Re: backup archive format saved to disk

2006-12-05 Thread Andrew Sackville-West
On Tue, Dec 05, 2006 at 06:58:35PM -0600, Mike McCarty wrote:
> Andrew Sackville-West wrote:
> >On Tue, Dec 05, 2006 at 07:08:54PM -0500, Douglas Tutty wrote:
> >
> >>Yes. But I don't want to loose any data at all.
> >
> >
> >there is no way to guarantee this. you could improve your odds by
> >having multiple storage locations with multiple copies and a rigorous
> >method for routinely testing the backup media for corruption and
> >making new replacement copies of the backups to prevent future loss. 
> >
> >For example, make multiple identical backups. sprinkle them in various
> >locations. on a periodic, routine basis, test those backups for
> >possible corruption. If their clean, make a new copy anyway to put in
> >rotation, throwing away the old ones after so many periods. If you
> 
> Respectfully, I disagree with this last recommendation. You are
> suggesting that he continually keep his backup media on the
> infant mortality portion of the Weibull distribution. The usual
> way for devices which are not subjected to periodic high stress
> to fail is to have an infant mortality rate which is high, but falls
> down to a low level, then begins to rise again with wearout. In this
> case, wearout would be eventual degradation of the metallization
> layer in the disc.
> 

good point and one I hadn't thought of, though its obvious now that
you mention it. I'm thinking of moldy floppies and aging cd's that
definitely fall apart over time with probably less of the typical
bathtub shape and more of a slippery slope... 

> >find a corrupt one, get one of your clean ones to reproduce it and
> >start over. 
> 
> Be sure to use an odd number of copies. Don't want no tied votes
> on whether a given bit is a 0 or a 1 :-)

:)

> 
> >there is now way, using only one physical storage medium, to guarantee
> >no loss of data. 
> 
> There is no way, using any number of physical storage media, to
> gurantee no loss of data.


absolutely right.

> 
> On any storage medium, if the probability of error in a data bit is less
> than 50%, then given any e > 0 there exists an FEC method which reduces
> the probability of data loss to be less than e.
> 
> If the probability of error on any given bit is greater than 50%,
> then there is no way, by adding additional information, to make
> the eventual error rate be less than a single copy. The additional
> bits are more likely to be in error than the original.
> 
> >maybe I;'m reading this wrong , but it seems to be what you're asking for.
> 
> There is no way to guarantee that every bit of computer information
> on the Earth is not destroyed by a comet strike :-)

That's why I'm hoping the universe is circular. I can catch the
broadcast on the way back ;-)

A

ps. Mike, I got one of those bounces the other day and the whois
pointed to US DOD servers. heh.



signature.asc
Description: Digital signature


Re: Unix socket question - TLS with Exim/Courier

2006-12-05 Thread Bill Moseley
On Tue, Dec 05, 2006 at 10:43:58PM -0800, Bill Moseley wrote:
> failed to connect to socket /var/run/courier/authdaemon/socket: Permission 
> denied

Oh, ran strace and can now see that the authdaemon directory is where
the permissions are not correct.

Lack of sleep doesn't always help with debugging.

Never mind. ;)

-- 
Bill Moseley
[EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Problem installing packages with apt-get, aptitude and dselect

2006-12-05 Thread Andrew Sackville-West
On Tue, Dec 05, 2006 at 08:05:23PM -0500, José Alburquerque wrote:
> Andrew Sackville-West wrote:
> >check out the package apt-listbugs. It puls down critical (and maybe
> >severe) bug reports and prompts you before installing packages. That's
> >how I saw the segfault bug in apt and held my apt and apt-utils at the
> >current version pending resolution. 
> >
> >A
> >  
> The funny thing is that I do have this package installed.  Don't know 
> why I didn't catch this bug.  When installation pauses because of a 
> pending bug, does that always mean that a package should not be installed?


well, you answered your own question, but here's what I do.

mostly I ignore anyhting marked as . Anything marked as
 (or other things, are there others?) I review carefully to
see if it applies on my system. Often, the bugs are for different
architectures or are things that aren't critical to me and I can
safely ignore them. In fact this apt bug is the first one (in about 6
months of using apt-listbugs) that gave me pause and caused me to hold
the package. 

so to answer your question again: no, just be cause a bug is listed
doesn't mean you shouldn't install it. youmust research it a bit.

I am curious what others do.

A


signature.asc
Description: Digital signature


Re: Something different -- playing with the Hurd

2006-12-05 Thread Andrew Sackville-West
On Tue, Dec 05, 2006 at 07:41:35PM -0600, Nate Bargmann wrote:
> Okay, so I'm bored.
> 
> Linux may be getting too complete, easy, and stable.  ;-)
> 
> So, what's a geek to do?  *BSD?  Nawww, too mature, and I don't like to
> wander too far away from the Debian community  (yes, there's Debian
> GNU/kFreeBSD, but...).  So, enter Debian GNU/HURD as an interesting
> diversion. 
> 
> It's not too problematic to get going, almost too easy as well, but no
> automatic installer and a bit of manual work is required.  A lot of
> Unstable seems to be working except for notably Aptitude.  Dselect is
> there.  Shudder!
> 
> There are rough edges as DHCP doesn't work so the network must be
> manually configured each time.  The Debian bits seem to be as easy as
> on Linux while the Hurd bits seem to be the most immature.
> 
> As I said, an interesting diversion and something different to learn
> about.  Anyone else giving the Hurd a spin?
> 
> - Nate >>

I've been thinking about it, but haven't had the time. Do you now have
a working install? how about X?

A


signature.asc
Description: Digital signature


Re: following recent upgrade

2006-12-05 Thread Richard A Nelson

On Tue, 5 Dec 2006, Tom Allison wrote:


ntpd returns a permission denied error!


All the files are ntp owned...


btdt :(

every time I've seen that, there have been multiple ntpd daemons running
- something in the postinst doesn't properly kill the prior daemon.

do `ps aux | grep ntpd` (or just killall ntpd) - make sure none are
about and then start it - it should now start fine

--
Rick Nelson
Avoid the Gates of Hell.  Use Linux
-- unknown source


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: Odd Gnome behavior

2006-12-05 Thread Liam O'Toole
On Tue, 05 Dec 2006 15:13:28 -0800
Freddy Freeloader <[EMAIL PROTECTED]> wrote:

> On Tue, 2006-12-05 at 22:35 +, Liam O'Toole wrote:
> > On Tue, 05 Dec 2006 13:41:54 -0800
> > Freddy Freeloader <[EMAIL PROTECTED]> wrote:
> > 
> > > Hi All,
> > > 
> > > I have run across an oddity in Gnome's behavior when running admin
> > > tools from the gui. 
> > > 
> > > If I run any of the tools found in the Desktop -> Administration
> > > menu, explicitly from that menu, Gnome asks me for the root
> > > password.  I enter the root password and it tells me I entered an
> > > invalid password. However, if I run any of those same admin tools
> > > from the Applications -> Debian -> Apps -> System menu Gnome
> > > accepts the root password and they run just fine.  
> > > 

[...]

> > 
> > Determine what commands are launched by the menu entries. You can do
> > this by right-clicking on a menu entry and choosing "Add this
> > launcher to desktop". You then right-click on the icon thus
> > created, choose "Properties", then "Launcher" to determine the
> > command. You should then be able to account for the observed
> > behaviour.
> > 

[...]

> 
> Thanks for your reply.  I already knew about the menu entry stuff, and
> had taken a look at it.  It all seems to be fine when compared to a
> computer that works normally.
> 

[...]

So can you reproduce the problem by issuing the relevant commands in a
terminal? That would be valuable information in a bug report ...

-- 

Liam


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Unix socket question - TLS with Exim/Courier

2006-12-05 Thread Bill Moseley
I'm missing something obvious here.

I have two Debian Stable boxes both running exim4-daemon-heavy
4.50-8sarge2 & courier-imap-ssl 3.0.8-4sarge5

One machine Exim can connect to the Courier authdaemon socket and the
other I get permission denied on the socket.  I have not been able to find the
difference between the two setups.


2006-12-05 21:56:19 plain_courier authenticator failed for (me) [192.168.1.2] 
U=moseley: 435 Unable to authenticate at present (set_id=moseley): failed to 
connect to socket /var/run/courier/authdaemon/socket: Permission denied


I'm not sure I understand socket permissions as the socket looks like
this:

ls -l /var/run/courier/authdaemon/socket
srwxrwxrwx  1 root root 0 Dec  5 22:20 /var/run/courier/authdaemon/socket

Exim is running as user Debian-exim on both machines, as normal.  The
Courier authdeamon is running as root.


I found one post[1] that said they had to add group "daemon" to
Debian-exim, but I don't understand why that would make a difference
-- I don't see where the socket is group "daemon".  Plus, on the
machine where it's working Debian-exim is not part of the daemon
group.

Anyone familiar with domain sockets and/or the Exim+Courier setup to
give me advice how to debug this?

Thanks,




[1] http://fplanque.net/Blog/devblog?cat=89




-- 
Bill Moseley
[EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Firefox crashing on gmail

2006-12-05 Thread Santanu Chatterjee

Hi Sridhar,

Does your firefox also crash on www.xilinx.com like mine?
I'm sure it does. If so, like I said in my earlier mail, we
definitely have the same problem.

After reading this thread, I searched for a solution with renewed
enthusiasm, and just now found this:
---
https://launchpad.net/distros/ubuntu/+source/firefox/+bug/27626
---
There someone mentioned that the problem occurs only with
DefaultDepth=16, not with 24bit depth. Sure enough, my xorg.conf
had "DefaultDepth 16", changed it to use 24 bit, and firefox works
normally now. In fact, I am writing this via gmail using firefox right
now.

I hope it solves your problem (although I have no idea what the reason
for the problem was or how to actually 'solve' the problem)

-Santanu


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: backup archive format saved to disk

2006-12-05 Thread Ron Johnson
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 12/05/06 21:43, Mike McCarty wrote:
> Douglas Tutty wrote:
>> On Tue, Dec 05, 2006 at 07:55:40PM -0600, Mike McCarty wrote:
>>> Douglas Tutty wrote:
 On Tue, Dec 05, 2006 at 06:57:38PM -0600, Ron Johnson wrote:
> [snip]
[snip]
> If in X years you plug the drive into your machine, and smoke
> pours out, you are going to have difficulty reading any medium
> you may put into it. You are banking on the format of the tape
> or whatever not changing in that time. If the format becomes
> obsolete, and your drive fails, then you are SOL.

Sadly, this is a perfect argument for why businesses go with
"popular" instead of "best": you can still buy 9-track tape drives
that read IBM and DEC formatted tapes, as well as 3480/3490 tapes
and DEC TK50 tapes.  There are a few companies that can even still
read DECtapes.

It's the esoteric stuff (3rd-tier and specialized equipment) that's
impossible to read now.

- --
Ron Johnson, Jr.
Jefferson LA  USA

Is "common sense" really valid?
For example, it is "common sense" to white-power racists that
whites are superior to blacks, and that those with brown skins
are mud people.
However, that "common sense" is obviously wrong.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFFdlgrS9HxQb37XmcRAnr1AKDckEcDRbVAq7IVFRZlztDpgqkeugCfQ3sc
tytX60C3sU2k+TfwPt3kgd4=
=r6NR
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Can't get etch rc1 kppp or ndiswrapper wireless to connect to the net.

2006-12-05 Thread heba

2006/12/5, Mike Carter <[EMAIL PROTECTED]>:

Hi,
kppp won't load as user but will as root, even so won't connect.
Ndiswrapper is loaded, states it is connected to lan but will not
connect to net.  Anyone have any ideas?  It is driving me crazy.  A
few weeks ago etch was working on the net.  Ndiswrapper fine, kppp
worked in root ethernet connection then and now works.
cheers





do you have the permiss "pid" at the user?

--
heba


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




mouse freaks out

2006-12-05 Thread Jason Dunsmore

My Logitech usb mouse (model M-BT96a) has a tendancy to freak out a
couple of times per hour.  When this happens, the mouse cursor
suddenly goes to one of the screen corners.  When I try to reorient
myself by moving the mouse to see where it went, the mouse moves
rapidly all over the screen.  Normality is restored about 3 seconds
after this happens.  I've tried three different Logitech mice, and
they all have this problem.  I'm using Enlightenment with Debian Etch
and kernel 2.6.16.13.  Any idea what the problem is?

Thanks,
Jason


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: postfix relay smtp authentication

2006-12-05 Thread Roberto C. Sanchez
On Tue, Dec 05, 2006 at 11:58:26PM -0500, T wrote:
> On Tue, 05 Dec 2006 21:27:45 -0600, Ron Johnson wrote:
> 
> >> # cat /etc/postfix/sasl_passwd
> >> upstream.mail.exchange[EMAIL PROTECTED]:password
> > 
> > Can you have multiple entries, one per user?
> 
> From
> http://www.k2.on.lk/fourm/viewtopic.php?t=30
> 
> "u can list many servers as you like with defrant passwords and usernames
> if you have tranport maps for domains"
> 
> But I don't understand what exactly does it means. :-(
> 

A transport map looks something like this:

server.tldsmtp:[upstream.mail.exchange]
.server.other.tld smtp:[other.mail.exchange]

What you are referring to is the ability to have something like this in
the sasl_passwd file:

upstream.mail.exchange[EMAIL PROTECTED]:password
other.mail.exchange   [EMAIL PROTECTED]:password

Where a different username/password is used for different mail servers.

Regards,

-Roberto
-- 
Roberto C. Sanchez
http://people.connexer.com/~roberto
http://www.connexer.com


signature.asc
Description: Digital signature


Re: postfix relay smtp authentication

2006-12-05 Thread Roberto C. Sanchez
On Tue, Dec 05, 2006 at 11:55:25PM -0500, T wrote:
> 
> what's the output of following command in your system?
> 
>  grep smtp_sasl /etc/postfix/main.cf
> 
$ grep smtp_sasl /etc/postfix/main.cf
smtp_sasl_auth_enable=yes
smtp_sasl_password_maps = hash:/etc/postfix/sasl_passwd
smtp_sasl_security_options =


Regards,

-Roberto

-- 
Roberto C. Sanchez
http://people.connexer.com/~roberto
http://www.connexer.com


signature.asc
Description: Digital signature


Re: backup archive format saved to disk

2006-12-05 Thread Mike McCarty

Douglas Tutty wrote:


If FEC is used on all media (except CDROM), is there any value in adding
my own FEC layer over top or should I just format the drive JFS and copy
my tar.bz2 backup file to it and be done?  (remembering that the drive in
the bank is only one of the sets of data I keep).


Only you can answer that question.

I didn't say that FEC isn't used on CDROMs, I said I don't know
whether it be used. It's something worth investigating, though!

Mike
--
p="p=%c%s%c;main(){printf(p,34,p,34);}";main(){printf(p,34,p,34);}
This message made from 100% recycled bits.
You have found the bank of Larn.
I can explain it for you, but I can't understand it for you.
I speak only for myself, and I am unanimous in that!


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: backup archive format saved to disk

2006-12-05 Thread Mike McCarty

Douglas Tutty wrote:

Thanks Mike,

If I can attempt to summarize a portion of what you said:

If the issue is resistance to data block errors, it doesn't
matter if I use a file system or not so I may as well use a file
system then if have difficulty, rip multiple copies of the file
system bit by bit and do majority rules.


Well, not quite. "Majority rules" is a simple BCH code which anyone
could do with a simple program. All you need is an odd number of
copies. The distance of the code is the number of copies, so the
number of correctable errors (per bit, I mean) is (n-1)/2. So, with
three copies, one can correct any single error, with five copies
one can correct double errors (in a single bit), etc. It's not
the most efficient, but it is very very simple.


There's a package (forget the name) that will do this
with files: take multiple damaged copies and make one
good copy if possible.


Multiple copies on a single medium are not, IMO, advisable. There are
errors which can occur which prevent reading a single bit anywhere.
If you sit on a CDROM, you may make it completely unreadable :-)


Does the kernel software-raid in raid1 do this?  Would there be any
advantage/disadvantage to putting three partitions on the drive and
setting them up as raid1? (and record the partition table [sfdisk -d]
separately)?


I am not familiar with the internals of Linux' software RAID.


Googling this topic, I find sporatic posts on different forums whishing
for something like this but there doesn't seem to be anything
off-the-shelf for linux.  It seems to be what the data security
companies get paid for (e.g. the veritas filesystem).  Do you know of
anything?


I have used Veritas on some telephony equipment, and it worked well
enough.


I understand you description of FEC and I guess that's what we're
talking about.  In the absence of a filesystem that does it, I want a
program that takes a data stream (e.g. a tar.bz2 archive) and imbeds FEC
data in it so it can be stored, then later can take that data and
generate the origional data stream.

>

Do I understand you correctly that the FEC-embedded data stream to be
effective will be three times the size of the input stream?


That is correct. The larger the Hamming distance used in the code, the
more redundancy is required. It is unfortunate that the very best codes
we have been able to design fall quite a bit short of what is the
theoretical limit, which is itself somewhat disappointing to those
with naive expectations. Generally, one uses about 1/3 data and 2/3
check bits.


Does it matter if this FEC data is embeddded with the data or appended?


Depends on what you mean by the question. First, you presuppose that
in an arbitrary code, the original data survive intact, and some
additional redundancy is added. This would be called a systematic
code. Not all codes are systematic, though the very best practical
block[1] codes we have can all be put into systematic form. The very
best block codes we've cooked up for experimentation purposes are *not*
systematic, and the original data do not survive in any distinct form
apart from the entire code word. IOW, in these codes there aren't
distinguishable "data bits" and "check bits", there are just
"code bits", and without going through the decoding process, there
is no simple way to get the data bits back. AFAIK, none of these
experimental codes has ever been applied in a practical system,
as coding and decoding are too problematic.[2] But they are much
more compact codes, and more closely approach the theoretical
limits on the total code word size required to achieve a given
degree of correction ability.

Second, one of the best ways to make a code which can correct
bursts as well as independent bit errors (many media are
susceptible to bursts) is to use interleaved codes.

Here's a simple example. Let's go back to the "transmit each bit
three times" example I gave of CDROMs. That code is an example
of an interleaved code, which is one of the reasons it has such
good burst correcting capabilities. If we used a non-interleaved
code, we would simply record each bit three times on the disc,
and let it span multiple discs. Then it would have single bit
correcting ability, but no burst correcting ability.

If, OTOH, we have three discs which are each a complete copy,
then we can recover from any single burst which is less or equal to
any single disc in length. This is an interleaved code.

If we use 5x transmission, we can recover from any double bit
error, and any burst of up to two bits as well. But if we use
5 separate discs, once again we can recover from any single burst
which spans up to two discs.

The code used on CDs for music are interleaved Reed-Solomon codes,
one used for "fingerprints" (local errors) and another which spans
about half the circumference for "track errors" or whatever they
are called. Long bursts, anyway. That's AIUI; I'm n

Re: postfix relay smtp authentication

2006-12-05 Thread T
On Tue, 05 Dec 2006 19:55:39 -0500, Roberto C. Sanchez wrote:

>> I have been succesfully running postfix on Sarge as a local mailserver 
>> relaying all outbound mail (from multiple internal accounts) to my ISP.
>> 
>> However my ISP has just decided to require SMTP authentication.
>> 
> 
> Here is what I have done when I had an ISP that required SMTP AUTH:
> 
> # cat /etc/postfix/sasl_passwd
> upstream.mail.exchange[EMAIL PROTECTED]:password
> 
> # grep -r sasl_passwd /etc/postfix/
> /etc/postfix/main.cf:smtp_sasl_password_maps = hash:/etc/postfix/sasl_passwd
> 
> Then, make sure to run:
> 
> # postmap hash:/etc/postfix/sasl_passwd

what's the output of following command in your system?

 grep smtp_sasl /etc/postfix/main.cf

-- 
Tong (remove underscore(s) to reply)
  http://xpt.sourceforge.net/



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: postfix relay smtp authentication

2006-12-05 Thread T
On Tue, 05 Dec 2006 21:27:45 -0600, Ron Johnson wrote:

>> # cat /etc/postfix/sasl_passwd
>> upstream.mail.exchange[EMAIL PROTECTED]:password
> 
> Can you have multiple entries, one per user?

From
http://www.k2.on.lk/fourm/viewtopic.php?t=30

"u can list many servers as you like with defrant passwords and usernames
if you have tranport maps for domains"

But I don't understand what exactly does it means. :-(

-- 
Tong (remove underscore(s) to reply)
  http://xpt.sourceforge.net/



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: postfix relay smtp authentication

2006-12-05 Thread T
On Tue, 05 Dec 2006 19:55:39 -0500, Roberto C. Sanchez wrote:

>> I have been succesfully running postfix on Sarge as a local mailserver 
>> relaying all outbound mail (from multiple internal accounts) to my ISP.
>> 
>> However my ISP has just decided to require SMTP authentication.
> [...]
> 
> Also, make sure that you have libsasl2-modules installed.

That's the only extra package required for the OP's change?

Do you have the following packages in the system as well?

 postfix-tls libsasl-modules-plain sasl-bin

thanks

-- 
Tong (remove underscore(s) to reply)
  http://xpt.sourceforge.net/



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



keyboard problems on boot

2006-12-05 Thread Jason Dunsmore

Hi, I'm using a Goldtouch 4200U usb keyboard with Debian Etch, kernel
2.6.16.13.  The keyboard layout resembles a laptop keyboard, with
about half of the keys on the right half having dual function as a
number pad.  When I first start the computer, those keys don't work on
the gdm login screen.  If I press the "Num Lock" key twice (on, then
off), all the keys work.  Any idea what the problem is?

Thanks,
Jason


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: backup archive format saved to disk

2006-12-05 Thread Douglas Tutty
On Tue, Dec 05, 2006 at 09:43:55PM -0600, Mike McCarty wrote:
 
> Yes, FEC is used on all modern technology data storage that I know of,
> with the possible exception of CDROMs. I haven't studied the low level
> data storage format they use to know whether they use any FEC when
> storing data as opposed to music. I know the music format uses nested
> Reed-Solomon codes. For all I know, the ISO format has FEC embedded
> in it as part of the FS, though I doubt it.

If FEC is used on all media (except CDROM), is there any value in adding
my own FEC layer over top or should I just format the drive JFS and copy
my tar.bz2 backup file to it and be done?  (remembering that the drive in
the bank is only one of the sets of data I keep).

> 
> >>>I'm focusing on the one-drive issue because this is one drive sitting in
> >>>a bank vault.  This is __archive__ (just like tape).  I have backup
> >>>procedures as a separate issue.  One of the places that backup data goes
> >>>to is the bank vault archive.
> >>
> >>If the issue is a drive, then you need more than one drive. If the
> >>drive itself fails, then you are SOL.
> >
> >So drive failures are atomic?  I.e. if in 5 years I go to read a drive
> 
> If in X years you plug the drive into your machine, and smoke
> pours out, you are going to have difficulty reading any medium
> you may put into it. You are banking on the format of the tape
> or whatever not changing in that time. If the format becomes
> obsolete, and your drive fails, then you are SOL.
> 

True.  
 
Thanks,

Doug.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: backup archive format saved to disk

2006-12-05 Thread Douglas Tutty
Thanks Mike,

If I can attempt to summarize a portion of what you said:

If the issue is resistance to data block errors, it doesn't
matter if I use a file system or not so I may as well use a file
system then if have difficulty, rip multiple copies of the file
system bit by bit and do majority rules.

There's a package (forget the name) that will do this
with files: take multiple damaged copies and make one
good copy if possible.


Does the kernel software-raid in raid1 do this?  Would there be any
advantage/disadvantage to putting three partitions on the drive and
setting them up as raid1? (and record the partition table [sfdisk -d]
separately)?


Googling this topic, I find sporatic posts on different forums whishing
for something like this but there doesn't seem to be anything
off-the-shelf for linux.  It seems to be what the data security
companies get paid for (e.g. the veritas filesystem).  Do you know of
anything?

I understand you description of FEC and I guess that's what we're
talking about.  In the absence of a filesystem that does it, I want a
program that takes a data stream (e.g. a tar.bz2 archive) and imbeds FEC
data in it so it can be stored, then later can take that data and
generate the origional data stream.

Do I understand you correctly that the FEC-embedded data stream to be
effective will be three times the size of the input stream?

Does it matter if this FEC data is embeddded with the data or appended?

If this doesn't exist for linux, do you know of any open-source
non-linux implementations that just need some type of porting?  I've
found a couple of technical papers discussing the algorithms
(Reed-Solomon) used in the par2 archive that I'll study.

Thanks,

Doug.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: backup archive format saved to disk

2006-12-05 Thread Mike McCarty

Douglas Tutty wrote:

On Tue, Dec 05, 2006 at 07:55:40PM -0600, Mike McCarty wrote:


Douglas Tutty wrote:


On Tue, Dec 05, 2006 at 06:57:38PM -0600, Ron Johnson wrote:

 



[snip]



I'm not complaining Mike.  Also, note who's saying what; there's a few
voices in this conversation.


Sorry, did I miss an attribution? If so, then I apologize.


Please don't take my questions the wrong way.
I am very gratefull for the wisdom.  I'm just trying to tease apart
where failures can occur and what can mitigate them.


Fair enough. See my other message which describes hypothetical
data recovery on a damaged set of CDROMs.


I guess I don't know what the question is.



Since I don't __know__ that it can, I'm assuming that it can't.  I'm
playing my own devils advocate and trying to find out how to plan to be
able to read successfully off a drive with bad blocks after years of
sitting on a shelf.


IF this is what your goal is, then, as I pointed out, you can implement
your own FEC.


Yes I could.  The origional question was to see if one existed already.


Yes, FEC is used on all modern technology data storage that I know of,
with the possible exception of CDROMs. I haven't studied the low level
data storage format they use to know whether they use any FEC when
storing data as opposed to music. I know the music format uses nested
Reed-Solomon codes. For all I know, the ISO format has FEC embedded
in it as part of the FS, though I doubt it.


I'm focusing on the one-drive issue because this is one drive sitting in
a bank vault.  This is __archive__ (just like tape).  I have backup
procedures as a separate issue.  One of the places that backup data goes
to is the bank vault archive.


If the issue is a drive, then you need more than one drive. If the
drive itself fails, then you are SOL.


So drive failures are atomic?  I.e. if in 5 years I go to read a drive


If in X years you plug the drive into your machine, and smoke
pours out, you are going to have difficulty reading any medium
you may put into it. You are banking on the format of the tape
or whatever not changing in that time. If the format becomes
obsolete, and your drive fails, then you are SOL.

[snip]


Hmm. You going to become an expert at designing ECC? I suggest you take
a course in abstract algebra first.



Can (or at least I used to be able to) do the algebra, but that's not
the issue.  There are programs like par2 that do the ECC stuff but put
it in separate files.  If I went that route, I just have to pack it all
together.


I don't understand that. It shouldn't matter where the correction bits
get stored, so long as the number of bits that get damaged is less than
what the code can correct.

Mike
--
p="p=%c%s%c;main(){printf(p,34,p,34);}";main(){printf(p,34,p,34);}
This message made from 100% recycled bits.
You have found the bank of Larn.
I can explain it for you, but I can't understand it for you.
I speak only for myself, and I am unanimous in that!


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: postfix relay smtp authentication

2006-12-05 Thread Roberto C. Sanchez
On Tue, Dec 05, 2006 at 09:27:45PM -0600, Ron Johnson wrote:
> On 12/05/06 18:55, Roberto C. Sanchez wrote:
> > 
> > Here is what I have done when I had an ISP that required SMTP AUTH:
> > 
> > # cat /etc/postfix/sasl_passwd
> > upstream.mail.exchange[EMAIL PROTECTED]:password
> 
> Can you have multiple entries, one per user?
> 
I don't think so.  You can check the docs to be sure, though.

> > # grep -r sasl_passwd /etc/postfix/
> > /etc/postfix/main.cf:smtp_sasl_password_maps = hash:/etc/postfix/sasl_passwd
> > 
> > Then, make sure to run:
> > 
> > # postmap hash:/etc/postfix/sasl_passwd
> > 
> > This should leave you with a file called /etc/postfix/sasl_passwd.db
> > which postfix which actually use as the source of the authentication
> > information.
> > 
> > Also, make sure that the sasl_passwd and sasl_passwd.db have mode 600
> 
> So the password would be in cleartext?
> 
Yes.  I'm not aware of another to do this, which is why I don't like it.

> > and that you have libsasl2-modules installed.
> 
Regards,

-Roberto

-- 
Roberto C. Sanchez
http://people.connexer.com/~roberto
http://www.connexer.com


signature.asc
Description: Digital signature


Re: Command Language Reference Book (Website)

2006-12-05 Thread Eric Cooper
On Tue, Dec 05, 2006 at 04:39:44PM -0800, Baz wrote:
>Hello.  Will someone please recommend a reference book (or website)
>about fundamental to mid-level command language (Unix/Linux/Debian)?

http://www.cactus.org/~dak/shellscript.html
http://www.google.com/search?q=bash+tutorial

-- 
Eric Cooper e c c @ c m u . e d u


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: using bootchart

2006-12-05 Thread Douglas Tutty
On Wed, Dec 06, 2006 at 10:54:24AM +0800, Yuwen Dai wrote:
> On 12/6/06, Douglas Tutty <[EMAIL PROTECTED]> wrote:
> >
> >On Wed, Dec 06, 2006 at 09:34:09AM +0800, Yuwen Dai wrote:
> >> Dear all,
> >>
> >> When I used bootchart to benchmark booting of Debian sarge, I found
> >> S40hotplug took nearly 15 seconds.  S40hotplug calls
> >{pci,usb,isapnp}.rc,
> >> and installing some modules.  Is there any way to reduce this time?
> >
> >Upgrade to Etch.
> >
> >My amd64 Athlon 3800+ with 1 GB ram, dual 80 GB SATA drives
> >raid1/lvm/JFS, goes from grub to login in 20 seconds.
> 
> 
> It's realy fast.  Have you optimize the boot process?
> 

No. Stock Debian Etch amd64.

> >Etch doesn't use hotplug.  It _must_ use udev.
> >
> >How long does your boot sequence take total and on what hardware?
> 
> 
> My computer is a Dell D600 laptop, with Intel pentium M processor 1.6Ghz,
> 1GB memory, 60GB ata hard disk.
> 
> The total time from init to gdm is 58 seconds.
>

I don't use gdm so when I say login I mean console login (although
startx startup is about 10 seconds).

I don't know about Pentium.  I went with AMD.

58 seconds is about what my 486 does.

Doug.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: backup archive format saved to disk

2006-12-05 Thread Ron Johnson
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 12/05/06 21:20, Ron Johnson wrote:
> On 12/05/06 19:33, Douglas Tutty wrote:
>>> On Tue, Dec 05, 2006 at 06:57:38PM -0600, Ron Johnson wrote:
>>>  > 
[snip]
>>> The question is, if a block is sucessfully written now, if the drive is
>>> not used for 5 years then a read is attempted, is the drive able to
>>> retreive that data using ECC (as a tape drive could)?
> 
> Mike is correct, disk drive blocks do have ECC.
> 
> Remember, though, that drives are delicate mechanisms, and so the
> problem I see is the lubricating oil possibly thickening, and thus
> the drive not spinning up properly.  Hopefully the bad spin-up would
> not cause the r/w head to gouge the platter.  Otherwise, the data
> could still be retrieved, easily, for a price, from a data recovery
> company.

Forgot to mention: for important data, we make multiple copies of
the data, so if one of the tapes has too many errors for the EDAC to
handle, the other tape hopefully won't be bad.

I'd do the same thing with disks.

- --
Ron Johnson, Jr.
Jefferson LA  USA

Is "common sense" really valid?
For example, it is "common sense" to white-power racists that
whites are superior to blacks, and that those with brown skins
are mud people.
However, that "common sense" is obviously wrong.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFFdjl2S9HxQb37XmcRAo07AJ0aNpxM6buYCerG3svIp6frmunHegCghvhZ
Bo+aCHk0fbq0fD29QmuimNc=
=Hzt/
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



dhcp3, assign IP based on client

2006-12-05 Thread michael
Hello,

I wondering if I can assign a specific IP to a machine based
on its name?
I realize this can be done with hardware ethernet address, but
I would prefer to use client-hostname if its even possible.

A regular machine connecting to the dhcp3 server will add an entry to
the dhcpd.leases file, something like:

lease 10.0.0.60 {
  starts 3 2006/12/06 02:45:05;
  ends 3 2006/12/06 04:25:05;
  binding state active;
  next binding state free;
  hardware ethernet 00:17:f2:eb:2a:f8;
  uid "\001\000\027\362\353*\370";
  client-hostname "laptop";
}

Any chance I can use the client-hostname line and say; if this line
equals "laptop" then give this machine an IP of 10.0.0.222 ?

Thanks,
Mike


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: what's the killer app for GNU/Linux systems?

2006-12-05 Thread Douglas Tutty
On Tue, Dec 05, 2006 at 08:45:51PM -0600, John Hasler wrote:
> Doug writes:
> > The difficulty is, having seen the code, how do I accomplish the same
> > thing without using hints inherent in your code.  Its like trying to
> > write a literature-research paper; having read a hundred articles, I have
> > to ensure that everything I say in my paper is either my own idea or is
> > properly referenced.
> 
> Copyright law does not require that.
> 
> > Therefore, I don't even want to read code that I'm not free to take ideas
> > from.
> 
> You _are_ free to take ideas from copyrighted code.  Copyright protects
> expression, not ideas.
> 

Legal or not, you can still get into hot water.  Just look at the
Davinchi Code court case where the authors of a scholary paper tried to
sue the authors of the book based on the use if _ideas_ in their paper.

It got thrown out and the publicity helped the book, but it was still
hot water.

Doug.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: postfix relay smtp authentication

2006-12-05 Thread Ron Johnson
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 12/05/06 18:55, Roberto C. Sanchez wrote:
> On Wed, Dec 06, 2006 at 12:13:26AM +0100, Martin Fuzzey wrote:
>> Hi,
>>
>> I have been succesfully running postfix on Sarge as a local mailserver 
>> relaying all outbound mail (from multiple internal accounts) to my ISP.
>>
>> However my ISP has just decided to require SMTP authentication.
>>
> 
> Here is what I have done when I had an ISP that required SMTP AUTH:
> 
> # cat /etc/postfix/sasl_passwd
> upstream.mail.exchange[EMAIL PROTECTED]:password

Can you have multiple entries, one per user?

> # grep -r sasl_passwd /etc/postfix/
> /etc/postfix/main.cf:smtp_sasl_password_maps = hash:/etc/postfix/sasl_passwd
> 
> Then, make sure to run:
> 
> # postmap hash:/etc/postfix/sasl_passwd
> 
> This should leave you with a file called /etc/postfix/sasl_passwd.db
> which postfix which actually use as the source of the authentication
> information.
> 
> Also, make sure that the sasl_passwd and sasl_passwd.db have mode 600

So the password would be in cleartext?

> and that you have libsasl2-modules installed.

- --
Ron Johnson, Jr.
Jefferson LA  USA

Is "common sense" really valid?
For example, it is "common sense" to white-power racists that
whites are superior to blacks, and that those with brown skins
are mud people.
However, that "common sense" is obviously wrong.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFFdjixS9HxQb37XmcRAqMRAKCIB3wkmh3NHiKpF26OeZZQiJTyfQCguDTK
bUB5ZbFClzHz7cA74+fSDPo=
=kzzP
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: backup archive format saved to disk

2006-12-05 Thread Ron Johnson
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 12/05/06 19:33, Douglas Tutty wrote:
> On Tue, Dec 05, 2006 at 06:57:38PM -0600, Ron Johnson wrote:
>  > 
>>> You could implement your own FEC. A very simple form of FEC is simply
>> Yes, but *why*?  Tape storage systems have been using ECC for decades.
>>
>> There's a whole lot of "Linux people" who's knowledge of computer
>> history seems to have started in 1991, and thus all the many lessons
>> learned in 30 years of computing are lost.
>>
>  
> Hi Ron,
> 
> I'm hoping someone who can remember computer history prior to 1991 can
> give some perspective.
> 
> It think (__please__ correct me if I'm wrong) that the tape systems had
> the ECC as part of the hardware.  Write a plain datastream to the drive
> and the drive did the ECC part transparent to the user.  Read the data
> and a bad block gets fixed by the hardware ECC.
> 
> I'm told that modern hard drives also do ECC but I can't find out how
> that is implemented.  I'm told that if a block starts to fail (whatever
> that means) then the data is transferred to a new unallocated block,
> transparent to the rest of the computer.  Only if the drive runs out of
> unallocated blocks does it give errors.
> 
> The question is, if a block is sucessfully written now, if the drive is
> not used for 5 years then a read is attempted, is the drive able to
> retreive that data using ECC (as a tape drive could)?

Mike is correct, disk drive blocks do have ECC.

Remember, though, that drives are delicate mechanisms, and so the
problem I see is the lubricating oil possibly thickening, and thus
the drive not spinning up properly.  Hopefully the bad spin-up would
not cause the r/w head to gouge the platter.  Otherwise, the data
could still be retrieved, easily, for a price, from a data recovery
company.

[snip]
> In the absence of an all-in-one archive format, I'll use tar (which can
> detect errors just not fix them) to take care of names, owners,
> permissions, etc.  Then that tar needs to be made ECC and compressed.
> If I want to throw in a monkey, I'll consider encryption.

Remember what "tar" means: Tape ARchive.  It's designed as a
container file.

OTOH, if you're backing up a hard disk, you could do file-by-file
backups, compressing the big, compressible files, and leaving alone
the not-so-compressible files.  Thus, if a sector goes blooey,
you've still got most of your data.

> Yes tape drives do that.  Its probably why they cost so much.  Hard

And lower production volumes.

> drives are much cheaper and are supposed to be able to hang on to their
> data (Seagate gives a 5 year warranty).  But having seagate give me a
> new drive when I can't get my data off after 4 years is cold comfort.  
> 
> The other problem with tapes is their fragility.  Drop a DLT and I'm
> told that its toast.  Put that tape in the drive and I'm told it can
> damage the drive.

We've used DLT drives for years, and never had that problem.

>   A laptop drive in a ruggedized enclosure is much more
> robust and has a wider environmental range.

Drop a HDD and you've got worse problems.

> Perhaps what I'm looking for doesn't exist.  If it doesn't, I'll start
> work on it.
> 
> As far as computer history prior to 1991, I could never get the hang of
> C.  I'll stick with fortran77.

Give me VAX COBOL.  But then, I've always been on the DP side.

- --
Ron Johnson, Jr.
Jefferson LA  USA

Is "common sense" really valid?
For example, it is "common sense" to white-power racists that
whites are superior to blacks, and that those with brown skins
are mud people.
However, that "common sense" is obviously wrong.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFFdjcNS9HxQb37XmcRAnHsAJ9c5OekXV/Q6K9DPIpWN7OZy4AQHACeKRQE
hlA1v/E/xXqysk0iholtU84=
=8624
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Firefox crashing on gmail

2006-12-05 Thread Sridhar M.A.
On Tue, Dec 05, 2006 at 06:53:06PM -0800, Scarletdown wrote:
   > 
   > To me, the most sensible solution is to set up an actual email client
   > (like Evolution, for example) to access your GMail account(s) via POP
   > and SMTP.  For receiving, the server is simply pop.gmail.com with SSL
   > Encryption and Password as the authentication type.
   > 
   > For sending, it is smtp.gmail.com, SSL Encryption, Authentication Type:
   > Plain
   > 
Problem is, what was normally working has begun crashing. We are
trying to look at a solution for that. Settinp up a mail retrieval and
forwarding system, though a solution for mail issues, is not the answer
I am looking at.

FWIW, the gmail notifier extension for firefox works without a problem.
The crash occurs when we try to read the mail. So far, the Inbox screen
is displayed and within a second or so the browser crashes :-(

I tried with swiftfox also. Same behaviour noticed. onqueror has not
crashed, but I do not get the enhanced view of gmail.

Thanks for your suggestion.

Regards,

-- 
Sridhar M.A. GPG KeyID : F6A35935
  Fingerprint: D172 22C4 7CDC D9CD 62B5  55C1 2A69 D5D8 F6A3 5935

Three o'clock in the afternoon is always just a little too late or a little
too early for anything you want to do.
-- Jean-Paul Sartre


signature.asc
Description: Digital signature


Re: backup archive format saved to disk

2006-12-05 Thread Mike McCarty

Douglas Tutty wrote:

On Tue, Dec 05, 2006 at 06:27:10PM -0600, Mike McCarty wrote:


Douglas Tutty wrote:




[snip]


One thing to bear in mind is that, no matter how good an FEC method
you use, you are going to have to store about 2x redundant data
to get anything out of it. IOW, the data + parity information is going
to be about 3x the size of the data alone for any reasonable ability
to correct anything.



Par2 seems to be able to do it at about 15%.  It comes down to number
theory and how many corrupted data blocks one needs to be able to
handle.  If 100 % of the data blocks are unavailable (worst case) then
you need 100% redundant data (i.e. raid1).  


15% to do what?

I have designed some BCH FEC codes for a few systems, so I think I
have a reasonable feel for what is involved.

What you describe is correct only if each bit has only three values:
0, 1, and missing. If the transmission channel can only change a bit
from 0 to missing, or 1 to missing, but no other values, then 100%
redundancy is adequate for single error correction. If other types of
damage may occur, then 100% redundancy is not adequate. A distance 2
code is adequate if the only changes the channel introduces is missing
bits. But if not all bits may be distinguished as damaged, then at least
a distance 3 code is required, which needs more than 100% redundancy.


Separate files suggests that it be on a file system, and we're back to
where we started since I haven't found a parfs.


I don't understand this statement. If you have a means to create FEC
checksums, and a way to store those, and a way to use the FEC checksums
along with a damaged copy of the file to reconstruct it, then why
do you need some special kind of FS to store it?



My statement referrs to using par2 which doesn't touch the input file(s)
but generates the error-corecting data as separate files.


Wherever they get stored is irrelevant, except insofar as it may aid
the code in burst detection and correction.


What does FEC stand for?  I think ECC stands for Error Checking and
Correcting.  


FEC = Forward Error Correction. When a transmission channel makes
error detection with request for retransmission infeasible (like
with space missions, or when the data are recorded, and no other
copy exists to use as a retransmission source, for examples) then
one uses some form of FEC. ECC = Error Correcting Code, which refers
to the code itself, not the technique. EDAC = Error Detection And
Correction, which refers to any number of techniques which may
include error detection with request for retransmit, or FEC,
for examples.


I suppose I could use par2 to create the ECC files, then feed the ECC
files one at a time, followed by the main data file, followed by the ECC
files again.


Why two copies of the FEC information?



What if two blocks on the drive fail, one containing data, the other
containing the ECC info?


Then the information in the check and data bits is used to correct them.

In a properly designed code the check bits are themselves part of the
correctable data, so that errors in them are correctable. The check bits
are not treated any diffferently from any other bits. They are all just
data. If the total number of bits which are damaged does not exceed
the ability of the code to correct, then they are all recovered.


I'll check out with my zip drive if I can write a tar file directly to
disk without a fs (unless someone knows the answer).


Why do you insist on not having a FS? Even if you don't have an FS,
I don't see why you want to separate the FEC information, unless you
don't have a program which can manage the information you're trying
to store. If that be the case, then the FEC information won't do
any good anyway.


I don't insist on not having a FS.  But how well does a FS work with bad
blocks cropped up?  If it doesn't encorporate ECC itself then it either
drops the data from the bad blocks or at worst can't be mounted.  The
question is, do I need a FS?  If I don't, isn't it just one more
potential point of failure?


How well does the disc work with bad blocks? If you have errors which
the disc itself cannot correct, then you are going to have to do
very low level recovery, indeed. That is why I suggested not doing that,
but rather use your own FEC, by having redundant copies of the entire
disc. In this wise, you don't have to go about trying to recover
whatever high level information may be on the disc, and fixing the
data storage format itself. If you do that, then it doesn't matter
whether there is a file system present, and if it is present whether
it can recover from corrupted blocks. You do the low level recovery,
then whatever data were on the discs it is recovered.

To put it another way, if the disc is unable to read its platters,
then it can't and you aren't going to get data, anyway, for those
sectors. It's better then, not to try to layer on top of something
that is going to lose large blocks by trying to do it on the
same device, 

Re: what's the killer app for GNU/Linux systems?

2006-12-05 Thread John Hasler
Doug writes:
> The difficulty is, having seen the code, how do I accomplish the same
> thing without using hints inherent in your code.  Its like trying to
> write a literature-research paper; having read a hundred articles, I have
> to ensure that everything I say in my paper is either my own idea or is
> properly referenced.

Copyright law does not require that.

> Therefore, I don't even want to read code that I'm not free to take ideas
> from.

You _are_ free to take ideas from copyrighted code.  Copyright protects
expression, not ideas.
-- 
John Hasler


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: using bootchart

2006-12-05 Thread Yuwen Dai

On 12/6/06, Douglas Tutty <[EMAIL PROTECTED]> wrote:


On Wed, Dec 06, 2006 at 09:34:09AM +0800, Yuwen Dai wrote:
> Dear all,
>
> When I used bootchart to benchmark booting of Debian sarge, I found
> S40hotplug took nearly 15 seconds.  S40hotplug calls
{pci,usb,isapnp}.rc,
> and installing some modules.  Is there any way to reduce this time?
Thanks
> in advance.

Upgrade to Etch.

My amd64 Athlon 3800+ with 1 GB ram, dual 80 GB SATA drives
raid1/lvm/JFS, goes from grub to login in 20 seconds.



It's realy fast.  Have you optimize the boot process?

Etch doesn't use hotplug.  It _must_ use udev.


How long does your boot sequence take total and on what hardware?



My computer is a Dell D600 laptop, with Intel pentium M processor 1.6Ghz,
1GB memory, 60GB ata hard disk.

The total time from init to gdm is 58 seconds.

Yuwen




Doug.



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact
[EMAIL PROTECTED]




Re: Firefox crashing on gmail

2006-12-05 Thread Scarletdown
On Tue, 2006-12-05 at 16:05 +0530, Sridhar M.A. wrote:
> Hello all,
> 
> since yesterday evening, firefox is crashing when I log on to the gmail
> account. This happens across all accounts on my box. I get the following
> message on the console after it crashes:
> 

To me, the most sensible solution is to set up an actual email client
(like Evolution, for example) to access your GMail account(s) via POP
and SMTP.  For receiving, the server is simply pop.gmail.com with SSL
Encryption and Password as the authentication type.

For sending, it is smtp.gmail.com, SSL Encryption, Authentication Type:
Plain




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Couldn't open directory /lib/modules/2.6.12: No such file or directory

2006-12-05 Thread KokHow.Teh
Hi;
I am using a debian linux-2.6.17 system to build a linux-2.6.x
(x = 12 or 9). After `make install` the newly built kernel, I could boot
up the new kernel without error. However, when I boot up the system back
to the original default linux-2.6.17, I am stumbled into the error above
and dropped into single user shell where I could type anything on the
keyboard now. My question is, what has gone wrong with any configuration
in /boot that could have miss-led the original default linux-2.6.17 to
load modules from the wrong directories; directories which are supposed
to be used by the respective linux kernel when it boots up?
Any insight is appreciated.

Thanks & Regards,
KH



Re: Problem installing packages with apt-get, aptitude and dselect

2006-12-05 Thread José Alburquerque

José Alburquerque wrote:
When installation pauses because of a pending bug, does that always 
mean that a package should not be installed?
Oops I didn't realize that the man page for apt-listbugs sort of 
explains it.  Never mind the simplistic question. :-)


--
Sincerely
Jose Alburquerque


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: what's the killer app for GNU/Linux systems?

2006-12-05 Thread John Hasler
Nate writes:
> I have no beef with automatic Copyright, I just claim it's useless.  Can
> you find any case law where automatic Copyright has been invoked?

Every case filed in the US under current copyright law.  Automatic
copyright is the only kind there is.

> Try releasing something into public and then trying to regain your
> Copyright in a couple of years if it gets wildly popular just because you
> changed your mind.

If you explicitly release it into the public domain you have licensed it.
If you "release" it with no license at all it will never become popular
because no one will distribute it.
-- 
John Hasler


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: using bootchart

2006-12-05 Thread Douglas Tutty
On Wed, Dec 06, 2006 at 09:34:09AM +0800, Yuwen Dai wrote:
> Dear all,
> 
> When I used bootchart to benchmark booting of Debian sarge, I found
> S40hotplug took nearly 15 seconds.  S40hotplug calls {pci,usb,isapnp}.rc,
> and installing some modules.  Is there any way to reduce this time? Thanks
> in advance.

Upgrade to Etch.  

My amd64 Athlon 3800+ with 1 GB ram, dual 80 GB SATA drives
raid1/lvm/JFS, goes from grub to login in 20 seconds.

Etch doesn't use hotplug.  It _must_ use udev.

How long does your boot sequence take total and on what hardware?

Doug.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: backup archive format saved to disk

2006-12-05 Thread Douglas Tutty
On Tue, Dec 05, 2006 at 07:55:40PM -0600, Mike McCarty wrote:
> Douglas Tutty wrote:
> >On Tue, Dec 05, 2006 at 06:57:38PM -0600, Ron Johnson wrote:
> > > 
> >
 
> >The question is, if a block is sucessfully written now, if the drive is
> >not used for 5 years then a read is attempted, is the drive able to
> >retreive that data using ECC (as a tape drive could)?
> 
> I thought the question was "How can I be sure I can get my data back?"
> So far, some people have suggested few techniques to accomplish that,
> but all I've seen is complaints in response.

I'm not complaining Mike.  Also, note who's saying what; there's a few
voices in this conversation.

Please don't take my questions the wrong way.
I am very gratefull for the wisdom.  I'm just trying to tease apart
where failures can occur and what can mitigate them.

> 
> I guess I don't know what the question is.
> 
> >Since I don't __know__ that it can, I'm assuming that it can't.  I'm
> >playing my own devils advocate and trying to find out how to plan to be
> >able to read successfully off a drive with bad blocks after years of
> >sitting on a shelf.
> 
> IF this is what your goal is, then, as I pointed out, you can implement
> your own FEC.
> 

Yes I could.  The origional question was to see if one existed already.

> >I'm focusing on the one-drive issue because this is one drive sitting in
> >a bank vault.  This is __archive__ (just like tape).  I have backup
> >procedures as a separate issue.  One of the places that backup data goes
> >to is the bank vault archive.
> 
> If the issue is a drive, then you need more than one drive. If the
> drive itself fails, then you are SOL.
> 

So drive failures are atomic?  I.e. if in 5 years I go to read a drive
and it has errors, everything is toast?  I'm wanting a data-stream
format (call it a file system, an archive format, whatever) that can
withstand those errors.

> >In the absence of an all-in-one archive format, I'll use tar (which can
> >detect errors just not fix them) to take care of names, owners,
> >permissions, etc.  Then that tar needs to be made ECC and compressed.
> >If I want to throw in a monkey, I'll consider encryption.
> >
> >Yes tape drives do that.  Its probably why they cost so much.  Hard
> >drives are much cheaper and are supposed to be able to hang on to their
> >data (Seagate gives a 5 year warranty).  But having seagate give me a
> >new drive when I can't get my data off after 4 years is cold comfort. 
> 
> Hard disc drives use FEC (usually a BCH 11 bit redundant code).
> If you want to be able to read more reliably than the FEC already
> present, you'll have to add your own.
> 
> >The other problem with tapes is their fragility.  Drop a DLT and I'm
> >told that its toast.  Put that tape in the drive and I'm told it can
> 
> The most common cause of that is edge damage.
> 
> >damage the drive.  A laptop drive in a ruggedized enclosure is much more
> >robust and has a wider environmental range.
> >
> >Perhaps what I'm looking for doesn't exist.  If it doesn't, I'll start
> >work on it.
> 
> Hmm. You going to become an expert at designing ECC? I suggest you take
> a course in abstract algebra first.
> 

Can (or at least I used to be able to) do the algebra, but that's not
the issue.  There are programs like par2 that do the ECC stuff but put
it in separate files.  If I went that route, I just have to pack it all
together.

> >As far as computer history prior to 1991, I could never get the hang of
> >C.  I'll stick with fortran77.
> 
> Which progamming language one uses is less important than the algorithm
> implemented.
> 
True.

Thanks.

Doug.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: apache2 memory footprint

2006-12-05 Thread Roberto C. Sanchez
On Tue, Dec 05, 2006 at 10:42:35AM -0800, Paul Yeatman wrote:
> Hi, I've recently noticed that two of the four apache2 processes I have
> running are consuming about 240Mb of memory each.  I'm not doing
> anything fancy.  A very basic, default web server.  I'm running Etch
> which is using apache 2.2.3-3.1.  I remember that new apache2 packages
> were recently released and I don't remember apache2 using this much
> memory previously.  I tried stopping the apache service and restarting
> it should something have been awry.  I am seeing tthe same memory usage,
> however, since restarting.  Is anyone else getting this?
> 

What modules are loaded?  Are you using mod_rewrite?  If so, are your
rules correct?  It is very easy to get mod_rewrite rules mixed up to the
point of having the server process chew up lots of memory.

Regards,

-Roberto
-- 
Roberto C. Sanchez
http://people.connexer.com/~roberto
http://www.connexer.com


signature.asc
Description: Digital signature


Re: postfix relay smtp authentication

2006-12-05 Thread Roberto C. Sanchez
On Wed, Dec 06, 2006 at 12:13:26AM +0100, Martin Fuzzey wrote:
> Hi,
> 
> I have been succesfully running postfix on Sarge as a local mailserver 
> relaying all outbound mail (from multiple internal accounts) to my ISP.
> 
> However my ISP has just decided to require SMTP authentication.
> 

Here is what I have done when I had an ISP that required SMTP AUTH:

# cat /etc/postfix/sasl_passwd
upstream.mail.exchange[EMAIL PROTECTED]:password

# grep -r sasl_passwd /etc/postfix/
/etc/postfix/main.cf:smtp_sasl_password_maps = hash:/etc/postfix/sasl_passwd

Then, make sure to run:

# postmap hash:/etc/postfix/sasl_passwd

This should leave you with a file called /etc/postfix/sasl_passwd.db
which postfix which actually use as the source of the authentication
information.

Also, make sure that the sasl_passwd and sasl_passwd.db have mode 600
and that you have libsasl2-modules installed.

Regards,

-Roberto

-- 
Roberto C. Sanchez
http://people.connexer.com/~roberto
http://www.connexer.com


signature.asc
Description: Digital signature


Re: signature invalid: BADSIG 010908312D230C5F Debian Archive Automatic Signing Key (2006)

2006-12-05 Thread Roberto C. Sanchez
On Sat, Dec 02, 2006 at 06:12:49PM -0500, Rick Thomas wrote:
> 
> Does anybody know why I'm getting this message when I do "aptitude  
> update"
> 
> >W: GPG error: http://mirrors.usc.edu etch Release: The following  
> >signatures were invalid: BADSIG 010908312D230C5F Debian Archive  
> >Automatic Signing Key (2006) <[EMAIL PROTECTED]>
> 
> A couple of days ago, I was getting the same message, but from  
> debian.lcs.mit.edu, instead of mirrors.usc.edu.  Both sites are in my  
> sources.list file.
> 

Please use Google.  There are probably thousands of hits discussion this
very problem.

Regards,

-Roberto

-- 
Roberto C. Sanchez
http://people.connexer.com/~roberto
http://www.connexer.com


signature.asc
Description: Digital signature


Re: what's the killer app for GNU/Linux systems?

2006-12-05 Thread Roberto C. Sanchez
On Tue, Dec 05, 2006 at 05:44:14PM -0700, Nate Duehr wrote:
> 
> I knew some pedantic schmuck would say that.
> 
> Pretend that I left those OFF the message, because trying to make the 
> point in the message is difficult without saying it explicitly, so just 
> use your tiny little imagination and pretend none of that explanation 
> was there).
> 
> Twit.
> 
Do you always feel compelled to be so abusive?  I think that he made his
point about your point quite elegantly.  Had you *not* had those
statements in your message, he would not have been able to assume that
he had rights to redistribute the code at all.

Regards,

-Robeto

-- 
Roberto C. Sanchez
http://people.connexer.com/~roberto
http://www.connexer.com


signature.asc
Description: Digital signature


Re: opening URLs in Firefox from Thunderbird using upstream programs

2006-12-05 Thread Roberto C. Sanchez
On Sun, Dec 03, 2006 at 05:38:33PM -0800, Marc Shapiro wrote:
> I am running Etch and want to continue to use the branded Firefox (2.0) 
> and Thunderbird.  I do not want to switch to Icedove and IceWeasel.  I 
> have been running the upstream Firefox 2.0 for a while, now, with no 
> problems.  When I switched from debian-thunderbird to the upstream 
> version (1.5.0.8) urls stopped opening in firefox.  They have, in fact, 
> stopped opening in anything.
> 
> I have made sure that /etc/alternatives/x-www-browser is pointing to the 
> proper firefox binary and I don't know what else to check.  I can not 
> find any configuration option, or preference, that says where links 
> should open, only where html attachments should open.  Can anyone tell 
> me what I am missing?
> 

Have you tried going into Firefox preferences and setting Firefox as the
default browser again?  When things got messed for me (using Debian
version on Sarge), I did that and everything went back to opening in
Firefox again.

Regards,

-Roberto

-- 
Roberto C. Sanchez
http://people.connexer.com/~roberto
http://www.connexer.com


signature.asc
Description: Digital signature


Re: Checking integrity of cached debs

2006-12-05 Thread Roberto C. Sanchez
On Sat, Dec 02, 2006 at 05:05:30PM -0500, Winston Smith wrote:
> Does apt-get check the integrity of cached debs before installing them?
> For example, if I did 
> 
> apt-get --download-only install 
> 
> which downloads the package to the file
> 
> /var/cache/apt/archives/.version.deb
> 
> but doesn't install it, and then sometime later, after the above file
> became corrupt because of a faulty hard drive, did
> 
> apt-get install 
> 
> (which required no new download because there is no version change) would
> the corruption be detected?
> 
> In other words, is the check done after the download, before the
> installation, or both? 
> 
Basically, yes.  The md5sum is stored by apt.  It checks the downloaded
deb before installing against the stored md5sum.

> Is there an easy way to check the integrity of cached debs and remove
> corrupt ones? Also, is there an easy way to check the integrity of the
> unchanging parts of installed packages?
> 
Try debsums.

Regards,

-Roberto

-- 
Roberto C. Sanchez
http://people.connexer.com/~roberto
http://www.connexer.com


signature.asc
Description: Digital signature


Re: following recent upgrade

2006-12-05 Thread Roberto C. Sanchez
On Tue, Dec 05, 2006 at 08:39:02PM -0500, Tom Allison wrote:
> ntpd returns a permission denied error!
> 
> 
> All the files are ntp owned...
> 
What is the exact message from the logs?  What happens if you stop it
and start it or restart it?

Regards,

-Roberto

-- 
Roberto C. Sanchez
http://people.connexer.com/~roberto
http://www.connexer.com


signature.asc
Description: Digital signature


Re: using bootchart

2006-12-05 Thread Roberto C. Sanchez
On Wed, Dec 06, 2006 at 09:34:09AM +0800, Yuwen Dai wrote:
> Dear all,
> 
> When I used bootchart to benchmark booting of Debian sarge, I found
> S40hotplug took nearly 15 seconds.  S40hotplug calls {pci,usb,isapnp}.rc,
> and installing some modules.  Is there any way to reduce this time? Thanks
> in advance.
> 

Don't reboot the machine.  Unless it is laptop, there isn't a really
compelling reason to power it down.

Regards,

-Roberto

-- 
Roberto C. Sanchez
http://people.connexer.com/~roberto
http://www.connexer.com


signature.asc
Description: Digital signature


Re: Command Language Reference Book (Website)

2006-12-05 Thread Roberto C. Sanchez
On Tue, Dec 05, 2006 at 04:39:44PM -0800, Baz wrote:
> Hello.  Will someone please recommend a reference book (or website) about
> fundamental to mid-level command language (Unix/Linux/Debian)?  Thanks.
> Sebastian
> 
If by command language you mean shell, then you need to pick a reference
that is specific to the shell you run (most likely bash).  I would
recommend the "Advance Bash-Scripting Guide":

http://tldp.org/LDP/abs/html/

Regards,

-Roberto

-- 
Roberto C. Sanchez
http://people.connexer.com/~roberto
http://www.connexer.com


signature.asc
Description: Digital signature


Re: what's the killer app for GNU/Linux systems?

2006-12-05 Thread Roberto C. Sanchez
On Tue, Dec 05, 2006 at 11:02:12AM -0700, Nate Duehr wrote:
> 
> Code does NOT inherently *require* licensing or Copyright.  You just 
> think it does.
> 
Except that code, like every other creative endeavor gains the benefit
of copyright on its creation.  You must explicitly uncopyright it, or
release it under license which allows free redistribution or
modification, or go one step further and place it into the public domain
(at least in places where such a thing as the public domain exists).

> What would you like me to send you?  A two line BASIC program?
> 
> 10 PRINT "HELLO"
> 20 GOTO 10
> 
> Look - there you go.  Free code.  No Copyright, no license.  Freely 
> distributed.
> 
Actually, you can make a reasonable argument that your code snippet is
in the public domain.  I wager that if you go back far enough you will
find a publication of that code which is old enough to be in the public
domain, or a previous release of it which is public domain.

> I would tell you to do with it what you wish, but that would insinuate 
> that you need to follow my wishes.  You don't.  It has no license or 
> copyright.  (Many countries call this "Public Domain".)  You may 
> incorporate my code into your own works freely without any encumberances 
> of any kind.  Enjoy.  Or don't.  Your choice.
> 
> Do you get it now?
> 
I think you fail to get it.  Without the statements in your previous
paragraph, I have no right to redistribute or modify and then
redistribute your creative work (not the little code snippet above, but
some original work which you create).

Regards,

-Roberto
-- 
Roberto C. Sanchez
http://people.connexer.com/~roberto
http://www.connexer.com


signature.asc
Description: Digital signature


Re: what's the killer app for GNU/Linux systems?

2006-12-05 Thread Douglas Tutty
On Tue, Dec 05, 2006 at 05:44:14PM -0700, Nate Duehr wrote:
> Douglas Tutty wrote:
> >On Tue, Dec 05, 2006 at 11:02:12AM -0700, Nate Duehr wrote:
 >>
> >>What would you like me to send you?  A two line BASIC program?
> >>
> >>10 PRINT "HELLO"
> >>20 GOTO 10
> >>
> >>Look - there you go.  Free code.  No Copyright, no license.  Freely 
> >>distributed.
> >
> >This would be your licence.  Thank you.
> >
> >>I would tell you to do with it what you wish, but that would insinuate 
> >>that you need to follow my wishes.  You don't.  It has no license or 
> >>copyright.  (Many countries call this "Public Domain".)  You may 
> >>incorporate my code into your own works freely without any encumberances 
> >>of any kind.  Enjoy.  Or don't.  Your choice.
> >>
> >
> >Clause two of your licence.  Thank you.
> 
> I knew some pedantic schmuck would say that.
> 
> Pretend that I left those OFF the message, because trying to make the 
> point in the message is difficult without saying it explicitly, so just 
> use your tiny little imagination and pretend none of that explanation 
> was there).
> 
> Twit.
> 
> Nate

LOL:-)

If those messages weren't there and the code was unique enough that it
represented some intelectual property, then I wouldn't touch it without
you permission.

The difficulty is, having seen the code, how do I accomplish the same
thing without using hints inherent in your code.  Its like trying to
write a literature-research paper; having read a hundred articles, I
have to ensure that everything I say in my paper is either my own idea
or is properly referenced.  It takes great disipline to ensure that a
bright idea at 9:00 in the morning isn't the result of reading something
at 2:00 in the morning that I forgot to cite.

Therefore, I don't even want to read code that I'm not free to take
ideas from.  

Doug.



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: backup archive format saved to disk

2006-12-05 Thread Mike McCarty

Douglas Tutty wrote:

On Tue, Dec 05, 2006 at 06:57:38PM -0600, Ron Johnson wrote:
 > 


You could implement your own FEC. A very simple form of FEC is simply


Yes, but *why*?  Tape storage systems have been using ECC for decades.

There's a whole lot of "Linux people" who's knowledge of computer
history seems to have started in 1991, and thus all the many lessons
learned in 30 years of computing are lost.



 
Hi Ron,


I'm hoping someone who can remember computer history prior to 1991 can
give some perspective.

It think (__please__ correct me if I'm wrong) that the tape systems had
the ECC as part of the hardware.  Write a plain datastream to the drive
and the drive did the ECC part transparent to the user.  Read the data
and a bad block gets fixed by the hardware ECC.


The 9 track tape drives had two forms of EDAC. One was the fact that
each byte was written with a 9th check bit, even parity IIRC, allowing
some detection, and some FEC on a block basis, IIRC.


I'm told that modern hard drives also do ECC but I can't find out how
that is implemented.  I'm told that if a block starts to fail (whatever
that means) then the data is transferred to a new unallocated block,
transparent to the rest of the computer.  Only if the drive runs out of
unallocated blocks does it give errors.


That's the way fixe discs work, usually with 11 bit BCH code, and also
the way DAT works. Whatever other tapes may be in use, I don't know what
they do. CDs also use some FEC (two Read-Solomon codes, one for
thumbprint correction, and one for long-burst errors), but I don't know
whether they do that when using a data format, as opposed to music.


The question is, if a block is sucessfully written now, if the drive is
not used for 5 years then a read is attempted, is the drive able to
retreive that data using ECC (as a tape drive could)?


I thought the question was "How can I be sure I can get my data back?"
So far, some people have suggested few techniques to accomplish that,
but all I've seen is complaints in response.

I guess I don't know what the question is.


Since I don't __know__ that it can, I'm assuming that it can't.  I'm
playing my own devils advocate and trying to find out how to plan to be
able to read successfully off a drive with bad blocks after years of
sitting on a shelf.


IF this is what your goal is, then, as I pointed out, you can implement
your own FEC.


I'm focusing on the one-drive issue because this is one drive sitting in
a bank vault.  This is __archive__ (just like tape).  I have backup
procedures as a separate issue.  One of the places that backup data goes
to is the bank vault archive.


If the issue is a drive, then you need more than one drive. If the
drive itself fails, then you are SOL.


In the absence of an all-in-one archive format, I'll use tar (which can
detect errors just not fix them) to take care of names, owners,
permissions, etc.  Then that tar needs to be made ECC and compressed.
If I want to throw in a monkey, I'll consider encryption.

Yes tape drives do that.  Its probably why they cost so much.  Hard
drives are much cheaper and are supposed to be able to hang on to their
data (Seagate gives a 5 year warranty).  But having seagate give me a
new drive when I can't get my data off after 4 years is cold comfort. 


Hard disc drives use FEC (usually a BCH 11 bit redundant code).
If you want to be able to read more reliably than the FEC already
present, you'll have to add your own.


The other problem with tapes is their fragility.  Drop a DLT and I'm
told that its toast.  Put that tape in the drive and I'm told it can


The most common cause of that is edge damage.


damage the drive.  A laptop drive in a ruggedized enclosure is much more
robust and has a wider environmental range.

Perhaps what I'm looking for doesn't exist.  If it doesn't, I'll start
work on it.


Hmm. You going to become an expert at designing ECC? I suggest you take
a course in abstract algebra first.


As far as computer history prior to 1991, I could never get the hang of
C.  I'll stick with fortran77.


Which progamming language one uses is less important than the algorithm
implemented.

Mike
--
p="p=%c%s%c;main(){printf(p,34,p,34);}";main(){printf(p,34,p,34);}
This message made from 100% recycled bits.
You have found the bank of Larn.
I can explain it for you, but I can't understand it for you.
I speak only for myself, and I am unanimous in that!


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: backup archive format saved to disk

2006-12-05 Thread Douglas Tutty
On Tue, Dec 05, 2006 at 06:27:10PM -0600, Mike McCarty wrote:
> Douglas Tutty wrote:
 
> >I've looked at par2.  It looks interesting.  For me, the question is how
> >to implement it for archiving onto a drive since the ECC data are
> >separate files rather than being included within one data stream.
> 
> You could implement your own FEC. A very simple form of FEC is simply
> three copies, which you can do by hand. Another possibility is simply
> have two copies of the BZ2 and read any bad blocks from the other
> copy. This corresponds more closely to the request retransmission
> model than FEC, but is reasonable in this circumstance.
> 
> One thing to bear in mind is that, no matter how good an FEC method
> you use, you are going to have to store about 2x redundant data
> to get anything out of it. IOW, the data + parity information is going
> to be about 3x the size of the data alone for any reasonable ability
> to correct anything.

Par2 seems to be able to do it at about 15%.  It comes down to number
theory and how many corrupted data blocks one needs to be able to
handle.  If 100 % of the data blocks are unavailable (worst case) then
you need 100% redundant data (i.e. raid1).  

> 
> >Separate files suggests that it be on a file system, and we're back to
> >where we started since I haven't found a parfs.
> 
> I don't understand this statement. If you have a means to create FEC
> checksums, and a way to store those, and a way to use the FEC checksums
> along with a damaged copy of the file to reconstruct it, then why
> do you need some special kind of FS to store it?

My statement referrs to using par2 which doesn't touch the input file(s)
but generates the error-corecting data as separate files.  

What does FEC stand for?  I think ECC stands for Error Checking and
Correcting.  

> 
> >I suppose I could use par2 to create the ECC files, then feed the ECC
> >files one at a time, followed by the main data file, followed by the ECC
> >files again.
> 
> Why two copies of the FEC information?
> 

What if two blocks on the drive fail, one containing data, the other
containing the ECC info?

> >I'll check out with my zip drive if I can write a tar file directly to
> >disk without a fs (unless someone knows the answer).
> 
> Why do you insist on not having a FS? Even if you don't have an FS,
> I don't see why you want to separate the FEC information, unless you
> don't have a program which can manage the information you're trying
> to store. If that be the case, then the FEC information won't do
> any good anyway.
>

I don't insist on not having a FS.  But how well does a FS work with bad
blocks cropped up?  If it doesn't encorporate ECC itself then it either
drops the data from the bad blocks or at worst can't be mounted.  The
question is, do I need a FS?  If I don't, isn't it just one more
potential point of failure?

Thank you all for the discussion.  

Doug.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: signature invalid: BADSIG 010908312D230C5F Debian Archive Automatic Signing Key (2006)

2006-12-05 Thread Rick Thomas


On Dec 2, 2006, at 6:12 PM, Rick Thomas wrote:



Does anybody know why I'm getting this message when I do "aptitude  
update"


W: GPG error: http://mirrors.usc.edu etch Release: The following  
signatures were invalid: BADSIG 010908312D230C5F Debian Archive  
Automatic Signing Key (2006) <[EMAIL PROTECTED]>


A couple of days ago, I was getting the same message, but from  
debian.lcs.mit.edu, instead of mirrors.usc.edu.  Both sites are in  
my sources.list file.


[EMAIL PROTECTED] wrote:


Have you tried installing:

http://packages.debian.org/unstable/misc/debian-archive-keyring




The error message has moved back to debian.lcs.mit.edu.  It's gone  
from mirrors.usc.edu for the time being.  By removing the mit site  
from my sources.list file I was able to do "aptitude update &&  
aptitude dist-upgrade" which updated the debian-archive-keyring  
package to the November 22, 2006 version.  But when I put the mit  
site back in, the error was still there.


Anybody got any ideas?

Rick


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Something different -- playing with the Hurd

2006-12-05 Thread Nate Bargmann
Okay, so I'm bored.

Linux may be getting too complete, easy, and stable.  ;-)

So, what's a geek to do?  *BSD?  Nawww, too mature, and I don't like to
wander too far away from the Debian community  (yes, there's Debian
GNU/kFreeBSD, but...).  So, enter Debian GNU/HURD as an interesting
diversion. 

It's not too problematic to get going, almost too easy as well, but no
automatic installer and a bit of manual work is required.  A lot of
Unstable seems to be working except for notably Aptitude.  Dselect is
there.  Shudder!

There are rough edges as DHCP doesn't work so the network must be
manually configured each time.  The Debian bits seem to be as easy as
on Linux while the Hurd bits seem to be the most immature.

As I said, an interesting diversion and something different to learn
about.  Anyone else giving the Hurd a spin?

- Nate >>

-- 
 Wireless | Amateur Radio Station N0NB  |  Successfully Microsoft
  Amateur radio exams; ham radio; Linux info @  | free since January 1998.
 http://www.qsl.net/n0nb/   |  "Debian, the choice of
 My Kawasaki KZ-650 SR @| a GNU generation!"
http://www.networksplus.net/n0nb/   |   http://www.debian.org


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



following recent upgrade

2006-12-05 Thread Tom Allison

ntpd returns a permission denied error!


All the files are ntp owned...


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




no bold font in X

2006-12-05 Thread Yuwen Dai

Dear all,

I found there're no bold fonts in someplace where they should appear.  For
example, the gmail, the new arrived emails use bold font.  Should I install
anything or do configuration?  My system is Debian Sarge.

Best regards,
Dai Yuwen


using bootchart

2006-12-05 Thread Yuwen Dai

Dear all,

When I used bootchart to benchmark booting of Debian sarge, I found
S40hotplug took nearly 15 seconds.  S40hotplug calls {pci,usb,isapnp}.rc,
and installing some modules.  Is there any way to reduce this time? Thanks
in advance.

Best regards,
Dai Yuwen


Re: backup archive format saved to disk

2006-12-05 Thread Douglas Tutty
On Tue, Dec 05, 2006 at 06:57:38PM -0600, Ron Johnson wrote:
 > 
> > You could implement your own FEC. A very simple form of FEC is simply
> 
> Yes, but *why*?  Tape storage systems have been using ECC for decades.
> 
> There's a whole lot of "Linux people" who's knowledge of computer
> history seems to have started in 1991, and thus all the many lessons
> learned in 30 years of computing are lost.
> 
 
Hi Ron,

I'm hoping someone who can remember computer history prior to 1991 can
give some perspective.

It think (__please__ correct me if I'm wrong) that the tape systems had
the ECC as part of the hardware.  Write a plain datastream to the drive
and the drive did the ECC part transparent to the user.  Read the data
and a bad block gets fixed by the hardware ECC.

I'm told that modern hard drives also do ECC but I can't find out how
that is implemented.  I'm told that if a block starts to fail (whatever
that means) then the data is transferred to a new unallocated block,
transparent to the rest of the computer.  Only if the drive runs out of
unallocated blocks does it give errors.

The question is, if a block is sucessfully written now, if the drive is
not used for 5 years then a read is attempted, is the drive able to
retreive that data using ECC (as a tape drive could)?

Since I don't __know__ that it can, I'm assuming that it can't.  I'm
playing my own devils advocate and trying to find out how to plan to be
able to read successfully off a drive with bad blocks after years of
sitting on a shelf.

I'm focusing on the one-drive issue because this is one drive sitting in
a bank vault.  This is __archive__ (just like tape).  I have backup
procedures as a separate issue.  One of the places that backup data goes
to is the bank vault archive.

In the absence of an all-in-one archive format, I'll use tar (which can
detect errors just not fix them) to take care of names, owners,
permissions, etc.  Then that tar needs to be made ECC and compressed.
If I want to throw in a monkey, I'll consider encryption.

Yes tape drives do that.  Its probably why they cost so much.  Hard
drives are much cheaper and are supposed to be able to hang on to their
data (Seagate gives a 5 year warranty).  But having seagate give me a
new drive when I can't get my data off after 4 years is cold comfort.  

The other problem with tapes is their fragility.  Drop a DLT and I'm
told that its toast.  Put that tape in the drive and I'm told it can
damage the drive.  A laptop drive in a ruggedized enclosure is much more
robust and has a wider environmental range.

Perhaps what I'm looking for doesn't exist.  If it doesn't, I'll start
work on it.

As far as computer history prior to 1991, I could never get the hang of
C.  I'll stick with fortran77.

Doug.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Firefox crashing on gmail

2006-12-05 Thread Sridhar M.A.
On Tue, Dec 05, 2006 at 10:35:36AM -0600, Hugo Vanwoerkom wrote:
   > 
   > Dumb question perhaps, but did you try running ldconfig? That is what is 
   > usually the prob if "they are there" and also "not found".
   > 
That was the first thing that I did once I saw the 'not found' messages. 
For completeness here is it again:

# ldconfig
# ldd firefox-bin | grep "found"
./firefox-bin: /usr/lib/libnss3.so: version `NSS_3.11.1' not found (required by 
./firefox-bin)
libmozjs.so => not found
libxpcom.so => not found
libxpcom_core.so => not found
libsmime3.so => not found
libssl3.so => not found
libsoftokn3.so => not found
libxpcom_compat.so => not found

Regards,

-- 
Sridhar M.A. GPG KeyID : F6A35935
  Fingerprint: D172 22C4 7CDC D9CD 62B5  55C1 2A69 D5D8 F6A3 5935

miracle:  an extremely outstanding or unusual event, thing, or accomplishment.
-- Webster's Dictionary


signature.asc
Description: Digital signature


APM no kernel support ? Use Software suspend 2 ? how ?

2006-12-05 Thread Cameron L. Spitzer
[This message has also been posted to linux.debian.user.]
I had sarge on a Compaq Armada 3500 notebook.  No ACPI,
but APM suspend to disk was working with an upstream
kernel with APM compiled in.
Fresh etch install on the same system, 2.6.17-2-686.
modprobe apm gives

apm: BIOS version 1.2 Flags 0x03 (Driver version 1.16ac)
apm: overridden by ACPI
FATAL: Error inserting apm ([path]/apm.ko) no such device."

I added acpi=off to the kernel command line in GRUB, but
I got ACPI anyway.
Is there some boot time kernel argument to shut off ACPI
in this kernel?  Should I use Software Suspend 2?
Is it in Debian's kernel already or do I have to make
my own?  There's a Debian page in the Suspend2 Wiki but
it was written when sarge was testing and it's not clear
what still applies.


Cameron




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: backup archive format saved to disk

2006-12-05 Thread Mike McCarty

Ron Johnson wrote:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 12/05/06 18:27, Mike McCarty wrote:




You could implement your own FEC. A very simple form of FEC is simply



Yes, but *why*?  Tape storage systems have been using ECC for decades.


You are the only one who can answer this question. AFAIK, tape systems
have *not* been using FEC. The systems I've used have implemented
ED, but not EDAC.


There's a whole lot of "Linux people" who's knowledge of computer
history seems to have started in 1991, and thus all the many lessons
learned in 30 years of computing are lost.


I can't help that.

How about stating some measureable goals in the form of requirements
instead of just complaining that some systems don't meeet your needs?
Then perhaps some of us could suggest possible solutions. At present,
I feel like whatever I suggest is going to be met with another objection
that an as-yet-unstated requirement is not being met.

You seem to have just added a requirement that what you use be something
which was used on tape before 1991.

Mike
--
p="p=%c%s%c;main(){printf(p,34,p,34);}";main(){printf(p,34,p,34);}
This message made from 100% recycled bits.
You have found the bank of Larn.
I can explain it for you, but I can't understand it for you.
I speak only for myself, and I am unanimous in that!


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: Problem installing packages with apt-get, aptitude and dselect

2006-12-05 Thread José Alburquerque

Andrew Sackville-West wrote:

check out the package apt-listbugs. It puls down critical (and maybe
severe) bug reports and prompts you before installing packages. That's
how I saw the segfault bug in apt and held my apt and apt-utils at the
current version pending resolution. 


A
  
The funny thing is that I do have this package installed.  Don't know 
why I didn't catch this bug.  When installation pauses because of a 
pending bug, does that always mean that a package should not be installed?


--
Sincerely
Jose Alburquerque


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: backup archive format saved to disk

2006-12-05 Thread Mike McCarty

Tyler MacDonald wrote:

[snip]


When the /dump partition starts to get a bit full somewhere, I
create a DVD image of some of the tarballs and burn off 4 copies. Two stay
at home, one goes to my friend that is managing the repo, and one gets
mailed to a friend in austria.


You are effectively using a BCH code with a Hamming distance of 2. This
same distance can be achieved with only three copies. Now, if you have
a way to know which copy got corrupted (IOW, you have three states
for any given bit: 0, 1, missing, as opposed to just 0, 1) then your
method is better, because correcting mising bits takes less information
than corrected corrupted bits. But if you have no way to detect missing
bits, then you are doing effectively no better than you could with just
three discs.

[snip]

Mike
--
p="p=%c%s%c;main(){printf(p,34,p,34);}";main(){printf(p,34,p,34);}
This message made from 100% recycled bits.
You have found the bank of Larn.
I can explain it for you, but I can't understand it for you.
I speak only for myself, and I am unanimous in that!


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: backup archive format saved to disk

2006-12-05 Thread Mike McCarty

Andrew Sackville-West wrote:

On Tue, Dec 05, 2006 at 07:08:54PM -0500, Douglas Tutty wrote:


Yes. But I don't want to loose any data at all.



there is no way to guarantee this. you could improve your odds by
having multiple storage locations with multiple copies and a rigorous
method for routinely testing the backup media for corruption and
making new replacement copies of the backups to prevent future loss. 


For example, make multiple identical backups. sprinkle them in various
locations. on a periodic, routine basis, test those backups for
possible corruption. If their clean, make a new copy anyway to put in
rotation, throwing away the old ones after so many periods. If you


Respectfully, I disagree with this last recommendation. You are
suggesting that he continually keep his backup media on the
infant mortality portion of the Weibull distribution. The usual
way for devices which are not subjected to periodic high stress
to fail is to have an infant mortality rate which is high, but falls
down to a low level, then begins to rise again with wearout. In this
case, wearout would be eventual degradation of the metallization
layer in the disc.


find a corrupt one, get one of your clean ones to reproduce it and
start over. 


Be sure to use an odd number of copies. Don't want no tied votes
on whether a given bit is a 0 or a 1 :-)


there is now way, using only one physical storage medium, to guarantee
no loss of data. 


There is no way, using any number of physical storage media, to
gurantee no loss of data.

On any storage medium, if the probability of error in a data bit is less
than 50%, then given any e > 0 there exists an FEC method which reduces
the probability of data loss to be less than e.

If the probability of error on any given bit is greater than 50%,
then there is no way, by adding additional information, to make
the eventual error rate be less than a single copy. The additional
bits are more likely to be in error than the original.


maybe I;'m reading this wrong , but it seems to be what you're asking for.


There is no way to guarantee that every bit of computer information
on the Earth is not destroyed by a comet strike :-)

Mike
--
p="p=%c%s%c;main(){printf(p,34,p,34);}";main(){printf(p,34,p,34);}
This message made from 100% recycled bits.
You have found the bank of Larn.
I can explain it for you, but I can't understand it for you.
I speak only for myself, and I am unanimous in that!


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: backup archive format saved to disk

2006-12-05 Thread Ron Johnson
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 12/05/06 18:27, Mike McCarty wrote:
> Douglas Tutty wrote:
>> On Tue, Dec 05, 2006 at 05:47:23PM -0600, Mike McCarty wrote:
>>> Johannes Wiedersich wrote:
 Douglas Tutty wrote:
> I'm going to be backing up to a portable ruggedized hard drive.
> Currently, my backups end up in tar.bz2 format.
> [snip]
[snip]
>>> [snip]
[snip]
>> I've looked at par2.  It looks interesting.  For me, the question is how
>> to implement it for archiving onto a drive since the ECC data are
>> separate files rather than being included within one data stream.
> 
> You could implement your own FEC. A very simple form of FEC is simply

Yes, but *why*?  Tape storage systems have been using ECC for decades.

There's a whole lot of "Linux people" who's knowledge of computer
history seems to have started in 1991, and thus all the many lessons
learned in 30 years of computing are lost.

- --
Ron Johnson, Jr.
Jefferson LA  USA

Is "common sense" really valid?
For example, it is "common sense" to white-power racists that
whites are superior to blacks, and that those with brown skins
are mud people.
However, that "common sense" is obviously wrong.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFFdhWCS9HxQb37XmcRAqfhAKCVL2+Da0wBAI9FCvNDvXPCfbB+7QCgz+kx
IFQUOeS/tHQ+WptZkwapY0s=
=hXfa
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: what's the killer app for GNU/Linux systems?

2006-12-05 Thread John Hasler
Andrew Sackville-West writes:
> you release code anonymously into public domain. companyA sees that code,
> likes it, grabs it, incorporates it, copyrights and distributes it in a
> closed source application. this of course is their right as there are no
> licenses or rights attached to the code.  simultaneously, userB sees it,
> grabs it, incorporates it, and releases it under gpl. later, companyA,
> having lost track of how it got the code, sees it in userB's gpl code and
> sues userB claiming that they stole it, violated companyA's
> copyright. userB ends up in court trying to defend themselves. If there
> is no other record available of this code being in public domain, nor any
> clear release from the author, then userB is effectively screwed.

CompanyA has to show that userB had access to their source code.  Copyright
is not patent. 
-- 
John Hasler


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: what's the killer app for GNU/Linux systems?

2006-12-05 Thread Nate Duehr

John Hasler wrote:


Copyright law is what it is, not what we want it to be.


Agreed, but that doesn't require us to pay any attention to it, or give 
it more than it deserves.


Nate


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: what's the killer app for GNU/Linux systems?

2006-12-05 Thread Nate Duehr

Douglas Tutty wrote:

On Tue, Dec 05, 2006 at 03:03:53PM -0700, Nate Duehr wrote:
Thus, copyright in the real world only matters if the author chooses to 
exercise it.


Since copywrite exists unless released within a licence, who would want
to open themselves (or their company) to the risk of a legal battle, or
tarnishing of a reputation.


Their view of the real risks are skewed then.  Ask any company who's put 
GPL'ed code inside a product and gotten away with it because no one 
could tell it was there.  You naive enough to think that hasn't, and 
isn't happening daily?  Do those people give a whit about the license or 
the Copyright?  Nope.  Do they just have a copy of the code.  Yep.


You (as copyright holder) have to prove they're using your code.  (Re: 
SCO.)  You can't prove it, then what good did your automatic Copyright 
do for you?  Absolutely nothing.


By your definition, you could have hit reply with quoting turned on in 
your MUA to my code example I sent -- and then you would have been a law 
breaker!




No.  The forums are clearly stated on the web-site (not just assumed by
the culture) that they and anything posted to them are public.  This
releases the rest of us from liability if we redistribute your code.


Where?  What forum?  This is a mailing list you can sign up for without 
ever seeing a web page.


I could start sprinkling code into my signature line and then sue 
everyone who quotes it on a mailing list?  Yeah, right.  It'd actually 
be fun to see someone try that and see how far it got in the legal system.


You obviously don't agree with automatic copyright.  However, to change
it you would have to change international law.


I have no beef with automatic Copyright, I just claim it's useless.  Can 
you find any case law where automatic Copyright has been invoked?


Try releasing something into public and then trying to regain your 
Copyright in a couple of years if it gets wildly popular just because 
you changed your mind.  Won't happen.  Most Judges just aren't that stupid.


Nate


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: what's the killer app for GNU/Linux systems?

2006-12-05 Thread Nate Duehr

Douglas Tutty wrote:

On Tue, Dec 05, 2006 at 11:02:12AM -0700, Nate Duehr wrote:

Roberto C. Sanchez wrote:

On Fri, Dec 01, 2006 at 09:52:16PM -0700, Nate Duehr wrote:
 
I can send you some non-GPL'ed non-Copyrighted code right now.  Would 
you like some?


You're adding things that simply don't need to exist.  They *do* exist 
for *some* code, including GPL'ed code, but licensing of ANY sort 
(including Copyright, which is nothing more than another contrived 
license allowed by law in many places) *restricts* the use of code in 
some fashion.  The only truly FREE code is code without any license at all.


Code does NOT inherently *require* licensing or Copyright.  You just 
think it does.


What would you like me to send you?  A two line BASIC program?

10 PRINT "HELLO"
20 GOTO 10

Look - there you go.  Free code.  No Copyright, no license.  Freely 
distributed.


This would be your licence.  Thank you.

I would tell you to do with it what you wish, but that would insinuate 
that you need to follow my wishes.  You don't.  It has no license or 
copyright.  (Many countries call this "Public Domain".)  You may 
incorporate my code into your own works freely without any encumberances 
of any kind.  Enjoy.  Or don't.  Your choice.




Clause two of your licence.  Thank you.


I knew some pedantic schmuck would say that.

Pretend that I left those OFF the message, because trying to make the 
point in the message is difficult without saying it explicitly, so just 
use your tiny little imagination and pretend none of that explanation 
was there).


Twit.

Nate


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: Installation process Debian Etch

2006-12-05 Thread aa dd




Date: Sun, 03 Dec 2006 14:56:01 Magnus Pedersen wrote:

aa dd wrote:

I want to install debian etch. Now installation process
is asking for domain name, what should I give? I don't
have a domain setup. I've 4 winxp computers under a
workgorup named Workgroup. So do I keep the field for
domain name empty in the installation process? If i
use a madeup domain, do i have to do anything special
to my winxp computers' settings in order to share files?
I'm asking this because the installation also says that
I've to use that same domain name to all my windows
computers. Thanks.


Just leave it empty.


Thanks Magnus.

--S.R.

_
Enter the "Telus Mobility Xbox a Day" contest for your chance to WIN!  Telus 
Mobility is giving away an Microsoft Xbox® 360 every day from November 20 to 
December 31, 2006! Just download Windows Live (MSN) Messenger to your 
IM-capable TELUS mobile phone, and you could be a winner!  
http://www.telusmobility.com/msnxbox/



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Command Language Reference Book (Website)

2006-12-05 Thread Baz

Hello.  Will someone please recommend a reference book (or website) about
fundamental to mid-level command language (Unix/Linux/Debian)?  Thanks.
Sebastian

"...heart and soulone will burn."
- Joy Division


Re: what's the killer app for GNU/Linux systems?

2006-12-05 Thread John Hasler
Douglas Tutty writes:
> No.  The forums are clearly stated on the web-site (not just assumed by
> the culture) that they and anything posted to them are public.  This
> releases the rest of us from liability if we redistribute your code.

I don't think it does.  We are free to download the code and read it and
probably run it, but I don't see how we get any distribution rights.

Nate Duehr wrote:
> I could start sprinkling code into my signature line and then sue
> everyone who quotes it on a mailing list?  Yeah, right.  It'd actually be
> fun to see someone try that and see how far it got in the legal system.

There is clearly an implied license (in addition to fair use) to quote such
things.  However, if there was enough code to qualify for copyright
protection you might very well be able to prevent me from selling copies of
it.

Copyright law is what it is, not what we want it to be.
-- 
John Hasler


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Mozilla resolving host problem

2006-12-05 Thread David Shultz

On 12/2/06, David Shultz <[EMAIL PROTECTED]> wrote:


Whenever  I browse any website, mozilla says
"Resolving www.google.com" and waits for about
15 seconds to resolve the host. I've disabled
ipv6 but the problem is still there. Also I've
checked the isp nameserver and they are fine.
Does anyone has the same problem?




First of all I apologize for late reply. I messed up
my system so had to reinstall everything. Sorry about
that. After reinstall everything is working fine now.
Don't have that delay. If anything goes wrong, I'll
post back later. Again thanks to all for helping me.

--David


Re: can't boot with Spurious ACK with kernel 2.6.19

2006-12-05 Thread Bernd Prager
On Tue, Dec 05, 2006 at 10:09:00AM -0500, bernd wrote:
> I'm trying to upgrade my Debian box to kernel 1.6.19.
> The boot process immediatly locks in a loop with the message:
> "atkbd.c: Spurious ACK on isa0060/serio0. Some program might be trying access 
> hardware directly."
> 
> The box is running fine with kernel 1.6.18.4.
> Did anybody discovered similar issues ar have any ideas on how to solve that?
> 
> Here's my BIOS information based on dmidecode:
> 
> BIOS Information
> Vendor: Phoenix Technologies, LTD
> Version: 6.00 PG
> Release Date: 08/19/2003
> Address: 0xE
> Runtime Size: 128 kB
> ROM Size: 512 kB
> Characteristics:
> ISA is supported
> PCI is supported
> PNP is supported
> APM is supported
> BIOS is upgradeable
> BIOS shadowing is allowed
> ESCD support is available
> Boot from CD is supported
> Selectable boot is supported
> BIOS ROM is socketed
> EDD is supported
> 5.25"/360 KB floppy services are supported (int 13h)
> 5.25"/1.2 MB floppy services are supported (int 13h)
> 3.5"/720 KB floppy services are supported (int 13h)
> 3.5"/2.88 MB floppy services are supported (int 13h)
> Print screen service is supported (int 5h)
> 8042 keyboard services are supported (int 9h)
> Serial services are supported (int 14h)
> Printer services are supported (int 17h)
> CGA/mono video services are supported (int 10h)
> ACPI is supported
> USB legacy is supported
> AGP is supported
> LS-120 boot is supported
> ATAPI Zip drive boot is supported
> 
> ( .. more info available if useful ..)
> 
Based on the email "xtables/iptables and atkbd.c Spurious ACK on 
isa0060/serio0" from [EMAIL PROTECTED] I checked my configuration. And yes, I 
have CONFIG_NETFILTER_XTABLES=m and CONFIG_IP_NF_IPTABLES=m as well.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: backup archive format saved to disk

2006-12-05 Thread Tyler MacDonald
Andrew Sackville-West <[EMAIL PROTECTED]> wrote:
> For example, make multiple identical backups. sprinkle them in various
> locations. on a periodic, routine basis, test those backups for
> possible corruption. If their clean, make a new copy anyway to put in
> rotation, throwing away the old ones after so many periods. If you
> find a corrupt one, get one of your clean ones to reproduce it and
> start over. 

Here's what I do with my systems:

I use backup2l to make incremental backups to a partition in /dump.
These backups are then GPG-encrypted, with the key of the owner of each
server. They are then rsynced to a central repository on one of the servers,
and from there rsynced down to my home system.

So each server's backup data is always in three locations: It's own
machine, the repo, and my home machine.

When the /dump partition starts to get a bit full somewhere, I
create a DVD image of some of the tarballs and burn off 4 copies. Two stay
at home, one goes to my friend that is managing the repo, and one gets
mailed to a friend in austria.

This system works well, but that's mainly because we have less than
300GB of data that needs to be backed up and we have long backup cycles -- a
new level-1 backup is generated maybe once every six months.

If anyone wants to check out the backup2l.conf and associated files,
let me know and I'll send it to you off-list.

Cheers,
Tyler


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: backup archive format saved to disk

2006-12-05 Thread Mike McCarty

Douglas Tutty wrote:

On Tue, Dec 05, 2006 at 05:47:23PM -0600, Mike McCarty wrote:


Johannes Wiedersich wrote:


Douglas Tutty wrote:



I'm going to be backing up to a portable ruggedized hard drive.
Currently, my backups end up in tar.bz2 format.


[snip]



Now, to something completely different
If data integrity is your concern, than maybe a better solution than
compression is to copy all your data with rsync or another backup tool
that 'mirrors' your files instead of packing them all together in one
large file. If something goes wrong with this large file you might loose
the backup of all your files. If something goes wrong with the


[snip]

My understanding of the BZ2 format is that it compresses individual
blocks independently, and that the loss of a block will not compromize
the entire archive, only those files which are contained in a given
block.



Yes. But I don't want to loose any data at all.


Of course not. I was responding to Johannes' statement that one
risks entire loss. This is true with, for example, gzip of a tar,
but not with bzip2.


I've looked at par2.  It looks interesting.  For me, the question is how
to implement it for archiving onto a drive since the ECC data are
separate files rather than being included within one data stream.


You could implement your own FEC. A very simple form of FEC is simply
three copies, which you can do by hand. Another possibility is simply
have two copies of the BZ2 and read any bad blocks from the other
copy. This corresponds more closely to the request retransmission
model than FEC, but is reasonable in this circumstance.

One thing to bear in mind is that, no matter how good an FEC method
you use, you are going to have to store about 2x redundant data
to get anything out of it. IOW, the data + parity information is going
to be about 3x the size of the data alone for any reasonable ability
to correct anything.


Separate files suggests that it be on a file system, and we're back to
where we started since I haven't found a parfs.


I don't understand this statement. If you have a means to create FEC
checksums, and a way to store those, and a way to use the FEC checksums
along with a damaged copy of the file to reconstruct it, then why
do you need some special kind of FS to store it?


I suppose I could use par2 to create the ECC files, then feed the ECC
files one at a time, followed by the main data file, followed by the ECC
files again.


Why two copies of the FEC information?


I'll check out with my zip drive if I can write a tar file directly to
disk without a fs (unless someone knows the answer).


Why do you insist on not having a FS? Even if you don't have an FS,
I don't see why you want to separate the FEC information, unless you
don't have a program which can manage the information you're trying
to store. If that be the case, then the FEC information won't do
any good anyway.

Mike
--
p="p=%c%s%c;main(){printf(p,34,p,34);}";main(){printf(p,34,p,34);}
This message made from 100% recycled bits.
You have found the bank of Larn.
I can explain it for you, but I can't understand it for you.
I speak only for myself, and I am unanimous in that!


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: Bad mirror error during network installation

2006-12-05 Thread Andrew Sackville-West
On Tue, Dec 05, 2006 at 06:56:12PM -0500, Wayne Topa wrote:
> 
> Today  the best one [1], for me, keeps dropping out while I'm 
> upgraiding.
> 
> [1] debian.fifi.org


I use debian.midco.net and it always works great for me. 

check out apt-spy.

A


signature.asc
Description: Digital signature


Re: backup archive format saved to disk

2006-12-05 Thread Andrew Sackville-West
On Tue, Dec 05, 2006 at 07:08:54PM -0500, Douglas Tutty wrote:
> 
> Yes. But I don't want to loose any data at all.

there is no way to guarantee this. you could improve your odds by
having multiple storage locations with multiple copies and a rigorous
method for routinely testing the backup media for corruption and
making new replacement copies of the backups to prevent future loss. 

For example, make multiple identical backups. sprinkle them in various
locations. on a periodic, routine basis, test those backups for
possible corruption. If their clean, make a new copy anyway to put in
rotation, throwing away the old ones after so many periods. If you
find a corrupt one, get one of your clean ones to reproduce it and
start over. 

there is now way, using only one physical storage medium, to guarantee
no loss of data. 

maybe I;'m reading this wrong , but it seems to be what you're asking for.
> 

A


signature.asc
Description: Digital signature


Re: Bad mirror error during network installation

2006-12-05 Thread Wayne Topa
maarten fiege([EMAIL PROTECTED]) is reported to have said:
> LS
> 
> I'm trying to install debian using a network
> installation. Everything works great untill my pc
> searches for a debian mirror. I've tried several
> mirrors included the recommended mirrors and even the
> "official" US mirror, but the the massage bad mirror
> keeps coming up.
> 
> What can be the problem, it doesn't seem likey that
> these are all bad mirrors.

I recently ran into the same problem.  I went looking for a mirror
that would work and found only 5, from the US mirror list, that
worked.

Today  the best one [1], for me, keeps dropping out while I'm 
upgraiding.

[1] debian.fifi.org

Wayne

-- 
The reason computer chips are so small is computers don't eat much.
___


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Mdadm Corruption

2006-12-05 Thread Maxus
Hi Johannes,

Thanks for the reply, I'm well aware the device is a hardware raid
controller, but like most cheap raid card this unit uses the host CPU
to do the raid striping. I was concerned that if the card failed I
would lose my raid array, So I wanted to use mdadm so that I could just
replace the card with some other and have it continue working, as there
is no really advantage to the card as it uses the host CPU any way. The
other reason I choose the card is that it has 4 sata ports and my
current machine doesn't have any. The cards driver allows you to
disable the raid part of the controller and simply use it as a sata
expansion card.

And as for mdadm its been working fine untill now (18 Months). I belive
it was a power shortage but I'm not 100% sure, but the issues doesn't
lie with the card nor its abillities the issue is FSCK getting caught
in a perpetual loop.

I'm running debain 2.6.8-3-386 version 3.1 the SATA card is use the
open source driver proved by highpoint and has 4 x 200 GB western
didgital drives connected in a raid 5 configuration.

Thanks
Alex



Johannes Wiedersich wrote:
> Maxus wrote:
> > Hi Linux Pepole,
> >
> > I have a debian box (sarge (I think)) with a 2.6.8-3.386 kernel. I
> > recently upgraded to 2.6.18 to get checkarray working in Mdadm (it
> > needs a kernel high than 2.6.15 to function) as there is not a lot of
> > point in having a raid system if it doesn't keep an eye on itself :)
> >
> > Anyhow well it went very wrong not 100% sure how, I'm running a
> > highpoint 1640 with the 2.16 driver with 4 x WD 200 GB drives. Now when
> > the system goes to mount the array it stats the array is corrupted.
>
> Correct me, if I am wrong, but from google, I get the impression that
> this is a _hardware_ raid controller.
>
> mdadm is a _software_ raid program:
> ~# aptitude show mdadm
> [...]
> Description: Manage MD devices aka Linux Software Raid
> [...]
>
> This is meant to implement raid on computers *without* a _hardware_ raid
> controller.
>
> > So, Any suggestion or ideas how to fix it? Would love to try and get
> > some of the data off the drive.
>
> Don't confuse software raid with hardware raid, ie. don't use tools for
> software raid on a hardware raid controller.
>
> http://en.wikipedia.org/wiki/RAID#Hardware_vs._software
>
> HTH,
> Johannes
>
>
> --
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: what's the killer app for GNU/Linux systems?

2006-12-05 Thread Andrew Sackville-West
On Tue, Dec 05, 2006 at 06:55:21PM -0500, Douglas Tutty wrote:
> On Tue, Dec 05, 2006 at 03:03:53PM -0700, Nate Duehr wrote:
> > 
> > Thus, copyright in the real world only matters if the author chooses to 
> > exercise it.
> 
> Since copywrite exists unless released within a licence, who would want
> to open themselves (or their company) to the risk of a legal battle, or
> tarnishing of a reputation.
> 

I can't believe I'm jumping into this but...

ISTM, that this is an interesting scenario: 

you release code anonymously into public domain. companyA sees that
code, likes it, grabs it, incorporates it, copyrights and distributes it in a
closed source application. this of course is their right as there are
no licenses or rights attached to the code.
 simultaneously, userB sees it, grabs it, incorporates it, and
 releases it under gpl. later, companyA, having 
lost track of how it got the code, sees it in userB's gpl code and
sues userB claiming that they stole it, violated companyA's
copyright. userB ends up in court trying to defend themselves. If
there is no other record available of this code being in public
domain, nor any clear release from the author, then userB is
effectively screwed.  

If one had instead released the code with explicit copyright releases
attached, then userB could attribute the code properly and be
defendable.

it seems irresponsible to just throw code out there with the idea that
anybody could use it without making some statement to that effect. 

this all assumes the existence of automatic copyright etc. Without
automatic copyright, I suppose the situation would be pretty similar though.

my .02 as IANAA or coder at this point. 

/me runs and hides

A


signature.asc
Description: Digital signature


Re: backup archive format saved to disk

2006-12-05 Thread Douglas Tutty
On Tue, Dec 05, 2006 at 05:47:23PM -0600, Mike McCarty wrote:
> Johannes Wiedersich wrote:
> >Douglas Tutty wrote:
> >
> >>I'm going to be backing up to a portable ruggedized hard drive.
> >>Currently, my backups end up in tar.bz2 format.
> >>
> >>It would be nice if there was some redundancy in the data stream to
> >>handle blocks that go bad while the drive is in storage (e.g. archive).
> >>
> >>How is this handled on tape?  Is it built-into the hardware
> >>compression?
> >>
> >>Do I need to put a file system on a disk partition if I'm only saving
> >>one archive file or can I just write the archive to the partition
> >>directly (and read it back) as if it was a scsi tape?
> >>
> >>Is there an archive or compression format that includes the ability to
> >>not only detect errors but to correct them? (e.g. store ECC data
> >>elsewhere in the file)  If there was, and I could write it directly to
> >>the disk, then that would solve the blocks-failing-while-drive-stored
> >>issue.
> >
> >
> >Now, to something completely different
> >If data integrity is your concern, than maybe a better solution than
> >compression is to copy all your data with rsync or another backup tool
> >that 'mirrors' your files instead of packing them all together in one
> >large file. If something goes wrong with this large file you might loose
> >the backup of all your files. If something goes wrong with the
> 
> [snip]
> 
> My understanding of the BZ2 format is that it compresses individual
> blocks independently, and that the loss of a block will not compromize
> the entire archive, only those files which are contained in a given
> block.

Yes. But I don't want to loose any data at all.

I've looked at par2.  It looks interesting.  For me, the question is how
to implement it for archiving onto a drive since the ECC data are
separate files rather than being included within one data stream.

Separate files suggests that it be on a file system, and we're back to
where we started since I haven't found a parfs.

I suppose I could use par2 to create the ECC files, then feed the ECC
files one at a time, followed by the main data file, followed by the ECC
files again.

I'll check out with my zip drive if I can write a tar file directly to
disk without a fs (unless someone knows the answer).

Doug.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Problem installing packages with apt-get, aptitude and dselect

2006-12-05 Thread Andrew Sackville-West
On Tue, Dec 05, 2006 at 06:01:51PM -0500, José Alburquerque wrote:
> Andrew Sackville-West wrote:
> >what version of apt-get? 
> >
> >check out bug 401263. 
> >
> >Interestingly, though the bug says it applies to 0.6.46.2, I am
> >running that with no problems. (k7 arch). but there are a variety of
> >possible solutions posted.
> >
> >you may have to use dpkg to manually install an older(or newer) apt until 
> >it
> >gets resolved.
> >
> >hth
> >
> >A
> >  
> Thanks so much for your guidance!  I'm running version 0.6.46.3 of apt, 
> but thanks to your pointing out of the bug report I was able to fix the 
> segfaulting by following the temporary solution given in the bug 
> report.  I'll most probably contribute to the bug report.
> 

check out the package apt-listbugs. It puls down critical (and maybe
severe) bug reports and prompts you before installing packages. That's
how I saw the segfault bug in apt and held my apt and apt-utils at the
current version pending resolution. 

A
> 


signature.asc
Description: Digital signature


Re: postfix relay smtp authentication

2006-12-05 Thread Andrew Sackville-West
On Wed, Dec 06, 2006 at 12:13:26AM +0100, Martin Fuzzey wrote:
> 
> This works BUT only for a single user since the postfix version in sarge 
> (2.1.5) doesn't implement the smtp_sender_dependent_authentication 
> option and my ISP actually wants the correct password for each email 
> address (not just a single one for all addresses associated with the 
> account.

I've not used postfix, but maybe this can help. I use exim4 with a
smarthost and only use one of several accounts to send the mail. The
headers in the outgoing mail have various return/from addresses, but
we only login to the smtp host using one of those accounts. so whether
mail actually comes from bob or joe or mary, the mailserver here logs
into the smtp server as joe and then sends the message. ymmv.

A


signature.asc
Description: Digital signature


Re: what's the killer app for GNU/Linux systems?

2006-12-05 Thread Douglas Tutty
On Tue, Dec 05, 2006 at 03:03:53PM -0700, Nate Duehr wrote:
> John Hasler wrote:
> 
> >If you give or sell me a copy of a work of yours I own that copy and can do
> >as I please with it (that includes running it if it is a computer program)
> >with no need for a license.  However, copyright law forbids me to make and
> >distribute copies of it without your permission.
> 
> Feel free to feel bound and to limit your own freedom if you so choose.
> 
> It's a self-imposed limitation in the case of my example of 
> non-licensed, non-attributed code that I typed into the mailing list.
> 
> >Code is protected by copyright by default and may not be copied and
> >distributed without permission of the copyright owner.
> 
> If you feel you need to follow that law in every circumstance, go right 
> ahead.  Breaking copyright in the case of someone releasing something 
> without a license appears to be a victim-less crime.
> 
> Thus, copyright in the real world only matters if the author chooses to 
> exercise it.

Since copywrite exists unless released within a licence, who would want
to open themselves (or their company) to the risk of a legal battle, or
tarnishing of a reputation.

> 
> By your definition, you could have hit reply with quoting turned on in 
> your MUA to my code example I sent -- and then you would have been a law 
> breaker!
> 

No.  The forums are clearly stated on the web-site (not just assumed by
the culture) that they and anything posted to them are public.  This
releases the rest of us from liability if we redistribute your code.

> I could start sprinkling code into my signature line and then sue 
> everyone who quotes it on a mailing list?  Yeah, right.  It'd actually 
> be fun to see someone try that and see how far it got in the legal system.

You obviously don't agree with automatic copyright.  However, to change
it you would have to change international law.

If you have the energy and effectivness to pull that off, I'd rather you
spend your talents on climate change.


Doug.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



raidutil + debian stable + 2.6.17.11

2006-12-05 Thread Arnór Kristjánsson

Hi,

I'm trying to monitor the RAID on a IBM x345 with 6 1RPM scsi  
drives on the built in RAID controller (Adaptec ServeRaid). I'm not  
having any luck.


raidutil from the stable package says:
xa:~# raidutil -L all

Engine connect failed: COMPATIBILITY number
osdIOrequest : File /dev/dpti17 Could Not Be Opened

raidutil 0.0.6 compiled and run in place (not installed that is)  
gives me the same error.


Any ideas on how to get this to work or what other tool I can use? Is  
it the "I2O Bus Adapter OSM" (see below)?


A.


Info:
xa:~# uname -r
2.6.17.11-vs2.0.2 [linux vserver - this is on the mothership, not a  
virtual machine]


xal:~# lspci -vv
:08:02.0 RAID bus controller: Adaptec ServeRAID Controller (rev 02)
   Subsystem: IBM ServeRAID-xx
   Control: I/O- Mem+ BusMaster+ SpecCycle- MemWINV+ VGASnoop- ParErr 
+ Stepping+ SERR+ FastB2B-
   Status: Cap+ 66MHz+ UDF- FastB2B- ParErr- DEVSEL=medium >TAbort-  
SERR- 
   Latency: 64 (32000ns min), Cache Line Size: 0x08 (32 bytes)
   Interrupt: pin A routed to IRQ 169
   Region 0: Memory at f3fff000 (32-bit, non-prefetchable) [size=4K]
   Region 2: Memory at f400 (32-bit, prefetchable) [size=64M]
   Expansion ROM at f108 [disabled] [size=512K]
   Capabilities: [c0] Power Management version 2
 Flags: PMEClk- DSI- D1+ D2- AuxCurrent=0mA PME 
(D0-,D1-,D2-,D3hot-,D3cold-)

 Status: D0 PME-Enable- DSel=0 DScale=0 PME-
   Capabilities: [d0] Message Signalled Interrupts: 64bit+ Queue=0/1  
Enable-

 Address:   Data: 
   Capabilities: [e0] PCI-X non-bridge device.
 Command: DPERE- ERO- RBC=0 OST=3
 Status: Bus=8 Dev=2 Func=0 64bit+ 133MHz+ SCD- USC-, DC=bridge,  
DMMRBC=1, DMOST=3, DMCRS=1, RSCEM-


make menuconfig:
Device Drivers  --->
I2O device support  --->
 I2O support
[*]   Enable LCT notification
[*]   Enable Adaptec extensions
[*]Enable 64-bit DMA
   I2O Configuration support
[*]Enable ioctls (OBSOLETE)
< >   I2O Bus Adapter OSM
   I2O Block OSM
   I2O SCSI OSM
   I2O /proc support


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: what's the killer app for GNU/Linux systems?

2006-12-05 Thread Douglas Tutty
On Tue, Dec 05, 2006 at 11:02:12AM -0700, Nate Duehr wrote:
> Roberto C. Sanchez wrote:
> >On Fri, Dec 01, 2006 at 09:52:16PM -0700, Nate Duehr wrote:
 
> I can send you some non-GPL'ed non-Copyrighted code right now.  Would 
> you like some?
> 
> You're adding things that simply don't need to exist.  They *do* exist 
> for *some* code, including GPL'ed code, but licensing of ANY sort 
> (including Copyright, which is nothing more than another contrived 
> license allowed by law in many places) *restricts* the use of code in 
> some fashion.  The only truly FREE code is code without any license at all.
> 
> Code does NOT inherently *require* licensing or Copyright.  You just 
> think it does.
> 
> What would you like me to send you?  A two line BASIC program?
> 
> 10 PRINT "HELLO"
> 20 GOTO 10
> 
> Look - there you go.  Free code.  No Copyright, no license.  Freely 
> distributed.

This would be your licence.  Thank you.

> 
> I would tell you to do with it what you wish, but that would insinuate 
> that you need to follow my wishes.  You don't.  It has no license or 
> copyright.  (Many countries call this "Public Domain".)  You may 
> incorporate my code into your own works freely without any encumberances 
> of any kind.  Enjoy.  Or don't.  Your choice.
> 

Clause two of your licence.  Thank you.

Doug.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: backup archive format saved to disk

2006-12-05 Thread Mike McCarty

Johannes Wiedersich wrote:

Douglas Tutty wrote:


I'm going to be backing up to a portable ruggedized hard drive.
Currently, my backups end up in tar.bz2 format.

It would be nice if there was some redundancy in the data stream to
handle blocks that go bad while the drive is in storage (e.g. archive).

How is this handled on tape?  Is it built-into the hardware
compression?

Do I need to put a file system on a disk partition if I'm only saving
one archive file or can I just write the archive to the partition
directly (and read it back) as if it was a scsi tape?

Is there an archive or compression format that includes the ability to
not only detect errors but to correct them? (e.g. store ECC data
elsewhere in the file)  If there was, and I could write it directly to
the disk, then that would solve the blocks-failing-while-drive-stored
issue.



Now, to something completely different
If data integrity is your concern, than maybe a better solution than
compression is to copy all your data with rsync or another backup tool
that 'mirrors' your files instead of packing them all together in one
large file. If something goes wrong with this large file you might loose
the backup of all your files. If something goes wrong with the


[snip]

My understanding of the BZ2 format is that it compresses individual
blocks independently, and that the loss of a block will not compromize
the entire archive, only those files which are contained in a given
block.

Your other points are (as usual) well taken.

Mike
--
p="p=%c%s%c;main(){printf(p,34,p,34);}";main(){printf(p,34,p,34);}
This message made from 100% recycled bits.
You have found the bank of Larn.
I can explain it for you, but I can't understand it for you.
I speak only for myself, and I am unanimous in that!


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: New PC, new install, new problems!

2006-12-05 Thread Douglas Tutty
On Tue, Dec 05, 2006 at 10:49:33AM -0600, Hugo Vanwoerkom wrote:
 
> Truer words were never spoken, but...
> It is extremely difficult to get before the purchase answers of more 
> recent mobo's. E.g. try to get a Linux perspective from any of the 
> hundreds of boards available thru NewEgg.
> 
> You end up in an unending search of mobo manufacturers forums to see if 
> anyone said anything about Linux. When you find an answer... the mobo is 
> no longer available.
> 
> The Linux databases that *are* available are almost always for stuff 
> that is outdated.
> 
> I'd like to hear of just one example of a recent mobo that is discussed 
> anywhere from a Linux perspective.

Before I bought my Asus M2N-SLI Deluxe, I found a discussion related to
it somewhere using google.  I don't think the discuss was about wheter
it would work with linux but on some other matter.  However, it was
clear from the discussion that linux was running on it.

So now I have it and everything seems hunky dory.  Although I haven't
tried sound yet.

Doug.

 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



postfix relay smtp authentication

2006-12-05 Thread Martin Fuzzey

Hi,

I have been succesfully running postfix on Sarge as a local mailserver 
relaying all outbound mail (from multiple internal accounts) to my ISP.


However my ISP has just decided to require SMTP authentication.

I have set up SASL following the postfix documentation and the 
authentication phase succeeds, *however* postfix does not include the 
authenticated sender address in the AUTH section of the MAIL FROM 
message and my ISP is still refusing the message :((


Looking at the source in src/smtp/smtp_proto.c:
   /*
* We authenticate the local MTA only, but not the sender.
*/
#ifdef USE_SASL_AUTH
   if (var_smtp_sasl_enable
   && (state->features & SMTP_FEATURE_AUTH)
   && state->sasl_passwd)
   vstring_strcat(next_command, " AUTH=<>");
#endif


I have "fixed" this with the following patch to the postfix code:

--- postfix-2.1.5/src/smtp/smtp_proto.c 2006-12-04 22:08:23.0 +0100
+++ postfix-2.1.5/src/smtp/smtp_proto.c.new 2006-12-04 
22:33:35.943911483 +0100

@@ -755,8 +755,11 @@
#ifdef USE_SASL_AUTH
   if (var_smtp_sasl_enable
   && (state->features & SMTP_FEATURE_AUTH)
-   && state->sasl_passwd)
-   vstring_strcat(next_command, " AUTH=<>");
+   && state->sasl_passwd) {
+   // Patch MF 4/12/2006 Authenticate sender (for 
Tele2...)

+   QUOTE_ADDRESS(state->scratch, request->sender);
+   vstring_sprintf_append(next_command, " 
AUTH=<%s>", vstring_str(state->scratch));

+   }
#endif
   next_state = SMTP_STATE_RCPT;
   break;


This works BUT only for a single user since the postfix version in sarge 
(2.1.5) doesn't implement the smtp_sender_dependent_authentication 
option and my ISP actually wants the correct password for each email 
address (not just a single one for all addresses associated with the 
account.


I've tried similarly patching the etch version of postfix - I can build 
the package but it won't install due to an unsatisified dependency on 
lsb_base (> 3.0.6)


So does anyone have any better ideas of how to make this work?

Regards,

Martin



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: Odd Gnome behavior

2006-12-05 Thread Freddy Freeloader
On Tue, 2006-12-05 at 22:35 +, Liam O'Toole wrote:
> On Tue, 05 Dec 2006 13:41:54 -0800
> Freddy Freeloader <[EMAIL PROTECTED]> wrote:
> 
> > Hi All,
> > 
> > I have run across an oddity in Gnome's behavior when running admin
> > tools from the gui. 
> > 
> > If I run any of the tools found in the Desktop -> Administration
> > menu, explicitly from that menu, Gnome asks me for the root
> > password.  I enter the root password and it tells me I entered an
> > invalid password. However, if I run any of those same admin tools
> > from the Applications -> Debian -> Apps -> System menu Gnome accepts
> > the root password and they run just fine.  
> > 
> > Does anyone know what is going on with this?  I do the vast majority
> > of my work from the bash prompt, but on occasion I will want to just
> > look at a setting and will choose to do that from the gui tools.
> > Although this problem is easily worked around I'm stumped as to why
> > this is happening. 
> > 
> > BTW, this behavior started when I changed the behavior of sudo from
> > the Debian default of not requiring a password to requiring one.
> > I've since reversed that to see if that is responsible for the change
> > in behavior in the gui, but it has made no difference whatsoever. 
> > 
> > Any clues as to where to look would be appreciated. 
> > 
> > 
> 
> Determine what commands are launched by the menu entries. You can do
> this by right-clicking on a menu entry and choosing "Add this launcher
> to desktop". You then right-click on the icon thus created, choose
> "Properties", then "Launcher" to determine the command. You should then
> be able to account for the observed behaviour.
> 
> You can also discover launch commands by searching through the files in
> the /usr/share/applications and /usr/share/menu directories.
> 
> -- 
> 
> Liam
> 
> 

Thanks for your reply.  I already knew about the menu entry stuff, and
had taken a look at it.  It all seems to be fine when compared to a
computer that works normally.

I didn't, however, know about the /usr/share/applications
and /usr/share/menu ways of looking at things.  Thanks.  It's too bad I
didn't find anything out of the ordinary there.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Odd Gnome behavior

2006-12-05 Thread Freddy Freeloader
On Tue, 2006-12-05 at 23:14 +0100, Sven Arvidsson wrote:
> On Tue, 2006-12-05 at 13:41 -0800, Freddy Freeloader wrote:
> > If I run any of the tools found in the Desktop -> Administration menu, 
> > explicitly from that menu, Gnome asks me for the root password.  I enter 
> > the root password and it tells me I entered an invalid password.  
> > However, if I run any of those same admin tools from the Applications -> 
> > Debian -> Apps -> System menu Gnome accepts the root password and they 
> > run just fine.  
> > 
> > Does anyone know what is going on with this?  I do the vast majority of 
> > my work from the bash prompt, but on occasion I will want to just look 
> > at a setting and will choose to do that from the gui tools.  Although 
> > this problem is easily worked around I'm stumped as to why this is 
> > happening. 
> > 
> > BTW, this behavior started when I changed the behavior of sudo from the 
> > Debian default of not requiring a password to requiring one.  I've since 
> > reversed that to see if that is responsible for the change in behavior 
> > in the gui, but it has made no difference whatsoever. 
> > 
> > Any clues as to where to look would be appreciated. 
> 
> Hi,
> 
> g-s-t, when launched from the gnome menu, uses gksu for authorisation,
> when launched from the debian menu, it uses something built in, i think.
> 
> gksu can be configured via gconf-editor.
> 

Thanks for answering, but I'd already tried this.  The settings on my
desktop, where the problem exists, are no different than the settings on
laptop, where everything works normally.

I also realize that I haven't explained the problem in great enough
detail. What happens is if it's the first time I try during a session to
use one of the admin tools it will first ask for the password to the
keyring. After I give it the screen will clear for a fraction of a
second, and the app will show up behind a second request for root's
password.  That request for a password is always returned as an invalid
password.  I have tried the keyring password, my password, and root's
password.  All are denied.

If I configure gsku to use sudo-mode I will be asked for root's password
twice, and the second time it asks for it the password will be
rejected.   


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Problem installing packages with apt-get, aptitude and dselect

2006-12-05 Thread José Alburquerque

Andrew Sackville-West wrote:
what version of apt-get? 

check out bug 401263. 


Interestingly, though the bug says it applies to 0.6.46.2, I am
running that with no problems. (k7 arch). but there are a variety of
possible solutions posted.

you may have to use dpkg to manually install an older(or newer) apt until it
gets resolved.

hth

A
  
Thanks so much for your guidance!  I'm running version 0.6.46.3 of apt, 
but thanks to your pointing out of the bug report I was able to fix the 
segfaulting by following the temporary solution given in the bug 
report.  I'll most probably contribute to the bug report.


Thanks again.

--
Sincerely
Jose Alburquerque


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: dedicated debian hosting

2006-12-05 Thread Tom Allison

Tom Allison wrote:
Can anyone direct me towards debian based dedicated server hosting 
companies?


I might be interested in other levels of hosting, but I might need more 
root-level access than some configurations would permit.






Many thanks to everyone who responded on and off the list.
This will make a great starting point for me.
This is great!


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: Odd Gnome behavior

2006-12-05 Thread Liam O'Toole
On Tue, 05 Dec 2006 13:41:54 -0800
Freddy Freeloader <[EMAIL PROTECTED]> wrote:

> Hi All,
> 
> I have run across an oddity in Gnome's behavior when running admin
> tools from the gui. 
> 
> If I run any of the tools found in the Desktop -> Administration
> menu, explicitly from that menu, Gnome asks me for the root
> password.  I enter the root password and it tells me I entered an
> invalid password. However, if I run any of those same admin tools
> from the Applications -> Debian -> Apps -> System menu Gnome accepts
> the root password and they run just fine.  
> 
> Does anyone know what is going on with this?  I do the vast majority
> of my work from the bash prompt, but on occasion I will want to just
> look at a setting and will choose to do that from the gui tools.
> Although this problem is easily worked around I'm stumped as to why
> this is happening. 
> 
> BTW, this behavior started when I changed the behavior of sudo from
> the Debian default of not requiring a password to requiring one.
> I've since reversed that to see if that is responsible for the change
> in behavior in the gui, but it has made no difference whatsoever. 
> 
> Any clues as to where to look would be appreciated. 
> 
> 

Determine what commands are launched by the menu entries. You can do
this by right-clicking on a menu entry and choosing "Add this launcher
to desktop". You then right-click on the icon thus created, choose
"Properties", then "Launcher" to determine the command. You should then
be able to account for the observed behaviour.

You can also discover launch commands by searching through the files in
the /usr/share/applications and /usr/share/menu directories.

-- 

Liam


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: backup archive format saved to disk

2006-12-05 Thread Douglas Tutty
On Tue, Dec 05, 2006 at 10:53:13AM +0100, Johannes Wiedersich wrote:
> Douglas Tutty wrote:
> > I'm going to be backing up to a portable ruggedized hard drive.
> > Currently, my backups end up in tar.bz2 format.
> > 
> > It would be nice if there was some redundancy in the data stream to
> > handle blocks that go bad while the drive is in storage (e.g. archive).
> > 
> > How is this handled on tape?  Is it built-into the hardware
> > compression?
> > 
> > Do I need to put a file system on a disk partition if I'm only saving
> > one archive file or can I just write the archive to the partition
> > directly (and read it back) as if it was a scsi tape?
> > 
> > Is there an archive or compression format that includes the ability to
> > not only detect errors but to correct them? (e.g. store ECC data
> > elsewhere in the file)  If there was, and I could write it directly to
> > the disk, then that would solve the blocks-failing-while-drive-stored
> > issue.
> 
> Now, to something completely different
> If data integrity is your concern, than maybe a better solution than
> compression is to copy all your data with rsync or another backup tool
> that 'mirrors' your files instead of packing them all together in one
> large file. If something goes wrong with this large file you might loose
> the backup of all your files. If something goes wrong with the
> transmission of one file in the rsync case you will only 'loose' the
> backup of that one file and just restart the rsync command.
> 
> Well, at least I much prefer to spend a bit more on storage and have all
> my files copied individually. It adds the benefit that it is
> straightforward to verify the integrity of the backup via 'diff -r'.
> 
> As far as redundancy is concerned I would prefer to use a second disk
> (and while you are at it store it in a different location, miles away
> from the other). I have one backup at home and another one at my
> mother's house, adding several layers of security to my data.
> 
> Johannes
> 
Thanks Johannes,

Yes I use JFS for my file systems.  I have raid1 on my main drives.  I
will have one portable drive at home, so several layers of backup here.
The issue is off-site backup and that's where the disk in the bank comes
in. 

The problem is that a journal on a hard disk only protects the
filesystem from an inconsistant state due to power failure.  It does
nothing to protect the data if it was written correctly 5 years ago and
never mounted since.  If a block or two goes bad then that piece of data
is lost.  It could make the filesystem unmountable.  

I haven't been able to find a filesystem that provides redundancy that
is free.  The companies that pioneered disk-based virtual tape serves
have their own (e.g. Veritas).  This is why I'm looking at archive
formats.  

The idea is that a format with built-in error-correcting would scatter
the redundancy around the disk so that if a few blocks are bad, the data
can still be retreived.  

Even raid1 doesn't accomplish this.  With raid1 and two disks, if both
disks have bad blocks appear, even if they are on different spots on
each drive, as far as I can tell raid1 can't create a virtual pristine
partition out of several damaged ones.  

Searching aptitude, there seem to be a few packages that address this
issue obliquely (given two corrupted archives, can create a single
pristine archive) but need two complete archive sets.  I have to look at
the par spec.

Basically, I want to do for my archives what ECC does for memory.  With
ECC memory, for every 8 bits, there's one extra bit of storage.  It can
fix single-bit errors.  If I'm remembering my math right, ECC adds 15%
to the size of an archive __prior_to_compression__.  Its impossible to
do with less than 1:1 (100%) on compressed data.  Its therefore best
done from __within__ the compression algorithm.  Take a block of data
from the input stream, make the ECC data, compress the block of data,
append the ECC, and spit this to the output stream and write the ECC
data to an ECC stream.  At the end of the input stream, take the ECC
stream, make ECC data for that, compress the ECC stream, append the ECC
for that, spit this to the output stream.  

If par doesn't do what I need and I can't find an alternative, I'll just
write my own, modeled first in python, then done in Fortran77 for speed.
If I go to all this trouble, I'd probably throw in AES for good measure.
It would make a fun project but I hate reinventing perfectly good
wheels.  Then again, I know people who jump out of perfectly good
airplanes.  Go figure.

Doug.



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: evolution vs firebird (or mozilla calendar)

2006-12-05 Thread Michael Marsh

On 12/1/06, H.S. <[EMAIL PROTECTED]> wrote:

I have been trying out evolution for a few months now, mainly as task
manager or calendar application (appointments, schedules, etc.).
However, it appears that it is not possible to keep two location in sync
as far as the Evolution calendar goes (home (Debian Etch) and university
(Ubuntu)). I am now thinking of trying out mozilla calendars
(firebird?). I guess that it has a calendar export feature, which I
haven't been able to find in evolution.


Firebird is a (non-Mozilla) database.  Sunbird is the Mozilla
calendar.  That being said, I'm not sure how easy it is to sync up.
If you use the calendar extension ("Lightning" is, I believe, the new
name) for Thunderbird/Icedove (if you're using that as your mail
client), there's SyncKolab, which stores your calendar entries as IMAP
messages (if you're using IMAP).  That places a lot of assumptions on
your system, and I don't recall if it does updates particularly
gracefully.  I know I tried that approach for a little while, and at
the time SyncKolab was sufficiently flaky that it drove me to Google
Calendar, with which I've been fairly happy.  The other function of
SyncKolab, synchronizing address books, is still something I lack.


(Also, I do not want to have a calendar server running anywhere at all.)


Does Google count?

If you want to get really wacky, keep your .ics file in CVS, updated
remotely through ssh.  I don't know if the calendar-refresh issue gets
any easier, though.

--
Michael A. Marsh
http://www.umiacs.umd.edu/~mmarsh
http://mamarsh.blogspot.com


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Can't get etch rc1 kppp or ndiswrapper wireless to connect to the net.

2006-12-05 Thread Mike Carter

Hi,
kppp won't load as user but will as root, even so won't connect.
Ndiswrapper is loaded, states it is connected to lan but will not
connect to net.  Anyone have any ideas?  It is driving me crazy.  A
few weeks ago etch was working on the net.  Ndiswrapper fine, kppp
worked in root ethernet connection then and now works.
cheers


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: Odd Gnome behavior

2006-12-05 Thread Sven Arvidsson
On Tue, 2006-12-05 at 13:41 -0800, Freddy Freeloader wrote:
> If I run any of the tools found in the Desktop -> Administration menu, 
> explicitly from that menu, Gnome asks me for the root password.  I enter 
> the root password and it tells me I entered an invalid password.  
> However, if I run any of those same admin tools from the Applications -> 
> Debian -> Apps -> System menu Gnome accepts the root password and they 
> run just fine.  
> 
> Does anyone know what is going on with this?  I do the vast majority of 
> my work from the bash prompt, but on occasion I will want to just look 
> at a setting and will choose to do that from the gui tools.  Although 
> this problem is easily worked around I'm stumped as to why this is 
> happening. 
> 
> BTW, this behavior started when I changed the behavior of sudo from the 
> Debian default of not requiring a password to requiring one.  I've since 
> reversed that to see if that is responsible for the change in behavior 
> in the gui, but it has made no difference whatsoever. 
> 
> Any clues as to where to look would be appreciated. 

Hi,

g-s-t, when launched from the gnome menu, uses gksu for authorisation,
when launched from the debian menu, it uses something built in, i think.

gksu can be configured via gconf-editor.

-- 
Cheers,
Sven Arvidsson
http://www.whiz.se
PGP Key ID 760BDD22



signature.asc
Description: This is a digitally signed message part


  1   2   >