Re: [arch-general] How to reboot remotely without hanging ssh session?

2014-02-05 Thread Leonid Isaev
On Wed, 05 Feb 2014 13:19:56 -0600
"David C. Rankin"  wrote:

> Guys,
> 
>I remote administer one arch server and after moving to systemd I haven't 
> found a way to reboot without hanging the ssh session. Prior to system, we 
> could simply pass the shutdown command via ssh and the ssh session would 
> complete/close before reboot took place: i.e.
> 
> $ ssh remote.host.org "sudo shutdown -r now"
> 
>However with systemd, using "systemctl reboot" the ssh session hangs
> until the remote host reboot or a timeout occurs.
> 
>Is there a better way to reboot a remote server and avoid this?
> 

AFAIU, this issue is related to the lack of ordering
between systemd-user-sessions.service and network.target (the former should
start after the latter)... OTOH, one can simply
$ ssh r...@remote.host.org
and do
# ( sleep 30 && systemctl reboot ) &
# exit

Cheers,
-- 
Leonid Isaev
GnuPG key: 0x164B5A6D
Fingerprint: C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


signature.asc
Description: PGP signature


Re: [arch-general] Linux container

2014-02-12 Thread Leonid Isaev
On Wed, 12 Feb 2014 12:59:43 +0100
arnaud gaboury  wrote:

> Dear all,
> 
> I am slowly building a Arch Linux VM guest on my Arch Linux host.
> 
> The guest machine is now built and is recognized as shown by this command :
> 
> gabx@hortensia ➤➤ ~ % machinectl list
> MACHINE  CONTAINER SERVICE
> dahlia   container nspawn
> 
> 1 machines listed.
> 
> I an following the libvirt.org documentation. Now, according this
> page[1] about lxc driver, i am dealing with namespace requirements.
> This sentence, in bold, puzzles me:
> 
> A suitably configured UID/GID mapping is a pre-requisite to making
> containers secure, in the absence of sVirt confinement.
> 
> If I understand what a namespace is, I have no idea how to make sure
> my UIG/GID mapping is well configured. I would appreciate having any
> hints abut this part of the settings.

User namespaces are currently disabled in the -ARCH kernel, so you should
either build your own kernel, or do not configure any mapping (it is optional).

> 
> Another question : is there any advantage/disadvantage using the lxc
> Userspace tools[2] instead of libvirt to manage these namespaces ?

Namespaces are property of the kernel, not a userspace tool, so both are
equivalent.

Having said that, I prefer lxc tools because they are somewhat more flexible
and come with fewer dependencies.

Also notice, that if you don't need an advanced network configuration,
systemd-nspawn may be sufficient for your purposes.

> 
> Thank you for help.
> 
> 
> 
> 
> [1]http://libvirt.org/drvlxc.html
> [2]http://linuxcontainers.org/



-- 
Leonid Isaev
GPG key fingerprint: C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


signature.asc
Description: PGP signature


Re: [arch-general] Linux container

2014-02-13 Thread Leonid Isaev
On Thu, 13 Feb 2014 19:00:49 +0100
arnaud gaboury  wrote:

> >
> > This feature is relatively new and is not enabled in the default Arch
> > Linux kernel:
> > $ zgrep USER_NS /proc/config.gz
> > # CONFIG_USER_NS is not set
> >
> > You'll have to build a custom kernel.
> >
> > --
> > Timothée Ravier
> 
> now I rebuilt the kernel with user space set.
> Shall I do another new install for the container with this new kernel?
> Or keep the container installed with the "old" kernel?

Probably not. The only thing you need to change is config, but you'd better
check libvirt docs.

By the way, there was a reason why usens was disabled in our kernel
(FS#36969)...

Cheers,
-- 
Leonid Isaev
GPG key fingerprint: C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


signature.asc
Description: PGP signature


[arch-general] Updating the archlinux-keyring package

2014-02-13 Thread Leonid Isaev
Hi,

Recently I had to fix a corrupted pacman db from a 3 month old livecd
and realized that this process is not so innocent. Specifically, there is a
chance to get a trojaned package on the system simply because the
archlinux-keyring package on the iso is outdated. Of course, other similar
scenarios are possible, e.g. a fresh install is made from an old livecd, or a
server is updated after several months of uptime: new packages are pulled in
but signature checks are made using the old keyring currently on the host.
So, instead of relying on the discrete updates of archlinux-keyring,
wouldn't is make more sense to have a systemd timer/cron job to frequently
refresh pacman keyring?

Thanks,
-- 
Leonid Isaev
GPG key fingerprint: C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


signature.asc
Description: PGP signature


Re: [arch-general] Updating the archlinux-keyring package

2014-02-14 Thread Leonid Isaev
On Fri, 14 Feb 2014 03:43:38 -0800
Don deJuan  wrote:

> On 02/14/2014 03:00 AM, Plonky Duby wrote:
> > I do agree with that, i switched on a laptop which was off since september
> > 2013 and i had some issue with some key.
> >
> > I had to update key, before having a sucessfull update.
> >
> >
> >
> >
> > 2014-02-13 20:21 GMT+01:00 Leonid Isaev :
> >
> >> Hi,
> >>
> >> Recently I had to fix a corrupted pacman db from a 3 month old
> >> livecd
> >> and realized that this process is not so innocent. Specifically, there is
> >> a chance to get a trojaned package on the system simply because the
> >> archlinux-keyring package on the iso is outdated. Of course, other similar
> >> scenarios are possible, e.g. a fresh install is made from an old livecd,
> >> or a
> >> server is updated after several months of uptime: new packages are pulled
> >> in
> >> but signature checks are made using the old keyring currently on the host.
> >> So, instead of relying on the discrete updates of
> >> archlinux-keyring,
> >> wouldn't is make more sense to have a systemd timer/cron job to frequently
> >> refresh pacman keyring?
> >>
> >> Thanks,
> >> --
> >> Leonid Isaev
> >> GPG key fingerprint: C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D
> >>
> 
> pacman-key --refresh-keys ??

Well, I run this on the home server via a systemd timer, so that I don't
forget to do it before an update. It is certainly not necessary on a
frequently updated machine, but might be a good idea for a livecd before an
installation.

Cheers,
-- 
Leonid Isaev
GPG key fingerprint: C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


signature.asc
Description: PGP signature


Re: [arch-general] libvirt / lxc : no valid cgroup for machine

2014-02-15 Thread Leonid Isaev
On Sat, 15 Feb 2014 21:04:43 +0100
arnaud gaboury  wrote:

> > Thank you Tom for your long and precise help. I think I will give up
> > libvirt and go to LXC. Btw, the container does not need so much
> > settings offer by libvirt management.
> > For your info, /etc/cgconfig is needed and read by systemd
> > cgconfig.service. But there is no need in fact to enable this service.
> 
> 
> I gave a try to LXC. There is unfortunately no better doc, and it
> seems I still have an issue with my cgroup configuration:

What LXC version do you use?

Cheers,
-- 
Leonid Isaev
GPG key fingerprint: C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


signature.asc
Description: PGP signature


Re: [arch-general] [arch-dev-public] systemd 209 in [testing]

2014-02-21 Thread Leonid Isaev
On Fri, 21 Feb 2014 10:24:39 +0100
Thomas Bächler  wrote:

> Am 20.02.2014 17:33, schrieb Dave Reisner:
> > Hi all,
> > 
> > I'm working on packaging the systemd 209 release, and I expect to have
> > pkgrel=1 into [testing] in a few hours, barring any unforseen problems.
> > It's a huge release (nearly 2000 commits since 208), and I don't
> > anticipate that this will make it into [core].
> 
> This version works fine on my desktop, but fails on my laptop. The
> initramfs works fine. While booting up the system, systemd hangs and
> this appears in the journal:
> 
> systemd[1]: Assertion '(x->type == SOURCE_MONOTONIC && y->type ==
> SOURCE_MONOTONIC) || (x->type == SOURCE_REALTIME && y->type ==
> SOURCE_REALTIME)' failed at src/libsystemd/sd-event/sd-event.c:264,
> function latest_time_prioq_compare(). Aborting.
> systemd[1]: Caught , dumped core as pid 317.
> 
> 

As long this is turning into a thread about newly introduced issues in
systemd...

Udev 209 now tries to rename (I guess) all interfaces, including virtual:
$ journalctl -u systemd-udevd.service PRIORITY=3 -o cat
Could not apply link config to br0
Could not apply link config to vethQEP978
Could not apply link config to vethDR7OA5
Could not apply link config to vethW1QM0I
Could not apply link config to vethC4240S

Those are bridge and veth interfaces created by lxc userspace tools (2
containers/2 ifaces per container). Is this intended?

Thanks,
-- 
Leonid Isaev
GPG key fingerprint: C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


signature.asc
Description: PGP signature


Re: [arch-general] Bridge interface with netctl

2014-02-25 Thread Leonid Isaev
On Tue, 25 Feb 2014 12:47:02 +0100
arnaud gaboury  wrote:

> Dear list,
> 
> I am messing with assigning a static IP on a systemd-nspawn container,
> on both sides (host,container).

You assign an IP address only inside the container.

> My idea is to first create a bridge (br0) on the host.
> [...]
> gabx@hortensia ➤➤ ~ % cat /etc/netctl/bridge-hortensia
> Description="Example Bridge connection"
> Interface=br0
> Connection=bridge
> BindsToInterfaces=enp7s0
> IP=no

This profile is wrong. Here is the right one:
---
$ cat /etc/netctl/lxc_lan_bridge
Description="LAN bridge for LXC containers"
Connection=bridge
Interface=br0
SkipNoCarrier="yes"
BindsToInterfaces=()
IP=static
Address=(10.137.0.1/24)
---
Also, since you are running systemd >= 209, you can use networkd. Here are the
config files:
---
$ cat /etc/systemd/network/lxc_bridge.netdev
[NetDev]
Name=br0
Kind=bridge
$ cat /etc/systemd/network/lxc_bridge.network 
[Match]
Name=br0

[Network]
Description=LAN bridge for LXC containers
DHCP=false

[Address]
Address=10.137.0.1/24
---

Now:
* Populate the iptables FORWARD chain to route traffic from your physical
interface to the bridge and back.
* Inside the container, get rid of dhcpcd, and use either networkd or netctl
to assign a static IP like you would do on a physical host.
* The simplest way to take care of DNS (that is without any additional host
configuration) is to use a static resolv.conf inside the container with a
public DNS service, e.g.
---
$ cat /var/lib/lxc/appserver1/rootfs/etc/resolv.conf 
nameserver 8.8.8.8
nameserver 8.8.4.4
---

Cheers,
-- 
Leonid Isaev
GPG key fingerprint: C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


signature.asc
Description: PGP signature


Re: [arch-general] Any way to change .PKGINFO post build w/o Rebuilding?

2014-02-26 Thread Leonid Isaev
On Wed, 26 Feb 2014 15:06:36 -0600
"David C. Rankin"  wrote:

> On 02/26/2014 05:45 AM, Gesh wrote:
> > A naïve reading of [1] suggests that makepkg -R should do the trick.
> > However, as I'm away from my computer, I can't test
> > this.
> > Gesh
> > [1] - https://www.archlinux.org/pacman/makepkg.8.html
> 
> With just about every other package, that is OK, but not in the case of
> tdebase. There are files autogenerated during Make and copied to 'pkg' that
> are not present if makepkg -R is called (makepkg wipes out 'pkg' before
> repackaging -- so in this case it will not work). That is what prompted this
> manual question. Thanks though.

Why is this a problem? If you have a build directory in src/, then
autogenerated files are there, so makepkg -R will reexec package() which will
copy those files again.

If make(1) copies those files directly, i.e. not being instructed by the
PKGBUILD, then your package is broken.

Cheers,
-- 
Leonid Isaev
GPG key fingerprint: C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


signature.asc
Description: PGP signature


Re: [arch-general] netctl provides wifi-menu which is unusable

2014-02-27 Thread Leonid Isaev
On Thu, 27 Feb 2014 18:10:39 +0100
Nowaker  wrote:

> Guys, the goal of this "slanted ranting" (really?) is to propose a good 
> solution and make Arch better. Please think out of the box and answer 
> one question:
> 
> Would a separate netctl-wifi-menu package that depends on dialog, 
> wpa_supplicant and dhcpcd be better or not - and why?

No, it won't. Because the metadata will take more space than the actual
application. Besides, wpa_supplicant and dhcpcd is needed not only for
wifi-menu.

> 
> My answer is yes: it will make wifi-menu usable to anyone who wants to 
> use wifi-menu and installs the package.

IMHO, wifi-menu has always been a strange tool because it requires root
privileges to operate. But if I login as root, I might as well use wpa_cli,
iw or write a profile directly. It would be nice if we could use polkit
for non-root users...

Cheers,
-- 
Leonid Isaev
GPG key fingerprint: C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


signature.asc
Description: PGP signature


Re: [arch-general] netctl hangs after last update

2014-03-10 Thread Leonid Isaev
On Mon, 10 Mar 2014 19:54:56 +0100
Robert Knauer  wrote:

> Hello,
> after the update yesterday (see pacman log at the end of the e-mail),
> netctl hangs when I try to start my network connection with the error
> message:
> > A dependency job for netctl@conn1.service failed. See 'journalctl
> > -xn' for details.
> The hanging sub-process of netctl seems to be
> /usr/bin/systemd-tty-ask-password-agent --watch.

AFAIK, netctl doesn't call this.

> 
> In my syslog are the following lines:
> > [19:42:09] info daemon systemd Expecting device sys-subsystem-
> > net-devices-eth0.device...
> > [19:43:39] warning daemon systemd Job sys-subsystem-net-devices-
> > eth0.device/start timed out.
> > [19:43:39] err daemon systemd Timed out waiting for device
> > sys-subsystem-net-devices-eth0.device.
> > [19:43:39] err daemon systemd Dependency failed for The main network
> > connection.

So, what exactly is your question?

Systemd looks and doesn't find eth0, which is correct since your interface is
ens3. In your /etc/systemd/system there should be a .service file which netctl
created when you enabled the profile. I bet that unit is the culprit.

> 
> My netctl profile is the following:
> > Description='The main network connection'
> > Interface=ens3
> > Connection=ethernet
> > IP=static
> > Address=('xx.xx.xx.xx/22')
> > Gateway='xx.xx.xx.xx'
> > DNS=('xx.xx.xx.xx' 'xx.xx.xx.xx')
> > IP6=static
> > Address6=(':::::1/64')
> > Gateway6='fe80::1'
> 
> My network interfaces:
> # ifconfig -a
> ens3: flags=4163  mtu 1500
> inet xx.xx.xx.xx  netmask 255.255.252.0  broadcast xx.xx.xx.xx

Just FYI, hiding IP and MAC addresses is kinda silly...

Cheers,
-- 
Leonid Isaev
GPG key fingerprint: C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


signature.asc
Description: PGP signature


Re: [arch-general] [arch-dev-public] Cyclic dependencies between systemd and util-linux

2014-03-12 Thread Leonid Isaev
On Wed, 12 Mar 2014 17:21:20 +0100
Tobias Powalowski  wrote:

> Am 12.03.2014 06:32, schrieb Gerardo Exequiel Pozzi:
> > On 02/24/2014 03:56 PM, Thomas Bächler wrote:
> >> Right now, we have a problem with cyclic dependencies in core: systemd
> >> requires libblkid and libuuid (systemd-udevd) and util-linux requires
> >> libudev (findmnt, and soon uuidd [1]).
> >>
> >> I don't like this situation and currently it is revoled by adding
> >> systemd as optdepend to util-linux. This has the side effect that in a
> >> chroot with only certain packages installed, one has to explicitly
> >> install systemd to get findmnt working. Since I've run into this
> >> situation and cyclic deps are bad, I propose the following:
> >>
> >> Split both util-linux and systemd into libutil-linux/util-linux and
> >> libsystemd/systemd. Then we could have both util-linux and systemd
> >> depend on both libsystemd and libutil-linux.
> >>
> >> [1] http://www.spinics.net/lists/util-linux-ng/msg08699.html
> >>
> > We also have another set when installing {base} group:
> >
> > warning: util-linux will be installed before its coreutils dependency
> > warning: util-linux will be installed before its pam dependency
> > warning: shadow will be installed before its pam dependency
> >
> >
> New depends introduce error during base installation,
> libutil-linux needs coreutils first else no install is found.

Sorry for cross-list posting...

Actually, this is an old error which I saw on all new installs for quite some
time. For example:
-
[2014-02-14 19:46] [PACMAN] installed shadow (4.1.5.1-7)
[2014-02-14 19:46] [ALPM-SCRIPTLET] /tmp/alpm_p51CHp/.INSTALL: line 6:
install: command not found
[2014-02-14 19:46] [PACMAN] installed util-linux (2.24.1-1)
-

Cheers,
L.

-- 
Leonid Isaev
GPG key fingerprint: C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


signature.asc
Description: PGP signature


Re: [arch-general] [arch-dev-public] Trimming down our default kernel configuration

2014-03-26 Thread Leonid Isaev
On Wed, 26 Mar 2014 19:56:26 +0100
Thomas Bächler  wrote:

> Hello all,
> 
> it won't be too long until 3.14 is out and I want to address a topic
> that has been bugging me for a while. Our kernel includes everything and
> the kitchensink. I have no problem with delivering drivers that can be
> built modular, but there are other things that have an unknown impact on
> everyone.
> 
> I want to trim our kernel down to what we actually support.

Thanks for doing this.

> 
> 1) Once we agreed to disable one LSM, everyone else said "we can enable
> LSM XYZ, too". And so we did. Right now, we enable SELinux, SMACK,
> Tomoyo, AppArmor and Yama, although we don't support the userspace for
> any of those.
> 
> I propose to drop all of them.

I agree regarding SELinux/Apparmor (it's not only userspace tools, but also
sane application policies that are missing).

However, I don't think that Yama requires any userspace components, does it?
Currently, I boot with "security=yama" and completely disabled non-admin
ptrace (kernel.yama.ptrace_scope=2). Perhaps -ARCH kernels should keep Yama
available albeit disabled by default (as they now do).

> 
> 2) We patch our kernel to allow enabling CHECKPOINT_RESTORE without
> enabling CONFIG_EXPERT. I have no idea what the impact of this option
> is, other than that it was requested in order to support some tool that
> can freeze and save single processes resume them later. I am generally
> sceptical towards options that require CONFIG_EXPERT, so I propose
> dropping this one, too.
> 
> 3) We enable tons of debug options in the "Kernel Hacking" section, many
> of which have a "small performance impact". I'd like to get rid of those
> that we don't need (I didn't go through all of them yet).
> 
> What I'd like is a discussion where people suggest more things that
> could or should be dropped, and tell me what is absolutely needed and
> why. I hope that such a discussion makes it clearer to me how I should
> proceed.
> 
> Regards
> Thomas
> 

Best,
-- 
Leonid Isaev
GnuPG key fingerprint: C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


signature.asc
Description: PGP signature


Re: [arch-general] [arch-dev-public] Trimming down our default kernel configuration

2014-03-26 Thread Leonid Isaev
On Wed, 26 Mar 2014 21:00:15 +0100
Thomas Bächler  wrote:

> Am 26.03.2014 20:18, schrieb Leonid Isaev:
> > However, I don't think that Yama requires any userspace components, does
> > it? Currently, I boot with "security=yama" and completely disabled
> > non-admin ptrace (kernel.yama.ptrace_scope=2). Perhaps -ARCH kernels
> > should keep Yama available albeit disabled by default (as they now do).
> 
> Once yama is built-in, the ptrace_scope protection is enabled by
> default. There is no option to change that.
> 

But by default, kernel.yama.ptrace_scope = 0, which according to documentation
(Yama.txt) is like having no ptrace restriction at all, and indeed gdb/strace
work...

Best,
-- 
Leonid Isaev
GnuPG key fingerprint: C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


signature.asc
Description: PGP signature


Re: [arch-general] [arch-dev-public] Trimming down our default kernel configuration

2014-03-27 Thread Leonid Isaev
On Wed, 26 Mar 2014 22:17:25 +0100
Thomas Bächler  wrote:

> Am 26.03.2014 21:31, schrieb Leonid Isaev:
> > On Wed, 26 Mar 2014 21:00:15 +0100
> > Thomas Bächler  wrote:
> > 
> >> Am 26.03.2014 20:18, schrieb Leonid Isaev:
> >>> However, I don't think that Yama requires any userspace components, does
> >>> it? Currently, I boot with "security=yama" and completely disabled
> >>> non-admin ptrace (kernel.yama.ptrace_scope=2). Perhaps -ARCH kernels
> >>> should keep Yama available albeit disabled by default (as they now do).
> >>
> >> Once yama is built-in, the ptrace_scope protection is enabled by
> >> default. There is no option to change that.
> >>
> > 
> > But by default, kernel.yama.ptrace_scope = 0
> 
> No. The default is 1.
> 

Yes, you are right, I was speaking from the old memory... If this causes
problems and a default sysctl.d/ conf file is not desired, then I guess, Yama
can go away as well.

Does this discussion also apply to the -lts kernel?

Thanks,
-- 
Leonid Isaev
GnuPG key fingerprint: C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


signature.asc
Description: PGP signature


Re: [arch-general] pacman-key complaining, but what to do about it?

2014-04-02 Thread Leonid Isaev
On Wed, 02 Apr 2014 18:47:52 +0200
Nowaker  wrote:

> > There may be a transparent proxy in your routing chain that strips
> > compression in order to run a virus scan.
> 
> Time for SSL-securing Arch Linux repos to prevent any sort of 
> man-in-the-middle attacks? Even such trivial things like compression 
> stripping, or image optimization often performed by mobile internet 
> providers is a man-in-the-middle. This should be fought by any means.
> 

If you are talking about mirrors, then look at 
https://www.archlinux.org/mirrorlist/all/https/ . At least in my experience,
using tls allows to evade certain routers which redirect to a captive
portal if plain http is used, but don't touch encrypted traffic (e.g. if you
are in a hotel and need to install something).

However, tls adds CPU overhead and is not a way to fight broken ISPs and
proxies/routers.

Cheers,
-- 
Leonid Isaev
GnuPG key fingerprint: C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


signature.asc
Description: PGP signature


[arch-general] Using timers instead of cron jobs

2014-04-02 Thread Leonid Isaev
Hi,

On a current [testing] installation, there are several timer symlinks
in /usr/lib/systemd/system/multi-user.target.wants (shipped with logrotate,
man-db, etc.). What is the reason for choosing multi-user.target instead of
timers.target?

Thanks,
-- 
Leonid Isaev
GnuPG key fingerprint: C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


signature.asc
Description: PGP signature


Re: [arch-general] Heartbleed-bug in OpenSSL 1.0.1 up to 1.0.1f

2014-04-09 Thread Leonid Isaev
[ I had to reconstruct the message from the online archive -- sorry if message
  ID is screwed ]

On Tue, 8 Apr 2014 17:54:14 +0100
adys.wh at gmail.com (Jerome Leclanche) wrote:

> Slightly OT but for those interested, I added the heartbleed utility
> (used by the heartbleed checker site) to the AUR:
> https://aur.archlinux.org/packages/heartbleed-git/
> 
> % heartbleed mediacru.sh:443
> 2014/04/08 17:53:57 mediacru.sh:443 - SAFE
> J. Leclanche

One should probably make clear that openssh servers/clients are _not_
affected because ssh does not use TLS:
http://serverfault.com/questions/587433/heartbleed-are-services-other-than-https-affected
 .

-- 
Leonid Isaev
GPG key fingerprint: C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


signature.asc
Description: PGP signature


[arch-general] On-boot delay due to timer units

2014-04-17 Thread Leonid Isaev
Hi,

Since anacron jobs were replaced with timers, I am seeing a noticeable delay
before agetty prompt appears on machines which were unused for some time (due
to update/man-db timers starting up simultaneously).

TLDR: Anacron inserts a random delay between boot and running the jobs, so is
it possible to simulate this behavior by including e.g. "OnBootSec=..." in the
timers at next update? Or is this option incompatible with OnCalendar?

Here is the (edited) "statistics" obtained by grepping /var/log/daemon.log.
The disk is actually an Intel X-25 (sata-2) SSD.

--- No timers are active (baseline) ---
Apr  6: 5.983s (kernel) + 1.947s (userspace) = 7.930s.
Apr  6: 5.815s (kernel) + 2.494s (userspace) = 8.310s.
Apr  6: 5.692s (kernel) + 1.612s (userspace) = 7.304s.
Apr  7: 5.874s (kernel) + 2.561s (userspace) = 8.436s.
Apr  9: 5.704s (kernel) + 3.001s (userspace) = 8.706s.
Apr 10: 5.612s (kernel) + 2.494s (userspace) = 8.106s.
Apr 11: 5.618s (kernel) + 2.908s (userspace) = 8.526s.
Apr 12: 5.671s (kernel) + 3.345s (userspace) = 9.016s.

--- Timers first run ---
Apr 14: 5.464s (kernel) + 46.883s (userspace) = 52.348s.

--- Startup with timers ---
Apr 15: 5.715s (kernel) + 2.878s (userspace) = 8.593s.
Apr 16: Not powered on
Apr 17: 6.414s (kernel) + 7.785s (userspace) = 14.200s.
$ systemd-analyze blame | head
  6.724s man-db.service
  1.935s updatedb.service
   926ms root-ssh-key-init@0x14d33aba.service
   507ms lxc@appserver\x2dx86_64.service
   427ms rfkill-unblock@wlan.service
   381ms systemd-networkd.service
   340ms wlan-powersave@wls1.service
   289ms syslog-ng.service
   235ms volatile-mail.service
   225ms iptables.service

Thanks,
L.

-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


signature.asc
Description: PGP signature


Re: [arch-general] On-boot delay due to timer units

2014-04-17 Thread Leonid Isaev
On Thu, 17 Apr 2014 21:31:07 +0200
Thomas Bächler  wrote:

> Am 17.04.2014 20:56, schrieb Leonid Isaev:
> > Hi,
> > 
> > Since anacron jobs were replaced with timers, I am seeing a noticeable
> > delay before agetty prompt appears on machines which were unused for some
> > time (due to update/man-db timers starting up simultaneously).
> > 
> > TLDR: Anacron inserts a random delay between boot and running the jobs, so
> > is it possible to simulate this behavior by including e.g. "OnBootSec=..."
> > in the timers at next update? Or is this option incompatible with
> > OnCalendar?
> 
> OnBootSec would cause the timers to always run on boot, no matter how
> much time has passed, which is not what we want.

OK.

> 
> I don't think it is a problem that the timers run on boot, but rather
> that they delay Type=idle units, like agetty. From what the
> documentation says, there should not be any delay:
> 
> "Behavior of idle is very similar to simple; however, actual execution
> of the service binary is delayed until all jobs are dispatched."
> 
> I am confused why get a delay here.

I think the problem is the disk I/O generated due to e.g. man-db indexing,
because I see the hdd light is solid on. So, my guess is that two things can
happen: either the login prompt is delayed, or the prompt is shown but the
actual login will stall.

> 
> I think another solution in systemd would be introducing a holdoff time:
> Instead of running immediately on boot, the timer should be scheduled
> for boot+5min.

You are right -- that's the best way to put it. Except, I'd generate random
timeouts (distributed in some interval) for the corresponding services...

Thanks,
L.

-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


signature.asc
Description: PGP signature


Re: [arch-general] On-boot delay due to timer units

2014-04-21 Thread Leonid Isaev
On Thu, 17 Apr 2014 21:31:07 +0200
Thomas Bächler  wrote:

> [...]
> 
> I think another solution in systemd would be introducing a holdoff time:
> Instead of running immediately on boot, the timer should be scheduled
> for boot+5min.
> 
> This requires some investigation - sorry, I don't have a quick solution
> right now.
> 

AFAIU, there are 2 real issues here:
1. We hook to the boot process a bunch of disk-intensive operations which did
not belong there in the 1st place.
2. Even if a boot delay for timers is implemented or the behavior of Type=idle
units is "fixed" somehow in systemd, still all "cron" timers will be started in
parallel which may result in a slow/unresponsive system. Note, that under
anacron they were serialized by run-parts.

BTW, thanks for bringing this up on systemd ML.

L.

-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


signature.asc
Description: PGP signature


Re: [arch-general] Comment on: Use systemd timers instead of /etc/cron.{hourly, daily, weekly, monthly}?

2014-04-25 Thread Leonid Isaev
On Fri, 25 Apr 2014 17:19:04 -0400
Carl Schaefer  wrote:

> It seems to me that, compared to cron/anacron, systemd timers currently
> offer reduced functionality and no clear benefit (I don't consider the
> act of uninstalling cron to have significant value in itself).

But then again, you don't maintain the cron package...

> Losing
> the ability to control when jobs run is giving up a lot; without that,
> the more use is made of systemd timers, the more unpredictable the
> results will be.

See systemd.timer(5) manpage. The timer configuration _should be_ one-to-one
equivalent to a crontab, except for a different syntax...

> 
> Perhaps I'm missing something, because I don't fully understand all the
> points Thomas raised last month in his proposal on arch-dev-public:
> 
> > Pros:
> > * enabled by default (in contrast to cronie)
> > * systems without need for crontabs can disable/uninstall cron
> > * service will be simpler than the rather long dropin scripts
> > 
> > Cons:
> > * services are run in parallel instead of sequentially (is this even a
> >   con? timer start will be randomized, and we can increase accuracy to an
> >   hour to randomize even more)
> > * no holdoff time after boot as it seems
> 
> pro#3 is a mystery to me,

Just compare {man-db,logrotate,updatedb}.service files with the corresponding
scripts in cron.daily...

> and missing from the "con" list is the point
> Maciej raised about the effect random timer jobs can have on busy
> servers.

So far, I have seen only (minor) inconveniences associated with switching to
the timers, which essentially have to do with system(d) startup time. Notice
that these issues will not be visible on servers because there systemd's
parallellization of the boot process is irrelevant.

The timer jobs are niced to 19 so if the server is busy they should wait, no?

> 
> If this ship is already sailing, though, the goal should be to add
> functionality to systemd timers so that it becomes a real replacement
> for cron, e.g. allow execution windows to be defined, jobs placed within
> these windows, and scheduling parameters like acceptable degrees of
> parallelism to be specified.  Something like that could be more powerful
> and flexible than cron, and potentially easier to manage than a set of
> crontabs.  Does anyone know if the systemd timers roadmap includes
> anything like this?

Ask this on [systemd-devel].

Cheers,
L.

-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


signature.asc
Description: PGP signature


Re: [arch-general] netctl/systemd - permission error in dmesg - need fixing?

2014-05-02 Thread Leonid Isaev
On Fri, 02 May 2014 09:52:38 -0500
"David C. Rankin"  wrote:

> All,
> 
>   Checking dmesg, I found the line:
> 
> [2.865094] systemd[1]: Configuration file
> /etc/systemd/system/netctl@rlf_network\x2dstatic.service is marked
> world-inaccessible. This has no effect as configuration data is accessible
> via APIs without restrictions. Proceeding anyway.

See
http://lists.freedesktop.org/archives/systemd-devel/2014-February/017146.html :

* When reading unit files, systemd will now verify
  the access mode of these files, and warn about certain
  suspicious combinations. This has been added to make it
  easier to track down packaging bugs where unit files are
  marked executable or world-writable.

Cheers,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


signature.asc
Description: PGP signature


Re: [arch-general] Comment on: Use systemd timers instead of /etc/cron.{hourly, daily, weekly, monthly}?

2014-05-05 Thread Leonid Isaev
Hi,

On Mon, 5 May 2014 08:05:08 -0500
Maciej Puzio  wrote:

> I have been testing the issue for a week. Daily timers are fired
> between 0:00 and 0:01 without exception - all timers at the same time,
> all machines at the same time, every day at the same time. The largest
> variation I have seen was 30 seconds. So yes, there is definitely an
> issue with AccuracySec=12h not being honored.

AFAIU systemd is supposed to start timers "randomly" in the time interval
[1d, 1d + 12h]; different timers are started in parallel. Are you arguing that
the starting time is not "random" enough?

> 
> However, whether timer accuracy is 30 seconds or 12 hours, this makes
> little difference to me, as both are unacceptable without the
> possibility to customize timer elapse time. I have reverted all my
> Arch machines to previous cron-based config and intend to keep it this
> way. Perhaps it is not "cool", but at least it works.

You misunderstood the point here.

Systemd timers (at least in the current form) are _not_ cron replacement.
However, they are adequate for daily maintainance jobs that are shipped with
packages. If you had custom, carefully scheduled cron jobs, you should
continue using cronie. What I don't understand is why do you care when
man-db/updatedb runs?

> 
> An example of such a solution
> would be hourly/daily/monthly/weekly timers that execute scripts from
> relevant /etc/cron.* directories. That would allow for removal of
> cronie while sidestepping timer elapse problems that we are discussing
> here. It would also have a benefit of handling all cron tasks in
> addition to logrotate/updatedb/man-db/shadow.

The scripts mainly set up the environment which is now done by systemd. You
issue is with scheduling, and it will _not_ go away because scripts are still
executed by systemd (as opposed to cronie).

Cheers,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


signature.asc
Description: PGP signature


Re: [arch-general] Comment on: Use systemd timers instead of /etc/cron.{hourly, daily, weekly, monthly}?

2014-05-06 Thread Leonid Isaev
On Tue, 6 May 2014 13:23:26 -0500
Maciej Puzio  wrote:

> As I wrote before, I can edit every timer file and set the elapse
> time. What I can't do is to change one setting which says when daily
> maintenance tasks are run. This was possible with cron, but is no
> longer possible now. What's the problem to edit four files? Well, this
> is multiplied by the number of machines that are under my care.
> Again, here is relevant systemd RFE link:
> https://bugs.freedesktop.org/show_bug.cgi?id=77938

This is bogus.

See "man 7 systemd.time"; what you want is something like "OnCalendar=*-*-*
04:10:20" for a job that runs every day at 4:10:20 AM.

> On Mon, May 5, 2014 at 12:21 PM, Leonid Isaev  wrote:
> > Systemd timers (at least in the current form) are _not_ cron replacement.
> > However, they are adequate for daily maintainance jobs that are shipped
> > with packages. If you had custom, carefully scheduled cron jobs, you should
> > continue using cronie. What I don't understand is why do you care when
> > man-db/updatedb runs?

After re-reading the documentation I have to take this back, systemd timers
seem to implement all features provided by cronie.

Cheers,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


signature.asc
Description: PGP signature


Re: [arch-general] Comment on: Use systemd timers instead of /etc/cron.{hourly, daily, weekly, monthly}?

2014-05-07 Thread Leonid Isaev
Hi,

On Wed, 7 May 2014 13:34:29 -0500
Maciej Puzio  wrote:

> On Tue, May 6, 2014 at 3:13 PM, Leonid Isaev  wrote:
> > On Tue, 6 May 2014 13:23:26 -0500
> > Maciej Puzio  wrote:
> >
> >> As I wrote before, I can edit every timer file and set the elapse
> >> time. What I can't do is to change one setting which says when daily
> >> maintenance tasks are run. This was possible with cron, but is no

You mean, you could change /etc/anacrontab?

> >> longer possible now. What's the problem to edit four files? Well, this
> >> is multiplied by the number of machines that are under my care.

Why can't you put additional configs in /etc/systemd/system/xxx.timer.d/ dir?

> >> Again, here is relevant systemd RFE link:
> >> https://bugs.freedesktop.org/show_bug.cgi?id=77938
> >
> > This is bogus.
> 
> Leonid, please reread the above paragraph and my previous posts, with
> comprehension. With all due respect, your replies are not related to
> the issue discussed.

It is completely unclear what you want to be fixed and the title is
misleading...

If you have machines m_1 ... m_N and want to spread the anacron jobs, you need
to edit N anacrontabs, right? Now you need to do k*N changes, k -- the number
of jobs used to be started by anacron. Are you asking for a centralized
control affecting all "daily" timers like the per-machine anacrontab? If true,
this is unlikely to be implemented (at least I wouldn't do it).

Perhaps a proper approach is to create a special target for your maintainance
jobs which would pull all relevant services and would itself be triggered by an
OnCalendar timer. Although I am not sure whether a timer can directly trigger
a target yet...

Cheers,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


signature.asc
Description: PGP signature


Re: [arch-general] Comment on: Use systemd timers instead of /etc/cron.{hourly, daily, weekly, monthly}?

2014-05-08 Thread Leonid Isaev
On Thu, 8 May 2014 14:24:45 +0900
Savyasachee Jha  wrote:

> On Thu, May 8, 2014 at 6:23 AM, Leonid Isaev  wrote:
> 
> >
> > Perhaps a proper approach is to create a special target for your
> > maintainance
> > jobs which would pull all relevant services and would itself be triggered
> > by an
> > OnCalendar timer. Although I am not sure whether a timer can directly
> > trigger
> > a target yet...
> >
> >
> They can, do refer to
> https://wiki.archlinux.org/index.php/Systemd/cron_functionality where you
> can find some examples of the same.
> 

Cool. I didn't know about that wikipage.

Thanks,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


signature.asc
Description: PGP signature


Re: [arch-general] How to disable systemd-tmpfiles-clean.timer

2014-05-08 Thread Leonid Isaev
Hi,

On Thu, 08 May 2014 02:43:57 -0400
Olivier Langlois  wrote:

> Since a recent update (I have first noticed a couple of weeks ago this
> new systemd enhancement), systemd started to automatically clean /tmp
> directory daily. This is not something that I like as I prefer to decide
> when to clean up and to manually perform the clean up.
> 
> I have tried
> 
> systemctl stop systemd-tmpfiles-clean.timer
> systemctl disable systemd-tmpfiles-clean.timer
> 
> The disabling apparently did not survived a reboot and the undesired
> systemd service came back.
> 
> I guess that I could mess with tmpfiles-clean config file but I am just
> not interested in the service at all. What is the sure way method to
> disable it for good?

systemd-tmpfiles-clean does more that just removing stuff from /tmp. So
changing the config is the only way to go. Just
copy /usr/lib/tmpfiles.d/tmp.conf to /etc/tmpfiles.d/ and modify it as you
like...

Cheers,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


signature.asc
Description: PGP signature


Re: [arch-general] makepkg.conf CFLAGS

2014-06-02 Thread Leonid Isaev
On Mon, 2 Jun 2014 23:53:38 +0600
Rashif Ray Rahman  wrote:

> On 2 June 2014 18:56, Yamakaky  wrote:
> >
> >> I believe when the decision was made it was simply based on the fact
> >> that being able to share is worth more for the community than local
> >> optimization.
> >
> > PKGBUILDs and packages from repositories have to be portable, but it's
> > not a requirement for self-build AUR packages. Who shares binary
> > packages from AUR ?
> 
> Anybody can share binary packages that they build off of AUR
> buildscripts -- that is exactly what we allow by making these flags
> the default.
> 
> With local optimization, users end up spending time rebuilding. You
> may build a bunch of packages and decide to share them from a repo, or
> you may want help from somebody else with runtime problems that you're
> having.
> 
> There is no statistical backing here AFAIK, so if you feel strongly
> about it, you are welcome to approach the pacman developers in order
> to reach a new conclusion.
> 

Remember also that gcc optimization flags make difference only for programs
which run in or close to realtime. Examples include lapack/arpack, blender,
or your own HPC code. For everything else advanced optimization via -march= and
-O? flags yields no measurable performance increase.

Even if you build e.g. thunderbird using -O1 for a generic x86_64 machine,
you'll not notice any slowdown compared to an "optimized" build (actually,
that's how I build all my local packages).

Cheers,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


signature.asc
Description: PGP signature


Re: [arch-general] How do I _really_ fix the superblock?

2014-06-07 Thread Leonid Isaev
On Sat, Jun 07, 2014 at 05:46:48PM +0200, Ralf Mardorf wrote:
> Date: Sat, 07 Jun 2014 17:46:48 +0200
> From: Ralf Mardorf 
> To: arch-general@archlinux.org
> Subject: Re: [arch-general] How do I _really_ fix the superblock?
> X-Mailer: Evolution 3.12.2
> 
> On Sat, 2014-06-07 at 09:59 -0500, Doug Newgard wrote:
> > The Beginner's Guide says: Warning: Using localtime may lead to several 
> > known and unfixable bugs.
> > 
> > If you're going to do something non-standard that's known to cause 
> > problems, you have to expect things like this from time to time.
> 
> "systemd, libsystemd and systemd-sysvcompat 213-6 from testing only
> solve the fstab issue, but they don't solve the superblock issue." -
> https://bugs.archlinux.org/task/40706

There has never been a "superblock" issue. There is something wrong with your
RTC/system clock. Depending on the filesystem this may be a problem or not. For
instance, ext{3,4} cares about superblock modification time, while ntfs does
not (iirc).

> now. I chose local time because I want the correct time, when I use the
> BIOS, e.g. to backup BIOS settingstamps.

And... your clock is not correct apparently. Besides, what does BIOS backup
have to do with a way your clock keep time?

-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgpEy3a4KYQfx.pgp
Description: PGP signature


Re: [arch-general] How do I _really_ fix the superblock?

2014-06-07 Thread Leonid Isaev
On Sat, Jun 07, 2014 at 06:23:49PM +0200, Ralf Mardorf wrote:
> Date: Sat, 07 Jun 2014 18:23:49 +0200
> From: Ralf Mardorf 
> To: arch-general@archlinux.org
> Subject: Re: [arch-general] How do I _really_ fix the superblock?
> X-Mailer: Evolution 3.12.2
> 
> On Sat, 2014-06-07 at 12:12 -0400, Leonid Isaev wrote:
> > your clock is not correct apparently.
> 
> The clock provides the correct localtime. There's no issue caused by the
> clock. The issue only appears for Arch Linux with systemd from the
> repositories > version 212-3. It worked before:
> 
> [rocketmouse@archlinux ~]$ grep systemd /var/log/pacman.log
> [snip]
> [2013-02-17 02:59] installed systemd (197-4)
> [snip]
> [2014-06-04 08:34] [PACMAN] upgraded libsystemd (212-3 -> 213-5)
> [2014-06-04 08:34] [PACMAN] upgraded systemd (212-3 -> 213-5)
> [2014-06-04 08:34] [PACMAN] upgraded systemd-sysvcompat (212-3 -> 213-5)
> [snip]
> [2014-06-07 17:19] [PACMAN] Running 'pacman -U 
> systemd-213-6-x86_64.pkg.tar.xz libsystemd-213-6-x86_64.pkg.tar.xz 
> systemd-sysvcompat-213-6-x86_64.pkg.tar.xz'
> [2014-06-07 17:19] [PACMAN] upgraded libsystemd (213-5 -> 213-6)
> [2014-06-07 17:19] [PACMAN] upgraded systemd (213-5 -> 213-6)
> [2014-06-07 17:19] [PACMAN] upgraded systemd-sysvcompat (213-5 -> 213-6)
> 
> And it always worked without a problem for all other Linux and FreeBSD
> installs on my machines.

Just out of curiosity, when exactly do you see the fsck warning: at each
reboot, or when booting after some downtime? Also, how do you syncronize time:
ntpd/chrony/timesyncd?

> 
> If it's a new policy, then there's no reason to discuss this on the
> mailing list.
> 

There is no policy, just common sense...

-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgpQcZy6VVvrX.pgp
Description: PGP signature


Re: [arch-general] How do I _really_ fix the superblock?

2014-06-07 Thread Leonid Isaev
On Sat, Jun 07, 2014 at 06:49:58PM +0200, Ralf Mardorf wrote:
> Date: Sat, 07 Jun 2014 18:49:58 +0200
> From: Ralf Mardorf 
> To: arch-general@archlinux.org
> Subject: Re: [arch-general] How do I _really_ fix the superblock?
> X-Mailer: Evolution 3.12.2
> 
> On Sat, 2014-06-07 at 12:43 -0400, Leonid Isaev wrote:
> > Just out of curiosity, when exactly do you see the fsck warning: at
> > each reboot, or when booting after some downtime? Also, how do you
> > syncronize time: ntpd/chrony/timesyncd?
> 
> I see the warning with each startup, it doesn't matter if I reboot or if
> I boot after a long downtime. The clock is ok. I sync manually
> 
> [rocketmouse@archlinux ~]$ cat /usr/local/bin/tool
> #!/bin/bash
> 
> # /usr/local/bin/tool
> 
> case $1 in
> [snip]
> ntp)
> ntpdate ntp.favey.ch
> hwclock --set --date "$(date)";;
> [snip]

Just an advice: replace this with a continuously tunning ntpd or at least with
ntpd -q.

> 
> The warning about the wrong superblock time isn't an issue, the problem
> is that with each startup the / partition is checked. I thought this is
> caused by the wrong superblock time, but IIUC it's another bug.
> 

That's actually interesting. Whether / will be fsck'ed or not depends on your
mkinitcpio hooks (fsck) and kernel cmdline. What are them? Do you have "ro" in
the cmdline?

-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgpdOAP_6fnZI.pgp
Description: PGP signature


Re: [arch-general] Unwanted forced fsck at each startup - Was: How do I _really_ fix the superblock?

2014-06-07 Thread Leonid Isaev
On Sat, Jun 07, 2014 at 10:34:12PM +0200, Ralf Mardorf wrote:
> Date: Sat, 07 Jun 2014 22:34:12 +0200
> From: Ralf Mardorf 
> To: arch-general@archlinux.org
> Subject: Re: [arch-general] Unwanted forced fsck at each startup - Was: How
>  do I _really_ fix the superblock?
> X-Mailer: Evolution 3.12.2
> 
> On Sat, 2014-06-07 at 13:23 -0400, Leonid Isaev wrote:
> > That's actually interesting. Whether / will be fsck'ed or not depends
> > on your mkinitcpio hooks (fsck) and kernel cmdline. What are them? Do
> > you have "ro" in the cmdline?
> 
> The GRUB lines for my kernels all include 'ro'.
> 
> [rocketmouse@archlinux ~]$ grep HOOKS /etc/mkinitcpio.conf | grep -v "#"
> HOOKS="base udev autodetect modconf block filesystems keyboard fsck vboxhost"

So, your / is being checked twice on boot...

> 
> "1) Use the 'fsck' hook, use 'rw' on the kernel commandline.
> 2) Don't use the 'fsck' hook, use 'ro' on the kernel commandline." -
> https://bbs.archlinux.org/viewtopic.php?pid=1307895#p1307895
> 
> So I should remove fsck from the hooks?

Since you are seeing the fsck warning even after an extended downtime, I can
think of two possibilities:

1. The superblock mod time is _really_ wrong (like in 2020), that is OS does
something strange. You can check this by running "tune2fs -l" or dumpe2fs from
a live environment, possibly disabling your timesync tool for this one
experiment.

2. Something happens in between the two runs of fsck. I'd remove the fsck hook
to let systemd check the filesystems and see if that helps.

> If so, why didn't it cause the issue before the systemd update?
> 

I don't know.

> Regards,
> Ralf
> 
> Off-topic PS:
> > Just an advice: replace this with a continuously tunning ntpd or at
> > least with ntpd -q.
> 
> Is this useful for a DAW? Part of the audio tuning could be turning off
> Internet connections, but at least I will run as less services as
> possible. Ok, the -q "ntpd will not daemonize and will exit after the
> clock is first synchronized" seems to be something I could use.
> 

I meant "running", not "tunning". Also, I can only suspect what you mean by
DAW. Anyway, ntpd daemon can handle intermittent network access just fine...
Unless you have an extremely CPU/memory-constrained system, you really should
use the daemon IMHO because it offers continuous time synchronization, etc. 

-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgpLw8Tckygaq.pgp
Description: PGP signature


Re: [arch-general] [PATCH 1/1] systemd: restart services after update

2014-06-11 Thread Leonid Isaev
Hi,

On Wed, Jun 11, 2014 at 12:15:18PM +0200, Christian Hesse wrote:
> Date: Wed, 11 Jun 2014 12:15:18 +0200
> From: Christian Hesse 
> To: arch-general 
> Cc: Christian Hesse 
> Subject: [arch-general] [PATCH 1/1] systemd: restart services after update
> X-Mailer: git-send-email 2.0.0
> 
> From: Christian Hesse 
> 
> ---
>  systemd.install | 6 ++
>  1 file changed, 6 insertions(+)
> 
> diff --git a/systemd.install b/systemd.install
> index 5c370f7..11e97bc 100644
> --- a/systemd.install
> +++ b/systemd.install
> @@ -27,6 +27,12 @@ maybe_reexec() {
>  
>if sd_booted; then
>  systemctl --system daemon-reexec
> +
> +for SERVICE in systemd-journald systemd-logind systemd-machined 
> systemd-networkd systemd-resolved systemd-udevd; do
> +  if systemctl is-active ${SERVICE} >/dev/null; then
> +systemctl restart ${SERVICE}
> +  fi
> +done
>fi
>  }

Are you sure it's a good idea to restart things like that? Because this assumes
that these daemons are independent -- is this a valid assumption? It seems that
systemctl daemon-reexec _should_ reexec itself and its flock of helpers...

Thanks,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgpdd1dQwBZmd.pgp
Description: PGP signature


[arch-general] inetutils and the 'base' group

2014-06-16 Thread Leonid Isaev
Hi,

Is there a reason why core/inetutils is in base group, i.e. which
packages implicitly rely on it? It was added to base around Aug. 2011 ago, I
think because of hostname(1), but shouldn't this functionality be now provided
by hostnamectl?

Thanks,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgpjkLWHlDer2.pgp
Description: PGP signature


Re: [arch-general] inetutils and the 'base' group

2014-06-16 Thread Leonid Isaev
On Mon, Jun 16, 2014 at 08:31:42PM -0400, Daniel Micay wrote:
> Date: Mon, 16 Jun 2014 20:31:42 -0400
> From: Daniel Micay 
> To: arch-general@archlinux.org
> Subject: Re: [arch-general] inetutils and the 'base' group
> User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101
>  Thunderbird/24.6.0
> 
> On 16/06/14 07:35 PM, Leonid Isaev wrote:
> > Hi,
> > 
> > Is there a reason why core/inetutils is in base group, i.e. which
> > packages implicitly rely on it? It was added to base around Aug. 2011 ago, I
> > think because of hostname(1), but shouldn't this functionality be now 
> > provided
> > by hostnamectl?
> > 
> > Thanks,
> 
> It's likely just in base because it was viewed as convenient. You can
> temporarily change the hostname with `sysctl kernel.hostname=foo` alone
> anyway.

Yes, but the hostname binary may be queried by scripts, like startx.

> 
> AFAIK it's a bug if there's an implicit dependency on base, although
> it's not clear if an implicit make dependency on base is allowed as it
> is for base-devel. 

I thinks so, and this seems convenient. Otherwise everything should depend on
glibc, for example. This implicit behavior is the reason why base should be
small. Hence my question...

Sincerely, 
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgpdPUHzYcQPH.pgp
Description: PGP signature


[arch-general] No libutil.a in core/glibc

2014-06-19 Thread Leonid Isaev
Hi,

Why is there no static libutil (libutil.a) in the glibc package? The
PKGBUILD has "options=(staticlibs)" which is supposed to keep *.a files, and
indeed, there are some static libraries like libpthread{,_nonshared}.a. Was
static libutil removed by upstream?

Thanks,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgpuqE7AmZ2ty.pgp
Description: PGP signature


Re: [arch-general] [draft] xorg-server 1.16 is now available

2014-07-25 Thread Leonid Isaev
Hi,

[ cross-posting to arch-general ]

On Fri, Jul 25, 2014 at 03:59:27PM +0200, Laurent Carlier wrote:
> The new version comes with the following changes:
> * X is now rootless with the help of systemd-logind, this also means that it 
> must be launched from the same virtual terminal as was used to log in. Please 
> note that launching X through a login-manager (gdm, kdm, ...) doesn't yet 
> provide rootless access. The old root execution behavior can be restored 
> through the Xorg.wrap config file (man xorg.wrap).

Note that this update is not seemless because it breaks virtual machines with
vesa (no KMS, so can not access /dev/mem). The documentation says that Xorg
will autodetect whether or not to drop root privs, but it doesn't.

Forcing X to run as root via Xwrapper.config does help, but neither this file
nor /etc/X11/X11 are part of the package. Is it possible to at least have the
latter directory in xorg-server?

Otherwise, great news!

Thanks,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgpNlqm2GrN4H.pgp
Description: PGP signature


Re: [arch-general] [draft] xorg-server 1.16 is now available

2014-07-26 Thread Leonid Isaev
On Sat, Jul 26, 2014 at 08:54:21AM +0200, Laurent Carlier wrote:
> Le samedi 26 juillet 2014, 03:11:45 Karol Blazewicz a écrit :
> > I can start only one rootless X session at a time. If I want to start
> > a second one while the first one is running, I have to use 'sudo
> > startx'.
> > I'm logging into tty and starting X as a user.
> > 
> > Did I mis-configure something or is it a "feature'? Can you start
> > multiple X sessions simultaneously with xorg 1.16?
> 
> I have not yet found how to do this with xorg 1.16 in rootless mode. Multiple 
> X sessions should work flawlessly with root rights.

Not really, in general. For me, Xserver 1.16 with root rights works only on
KMS-less systems. In other setups I have tested, X simply segfaults if running
as root. This happens on real hw as well as in vmware player (which provides
KMS). In the latter case I had to downgrade to xorg-server 1.15 to get my
desktop back (also, I do not use proprietary vmware tools).

Here are the errors on a real machine with hybrid AMD/Intel graphics:
--
$ lspci | grep VGA
00:02.0 VGA compatible controller: Intel Corporation 4th Gen Core Processor
Integrated Graphics Controller (rev 06)
01:00.0 VGA compatible controller: Advanced Micro Devices, Inc. [AMD/ATI] Venus
XT [Radeon HD 8870M / R9 M270X] (rev ff)

$ grep "(EE)" /var/log/Xorg.0.log
(WW) warning, (EE) error, (NI) not implemented, (??) unknown.
[  2484.378] (EE) systemd-logind: failed to take device /dev/dri/card0: Did not 
receive a reply. Possible causes include: the remote application did not send a 
reply, the message bus security policy blocked the reply, the reply timeout 
expired, or the network connection was broken.
[  2485.302] (EE) /dev/dri/card0: failed to set DRM interface version 1.4: 
Permission denied
[  2485.305] (EE) Failed to load module "modesetting" (module does not exist, 0)
[  2485.305] (EE) Failed to load module "fbdev" (module does not exist, 0)
[  2485.305] (EE) Failed to load module "vesa" (module does not exist, 0)
[  2485.376] (EE) systemd-logind: failed to take device /dev/dri/card0: Device 
already taken
[  2485.376] (EE) /dev/dri/card0: failed to set DRM interface version 1.4: 
Permission denied
[  2491.936] (EE) 
[  2491.936] (EE) Backtrace:
[  2491.937] (EE) 0: /usr/bin/Xorg.bin (xorg_backtrace+0x56) [0x5938f6]
[  2491.937] (EE) 1: /usr/bin/Xorg.bin (0x40+0x197af9) [0x597af9]
[  2491.937] (EE) 2: /usr/lib/libc.so.6 (0x7f88e4e55000+0x33df0) 
[0x7f88e4e88df0]
[  2491.937] (EE) 3: /usr/lib/libc.so.6 (0x7f88e4e55000+0x128696) 
[0x7f88e4f7d696]
[  2491.937] (EE) 4: /usr/bin/Xorg.bin (0x40+0xa14e8) [0x4a14e8]
[  2491.937] (EE) 5: /usr/lib/libdbus-1.so.3 (dbus_connection_dispatch+0x3f1) 
[0x7f88e69055b1]
[  2491.937] (EE) 6: /usr/lib/libdbus-1.so.3 (0x7f88e68f5000+0x10805) 
[0x7f88e6905805]
[  2491.937] (EE) 7: /usr/bin/Xorg.bin (0x40+0x9ae09) [0x49ae09]
[  2491.937] (EE) 8: /usr/bin/Xorg.bin (WakeupHandler+0x6b) [0x43c3ab]
[  2491.937] (EE) 9: /usr/bin/Xorg.bin (WaitForSomething+0x1c7) [0x590d27]
[  2491.937] (EE) 10: /usr/bin/Xorg.bin (0x40+0x374f1) [0x4374f1]
[  2491.937] (EE) 11: /usr/bin/Xorg.bin (0x40+0x3b866) [0x43b866]
[  2491.937] (EE) 12: /usr/lib/libc.so.6 (__libc_start_main+0xf0) 
[0x7f88e4e75000]
[  2491.937] (EE) 13: /usr/bin/Xorg.bin (0x40+0x25d0e) [0x425d0e]
[  2491.937] (EE) 
[  2491.937] (EE) Segmentation fault at address 0x0
[  2491.937] (EE) 
[  2491.937] (EE) Caught signal 11 (Segmentation fault). Server aborting
[  2491.937] (EE) 
[  2491.937] (EE) 
[  2491.937] (EE) Please also check the log file at "/var/log/Xorg.0.log" for 
additional information.
[  2491.937] (EE) 
[  2493.888] (EE) systemd-logind: ReleaseControl failed: Did not receive a 
reply. Possible causes include: the remote application did not send a reply, 
the message bus security policy blocked the reply, the reply timeout expired, 
or the network connection was broken.
[  2493.888] (EE) Server terminated with error (1). Closing log file.
--

Somehow, I can not make sense of the above error (X runs as root, so it can
write to /var/log/ but lacks permissions for a device?). Any ideas?

Thanks,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgpyH0jXSKnSY.pgp
Description: PGP signature


Re: [arch-general] [draft] xorg-server 1.16 is now available

2014-07-26 Thread Leonid Isaev
On Sat, Jul 26, 2014 at 11:09:32PM +0200, Laurent Carlier wrote:
> [...] 
> Probably a bug related to PRIME, you should probably open an upstream bug 
> report.

Yes. I'll wait for linux 3.16 and then do if the problem is still there.
Although, this looks more like a kernel/systemd issue. Here is a log from
a rootless X:
--
[   143.639] (II) xfree86: Adding drm device (/dev/dri/card0)
[   143.639] (II) systemd-logind: got fd for /dev/dri/card0 226:0 fd 8 paused 0
[   143.639] (II) xfree86: Adding drm device (/dev/dri/card1)
[   143.640] (II) systemd-logind: got fd for /dev/dri/card1 226:1 fd 9 paused 0
[   143.640] (--) PCI:*(0:0:2:0) 8086:0416:1028:05cc rev 6, Mem @
0xf640/4194304, 0xd000/268435456, I/O @ 0xf000/64
[   143.640] (--) PCI: (0:1:0:0) 1002:6821:1028:05cc rev 0, Mem @
0xe000/268435456, 0xf7d0/262144, I/O @ 0xe000/256, BIOS @ 
0x/131072
--

Card0 = radeon; card1 = intel:
--
$ cat /sys/class/drm/card0/device/power/runtime_status
suspended
$ cat /sys/class/drm/card1/device/power/runtime_status
active
$ xrandr --listproviders
Providers: number : 2
Provider 0: id: 0x82 cap: 0xb, Source Output, Sink Output, Sink Offload crtcs:
4 outputs: 5 associated providers: 0 name:Intel
Provider 1: id: 0x59 cap: 0xf, Source Output, Sink Output, Source Offload, Sink
Offload crtcs: 6 outputs: 4 associated providers: 0 name:radeon
--

Cheers,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgpgEyyQibbWG.pgp
Description: PGP signature


Re: [arch-general] [draft] xorg-server 1.16 is now available

2014-07-26 Thread Leonid Isaev
On Sat, Jul 26, 2014 at 11:40:18PM +0200, Laurent Carlier wrote:
> [...]
> 
> Can you try to boot with the kernel parameter drm.rnodes=1 ?
>

Yes, but this doesn't make a difference. X still crashes when tries to run as
root. However, after a closer look, I found this in auth.log (sorry, forgot
to mention before):
--
2014-07-26T23:09:56.000-04:00 borei polkitd[823]: Loading rules from directory
/etc/polkit-1/rules.d
2014-07-26T23:09:56.000-04:00 borei polkitd[823]: Loading rules from directory
/usr/share/polkit-1/rules.d
2014-07-26T23:09:56.000-04:00 borei polkitd[823]: Finished loading, compiling
and executing 1 rules
2014-07-26T23:09:56.000-04:00 borei polkitd[823]: Acquired the name
org.freedesktop.PolicyKit1 on the system bus
2014-07-26T23:09:59.000-04:00 borei systemd-logind[415]: kernel does not
support evdev-revocation
--

What's the need for polkit when needs_root_rights = yes?


Thanks,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgpTPyR2jQYtc.pgp
Description: PGP signature


Re: [arch-general] Improve the filesystem package

2014-08-01 Thread Leonid Isaev
On Fri, Aug 01, 2014 at 12:14:21PM +0200, Yamakaky wrote:
> Hi
> 
> I see some possible improvements to the filesystem package to use some of
> the recent improvements to systemd. I don't know if they are already
> planned.
> 
> All the empty directories and the links could be replaced by a tmpfiles.d
> file, like /usr/lib/tmpfiles.d/archlinux.conf.

And what happens if my root filesystem is mounted read-only? So, please let's
not allow tmpfiles to touch /etc...

> 
> /etc/{group,gshadow,passwd,shadow} could be removed as the base users and
> groups are already created by the upstream sysusers.d files. The
> arch-specific ones (like bin or daemon) could be created by
> /usr/lib/sysusers.d/archlinux.conf.
> 
> The others /etc/ files could be moved to /usr/share/etc/ and copied as
> needed to /etc using tmpfiles.d files.
> 
> A filesystem.install file could launch systemd-tmpfiles and systemd-sysusers
> to update the local configuration when the package is updated.
> 
> In the end, filesystem would contain only tmpfiles.d and sysusers.d files +
> /usr/share/etc.
> 
> I can make a draft of this package if you want.

And all that assumes that you can execute systemd-sysusers, no?

Cheers,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgpMFRGzSgbMK.pgp
Description: PGP signature


Re: [arch-general] Improve the filesystem package

2014-08-01 Thread Leonid Isaev
On Fri, Aug 01, 2014 at 07:10:10PM +0200, Yamakaky wrote:
> >And all that assumes that you can execute systemd-sysusers, no?
> 
> Oh, I see, you are talking about emergency boot ?
> 

Yes. What you suggest is OK for an update on a working system, but what about a
fresh install or rescue? You call pacstrap to install into a directory, but
systemd is installed _after_ filesystem and a bunch of other packages which
expect all those directories.

IMHO, the idea of a stateless system applies to a narrow usecase like coreos,
when you magically obtained a working system (and systemd), and now can do all
the cool stuff. However, coreos is not a general-purpose distro like Arch.

On top of that, I remember that quite recently it was considered a no-no for a
daemon to write to /etc...

Cheers,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgpIvvcOFCTYs.pgp
Description: PGP signature


Re: [arch-general] [arch-dev-public] linux 3.16 in [testing]

2014-08-13 Thread Leonid Isaev
Hi,

On Wed, Aug 13, 2014 at 06:44:39PM +0200, Thomas Bächler wrote:
> Am 13.08.2014 um 17:29 schrieb Damjan Georgievski:
> > On 13 August 2014 17:26, Damjan Georgievski  wrote:
> >> yey
> >> thanks for CONFIG_USER_NS=y
> > 
> > ahh no, I'm stupid.
> > Checked it on another machine and got excited before hand
> > :/
> > 
> > anyway. is there a reason this is not enabled now?
> > all the mainstream distros hae it enabled now Fedora, RHEL/CentOS 7,
> > Ubuntu and Debian (at least on the backported kernel)
> 
> I'd think about it, if the feature wasn't entirely useless. Despite the
> lack of official documentation, I found a document that described how it
> worked. After reading that document I concluded that the feature is a
> huge potential security risk with no actual benefit.

Interestinig. Could you please provide a link?

> 
> If you give me a valid use case for USER_NS, I might reconsider, but
> every use case I can imagine is crushed by the limitations of the
> implementation.

As you know, user_ns is a necesary prerequisite for unpriviileged containers:
https://www.stgraber.org/2014/01/17/lxc-1-0-unprivileged-containers/ . AFAIU,
currently only Ubuntu 14.04 supports those.

However, I agree with you that CONFIG_USER_NS is better left disabled in -ARCH
kernels. After all, people using containers should be able to compile a custom
kernel...

Thanks,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgp56_oGHbyXw.pgp
Description: PGP signature


Re: [arch-general] [arch-dev-public] linux 3.16 in [testing]

2014-08-13 Thread Leonid Isaev
On Wed, Aug 13, 2014 at 08:21:32PM +0300, Mihamina Rakotomandimby wrote:
> Easing the work by defaulting to a ready-to-work kernel would be nice.

I think that LXC is used by minority of users (myself included). So, enabling
USER_NS by default would put the rest of (unsuspecting) users in unnecessary
danger.

OTOH, configuring an LXC container already requires some understanding.
Compared to that, building a custom kernel is really not a major barrier.

Of course, the user namespace stuff will never become 'stable' if nobody uses
it...

Cheers,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgpz6CFRr3OKD.pgp
Description: PGP signature


Re: [arch-general] qemu-vm : access to KVM kernel denied

2014-08-17 Thread Leonid Isaev
On Sun, Aug 17, 2014 at 11:30:38AM +0200, arnaud gaboury wrote:
> I found my entries about this topic, but no clear answer.
> 
> As user, I want to install a VM with virt-install.
> $ virt-install  --connect qemu:///system  --LONG list of options
> 
> Error : could not access KVM kernel module: permission denied. Running
> the above command as root returns the same.
> 
> My configuration:
> martinus@gerbillous ➤➤ ~ % uname -r
> 3.16.1-1-ARCH
> martinus@gerbillous ➤➤ ~ % ls -al /dev/kvm
> crw-rw+ 1 root kvm 10, 232 Aug 17 11:05 /dev/kvm
> martinus@gerbillous ➤➤ ~ % groups martinus
> adm wheel video audio kalu libvirt qemu kvm martinus

You don't need to be in 'kvm' group to use /dev/kvm. What does 'getfacl
/dev/kvm' say? Can you run a plain qemu-system-?

Cheers,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgpnNXmxKY1pH.pgp
Description: PGP signature


Re: [arch-general] qemu-vm : access to KVM kernel denied

2014-08-17 Thread Leonid Isaev
On Sun, Aug 17, 2014 at 05:00:44PM +0200, arnaud gaboury wrote:
> martinus@gerbillous ➤➤ ~ % getfacl /dev/kvm
> getfacl: Removing leading '/' from absolute path names
> # file: dev/kvm
> # owner: root
> # group: kvm
> user::rw-
> user:martinus:rw-
> group::rw-
> mask::rw-
> other::---

So, permissions on /dev/kvm look OK. Actually, you can remove yourself from the
'kvm' group.

> 
> >From man virt-install :
> --
>  qemu:///system
>  For creating KVM and QEMU guests to be run by the system libvirtd
>  instance.  This is the default mode that virt-manager uses, and
>  what most KVM users want.
> 
>  qemu:///session
>  For creating KVM and QEMU guests for libvirtd running as the
>  regular user.
> --
> 
> $ >> $ virt-install  --connect qemu:///session

I have no idea what this means because I never used libvirt (only qemu
directly).

Cheers,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgpvaNd8ji_k1.pgp
Description: PGP signature


Re: [arch-general] Improve the filesystem package

2014-08-20 Thread Leonid Isaev
On Wed, Aug 20, 2014 at 02:42:27PM +0200, Alain Kalker wrote:
> On 08/20/2014 02:04 PM, Alain Kalker wrote:
> >Also, why ship the /etc/shadow, /etc/gshadow files at all?
> >AFAIK, nothing is supposed to mess with the shadow files anyway, except
> >pwconv and grpconv (for initially converting a freshly installed,
> >non-shadow system into one using shadow files), after which these files
> >should be managed by the shadow system itself, in response to
> >adding/removing/changing users and groups using the designated tools.
> 
> From `man pwconv`:
> 
> > Each program acquires the necessary locks before conversion.

Except that sometimes a package installs files owned by a _new_ user. So one
needs some "basic" groups to exist _before_ high-level packages are unpacked.

Shipping these users/groups only in un-shadowed files will lead to pwck/grck
complaints...

HTH,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgpaI_A9p0_qL.pgp
Description: PGP signature


Re: [arch-general] [arch-dev-public] systemd 216 coming soon to testing

2014-08-20 Thread Leonid Isaev
Hi,

[sorry for cross-posting]

On Wed, Aug 20, 2014 at 02:25:24PM -0400, Dave Reisner wrote:
> Full NEWS file:
>
>   http://cgit.freedesktop.org/systemd/systemd/tree/NEWS

This changelog says that:
* journald will no longer forward all local data to another running syslog
  daemon. This change has been made because rsyslog (which appears to be the
  most commonly used syslog implementation these days) no longer makes use of
  this, and instead pulls the data out of the journal on its own. Since
  forwarding the messages to a non-existent syslog server is more expensive
  than we assumed we have now turned this off. If you run a syslog server that
  is not a recent rsyslog version, you have to turn this option on again
  (ForwardToSyslog= in journald.conf).

This is going to break syslog-ng... So is it possible to patch journald.conf
and enable ForwardToSyslog in the package?

Thanks,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgpU3zf33QwIH.pgp
Description: PGP signature


Re: [arch-general] [arch-dev-public] systemd 216 coming soon to testing

2014-08-21 Thread Leonid Isaev
On Thu, Aug 21, 2014 at 10:21:49AM -0500, Bigby James wrote:
> On 08/20, Leonid Isaev wrote:
> > 
> > This changelog says that:
> > * journald will no longer forward all local data to another running syslog
> >   daemon. This change has been made because rsyslog (which appears to be the
> >   most commonly used syslog implementation these days) no longer makes use 
> > of
> >   this, and instead pulls the data out of the journal on its own. Since
> >   forwarding the messages to a non-existent syslog server is more expensive
> >   than we assumed we have now turned this off. If you run a syslog server 
> > that
> >   is not a recent rsyslog version, you have to turn this option on again
> >   (ForwardToSyslog= in journald.conf).
> > 
> > This is going to break syslog-ng... So is it possible to patch journald.conf
> > and enable ForwardToSyslog in the package?
> > 
> > Thanks,
> 
> It seems this is just a change in the default settings, nothing more.

I know, but not everyone follows systemd-devel. So, just updating systemd would
lead to syslog "mysteriously" not logging anything...

[rant]
Besides, I don't understand the motivation that rsyslog "pulls the data out of
the journal on its own". If this is via the "imjournal" module, then
it's a bogus argument because even the official documentation basically
discourages the use of this module.
[/tant]

[1] http://www.rsyslog.com/doc/imjournal.html

Cheers,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgpFCq4IDcaPA.pgp
Description: PGP signature


Re: [arch-general] [arch-dev-public] systemd 216 coming soon to testing

2014-08-21 Thread Leonid Isaev
On Thu, Aug 21, 2014 at 11:56:06AM -0500, Bigby James wrote:
> > > It seems this is just a change in the default settings, nothing more.
> > 
> > I know, but not everyone follows systemd-devel. So, just updating systemd 
> > would
> > lead to syslog "mysteriously" not logging anything...
> 
> Sure, *if* you didn't already explicity set journald to use an external 
> logging
> daemon. If you did, then the update is just going to create a *.pacnew file 
> that
> can be deleted. In other words, the problem is improper configuration on the
> part of the user, not impropriety on the part of upstream.
> 
> I use syslog-ng myself, and it seems to me that if I'm going to be deviating
> from the defaults set by upstream and the Arch devs then it falls to me to pay

Using syslog-ng is not "deviating from the defaults". So far the default was to
send things to _a_ syslog -- no modification of journald.conf was required
(check the old manpages).

Therefore, you won't get a pacnew file, and the new config will be quietly put
in place, breaking existing installations for no valid technical reason.

Anyway, let's not argue about the semantics, it's not a big deal of course.
Hopefully, this thread saves someone a bit of hairpulling :)

Cheers,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgpScBICVVdOh.pgp
Description: PGP signature


Re: [arch-general] Building in docker?

2014-09-03 Thread Leonid Isaev
On Wed, Sep 03, 2014 at 09:04:37AM +0200, Magnus Therning wrote:
> For various reasons I'm looking into not using `makechrootpkg` when
> building the 200+ packages I put into a non-official repo.  Obviously
> it's important to keep the building environment separate from my
> ordinary system environment.  Going to full virtualisation is
> definitely overkill and the only containers I know of are chroots and
> docker.

If by chroot you mean also nspawn, then it is mostly equivalent to docker and
lxc. The only thing bad about systemd-nspawn is its lack of easy config through
files (it only supports cmdline switches which is ridiculously cumbersome).
Also, docker is more complex than a plain lxc-tools approach.

So, I would go with lxc as the simplest and most flexible solution. In fact,
that's how I build my packages.

> 
> Docker has some nice attributes, in particular no need for root
> access.  However, I don't know a whole lot about it, so I wonder are

Where do you take this from? Rootless containers require a specific host kernel
configuration (which -ARCH kernels don't have).

Cheers,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgpNjCL6OfLXw.pgp
Description: PGP signature


Re: [arch-general] Building in docker?

2014-09-04 Thread Leonid Isaev
On Wed, Sep 03, 2014 at 10:26:11PM +0200, Magnus Therning wrote:
> Oki, I've never looked at lxc, I was under the impression that docker
> used to build on lxc in the past.  Is that not true any longer?

It was true, yes, but I don't think it is now. Although, I can't find a link
ATM.

> Is there a template included for Arch?  That would be quite nice
> because building the docker image for Arch is a bit ugly I'd say

Yes. It is a bit messy IMHO because it is being maintaned by several people...
So, I always manually create my containers, but then again, I always have a
config lying around.

> 
> Finally, what about running a 32bit container on a 64bit host?  I've
> not managed to find any indication that this is officially supported
> in docker, but it seems to work just fine.

This is supported.

> 
> > > Docker has some nice attributes, in particular no need for root
> > > access.  However, I don't know a whole lot about it, so I wonder are
> > 
> > Where do you take this from? Rootless containers require a specific
> > host kernel configuration (which -ARCH kernels don't have).
> 
> Well, I'm probably imprecise here.  What I meant was that after the
> service has been started (which requires root) any user in the docker
> group can start images.

Yeah, I kinda dislike these "daemon + privileged group" things -- reminds me of
polkit.

With lxc, you'll need to have a container running and connect to it via SSH or
VNC. For me this is OK because my build container is on a desktop and I usually
access it from a laptop...

HTH,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgpYzW8WQRCSU.pgp
Description: PGP signature


Re: [arch-general] Building in docker?

2014-09-04 Thread Leonid Isaev
On Thu, Sep 04, 2014 at 07:24:36AM +0200, Magnus Therning wrote:
> As always complex doesn't automatically translate to complicated ;)
> 
> In this particular case I had no issues with following the
> instructions I found on docker.  While when spending the same amount
> of time on getting lxc to work I get stuck almost immediately:
> 
> 
> % lxc-create -n test -t archlinux
> lxc_container: No mapping for container root
> lxc_container: Error chowning /home/magnus/.local/share/lxc/test/rootfs to 
> container root
> lxc_container: Error creating backing store type (none) for test
> lxc_container: Error creating container test
> 
> 
> And quick googling didn't turn up anything useful.  Reading through
> the Linux Containers page [1] didn't help either.

No, this will not work because lxc-create needs root privileges for a variety
of things. You'll need to have user_ns enabled in the kernel to accomplish this
as a normal user. Note, that docker is not much better, it's just uses a
privileged daemon to do things.

IIRC, currently running lxc-* as a normal user will work out-of-the-box only on
an Ubuntu 14.04 host.

Cheers,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgp7piC7vz3lA.pgp
Description: PGP signature


Re: [arch-general] pacman-key issue

2014-09-09 Thread Leonid Isaev
On Tue, Sep 09, 2014 at 08:42:38PM +0200, Frank Zimmermann wrote:
> Good evening,
> 
> I'm having trouble with my pacman-keyring which in the end prevents me from
> installing signed packages. Here's the output:
> pacman-key --populate archlinux
> ==> Appending keys from archlinux.gpg...
> ==> Locally signing trusted keys in keyring...
>  -> Locally signing key FOO
> ==> ERROR: FOO could not be locally signed.
> 
> Any hints?

Something is wrong with your local keyring or the secret key. Did you run
"pacman-key --init" and what does "pacman-key -l" show?

Cheers,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgpjhDH7PmyN1.pgp
Description: PGP signature


Re: [arch-general] Location of the pacman database

2014-09-10 Thread Leonid Isaev
On Wed, Sep 10, 2014 at 09:05:03PM +0200, Yamakaky wrote:
> Le 10/09/2014 20:50, Joel Teichroeb a écrit :
> >Generally, things that are written to are not stored in /usr.
> >
> >This page might help
> >
> >https://wiki.archlinux.org/index.php/arch_filesystem_hierarchy
> >
> 
> That's what I thought at first, but it's different. pacman db doesn't
> contain runtime stuff, it's a description of the currently installed
> packages. It's a bit like putting os-release in /usr/lib.

I htink you are right about the local DB (/var/lib/pacman/local). However,
/var/lib/pacman/sync should probably stay in /var (I don't need a rw root FS to
resync package DB). Anyway, I think you should open a feature request at the
bugtracker.

Cheers,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgph4N8WfVFUU.pgp
Description: PGP signature


Re: [arch-general] Location of the pacman database

2014-09-13 Thread Leonid Isaev
On Sat, Sep 13, 2014 at 03:55:26PM +0200, Tobias Hunger wrote:
> On Wed, Sep 10, 2014 at 11:59 PM, Neven Sajko  wrote:
> > But that task is not only about the filesystem location of the Pacman DB.
> > It could be useful to open a separate bugreport just for that one issue.
> 
> For what reason should the pacman DB be moved if not to enable new features
> like the factory reset or image based installation?
> 
> I can file separate bugs for all the items listed in
> https://bugs.archlinux.org/task/41863 ,
> but I personally do not think it makes a lot of sense.

Yeah, that's what the 1st response in the bug report basically said: pacman DB
location is a cosmetic detail.

Also, note that systemd features like factory reset and/or atomic updates make
no sense in the context of a rolling-release distro like Arch (or any
distribution for that matter), so I doubt that they can be a sufficient
motivation for this DB move...

> 
> Best Regards,
> Tobias

Cheers,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgp73KTVckdoP.pgp
Description: PGP signature


Re: [arch-general] Location of the pacman database

2014-09-14 Thread Leonid Isaev
On Sun, Sep 14, 2014 at 11:15:13PM +0200, Nowaker wrote:
> At this point /var/lib/pacman/local defines the current state of /usr.
> It's not "variable" - you write to /var/lib/pacman/local if and only if
> you write to /usr. The description of /usr on wiki perfectly describes
> why /var/lib/pacman/local really belongs there:

So, files in (now) /usr/lib/pacman/local contain filelists of packages, yes? If
you wipe /var, lots of packages will have missing files...

> - move /var/lib/pacman/local/ to /usr
> - move the default pacman.conf and mirrorlist to /usr/share
> - provide tmpfiles.d to copy those files to /etc

What about pacman keyring? Also note that your custom keys should be packaged
as well and resigned on-boot.

> If I'm not mistaken, /usr/share and tmpfiles.d are really trivial and
> wouldn't affect users in any way. That'd be a few additional files
> somewhere in the filesystem without any effect on existing machines. Or
> I'm wrong?

This is madness. I remember sometime ago there was a witchhunt against daemons
that write to /etc (cups is the worst offender). So why is it OK for systemd to
do so? I personally don't want systemd to come anywhere near my /etc. Please
package the tmpfiles.d/sysusers stuff with virtkick or whatever, but not with
pacman.

Cheers,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgpmADioTU9YG.pgp
Description: PGP signature


Re: [arch-general] Location of the pacman database

2014-09-14 Thread Leonid Isaev
On Mon, Sep 15, 2014 at 12:53:40AM +0200, Nowaker wrote:
> Good point. I just did `pacman -Ql |grep -F ' /var'` to see how many
> files there are. 99.7% of them are directories only, though. Are
> tmpfiles.d supposed to create directories in /var too? Docs mention
> using tmpfiles.d to init /tmp or /run, not /var though. But I guess
> stateless systemd would always provide tmpfiles for that.

Yes, those are mostly dirs. And you can't create them through tmpfiles because
it's going to be a mess. But breaking pacman -Qk is relatively harmless, the
bigger question is what to do with all the files in var (e.g. exim mailspools)?
Wiping /var is not an option on a workstation/server and is OK only in special
cases, like kiosk-type systems or Fedora installations (which are broken by
default anyway) :).

AFAIK, this has not been publicly discussed on systemd-devel.

> > What about pacman keyring? Also note that your custom keys should
> > be packaged as well and resigned on-boot.
> 
> I wasn't aware of that. I only refer to what the OP requested and that
> didn't sound complicated at all. Now it does.

Of course, depending on your paranoia (and amount of free time), you can ask
whether keyring should be shared among snapshots and similar questions...

> Please note I'm not a huge fan of systemd. I'd rather Arch hadn't
> married systemd back then. But since it has already happened, many
> parts of Arch make use of systemd (e.g. netctl), there are several
> systemd contributors amongst Arch Linux developers, it'd be good to
> make use of various systemd features. As long as they are not costly
> to implement, of course. And this "factory reset" feature indeed seems
> to be costly.

systemd's factory reset and atomic upgrades were explicitly stated to be useful
only in special situations, like embedded systems. Just because Archlinux
systemd package enables them doesn't mean that the entire distribution should
be change around.

Implementation is easy, support in all usecases is hard. I mean, Archlinux is
not CoreOS...

Cheers,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgpFZosgaJcCg.pgp
Description: PGP signature


Re: [arch-general] Location of the pacman database

2014-09-15 Thread Leonid Isaev
Hi,

On Mon, Sep 15, 2014 at 08:28:22AM +0200, Tobias Hunger wrote:
> On Sep 15, 2014 1:56 AM, "Leonid Isaev"  wrote:
> > systemd's factory reset and atomic upgrades were explicitly stated to be
> useful
> > only in special situations, like embedded systems. Just because Archlinux
> > systemd package enables them doesn't mean that the entire distribution
> should
> > be change around.
> 
> Yes, these are features for special use cases, I am not arguing that.
> 
> I would still like these features to be easy to implement on Arch, provided
> the required changes do not harm the traditional setups.
> 
> > Implementation is easy, support in all usecases is hard. I mean,
> Archlinux is
> > not CoreOS...
> 
> I do not think the changes in my bug report carry a support overhead.

My only point is that moving pacman DB around is the least difficult thing to
deal with when it comes to bringing factory-reset and friends to Archlinux.

I don't object to this move by itself, but the motivation seems ill-defined to
me. Moreover, reshuffling things around will break lots of scripts our there
that expect /var/lib/pacman/local to be populated...

Cheers,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgpFYaVKHO1TF.pgp
Description: PGP signature


Re: [arch-general] Location of the pacman database

2014-09-15 Thread Leonid Isaev
Hi,

On Mon, Sep 15, 2014 at 07:32:51AM +0200, Tobias Hunger wrote:
> As I understand this, systemd expects daemons to deal with no settings in
> /etc and /var.

/var stores files, not settings. Most daemons will run OK with empty /var. But
what do you do with the files? Some kind of rsync gluework?

> I do not consider this a problem. When you use somebodies images you need
> to trust that person. I do not consider trusting the keys that person
> provides to be a problem.

But it is a problem which has already been discussed. If you have N images, and
1 has its key stolen, all N are in danger. So, it's not about (not) trusting
the developer.

> > > This is madness. I remember sometime ago there was a witchhunt
> > > against daemons that write to /etc (cups is the worst offender). So
> > > why is it OK for systemd to do so? I personally don't want systemd
> > > to come anywhere near my /etc. Please package the
> > > tmpfiles.d/sysusers stuff with virtkick or whatever, but not with
> > > pacman.
> 
> Any privileged process can mess with /etc at any time. With factory reset
> at least you get a pristine copy to compare the files in /etc against.

Sure, and then we call it malicious... What do you call pristine? The files
shipped on a livecd? Or an empty default configs shipped with daemons? So far,
there are only things like groups/users, but those are trivialities.

> Arch did embrace systemd, it should make it easy to use all its features. I
> am not proposing to enable them by default.

We already have enabled by default ldconfig.service enabled,
systemd-update-done.service, etc, which messed a number of my containers.

Cheers,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgptY4PyahmIJ.pgp
Description: PGP signature


Re: [arch-general] Location of the pacman database

2014-09-15 Thread Leonid Isaev
Hi Tobias,

Thanks for the explanation. A few questions though -- sorry.

On Mon, Sep 15, 2014 at 09:37:40PM +0200, Tobias Hunger wrote:
> Well, I do not put the secret keyring into the images, so everything
> should be fine.

So, you never run pacman from within an image, or have sig. validation disabled
in pacman.conf?

> Pacman can still validate images, so everything is well.

Do you mean packages in an image?

> Local installs are not possible anyway.

What's a local install?

I mean, if you treat images atomically, why do you need pacman (and associated
DB) at all? You should have it only on the buildhost that generates the images
(I couldn't find details in your previous emails in this thread).

> In the general case 'pristine' is probably the settings shipped by the
> various arch linux packages.

But those do not usually provide sane defaults, e.g. smartd.conf, dnsmasq.conf,
syslog-ng.conf, wpa_supplicant.conf, and must be edited anyway.

Cheers,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgpt54QavFb7k.pgp
Description: PGP signature


Re: [arch-general] A good time to switch to dash as /bin/sh?

2014-09-25 Thread Leonid Isaev
On Fri, Sep 26, 2014 at 05:37:57AM +0800, lolilolicon wrote:
> With the disclosure of the new bash bug (CVE-2014-6271, CVE-2014-7169),
> it seems timely to bring this up.
> 
> Dan added dash to core/base around seven years ago [1], intending the
> eventually link /bin/sh to dash instead of bash.
> 
> [1] 
> https://mailman.archlinux.org/pipermail/arch-dev-public/2007-November/003053.html
> 
> We didn't make the switch, supposedly due to the bashism in our scripts
> which had a #!/bin/sh shebang line?
> 
> Seven years passed.
> 
> Is there anything preventing us from making the switch from bash to dash
> as /bin/sh now? We can then have dash provide sh instead.

Yes -- due to the same reasons. Also, I don't understand what the switch has to
do with the CVEs? If they are found -- good; if promptly fixed -- great. At the
very least this means that people are looking at the code... Has anyone proven
a theorem saying that no such bugs exist in dash (zsh, ksh, etc.)?

Cheers,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgpLFD8F0PBP1.pgp
Description: PGP signature


Re: [arch-general] A good time to switch to dash as /bin/sh?

2014-09-26 Thread Leonid Isaev
Hi,

On Fri, Sep 26, 2014 at 07:30:29AM -0500, Drake Wilson wrote:
> [...]
> On my own desktop system, when I realized sh was bash recently I immediately
> relinked it to dash and intend to keep it that way as long as I reasonably
> can (I assume some things may break, in the current state; I'm willing to
> deal with that on my own for now).

Guys, please stop this witch hunt. If you don't trust bash, then get rid of it,
but don't forget that:
---
$ head -n1 /usr/bin/mkinitcpio 
#!/bin/bash
---

So, yes ArchLinux core tools use and will continue to use 'bashisms' because
they are convenient. The bugs which started this discussion are not a big deal
anyway. They will only affect scripts that don't properly sanitize the input.
Such scripts have bigger problems to worry about IMHO. The SSH-related issue is
also insignificant because the bug will be triggered post-auth...

Cheers,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgpEm_qlnUdLv.pgp
Description: PGP signature


Re: [arch-general] A good time to switch to dash as /bin/sh?

2014-09-26 Thread Leonid Isaev
Hi,

On Fri, Sep 26, 2014 at 03:57:54PM -0500, Doug Newgard wrote:
> Yes, it's this paranoia that I've been trying to cut through in this thread
> to get people to start discussing things rationally.

Just an FYI for people running their own DHCP servers:
http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2014q3/008859.html .

That said, an up-to-date Arch install should be relatively safe.

Cheers,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgpk5dm8JiL_k.pgp
Description: PGP signature


Re: [arch-general] fdisk vs. gdisk for GPT partitioning

2014-12-21 Thread Leonid Isaev
On Tue, Dec 16, 2014 at 08:15:26PM +0100, Bardur Arantsson wrote:
> On 2014-12-16 19:58, Sebastiaan Lokhorst wrote:
> > Hello everyone,
> > 
> > Since more than a year now, fdisk (provided by util-linux) has had GPT
> > support. This theoretically makes gdisk a duplicate of fdisk, and we could
> > replace gdisk with fdisk.
> > 
> > Now, I'm not asking to drop gdisk or anything like that, but in an effort
> > to clean up the Beginners' guide of the Arch Wiki, we want to use a single
> > partitioning tool for both MBR and GPT partitioning instructions.[1]
> > util-linux fdisk is able to provide this functionality, but we are not
> > completely sure if it is stable by now (it should be, I think).
> 
> Speaking from complete ignorance... do significant numbers of people
> still use MBR for non-obsolete platforms/machines?

Yes. The age of a machine has no relevance for deciding whether to use GPT (or
UEFI in general). Whenever I use LVM and/or LUKS, I set it up over the block
device (like /dev/sda), not partitions (like /dev/sda1). So, there is no
partition table at all. In this case, using legacy BIOS saves me from lots of
UEFI-related headache.

And of course, this entire motto of GPT "we support 20TiB drives" is just
silly...

Cheers,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgptzAdvSs8a9.pgp
Description: PGP signature


Re: [arch-general] fdisk vs. gdisk for GPT partitioning

2014-12-21 Thread Leonid Isaev
On Sun, Dec 21, 2014 at 09:49:42PM +0100, Sebastiaan Lokhorst wrote:
> Thanks everyone for your responses! It seems that gdisk is still favorable
> for advanced tasks, but fdisk is can be used for basic tasks, as are
> usually required by beginners.

No, that was my point: for "advanced" tasks you need neither. I never read the
beginners' guide, and don't care how it is formatted. I am just trying to
un-confuse people regarding the whole GPT vs MBR thing...

> 2014-12-21 20:54 GMT+01:00 Leonid Isaev :
> 
> > Yes. The age of a machine has no relevance for deciding whether to use GPT
> > (or
> > UEFI in general).
> >
> 
> This is not true. Some low-end modern machines completely drop legacy BIOS
> boot. So booting via UEFI is required, and thus GPT is required.

I really doubt this. Are you saying that some vendors on purpose break such
things as booting from an external USB key?

For example, I have an ExoPC tablet running Arch 64bit. It is true, that there
is no checkbox in UEFI config saying "legacy BIOS". However, GPT partitioning
is _not_ required at all. So, I nuked the EFI partition, made the entire SSD
a LUKS container, and happily boot with MBR.

Cheers,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgpZ7h3Hq2SiM.pgp
Description: PGP signature


Re: [arch-general] fdisk vs. gdisk for GPT partitioning

2014-12-22 Thread Leonid Isaev
On Mon, Dec 22, 2014 at 07:33:43AM +0100, Thomas Bächler wrote:
> Am 21.12.2014 um 22:48 schrieb Leonid Isaev:
> > On Sun, Dec 21, 2014 at 09:49:42PM +0100, Sebastiaan Lokhorst wrote:
> >> Thanks everyone for your responses! It seems that gdisk is still favorable
> >> for advanced tasks, but fdisk is can be used for basic tasks, as are
> >> usually required by beginners.
> > 
> > No, that was my point: for "advanced" tasks you need neither. I never read 
> > the
> > beginners' guide, and don't care how it is formatted. I am just trying to
> > un-confuse people regarding the whole GPT vs MBR thing...
> 
> If you want to un-confuse people, you can really simplify the
> instructions by using only fdisk in the beginner's guide. Then you have
> the same tool for both GPT and MBR.

I usually go with cfdisk(8) though. But in general, I'd recommend to use
BIOS/MBR whenever possible...

> >> This is not true. Some low-end modern machines completely drop legacy BIOS
> >> boot. So booting via UEFI is required, and thus GPT is required.
> > 
> > I really doubt this. Are you saying that some vendors on purpose break such
> > things as booting from an external USB key?
> 
> I have a firmware that boots from USB fine in UEFI mode, but _only_ if
> it is formatted with MBR - it won't boot from GPT USB disks. Confusing,
> right?

Not really. I can tell that Win 7/8/8.1 installation DVD downloaded from MSDN
are definitely not GPT-formatted.

But, that's what happens on my tablet. Formally the firmware is UEFI, but I
only use MBR partitioning.

Cheers,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgp3ZMccPD7d7.pgp
Description: PGP signature


Re: [arch-general] mutt and gnupg

2014-12-22 Thread Leonid Isaev
On Sun, Dec 07, 2014 at 10:45:45AM +1300, Jason Ryan wrote:
> Yes, but you do need to move to GPGME (or at least that was the only way I
> restored that functionality).

Why? Where is it written?

> 
> Update your gpg configuration in your mutt files:
>   set crypt_use_gpgme = yes

This variable can certainly be set. However, by itself it doesn't do anything
to help mutt discover the running gpg-agent.

> Then in your shell profile file, set a couple of variables:
>   export GPG_TTY=$(tty)
>   export GPG_AGENT_INFO=$HOME/.gnupg/S.gpg-agent

This is also unnecessary. The first variable should anyway be set in the
.bashrc (or similar). The 2nd one is not needed to be exported globally.

The real solution would be for mutt to look for gpg-agent sockets. Currently,
mutt just seems to check GPG_AGENT_INFO in env and ask for a passwd if it is
not set.

It follows that the simplest workaround is to change mutt invocation as
--
$ env | grep GPG
GPG_TTY=/dev/pts/4
$ GPG_AGENT_INFO="" mutt
--

and leave muttrc alone.

Cheers,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgpKt88WpTScU.pgp
Description: PGP signature


Re: [arch-general] mutt and gnupg

2014-12-22 Thread Leonid Isaev
On Tue, Dec 23, 2014 at 10:44:35AM +1300, Jason Ryan wrote:
> So, we only disagree about the content of the variable; ie., it *has* to 
> exist,
> but it doesn't matter what is in it, or even if it is empty…

Yes. However, I don't see why you need to export it globally and I also don't
understand why using the GPGME backend should help.

By looking at mutt src, it seems that GPGME backend (crypt-gpgme.c) uses the
same logic regarding the gpg-agent as the classic PGP backend (pgp.c). Namely,
both invoke !getenv("GPG_AGENT_INFO") to check if a gpg-agent is running.

Cheers,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgpZr10I647wU.pgp
Description: PGP signature


Re: [arch-general] depends vs. optdepends

2014-12-29 Thread Leonid Isaev
Hi,

On Mon, Dec 29, 2014 at 07:20:42PM -0600, Troy Engel wrote:
> On Mon, Dec 29, 2014 at 6:50 PM, Daniel Micay  wrote:
> > Arch currently uses optional dependencies even when it means that
> > executables provided by the package aren't going to work with the
> > minimal set of dependencies. The packages could be split up more to
> > avoid this without pulling in more stuff, but it's not what packagers
> > usually choose to it. It's a design choice left up to the packager, not
> > a bug.
> 
> Thank you - tribal knowledge that wasn't written down as an acceptable
> standard to the Arch packaging. I have added your first sentence to a
> note (and credited you in the comment) so that it's not tribal
> anymore:
> 
>   https://wiki.archlinux.org/index.php/PKGBUILD#optdepends

Just because something is written in a wiki doesn't make it rational

> The reason this is complicated is anyone who comes into Arch from
> (most) other distros where this is considered a bug needs to
> understand Arch doesn't work by the same rules as all the others for
> binary shared library resolution. I disagree with the SOP, but can
> leave my opinion at the door.

Well, other distros following certain packaging guidelines doesn't imply that
Arch should follow them as well. If you subscribe e.g. to fedora-devel you'll
see how much more complicated compared to Arch the packaging process in Fedora
is (and this process is fr from perfect). And I am not even talking about
Debian... There is a tradeoff of complexity vs some "breakage".

So it's not about you agreeing or not with the status quo, it's about
contributing a more rational alternative than the existing PKGBUILD. In your
jasper bugreport, it would have helped if you provided a PKGBUILD with
split-packages, like jasper-base and jasper-jiv with proper "conflicts" and
"provides". At least that's what I would do...

Cheers,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgpnZSbyhvC5q.pgp
Description: PGP signature


Re: [arch-general] makepkg as root

2015-01-03 Thread Leonid Isaev
On Sat, Jan 03, 2015 at 03:45:35PM -0500, Christian Demsar wrote:
> Removing asroot reduces flexibility. For instance, when making packages on a 
> live install usb. You'd have to create a new account and su into it.

Why? Just do what Arch LiveCD has been doing for ages (i.e. having the 'arch'
user).

And regardless of makepkg, using an only-root system (even read-only) is asking
for trouble.

> 
> It seems like a projection of morals to me. Just because it's not good 
> practice to use root permissions when it's not necessary, doesn't mean it 
> won't ever be useful.

makepkg uses fakeroot, there is simply no need to be running as a superuser.

> 
> The argument for choice and freedom of the creators can also be successfully 
> used to justify DRM.

Companies are free to produce whatever crap they want. Unless you are a FSF (or
RMS) fanatic, there is nothing wrong with DRM really.

Cheers,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgpDr7jexoDDt.pgp
Description: PGP signature


Re: [arch-general] rsync patches

2015-01-04 Thread Leonid Isaev
On Sun, Jan 04, 2015 at 03:34:17PM -0500, Ido Rosen wrote:
> Hi,
>   I'd like to add --time-limit / --stop-at added to ArchLinux's rsync
> since it's available in some other distributions.  (This patch is
> distributed from the same source as rsync itself, just in a different
> tarball called rsync-patches, along with a bunch of other patches for
> optional functionality that rsync can support but that isn't built
> into the core rsync by default.)  Below is an updated PKGBUILD for
> rsync that adds time-limit support.  There are several other patches
> in rsync-patches that could be useful, but this is the one that most
> affects me.
> 
> Pierre did not respond to my email back in October, so Pierre, if you
> are monitoring this list, see the attached PKGBUILD, it's a trivial
> addition.  I hope you'll make the change. :-)

The ML isn't a proper place to request features and report bugs. And I couldn't
find any related feature-request in the flyspray...

Cheers,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgp5IRy5nZB_E.pgp
Description: PGP signature


Re: [arch-general] gpg source validation for kernel.org style signatures

2015-01-05 Thread Leonid Isaev
On Mon, Jan 05, 2015 at 10:16:10AM +0100, Christian Hesse wrote:
> I do not think we need HTTPS, though it does not hurt. If anybody tries to
> fool us with man-in-the-middle via HTTP we should detect that just fine with
> broken signatures (given signatures are provided...).
> 
> Appending .sign may help as well. In fact for an example file archive.tar.xz
> we may want to check for {${FILE},${FILE%.(xz|bz2|gz)}}.{asc,sig,sign}
> 
> $ export FILE=archive.tar.xz
> $ echo {${FILE},${FILE%.(xz|bz2|gz)}}.{asc,sig,sign}
> archive.tar.xz.asc
> archive.tar.xz.sig
> archive.tar.xz.sign
> archive.tar.asc
> archive.tar.sig
> archive.tar.sign

Does makepkg(8) know how to check sigs of .tar files as opposed to .tar.xz?

Cheers,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgpOi4jUPre_t.pgp
Description: PGP signature


Re: [arch-general] gpg source validation for kernel.org style signatures

2015-01-05 Thread Leonid Isaev
On Mon, Jan 05, 2015 at 04:09:50AM -0500, Daniel Micay wrote:
> On 04/01/15 04:05 PM, Christian Hesse wrote:
> > Hello everybody,
> > 
> > pacman 4.2.0 gained support for verifying source tarballs with kernel.org
> > style signature. Some (even essential) packages could benefit from that,
> > linux and git come to mind.
> > 
> > How to handle this? Report a bug for every package? Provide a list here?
> 
> I would create a wiki page with the list and then see if you can find a
> developer interested in mass-adding the missing signatures. I'd be
> interested in helping with it for [community], but you'll likely be able
> to do it yourself soon ;).

In the TODO list mentioned in this thread, community/exim is absent, even
though its releases are signed (see e.g. this announcement
https://lists.exim.org/lurker/message/20140811.135006.dc48cddf.en.html ).

Cheers,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgpSHvRrHEXbL.pgp
Description: PGP signature


Re: [arch-general] Standard group for "hardware user"?

2015-01-05 Thread Leonid Isaev
On Mon, Jan 05, 2015 at 07:12:41PM +, Neale Pickett wrote:
> I run mdev instead of systemd-udev and was just alerted to the deprecation
> of all the groups I'd been using. Looking at the filesystem package, it
> seems that most of them are still present, but I presume they'll go away
> eventually.

In general... The groups you are talking about (i.e. optical, etc.) are
arbitrary to begin with, so there is no strict requirement for having them. On
a (current) Arch system your user doesn't need to be in any of these groups, so
you can manually delete them. The reason is, as you said, that logind grants
device access to local users. Of course, this logic won't work if you'd like to
e.g. play audio over ssh (you'll have to be a member of audio).

Regarding the "standard" group list, I'd do the following:
(1) Look at /usr/lib/sysuser.d/*. This is the systemd way (tm) of defining
"standard" groups. The filesystem .install script follows this convention,
AFAIK. So, these groups are unlikely to be deprecated in Arch, unless they are
also deprecated in systemd (which might happen on a whim of course).
(2) Clone Arch SVN repos and grep the .install scripts for udev rules that set
device permissions to the above groups. I don't think there will be many (lvm2
and device-mapper come to mind).

If in (2) no packages come up, then just ignore Arch default groups (in the
filesystem package). You already run a non-standard udev (mdev), so you'll have
to make sure that the device nodes are created with a correct u+g permissions
(via some rules). These rules will define your "standard" group list.
Otherwise, stick with systemd groups.

HTH,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgpAiJowBT0Oj.pgp
Description: PGP signature


Re: [arch-general] Standard group for "hardware user"?

2015-01-05 Thread Leonid Isaev
On Mon, Jan 05, 2015 at 09:59:51PM +, Neale Pickett wrote:
> This is very helpful. Thank you!

If you go with your own group list, check configs of your daemons to see which
groups they expect. Some (e.g. dnsmasq) will call useradd and groupadd in their
.install files. But syslog-ng, for example, by default creates log files 640
root:log...

Also, I just wonder, do you have systemd installed at all?

Cheers,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgpjpGJdxHCVA.pgp
Description: PGP signature


Re: [arch-general] What's the holdup on Linux 3.18?

2015-01-08 Thread Leonid Isaev
On Thu, Jan 08, 2015 at 01:51:36PM +, Mauro Santos wrote:
> On 08-01-2015 00:00, Mark Lee wrote:
> > Salutations,
> > 
> > I was wondering what's the holdup on Linux 3.18. It's been in testing
> > since 12/11/2014.
> 
> 
> I suppose the reason is this:
> https://bugs.archlinux.org/task/43143?string=43143

Strange, is that an issue specific to Intel atom GPUs? I have not seen any
problems on a dual Intel (Ci7 4800) and AMD graphics machine. Anyway, it is
easy enough to just download and install the linux package directly, even if
[testing] is disabled.

BTW, to those updating, one notable (at least from my perspective) change with
3.18.y is the new module br_netfilter responsible for filtering traffic coming
through a bridge. This module is not loaded automatically, so no firewall is
enabled by default in bridges. Here is a dmesg snippet:
---
kernel: [   23.690774] bridge: automatic filtering via arp/ip/ip6tables has
been deprecated. Update your scripts to load br_netfilter if you need this.
---

Cheers,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgp2gGJEZSUlF.pgp
Description: PGP signature


Re: [arch-general] What's the holdup on Linux 3.18?

2015-01-08 Thread Leonid Isaev
On Thu, Jan 08, 2015 at 07:18:25PM +, Mauro Santos wrote:
> On 08-01-2015 18:57, Leonid Isaev wrote:
> > 
> > BTW, to those updating, one notable (at least from my perspective) change 
> > with
> > 3.18.y is the new module br_netfilter responsible for filtering traffic 
> > coming
> > through a bridge. This module is not loaded automatically, so no firewall is
> > enabled by default in bridges. Here is a dmesg snippet:
> > ---
> > kernel: [   23.690774] bridge: automatic filtering via arp/ip/ip6tables has
> > been deprecated. Update your scripts to load br_netfilter if you need this.
> > ---
> 
> I'm not sure I'm reading it right and a quick google search doesn't turn
> up much besides this[1]. Does this apply to filtering via iptables
> (traffic from/to localhost to/from machines on the bridge) or more
> specifically to ebtables (filter traffic between machines on the bridge)?
> 
> [1] http://ebtables.netfilter.org/documentation/bridge-nf.html

The former. It applies to filtering traffic passing through the bridge. If the
module is loaded and /proc/sys/net/bridge/bridge-nf-* == 1 then you should be
able to manipulate traffic _inside_ the bridge using iptables FORWARD chain. If
the module is not loaded, or the above files contain 0, then the bridge acts as
a "dumb" switch. So, you can use the FORWARD chain to forward packets _between_
the bridge and some other interface.

The warning is because with linux < 3.18, bridge-netfilter was enabled by
default, so you'd need a service that nullifies bridge-nf-*. Now, the module is
not loaded by default, so the files are not there, and the existing service
will fail. Basically there is no need to do what is suggested in [1] and [2].
(Note, that the sysctl was never the right approach to begin with, no idea who
put it in thw wiki).

[1] https://wiki.archlinux.org/index.php/QEMU#Creating_bridge_manually
[2] https://bugzilla.redhat.com/show_bug.cgi?id=512206

Cheers,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgpI7fwvliM_d.pgp
Description: PGP signature


Re: [arch-general] syslog-ng + systemd-journald = no logs for syslog-ng

2015-02-15 Thread Leonid Isaev
TL:DR: Syslog-ng in [extra] is kind of broken, so you'll need to a few steps to
get it to work in your environment.

On Sun, Feb 15, 2015 at 10:37:22AM +0100, ephae...@gmx.net wrote:
> ## vanilla /etc/syslog-ng/syslog-ng.conf
> # grep -v '^#' /etc/systemd/journald.conf
> 
> [Journal]
> ForwardToSyslog=no

1. Set this to "yes".

2. Replace the stock syslog-ng.service with this:
--
$ cat /etc/systemd/system/syslog-ng.service
[Unit]
Description=System Logger Daemon
Documentation=man:syslog-ng(8)
Requires=syslog.socket

[Service]
ExecStart=/usr/bin/syslog-ng -F
ExecReload=/usr/bin/kill -HUP $MAINPID
StandardOutput=null

[Install]
WantedBy=multi-user.target
Alias=syslog.service
--

3. Fix the src{} in syslog-ng.conf:
--
source src {
  #system();
  unix-dgram("/run/systemd/journal/syslog");
  internal();
  file("/proc/kmsg");
};
--

4. Reenable syslog-ng.service and restart syslog.

Explanation:
Syslog indeed imports data from journald, but _only_ if journald stores the
logs (I guess that syslog-ng reads logs from the journald file on-disk). If you
don't want journald storage, you'll have to use the "old" way by making systemd
forward logs to syslog. The stock syslog-ng.service file is broken because it
doesn't pull in syslog.socket.

And, no, I haven't filed any bugreports, so go ahead if you feel like it. But I
personally recommend simply repackaging syslog-ng without systemd support...

HTH,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgp4hiN4rQhvj.pgp
Description: PGP signature


Re: [arch-general] debug package repositories again

2015-08-12 Thread Leonid Isaev
On Wed, Aug 12, 2015 at 12:36:22PM -0700, Joe Julian wrote:
> It's been hashed and rehashed, but I need to bring this up again. Every
> other popular distro has a way of debugging without completely rebuilding a
> package, saving countless combined hours.
> 
> Why can't we just have a way of installing the symbols?

Not enough manpower...

> Allan has already added the features necessary to make this possible.
> 
> Why is this so hard? What can I do to help make this a reality?

Well, there has to be a separate [debug] repo which (most importantly) must be
kept in-sync with the main ones, or more packages in current repos. Then,
someone has to actually build those packages.

I would personally prefer that most packages come with debugging enabled by
default. Surely, there will be a performance cost, but speed is not crucial in
most cases.

Cheers,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


Re: [arch-general] debug package repositories again

2015-08-13 Thread Leonid Isaev
On Thu, Aug 13, 2015 at 03:11:58PM +0200, Evan Penner wrote:
> >> I would personally prefer that most packages come with debugging enabled
> >> by
> >> default. Surely, there will be a performance cost, but speed is not
> >> crucial in
> >> most cases.
> >>
> >> Cheers,
> >>
> >
> > There's no performance impact, just disk space and bandwidth.
> >
> 
> Bandwidth is probably the main problem, although anyone who wants to debug
> will probably be fine with that.

I think you guys misunderstood me. The biggest problem IMHO with building debug
versions locally is not compiling itself, but setting up the environment. So, I
meant that packages come with debugging enabled (compiled with gcc -O0 -g and
perhaps ./configure options). This way, there will be not many new packages.

Of course, this is not a good idea for things like FF/Gnome/KDE because of a
slow-down, but a performance penalty for smaller programs like vim, links,
XFCE4 etc. will not be noticeable (at least I don't see any for a self-compiled
xfce4 desktop on a single-core Intel Atom based netbook).

Cheers,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


Re: [arch-general] debug package repositories again

2015-08-13 Thread Leonid Isaev
On Thu, Aug 13, 2015 at 10:09:00AM -0700, Joe Julian wrote:
> >>Bandwidth is probably the main problem, although anyone who wants to debug
> >>will probably be fine with that.
> >I think you guys misunderstood me. The biggest problem IMHO with building 
> >debug
> >versions locally is not compiling itself, but setting up the environment. 
> >So, I
> >meant that packages come with debugging enabled (compiled with gcc -O0 -g and
> >perhaps ./configure options). This way, there will be not many new packages.
> 
> No, the biggest problem with building debug versions locally is that it
> takes hours of developer time multiplied by every bug found. Why are we
> wasting such a limited resource when it's so easy not to? Life is finite.

That's just pure theory. In practice, the compilation itself is a minor
inconvenience, unless you are talking about Gnome/KDE. But debugging those is
hopeless anyway :)

As a developer, you'll spend most time understanding the changes (looking at
the code), not compiling.

> >Of course, this is not a good idea for things like FF/Gnome/KDE because of a
> >slow-down, but a performance penalty for smaller programs like vim, links,
> >XFCE4 etc. will not be noticeable (at least I don't see any for a 
> >self-compiled
> >xfce4 desktop on a single-core Intel Atom based netbook).
> >
> >Cheers,
> 
> What is this slow-down you keep talking about? I'm not asking to do away
> with optimization, just give us a way to get the debug symbols without
> rebuilding. The debug symbols are located in totally different sections from
> the code/data sections. You can check it with objdump:

I was under the impression that with C, -On (n > 0) is not recommended with -g.
Now, I don't know how much -O2 (for example) speeds things up compared to -O1
etc, but probably not much on small applications.

Granted, I think any compiler-level optimization is overrated, and I never
really saw any measurable effect of it. But I use Fortran (not C) for all my
projects.

Cheers,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


Re: [arch-general] Any ETA on the Tex Live 2015 update?

2015-08-24 Thread Leonid Isaev
> I'm also curious about this. It seems like the maintainer hasn't been
> active for the past 5 months.[1]
> What is the normal course of action in such a case? For instance, how could
> I contact the maintainer?

TeXLive is not a critical package, so what's the rush updating it? If you
really want to see an updated version, open a bugreport and attach there a
patched PKGBUILD. And of course, you can always build the latest version
locally (just clone the svn trunk and run makepkg)...

Cheers,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


Re: [arch-general] Any ETA on the Tex Live 2015 update?

2015-08-24 Thread Leonid Isaev
On Mon, Aug 24, 2015 at 12:15:32PM -0500, Doug Newgard wrote:
> On Mon, 24 Aug 2015 17:00:18 +
> Leonid Isaev  wrote:
> 
> > > I'm also curious about this. It seems like the maintainer hasn't been
> > > active for the past 5 months.[1]
> > > What is the normal course of action in such a case? For instance, how 
> > > could
> > > I contact the maintainer?
> > 
> > TeXLive is not a critical package, so what's the rush updating it? If you
> > really want to see an updated version, open a bugreport and attach there a
> > patched PKGBUILD. And of course, you can always build the latest version
> > locally (just clone the svn trunk and run makepkg)...
> > 
> > Cheers,
> 
> Please do not file a bug report because a package is outdated. This is the #1
> rule of the bugtracker.

Sorry, I meant feature request. Of course, opening tickets just to say that a
package X is out-of-date is silly.

But if the project is complex (like texlive-*) then bumping it may not be a
simple issue. So if I happen to go through this exercise before the maintainer,
how am supposed to communicate the working PKGBUILD, in an open fashion? A ML
would be best of course, but arch-general isn't a place for this...

Cheers,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


[arch-general] iptutils 20150815.1b5d03a-2 and ipv4-only system

2015-09-08 Thread Leonid Isaev
Hi,

I noticed that ping in [testing]/iputils does not work on systems with
disabled IPv6 stack. For example (as root):
--
# ping archlinux.org
ping: socket: Operation not permitted (raw socket required by specified 
options).
# cat /proc/cmdline 
BOOT_IMAGE=../vmlinuz-linux ... ipv6.disable=1 ...
# pacman -Qo ping
/usr/bin/ping is owned by iputils 20150815.1b5d03a-2
# getcap /usr/bin/ping 
/usr/bin/ping = cap_net_raw+ep
--
I tried playing with cmdline options, without any success. ping from
[core]/iputils 20140519.fad11dc-1 does work. Is this a bug or a feature, and
does anyone know how to make ping work again?

Thanks,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


Re: [arch-general] iptutils 20150815.1b5d03a-2 and ipv4-only system

2015-09-09 Thread Leonid Isaev
[replying to both emails]

On Wed, Sep 09, 2015 at 12:11:29PM +0200, Joakim Hernberg wrote:
> On Tue, 8 Sep 2015 14:14:31 -0600
> Leonid Isaev  wrote:
> 
> > I tried playing with cmdline options, without any success. ping from
> > [core]/iputils 20140519.fad11dc-1 does work. Is this a bug or a
> > feature, and does anyone know how to make ping work again?
> 
> You could create an ip6table firewall that just drops most
> things and leave ipv6 enabled in the kernel.

All networks on which I have Arch machines are IPv4-only. So I don't need
IPv6...

> 
> -- 
> 
>Joakim

On Wed, Sep 09, 2015 at 01:49:34PM +0200, Jens Adam wrote:
> Tue, 8 Sep 2015 14:14:31 -0600
> Leonid Isaev :
> 
> > Is this a bug or a feature, and does anyone know how to make ping work
> > again?
> 
> Have you tried 'ping -4'?
> Yes, it's undocumented.

Yep :(
--
# ping -4 google.com
ping: socket: Operation not permitted (raw socket required by specified 
options).
# ping -N ipv4 google.com
ping: socket: Operation not permitted (raw socket required by specified 
options).
--

Thanks,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


Re: [arch-general] iptutils 20150815.1b5d03a-2 and ipv4-only system

2015-09-09 Thread Leonid Isaev
On Wed, Sep 09, 2015 at 08:04:37PM +0200, Joakim Hernberg wrote:
> afaik
> disabling ipv6 with a kernel boot flag is not recommended and one can
> expect breakage...

Why? Where is it written?

Sure, I don't expect ipv6-specific software to work on my system but the ipv4
stack is fully functional.

Thanks,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


Re: [arch-general] Thunar sftp connection not working - access denied

2015-10-09 Thread Leonid Isaev
On Sat, Oct 10, 2015 at 02:05:38AM +0200, Friedrich Strohmaier wrote:
> Hi Folks,
> 
> since some time I cannot get thunar connect my remote servers folders via 
> sftp.
> 
> Error dialog:
> Failed to open "/my/remote/path on my.server"
> access denied
> 
> ssh access works as expected.
> 
> I feel like it stopped working after I got this arch announce:
> https://www.archlinux.org/news/d-bus-now-launches-user-buses/

So, does sftp work from the command line?

Cheers,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


Re: [arch-general] [arch-announce] Xorg 1.18.0 enters [testing]

2015-11-13 Thread Leonid Isaev
On Fri, Nov 13, 2015 at 01:01:09PM -, Arch Linux: Recent news updates: 
Laurent Carlier wrote:
> Xorg 1.18.0 is entering [testing] with the following changes:
> 
>   * You can now choose between `xf86-input-evdev` and `xf86-input-libinput`.
> 
>   * `xf86-input-aiptek` will not be updated and will be removed when 
> xorg-1.18.0
> is moved to [extra]
> 
> Caveat:
> 
> NVIDIA drivers are not yet compatible with 1.18.0. You can block the upgrade 
> by
> appending --ignoregroup=xorg to the pacman command or adding 'xorg' to
> IgnoreGroup in pacman.conf
> 
> URL: https://www.archlinux.org/news/xorg-1180-enters-testing/

Hmm, on my machine Xorg now runs as root, and I had to create
/etc/X11/Xwrapper.config to enfoce the old behavior of dropping suid privs...
Has anyone else noticed this?

Thanks,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


Re: [arch-general] Policy about packages and file capabilities

2015-11-16 Thread Leonid Isaev
On Mon, Nov 16, 2015 at 07:51:30PM +0100, Damjan Georgievski wrote:
> What's the policy about capabilities for executables in Arch packages?

I _guess_ that capabilities are used to avoid SUID binaries when this is
secure.

> I'm asking since in my setup I'm running wpa_supplicant as the
> 'nobody' user, but I let it keep the NET_ADMIN and NET_RAW
> capabilities (excerpt from the .service file):

Read the caveat here: https://w1.fi/cgit/hostap/plain/wpa_supplicant/README .
Basically, you'll need a special user/group for executing
/usr/bin/wpa_supplicant.

In general, why is this necessary? What kind of attack (besides DoS) is
possible against wpa_supplicant?

Cheers,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


Re: [arch-general] Policy about packages and file capabilities

2015-11-16 Thread Leonid Isaev
On Mon, Nov 16, 2015 at 09:00:28PM +0100, Damjan Georgievski wrote:
> >> What's the policy about capabilities for executables in Arch packages?
> >
> > I _guess_ that capabilities are used to avoid SUID binaries when this is
> > secure.
> 
> well, also, unless you set capabilities on the executable a process
> can't have capabilities when a non-root process execs the executable

Sure, that's what is done with the ping(8) binary.

> >> I'm asking since in my setup I'm running wpa_supplicant as the
> >> 'nobody' user, but I let it keep the NET_ADMIN and NET_RAW
> >> capabilities (excerpt from the .service file):
> >
> > Read the caveat here: https://w1.fi/cgit/hostap/plain/wpa_supplicant/README 
> > .
> > Basically, you'll need a special user/group for executing
> > /usr/bin/wpa_supplicant.
> 
> right, I  think that too would need to be done in a proper package.
> I'd rather make it 750, and root/wpa_supplicant

Which means that the filesystem package should get modified?

> 
> > In general, why is this necessary? What kind of attack (besides DoS) is
> > possible against wpa_supplicant?
> 
> there have been buffer overflows etc. in wpa supplicant, not good for
> a root process.
> https://www.google.com/search?q=wpa_supplicant+CVE&ie=utf-8&oe=utf-8

But those CVEs are mostly denial of service... right?

-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


Re: [arch-general] ssd trim using fstrim.service and fstrim.timer

2015-12-27 Thread Leonid Isaev
On Sun, Dec 27, 2015 at 09:45:27PM -0500, Francis Gerund wrote:
> Per the Arch wiki SSD page, I just enabled sysctl fstrim.timer, and then
> rebooted.  I did not "enable" fstab.service.  Now fstrim.timer is loaded,
> and active (but "waiting") and fstrim.service is loaded, but inactive.  And
> the time stamp file the wiki mentions has a "0" size.

In /var/lib/systemd/timers? They all have zero size, it's their timestamp what
matters.

> So, do I have to wait (A WEEK!) to see if it works, or can I somehow now
> run fstrim.service manually to at least get it done once?

fstrim.service most likely ran on-boot, silently, so you haven't noticed. If
you use systemd-journal, check it, otherwise just start fstrim.service w/o
enabling it (or run its ExecStart cmdline).

> Note: I could just add "discard" to /etc/fstab, but wouldn't that wear out
> the SSD faster than periodic trimming?

I don't know precise numbers, but IME none of those made a difference
performace-wise. I'd say if SSD wear is a problem (i.e. if you estimate it
within expected usage time of the device), just switch to a HDD.

HTH,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


Re: [arch-general] [OT?] Which is most future-proof desktop environment?

2015-12-30 Thread Leonid Isaev
On Wed, Dec 30, 2015 at 11:57:48AM +0100, Ralf Mardorf wrote:
> Xfce4
> 
> After an update e.g. a small window title bar with a clean design,
> became a fat thing with a Microsoft appeal.

Wrong. It's not xfwm4, but the default gtk3 theme. Just use a gtk2 xfwm4 theme
and be happy :) Or better yet, recompile libxfce4ui w/o gtk3 support.

> The long and the short of it, if you want to decide how your
> environment should work, what you need and what not, then better do not
> use ad DE such as GNOME, KDE, Xfce4 or similar, instead use a WM
> such as openbox, jwm or similar.

A DE is a vague concept because it includes many non-essential (IMHO) "apps"
like browser, file manager etc. For instance, is GNOME epiphany in any way
superior to FF or Chromium (besides "better integration")? Or how does a
DE-specific calculator better than bc(1)?

For apples-to-apples comparison, I'd only focus on WMs because this is a
component you interact with the most. Bigger DEs have failry sophisticated
compositing WMs (xfwm4, kwin, whatever metacity is called these days) with hw
acceleration etc. Compositing does not imply eyecandy, it's just a better use
of system resources (for instance by exploiting GPU).

On the contrary, things like {open,flux}box and tiling WMs (i3, jwm) still use
a design from '90s. And from olden days of Win98 we remember what it leads to.

Cheers,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


Re: [arch-general] Firefox without signature checking

2016-01-02 Thread Leonid Isaev
On Sat, Jan 02, 2016 at 02:06:05PM -0800, Kyle Terrien wrote:
> Thank you!  I was tempted to reopen it, but it looks like the general
> consensus is that an AUR package will be submitted.

You can only request to reopen...

> It looks like sticking to upstream trumps user-centric in this case.
> (Although I guess building from AUR is a fair substitute for
> user-centric.)

Yes, that's what the SVN repo is for: if you don't like the official release (=
the one in binary repos), just clone && rebuild the thing yourself. As a bonus,
you can get rid of unnecessary deps.

> It's a real bummer that a bunch of users (myself included) will be
> forced to compile Firefox on each release.  I really hope we can
> eventually get an abrowser or firefox-nobranding (or maybe even
> palemoon) into the repos.

Compiling FF doesn't take long if you disable PGO in PKGBUILD.

> How can we nominate a package into community or extra?

The package will have to get enough votes in the AUR and someone should want to
maintain it in the repo.

> (And if you are fed-up with Mozilla's walled-garden policy like I am, I
> suggest trying out Pale Moon [0].)

... which you need to build yourself anyway.

Cheers,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


Re: [arch-general] Firefox without signature checking

2016-01-02 Thread Leonid Isaev
On Sat, Jan 02, 2016 at 11:25:12PM +0100, Niels Kobschaetzki wrote:
> What about an AUR-package with a pre-compiled binary? Sure I have to
> trust the maintainer.

No, this is a recipe for spreading malware. Also, have you seen the size of
said binary?

> But I also have to with a source-package since I
> won't check the sources with each release ;)

Which is plain stupid.

Best,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


Re: [arch-general] Firefox without signature checking

2016-01-02 Thread Leonid Isaev
On Sat, Jan 02, 2016 at 04:50:06PM -0600, Doug Newgard wrote:
> On Sat, 2 Jan 2016 15:35:01 -0700
> Leonid Isaev  wrote:
> 
> > On Sat, Jan 02, 2016 at 02:06:05PM -0800, Kyle Terrien wrote:
> > > Thank you!  I was tempted to reopen it, but it looks like the general
> > > consensus is that an AUR package will be submitted.  
> > 
> > You can only request to reopen...
> 
> And that request would be denied unless you can bring new info to the table.
> So far, I haven't seen any.

Me? I fully support closing that bugreport. And moreover, I am not affected by
the discussed issue, as I run FF beta...

Cheers,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


Re: [arch-general] Firefox without signature checking

2016-01-02 Thread Leonid Isaev
On Sun, Jan 03, 2016 at 12:18:36AM +0100, Magnus Therning wrote:
> How is that stupid?  Do you check the sources with each release?  *How*
> do you perform those checks?

OK, fact #0 - I only use software whose upstream I trust.

Having said that, I usually pull md5sums and sha*sums in the PKGBUILD, all from
different sources (upstream, Debian, Gentoo, etc.), if the src is not
upstream-signed. FF releases _are_ signed (I don't know why the PKGBUILD in
[extra] doesn't check that), so just have the Mozilla signing key (currently
0x61B7B526D98F0353) in your keychain.

If you trust random people in the AUR and never inspect their PKGUILDs, or even
worse, use their binaries, you deserve to be rooted.

Best,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


Re: [arch-general] Firefox without signature checking

2016-01-02 Thread Leonid Isaev
On Sat, Jan 02, 2016 at 05:34:51PM -0600, Doug Newgard wrote:
> Just expanding on your point.

Ah, OK, sorry :)

Also, perhaps one should note that "walled garden" discussions (albeit
justified) belong at Mozilla's bug tracker, not Arch's.

Cheers,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


Re: [arch-general] Firefox without signature checking

2016-01-02 Thread Leonid Isaev
On Sat, Jan 02, 2016 at 03:26:59PM -0800, Kyle Terrien wrote:
> On the other hand, I fully understand why we would want to follow
> upstream--less work for packaging and testing, as well as official
> sanctioning via branding.

It's neither. Mozilla advertises certain level of default security. If Arch is
to reduce that, I think the package will need to be renamed, just not to
mislead unsuspecting users. The expressed concerns have nothing to do with the
branding or maintenance.

Also, if you have specific concerns about the signing procedure, deal with
people @Mozilla. (I don't really care because I don't use any addons.)

Best,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


  1   2   3   4   5   >