Re: DYNDNS server software for local use
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 2003-10-16, Gideon Oosthuysen (Isogo) wrote: I am looking for a local DYNDNS solution for my dialup clients. I would like to run My own DYNDNS server that updates the dns records so that the change is basically Instant for me. Does anyone know of any software like this out there? This is possible with ISC Bind 9 (debian package bind9) and some simple scripting, for example, http://zwitterion.org/software/dynamic-dns-update/ Yours sincerely, Mark SuterMiju Systems http://www.miju.com.au/ Phone: +61 0411 262 316 PO Box 176, Corinda Q 4075, Australia Email: [EMAIL PROTECTED] ABN 48 065 548 496 Fax: +61 7 3278 2343 -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.3 (GNU/Linux) Comment: Check Keyservers or http://zwitterion.org/keys/ iD8DBQE/j4RLRYso2ixx1j0RAuxSAKCKXi5dVKeYWDhCNWpHQ3ssgIa9CgCfbLTB UvQj9Smtv4q8w7w8Sf5lCfE= =H4dQ -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Per-user spamassassin settings with amavisd-new?
hi everyone, i'm running spamassassin/unstable through amavisd-new/unstable on a postfix/stable mailserver (debian/stable). it seems like spamassassin ignores the per-user settings in ~/.spamassassin (like a personal 'required_hits'). is there a way to fix this? it did work before when i ran spamassassin through procmail, but procmail didn't handle the quota too well (no error message was sent to senders when the account was over quota), so i took procmail out of the chain.. regards, -rodi -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
How to investigate kernel failure?
Not sure if this is OT, just hope someone can help. I experienced a kernel crash last night at cron.daily time. As i'm totally new to this kind of things i'd like to know where to start from? This machine, which run quite fine for over a year a 2.4.18 kernel (build from vanilla source taken from kernel.org), was upgraded to 2.4.22 (again from kernel.org) around 1 month ago. The 1st block is this: Oct 17 04:48:38 fserv kernel: printing eip: Oct 17 04:48:38 fserv kernel: c0135158 Oct 17 04:48:38 fserv kernel: Oops: Oct 17 04:48:38 fserv kernel: CPU:0 Oct 17 04:48:38 fserv kernel: EIP:0010:[get_hash_table+104/144] Not tainted Oct 17 04:48:38 fserv kernel: EFLAGS: 00010202 Oct 17 04:48:38 fserv kernel: eax: dffc ebx: 0003 ecx: 403de5b0 edx: 403de5b0 Oct 17 04:48:38 fserv kernel: esi: 0009 edi: 0901 ebp: 00010e9e esp: ca897df0 Oct 17 04:48:38 fserv kernel: ds: 0018 es: 0018 ss: 0018 Oct 17 04:48:38 fserv kernel: Process find (pid: 20377, stackpage=ca897000) Oct 17 04:48:38 fserv kernel: Stack: 0901 1000 00010e9e 0ab8 c01356b9 0901 00010e9e Oct 17 04:48:38 fserv kernel:1000 c0158dc9 0901 00010e9e Oct 17 04:48:38 fserv kernel:1000 ca897f18 d75b1b80 ce204a00 Oct 17 04:48:38 fserv kernel: Call Trace:[getblk+25/80] [ext3_getblk+185/624] [vc_resize+289/1168] [ext3_find_entry+501/768] [ext3_bread+35/128] Oct 17 04:48:38 fserv kernel: [ext3_readdir+150/912] [permission+42/48] [vfs_readdir+97/144] [filldir64+0/368] [sys_getdents64+79/259] [filldir64+0/368] Oct 17 04:48:38 fserv kernel: [sys_fcntl64+128/144] [system_call+51/56] Oct 17 04:48:38 fserv kernel: Oct 17 04:48:38 fserv kernel: Code: 39 6a 04 75 f3 0f b7 42 08 3b 44 24 20 75 e9 66 39 7a 0c 75 Oct 17 04:48:38 fserv syslogd 1.4.1#10: restart. Oct 17 04:48:50 fserv kernel: 1Unable to handle kernel paging request at virtual address 403de5b4 Oct 17 04:48:50 fserv kernel: printing eip: Oct 17 04:48:50 fserv kernel: c0135158 Oct 17 04:48:50 fserv kernel: Oops: Oct 17 04:48:50 fserv kernel: CPU:0 Oct 17 04:48:50 fserv kernel: EIP:0010:[get_hash_table+104/144] Not tainted Oct 17 04:48:50 fserv kernel: EFLAGS: 00010202 Oct 17 04:48:50 fserv kernel: eax: dffc ebx: 0003 ecx: 403de5b0 edx: 403de5b0 Oct 17 04:48:50 fserv kernel: esi: 0009 edi: 0901 ebp: 001e1941 esp: d061fdf0 Oct 17 04:48:50 fserv kernel: ds: 0018 es: 0018 ss: 0018 Oct 17 04:48:50 fserv kernel: Process tar (pid: 20504, stackpage=d061f000) Oct 17 04:48:50 fserv kernel: Stack: 0901 1000 001e1941 0ab8 c01356b9 0901 001e1941 Oct 17 04:48:50 fserv kernel:1000 c0158dc9 0901 001e1941 Oct 17 04:48:50 fserv kernel:1000 d061ff18 d3ba4480 caf4c3c0 Oct 17 04:48:50 fserv kernel: Call Trace:[getblk+25/80] [ext3_getblk+185/624] [vc_resize+289/1168] [ext3_find_entry+501/768] [ext3_bread+35/128] Oct 17 04:48:50 fserv kernel: [ext3_readdir+150/912] [vfs_permission+121/256] [permission+42/48] [vfs_readdir+97/144] [filldir64+0/368] [sys_getdents64+79/259] Oct 17 04:48:50 fserv kernel: [filldir64+0/368] [sys_fcntl64+128/144] [system_call+51/56] Oct 17 04:48:50 fserv kernel: Oct 17 04:48:50 fserv kernel: Code: 39 6a 04 75 f3 0f b7 42 08 3b 44 24 20 75 e9 66 39 7a 0c 75 At this time most (possibly all) services were still alive, according to the logs. Then a second crash around 3 hours later: Oct 17 08:13:58 fserv kernel: 1Unable to handle kernel paging request at virtual address 403de5b4 Oct 17 08:13:58 fserv kernel: printing eip: Oct 17 08:13:58 fserv kernel: c0135158 Oct 17 08:13:58 fserv kernel: Oops: Oct 17 08:13:58 fserv kernel: CPU:0 Oct 17 08:13:58 fserv kernel: EIP:0010:[get_hash_table+104/144] Not tainted Oct 17 08:13:58 fserv kernel: EFLAGS: 00010202 Oct 17 08:13:58 fserv kernel: eax: dffc ebx: 0003 ecx: 403de5b0 edx: 403de5b0 Oct 17 08:13:58 fserv kernel: esi: 0009 edi: 0801 ebp: 16df esp: df445e30 Oct 17 08:13:58 fserv kernel: ds: 0018 es: 0018 ss: 0018 Oct 17 08:13:58 fserv kernel: Process kjournald (pid: 16, stackpage=df445000) Oct 17 08:13:58 fserv kernel: Stack: dfd9a800 0801 1000 16df 0ab8 c01356b9 0801 16df Oct 17 08:13:58 fserv kernel:1000 dfd9a800 cae65390 d9eceec0 c0164cb9 0801 16df Oct 17 08:13:58 fserv kernel:1000 dfd9a800 cae65390 16df c01621ad dfd9a800 dfd9a850 dfd9a800 Oct 17 08:13:58 fserv kernel: Call Trace:[getblk+25/80] [journal_get_descriptor_buffer+57/112] [journal_commit_transaction+1373/3799] [schedule+758/800] [kjournald+278/448] Oct 17 08:13:58 fserv kernel: [commit_timeout+0/16] [arch_kernel_thread+40/64] Oct 17 08:13:58 fserv kernel: Oct 17 08:13:58 fserv kernel: Code: 39
Re: DYNDNS server software for local use
On Thu, Oct 16, 2003 at 06:41:03PM +0200, Gideon Oosthuysen (Isogo) wrote: I am looking for a local DYNDNS solution for my dialup clients. I would like to run My own DYNDNS server that updates the dns records so that the change is basically Instant for me. Does anyone know of any software like this out there? We are running tinydyndns successfully for more than a year now for a continuously increasing number of customers. http://innominate.org/projects/tinydyndns/ Regards, Gerrit. -- Open projects at http://smarden.org/pape/. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Re: How to investigate kernel failure?
On Fri, Oct 17, 2003 at 11:50:28AM +0200, aCaB wrote: Oct 17 04:48:38 fserv kernel: Call Trace:[getblk+25/80] [ext3_getblk+185/624] [vc_resize+289/1168] [ext3_find_entry+501/768] [ext3_bread+35/128] Oct 17 04:48:38 fserv kernel: [ext3_readdir+150/912] [permission+42/48] [vfs_readdir+97/144] [filldir64+0/368] [sys_getdents64+79/259] [filldir64+0/368] Oct 17 04:48:38 fserv kernel: [sys_fcntl64+128/144] [system_call+51/56] [...] Oct 17 04:48:50 fserv kernel: Call Trace:[getblk+25/80] [ext3_getblk+185/624] [vc_resize+289/1168] [ext3_find_entry+501/768] [ext3_bread+35/128] Oct 17 04:48:50 fserv kernel: [ext3_readdir+150/912] [vfs_permission+121/256] [permission+42/48] [vfs_readdir+97/144] [filldir64+0/368] [sys_getdents64+79/259] Oct 17 04:48:50 fserv kernel: [filldir64+0/368] [sys_fcntl64+128/144] [system_call+51/56] [...] Oct 17 08:13:58 fserv kernel: Call Trace:[getblk+25/80] [journal_get_descriptor_buffer+57/112] [journal_commit_transaction+1373/3799] [schedule+758/800] [kjournald+278/448] Oct 17 08:13:58 fserv kernel: [commit_timeout+0/16] At this point the server was defently dead, only replaying to the ping. The above are stack dumps. As you can see the most-recently invoked function in each case was getblk(), so I'd say you need to check your filesystem (and/or replace the hard drive). Marcin -- Marcin Owsiany [EMAIL PROTECTED] http://marcin.owsiany.pl/ GnuPG: 1024D/60F41216 FE67 DA2D 0ACA FC5E 3F75 D6F6 3A0D 8AA0 60F4 1216 -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
downloading recursive dependancies
Hello, here is my situation: I have a computer which is not connected to a network, which I want to install a package to. This particular package, mondo, doesn't have many dependencies, so this issue is academic. My objective is to install everything needed to get mondo up and running on this remote machine, which means making sure that all dependencies (and the deps of the deps...) are satisfied. Is there an automated method for doing this? Any advice is appreciated. Thanks -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Re: How to investigate kernel failure?
The above are stack dumps. As you can see the most-recently invoked function in each case was getblk(), so I'd say you need to check your filesystem (and/or replace the hard drive). Marcin Thanks a lot for your help. Now everything seems a bit more clear. But this leads to another question... The disks are software raided so the failed one should have been kicked out of the array which, in fact, didn't happen. Any hints? -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Re: Sugesstions building a rather big mail system.
On 09 Oct 2003 10:31:25 +0200, you wrote: Am Don, 2003-10-09 um 02.50 schrieb Donovan Baarda: Using snapshots to do an incremental backup would be no different to doing any other type of backup using snapshots. It's the same as a normal incremental backup, just with the added guarantee that the filesystem is not changing underneath you as you do it. I agree with that comment. Also somebody asked how to get it with Linux. Tip: use LVM + dump. - LVM will provide snapshot capability - avoids files changing when backing up (as told by Donovan) - Dump is the tool used for taking backups (complete or incremental) Say the first snapshot is created at 05:00 AM with 10TB data on the filer and the second one one hour later at 06:00 AM the incremental snapshot would backup only those blocks/files/whatever that have changed since then (maybe just a few GB). This allows much faster backups/restores with guaranteed consistency. At 5AM you should: - create a LVM snapshot (this is very fast, since LVM doesn't really need to copy data from the real fs to the snapshot fs). - dump fs completely - destroy LVM snapshot At 6AM you should: - create a new LVM snapshot - dump fs partially (incremental mode) - destroy LVM snapshot Is anyone on the list you uses this features and can tell what they really do or how good they work? Well, I haven't tested enough and I really don't have big and loaded systems as the one you want to use, but all my tests have been very successful. Read the following thread that I started a few weeks ago: http://lists.debian.org/debian-isp/2003/debian-isp-200309/msg00330.html Saludos, --Roman -- PGP Fingerprint: 09BB EFCD 21ED 4E79 25FB 29E1 E47F 8A7D EAD5 6742 [Key ID: 0xEAD56742. Available at KeyServ] -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Re: Best way to update perl on Woody Stable ?
On Fri, 10 Oct 2003 13:49:56 +1000, you wrote: another method is to use apt's pinning features where you can tell it to upgrade certain packages from one distribution (e.g. unstable) and the rest from another (e.g. stable). Could you post an /etc/apt/sources.list which demonstrates this option, please? (for instance, how to use latest postfix packages whilest keeping all the rest of packages from woody). TIA. Saludos, --Roman -- PGP Fingerprint: 09BB EFCD 21ED 4E79 25FB 29E1 E47F 8A7D EAD5 6742 [Key ID: 0xEAD56742. Available at KeyServ] -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
SSH access restrictions
Hi, Is there anyway to resistict a non-root user's shell account ? For example once he/she is logged in is there any way to deny, say, reading the /etc/passwd file ? Can they be restricted like the way a user can be restricted using FTP ? I know I could use a tool like Snort to watch whats going out , for example /etc/passwd, except using SSH because it's encrypted. To my knowledge so far I cannot prevent an SSH user from reading system files. Cheers Rudi. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Re: SSH access restrictions
On Sat, 18 Oct 2003 11:23, Rudi Starcevic wrote: For example once he/she is logged in is there any way to deny, say, reading the /etc/passwd file ? Can they be restricted like the way a user can be restricted using FTP ? I have heard of people setting up chroot environments for ssh accounts which is the same restriction as is usually used for anonymous FTP. But for file access there is no way of doing it using Unix permissions. If you use a security system such as SE Linux, systrace, RSBAC, or GRSEC then you can do such things. -- http://www.coker.com.au/selinux/ My NSA Security Enhanced Linux packages http://www.coker.com.au/bonnie++/ Bonnie++ hard drive benchmark http://www.coker.com.au/postal/Postal SMTP/POP benchmark http://www.coker.com.au/~russell/ My home page -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Re: Best way to update perl on Woody Stable ?
On Sat, Oct 18, 2003 at 02:52:11AM +0200, Roman Medina wrote: On Fri, 10 Oct 2003 13:49:56 +1000, you wrote: another method is to use apt's pinning features where you can tell it to upgrade certain packages from one distribution (e.g. unstable) and the rest from another (e.g. stable). Could you post an /etc/apt/sources.list which demonstrates this option, please? (for instance, how to use latest postfix packages whilest keeping all the rest of packages from woody). TIA. sorry, i've never done it. i just know that it's possible. craig -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]