burning as non-root with k3b

2007-03-08 Thread Petr Janda
For some reason I cannot burn as non-root. The permissions on /dev/cd0c 
are 660 root:burning and I am positively in the burning group:

[elevator] ~% id petr
uid=1001(petr) gid=1001(petr) groups=1001(petr), 0(wheel), 5(operator), 
1018(burning)


Even when i set permissions to 777 on cd0c, my dvd writer still gets 
unrecognized in k3b.


Any ideas?

Petr



Re: burning as non-root with k3b

2007-03-08 Thread Simon 'corecode' Schubert

On 08.03.2007, at 09:15, Petr Janda wrote:
Even when i set permissions to 777 on cd0c, my dvd writer still gets 
unrecognized in k3b.


Any ideas?


try fiddling with pass0 and/or acd0.

cheers
  simon

--
Serve - BSD +++  RENT this banner advert  +++ASCII Ribbon   /\
Work - Mac  +++  space for low €€€ NOW!1  +++  Campaign \ /
Party Enjoy Relax   |   http://dragonflybsd.org  Against  HTML   \
Dude 2c 2 the max   !   http://golden-apple.biz   Mail + News   / \


PGP.sig
Description: This is a digitally signed message part


Re: burning as non-root with k3b

2007-03-08 Thread Petr Janda

Simon 'corecode' Schubert wrote:

On 08.03.2007, at 09:15, Petr Janda wrote:
Even when i set permissions to 777 on cd0c, my dvd writer still gets 
unrecognized in k3b.


Any ideas?


try fiddling with pass0 and/or acd0.

cheers
  simon

I chmoded all of /dev to 660 and its working now. Ive tried setting 
pass0 and acd0 to 660 but it made no difference. What could be the block 
devices in /dev that actually caused my drive not to be recognized at 
first place? I assume they belong to the scsi sub-system?


Petr


Re: wiki log of #dragonfly irc channel

2007-03-08 Thread Helge Rohde
On Wednesday 07 March 2007 19:53, Dmitri Nikulin wrote:

 All of this is entirely possible. So either you encrypt something and
 accidentally reveal the key through normal use or OS compromise, or
 you hide the key perfectly and are charged with destruction of
 evidence, which is no picnic. They'll know you did it because when the
 random seizure occurs, you'll have the encrypted files somewhere. Even
 a complete encrypted partition doesn't look like old-file noise - its
 apparent entropy is too high.

 Either way, cryptography doesn't really help you once you're under
 investigation. At best, it can help you discuss questionable issues
 without being caught by the many indiscriminate monitoring systems out
 there, but it takes a lot less than cryptography.

Which is precisly why i always envyid that windoze partition encryption 
thingy, cant remember the name now, but it provides 2 keys, one will open the 
(actual) container and another one will open another encrypted container with 
all legal and perfectly harmless files. That way they cannot crack down on 
you for destruction of evidence (what second password ? häh? no idea what you 
mean!). But afaik theres is no such thing on any of the BSD systems. Which is 
sad, because -as you point out pretty precisely - it refutes most of the 
points file/HD encryption could be useful for - They will just order you to 
give them the PW as soon as they find an encrypted Partition/File. 

regards,
Helge




Re: wiki log of #dragonfly irc channel

2007-03-08 Thread Martin P. Hellwig

Helge Rohde wrote:
cut
Which is precisly why i always envyid that windoze partition encryption 
thingy, cant remember the name now, but it provides 2 keys, one will open the 
(actual) container and another one will open another encrypted container with 
all legal and perfectly harmless files. That way they cannot crack down on 
you for destruction of evidence (what second password ? häh? no idea what you 
mean!). But afaik theres is no such thing on any of the BSD systems. Which is 
sad, because -as you point out pretty precisely - it refutes most of the 
points file/HD encryption could be useful for - They will just order you to 
give them the PW as soon as they find an encrypted Partition/File. 


regards,
Helge


In most western legal systems you are not enforced to participate in 
gathering evidence against yourself. Though it could be enforced that 
you are not allowed to alter current situation which can influence 
evidence against you. In short with a warrant they may be allowed to 
search your home and take your computer as evidence but they may not 
enforce you to tell them your pass phrase, that contradicts with the 
You have the right to remain silent thing :-)


--
mph


Re: wiki log of #dragonfly irc channel

2007-03-08 Thread Helge Rohde
On Friday 09 March 2007 00:57, Martin P. Hellwig wrote:
 Helge Rohde wrote:
 cut

  Which is precisly why i always envyid that windoze partition encryption
  thingy, cant remember the name now, but it provides 2 keys, one will open
  the (actual) container and another one will open another encrypted
  container with all legal and perfectly harmless files. That way they
  cannot crack down on you for destruction of evidence (what second
  password ? häh? no idea what you mean!). But afaik theres is no such
  thing on any of the BSD systems. Which is sad, because -as you point out
  pretty precisely - it refutes most of the points file/HD encryption could
  be useful for - They will just order you to give them the PW as soon as
  they find an encrypted Partition/File.
 
  regards,
  Helge

 In most western legal systems you are not enforced to participate in
 gathering evidence against yourself. Though it could be enforced that
 you are not allowed to alter current situation which can influence
 evidence against you. In short with a warrant they may be allowed to
 search your home and take your computer as evidence but they may not
 enforce you to tell them your pass phrase, that contradicts with the
 You have the right to remain silent thing :-)
Yeah, i would have thought so too. But apparently they do bend their rules 
when the see the need, atleast in Germany they *can* put you into jail until 
you tell them the passphrase and i have heard similar from other european 
countries. I believe the reasoning goes along the lines of: they have an 
urgent suspicion that there is evidence against you (the encrypted 
partition ), so they can put you into 'Beugehaft' (= coercive detention) 
until you stop hiding the evidence and cooperate with the authorities. The 
mentioned two-container system has prooven to be an effective countermeasure 
(well, atleast until now). 

cheers,
Helge