[rlug] myrinet q.

2008-09-05 Thread Dragos Manac
Salut,

A lucrat careva intre voi cu echipamente Myrinet? http://www.myri.com/

Ma intereseaza sa leg un cluster de 8 noduri, care acum functioneaza
peste gigabit (destul de incet).

Nu stiu daca se justifica achizitia unor echipamente pe 10G, sau cele 2G
sunt suficiente in cazul meu, nefiind noduri extrem de rapide sau
puternice.

Multumesc.


___
RLUG mailing list
RLUG@lists.lug.ro
http://lists.lug.ro/mailman/listinfo/rlug


[rlug] proftpd root exploit

2008-07-22 Thread Dragos Manac
Pentru cei cu ProFTPd instalat:

http://www.heise-online.co.uk/security/One-year-old-ProFTPD-exploit-now-public--/news/81675

Versiunea din Debian Etch e vulnerabila, inca nu a aparut pachetul cu
fixul. 


HTH


___
RLUG mailing list
RLUG@lists.lug.ro
http://lists.lug.ro/mailman/listinfo/rlug


[rlug] ERP romanesc OSS

2006-06-02 Thread Dragos Manac
http://www.computerworld.ro/?page=node&id=6577

Tibi, asteptam o analiza comprehensiva.

-- 
Cu stima,
Dragos Manac
Lead Operations
System & Network Solutions
http://www.sns.ro


___
RLUG mailing list
RLUG@lists.lug.ro
http://lists.lug.ro/mailman/listinfo/rlug


[rlug] LUG Meeting AZI!

2006-05-05 Thread Dragos Manac
Salut,

Dupa cum unii deja stiu, diseara se organizeaza o intalnire informala a
membrilor RLUG in Bucuresti, la Terasa Desperado din parcul Herastrau. 

Locatia este langa statia de metrou Aviatorilor, in capatul bulevadrului
Primaverii. Sper ca va descurcati sa ajungeti. (Si NU, NU cautati pe
Google terasa desperado bucuresti!).

Ca evenimente notabile:

1. Birzan come back 2006. After 3 sabbatical years! + CERF bashing
contest.

2. CaCert Assurance Party: http://www.cacert.org/index.php?id=51 

Pe scurt, cine va fi asigurat va putea semna/elibera for free oricate
ceritificate semnate de CA de la CACert. Pentru a putea porni in .ro
asigurarea e nevoie de cel putin 3 persoane cu 150 puncte CACert, iar
azi e unul din rarele momente cand sunt toti 3 in Bucuresti. ATENTIE:
Aduceti 2 ID-uri la voi, cel putin unul cu poza (chiar si pentru cei
care ne/se cunosc).

3. RLUG Org Debate

O sa profit de faptul ca vom fi la un loc multi din cei care am pornit
sa infiintam organizatia RLUG ca sa vedem in ce masura putem continua ce
am inceput acum cativa ani si sa rezolvam o parte din problemele lasate
de atunci in aer. Invitatia asta la iesire e cu atat mai importanta
pentru cei care au fost sa semneze statutul asociatiei la notar (se stiu
ei). Va rog sa veniti.

Deja s-au anuntat peste 20 de participanti. Ne vedem acolo!

-- 
Dragos Manac
Lead Operations
System & Network Solutions
http://www.sns.ro


___
RLUG mailing list
RLUG@lists.lug.ro
http://lists.lug.ro/mailman/listinfo/rlug


[rlug] mirrorat local

2006-04-12 Thread Dragos Manac
http://ftp.lug.ro/santas-corner/kororaa-xgl-livecd-0.2.iso
ftp://ftp.lug.ro/santas-corner/kororaa-xgl-livecd-0.2.iso


pentru cei interesati


___
RLUG mailing list
RLUG@lists.lug.ro
http://lists.lug.ro/mailman/listinfo/rlug


[rlug] [Fwd: [SECURITY] [DSA 1011-1] New kernel-patch-vserver packages fix root exploit]

2006-03-21 Thread Dragos Manac
Pentru cei ce nu urmaresc listele de securitate si au kernele cu vserver
pe Debian.

 Forwarded Message 
From: Martin Schulze <[EMAIL PROTECTED]>
Reply-To: debian-security@lists.debian.org
To: Debian Security Announcements

Subject: [SECURITY] [DSA 1011-1] New kernel-patch-vserver packages fix
root exploit
Date: Tue, 21 Mar 2006 07:53:32 +0100 (CET)

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- --
Debian Security Advisory DSA 1011-1[EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
March 21st, 2005http://www.debian.org/security/faq
- --

Package: kernel-patch-vserver, util-vserver
Vulnerability  : missing attribute support
Problem type   : local (remote)
Debian-specific: yes
CVE IDs: CVE-2005-4347 CVE-2005-4418
Debian Bugs: 329087 329090

Several vulnerabilities have been discovered in the Debian vserver
support for Linux.  The Common Vulnerabilities and Exposures project
identifies the following problems:

CVE-2005-4347

Bjørn Steinbrink discovered that the chroot barrier is not set
correctly with util-vserver which may result in unauthorised
escapes from a vserver to the host system.

This vulnerability is limited to the 2.4 kernel patch included in
kernel-patch-vserver.  The correction to this problem requires
updating the util-vserver package as well and installing a new
kernel built from the updated kernel-patch-vserver package.

CVE-2005-4418

The default policy of util-vserver is set to trust all unknown
capabilities instead of considering them as insecure.

The old stable distribution (woody) does not contain a
kernel-patch-vserver package.

For the stable distribution (sarge) this problem has been fixed in
version 1.9.5.5 of kernel-patch-vserver and in version
0.30.204-5sarge3 of util-vserver.

For the unstable distribution (sid) this problem has been fixed in
version 2.3 of kernel-patch-vserver and in version 0.30.208-1 of
util-vserver.

We recommend that you upgrade your util-vserver and
kernel-patch-vserver packages and build a new kernel immediately.


Upgrade Instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- 

  Source archives:


http://security.debian.org/pool/updates/main/k/kernel-patch-vserver/kernel-patch-vserver_1.9.5.5.dsc
  Size/MD5 checksum:  637 415731be72a9cd966e2fdb5d4f408c4a

http://security.debian.org/pool/updates/main/k/kernel-patch-vserver/kernel-patch-vserver_1.9.5.5.tar.gz
  Size/MD5 checksum:   950447 fe6b34612095d2fbdbaab5aefbd83264


http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3.dsc
  Size/MD5 checksum:  752 e32069a5ca2ef2bc87794cd6c2160821

http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3.diff.gz
  Size/MD5 checksum:   115947 d0bb2cd998a73905189ee24b5f46dd0d

http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204.orig.tar.gz
  Size/MD5 checksum:   677831 b315f375b1cef48da1b644dec18f22bd

  Architecture independent components:


http://security.debian.org/pool/updates/main/k/kernel-patch-vserver/kernel-patch-vserver_1.9.5.5_all.deb
  Size/MD5 checksum:   436934 b50048ea819d150d660ed96e3988613b

  Alpha architecture:


http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3_alpha.deb
  Size/MD5 checksum:   600660 e52fe0ff93e4c9ca7d58fe8386ebab5a

  AMD64 architecture:


http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3_amd64.deb
  Size/MD5 checksum:   429530 c4155982844c085b7d9bc59d7eaa02c4

  Intel IA-32 architecture:


http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3_i386.deb
  Size/MD5 checksum:   398794 56831faa6fa6d76c601fee78251f50eb

  Intel IA-64 architecture:


http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3_ia64.deb
  Size/MD5 checksum:   640332 ab2b2e4283ca5b62c9d9cf5776b6dadb

  Big endian MIPS architecture:


http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3_mips.deb
  Size/MD5 checksum:   612918 e4a60532f25ce776880261de79278e85

  Little endian MIPS architecture:


http://security.debian.org/pool/u

[rlug] multifunctional pe linux

2006-03-04 Thread Dragos Manac
Salut,

Stiti vreun multifunctional care sa fie suportat complet sub linux?
(adica printare/scanare). Daca e vreunul potrivit ziceti-mi si cum sta
la partea de cartuse/reincarcare.

Multumesc.


___
RLUG mailing list
RLUG@lists.lug.ro
http://lists.lug.ro/mailman/listinfo/rlug


[rlug] tivo

2006-03-02 Thread Dragos Manac
Salut,

Vreau sa fac o masina care sa inregistreze stuff de la tv din cand in
cand, un fel de Tivo. Am cautat un pic dar nu am gasit niciun pachet
gata facut. E vreo solutie mai comoda decat cron-uri care sa apeleze
mplayer/dumpstream? Nu ca asta ar fi criminala, dar s-ar putea sa fie
operata si de persoane fara prea mare pregatire tehnica.

Multumesc.


-- 
Cu stima,
Dragos Manac
Lead Operations
System & Network Solutions
http://www.sns.ro


___
RLUG mailing list
RLUG@lists.lug.ro
http://lists.lug.ro/mailman/listinfo/rlug