Re: RedShift

2021-06-25 Thread Jakub Jelen

On 6/25/21 5:19 AM, ToddAndMargo via users wrote:

Hi All,

Fedora 34
Xfce 4.14
redshift-1.12-11.fc34.x86_64
redshift-gtk-1.12-11.fc34.x86_64

Hi All,

Red Shift is all screwed up again:


Unable to connect to GeoClue. Unable to get location from provider:

https://github.com/jonls/redshift/issues/318#issuecomment-865667340

is back in full force.


Is there an alternatives to Red Shift?


Gnome integrated this in its own settings as a "Night Light" couple of 
years back and I am using that to satisfaction. But I assume it will not 
solve your issues on xfce ...


https://www.addictivetips.com/ubuntu-linux-tips/gnome-night-light-mode/

Regards,
--
Jakub Jelen
Crypto Team, Security Engineering
Red Hat, Inc.
___
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Deprecating SCP

2020-11-10 Thread Jakub Jelen

On 11/5/20 7:49 PM, Michael Hennebry wrote:

On Wed, 4 Nov 2020, George N. White III wrote:


On Wed, 4 Nov 2020 at 11:39, Michael Hennebry <
henne...@web.cs.ndsu.nodak.edu> wrote:



In this particular case, I'd think the client
could tell that a .BAT file was not a .c file.



Downloading 1000's of files resulting from some HPC calculation
it would be easy to overlook an unwanted file.


To be clear, I'd meant the client could to it automatically.


To be clear, the scp client does finename matching already by default. 
But if there is a recursive download (or a regex matching the malicious 
file), this might not help either.


Not even using sftp, if the file is sneaked inside of the downloaded 
directory. But breaking scp protocol to do that is a matter of inserting 
one command, while SFTP requires significantly more work and the 
downloads can be properly audited (unlike scp, which is just a command 
on the server).


Regards,
--
Jakub Jelen
Senior Software Engineer
Crypto Team, Security Engineering
Red Hat, Inc.
___
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org


Re: Deprecating SCP

2020-11-03 Thread Jakub Jelen

On 11/2/20 4:57 PM, francis.montag...@inria.fr wrote:


Hi.

On Mon, 02 Nov 2020 15:44:39 +0100 Jakub Jelen wrote:


Is this something you would like to see in Fedora soon?


No. I prefer a lot to use rsync, because scp:

  - has no dry-run mode
  - is not incremental
  - follows symlinks when used with the -r option
  - has too few options: no --chown --chgrp


Then you are indeed not the target group.


Do you have something against this?


No: users should be free to continue using it (but not with the -r option IMO).


The vulnerability of the -r was not the only issue found in scp over 
last years. And recursive copying of files is handy so I do not think it 
is a good idea to axe just one commandline switch.



Is your use case missing?


With scp no, but I use sshfs for years. This is IMO something to promote.

Ex: Example: a simple 3-way copy, assuming you have root SSH access (with keys)

 mkdir /mnt/hostA
 sshfs -o transform_symlinks root@hostA:/ /mnt/hostA
 rsync -a --delete /mnt/hostA/etc/skel/ root@hostB:/etc/skel


sshfs is using sftp internally so you are already using the sftp. 
Congratulations.


Regards,
--
Jakub Jelen
Senior Software Engineer
Crypto Team, Security Engineering
Red Hat, Inc.
___
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org


Re: Deprecating SCP

2020-11-03 Thread Jakub Jelen

On 11/2/20 5:13 PM, Joe Wulf via users wrote:
Improving the state of security for SCP is overdue.  Like you've said, 
Jakub, the code just hasn't been worked on in a long time, nor been 
well-maintained.


I am curious to better understand if the scp binary, as implemented, has 
security-related issues of concern here (along with old code), or if the 
protocol being used is the significant issue; or maybe a mixture of both.


It is a mixture of both.

There were issues where malicious servers could write any file on the 
client, including .ssh/known_hosts or authorized_keys while downloading 
other files. These were labeled as CVE-2019-6111, CVE-2019-6110, 
CVE-2019-6109. These were issues of design of the SCP protocol (based on 
RCP, which is almost 40 years old) and implementation. There was another 
issue CVE-2020-15778, which could allow remote code execution and there 
might be more to be found. The above were fixed, but CVE-2019-6111 
already caused some backward incompatible changes.


At this point, almost any direction to improve scp is welcome and 
appreciated by many.  One challenge for adoption of the method you are 
proposing (and working on), is that conflict between the easy/casual use 
of scp via established channels where ssh is already accepted (keys, 
etc) versus those environments (or set of systems) where an sftp server 
running is forbidden due to security hardening requirements.


If there are policies preventing the use of sftp, while allowing scp, 
they are bogus and need to be reconsidered. Even though SFTP is more 
complex, it supports much more fine-grained access configuration, 
including readonly access, which is not possible with scp at all. 
Similarly, if something was not possible with scp (change permissions, 
create directory), one could connect through ssh, which usually works 
and do it in the terminal. SFTP provides access control around these 
operations too.


Security hardening is a scrupulous effort in many places. Reduce the 
attack surface, is but one mantra.  As others have pointed out, the ease 
with which to quickly move some files will never go away, and in that 
regard, scp has been 'good enough' both from a functionality, as well as 
security-hardening, perspectives.


Proposing/discussing how to approach the deprecation of 
scp-as-we-know-it-today would help, too.


I would suggest to re-evaluate the hardening requirements as a start. 
What will happen with scp as we know today is still open question and I 
do not expect it will be gone in 5 years, but people and policies should 
start to learn the difference and advantage of the sftp now.


Regards,
Jakub


Thank you.

R,
-Joe Wulf

On Monday, November 2, 2020, 10:54:59 AM EST, Jakub Jelen 
 wrote:



On 11/2/20 4:36 PM, Kamil Dudka wrote:
 > On Monday, November 2, 2020 3:44:39 PM CET Jakub Jelen wrote:
 >> Hi Fedora users!
 >>
 >> Over the last years, there were several issues in the SCP protocol,
 >> which lead us into discussions if we can get rid of it in upstream [1].
 >> Most of the voices there said that they use SCP mostly for simple ad-hoc
 >> copy and because sftp utility does not provide simple interface to copy
 >> one or couple of files back and forth and because of people are just
 >> used to write scp rather than sftp.
 >>
 >> Some months ago, I wrote a patch [2] for scp to use SFTP internally
 >> (with possibility to change it back using -M scp) and ran it through
 >> some successful testing. The general feedback from upstream was also
 >> quite positive so I would like to hear also opinions from our users.
 >>
 >> It still has some limitations (missing -3 support, it will not work if
 >> the server does not run sftp subsystem, ...), but it should be good
 >> enough for most common use cases.
 >>
 >> Today, I set up a copr repository with the current openssh from Fedora +
 >> the patch [2] for anyone to test and provide feedback, either here on
 >> the mailing list, or in the github PR according to ones preferences.
 >>
 >> I am looking for any kind of feedback from the idea through the
 >> usability, implementation. Is this something you would like to see in
 >> Fedora soon? Do you have something against this? Is your use case 
missing?

 >>
 >> [1]
 >> 
https://lists.mindrot.org/pipermail/openssh-unix-dev/2020-June/038594.html

 >> [2] https://github.com/openssh/openssh-portable/pull/194/
 >> [3] https://copr.fedorainfracloud.org/coprs/jjelen/openssh-sftp/
 >
 > How is the "compatibility scpd to support old clients" going to differ
 > from the current implementation?

I can think of a solution that in the end, there will be just the server
parts of the current scp and the client code branches will be gone or
support sftp only. But this can change as we are not ther

Re: Deprecating SCP

2020-11-03 Thread Jakub Jelen

On 11/2/20 4:09 PM, Ian Pilcher wrote:

On 11/2/20 8:44 AM, Jakub Jelen wrote:
I am looking for any kind of feedback from the idea through the 
usability, implementation. Is this something you would like to see in 
Fedora soon? Do you have something against this? Is your use case 
missing?


What impact will this have on compatibility with other operating
systems (Windows 10, etc.)?


If you are able to run sftp server on Windows, you will be able to 
connect to it as before.


Regards,
--
Jakub Jelen
Senior Software Engineer
Crypto Team, Security Engineering
Red Hat, Inc.
___
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org


Re: Deprecating SCP

2020-11-02 Thread Jakub Jelen

On 11/2/20 4:36 PM, Kamil Dudka wrote:

On Monday, November 2, 2020 3:44:39 PM CET Jakub Jelen wrote:

Hi Fedora users!

Over the last years, there were several issues in the SCP protocol,
which lead us into discussions if we can get rid of it in upstream [1].
Most of the voices there said that they use SCP mostly for simple ad-hoc
copy and because sftp utility does not provide simple interface to copy
one or couple of files back and forth and because of people are just
used to write scp rather than sftp.

Some months ago, I wrote a patch [2] for scp to use SFTP internally
(with possibility to change it back using -M scp) and ran it through
some successful testing. The general feedback from upstream was also
quite positive so I would like to hear also opinions from our users.

It still has some limitations (missing -3 support, it will not work if
the server does not run sftp subsystem, ...), but it should be good
enough for most common use cases.

Today, I set up a copr repository with the current openssh from Fedora +
the patch [2] for anyone to test and provide feedback, either here on
the mailing list, or in the github PR according to ones preferences.

I am looking for any kind of feedback from the idea through the
usability, implementation. Is this something you would like to see in
Fedora soon? Do you have something against this? Is your use case missing?

[1]
https://lists.mindrot.org/pipermail/openssh-unix-dev/2020-June/038594.html
[2] https://github.com/openssh/openssh-portable/pull/194/
[3] https://copr.fedorainfracloud.org/coprs/jjelen/openssh-sftp/


How is the "compatibility scpd to support old clients" going to differ
from the current implementation?


I can think of a solution that in the end, there will be just the server 
parts of the current scp and the client code branches will be gone or 
support sftp only. But this can change as we are not there yet.



libcurl implements its own SCP client over libssh.  Will this implementation
continue to work after OpenSSH gets updated on servers?


With the above update, everything will work as before -- it affects only 
the client scp binary.



Applications often allow users to pass arbitrary URLs to libcurl.  So one can,
for example, use scp:// URLs to specify a kickstart for Anaconda.  The fact
that scp utility will be reimplemented over SFTP does not help much in this
case.  Each build of libcurl that supports scp:// supports sftp:// as well.
But libcurl will not transmit scp:// requests over sftp:// in case SCP is not
supported by the remote server any more.


As Simo wrote, I think it is something that will have to happen sooner 
or later inside of libcurl or libssh or in users configurations. But 
again, the above change should not have any effect on this.


Regards,
--
Jakub Jelen
Senior Software Engineer
Crypto Team, Security Engineering
Red Hat, Inc.
___
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org


Re: [Fedora] Deprecating SCP

2020-11-02 Thread Jakub Jelen

On 11/2/20 3:57 PM, Walter Cazzola wrote:

Hi,
I don't know if and how the internet protocol scp: is related to the scp
command. But I suppose it is.


Hi,
SCP is not an internet protocol -- it is simple protocol that is used 
inside of encrypted SSH session, similarly to SFTP protocol. The name 
comes from RCP which actually was unencrypted internet protocol and 
which is hopefully gone.



I'm using scp: a lot to edit remote files with vim and I'm pretty sure that
many remote admins are doing the same.

So I'm wondering how this change will affect my use case scenario and if 
you

have considered it when moving to sftp.


That is a good question!

When I try to use scp://host/file I am getting errors that vim is trying 
to use `rcp` command (yuck!). But using the same with sftp://host/file 
works like a charm.


I believe vim is using just scp to fetch the file so if the connection 
to the server will work also with sftp, it should continue to work (but 
I recommend using sftp protocol anyway).


The simplest way to try is to try with sftp:// or try the previously 
mentioned package, but my best bet is that it will keep on working as 
before (even though I never used this inside of vim up until today).


Regards,
Jakub


Thank you
Walter

On Mon, 2 Nov 2020, Jakub Jelen wrote:


Hi Fedora users!

Over the last years, there were several issues in the SCP protocol, 
which lead us into discussions if we can get rid of it in upstream 
[1]. Most of the voices there said that they use SCP mostly for simple 
ad-hoc copy and because sftp utility does not provide simple interface 
to copy one or couple of files back and forth and because of people 
are just used to write scp rather than sftp.


Some months ago, I wrote a patch [2] for scp to use SFTP internally 
(with possibility to change it back using -M scp) and ran it through 
some successful testing. The general feedback from upstream was also 
quite positive so I would like to hear also opinions from our users.


It still has some limitations (missing -3 support, it will not work if 
the server does not run sftp subsystem, ...), but it should be good 
enough for most common use cases.


Today, I set up a copr repository with the current openssh from Fedora 
+ the patch [2] for anyone to test and provide feedback, either here 
on the mailing list, or in the github PR according to ones preferences.


I am looking for any kind of feedback from the idea through the 
usability, implementation. Is this something you would like to see in 
Fedora soon? Do you have something against this? Is your use case 
missing?


[1] 
https://lists.mindrot.org/pipermail/openssh-unix-dev/2020-June/038594.html 


[2] https://github.com/openssh/openssh-portable/pull/194/
[3] https://copr.fedorainfracloud.org/coprs/jjelen/openssh-sftp/

Thanks,






--
Jakub Jelen
Senior Software Engineer
Crypto Team, Security Engineering
Red Hat, Inc.
___
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org


Deprecating SCP

2020-11-02 Thread Jakub Jelen

Hi Fedora users!

Over the last years, there were several issues in the SCP protocol, 
which lead us into discussions if we can get rid of it in upstream [1]. 
Most of the voices there said that they use SCP mostly for simple ad-hoc 
copy and because sftp utility does not provide simple interface to copy 
one or couple of files back and forth and because of people are just 
used to write scp rather than sftp.


Some months ago, I wrote a patch [2] for scp to use SFTP internally 
(with possibility to change it back using -M scp) and ran it through 
some successful testing. The general feedback from upstream was also 
quite positive so I would like to hear also opinions from our users.


It still has some limitations (missing -3 support, it will not work if 
the server does not run sftp subsystem, ...), but it should be good 
enough for most common use cases.


Today, I set up a copr repository with the current openssh from Fedora + 
the patch [2] for anyone to test and provide feedback, either here on 
the mailing list, or in the github PR according to ones preferences.


I am looking for any kind of feedback from the idea through the 
usability, implementation. Is this something you would like to see in 
Fedora soon? Do you have something against this? Is your use case missing?


[1] 
https://lists.mindrot.org/pipermail/openssh-unix-dev/2020-June/038594.html

[2] https://github.com/openssh/openssh-portable/pull/194/
[3] https://copr.fedorainfracloud.org/coprs/jjelen/openssh-sftp/

Thanks,
--
Jakub Jelen
Senior Software Engineer
Crypto Team, Security Engineering
Red Hat, Inc.
___
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org


Re: EXTERNAL: Re: sshd on F31 : strange problem with login with keys's

2019-11-29 Thread Jakub Jelen
On Thu, 2019-11-28 at 16:27 +, Wells, Roger K. via users wrote:
> On 11/26/19 8:32 AM, Ed Greshko wrote:
> > On 2019-11-26 20:27, Jouk Jansen wrote:
> > > I'm trying to setup an ssh-server on F31 which logs a user in
> > > without a
> > > password, but with a key-exchange. I generated all the keys and
> > > placed them
> > > in the right locations. It still asks for the password.
> > > 
> > > Than comes the strange : I stoped the service by "systemctl stop
> > > sshd" and
> > > did run "as root" /usr/sbin/sshd. And than it just worked. (tried
> > > to stop
> > > and start with systemctl again made the passwordless login fail
> > > again)
> > > 
> > > Question : why does is work with just running "/usr/sbin/sshd"
> > > but not with
> > > "systemctl start sshd" ?
> > One thing you should check is the permissions on the ~/.ssh on the
> > machine you're trying to connect
> > to.  If it is not 700 you will get the behavior you cite.
> I've seen this on several fedora updates.  Something changes
> permissions
> on ~/.ssh and then what you see happens

Nothing changes permissions on updates on itself. The .ssh directory
was copied from somewhere else and it retained its SELinux context or
wrong modes.

Regards,
-- 
Jakub Jelen
Senior Software Engineer
Security Technologies
Red Hat, Inc.
___
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org


Re: Fedora 32 Firefox and DNS over HTTPS

2019-11-28 Thread Jakub Jelen
On Wed, 2019-11-27 at 15:17 -0800, Kevin Fenzi wrote:
> On Wed, Nov 27, 2019 at 04:43:06PM -0500, Robert Moskowitz wrote:
> > In the upcoming Fedora 32, is Firefox defaulting to DNS over HTTPS
> > (RFC
> > 8484)?
> 
> No. firefox in fedora will not default enable this. 
> 
> https://bugzilla.redhat.com/show_bug.cgi?id=1751410#c2

Great to hear that Fedora is shielding us from these half-baked ideas
(or contracts?).

Last time it was unsolicited browser extension, now it is DoH to
CloudFlare servers. What will be next? I recommend the following
thread:

https://twitter.com/paulvixie/status/1198013742493028353

Many users are used to Firefox now. But was there some discussion about
providing some more privacy-focused browser?

Regards,
-- 
Jakub Jelen
Senior Software Engineer
Security Technologies
Red Hat, Inc.
___
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org


Re: (fedora) Re: sshd on F31 : strange problem with login with keys's

2019-11-28 Thread Jakub Jelen
On Wed, 2019-11-27 at 13:47 +0100, Jouk Jansen wrote:
> Jakub Jelen wrote on 27-NOV-2019 13:20:25.09
> 
> > On Tue, 2019-11-26 at 13:27 +0100, Jouk Jansen wrote:
> [snip]
> > > Question : why does is work with just running "/usr/sbin/sshd"
> > > but
> > > not with
> > > "systemctl start sshd" ?
> > This sounds like an issue with selinux permissions on the
> > authorizied
> > keys file or path to it. Configure sshd to run in debug mode by
> > setting
> > LogLevel DEBUG3 in sshd_config, restart the service and retry. The
> > logs
> > will show up in journal and in /var/log/secure pointing the reason
> > why
> > your key was rejected.
> 
> You are right. I switched selinux off (setenforce 0) and the problem
> is
> gone. I could not find an entry in the journalctl -e output (but
> maybe I
> overlooked (too many records)). Perhaps I should look in the selinux
> logs,
> but where do I find them?

Hello.
I would start with sshd logs as I described above. The selinux denials
are in /var/log/audit/audit.log but they sometimes do not give enough
information what is wrong.

Regards,
-- 
Jakub Jelen
Senior Software Engineer
Security Technologies
Red Hat, Inc.
___
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org


Re: sshd on F31 : strange problem with login with keys's

2019-11-27 Thread Jakub Jelen
On Tue, 2019-11-26 at 13:27 +0100, Jouk Jansen wrote:
> Hi All,
> 
> I'm trying to setup an ssh-server on F31 which logs a user in without
> a
> password, but with a key-exchange. I generated all the keys and
> placed them
> in the right locations. It still asks for the password.
> 
> Than comes the strange : I stoped the service by "systemctl stop
> sshd" and
> did run "as root" /usr/sbin/sshd. And than it just worked. (tried to
> stop
> and start with systemctl again made the passwordless login fail
> again)
> 
> Question : why does is work with just running "/usr/sbin/sshd" but
> not with
> "systemctl start sshd" ?

This sounds like an issue with selinux permissions on the authorizied
keys file or path to it. Configure sshd to run in debug mode by setting
LogLevel DEBUG3 in sshd_config, restart the service and retry. The logs
will show up in journal and in /var/log/secure pointing the reason why
your key was rejected.


Regards,
-- 
Jakub Jelen
Senior Software Engineer
Security Technologies
Red Hat, Inc.
___
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org


Re: SSH after upgrade

2019-10-07 Thread Jakub Jelen
On Mon, 2019-10-07 at 14:13 +0200, Marko Vojinovic wrote:
> On Mon, 07 Oct 2019 10:38:32 +0200
> Jakub Jelen  wrote:
> 
> > On Mon, 2019-10-07 at 02:53 +0200, Marko Vojinovic wrote:
> > > On Mon, 7 Oct 2019 10:21:03 +1100
> > > Cameron Simpson  wrote:
> > > > On 07Oct2019 01:00, Marko Vojinovic  wrote:
> > > > > On Sun, 06 Oct 2019 18:05:02 +0200
> > > > > alcir...@gmail.com wrote:
> > > > > > It could it be related to this change:
> > > > > > https://fedoraproject.org/wiki/Releases/31/ChangeSet#Disable_Root_Password_Login_in_SSH
> > > > > 
> > > > > As a side question --- I remember that this was the default
> > > > > for
> > > > > upstream OpenSSH since 2015, but was not adopted in Fedora
> > > > > because
> > > > > people who install Fedora on headless machines (or remotely)
> > > > > would
> > > > > have no other way of logging in after initial installation.
> > > > > So
> > > > > why
> > > > > the change of heart now, what happened to the headless login
> > > > > issue?
> > > > 
> > > > Because one can generally set up a normal user, log in as them,
> > > > then
> > > > su or sudo.
> > > 
> > > Was this not possible back in 2015?
> > > 
> > > I guess I am asking what technically changed between then and
> > > now,
> > > so that we didn't block root back then and we are doing it now?
> > 
> > Please, read the whole fedora change page. It answers all your
> > questions.
> 
> Well, the relevant sentence from the change page says:
> 
> "Fedora was for many practical reasons keeping the old configuration
> since then, but the difference is no longer bearable"
> 
> Can you please elaborate what were the "many practical reasons" that
> prevented this from being changed for the last 5 years? And why are
> they not equally practical now?

Mostly the unwillingness of people who were used to use root accounts
in Fedora and not enough alternatives how to override or set up
alternative during installation.

The initial change was half-baked proposed 5 years ago:

https://fedoraproject.org/wiki/Changes/SSHD_PermitRootLogin_no

but never accepted by FeSCO (note sure if it was even proposed) and
started long discussions on mailing lists as linked from there.

Since then, we did not change the value to "no", but we disabled only
the password logins, we added a simple way how to override this in
anaconda installer and there are simple ways how to override it in
kickstarts or add a public ssh keys to authorized_keys files.

> Don't get me wrong, I fully support this change, disabling ssh root
> login is the very first thing I do every time I install a new system.
> And each time I ask myself why on earth isn't this the default, but I
> sort-of remember (from various discussions on this mailing list back
> in
> 2015 or so) that people had good reasons to keep it that way.

I think it was mostly testing and scratch boxes that needed root logins
(specific use cases), making sure that there is some other account that
is allowed to login after installation (installation problems). But I
think I did not manage to read that thread this year again.

> And now
> that I see the default is going to be changed, I'm curious what were
> those reasons and what happened to them --- how come they were
> good enough for the last five years, and are not good enough now? 

5 years ago, there were no simple workarounds for the installation.
Even this year, the agreement was not really smooth and updating
installer was one of the requirements for the change to be approved:

https://pagure.io/fesco/issue/2133

This change request is in Fedora actually for more than 15 years:

https://bugzilla.redhat.com/show_bug.cgi?id=89216

Back in that time, this was not default even in upstream and many
people were using root accounts.

> What
> changed? Or else, why wasn't this done already back in 2015?

I think that over the years, the security practices shifted to better
solutions, people learned to use normal users, sudo and ssh keys, which
allowed us to do this finally. Originally the change would be a
surprise for users, but recently, people were surprised by the root
login allowed in Fedora, which also started to be dangerous.

Regards,
Jakub

> Best, :-)
> Marko
> 
> 
> 
> 
> ___
> users mailing list -- users@lists.fedoraproject.org
> To unsubscribe send an email to users-le...@lists.fedoraproject.org
> Fedora Code of Conduct: 
> https://docs.fedorap

Re: SSH after upgrade

2019-10-07 Thread Jakub Jelen
On Mon, 2019-10-07 at 02:53 +0200, Marko Vojinovic wrote:
> On Mon, 7 Oct 2019 10:21:03 +1100
> Cameron Simpson  wrote:
> 
> > On 07Oct2019 01:00, Marko Vojinovic  wrote:
> > > On Sun, 06 Oct 2019 18:05:02 +0200
> > > alcir...@gmail.com wrote:
> > > > It could it be related to this change:
> > > > https://fedoraproject.org/wiki/Releases/31/ChangeSet#Disable_Root_Password_Login_in_SSH
> > > 
> > > As a side question --- I remember that this was the default for
> > > upstream OpenSSH since 2015, but was not adopted in Fedora
> > > because
> > > people who install Fedora on headless machines (or remotely)
> > > would
> > > have no other way of logging in after initial installation. So
> > > why
> > > the change of heart now, what happened to the headless login
> > > issue?
> > 
> > Because one can generally set up a normal user, log in as them,
> > then
> > su or sudo.
> 
> Was this not possible back in 2015?
> 
> I guess I am asking what technically changed between then and now, so
> that we didn't block root back then and we are doing it now?

Please, read the whole fedora change page. It answers all your
questions.

You can always install public keys for root during kickstart (it might
not have been that easy before) or allow password root logins from
Anaconda (which is new feature in F31).

Regards,
-- 
Jakub Jelen
Senior Software Engineer
Security Technologies
Red Hat, Inc.
___
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org


Re: [SOLVED] SSH after upgrade

2019-10-07 Thread Jakub Jelen
On Sun, 2019-10-06 at 11:15 -0500, Mike Chambers wrote:
> On Sun, 2019-10-06 at 18:05 +0200, alcir...@gmail.com wrote:
> > On Sun, 2019-10-06 at 10:46 -0500, Mike Chambers wrote:
> > > Upgraded server from Fedora 30 to 31 (updated to present), and
> > > ssh
> > > into
> > > that server works fine as normal user, but no longer lets me
> > > login
> > > as
> > > root.  I can login as root from the server machine itself, and
> > > can
> > > login via su - but just cant' from ssh.
> > > 
> > > Any ideas what changed or got replaced so revert it back?
> > 
> > It could it be related to this change: 
> > https://fedoraproject.org/wiki/Releases/31/ChangeSet#Disable_Root_Password_Login_in_SSH
> 
> Had to add the below line to my sshd.conf file and works now.
> 
> PermitRootLogin yes
> 
> Guess it changed or got removed when I did the upgrade (upgraded via
> dnf, not a clean install), but added that line and it works now.

No, this IS intentional change of Fedora 31 to disable password root
logins. This account is very frequent target of brute-force attacks
(and this change was made by upstream OpenSSH years ago).

Please, do not advise this as a general solution. The correct solution
is to setup public key authentication or use different user and sudo
for the administrative tasks.

Regards,
-- 
Jakub Jelen
Senior Software Engineer
Security Technologies
Red Hat, Inc.
___
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org


Re: Volume/mute/brightness keys stopped working

2019-08-13 Thread Jakub Jelen
On Tue, 2019-08-13 at 03:23 -0500, Ian Pilcher wrote:
> I have a Dell Precision 5520 laptop (basically an XPS 15).  The
> volume,
> mute, and brightness "function" keys have always just worked on this
> laptop with no additional configuration required ... until now.
> 
> Something has changed in the last week or two, and the keys no longer
> have any effect (except that the brightness increase key now toggles
> the maximized state of terminal windows).
> 
> Anyone else seen this recently?
> 
> Assuming no, anyone have any hints on how to debug this?  I'm not
> really
> sure how these function keys work (i.e. are they keypresses, ACPI
> events, something else?).
> 
> Any thoughts appreciated.  Thanks!

I think something like this happened to my Thinpad also during last
weeks, but after some time, it started to work again. Did you try to
reboot?

Regards,
-- 
Jakub Jelen
Senior Software Engineer
Security Technologies
Red Hat, Inc.
___
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org


Re: OSM??

2019-05-22 Thread Jakub Jelen
On Tue, 2019-05-21 at 14:52 -0700, Clifford Snow wrote:
> What exactly are you trying to accomplish? I've never heard of an
> .iso.
> There is a java based editor, JOSM. I believe their might be a repo
> for it,
> but I find just downloading the new JAR file every once in a while
> works
> satisfactorily.

Josm is packaged in Fedora so dnf install josm is enough.

> The OSM database, we call the plant, is quite large. It needs to be
> downloaded from planet.openstreetmap.org. GeoFribrik at
> download.geofabrik.de has extracts for parts of the world. And HOTOSM
> has
> an export tool, https://export.hotosm.org/en/v3/, to grab areas for
> download.
> 
> If you want to duplicate the website, look on github.
> 
> Gnome does have a extension with an OSM map which I find out of date
> so I
> don't use it.
> 
> Best,
> Clifford AKA Glassman on OSM
> 
> 
> 
> On Tue, May 21, 2019 at 10:26 AM Beartooth 
> wrote:
> 
> > Can dnf get me OSM? I tried osm, OSM, and openstreetmap. I
> > don't
> > doubt there's some sort of .iso on their own site, but with a
> > program so
> > vast ...
> > 
> > --
> > Beartooth Staffwright, Not Quite Clueless Power User
> > Remember I know little (precious little!) of where up is.
> > ___
> > users mailing list -- users@lists.fedoraproject.org
> > To unsubscribe send an email to users-le...@lists.fedoraproject.org
> > Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
> > List Guidelines: 
> > https://fedoraproject.org/wiki/Mailing_list_guidelines
> > List Archives:
> > https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org
> > 
> 
> ___
> users mailing list -- users@lists.fedoraproject.org
> To unsubscribe send an email to users-le...@lists.fedoraproject.org
> Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
> List Guidelines: 
> https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: 
> https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org
-- 
Jakub Jelen
Senior Software Engineer
Security Technologies
Red Hat, Inc.
___
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org


Re: update failed

2019-02-25 Thread Jakub Jelen
On Mon, 2019-02-25 at 09:33 -0500, Frank McCormick wrote:
> Tried to update my Fedora 29 this morning. It failed
> 
> with this error:
> 
> 
> [SKIPPED] google-chrome-stable-72.0.3626.119-1.x86_64.rpm: Already 
> downloaded
> Package ffmpeg-4.1.1-7.fc29.x86_64.rpm is not signed
> Package ffmpeg-libs-4.1.1-7.fc29.x86_64.rpm is not signed
> Package libavdevice-4.1.1-7.fc29.x86_64.rpm is not signed
> The downloaded packages were saved in cache until the next
> successful 
> transaction.
> You can remove cached packages by executing 'dnf clean packages'.
> Error: GPG check FAILED
> 
> 
> Is there a work around or should I just wait ?

$ dnf info google-chrome-stable
Error: No matching Packages to list

There is no chrome package in Fedora. If you have issues with updates
from third party repositories, it is probably better to ask where you
got these repositories from.

Note, that chromium works fine.

Regards,
-- 
Jakub Jelen
Software Engineer
Security Technologies
Red Hat, Inc.
___
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org


Re: Extremely slow Josm

2019-01-04 Thread Jakub Jelen
Hello,
do you have the same version from Fedora repositories on both? You can
try also to run the jnlp from

https://josm.openstreetmap.de/

or even flatpack

https://flathub.org/apps/details/org.openstreetmap.josm

The speed of running can be also caused by the hardware (you did not
point out if the hardware is similar or completely different). There
are many possibilities.

Do you have some josm plugins installed? Cleaning up some configuration
directories might also help, but I never had a problem with JOSM
performance (except for the fact that it is a java application).

Regards,
Jakub

On Thu, 2019-01-03 at 22:05 +0100, Robin Lee wrote:
> Hi
> 
> I have a desktop and a laptop, both with fully updated Fedora 29. The
> laptop is a fresh installation while the desktop has been upgraded
> from
> previous versions of Fedora. And I have Josm installed on both.
> 
> Now the problem is that on the desktop Josm has become really slow.
> You
> need some serious patience to use it. On the laptop it works fine as
> it
> did on the desktop before. I've tried to reinstall Josm, but that
> didn't help.
> 
> Josm is a Java application.
> 
> Any idea what could be wrong?
> 
> Cheers
> Robin
> ___
> users mailing list -- users@lists.fedoraproject.org
> To unsubscribe send an email to users-le...@lists.fedoraproject.org
> Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
> List Guidelines: 
> https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: 
> https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org
-- 
Jakub Jelen
Software Engineer
Security Technologies
Red Hat, Inc.
___
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org


Re: scp over wireless is slow

2018-09-03 Thread Jakub Jelen
On Sun, 2018-09-02 at 22:16 -0600, Chris Murphy wrote:
> Fedora 28 Server
> Fedora 28 Workstation
> dd-wrt 802.11n Broadcom based router
> Connected wirelessly 5GHz, wired ethernet cable is physically
> disconnected from Server
> 
> File transfer from Workstation to Server
> 
> scp: scp itself reports ~620KB/s; where nload on the server reports
> ~4.9Mbit/s
> smb: GNOME reports 4.9MB/s; where nload on the server reports
> ~39.8Mbit/s
> 
> Why? That's rather unexpected.
> 
> Command is
> scp test.bin f28s.local:/srv/scratch
> 
> Using nc, I get speeds slightly faster than smb. OK so encryption? If
> I connect wired, and then 'nmcli  c down ' to disconnect the
> wireless connection:
> 
> scp: 12MB/s, nload ~101Mbit/s
> smb: nload ~96Mbit/s
> 
> So, it's not encryption. Why would scp be this much slower only
> with a wireless connection? And using:
> 
> rync -avzhe ssh test.bin f28s.local:/srv/scratch
> 
> Over wireless, this is just as bad as scp.


SCP protocol is really slow, especially on networks with high latency
(wireless). The reason why is mostly the size of buffers, which is very
small and SCP waits for every part to be confirmed by the remote host
before sending another part.

You can google "scp speed" and you will get a lot of answers, sometimes
wrongly accusing the encryption or the compression, but really, the RTT
and buffers are the fault as I write here:

https://superuser.com/a/1101203/466930

SCP should be really used only as fast hack for copying files in fast
local networks. For all other cases, use SFTP or rsync if you need
something more complex.

Regards,
-- 
Jakub Jelen
Software Engineer
Security Technologies
Red Hat, Inc.
___
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org


Re: SSH private keys?

2018-08-08 Thread Jakub Jelen
On Sat, 2018-06-23 at 16:35 -0400, Jeffrey Ross wrote:
> 
> On 06/22/2018 03:45 PM, Gordon Messmer wrote:
> > On 06/22/2018 04:37 AM, Jeffrey Ross wrote:
> > > Fast forward to today, the system had been reinstalled (new
> > > hardware, 
> > > new disks, etc) and I no longer have that ability.  I'm
> > > currently 
> > > runn Fedora 28 and the desktop is "Gnome", I'm sure it is just a 
> > > matter of installing/configuring/running the correct
> > > application 
> > > but which one? 
> > 
> > That's handled by gnome-keyring and, as of this version of GNOME, 
> > ssh-agent.  As far as I can tell, those are both required
> > components, 
> > so they're probably not missing on your workstation. The problem 
> > *might* be that GNOME keyring will only automatically unlock
> > private 
> > keys if there is a valid public key with the same name, and a .pub 
> > suffix.  So, you might not have the public keys. Or, you might have
> > a 
> > .pub file that's *really* old and no longer valid.
> > 
> > There is an open bug concerning the fact that if there is an
> > invalid 
> > .pub file in .ssh, GNOME keyring won't automatically unlock *any* 
> > keys, so remove any old key files.
> > 
> > https://bugzilla.redhat.com/show_bug.cgi?id=1568895
> 
> my .ssh directory has my private key in a file called "id_rsa"
> nothing 
> with .pub on the end and if I understand correctly running ssh will
> look 
> for the private key in a few different file names, none of which end 
> with .pub.

Or use AddKeysToAgent option in ssh_config, which will automatically
add the keys to the agent on first use.

-- 
Jakub Jelen
Software Engineer
Security Technologies
Red Hat, Inc.
___
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org/message/YZZPIEZ6UVESJQDJ7E6DQ5CRCFNITMJR/


Re: Scroll Bars with Arrows Wanted

2018-01-25 Thread Jakub Jelen
On Wed, 2018-01-24 at 16:47 -0500, fred roller wrote:
> have you tried [shift]+[wheel] for horizontal scroll?
> 
> -- Fred

In Firefox, it scrolls through the history, which is not very useful.

Regards,
Jakub
___
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org


HEADS UP: OpenSSH 7.6p1 in Fedora 27

2017-11-22 Thread Jakub Jelen
Hello all,
The OpenSSH 7.6p1 was submitted for testing in Fedora 27 [1].

Unfortunately I didn't manage to get it out before freeze since all the
thing/bugs/upstream release somehow pilled up. On the other side, this
package was already tested quite extensively during recent months by
myself, using automated test cases and was in rawhide for last two
weeks, where we caught last issues.

If you have some "special" use case, please make sure it works for you
after the update and leave a karma.

[1] https://bodhi.fedoraproject.org/updates/FEDORA-2017-96d1995b70

Thank you,
-- 
Jakub Jelen
Software Engineer
Security Technologies
Red Hat, Inc.
___
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org


Re: rsync from F27 box causes higher (30x) cpu on F26 box?

2017-11-20 Thread Jakub Jelen
Hello,
this might be related to 

https://fedoraproject.org/wiki/Changes/OpenSSH_Server_Crypto_Policy

Can you check what ciphers, macs were used in your Fedora 26 and what
is used now? We can probably blame the change of the default cipher,
from ChaCha20 to AES256, but I don't have the exact numbers.

Can you try to uncomment last line of /etc/sysconfig/sshd to overwrite
system-wide policy:

CRYPTO_POLICY=

If it has so significant performance impact, we should adjust the
policy to prefer ChaCha20.


Regards,
Jakub Jelen

On Thu, 2017-11-16 at 19:44 +0100, Kasper Pedersen wrote:
> I have been poking at this for some hours, and by now I could use
> a second opinion. Or clue. Thirteen black candles?
> 
> 
> Somehow, when I sit on a F27 machine and pull from a F26 machine
> using
> rsync, something extremely inefficient happens in the F26 machine.
> 
> If I sit on a F26 machine and pull from the F26 machine, it is fast.
> 
> 
> The good state:
> ---
> I had 3 reasonable machines, all on F26:
> 
> Server - 1.8Ghz Haswell-celeron dualcore
> Desktop - 3.2GHz Haswell
> Backup - 2.4GHz Core2Q
> 
> Backup runs rsync, and pulls from Server and Desktop using ssh.
> Nothing fancy, it copies and shuts itself down.
> When Backup was reading from Server, Server would have about
> 
>  - 30% cpu to rsync
>  - 60% cpu to ssh
> 
> and deliver 100MB/s reliably. So does Desktop.
> 
> 
> The bad state:
> --
> After one such rsync run, I upgraded Backup to F27.
> When Backup pulls from Server, Server shows:
> 
>  - 99% cpu to rsync
>  - 6% cpu to ssh
> 
> and it delivers **11MB/s**, one tenth of what it did before.
> So, 30x higher cpu load per byte delivered.
> 
> So, somehow, the rsync running on F27, which by the way reports
> the same version and capabilities as the one on F26, triggers
> something in the spawned process that behaves differently.
> 
> 
> 
> On the server, the ssh-spawned rsync process looks the same whether
> it is Backup or Desktop pulling from it:
> 
> On Server, with Backup as client, 11MB/s:
> root 25042 34.4  0.0 124996  5620 ?Rs   18:54   0:40
> rsync
> --server --sender -vlogDtpre.iLsfxC .
> /bulk/mux/media/xbn-2017_10_29_010103.m.ts
> /bulk/mux/media/xbn-2017_11_04_235600.m.ts
> /bulk/mux/media/xbn-2017_11_12_005938.m.ts
> /bulk/mux/media/xbn-2017_11_12_011442.m.ts
> /bulk/mux/media/xbn-2017_11_12_015031.m.ts
> 
> 
> On server, with Desktop as client, 100MB/s:
> root 25152 31.9  0.0 122344  3000 ?Rs   18:56   0:05
> rsync
> --server --sender -vlogDtpre.iLsfxC .
> /bulk/mux/media/xbn-2017_10_29_010103.m.ts
> /bulk/mux/media/xbn-2017_11_04_235600.m.ts
> /bulk/mux/media/xbn-2017_11_12_005938.m.ts
> /bulk/mux/media/xbn-2017_11_12_011442.m.ts
> /bulk/mux/media/xbn-2017_11_12_015031.m.ts
> 
> The command being run on Backup or Desktop is:
> rsync -av -e 'ssh -i id_ecdsa'  --exclude XA/ --exclude video2/
> root@10.5.5.1:/bulk/mux/media/xbn* . --progress
> 
> 
> 
> 
> Things I did:
> -
> Tried the still-installed F26 and F25 kernels
> Desktop (F26) can rsync to and from Server(F26) at full speed.
> All machines get 110MB/s when running iperf, all six ways.
> The Sky2 nic in Backup is not spewing errors
> iperf shows no dropped.
> Swapped switchports between Desktop and Backup
> Switch does not report errors
> 
> Things to do:
> -
> swap nics
> upgrade a sacrificial F26 machine to F27 and try from that
___
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org


Re: Cannot install bugzilla on F26: wrong error saying /var/lib/bugzilla/data/params.json file does not exist but it exists

2017-11-08 Thread Jakub Jelen
On Thu, 2017-11-02 at 16:13 +0100, Frédéric wrote:
> Hi,
> 
> I am trying to install bugzilla. checksetup.pl is happy, the http
> server is running (http://localhost shows something) but
> http://localhost/bugzilla shows this strange message:
> 
> The /var/lib/bugzilla/data/params.json file does not exist. You
> probably need to run checksetup.pl. at Bugzilla/Config.pm line 334.
> Compilation failed in require at /usr/share/bugzilla/index.cgi line
> 15.
> BEGIN failed--compilation aborted at /usr/share/bugzilla/index.cgi
> line 15.
> 
> However file /var/lib/bugzilla/data/params.json do exist!

Does that file have proper permissions and SELinux context? Do you see
some AVCs in audit log?

Regards,
-- 
Jakub Jelen
Software Engineer
Security Technologies
Red Hat, Inc.
___
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org


Re: tcp_wrappers deprecation

2017-08-21 Thread Jakub Jelen
On Fri, 2017-08-18 at 13:15 -0500, Jason L Tibbitts III wrote:
> For the record, denyhosts currently relies upon the tcp_wrappers
> functionality in openssh to function.  While it's possible to make it
> manipulate the firewall as well, the whole situation is kind of a
> mess.
> (Does it talk to firewalld?  What if you're not running firewalld?)

Unfortunately this is not as straightforward as it could be.
Checking how Archlinux does it now, they probably go without denyhosts.
There is a also a tool sshguard [1], which does quite much the same as
fail2ban using configurable backend (firewalld, iptables, ...). 

The denyhosts got last update also 10 years ago [2] and we already have
quite much 2 alternatives that can do the same using firewalls, so it
might be also a time to go for denyhosts. Or not, but clearly document
that OpenSSH will not be using hosts.deny anymore.

> Sadly I know how terrible tcp_wrappers is and so I know it needs to
> go
> away.  It's just unfortunate that there's no replacement for it
> besides
> firewalling, and dealing with the firewall is unfortunately so
> complicated.
> 
> So that's three of my packages that use tcp_wrappers in some way
> (denyhosts, apcupsd and cyrus-imapd) though I suspect two of those
> just
> need the build dependencies dropped.

That would be great if you could review the dependencies if it is used
and drop the bogus dependencies.

[1] https://wiki.archlinux.org/index.php/sshguard
[2] https://sourceforge.net/projects/denyhosts/files/

Thanks,
-- 
Jakub Jelen
Software Engineer
Security Technologies
Red Hat, Inc.
___
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org


Re: tcp_wrappers deprecation

2017-08-18 Thread Jakub Jelen
On Tue, 2017-08-15 at 13:58 +0200, Jakub Jelen wrote:
> Hello Fedora devels and users,
> 
> more than three years ago, the same topic started discussion if we
> want
> this package in Fedora or not and how [1]. The discussion resulted
> mostly in flames and in the removal of the dependency on tcp_wrappers
> from systemd. But it was quite agreed that it is considered as a
> security layer for some users, if they use it correctly, or something
> that is or should be replaced by firewalls.
> 
> So can we discuss it now once more without the affiliation to
> systemd?
> The fact is that we still do not have any other replacement except
> firewalls. But do we need one?
> 
> The complete removal of the package is probably not a wise step, even
> though we can not find tcp_wrappers in recent SuSE anymore [2]. It is
> still available in Arch [3] without other tools depending on it. To
> be
> fair, Debian [4] is still building tools (for example openssh) with a
> build-time support for it.
> 
> My primary concern is OpenSSH, which upstream dropped support for
> tcp_wrappers three years ago (late 2014) [5] and since then we are
> maintaining one more downstream patch. But this effort should be
> coordinated among other components to simplify the transition for
> users
> who insist on using it (using tcpd).
> 
> Removing the dependency will also allow us to trim the default
> install for few more Kb.
> 
> If there will be no significant drawbacks, I will progress with
> filling
> a system wide change for Fedora 28 and I will pull the maintainers of
> other tolls using libwrap into the round and discussion.

Hello,
In Fedora 26, there is over 50 packages using tcp_wrappers as a build-
time dependency:

$ dnf repoquery --whatrequires 'libwrap.so.0()(64bit)'|grep x86_64
389-ds-base-snmp-0:1.3.6.6-2.fc26.x86_64 rmeggins
aeskulap-0:0.2.2-0.27.beta1.fc26.x86_64  jenslody
apcupsd-0:3.14.14-5.fc26.x86_64  tibbs
apcupsd-cgi-0:3.14.14-5.fc26.x86_64
apcupsd-gui-0:3.14.14-5.fc26.x86_64
apt-cacher-ng-0:0.9.0-3.fc26.x86_64  kenjiro
audit-0:2.7.7-1.fc26.x86_64  sgrubb
bacula-client-0:7.4.7-1.fc26.x86_64  slaanesh
bacula-director-0:7.4.7-1.fc26.x86_64
bacula-libs-0:7.4.7-1.fc26.x86_64
bacula-storage-0:7.4.7-1.fc26.x86_64
bacula2-client-0:2.4.4-24.fc26.x86_64limb
conserver-0:8.2.1-3.fc24.x86_64  jkastner
ctk-devel-0:0.1-0.2.20151015gitbdc8cac.fc26.x86_64   bizdelnick
ctk-dicom-0:0.1-0.2.20151015gitbdc8cac.fc26.x86_64
cyrus-imapd-0:3.0.1-7.fc26.x86_64landgraf
dcmtk-0:3.6.1-4.fc24.x86_64  ignatenkobrain
dovecot-1:2.2.31-3.fc26.x86_64   mhlavink
exim-0:4.89-1.fc26.x86_64dwmw2
flow-tools-0:0.68.5.1-18.fc26.x86_64 stingray
foghorn-0:0.1.6-12.fc26.x86_64   rohara  
gsi-openssh-server-0:7.5p1-1.fc26.x86_64 ellert
libvirt-snmp-0:0.0.3-7.fc24.x86_64   mprivozn
libyaz-0:5.14.11-6.fc26.x86_64   guidograzioli
lldpd-0:0.9.7-5.fc26.x86_64  jhogarth
net-snmp-1:5.7.3-15.fc26.x86_64  jsafrane
net-snmp-agent-libs-1:5.7.3-15.fc26.x86_64
nfs-utils-1:2.1.1-5.rc4.fc26.x86_64  steved
ngircd-0:24-2.fc26.x86_64ixs
nrpe-0:3.0.1-4.fc26.x86_64   smooge
nut-0:2.7.4-7.fc26.x86_64mhlavink
ocserv-0:0.11.8-1.fc26.x86_64nmav
openhpi-subagent-0:2.3.4-28.fc26.x86_64  sharkcz
openldap-servers-0:2.4.44-10.fc26.x86_64 mhonek
opensips-snmpstats-0:2.2.3-1.fc26.x86_64 ivaxer
openssh-server-0:7.5p1-2.fc26.x86_64 jjelen
pptpd-0:1.4.0-11.fc26.x86_64 jskarvad
prelude-manager-0:3.1.0-2.fc26.x86_64totol
proftpd-0:1.3.6-1.fc26.x86_64itamarjp
ptpd-0:2.3.1-4.fc24.x86_64   pbrobinson
pulseaudio-libs-0:10.0-4.fc26.x86_64 lennart
quagga-0:1.1.1-2.fc26.x86_64 mruprich
quota-rpc-1:4.03-8.fc26.x86_64   ppisar
redir-0:2.2.1-16.fc26.x86_64 itamarjp
rpcbind-0:0.2.4-7.rc2.fc26.x86_64steved
rwhoisd-0:1.5.9.6-6.fc26.x86_64  ppisar
sendmail-0:8.15.2-14.fc26.x86_64 jskarvad
slapi-nis-0:0.56.1-2.fc26.x86_64 abbra
sslh-0:1.18-2.fc26.x86_64jhogarth
stunnel-0:5.41-1.fc26.x86_64 tmraz
syslog-ng-0:3.9.1-1.fc26.x86_64  marcusk
tcp_wrappers-devel-0:7.6-85.fc26.x86_64  jjelen
tftp-server-0:5.2-20.fc26.x86_64 jsynacek

tcp_wrappers deprecation

2017-08-15 Thread Jakub Jelen
Hello Fedora devels and users,

more than three years ago, the same topic started discussion if we want
this package in Fedora or not and how [1]. The discussion resulted
mostly in flames and in the removal of the dependency on tcp_wrappers
from systemd. But it was quite agreed that it is considered as a
security layer for some users, if they use it correctly, or something
that is or should be replaced by firewalls.

So can we discuss it now once more without the affiliation to systemd?
The fact is that we still do not have any other replacement except
firewalls. But do we need one?

The complete removal of the package is probably not a wise step, even
though we can not find tcp_wrappers in recent SuSE anymore [2]. It is
still available in Arch [3] without other tools depending on it. To be
fair, Debian [4] is still building tools (for example openssh) with a
build-time support for it.

My primary concern is OpenSSH, which upstream dropped support for
tcp_wrappers three years ago (late 2014) [5] and since then we are
maintaining one more downstream patch. But this effort should be
coordinated among other components to simplify the transition for users
who insist on using it (using tcpd).

Removing the dependency will also allow us to trim the default
install for few more Kb.

If there will be no significant drawbacks, I will progress with filling
a system wide change for Fedora 28 and I will pull the maintainers of
other tolls using libwrap into the round and discussion.


[1] https://lists.fedoraproject.org/pipermail/devel/2014-March/196913.h
tml
[2] https://www.rpmfind.net/linux/rpm2html/search.php?query=tcpd&submit
=Search+...&system=&arch=
[3] https://www.archlinux.org/packages/community/x86_64/tcp-wrappers/
[4] https://packages.debian.org/sid/openssh-server
[5] http://www.openssh.com/txt/release-6.7


Thank you for comments and constructive ideas.
Regards,
-- 
Jakub Jelen
Software Engineer
Security Technologies
Red Hat, Inc.
___
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org


Re: SSH problem from BasicLinux floppy booted 486 to Fedora 25

2017-03-13 Thread Jakub Jelen

On 03/13/2017 07:02 AM, Philip Rhoades wrote:

People,

I get an error trying to ssh from a BasicLinux floppy booted 486 (I want
to sort out HD problems on the old Adaptec 1542 controlled SCSI drive
that has RH5.2 on it!) when trying to connect to my Fedora 25 x86_64
workstation.  On the F25 machine in /var/log/secure I get lines like:

Mar 13 16:25:47 phil sshd[7562]: Unable to negotiate with 192.168.1.40
port 1034: no matching key exchange method found. Their offer:
diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]


You are connecting from very old OpenSSH client (3.5), which does not 
support any of the currently secure cryptography algorithms. You should 
really consider updating that BasicLinux.


Otherwise you can enable the legacy kex and ciphers in the Fedora 
OpenSSH server by following these instructions:


http://www.openssh.com/legacy.html

Regards,

--
Jakub Jelen
Software Engineer
Security Technologies
Red Hat
___
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org


Re: ssh/screen question - thread

2016-11-14 Thread Jakub Jelen

On 11/14/2016 02:17 AM, bruce wrote:

I think I'm getting closer to an actual soln...


** Notice the backticks around the remote cmd to be run
  -without the ticks, the cmd doesn't appear to work


ssh  crawl_user@192.81.214.49 'screen -r "testname" -X "`nohup ls -al
/crawl_tmp/* > aa.tmp`"  '
ssh  crawl_user@192.81.214.49 'screen -r "testname" -X "`nohup sleep 10`"  '
ssh  crawl_user@192.81.214.49 'screen -r "testname" -X "`nohup sleep 10`" & '

If the backticks are required, ok the final part of the solution is to
make the whole thing run the cmd in the screen session, but return
back to the calling term, once the screen session/cmd starts.


The backticks makes your command run in your local sub-shell, not the 
remote one.


Also if you want interactive session, you need to use -t switch to the 
ssh command.



In other words I want the long running/remote process to start running
in the screen session and return the control to the calling term
without waiting for the completion of the process.

With the basic tests using the sleep func.. it appears that my current
attempts aren't quite there yet.

I don't want to put the remote/running cmd in the background, as that
would disable the ability to see/view the display output of the
process.

Tried to put the screen process in the background.. no luck..

Thoughts/comments???

THanks




On Sun, Nov 13, 2016 at 1:00 PM, Patrick O'Callaghan
 wrote:

On Sun, 2016-11-13 at 10:09 -0500, bruce wrote:

  The goal, to be able to reattach to a remote screen session, and to
run a cmd in the remote screen session, and have the cmd return to the
calling term

Maybe take a look at expect (dnf info expect).

poc
___
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org

___
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org


--
Jakub Jelen
Software Engineer
Security Technologies
Red Hat
___
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org


Re: Annoying audit messages

2016-09-27 Thread Jakub Jelen

On 09/27/2016 02:22 AM, Alex wrote:

Hi,

On Mon, Sep 26, 2016 at 2:53 PM, Patrick O'Callaghan
 wrote:

On Mon, 2016-09-26 at 14:46 -0400, Alex wrote:

Hi all,

I recall seeing an rsyslog entry to prevent these messages from
filling my messages logs, but it no longer appears to work with f24.
Is there a more specific method to disable audit messages?

Sep 26 14:40:56 alex kernel: audit: type=2404
audit(1474915256.442:724): pid=3297 uid=0 auid=4294967295
ses=4294967295 msg='op=destroy kind=server
fp=SHA256:c3:77:02:0b:2c:82:43:05:c5:50:ff:e6:99:f1:3f:1a:1d:6a:51:b7:a4:cb:45:55:37:66:95:46:51:9b:80:d2
direction=? spid=3297 suid=0  exe="/usr/sbin/sshd" hostname=?
addr=107.155.77.2 terminal=? res=success'

I'm not using selinux, and have enabled rsyslog. They're just not helpful to me.

Edit /etc/default/grub. Look for the line beginning GRUB_CMDLINE_LINUX.
Add "audit=0" to the end of that line. Run:

grub2-mkconfig --output /boot/grub2/grub.cfg

Audit will be turned off when you reboot. To turn it off without
rebooting, do:

auditctl -e 0

Thanks very much, very helpful. What is the reason this is enabled by
default? Don't other people find it obnoxious and unhelpful?

How does this information help the average sysadmin?
Audit is not just a log. For that reason, it is not dumped to the same 
files (/var/log/secure, /var/log/messages) as other logs, but into 
separate file (/var/log/audit/audit.log), when you have auditd running 
(if you stop that, it is dumped into the messages, which might be 
confusing).


It keeps track of actions that were performed somewhere on lower level 
than "average sysadmin" might need. In first place, they are needed for 
the certifications in some environments. In second place, it is helpful 
when you seek for more specific actions that were performed in the past.


Your example shows an event, when the server private key was zeroed 
before exit or before changing to unprivileged process, who should not 
see the content of the private keys.


Regards,

--
Jakub Jelen
Associate Software Engineer
Security Technologies
Red Hat
___
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org


Re: Slightly OT - connecting from Fedora to Windows 7 sftp/ssh using public keys

2016-03-22 Thread Jakub Jelen

I would check

https://github.com/PowerShell/Win32-OpenSSH

Windows guys did some work and the openssh should work on Windows in 
some way. I didn't try that yet, but it seems working for some people.


If you see authentication failures, there might be something unseful in 
the logs.



On 03/22/2016 01:27 PM, Gary Stainburn wrote:

I need a way to rebustly copy files from a Fedora server to a Windows box. As
my usual environment is Linux by first thought was SCP, using Perl and
Net::SCP.

I first tried an OpenSSH install from the WinSCP site and had managed to
connec to the Windows box using passwords, but could not get public keys to
work either way.

I then downloaded OpenSSH for Windows using the installer found at
http://www.mls-software.com/opensshd.html

Using this setup I can ssh from the Windows box to my Fedora server and it
logs in successfully using keys.  However, I still cannot connect from Fedora
to Windows.

Oddly, I do get the banner.txt file appear in the login attempt.
Also oddly, the attemp doesn't drop down to passwords when the keys fail even
though it has

...


Regards,

--
Jakub Jelen
Associate Software Engineer
Security Technologies
Red Hat

--
users mailing list
users@lists.fedoraproject.org
To unsubscribe or change subscription options:
https://admin.fedoraproject.org/mailman/listinfo/users
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines
Have a question? Ask away: http://ask.fedoraproject.org


Re: sshd logging changed?

2016-03-14 Thread Jakub Jelen

On 03/12/2016 02:26 PM, Tom Horsley wrote:

I noticed I got a sshd update recently. Now I have bazillions
of messages about disconnects:

Disconnected from NN.NN.NN.NN port 41236 : 1 time(s)
  Received disconnect from NN.NN.NN.NN port 39642:11: disconnected by user : 1 
time(s)

Logging in and logging out are are normal activities
in a working ssh. How the devil can I stop this logging
of utterly useless information? (Which for me happens
every 5 minutes due to a cron job I have running at
work that phones home :-).
I don't think these messages were not there before. But the format 
changed a bit (added port number) and it is not handled by Logwatch as 
it should be.


Sorry I didn't notice earlier before pushing that into F23. But this 
needs to be fixed in Logwatch at least for F24. There is patch for the 
second line, but I have no idea why the first was not visible before. 
Can you please fill a bug on logwatch?


Kind regards,

--
Jakub Jelen
Security Technologies
Red Hat

--- /usr/share/logwatch/scripts/services/sshd.old	2015-08-25 10:53:58.0 +0200
+++ /usr/share/logwatch/scripts/services/sshd	2015-08-25 10:53:58.0 +0200
@@ -383,7 +383,7 @@
   $RefusedConnections{$1}++;
} elsif ( my ($Reason) = ($ThisLine =~ /^Authentication refused: (.*)$/ ) ) {
   $RefusedAuthentication{$Reason}++;
-   } elsif ( my ($Host,$Reason) = ($ThisLine =~ /^Received disconnect from ([^ ]*): (.*)$/)) {
+   } elsif ( my ($Host,$Reason) = ($ThisLine =~ /^Received disconnect from ([^ ]*) port [^ ]*: (.*)$/)) {
   # Reason 11 (SSH_DISCONNECT_BY_APPLICATION) is expected, and logged at severity level INFO
   if ($Reason != 11) {$DisconnectReceived{$Reason}{$Host}++;}
} elsif ( my ($Host) = ($ThisLine =~ /^ROOT LOGIN REFUSED FROM ([^ ]*)$/)) {
-- 
users mailing list
users@lists.fedoraproject.org
To unsubscribe or change subscription options:
https://admin.fedoraproject.org/mailman/listinfo/users
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines
Have a question? Ask away: http://ask.fedoraproject.org


Re: [HEADS UP]: OpenSSH 7.2 to Fedora 23

2016-03-03 Thread Jakub Jelen

On 03/03/2016 09:31 AM, Corinna Vinschen wrote:

Hi Jakub,

On Mar  2 17:48, Jakub Jelen wrote:

Hi there,
I just pushed openssh-7.2 update [1] into Fedora 23 testing. There are no
incompatible changes except these:

As I reported to the openssh-unix-dev list, as well as in
https://bodhi.fedoraproject.org/updates/openssh-7.2p1-1.fc23,
this release silently removes the /usr/bin/slogin symlink pointing to
/usr/bin/ssh, because upstream removed the Makefile commands creating
it at install time.  Same for slogin.1 -> ssh.1.

This will break lots of installations (scripts, keyboard shortcuts, etc).

For the Cygwin distro I now added the missing rules to the spec file,
along the lines of

   cd ${DESTDIR}/usr/bin
   ln -s ./ssh.exe slogin
   cd ${DESTDIR}/usr/share/man/man1
   ln -s ./ssh.1 slogin.1

Please create slogin in the rpm spec file as well.
Thanks for the notice. My bad that I thought that symlink is just 
ancient stuff from old times. I will respin update with restored symlink 
for Fedora 23.


Do you think that we need to carry this symlink even to Fedora 24? Do 
you have some examples of scripts using slogin? They should probably 
also get fixed.


Upstream also probably didn't see it as a big deal:
https://anongit.mindrot.org/openssh.git/commit/?id=69fead5d7cdaa73bdece9fcba80f8e8e70b90346

--
Jakub Jelen
Associate Software Engineer
Security Technologies
Red Hat

--
users mailing list
users@lists.fedoraproject.org
To unsubscribe or change subscription options:
https://admin.fedoraproject.org/mailman/listinfo/users
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines
Have a question? Ask away: http://ask.fedoraproject.org


[HEADS UP]: OpenSSH 7.2 to Fedora 23

2016-03-02 Thread Jakub Jelen

Hi there,
I just pushed openssh-7.2 update [1] into Fedora 23 testing. There are 
no incompatible changes except these:


 * the minimum modulus size supported for diffie-hellman-group-exchange
   was increased to 2048 bits,
 * several legacy cryptographic algorithms and MD5-based and truncated
   HMAC algorithms were disabled on client side.

which might be some trouble when connecting to old systems. If you need 
to use some of these fancy ciphers or HMACs, you need to configure your 
client to use them explicitly, for example:


ssh -o Ciphers=+blowfish-cbc -o MACs=+hmac-md5-96 your_host

or store appropriate values to the  ~/.ssh/config. SSH should now also 
yield reasonable messages when it was not able to negotiate particular 
algorithms.


My tests passed and the package is already for few days in rawhide and 
f24, but another testing would be appreciated, especially quick check if 
some of your common use cases are not disturbed. And there are also some 
fancy features you might want to give a try such ad-hoc adding keys to 
ssh-agent or new keyword  restrict  to use in authorized_keys  file [2].


Thanks for attention and have a great day,

[1] https://bodhi.fedoraproject.org/updates/openssh-7.2p1-1.fc23
[2] http://www.openssh.com/txt/release-7.2

--
Jakub Jelen
Security Technologies
Red Hat

--
users mailing list
users@lists.fedoraproject.org
To unsubscribe or change subscription options:
https://admin.fedoraproject.org/mailman/listinfo/users
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines
Have a question? Ask away: http://ask.fedoraproject.org