Dracut + Disk Crypt Passphrase Timeout

2013-01-09 Thread John . Florian
I haven't used the disk encryption features much so maybe this is normal, 
but what I saw seemed odd enough I thought I better post it here.

I have just installed F18 (with RC1) and configured the disk crypt 
feature.  I just did my first boot, saw the prompt for the passphrase come 
up when I got called off to tend to problems elsewhere.  Upon returning I 
noticed that my system was now in a dracut emergency recovery shell.  I 
saw some message about a timeout, but had already hit C-A-D before taking 
good mental notes.

Is this timeout normal and expected or is it a bug?  (I'm not worried 
about it, but thought someone might like to know if it's unexpected.)
--
John Florian

-- 
test mailing list
test@lists.fedoraproject.org
To unsubscribe:
https://admin.fedoraproject.org/mailman/listinfo/test

Re: update some testcases

2013-01-08 Thread John . Florian
 From: Adam Williamson awill...@redhat.com
 Sure, but then you've just switched modes. The decisions you made on the
 Guided path are wiped out. This could be made clearer in the UI, though
 - I've seen several users report that they expected to be able to, say,
 delete partitions in Guided mode, then create them in Custom mode.

I did that just today with my desktop machine.  I wanted to leverage the 
Guided feature for most of the setup, but needed to rm the home partition 
since I have that via NFS.

To me the existing naming seemed fairly clear.  In a Guided mode, I expect 
to have the way led for me, but I should be allowed to deviate.  With a 
Manual mode I expect to lead the way, but also be offered tools to make 
that easier.  I guess I didn't think of it so much as modes though, as 
much of a initial question of how much assistance was I going to require.

PS.  I may have all the names horfed up here.  I've only used the new 
anaconda this once.  I've installed F18 hundreds of times already, but 
always via kickstarts ala livecd-tools.
--
John Florian

-- 
test mailing list
test@lists.fedoraproject.org
To unsubscribe:
https://admin.fedoraproject.org/mailman/listinfo/test

Re: systemd: Failed to initialize SELinux context: Permission denied

2012-12-07 Thread John . Florian
Daniel J Walsh dwa...@redhat.com wrote on 12/07/2012 10:46:11:
 
 On 12/07/2012 08:44 AM, Bruno Wolff III wrote:
  On Fri, Dec 07, 2012 at 08:22:10 -0500, john.flor...@dart.biz wrote:
  
  Thinking selinux might be preventing the relabel from happening (?!?) 
I 
  rebooted with selinux=0 so that I could reconfig 
/etc/sysconfig/selinux 
  having SELINUX=permissive, touched /.autorelabel and rebooted again.
  This time I saw the relabel process do its thing and trigger a 
reboot.  I
  then went back to reconfig /etc/sysconfig/selinux having
  SELINUX=enforcing, rebooted and all seemed well, finally.
  
  The autorelabel is supposed to happen early in the boot process and I 
think
  it is supposed to work even if you system normally comes up in 
enforcing
  mode. So that sounds like a bug.
  
  (You can come up in permissive mode using the enforcing=0 kernel 
parameter.
  This is a bit more convenient in some cases for a one time boot, than
  changing the selinux configuration.)
  
  This is generally the safeest way to relabel as you don't want 
processes
  that started with the wrong context creating more incorrectly labelled
  files while you are trying to fix things up (with say restorecon).
  
  So, I'm all good now, but there may be some bugs in that relabel 
should 
  happen automatically bit. -- John Florian
 Yes systemd is supposed to set the machine into permissive mode for the
 relabel, but I guess if the machine is totally mislabeled, systemd might 
be
 prevented from doing this, although I would figure systemd would be 
running as
 the kernel label.  Bottom line this would be difficult to diagnose what
 happened to force you to relabel in permissive mode.
 -BEGIN PGP SIGNATURE-
 Version: GnuPG v1.4.12 (GNU/Linux)
 Comment: Using GnuPG with undefined - http://www.enigmail.net/
 
 iEYEARECAAYFAlDCD0MACgkQrlYvE4MpobN0gACeIRh+3rBTIXX/GVvxxIrMnvUq
 1EUAoNfsFpd+zYOiPq9h/+fXol6j3mLO
 =kYu4
 -END PGP SIGNATURE-


I agree this would be hard to diagnose.  I doubt I could reproduce the 
situation given all this poor system has been through.  That and I'm 
already up to my ears in alligators trying to port our software stack over 
to what's becoming F18.

As I stated, it's no longer a problem for me, so I'm happy.  I just wanted 
to make sure those who would want to know had been informed.

--
John Florian
-- 
test mailing list
test@lists.fedoraproject.org
To unsubscribe:
https://admin.fedoraproject.org/mailman/listinfo/test

Re: systemd: Failed to initialize SELinux context: Permission denied

2012-12-07 Thread John . Florian
Daniel J Walsh dwa...@redhat.com wrote on 12/07/2012 14:40:55:
 
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1
 
 On 12/07/2012 11:26 AM, john.flor...@dart.biz wrote:
  Daniel J Walsh dwa...@redhat.com wrote on 12/07/2012 10:46:11:
  
  On 12/07/2012 08:44 AM, Bruno Wolff III wrote:
  On Fri, Dec 07, 2012 at 08:22:10 -0500, john.flor...@dart.biz wrote:
  
  Thinking selinux might be preventing the relabel from happening 
(?!?)
  I rebooted with selinux=0 so that I could reconfig
  /etc/sysconfig/selinux having SELINUX=permissive, touched
  /.autorelabel and rebooted again. This time I saw the relabel 
process
  do its thing and trigger a reboot.  I then went back to reconfig
  /etc/sysconfig/selinux having SELINUX=enforcing, rebooted and all
  seemed well, finally.
  
  The autorelabel is supposed to happen early in the boot process and 
I
  think it is supposed to work even if you system normally comes up in
  enforcing mode. So that sounds like a bug.
  
  (You can come up in permissive mode using the enforcing=0 kernel
  parameter. This is a bit more convenient in some cases for a one 
time
  boot, than changing the selinux configuration.)
  
  This is generally the safeest way to relabel as you don't want
  processes that started with the wrong context creating more 
incorrectly
  labelled files while you are trying to fix things up (with say
  restorecon).
  
  So, I'm all good now, but there may be some bugs in that relabel
  should happen automatically bit. -- John Florian
  Yes systemd is supposed to set the machine into permissive mode for 
the 
  relabel, but I guess if the machine is totally mislabeled, systemd 
might
  be prevented from doing this, although I would figure systemd would 
be
  running as the kernel label.  Bottom line this would be difficult to
  diagnose what happened to force you to relabel in permissive mode. 
  -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.12 (GNU/Linux) 
Comment:
  Using GnuPG with undefined - http://www.enigmail.net/
  
  iEYEARECAAYFAlDCD0MACgkQrlYvE4MpobN0gACeIRh+3rBTIXX/GVvxxIrMnvUq 
  1EUAoNfsFpd+zYOiPq9h/+fXol6j3mLO =kYu4 -END PGP SIGNATURE-
  
  
  I agree this would be hard to diagnose.  I doubt I could reproduce the
  situation given all this poor system has been through.  That and I'm
  already up to my ears in alligators trying to port our software stack 
over
  to what's becoming F18.
  
  As I stated, it's no longer a problem for me, so I'm happy.  I just 
wanted
  to make sure those who would want to know had been informed.
  
  -- John Florian
  
  
 If you have a selinux-policy version of 57,58,59 it could have also 
failed on
 the relabel in enforcing mode, since there was  a major bug in policy 
that
 should be fixed by -60.
 -BEGIN PGP SIGNATURE-
 Version: GnuPG v1.4.12 (GNU/Linux)
 Comment: Using GnuPG with undefined - http://www.enigmail.net/
 
 iEYEARECAAYFAlDCRkYACgkQrlYvE4MpobNVEwCg3sx2OlPipwq2YHlS+fxsozCb
 ayUAn2r56PioTL8Swc0nG9cglnpOT3tY
 =Bds9
 -END PGP SIGNATURE-


Believe it or not, I had enough ssh history in konsole on that machine to 
scroll back and see where I was doing the upgrade and lo and behold, it 
was on -59 at the time.

Would it make sense to capture the policy version in the audit.log 
alongside those AVCs?  Seems like that would be helpful when reviewing 
them.  Or would it be useless without some sort of tainted flag like the 
kernel uses to indicate when the policy had been augmented in some way?
--
John Florian
-- 
test mailing list
test@lists.fedoraproject.org
To unsubscribe:
https://admin.fedoraproject.org/mailman/listinfo/test

systemd: Failed to initialize SELinux context: Permission denied

2012-12-06 Thread John . Florian
As one bitten by https://bugzilla.redhat.com/show_bug.cgi?id=858373 I was 
hoping to set SELinux back to enforcing on my F18 test box in order to 
provide feedback for 
https://admin.fedoraproject.org/updates/FEDORA-2012-19802/livecd-tools-18.13-1.fc18
. I've had SEL disabled for quite awhile on this box now because building 
images with livecd-creator was more important.  Seeing that an update was 
available, I changed /etc/sysconfig/selinux for enforcing and rebooted and 
was promptly greeted with the message show in the subject.  The box just 
hangs there at this message.

I wasn't expecting this behavior -- figured livecd-creator would be as 
before or better.  I guess for now I need to boot with selinux=0 unless 
someone has any suggestions for this problem.

--
John Florian

-- 
test mailing list
test@lists.fedoraproject.org
To unsubscribe:
https://admin.fedoraproject.org/mailman/listinfo/test

Re: new criterion proposal: core kickstart commands

2012-12-05 Thread John . Florian
 From: Kamil Paral kpa...@redhat.com
 
 In the discussion about 
https://bugzilla.redhat.com/show_bug.cgi?id=869978
 we agreed that we should have a list of core kickstart commands that
 should definitely work for a Final release.
 
 All the options are documented here:
 http://fedoraproject.org/wiki/Anaconda/Kickstart
 
 I tried to make a core selection. I had the following in mind:
 1. Kickstarts are used for automation, therefore the most important 
 commands related to automation must work (manual intervention is not 
fine).
 2. Commands which are easily work-aroundable shouldn't be part of 
 the core selection.
   Example: 'authconfig' kickstart command is just a wrapper around 
 authconfig tool. You can issue the same command in %post and it 
 should do the same. If %post works, it's trivial to work around 
 nonfunctional authconfig kickstart command. The same applies for 
 'firewall', 'group', 'user' and others, it's trivial to run it in %post.
 3. Some commands have plenty of options. We can't really define into
 the smallest detail which one of them must work and which doesn't 
 have to. In this case a blocker-bug discussion is necessary to 
 weight the importance of the option, its usage volume and the risk 
involved.
 
 
 I arrived at three different categories of the core set:
 
 == Setting up installation environment ==
 network
 updates
 keyboard
 lang
 rootpw
 
 * 'network' and 'updates' are core commands, in same cases you 
 really need them to start the installation.
 * 'keyboard' and 'lang' might probably be worked around in %pre, but
 it might be non-trivial for people. But I'm not firmly decided here.
 * 'rootpw' can be worked around in %post, but I consider it pretty 
 basic command to work without problems
 
 == Partitioning the system ==
 zerombr
 autopart
 clearpart
 part
 bootloader
 volgroup
 logvol
 
 * Partitioning is pretty major function of the installer and if 
 doesn't work, it's just useless. I consider it core.
 * LVM support might be questioned. I decided to put it here, because
 LVM is the Fedora default and it might be pretty useful in some 
 automated installation. We can discuss it though.
 * I haven't included some other partitioning commands, like 'btrfs',
 'raid', or 'multipath'. They are useful and pretty, but I don't see 
 them as really core.
 
 == Installation process ==
 install
 upgrade
 repo
 %packages
 %pre
 %post
 poweroff
 reboot
 
 * 'install' and 'upgrade', because you need to be able to tell 
 installer which mode to use
 * 'repo' because you need to set your mirror, or activate/deactive 
 updates-testing, or something like that
 * '%packages' because package selection is one the core functions 
ofkickstart
 * '%pre' and '%post' because it is often needed for some post-
 install setups (setting up sshd, creating accounts etc) and also can
 be used to work around broken commands
 * 'poweroff' and 'reboot' because in an automated environment these 
 might be very important for you. Rebooting a computer that is 1000 
 miles away from you might not be an easy task.
 
 
 It might be a bit difficult to put this into criteria, I think there
 is no other way except than list the core commands. We can't say 
 everything related to partitioning, because then people would 
 argue btrfs command is included. Maybe we can create a separate 
 page/subpage related to kickstart core commands and just link to it 
 from the criteria document.
 
 Comments very welcome.

I make heavy use of the %include directive which I don't see that you've 
mentioned anywhere.  It's a rather fundamental feature for how I use 
kickstarts through livecd-tools to effect dynamic sections.  I suppose I 
could revise my tools to create a dynamic, yet monolith kickstart script, 
but at present I have everything tooled to around a core kickstart script, 
numerous static helpers that get %included and several dynamic helpers 
that are also %included.  Thus I'd appreciate seeing %include added to the 
criteria, if it's not too much of a pain.

FWIW it's presently working fine for me with my test box that was F17 
originally and yum-upgraded to F18 shortly after the branch was made. This 
box is running my tool that runs livecd-tools to make custom live spins 
that I've been heavily testing and developing since the branch.
--
John Florian
-- 
test mailing list
test@lists.fedoraproject.org
To unsubscribe:
https://admin.fedoraproject.org/mailman/listinfo/test

Re: [Test-Announce] Heads up: Fedora 18 Final Change Deadline and Feature Process changes

2012-12-05 Thread John . Florian
 From: Jaroslav Reznik jrez...@redhat.com
 To: devel-annou...@lists.fedoraproject.org, test-
 annou...@lists.fedoraproject.org
 Date: 12/05/2012 15:53
 Subject: [Test-Announce] Heads up: Fedora 18 Final Change Deadline 
 and Feature Process changes
 Sent by: test-boun...@lists.fedoraproject.org
 
 Hi!
 FESCo on today's meeting decided to move the final change deadline
 by one week earlier (2012-12-11) to avoid Christmas holidays 
 break [1] but the final release date remains the same - 2013-01-08 [2].
 After the Final Change Deadline only approved blocker and NTH bugs 
 will be included into the final release, please make sure to do the 
 Bodhi work for everything you'd like to see in final.
 
 FESCo also agreed on Feature Process modifications [3] - from now, all
 proposed features will be publicly announced on devel-announce by 
 the Feature Wrangler once the page content is verified for correctness 
 and FESCo votes on Feature no sooner than a week after the announcement
 to encourage broader discussion.
 
 Jaroslav
 
 [1] https://fedorahosted.org/fesco/ticket/960
 [2] https://fedoraproject.org/wiki/Releases/18/Schedule
 [3] https://fedorahosted.org/fesco/ticket/869


[3] does not look the right link

--
John Florian
-- 
test mailing list
test@lists.fedoraproject.org
To unsubscribe:
https://admin.fedoraproject.org/mailman/listinfo/test

Re: F18 hostname -b foo.bar.baz

2012-11-07 Thread John . Florian
 From: Frank Murphy frankl...@gmail.com
 
 In F18 su -c hostname -b foo.mylocal.stuff
 
 is not kept over a reboot.
 Is there a new command for doing so.


Take a look at hostnamectl out of the systemd package.


--
John Florian
-- 
test mailing list
test@lists.fedoraproject.org
To unsubscribe:
https://admin.fedoraproject.org/mailman/listinfo/test

Re: removing the non booting kernels how do I troubleshoot them?

2012-10-18 Thread John . Florian
 From: Antonio Olivares wingat...@inbox.com
 
  -Original Message-
  From: li...@colorremedies.com
  Sent: Wed, 10 Oct 2012 13:02:03 -0600
  To: test@lists.fedoraproject.org
  Subject: Re: removing the non booting kernels how do I troubleshoot 
them?
  
  
  On Oct 10, 2012, at 12:07 PM, Antonio Olivares wrote:
  
  
  I get dracut errors:
  
  dracut-initqueue[196]:  Warning:  could not boot
  dracut-initqueue[196]:  Warning:  /dev/root does not exist
  
  Entering emergency mode.  Exit the shell to continue
  Type journalctl to view sytem logs.
  
  dracut:/#_
  
  and it just sits there. 
 
  Oh that sounds like you hit a dracut bug. If you rebuild their 
initramfs
  files with the current dracut then they will probably work.
  
  
  Chris Murphy
  --
 
 Newer kernels = 3.6.0-2 do not boot on this toshiba laptop machine.
 I do not know/(have experience)/ with dracut to troubleshoot this 
 issue.  Newer 3.6.1* and today/yesterday's 3.6.2 kernels die with 
 the same message.  Can someone please suggest some commands to try 
 out and fix this issue.

https://fedoraproject.org/wiki/How_to_debug_Dracut_problems has always 
been good to me.


 
 I have done some netinstalls with TC3 and a newer TC4 with great 
 success and do not see these issues!
 
 Thanks,
 
 
 Antonio
 
 
 GET FREE SMILEYS FOR YOUR IM  EMAIL - Learn more at http://
 www.inbox.com/smileys
 Works with AIM®, MSN® Messenger, Yahoo!® Messenger, ICQ®, Google 
 Talk™ and most webmails
 
 
 -- 
 test mailing list
 test@lists.fedoraproject.org
 To unsubscribe:
 https://admin.fedoraproject.org/mailman/listinfo/test



--
John Florian


-- 
test mailing list
test@lists.fedoraproject.org
To unsubscribe:
https://admin.fedoraproject.org/mailman/listinfo/test

Re: kernel: Request for unknown module key

2012-10-16 Thread John . Florian
 From: Adam Williamson awill...@redhat.com
 On Mon, 2012-10-15 at 08:51 -0400, john.flor...@dart.biz wrote:
   From: Carl G ca...@fedoraproject.org 
   
   Hello,
   
   You should consult https://fedoraproject.org/wiki/Secureboot 
  
  Okay, that page certainly sounds like a good start, but it seems short
  on some details.  My custom spin uses only Fedora-provided boot
  components, kernel and modules, yet I still get these messages.  Just
  before livecd-creator reaches the %post of my kickstart, I see these: 
  
  Missing EFI file (/boot/efi/EFI/*/shim.efi) 
  Missing EFI file (/boot/efi/EFI/*/gcdx64.efi) 
  Missing EFI file (/boot/efi/EFI/*/fonts/unicode.pf2) 
  Failed to copy EFI files, no EFI Support will be included. 
  Missing shim.efi, skipping efiboot.img creation. 
  
  So maybe I'm just missing some new required things in my kickstart?
 
 Though Josh cleared up the issue and these messages weren't related, I
 thought I'd cover those too, just in case anyone else is seeing them and
 wondering: you'd need to have grub2-efi in your kickstart to make those
 go away. The only effect of not having it is that the image generated
 will have no UEFI support, it'll work fine in all other respects.
 
 Note that you also need livecd-creator 18.12 to get viable UEFI live
 images with the current F18 package set, as some files that earlier
 livecd-creator versions looked for were relocated or removed in other
 packages .


Thanks Adam for that additional info.  I'm going to add that to my 
kickstart even though I don't have EFI hardware to support, not so much to 
quiet the noise but more because I have the unenviable job of making a 
spin that will ideally work on hardware we don't own yet or may not even 
be manufactured yet.

--
John Florian
-- 
test mailing list
test@lists.fedoraproject.org
To unsubscribe:
https://admin.fedoraproject.org/mailman/listinfo/test

Re: kernel: Request for unknown module key

2012-10-15 Thread John . Florian
 From: Carl G ca...@fedoraproject.org
 
 Hello,
 
 You should consult https://fedoraproject.org/wiki/Secureboot

Okay, that page certainly sounds like a good start, but it seems short on 
some details.  My custom spin uses only Fedora-provided boot components, 
kernel and modules, yet I still get these messages.  Just before 
livecd-creator reaches the %post of my kickstart, I see these:

Missing EFI file (/boot/efi/EFI/*/shim.efi)
Missing EFI file (/boot/efi/EFI/*/gcdx64.efi)
Missing EFI file (/boot/efi/EFI/*/fonts/unicode.pf2)
Failed to copy EFI files, no EFI Support will be included.
Missing shim.efi, skipping efiboot.img creation.

So maybe I'm just missing some new required things in my kickstart?  To be 
perfectly clear, my target hardware does not have EFI, nor do I require 
these secure-boot features.  So do I have to just live with all this noise 
in the system log?  Or is there a way to quiet things down a bit by 
installing some shim package or some such?


 2012/10/11 john.flor...@dart.biz
 I've made a custom Live spin of F18 and why I boot the resultant 
 image and review journalctl (for other reasons), I'm seeing quite a 
 few instances of: 
 
 kernel: Request for unknown module key 'Fedora kernel signing key: 
 c6fb6e1f2b79b50ab078f4d6b9fc9b2204a692a7' err -11 
 
 # rpm -q kernel 
 kernel-3.6.1-1.fc18.i686 
 
 Any idea what that's all about? 

--
John Florian
-- 
test mailing list
test@lists.fedoraproject.org
To unsubscribe:
https://admin.fedoraproject.org/mailman/listinfo/test

Re: kernel: Request for unknown module key

2012-10-15 Thread John . Florian
 From: Josh Boyer jwbo...@gmail.com
 
 On Mon, Oct 15, 2012 at 9:18 AM,  john.flor...@dart.biz wrote:
  Post the full dmesg output of the boot.  There should be a section in
  there about loading the module signing key with a key listed.  If 
that
  didn't succeed, it will produce that error message when a module is
  loaded, but it will still load.
 
  Okay, the entire dmesg output follows, but given what you just said, I
  suspect this is the important bit:
 
  [3.643056] MODSIGN: Problem loading in-kernel X.509 certificate 
(-129)
 
 Actually, the important bit is the few lines above that:
 
  [3.591826] Loading module verification certificates
  [3.601372] Cert Valid From: 2012-10-08 16:52:26
  [3.610300] Cert Valid To: 2112-09-14 16:52:26
  [3.618967] Now: 2003-01-01 00:02:42
  [3.626830] X.509: Cert c6fb6e1f2b79b50ab078f4d6b9fc9b2204a692a7 is 
not
  yet valid
  [3.643056] MODSIGN: Problem loading in-kernel X.509 certificate 
(-129)
  [3.654414] registered taskstats version 1
  [3.664906]   Magic number: 3:0:0
  [3.673116] rtc_cmos 00:04: setting system clock to 2003-01-01 
00:02:44
  UTC (1041379364)
 
 Your RTC thinks it's 2003.  Why it does, I have no idea but that is the
 problem.  The cert embedded in the kernel is valid from the dates
 listed and since your machine is telling the kernel we're back in the
 past it won't load.
 
 If you can get your machine to join us in this decade, the message
 should go away.  If for some reason it really just wants to stay in
 2003, the error message is just irritating.  Nothing is going to be
 prevented from working.

Oh, well that seems obvious now.  I'm not sure how I missed that; likely 
I'm overly dependent on grep.  Thank you for the detailed explanation.

The RTC issue is a long standing one I've fought for some time with little 
success.  I have a large number of PC/104 class systems that refuse to 
have their hardware clock become sync'd with the kernel's clock, despite 
variously using ntpd, chronyd, custom calls to hwclock and the stuff in 
the old initscripts. I've not yet looked into how systemd has replaced 
those parts that were in initscripts.  While most of these systems never 
get shutdown properly -- their deployed design requirement is to simply be 
powered off -- I've come to believe the problem is somehow buggy hardware, 
although *some* units of the same make/model do sync.  Sigh!  :-(

--
John Florian
-- 
test mailing list
test@lists.fedoraproject.org
To unsubscribe:
https://admin.fedoraproject.org/mailman/listinfo/test

kernel: Request for unknown module key

2012-10-11 Thread John . Florian
I've made a custom Live spin of F18 and why I boot the resultant image and 
review journalctl (for other reasons), I'm seeing quite a few instances 
of:

kernel: Request for unknown module key 'Fedora kernel signing key: 
c6fb6e1f2b79b50ab078f4d6b9fc9b2204a692a7' err -11

# rpm -q kernel
kernel-3.6.1-1.fc18.i686

Any idea what that's all about?

--
John Florian

-- 
test mailing list
test@lists.fedoraproject.org
To unsubscribe:
https://admin.fedoraproject.org/mailman/listinfo/test

Odd user/group identity lookup problem

2012-10-04 Thread John . Florian
I'm building F18 images with livecd-creator on F18 and for the first build 
attempt after boot, I see many unexpected errors like this snippet shows:

[snip]
  Installing: libsemanage  # [315/492] 

  Installing: shadow-utils # [316/492] 

groupadd: failure while writing changes to /etc/group
groupadd: failure while writing changes to /etc/group
  Installing: libutempter  ### [317/492]warning: group 
utempter does not exist - using root
warning: group utmp does not exist - using root
  Installing: libutempter  # [317/492] 

[snip]
  Installing: parted   # [331/492] 

groupadd: failure while writing changes to /etc/group
useradd: group 'dhcpd' does not exist
  Installing: dhcp  
[332/492]warning: user dhcpd does not exist - using root
warning: group dhcpd does not exist - using root
warning: user dhcpd does not exist - using root
warning: group dhcpd does not exist - using root
warning: user dhcpd does not exist - using root
warning: group dhcpd does not exist - using root
  Installing: dhcp # [332/492] 

[snip]
  Installing: os-prober# [335/492] 

groupadd: failure while writing changes to /etc/group
  Installing: openssh  ## [336/492]warning: 
group ssh_keys does not exist - using root
[snip]
  Installing: samba-common # [338/492] 

Failed to initialize SELinux context: No such file or directory
  Installing: iputils  # [339/492] 

[snip]
  Installing: mesa-dri-drivers # [347/492] 

groupadd: failure while writing changes to /etc/group
useradd: group 'polkitd' does not exist
  Installing: polkit [348/492]warning: user polkitd does not exist - using 
root
[snip]
  Installing: alsa-utils   # [354/492] 

error: %pre(rpcbind-0.2.0-17.fc18.i686) scriptlet failed, exit status 6
error: rpcbind-0.2.0-17.fc18.i686: install failed
groupadd: failure while writing changes to /etc/group
useradd: group 'chrony' does not exist
  Installing: chrony [356/492]warning: group chrony does not exist - using 
root
  Installing: chrony    
[356/492]warning: user chrony does not exist - using root
warning: group chrony does not exist - using root
warning: user chrony does not exist - using root
warning: group chrony does not exist - using root
  Installing: chrony   # [356/492] 

[snip]

If I let it run through to completion and rerun the exact same command 
again, everything works normally.  I used to see this behavior for every 
build attempt prior to sssd coming along when I was still using nscd, if 
nscd was running.  Back then I'd have to stop nscd for the duration of the 
build.  I never had such a problem with sssd, but this looks eerily 
familiar now with F18 (where I'm still using sssd instead of nscd).

Has anyone else seen something similar, or is this a known bug?  I have 
not had a chance to dig into this yet, but I've been seeing this with F18 
since before Alpha was out.

PS.  FWIW, this F18 box started life as F17 and was been yum distro-sync'd 
and kept updated.

--
John Florian

-- 
test mailing list
test@lists.fedoraproject.org
To unsubscribe:
https://admin.fedoraproject.org/mailman/listinfo/test

Re: Selinux in development releases

2012-09-25 Thread John . Florian
 From: Jóhann B. Guðmundsson johan...@gmail.com
 To: test@lists.fedoraproject.org
 Date: 09/24/2012 16:25
 Subject: Re: Selinux in development releases
 Sent by: test-boun...@lists.fedoraproject.org
 
 On 09/24/2012 08:16 PM, drago01 wrote:
  On Mon, Sep 24, 2012 at 10:13 PM, Jóhann B. Guðmundsson
  johan...@gmail.com wrote:
  I hereby propose that we default selinux to permissive mode up to 
final
  which should just get rid of unneeded nuance during testing.
  -1
 
  This would just mean we test something different then we actually
  ship. If there are selinux bugs they are supposed to be cough during
  testing and reported like any other bugs.
 
 With permissive mode we should still be able to catch all those errors 
 and report them without all the downside that comes with having it in 
 enforcing mode during our development releases...

Not true from what I've witnessed.  There are certain rules that indeed 
block some action, but do not get logged.  I've encountered several over 
the years and was only able to detect these by toggling 
enforcing/permissive.  I do wish there was some master switch to 
temporarily enable logging for them.

I concur that Dan is superhuman in his response times.

--
John Florian
-- 
test mailing list
test@lists.fedoraproject.org
To unsubscribe:
https://admin.fedoraproject.org/mailman/listinfo/test

Re: Selinux in development releases

2012-09-25 Thread John . Florian
 From: Jason L Tibbitts III ti...@math.uh.edu
  JF == John Florian john.flor...@dart.biz writes:
 
 JF I do wish there was some master switch to temporarily enable logging
 JF for them.
 
 You mean, besides the existing disable dontaudit rules switch?  Just
 run semoduile -DB.  It's pretty much mandatory to do that first when
 debugging selinux problems.
 


No, that would be the one I'd want and was completely unaware of.  ;-)

I was going to suggest that this should be noted at 
http://fedoraproject.org/wiki/SELinux/Troubleshooting, but I see it 
already is.  This just proves what I was saying about Dan's superhuman 
response times.  He can somehow introduce just requested features prior to 
the present time!  =)

Regardless of how dumb I feel right now, thanks so much for pointing that 
out.

--
John Florian
-- 
test mailing list
test@lists.fedoraproject.org
To unsubscribe:
https://admin.fedoraproject.org/mailman/listinfo/test

Re: Selinux in development releases

2012-09-25 Thread John . Florian
 From: Jason L Tibbitts III ti...@math.uh.edu
 I'm something of an idiot when it comes to selinux; I used to know just
 enough to get a reasonable bug report out, but now I've even forgotten
 most of that.  I do know, however, that turning off dontaudit rules can
 save your sanity, because _way_ too much stuff fails silently.  Which is
 a horrible bug in itself but it seems to be by design.

I concur.  I suppose there's a good reason to not log some of these, but 
I've nearly lost my sanity more than once with these squelched messages. 
Life improved only once I realized my testing was missing 'setenforce 0' 
to see if that had any effect.

--
John Florian
-- 
test mailing list
test@lists.fedoraproject.org
To unsubscribe:
https://admin.fedoraproject.org/mailman/listinfo/test

Re: Selinux in development releases

2012-09-25 Thread John . Florian
 From: john.flor...@dart.biz
 I was going to suggest that this should be noted at http://
 fedoraproject.org/wiki/SELinux/Troubleshooting, but I see it already
 is.

Perhaps I should start reading all of my mail before responding to any of 
it.  Anyway, I'm very happy to see the addition on that page.

--
John Florian
-- 
test mailing list
test@lists.fedoraproject.org
To unsubscribe:
https://admin.fedoraproject.org/mailman/listinfo/test

Re: sudo/kerberos problems in F18

2012-08-17 Thread John . Florian
 From: john.flor...@dart.biz
 
 I have sudo configured with: 
 
 # Allow all members of the sudoers group (in LDAP) to run all commands. 
 %sudoersALL=(ALL)   NOPASSWD: ALL 
 
 I'm a member of the sudoers group, but it is failing to authenticate
 me and this shows up in syslog: 
 
 Aug 16 16:04:28 f18test [sssd[krb5_child[16009]]]: Credential cache 
 directory /run/user/10325/ccdir does not exist 
 
 All but the ccdir does indeed exist.  Seeing krb5 mentioned here, I 
 should note that system-auth uses Kerberos against an AD server.

Debugging this a little further, I've manually created the required ccdir 
directory and made myself its owner.  Running groups as myself, I can 
confirm my membership to the sudoers group.  However, sudo still claims 
testuser is not in the sudoers file.  This incident will be reported. 
The relevant logs capture:

== /var/log/secure ==
Aug 17 09:34:36 f18test sudo: pam_unix(sudo:auth): authentication failure; 
logname=testuser uid=10325 euid=0 tty=/dev/pts/3 ruser=testuser rhost= 
user=testuser

== /var/log/audit/audit.log ==
type=USER_AUTH msg=audit(1345210476.895:3118): pid=0 uid=0 auid=10325 
ses=56 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 
msg='op=PAM:authentication acct=testuser exe=/usr/bin/sudo hostname=? 
addr=? terminal=/dev/pts/3 res=success'

== /var/log/secure ==
Aug 17 09:34:36 f18test sudo: pam_sss(sudo:auth): authentication success; 
logname=testuser uid=10325 euid=0 tty=/dev/pts/3 ruser=testuser rhost= 
user=testuser

== /var/log/audit/audit.log ==
type=USER_ACCT msg=audit(1345210476.896:3119): pid=0 uid=0 auid=10325 
ses=56 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 
msg='op=PAM:accounting acct=testuser exe=/usr/bin/sudo hostname=? 
addr=? terminal=/dev/pts/3 res=success'
type=USER_CMD msg=audit(1345210476.897:3120): pid=0 uid=0 auid=10325 
ses=56 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 
msg='cwd=/home/00/testuser cmd=date terminal=pts/3 res=failed'

== /var/log/secure ==
Aug 17 09:34:36 f18test sudo:   testuser : user NOT in sudoers ; TTY=pts/3 
; PWD=/home/00/testuser ; USER=root ; 
ENV=PROPHILE=/var/lib/prophile.d/jflorian GVIMINIT=source 
/var/lib/prophile.d/jflorian/vim/gvimrc VIMINIT=source 
/var/lib/prophile.d/jflorian/vim/vimrc ; COMMAND=/bin/date

I'm not sure what else I can do to dig further into why sudo is failing.

--
John Florian

-- 
test mailing list
test@lists.fedoraproject.org
To unsubscribe:
https://admin.fedoraproject.org/mailman/listinfo/test

SELinux blocking automounted home

2012-08-16 Thread John . Florian
My $HOME is (normally) mounted with autofs via NFS, but with F18 I am 
seeing this in my audit.log:

type=AVC msg=audit(1345138563.576:2652): avc:  denied  { block_suspend } 
for  pid=3708 comm=sssd_nss capability=36 
scontext=system_u:system_r:sssd_t:s0 tcontext=system_u:system_r:sssd_t:s0 
tclass=capability2

I briefly looked for new SE bools with:

# getsebool -a  | egrep 'sssd|nss'
authlogin_nsswitch_use_ldap -- off

That one didn't quite sound right, but I toggled it anyway, but still no 
luck.  To verify basic setup, I 'setenforce 0' and tried ssh again to see 
if $HOME would be mounted this time.  Still no luck, so as root, I 
manually tried the mount under /tmp and that did work, but also generated:

type=AVC msg=audit(1345139104.567:2687): avc:  denied  { block_suspend } 
for  pid=4084 comm=rpc.idmapd capability=36 
scontext=system_u:system_r:rpcd_t:s0 tcontext=system_u:system_r:rpcd_t:s0 
tclass=capability2

Known problems or am I overlooking something?

--
John Florian
Machine Data Collections Team-- 
test mailing list
test@lists.fedoraproject.org
To unsubscribe:
https://admin.fedoraproject.org/mailman/listinfo/test

Re: SELinux blocking automounted home

2012-08-16 Thread John . Florian
Daniel J Walsh dwa...@redhat.com wrote on 08/16/2012 14:34:01:

 Fixed in selinux-policy-3.11.1-9.fc18.noarch

Should I be able to grab that from bodhi?  If not, where can I get these 
newer than new builds before they reach bodhi?
--
John Florian
Machine Data Collections Team

-- 
test mailing list
test@lists.fedoraproject.org
To unsubscribe:
https://admin.fedoraproject.org/mailman/listinfo/test

sudo/kerberos problems in F18

2012-08-16 Thread John . Florian
I have sudo configured with:

# Allow all members of the sudoers group (in LDAP) to run all commands.
%sudoersALL=(ALL)   NOPASSWD: ALL

I'm a member of the sudoers group, but it is failing to authenticate me 
and this shows up in syslog:

Aug 16 16:04:28 f18test [sssd[krb5_child[16009]]]: Credential cache 
directory /run/user/10325/ccdir does not exist

All but the ccdir does indeed exist.  Seeing krb5 mentioned here, I should 
note that system-auth uses Kerberos against an AD server.
--
John Florian
Machine Data Collections Team-- 
test mailing list
test@lists.fedoraproject.org
To unsubscribe:
https://admin.fedoraproject.org/mailman/listinfo/test

Re: Preupgrade from F17 to F18 Branched

2012-08-15 Thread John . Florian
 From: Adam Williamson awill...@redhat.com

 This is probably a terrible time to try preupgrade. It gets no major
 love until Beta, usually. If your goal is a working install of F18, your
 best option at present is a yum update from F17, following the
 directions at
 https://fedoraproject.org/wiki/
 Upgrading_Fedora_using_yum#Fedora_17_-.3E_Fedora_18 .

Oh, well that would be easier for me since it stays more in my familiar 
realm.  (Preupgrade looks neat, but my norm is fresh installs + puppet.) 
Should this wisdom (both waiting until Beta and that link) be incorporated 
into 
https://fedoraproject.org/wiki/Releases/Branched#Yum_update_from_previous_official_release
 
?

 Or you can 
 wait a week or two and get the Alpha release when it comes out.

If I have to I will, but where's the fun in that?  ;-)

  I grabbed a copy of
  http://mirrors.fedoraproject.org/releases.txt and didn't see any
  mention of Fedora 18 (Branched) as indicated on the Wiki.  I edited
  this copy to include my own  Fedora 18 (Branched) section that
  referenced my local mirror and then got much further. 
 
 It's probably a little early post-F18 for all this to be in place, but
 releases.txt does need updating.

Nice to know, thanks.  I'm having lots of fun seeing what it takes to get 
Fedora out the door since I'm making my own derived Live spins for 
internal company use on embedded systems.  I face many of the same 
challenges.


--
John Florian
Machine Data Collections Team
-- 
test mailing list
test@lists.fedoraproject.org
To unsubscribe:
https://admin.fedoraproject.org/mailman/listinfo/test

Re: Preupgrade from F17 to F18 Branched

2012-08-15 Thread John . Florian
   From: Adam Williamson awill...@redhat.com 
  
   This is probably a terrible time to try preupgrade. It gets no major
   love until Beta, usually. If your goal is a working install of F18,
  your
   best option at present is a yum update from F17, following the
   directions at
   https://fedoraproject.org/wiki/
   Upgrading_Fedora_using_yum#Fedora_17_-.3E_Fedora_18 . 
  
  Oh, well that would be easier for me since it stays more in my
  familiar realm.  (Preupgrade looks neat, but my norm is fresh installs
  + puppet.)  Should this wisdom (both waiting until Beta and that link)
  be incorporated into
  https://fedoraproject.org/wiki/Releases/
 Branched#Yum_update_from_previous_official_release? 
 
 Probably not. Actually I should have written that a bit differently:
 it's a *good* thing from a QA perspective that you're trying preupgrade
 now and finding the bugs. We want them found early. It's only a bad
 thing from the point of view that it has about 0% chance of succeeding.
 =) Even if you get the preupgrade bit working, I believe newUI anaconda
 does not actually implement upgrades yet, so there is no chance the
 anaconda bit of the process will work.
 
 Cool. Let us know if you find any QA process documentation missing - I
 think we cover it pretty well though :)

It is covered pretty well.  For some reason though, when I first sought 
out pages telling me how to get on rawhide (because 18 hadn't been 
branched just yet), I never stumbled onto the Upgrading_Fedora_using_yum 
page.  I mostly got a rawhide box based on intuition, but that page 
clearly documents some things I hadn't thought about.  My suggestion for 
incorporating this link into the Releases/Branched page was primarily 
based on the impression that the former covered that specific topic more 
thoroughly.  Thus I kind of envisioned something akin to:


Yum update from previous official release
This method is available but generally not recommended. Anaconda can make 
changes that are outside what the packaging system can normally deal with. 
You may also run into dependency problems which could take time to 
untangle. You may also need to upgrade from the immediately previous 
release (e.g. install Fedora 12, then Fedora 14 Branched, not jump 
directly from Fedora 12 to Fedora 14 Branched). Be prepared to wipe your 
system and re-install from scratch if things do not go well.

If you decide to go this route anyway, please see 
http://fedoraproject.org/wiki/Upgrading_Fedora_using_yum


Also, that paragraph is just plain confusing (to me, at least).  After 
trying to parse it for a while, I think it's trying to say: You may 
*first* need to upgrade *to* the immediately previous release (e.g. 
install/upgrade to Fedora *13*, then Fedora 14 Branched, not jump directly 
from Fedora 12 to Fedora 14 Branched).

--
John Florian
Machine Data Collections Team
-- 
test mailing list
test@lists.fedoraproject.org
To unsubscribe:
https://admin.fedoraproject.org/mailman/listinfo/test