Re: [CentOS] CentOS Security Advisories OVAL feed??

2020-08-05 Thread Carl George
> Q3) Does this indicate that only the latest CentOS (minor) release can
> be considered "secure" or "patched"?

Yes.  Security errata for previous Enterprise Linux minor releases are
a Red Hat product called Extended Update Support (EUS) [0].  CentOS
doesn't build EUS updates.  CentOS point releases are a point in time
reference and an implementation detail, not something you should try
to lock your system to.  When someone says they are using CentOS X.Y,
that just means that they haven't updated their system since X.Y+1 was
released.  Effectively, you don't have CentOS 8.1, you have outdated
CentOS 8.

[0] https://access.redhat.com/articles/rhel-eus

On Tue, Aug 4, 2020 at 11:34 AM  wrote:
>
> Dear List,
>
> I have spent some time playing around with oscap and the RHEL OVAL feed
> (https://www.redhat.com/security/data/oval/v2/RHEL8/, also check Chapter
> 16 of the RHEL 8 Design Guide). Because I could not find an existing
> OVAL file for CentOS, I downloaded one of the RHEL8 files and managed to
> modify (eg. the rhel-8.1-e4s.oval.xml) it to make it work on a CentOS
> machine. Basically I just had to change the package signing key check to
> use the CentOS key and I had to replace the redhat-release RPM package
> name with "centos-release". Obviously, this would violate all kinds of
> rights if redistributed, due to the fact that the upstream vendor is
> named all over the place, but technically it "worked".
>
> On an internal system running a freshly updated CentOS 8.1 system I
> ended up with three errors, titled:
>
> * RHSA-2019:4269: container-tools:rhel8 security and bug fix update
> (Important)
>
> * RHSA-2019:3403: container-tools:rhel8 security, bug fix, and
> enhancement update (Important)
>
> * RHSA-2019:2799: nginx:1.14 security update (Important)
>
> This raises some questions (some of them connected), namely:
>
> Q1) There are no equivalent CESA advisories for those RHSA advisories:
> why is that? Note that there are also no equivalent CentOS packages to
> those mentioned in the RHSA advisories. (My guess: because, when the
> advisories where issued, Centos already had moved on to 8.2)
>
> Q2) Does this indicate a problem in the release process / handling of
> upstream updates on the side of the CentOS project? Were the advisories
> missed at the time of issuance?
>
> Q3) Does this indicate that only the latest CentOS (minor) release can
> be considered "secure" or "patched"?
>
> Q4) Is there a native OVAL file released from the CentOS project
> covering these issues? It could be extremely similar to the RHEL one,
> but it should take the answers to the above questions into account (eg.
> it could require the latests minor-release and there would only be one
> file for CentOS 8 if the answer to Q3 is "yes").
>
> Q5) If the answer to the last question is "no": shouldn't there be such
> a resource?
>
> Thanks for any answers.
>
> peter
>
> ___
> CentOS mailing list
> CentOS@centos.org
> https://lists.centos.org/mailman/listinfo/centos
>


-- 
Carl George

___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] CentOS Security Advisories OVAL feed??

2020-08-05 Thread Leon Fauster via CentOS

Am 05.08.20 um 17:55 schrieb Johnny Hughes:

On 8/5/20 10:45 AM, cen...@niob.at wrote:

On 05/08/2020 16:49, Johnny Hughes wrote:

On 8/5/20 1:05 AM, cen...@niob.at wrote:

On 04/08/2020 23:50, Jon Pruente wrote:

On Tue, Aug 4, 2020 at 11:34 AM  wrote:


Q5) If the answer to the last question is "no": shouldn't there be
such
a resource?


CentOS doesn't publish security errata. If you need it then you should
either buy RHEL, or deal with putting together your own set up with
something like http://cefs.steve-meier.de/

I expected just this answer, and we do have a RHEL subscription (and
BTW: thanks for the link). But you missed the main point by omitting the
other questions (especially Q1, Q2 and Q3): There are upstream package
versions that were never rebuilt for CentOS.

For instance: If, for whatever reason, I am required to stay with nginx
1.14.1 then the missing rebuild of the packages mentioned in
RHSA-2019:2799 (https://access.redhat.com/errata/RHSA-2019:2799) would
leave me with a vulnerable system.

The question for an OVAL feed is actually an add-on question: In the
same spirit that is the base for the CentOS project itself: wouldn't
such a feed be a good thing to have? Otherwise your answer could be the
catch-all answer to all questions CentOS: Go get a commercial
subscription. Personally, I think such an answer is not very helpful.

So what do you think about the underlying issue? Under what
argumentation does it NOT constitute to be an issue?


Modules suck .. :)

But that is built and in the repo ..

dnf list 'nginx*'

nginx.x86_64
1:1.14.1-9.module_el8.0.0+184+e34fea82  AppStream
nginx-all-modules.noarch
1:1.14.1-9.module_el8.0.0+184+e34fea82  AppStream
nginx-filesystem.noarch
1:1.14.1-9.module_el8.0.0+184+e34fea82  AppStream
nginx-mod-http-image-filter.x86_64
1:1.14.1-9.module_el8.0.0+184+e34fea82  AppStream
nginx-mod-http-perl.x86_64
1:1.14.1-9.module_el8.0.0+184+e34fea82  AppStream
nginx-mod-http-xslt-filter.x86_64
1:1.14.1-9.module_el8.0.0+184+e34fea82  AppStream
nginx-mod-mail.x86_64
1:1.14.1-9.module_el8.0.0+184+e34fea82  AppStream
nginx-mod-stream.x86_64
1:1.14.1-9.module_el8.0.0+184+e34fea82  AppStream

As I have said before .. mbbox (the item used to build modules) adds an
index code (the 184) and a part of the git commit (e34fea82) .. so this
will always be different between RHEL and CentOS .. because we use
different builders and a different git repo.  Red Hat's RHEL index code
is 4108 and the git commit is af250afe


Thanks a lot for pointing that out! That explains part of the problem.
The corresponding source RPMs are indeed identical (I checked :-) ), so
the packages were (indeed) rebuilt. That was not at all obvious to me.

OTOH: I probably would have guessed if there had been a corresponding
e-mail to Centos-Announce. At this point, I would like to add that I am
extremely impressed by the CentOS project and that I do not want to
blame anybody for forgetting such an e-mail (or maybe it was just lost
somewhere in SMTP-land) - I just want to state that fact. Thanks for
putting in all that hard work!

With that new knowledge, I also checked my other issues wrt to the
container-tools package: Same module issue. So there is a pattern. But
there is also the pattern that I cannot find the corresponding
CentOS-Announce e-mail. Strange, isn't it?

This still leaves me wondering if there should be an attempt at
providing a CentOS OVAL file similar to the one by RH that is not
generated by taking the upstream file and running some uninspired
sed-script on it, like (for reference):

     sed -e 's,/etc/redhat-release,/etc/centos-release,g' -e
's/199e2f91fd431d51/05b555b38483c65d/g'

However, the question could be asked if such an OVAL file would be of
any use, in the light of possibly missing CESA announce e-Mails, because
that advisory information must some be translated into the OCAL XML.

Having said all this: maybe there is some deeper problem here, because
of that pattern of missing announce e-mails that correspond with
packages that differ in the final version number with respect to the
upstream package. Or is this just a coincidence?



We understand that there are no announcements for CentOS 8 .. this (the
modules differences) is precisely the reason why (the names do not match
up and our scripts require that).

We do not have the capability to announce these at the present time.

This is something that needs an engineering solution.  Submissions welcome.




I the mean time : https://feeds.centos.org/


--
Leon
___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] CentOS Security Advisories OVAL feed??

2020-08-05 Thread centos

On 05/08/2020 17:55, Johnny Hughes wrote:



Having said all this: maybe there is some deeper problem here, because
of that pattern of missing announce e-mails that correspond with
packages that differ in the final version number with respect to the
upstream package. Or is this just a coincidence?


We understand that there are no announcements for CentOS 8 .. this (the
modules differences) is precisely the reason why (the names do not match
up and our scripts require that).

We do not have the capability to announce these at the present time.

This is something that needs an engineering solution.  Submissions welcome.


Thanks for the clarification. This explains exactly what I have seen. 
Are those scripts available somewhere? A quick search didn't turn up 
anything obvious...



peter

___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] CentOS Security Advisories OVAL feed??

2020-08-05 Thread Johnny Hughes
On 8/5/20 10:45 AM, cen...@niob.at wrote:
> On 05/08/2020 16:49, Johnny Hughes wrote:
>> On 8/5/20 1:05 AM, cen...@niob.at wrote:
>>> On 04/08/2020 23:50, Jon Pruente wrote:
 On Tue, Aug 4, 2020 at 11:34 AM  wrote:

> Q5) If the answer to the last question is "no": shouldn't there be
> such
> a resource?
>
 CentOS doesn't publish security errata. If you need it then you should
 either buy RHEL, or deal with putting together your own set up with
 something like http://cefs.steve-meier.de/
>>> I expected just this answer, and we do have a RHEL subscription (and
>>> BTW: thanks for the link). But you missed the main point by omitting the
>>> other questions (especially Q1, Q2 and Q3): There are upstream package
>>> versions that were never rebuilt for CentOS.
>>>
>>> For instance: If, for whatever reason, I am required to stay with nginx
>>> 1.14.1 then the missing rebuild of the packages mentioned in
>>> RHSA-2019:2799 (https://access.redhat.com/errata/RHSA-2019:2799) would
>>> leave me with a vulnerable system.
>>>
>>> The question for an OVAL feed is actually an add-on question: In the
>>> same spirit that is the base for the CentOS project itself: wouldn't
>>> such a feed be a good thing to have? Otherwise your answer could be the
>>> catch-all answer to all questions CentOS: Go get a commercial
>>> subscription. Personally, I think such an answer is not very helpful.
>>>
>>> So what do you think about the underlying issue? Under what
>>> argumentation does it NOT constitute to be an issue?
>>>
>> Modules suck .. :)
>>
>> But that is built and in the repo ..
>>
>> dnf list 'nginx*'
>>
>> nginx.x86_64
>> 1:1.14.1-9.module_el8.0.0+184+e34fea82  AppStream
>> nginx-all-modules.noarch
>> 1:1.14.1-9.module_el8.0.0+184+e34fea82  AppStream
>> nginx-filesystem.noarch
>> 1:1.14.1-9.module_el8.0.0+184+e34fea82  AppStream
>> nginx-mod-http-image-filter.x86_64
>> 1:1.14.1-9.module_el8.0.0+184+e34fea82  AppStream
>> nginx-mod-http-perl.x86_64
>> 1:1.14.1-9.module_el8.0.0+184+e34fea82  AppStream
>> nginx-mod-http-xslt-filter.x86_64
>> 1:1.14.1-9.module_el8.0.0+184+e34fea82  AppStream
>> nginx-mod-mail.x86_64
>> 1:1.14.1-9.module_el8.0.0+184+e34fea82  AppStream
>> nginx-mod-stream.x86_64
>> 1:1.14.1-9.module_el8.0.0+184+e34fea82  AppStream
>>
>> As I have said before .. mbbox (the item used to build modules) adds an
>> index code (the 184) and a part of the git commit (e34fea82) .. so this
>> will always be different between RHEL and CentOS .. because we use
>> different builders and a different git repo.  Red Hat's RHEL index code
>> is 4108 and the git commit is af250afe
>>
> Thanks a lot for pointing that out! That explains part of the problem.
> The corresponding source RPMs are indeed identical (I checked :-) ), so
> the packages were (indeed) rebuilt. That was not at all obvious to me.
> 
> OTOH: I probably would have guessed if there had been a corresponding
> e-mail to Centos-Announce. At this point, I would like to add that I am
> extremely impressed by the CentOS project and that I do not want to
> blame anybody for forgetting such an e-mail (or maybe it was just lost
> somewhere in SMTP-land) - I just want to state that fact. Thanks for
> putting in all that hard work!
> 
> With that new knowledge, I also checked my other issues wrt to the
> container-tools package: Same module issue. So there is a pattern. But
> there is also the pattern that I cannot find the corresponding
> CentOS-Announce e-mail. Strange, isn't it?
> 
> This still leaves me wondering if there should be an attempt at
> providing a CentOS OVAL file similar to the one by RH that is not
> generated by taking the upstream file and running some uninspired
> sed-script on it, like (for reference):
> 
>     sed -e 's,/etc/redhat-release,/etc/centos-release,g' -e
> 's/199e2f91fd431d51/05b555b38483c65d/g'
> 
> However, the question could be asked if such an OVAL file would be of
> any use, in the light of possibly missing CESA announce e-Mails, because
> that advisory information must some be translated into the OCAL XML.
> 
> Having said all this: maybe there is some deeper problem here, because
> of that pattern of missing announce e-mails that correspond with
> packages that differ in the final version number with respect to the
> upstream package. Or is this just a coincidence?
> 

We understand that there are no announcements for CentOS 8 .. this (the
modules differences) is precisely the reason why (the names do not match
up and our scripts require that).

We do not have the capability to announce these at the present time.

This is something that needs an engineering solution.  Submissions welcome.




signature.asc
Description: OpenPGP digital signature
___
CentOS mailing list
CentOS@centos.org

Re: [CentOS] CentOS Security Advisories OVAL feed??

2020-08-05 Thread centos

On 05/08/2020 16:49, Johnny Hughes wrote:

On 8/5/20 1:05 AM, cen...@niob.at wrote:

On 04/08/2020 23:50, Jon Pruente wrote:

On Tue, Aug 4, 2020 at 11:34 AM  wrote:


Q5) If the answer to the last question is "no": shouldn't there be such
a resource?


CentOS doesn't publish security errata. If you need it then you should
either buy RHEL, or deal with putting together your own set up with
something like http://cefs.steve-meier.de/

I expected just this answer, and we do have a RHEL subscription (and
BTW: thanks for the link). But you missed the main point by omitting the
other questions (especially Q1, Q2 and Q3): There are upstream package
versions that were never rebuilt for CentOS.

For instance: If, for whatever reason, I am required to stay with nginx
1.14.1 then the missing rebuild of the packages mentioned in
RHSA-2019:2799 (https://access.redhat.com/errata/RHSA-2019:2799) would
leave me with a vulnerable system.

The question for an OVAL feed is actually an add-on question: In the
same spirit that is the base for the CentOS project itself: wouldn't
such a feed be a good thing to have? Otherwise your answer could be the
catch-all answer to all questions CentOS: Go get a commercial
subscription. Personally, I think such an answer is not very helpful.

So what do you think about the underlying issue? Under what
argumentation does it NOT constitute to be an issue?


Modules suck .. :)

But that is built and in the repo ..

dnf list 'nginx*'

nginx.x86_64
1:1.14.1-9.module_el8.0.0+184+e34fea82  AppStream
nginx-all-modules.noarch
1:1.14.1-9.module_el8.0.0+184+e34fea82  AppStream
nginx-filesystem.noarch
1:1.14.1-9.module_el8.0.0+184+e34fea82  AppStream
nginx-mod-http-image-filter.x86_64
1:1.14.1-9.module_el8.0.0+184+e34fea82  AppStream
nginx-mod-http-perl.x86_64
1:1.14.1-9.module_el8.0.0+184+e34fea82  AppStream
nginx-mod-http-xslt-filter.x86_64
1:1.14.1-9.module_el8.0.0+184+e34fea82  AppStream
nginx-mod-mail.x86_64
1:1.14.1-9.module_el8.0.0+184+e34fea82  AppStream
nginx-mod-stream.x86_64
1:1.14.1-9.module_el8.0.0+184+e34fea82  AppStream

As I have said before .. mbbox (the item used to build modules) adds an
index code (the 184) and a part of the git commit (e34fea82) .. so this
will always be different between RHEL and CentOS .. because we use
different builders and a different git repo.  Red Hat's RHEL index code
is 4108 and the git commit is af250afe

Thanks a lot for pointing that out! That explains part of the problem. 
The corresponding source RPMs are indeed identical (I checked :-) ), so 
the packages were (indeed) rebuilt. That was not at all obvious to me.


OTOH: I probably would have guessed if there had been a corresponding 
e-mail to Centos-Announce. At this point, I would like to add that I am 
extremely impressed by the CentOS project and that I do not want to 
blame anybody for forgetting such an e-mail (or maybe it was just lost 
somewhere in SMTP-land) - I just want to state that fact. Thanks for 
putting in all that hard work!


With that new knowledge, I also checked my other issues wrt to the 
container-tools package: Same module issue. So there is a pattern. But 
there is also the pattern that I cannot find the corresponding 
CentOS-Announce e-mail. Strange, isn't it?


This still leaves me wondering if there should be an attempt at 
providing a CentOS OVAL file similar to the one by RH that is not 
generated by taking the upstream file and running some uninspired 
sed-script on it, like (for reference):


    sed -e 's,/etc/redhat-release,/etc/centos-release,g' -e 
's/199e2f91fd431d51/05b555b38483c65d/g'


However, the question could be asked if such an OVAL file would be of 
any use, in the light of possibly missing CESA announce e-Mails, because 
that advisory information must some be translated into the OCAL XML.


Having said all this: maybe there is some deeper problem here, because 
of that pattern of missing announce e-mails that correspond with 
packages that differ in the final version number with respect to the 
upstream package. Or is this just a coincidence?



peter


___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] CentOS Security Advisories OVAL feed??

2020-08-05 Thread Johnny Hughes
On 8/5/20 1:05 AM, cen...@niob.at wrote:
> On 04/08/2020 23:50, Jon Pruente wrote:
>> On Tue, Aug 4, 2020 at 11:34 AM  wrote:
>>
>>> Q5) If the answer to the last question is "no": shouldn't there be such
>>> a resource?
>>>
>> CentOS doesn't publish security errata. If you need it then you should
>> either buy RHEL, or deal with putting together your own set up with
>> something like http://cefs.steve-meier.de/
> 
> I expected just this answer, and we do have a RHEL subscription (and
> BTW: thanks for the link). But you missed the main point by omitting the
> other questions (especially Q1, Q2 and Q3): There are upstream package
> versions that were never rebuilt for CentOS.
> 
> For instance: If, for whatever reason, I am required to stay with nginx
> 1.14.1 then the missing rebuild of the packages mentioned in
> RHSA-2019:2799 (https://access.redhat.com/errata/RHSA-2019:2799) would
> leave me with a vulnerable system.
> 
> The question for an OVAL feed is actually an add-on question: In the
> same spirit that is the base for the CentOS project itself: wouldn't
> such a feed be a good thing to have? Otherwise your answer could be the
> catch-all answer to all questions CentOS: Go get a commercial
> subscription. Personally, I think such an answer is not very helpful.
> 
> So what do you think about the underlying issue? Under what
> argumentation does it NOT constitute to be an issue?
> 

Modules suck .. :)

But that is built and in the repo ..

dnf list 'nginx*'

nginx.x86_64
1:1.14.1-9.module_el8.0.0+184+e34fea82  AppStream
nginx-all-modules.noarch
1:1.14.1-9.module_el8.0.0+184+e34fea82  AppStream
nginx-filesystem.noarch
1:1.14.1-9.module_el8.0.0+184+e34fea82  AppStream
nginx-mod-http-image-filter.x86_64
1:1.14.1-9.module_el8.0.0+184+e34fea82  AppStream
nginx-mod-http-perl.x86_64
1:1.14.1-9.module_el8.0.0+184+e34fea82  AppStream
nginx-mod-http-xslt-filter.x86_64
1:1.14.1-9.module_el8.0.0+184+e34fea82  AppStream
nginx-mod-mail.x86_64
1:1.14.1-9.module_el8.0.0+184+e34fea82  AppStream
nginx-mod-stream.x86_64
1:1.14.1-9.module_el8.0.0+184+e34fea82  AppStream

As I have said before .. mbbox (the item used to build modules) adds an
index code (the 184) and a part of the git commit (e34fea82) .. so this
will always be different between RHEL and CentOS .. because we use
different builders and a different git repo.  Red Hat's RHEL index code
is 4108 and the git commit is af250afe




signature.asc
Description: OpenPGP digital signature
___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Fixing grub/shim issue Centos 7

2020-08-05 Thread Johnny Hughes
On 8/4/20 10:45 AM, ja wrote:
> On Tue, 2020-08-04 at 10:36 -0500, Chris Adams wrote:
>> Once upon a time, Johnny Hughes  said:
>>> The issues should now be resolved.
>>>
>>> If you just mount /mnt/sysimage, set an ip address and upgrade (to get
>>> th new shim) .. then:
>>>
>>> yum reinstall 
>>
>> I'm curious - why does the kernel need to be reinstalled?  The shim-x64
>> package installs its files directly to the EFI partition where they are
>> needed.
>>
> 
> +1
> 

That is the easiest way for the initrd to be rebuilt .. which is what
created the unbootable issue in the first place.  At least is some
circumstances.

You can also regenerate your initrd manually after installing the shim.

This is  IF  you are already in a failed boot condition from the bad
install on Friday.

If you are doing the upgrade/install now from a bootable system, all you
need to do is a normal update.



signature.asc
Description: OpenPGP digital signature
___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Centos 7 shim fix failed

2020-08-05 Thread Kai Bojens via CentOS
Am 05.08.20 um 13:44 schrieb Leon Fauster via CentOS:
> Take a look into "top",
> if something like gz or xz is in place occupying your CPU then the
> initrd gets build ... just wait :-)

'journalctl -f' shows the state of the build process.
___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Centos 7 shim fix failed

2020-08-05 Thread Leon Fauster via CentOS

Am 05.08.20 um 02:13 schrieb david:

At 05:01 PM 8/4/2020, you wrote:

Am 05.08.20 um 01:27 schrieb david:

At 04:18 PM 8/4/2020, you wrote:

Am 05.08.20 um 01:09 schrieb david:

At 01:54 PM 8/4/2020, you wrote:

On Tue, 04 Aug 2020 13:44:05 -0700
david wrote:

> After all the updates, the system was NOT bootable.

How long did you wait for it to boot, and what did it do when it 
failed to boot?  What text messages showed up on the 
console?  Any reported errors when you ran the update or when 
you rebooted the computer?  If so, what did the say?


I personally haven't had any issues updating any of my computers 
(using a mix of Centos 6, 7 and 8) but maybe they're all too old 
to for the issue to show up.


--

How long did I wait:  5 minutes
What on the console:  nothing, just a dull gray color
Errors on update:  none
-
But when I blocked the update, it booted within a minute, and ran.


Can you boot the system with all updates and secureboot=off?
(Just to be sure; I imply that you use UEFI, right?)

--
Leon



I'm not sure how to turn 'secure boot' off or if it exists.
(MacMini5.2).  I presume it uses UEFI, but not sure how to answer that.


Oh, an apple device. AFAIK the openfirmware of such hardware have also 
a legacy mode. So first check if it uses the UEFI mode at all by checking

if this directory exists (in the working/bootable system):

# ls -la /sys/firmware/efi

if so test the secure boot state with

# mokutil --sb-state


Boot failure only occurs when the grub2/shim/mokutil updates are 
applied.




[root@xxx -]ls -la /sys/firmware/efi
total 0
drwxr-xr-x  5 root root    0 Aug  4 17:12 .
drwxr-xr-x  7 root root    0 Aug  4 14:30 ..
-r--r--r--  1 root root 4096 Aug  4 17:12 config_table
drwxr-xr-x  2 root root    0 Aug  4 14:30 efivars
-r--r--r--  1 root root 4096 Aug  4 17:12 fw_platform_size
-r--r--r--  1 root root 4096 Aug  4 17:12 fw_vendor
-r--r--r--  1 root root 4096 Aug  4 17:12 runtime
drwxr-xr-x 10 root root    0 Aug  4 17:12 runtime-map
-r  1 root root 4096 Aug  4 14:31 systab
drwxr-xr-x 23 root root    0 Aug  4 17:12 vars
[root@xxx ~]# mokutil --sb-state
This system doesn't support Secure Boot
[root@xxx ~]#




The boot hole security issue is related to secure boot. In your case I 
would assume a different problem (after seeing the above information).
As others mentioned already apply some patience while updating. You said 
that you could change to a different terminal. Take a look into "top", 
if something like gz or xz is in place occupying your CPU then the 
initrd gets build ... just wait :-)


--
Leon








___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Announcing the version 1.0 hexpeek release!

2020-08-05 Thread Leon Fauster via CentOS

Am 05.08.20 um 06:22 schrieb hexp...@hexpeek.com:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Announcing the version 1.0 hexpeek release!

I am pleased to announce the first stable release of hexpeek, which
seeks to be an efficient, powerful, and portable hex editor for files
of all kinds and sizes.

This release improves on the beta release with a live undo, a greatly
increased backup depth, better support for writing to non-seekable
files, and some miscellaneous cleanup.

Visit https://www.hexpeek.com for more information.

Out of respect for the bandwidth on this mailing list, I do not plan
to announce future hexpeek releases here. There is a mailing list
on https://www.hexpeek.com where future announcements will be posted.

If you are interested in hexpeek becoming a package/port for your
distro, please let me know.



Its for sure a great tool but is this the right list for such 
announcements [*]?


[*]
"This is a General discussion list for all CentOS issues."
https://lists.centos.org/mailman/listinfo/centos
___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Centos 7 shim fix failed

2020-08-05 Thread Phil Perry

On 05/08/2020 10:40, Kenneth Porter wrote:


Is there some way we could get the initrd rebuild to be more verbose, so 
that it doesn't appear to hang? It would be nice to get feedback that 
something is happening, especially on an older, slower system that takes 
a long time for this step.




Not without hacking the underlying scripts that call dracut to increase 
the verbosity. You can run yum at a more verbose debug level, but it's 
not going to give you information on the state of individual rpm 
scriptlets. You could monitor the process in top where you should be 
able to see that it's still working. You can also monitor 
/var/log/messages where dracut activity is logged.


___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Centos 7 shim fix failed

2020-08-05 Thread Kenneth Porter

On 8/4/2020 11:20 AM, Jonathan Billings wrote:

Running transaction
   Installing : kernel-3.10.0-1127.el7.x86_64 1/1

at which point the process appeared to hang.  No further output happened for
five minutes.  I opened a different terminal and entered "shutdown -r now".
The result is an unbootable system.


What did I do wrong?  I must admit that there are multiple copies of advice
on the mailing list, so perhaps I followed the wrong one?

Your system was most likely rebuilding the initrd, and you interrupted
it leaving you with a broken initrd.


Is there some way we could get the initrd rebuild to be more verbose, so 
that it doesn't appear to hang? It would be nice to get feedback that 
something is happening, especially on an older, slower system that takes 
a long time for this step.


I run into the same problem with the kernel-devel package, just because 
of the sheer number of files involved. I've learned to be patient and 
expect a kernel upgrade on my oldest system to take a very long time. (I 
need the -devel package to rebuild an ancient 3rd party driver no longer 
provided by RHEL.)



___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] CentOS Security Advisories OVAL feed??

2020-08-05 Thread centos

On 04/08/2020 23:50, Jon Pruente wrote:

On Tue, Aug 4, 2020 at 11:34 AM  wrote:


Q5) If the answer to the last question is "no": shouldn't there be such
a resource?


CentOS doesn't publish security errata. If you need it then you should
either buy RHEL, or deal with putting together your own set up with
something like http://cefs.steve-meier.de/


I expected just this answer, and we do have a RHEL subscription (and 
BTW: thanks for the link). But you missed the main point by omitting the 
other questions (especially Q1, Q2 and Q3): There are upstream package 
versions that were never rebuilt for CentOS.


For instance: If, for whatever reason, I am required to stay with nginx 
1.14.1 then the missing rebuild of the packages mentioned in 
RHSA-2019:2799 (https://access.redhat.com/errata/RHSA-2019:2799) would 
leave me with a vulnerable system.


The question for an OVAL feed is actually an add-on question: In the 
same spirit that is the base for the CentOS project itself: wouldn't 
such a feed be a good thing to have? Otherwise your answer could be the 
catch-all answer to all questions CentOS: Go get a commercial 
subscription. Personally, I think such an answer is not very helpful.


So what do you think about the underlying issue? Under what 
argumentation does it NOT constitute to be an issue?


peter

___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos