burning as non-root with k3b
For some reason I cannot burn as non-root. The permissions on /dev/cd0c are 660 root:burning and I am positively in the burning group: [elevator] ~% id petr uid=1001(petr) gid=1001(petr) groups=1001(petr), 0(wheel), 5(operator), 1018(burning) Even when i set permissions to 777 on cd0c, my dvd writer still gets unrecognized in k3b. Any ideas? Petr
Re: burning as non-root with k3b
On 08.03.2007, at 09:15, Petr Janda wrote: Even when i set permissions to 777 on cd0c, my dvd writer still gets unrecognized in k3b. Any ideas? try fiddling with pass0 and/or acd0. cheers simon -- Serve - BSD +++ RENT this banner advert +++ASCII Ribbon /\ Work - Mac +++ space for low €€€ NOW!1 +++ Campaign \ / Party Enjoy Relax | http://dragonflybsd.org Against HTML \ Dude 2c 2 the max ! http://golden-apple.biz Mail + News / \ PGP.sig Description: This is a digitally signed message part
Re: burning as non-root with k3b
Simon 'corecode' Schubert wrote: On 08.03.2007, at 09:15, Petr Janda wrote: Even when i set permissions to 777 on cd0c, my dvd writer still gets unrecognized in k3b. Any ideas? try fiddling with pass0 and/or acd0. cheers simon I chmoded all of /dev to 660 and its working now. Ive tried setting pass0 and acd0 to 660 but it made no difference. What could be the block devices in /dev that actually caused my drive not to be recognized at first place? I assume they belong to the scsi sub-system? Petr
Re: wiki log of #dragonfly irc channel
On Wednesday 07 March 2007 19:53, Dmitri Nikulin wrote: All of this is entirely possible. So either you encrypt something and accidentally reveal the key through normal use or OS compromise, or you hide the key perfectly and are charged with destruction of evidence, which is no picnic. They'll know you did it because when the random seizure occurs, you'll have the encrypted files somewhere. Even a complete encrypted partition doesn't look like old-file noise - its apparent entropy is too high. Either way, cryptography doesn't really help you once you're under investigation. At best, it can help you discuss questionable issues without being caught by the many indiscriminate monitoring systems out there, but it takes a lot less than cryptography. Which is precisly why i always envyid that windoze partition encryption thingy, cant remember the name now, but it provides 2 keys, one will open the (actual) container and another one will open another encrypted container with all legal and perfectly harmless files. That way they cannot crack down on you for destruction of evidence (what second password ? häh? no idea what you mean!). But afaik theres is no such thing on any of the BSD systems. Which is sad, because -as you point out pretty precisely - it refutes most of the points file/HD encryption could be useful for - They will just order you to give them the PW as soon as they find an encrypted Partition/File. regards, Helge
Re: wiki log of #dragonfly irc channel
Helge Rohde wrote: cut Which is precisly why i always envyid that windoze partition encryption thingy, cant remember the name now, but it provides 2 keys, one will open the (actual) container and another one will open another encrypted container with all legal and perfectly harmless files. That way they cannot crack down on you for destruction of evidence (what second password ? häh? no idea what you mean!). But afaik theres is no such thing on any of the BSD systems. Which is sad, because -as you point out pretty precisely - it refutes most of the points file/HD encryption could be useful for - They will just order you to give them the PW as soon as they find an encrypted Partition/File. regards, Helge In most western legal systems you are not enforced to participate in gathering evidence against yourself. Though it could be enforced that you are not allowed to alter current situation which can influence evidence against you. In short with a warrant they may be allowed to search your home and take your computer as evidence but they may not enforce you to tell them your pass phrase, that contradicts with the You have the right to remain silent thing :-) -- mph
Re: wiki log of #dragonfly irc channel
On Friday 09 March 2007 00:57, Martin P. Hellwig wrote: Helge Rohde wrote: cut Which is precisly why i always envyid that windoze partition encryption thingy, cant remember the name now, but it provides 2 keys, one will open the (actual) container and another one will open another encrypted container with all legal and perfectly harmless files. That way they cannot crack down on you for destruction of evidence (what second password ? häh? no idea what you mean!). But afaik theres is no such thing on any of the BSD systems. Which is sad, because -as you point out pretty precisely - it refutes most of the points file/HD encryption could be useful for - They will just order you to give them the PW as soon as they find an encrypted Partition/File. regards, Helge In most western legal systems you are not enforced to participate in gathering evidence against yourself. Though it could be enforced that you are not allowed to alter current situation which can influence evidence against you. In short with a warrant they may be allowed to search your home and take your computer as evidence but they may not enforce you to tell them your pass phrase, that contradicts with the You have the right to remain silent thing :-) Yeah, i would have thought so too. But apparently they do bend their rules when the see the need, atleast in Germany they *can* put you into jail until you tell them the passphrase and i have heard similar from other european countries. I believe the reasoning goes along the lines of: they have an urgent suspicion that there is evidence against you (the encrypted partition ), so they can put you into 'Beugehaft' (= coercive detention) until you stop hiding the evidence and cooperate with the authorities. The mentioned two-container system has prooven to be an effective countermeasure (well, atleast until now). cheers, Helge