Re: [gentoo-user] CD ROM does not play audio CD's

2008-06-25 Thread Stroller


On 25 Jun 2008, at 22:01, Uwe Thiem wrote:

...
This looks like the two-wire cable between the CD ROM and your
soundcard is missing or loose.


As it bloody well should be. An analogue cable is not fixing the  
problem. It has for years been possible to play music from a CD-ROM  
connected by only the EIDE cable.


Stroller.

--
gentoo-user@lists.gentoo.org mailing list



[gentoo-user] openoffice dictionaries

2008-06-25 Thread W.Kenworthy
Is there are way to use the proper openoffice dictionaries in OO?
'eselect' does not offer any alternatives to the myspell dictionaries
and there is no relevant USE flag.

As well as forcing OO to use myspell only (the OO built in dictionary
wizard is removed), there are some other problems with this kludge. The
myspell ones do not seem to work as well as the OO ones (for en_AU) and
you cannot select a user dictionary and have it stay selected.  As I
open and close documents all day long, its it is very annoying to have
to continually open the user dictionary every time.  I presume this is a
consequence of the myspell change as it worked properly before then.

I'll raise some bugs on this but thought I might have missed an easy
fix, so am asking here first.

I must have opened documents 20 time so far today and its been so
annoying I am looking at fixing it :(
BillK
 
-- 
gentoo-user@lists.gentoo.org mailing list



re: [gentoo-user] Atheros 5xxx driver in kernel 2.6.24-gentoo-r5

2008-06-25 Thread Zhou Rui
Finally, I emerged madwifi-ng and the WLAN card works. Add if I do the cmd
manually:
# /etc/init.d/net.ath0 start
the interface can get IP address from dhcp normally. But when I add the net.
ath0 to the
runlevel default and reboot, it cannot obtain the IP information with
dhcpcd... That means
I have to run the network restart script every time the system boots... Can
you give me some
advices about this?

# cat /etc/conf.d/net

# This blank configuration will automatically use DHCP for any net.*
# scripts in /etc/init.d.  To create a more complete configuration,
# please review /etc/conf.d/net.example and save your configuration
# in /etc/conf.d/net (this file :]!).

# config_eth0=( "dhcp" )
# dhcp_eth0="nonis nontp"

modules=( "iwconfig" )
key_xx="[1] ------cc key [1] enc restricted"
preferred_aps=( "xx" )

config_ath0=( "dhcp" )
dhcp_ath0="nonis nontp"

Thank you very much.
Zhou

-邮件原件-
发件人: Kan-I Jyo [mailto:[EMAIL PROTECTED] 
发送时间: 2008年6月24日 17:15
收件人: gentoo-user@lists.gentoo.org
主题: Re: [gentoo-user] Atheros 5xxx driver in kernel 2.6.24-gentoo-r5

2008/6/24 Zhou Rui <[EMAIL PROTECTED]>:
> Thanks for your help, but I'm still puzzled with the madwifi driver and
the
> build-in ath5k driver. Does it mean
> if I choose to install a madwifi driver I can still use my 2.6.24 kernel?

Though ath5k driver will eventually replace the madwifi driver
according to the development team,  surely you can use your current
2.6.24 kernel with madwifi-ng package in portage.

However, as Dirk has mentioned, the driver may or may not work with
your card. So you may have to give it a try.

> But the problem is I cannot find the "non-hamradio
> WLAN" option in current kernel either...

If the "How to install madwifi" gentoo wiki page is what you are
reffering to, it may be a little bit out of date. You can take a look
on madwifi.org's web page for an up-to-date requirements.

http://madwifi.org/wiki/Requirements


-- 
Sincerely,

Jyo
-- 
gentoo-user@lists.gentoo.org mailing list

--
gentoo-user@lists.gentoo.org mailing list



Re: [gentoo-user] CD ROM does not play audio CD's

2008-06-25 Thread Mark Shields
On Wed, Jun 25, 2008 at 4:21 PM, Yoav Luft <[EMAIL PROTECTED]> wrote:

> Hi,
> I posted a similar e-mail a couple of weeks ago and got no response. I wish
> not to spam the mailing list, only for maybe a better luck this time.
> My CD ROM drive had stopped playing audio CD's. It still works fine, data
> CD's work alright and various programs manage to gather useful information
> about the audio CD's tracks, but I hear nothing. I checked all controls in
> alsamixer to be unmuted and at reasonable volume, but it's not it. I can't
> rip the CD's neither. Any ideas what might be wrong?
>

This may not help, but I haven't used the analog or digital cable from the
cdrom to the soundcard to play audio cds in over 5 years; every software
player I've ever used just read the audio data directly from the cdrom.

-- 
- Mark Shields


Re: [gentoo-user] loop-aes

2008-06-25 Thread Daniel Iliev
On Wed, 25 Jun 2008 22:30:25 -0400
Chris Walters <[EMAIL PROTECTED]> wrote:


> | The following works here:
> |
> | 1) ebuild `equery w loop-aes` unpack
> |
> | 2) cd $PORTDIR/sys-fs/loop-aes-/work/loop-AES-/
> |
> | 3) make EXTRA_CIPHERS=y
> |
> | 4) cd ../../
> |
> | 5) touch .compiled
> |
> | 6) cd
> |
> | 7) ebuild `equery w loop-aes` merge
> |
> |
> | (I actually stopped only up to step 3, but it finished w/o error)
> |
> |
> | Since you said something about lack of documentation about loop-aes,
> | have you already found this?
> |
> | http://loop-aes.sourceforge.net/loop-AES.README
> |
> |
> | NOTE: "In order to support AES and other ciphers, mount, umount,
> | losetup, swapon and swapoff need to be patched and
> | recompiled."
> |
> | There's a hope - Gentoo may provide a patched version of util-linux.
> | In case those tools are not already patched I wouldn't go that far
> | on a system which is not especially dedicated for this encryption
> | test of yours.
> 
> Thanks for this.  I will give it a try, when I get a chance. 


Sorry, from your reply I saw there's an error in my message:

Step 2 should read: "$PORTAGE_TMPDIR/portage" instead of "$PORTDIR"

Anyways you'll see the correct directory for your system from the output
of "ebuild unpack". My apologies and good luck.


-- 
Best regards,
Daniel
-- 
gentoo-user@lists.gentoo.org mailing list



Re: [gentoo-user] loop-aes

2008-06-25 Thread Chris Walters

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Daniel Iliev wrote:
| On Wed, 25 Jun 2008 18:40:08 -0400
| Chris Walters <[EMAIL PROTECTED]> wrote:
|
|
|> My original question was:  Does anyone know how to compile the
|> "extra-ciphers" package that you can find on the loop-aes SourceForge
|> site.
|
| The following works here:
|
| 1) ebuild `equery w loop-aes` unpack
|
| 2) cd $PORTDIR/sys-fs/loop-aes-/work/loop-AES-/
|
| 3) make EXTRA_CIPHERS=y
|
| 4) cd ../../
|
| 5) touch .compiled
|
| 6) cd
|
| 7) ebuild `equery w loop-aes` merge
|
|
| (I actually stopped only up to step 3, but it finished w/o error)
|
|
| Since you said something about lack of documentation about loop-aes,
| have you already found this?
|
| http://loop-aes.sourceforge.net/loop-AES.README
|
|
| NOTE: "In order to support AES and other ciphers, mount, umount,
| losetup, swapon and swapoff need to be patched and
| recompiled."
|
| There's a hope - Gentoo may provide a patched version of util-linux.
| In case those tools are not already patched I wouldn't go that far on
| a system which is not especially dedicated for this encryption test of
| yours.

Thanks for this.  I will give it a try, when I get a chance.  It is not really
an encryption test, as you put it, so much as it is frustration at not being
able to get the extra ciphers to compile.

Oh, and Gentoo already patches util-linux with the patch from loop-aes.  One
big problem that people are experiencing right now it that since the testing
version of util-linux got bumped up, the old patch will not work anymore - this
has to be fixed upstream, but I doubt they will do so until the new version of
util-linux is proven stable.  For some reason, the 2.6.24 kernel patch works
with the 2.6.25 version of the kernel, probably because the files it changes
have not yet changed.

Regards,
Chris
-BEGIN PGP SIGNATURE-
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=2CfF
-END PGP SIGNATURE-
--
gentoo-user@lists.gentoo.org mailing list



Re: [gentoo-user] My last words on cryptology and cryptography.

2008-06-25 Thread Chris Walters

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Sebastian Wiesner wrote:
| "Jason Rivard" <[EMAIL PROTECTED]> at Wednesday 25 June 2008, 23:53:23
[snip]
| A OTP cannot be broken using brute force, so the term "perfectly secure"
| fits here, imho, at least a bit ;)

A OTP cipher would be *theoretically* impossible to crack, even given infinite
computing power.  I use the word "theoretically" here because this "perfect
security" of OTP depends on a purely theoretical perfect setting.

http://en.wikipedia.org/wiki/One-time_pad

| Does that difference really matter for ciphers like AES or at least for
| brute-force attacks on random 256-bit keys?

The key word here is "random".  Nothing generated by your computer can generate
pure entropy, only a good representation of it.  Now if you have a computer
network at your disposal, and can get the computers working in parallel or in a
distributed manner, you will notice that tasks are completed much faster than
with one computer working on that task.  A network of supercomputers would be
able to, in a sense, either work on breaking a single key at a time (assuming
CBC with keys >= blocks), then you could decrypt the message one block at a
time.  I did not say it would be very fast, just faster than many people would
like to assume.

[snip]

| Still, there is a difference between the algorithm as such and a
| cryptosystem applying this algorithm.
|
| Btw, apart from general stuff like weak passphrases, that apply to most
| cryptosystems, really bad leaks often came from weak algorithms.  Consider
| WEP.

An algorithm is just a "recipe" - a set of steps to achieve a task.  The
implementation is the *only* thing that counts.  A weak implementation of
AES256 would lead to a weak cryptosystem.  While a strong implementation would,
theoretically, lead to a strong cryptosystem.  I will state my view as a
programmer.  An algorithm is next to useless without a working application that
uses it.

As an aside, let us say you use a USB thumb drive or the like to store a master
key, from which cryptographically random quality keys are derived.  There would
be two weak points in that system.  You, and the thumb drive.  If any entity
can get you, your computer and your thumb drive, your data could be decrypted
without the need for a supercomputer.

[snip]

|>> Anyway, you may believe, what you want to believe, I'm just reflecting,
|>> what
|>> real experts like Bruce Schneier have been telling for years:  It's
|>> wrong to trust into simple ciphers, but it's equally wrong, to believe,
|>> that anything can be broken.
|> It is equally wrong to believe that any cipher is immune to attack
|
| I don't and I did not say so, things like the Debian disaster bring you back
| to reality from dreams ...

With desktop computing power and speed growing at the rate that it currently
is, does it stretch the imagination so much that supercomputer power and speed
is also growing at a similar rate.  Even if an AES256 key cannot be broken "in
a million years" by one supercomputer (*I* would like to see a citation for
that), there will soon be a time when it will be able to be cracked in a much
shorter time - with one supercomputer.

Regards,
Chris
-BEGIN PGP SIGNATURE-

iQIcBAEBCgAGBQJIYv1LAAoJEIAhA8M9p9DAK44P/2ikcuihfTj6OgArcNvJUHNK
m1qwKpk8dRkkeeLQsNZJzZtd00Gv03dkV0pD3sEfzVlKl9TIaoMheJ4D+XqHuorA
ojFfWjcV7eFs5C5rMpvyb96fQ+m98bfRuGNlwnb3Jwy82ehGsxdM3VuVQEgojsyi
TmFIuoS9moZrecLn+Smap5SxSvFmSdHpZ/sy0vbN78+58vvP/Fuq+uoqdz5fZcJH
HwPu+8euaabBOiiPBXInRYYCfSdDqS/X9VuUzetRIhU15B+yijBesDmeo9BjB3oi
ING3XFtbXiQ94/Kjzfz3Bx5MGotm2npM4H8TIr1SQSpB57j8+VHy+EepFWEjN3Dj
hh8D3d4hpw64oBi6Gj+P0b/4QYkot1yBdQvXXeAt7oappQ0QsFXv1CDvGS8tDQ9f
WWv9IXQ/1EaeQYPLVEv8kSuTxgqte4EcvpUJpIZ9Ku4Z8PGh50Bc2Y2AGlszezxk
IIk7eI/Z2wJquQ7+A8QLGpiuM2+2WDfrfdh/kvX4AZS6mYm/a2V95K9oPPGTqDgp
R5HwGW69hANARhdJAQg/GZFMrsi3BFGMDtj1EIVnWwXS1W3cAFZFIWJHWuBf0c06
5aQjYQNq055eUe1QvsIf0v3eyuG1QiOazb+0FaDJ1u9wrgsYQ7G1hR9uVBCxyWz7
moYaBh171qt40nMFrp8u
=ond2
-END PGP SIGNATURE-
--
gentoo-user@lists.gentoo.org mailing list



Re: [gentoo-user] Xorg crashing when PC wake up from suspend-to-ram

2008-06-25 Thread W.Kenworthy
Try tuxonice instead of the in-kernel suspend - never been able to get
in-kernel to work on any of my systems.  Other than ToI and
gentoo-sources-2.6.25-r5, the software versions are the same

You are using sabayon? - tried their mailing lists?

BillK

On Wed, 2008-06-25 at 22:57 +0200, Wael Nasreddine wrote:
> This One Time, at Band Camp, Wael Nasreddine <[EMAIL PROTECTED]> said, On 
> Mon, Jun 23, 2008 at 01:48:29PM +0200:
> > Hey guys,
> 
> > When my PC wakes up from suspend-to-ram, X crashes, my video card is
> > an intel 945GM.
> 
> > In ubuntu it works, I tried using Ubuntu's hal-info folder and I
> > patched my Intel driver with all ubuntu patches but the problem still
> > here, I can't figure out what is going on... I need a little help
> > please...
> 
> > Xorg.0.log attached...
> > /etc/X11/xorg.conf attached...
> 
> > Kernel-2.6.25-sabayon-r1 (config Attached)
> > x11-base/xorg-server-1.4.2
> > x11-drivers/xf86-video-i810-2.3.2
> > sys-power/pm-utils-1.1.2.1
> 
> > Regards,
> Come on guys a little help please!! I either have to keep my Laptop
> always turned on or shutdown/boot everytime I'm not using it... please
> I need some help!!
> 
-- 
gentoo-user@lists.gentoo.org mailing list



Re: [gentoo-user] Quick script request

2008-06-25 Thread Daniel Iliev
On Wed, 25 Jun 2008 22:42:47 +0200
Alan McKinnon <[EMAIL PROTECTED]> wrote:


> Isn't there a little known and unused but very useful command that 
> already does this? This type of usage often comes up on mailing lists 
> and invariably someone mentions it after 20 posts or so, but I can 
> never remember what it is. Used a lot like rename, but that's not it.


I believe you are talking about the "rename (1)" command, but this
case is a little bit different. :)


-- 
Best regards,
Daniel
-- 
gentoo-user@lists.gentoo.org mailing list



Re: [gentoo-user] CD ROM does not play audio CD's

2008-06-25 Thread W.Kenworthy
Some (and only some) multimedia audio broke in the last few of updates
on two of my systems with cmi chipsets - I had to select IEC958 Monitor
before I got sound back. Might be the same thing.  and no, I am not
using digital output.

If this doesnt help you, might help someone else as it was a pita to
find the cause as I am not using the digital outputs from the card.

BillK


On Wed, 2008-06-25 at 23:21 +0300, Yoav Luft wrote:
> Hi,
> I posted a similar e-mail a couple of weeks ago and got no response. I
> wish not to spam the mailing list, only for maybe a better luck this
> time.
> My CD ROM drive had stopped playing audio CD's. It still works fine,
> data CD's work alright and various programs manage to gather useful
> information about the audio CD's tracks, but I hear nothing. I checked
> all controls in alsamixer to be unmuted and at reasonable volume, but
> it's not it. I can't rip the CD's neither. Any ideas what might be
> wrong?
-- 
gentoo-user@lists.gentoo.org mailing list



Re: [gentoo-user] loop-aes

2008-06-25 Thread Daniel Iliev
On Wed, 25 Jun 2008 18:40:08 -0400
Chris Walters <[EMAIL PROTECTED]> wrote:

 
> My original question was:  Does anyone know how to compile the
> "extra-ciphers" package that you can find on the loop-aes SourceForge
> site.

The following works here:

1) ebuild `equery w loop-aes` unpack

2) cd $PORTDIR/sys-fs/loop-aes-/work/loop-AES-/

3) make EXTRA_CIPHERS=y

4) cd ../../

5) touch .compiled

6) cd

7) ebuild `equery w loop-aes` merge


(I actually stopped only up to step 3, but it finished w/o error)


Since you said something about lack of documentation about loop-aes,
have you already found this?

http://loop-aes.sourceforge.net/loop-AES.README


NOTE: "In order to support AES and other ciphers, mount, umount,
losetup, swapon and swapoff need to be patched and
recompiled."

There's a hope - Gentoo may provide a patched version of util-linux.
In case those tools are not already patched I wouldn't go that far on
a system which is not especially dedicated for this encryption test of
yours.


HTH

-- 
Best regards,
Daniel
-- 
gentoo-user@lists.gentoo.org mailing list



[gentoo-user] 答复: [gentoo-user] Atheros 5xxx driver in kernel 2.6.24-gentoo-r5

2008-06-25 Thread Zhou Rui
Finally, I emerged madwifi-ng and the WLAN card works. Add if I do the cmd
manually:
# /etc/init.d/net.ath0 start
the interface can get IP address from dhcp normally. But when I add the net.
ath0 to the
runlevel default and reboot, it cannot obtain the IP information with
dhcpcd... That means
I have to run the network restart script every time the system boots... Can
you give me some
advices about this?

# cat /etc/conf.d/net

# This blank configuration will automatically use DHCP for any net.*
# scripts in /etc/init.d.  To create a more complete configuration,
# please review /etc/conf.d/net.example and save your configuration
# in /etc/conf.d/net (this file :]!).

# config_eth0=( "dhcp" )
# dhcp_eth0="nonis nontp"

modules=( "iwconfig" )
key_xx="[1] ------cc key [1] enc restricted"
preferred_aps=( "xx" )

config_ath0=( "dhcp" )
dhcp_ath0="nonis nontp"

Thank you very much.
Zhou

-邮件原件-
发件人: Kan-I Jyo [mailto:[EMAIL PROTECTED] 
发送时间: 2008年6月24日 17:15
收件人: gentoo-user@lists.gentoo.org
主题: Re: [gentoo-user] Atheros 5xxx driver in kernel 2.6.24-gentoo-r5

2008/6/24 Zhou Rui <[EMAIL PROTECTED]>:
> Thanks for your help, but I'm still puzzled with the madwifi driver and
the
> build-in ath5k driver. Does it mean
> if I choose to install a madwifi driver I can still use my 2.6.24 kernel?

Though ath5k driver will eventually replace the madwifi driver
according to the development team,  surely you can use your current
2.6.24 kernel with madwifi-ng package in portage.

However, as Dirk has mentioned, the driver may or may not work with
your card. So you may have to give it a try.

> But the problem is I cannot find the "non-hamradio
> WLAN" option in current kernel either...

If the "How to install madwifi" gentoo wiki page is what you are
reffering to, it may be a little bit out of date. You can take a look
on madwifi.org's web page for an up-to-date requirements.

http://madwifi.org/wiki/Requirements


-- 
Sincerely,

Jyo
-- 
gentoo-user@lists.gentoo.org mailing list

--
gentoo-user@lists.gentoo.org mailing list



Re: [gentoo-user] gnucash pulls in firefox (when I already have firefox-bin)

2008-06-25 Thread Allan Gottlieb
At Wed, 25 Jun 2008 16:46:44 -0700 James Ausmus <[EMAIL PROTECTED]> wrote:

> On Wed, Jun 25, 2008 at 4:14 PM, Neil Bothwick <[EMAIL PROTECTED]> wrote:
>> On Wed, 25 Jun 2008 18:40:41 -0400, Allan Gottlieb wrote:
>>
>>> > yelp is pulling in firefox because you do not have xulrunner in USE.
>>> > firefox-bin is no use, the program needs the header files for either
>>> > firefox or xulrunner. The current recommendation is to use xulrunner
>>> > instead of firefox in this situation, and in your USE flags.
>>
>>> I am currently having no problems.  I use gnucash extensively and use
>>> firefox (not -bin) as well.  Is the recommendation to switch and add
>>> xulrunner to USE?  If the purpose is to avoid the need for firefox,
>>> that is not relevant to me.  If, however, xulrunner in some way
>>> improves gnucash, I might well want to try it.
>>
>> It is to avoid the need for Firefox 2 installed from source, which is a
>> problem if you use Firefox 3 or firefox-bin. the xulrunner flag make
>> GnuCash, and other apps, build against xunrunner instead of the firefox 2
>> headers.
>
> Also, if you're going to use FF3, with xulrunner, FF3 will compile
> against xulrunner, thus reducing the FF3 build to time to a few
> minutes, as the LONG build already happened with xulrunner...

I see.  When FF3 becomes stable, I will turn on xulrunner.

Thanks for the explanations.

allan
-- 
gentoo-user@lists.gentoo.org mailing list



Re: [gentoo-user] gnucash pulls in firefox (when I already have firefox-bin)

2008-06-25 Thread James Ausmus
On Wed, Jun 25, 2008 at 4:14 PM, Neil Bothwick <[EMAIL PROTECTED]> wrote:
> On Wed, 25 Jun 2008 18:40:41 -0400, Allan Gottlieb wrote:
>
>> > yelp is pulling in firefox because you do not have xulrunner in USE.
>> > firefox-bin is no use, the program needs the header files for either
>> > firefox or xulrunner. The current recommendation is to use xulrunner
>> > instead of firefox in this situation, and in your USE flags.
>
>> I am currently having no problems.  I use gnucash extensively and use
>> firefox (not -bin) as well.  Is the recommendation to switch and add
>> xulrunner to USE?  If the purpose is to avoid the need for firefox,
>> that is not relevant to me.  If, however, xulrunner in some way
>> improves gnucash, I might well want to try it.
>
> It is to avoid the need for Firefox 2 installed from source, which is a
> problem if you use Firefox 3 or firefox-bin. the xulrunner flag make
> GnuCash, and other apps, build against xunrunner instead of the firefox 2
> headers.

Also, if you're going to use FF3, with xulrunner, FF3 will compile
against xulrunner, thus reducing the FF3 build to time to a few
minutes, as the LONG build already happened with xulrunner...

-James



>
> --
> Neil Bothwick
>
> Top Oxymorons Number 22: Childproof
>
-- 
gentoo-user@lists.gentoo.org mailing list



Re: [gentoo-user] gnucash pulls in firefox (when I already have firefox-bin)

2008-06-25 Thread Neil Bothwick
On Wed, 25 Jun 2008 18:40:41 -0400, Allan Gottlieb wrote:

> > yelp is pulling in firefox because you do not have xulrunner in USE.
> > firefox-bin is no use, the program needs the header files for either
> > firefox or xulrunner. The current recommendation is to use xulrunner
> > instead of firefox in this situation, and in your USE flags.  

> I am currently having no problems.  I use gnucash extensively and use
> firefox (not -bin) as well.  Is the recommendation to switch and add
> xulrunner to USE?  If the purpose is to avoid the need for firefox,
> that is not relevant to me.  If, however, xulrunner in some way
> improves gnucash, I might well want to try it.

It is to avoid the need for Firefox 2 installed from source, which is a
problem if you use Firefox 3 or firefox-bin. the xulrunner flag make
GnuCash, and other apps, build against xunrunner instead of the firefox 2
headers.

-- 
Neil Bothwick

Top Oxymorons Number 22: Childproof


signature.asc
Description: PGP signature


Re: [gentoo-user] loop-aes + extra-ciphers...

2008-06-25 Thread Alan McKinnon
On Wednesday 25 June 2008, Jason Rivard wrote:

> Wait for my private mail, Mr. Walters.

I wouldn't bother with a private mail Jason. Tomorrow Chris will calm 
down, take a deep breath and probably contribute to the list again. It 
pretty much always works that way.

Maybe he's quick to anger. Well, so am I sometimes. But he certainly 
does not belong in that class of people who have nothing useful to 
contribute.

-- 
Alan McKinnon
alan dot mckinnon at gmail dot com

-- 
gentoo-user@lists.gentoo.org mailing list



Re: [gentoo-user] gnucash pulls in firefox (when I already have firefox-bin)

2008-06-25 Thread Allan Gottlieb
At Tue, 24 Jun 2008 00:17:36 +0100 Neil Bothwick <[EMAIL PROTECTED]> wrote:

> yelp is pulling in firefox because you do not have xulrunner in USE.
> firefox-bin is no use, the program needs the header files for either
> firefox or xulrunner. The current recommendation is to use xulrunner
> instead of firefox in this situation, and in your USE flags.

Neil,

I am currently having no problems.  I use gnucash extensively and use
firefox (not -bin) as well.  Is the recommendation to switch and add
xulrunner to USE?  If the purpose is to avoid the need for firefox,
that is not relevant to me.  If, however, xulrunner in some way
improves gnucash, I might well want to try it.

thanks in advance and thanks for all your previous help and thoughtful
comments.

allan
-- 
gentoo-user@lists.gentoo.org mailing list



Re: [gentoo-user] PEACE!!!

2008-06-25 Thread Chris Walters

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Daniel Iliev wrote:
| On Wed, 25 Jun 2008 17:51:53 -0400
| Chris Walters <[EMAIL PROTECTED]> wrote:
|> Alan McKinnon wrote:
[snip]
| WOW! Both of you! Come on, guys! What is this? I've never seen such
| thing here for all the years I'm on the list.
|
| Please calm down, we are supposed to be friends here, right?

Sorry for the outburst.  It just gets my dander up when someone calls me
childish names on a discussion group like this.  I thought we were all friends
here - we have all chosen the same distribution (Gentoo), and we all often come
here first when we have problems.

I asked a simple question that grew into so much more.  Never did get an answer
to my simple question.  For the record, I agree that AES256 is an extremely
secure cipher, which is why I am using it.

My original question was:  Does anyone know how to compile the "extra-ciphers"
package that you can find on the loop-aes SourceForge site.

Regards,
Chris
-BEGIN PGP SIGNATURE-
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=ndyG
-END PGP SIGNATURE-
--
gentoo-user@lists.gentoo.org mailing list



Re: [gentoo-user] loop-aes + extra-ciphers...

2008-06-25 Thread Sebastian Wiesner
"Jason Rivard" <[EMAIL PROTECTED]> at Wednesday 25 June 2008, 23:53:23
> > > The only thing that cryptography attempts to do is reduce the
> > > **probability** of cracking the key and gaining access to the data as
> > > low as possible.
> >
> > No news.  That's, why cryptology defines "security" not as "being
> > impossible
> > to crack", but as "being sufficiently improbable to crack".  The only
> > cipher, that can't be "brute-forced", is the OTP, which is
> > considered "perfectly secure".
>
> There is no such thing as perfectly secure,

A OTP cannot be broken using brute force, so the term "perfectly secure" 
fits here, imho, at least a bit ;)

> > In such a case, the question is, if the data, you ciphered, is really
> > worth the effort of putting a super computer into work for a long time
> > to try any possible passphrase.
>
> Mr. Walters' claim is not that they would put a single super-computer to
> decrypting it, but a "network of supercomputers".

Does that difference really matter for ciphers like AES or at least for 
brute-force attacks on random 256-bit keys?

> I truly don't think you 
> have to worry about that occurring, unless you are deemed a danger to US
> National Security. Even then, AES is very hard to crack. The major
> weakness is the person who encrypts the data. Under questioning, most
> will give up their keys.
>
> > > Cryptology is, at least partly about finding the weakest link,
> > > because that is what is likely to be attacked in any cryptosystem.
> >
> > Of course, absolutely true.  Hard disk encryption is by far not
> > perfect, just look at the cold boot attacks that gained public interest
> > in the last time.  But you didn't talk of _cryptosystems_ in your
> > previous posts, you did talk about _algorithms_.
>
> By themselves algorithms are relatively useless. It is only the
> application of those algorithms that make them useful.

Still, there is a difference between the algorithm as such and a 
cryptosystem applying this algorithm.

Btw, apart from general stuff like weak passphrases, that apply to most 
cryptosystems, really bad leaks often came from weak algorithms.  Consider 
WEP. 

> > > A final thought:  It is a fact that both the US Navy and the NSA are
> > > *very* interested in cryptology and data security.  The NSA also does
> > > have large networks of supercomputers that, using parallel,
> > > distributed or concurrent computing principles can crack keys more
> > > quickly than you may think.
> >
> > You can use simple mathematics to find out, that even the largest super
> > computers, having one peta flop, needs millions of years to perform an
> > exhaustive search through AES key space.
> >
> > Anyway, you may believe, what you want to believe, I'm just reflecting,
> > what
> > real experts like Bruce Schneier have been telling for years:  It's
> > wrong to trust into simple ciphers, but it's equally wrong, to believe,
> > that anything can be broken.
>
> It is equally wrong to believe that any cipher is immune to attack

I don't and I did not say so, things like the Debian disaster bring you back 
to reality from dreams ...

-- 
Freedom is always the freedom of dissenters.
  (Rosa Luxemburg)


signature.asc
Description: This is a digitally signed message part.


Re: [gentoo-user] PEACE!!!

2008-06-25 Thread Daniel Iliev
On Wed, 25 Jun 2008 17:51:53 -0400
Chris Walters <[EMAIL PROTECTED]> wrote:

> Alan McKinnon wrote:
> >> Or 
> >> perhaps you doubt that they can crack any keys at all...
> > 
> > Don't get smart with me, jackass.
> 
> Fuck off, shitehead.  Call me a jackass, when I simply state facts
> you admitted to?  You're a fucking idiot.  Welcome to my ignore list.
> 


WOW! Both of you! Come on, guys! What is this? I've never seen such
thing here for all the years I'm on the list.

Please calm down, we are supposed to be friends here, right?


-- 
Best regards,
Daniel
-- 
gentoo-user@lists.gentoo.org mailing list



Re: [gentoo-user] loop-aes + extra-ciphers...

2008-06-25 Thread Jason Rivard
On Wed, Jun 25, 2008 at 9:51 PM, Chris Walters <[EMAIL PROTECTED]> wrote:

> Alan McKinnon wrote:
>
>> Or perhaps you doubt that they can crack any keys at all...
>>>
>>
>> Don't get smart with me, jackass.
>>
>
> Fuck off, shitehead.  Call me a jackass, when I simply state facts you
> admitted to?  You're a fucking idiot.  Welcome to my ignore list.
>
> Now that was TOTALLY UNCALLED FOR! All he asked you to do is prove your
ludicrous statements about the NSA being able to crack any key in a "short"
amount of time. Wait for my private mail, Mr. Walters.

Jase


[gentoo-user] Security of ciphers.

2008-06-25 Thread Jason Rivard
I've been reading this thread in the archives, on loop-aes and then the
security of AES. I hate to jump on the bandwagon, so before I do, I will
state that I *am* a crypto-expert, and have worked for the several
government entities in the US. I am not at liberty to tell you which ones.

Mr. Walters:  It is not all that easy to crack a *secure* key with the
AES-256 cipher. This holds true, even with networks of super-computers. Just
how many of them do you think the NSA (you named it), has to spare for
things like that? Parallel and distributed computing does not help much with
AES, since it is a CBC cipher algorithm (look it up).

I think you need to do some research on the subject you say you're majoring
in, before you post on the topic, Mr. Walters.

Jase


Re: [gentoo-user] loop-aes + extra-ciphers...

2008-06-25 Thread Jason Rivard
On Wed, Jun 25, 2008 at 9:24 PM, Sebastian Wiesner <[EMAIL PROTECTED]>
wrote:

> Chris Walters <[EMAIL PROTECTED]> at Wednesday 25 June 2008, 22:25:18
> > Are you a cryptology expert?
>
> Are you then?


  I doubt that either of you are cryptology experts. I've known a few, and I
am a crypto-expert, who has worked for the government of the US.

>
> > The only thing that cryptography attempts to do is reduce the
> > **probability** of cracking the key and gaining access to the data as low
> > as possible.
>
> No news.  That's, why cryptology defines "security" not as "being
> impossible
> to crack", but as "being sufficiently improbable to crack".  The only
> cipher, that can't be "brute-forced", is the OTP, which is
> considered "perfectly secure".


There is no such thing as perfectly secure, but a cipher algorithm that
would take *all* the computers on Earth a year or more to crack is pretty
secure.

>
> > As for brute forcing a passphrase:  Since most implementations of AES
> > (Rijndael) use a hash of the passphrase to form the key, it amounts to
> > the same thing, in practice, as cracking the key.
>
> First of all, you can perform hard disk encryption _without_ a passphrase.
> You can store keyfiles on smart cards, usb sticks, etc.  In this case, you
> can generate a _truely random_ key.
>
> Using a passphrase is the most insecure approach, but still, with a
> sufficiently random passphrase, you can gain a level of security, that even
> the NSA will find difficult to come around.
>
> The randomness of a 30-char passphrase does of course by far not match the
> randomness of a 256-bit key, so there is a real chance, that it can be
> guessed by brute force.  Still it will take much cpu time, which is not
> endless, even to the NSA.


I don't think I can really comment on this, except to say that smart cards
and usb thumb drives are the way to go for security. As long as you can keep
control of the device.

>
> In such a case, the question is, if the data, you ciphered, is really worth
> the effort of putting a super computer into work for a long time to try any
> possible passphrase.


Mr. Walters' claim is not that they would put a single super-computer to
decrypting it, but a "network of supercomputers". I truly don't think you
have to worry about that occurring, unless you are deemed a danger to US
National Security. Even then, AES is very hard to crack. The major weakness
is the person who encrypts the data. Under questioning, most will give up
their keys.

>
> > Cryptology is, at least partly about finding the weakest link, because
> > that is what is likely to be attacked in any cryptosystem.
>
> Of course, absolutely true.  Hard disk encryption is by far not perfect,
> just look at the cold boot attacks that gained public interest in the last
> time.  But you didn't talk of _cryptosystems_ in your previous posts, you
> did talk about _algorithms_.


By themselves algorithms are relatively useless. It is only the application
of those algorithms that make them useful. In this case, Mr. Walters pointed
out how *NOT* to apply cipher algorithms. Some of the ways, anyway.

>
> Summarizing, the modern ciphers themselves are secure, as there is mostly
> no
> way to crack them save a brute-force attack on the key.  On the other hand,
> cryptosystems built around these algorithms can of course contain
> weaknesses and holes, like weak passphrases, unsecure key storage, etc.
>
> > The US Government only keeps classified information on non-networked
> > computers in secure environments, so the cipher used does not matter as
> > much as the other security measures taken to ensure that the data does
> > not fall into the wrong hands.
>
> May be.  I do not know, which restrictions apply to US classified data, I
> only know about official statements, the US government made towards the
> security of AES.


I can neither confirm nor deny Mr. Walters' statement. I will state that the
United States Government does, in fact, use ciphers to communicate with
Embassies, Military Camps and Bases abroad, and Naval vessels. That hardly
fits Mr. Walters' statement.

>
> > A final thought:  It is a fact that both the US Navy and the NSA are
> > *very* interested in cryptology and data security.  The NSA also does
> > have large networks of supercomputers that, using parallel, distributed
> > or concurrent computing principles can crack keys more quickly than you
> > may think.
>
> You can use simple mathematics to find out, that even the largest super
> computers, having one peta flop, needs millions of years to perform an
> exhaustive search through AES key space.
>
> Anyway, you may believe, what you want to believe, I'm just reflecting,
> what
> real experts like Bruce Schneier have been telling for years:  It's wrong
> to trust into simple ciphers, but it's equally wrong, to believe, that
> anything can be broken.


It is equally wrong to believe that any cipher is immune to attack, but it
is not nearly as easy as Mr. Wa

Re: [gentoo-user] loop-aes + extra-ciphers...

2008-06-25 Thread Chris Walters

Alan McKinnon wrote:
Or 
perhaps you doubt that they can crack any keys at all...


Don't get smart with me, jackass.


Fuck off, shitehead.  Call me a jackass, when I simply state facts you admitted 
to?  You're a fucking idiot.  Welcome to my ignore list.


--
gentoo-user@lists.gentoo.org mailing list



Re: [gentoo-user] CD ROM does not play audio CD's

2008-06-25 Thread John covici
on Wednesday 06/25/2008 Uwe Thiem([EMAIL PROTECTED]) wrote
 > On Wednesday 25 June 2008, Yoav Luft wrote:
 > > Hi,
 > > I posted a similar e-mail a couple of weeks ago and got no
 > > response. I wish not to spam the mailing list, only for maybe a
 > > better luck this time. My CD ROM drive had stopped playing audio
 > > CD's. It still works fine, data CD's work alright and various
 > > programs manage to gather useful information about the audio CD's
 > > tracks, but I hear nothing. I checked all controls in alsamixer to
 > > be unmuted and at reasonable volume, but it's not it. I can't rip
 > > the CD's neither. Any ideas what might be wrong?
 > 
 > This looks like the two-wire cable between the CD ROM and your 
 > soundcard is missing or loose. I'd check this first. If this is a 
 > laptop, it might well be that the connection between the two 
 > subsystems was left out intentionally by the manufacturer to save a 
 > couple of cents. Some do that. :-(
 > 

I am having the same problem -- but additionally my CDROM  has no
place to even put such a cable -- at least according to the person who
actually put the machine together.
I have not opened up the box to check, but if so, what can I do to
play cds?

-- 
Your life is like a penny.  You're going to lose it.  The question is:
How do
you spend it?

 John Covici
 [EMAIL PROTECTED]
-- 
gentoo-user@lists.gentoo.org mailing list



Re: [gentoo-user] loop-aes + extra-ciphers...

2008-06-25 Thread Alan McKinnon
On Wednesday 25 June 2008, Chris Walters wrote:
> | This is the point where I start to ask for a citation and stop
> | listening to theoretical possibilities and things that might
> | possibly could be. Unless of course the exact meaning of phrases
> | like "three hundred thousand million years" has a different meaning
> | in your universe than it does in mine.
>
> Whom are you asking for a citation from?

I'm asking you to back up your totally unsubstantiated assertions that 
the NSA et al can rapidly crack decent cryptography

> For which particular facts? 

Pick any one you like from your contribution to this thread. My 
favourite would be this one:

"A final thought:  It is a fact that both the US Navy and the NSA are 
*very*
interested in cryptology and data security.  The NSA also does have 
large
networks of supercomputers that, using parallel, distributed or 
concurrent
computing principles can crack keys more quickly than you may think."

Now that's a pretty definite statement you made there. So, how quickly 
do you think I think they can do it? And how quickly can they actually 
do it?

>  Do you really doubt that the US NSA has a *lot* of supercomputers?

Not at all, in fact I would hazard an educated guess that the NSA is the 
largest consumer of supercomputers in the world, and also that they are 
very reluctant to advertise the fact. I doubt any of their machines 
appear on the Top500 list.

I say this as a natural deduction from knowing what they are mandated to 
do and how they would realistically go about doing it.

>  Do you really doubt that they have experts in mathematics,
> cryptology, cryptanalysis, and cryptography experts on staff?

Not at all, I would be stupid indeed to doubt that. As evidence, one 
only has to look at the vast amount of technical literature the NSA has 
published on the subject.

> Or 
> perhaps you doubt that they can crack any keys at all...

Don't get smart with me, jackass.

Everyone here who knows a bit about cryptography knows that give enough 
time and resources any key can be cracked.

I asked you to do a perfectly reasonable thing. You are asserting that 
the NSA can crack keys quickly, much quicker than the average geek 
thinks they can do it, but you provide no evidence of this other than 
your own assertion of it. You didn't even give any evidence of why I 
should consider you a credible and knowledgeable person in the field. 
Extraordinary assertions require extraordinary evidence and all that.

I see 4 scenarios here:

1. You are perfectly correct and can back it up. In which case I'd like 
to read the evidence.
2. You are perfectly correct and have the evidence but cannot show it to 
me due to national security or NDA. That's fine, but do say so.
3. You are presenting your knowledgeable hunch/gut feel/opinion/hearsay 
evidence as fact. that's also fine, but do say so.
4. You are simply making stuff up in varying degrees.

-- 
Alan McKinnon
alan dot mckinnon at gmail dot com

--
gentoo-user@lists.gentoo.org mailing list



Re: [gentoo-user] loop-aes + extra-ciphers...

2008-06-25 Thread Sebastian Wiesner
Chris Walters <[EMAIL PROTECTED]> at Wednesday 25 June 2008, 22:25:18
> Are you a cryptology expert?

Are you then?

> The only thing that cryptography attempts to do is reduce the 
> **probability** of cracking the key and gaining access to the data as low 
> as possible.  

No news.  That's, why cryptology defines "security" not as "being impossible 
to crack", but as "being sufficiently improbable to crack".  The only 
cipher, that can't be "brute-forced", is the OTP, which is 
considered "perfectly secure".

> As for brute forcing a passphrase:  Since most implementations of AES
> (Rijndael) use a hash of the passphrase to form the key, it amounts to
> the same thing, in practice, as cracking the key.

First of all, you can perform hard disk encryption _without_ a passphrase.  
You can store keyfiles on smart cards, usb sticks, etc.  In this case, you 
can generate a _truely random_ key. 

Using a passphrase is the most insecure approach, but still, with a 
sufficiently random passphrase, you can gain a level of security, that even 
the NSA will find difficult to come around.

The randomness of a 30-char passphrase does of course by far not match the 
randomness of a 256-bit key, so there is a real chance, that it can be 
guessed by brute force.  Still it will take much cpu time, which is not 
endless, even to the NSA.  

In such a case, the question is, if the data, you ciphered, is really worth 
the effort of putting a super computer into work for a long time to try any 
possible passphrase.

> Cryptology is, at least partly about finding the weakest link, because
> that is what is likely to be attacked in any cryptosystem.

Of course, absolutely true.  Hard disk encryption is by far not perfect, 
just look at the cold boot attacks that gained public interest in the last 
time.  But you didn't talk of _cryptosystems_ in your previous posts, you 
did talk about _algorithms_.  

Summarizing, the modern ciphers themselves are secure, as there is mostly no 
way to crack them save a brute-force attack on the key.  On the other hand, 
cryptosystems built around these algorithms can of course contain 
weaknesses and holes, like weak passphrases, unsecure key storage, etc.

> The US Government only keeps classified information on non-networked
> computers in secure environments, so the cipher used does not matter as
> much as the other security measures taken to ensure that the data does
> not fall into the wrong hands.

May be.  I do not know, which restrictions apply to US classified data, I 
only know about official statements, the US government made towards the 
security of AES.

> A final thought:  It is a fact that both the US Navy and the NSA are
> *very* interested in cryptology and data security.  The NSA also does
> have large networks of supercomputers that, using parallel, distributed
> or concurrent computing principles can crack keys more quickly than you
> may think.

You can use simple mathematics to find out, that even the largest super 
computers, having one peta flop, needs millions of years to perform an 
exhaustive search through AES key space.  

Anyway, you may believe, what you want to believe, I'm just reflecting, what 
real experts like Bruce Schneier have been telling for years:  It's wrong 
to trust into simple ciphers, but it's equally wrong, to believe, that 
anything can be broken.

my 2 cents

-- 
Freedom is always the freedom of dissenters.
  (Rosa Luxemburg)


signature.asc
Description: This is a digitally signed message part.


Re: [gentoo-user] CD ROM does not play audio CD's

2008-06-25 Thread Uwe Thiem
On Wednesday 25 June 2008, Yoav Luft wrote:
> Hi,
> I posted a similar e-mail a couple of weeks ago and got no
> response. I wish not to spam the mailing list, only for maybe a
> better luck this time. My CD ROM drive had stopped playing audio
> CD's. It still works fine, data CD's work alright and various
> programs manage to gather useful information about the audio CD's
> tracks, but I hear nothing. I checked all controls in alsamixer to
> be unmuted and at reasonable volume, but it's not it. I can't rip
> the CD's neither. Any ideas what might be wrong?

This looks like the two-wire cable between the CD ROM and your 
soundcard is missing or loose. I'd check this first. If this is a 
laptop, it might well be that the connection between the two 
subsystems was left out intentionally by the manufacturer to save a 
couple of cents. Some do that. :-(

Uwe

-- 
Ignorance killed the cat, sir, curiosity was framed!
-- 
gentoo-user@lists.gentoo.org mailing list



Re: [gentoo-user] Xorg crashing when PC wake up from suspend-to-ram

2008-06-25 Thread Wael Nasreddine
This One Time, at Band Camp, Wael Nasreddine <[EMAIL PROTECTED]> said, On Mon, 
Jun 23, 2008 at 01:48:29PM +0200:
> Hey guys,

> When my PC wakes up from suspend-to-ram, X crashes, my video card is
> an intel 945GM.

> In ubuntu it works, I tried using Ubuntu's hal-info folder and I
> patched my Intel driver with all ubuntu patches but the problem still
> here, I can't figure out what is going on... I need a little help
> please...

> Xorg.0.log attached...
> /etc/X11/xorg.conf attached...

> Kernel-2.6.25-sabayon-r1 (config Attached)
> x11-base/xorg-server-1.4.2
> x11-drivers/xf86-video-i810-2.3.2
> sys-power/pm-utils-1.1.2.1

> Regards,
Come on guys a little help please!! I either have to keep my Laptop
always turned on or shutdown/boot everytime I'm not using it... please
I need some help!!

-- 
Wael Nasreddine
http://wael.nasreddine.com
PGP: 1024D/C8DD18A2 06F6 1622 4BC8 4CEB D724  DE12 5565 3945 C8DD 18A2

/\ Windows 95 is the most popular virus on the market today.


signature.asc
Description: Digital signature


Re: [gentoo-user] loop-aes + extra-ciphers...

2008-06-25 Thread Chris Walters

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Alan McKinnon wrote:
| On Wednesday 25 June 2008, Chris Walters wrote:
|> Dirk Heinrichs wrote:
|> | If it is so easy for them to crack our ciphers (and the one they
|> | use themselves, btw.), why doesn't Kasperky ask them to crack the
|> | key of the GPCode virus which, according to Kaspersky's
|> | assumptions, would keep 15 million modern PCs busy for a year.
|> |
|> | And, if it is so easy for them, it is as easy for other governments
|> | too, right? That would mean they use a cipher that's easily
|> | crackable by other governments. Do you really think they do?
|>
|> I didn't say it was "easy".  All I said is that it is possible, with
|> enough resources, to crack keys.  I very much doubt that the NSA
|> would be interested in cracking the key of the GPCode virus, since
|> they are more directed to the National Security of the US.
|>
|> As for other governments, if they have large networks of
|> supercomputers, and cryptanalysis experts, then it would probably be
|> just as probable that they could crack any key from any publicly used
|> cipher algorithm.
|
| This is the point where I start to ask for a citation and stop listening
| to theoretical possibilities and things that might possibly could be.
| Unless of course the exact meaning of phrases like "three hundred
| thousand million years" has a different meaning in your universe than
| it does in mine.

Whom are you asking for a citation from?  For which particular facts?  Do you
really doubt that the US NSA has a *lot* of supercomputers?  Do you really
doubt that they have experts in mathematics, cryptology, cryptanalysis, and
cryptography experts on staff?  Or perhaps you doubt that they can crack any
keys at all...

Chris
-BEGIN PGP SIGNATURE-
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=N/8S
-END PGP SIGNATURE-
--
gentoo-user@lists.gentoo.org mailing list



Re: [gentoo-user] loop-aes + extra-ciphers...

2008-06-25 Thread Alan McKinnon
On Wednesday 25 June 2008, Chris Walters wrote:
> Dirk Heinrichs wrote:
> | If it is so easy for them to crack our ciphers (and the one they
> | use themselves, btw.), why doesn't Kasperky ask them to crack the
> | key of the GPCode virus which, according to Kaspersky's
> | assumptions, would keep 15 million modern PCs busy for a year.
> |
> | And, if it is so easy for them, it is as easy for other governments
> | too, right? That would mean they use a cipher that's easily
> | crackable by other governments. Do you really think they do?
>
> I didn't say it was "easy".  All I said is that it is possible, with
> enough resources, to crack keys.  I very much doubt that the NSA
> would be interested in cracking the key of the GPCode virus, since
> they are more directed to the National Security of the US.
>
> As for other governments, if they have large networks of
> supercomputers, and cryptanalysis experts, then it would probably be
> just as probable that they could crack any key from any publicly used
> cipher algorithm.

This is the point where I start to ask for a citation and stop listening 
to theoretical possibilities and things that might possibly could be. 
Unless of course the exact meaning of phrases like "three hundred 
thousand million years" has a different meaning in your universe than 
it does in mine.



-- 
Alan McKinnon
alan dot mckinnon at gmail dot com

-- 
gentoo-user@lists.gentoo.org mailing list



Re: [gentoo-user] Quick script request

2008-06-25 Thread Alan McKinnon
On Wednesday 25 June 2008, Grant wrote:

> > This:
> >j = basename $i .jpg
> > should be more like this:
> >j=$( basename $i .jpg )
> >
> > Or: j=${i%.jpg}
> >
> > That is, there must be no whitespace around the '='. And in order
> > to set j to the result of a command, use $( command ) or ` command
> > `.
>
> Worked perfectly, thanks a lot everyone.

Isn't there a little known and unused but very useful command that 
already does this? This type of usage often comes up on mailing lists 
and invariably someone mentions it after 20 posts or so, but I can 
never remember what it is. Used a lot like rename, but that's not it.


-- 
Alan McKinnon
alan dot mckinnon at gmail dot com

-- 
gentoo-user@lists.gentoo.org mailing list



Re: [gentoo-user] loop-aes + extra-ciphers...

2008-06-25 Thread Chris Walters

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Dirk Heinrichs wrote:
| If it is so easy for them to crack our ciphers (and the one they use
| themselves, btw.), why doesn't Kasperky ask them to crack the key of the
| GPCode virus which, according to Kaspersky's assumptions, would keep 15
| million modern PCs busy for a year.
|
| And, if it is so easy for them, it is as easy for other governments too,
| right? That would mean they use a cipher that's easily crackable by other
| governments. Do you really think they do?

I didn't say it was "easy".  All I said is that it is possible, with enough
resources, to crack keys.  I very much doubt that the NSA would be interested
in cracking the key of the GPCode virus, since they are more directed to the
National Security of the US.

As for other governments, if they have large networks of supercomputers, and
cryptanalysis experts, then it would probably be just as probable that they
could crack any key from any publicly used cipher algorithm.

Regards,
Chris
-BEGIN PGP SIGNATURE-
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=Cvzy
-END PGP SIGNATURE-
--
gentoo-user@lists.gentoo.org mailing list



Re: [gentoo-user] loop-aes + extra-ciphers...

2008-06-25 Thread Chris Walters

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Sebastian Wiesner wrote:
| Chris Walters <[EMAIL PROTECTED]> at Wednesday 25 June 2008, 17:14:20
|
|> | Rumor has it that the three-letter agencies (CIA, KGB, M.A.V.O. [2],
|> | etc) can break those algorithms relatively easy. On the other hand even
|> | weaker algorithms can protect your data against laptop thieves.
|
| You had better used the acronym FUD instead of the word "rumor".  US
| government itself has declared Rijndael 256 sufficient for classified
| information up to top secret.  This level of security is shared among all
| AES finalists like RC6 or Serpent.
|
|> That's more than a rumor.  Another three letter agency (NSA) has networks
|> of supercomputers that can brute force a passphrase is little time.
|
| Bruteforcing a _passphrase_ is not the same as bruteforcing a key.  An both
| of these don't have nothing to do with the algorithm itself.  They are
| side-attacks ...  a weak passphrase is user idiocity, not a cipher
| weakness.
|
|> It is not that I'm terribly paranoid about people getting my data, I just
|> want to make it a little harder.
|
| What's the point in making the impossible even harder?
|
|> Of course, it is always possible to insert code that will send the
|> unencrypted data, once you've logged on - not easy for the casual user,
|> but for the guru, an easy thing.
|
| That's operating system security and has nothing to do with cryptology.
| Someone having only your hard disk can't inject a rootkit into the system.

Are you a cryptology expert?  By the way, nothing is impossible.  The only
thing that cryptography attempts to do is reduce the **probability** of
cracking the key and gaining access to the data as low as possible.

As for brute forcing a passphrase:  Since most implementations of AES
(Rijndael) use a hash of the passphrase to form the key, it amounts to the same
thing, in practice, as cracking the key.

Cryptology is, at least partly about finding the weakest link, because that is
what is likely to be attacked in any cryptosystem.  If the weakest link is
system security or a weak passphrase, then that weakness translates to a
weakness in anything encrypted in such an environment.

The US Government only keeps classified information on non-networked computers
in secure environments, so the cipher used does not matter as much as the other
security measures taken to ensure that the data does not fall into the wrong 
hands.

A final thought:  It is a fact that both the US Navy and the NSA are *very*
interested in cryptology and data security.  The NSA also does have large
networks of supercomputers that, using parallel, distributed or concurrent
computing principles can crack keys more quickly than you may think.

Regards,
Chris
-BEGIN PGP SIGNATURE-

iQIcBAEBCgAGBQJIYqmqAAoJEIAhA8M9p9DAIo8P/A17VwmkVsscVgfFzpCVDQbw
69WHMmoUvn5GasVRiM2JUi2UeEDpzCuLNxYlQglFWhyvsbplV3aiJmtzVdbEitsK
hpf7Jt0wNvzi25Cye/j2DJlkGh7PTGRCkrMkoirgg+JTSFC21TzAnJZSUQH3Zhv8
Inb1C53jl8/RV1KTdPOX2W/hNo1VCPfpFnhxhad8fzj59pM1UwMVktwAQtO1JmOW
fQm3/mSbeLyr0L5ZKPlc5shao/QVZ7Zo9xTDU8PFrBCmmt93MODGdbaOY7IsCmsl
6vWfWi1suV1a9ptPpU9ohn7YZtHlEboRMb4/mHCsj46SsI9cOo1KVLpqfiQZxd1t
U1niZU8Cb67+cvEDcQ/q1eIGDMza01NR8UxtF66vHB8WrGKpLYs+ckHqJg9+hgF5
nUiY2RHeyNd3lh4vUWCY15Kh9OfK/LlL9IvGZV2Vpc066aa/EfC3AyiSSc+cMMx9
r4GQijL3wfKaDY9OUh6hJZcSZpBNTZezQ1sNZNMOm0TgDLGtJNMv5ltHjtZnxmbC
Fus0IRrQVYvXT8ADZW80Ic256RWtUvn73WjBevYswa2T/Oc3o/NWc2sMrxEg8FVs
a7nCa4ErSKIWRbMHTuTZLO3l6+XXjXm0sHk0qQ4JfFNkoV4gyMZq36HelAb2GsRu
7NJKaZIXlOCuNiYByLfp
=wp+F
-END PGP SIGNATURE-
--
gentoo-user@lists.gentoo.org mailing list



[gentoo-user] CD ROM does not play audio CD's

2008-06-25 Thread Yoav Luft
Hi,
I posted a similar e-mail a couple of weeks ago and got no response. I wish
not to spam the mailing list, only for maybe a better luck this time.
My CD ROM drive had stopped playing audio CD's. It still works fine, data
CD's work alright and various programs manage to gather useful information
about the audio CD's tracks, but I hear nothing. I checked all controls in
alsamixer to be unmuted and at reasonable volume, but it's not it. I can't
rip the CD's neither. Any ideas what might be wrong?


Re: [gentoo-user] DVD drive firmware version

2008-06-25 Thread Volker Armin Hemmann
On Wednesday 25 June 2008, Grant wrote:
> Does anyone know how I can find the firmware version in my Lite-On DVD
> drive?  I have an .exe file with the latest version.  Impossible to
> use it?
>
> - Grant


http://forum.rpc1.org/index.php

usually freedos works fine for flashing. For some burners linux flash tools 
exist. Oh and the firmware version is also told by:
dmesg
hdparm
-- 
gentoo-user@lists.gentoo.org mailing list



Re: [gentoo-user] Quick script request

2008-06-25 Thread Grant
>> >> > cd dir1
>> >> > for i in *jpg
>> >> > do
>> >> >  j = basename $i .jpg
>> >> >  cp -u ${j}.jpg dir2/${j}_original.jpg
>> >> > done
>> >> >
>> >> > 'cp -u' works around the messy problem of checking if the
>> >> > destination file exists
> [...]
>> I put the above script in a file, added the appropriate header, issued
>> chmod, and when I execute with ./file I get a bunch of these:
>>
>> ./script: line 6: j: command not found
>> cp: cannot stat `.jpg': No such file or directory
>
> This:
>j = basename $i .jpg
> should be more like this:
>j=$( basename $i .jpg )
>
> Or: j=${i%.jpg}
>
> That is, there must be no whitespace around the '='. And in order to set j
> to the result of a command, use $( command ) or ` command `.

Worked perfectly, thanks a lot everyone.

- Grant
-- 
gentoo-user@lists.gentoo.org mailing list



Re: [gentoo-user] loop-aes + extra-ciphers...

2008-06-25 Thread Alan McKinnon
On Wednesday 25 June 2008, Dirk Heinrichs wrote:

> If it is so easy for them to crack our ciphers (and the one they use
> themselves, btw.), why doesn't Kasperky ask them to crack the key of
> the GPCode virus which, according to Kaspersky's assumptions, would
> keep 15 million modern PCs busy for a year.

There's an interesting side possibility to that one. It's entirely 
plausible that the key used to encrypt all those poor sucker Windows 
user's files isn't just any old key, but rather a very important public 
key that matches a private key the bad guys would like to have - like a 
CA's private key.

Maybe cracking that key isn't such a good idea after all. I think this 
is a case for hose-pipe decryption.

-- 
Alan McKinnon
alan dot mckinnon at gmail dot com

-- 
gentoo-user@lists.gentoo.org mailing list



Re: [gentoo-user] loop-aes + extra-ciphers...

2008-06-25 Thread Sebastian Wiesner
Chris Walters <[EMAIL PROTECTED]> at Wednesday 25 June 2008, 17:14:20

> | Rumor has it that the three-letter agencies (CIA, KGB, M.A.V.O. [2],
> | etc) can break those algorithms relatively easy. On the other hand even
> | weaker algorithms can protect your data against laptop thieves.

You had better used the acronym FUD instead of the word "rumor".  US 
government itself has declared Rijndael 256 sufficient for classified 
information up to top secret.  This level of security is shared among all 
AES finalists like RC6 or Serpent.

> That's more than a rumor.  Another three letter agency (NSA) has networks
> of supercomputers that can brute force a passphrase is little time.

Bruteforcing a _passphrase_ is not the same as bruteforcing a key.  An both 
of these don't have nothing to do with the algorithm itself.  They are 
side-attacks ...  a weak passphrase is user idiocity, not a cipher 
weakness.

> It is not that I'm terribly paranoid about people getting my data, I just
> want to make it a little harder.

What's the point in making the impossible even harder?

> Of course, it is always possible to insert code that will send the
> unencrypted data, once you've logged on - not easy for the casual user,
> but for the guru, an easy thing. 

That's operating system security and has nothing to do with cryptology.  
Someone having only your hard disk can't inject a rootkit into the system.

-- 
Freedom is always the freedom of dissenters.
  (Rosa Luxemburg)


signature.asc
Description: This is a digitally signed message part.


Re: [gentoo-user] Loop-AES versus DM-Crypt versus ???

2008-06-25 Thread Dirk Heinrichs
Am Montag, 23. Juni 2008 schrieb Chris Walters:

> I might try LUKS.  Does it have support for multi-key encryption?  How
> about random key encryption?

Hmm, didn't I mention this? Yes to both. See also http://luks.endorphin.org.

Bye...

Dirk


signature.asc
Description: This is a digitally signed message part.


Re: [gentoo-user] CD/DVD burning tools?

2008-06-25 Thread Dirk Heinrichs
Am Montag, 23. Juni 2008 schrieb Joerg Schilling:

> Be careful not to use forks but only official code. All known forks
> are full of bugs. In special: they come with extremely buggy mkisofs
> variants and they all have incomplete and broken DVD support (because
> the working original DVD support code has been completely relaced in
> the forks).

FUD or Fact?

Bye...

Dirk


signature.asc
Description: This is a digitally signed message part.


Re: [gentoo-user] loop-aes + extra-ciphers...

2008-06-25 Thread Dirk Heinrichs
Am Mittwoch, 25. Juni 2008 schrieb Chris Walters:

> | Rumor has it that the three-letter agencies (CIA, KGB, M.A.V.O. [2],
> | etc) can break those algorithms relatively easy. On the other hand even
> | weaker algorithms can protect your data against laptop thieves.
>
> That's more than a rumor.  Another three letter agency (NSA) has networks
> of supercomputers that can brute force a passphrase is little time.  I am
> majoring in mathematics, and plan to specialize in cryptology.

If it is so easy for them to crack our ciphers (and the one they use 
themselves, btw.), why doesn't Kasperky ask them to crack the key of the 
GPCode virus which, according to Kaspersky's assumptions, would keep 15 
million modern PCs busy for a year. 

And, if it is so easy for them, it is as easy for other governments too, 
right? That would mean they use a cipher that's easily crackable by other 
governments. Do you really think they do?

Bye...

Dirk


signature.asc
Description: This is a digitally signed message part.


Re: [gentoo-user] Quick script request

2008-06-25 Thread Alex Schuster
Grant asks:

> >> > cd dir1
> >> > for i in *jpg
> >> > do
> >> >  j = basename $i .jpg
> >> >  cp -u ${j}.jpg dir2/${j}_original.jpg
> >> > done
> >> >
> >> > 'cp -u' works around the messy problem of checking if the
> >> > destination file exists
[...]
> I put the above script in a file, added the appropriate header, issued
> chmod, and when I execute with ./file I get a bunch of these:
>
> ./script: line 6: j: command not found
> cp: cannot stat `.jpg': No such file or directory

This:
j = basename $i .jpg
should be more like this:
j=$( basename $i .jpg )

Or: j=${i%.jpg}

That is, there must be no whitespace around the '='. And in order to set j 
to the result of a command, use $( command ) or ` command `.

Wonko
-- 
gentoo-user@lists.gentoo.org mailing list



Re: [gentoo-user] Quick script request

2008-06-25 Thread Grant
>> >> Feel free to ignore me here, but if anyone could whip out a quick
>> >> script for this I would really appreciate it.
>> >>
>> >> I need to move any files from dir1 to dir2 if they don't already
>> >> exist in dir2 with a slightly different filename.  The dir1 files
>> >> are named like a-1.jpg and the dir2 files are named like
>> >> a-1_original.jpg.
>> >>
>> >> - Grant
>> >
>> > rough and ready, off the top of my head:
>> >
>> > cd dir1
>> > for i in *jpg
>> > do
>> >  j = basename $i .jpg
>> >  cp -u ${j}.jpg dir2/${j}_original.jpg
>> > done
>> >
>> > 'cp -u' works around the messy problem of checking if the
>> > destination file exists
>>
>> Thanks guys, can you tell me how to execute this?  Put it in a file
>
> yes
>
>> and './file' I think?
>
> Either that or chmod a+x file and execute it directly
>
>> Should I have special stuff at the top of the
>> file?
>
> #!/bin/bash

I put the above script in a file, added the appropriate header, issued
chmod, and when I execute with ./file I get a bunch of these:

./script: line 6: j: command not found
cp: cannot stat `.jpg': No such file or directory

- Grant
-- 
gentoo-user@lists.gentoo.org mailing list



Re: [gentoo-user] Quick script request

2008-06-25 Thread Alan McKinnon
On Wednesday 25 June 2008, Grant wrote:
> >> Feel free to ignore me here, but if anyone could whip out a quick
> >> script for this I would really appreciate it.
> >>
> >> I need to move any files from dir1 to dir2 if they don't already
> >> exist in dir2 with a slightly different filename.  The dir1 files
> >> are named like a-1.jpg and the dir2 files are named like
> >> a-1_original.jpg.
> >>
> >> - Grant
> >
> > rough and ready, off the top of my head:
> >
> > cd dir1
> > for i in *jpg
> > do
> >  j = basename $i .jpg
> >  cp -u ${j}.jpg dir2/${j}_original.jpg
> > done
> >
> > 'cp -u' works around the messy problem of checking if the
> > destination file exists
>
> Thanks guys, can you tell me how to execute this?  Put it in a file

yes

> and './file' I think?  

Either that or chmod a+x file and execute it directly

> Should I have special stuff at the top of the 
> file?

#!/bin/bash

-- 
Alan McKinnon
alan dot mckinnon at gmail dot com

-- 
gentoo-user@lists.gentoo.org mailing list



Re: [gentoo-user] Quick script request

2008-06-25 Thread Alex Schuster
Grant asks:

> Thanks guys, can you tell me how to execute this?  Put it in a file
> and './file' I think?  Should I have special stuff at the top of the 
> file?

Yes, a '#!/bin/bash', it you want top have thsi as a script. You need to 
make it executable, too: chmod +x file

But you can also leave the #!/bin/bash out,l and call it like this: '. file' 
or 'source file'. This acts as if you typed the commands directly in the 
terminal.

Which would be the easiest way to do it: Just mark the stuff in your mail 
program, ans paste it into you terminal.

Wonko
-- 
gentoo-user@lists.gentoo.org mailing list



Re: [gentoo-user] Quick script request

2008-06-25 Thread Grant
>> Feel free to ignore me here, but if anyone could whip out a quick
>> script for this I would really appreciate it.
>>
>> I need to move any files from dir1 to dir2 if they don't already
>> exist in dir2 with a slightly different filename.  The dir1 files are
>> named like a-1.jpg and the dir2 files are named like
>> a-1_original.jpg.
>>
>> - Grant
>
> rough and ready, off the top of my head:
>
> cd dir1
> for i in *jpg
> do
>  j = basename $i .jpg
>  cp -u ${j}.jpg dir2/${j}_original.jpg
> done
>
> 'cp -u' works around the messy problem of checking if the destination
> file exists

Thanks guys, can you tell me how to execute this?  Put it in a file
and './file' I think?  Should I have special stuff at the top of the
file?

- Grant
-- 
gentoo-user@lists.gentoo.org mailing list



Re: [gentoo-user] Quick script request

2008-06-25 Thread Etaoin Shrdlu
On Wednesday 25 June 2008, 17:08, Grant wrote:

> Feel free to ignore me here, but if anyone could whip out a quick
> script for this I would really appreciate it.
>
> I need to move any files from dir1 to dir2 if they don't already exist
> in dir2 with a slightly different filename.  The dir1 files are named
> like a-1.jpg and the dir2 files are named like a-1_original.jpg.

Try this (untested)

#!/bin/bash

cd /dir1

for i in *; do
  if [ ! -f "/dir2/$i" ]; then
bn=${i%.*}
ext=${i##*.}
nn=${bn}_original.${ext}
mv -- "$i" "/dir2/$nn"
  fi

done


For each file in dir1, say a-1.jpg, this look if a file with the same 
name exists in dir2. If not, it moves it to dir2 with the new name of 
a-1_original.jpg. I hope I got that right.
-- 
gentoo-user@lists.gentoo.org mailing list



Re: [gentoo-user] Quick script request

2008-06-25 Thread Alan McKinnon
On Wednesday 25 June 2008, Grant wrote:
> Feel free to ignore me here, but if anyone could whip out a quick
> script for this I would really appreciate it.
>
> I need to move any files from dir1 to dir2 if they don't already
> exist in dir2 with a slightly different filename.  The dir1 files are
> named like a-1.jpg and the dir2 files are named like
> a-1_original.jpg.
>
> - Grant

rough and ready, off the top of my head:

cd dir1
for i in *jpg
do
  j = basename $i .jpg
  cp -u ${j}.jpg dir2/${j}_original.jpg
done

'cp -u' works around the messy problem of checking if the destination 
file exists

-- 
Alan McKinnon
alan dot mckinnon at gmail dot com

-- 
gentoo-user@lists.gentoo.org mailing list



Re: [gentoo-user] Quick script request

2008-06-25 Thread Alex Schuster
Grant asks:

> Feel free to ignore me here, but if anyone could whip out a quick
> script for this I would really appreciate it.

Whipped. Be sure to test it, because I did not :) Remove the echo statement 
when you are sure it works.

> I need to move any files from dir1 to dir2 if they don't already exist
> in dir2 with a slightly different filename.  The dir1 files are named
> like a-1.jpg and the dir2 files are named like a-1_original.jpg.

cd $dir1
for file in *
do
if ! [[ -f $dir2/${file%.*}_original.${file##*.} ]]
then
echo mv -v "$file" "$dir2/"
fi
done

Loop over all files. If not exists a file called dir2/${file%.*}_original.
${file##*/}, move $file. ${file%.*} removes the suffix from $file 
(everything from the last dot on), while ${file##*.} removes everything 
until the dot, leaving the suffix only. Be sure to use the correct path for 
dir2, either absolute or with some ../ in it.

Alex
-- 
gentoo-user@lists.gentoo.org mailing list



Re: [gentoo-user] DVD drive firmware version

2008-06-25 Thread Joerg Schilling
Grant <[EMAIL PROTECTED]> wrote:

> > cdrecord -inq
> >
> > Jörg
>
> Thank you, that works great.  How would you upgrade the firmware?
> Maybe boot to a DOS disc?

Sorry, this is where I cannot help with LiteON drives. 
There may be code for DOS but it it not OSS.

Jörg

-- 
 EMail:[EMAIL PROTECTED] (home) Jörg Schilling D-13353 Berlin
   [EMAIL PROTECTED](uni)  
   [EMAIL PROTECTED] (work) Blog: http://schily.blogspot.com/
 URL:  http://cdrecord.berlios.de/old/private/ ftp://ftp.berlios.de/pub/schily
-- 
gentoo-user@lists.gentoo.org mailing list



Re: [gentoo-user] loop-aes + extra-ciphers...

2008-06-25 Thread Chris Walters

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Daniel Iliev wrote:
| On Tue, 24 Jun 2008 22:20:20 -0400
| Chris Walters <[EMAIL PROTECTED]> wrote:
[snip]
| Perhaps they appear as kernel modules? I'm just guessing.

I think that is how they are supposed to appear, but I can't seem to get them
to compile, and the instructions are not too helpful.

[snip]

| Yes, you can have multiple passwords with dm-crypt-luks.

That is good.
[snip

| Never bothered to go so deep in the internals, but...
|
| I had a busyness laptop with non-sensitive (in my opinion) data, but
| the managers were quite paranoid about that, so I had to encrypt the
| drives to save myself the administrative trouble in case it was stolen.
| I followed the gentoo-wiki how-to [1] and found out that encrypting the
| hdd visibly slowed down the system.
|
| Rumor has it that the three-letter agencies (CIA, KGB, M.A.V.O. [2],
| etc) can break those algorithms relatively easy. On the other hand even
| weaker algorithms can protect your data against laptop thieves.

That's more than a rumor.  Another three letter agency (NSA) has networks of
supercomputers that can brute force a passphrase is little time.  I am majoring
in mathematics, and plan to specialize in cryptology.  I doubt they'd let me
publish an algorithm that is very hard to break...  It is not that I'm terribly
paranoid about people getting my data, I just want to make it a little harder.
Of course, it is always possible to insert code that will send the unencrypted
data, once you've logged on - not easy for the casual user, but for the guru,
an easy thing.

| What I'm saying is that it is pointless to get very crazy about strong
| and heavy algorithms. After all if your enemies are not after your
| hardware, but after your data, they could always physically force you
| to reveal the password.

Yes, I suppose that they could do that, using torture or something like that.

[snip]
| Yes, you could do something like:
|
| head /dev/urandom | gpg --symmetric -a > key.gpg
| gpg --decrypt key.gpg | cryptsetup luksFormat /dev/some-block-device
| gpg --decrypt key.gpg | cryptsetup luksOpen /dev/some-block-device
|
|
| (The above commands are not correct, their sole purpose is to show the
| idea)

Thanks for the ideas, and for the links.  I will be checking them out.

| [1] System Encryption DM-Crypt with LUKS: http://tinyurl.com/clrk6
|
| [2] M.A.V.O.: http://tinyurl.com/4badqs ; http://tinyurl.com/4chhph :D

Regards,
Chris
-BEGIN PGP SIGNATURE-
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=SUZm
-END PGP SIGNATURE-
--
gentoo-user@lists.gentoo.org mailing list



[gentoo-user] Quick script request

2008-06-25 Thread Grant
Feel free to ignore me here, but if anyone could whip out a quick
script for this I would really appreciate it.

I need to move any files from dir1 to dir2 if they don't already exist
in dir2 with a slightly different filename.  The dir1 files are named
like a-1.jpg and the dir2 files are named like a-1_original.jpg.

- Grant
-- 
gentoo-user@lists.gentoo.org mailing list



Re: [gentoo-user] DVD drive firmware version

2008-06-25 Thread Grant
>> Does anyone know how I can find the firmware version in my Lite-On DVD
>> drive?  I have an .exe file with the latest version.  Impossible to
>> use it?
>
> cdrecord -inq
>
> Jörg

Thank you, that works great.  How would you upgrade the firmware?
Maybe boot to a DOS disc?

- Grant
--
gentoo-user@lists.gentoo.org mailing list



Re: [gentoo-user] DVD drive firmware version

2008-06-25 Thread Joerg Schilling
Grant <[EMAIL PROTECTED]> wrote:

> Does anyone know how I can find the firmware version in my Lite-On DVD
> drive?  I have an .exe file with the latest version.  Impossible to
> use it?

cdrecord -inq

Jörg

-- 
 EMail:[EMAIL PROTECTED] (home) Jörg Schilling D-13353 Berlin
   [EMAIL PROTECTED](uni)  
   [EMAIL PROTECTED] (work) Blog: http://schily.blogspot.com/
 URL:  http://cdrecord.berlios.de/old/private/ ftp://ftp.berlios.de/pub/schily
-- 
gentoo-user@lists.gentoo.org mailing list



[gentoo-user] DVD drive firmware version

2008-06-25 Thread Grant
Does anyone know how I can find the firmware version in my Lite-On DVD
drive?  I have an .exe file with the latest version.  Impossible to
use it?

- Grant
-- 
gentoo-user@lists.gentoo.org mailing list



Re: [gentoo-user] loop-aes + extra-ciphers...

2008-06-25 Thread Daniel Iliev
On Tue, 24 Jun 2008 22:20:20 -0400
Chris Walters <[EMAIL PROTECTED]> wrote:

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
> 
> Thanks to all who replied to my previous question.  This question is
> related. Has anyone gotten the 'extra-ciphers' (you can get them from
> the loop-aes site) to compile with the loop-aes kernel patch in
> place?  If so, could you give me a hint on how to do this?


Perhaps they appear as kernel modules? I'm just guessing.


> Also, someone said that it was possible to encrypt using multiple
> passphrases using dm-crypt.  To be clear are we talking about the
> same type of multiple passphrases that can be used with AES and
> Serpent with loop-aes?

Yes, you can have multiple passwords with dm-crypt-luks.


> In other words, you set up a number pg
> passphrases (64 or 65), and the first block uses the first
> passphrase, the second block uses the second one, etc.  The 65th
> passpharse is added to the hash of the encryption passphrase.


Never bothered to go so deep in the internals, but...

I had a busyness laptop with non-sensitive (in my opinion) data, but
the managers were quite paranoid about that, so I had to encrypt the
drives to save myself the administrative trouble in case it was stolen.
I followed the gentoo-wiki how-to [1] and found out that encrypting the
hdd visibly slowed down the system.

Rumor has it that the three-letter agencies (CIA, KGB, M.A.V.O. [2],
etc) can break those algorithms relatively easy. On the other hand even
weaker algorithms can protect your data against laptop thieves.

What I'm saying is that it is pointless to get very crazy about strong
and heavy algorithms. After all if your enemies are not after your
hardware, but after your data, they could always physically force you
to reveal the password.


> Also (as if that weren't enough), is it possible to encrypt the
> passphrases  or keys in dm-crypt with gnupg, like it is with
> loop-aes?  If so, please give examples.
> 

Yes, you could do something like:

head /dev/urandom | gpg --symmetric -a > key.gpg
gpg --decrypt key.gpg | cryptsetup luksFormat /dev/some-block-device
gpg --decrypt key.gpg | cryptsetup luksOpen /dev/some-block-device


(The above commands are not correct, their sole purpose is to show the
idea)


[1] System Encryption DM-Crypt with LUKS: http://tinyurl.com/clrk6

[2] M.A.V.O.: http://tinyurl.com/4badqs ; http://tinyurl.com/4chhph :D



-- 
Best regards,
Daniel
-- 
gentoo-user@lists.gentoo.org mailing list



Re: [gentoo-user] xrandr: Intel G965 and HDTV woes

2008-06-25 Thread bzk0711
On Wed, 25 Jun 2008 10:47:12 +0100
Bob <[EMAIL PROTECTED]> wrote:

> ...
> # xrandr -display :0
> Xlib: connection to ":0.0" refused by server
> Xlib: No protocol specified
> 
> Can't open display :0
> 
> 
> I'm guessing this requires me to somehow open access to the X server.
> 
> I set 'DisallowTCP=false' in /etc/X11/gdm/custom.conf in the
> [security] section and restarted gdm but that didn't seem to do
> anything.
> 
> What else can I try to get xrandr to let me change the resolution for
> a xserver that can't be seen?
> 

Have a look at xhost. 
You can manage the access to your xserver on a per-host basis. "xhost
+" will just allow any host to connect (which is of course insecure,
depending on your environment!).

Regards,
Patric

-- 
gentoo-user@lists.gentoo.org mailing list



[gentoo-user] xrandr: Intel G965 and HDTV woes

2008-06-25 Thread Bob

I've bought a shiny new htpc that I was hoping would just work with
Linux.

Sadly it doesn't.

Before I post a long and rambling diatribe, does anyone know how to
run xrandr remotely (since I just get a blank screen on the hdtv)?

I tried over tunnelled ssh and just got the local (my laptop's) X server's 
settings,
and then tried using the -display flag like so:


# /etc/init.d/xdm start
* Setting up gdm ...
* Detaching to start `/usr/bin/gdm' ...  
# xrandr -display :0

Xlib: connection to ":0.0" refused by server
Xlib: No protocol specified

Can't open display :0


I'm guessing this requires me to somehow open access to the X server.

I set 'DisallowTCP=false' in /etc/X11/gdm/custom.conf in the [security] section 
and restarted gdm but that didn't seem to do anything.

What else can I try to get xrandr to let me change the resolution for a xserver 
that can't be seen?

Thanks.

--
gentoo-user@lists.gentoo.org mailing list