resolv-conf in its current (as of bullseye)
> form is that it does nothing to the list of the resolvers that are
> configured already before the openvpn handshake. Which could lead to DNS
> leaks, which are considered a bad thing by some.
>
I see. Thanks for your explanation.

The following describes what I've been doing when I used the installer since 
Debian Jessie:

1. Plug the LAN cable out from its RJ45 port
2. Click "No" when asked if I wish to have auto networking configuration enabled
3. Input my IP address, netmask, default gateway and the IP addresses of my 
preferred DNS resolvers (my preferred DNS resolvers are hosted/managed by 
privacy-conscious folks all over the world; none of them are from my country, 
which is part of the Five-Eyes Alliance.)

Based on the above description, do you think that update-resolv-conf in 
Bullseye will leak the IP addresses of my ISP's DNS resolvers?

> Back in the day I solved that problem by using a custom dnsmasq config
> and a handful of netfilter rules, these days I just use network namespaces.
>
Would you like to show me how to use network namespaces to solve the problems 
when using update-resolv-conf?



Re: iwd: Using iwd to connect to a wireless network (Part 1 - Connection status show OK but unable to surf the net)

2021-09-30 Thread Stella Ashburne
Hi Dan,

Thanks for your reply.

> Sent: Thursday, September 30, 2021 at 6:06 AM
> From: "Dan Ritter" 
> To: "Stella Ashburne" 
> Cc: "debian-user mailing list" 
> Subject: Re: iwd: Using iwd to connect to a wireless network (Part 1 - 
> Connection status show OK but unable to surf the net)
>
>
> Might I suggest wicd, which people here do have experience with
> and have used successfully?
>
Before writing this reply, I checked with packages.debian.org and I couldn't 
find the package wicd in Debian's official list of packages for Debian 11. It 
seems that it's been removed for some reasons.



Re: iwd: Using iwd to connect to a wireless network (Part 2 - DNS managers)

2021-09-30 Thread Stella Ashburne
Hi Anssi

Thanks for sharing your experience with me.

> Sent: Thursday, September 30, 2021 at 8:15 PM
> From: "Anssi Saari" 
> To: debian-user@lists.debian.org
> Subject: Re: iwd: Using iwd to connect to a wireless network (Part 2 - DNS 
> managers)
>
> If you mean you want to use the old script update-resolv-conf with
> openvpn,
>
Yes, I was referring to using the old script update-resolv-conf with OpenVPN.

> I never got that to do the right thing with any
> reliability.
>
Please explain what you meant by your statement.

I've been using update-resolv-conf with OpenVPN without problems for the past 
four to five years. The dozen or two commercial VPN providers insist that I use 
update-resolv-conf to prevent DNS and data leaks.

? With systemd-resolved you can use update-systemd-resolved
> which actually seems to work.
>
Would you like to share with me how to invoke/launch systemd-resolved and 
update-systemd-resolved in combination with OpenVPN please? Do I need to 
install packages in order to have systemd-resolved and update-systemd-resolved?



Re: iwd: Using iwd to connect to a wireless network (Part 2 - DNS managers)

2021-09-30 Thread Stella Ashburne
Hi Reco

I'm happy to hear from you again.

> Sent: Thursday, September 30, 2021 at 8:20 PM
> From: "Reco" 
> To: debian-user@lists.debian.org
> Subject: Re: iwd: Using iwd to connect to a wireless network (Part 2 - DNS 
> managers)
>
>
> Works for me since Debian squeeze. The script in question does not do
> anything more fancy than calling "resolvconf -a" and "resolvconf -d"
> anyway.
>
It worked and still works for me too, since Debian Wheezy.

> Of course, if you intend to use openvpn-provided DNS list only, things
> will be more complicated.
>
What did you mean by "openvpn-provided DNS list only"? I didn't know that 
OpenVPN provides a list of DNS resolvers?



Re: iwd: Using iwd to connect to a wireless network (Part 1 - Connection status show OK but unable to surf the net)

2021-09-30 Thread Stella Ashburne
Hi

Thanks for sharing your experience with me.

> Sent: Thursday, September 30, 2021 at 2:38 PM
> From: "riveravaldez" 
> To: debian-user@lists.debian.org
> Subject: Re: iwd: Using iwd to connect to a wireless network (Part 1 - 
> Connection status show OK but unable to surf the net)
>
>
> Hi, my case was similar, while in Debian I use just /etc/network/interfaces
> file or NM, in a Dell laptop with Arch I was using Wicd until it got more
> or less abandoned and out of official repositories (like in Debian, IIRC),

You're right. Before writing this reply, I checked for the latest version of 
wicd on packages.debian.org and the latter returned zero results.

> so, following Arch wiki instructions, I changed Wicd for the
> systemd-networkd+iwd combo, and the Wi-Fi connections are working
> fine (previously, wpa_supplicant gave me some persistent problems...).
> So, I can say that it's a pretty functional and simple tool for the task.
> Meaning, it works.
>
According to some tutorials that I found on the internet, it's advisable to 
remove/uninstall wpa_supplicant before using iwd due to potential conflicts.

As for your statement "..I changed Wicd for the systemd-networkd+iwd combo...", 
how did you do it? Could you share how you used systemd-networkd with iwd 
please? I'm still learning Linux, you know and I appreciate all the help that 
everyone here is willing to give.



Re: iwd: Using iwd to connect to a wireless network (Part 2 - DNS managers)

2021-09-30 Thread Stella Ashburne
Hi Greg

> Sent: Thursday, September 30, 2021 at 7:21 PM
> From: "Greg Wooledge" 
> To: debian-user@lists.debian.org
> Subject: Re: iwd: Using iwd to connect to a wireless network (Part 2 - DNS 
> managers)
>
>
> This page doesn't talk about iwd... partly because I'd never heard of it
> at the time I wrote most of the content on that page.
>
Kudos to you for contributing your time and effort for the benefit of the 
Debian community.

> It also doesn't talk about systemd-networkd, or network-manager.  If
> some people out there know how those things work (in *detail*) and
> are able to contribute to the wiki page, that would be great.
>
Well, if I discover/learn how to make iwd work with systemd-networkd, I shall 
let you know.



Re: iwd: Using iwd to connect to a wireless network (Part 1 - Connection status show OK but unable to surf the net)

2021-09-30 Thread Stella Ashburne
Hi David

> Sent: Thursday, September 30, 2021 at 1:25 PM
> From: "David Wright" 
> To: debian-user@lists.debian.org
> Subject: Re: iwd: Using iwd to connect to a wireless network (Part 1 - 
> Connection status show OK but unable to surf the net)
>
> 
> Err, not with bullseye. That's why I'm interested to see how Stella
> gets on with iwd —
>
Me too. I'm keen to know why I'm unable to surf the net even after iwd has 
connected my machine to my wireless network.



Re: iwd: Using iwd to connect to a wireless network (Part 1 - Connection status show OK but unable to surf the net)

2021-09-30 Thread Stella Ashburne
Hi Henning

> Sent: Thursday, September 30, 2021 at 10:14 PM
> From: "Henning Follmann" 
> To: debian-user@lists.debian.org
> Subject: Re: iwd: Using iwd to connect to a wireless network (Part 1 - 
> Connection status show OK but unable to surf the net)
>
>
> That depends. How did you get their e-mail address?
> Was it from the project webpage? Do they encourage anybody to
> send them direct mail?
> Them yes.
>
Yes, their email address are displayed on the project's website.

No, they didn't mention that any Tom, Dick and Harry are welcome to write to 
them.

> What baffels me is though, at what length someone would go to not use the 
> default
> methods to connect  via wifi. Especially when they showed limited experience
> in networking in the first place.
>
Pray thee, what are the default methods that you speak of?

My OS is plain Debian 11 with just lxqt-core and lightdm installed. I'm tired 
of using Gnome.

Indeed, I've very limited networking and that's why I'm motivated to learn how 
to use iwd to surf the net.



Re: iwd: Using iwd to connect to a wireless network (Part 1 - Connection status show OK but unable to surf the net)

2021-09-30 Thread Stella Ashburne
Hi Dan

> Sent: Thursday, September 30, 2021 at 11:15 PM
> From: "Dan Ritter" 
> To: "Stella Ashburne" 
> Cc: debian-user@lists.debian.org
> Subject: Re: iwd: Using iwd to connect to a wireless network (Part 1 - 
> Connection status show OK but unable to surf the net)
>
>
> Try
>
> ip link show
>
> and look for the name of a device which could be your wifi NIC.
>
Nope, ip link show does not show up any device which is my wifi NIC



Re: iwd: Using iwd to connect to a wireless network (Part 1 - Connection status show OK but unable to surf the net)

2021-09-30 Thread Stella Ashburne
Hi Tomas

> Sent: Thursday, September 30, 2021 at 11:48 PM
> From: to...@tuxteam.de
> To: debian-user@lists.debian.org
> Subject: Re: iwd: Using iwd to connect to a wireless network (Part 1 - 
> Connection status show OK but unable to surf the net)
>
> On Thu, Sep 30, 2021 at 10:14:05AM -0400, Henning Follmann wrote:
>
> [...]
>
> > What baffels me is though, at what length someone would go to not use the 
> > default
> > methods to connect  via wifi. Especially when they showed limited experience
> > in networking in the first place.
>
> This remark was, IMO, unnecessary: after all, that's how we learn around here,
> don't we?
>
> At least that's how I learn.
>
Bingo. I couldn't agree with you more.

The main objective of having a mailing list for Debian users is so that we, as 
a community of like-minded individuals, are able to share our knowledge and 
experience.



Re: iwd: Using iwd to connect to a wireless network (Part 1 - Connection status show OK but unable to surf the net)

2021-09-30 Thread Stella Ashburne
Hi

Thanks for your words of encouragement.

> Sent: Thursday, September 30, 2021 at 11:39 PM
> From: rhkra...@gmail.com
> To: debian-user@lists.debian.org
> Subject: Re: iwd: Using iwd to connect to a wireless network (Part 1 - 
> Connection status show OK but unable to surf the net)
>
> On Thursday, September 30, 2021 10:54:17 AM Stella Ashburne wrote:
> Yes, their email address are displayed on the project's website.
> No, they didn't mention that any Tom, Dick and Harry are welcome to write
> to them. Well, thank goodness your name is Stella ;-) (Sorry!) I think the 
> implication of them having their email address on the project's website is 
> that Tom, Dick and Harry (and even Stella) are welcome to write to
> them, and they have the implied option of not replying for whatever reason. 
> Be bold, go where no man has gone before ;-)

Your statement: "Be bold, go where no man has gone before"

I suppose that "man" refers to both men and women, right? (Just kidding. In 
this time and age, one has to be seen to be politically correct, yes?)



Debian 11: Unable to detect wireless interface on an old laptop computer

2021-09-27 Thread Stella Ashburne
I have a dual-boot OS configuration on my HDD: Debian 11 and Microsoft Windows 
10.

My CPU belongs to Intel 4th generation (Haswell) and I even installed packages 
such as firmware-misc-nonfree firmware-iwlwifi firmware-realtek

Microsoft Windows 10 is able to detect and makes use of the wireless chipset on 
my computer's motherboard.

However, Debian 11 is unable to detect it (wireless chipset). I only installed 
the bare minimum lxqt-core and lightdm packages (no fanciful stuff).

I issued the command:

ip link show

and there is not a line that says something like wlan or wl01 etc...

Below is the output of lspci:

00:00.0 Host bridge: Intel Corporation Xeon E3-1200 v3/4th Gen Core Processor 
DRAM Controller (rev 06)
00:01.0 PCI bridge: Intel Corporation Xeon E3-1200 v3/4th Gen Core Processor 
PCI Express x16 Controller (rev 06)
00:01.1 PCI bridge: Intel Corporation Xeon E3-1200 v3/4th Gen Core Processor 
PCI Express x8 Controller (rev 06)
00:02.0 VGA compatible controller: Intel Corporation 4th Gen Core Processor 
Integrated Graphics Controller (rev 06)
00:03.0 Audio device: Intel Corporation Xeon E3-1200 v3/4th Gen Core Processor 
HD Audio Controller (rev 06)
00:04.0 Signal processing controller: Intel Corporation Device 0c03 (rev 06)
00:14.0 USB controller: Intel Corporation 8 Series/C220 Series Chipset Family 
USB xHCI (rev 05)
00:16.0 Communication controller: Intel Corporation 8 Series/C220 Series 
Chipset Family MEI Controller #1 (rev 04)
00:1a.0 USB controller: Intel Corporation 8 Series/C220 Series Chipset Family 
USB EHCI #2 (rev 05)
00:1b.0 Audio device: Intel Corporation 8 Series/C220 Series Chipset High 
Definition Audio Controller (rev 05)
00:1c.0 PCI bridge: Intel Corporation 8 Series/C220 Series Chipset Family PCI 
Express Root Port #1 (rev d5)
00:1c.2 PCI bridge: Intel Corporation 8 Series/C220 Series Chipset Family PCI 
Express Root Port #3 (rev d5)
00:1c.3 PCI bridge: Intel Corporation 8 Series/C220 Series Chipset Family PCI 
Express Root Port #4 (rev d5)
00:1d.0 USB controller: Intel Corporation 8 Series/C220 Series Chipset Family 
USB EHCI #1 (rev 05)
00:1f.0 ISA bridge: Intel Corporation HM87 Express LPC Controller (rev 05)
00:1f.2 SATA controller: Intel Corporation 8 Series/C220 Series Chipset Family 
6-port SATA Controller 1 [AHCI mode] (rev 05)
00:1f.3 SMBus: Intel Corporation 8 Series/C220 Series Chipset Family SMBus 
Controller (rev 05)
00:1f.6 Signal processing controller: Intel Corporation 8 Series Chipset Family 
Thermal Management Controller (rev 05)
06:00.0 Ethernet controller: Realtek Semiconductor Co., Ltd. RTL8111/8168/8411 
PCI Express Gigabit Ethernet Controller (rev 10)
07:00.0 Network controller: Intel Corporation Wireless 3160 (rev 83)
0a:00.0 3D controller: NVIDIA Corporation GM107M [GeForce GTX 950M] (rev a2)

Could someone help me please? Thanks.




Re: Debian 11: Unable to detect wireless interface on an old laptop computer

2021-09-27 Thread Stella Ashburne
Hello Henning,

Thanks for your reply.

> Sent: Tuesday, September 28, 2021 at 1:09 AM
> From: "Henning Follmann" 
> To: debian-user@lists.debian.org
> Subject: Re: Debian 11: Unable to detect wireless interface on an old laptop 
> computer
>
> And after that device shows up nmcli can be very useful:
>  nmcli device
>
> will list your network devices
>
> if it is not enabled - unless it it is physically switched off -
> you can unblock it with
>
>  nmcli radio wifi on
>
> and to connect
>  nmcli --ask dev wifi connect 
>
> it will ask for your wpa password and by default will remember it.

nmcli is from the package network-manager, yes? If it is, I'd prefer not to 
install it. Why? Many VPN providers/vendors recommend against using Network 
Manager to connect to OpenVPN servers because the former is buggy and leaks 
details about the user.

I just came to know that there is a much better wireless daemon called iwd. On 
the internet it's said that iwd performs better and faster than the tradition 
wpasupplicant. What's more iwd was conceptualized by someone at Intel.

If you do know how to make changes to the settings of iwd configuration files, 
I wish to seek your help. You see, I'd to learn how to make use of this 
wonderful new technology. I have googled the internet and most of them don't 
provide detailed tutorials on how to set up for a home user. Sure, for example 
on ArchLinux's wiki pages, there are tutorials on how to set EAP-TTLS etc. I 
don't even know what EAP-TTLS stands for.

Some of the links that I have surfed to are the following:

https://wiki.archlinux.org/title/Iwd
https://unix.stackexchange.com/questions/477488/connect-to-wifi-from-command-line-on-linux-systems-through-the-iwd-wireless-dae
https://docs.voidlinux.org/config/network/iwd.html



Re: Debian 11: Unable to detect wireless interface on an old laptop computer

2021-09-27 Thread Stella Ashburne
Hi David,

It's reassuring to know that you're still around and thanks for replying to my 
original post.

>
> And also any output from:
>
> # dmesg | grep iwl
>

username@hostname:~$ sudo dmesg|grep iwl
[sudo] password for username:
[9.169801] iwlwifi :07:00.0: enabling device ( -> 0002)
[9.170310] iwlwifi :07:00.0: firmware: failed to load 
iwlwifi-3160-17.ucode (-2)
[9.170402] iwlwifi :07:00.0: Direct firmware load for 
iwlwifi-3160-17.ucode failed with error -2
[9.170405] iwlwifi :07:00.0: iwlwifi-3160-17 is required
[9.170434] iwlwifi :07:00.0: check 
git://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git
username@hostname:~$

It's my terrible mistake. After installing the package firmware-iwlwifi, the 
command "ip link show" displayed the name of the wireless interface. (I thought 
I had installed firmware-iwlwifi on this machine but I was wrong. In fact I 
installed it on my sister's newer computer but not on this one.)



Re: Debian 11: Unable to detect wireless interface on an old laptop computer

2021-09-27 Thread Stella Ashburne


>
> This one looks like it might be your friend. AFAIK the firmware for that
> is in the firmware-iwlwifi package.
>
> What does `lsmod | grep iwl' say?

username@hostname:~$ lsmod|grep iwl
iwlwifi   294912  0
cfg80211  970752  1 iwlwifi
username@hostname:~$

But you are right. After installing the package firmware-iwlwifi, the command 
"ip link show" displays the name of the wireless interface. (I thought I had 
installed firmware-iwlwifi but I was wrong. In fact I installed it on my 
sister's newer computer but not on this one.)

Thanks for your reply.



Re: iwd: Using iwd to connect to a wireless network (Part 1 - Connection status show OK but unable to surf the net)

2021-09-29 Thread Stella Ashburne
Hi guys

Thanks for your replies.

> Sent: Wednesday, September 29, 2021 at 6:20 AM
> From: "Jude DaShiell" 
> To: "Dan Ritter" , "Stella Ashburne" 
> , "debian-user mailing list" 
> Subject: Re: iwd: Using iwd to connect to a wireless network (Part 1 - 
> Connection status show OK but unable to surf the net)
>
> Have you got:
> (setq gnutls-algorithm-priority "NORMAL:-VERS-TLS1.3")
> in your .emacs file?  The internet broke for emacs a while ago and this
> line fixed that problem.  It may also have done some other things as well.
>
>
What is the exact location of .emacs file?



Re: iwd: Using iwd to connect to a wireless network (Part 1 - Connection status show OK but unable to surf the net)

2021-09-29 Thread Stella Ashburne
Hi Dan

> Sent: Wednesday, September 29, 2021 at 9:30 PM
> From: "Dan Ritter" 
> To: "Stella Ashburne" 
> Cc: "debian-user mailing list" 
> Subject: Re: iwd: Using iwd to connect to a wireless network (Part 1 - 
> Connection status show OK but unable to surf the net)
>
>
> If that's correct configuration for iwd,

What did you mean by "correct configuration"? I based my .psk file on the 
sample provided by ArchLinux's wiki on iwd

> then it should assign
> 192.168.0.30.115 to wlan0 and
>
> ip addr show
>
> should show that assignation. Does it?
>
No, it doesn't.



Re: iwd: Using iwd to connect to a wireless network (Part 1 - Connection status show OK but unable to surf the net)

2021-09-29 Thread Stella Ashburne
Hi Dan

Thanks for your reply.

> Sent: Wednesday, September 29, 2021 at 4:45 AM
> From: "Dan Ritter" 
> To: "Stella Ashburne" 
> Cc: "debian-user mailing list" 
> Subject: Re: iwd: Using iwd to connect to a wireless network (Part 1 - 
> Connection status show OK but unable to surf the net)
>
>
> Try
>
> sudo dhclient wlan0
>
> and see if that gives you an IP and a default route, at which
> point  apt update should work.
>

I tried the command:

sudo dhclient wlan0

and no result (nothing) appeared.

May I refer you to the sub-section titled "Setting static IP address in network 
configuration" of ArchLinux' wiki on iwd (https://wiki.archlinux.org/title/Iwd).

My file whitecollar.psk located in /var/lib/iwd/ has the following contents:

[Security]
PreSharedKey=a long string of alphanumeric characters
Passphrase=aquickbrownfoxjumpsoverthelazydog

[IPv4]
Address=192.168.30.115
Netmask=255.255.255.0
Gateway=192.168.30.1
Broadcast=192.168.30.255
DNS=8.8.8.8

Please note that I have disabled IPv6 by adding the line

GRUB_CMDLINE_LINUX_DEFAULT="ipv6.disable=1 quiet"

to /etc/default/grub




iwd: Using iwd to connect to a wireless network (Part 2 - DNS managers)

2021-09-29 Thread Stella Ashburne
I refer to the sub-section "Select DNS manager" 
(https://wiki.archlinux.org/title/Iwd), in which the statement reads as follows:

At the moment, iwd supports two DNS managers - systemd-resolved and resolvconf

Question: Which of the above two manages my DNS queries in a default Debian 
with lxqt-core and lightdm?

In /etc/network/interfaces, my dns-servers are 8.8.8.8 1.1.1.1

[How do I manage to add only these two IP addresses? During installation of 
Debian 11, I unplugged the LAN cable from my machine. I installed the OS 
without any internet connection and thus avoided auto configuration of the 
network.]

I also installed the package resolvconf because I need to use it with openvpn.



Re: How do I mount the USB stick containing the installer in Rescue Mode?

2021-07-21 Thread Stella Ashburne
Hi Reco

Thanks for your help.

> Sent: Friday, July 16, 2021 at 5:09 AM
> From: "Reco" 
> To: debian-user@lists.debian.org
> Subject: Re: How do I mount the USB stick containing the installer in Rescue 
> Mode?
>
> > > What you actually need is to bind mount the directory with packages into
> > > the mounted /dev/perfect-vg/root, and just chroot into it. No need to
> > > modify /etc/fstab at all.
> > >
> > Could you be so nice as to give me the command(s) to bind mount the 
> > directory with packages? Thank you.
>
> mount --bind  \
>   /target/
>

Sorry, what's source_dir_with_packages ? Were you referring to /dev/sdb1 ?

By target_dir_where_packages_should_be, did you mean that I create a directory 
called stella (for example)?



Re: How do I mount the USB stick containing the installer in Rescue Mode?

2021-07-15 Thread Stella Ashburne
> Sent: Thursday, July 15, 2021 at 11:59 AM
> From: "Reco" 
> To: debian-user@lists.debian.org
> Subject: Re: How do I mount the USB stick containing the installer in Rescue 
> Mode?
>
> > Output of mount is
> >
> > root@perfect:/# mount
> > /dev/mapper/perfect--vg-root on / type ext4 (rw,relatime)
> > devtmpfs on /dev type devtmpfs 
> > (rw,relatime,size=8137669k,nr_inodes=2034417,mode=755)
> > proc on /proc type proc (rw,relatime)
> > sysfs on /sys type sysfs (rw,relatime)
> > tmpfs on /run type tmpfs (rw,nosuid,relatime,size=1629756k,mode=755)
> > root@perfect:/#
>
> And yet it fails to mount /dev/sdb1. Interesting.
>
I suppose the reason is that the USB stick is already mounted for booting into 
Rescue Mode.

> Ok, how about this (I'm assuming that the USB stick in question is
> plugged in):
>
Yes, it's always plugged in because I need it in Rescue Mode.

> lsblk
>
root@perfect:/# lsblk

NAME MAJ:MIN  RM   ROTYPEMOUNTPOINT
sda  8:0  00 disk
  sda1   8.1  00 part
  sda2   8:2  00 part
  sda3   8:3  00 part
sda3_crypt   253:000 crypt
  perfect--vg-swap   253:100 lvm
  perfect--vg-root   253:200 lvm /
sdb  8:16 10 disk
  sdb1   8:17 10 part
  sdb2   8:18 10 part
sr0  11:0 10 rom
root@perfect:/#

> fdisk -l /dev/sdb
>
root@perfect:/# fdisk -l /dev/sdb
Disk /dev/sdb

Device   BootStart End  SectorsSize  IdType
/dev/sdb1*   0 7677919  76779203.7G  0 Empty
/dev/sdb224260 294435184   2.5M  efEFI 
(FAT-12/16/32)
root@perfect:/#

> file -sL /dev/sdb1
>
root@perfect:/# file -sL /dev/sdb1
bash: file: command not found
root@perfect:/#


> ls -al /media/usbdisk
>
root@perfect:/# ls -al /media/usbdisk
ls: cannot access '/media/usbdisk' : No such file or directory

> mountpoint /media/usbdisk
>
root@perfect:/# mountpoint /media/usbdisk
mountpoint: /media/usbdisk : No such file or directory
root@perfect:/#



Re: How do I mount the USB stick containing the installer in Rescue Mode?

2021-07-15 Thread Stella Ashburne
> Sent: Thursday, July 15, 2021 at 3:49 PM
> From: "David Wright" 
> To: debian-user@lists.debian.org
> Subject: Re: How do I mount the USB stick containing the installer in Rescue 
> Mode?
>
> This
> might help the OP boot the system manually and recover the blue
> Grub menu.
>
That's very nice of you, David.



Re: How do I mount the USB stick containing the installer in Rescue Mode?

2021-07-15 Thread Stella Ashburne
Hi

> Sent: Thursday, July 15, 2021 at 7:07 PM
> From: "Reco" 
> To: debian-user@lists.debian.org
> Subject: Re: How do I mount the USB stick containing the installer in Rescue 
> Mode?

> Ok. Can you use this rescue mode to execute an ordinary shell, with full
> access to all filesystems?

Before I proceed with your suggestion, while in Resuce Mode, do I enter the 
encryption passphrase or not? If I don't enter the password, 
/dev/perfect-vg/root won't be mounted.

Even after I've entered the encryption passphrase, there are two ways to 
execute a shell: one is to execute it in /dev/perfect-vg/root environment and 
the other is to execute it in the installer environment. Which environment do 
you want me to executve a shell in please?

What did you mean by "full access to all filesystems"? When I was installing 
Debian 11, I first encrypted a free space with LUKS and then created two 
logical volumes in it: one whose mount point is / (the root file system. Debian 
installer requires it; otherwise the installation can't and won't proceed.) 
while the other is "used as" swap area.

> If you're using your USB stick to boot, you have its file system
> (/dev/sdb1 in this case) mounted.

That's a logical assumption because I needed the USB-installer to boot into 
Rescue Mode.

> If you're executing a shell in a
> logical volume, you're chrooted into that filesystem.

I had to enter the encryption passphrase first, followed by mounting 
/dev/perfect-vg/root as a root file system temporarily. Then I chose 'Execute a 
shell in the installer environment' and only then would I be able to chroot 
/target

> But it does not change that the filesystem from /dev/sdb1 is mounted
> already, it's just inaccessible from the chroot.
>
That's why I asked for help here.

> What you actually need is to bind mount the directory with packages into
> the mounted /dev/perfect-vg/root, and just chroot into it. No need to
> modify /etc/fstab at all.
>
Could you be so nice as to give me the command(s) to bind mount the directory 
with packages? Thank you.



Re: How do I mount the USB stick containing the installer in Rescue Mode?

2021-07-15 Thread Stella Ashburne
Hello Thomas

> Sent: Thursday, July 15, 2021 at 7:30 PM
> From: "Thomas Schmitt" 
> To: debian-user@lists.debian.org
> Subject: Re: How do I mount the USB stick containing the installer in Rescue 
> Mode?
>
> Well, since the case "already mounted" is quite outruled, it might be time
> to explore "mount point busy".
>
>   
> https://codesearch.debian.net/search?q=package%3Autil-linux+already+mounted+or+mount+point+busy
> shows that mount(8) emits this message if it gets error code EBUSY.
> It is not so clear from where this code comes, but mount(2) would be a
> fine candidate (or placeholder).

In Rescue Mode, it's impossible for me to install packages such as the one 
whose link you had provided.

>
> So does it work with some other, newly created directory instead of /mnt ?
>

No, it doesn't work with other newly created directories in addition to /mnt.

> Have a nice day :)
>
You too.
> Thomas
>
Stella



Re: How do I mount the USB stick containing the installer in Rescue Mode?

2021-07-15 Thread Stella Ashburne
Hi David

> Sent: Thursday, July 15, 2021 at 6:42 PM
> From: "David Wright" 
> To: debian-user@lists.debian.org
> Subject: Re: How do I mount the USB stick containing the installer in Rescue 
> Mode?
>
> That's right, it's the 16th deb to be installed at the main
> installation stage, but if you use the installer stick for
> rescue, I don't think it's installed early enough.
>
Based on the result of typing the 'file' command, it's appears that the package 
'file' isn't installed when one is using Rescue Mode.


> Chicken and egg: I think the OP is trying to set up some sort of
> repository to install packages from. (I can't be sure.

Your guess is right. I wish to install linux-image-5.10.0-7-amd64.deb onto 
chroot /target after entering Rescue Mode.

> I would
> have preferred it if they'd continued to try and boot their
> actual installed system,

At this moment I don't have a GRUB menu.

> but any help I might have given
> fell short because I have no experience with LVM.)

Oh..but you've helped me in other ways and for which I appreciate it very much.



Re: How do I mount the USB stick containing the installer in Rescue Mode?

2021-07-15 Thread Stella Ashburne
Hello David

> Sent: Thursday, July 15, 2021 at 7:08 PM
> From: "David Wright" 
> To: debian-user@lists.debian.org
> Subject: Re: How do I mount the USB stick containing the installer in Rescue 
> Mode?
>
>
> Best I can do. (And I see that your kernel's naming of sda/sdb
> is more stable than on at least a couple of my machines.)
>
What did you mean by "more stable"?

> It might be worth posting a request for the stanza I asked for,
> but as a new topic with a specific Subject line.

What "stanza" were you referring to? Was it Reco who posted it? And you wrote 
that it was posted some time in June?

> I can't see
> why you shouldn't be able to boot your system with manual Grub
> commands.

I thought so too. GRUB developers would and should have built a "Rescue Mode" 
by just entering the commands.



Re: How do I mount the USB stick containing the installer in Rescue Mode?

2021-07-15 Thread Stella Ashburne
> Sent: Thursday, July 15, 2021 at 6:26 PM
> From: "Brian" 
> To: debian-user@lists.debian.org
> Subject: Re: How do I mount the USB stick containing the installer in Rescue 
> Mode?
>
> On Thu 15 Jul 2021 at 20:01:05 +0200, Stella Ashburne wrote:
>
> > root@perfect:/# file -sL /dev/sdb1
> > bash: file: command not found
> > root@perfect:/#
>
Nope, apparently it isn't available in Rescue Mode.

Entered encryption passphrase -> Choose a device to use as root file system -> 
/dev/perfect-vg/root -> Execute a shell in /dev/perfect-vg/root


> File is a standard utilty. It should be on your system.

It isn't available in Rescue Mode.
>
>  apt install file
>
Unable to install now as I'm in Rescue Mode without an internet connection. The 
only way for me to install packages is to use the USB-installer (Debian 11) and 
I can't mount it.



Re: How do I mount the USB stick containing the installer in Rescue Mode?

2021-07-15 Thread Stella Ashburne
Hello David,

Nice to hear from you again.

> Sent: Thursday, July 15, 2021 at 4:05 PM
> From: "David Wright" 
> To: debian-user@lists.debian.org
> Subject: Re: How do I mount the USB stick containing the installer in Rescue 
> Mode?
>
> Presumably given as root.
>
A definite yes because I chose to mount /dev/perfect-vg/root as a root file 
system in Rescue Mode.

> > The error message is:
> >
> > mount: /media/myusb: /dev/sdb1 already mounted or mount point busy
>
> Type:
> $ ls -l /dev/disk/by-label/
> to see what the kernel called your stick. Debian installers have LABELs.

root@perfect:/# ls -l /dev/disk/by-label/
Total 0
lrwxrwxrwx 1 root root 10 Jul 15 17:00 'Debian\x20testing\x20amd64\x201' --> 
../../sdb1
root@perfect:/#

>
> > Below are the results of cat /etc/fstab
> >
> >  
> >  
> > /dev/mapper/perfect--vg-root   /  ext4 errors-remount-ro   
> > 0   1
> > /boot/efi was on /dev/sda1 during installation
>
> There's a # before that line
>
Which line please?

> > UUID=A30E-2C33/boot/efi vfatumask=0077  0  1
> > /dev/mapper/perfect--vg-swapnone   swapsw   0  0
> > /dev/sr0  /media/cdrom0 udf, iso9660 user, noauto   0  0
> > /media/myusb
>
> That line looks spurious. If you put it there, I would remove it for
> the time being.
>
Did you mean /media/myusb ?

> When you mount a USB stick as root, you don't need
> an entry in fstab, but you do need to create a mount point first.

I didn't know that I didn't need to create an entry in fstab if I mount a USB 
stick as root.

> Of course, this has been done for you as a convenience: there is
> a /mnt directory specifically for temporarily mounting a device.
>
root@perfect:/# mount /dev/sdb1 /mnt
mount: /mnt: /dev/sdb1 already mounted or mount point busy
root@perfect:/#





Re: How do I mount the USB stick containing the installer in Rescue Mode?

2021-07-27 Thread Stella Ashburne
I quote a section of the Debian's man page of mount:

The move operation
Move a mounted tree to another place (atomically). The call is:

mount --move olddir newdir

This will cause the contents which previously appeared under olddir to now be 
accessible under newdir. The physical location of the files is not changed. 
Note that olddir has to be a mountpoint.

What commands shall I type to find out the location of the directory where 
linux-image-5.10.0-7-amd64.deb is, given the fact that I'm using a 
USB-installer?

Do I need to use the --bind argument like

mount --bind --move olddir newdir



P.S.: I have never been a fan of using man pages because the commands contained 
therein don't provide examples of how to use them properly.



Re: location of screenshots during debian install

2021-07-27 Thread Stella Ashburne



> Sent: Tuesday, July 27, 2021 at 7:14 AM
> From: "Jupiter777" 
> To: debian-user@lists.debian.org
> Subject: location of screenshots during debian install
>
>
> Where are the screenshots?  I like to  use them for troubleshooting?
>

I'm sorry to ask you but have you googled the internet for answers before 
writing to this mailing list?

Based on my experience in asking for help here, Mr David Wright is the one guy 
who doesn't ask you refer to man pages. He's actually quite nice. There's only 
one guy who can match David in both helpfulness and a being a gentleman. You 
can find him in the OpenBSD forum.

And based on my experience as a beginner of all things Linux, man pages are not 
for those who don't have a foundation in computer science like e. The commands 
contained in them aren't accompanied by examples on how to use them. Sure, a 
brief description is given for each command. However, IMHO, it isn't enough to 
help me.

Best regards.

Stella



Re: Uninstalling a package removes other essential packages: What is the best course of action?

2022-02-15 Thread Stella Ashburne
Dearie,

Thanks for your reply.

> Sent: Tuesday, February 15, 2022 at 2:48 PM
> From: to...@tuxteam.de
> To: debian-user@lists.debian.org
> Subject: Re: Uninstalling a package removes other essential packages: What is 
> the best course of action?
>
>
> Please, hold your horses. Lack of knowledge sometimes might
> come across as "xenophobic" -- things sometimes clear themselves
> once knowledge grows. Give us people a chance to learn :-)
>
We have to make allowance for the fact that some people are quick to judge 
others

Best regards.

Stella



Under each of these scenarios, what is the neatest and simplest way to manipulate the /etc/network/interfaces file?

2022-03-18 Thread Stella Ashburne
Hi

There are instances in which my machine is connected to a mobile hotspot. And 
in some situations, it's connected to a smartphone via USB tethering. And when 
I'm in the office, I may connect it to a LAN cable.

Below are the contents of my /etc/network/interfaces file:

# This file describes the network interfaces available on your system
# and how to activate them. For more information, see interfaces(5).

source /etc/network/interfaces.d/*

# The loopback network interface
auto lo
iface lo inet loopback

# The primary network interface
#allow-hotplug enx61s07
#iface enx60a4b79d7f48 inet static
#   address 192.168.1.35/24
#   gateway 192.168.1.1
# dns-* options are implemented by the resolvconf package, if installed
#   dns-nameservers 1.1.1.1 8.8.8.8


# The primary network interface for USB tethering
allow-hotplug usb0
iface usb0 inet dhcp static
 address 192.168.42.35
 gateway 192.168.42.1
# dns-* options are implemented by the resolvconf package, if installed
 dns-nameservers 1.1.1.1 8.8.8.8

# The primary network interface for wireless connections
#allow-hotplug wlo1
#iface wlo1 inet dhcp static
# wpa-ssid Osia27
# wpa-psk string-of-alphanumberice-characters
# address 192.168.43.28
# gateway 192.168.43.1
# dns-nameservers 1.1.1.1 8.8.8.8

Questions:

1. At the moment, if I wish to change to using a mobile hotspot from USB 
tethering, I'll edit the /etc/network/interfaces file, uncomment the applicable 
lines under #The primary network interface for wireless connections and place a 
# in front of all the lines under #The primary network interface for USB 
tethering

Instead of carrying out the above steps, is there a neater and simpler way?

2. What is the command to type in a terminal after I have made changes to the 
/etc/network/interfaces file without rebooting my machine?

Best regards.

Stella



Re: Uninstalling a package removes other essential packages: What is the best course of action?

2022-02-12 Thread Stella Ashburne
Hello Dearie

I am happy to hear from you again and hope that everything's fine with you and 
your family.

> Sent: Sunday, February 13, 2022 at 6:23 AM
> From: "David" 
> To: "debian-user" 
> Subject: Re: Uninstalling a package removes other essential packages: What is 
> the best course of action?
>
>
> But, why do you care? There may be many packages installed
> that you will never notice that you will never use.
> Why pick on this one?
>
> libthai appears to not occupy much disk space:
>
>
> So there's hardly any win for the effort.
>

Indeed, you asked a very pertinent question.

"Why pick on this one?", you asked.

It just happens that this file was in my installed Debian. I have checked for 
other non-English files and found none other than Thai files.

"But, why do you care?" you wondered.

I care because I am worried that it may contain poorly designed code or 
backdoors that enable root privileges without my explicit intervention. Nobody 
has bothered to audit the Thai files that I mentioned for integrity and 
probable malicious activity.

> Alternatively, don't install lxqt-core. Only install what you want.
> Some ideas here:
>   https://wiki.debian.org/ReduceDebian
>
> Naturally this kind of thing takes time and effort which you may
> or may not find is worthwhile depending on your goals, and
> what you choose to spend productive time doing.
>
You're right. I don't have the time nor the intellectual capacity to customize 
my Debian setup. I'll just have to look for other ways to install a custom 
Debian without foreign-language files.



Re: Uninstalling a package removes other essential packages: What is the best course of action?

2022-02-12 Thread Stella Ashburne
Hello Dearie

> Sent: Sunday, February 13, 2022 at 8:34 AM
> From: "David Wright" 
> To: debian-user@lists.debian.org
> Subject: Re: Uninstalling a package removes other essential packages: What is 
> the best course of action?
>
>
> Installing those two would add 170 more packages to my system, so

OMG

>
>
> > What is the best course of action?
>
> Leave it. Worry about bigger issues than the odd library.
>
For all you know, the odd library which is this Thai file in question may 
contain poorly designed code, ill-intentioned designed code or backdoors that 
enable(s) root privileges without a user's direct intervention.

Best regards.

Stella



Re: Uninstalling a package removes other essential packages: What is the best course of action?

2022-02-16 Thread Stella Ashburne
Hello

> Sent: Wednesday, February 16, 2022 at 10:04 AM
> From: "The Wanderer" 
> To: debian-user@lists.debian.org
> Subject: Re: Uninstalling a package removes other essential packages: What is 
> the best course of action?
>
> What if someone sends you a document that has one or more words written
> in Thai? In order to be able to display that document correctly, the
> computer will need code that knows how to handle the Thai language.
> Whether that code is in libthai, or in a more general library, or
> embedded directly in whatever program it is that's reading the document,
> it's still there.
>
> Even if you can be sure you'll never have any reason to want to read a
> document that contains Thai, the same thing applies for every other
> language that doesn't just use the same character set, etc., as English.
> Most of them don't have sufficiently unusual and/or complex rules that
> they need a dedicated library to handle them, as Thai apparently does,
> but they do need something to handle whatever rules there may be.
>
So why not create libraries for Burmese, Laotian and Cambodian (Khmer) 
languages? Why don't we have libburmese, liblaotian and libkhmer and make them 
essential dependencies for libpango?

Best regards.

Stella



Re: What should I put inside the file called wlan0?

2022-02-28 Thread Stella Ashburne
Dearie

> Sent: Tuesday, March 01, 2022 at 4:20 AM
> From: to...@tuxteam.de
> To: debian-user@lists.debian.org
> Subject: Re: What should I put inside the file called wlan0?
>
>
> However, if I remember your original post correctly, there were security
> reasons mentioned (about a possibly world readable /etc/network/interfaces,
> and splitting out an .../interfaces.d/wlan0 as a fix), Note that by default
> (in Debian, at least) /etc/network/interfaces is only root-readable. So
> this wouldn't be the reason you'd want to do the split (there are other
> valid reasons, though).
>
According to Debian Wiki WiFi How To Use 
(https://wiki.debian.org/WiFi/HowToUse), the reason for doing the split is:

(sic) Restrict the permissions of /etc/network/interfaces, to prevent 
pre-shared key (PSK) disclosure

Best regards.

Stella



Re: What should I put inside the file called wlan0?

2022-02-28 Thread Stella Ashburne
Dearie

> Sent: Tuesday, March 01, 2022 at 4:21 AM
> From: to...@tuxteam.de
> To: debian-user@lists.debian.org
> Subject: Re: What should I put inside the file called wlan0?
>
> On Mon, Feb 28, 2022 at 09:20:07PM +0100, to...@tuxteam.de wrote:
>
> [...]
>
> > (in Debian, at least) /etc/network/interfaces is only root-readable. So
>
If that's the case, why would Debian Wiki recommend to chmod as follows?

# chmod 0600 /etc/network/interfaces

(source: https://wiki.debian.org/WiFi/HowToUse)

Best regards.

Stella



Re: What should I put inside the file called wlan0?

2022-02-28 Thread Stella Ashburne
Dearie,

> Sent: Tuesday, March 01, 2022 at 4:08 AM
> From: "Brian" 
> To: debian-user@lists.debian.org
> Subject: Re: What should I put inside the file called wlan0?
>
>
> You do not want just anyone to read /etc/network/interfaces?
>
>   chmod 600 /etc/network/interfaces
>
That's the recommended step in said Wiki.

What's the default chmod value of /etc/network/interfaces?

Best regards.

Stella



Re: What should I put inside the file called wlan0?

2022-02-28 Thread Stella Ashburne
Dearie,

Thanks for your reply.

> Sent: Tuesday, March 01, 2022 at 3:10 AM
> From: to...@tuxteam.de
> To: debian-user@lists.debian.org
> Subject: Re: What should I put inside the file called wlan0?
>
>
> So if you have this in your /etc/network/interfaces somewhere:
>
>   ...
>   ## Bahn ICE
>   iface wlan0 inet dhcp
> wireless-essid WIFIonICE
> wireless-mode Auto
>   ...
>
> (it's actually my current setting, BTW :) you could swap that
> out to some file under interfaces.d.

The contents of my current /etc/network/interfaces file are:

# The primary network interface
allow-hotplug wlp3s0
iface wlp7s0 inet static
wpa-ssid JupiterRising
wpa-psk {a long string of alphanumeric characters}
address 192.168.1.99/24
gateway 192.168.1.1
# dns-* options are implemented by the resolvconf package, if installed
dns-nameservers 1.1.1.1 8.8.8.8

Are you saying that I can cut out the above contents and paste them into a file 
called wlp7s0 (whose path is /etc/network/interfaces.d/)?

Best regards.

Stella




Re: Authentication failed after su-

2022-02-28 Thread Stella Ashburne
Dearie

Thanks for your offer of help; however.

> Sent: Tuesday, March 01, 2022 at 3:10 AM
> From: "Andrew M.A. Cater" 
> To: debian-user@lists.debian.org
> Subject: Re: Authentication failed after su-
>
>
> If you use sudo: prefix the above command with sudo
>
> It may be that you need
>
> su - -l -c "rest of the line"
>
> su alone doesn't always get you root equivalent: the default changed a while
> ago now so su - is needed.

Firstly, I tried the command:

sudo su - -l -c "rest of the line"

It didn't work

Next, I tried:

sudo su- -l -c "rest of the line"

It didn't work either

On the third try, I typed:

sudo -i

followed by "rest of the line" (I ignored -l -c because if I included them, the 
"rest of the line" wouldn't be executed. Besides I don't know what the 
arguments -l -c stand for.)

Alternatively, one could type:

sudo su


Best regards.

Stella



Re: Authentication failed after su-

2022-02-28 Thread Stella Ashburne
Dearie

> Sent: Tuesday, March 01, 2022 at 5:09 AM
> From: "Dan Ritter" 
> To: "Stella Ashburne" 
> Cc: debian-user@lists.debian.org
> Subject: Re: Authentication failed after su-
>
> Stella Ashburne wrote:
> > sudo su - -l -c "rest of the line"
> >
> > It didn't work
>
> Copy and paste the actual error; they contain real information
> to help us figure out what is happening.
>

To avoid confusion, I shall use the original example provided by Debian Wiki 
(https://wiki.debian.org/WiFi/HowToUse) which is:

su -l -c "wpa_passphrase myssid my_very_secret_passphrase > 
/etc/wpa_supplicant/wpa_supplicant.conf"

In a terminal, I typed:

username@hostname:~$ su -l -c "wpa_passphrase JupiterRising 1234567890 > 
/etc/wpa_supplicant/wpa_supplicant.conf"
Password:
su: Authentication failure

The output is Authentication failure

Best regards.

Stella



Re: Authentication failed after su-

2022-02-28 Thread Stella Ashburne
Dearie

> Sent: Tuesday, March 01, 2022 at 7:13 AM
> From: "Dan Ritter" 
> To: "Stella Ashburne" 
> Cc: debian-user@lists.debian.org
> Subject: Re: Authentication failed after su-
>
> >
> > In a terminal, I typed:
> >
> > username@hostname:~$ su -l -c "wpa_passphrase JupiterRising 1234567890 > 
> > /etc/wpa_supplicant/wpa_supplicant.conf"
> > Password:
> > su: Authentication failure
>
> That means that you failed to give the root password.
>
I disabled the root password during the process of installing Debian 11.

What should I do to resolve the issue?

Best regards.

Stella



Re: Authentication failed after su-

2022-02-28 Thread Stella Ashburne
Dearie

> Sent: Tuesday, March 01, 2022 at 5:47 AM
> From: "Bob McGowan" 
> To: debian-user@lists.debian.org
> Subject: Re: Authentication failed after su-
>
> On 2/28/22 13:09, Dan Ritter wrote:
> > sudo su - -l -c "rest of the line"
> 
> Some comments on this, without knowing just how it failed:
> 
> 1.  There is no reason I can see to using both 'sudo' and 'su' 
> together.  By default, they both let you run a command as the root user.
> 
Thanks for the clarification.

> 2.  Using both '-' and '-l' with su is redundant, they do almost (per 
> the man page) the same thing.  The man page suggests '-l' is better due 
> to reduced side effects.
> 
I wonder what "side effects" they may be.

> 3.  The -c option provides a means to tell su to run a specific 
> command.  So the string 'rest of the line' generates an error stating 
> 'command not found' if run as is.  You need to supply this part of the 
> line so processing can be duplicated and evaluated.
> 
Thanks once again.

> If I insert an 'echo' before the word 'rest', there is no error.
> 
Noted.

> Hence, the actual error is needed, as well as the actual command being run.
> 
The actual command is actually lifted from Debian Wiki 
(https://wiki.debian.org/WiFi/HowToUse). It is:

su -l -c "wpa_passphrase myssid my_very_secret_passphrase > 
/etc/wpa_supplicant/wpa_supplicant.conf"

In a terminal, I typed:

username@hostname:~$ su -l -c "wpa_passphrase JupiterRising 1234567890 > 
/etc/wpa_supplicant/wpa_supplicant.conf"
Password: 
su: Authentication failure
username@hostname:~$

The error message is Authentication failure.

Please note that I have chosen not to create a root password during the process 
of installing Debian 11.

Best regards.

Stella



What should I put inside the file called wlan0?

2022-02-28 Thread Stella Ashburne
I quote from Debian Wiki (https://wiki.debian.org/WiFi/HowToUse) :

"Restrict the permissions of /etc/network/interfaces, to prevent pre-shared key 
(PSK) disclosure (alternatively use a separate config file such as 
/etc/network/interfaces.d/wlan0 on newer Debian versions): "

What should I put in the file called wlan0? Said wiki does not provide examples.

Best regards.

Stella



  1   2   >