Re: How do I permanently disable unattended downloads of software/security updates?
I had already done that long before I posted my original question in this mailing list. > Sent: Wednesday, May 26, 2021 at 9:50 AM > From: "Jeremy Ardley" > To: debian-user@lists.debian.org > Subject: Re: How do I permanently disable unattended downloads of > software/security updates? > > > On 26/5/21 9:38 am, Stella Ashburne wrote: > > Thanks for your reply, Keith. > > > > I'm sorry if my original question is ambiguous. > > > > Here's what I wish to happen: > > > > 1. My OS stops downloading software and security updates silently in the > > background. It's called automatic downloads, am I right? I wish it to stop. > > 2. Debian stops giving me notifications that there are software updates > available for download. > > > > I have removed/deleted 50unattended-upgrades. It's obvious that such an > action hasn't achieved its goals; hence my original post. > > > > > In my system using the GUI I have System/Control Centre If I open that I > see 'Software and Updates' > > On the updates tab I have none of the option boxes ticked. > > The system pops up warnings on the GUI but no automatic download and > install > > -- > Jeremy > >
Re: How do I permanently disable unattended downloads of software/security updates?
Thanks for your reply, Keith. I'm sorry if my original question is ambiguous. Here's what I wish to happen: 1. My OS stops downloading software and security updates silently in the background. It's called automatic downloads, am I right? I wish it to stop. 2. Debian stops giving me notifications that there are software updates available for download. I have removed/deleted 50unattended-upgrades. It's obvious that such an action hasn't achieved its goals; hence my original post. > Sent: Wednesday, May 26, 2021 at 7:24 AM > From: "Keith Bainbridge" > To: "Stella Ashburne" > Cc: "Kenneth Parker" , "Debian Users" > > Subject: Re: How do I permanently disable unattended downloads of > software/security updates? > > > On Tue, 25 May 2021 22:48:06 +0200 Stella Ashburne > wrote: > > >>And yes, I manually perform "sudo apt update" and "sudo apt upgrade" > >>about twice a day. > > > > Good Morning Stella > > If you are upgrading this often, why not get the bulk of the packages > downloaded ready to install? I do that much via cron. > > Or did the original question imply that the background operation is > also installing the new packages? That I would want stopped, and is > probably why I have not investigated auto upgrades. > > Maybe I'm missing something else. > > > > All the best > > Keith Bainbridge > > keith.bainbridge.3...@gmail.com > 0447 667 468 > >
Re: How do I permanently disable unattended downloads of software/security updates?
Hello, Thanks for your help and time. I really appreciate it. > Sent: Friday, May 28, 2021 at 8:06 PM > From: "Greg Wooledge" > To: debian-user@lists.debian.org > Subject: Re: How do I permanently disable unattended downloads of > software/security updates? > > More likely, it was brought in as a recommendation by some desktop > environment. One may use "aptitude why unattended-upgrades" to find > out why it was installed, or more properly, why it's not being marked > for autoremoval at the current moment. I'm very certain that I didn't install it manually. In fact, during installation of Debian, I specifically chose the option to not upgrade/update software automatically. The package "unattended-upgrades" might have been installed automatically because I installed a minimal Gnome desktop environment (I quite like using Gnome.) Question: Instead of using "aptitude why unattended-upgrades" command, can I use "apt why unattended-upgrades"? I was told many years ago that the command "aptitude" was deprecated. > However, if the package is marked as a *dependency* of some desktop > environment, rather than simply a recommendation, then purging the > undesired package may also try to remove the desktop environment > metapackage. And some people panic when that happens, because they > don't understand that a metapackage is not critically important. Question: What command can I type in a terminal to find out if the package "unattended-upgrades" is a *dependency* of some other packages? Yeah, I do panic when any metapackage of my Gnome desktop environment is removed. Why? My knowledge of computing and Debian is elementary. Question: What do you mean by "a metapackage is not critically important"? Would you like to elaborate please? > > (And then it gets even more complicated when you consider autoremove, > because removing the placeholder metapackage may free up various other > pieces of the desktop environment -- ones that actually *do* something -- > to be marked for autoremoval. And that's not desired.) Thanks for your explanation. > > (Personally I solve all of that by disabling autoremoval. But that's > just me, and most people seem to like it.) I wish to improve my knowledge of computing. How do I disable autoremove? What is the command to be typed in a terminal?
Re: How do I permanently disable unattended downloads of software/security updates?
Hello, Thanks for your help and time. I really appreciate it. > Sent: Saturday, May 29, 2021 at 2:51 AM > From: "Greg Wooledge" > To: debian-user@lists.debian.org > Subject: Re: How do I permanently disable unattended downloads of > software/security updates? > > > Question: What do you mean by "a metapackage is not critically important"? > > Would you like to elaborate please? > > Take a look at "apt show gnome", for example. > > On bullseye, on my platform, the package "gnome" (which is a metapackage) > has an Installed-Size of 35.8 kB. It doesn't contain any software. All > it really contains are Depends: and Recommends: and Suggests: lines. If > you install this package, it will bring in a whole bunch of new packages > (unless you already installed GNOME, in which case it may do nothing). > > Once all of those packages are installed, you can go ahead and remove > the package named "gnome". It doesn't do anything. It's just a metapackage. Thank you for explaining why a metapackage is not critically important. I'm a bit wiser now :) > Well... OK, I'll tell you how I did it. It's easily reversible, so it > won't hurt you. > > I did it by creating the file /etc/apt/apt.conf.d/99local with the > following content (one line): > > APT::NeverAutoRemove "."; > > What this configuration file does is define a regular expression that > matches every package, and then tells apt never to autoremove any package > that matches that regular expression. > > If you want to go back to normal, simply remove that file. Thank you very much for your example. Best wishes.
Re: How do I permanently disable unattended downloads of software/security updates?
Hello, > Sent: Friday, May 28, 2021 at 7:43 PM > From: l0f...@tuta.io > To: "Debian User" > Subject: Re: How do I permanently disable unattended downloads of > software/security updates? > > > unattended-upgrades is not installed by default, so you installed that > package at some point because you were interested in applying upgrades > automatically. I'm sorry but your understanding is incorrect. I'm sure I've never installed it at any point in the course of using Debisn. I remember very clearly that when I first installed Debian on my machine, I did specify that I didn't want automatic upgrades. > Now, you are not interested anymore. So you have chosen to delete the > configuration file /etc/apt/apt.conf.d/50unattended-upgrades and disabled the > systemd service unattended-upgrades. I've never wanted upgrades/updates to be automatic. > No I don't have it, it's installed with the optional package > "unattended-upgrades". I'm very certain that I didn't install the package "unattended-upgrades". My knowledge of computing and Debian is elementary so much so that I'd never install packages that seem weird or alien to me. > > Strictly speaking, /etc/apt/apt.conf.d/50unattended-upgrades is a file, not a > package. > A package is a combination of files provided for your Debian distribution. > I just wanted to make sure you didn't talk about removing the > "unattended-upgrades" package. Thanks for your explanation. > > By the way, I think you should not have deleted that file. That's somewhat > dirty. I still have that file because I'd moved it to my removable backup drive. Should I restore it? What do you think? > If you want to make a pause with a package, just stop it and disable it (or > tweak the configuration file so there is no real action processed). Just so you know, my knowledge of Debian and computing is basic/elementary (meaning, I don't know how to tweak configuration files...). > > If you are sure not to use some optional package, then remove or even purge > it. You suggest that I purge the optional package "unattended-upgrades" What happens if that package is a dependency of some other packages? What commands can I type to show that the package "unattended=upgrades" is or isn't a dependency of some other packages? Thanks for your help and time. I really appreciate it. Best regards.
Re: How do I permanently disable unattended downloads of software/security updates?
Hi Thanks for your help and time. I really appreciate it. > Sent: Friday, May 28, 2021 at 8:05 PM > From: l0f...@tuta.io > To: "Debian User" > Subject: Re: How do I permanently disable unattended downloads of > software/security updates? > > Correction: I meant if you still have updates/upgrades, then it shouldn't be > because of package unattended-upgrades. So you would have to dig somewhere > else... Oh my God, are you telling me that we are not done with this "whatever thing you may call it"? I thought I could close this matter..lol Based on your vast experience of using Linux in general and Debian in particular, can you think of any other packages or files that could download software and security updates silently in the background? Best regards.
Re: How do I permanently disable unattended downloads of software/security updates?
Hi Thanks for your help and time. I really appreciate it. > Sent: Wednesday, June 02, 2021 at 7:49 PM > From: l0f...@tuta.io > To: "Debian User" > Subject: Re: How do I permanently disable unattended downloads of > software/security updates? > > What about the following commands? > > cat /etc/anacrontab > systemctl list-timers > Output of cat /etc/anacrontab # /etc/anacrontab: configuration file for anacron # See anacron(8) and anacrontab(5) for details. SHELL=/bin/sh PATH=/usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin HOME=/root LOGNAME=root # These replace cron's entries 1 5 cron.daily run-parts --report /etc/cron.daily 7 10 cron.weekly run-parts --report /etc/cron.weekly @monthly15 cron.monthlyrun-parts --report /etc/cron.monthly Output of systemctl list-timers NEXT LEFT LAST PASSED Wed 2021-06-02 16:24:55 GMT 4min 34s left n/a n/a Thu 2021-06-03 00:00:00 GMT 7h left Wed 2021-06-02 16:10:36 GMT 9min ago Thu 2021-06-03 00:00:00 GMT 7h left Wed 2021-06-02 16:10:36 GMT 9min ago Thu 2021-06-03 00:39:22 GMT 8h left Wed 2021-06-02 16:10:36 GMT 9min ago Thu 2021-06-03 06:40:44 GMT 14h left Wed 2021-06-02 07:43:04 GMT 8h ago Thu 2021-06-03 07:30:43 GMT 15h left Thu 2021-06-03 00:10:06 GMT 7h left 6 timers listed. Pass --all to see loaded but inactive timers, too.
Re: How do I permanently disable unattended downloads of software/security updates?
Hi Thanks for your help and time. I really appreciate it. > Sent: Wednesday, June 02, 2021 at 3:01 PM > From: l0f...@tuta.io > To: "Debian User" > Subject: Re: How do I permanently disable unattended downloads of > software/security updates? > > NB: You do not need `sudo` here. > Noted. > Can you provide us with the output of the following commands? > Output of crontab -l No crontab for username Output of sudo crontab -l No crontab for root Output of cat /etc/crontab # /etc/crontab: system-wide crontab # Unlike any other crontab you don't have to run the `crontab' # command to install the new version when you edit this file # and files in /etc/cron.d. These files also have username fields, # that none of the other crontabs do. SHELL=/bin/sh PATH=/usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin # Example of job definition: # . minute (0 - 59) # | .- hour (0 - 23) # | | .-- day of month (1 - 31) # | | | .--- month (1 - 12) OR jan,feb,mar,apr ... # | | | | . day of week (0 - 6) (Sunday=0 or 7) OR sun,mon,tue,wed,thu,fri,sat # | | | | | # * * * * * user-name command to be executed 17 ** * * rootcd / && run-parts --report /etc/cron.hourly 25 6* * * roottest -x /usr/sbin/anacron || ( cd / && run-parts --report /etc/cron.daily ) 47 6* * 7 roottest -x /usr/sbin/anacron || ( cd / && run-parts --report /etc/cron.weekly ) 52 61 * * roottest -x /usr/sbin/anacron || ( cd / && run-parts --report /etc/cron.monthly ) # Output of ls -l /etc/cron.* /etc/cron.d: total 4 -rw-r--r-- 1 root root 285 May 19 2019 anacron /etc/cron.daily: total 32 -rwxr-xr-x 1 root root 311 May 19 2019 0anacron -rwxr-xr-x 1 root root 1478 May 12 2020 apt-compat -rwxr-xr-x 1 root root 355 Dec 29 2017 bsdmainutils -rwxr-xr-x 1 root root 384 Dec 31 2018 cracklib-runtime -rwxr-xr-x 1 root root 1187 Apr 19 2019 dpkg -rwxr-xr-x 1 root root 377 Aug 28 2018 logrotate -rwxr-xr-x 1 root root 1123 Feb 10 2019 man-db -rwxr-xr-x 1 root root 249 Sep 27 2017 passwd /etc/cron.hourly: total 0 /etc/cron.monthly: total 4 -rwxr-xr-x 1 root root 313 May 19 2019 0anacron /etc/cron.weekly: total 8 -rwxr-xr-x 1 root root 312 May 19 2019 0anacron -rwxr-xr-x 1 root root 813 Feb 10 2019 man-db Output of dpkg -l | grep -i apt ii apt 1.8.2.3 amd64commandline package manager ii apt-config-icons 0.12.5-1 all APT configuration snippet to enable icon downloads ii apt-listchanges 3.19 all package change history notification tool ii apt-utils 1.8.2.3 amd64package management related utility programs ii laptop-detect 0.16 all system chassis type checker ii libapt-inst2.0:amd64 1.8.2.3 amd64deb package format runtime library ii libapt-pkg5.0:amd64 1.8.2.3 amd64package management runtime library ii libatk-adaptor:amd64 2.30.0-5 amd64AT-SPI 2 toolkit bridge ii libmjpegutils-2.1-0 1:2.1.0+debian-5 amd64MJPEG capture/editing/replay and MPEG encoding toolset (library) ii libmpeg2encpp-2.1-0 1:2.1.0+debian-5 amd64MJPEG capture/editing/replay and MPEG encoding toolset (library) ii libmplex2-2.1-0 1:2.1.0+debian-5 amd64MJPEG capture/editing/replay and MPEG encoding toolset (library) ii libopencore-amrnb0:amd64 0.1.3-2.1+b2 amd64Adaptive Multi Rate speech codec - shared library ii libopencore-amrwb0:amd64 0.1.3-2.1+b2 amd64Adaptive Multi-Rate - Wideband speech codec - shared library ii libpcap0.8:amd64 1.8.1-6 amd64system interface for user-level packet capture ii python-apt-common 1.8.4.3 all Python interface to libapt-pkg (locales) ii python3-apt 1.8.4.3 amd64Python 3 interface to libapt-pkg ii synaptic 0.84.6 amd64Graphical package manager ii task-laptop 3.53 all laptop
Re: How do I permanently disable unattended downloads of software/security updates?
Hello Andrei Thank you for your advice and time. I really appreciate it. > Sent: Saturday, May 29, 2021 at 2:49 PM > From: "Andrei POPESCU" > To: debian-user@lists.debian.org > Subject: Re: How do I permanently disable unattended downloads of > software/security updates? > > Removing files belonging to a package is typically frowned upon, as this > can under specific circumstances be like pulling the rug from underneath > a package (or worse, APT/dpkg). Oops. I removed/deleted the file 50unattended-upgrades located in /etc/apt/apt.conf.d/ > > In the case of configuration files (basically everything that is under > /etc and a few other places) it can cause unexpected or even unsafe > behaviour as the software might revert to built-in defaults that could > be wrong for your system. I suppose 50unattended-upgrades is a configuration file? Best regards.
Re: How do I permanently disable unattended downloads of software/security updates?
Hi Greg, > Sent: Saturday, May 29, 2021 at 8:58 PM > From: "Greg Wooledge" > To: debian-user@lists.debian.org > Subject: Re: How do I permanently disable unattended downloads of > software/security updates? > > tasksel will also perform an autoremove for you without asking you. > It was after this happened to me that I investigated how to disable > apt's autoremove feature. > Thanks for your observation about tasksel and autoremove. About the only time that I encountered tasksel was during the installation of Debian. Since you mentioned tasksel in your reply, how do you invoke tasksel? Do you just type tasksel in a terminal?
Re: How do I permanently disable unattended downloads of software/security updates?
Hi Andrei > Sent: Saturday, May 29, 2021 at 3:06 PM > From: "Andrei POPESCU" > To: debian-user@lists.debian.org > Subject: Re: How do I permanently disable unattended downloads of > software/security updates? > > aptitude was deprecated for some very specific uses only (in particular > dist-upgrades), not because it couldn't do them, but because APT found > better solutions. It also didn't help that development of aptitude was > stopped for a while. Yeah, I remember somewhat clearly that someone in www.reddit.com/r/debian advised me to use "sudo apt upgrade" instead of aptitude because with the former, I can see the green-colored progress bar during the installation of packages. > > In this particular case, apt doesn't have a 'why' command, hence the > suggestion to use aptitude instead. > Thanks for your advice and time. I really appreciate it. Best regards.
Re: How do I permanently disable unattended downloads of software/security updates?
Hi > Sent: Sunday, May 30, 2021 at 7:00 PM > From: to...@tuxteam.de > To: "Stella Ashburne" > Cc: "Greg Wooledge" , debian-user@lists.debian.org > Subject: Re: How do I permanently disable unattended downloads of > software/security updates? > > Not Greg here, but... yes, you can do that. And there's even a man > page :) Thanks for your reply. Best wishes.
Re: How do I permanently disable unattended downloads of software/security updates?
Hi Thanks for your help and time. I really appreciate it. > Sent: Saturday, May 29, 2021 at 5:29 PM > From: l0f...@tuta.io > To: "Debian User" > Subject: Re: How do I permanently disable unattended downloads of > software/security updates? > > NB: You can still filter `apt-cache rdepends` results with some other > switches like `--no-pre-depends`, `--no-recommends`, `--no-suggests`, > `--no-conflicts`, `--no-breaks`, `--no-replaces` and `--no-enhances`. Thanks for the above tip. Can I do something like the following using your above filters? sudo apt rdepends --no-recommends sudo apt rdepends --no-suggests > > As said Socrates: "I know that I do not know.". It happens everyday for me ;p > I think you're being modest. You know so much more than me. > Back to your question, here are other suggestions I can think about: > * cron-apt > * apticron (its goal is only to send notifications by emails but it certainly > triggers `apt update` to do that. So maybe this update triggers some other > things from your side as well, like widgets...) > * widgets/applets for your favorite desktop environment (I can't help you, I > don't use any...) My knowledge of computing, Linux and Debian is elementary and hence I won't know how to set up a cron-apt or use apticron. Question: Is it a prerequisite (pre-condition) that to set up a cron job to download updates at a fixed time every day, the OS must have the installed package "unattended-upgrades"? > > NB: If not explicitely mentioned by a debian-user poster, most of the time > (s)he is a subscriber of this mailing-list. At least I am, so you can omit my > email address in each of your answers (I'm currently receiving all your > emails twice) ;) > I apologize if I have caused inconvenience to you and shall remember to remove your email address when I reply to yours. Best regards.
Re: How do I permanently disable unattended downloads of software/security updates?
Hi > Sent: Friday, May 28, 2021 at 4:09 AM > From: l0f...@tuta.io > To: "Debian User" > Subject: Re: How do I permanently disable unattended downloads of > software/security updates? > > What you call "package" is actually a simple file right? Yes, it is a file that contains a lot of programming code or what you would call scripting language. The default path is /etc/apt/apt.conf.d/. I guess every one who installs Debian 10.9 should have it too, yourself included. > But the service is still currently running right? I don't know how to answer your question because my knowledge of computing and Linux is basic/elementary. > systemctl status unattended-upgrades Below is the result: unattended-upgrades.service - Unattended Upgrades Shutdown Loaded: loaded (/lib/systemd/system/unattended-upgrades.service; disabled; ve Active: inactive (dead) Docs: man:unattended-upgrade(8) > Can you provide us with the following command results? > > cat /etc/apt/apt.conf.d/10periodic Below is the result of cat /etc/apt/apt.conf.d/10periodic APT::Periodic::Download-Upgradeable-Packages "0"; APT::Periodic::Unattended-Upgrade "0"; > cat /etc/apt/apt.conf.d/00aptitude Below is the result of cat /etc/apt/apt.conf.d/00aptitude Aptitude::Get-Root-Command "sudo:/usr/bin/sudo"; > You confirm that you never ran something like the following? > > sudo apt remove unattended-upgrades > sudo apt purge unattended-upgrades Yes, I confirm that I have never issued the following one of two commands, viz.: sudo apt remove unattended-upgrades sudo apt purge unattended-upgrades The reason is that I find it too drastic a step. I chose to disable by doing sudo systemctl disable unattended-upgrades. I did delete the package called 50unattended-upgrades (as mentioned in my original post.) > What give you the next commands please? > > apt-config dump | grep -i unatt Below is the result of apt-config dump | grep -i unatt APT::Periodic::Unattended-Upgrade "0"; > apt-config dump | grep -i APT::Periodic Below is the result of apt-config dump | grep -i APT::Periodic APT::Periodic ""; APT::Periodic::Download-Upgradeable-Packages "0"; APT::Periodic::Unattended-Upgrade "0"; > NB: Have you rebooted and observed the same behavior since your posts? After rebooting, I have no opportunity to observe the same behavior since my posts because there are no software/security updates that are relevant to my Debian system at the time of writing this email. Based on my past experience, Debian only downloads software/security updates for my kernel and the installed packages. The installed packages on my system are minimal. I'll have to wait patiently for the next software/security updates for my installed packages. Thank you for your time and help. I really appreciate it. Best regards.
Re: How do I permanently disable unattended downloads of software/security updates?
Hi Reco Thanks for your help and time. I really appreciate it. > Sent: Thursday, June 03, 2021 at 12:33 AM > From: "Reco" > To: debian-user@lists.debian.org > Subject: Re: How do I permanently disable unattended downloads of > software/security updates? > > The most important parts of "systemctl list-timers" (your problem > considered) are UNIT and ACTIVATES columns, and your result lacks them > for some reason. > What does "your result lacks them for some reason" mean? Could you elaborate it please? Stella
Re: How do I permanently disable unattended downloads of software/security updates?
Hi Tom Thanks for your help and time. I really appreciate it. Sent: Thursday, June 03, 2021 at 3:53 AM From: "Tom Browder" To: "Stella Ashburne" Cc: debian-user@lists.debian.org Subject: Re: How do I permanently disable unattended downloads of software/security updates? How did you get the installation originally? Was it from a fresh install of Buster or an upgrade from 9 or older version? -Tom It was a fresh installation. I never do upgrades from Debian Stretch (a.k.a. version 9) and always choose Expert Install (without GUI). On a different topic, I noticed that you composed your email with HTML formatting. I didn't know it is allowed by Debian User Mailing List. I remember a few years ago, if one were to send an email to said mailing list, the former would never be published. At that time, all emails must be in plain text format. When did said mailing list accept emails that are HTML formatted?
Re: [Openvpn-users] surf the internet through openvpn
Hi guys, This mailing list is for discussions concerning Debian. For discussions on specific topics such as openvpn, please post your questions on https://forums.openvpn.net/ or https://www.reddit.com/r/OpenVPN/ Sent: Saturday, June 05, 2021 at 7:04 AM From: "Bonno Bloksma" To: "debian-user list" Cc: "Fermin Francisco" Subject: Re: [Openvpn-users] surf the internet through openvpn Please keep the discussion on the list. And sorry for top posting, this client refuses todo otherwise :-( Make sure traffic coming from the openvpn client can indeed access the internet, test with ping. If that does not work solve that problem first. Look at routing and NAT on your openvpn server. Once that works try what happens with a browser, go to whatismyip.com or a similar website. The client ip the website sees should the ip of your openvpn server. If ping works but http(s) does not you probably have a firewall issue. If that works then SMTP should work as well as long as the receiving server has no problem with the discrepency in the ip number, hostname and PTR record. Bonno Bloksma (mobile) Op 4 jun. 2021 om 22:01 heeft Fermin Francisco het volgende geschreven: Hi! My problems are two: After I putted the push "redirect-gateway local def1" in server conf file. 1. OpenVPN Linux's clients can't surf into the internet (Windows clients can surf into the internet), but can connect to remote software. 2. SMTP cannot worked (Thunderbird). Sorry, my english is not good. José Fermín Francisco Ferreras Registered User #579535 (LinuxCounter.net) El viernes, 4 de junio de 2021 02:05:40 a. m. AST, Bonno Bloksma escribió: Hello > How can I make openvpn clients (Linux clients) surf the internet through > openvpn using the public ip of the openvpn server The client config should contain the line redirect-gateway local def1 This will let OpenVpn add some lines to you routing table that make sure that: - your client can still reach the OpenVPN server via the normal internet connection. - All other traffic will leave the client via the openVPN tunnel. Make sure the routing on your openVPN server and your firewall are set up correctly. >(the openvpn server is on Windows)? And also that emails using Thunderbird can >work with this method (that emails can enter and leave without problems). This is just routing via another node, it has no influence on the protocol as the client still initiates all traffic sessions. Ps. If you want you can push the line from the servers if you want to have it configures on all clients. Bonno Bloksma
Re: How do I permanently disable unattended downloads of software/security updates?
Hi Thomas Thank you for your help and time. I really appreciate it. > Sent: Friday, June 04, 2021 at 10:23 AM > From: "Thomas D. Dean" > To: debian-user@lists.debian.org > Subject: Re: How do I permanently disable unattended downloads of > software/security updates? > > I have the same problem. OK, but do you use Ubuntu or Debian or both? > > I saw this in: https://askubuntu.com/questions/1038923 > > sudo systemctl disable apt-daily.service > sudo systemctl disable apt-daily.timer > > sudo systemctl disable apt-daily-upgrade.timer > sudo systemctl disable apt-daily-upgrade.service > A poster named l0f...@tuta.io replied to me via this mailing list yesterday and below is what he wrote (verbatim): "Cannot remember if you have Gnome installed but you should have a look at https://unix.stackexchange.com/a/594287, especially ALL the associated comments (click on "Show 7 more comments")." When I did a *fresh* minimal install of Debian about two years ago, I didn't install the whole Gnome DE. Instead, I installed the following packages: xorg gnome-core gnome-tweak-tool synaptic file-roller gedit A few days ago, after reading replies from some posters, I purged the package called unattended-upgrades. I don't know how and when it was installed in the first place. You see, about two years I chose the option Expert Install (without GUI) and during the installation process, I chose the option to not install updates automatically. After reading what was written in the page (https://unix.stackexchange.com/a/594287), I disabled the package called PackageKit today. Only time will tell if said step works. By the way, does Ubuntu use the full or stripped-down version of Gnome Desktop Environment? *fresh* = not upgraded from Debian Stretch
Re: Unexplained freezes and crashes, nothing in /var/log/messages
Hi David > Sent: Friday, June 04, 2021 at 10:27 AM > From: "David Wright" > To: debian-user@lists.debian.org > Subject: Re: Unexplained freezes and crashes, nothing in /var/log/messages > > It's just a home-grown program that's started from .xsession. > It sets the X background colour in a loop, with excessive > temperatures taking priority over power indications. > Is your program proprietary? If it isn't, would you like to share it with me?
Re: How do I permanently disable unattended downloads of software/security updates?
Hi Thomas > Sent: Friday, June 04, 2021 at 6:02 PM > From: "Thomas D. Dean" > To: debian-user@lists.debian.org > Subject: Re: How do I permanently disable unattended downloads of > software/security updates? > > I use Ubuntu. I removed the ubuntu desktop and installed vanilla gnome. > Google: > 'Converting Ubuntu 20.04 LTS to Vanilla Gnome3' According to the website "The 8 Best Ubuntu Desktop Environments (20.04 Focal Fossa Linux)" [https://linuxconfig.org/the-8-best-ubuntu-desktop-environments-20-04-focal-fossa-linux], Ubuntu 20.04 LTS comes with the default Gnome 3.36 desktop. > > After I disabled timers, I rebooted. apt-update && apt-upgrade. After > that I had one popup that said I had upgrades pending. The apt timer > was set to expire in 3 hours... See...you'd an automatic download of updates.
Re: How do I permanently disable unattended downloads of software/security updates?
Hi, Thanks for your help and effort. I really appreciate it. > Sent: Thursday, June 03, 2021 at 4:02 AM > From: l0f...@tuta.io > To: "Debian User" > Subject: Re: How do I permanently disable unattended downloads of > software/security updates? > > Cannot remember if you have Gnome installed but you should have a look at > https://unix.stackexchange.com/a/594287, especially ALL the associated > comments (click on "Show 7 more comments"). After I have done a fresh minimal install of Debian, I installed the following packages: xorg gnome-core gnome-tweak-tool synaptic gedit gdebi file-roller As you can see from the above, I did not install the full Gnome desktop environment. The link that you gave me leads to the post in which the description of the problem is similar to my issue. It contains helpful information and I have taken action based on what the contributors had written. I have disabled PackageKit. I have not purged gnome-software as advised by the contributor in said post. Why? I am afraid that purging gnome-software may cause my operating system to become unusable. I shall keep you informed if after disabling PackageKit, automatic downloads of software/security updates still take place.
Re: How do I permanently disable unattended downloads of software/security updates?
Hi Thanks for your help and time. I really appreciate it. > Sent: Thursday, June 03, 2021 at 3:03 AM > From: "Linux-Fan" > To: debian-user@lists.debian.org > Subject: Re: How do I permanently disable unattended downloads of > software/security updates? > > > Anyway, I suspect that the OP might find some useful information from > > this command: > > > > systemctl list-timers | grep apt Below is the output of systemctl list-timers | grep apt Thu 2021-06-03 20:29:30 GMT 9h leftThu 2021-06-03 09:18:00 GMT 1h 17min ago apt-daily.timer apt-daily.service Fri 2021-06-04 06:51:16 GMT 20h left Thu 2021-06-03 09:18:00 GMT 1h 17min ago apt-daily-upgrade.timer apt-daily-upgrade.service > > I am leaning towards the "DE explanation" -- that the upgrades are not > caused by APT's own mechanisms but rather triggered by some DE through > opaque means not visible in cron or systemd timers. I am not sure how I > would go about identifying the cause there, except for checking the GUI > configuration that all related options are turned off? > One of the posters provided me a link to the post in Unix StackExchange: https://unix.stackexchange.com/a/594287 and I have followed the instructions to disable PackageKit. By the way, when I did a fresh minimal install of Debian Buster without installing the full Gnome DE about two years ago, I also installed the following packages: xorg gnome-core gnome-tweak-tool synaptic gedit gdebi file-roller
How do I permanently disable unattended downloads of software/security updates?
My OS is Debian 10.9 and has the kernel version: Linux localhost 5.10.0-0.bpo.5-amd64 #1 SMP Debian 5.10.24-1~bpo10+1 (2021-03-29) x86_64 GNU/Linux 1. I have already configured the OS not to download software updates automatically by using the widget "Software & Updates". Click the URL below to see a screenshot of the Software Updates: https://ibb.co/bs7pF9q 2. I deleted the file 50unattended-upgrades located in /etc/apt/apt.conf.d/ In spite of the above two actions, Debian 10.9 still downloads software and security updates for me automatically in the background. Could someone help me with a fix that really works? Thanks. Marcello
Re: How do I permanently disable unattended downloads of software/security updates?
> Sent: Wednesday, May 26, 2021 at 8:23 PM > From: l0f...@tuta.io > To: "Debian User" > Subject: Re: How do I permanently disable unattended downloads of > software/security updates? > > Hi, > > Can you type the following commands in a terminal and give us the results > please (use `sudo` if necessary)? > > ls -al /etc/apt/apt.conf.d/ > dpkg -l | grep -i unattended-upgrades > cat /lib/systemd/system/apt-daily.timer > cat /etc/systemd/system/apt-daily.timer.d/override.conf > > Best regards, > l0f4r0 Hi Thanks for your reply and offer of help. Before I provide you the answers, please note that I had removed/deleted the package called 50unattended-upgrades in /etc/apt/apt.conf.d/ before my original post in this mailing list. Secondly, according to a reply that I received prior to your response, I issued the command sudo systemctl diaable unattended-upgrades Please find below the results of what you had asked me to do: ls -al /etc/apt/apt.conf.d/ total 56 drwxr-xr-x 2 root root 4096 Apr 23 04:45 . drwxr-xr-x 7 root root 4096 Apr 23 04:45 .. -rw-r--r-- 1 root root 49 Sep 8 2020 00aptitude -rw-r--r-- 1 root root 82 Sep 8 2020 00CDMountPoint -rw-r--r-- 1 root root 40 Sep 8 2020 00trustcdrom -rw-r--r-- 1 root root 1018 May 12 2020 01autoremove -r--r--r-- 1 root root 3636 Apr 17 15:17 01autoremove-kernels -rw-r--r-- 1 root root 89 Apr 10 07:12 10periodic -rw-r--r-- 1 root root 202 Mar 17 2019 20listchanges -rw-r--r-- 1 root root 1040 Mar 2 2019 20packagekit -rw-r--r-- 1 root root 2592 Jan 26 2019 50appstream -rw-r--r-- 1 root root 435 Jan 26 2019 60icons -rw-r--r-- 1 root root 182 Feb 26 2019 70debconf -rw-r--r-- 1 root root 32 Apr 17 15:17 99synaptic dpkg -l | grep -i unattended-upgrades ii unattended-upgrades 1.11.2 all automatic installation of security upgrades cat /lib/systemd/system/apt-daily.timer [Unit] Description=Daily apt download activities [Timer] OnCalendar=*-*-* 6,18:00 RandomizedDelaySec=12h Persistent=true [Install] WantedBy=timers.target cat /etc/systemd/system/apt-daily.timer.d/override.conf cat: /etc/systemd/system/apt-daily.timer.d/override.conf: No such file or directory
Re: How do I permanently disable unattended downloads of software/security updates?
Thanks Kenneth for your reply. Your suggestion that I "apt-get purge unattended-upgrades" is intended to be a one-off operation or must I perform it each time I log into my OS? And yes, I manually perform "sudo apt update" and "sudo apt upgrade" about twice a day. Marcello Sent: Wednesday, May 26, 2021 at 3:05 AM From: "Kenneth Parker" To: "Debian Users" Subject: Re: How do I permanently disable unattended downloads of software/security updates? On Tue, May 25, 2021, 1:25 PM Stella Ashburne mailto:rewe...@gmx.com]> wrote:My OS is Debian 10.9 and has the kernel version: Linux localhost 5.10.0-0.bpo.5-amd64 #1 SMP Debian 5.10.24-1~bpo10+1 (2021-03-29) x86_64 GNU/Linux 1. I have already configured the OS not to download software updates automatically by using the widget "Software & Updates". Click the URL below to see a screenshot of the Software Updates: https://ibb.co/bs7pF9q[https://ibb.co/bs7pF9q] 2. I deleted the file 50unattended-upgrades located in /etc/apt/apt.conf.d/ In spite of the above two actions, Debian 10.9 still downloads software and security updates for me automatically in the background. Could someone help me with a fix that really works? One step I have taken is "apt-get purge unattended-upgrades". That said, I regularly update and upgrade my systems. Thanks. Marcello Good luck! Kenneth Parker
Re: How do I permanently disable unattended downloads of software/security updates?
Thanks for your reply. No, I haven't tried clearing the apt cache and shall let you know if my OS downloads software/security updates in the background. By the way, is there a method to suppression notification of new software and/or security updates? (I assume that if I can receive notifications of software/security updates, it means that my OS is communicating with Debian servers in the background, without my knowledge. I don't like that.) > Sent: Wednesday, May 26, 2021 at 1:29 AM > From: "Polyna-Maude Racicot-Summerside" > To: "Stella Ashburne" > Subject: Re: How do I permanently disable unattended downloads of > software/security updates? > > Have you tried clearing the apt cache (/var/cache/apt/archives/) > and see if you really get download or if it's just notification ? > > On 2021-05-25 1:25 p.m., Stella Ashburne wrote: > > My OS is Debian 10.9 and has the kernel version: > > > > Linux localhost 5.10.0-0.bpo.5-amd64 #1 SMP Debian 5.10.24-1~bpo10+1 > > (2021-03-29) x86_64 GNU/Linux > > > > 1. I have already configured the OS not to download software updates > > automatically by using the widget "Software & Updates". Click the URL below > to see a screenshot of the Software Updates: > > > > https://ibb.co/bs7pF9q > > > > 2. I deleted the file 50unattended-upgrades located in /etc/apt/apt.conf.d/ > > > > In spite of the above two actions, Debian 10.9 still downloads software > and security updates for me automatically in the background. Could someone > help me with a fix that really works? > > > > Thanks. > > > > Marcello > > > > -- > Polyna-Maude R.-Summerside > -Be smart, Be wise, Support opensource development > >
Re: How do I permanently disable unattended downloads of software/security updates?
Hi Greg By the way, is there a method to suppression notification of new software and/or security updates? (I assume that if I can receive notifications of software/security updates, it means that my OS is communicating with Debian servers in the background, without my knowledge. I don't like that.) > Sent: Wednesday, May 26, 2021 at 4:51 AM > From: "Greg Wooledge" > To: debian-user@lists.debian.org > Subject: Re: How do I permanently disable unattended downloads of > software/security updates? > > On Tue, May 25, 2021 at 10:48:06PM +0200, Stella Ashburne wrote: > > Thanks Kenneth for your reply. > > > > Your suggestion that I "apt-get purge unattended-upgrades" is intended to > > be a one-off operation or must I perform it each time I log into my OS? > > > > And yes, I manually perform "sudo apt update" and "sudo apt upgrade" about > > twice a day. > > > Anything you do with apt-get, apt or dpkg (or any other package management > tool) is permanent. > > The only things in this realm that *aren't* permanent are stopping or > starting a service, e.g. "systemctl stop foobar". Those operations do > not affect the state of the system at the next boot. (For that, you > would use enable, disable, mask, or unmask, all of which are permanent.) > >
Re: How do I permanently disable unattended downloads of software/security updates?
Thanks Charles for your reply. Your suggestion "apt purge unattended-upgrades" implies that my deletion/removal of the file 50unattended-upgrades is insufficient. Is that correct? I shall feedback to you if your suggestion works. By the way, is there a method to suppression notification of new software and/or security updates? (I assume that if I can receive notifications of software/security updates, it means that my OS is communicating with Debian servers in the background, without my knowledge. I don't like that.) Marcello > Sent: Wednesday, May 26, 2021 at 3:14 AM > From: "Charles Curley" > To: "Debian Users" > Subject: Re: How do I permanently disable unattended downloads of > software/security updates? > > On Tue, 25 May 2021 19:25:01 +0200 > Stella Ashburne wrote: > > > 2. I deleted the file 50unattended-upgrades located > > in /etc/apt/apt.conf.d/ > > > > In spite of the above two actions, Debian 10.9 still downloads > > software and security updates for me automatically in the background. > > Could someone help me with a fix that really works? > > Well, you could run: > > apt purge unattended-upgrades > > Somewhat less drastic: > > systemctl [stop|disable] unattended-upgrades > > (Both, of course, as root.) > > -- > Does anybody read signatures any more? > > https://charlescurley.com > https://charlescurley.com/blog/ > >
Re: How do I permanently disable unattended downloads of software/security updates?
Hi > Sent: Tuesday, June 01, 2021 at 9:26 PM > From: "Joe" > To: debian-user@lists.debian.org > Subject: Re: How do I permanently disable unattended downloads of > software/security updates? > First of all, id you surf using the link to the screenshot? Here's the URL again: https://ibb.co/5xP7r5t The screenshot shows that my OS surreptitiously downloads the software/security updates without my manual intervention. This is not what I want and is the subject of my original post.
Re: How do I permanently disable unattended downloads of software/security updates?
Hi > Sent: Tuesday, June 01, 2021 at 9:39 PM > From: "Reco" > To: debian-user@lists.debian.org > Subject: Re: How do I permanently disable unattended downloads of > software/security updates? > As you can see from the screenshot, my OS has surreptitiously downloaded software/security updates without my manual intervention. This behavior is not what I like and it's the subject of my original post. > > The devil is in the details, as they say. > "sudo apt upgrade" shows that it does not need to download anything, > because: > > > > username@localhost:~$ sudo apt upgrade > ... > > > Need to get 0 B/20.2 MB of archives. > Exactly. The notification about software updates being available was the first thing that popped up on my OS (see screenshot: https://ibb.co/5xP7r5t). This was confirmed by the message "Need to get 0 B/20.2 MB of archives". > I'm curious what will be shown in this configuration by: > > apt-config dump | grep Periodic > One kind person has already asked me for the output of apt-config dump | grep -i APT::Periodic Below is the output of the above command: APT::Periodic ""; APT::Periodic::Download-Upgradeable-Packages "0"; APT::Periodic::Unattended-Upgrade "0";
Re: How do I permanently disable unattended downloads of software/security updates?
Hi > Sent: Friday, May 28, 2021 at 8:05 PM > From: l0f...@tuta.io > To: "Debian User" > Subject: Re: How do I permanently disable unattended downloads of > software/security updates? > > 28 mai 2021, 13:43 de l0f...@tuta.io: > > > I think you won't update/upgrade automatically anymore (by the way you say > > you haven't noticed this behavior so far), but time will confirm. Time has indeed confirmed my worst fears. Today June 1, 2021 in fact... > Correction: I meant if you still have updates/upgrades, then it shouldn't be > because of package unattended-upgrades. So you would have to dig somewhere > else... > Automatic downloads of software/security downloads took place today, June 1, 2021. Please click the link to the screenshot: https://ibb.co/5xP7r5t Please see below for the details: username@localhost:~$ sudo apt update [sudo] password for username: Hit:1 http://security.debian.org/debian-security buster/updates InRelease Hit:2 http://security.debian.org buster/updates InRelease Hit:3 https://deb.debian.org/debian buster InRelease Hit:4 https://deb.debian.org/debian buster-updates InRelease Hit:5 https://deb.debian.org/debian buster-backports InRelease Reading package lists... Done Building dependency tree Reading state information... Done 4 packages can be upgraded. Run 'apt list --upgradable' to see them. username@localhost:~$ sudo apt list --upgradable Listing... Done gir1.2-javascriptcoregtk-4.0/stable,stable 2.32.1-1~deb10u1 amd64 [upgradable from: 2.30.6-1~deb10u1] gir1.2-webkit2-4.0/stable,stable 2.32.1-1~deb10u1 amd64 [upgradable from: 2.30.6-1~deb10u1] libjavascriptcoregtk-4.0-18/stable,stable 2.32.1-1~deb10u1 amd64 [upgradable from: 2.30.6-1~deb10u1] libwebkit2gtk-4.0-37/stable,stable 2.32.1-1~deb10u1 amd64 [upgradable from: 2.30.6-1~deb10u1] username@localhost:~$ username@localhost:~$ sudo apt upgrade Reading package lists... Done Building dependency tree Reading state information... Done Calculating upgrade... Done The following NEW packages will be installed: xdg-desktop-portal xdg-desktop-portal-gtk The following packages will be upgraded: gir1.2-javascriptcoregtk-4.0 gir1.2-webkit2-4.0 libjavascriptcoregtk-4.0-18 libwebkit2gtk-4.0-37 4 upgraded, 2 newly installed, 0 to remove and 0 not upgraded. Need to get 0 B/20.2 MB of archives. After this operation, 5,118 kB of additional disk space will be used. Do you want to continue? [Y/n] If you guys notice, 20.2MB of updates have been automatically downloaded in the background (without my manual intervention). I appreciate your help in this matter. Best wishes.
Re: which command can show if usb 3.0 is used
Hi > Sent: Monday, May 31, 2021 at 8:36 AM > From: "Jude DaShiell" > To: "Long Wind" , "Debian-user Mailing List" > > Subject: Re: which command can show if usb 3.0 is used > > First disconnect the disk; next run lsblk >lsblk.old, next connect the > disk, next run lsblk >lsblk.new. Finally do a diff on lsblk.old lsblk.new > and see if something shows up in lsblk.new that isn't in lsblk.old. > Can I do a diff using the following command in a terminal? diff -c lsblk.old lsblk.new
Re: thunderbird
Hello > Sent: Monday, May 31, 2021 at 2:29 AM > From: "fxkl47BF" > To: "debian-user@lists.debian.org" > Subject: thunderbird > > what are your thoughts of thunderbird. > Thunderbird appears to have many, many security vulnerabilities based on the fact that in any calendar month, security updates are availalbe for downloads from Debian.
Re: How do I permanently disable unattended downloads of software/security updates?
Hi Tom > Sent: Friday, June 04, 2021 at 4:18 AM > From: "Tom Browder" > To: "Stella Ashburne" > Cc: "debian-user mailing list" > Subject: Re: How do I permanently disable unattended downloads of > software/security updates? > > > Unfortunately I mostly use email from my iPad (gmail app) and I > haven't found a way to get plain text on it like one can from a real > computer. Sometimes I go to my Linux laptop and force plain text, but > normally I try to strip out what I can. > Don't get me wrong Tom. I'm perfectly fine with receiving emails in HTML format. It's just that a few years ago, when I sent emails with HTML formatting, Debian User Mailing List rejected them outright. It took me quite a while - about at least two months - trying to figure out why my sent HTML-formatted emails were rejected. > This time i'm replying from my laptop so it **should** be plain text. > I am OK as long as Debian User Mailing List now accepts HTML-formatted emails. Stella
Re: Unexplained freezes and crashes, nothing in /var/log/messages
Hi David > Sent: Friday, June 04, 2021 at 5:12 AM > From: "David Wright" > To: debian-user@lists.debian.org > Subject: Re: Unexplained freezes and crashes, nothing in /var/log/messages > > > My own monitoring program logs the temperature (and battery) > every six seconds. > I'm curious: what's the name of your monitoring program? Is it available for download and installation from Debian's official repos? Stella
Re: How do I permanently disable unattended downloads of software/security updates?
Hi Greg > Sent: Thursday, June 03, 2021 at 9:55 AM > From: "Greg Wooledge" > To: debian-user@lists.debian.org > Subject: Re: How do I permanently disable unattended downloads of > software/security updates? > > > I gave some alternatives that will reveal more information. Replies to > my reply elaborated further still. > Output of systemctl list-timers | grep apt Thu 2021-06-03 20:29:30 GMT 9h leftThu 2021-06-03 09:18:00 GMT 1h 17min ago apt-daily.timer apt-daily.service Fri 2021-06-04 06:51:16 GMT 20h left Thu 2021-06-03 09:18:00 GMT 1h 17min ago apt-daily-upgrade.timer apt-daily-upgrade.service
Re: How do I get back the GRUB menu with the blue background?
Hi > Sent: Sunday, July 04, 2021 at 12:01 PM > From: "David" > To: "debian-user mailing list" > Subject: Re: How do I get back the GRUB menu with the blue background? > > > As I mentioned, I do not know GPT and UEFI systems. It's off-topic; I am curious why you do not use GPT/UEFI/Secure Boot? Secure Boot has been supported since Debian Buster. > However, I would expect that after you have successfully > discovered where grub finds the grub file directory, and the > kernel file and the initrd image, then it should be possible to > execute a manual sequence of commands at the grub prompt like: > > grub> insmod part_gpt > grub> insmod ext2 > grub> linux ... root= ... > grub> initrd ... > grub> boot > > That should boot into your installation. After that you will need to > run 'grub-install', see below. > > If the insmod commands fail, that can mean the value of > 'prefix' is incorrect. If you specify the full path that grub uses > to refer to each file, then it isn't necessary to specify 'root' > variable. > What did you mean by "prefix"? Would you like to elaborate? > Doing that, grub should attempt to boot the specified files, perhaps > giving further error messages as a clue to what might be > wrong. Did you try this method? > No, I didn't. > > Yes I am aware of that method which can succeed. However > I think you need to also run 'grub-install' in that situation to fix your > problem, because 'update-grub' merely regenerates a grub.cfg file > somewhere. > Thanks for your tip. I shall try it. > > You should check that target device and boot directory used > by 'grub-install' are correct. > How do I go about doing it? > Perhaps use -v and --boot-directory > options to make sure that 'grub-install' > does not reference anything inside your encrypted partition. > I don't know how to use the -v and --boot-directory options. Would you like to show me please? > > > Without seeing the commands, I don't know what this refers to > or why you would hold this view. > Sorry for the confusion. I looked up some Youtube video clips to see if they could provide me some tips on how to fix my issue.
Re: How do I get back the GRUB menu with the blue background?
Hi > Sent: Sunday, July 04, 2021 at 2:42 PM > From: "deloptes" > To: debian-user@lists.debian.org > Subject: Re: How do I get back the GRUB menu with the blue background? > > > I had similar issue on some of the machines. Try with the bios boot from > device (some F key). > Thanks for your suggestion. However it didn't work
Unidentified subject!
The partition table scheme is GPT and UEFI with Secure Boot is enabled. I do not use legacy BIOS with master boot record. Below is the partition layout of my SDD: 536.9MB EFI system partition (ESP) 511.7MB /boot (unencrypted) 100GB encrypted logical volumes (contains 99GB of / partition, 1GB of swap area.Debian Buster was installed on this partition) 16MB Microsoft reserved area (automatically created by Microsoft Windows' installer) 100GB Microsoft Windows 10 1. Debian Buster's 64bit installer (version 10.10) was used to create the EFI System Partition (ESP), the /boot partition and the encrypted logical volumes. Installation was successful and I was able to boot into the GRUB menu with a blue background. It had an entry named Debian GNU/Linux. 2. Next I installed Microsoft Windows 10 and the installation was successful. 3. I rebooted into Debian and used sudo os-prober to add the Microsoft Windows' entry to GRUB followed by sudo update-grub 4. Dual-boot of Debian and Windows was possible Problem(s) happened after I did the following: 5. With a USB stick containing the latest weekly build of Debian Testing (Bullseye), I booted into the Debian's installer screen and deleted the 100GB encrypted logical volumes. 6. As a result, 100GB of free space was made available. I configured it to have two encrypted logical volumes: 99GB of the / partition, 1GB of swap area. 7. Debian Testing was installed on the 100GB partition. Installation was successful. 8. However, I am now unable to boot into the GRUB menu with the blue background. Instead all I have is a black screen with the word grub> _ (The underscore is actually the position of the cursor) After reading some stuff on the internet, please tell me if my understanding of the following is correct: Grub's UEFI Stub is located in EFI System Partition (ESP) while its second stage modules are in the /boot partition. /boot also contains Grub's config file. It would appear that the bootloader in ESP is not updated to match the modules in the /boot partition or it could be that /boot/grub/grub.cfg is missing. Below's my attempt at getting back the Grub menu with the blue background: A. I used Debian Bullseye's weekly installer to boot up my machine and chose Rescue mode. B. After entering the encrypted passphrase, below were some relevant messages on the screen: [beginning of message] Enter a device you wish to use as your root file system. Device to use as root file system: /dev/perfect-vg/root /dev/perfect-vg/swap /dev/dm-1 /dev/dm-2 /dev/mapper/sda3_crypt /dev/sda1 /dev/sda2 etc, etc Assemble a RAID system Do not use a root file system [end of message] I highlighted /dev/sda1 and pressed Enter. I was given four choices one of which was to Execute a shell in the installer environment. I highlighted it and pressed Enter. There was a message on the screen stating that /dev/sda1 would be mounted as "/target", that the tools of the installer environment would be available for use and that I could use chroot to "chroot /target". There was a small grey box at the bottom of the screen. I tried the following options: ~# "chroot /target" /bin/sh: "chroot /target" not found ~# chroot /target chroot: can't execute "/bin/sh". No such file or directory ~# apt install --reinstall grub-efi /bin/sh: apt: not found I am stuck with the above as my technical knowledge of Linux is limited and appreciate your help with the above matter.
How do I get back the GRUB menu with the blue background?
The partition table scheme is GPT and UEFI with Secure Boot is enabled. I do not use legacy BIOS with master boot record. Below is the partition layout of my SDD: 536.9MB EFI system partition (ESP) 511.7MB /boot (unencrypted) 100GB encrypted logical volumes (contains 99GB of / partition, 1GB of swap area.Debian Buster was installed on this partition) 16MB Microsoft reserved area (automatically created by Microsoft Windows' installer) 100GB Microsoft Windows 10 1. Debian Buster's 64bit installer (version 10.10) was used to create the EFI System Partition (ESP), the /boot partition and the encrypted logical volumes. Installation was successful and I was able to boot into the GRUB menu with a blue background. It had an entry named Debian GNU/Linux. 2. Next I installed Microsoft Windows 10 and the installation was successful. 3. I rebooted into Debian and used sudo os-prober to add the Microsoft Windows' entry to GRUB followed by sudo update-grub 4. Dual-boot of Debian and Windows was possible Problem(s) happened after I did the following: 5. With a USB stick containing the latest weekly build of Debian Testing (Bullseye), I booted into the Debian's installer screen and deleted the 100GB encrypted logical volumes. 6. As a result, 100GB of free space was made available. I configured it to have two encrypted logical volumes: 99GB of the / partition, 1GB of swap area. 7. Debian Testing was installed on the 100GB partition. Installation was successful. 8. However, I am now unable to boot into the GRUB menu with the blue background. Instead all I have is a black screen with the word grub> _ (The underscore is actually the position of the cursor) After reading some stuff on the internet, please tell me if my understanding of the following is correct: Grub's UEFI Stub is located in EFI System Partition (ESP) while its second stage modules are in the /boot partition. /boot also contains Grub's config file. It would appear that the bootloader in ESP is not updated to match the modules in the /boot partition or it could be that /boot/grub/grub.cfg is missing. Below's my attempt at getting back the Grub menu with the blue background: A. I used Debian Bullseye's weekly installer to boot up my machine and chose Rescue mode. B. After entering the encrypted passphrase, below were some relevant messages on the screen: [beginning of message] Enter a device you wish to use as your root file system. Device to use as root file system: /dev/perfect-vg/root /dev/perfect-vg/swap /dev/dm-1 /dev/dm-2 /dev/mapper/sda3_crypt /dev/sda1 /dev/sda2 etc, etc Assemble a RAID system Do not use a root file system [end of message] I highlighted /dev/sda1 and pressed Enter. I was given four choices one of which was to Execute a shell in the installer environment. I highlighted it and pressed Enter. There was a message on the screen stating that /dev/sda1 would be mounted as "/target", that the tools of the installer environment would be available for use and that I could use chroot to "chroot /target". There was a small grey box at the bottom of the screen. I tried the following options: ~# "chroot /target" /bin/sh: "chroot /target" not found ~# chroot /target chroot: can't execute "/bin/sh". No such file or directory ~# apt install --reinstall grub-efi /bin/sh: apt: not found I am stuck with the above as my technical knowledge of Linux is limited and appreciate your help with the above matter.
Re: How do I get back the GRUB menu with the blue background?
Hi David > Sent: Monday, July 05, 2021 at 4:52 AM > From: "David Wright" > To: debian-user@lists.debian.org > Subject: Re: How do I get back the GRUB menu with the blue background? > > > I find the Grub installation prompts in the d-i very confusing. > I'm wondering whether your process incorrectly updated grub.cfg > in the ESP on the SSD. > I suspected it too because when I installed Debian Testing, I didn't delete both the ESP and /boot partitions that were created by Debian Buster. As a result, after installing Debian Testing successfully and rebooting my machine, there was no blue GRUB menu. > Bear in mind there are two grub.cfg files. Where are their locations? > The > second one is the familiar one, so I just give the head: > > # cat /boot/efi/EFI/debian/grub.cfg When I issued the above command at the grub> prompt, the response was 'file /boot/efi/EFI/debian/grub.cfg' not found. > (I only encrypt /Home and swap.) I'm wondering whether your first > grub.cfg is pointing to the USB stick that you used in the > installation. That would be simple to check. No. If you're using UEFI and the partition table scheme is gpt, Debian 10's installer detects that your SSD is using EFI, there's a message on the screen that asks "Force EFI installation to a removable media? Yes or No". My response is always "No". > > If this guess, is correct, it might be possible to confirm it > if you get these symptoms: > > . Booting with the internal drive only: GRUB> prompt. > . Booting with the USB stick inserted: something else appears, > a blue Grub menu, or a Debian installer splash screen, > or even Windows. I did what you suggested by first inserting the USB stick that contains Debian 10's installer and booting up my machine. There's no blue GRUB menu, whatsoever > > Of course, the second scenario can only work if the USB's UUID > hasn't been recreated by further uses. Yes, I'm aware of that fact > > ¹ With encrypted systems, you have to bear in mind what can be seen > outside and inside the container. This is easy to distinguish > with only /home encrypted, as you can inspect things with the > normal system tools. My LUKS-encrypted partition consists of / and swap area. I assume the / contains /home, /var, /usr, etc... Best wishes.
Re: How do I get back the GRUB menu with the blue background?
Attention: David Hello, I wish to add some info that might be of interest to you: grub> ls (hd0,gpt1)/ efi/ Note: (hd0,gpt1) contains ESP (EFI System Partition) grub> ls (hd0,gpt2)/ lost+found/ efi/ config-4.19.0.17-amd64 vmlinuz-4.19.0.17-amd64 grub/ System.map-4.19.0.17-amd64 initrd.img-4.19.0.17-amd64 Note: (hd0,gpt2) is the /boot partition The version of the kernel in Debian Testing is 5.10.0-7-amd64 whereas that of Debian Buster is 4.19.0.17-amd64. I'm surprised that even though installation of Debian Testing was successful, the version of config-, vmlinuz- System.map and initrd.img- in grub is of the older Debian Buster. Do you think the problem of the missing GRUB menu can be fixed if the older version of config-, vmlinuz- System.map and initrd.img- can replaced with those of Debian Testing? What do you think? Best regards
Re: How do I get back the GRUB menu with the blue background?
Hello David I didn't expect a rather lengthy reply from you. > Sent: Tuesday, July 06, 2021 at 9:29 AM > From: "David" > To: "debian-user mailing list" > Subject: Re: How do I get back the GRUB menu with the blue background? > > > grub> echo "$prefix" > The reply is (hd0,gpt1)/boot/grub > > 6) Perhaps something else is broken, but attempting > to boot from the grub> prompt will help to diagnose that. > That is certain, and straightforward. I have given you > the steps to try, but you have not yet reported trying it. > Frankly, I don't know the exact commands to type to boot from the grub> prompt. > 7) Inside grub, the 'prefix' variable defines where > grub finds its own code. That appears to be correct, > otherwise you would see grub_rescue> prompt. > What command can I type at the grub> prompt to look inside grub so as to see the "prefix" variable? > > 9) I suppose you can use a rescue environment and > chroot to boot your system, but it seems unnecessary > unless you can't boot any other way. But if you have a > broken initrd, you will need to do this. > How can I tell if I've a broken initrd? > 10) Once booted, you will need to 'grub-install' to fix > the problem of grub.cfg not being found. Because grub > currently can't find any grub.cfg, you need to make sure > that the new one is installed to the correct location, which > needs to be outside your encrypted partition. Thanks for the mini-tutorial. > I would not > be surprised if the /boot in your new installation is not the > same as your boot partition, you should check that. > Check your mountpoints. Does 'lsblk -f' show the boot > partition is mounted at /boot? > After typing lsblk -f at the grub> prompt, the error message was can't find command 'lsblk' > Run 'grub-install -v ' > and look for output like: > grub-install: info: setting the root device to > After typing grub-install -v (hd0,gpt2), the error message was can't find command 'grub-install' > Make sure is your unencrypted boot partition. > If it isn't, run 'grub-install' again with the '--boot-directory' option > pointing to your boot partition. > Read 'man grub-install' for documentation of its options. > (hd0,gpt2) is my un-encrypted boot partition > a) Can you boot from grub> prompt? > No > b) At grub>, can you check the value of $root to discover > where it is looking for grub.cfg? grub> echo "$root" > hd0,gpt1 > c) At grub>, can you find grub.cfg anywhere by the > tab-completion method I described in a prior message? > Where? At the grub> prompt, I typed gr and pressed the TAB key. There was no output or suggestions. > > d) After booting somehow, if you run 'grub-install -v', what > root device does it use to to save the files that it updates, > as explained above? I'm unable to boot (frankly what commands to type to boot at the grub> prompt ?) > > e) If you reboot after running 'grub-install', does it work? > Unable to answer your question (e) because of (d) > f) Is the value of '$root' above the same location that > 'grub-install' writes to by default? If not, use its > '--boot-directory' option. > Unable to answer your question (f) because of (d)
Re: How do I get back the GRUB menu with the blue background?
Hi > Sent: Friday, July 02, 2021 at 8:58 AM > From: "deloptes" > To: debian-user@lists.debian.org > Subject: Re: How do I get back the GRUB menu with the blue background? > > > As this is a fresh installation, why don't you just wipe everything linux > partitions and install again the way you want it. > That was what I did. But I wish to learn how to repair GRUB in a non-destructive way. > Alternatively boot into a usb or live cd or installer, mount the volumes and > chroot into (there are many howtos) > > I use something like following where SYSTEM is the target ppath > > mount --make-unbindable -obind /proc/ $SYSTEM/proc/ && \ > mount --make-unbindable -obind /dev/ $SYSTEM/dev/ && \ > mount --make-unbindable -obind /dev/pts $SYSTEM/dev/pts && \ > mount --make-unbindable -obind /run $SYSTEM/run && \ > mount --make-unbindable -obind /sys $SYSTEM/sys/ && \ > > chroot $SYSTEM su - > > when you are there reinstall grub and run update-grub > I discovered that reinstalling GRUB and then ran update-grub didn't help at all. The issue still persists. With my limited technical knowledge, the only way for me to get back the GRUB menu with the blue background is to reinstall Debian.
Re: How do I get back the GRUB menu with the blue background?
Hi David > Sent: Friday, July 02, 2021 at 10:49 AM > From: "David" > To: "Stella Ashburne" > Cc: "debian-user mailing list" > Subject: Re: How do I get back the GRUB menu with the blue background? > > I see that you've not had any replies, so I'll attempt to assist. That's very kind of you :) > > Thank you for making some effort to provide a detailed > description of your situation. > > Please note that I have several questions (1, 2, 3) interleaved > below, followed by some suggestions at the end. > > On Thu, 1 Jul 2021 at 23:20, Stella Ashburne wrote: > > > 1) Do you mean "SSD". If not, what is SDD? > Yes, I meant to type SSD. It was a typo. > There's a couple of things that might have gone wrong here. > Exactly what is unclear at this stage. > > 2) Can you tell us, during your step 7, what instructions did you > give to the installer at the "install a boot loader" stage? No specific instructions were given to the installer at the "install a boot loader" stage. I just accepted the default. If I remember correctly, the installer of Debian Stretch asked the user to specify the exact location that the boot loader was to be installed. With Debian Buster's installer, there was no need to specify your preferred location. > > 3) And during the partitioning stages, can you tell us which existing > devices (LUKS, LVM) did you attempt to reuse unchanged, and which > did you recreate? > I deleted the entire 100GB of encrypted volumes (LUKS, LVM), meaning none of the encrypted logical volumes was reused. > >From my own experience, attempting to install into a pre-existing > LVM logical volume on a LUKS physical volume, I did once see some > unexpected failures. This might have been my error, or perhaps > the installer might have some buggy behaviour in this kind of > situation. I have not had time to investigate properly. > Thanks for sharing your experience with me. > If, in the installer, you were to start again from the device > partition, and freshly create the LUKS device and the LVM > logical volumes from scratch, then I would expect that to work. No it didn't; hene my original post. To the best of my knowledge, the bootloader's files are not installed on encrypted volumes for obvious reasons. > > > I suggest to boot as you describe above (your step #8) until you reach > the 'grub>' prompt. This is actually a very useful prompt but you > need to know some tricks to use it. So begin by reading this page: > https://www.gnu.org/software/grub/manual/grub/html_node/Naming-convention.html#Naming-convention > Thanks for the link, David. > > You can use this method to try to find which device > and directory contains your grub directory. It will > look something like (hd0,msdos1)/grub and will > contain the grub files including your grub.cfg menu. > You could then use grub's 'cat' command to inspect > the UUIDs it is attempting to use. However that's > probably not useful at this time. I know where GRUB's files are located, viz. in ESP (EFI System Partition) and the /boot partition. > > When you find your grub.cfg, that is progress, and you > can try booting from that menu. > grub> configfile (hd0,msdos1)/path/to/grub.cfg > It didn't work. Your tip can be found in Youtube video clips. > However I expect that will not succeed, > because the default grub.cfg by default uses UUID to > identify all devices. And because you reinstalled (your > step #7) you probably have different UUIDs now. > I suspect that the GRUB files in either ESP or /boot are messed up and their corresponding modules don't match. > > The easier scenario will be that we just need to persuade > grub to boot, and then you can run grub-install. Things will > be more difficult if the installer has not properly initialised > your initrd for LUKS. Did you know that Debian Buster's installer has a feature called Rescue Mode. I made use of it to chroot into /target followed by running apt install --reinstall grub-efi and update-grub. It didn't work. As stated earlier, I guess the file and modules are messed up in the ESP and /boot partition. > The other approach is for you to do a complete repeat of > your step 7, and this time create all device manager layers > from scratch as I explained above. > > That approach might be simpler for everyone, but less educational. > I totally agree with you. That's why I post my request for help so that I can learn how to fix it. Oh by the way, Youtube video clips that show how to fix GRUB issues aren't useful in my case. > Let us know how you go. Please be sure to reply to the > list, not me personally, because I am subscribed. Thanks. > Understood.
Re: How do I mount the USB stick containing the installer in Rescue Mode?
Hi guys, There's a typo in my original post. Thanks to Reco for pointing it out to me. > Sent: Thursday, July 15, 2021 at 9:43 AM > From: "Stella Ashburne" > To: "debian-user mailing list" > Subject: How do I mount the USB stick containing the installer in Rescue Mode? > > > When asked if I wanted to mount the separate /boot/efi partition, I entered > No. > > Next, I entered Executive a shell in /dev/perfect-vg/root > CORRECTION: Execute a shell in /dev/perfect-vg/root
How do I mount the USB stick containing the installer in Rescue Mode?
Debian Bullseye's installer is on a USB stick and I used it to boot into Rescue Mode. If it's of any relevance, the partition table type is GPT, with UEFI+Secure Boot enabled. After booting into Rescue Mode and filling out the required details onscreen, I chose /dev/perfect-vg/root as the device to use as root file system. If you may recall, the volume group perfect-vg is LUKS-encrypted. When asked if I wanted to mount the separate /boot/efi partition, I entered No. Next, I entered Executive a shell in /dev/perfect-vg/root I typed the command nano /etc/apt/sources.list and commented out all the lines therein. I added the the following line: deb [trusted=yes] file:/media/myusb bullseye main I saved the sources.list file. I created a directory called /media/myusb and issued the following command to mount the USB stick to it: mount /dev/sdb1 /media/myusb The error message is: mount: /media/myusb: /dev/sdb1 already mounted or mount point busy Below are the results of cat /etc/fstab /dev/mapper/perfect--vg-root / ext4 errors-remount-ro 0 1 /boot/efi was on /dev/sda1 during installation UUID=A30E-2C33/boot/efi vfatumask=0077 0 1 /dev/mapper/perfect--vg-swapnone swapsw 0 0 /dev/sr0 /media/cdrom0 udf, iso9660 user, noauto 0 0 /media/myusb I appreciate your help in this matter.
Re: How do I mount the USB stick containing the installer in Rescue Mode?
Hi > Sent: Thursday, July 15, 2021 at 9:55 AM > From: "Reco" > To: debian-user@lists.debian.org > Subject: Re: How do I mount the USB stick containing the installer in Rescue > Mode? > > Hi. > > On Thu, Jul 15, 2021 at 11:43:26AM +0200, Stella Ashburne wrote: > > Next, I entered Executive a shell in /dev/perfect-vg/root > > It's Superuser shell actually, not Supervisor/Executive one. > Thanks for pointing out my typo. > > Something has mounted your device elsewhere already. I guess that when I used the USB-installer to boot my machine into Rescue Mode, the USB stick is mounted, yes? > A usual thing with the modern desktop environments. > Check the output of "mount" and "df -Th" and /dev/sdb1 will probably be > there. I'd like to see the output of these commands too, btw. > Output of mount is root@perfect:/# mount /dev/mapper/perfect--vg-root on / type ext4 (rw,relatime) devtmpfs on /dev type devtmpfs (rw,relatime,size=8137669k,nr_inodes=2034417,mode=755) proc on /proc type proc (rw,relatime) sysfs on /sys type sysfs (rw,relatime) tmpfs on /run type tmpfs (rw,nosuid,relatime,size=1629756k,mode=755) root@perfect:/# Output of dh -Th is root@perfect:/# df -Th FilesystemTypeSizeUsedAvailUse% Mounted on /dev/perfect-vg/root ext436G 773M33G 3% / devtmpfs devtmpfs 7.8G0 7.8G 0% /dev tmpfs tmpfs 1.6G 96K 1.6G 1% /run root@perfect:/# > If these are the full contents of /etc/fstab, it's incorrect. > In addition to the mountpoint you should specify a block device (or its > equivalent), filesystem type, mount points, dump/pass and that's the > least. Thanks for the mini instruction. I really appreciate it. > I.e. this line is wrong: > > /media/myusb > > This line is correct: > > /dev/sdb1 /media/usb auto defaults,nofail 0 0 > > "nofail" is really needed for removable devices, because whoever > designed systemd made an "interesting" decision to halt the boot process > (i.e. host is inaccessible by network, console access only) even if a > single filesystem mentioned in fstab fails to mount. > You may want to add "noauto" as well, see fstab(5). > I read fstab(5). Unfortunately such man pages don't contain examples to illustrate the arguments and options. > >
iwd: Using iwd to connect to a wireless network (Part 1 - Connection status show OK but unable to surf the net)
Based on ArchLinux's tutorial on using iwd to connect to a wireless network (https://wiki.archlinux.org/title/Iwd), I managed to connect to my wireless routeror so I thought :( Below are the relevant outputs: In Terminal #1 username@hostname:~$ iwctl [iwd]# device wlan0 show Device: wlan0* Settable Property Value Name wlan0 *Mode station *Powered on Address 2b:ef:4d:33:c2:e5 Adapter phy0 [iwd]# station wlan0 show Station: wlan0* Settable PropertyValue Scanningno State connected Connected network Stella-Network ConnectedBss2b:ef:6a:20:ac:18 Frequency 2412 SecurityWPA2-Personal RSSI-47 dBm AverageRSSI -47 dBm TxMode 802.11n TxMCS 7 TxBitrate 15 Kbit/s RxBitrate 1000 Kbit/s The asterisk to the right of the word wlan0 is always blinking. In Terminal #2 username@hostname:~$ sudo apt update Result: sudo apt update is unable to update the repositories specified in /etc/apt/sources.list. I tried to use Firefox to browse the internet to no avail. I appreciate your help in this matter. Thanks.
Re: iwd: Using iwd to connect to a wireless network (Part 1 - Connection status show OK but unable to surf the net)
Hi Dan > Sent: Thursday, September 30, 2021 at 3:09 AM > From: "Dan Ritter" > To: "Stella Ashburne" > Cc: "debian-user mailing list" > Subject: Re: iwd: Using iwd to connect to a wireless network (Part 1 - > Connection status show OK but unable to surf the net) > > Stella Ashburne wrote: > > Hi Dan > > > > Setting static IP address in network configuration > > Add the following section to /var/lib/iwd/network.type file. For example: > > > > /var/lib/iwd/spaceship.psk > > [IPv4] > > Address=192.168.1.10 > > Netmask=255.255.255.0 > > Gateway=192.168.1.1 > > Broadcast=192.168.1.255 > > DNS=192.168.1.1 > > > > In the above example the broadcast IP is 192.168.1.255. > > > > Question: Does the fourth octet have to be 255? > > Technically, no. In practice, you are unlikely to see anything > else unless you are configuring point-to-point router links. > Just to confirm that I understood your statement correctly: can I omit the line Broadcast=192.168.1.255 in the file spaceship.psk?
Re: iwd: Using iwd to connect to a wireless network (Part 1 - Connection status show OK but unable to surf the net)
> Sent: Thursday, September 30, 2021 at 3:36 AM > From: "Greg Wooledge" > To: debian-user@lists.debian.org > Subject: Re: iwd: Using iwd to connect to a wireless network (Part 1 - > Connection status show OK but unable to surf the net) > > [.} > > It's also worth pointing out that these bitwise operations are *lightning* > fast for computers to do. They're extremely efficient. CPUs have > dedicated circuitry to do them. > Thanks Greg for the detailed tutorial on what netmask is and does. > Let's get back to Debian for a moment. > > Debian doesn't use "iwd" (whatever that is) to configure network > interfaces. Whatever created this file, it's not being used. > Oh. > Debian uses /etc/network/intefaces, which is a file documented by > the man page interfaces(5). Any interface that's correctly defined in > this file will be configured by it. > I confirm that /etc/network/interfaces has been correctly configured because I am able to use a wired LAN connection to sudo apt upgrade and what not. > If network-manager (NM) is installed, it will try to configure any > interfaces that are *not* defined in /etc/network/interfaces. On some > systems, this means NM is the primary means of configuring interfaces. > On others, it may only do the wireless interfaces, while /e/n/i does > the ethernet ones. On still other systems, NM might do nothing, or it > might not even be installed at all. > Thanks again for the detailed explanation about what NM does. However according to the tutorials that I read on the internet, NM and wpasupplicant must be uninstalled prior to installing the package iwd. > Debian also allows you to configure interfaces using some crazy systemd > thing. This isn't done by any of the supported installation task sets. > What did you mean by "installation task sets"? Did you mean the tasksel stage of the installation process where we get to choose to install a Gnome DE, KDE DE, LXQT DE etc?
Re: iwd: Using iwd to connect to a wireless network (Part 1 - Connection status show OK but unable to surf the net)
Hi Dan > Sent: Wednesday, September 29, 2021 at 10:08 PM > From: "Dan Ritter" > To: "Stella Ashburne" > Cc: "debian-user mailing list" > Subject: Re: iwd: Using iwd to connect to a wireless network (Part 1 - > Connection status show OK but unable to surf the net) > > > You are using Debian, right? > > Yes I do. In fact Debian 11/Bullseye is my distro. > > Different distros do things differently. > Based on my experience with using ArchLinux's tutorials, I have been able to get all of my stuff done on Debian without problems. After all both are Linux distros. It's not like one of them belongs to *BSD family while the other belongs to Linux family. > > > I have no experience using 'iwd', so what I mean is that I > cannot spot a problem in your config. > Let's have a look at ArchLinux's wiki's example (https://wiki.archlinux.org/title/Iwd) which I reproduce here: Setting static IP address in network configuration Add the following section to /var/lib/iwd/network.type file. For example: /var/lib/iwd/spaceship.psk [IPv4] Address=192.168.1.10 Netmask=255.255.255.0 Gateway=192.168.1.1 Broadcast=192.168.1.255 DNS=192.168.1.1 In the above example the broadcast IP is 192.168.1.255. Question: Does the fourth octet have to be 255? > > > then it should assign > > > 192.168.0.30.115 to wlan0 and > > > > > > ip addr show > > > > > > should show that assignation. Does it? > > > > > No, it doesn't. > > Then iwd is not setting up your interface, or your config is > wrong. > Oh dear! This is bad news :(
Re: iwd: Using iwd to connect to a wireless network (Part 1 - Connection status show OK but unable to surf the net)
Hi > Sent: Thursday, September 30, 2021 at 2:29 PM > From: to...@tuxteam.de > To: debian-user@lists.debian.org > Subject: Re: iwd: Using iwd to connect to a wireless network (Part 1 - > Connection status show OK but unable to surf the net) > > I don't know about iwd specifically, but given address and > netmask it should be able to reasonably infer a default > broadcast. So I'd say "yes, but ask iwd" ;-) > Somehow I managed to find out the email addresses of the developers of iwd (who are all from Intel). Do you think any one of them will reply to my email? It's a long shot, I know.
Re: iwd: Using iwd to connect to a wireless network (Part 1 - Connection status show OK but unable to surf the net)
Oh dear! Oh dear! > Sent: Thursday, September 30, 2021 at 1:22 PM > From: "David Wright" > To: debian-user@lists.debian.org > Subject: Re: iwd: Using iwd to connect to a wireless network (Part 1 - > Connection status show OK but unable to surf the net) > > > [IPv4] > > Address=192.168.30.115 > > Netmask=255.255.255.0 > > Gateway=192.168.30.1 > > Broadcast=192.168.30.255 > > DNS=8.8.8.8 > > > It's claimed that iwd can do DHCP itself. For this, you'd drop > the [IPv4] paragraph above, and instead put > > [General] > EnableNetworkConfiguration=true > > into /etc/iwd/main.conf (create if necessary). > Per your suggestion, I created a file main.conf in /etc/iwd/ and typed in the words: [General] EnableNetworkConfiguration=true and saved it. Next I removed the following lines from /var/lib/iwd/whitecollar.psk as you have suggested: [IPv4] Address=192.168.30.115 Netmask=255.255.255.0 Gateway=192.168.30.1 Broadcast=192.168.30.255 DNS=8.8.8.8 and saved the changes. After a reboot, I typed the following word at the command prompt: iwctl Next, I typed station wlan0 show The output was: No device found
Re: iwd: Using iwd to connect to a wireless network (Part 1 - Connection status show OK but unable to surf the net)
Hola David > Sent: Thursday, September 30, 2021 at 1:22 PM > From: "David Wright" > To: debian-user@lists.debian.org > Subject: Re: iwd: Using iwd to connect to a wireless network (Part 1 - > Connection status show OK but unable to surf the net) > > > So the WiFi's SSID is whitecollar (all lower case)? > Si Señor > > [Security] > > PreSharedKey=a long string of alphanumeric characters > > Passphrase=aquickbrownfoxjumpsoverthelazydog > > I take it that you edited in the passphrase, and iwd wrote > the PreSharedKey into the file itself? > Yes, before I submitted my post to lists.debian.org, I changed my passphrase to aquickbrownfoxjumpsoverthelazydog > > [IPv4] > > Address=192.168.30.115 > > Netmask=255.255.255.0 > > Gateway=192.168.30.1 > > Broadcast=192.168.30.255 > > DNS=8.8.8.8 > > Where did you get the number 115 from? > My dear David, I plucked it out of thin air. Mea culpa, mea maxima culpa?? I could have just typed 130 instead of 115. > It's claimed that iwd can do DHCP itself. For this, you'd drop > the [IPv4] paragraph above, and instead put > > [General] > EnableNetworkConfiguration=true > into /etc/iwd/main.conf (create if necessary). > Yes, I think ArchLinux's wiki mentions that starting with iwd's version 0.9, the latter can do DHCP... > > Please note that I have disabled IPv6 by adding the line > > > > GRUB_CMDLINE_LINUX_DEFAULT="ipv6.disable=1 quiet" > > > > to /etc/default/grub > > It's claimed that iwd only configures IPv6 if you have > > [Network] > EnableIPv6=true > > in /etc/iwd/main.conf. > That's absolutely correct. In fact according to the same ArchLinux's wiki, with iwd, support for IPv6 is disabled by default.
Re: iwd: Using iwd to connect to a wireless network (Part 2 - DNS managers)
Hi David Happy to hear from you again. > Sent: Thursday, September 30, 2021 at 1:38 PM > From: "David Wright" > To: debian-user@lists.debian.org > Subject: Re: iwd: Using iwd to connect to a wireless network (Part 2 - DNS > managers) > > > My usual strategy is to let the Debian installer set the dns server to > IP address of the router, and configure the router to query 8.8.8.8/1.1.1.1. > It's not ideal if you have a router that doesn't "belong" to you, > ie that you can't configure yourself. > In the past I used to let the Debian installer set the DNS resolver for me. But you know what? When I did that, I found out that Debian added 192.163.1.1 as one of the DNS resolvers. This was and is a No!No! for me because of possible DNS leaks when I used a commercial VPN provider. Nowadays before I launch the Debian installer in commandline (Expert mode), I'll plug the LAN cable out from the RJ45 port and when the installer asks if I wish to have auto networking configuration enabled, I just click No. Thereafter I enter the IP addresses of my preferred DNS resolvers that are hosted by privacy-conscious folks. > Resolvconf squirrels that original address away in > /etc/resolvconf/resolv.conf.d/original so that it can revert to it > after you have left other networks/VPNs etc. So I guess that, at > worst, you can just write in whatever you want into that file. > Check it is still there after the next boot, and also check > /etc/resolv.conf (which is a symlink) to make sure that it used it ok. > Thanks for the reminder and last I checked /etc/resolv.conf is still there.
Re: iwd: Using iwd to connect to a wireless network (Part 2 - DNS managers)
Hi Reco Thanks for sharing your experience with me. > Sent: Thursday, September 30, 2021 at 9:52 PM > From: "Reco" > To: debian-user@lists.debian.org > Subject: Re: iwd: Using iwd to connect to a wireless network (Part 2 - DNS > managers) > > > The limitation of update-resolv-conf in its current (as of bullseye) > form is that it does nothing to the list of the resolvers that are > configured already before the openvpn handshake. Which could lead to DNS > leaks, which are considered a bad thing by some. > I see. Thanks for your explanation. The following describes what I've been doing when I used the installer since Debian Jessie: 1. Plug the LAN cable out from its RJ45 port 2. Click "No" when asked if I wish to have auto networking configuration enabled 3. Input my IP address, netmask, default gateway and the IP addresses of my preferred DNS resolvers (my preferred DNS resolvers are hosted/managed by privacy-conscious folks all over the world; none of them are from my country, which is part of the Five-Eyes Alliance.) Based on the above description, do you think that update-resolv-conf in Bullseye will leak the IP addresses of my ISP's DNS resolvers? > Back in the day I solved that problem by using a custom dnsmasq config > and a handful of netfilter rules, these days I just use network namespaces. > Would you like to show me how to use network namespaces to solve the problems when using update-resolv-conf?
Re: iwd: Using iwd to connect to a wireless network (Part 1 - Connection status show OK but unable to surf the net)
Hi Dan, Thanks for your reply. > Sent: Thursday, September 30, 2021 at 6:06 AM > From: "Dan Ritter" > To: "Stella Ashburne" > Cc: "debian-user mailing list" > Subject: Re: iwd: Using iwd to connect to a wireless network (Part 1 - > Connection status show OK but unable to surf the net) > > > Might I suggest wicd, which people here do have experience with > and have used successfully? > Before writing this reply, I checked with packages.debian.org and I couldn't find the package wicd in Debian's official list of packages for Debian 11. It seems that it's been removed for some reasons.
Re: iwd: Using iwd to connect to a wireless network (Part 2 - DNS managers)
Hi Anssi Thanks for sharing your experience with me. > Sent: Thursday, September 30, 2021 at 8:15 PM > From: "Anssi Saari" > To: debian-user@lists.debian.org > Subject: Re: iwd: Using iwd to connect to a wireless network (Part 2 - DNS > managers) > > If you mean you want to use the old script update-resolv-conf with > openvpn, > Yes, I was referring to using the old script update-resolv-conf with OpenVPN. > I never got that to do the right thing with any > reliability. > Please explain what you meant by your statement. I've been using update-resolv-conf with OpenVPN without problems for the past four to five years. The dozen or two commercial VPN providers insist that I use update-resolv-conf to prevent DNS and data leaks. ? With systemd-resolved you can use update-systemd-resolved > which actually seems to work. > Would you like to share with me how to invoke/launch systemd-resolved and update-systemd-resolved in combination with OpenVPN please? Do I need to install packages in order to have systemd-resolved and update-systemd-resolved?
Re: iwd: Using iwd to connect to a wireless network (Part 2 - DNS managers)
Hi Reco I'm happy to hear from you again. > Sent: Thursday, September 30, 2021 at 8:20 PM > From: "Reco" > To: debian-user@lists.debian.org > Subject: Re: iwd: Using iwd to connect to a wireless network (Part 2 - DNS > managers) > > > Works for me since Debian squeeze. The script in question does not do > anything more fancy than calling "resolvconf -a" and "resolvconf -d" > anyway. > It worked and still works for me too, since Debian Wheezy. > Of course, if you intend to use openvpn-provided DNS list only, things > will be more complicated. > What did you mean by "openvpn-provided DNS list only"? I didn't know that OpenVPN provides a list of DNS resolvers?
Re: iwd: Using iwd to connect to a wireless network (Part 1 - Connection status show OK but unable to surf the net)
Hi Thanks for sharing your experience with me. > Sent: Thursday, September 30, 2021 at 2:38 PM > From: "riveravaldez" > To: debian-user@lists.debian.org > Subject: Re: iwd: Using iwd to connect to a wireless network (Part 1 - > Connection status show OK but unable to surf the net) > > > Hi, my case was similar, while in Debian I use just /etc/network/interfaces > file or NM, in a Dell laptop with Arch I was using Wicd until it got more > or less abandoned and out of official repositories (like in Debian, IIRC), You're right. Before writing this reply, I checked for the latest version of wicd on packages.debian.org and the latter returned zero results. > so, following Arch wiki instructions, I changed Wicd for the > systemd-networkd+iwd combo, and the Wi-Fi connections are working > fine (previously, wpa_supplicant gave me some persistent problems...). > So, I can say that it's a pretty functional and simple tool for the task. > Meaning, it works. > According to some tutorials that I found on the internet, it's advisable to remove/uninstall wpa_supplicant before using iwd due to potential conflicts. As for your statement "..I changed Wicd for the systemd-networkd+iwd combo...", how did you do it? Could you share how you used systemd-networkd with iwd please? I'm still learning Linux, you know and I appreciate all the help that everyone here is willing to give.
Re: iwd: Using iwd to connect to a wireless network (Part 2 - DNS managers)
Hi Greg > Sent: Thursday, September 30, 2021 at 7:21 PM > From: "Greg Wooledge" > To: debian-user@lists.debian.org > Subject: Re: iwd: Using iwd to connect to a wireless network (Part 2 - DNS > managers) > > > This page doesn't talk about iwd... partly because I'd never heard of it > at the time I wrote most of the content on that page. > Kudos to you for contributing your time and effort for the benefit of the Debian community. > It also doesn't talk about systemd-networkd, or network-manager. If > some people out there know how those things work (in *detail*) and > are able to contribute to the wiki page, that would be great. > Well, if I discover/learn how to make iwd work with systemd-networkd, I shall let you know.
Re: iwd: Using iwd to connect to a wireless network (Part 1 - Connection status show OK but unable to surf the net)
Hi David > Sent: Thursday, September 30, 2021 at 1:25 PM > From: "David Wright" > To: debian-user@lists.debian.org > Subject: Re: iwd: Using iwd to connect to a wireless network (Part 1 - > Connection status show OK but unable to surf the net) > > > Err, not with bullseye. That's why I'm interested to see how Stella > gets on with iwd — > Me too. I'm keen to know why I'm unable to surf the net even after iwd has connected my machine to my wireless network.
Re: iwd: Using iwd to connect to a wireless network (Part 1 - Connection status show OK but unable to surf the net)
Hi Henning > Sent: Thursday, September 30, 2021 at 10:14 PM > From: "Henning Follmann" > To: debian-user@lists.debian.org > Subject: Re: iwd: Using iwd to connect to a wireless network (Part 1 - > Connection status show OK but unable to surf the net) > > > That depends. How did you get their e-mail address? > Was it from the project webpage? Do they encourage anybody to > send them direct mail? > Them yes. > Yes, their email address are displayed on the project's website. No, they didn't mention that any Tom, Dick and Harry are welcome to write to them. > What baffels me is though, at what length someone would go to not use the > default > methods to connect via wifi. Especially when they showed limited experience > in networking in the first place. > Pray thee, what are the default methods that you speak of? My OS is plain Debian 11 with just lxqt-core and lightdm installed. I'm tired of using Gnome. Indeed, I've very limited networking and that's why I'm motivated to learn how to use iwd to surf the net.
Re: iwd: Using iwd to connect to a wireless network (Part 1 - Connection status show OK but unable to surf the net)
Hi Dan > Sent: Thursday, September 30, 2021 at 11:15 PM > From: "Dan Ritter" > To: "Stella Ashburne" > Cc: debian-user@lists.debian.org > Subject: Re: iwd: Using iwd to connect to a wireless network (Part 1 - > Connection status show OK but unable to surf the net) > > > Try > > ip link show > > and look for the name of a device which could be your wifi NIC. > Nope, ip link show does not show up any device which is my wifi NIC
Re: iwd: Using iwd to connect to a wireless network (Part 1 - Connection status show OK but unable to surf the net)
Hi Tomas > Sent: Thursday, September 30, 2021 at 11:48 PM > From: to...@tuxteam.de > To: debian-user@lists.debian.org > Subject: Re: iwd: Using iwd to connect to a wireless network (Part 1 - > Connection status show OK but unable to surf the net) > > On Thu, Sep 30, 2021 at 10:14:05AM -0400, Henning Follmann wrote: > > [...] > > > What baffels me is though, at what length someone would go to not use the > > default > > methods to connect via wifi. Especially when they showed limited experience > > in networking in the first place. > > This remark was, IMO, unnecessary: after all, that's how we learn around here, > don't we? > > At least that's how I learn. > Bingo. I couldn't agree with you more. The main objective of having a mailing list for Debian users is so that we, as a community of like-minded individuals, are able to share our knowledge and experience.
Re: iwd: Using iwd to connect to a wireless network (Part 1 - Connection status show OK but unable to surf the net)
Hi Thanks for your words of encouragement. > Sent: Thursday, September 30, 2021 at 11:39 PM > From: rhkra...@gmail.com > To: debian-user@lists.debian.org > Subject: Re: iwd: Using iwd to connect to a wireless network (Part 1 - > Connection status show OK but unable to surf the net) > > On Thursday, September 30, 2021 10:54:17 AM Stella Ashburne wrote: > Yes, their email address are displayed on the project's website. > No, they didn't mention that any Tom, Dick and Harry are welcome to write > to them. Well, thank goodness your name is Stella ;-) (Sorry!) I think the > implication of them having their email address on the project's website is > that Tom, Dick and Harry (and even Stella) are welcome to write to > them, and they have the implied option of not replying for whatever reason. > Be bold, go where no man has gone before ;-) Your statement: "Be bold, go where no man has gone before" I suppose that "man" refers to both men and women, right? (Just kidding. In this time and age, one has to be seen to be politically correct, yes?)
Debian 11: Unable to detect wireless interface on an old laptop computer
I have a dual-boot OS configuration on my HDD: Debian 11 and Microsoft Windows 10. My CPU belongs to Intel 4th generation (Haswell) and I even installed packages such as firmware-misc-nonfree firmware-iwlwifi firmware-realtek Microsoft Windows 10 is able to detect and makes use of the wireless chipset on my computer's motherboard. However, Debian 11 is unable to detect it (wireless chipset). I only installed the bare minimum lxqt-core and lightdm packages (no fanciful stuff). I issued the command: ip link show and there is not a line that says something like wlan or wl01 etc... Below is the output of lspci: 00:00.0 Host bridge: Intel Corporation Xeon E3-1200 v3/4th Gen Core Processor DRAM Controller (rev 06) 00:01.0 PCI bridge: Intel Corporation Xeon E3-1200 v3/4th Gen Core Processor PCI Express x16 Controller (rev 06) 00:01.1 PCI bridge: Intel Corporation Xeon E3-1200 v3/4th Gen Core Processor PCI Express x8 Controller (rev 06) 00:02.0 VGA compatible controller: Intel Corporation 4th Gen Core Processor Integrated Graphics Controller (rev 06) 00:03.0 Audio device: Intel Corporation Xeon E3-1200 v3/4th Gen Core Processor HD Audio Controller (rev 06) 00:04.0 Signal processing controller: Intel Corporation Device 0c03 (rev 06) 00:14.0 USB controller: Intel Corporation 8 Series/C220 Series Chipset Family USB xHCI (rev 05) 00:16.0 Communication controller: Intel Corporation 8 Series/C220 Series Chipset Family MEI Controller #1 (rev 04) 00:1a.0 USB controller: Intel Corporation 8 Series/C220 Series Chipset Family USB EHCI #2 (rev 05) 00:1b.0 Audio device: Intel Corporation 8 Series/C220 Series Chipset High Definition Audio Controller (rev 05) 00:1c.0 PCI bridge: Intel Corporation 8 Series/C220 Series Chipset Family PCI Express Root Port #1 (rev d5) 00:1c.2 PCI bridge: Intel Corporation 8 Series/C220 Series Chipset Family PCI Express Root Port #3 (rev d5) 00:1c.3 PCI bridge: Intel Corporation 8 Series/C220 Series Chipset Family PCI Express Root Port #4 (rev d5) 00:1d.0 USB controller: Intel Corporation 8 Series/C220 Series Chipset Family USB EHCI #1 (rev 05) 00:1f.0 ISA bridge: Intel Corporation HM87 Express LPC Controller (rev 05) 00:1f.2 SATA controller: Intel Corporation 8 Series/C220 Series Chipset Family 6-port SATA Controller 1 [AHCI mode] (rev 05) 00:1f.3 SMBus: Intel Corporation 8 Series/C220 Series Chipset Family SMBus Controller (rev 05) 00:1f.6 Signal processing controller: Intel Corporation 8 Series Chipset Family Thermal Management Controller (rev 05) 06:00.0 Ethernet controller: Realtek Semiconductor Co., Ltd. RTL8111/8168/8411 PCI Express Gigabit Ethernet Controller (rev 10) 07:00.0 Network controller: Intel Corporation Wireless 3160 (rev 83) 0a:00.0 3D controller: NVIDIA Corporation GM107M [GeForce GTX 950M] (rev a2) Could someone help me please? Thanks.
Re: Debian 11: Unable to detect wireless interface on an old laptop computer
Hello Henning, Thanks for your reply. > Sent: Tuesday, September 28, 2021 at 1:09 AM > From: "Henning Follmann" > To: debian-user@lists.debian.org > Subject: Re: Debian 11: Unable to detect wireless interface on an old laptop > computer > > And after that device shows up nmcli can be very useful: > nmcli device > > will list your network devices > > if it is not enabled - unless it it is physically switched off - > you can unblock it with > > nmcli radio wifi on > > and to connect > nmcli --ask dev wifi connect > > it will ask for your wpa password and by default will remember it. nmcli is from the package network-manager, yes? If it is, I'd prefer not to install it. Why? Many VPN providers/vendors recommend against using Network Manager to connect to OpenVPN servers because the former is buggy and leaks details about the user. I just came to know that there is a much better wireless daemon called iwd. On the internet it's said that iwd performs better and faster than the tradition wpasupplicant. What's more iwd was conceptualized by someone at Intel. If you do know how to make changes to the settings of iwd configuration files, I wish to seek your help. You see, I'd to learn how to make use of this wonderful new technology. I have googled the internet and most of them don't provide detailed tutorials on how to set up for a home user. Sure, for example on ArchLinux's wiki pages, there are tutorials on how to set EAP-TTLS etc. I don't even know what EAP-TTLS stands for. Some of the links that I have surfed to are the following: https://wiki.archlinux.org/title/Iwd https://unix.stackexchange.com/questions/477488/connect-to-wifi-from-command-line-on-linux-systems-through-the-iwd-wireless-dae https://docs.voidlinux.org/config/network/iwd.html
Re: Debian 11: Unable to detect wireless interface on an old laptop computer
Hi David, It's reassuring to know that you're still around and thanks for replying to my original post. > > And also any output from: > > # dmesg | grep iwl > username@hostname:~$ sudo dmesg|grep iwl [sudo] password for username: [9.169801] iwlwifi :07:00.0: enabling device ( -> 0002) [9.170310] iwlwifi :07:00.0: firmware: failed to load iwlwifi-3160-17.ucode (-2) [9.170402] iwlwifi :07:00.0: Direct firmware load for iwlwifi-3160-17.ucode failed with error -2 [9.170405] iwlwifi :07:00.0: iwlwifi-3160-17 is required [9.170434] iwlwifi :07:00.0: check git://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git username@hostname:~$ It's my terrible mistake. After installing the package firmware-iwlwifi, the command "ip link show" displayed the name of the wireless interface. (I thought I had installed firmware-iwlwifi on this machine but I was wrong. In fact I installed it on my sister's newer computer but not on this one.)
Re: Debian 11: Unable to detect wireless interface on an old laptop computer
> > This one looks like it might be your friend. AFAIK the firmware for that > is in the firmware-iwlwifi package. > > What does `lsmod | grep iwl' say? username@hostname:~$ lsmod|grep iwl iwlwifi 294912 0 cfg80211 970752 1 iwlwifi username@hostname:~$ But you are right. After installing the package firmware-iwlwifi, the command "ip link show" displays the name of the wireless interface. (I thought I had installed firmware-iwlwifi but I was wrong. In fact I installed it on my sister's newer computer but not on this one.) Thanks for your reply.
Re: iwd: Using iwd to connect to a wireless network (Part 1 - Connection status show OK but unable to surf the net)
Hi guys Thanks for your replies. > Sent: Wednesday, September 29, 2021 at 6:20 AM > From: "Jude DaShiell" > To: "Dan Ritter" , "Stella Ashburne" > , "debian-user mailing list" > Subject: Re: iwd: Using iwd to connect to a wireless network (Part 1 - > Connection status show OK but unable to surf the net) > > Have you got: > (setq gnutls-algorithm-priority "NORMAL:-VERS-TLS1.3") > in your .emacs file? The internet broke for emacs a while ago and this > line fixed that problem. It may also have done some other things as well. > > What is the exact location of .emacs file?
Re: iwd: Using iwd to connect to a wireless network (Part 1 - Connection status show OK but unable to surf the net)
Hi Dan > Sent: Wednesday, September 29, 2021 at 9:30 PM > From: "Dan Ritter" > To: "Stella Ashburne" > Cc: "debian-user mailing list" > Subject: Re: iwd: Using iwd to connect to a wireless network (Part 1 - > Connection status show OK but unable to surf the net) > > > If that's correct configuration for iwd, What did you mean by "correct configuration"? I based my .psk file on the sample provided by ArchLinux's wiki on iwd > then it should assign > 192.168.0.30.115 to wlan0 and > > ip addr show > > should show that assignation. Does it? > No, it doesn't.
Re: iwd: Using iwd to connect to a wireless network (Part 1 - Connection status show OK but unable to surf the net)
Hi Dan Thanks for your reply. > Sent: Wednesday, September 29, 2021 at 4:45 AM > From: "Dan Ritter" > To: "Stella Ashburne" > Cc: "debian-user mailing list" > Subject: Re: iwd: Using iwd to connect to a wireless network (Part 1 - > Connection status show OK but unable to surf the net) > > > Try > > sudo dhclient wlan0 > > and see if that gives you an IP and a default route, at which > point apt update should work. > I tried the command: sudo dhclient wlan0 and no result (nothing) appeared. May I refer you to the sub-section titled "Setting static IP address in network configuration" of ArchLinux' wiki on iwd (https://wiki.archlinux.org/title/Iwd). My file whitecollar.psk located in /var/lib/iwd/ has the following contents: [Security] PreSharedKey=a long string of alphanumeric characters Passphrase=aquickbrownfoxjumpsoverthelazydog [IPv4] Address=192.168.30.115 Netmask=255.255.255.0 Gateway=192.168.30.1 Broadcast=192.168.30.255 DNS=8.8.8.8 Please note that I have disabled IPv6 by adding the line GRUB_CMDLINE_LINUX_DEFAULT="ipv6.disable=1 quiet" to /etc/default/grub
iwd: Using iwd to connect to a wireless network (Part 2 - DNS managers)
I refer to the sub-section "Select DNS manager" (https://wiki.archlinux.org/title/Iwd), in which the statement reads as follows: At the moment, iwd supports two DNS managers - systemd-resolved and resolvconf Question: Which of the above two manages my DNS queries in a default Debian with lxqt-core and lightdm? In /etc/network/interfaces, my dns-servers are 8.8.8.8 1.1.1.1 [How do I manage to add only these two IP addresses? During installation of Debian 11, I unplugged the LAN cable from my machine. I installed the OS without any internet connection and thus avoided auto configuration of the network.] I also installed the package resolvconf because I need to use it with openvpn.
Re: How do I mount the USB stick containing the installer in Rescue Mode?
Hi Reco Thanks for your help. > Sent: Friday, July 16, 2021 at 5:09 AM > From: "Reco" > To: debian-user@lists.debian.org > Subject: Re: How do I mount the USB stick containing the installer in Rescue > Mode? > > > > What you actually need is to bind mount the directory with packages into > > > the mounted /dev/perfect-vg/root, and just chroot into it. No need to > > > modify /etc/fstab at all. > > > > > Could you be so nice as to give me the command(s) to bind mount the > > directory with packages? Thank you. > > mount --bind \ > /target/ > Sorry, what's source_dir_with_packages ? Were you referring to /dev/sdb1 ? By target_dir_where_packages_should_be, did you mean that I create a directory called stella (for example)?
Re: How do I mount the USB stick containing the installer in Rescue Mode?
> Sent: Thursday, July 15, 2021 at 11:59 AM > From: "Reco" > To: debian-user@lists.debian.org > Subject: Re: How do I mount the USB stick containing the installer in Rescue > Mode? > > > Output of mount is > > > > root@perfect:/# mount > > /dev/mapper/perfect--vg-root on / type ext4 (rw,relatime) > > devtmpfs on /dev type devtmpfs > > (rw,relatime,size=8137669k,nr_inodes=2034417,mode=755) > > proc on /proc type proc (rw,relatime) > > sysfs on /sys type sysfs (rw,relatime) > > tmpfs on /run type tmpfs (rw,nosuid,relatime,size=1629756k,mode=755) > > root@perfect:/# > > And yet it fails to mount /dev/sdb1. Interesting. > I suppose the reason is that the USB stick is already mounted for booting into Rescue Mode. > Ok, how about this (I'm assuming that the USB stick in question is > plugged in): > Yes, it's always plugged in because I need it in Rescue Mode. > lsblk > root@perfect:/# lsblk NAME MAJ:MIN RM ROTYPEMOUNTPOINT sda 8:0 00 disk sda1 8.1 00 part sda2 8:2 00 part sda3 8:3 00 part sda3_crypt 253:000 crypt perfect--vg-swap 253:100 lvm perfect--vg-root 253:200 lvm / sdb 8:16 10 disk sdb1 8:17 10 part sdb2 8:18 10 part sr0 11:0 10 rom root@perfect:/# > fdisk -l /dev/sdb > root@perfect:/# fdisk -l /dev/sdb Disk /dev/sdb Device BootStart End SectorsSize IdType /dev/sdb1* 0 7677919 76779203.7G 0 Empty /dev/sdb224260 294435184 2.5M efEFI (FAT-12/16/32) root@perfect:/# > file -sL /dev/sdb1 > root@perfect:/# file -sL /dev/sdb1 bash: file: command not found root@perfect:/# > ls -al /media/usbdisk > root@perfect:/# ls -al /media/usbdisk ls: cannot access '/media/usbdisk' : No such file or directory > mountpoint /media/usbdisk > root@perfect:/# mountpoint /media/usbdisk mountpoint: /media/usbdisk : No such file or directory root@perfect:/#
Re: How do I mount the USB stick containing the installer in Rescue Mode?
> Sent: Thursday, July 15, 2021 at 3:49 PM > From: "David Wright" > To: debian-user@lists.debian.org > Subject: Re: How do I mount the USB stick containing the installer in Rescue > Mode? > > This > might help the OP boot the system manually and recover the blue > Grub menu. > That's very nice of you, David.
Re: How do I mount the USB stick containing the installer in Rescue Mode?
Hi > Sent: Thursday, July 15, 2021 at 7:07 PM > From: "Reco" > To: debian-user@lists.debian.org > Subject: Re: How do I mount the USB stick containing the installer in Rescue > Mode? > Ok. Can you use this rescue mode to execute an ordinary shell, with full > access to all filesystems? Before I proceed with your suggestion, while in Resuce Mode, do I enter the encryption passphrase or not? If I don't enter the password, /dev/perfect-vg/root won't be mounted. Even after I've entered the encryption passphrase, there are two ways to execute a shell: one is to execute it in /dev/perfect-vg/root environment and the other is to execute it in the installer environment. Which environment do you want me to executve a shell in please? What did you mean by "full access to all filesystems"? When I was installing Debian 11, I first encrypted a free space with LUKS and then created two logical volumes in it: one whose mount point is / (the root file system. Debian installer requires it; otherwise the installation can't and won't proceed.) while the other is "used as" swap area. > If you're using your USB stick to boot, you have its file system > (/dev/sdb1 in this case) mounted. That's a logical assumption because I needed the USB-installer to boot into Rescue Mode. > If you're executing a shell in a > logical volume, you're chrooted into that filesystem. I had to enter the encryption passphrase first, followed by mounting /dev/perfect-vg/root as a root file system temporarily. Then I chose 'Execute a shell in the installer environment' and only then would I be able to chroot /target > But it does not change that the filesystem from /dev/sdb1 is mounted > already, it's just inaccessible from the chroot. > That's why I asked for help here. > What you actually need is to bind mount the directory with packages into > the mounted /dev/perfect-vg/root, and just chroot into it. No need to > modify /etc/fstab at all. > Could you be so nice as to give me the command(s) to bind mount the directory with packages? Thank you.
Re: How do I mount the USB stick containing the installer in Rescue Mode?
Hello Thomas > Sent: Thursday, July 15, 2021 at 7:30 PM > From: "Thomas Schmitt" > To: debian-user@lists.debian.org > Subject: Re: How do I mount the USB stick containing the installer in Rescue > Mode? > > Well, since the case "already mounted" is quite outruled, it might be time > to explore "mount point busy". > > > https://codesearch.debian.net/search?q=package%3Autil-linux+already+mounted+or+mount+point+busy > shows that mount(8) emits this message if it gets error code EBUSY. > It is not so clear from where this code comes, but mount(2) would be a > fine candidate (or placeholder). In Rescue Mode, it's impossible for me to install packages such as the one whose link you had provided. > > So does it work with some other, newly created directory instead of /mnt ? > No, it doesn't work with other newly created directories in addition to /mnt. > Have a nice day :) > You too. > Thomas > Stella
Re: How do I mount the USB stick containing the installer in Rescue Mode?
Hi David > Sent: Thursday, July 15, 2021 at 6:42 PM > From: "David Wright" > To: debian-user@lists.debian.org > Subject: Re: How do I mount the USB stick containing the installer in Rescue > Mode? > > That's right, it's the 16th deb to be installed at the main > installation stage, but if you use the installer stick for > rescue, I don't think it's installed early enough. > Based on the result of typing the 'file' command, it's appears that the package 'file' isn't installed when one is using Rescue Mode. > Chicken and egg: I think the OP is trying to set up some sort of > repository to install packages from. (I can't be sure. Your guess is right. I wish to install linux-image-5.10.0-7-amd64.deb onto chroot /target after entering Rescue Mode. > I would > have preferred it if they'd continued to try and boot their > actual installed system, At this moment I don't have a GRUB menu. > but any help I might have given > fell short because I have no experience with LVM.) Oh..but you've helped me in other ways and for which I appreciate it very much.
Re: How do I mount the USB stick containing the installer in Rescue Mode?
Hello David > Sent: Thursday, July 15, 2021 at 7:08 PM > From: "David Wright" > To: debian-user@lists.debian.org > Subject: Re: How do I mount the USB stick containing the installer in Rescue > Mode? > > > Best I can do. (And I see that your kernel's naming of sda/sdb > is more stable than on at least a couple of my machines.) > What did you mean by "more stable"? > It might be worth posting a request for the stanza I asked for, > but as a new topic with a specific Subject line. What "stanza" were you referring to? Was it Reco who posted it? And you wrote that it was posted some time in June? > I can't see > why you shouldn't be able to boot your system with manual Grub > commands. I thought so too. GRUB developers would and should have built a "Rescue Mode" by just entering the commands.
Re: How do I mount the USB stick containing the installer in Rescue Mode?
> Sent: Thursday, July 15, 2021 at 6:26 PM > From: "Brian" > To: debian-user@lists.debian.org > Subject: Re: How do I mount the USB stick containing the installer in Rescue > Mode? > > On Thu 15 Jul 2021 at 20:01:05 +0200, Stella Ashburne wrote: > > > root@perfect:/# file -sL /dev/sdb1 > > bash: file: command not found > > root@perfect:/# > Nope, apparently it isn't available in Rescue Mode. Entered encryption passphrase -> Choose a device to use as root file system -> /dev/perfect-vg/root -> Execute a shell in /dev/perfect-vg/root > File is a standard utilty. It should be on your system. It isn't available in Rescue Mode. > > apt install file > Unable to install now as I'm in Rescue Mode without an internet connection. The only way for me to install packages is to use the USB-installer (Debian 11) and I can't mount it.
Re: How do I mount the USB stick containing the installer in Rescue Mode?
Hello David, Nice to hear from you again. > Sent: Thursday, July 15, 2021 at 4:05 PM > From: "David Wright" > To: debian-user@lists.debian.org > Subject: Re: How do I mount the USB stick containing the installer in Rescue > Mode? > > Presumably given as root. > A definite yes because I chose to mount /dev/perfect-vg/root as a root file system in Rescue Mode. > > The error message is: > > > > mount: /media/myusb: /dev/sdb1 already mounted or mount point busy > > Type: > $ ls -l /dev/disk/by-label/ > to see what the kernel called your stick. Debian installers have LABELs. root@perfect:/# ls -l /dev/disk/by-label/ Total 0 lrwxrwxrwx 1 root root 10 Jul 15 17:00 'Debian\x20testing\x20amd64\x201' --> ../../sdb1 root@perfect:/# > > > Below are the results of cat /etc/fstab > > > > > > > > /dev/mapper/perfect--vg-root / ext4 errors-remount-ro > > 0 1 > > /boot/efi was on /dev/sda1 during installation > > There's a # before that line > Which line please? > > UUID=A30E-2C33/boot/efi vfatumask=0077 0 1 > > /dev/mapper/perfect--vg-swapnone swapsw 0 0 > > /dev/sr0 /media/cdrom0 udf, iso9660 user, noauto 0 0 > > /media/myusb > > That line looks spurious. If you put it there, I would remove it for > the time being. > Did you mean /media/myusb ? > When you mount a USB stick as root, you don't need > an entry in fstab, but you do need to create a mount point first. I didn't know that I didn't need to create an entry in fstab if I mount a USB stick as root. > Of course, this has been done for you as a convenience: there is > a /mnt directory specifically for temporarily mounting a device. > root@perfect:/# mount /dev/sdb1 /mnt mount: /mnt: /dev/sdb1 already mounted or mount point busy root@perfect:/#
Re: How do I mount the USB stick containing the installer in Rescue Mode?
I quote a section of the Debian's man page of mount: The move operation Move a mounted tree to another place (atomically). The call is: mount --move olddir newdir This will cause the contents which previously appeared under olddir to now be accessible under newdir. The physical location of the files is not changed. Note that olddir has to be a mountpoint. What commands shall I type to find out the location of the directory where linux-image-5.10.0-7-amd64.deb is, given the fact that I'm using a USB-installer? Do I need to use the --bind argument like mount --bind --move olddir newdir P.S.: I have never been a fan of using man pages because the commands contained therein don't provide examples of how to use them properly.
Re: location of screenshots during debian install
> Sent: Tuesday, July 27, 2021 at 7:14 AM > From: "Jupiter777" > To: debian-user@lists.debian.org > Subject: location of screenshots during debian install > > > Where are the screenshots? I like to use them for troubleshooting? > I'm sorry to ask you but have you googled the internet for answers before writing to this mailing list? Based on my experience in asking for help here, Mr David Wright is the one guy who doesn't ask you refer to man pages. He's actually quite nice. There's only one guy who can match David in both helpfulness and a being a gentleman. You can find him in the OpenBSD forum. And based on my experience as a beginner of all things Linux, man pages are not for those who don't have a foundation in computer science like e. The commands contained in them aren't accompanied by examples on how to use them. Sure, a brief description is given for each command. However, IMHO, it isn't enough to help me. Best regards. Stella
Re: Uninstalling a package removes other essential packages: What is the best course of action?
Dearie, Thanks for your reply. > Sent: Tuesday, February 15, 2022 at 2:48 PM > From: to...@tuxteam.de > To: debian-user@lists.debian.org > Subject: Re: Uninstalling a package removes other essential packages: What is > the best course of action? > > > Please, hold your horses. Lack of knowledge sometimes might > come across as "xenophobic" -- things sometimes clear themselves > once knowledge grows. Give us people a chance to learn :-) > We have to make allowance for the fact that some people are quick to judge others Best regards. Stella
Under each of these scenarios, what is the neatest and simplest way to manipulate the /etc/network/interfaces file?
Hi There are instances in which my machine is connected to a mobile hotspot. And in some situations, it's connected to a smartphone via USB tethering. And when I'm in the office, I may connect it to a LAN cable. Below are the contents of my /etc/network/interfaces file: # This file describes the network interfaces available on your system # and how to activate them. For more information, see interfaces(5). source /etc/network/interfaces.d/* # The loopback network interface auto lo iface lo inet loopback # The primary network interface #allow-hotplug enx61s07 #iface enx60a4b79d7f48 inet static # address 192.168.1.35/24 # gateway 192.168.1.1 # dns-* options are implemented by the resolvconf package, if installed # dns-nameservers 1.1.1.1 8.8.8.8 # The primary network interface for USB tethering allow-hotplug usb0 iface usb0 inet dhcp static address 192.168.42.35 gateway 192.168.42.1 # dns-* options are implemented by the resolvconf package, if installed dns-nameservers 1.1.1.1 8.8.8.8 # The primary network interface for wireless connections #allow-hotplug wlo1 #iface wlo1 inet dhcp static # wpa-ssid Osia27 # wpa-psk string-of-alphanumberice-characters # address 192.168.43.28 # gateway 192.168.43.1 # dns-nameservers 1.1.1.1 8.8.8.8 Questions: 1. At the moment, if I wish to change to using a mobile hotspot from USB tethering, I'll edit the /etc/network/interfaces file, uncomment the applicable lines under #The primary network interface for wireless connections and place a # in front of all the lines under #The primary network interface for USB tethering Instead of carrying out the above steps, is there a neater and simpler way? 2. What is the command to type in a terminal after I have made changes to the /etc/network/interfaces file without rebooting my machine? Best regards. Stella
Re: Uninstalling a package removes other essential packages: What is the best course of action?
Hello Dearie I am happy to hear from you again and hope that everything's fine with you and your family. > Sent: Sunday, February 13, 2022 at 6:23 AM > From: "David" > To: "debian-user" > Subject: Re: Uninstalling a package removes other essential packages: What is > the best course of action? > > > But, why do you care? There may be many packages installed > that you will never notice that you will never use. > Why pick on this one? > > libthai appears to not occupy much disk space: > > > So there's hardly any win for the effort. > Indeed, you asked a very pertinent question. "Why pick on this one?", you asked. It just happens that this file was in my installed Debian. I have checked for other non-English files and found none other than Thai files. "But, why do you care?" you wondered. I care because I am worried that it may contain poorly designed code or backdoors that enable root privileges without my explicit intervention. Nobody has bothered to audit the Thai files that I mentioned for integrity and probable malicious activity. > Alternatively, don't install lxqt-core. Only install what you want. > Some ideas here: > https://wiki.debian.org/ReduceDebian > > Naturally this kind of thing takes time and effort which you may > or may not find is worthwhile depending on your goals, and > what you choose to spend productive time doing. > You're right. I don't have the time nor the intellectual capacity to customize my Debian setup. I'll just have to look for other ways to install a custom Debian without foreign-language files.
Re: Uninstalling a package removes other essential packages: What is the best course of action?
Hello Dearie > Sent: Sunday, February 13, 2022 at 8:34 AM > From: "David Wright" > To: debian-user@lists.debian.org > Subject: Re: Uninstalling a package removes other essential packages: What is > the best course of action? > > > Installing those two would add 170 more packages to my system, so OMG > > > > What is the best course of action? > > Leave it. Worry about bigger issues than the odd library. > For all you know, the odd library which is this Thai file in question may contain poorly designed code, ill-intentioned designed code or backdoors that enable(s) root privileges without a user's direct intervention. Best regards. Stella
Re: Uninstalling a package removes other essential packages: What is the best course of action?
Hello > Sent: Wednesday, February 16, 2022 at 10:04 AM > From: "The Wanderer" > To: debian-user@lists.debian.org > Subject: Re: Uninstalling a package removes other essential packages: What is > the best course of action? > > What if someone sends you a document that has one or more words written > in Thai? In order to be able to display that document correctly, the > computer will need code that knows how to handle the Thai language. > Whether that code is in libthai, or in a more general library, or > embedded directly in whatever program it is that's reading the document, > it's still there. > > Even if you can be sure you'll never have any reason to want to read a > document that contains Thai, the same thing applies for every other > language that doesn't just use the same character set, etc., as English. > Most of them don't have sufficiently unusual and/or complex rules that > they need a dedicated library to handle them, as Thai apparently does, > but they do need something to handle whatever rules there may be. > So why not create libraries for Burmese, Laotian and Cambodian (Khmer) languages? Why don't we have libburmese, liblaotian and libkhmer and make them essential dependencies for libpango? Best regards. Stella
Re: What should I put inside the file called wlan0?
Dearie > Sent: Tuesday, March 01, 2022 at 4:20 AM > From: to...@tuxteam.de > To: debian-user@lists.debian.org > Subject: Re: What should I put inside the file called wlan0? > > > However, if I remember your original post correctly, there were security > reasons mentioned (about a possibly world readable /etc/network/interfaces, > and splitting out an .../interfaces.d/wlan0 as a fix), Note that by default > (in Debian, at least) /etc/network/interfaces is only root-readable. So > this wouldn't be the reason you'd want to do the split (there are other > valid reasons, though). > According to Debian Wiki WiFi How To Use (https://wiki.debian.org/WiFi/HowToUse), the reason for doing the split is: (sic) Restrict the permissions of /etc/network/interfaces, to prevent pre-shared key (PSK) disclosure Best regards. Stella
Re: What should I put inside the file called wlan0?
Dearie > Sent: Tuesday, March 01, 2022 at 4:21 AM > From: to...@tuxteam.de > To: debian-user@lists.debian.org > Subject: Re: What should I put inside the file called wlan0? > > On Mon, Feb 28, 2022 at 09:20:07PM +0100, to...@tuxteam.de wrote: > > [...] > > > (in Debian, at least) /etc/network/interfaces is only root-readable. So > If that's the case, why would Debian Wiki recommend to chmod as follows? # chmod 0600 /etc/network/interfaces (source: https://wiki.debian.org/WiFi/HowToUse) Best regards. Stella
Re: What should I put inside the file called wlan0?
Dearie, > Sent: Tuesday, March 01, 2022 at 4:08 AM > From: "Brian" > To: debian-user@lists.debian.org > Subject: Re: What should I put inside the file called wlan0? > > > You do not want just anyone to read /etc/network/interfaces? > > chmod 600 /etc/network/interfaces > That's the recommended step in said Wiki. What's the default chmod value of /etc/network/interfaces? Best regards. Stella
Re: What should I put inside the file called wlan0?
Dearie, Thanks for your reply. > Sent: Tuesday, March 01, 2022 at 3:10 AM > From: to...@tuxteam.de > To: debian-user@lists.debian.org > Subject: Re: What should I put inside the file called wlan0? > > > So if you have this in your /etc/network/interfaces somewhere: > > ... > ## Bahn ICE > iface wlan0 inet dhcp > wireless-essid WIFIonICE > wireless-mode Auto > ... > > (it's actually my current setting, BTW :) you could swap that > out to some file under interfaces.d. The contents of my current /etc/network/interfaces file are: # The primary network interface allow-hotplug wlp3s0 iface wlp7s0 inet static wpa-ssid JupiterRising wpa-psk {a long string of alphanumeric characters} address 192.168.1.99/24 gateway 192.168.1.1 # dns-* options are implemented by the resolvconf package, if installed dns-nameservers 1.1.1.1 8.8.8.8 Are you saying that I can cut out the above contents and paste them into a file called wlp7s0 (whose path is /etc/network/interfaces.d/)? Best regards. Stella
Re: Authentication failed after su-
Dearie Thanks for your offer of help; however. > Sent: Tuesday, March 01, 2022 at 3:10 AM > From: "Andrew M.A. Cater" > To: debian-user@lists.debian.org > Subject: Re: Authentication failed after su- > > > If you use sudo: prefix the above command with sudo > > It may be that you need > > su - -l -c "rest of the line" > > su alone doesn't always get you root equivalent: the default changed a while > ago now so su - is needed. Firstly, I tried the command: sudo su - -l -c "rest of the line" It didn't work Next, I tried: sudo su- -l -c "rest of the line" It didn't work either On the third try, I typed: sudo -i followed by "rest of the line" (I ignored -l -c because if I included them, the "rest of the line" wouldn't be executed. Besides I don't know what the arguments -l -c stand for.) Alternatively, one could type: sudo su Best regards. Stella
Re: Authentication failed after su-
Dearie > Sent: Tuesday, March 01, 2022 at 5:09 AM > From: "Dan Ritter" > To: "Stella Ashburne" > Cc: debian-user@lists.debian.org > Subject: Re: Authentication failed after su- > > Stella Ashburne wrote: > > sudo su - -l -c "rest of the line" > > > > It didn't work > > Copy and paste the actual error; they contain real information > to help us figure out what is happening. > To avoid confusion, I shall use the original example provided by Debian Wiki (https://wiki.debian.org/WiFi/HowToUse) which is: su -l -c "wpa_passphrase myssid my_very_secret_passphrase > /etc/wpa_supplicant/wpa_supplicant.conf" In a terminal, I typed: username@hostname:~$ su -l -c "wpa_passphrase JupiterRising 1234567890 > /etc/wpa_supplicant/wpa_supplicant.conf" Password: su: Authentication failure The output is Authentication failure Best regards. Stella
Re: Authentication failed after su-
Dearie > Sent: Tuesday, March 01, 2022 at 7:13 AM > From: "Dan Ritter" > To: "Stella Ashburne" > Cc: debian-user@lists.debian.org > Subject: Re: Authentication failed after su- > > > > > In a terminal, I typed: > > > > username@hostname:~$ su -l -c "wpa_passphrase JupiterRising 1234567890 > > > /etc/wpa_supplicant/wpa_supplicant.conf" > > Password: > > su: Authentication failure > > That means that you failed to give the root password. > I disabled the root password during the process of installing Debian 11. What should I do to resolve the issue? Best regards. Stella
Re: Authentication failed after su-
Dearie > Sent: Tuesday, March 01, 2022 at 5:47 AM > From: "Bob McGowan" > To: debian-user@lists.debian.org > Subject: Re: Authentication failed after su- > > On 2/28/22 13:09, Dan Ritter wrote: > > sudo su - -l -c "rest of the line" > > Some comments on this, without knowing just how it failed: > > 1. There is no reason I can see to using both 'sudo' and 'su' > together. By default, they both let you run a command as the root user. > Thanks for the clarification. > 2. Using both '-' and '-l' with su is redundant, they do almost (per > the man page) the same thing. The man page suggests '-l' is better due > to reduced side effects. > I wonder what "side effects" they may be. > 3. The -c option provides a means to tell su to run a specific > command. So the string 'rest of the line' generates an error stating > 'command not found' if run as is. You need to supply this part of the > line so processing can be duplicated and evaluated. > Thanks once again. > If I insert an 'echo' before the word 'rest', there is no error. > Noted. > Hence, the actual error is needed, as well as the actual command being run. > The actual command is actually lifted from Debian Wiki (https://wiki.debian.org/WiFi/HowToUse). It is: su -l -c "wpa_passphrase myssid my_very_secret_passphrase > /etc/wpa_supplicant/wpa_supplicant.conf" In a terminal, I typed: username@hostname:~$ su -l -c "wpa_passphrase JupiterRising 1234567890 > /etc/wpa_supplicant/wpa_supplicant.conf" Password: su: Authentication failure username@hostname:~$ The error message is Authentication failure. Please note that I have chosen not to create a root password during the process of installing Debian 11. Best regards. Stella
What should I put inside the file called wlan0?
I quote from Debian Wiki (https://wiki.debian.org/WiFi/HowToUse) : "Restrict the permissions of /etc/network/interfaces, to prevent pre-shared key (PSK) disclosure (alternatively use a separate config file such as /etc/network/interfaces.d/wlan0 on newer Debian versions): " What should I put in the file called wlan0? Said wiki does not provide examples. Best regards. Stella