[CentOS] Script to monitor websites and generate RSS feed when they change

2020-02-24 Thread H
Looking for the above. I have found sites where you can register the sites you 
are interested in - as well as yourself - but I would rather run something 
myself on my server to monitor websites etc which do not have RSS-feeds.

Does anyone use something like this?

___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] OwnCloud vs NextCloud

2020-02-24 Thread H
On 02/22/2020 10:26 PM, Valeri Galtsev wrote:
>
>> On Feb 22, 2020, at 9:16 PM, H  wrote:
>>
>> On February 22, 2020 9:02:05 PM EST, "bryn1u85 ."  wrote:
>>> The Nextcloud has more features and all are for free. The ownCloud has
>>> some
>>> for enterprise features which are paid. Soo i think the choice is
>>> clear.
>>>
>>> niedz., 23 lut 2020 o 02:35 H  napisał(a):
>>>
 I am planning to install either ownCloud or NextCloud on a CentOS 7
>>> VPS
 server I control. I have previously used ownCloud on another server
>>> but
 have not updated the host application for quite some time. On this
>>> new
 server, I am not sure which one is the "best" and since I am doing a
>>> new
 install I need to decide which one to use.

 Looking at the Android apps for these cloud solutions, they both seem
>>> to
 have a fair number of critical reviews...

 Does anyone have a preference and, if so, why?

 ___
 CentOS mailing list
 CentOS@centos.org
 https://lists.centos.org/mailman/listinfo/centos

>>> ___
>>> CentOS mailing list
>>> CentOS@centos.org
>>> https://lists.centos.org/mailman/listinfo/centos
>> Ok. It seems, however, EPEL has version 10 of NextCloud whereas it is up to 
>> version 17?
> I believe, latest should be version 18. FreeBSD has package version 18.0.1
>
> Valeri
>> ___
>> CentOS mailing list
>> CentOS@centos.org
>> https://lists.centos.org/mailman/listinfo/centos
> 
> Valeri Galtsev
> Sr System Administrator
> Department of Astronomy and Astrophysics
> Kavli Institute for Cosmological Physics
> University of Chicago
> Phone: 773-702-4247
> 
>
> ___
> CentOS mailing list
> CentOS@centos.org
> https://lists.centos.org/mailman/listinfo/centos

I am surprised EPEL is so far behind, I would have thought there would be 
enough demand from RH and CentOS users for this type of product it would be 
kept up-to-date...

___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Encrypted container on CentOS VPS

2020-02-24 Thread H
On 02/24/2020 05:01 PM, Michael Hennebry wrote:
> What is the use-case here?
> Are you concerned that the host may change the data or just read it?
> Would re-creating the file anew for each use be practical?
> What about using the file in an encrypted form?
> I'm thinking of the case of records on people.
> Separate "cyphers" for first names, last names and other names
> would go a long way toward hiding whatever needs to be hidden.
>
> Keeping the host from reading the data might not be a solvable problem.
> Keeping the host from quietly changing the data might be expensive.
> If all else fails you might keep copies of the
> data on separate hosts and compare their md5sums.
> I expect that doing it on your own host has already been deemed a failure.
>
General prudence as to someone accessing my files.

___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Encrypted container on CentOS VPS

2020-02-24 Thread H
On 02/24/2020 05:02 PM, Valeri Galtsev wrote:
>
>
> On 2020-02-24 15:57, H wrote:
>> On 02/24/2020 12:42 PM, Roberto Ragusa wrote:
>>> On 2020-02-24 14:37, lejeczek via CentOS wrote:


 On 24/02/2020 10:26, Roberto Ragusa wrote:
> On 2020-02-24 10:51, lejeczek via CentOS wrote:
>> g) remember!! still at least (depending how you mount it)
>> the 'root' will have access to that data while mounted,
>> obviously!
>
> More than that: the root user will be able to access data
> in the future too, since it can steal the key
> while the data is mounted.
>
> Regards.
>
 With a passphare only?
>>>
>>> Attackers don't need the passphrase, they can use the
>>> real key used for encryption (dmsetup table).
>>>
>>> Regards.
>>>
>> So the final word seems to be that even if I create this LUKS-encrypted 
>> loop-back file and only mount it when needed, immediately un-mount when no 
>> longer needed, a root user can access this encrypted file system while it is 
>> mounted, and perhaps more importantly, even when it is not mounted since 
>> they can get the key as described above?
>>
>> My reputable VPS hosting provider in Europe of course outsources some of the 
>> support to other countries. While I have no immediate suspicion that they 
>> access files on my VPS, I also have no way of finding out, nor of protecting 
>> myself - apart from not putting "sensitive" files on the VPS or encrypting 
>> files before uploading them.
>>
>> If I upgrade to a dedicated server I expect that I will be the root user but 
>> will the hosting company still have access to my server?
>>
>
> Whoever has physical access to the machine can have everything. In the past I 
> was phrasing it "nothing can stop the guy with the screwdriver". Do not take 
> the screwdriver literally, of course.
>
> Valeri
>
Well, the scenario with a screw driver I can live with but not other types of 
access...

___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Encrypted container on CentOS VPS

2020-02-24 Thread Valeri Galtsev




On 2020-02-24 15:57, H wrote:

On 02/24/2020 12:42 PM, Roberto Ragusa wrote:

On 2020-02-24 14:37, lejeczek via CentOS wrote:



On 24/02/2020 10:26, Roberto Ragusa wrote:

On 2020-02-24 10:51, lejeczek via CentOS wrote:

g) remember!! still at least (depending how you mount it)
the 'root' will have access to that data while mounted,
obviously!


More than that: the root user will be able to access data
in the future too, since it can steal the key
while the data is mounted.

Regards.


With a passphare only?


Attackers don't need the passphrase, they can use the
real key used for encryption (dmsetup table).

Regards.


So the final word seems to be that even if I create this LUKS-encrypted 
loop-back file and only mount it when needed, immediately un-mount when no 
longer needed, a root user can access this encrypted file system while it is 
mounted, and perhaps more importantly, even when it is not mounted since they 
can get the key as described above?

My reputable VPS hosting provider in Europe of course outsources some of the support to 
other countries. While I have no immediate suspicion that they access files on my VPS, I 
also have no way of finding out, nor of protecting myself - apart from not putting 
"sensitive" files on the VPS or encrypting files before uploading them.

If I upgrade to a dedicated server I expect that I will be the root user but 
will the hosting company still have access to my server?



Whoever has physical access to the machine can have everything. In the 
past I was phrasing it "nothing can stop the guy with the screwdriver". 
Do not take the screwdriver literally, of course.


Valeri

--

Valeri Galtsev
Sr System Administrator
Department of Astronomy and Astrophysics
Kavli Institute for Cosmological Physics
University of Chicago
Phone: 773-702-4247

___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Encrypted container on CentOS VPS

2020-02-24 Thread Michael Hennebry

What is the use-case here?
Are you concerned that the host may change the data or just read it?
Would re-creating the file anew for each use be practical?
What about using the file in an encrypted form?
I'm thinking of the case of records on people.
Separate "cyphers" for first names, last names and other names
would go a long way toward hiding whatever needs to be hidden.

Keeping the host from reading the data might not be a solvable problem.
Keeping the host from quietly changing the data might be expensive.
If all else fails you might keep copies of the
data on separate hosts and compare their md5sums.
I expect that doing it on your own host has already been deemed a failure.

--
Michael   henne...@web.cs.ndsu.nodak.edu
"Sorry but your password must contain an uppercase letter, a number,
a haiku, a gang sign, a heiroglyph, and the blood of a virgin."
 --  someeecards
___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] OwnCloud vs NextCloud

2020-02-24 Thread H
On 02/24/2020 04:16 AM, LAHAYE Olivier wrote:
> Hi,
>
>
> I've built my owncloud 17 rpm for centos-7, but I didn't published it because 
> it cannot upgrade the v10.
> To Upgrade I did:
> Build by hand all intermediate versions and installed them in /usr (ugly I 
> know), overwriting the v10 rpm files and did all upgrade processes until v16.
> Then. I did rpm -Uvh the v17 and ran the upgrade process.
> This was the only quick and dirty way to upgrade to recent version while 
> keeping things in rpm database.
>
> Nextcloud has a ticket to enable the ability to upgrade from multiple major 
> versions. Once this is available I'm sure that we'll see an up to date 
> version of nextcloud in EPEL.
>
> For now, you need to hack.
>
> My work was based on this:
> https://copr.fedorainfracloud.org/coprs/scren/nextcloud/builds/
>
> My source RPM: 
> http://olivier.lahaye1.free.fr/SRPMS/nextcloud-17.0.2-1.el7.src.rpm
> You can build it using rpmbuild --rebuild nextcloud-17.0.2-1.el7.src.rpm
> Keep in mind that you have to upgrade manually in /usr all previous major 
> version up to v16 and do all the database update before upgrading to the 
> generated rpms. (use the highest release for each major release)
>
> OF course, if it's a new install, it should work out of the box.
>
> I didn't build the v18 as it was v18.0.0.0.0 by the time I worked on it and I 
> wanted a somehow stable version.
>
> My 2 cents.
>
> Olivier.
>
> Le 23/02/2020 04:17, « CentOS au nom de H »  nom de age...@meddatainc.com> a écrit :
>
> On February 22, 2020 9:02:05 PM EST, "bryn1u85 ."  
> wrote:
> >The Nextcloud has more features and all are for free. The ownCloud has
> >some
> >for enterprise features which are paid. Soo i think the choice is
> >clear.
> >
> >niedz., 23 lut 2020 o 02:35 H  napisał(a):
> >
> >> I am planning to install either ownCloud or NextCloud on a CentOS 7
> >VPS
> >> server I control. I have previously used ownCloud on another server
> >but
> >> have not updated the host application for quite some time. On this
> >new
> >> server, I am not sure which one is the "best" and since I am doing a
> >new
> >> install I need to decide which one to use.
> >>
> >> Looking at the Android apps for these cloud solutions, they both seem
> >to
> >> have a fair number of critical reviews...
> >>
> >> Does anyone have a preference and, if so, why?
> >>
> >> ___
> >> CentOS mailing list
> >> CentOS@centos.org
> >> https://lists.centos.org/mailman/listinfo/centos
> >>
> >___
> >CentOS mailing list
> >CentOS@centos.org
> >https://lists.centos.org/mailman/listinfo/centos
> 
> Ok. It seems, however, EPEL has version 10 of NextCloud whereas it is up 
> to version 17?
> ___
> CentOS mailing list
> CentOS@centos.org
> https://lists.centos.org/mailman/listinfo/centos
> 
>
> ___
> CentOS mailing list
> CentOS@centos.org
> https://lists.centos.org/mailman/listinfo/centos

Thank you, will save these instructions.

___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Encrypted container on CentOS VPS

2020-02-24 Thread H
On 02/24/2020 12:42 PM, Roberto Ragusa wrote:
> On 2020-02-24 14:37, lejeczek via CentOS wrote:
>>
>>
>> On 24/02/2020 10:26, Roberto Ragusa wrote:
>>> On 2020-02-24 10:51, lejeczek via CentOS wrote:
 g) remember!! still at least (depending how you mount it)
 the 'root' will have access to that data while mounted,
 obviously!
>>>
>>> More than that: the root user will be able to access data
>>> in the future too, since it can steal the key
>>> while the data is mounted.
>>>
>>> Regards.
>>>
>> With a passphare only?
>
> Attackers don't need the passphrase, they can use the
> real key used for encryption (dmsetup table).
>
> Regards.
>
So the final word seems to be that even if I create this LUKS-encrypted 
loop-back file and only mount it when needed, immediately un-mount when no 
longer needed, a root user can access this encrypted file system while it is 
mounted, and perhaps more importantly, even when it is not mounted since they 
can get the key as described above?

My reputable VPS hosting provider in Europe of course outsources some of the 
support to other countries. While I have no immediate suspicion that they 
access files on my VPS, I also have no way of finding out, nor of protecting 
myself - apart from not putting "sensitive" files on the VPS or encrypting 
files before uploading them.

If I upgrade to a dedicated server I expect that I will be the root user but 
will the hosting company still have access to my server?

___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Encrypted container on CentOS VPS

2020-02-24 Thread Roberto Ragusa

On 2020-02-24 14:37, lejeczek via CentOS wrote:



On 24/02/2020 10:26, Roberto Ragusa wrote:

On 2020-02-24 10:51, lejeczek via CentOS wrote:

g) remember!! still at least (depending how you mount it)
the 'root' will have access to that data while mounted,
obviously!


More than that: the root user will be able to access data
in the future too, since it can steal the key
while the data is mounted.

Regards.


With a passphare only?


Attackers don't need the passphrase, they can use the
real key used for encryption (dmsetup table).

Regards.

--
   Roberto Ragusamail at robertoragusa.it
___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] [External] Re: Installing a single rpm package from desktop/browser on CentOS 7

2020-02-24 Thread Pete Biggs


> In many case, but in the situations I'm talking about here is really a 
> lot more cumbersome to use. To use the command line to install a a 
> package from a website, I have to
> 
>  1. Right-click
>  2. Select Save Link As
>  3. Enter filename/directory
>  4. Open a terminal
>  5. Remember where I put the bloody file
>  6. Run yum to actually install it.

yum (and rpm) can install from the web

1. Right-click
2. Copy link location
3. yum install 

> 
> Compare that to
> 
>  1. Click on the link
>  2. Hey, there's no step 2.
> 
> The 2nd variant is something that's was working for about 15 years, but 
> I guess that was before someone decided to make the system "user 
> friendly"...
> 

Without getting emotional about it you need to think what happens when
you click on a link in a web browser, i.e. how does the browser know to
install this link you've just clicked on and what does it have to do in
order to install it. Personally, I think having RPMs installable with a
single click is a bad idea - they are as dangerous as .exe on Windows
systems. Having said that, on my Fedora system clicking on an RPM
downloads it (with a warnning), then double clicking on the downloaded
RPM in the browser launches "Gnome Software" to install it: no
terminals involved and you never have to take your hand off the mouse.

Things may be different if you aren't using Gnome or it may be
different for another browser. 

P.


___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Encrypted container on CentOS VPS

2020-02-24 Thread Valeri Galtsev


> On Feb 24, 2020, at 3:41 AM, Pete Biggs  wrote:
> 
> 
>> 
>> What is a "loop way"? I googled it together with Linux and file and
>> did not find anything.
> 
> The proper term is "loopback filesystem".
> 

This HOWTO I used some 15+ years ago:

http://www.tldp.org/HOWTO/archived/Loopback-Encrypted-Filesystem-HOWTO/Loopback-Encrypted-Filesystem-HOWTO-3.html

Search (not “google”, duckduckgo for me ;-) for "encrypted loopback filesystem 
howto”...

Valeri

>> Is this simply like a separate file that is LUKS-encrypted and I
>> would then mount it for remote access?
> 
> Yes, it's a filesystem in a file that you mount with '-o loop'.
> 
>> If so, what would prevent the hosting company - which I presume is
>> the root user - from also accessing it?
> 
> You provide the decryption password when you mount it.  Once the
> filesystem is mounted anyone with the appropriate permissions can read
> it.  You can reduce the opportunity of someone accessing it by only
> mounting it when you need it and unmounting it as soon as possible.
> 
> TBH, if you don't trust the root user of a system, then there's not
> much you can do - there are just so many ways a privileged user can get
> access to things, both "legitimately" because of their absolute access
> or "covertly" using trojans and so on that you would never know about.
> If you have legitimate concerns about the hosting company, then find a
> different one. 
> 
> P.
> 
> 
> ___
> CentOS mailing list
> CentOS@centos.org
> https://lists.centos.org/mailman/listinfo/centos


Valeri Galtsev
Sr System Administrator
Department of Astronomy and Astrophysics
Kavli Institute for Cosmological Physics
University of Chicago
Phone: 773-702-4247


___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] [External] Re: Installing a single rpm package from desktop/browser on CentOS 7

2020-02-24 Thread Toralf Lund

On 22/02/2020 03:55, Seth Goldin wrote:

Unfortunately, the GUI isn't quite set up to tell you what the error would
be.


Seriously? I'd say that if it's not set up that way it has no business 
being included in a stable release of anything, let alone an "enterprise 
operating system"...



  When you use `$ sudo yum install whatever.rpm`, the output in the shell
will often give you a clue as to what's going wrong--a missing dependency,
etc.


Actually, I'm talking about cases where there isn't or shouldn't be 
anything going wrong at all. The rpms install just fine from the command 
line.


- Toralf




-- Seth.

On Fri, Feb 21, 2020 at 9:51 AM Yves Bellefeuille  wrote:


Toralf Lund  wrote:


And, yeah, I know about rpm command line and yum and all, but shouldn't
there be a "more user-friendly" way?

The command line is your friend.

Have a look at yumex. I think you'll prefer the command line, though.

--
Yves Bellefeuille



___
CentOS mailing list
CentOS@centos.org
https://urldefense.proofpoint.com/v2/url?u=https-3A__lists.centos.org_mailman_listinfo_centos&d=DwICAg&c=KV_I7O14pmwRcmAVyJ1eg4Jwb8Y2JAxuL5YgMGHpjcQ&r=Q0oqxzgUp3xCCIiJDwS-RbNDndQ-KZDhj8wwveNoqU4&m=y0kNS-9PIKCKkOWvHpFeuPGfVHwKd-s1ejehH9aAZvw&s=V2zqZUG8dvjWL38DfNvx6vb2HGsmjzQtPrwDlLL50lU&e=


___
CentOS mailing list
CentOS@centos.org
https://urldefense.proofpoint.com/v2/url?u=https-3A__lists.centos.org_mailman_listinfo_centos&d=DwICAg&c=KV_I7O14pmwRcmAVyJ1eg4Jwb8Y2JAxuL5YgMGHpjcQ&r=Q0oqxzgUp3xCCIiJDwS-RbNDndQ-KZDhj8wwveNoqU4&m=y0kNS-9PIKCKkOWvHpFeuPGfVHwKd-s1ejehH9aAZvw&s=V2zqZUG8dvjWL38DfNvx6vb2HGsmjzQtPrwDlLL50lU&e=



___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] [External] Re: Installing a single rpm package from desktop/browser on CentOS 7

2020-02-24 Thread Toralf Lund

On 21/02/2020 15:51, Yves Bellefeuille wrote:

Toralf Lund  wrote:


And, yeah, I know about rpm command line and yum and all, but shouldn't
there be a "more user-friendly" way?

The command line is your friend.


In many case, but in the situations I'm talking about here is really a 
lot more cumbersome to use. To use the command line to install a a 
package from a website, I have to


1. Right-click
2. Select Save Link As
3. Enter filename/directory
4. Open a terminal
5. Remember where I put the bloody file
6. Run yum to actually install it.

Compare that to

1. Click on the link
2. Hey, there's no step 2.

The 2nd variant is something that's was working for about 15 years, but 
I guess that was before someone decided to make the system "user 
friendly"...


- Toralf




Have a look at yumex. I think you'll prefer the command line, though.



___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Encrypted container on CentOS VPS

2020-02-24 Thread lejeczek via CentOS



On 24/02/2020 10:26, Roberto Ragusa wrote:
> On 2020-02-24 10:51, lejeczek via CentOS wrote:
>> g) remember!! still at least (depending how you mount it)
>> the 'root' will have access to that data while mounted,
>> obviously!
>
> More than that: the root user will be able to access data
> in the future too, since it can steal the key
> while the data is mounted.
>
> Regards.
>
With a passphare only?

___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


[CentOS] Problems with reposync and createrepo on CentOS 7 for RHEL8/CentOS8 repo?

2020-02-24 Thread rainer

Hi,

I'm trying to mirror the PostgreSQL12 RHEL8 repo:

https://download.postgresql.org/pub/repos/yum/12/redhat/rhel-8-x86_64/


[root@cobbler yum.repos.d]# cat pgdg-12-centos8.repo

# PGDG Red Hat Enterprise Linux / CentOS stable repositories:

[pgdg12-rhel8]
name=PostgreSQL 12 for RHEL/CentOS $releasever - $basearch
baseurl=https://download.postgresql.org/pub/repos/yum/12/redhat/rhel-8-x86_64
enabled=1
gpgcheck=1
gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-PGDG

# Source RPMs (SRPM), and their testing repositories:


Then I run:

reposync --repoid=pgdg12-rhel8 --download_path=/repo/8


createrepo /repo/8/pgdg12-rhel8


However, when I try to install it on the target-server, it just doesn't 
find the postgresql12 binaries.


[root@my-db11-test yum.repos.d]# dnf search postgresql12
Last metadata expiration check: 0:24:06 ago on Mon 24 Feb 2020 11:18:20 
AM CET.
 
Name & Summary Matched: postgresql12 
=

postgresql12-debugsource.x86_64 : Debug sources for package postgresql12
postgresql12-debuginfo.x86_64 : Debug information for package 
postgresql12
postgresql12-libs-debuginfo.x86_64 : Debug information for package 
postgresql12-libs
postgresql12-test-debuginfo.x86_64 : Debug information for package 
postgresql12-test
postgresql12-devel-debuginfo.x86_64 : Debug information for package 
postgresql12-devel
postgresql12-pltcl-debuginfo.x86_64 : Debug information for package 
postgresql12-pltcl
postgresql12-plperl-debuginfo.x86_64 : Debug information for package 
postgresql12-plperl
postgresql12-server-debuginfo.x86_64 : Debug information for package 
postgresql12-server
postgresql12-contrib-debuginfo.x86_64 : Debug information for package 
postgresql12-contrib
postgresql12-llvmjit-debuginfo.x86_64 : Debug information for package 
postgresql12-llvmjit
postgresql12-plpython-debuginfo.x86_64 : Debug information for package 
postgresql12-plpython
postgresql12-plpython3-debuginfo.x86_64 : Debug information for package 
postgresql12-plpython3
= 
Name Matched: postgresql12 
==
postgresql12-libs.x86_64 : The shared libraries required for any 
PostgreSQL clients

postgresql12-odbc.x86_64 : PostgreSQL ODBC driver
postgresql12-devel.x86_64 : PostgreSQL development header files and 
libraries
postgresql12-llvmjit.x86_64 : Just-in-time compilation support for 
PostgreSQL
postgresql12-plpython.x86_64 : The Python procedural language for 
PostgreSQL



Is there something obvious (or not so obvious) that I forgot?



___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Encrypted container on CentOS VPS

2020-02-24 Thread Roberto Ragusa

On 2020-02-24 10:51, lejeczek via CentOS wrote:

g) remember!! still at least (depending how you mount it)
the 'root' will have access to that data while mounted,
obviously!


More than that: the root user will be able to access data
in the future too, since it can steal the key
while the data is mounted.

Regards.

--
   Roberto Ragusamail at robertoragusa.it
___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Encrypted container on CentOS VPS

2020-02-24 Thread lejeczek via CentOS


On 23/02/2020 19:06, H wrote:
> On 02/17/2020 05:03 AM, lejeczek via CentOS wrote:
>> On 16/02/2020 15:18, H wrote:
>>> I wonder if it is possible to set up an encrypted "file container" on a 
>>> CentOS VPS? I am the root user of the VPS but the hosting company also has 
>>> access to the VPS and thus all files. Is it possible to create a 
>>> LUKS-container on the VPS and those files only be accessible by me? IOW, 
>>> most of the file system on the VPS would be regular file system but the 
>>> container could be used by me as needed. This would allow the VPS to reboot 
>>> normally, I could ssh in normally etc etc. I would rsync files as needed to 
>>> this LUKS-container though.
>>>
>>> ___
>>> CentOS mailing list
>>> CentOS@centos.org
>>> https://lists.centos.org/mailman/listinfo/centos
>> How about a loop way? It would be a file which you can luks-enrypt,
>> decrypt, u/mount on demand, keep a small filesystem on it.
>>
>> ___
>> CentOS mailing list
>> CentOS@centos.org
>> https://lists.centos.org/mailman/listinfo/centos
> What is a "loop way"? I googled it together with Linux and file and did not 
> find anything. Is this simply like a separate file that is LUKS-encrypted and 
> I would then mount it for remote access? If so, what would prevent the 
> hosting company - which I presume is the root user - from also accessing it?
That's that precisely, very easy.
a) use dd to create a a file, eg.: dd if=/dev/zero
of=gor.loop bs=1M count=2000
b) luks encrypt it: cryptsetup luksFormat gor.loop
c) dev mapper mount it: cryptsetup luksOpen gor.loop
luks-gor.loop
d) fs it: mkfs.ext4 /dev/mapper/luks-gor.loop
e) mount it:  mount /dev/mapper/luks-gor.loop
$PWD/gor.rootfs.encrypted
f) use it (to simplify I'd put cryptOpen + mount + unmount +
luksClose into a script)
g) remember!! still at least (depending how you mount it)
the 'root' will have access to that data while mounted,
obviously!
> ___
> CentOS mailing list
> CentOS@centos.org
> https://lists.centos.org/mailman/listinfo/centos


___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Encrypted container on CentOS VPS

2020-02-24 Thread Pete Biggs


> 
> What is a "loop way"? I googled it together with Linux and file and
> did not find anything.

The proper term is "loopback filesystem".


>  Is this simply like a separate file that is LUKS-encrypted and I
> would then mount it for remote access?

Yes, it's a filesystem in a file that you mount with '-o loop'.

>  If so, what would prevent the hosting company - which I presume is
> the root user - from also accessing it?

You provide the decryption password when you mount it.  Once the
filesystem is mounted anyone with the appropriate permissions can read
it.  You can reduce the opportunity of someone accessing it by only
mounting it when you need it and unmounting it as soon as possible.

TBH, if you don't trust the root user of a system, then there's not
much you can do - there are just so many ways a privileged user can get
access to things, both "legitimately" because of their absolute access
or "covertly" using trojans and so on that you would never know about.
If you have legitimate concerns about the hosting company, then find a
different one. 

P.


___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] OwnCloud vs NextCloud

2020-02-24 Thread LAHAYE Olivier
Hi,


I've built my owncloud 17 rpm for centos-7, but I didn't published it because 
it cannot upgrade the v10.
To Upgrade I did:
Build by hand all intermediate versions and installed them in /usr (ugly I 
know), overwriting the v10 rpm files and did all upgrade processes until v16.
Then. I did rpm -Uvh the v17 and ran the upgrade process.
This was the only quick and dirty way to upgrade to recent version while 
keeping things in rpm database.

Nextcloud has a ticket to enable the ability to upgrade from multiple major 
versions. Once this is available I'm sure that we'll see an up to date version 
of nextcloud in EPEL.

For now, you need to hack.

My work was based on this:
https://copr.fedorainfracloud.org/coprs/scren/nextcloud/builds/

My source RPM: 
http://olivier.lahaye1.free.fr/SRPMS/nextcloud-17.0.2-1.el7.src.rpm
You can build it using rpmbuild --rebuild nextcloud-17.0.2-1.el7.src.rpm
Keep in mind that you have to upgrade manually in /usr all previous major 
version up to v16 and do all the database update before upgrading to the 
generated rpms. (use the highest release for each major release)

OF course, if it's a new install, it should work out of the box.

I didn't build the v18 as it was v18.0.0.0.0 by the time I worked on it and I 
wanted a somehow stable version.

My 2 cents.

Olivier.

Le 23/02/2020 04:17, « CentOS au nom de H »  a écrit :

On February 22, 2020 9:02:05 PM EST, "bryn1u85 ."  
wrote:
>The Nextcloud has more features and all are for free. The ownCloud has
>some
>for enterprise features which are paid. Soo i think the choice is
>clear.
>
>niedz., 23 lut 2020 o 02:35 H  napisał(a):
>
>> I am planning to install either ownCloud or NextCloud on a CentOS 7
>VPS
>> server I control. I have previously used ownCloud on another server
>but
>> have not updated the host application for quite some time. On this
>new
>> server, I am not sure which one is the "best" and since I am doing a
>new
>> install I need to decide which one to use.
>>
>> Looking at the Android apps for these cloud solutions, they both seem
>to
>> have a fair number of critical reviews...
>>
>> Does anyone have a preference and, if so, why?
>>
>> ___
>> CentOS mailing list
>> CentOS@centos.org
>> https://lists.centos.org/mailman/listinfo/centos
>>
>___
>CentOS mailing list
>CentOS@centos.org
>https://lists.centos.org/mailman/listinfo/centos

Ok. It seems, however, EPEL has version 10 of NextCloud whereas it is up to 
version 17?
___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos