Re: [CentOS] Logrotate errors

2014-04-10 Thread C. L. Martinez
Yep, Marios and Steven are right ... I have changed dateformat for one log file and I have done another test changing time rotations ... And all works ok. Many thanks for your help. On Fri, Apr 11, 2014 at 12:09 AM, Steven Tardy wrote: > http://svn.fedorahosted.org/svn/logrotate/tags/r3-8-5/logr

Re: [CentOS] Problem running yum update command

2014-04-10 Thread Anthony K
H wrote: > Thank you. I have now rebuilt the database and also secured the server > against the heartbleed bug. I do wonder, however, why the rpm database > crashed? It completed the last yum update just fine. > > Top posting yet again. This is a disease that apparently has no cure!!! Tsk, tsk,

[CentOS] Old HP Xeon server blade with only SCSI HDD ports & CentOS

2014-04-10 Thread Fernando Cassia
Hi there. I got myself a pair of old Intel Xeon blades, which I plan to repurpose with CentOS. The model is : HP bl20p-g3 server blade Manual http://h18004.www1.hp.com/products/quickspecs/12322_ca/12322_ca.pdf Now, the main problem with this hardware is that LVD UW SCSI HDDs are hard to find and

Re: [CentOS] Logrotate errors

2014-04-10 Thread Steven Tardy
http://svn.fedorahosted.org/svn/logrotate/tags/r3-8-5/logrotate.8 shows "hourly" as a .conf option was added to 3.8.5... current centos 6 version is logrotate-3.7.8-17.el6.x86_64 centos6$ man logrotate: dateformat format_string Specify the extension for dateext using the not

Re: [CentOS] chromium-33.0.1750.152-3.el6

2014-04-10 Thread ngeorgop
New build: chromium-33.0.1750.152-4.el6.src.rpm https://drive.google.com/file/d/0B9RlkKQB1POSWWhvaHhfWlZKd1E chromium-33.0.1750.152-4.el6.i386.rpm https://drive.google.c

Re: [CentOS] Logrotate errors

2014-04-10 Thread Marios Zindilis
Logrotate, by default, runs daily (not hourly) and renames the log files that it rotates by appending to them the current date. In your case, you are running it hourly, so it only runs successfully only once a day. The second time that it will attempt to run in the same day, it will find that there

Re: [CentOS] [CentOS-announce] CVE-2014-0160 CentOS 6 openssl heartbleed workaround

2014-04-10 Thread Markus Falb
On 09.Apr.2014, at 22:12, Peter wrote: > On 04/10/2014 03:09 AM, Markus Falb wrote: >> >> I am assuming that client certificates are handed out to staff. Basically >> you can't >> really control where people install client certificates and which client >> software is used. >> If one is tricke

Re: [CentOS] [CentOS-announce] CVE-2014-0160 CentOS 6 openssl heartbleed workaround

2014-04-10 Thread Stephen Harris
On Thu, Apr 10, 2014 at 03:10:31PM +0200, David Hrbá?? wrote: > are going to regenerate the user passwords and ssh keys. What more we SSH keys were not compromised by heartbleed (unless you had a management tool that was vulnerable or an alternative ssh daemon that used libssl). Nothing in the sta

Re: [CentOS] [CentOS-announce] CVE-2014-0160 CentOS 6 openssl heartbleed workaround

2014-04-10 Thread David Hrbáč
Dne 10.4.2014 14:47, Johnny Hughes napsal(a): > Those are the two possible things that could have happened. > = > In the case of CentOS servers, the time period where that could have > occurred is from December 1, 2013 (when openssl-1.0.1e-15.el6 was > released in Ce

Re: [CentOS] [CentOS-announce] CVE-2014-0160 CentOS 6 openssl heartbleed workaround

2014-04-10 Thread Johnny Hughes
On 04/10/2014 05:17 AM, David Hrbáč wrote: > Dne 9.4.2014 17:27, Johnny Hughes napsal(a): >> It is only things that actually used SSL in memory (like httpd, imaps, >> pop3s, etc) . those certificates COULD have been impacted. openssh was >> not impacted (based on my reading). > What about the user

[CentOS] CentOS-announce Digest, Vol 110, Issue 6

2014-04-10 Thread centos-announce-request
Send CentOS-announce mailing list submissions to centos-annou...@centos.org To subscribe or unsubscribe via the World Wide Web, visit http://lists.centos.org/mailman/listinfo/centos-announce or, via email, send a message with subject or body 'help' to centos-announce-requ..

Re: [CentOS] [CentOS-announce] CVE-2014-0160 CentOS 6 openssl heartbleed workaround

2014-04-10 Thread David Hrbáč
Dne 9.4.2014 17:27, Johnny Hughes napsal(a): > It is only things that actually used SSL in memory (like httpd, imaps, > pop3s, etc) . those certificates COULD have been impacted. openssh was > not impacted (based on my reading). What about the user credentials sent over this "insecure" communicati

Re: [CentOS] FLASH NewsBites - Heartbleed Open SSL Vulnerability (fwd)

2014-04-10 Thread Johnny Hughes
For Systems Administrators who missed this broadcast live, it is also available via a recorded webcast. I most highly recommend that if you are in charge of any server that is vulnerable to heartbleed (in CentOS terms, that is anyone with SSL/TLS services and CentOS-6.5 installed) that you absolut