[PVE-User] Proxmox 4.0 - problem with noVNC Console

2015-10-21 Thread Fabrizio Cuseo
Hello. With PVE 4.0 using noVNC console on Qemu VM, the power button can't be clicked. Using console on LXC, sometimes remains in "Loading" status; starting from that moment, i can't access the console until I delete and recreate the container. Someone have the same problem ? -- --- Fabrizio

[PVE-User] couple of questions for new lxc containers

2015-10-21 Thread hackru
Hello I have a couple of questions i create containers like this: pct create $id /var/lib/vz/template/cache/$template \ -net0 name=eth0,bridge=$bridge,ip=$ip,gw=$gw \ -cpulimit $cpus \ -memory $mem \ -storage rbd \ -mp0 "rbd:$storagesize,mp=/storage" \ -onboot 1 \ -password

Re: [PVE-User] PVE 4.0 - problem restoring vm

2015-10-21 Thread Dietmar Maurer
> On October 21, 2015 at 2:39 PM Fabrizio Cuseo wrote: > > > Hello. > Sometimes, restoring a vm, at the end I have this error and no vm is restored. Thanks for the bug report. I filed a bug report here: http://tracker.ceph.com/issues/13560

[PVE-User] PVE 4.0 - problem restoring vm

2015-10-21 Thread Fabrizio Cuseo
Hello. Sometimes, restoring a vm, at the end I have this error and no vm is restored. progress 96% (read 32985382912 bytes, duration 516 sec) progress 97% (read 33328988160 bytes, duration 516 sec) progress 98% (read 33672593408 bytes, duration 516 sec) progress 99% (read 34016198656 bytes,

Re: [PVE-User] ceph/rbd to qcow2 - sparse file

2015-10-21 Thread Alexandre DERUMIER
>>- rbd --> qcow2 (with proxmox 3.4 and POWERED-OFF vm) loose the sparse mode >>- qemu-img convert qcow2-->qcow2 gives me back a sparsed image >>- move (from gui) qcow2 --> rbd with proxmox 4.0 (and vm powered off), loose >>the sparse mode >>- qemu-img convert qcow2--> rbd (from CLI), keep the

[PVE-User] Diffie-Hellman vulnerability

2015-10-21 Thread Karl Ståhl
Hi! Is this vulnerability fixed for Proxmox web interface? https://weakdh.org/ /Karl signature.asc Description: OpenPGP digital signature ___ pve-user mailing list pve-user@pve.proxmox.com http://pve.proxmox.com/cgi-bin/mailman/listinfo/pve-user

Re: [PVE-User] Diffie-Hellman vulnerability

2015-10-21 Thread Wolfgang Bumiller
As far as I can tell the most important part of this is that _clients_ reject DH primes < 1024 bit, as a man-in-the-middle can downgrade the connection. As for what the server supports, this mostly depends on the openssl packages available. # openssl s_client -connect localhost:8006 -cipher EDH