Re: NFS-mounting crontabs

2004-11-07 Thread Mark Ferlatte
martin f krafft said on Sat, Nov 06, 2004 at 12:30:06PM +0100:
 also sprach Mark Ferlatte [EMAIL PROTECTED] [2004.11.06.0123 +0100]:
  Do you really want your user's crontabs to run on every host in your 
  cluster?
 
 They are mounted from master:/srv/var/spool/crontabs/${HOSTNAME}, so
 they are per host.
 
Okay.  I guess my next question is: why do you want your user crontabs NFS
mounted from your clients?  Since they are local configs, why not just let them
be local?  If you feel that you have to backup your crontabs for each host,
have a cronjob on each host that does a cp -a /var/spool/cron
/mount/master/srv/var/spool/crontabs/$HOSTNAME, or whatever.

This actually closes a security hole; if you are NFS mounting your crons, then
all I have to do is spoof your client's NFS mount (or response) to get cron to
run any command I want as any user on that system.

 One idea I had last night is a crontab wrapper, along with
 a root_squash NFS export. A cron job copies the files from there to
 /var/spool/cron/crontabs as you describe. But when the user calls
 crontab, what happens is that the file is first explicitly copied
 from the NFS mount, then crontab(1) is invoked, and upon exit, the
 user crontab is saved back to the NFS. I think this would work fine,
 don't you think?

Sure, if you want to go that way, a wrapper around crontab is fine.

M


pgpysO2lQrBaF.pgp
Description: PGP signature


Re: exim or postfix

2004-11-07 Thread Mark Ferlatte
Rodney Richison said on Sat, Nov 06, 2004 at 09:19:40PM -0600:
 Are most of you using exim or postfix?  Just curious.  I've never tried 
 exim.

Don't know about most; I use Postfix.  I don't think exim is a bad choice,
though; I just liked Postfix better, and it performs well enough to meet my
needs.

M


pgpwRaGgrw1KM.pgp
Description: PGP signature


Re: Limiting User Commands

2004-11-07 Thread Wouter Verhelst
On Fri, Nov 05, 2004 at 07:53:33PM +0200, [EMAIL PROTECTED] wrote:
 In regards to the latter method, would it be possible for me to change 
 the group ownership of the commands I don't want users to have access to
 and revoke execute permission from that group?
 
 Yes, you can make something like that: addgroup(access), then change
 groupname of commands that you want with that group (access), remember to
 remove execute/search by others from commands that are with
 group(access), also don't forget to add group(access) to every user that
 you want to have access to this commands.

The only problem with this approach would be that you'd revoke it from
system accounts too, not just your users. It might break in unexpected
places.

It seems to me that this should be possible with SELinux. What you need
would be a role for your users where they are only able to run the
commands you want them to run, whereas system accounts would remain
unblocked.

-- 
 EARTH
 smog  |   bricks
 AIR  --  mud  -- FIRE
soda water |   tequila
 WATER
 -- with thanks to fortune


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: exim or postfix

2004-11-07 Thread Brett Parker
On Sat, Nov 06, 2004 at 09:19:40PM -0600, Rodney Richison wrote:
 Are most of you using exim or postfix?  Just curious.  I've never tried 
 exim.

exim4 and postfix, depending on the machine, and who origionally set it
up. New machines are getting exim4 because it is far more flexible and
powerful that postfix (in my experience).

Cheers,
-- 
Brett Parker
web:   http://www.sommitrealweird.co.uk/
email: [EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: exim or postfix

2004-11-07 Thread martin f krafft
also sprach Mark Ferlatte [EMAIL PROTECTED] [2004.11.07.1013 +0100]:
 Don't know about most; I use Postfix.  I don't think exim is a bad choice,
 though; I just liked Postfix better, and it performs well enough to meet my
 needs.

Well said.

also sprach Brett Parker [EMAIL PROTECTED] [2004.11.07.1226 +0100]:
 exim4 and postfix, depending on the machine, and who origionally set it
 up. New machines are getting exim4 because it is far more flexible and
 powerful that postfix (in my experience).

Well, my last tests have shown postfix to be more performant by
about a factor of 1.6. In addition, there is the single setuid
binary thing about exim.

You are right that exim has a lot more features than postfix.
However, are they needed? To me, exim tries to be more than an MTA,
which is why I surely prefer postfix.

I can't wait until I have time to try/use/improve Md's policy
framework.

-- 
Please do not send copies of list mail to me; I read the list!
 
 .''`. martin f. krafft [EMAIL PROTECTED]
: :'  :proud Debian developer, admin, user, and author
`. `'`
  `-  Debian - when you have better things to do than fixing a system
 
Invalid/expired PGP subkeys? Use subkeys.pgp.net as keyserver!


signature.asc
Description: Digital signature


Re: NFS-mounting crontabs

2004-11-07 Thread martin f krafft
also sprach Mark Ferlatte [EMAIL PROTECTED] [2004.11.07.1012 +0100]:
 Okay.  I guess my next question is: why do you want your user
 crontabs NFS mounted from your clients?

The cluster nodes are frequently reinstalled, so the crontabs need
to be installed automatically.

 This actually closes a security hole; if you are NFS mounting your
 crons, then all I have to do is spoof your client's NFS mount (or
 response) to get cron to run any command I want as any user on
 that system.

Hey, it's NFS. It's inherently insecure. Until I switch it all to
IPsec, the cluster is open to everyone with physical access.

  One idea I had last night is a crontab wrapper, along with
  a root_squash NFS export. A cron job copies the files from there to
  /var/spool/cron/crontabs as you describe. But when the user calls
  crontab, what happens is that the file is first explicitly copied
  from the NFS mount, then crontab(1) is invoked, and upon exit, the
  user crontab is saved back to the NFS. I think this would work fine,
  don't you think?
 
 Sure, if you want to go that way, a wrapper around crontab is fine.

that, in addition with an @reboot cron job to initialise
/var/spool/cron/crontabs from the NFS mounted /var/local/crontabs
did the trick.

-- 
Please do not send copies of list mail to me; I read the list!
 
 .''`. martin f. krafft [EMAIL PROTECTED]
: :'  :proud Debian developer, admin, user, and author
`. `'`
  `-  Debian - when you have better things to do than fixing a system
 
Invalid/expired PGP subkeys? Use subkeys.pgp.net as keyserver!


signature.asc
Description: Digital signature


Re: exim or postfix

2004-11-07 Thread Brett Parker
On Sun, Nov 07, 2004 at 02:02:35PM +0100, martin f krafft wrote:
 also sprach Brett Parker [EMAIL PROTECTED] [2004.11.07.1226 +0100]:
  exim4 and postfix, depending on the machine, and who origionally set it
  up. New machines are getting exim4 because it is far more flexible and
  powerful that postfix (in my experience).
 
 Well, my last tests have shown postfix to be more performant by
 about a factor of 1.6. In addition, there is the single setuid
 binary thing about exim.
 
 You are right that exim has a lot more features than postfix.
 However, are they needed? To me, exim tries to be more than an MTA,
 which is why I surely prefer postfix.

I use a fair chunk of them, so yes, I'd say they are. ACLs and the sheer
power of the router config wins me over everytime. I work for a small
ISP so the more flexible the solution, the better for us. As new things
come up, and new unthought of problems arrise, I find that not having to
go outside the server setup for large groups of users is rather useful.
Coupled with rather powerful database access, exim4 just makes my life a
lot easier. There have been some very simple things that I've needed to
find solutions to with postfix in the past which I ended up having to do
with procmail that I can now deal with in ~ 3 lines in the exim config.

Then, I've always prefered exim, I like having control at my finger
tips, and things to do what I expect :)

Just out of interest, were your tests exim3 or exim4 vs postfix. FWICT
there's been a lot of work gone in to exim4, and it does seem to be
faster than exim3, I haven't done a straight speed comparison between
postfix and exim4, though.

Thanks,
-- 
Brett Parker
web:   http://www.sommitrealweird.co.uk/
email: [EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: exim or postfix

2004-11-07 Thread martin f krafft
also sprach Brett Parker [EMAIL PROTECTED] [2004.11.07.1440 +0100]:
 Then, I've always prefered exim, I like having control at my
 finger tips, and things to do what I expect :)

Ha! Flamebait! Consider yourself whacked. I won't even respond to
this. :)

/me embraces /etc/postfix/main.cf

 Just out of interest, were your tests exim3 or exim4 vs postfix.

exim3; sorry, I should have mentioned that.

 FWICT there's been a lot of work gone in to exim4, and it does
 seem to be faster than exim3, I haven't done a straight speed
 comparison between postfix and exim4, though.

I have not either for exim4. I would be interested though. I am very
happy with postfix, but I do at times eye over to the router config
of exim. You are right, I cannot get rid of procmail at the moment,
which is definitely a pain. However, I've been using postfix for
like 7 years now and I really don't want to start to learn to swim
again in icy waters.

-- 
Please do not send copies of list mail to me; I read the list!
 
 .''`. martin f. krafft [EMAIL PROTECTED]
: :'  :proud Debian developer, admin, user, and author
`. `'`
  `-  Debian - when you have better things to do than fixing a system
 
Invalid/expired PGP subkeys? Use subkeys.pgp.net as keyserver!


signature.asc
Description: Digital signature


Re: Limiting User Commands

2004-11-07 Thread Steve Kemp
On Fri, Nov 05, 2004 at 03:35:11PM -0800, Stephen Le wrote:

 See the example above. Users would still be able to upload their own
 Perl scripts and get Apache to execute them without restriction - the
 Perl script could call commands that I want to ban the users from
 executing.

  Lots of people have commented already, but I've not seen any
 discussion on why you might want to do this.  What kind of bad
 commands are you trying to prevent?

  Most of the dangerous commands like fdisk, etc, will be handled
 by the existing permissions setup.

  If you give people the ability to upload CGI scripts, like the
 perl example you mention, you've already lost - a malicious user
 could compile some C code statically and exectute that remotely.

  If you're operating a shared system and want to keep seperate
 web users isolated from each other using rbash, chroots or
 similar should be sufficient.  What exactly is it that these
 solutions do not give you which you need?

Steve
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Limiting User Commands

2004-11-07 Thread martin f krafft
also sprach Steve Kemp [EMAIL PROTECTED] [2004.11.07.1514 +0100]:
   If you're operating a shared system and want to keep seperate
  web users isolated from each other using rbash, chroots or
  similar should be sufficient.

Neither rbash not chroots are security measures. They are hurdles at
most, but can be easily circumvented. Use virtual machines instead
of chroots, and process and filesystem ACLs instead of rbash.

-- 
Please do not send copies of list mail to me; I read the list!
 
 .''`. martin f. krafft [EMAIL PROTECTED]
: :'  :proud Debian developer, admin, user, and author
`. `'`
  `-  Debian - when you have better things to do than fixing a system
 
Invalid/expired PGP subkeys? Use subkeys.pgp.net as keyserver!


signature.asc
Description: Digital signature


Re: exim or postfix

2004-11-07 Thread Teófilo Ruiz Suárez
On Sun, Nov 07, 2004 at 02:02:35PM +0100, martin f krafft wrote:
 [...] 

 I can't wait until I have time to try/use/improve Md's policy
 framework.

Do you have an URL with more info about that policy framework?.

Thanks,
-- 
teo - http://blog.eltridente.org
 
Res publica non dominetur


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: exim or postfix

2004-11-07 Thread martin f krafft
also sprach Teófilo Ruiz Suárez [EMAIL PROTECTED] [2004.11.07.1529 +0100]:
 Do you have an URL with more info about that policy framework?.

Not handy. Please write to md ät linux dot it, he's the author.

-- 
Please do not send copies of list mail to me; I read the list!
 
 .''`. martin f. krafft [EMAIL PROTECTED]
: :'  :proud Debian developer, admin, user, and author
`. `'`
  `-  Debian - when you have better things to do than fixing a system
 
Invalid/expired PGP subkeys? Use subkeys.pgp.net as keyserver!


signature.asc
Description: Digital signature


Re: Limiting User Commands

2004-11-07 Thread John Hasler
Steve Kemp writes:
 If you give people the ability to upload CGI scripts, like the perl
 example you mention, you've already lost - a malicious user could compile
 some C code statically and exectute that remotely.

No need for C.  Perl suffices.
-- 
John Hasler


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: NFS-mounting crontabs

2004-11-07 Thread Michelle Konzack
Am 2004-11-07 01:12:49, schrieb Mark Ferlatte:

 Okay.  I guess my next question is: why do you want your user
 crontabs NFS
 mounted from your clients?  Since they are local configs, why not
 just let them
 be local?  If you feel that you have to backup your crontabs for each
 host,
 have a cronjob on each host that does a cp -a /var/spool/cron
 /mount/master/srv/var/spool/crontabs/$HOSTNAME, or whatever.

And if you have several workstations where you are working ?

OK, I have $USER crontabs in ~/.crontab which are loaded if I
user login. It is loaded from ~7.bash_profile.  Then I have a
cronjob which check whether the user is Loged-Out or not and
it removed the $USER crontab from /var/spool/crontabs. 

Greetings
Michelle

-- 
Linux-User #280138 with the Linux Counter, http://counter.li.org/ 
Michelle Konzack   Apt. 917  ICQ #328449886
   50, rue de Soultz MSM LinuxMichi
0033/3/8845235667100 Strasbourg/France   IRC #Debian (irc.icq.com)


signature.pgp
Description: Digital signature


Re: Limiting User Commands

2004-11-07 Thread Stephen Le
On Sun, 7 Nov 2004 14:14:16 +, Steve Kemp [EMAIL PROTECTED] wrote:
   Lots of people have commented already, but I've not seen any
  discussion on why you might want to do this.  What kind of bad
  commands are you trying to prevent?
 
   Most of the dangerous commands like fdisk, etc, will be handled
  by the existing permissions setup.

For example, as I mentioned in an earlier reply, I might not want
normal users to be able to run ftp, telnet, ssh, wget, gcc, or any
other number of commands. I still want users to be able to run the
bulk of the commands available on the system, though. I might also
want to allow another set of users to be able to run the commands
unavailable to normal users.

In other words, I'd like to restrict normal users more than the
default permissions setup.

-Stephen Le


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Limiting User Commands

2004-11-07 Thread Stephen Le
On Sun, 07 Nov 2004 10:10:31 -0600, John Hasler [EMAIL PROTECTED] wrote:
 Steve Kemp writes:
  If you give people the ability to upload CGI scripts, like the perl
  example you mention, you've already lost - a malicious user could compile
  some C code statically and exectute that remotely.
 
 No need for C.  Perl suffices.

I should be able to restrict a user's Perl scripts using Apache's
suEXEC. I don't see how a user would be able to remotely execute a
compiled C program outside of their priviledges.

-Stephen Le


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Limiting User Commands

2004-11-07 Thread Stephen Gran
This one time, at band camp, Stephen Le said:
 On Sun, 7 Nov 2004 14:14:16 +, Steve Kemp [EMAIL PROTECTED] wrote:
Lots of people have commented already, but I've not seen any
   discussion on why you might want to do this.  What kind of bad
   commands are you trying to prevent?
  
Most of the dangerous commands like fdisk, etc, will be handled
   by the existing permissions setup.
 
 For example, as I mentioned in an earlier reply, I might not want
 normal users to be able to run ftp, telnet, ssh, wget, gcc, or any
 other number of commands. I still want users to be able to run the
 bulk of the commands available on the system, though. I might also
 want to allow another set of users to be able to run the commands
 unavailable to normal users.

apt-get remove --purge ftp telnet wget gcc
rm /usr/bin/ssh /usr/bin/scp

I understand your point, but simply don't install the more dangerous
things before bending over backwards to make things difficult.  As with
services, programs not needed should just not be on a server.  Part of
my monthly audit of systems I look after is to make sure things like gcc
and a few others are not installed.

Note that neither my approach nor yours really stops someone who is
determined - all of the functionality of the above programs could be
replicated in perl, python, etc, so you've only made it difficult, not
impossible.  Then there is ~/bin, where users can stash anything they
like, if you don't also regularly search /home for questionable files.
Even mounting it noexec isn't really a help - perl /path/to/script works
as well as /lib/ld-linux.so.2 /path/to/binary

Does not help at all for your original problem, I'm afraid.  It looks to
me like what you want is filesystem acl's or SELinux to totally lock
things down, but others are going to be more helpful with those than I
will.
-- 
 -
|   ,''`.Stephen Gran |
|  : :' :[EMAIL PROTECTED] |
|  `. `'Debian user, admin, and developer |
|`- http://www.debian.org |
 -


pgpJS5Xf0lFOX.pgp
Description: PGP signature


Re: Limiting User Commands

2004-11-07 Thread Stephen Le
On Sun, 7 Nov 2004 14:41:42 -0500, Stephen Gran [EMAIL PROTECTED] wrote:
 apt-get remove --purge ftp telnet wget gcc
 rm /usr/bin/ssh /usr/bin/scp

Unfortunately, I can't do that since I still want some users to be
able to access those commands. I just want to restrict access to those
commands from most users. I could install those utilities into another
directory and set appropriate permissions, but I'd also like system
accounts to be able to use them, which complicates matters...
 
 Note that neither my approach nor yours really stops someone who is
 determined - all of the functionality of the above programs could be
 replicated in perl, python, etc, so you've only made it difficult, not
 impossible.  Then there is ~/bin, where users can stash anything they
 like, if you don't also regularly search /home for questionable files.
 Even mounting it noexec isn't really a help - perl /path/to/script works
 as well as /lib/ld-linux.so.2 /path/to/binary

I understand that users could still upload their own programs and run
them, but users will do so at the risk of account suspension.
 
 Does not help at all for your original problem, I'm afraid.  It looks to
 me like what you want is filesystem acl's or SELinux to totally lock
 things down, but others are going to be more helpful with those than I
 will.

Well, after a couple of people mentioned filesystem ACLs, I took a
look at them. They might be able to accomplish what I need, but I'll
have to read more of the documentation.

-Stephen Le


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Limiting User Commands

2004-11-07 Thread John Hasler
I wrote:
 No need for C.  Perl suffices.

Stephen Le writes:
 I should be able to restrict a user's Perl scripts using Apache's
 suEXEC. I don't see how a user would be able to remotely execute a
 compiled C program outside of their priviledges.

I meant that they can do anything with Perl that they can with C.
-- 
John Hasler


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Limiting User Commands

2004-11-07 Thread ea
 On Fri, Nov 05, 2004 at 07:53:33PM +0200, [EMAIL PROTECTED] wrote:
 In regards to the latter method, would it be possible for me to change
 the group ownership of the commands I don't want users to have access
 to
 and revoke execute permission from that group?

 Yes, you can make something like that: addgroup(access), then change
 groupname of commands that you want with that group (access), remember
 to
 remove execute/search by others from commands that are with
 group(access), also don't forget to add group(access) to every user that
 you want to have access to this commands.




 The only problem with this approach would be that you'd revoke it from
 system accounts too, not just your users. It might break in unexpected
 places.

 It seems to me that this should be possible with SELinux. What you need
 would be a role for your users where they are only able to run the
 commands you want them to run, whereas system accounts would remain
 unblocked.


You just need to add group(access) to that system accounts that you want
or that you think that they'll break in unexpected places... Don't you
think?




 --
  EARTH
  smog  |   bricks
  AIR  --  mud  -- FIRE
 soda water |   tequila
  WATER
  -- with thanks to fortune




--
SELLINET Internet Services Provider - http://www.sellinet.net/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



gateway to dial-up connections

2004-11-07 Thread Nathan Levy

  Hi all,

  I'm in trouble on setting up a gateway to diul-up
users. I'm using iptables with mstate module to
masquerade the clients' ip addresses.
  I have a RAS Server (Ikon 4400) that receives PPP
and PPPoE connections. The RAS's gateway is pointing
to the server i'm setting up.
  Now araises the question. When I connect using a
PPPoE connection, every website I try to connect works
fine, but when a user does a normal dial-up, some
sites simply don't open. Just seems to be openning.
  I thought it was a MTU problem. I changed the mtu at
the client side, for test purposes, but it failed
again.
  I Also ckecked the mtu values at the RAS for ppp and
pppoe connections. and both were 576
  I changed the RAS gateway to another machine with
slackware using ipfwadm and kernel 2.0. I didn't
setted up this machine. It is the old gateway of the
ras.
  So, After this change, all the clients (ppp + pppoe)
could browse the any website.
  Is that any tip or crick i'm missing to settup my
new gateway?
  Thanks in advance,

  Nathan Levy.





___ 
Yahoo! Acesso Grátis - Internet rápida e grátis. Instale o discador agora! 
http://br.acesso.yahoo.com/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



gateway to dial-up connections

2004-11-07 Thread Nathan Levy

  Hi all,

  I'm in trouble on setting up a gateway to diul-up
users. I'm using iptables with mstate module to
masquerade the clients' ip addresses.
  I have a RAS Server (Ikon 4400) that receives PPP
and PPPoE connections. The RAS's gateway is pointing
to the server i'm setting up.
  Now araises the question. When I connect using a
PPPoE connection, every website I try to connect works
fine, but when a user does a normal dial-up, some
sites simply don't open. Just seems to be openning.
  I thought it was a MTU problem. I changed the mtu at
the client side, for test purposes, but it failed
again.
  I Also ckecked the mtu values at the RAS for ppp and
pppoe connections. and both were 576
  I changed the RAS gateway to another machine with
slackware using ipfwadm and kernel 2.0. I didn't
setted up this machine. It is the old gateway of the
ras.
  So, After this change, all the clients (ppp + pppoe)
could browse the any website.
  Is that any tip or crick i'm missing to settup my
new gateway?
  Thanks in advance,

  Nathan Levy.





___ 
Yahoo! Acesso Grátis - Internet rápida e grátis. Instale o discador agora! 
http://br.acesso.yahoo.com/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



apt-cacher transition from apache to apache2

2004-11-07 Thread Alexandros Papadopoulos
[sent this to debian-user, got no suggestions - I hope this is not too 
OT on this list]

On a sarge system, I was using apt-cacher with apache. No problems 
there. Once I replaced apache with apache2, apt-cacher works but no 
longer accepts any configuration changes. I.e. 
changing /etc/apt-cacher/apt-cacher.conf and then reloading/restarting 
apache2 does not honor the changes.

I think it has something to do with the /etc/apt-cacher/apache.conf 
snippet which I need to install somewhere, but I have no idea where.

I checked what bug #250599 says about apache2, and my link does exist:

helios:/etc/apache2/mods-enabled# ls -l cgi.load
lrwxrwxrwx  1 root root 36 Oct 21 14:52 cgi.load 
- /etc/apache2/mods-available/cgi.load
helios:/etc/apache2/mods-enabled#

Could anyone suggest a fix?

Thanks

-A


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: apt-cacher transition from apache to apache2

2004-11-07 Thread martin f krafft
also sprach Alexandros Papadopoulos [EMAIL PROTECTED] [2004.11.08.0734 +0100]:
 changing /etc/apt-cacher/apt-cacher.conf and then
 reloading/restarting apache2 does not honor the changes.

Well, you should not need to restart apache2 since apt-cacher is
a CGI. Apparently, apache2 loads it permanently though, which is
news to me.

Does it work at all?

 I think it has something to do with the
 /etc/apt-cacher/apache.conf snippet which I need to install
 somewhere, but I have no idea where.

Leave it right there and 'include' it from the vhost definition.

-- 
Please do not send copies of list mail to me; I read the list!
 
 .''`. martin f. krafft [EMAIL PROTECTED]
: :'  :proud Debian developer, admin, user, and author
`. `'`
  `-  Debian - when you have better things to do than fixing a system
 
Invalid/expired PGP subkeys? Use subkeys.pgp.net as keyserver!


signature.asc
Description: Digital signature