Re: firefox misbehaviour

2022-05-20 Thread Russell L. Harris

On Fri, May 20, 2022 at 10:18:59PM -0700, David Christensen wrote:

I am unfamiliar with "TAB AUTO REFRESH icon (and function)".


TAB AUTO REFRESH is an extension which automatically reloads the
current page every [specified number of] seconds.

I use it to refresh the weather bureau forecast web page about once an
hour and the web page for my personal weather station about every five
minutes.

When installed, TAB AUTO REFRESH displays an icon with a countdown of
the number of seconds until the next refresh.  Clicking on the icon
brings up a window for resetting the refresh interval.

RLH



Re: firefox misbehaviour

2022-05-20 Thread Hans
Am Samstag, 21. Mai 2022, 05:09:38 CEST schrieb Russell L. Harris:
Hi Russell,

I do not have those issues you describe, but on my system firefox sometimes 
completely freezes the system when calling some special websites.

Then nothing can be done, only the mouse is moving but no mouse clicking, nor 
keyboard input is possible then.

The only way is the hard way: long press power button, so it switches off.

I admit, there are some plugins installed, like noscript and ublock origin, 
which also might interfere. 

However, for testing purposes on those sites I temporarly deactivate the 
plugins. 

And of course, it can not be excluded, that these sites also interfere with 
the graphics driver, which is Nvidia.

Does this help?

Best regards

Hans


> Is anyone else having trouble with firefox over the past week?
> 
> At first I noticed that NEW WINDOW sometimes was absent from the menu
> (FILE > NEW WINDOW).  Then, some bookmarks went missing.  Now the TAB
> AUTO REFRESH icon (and function) has vanished and does not reinstall.
> 
> Debian 11, firefox 91.9.0esr (64-bit)
> 
> RLH






Re: firefox misbehaviour

2022-05-20 Thread David Christensen

On 5/20/22 20:09, Russell L. Harris wrote:

Is anyone else having trouble with firefox over the past week?

At first I noticed that NEW WINDOW sometimes was absent from the menu
(FILE > NEW WINDOW).  Then, some bookmarks went missing.  Now the TAB
AUTO REFRESH icon (and function) has vanished and does not reinstall.

Debian 11, firefox 91.9.0esr (64-bit)

RLH



I upgraded to 91.9.0esr-1~deb11u1 two weeks ago:

2022-05-06 15:42:02 root@laalaa ~
# apt-get upgrade

The following packages will be upgraded:
  firefox-esr ...

   Get:5 http://security.debian.org/debian-security 
bullseye-security/main amd64 firefox-esr amd64 91.9.0esr-1~deb11u1 [58.7 MB]


Preparing to unpack 
.../01-firefox-esr_91.9.0esr-1~deb11u1_amd64.deb ...
Leaving 'diversion of /usr/bin/firefox to /usr/bin/firefox.real 
by firefox-esr'
Unpacking firefox-esr (91.9.0esr-1~deb11u1) over 
(91.7.0esr-1~deb11u1) ...


Setting up firefox-esr (91.9.0esr-1~deb11u1) ...


File -> New Window exists and works.


I have not noticed any missing bookmarks.


I am unfamiliar with "TAB AUTO REFRESH icon (and function)".


David



Re: Resetting a USB port in Debian 10

2022-05-20 Thread tomas
On Fri, May 20, 2022 at 05:25:54PM -0500, Jason wrote:
> On Thu, May 19, 2022 at 09:25:23AM +0200, to...@tuxteam.de wrote:
> > On Thu, May 19, 2022 at 09:55:54AM +0300, Anssi Saari wrote:
> > > Jason  writes:
> > > 
> > > > What is the best way to power cycle or reset a USB port?
> 
> Turns out the easiest answer was within reach all the time: In Debian 10, 
> 'usbreset' is included in the standard usbutils package [...]

Gee. I had it all the time waiting there in /usr/bin. Thanks
for discovering it for me :-)

For the curious, here [1] is the source (for buster). The core
seems to be sending an ioctl to the relevant /dev/bus/usb/...
file.

Cheers
-- 
t


signature.asc
Description: PGP signature


firefox misbehaviour

2022-05-20 Thread Russell L. Harris

Is anyone else having trouble with firefox over the past week?

At first I noticed that NEW WINDOW sometimes was absent from the menu
(FILE > NEW WINDOW).  Then, some bookmarks went missing.  Now the TAB
AUTO REFRESH icon (and function) has vanished and does not reinstall.

Debian 11, firefox 91.9.0esr (64-bit)

RLH

--
Woe unto them that call evil good, and good evil; that put darkness
for light, and light for darkness; that put bitter for sweet, and
sweet for bitter! - Isaiah 5:20



Re: Avoiding command hijacking in shells (was Re: setting path for root after "sudo su" and "sudo" for Debian Bullseye (11))

2022-05-20 Thread Greg Wooledge
On Fri, May 20, 2022 at 09:36:40PM -0400, The Wanderer wrote:
> I wasn't even thinking of it in those terms, although now that you point
> it out that's a good thing to be aware of. I was thinking of it in terms
> of A: trying to write scripts that are safe against such problematic
> elements being in the environment,

You can't.  It's really that simple -- if someone can compromise the
execution environment of your script, they can make your script do
anything they like.

Don't think that compiled programs are safe, either -- unless they're
statically linked, someone with control over the execution environment
can use LD_PRELOAD or similar environment variables to override any
library function the program calls.

With that in mind, what you do as a programmer is simply ignore the
possibility.  Your program should assume it's being run in a sane, or
at least non-malicious, environment.

At the programming level, your security responsibilities are things like:

* Use correct and safe programming practices for whatever language(s)
  you're writing in.

* Sanity-check all user inputs, whether from files, from the environment,
  or from a terminal, before you use them.

* Avoid writing programs that write programs whenever possible.  If you
  can't avoid them (e.g. if you *must* call awk from your bash script),
  be on the lookout for code injections.

> and B: being able to detect and
> recover from some piece of malware having inserted such elements into
> the environment on your *own* computer.

Many people will tell you that if your computer has been compromised,
there's no recovering from it.  It's best to wipe the file systems and
reinstall, then restore data from the last non-compromised backup.

A post-mortem analysis is possible, if you remove the hard drive(s) and
use them as non-booting data disks in another system.  From a trusted
environment like that, you can mount the file systems and inspect them
to see what has been compromised.  But it'll be tedious and time-consuming.



Re: Apache2 404

2022-05-20 Thread IL Ka
How exactly do you go to the second page? Is it a hyperlink in HTML or
what? If so, what is url?
file:// protocol will not bring you to the server.

On Fri, May 20, 2022 at 7:44 PM ldmko...@yahoo.com 
wrote:

> I am having a problem with Apache2.  I have set a new configuration and
> have three html pages defined.  The inital html (index.html) displays fine
> on my laptop on my home network; however, when I attemp to go to the second
> page I get 404 not found on this server.  If I use localhost on my linux
> machine the second page diplays in firefox as "file:///. . .
> I have done the appropriate a2ensite and a2dissite commands.  I am new at
> Linux so any advice is appreciated.  If there are other files that you need
> to look at, let me know.
>
> Thanks, Larry
>
> This is /etc/apache2/apache2.conf
>
> # This is the main Apache server configuration file.  It contains 
> theConfiguration
> file /etc/apache2Configuration file
> /etc/apache2/sites/available/ldmdomain.info.confConfiguration file
> /etc/apache2/sites/available/ldmdomain.info.confConfiguration file
> /etc/apache2/sites/available/ldmdomain.info.conf
> /sites/available/ldmdomain.info.conf
> # configuration directives that give the server its instructions.Configuration
> file /etc/apache2/sites/Configuration file
> /etc/apache2/sites/available/ldmdomain.info.conf
> available/ldmdomain.info.conf
> # See http://httpd.apache.org/docs/2.4/ for detailed information about
> # the directives and /usr/share/doc/apache2/README.Debian about Debian
> specificConfigurConfiguration file
> /etc/apache2/sites/available/ldmdomain.info.confConfiguration file
> /etc/apache2/sites/available/ldmdomain.info.confConfiguration file
> /etc/apache2/sites/available/ldmdomain.info.confation file /Configuration
> file /etc/apache2/sites/available/ldmdomain.info.conf
> etc/apache2/sites/available/ldmdomain.info.conf
> # hints.
> #
> #
> # Summary of how the Apache 2 configuration works in Debian:
> # The Apache 2 web server configuration in Debian is quite different to
> # upstream's suggested way to configure the web server. This is because
> Debian's
> # default Apache2 installation attempts to make adding and removing
> modules,
> # virtual hosts, and extra configuration directives as flexible as
> possible, in
> # order to make automating the changes and administering the server as
> easy as
> # possible.
>
> # It is split into several files forming the configuration hierarchy
> outlined
> # below, all located in the /etc/apache2/ directory:
> #
> #/etc/apache2/Configuration file
> /etc/apache2/sites/available/ldmdomain.info.conf
> #|-- apache2.conf
> #|`--  ports.conf
> #|-- mods-enabled
> #||-- *.load
> #|`-- *.conf
> #|-- conf-enabled
> #|`-- *.conf
> # `-- sites-enabled
> # `-- *.conf
> #
> #
> # * apache2.conf is the main configuration file (this file). It puts the
> pieces
> #   together by including all remaining configuration files when starting
> up the
> #   web server.
> #
> # * ports.conf is always included from the main configuration file. It 
> isConfiguration
> file /etc/apache2/sites/available/ldmdomain.info.conf
> #   supposed to determine listening ports for incoming connections which
> can be
> #   customized anytime.
> #
> # * Configuration files in the mods-enabled/, conf-enabled/ and
> sites-enabled/
> #   directories contain particular configuration snippets which manage
> modules,
> #   global configuration fragments, or virtual host configurations,
> #   respectively.
> #
> #   They are activated by symlinking available configuration files from
> their
> #   respective *-available/ counterparts. These should be managed by using
> our
> #   helpers a2enmod/a2dismod, a2ensite/a2dissite and a2enconf/a2disconf.
> See
> #   their respective man pages for detailed information.
> #
> # * The binary is called apache2. Due to the use of environment variables,
> inConfiguration file 
> /etc/apache2/sites/available/ldmdomain.info.confConfiguration
> file /etc/apache2/sites/available/ldmdomain.info.conf
> #   the default configuration, apache2 needs to be started/stopped with
> #   /etc/init.d/apache2 or apache2ctl. Calling /usr/bin/apache2 directly
> will not
> #   work with the default configuration.
>
>
> # Global configuration
> #
>
> #
> # ServerRoot: The top of the directory tree under which the server's
> # configuration, error, and log files are kept.
> #
> # NOTE!  If you intend to place this on an NFS (or otherwise network)
> # mounted filesystem then please read the Mutex documentation (available
> # at http://httpd.apache.org/docs/2.4/mod/core.html#mutex>);
> # you will save yourself a lot of trouble.
> #
> # Do NOT add a slash at the end of the directory path.
> #
> #ServerRoot "/etc/apache2"
>
> #
> # The accept serialization lock file MUST BE STORED ON A LOCAL DISK.
> #
> #Mutex file:${APACHE_LOCK_DIR} default
> Configuration file /etc/apache2/sites/available/ldmdomain.info.conf

Re: Avoiding command hijacking in shells (was Re: setting path for root after "sudo su" and "sudo" for Debian Bullseye (11))

2022-05-20 Thread The Wanderer
On 2022-05-20 at 21:20, Greg Wooledge wrote:

> On Fri, May 20, 2022 at 08:41:43PM -0400, The Wanderer wrote:
>
>> On 2022-05-20 at 20:28, David Wright wrote:
>>
>> > $ function /usr/bin/sudo { echo teehee; }
>> > $ /usr/bin/sudo whatever
>> > teehee
>> > $ 
>> 
>> A quick test demonstrates that this can be worked around via the 'unset'
>> command:
> 
> Until you define a function named unset.

Well, yes - that was the point of the paragraphs after the demonstration.

> But the real point here is that you should only use sudo or su (or
> doas or any other program that reads your password) from a trusted
> environment. What you definitely should NOT do is get called by a
> coworker, go over to their workstation, hear the description of a
> problem, and try to fix it from their computer, where they may have
> overridden su/sudo/etc.
> 
> Go back to your own desk first, and fix it from there.

I wasn't even thinking of it in those terms, although now that you point
it out that's a good thing to be aware of. I was thinking of it in terms
of A: trying to write scripts that are safe against such problematic
elements being in the environment, and B: being able to detect and
recover from some piece of malware having inserted such elements into
the environment on your *own* computer.

Which is also about only doing it from a trusted environment, I suppose
- just with even more stringent and depressing considerations about what
the limitations of trustability are.

-- 
   The Wanderer

The reasonable man adapts himself to the world; the unreasonable one
persists in trying to adapt the world to himself. Therefore all
progress depends on the unreasonable man. -- George Bernard Shaw



signature.asc
Description: OpenPGP digital signature


Re: Avoiding command hijacking in shells (was Re: setting path for root after "sudo su" and "sudo" for Debian Bullseye (11))

2022-05-20 Thread Greg Wooledge
On Fri, May 20, 2022 at 08:41:43PM -0400, The Wanderer wrote:
> On 2022-05-20 at 20:28, David Wright wrote:
> > $ function /usr/bin/sudo { echo teehee; }
> > $ /usr/bin/sudo whatever
> > teehee
> > $ 
> 
> A quick test demonstrates that this can be worked around via the 'unset'
> command:

Until you define a function named unset.

But the real point here is that you should only use sudo or su (or doas
or any other program that reads your password) from a trusted environment.
What you definitely should NOT do is get called by a coworker, go over to
their workstation, hear the description of a problem, and try to fix it
from their computer, where they may have overridden su/sudo/etc.

Go back to your own desk first, and fix it from there.



Avoiding command hijacking in shells (was Re: setting path for root after "sudo su" and "sudo" for Debian Bullseye (11))

2022-05-20 Thread The Wanderer
On 2022-05-20 at 20:28, David Wright wrote:

> On Thu 19 May 2022 at 15:42:33 (-0500), Nicholas Geovanis wrote:
>
>> On Thu, May 19, 2022, 3:14 AM 황병희  wrote:
>> > Tom Browder  writes:
>> >
>> > > I need a special path setting for root after both "sudo" and "sudo
>> > > su." (...)
>> >
>> > Just you try like as "sudo su -". Sometimes i use it that way.
>> >
>> 
>> When I need to use sudo or su to invoke executables, I fully qualify the
>> path to sudo and the path to that specific executable by using their full
>> path from /. And I often assign values to the important environment
>> variables at the beginning of that same command line. Like...
>> 
>> joe="schmoe" slap="moe" /usr/bin/sudo 
>> 
>> The idea is to draw a line around that invocation by limiting what it
>> "knows".
> 
> If you're running bash, then giving the full path for sudo will
> circumvent any aliases you've defined, and any other versions
> of sudo available from earlier in your $PATH, but there's not
> necessarily any security bonus. After Greg (2018):
> 
> $ function /usr/bin/sudo { echo teehee; }
> $ /usr/bin/sudo whatever
> teehee
> $ 

A quick test demonstrates that this can be worked around via the 'unset'
command:


$ type malicious
bash: type: malicious: not found
$ function malicious { echo "Not really, but..."; }
$ type malicious
malicious is a function
malicious ()
{
echo "Not really, but..."
}
$ unset malicious
$ type malicious
bash: type: malicious: not found


It might look as if this could mean you could work around many possible
cases of malice by just issuing 'unset [command-name]' before any
command you're concerned about, but unfortunately, this same process can
be used to override 'unset' itself; I'm not going to reproduce the exact
commands and output here (mostly because I already closed that window
and I don't want to run through it all again), but a malicious actor
could just override 'unset' to something malicious and then you might
have no way of getting out of it within the running session.

(Such an actor could also override 'type' and 'set' and so forth to
something that would report the expected values, so even detecting that
this had been done could be difficult. Writing a shell function that
would behave "correctly" in that role could be difficult, and I
certainly don't intend to try to do it, but I don't think it would be at
all impossible.)

-- 
   The Wanderer

The reasonable man adapts himself to the world; the unreasonable one
persists in trying to adapt the world to himself. Therefore all
progress depends on the unreasonable man. -- George Bernard Shaw



signature.asc
Description: OpenPGP digital signature


Re: setting path for root after "sudo su" and "sudo" for Debian Bullseye (11)

2022-05-20 Thread Nicholas Geovanis
On Fri, May 20, 2022, 7:28 PM David Wright  wrote:

> On Thu 19 May 2022 at 15:42:33 (-0500), Nicholas Geovanis wrote:
> > On Thu, May 19, 2022, 3:14 AM 황병희  wrote:
> > > Tom Browder  writes:
> > >
> > > > I need a special path setting for root after both "sudo" and "sudo
> > > > su." (...)
> > >
> > > Just you try like as "sudo su -". Sometimes i use it that way.
> > >
> >
> > When I need to use sudo or su to invoke executables, I fully qualify the
> > path to sudo and the path to that specific executable by using their full
> > path from /. And I often assign values to the important environment
> > variables at the beginning of that same command line. Like...
> >
> > joe="schmoe" slap="moe" /usr/bin/sudo 
> >
> > The idea is to draw a line around that invocation by limiting what it
> > "knows".
>
> If you're running bash, then giving the full path for sudo will
> circumvent any aliases you've defined, and any other versions
> of sudo available from earlier in your $PATH, but there's not
> necessarily any security bonus. After Greg (2018):
>

Translation: There is no silver bullet that makes your system secure. There
are many steps large and small that make it incrementally more secure. Yes
that's true.

$ function /usr/bin/sudo { echo teehee; }
> $ /usr/bin/sudo whatever
> teehee
> $
>
> Cheers,
> David.
>
>


Re: setting path for root after "sudo su" and "sudo" for Debian Bullseye (11)

2022-05-20 Thread David Wright
On Thu 19 May 2022 at 15:42:33 (-0500), Nicholas Geovanis wrote:
> On Thu, May 19, 2022, 3:14 AM 황병희  wrote:
> > Tom Browder  writes:
> >
> > > I need a special path setting for root after both "sudo" and "sudo
> > > su." (...)
> >
> > Just you try like as "sudo su -". Sometimes i use it that way.
> >
> 
> When I need to use sudo or su to invoke executables, I fully qualify the
> path to sudo and the path to that specific executable by using their full
> path from /. And I often assign values to the important environment
> variables at the beginning of that same command line. Like...
> 
> joe="schmoe" slap="moe" /usr/bin/sudo 
> 
> The idea is to draw a line around that invocation by limiting what it
> "knows".

If you're running bash, then giving the full path for sudo will
circumvent any aliases you've defined, and any other versions
of sudo available from earlier in your $PATH, but there's not
necessarily any security bonus. After Greg (2018):

$ function /usr/bin/sudo { echo teehee; }
$ /usr/bin/sudo whatever
teehee
$ 

Cheers,
David.



Re: Resetting a USB port in Debian 10

2022-05-20 Thread Jason
On Thu, May 19, 2022 at 09:25:23AM +0200, to...@tuxteam.de wrote:
> On Thu, May 19, 2022 at 09:55:54AM +0300, Anssi Saari wrote:
> > Jason  writes:
> > 
> > > What is the best way to power cycle or reset a USB port?

Turns out the easiest answer was within reach all the time: In Debian 10, 
'usbreset' is included in the standard usbutils package. One glitch is that 
because it does not allow the user to specify the reset time (to my knowledge), 
my modem gets the next higher device number (ttyACM1 instead of ttyACM0). 
Calling usbreset a 2nd time brings it back to /dev/ttyACM0.

If usbreset turns out not to solve my problem(s), I will pursue the other 
excellent leads that were provided. Thank you for all the helpful responses.


-- 
Jason



Re: setting path for root after "sudo su" and "sudo" for Debian Bullseye (11)

2022-05-20 Thread Brian
On Thu 19 May 2022 at 20:24:50 -0400, Kenneth Parker wrote:

[...]

> Note, Debian (at least in the Expert Installation Mode) lets me set a Root
> Password.   Ubuntu doesn't, so one of my early actions after the Install is
> to enter "sudo su -" and, on the resulting Root Shell, type "passwd root".

Depends on whta you mean by "Ubuntu". Its mini.iso offers settong a root
password. I wonder whether the regular ISO can be preseeded?

-- 
Brian.



Re: Apache2 404

2022-05-20 Thread Dan Ritter
ldmko...@yahoo.com wrote: 
> I am having a problem with Apache2.  I have set a new configuration and have 
> three html pages defined.  The inital html (index.html) displays fine on my 
> laptop on my home network; however, when I attemp to go to the second page I 
> get 404 not found on this server.  If I use localhost on my linux machine the 
> second page diplays in firefox as "file:///. . .I have done the appropriate 
> a2ensite and a2dissite commands.  I am new at Linux so any advice is 
> appreciated.  If there are other files that you need to look at, let me know.
> Thanks, Larry
> 


> 
> DocumentRoot /var/www/ldmdomain.info/html
> 
>    Options Indexes FollowSymLinks
>    AllowOverride All
>    Order deny,Allow
>    Allow from all
>    Require all granted
> 
> 

This should be in /etc/apache2/sites-available/ something, and
then linked to  sites-enabled/

> # Include the virtual host configurations:
> IncludeOptional sites-enabled/*.conf

This is what allows that.

>Configuration file /etc/apache2/sites/available/ldmdomain.info.conf

It's sites-available and sites-enabled, not sites/available.

> ServerName ldmdomain.info

I can't ping or whois this, so that's a big problem. Register a
domain and get DNS going for it, or this will not work outside 
of your own local network.

Inside your local network, you will need an A or  and/or
CNAME record pointing to ldmdomain.info and optionally (but you
should) www.ldmdomain.info

> 
> ServerAdmin ad...@ldmdomain.info
> ServerName ldmdomain.info
> ServerAlias www.ldmdomain.info
> DocumentRoot /var/www/ldmdomain.info/html
>   
>   Options -Indexes +FollowSymLinks
>   AllowOverride All
>   
> ErrorLog ${APACHE_LOG_DIR}/error.log
> CustomLog ${APACHE_LOG_DIR}/access.log combined
> 

That all looks OK.

-dsr-



Apache2 404

2022-05-20 Thread ldmko...@yahoo.com
I am having a problem with Apache2.  I have set a new configuration and have 
three html pages defined.  The inital html (index.html) displays fine on my 
laptop on my home network; however, when I attemp to go to the second page I 
get 404 not found on this server.  If I use localhost on my linux machine the 
second page diplays in firefox as "file:///. . .I have done the appropriate 
a2ensite and a2dissite commands.  I am new at Linux so any advice is 
appreciated.  If there are other files that you need to look at, let me know.
Thanks, Larry

This is /etc/apache2/apache2.conf# This is the main Apache server 
configuration file.  It contains theConfiguration file 
/etc/apache2Configuration file 
/etc/apache2/sites/available/ldmdomain.info.confConfiguration file 
/etc/apache2/sites/available/ldmdomain.info.confConfiguration file 
/etc/apache2/sites/available/ldmdomain.info.conf/sites/available/ldmdomain.info.conf#
 configuration directives that give the server its instructions.Configuration 
file /etc/apache2/sites/Configuration file 
/etc/apache2/sites/available/ldmdomain.info.confavailable/ldmdomain.info.conf# 
See http://httpd.apache.org/docs/2.4/ for detailed information about
# the directives and /usr/share/doc/apache2/README.Debian about Debian 
specificConfigurConfiguration file 
/etc/apache2/sites/available/ldmdomain.info.confConfiguration file 
/etc/apache2/sites/available/ldmdomain.info.confConfiguration file 
/etc/apache2/sites/available/ldmdomain.info.confation file /Configuration file 
/etc/apache2/sites/available/ldmdomain.info.confetc/apache2/sites/available/ldmdomain.info.conf#
 hints.
#
#
# Summary of how the Apache 2 configuration works in Debian:
# The Apache 2 web server configuration in Debian is quite different to
# upstream's suggested way to configure the web server. This is because Debian's
# default Apache2 installation attempts to make adding and removing modules,
# virtual hosts, and extra configuration directives as flexible as possible, in
# order to make automating the changes and administering the server as easy as
# possible.

# It is split into several files forming the configuration hierarchy outlined
# below, all located in the /etc/apache2/ directory:
#
#    /etc/apache2/Configuration file 
/etc/apache2/sites/available/ldmdomain.info.conf#    |-- apache2.conf
#    |    `--  ports.conf
#    |-- mods-enabled
#    |    |-- *.load
#    |    `-- *.conf
#    |-- conf-enabled
#    |    `-- *.conf
#     `-- sites-enabled
#         `-- *.conf
#
#
# * apache2.conf is the main configuration file (this file). It puts the pieces
#   together by including all remaining configuration files when starting up the
#   web server.
#
# * ports.conf is always included from the main configuration file. It 
isConfiguration file /etc/apache2/sites/available/ldmdomain.info.conf#   
supposed to determine listening ports for incoming connections which can be
#   customized anytime.
#
# * Configuration files in the mods-enabled/, conf-enabled/ and sites-enabled/
#   directories contain particular configuration snippets which manage modules,
#   global configuration fragments, or virtual host configurations,
#   respectively.
#
#   They are activated by symlinking available configuration files from their
#   respective *-available/ counterparts. These should be managed by using our
#   helpers a2enmod/a2dismod, a2ensite/a2dissite and a2enconf/a2disconf. See
#   their respective man pages for detailed information.
#
# * The binary is called apache2. Due to the use of environment variables, 
inConfiguration file 
/etc/apache2/sites/available/ldmdomain.info.confConfiguration file 
/etc/apache2/sites/available/ldmdomain.info.conf#   the default configuration, 
apache2 needs to be started/stopped with
#   /etc/init.d/apache2 or apache2ctl. Calling /usr/bin/apache2 directly will 
not
#   work with the default configuration.


# Global configuration
#

#
# ServerRoot: The top of the directory tree under which the server's
# configuration, error, and log files are kept.
#
# NOTE!  If you intend to place this on an NFS (or otherwise network)
# mounted filesystem then please read the Mutex documentation (available
# at http://httpd.apache.org/docs/2.4/mod/core.html#mutex>);
# you will save yourself a lot of trouble.
#
# Do NOT add a slash at the end of the directory path.
#
#ServerRoot "/etc/apache2"

#
# The accept serialization lock file MUST BE STORED ON A LOCAL DISK.
#
#Mutex file:${APACHE_LOCK_DIR} default
Configuration file /etc/apache2/sites/available/ldmdomain.info.conf#
# The directory where shm and other runtime files will be stored.
#

DefaultRuntimeDir ${APACHE_RUN_DIR}

#
# PidFile: The file in which the server should record its process
# identification number when it starts.
# This needs to be set in /etc/apache2/envvars
#
PidFile ${APACHE_PID_FILE}

#
# Timeout: The number of secondsConfiguration file 
/etc/apache2/sites/available/ldmdomain.info.conf before receives and sends time 
out

Re: Firefox context menu and tooltip on wrong display?

2022-05-20 Thread Roberto C . Sánchez
On Thu, May 19, 2022 at 10:31:44PM -0400, Roberto C. Sánchez wrote:
> For those following along, a little while ago the problem "went away".
> That is, context menus, tooltips, and application menus now all show in
> the expected places in Firefox.  I really hope that this is not a
> temporary situation and that whatever the problem was has just magically
> resolved itself. :shrug:
> 
And this morning the problem returned.

-- 
Roberto C. Sánchez



Debian: perl6 package is replaced by raku package

2022-05-20 Thread Dominique Dumont
Hi

Some of you may have wondered by perl6 package vanished from Debian Bookworm 
(aka testing). 

Belatedly following the rename of Perl6 language to Raku, I've renamed most 
Debian packages related to Raku. Among them, perl6 package was renamed raku.

You can now install raku package to get rakudo compiler and the raku modules 
that are available in Debian [1].

All the best

Dod

PS: this announcement does not apply to Debian 11 (aka stable or bullseye)

[1] 
https://qa.debian.org/developer.php?login=pkg-rakudo-devel%40lists.alioth.debian.org




Installing mysql-workbench on Debian Sid

2022-05-20 Thread Valerio
Hi,
I need to install mysql-workbench package on debian sid, but i get
problems about missing dependencies.

The following packages have unmet dependencies:
mysql-workbench : Depends: libgdal29 (>= 3.3.0) but it is not
installable Depends: python3 (< 3.10) but 3.10.4-1+b1 is to be installed
Recommends: ttf-bitstream-vera but it is not installable
Recommends: mysql-utilities but it is not installable
Recommends: default-mysql-client is to be installed or
virtual-mysql-client

libgdal29 exists only for sh4 architecture. Is it possible to install
it in another way ?



Re: smartctl puzzlement new disk

2022-05-20 Thread Darac Marjal


On 14/05/2022 03:02, ghe2001 wrote:

Supermicro workstation, Debian Buster, smartctl v 6.6

I bought a new 12TB Western Digital Gold SATA disk the other day. 
After testing it, smartctl says, among other things:


 22 Unknown_Attribute   0x0023   001   001   025    Pre-fail 
Always   FAILING_NOW 13


And it looks like the test is aborted when smartctl sees that error.  
And there's lots of yelling all over my monitor.


I found some discussion of ID 22 on the 'Net -- it's often used to 
mean 'helium level' which makes some sense on a 12TB disk.  But 
testing the Seagate 12TB next to the Western Digital is OK -- sorta; 
there's no ID 22 in the output.


The Wikipedia article on S.M.A.R.T lists ID 22 as having to do with 
the helium.


On the web, it looked like there's a way of changing what ID 22's 
called so smartctl won't hurl.  I'd like the test to just keep going 
and tell me the other things it finds.


My questions:

Is this error on ID 22 anything to worry about?
(I'm guessing that it isn't, and smartctl and/or something in the 
Western Digital disk's firmware is mildly wrong)


Is there really a way to change 22 so smartctl will report the helium 
level?  How do I do that?


Regardless of whether smartctl knows what ID 22 means, the error is 
actually because the _value_ of ID 22 is too low.


SMART entries show four values:

 * VALUE - This is a "normalised" value, between 0 and 255. The
   RAW_VALUE (shown as the last column) is scaled according to the
   manufacturer's algorithm such that 100 is the ideal value.
 * WORST - This represents the worst level of VALUE that the drive has
   seen.
 * THRESH - This is a level which the manufacturer has determined. If
   VALUE is less than THRESH, there is a problem
 * RAW_VALUE - This is some internal value which the manufacturer knows
   the meaning of (sometimes it might be obvious such as the number of
   hours online, but in the case of the helium level it's not obvious
   what 13 represents)

So, Smartctl might not know that the helium level is low, but it _does_ 
know that ID 22 is at 1, which is less than 25, so therefore the drive 
is failing.


As far as the firmware is concerned, the drive is failing. Whether that 
decision is justified, only the manufacturer can really say.




Is there a way to to get smartctl to finish the test?  If so, how do I 
do that?


TIA...


>



OpenPGP_signature
Description: OpenPGP digital signature