ed, interrupt (ctrl-c) again within two seconds
to exit.
Yeah - I did hit it about 6 times there. What do you have to do to
make it actually stop in some reasonable amount of time?
--
Les Mikesell
lesmikes...@gmail.com
___
CentOS
st use a phone app to download
and play without having to copy anything. I use something called
'podcast addict' on an android phone.
--
Les Mikesell
lesmikes...@gmail.com
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos
0
>
> NETMASK0=255.255.255.0
> GATEWAY0=192.168.6.1
>
But it still doesn't matter. Your netmask in the ifcfg- file already
covers that range and you don't need another route/GATEWAY for it.
You don't need the route- file at all.
--
Les Mikesell
lesmikes...@gmail.
On Thu, Feb 19, 2015 at 9:19 AM, James B. Byrne wrote:
>
> On Wed, February 18, 2015 13:07, Les Mikesell wrote:
>> On Wed, Feb 18, 2015 at 11:39 AM, James B. Byrne
>> wrote:
>>> 2. How does one configure the routing table on network startup to
>>> spec
On Wed, Feb 18, 2015 at 10:08 AM, Jim Perrin wrote:
>
>
> On 02/17/2015 02:20 PM, Les Mikesell wrote:
>> Are there any tools to help assemble libraries and debuginfo to
>> examine core dumps that happened on another host where the versions
>> don't match? Somet
ing etho, but remove the entry from the private eth0:192.
Then add a route-eth0:192 file containing the network(s) and
gateway for the private side. The source address it picks should be
the one appropriate to reach the next-hop router specified in your
routes.
--
Les Mikesell
lesmik
On Wed, Feb 18, 2015 at 8:29 AM, James B. Byrne wrote:
>
> On Tue, February 17, 2015 15:20, Les Mikesell wrote:
>> Are there any tools to help assemble libraries and debuginfo to
>> examine core dumps that happened on another host where the versions
>> don't match?
Are there any tools to help assemble libraries and debuginfo to
examine core dumps that happened on another host where the versions
don't match? Something like mock but build-version specific and with
the debuginfo packages pulled in?
--
Les Mikesell
lesmikes...@gmai
explained above (see PARAMETERS).
I think that is still an oversimplification because more than
expansion is involved and the order related to other steps. When does
it do i/o redirection; which things happen before/during starting
subshells/pipes; what if you use 'eval', etc.?
--
Les Mikesell
lesmikes...@gmail.com
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos
t see the order of operations as a simple
set of steps - that you need to know before any of the rest will make
sense.
--
Les Mikesell
lesmikes...@gmail.com
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos
And I
don't know where to find a concise description of that any more.
--
Les Mikesell
lesmikes...@gmail.com
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos
f /bin/test, so try 'man
test' for the syntax of tests. And third, you generally should use
double quotes around variables in tests so they continue to exist as
an empty string if the variable happens to not be set.
--
Les Mikesell
lesmikes...@gmail.com
e when chunks of the
internet can't reach each other for long periods of time and anything
sending should do its own queuing and retries. In fact if you do
greylisting, you have forced all of your senders to prove it.
--
Les Mikesell
lesmikes...@gmail.com
> configuration is sane and does not "accept everything".
>
> So, what is the secondary MX server that you are describing that "accepts
> everything" is based on?
I think he means that the secondary does not know the user names on
the primary. Which it won't, un
mary
> MX on the secondary MX.
Doing greylisting right means you also have to keep the table of
already-known senders up to date and that may be very dynamic.
--
Les Mikesell
lesmikes...@gmail.com
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos
ugs to report and generic 'how
to' questions tend to be met with a 'go google it yourself' response.
It would sort of nice if there were a way to sort pure-technical stuff
from 'slightly-related' and 'way-off-topic' postings so actual
conversations
But my bigger worry
would be a dictionary-type attack on user names as recipients if you
don't have access to the real user list on the secondary. Aside from
the blowback of the bounces, if you've ever accepted an address it is
likely to get on lists of known-good spam and cause extra t
h is always a bad thing - you
want the authoritative receiver to reject at the smtp level instead of
accepting at all. There's a whole category of spam where the real
target is the apparent sender where a bounce will go. Also anything
sending valid mail should be prepared to queue and retry on tem
people,
I think it is generally a good thing when the bulk of the conversation
here is ranting about mostly irrelevant opinions. That is, instead
of 'Why doesn't this work"', or 'How do I fix this problem" that you
would have if there were something fundament
l implementation, but wouldn't it really
only need to track the inodes/paths of the files with >1 link?
--
Les Mikesell
lesmikes...@gmail.com
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos
can only
reproduce the hardlinks that exist in the portion of the filesystem
that is covered in one run. If you do multiple runs covering
different subdirectories, it can't duplicate hardlinks outside of each
run.
--
Les Mikesell
lesmikes...@gmail.com
__
tell it to use an existing disk. I think the only
part that seemed complicated was telling the KVM tools to use
different storage locations for the image files since I wanted them
spread over several volumes.
--
Les Mikesell
lesmikes...@gmail.com
___
iated space will be killed?Avoiding that is kind
of the point of having mirrors
--
Les Mikesell
lesmikes...@gmail.com
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos
e what looks likely. Or, just try to start your applications and
see if they complain about missing libraries, etc.
--
Les Mikesell
lesmikes...@gmail.com
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos
On Tue, Feb 10, 2015 at 4:18 AM, Ron Yorston wrote:
> Les Mikesell wrote:
>>I've mostly been using MATE from epel when I use GUI access on CentOS7
>>because it works with x2go, but just noticed on a system with Gnome3
>>that I can't drag items out of the menu
On Mon, Feb 9, 2015 at 3:42 PM, Valeri Galtsev
wrote:
> >
> Still, there are many knowledgeable people on the list, they may give
> different recommendation, which will create some pool of choices. I asked
> John and Jonathan, I'd like to ask also Les Mikesell and Mr. Silver
han pretty wallpaper?
--
Les Mikesell
lesmikes...@gmail.com
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos
On Mon, Jan 19, 2015 at 4:53 PM, Charles Polisher wrote:
> On Jan 07, 2015 at 01:47:53PM -0600, Les Mikesell wrote:
>>
>> I see a bunch of entries like:
>> ioatdma :00:08.0: Channel halted, chanerr = 2
>> ioatdma :00:08.0: Channel halted, chanerr = 0
>
entials. I doubt stronger
> passwords would have mattered.
Hmmm, maybe a reasonable argument for the crypto-card type VPNs where
the passwords aren't reusable...
--
Les Mikesell
lesmikes...@gmail.com
___
CentOS mailing list
CentOS
owing some instructions or running a script, it's not just the box
>> that is compromised, it is everything you think you know. On the
>> other hand it could have just been an accidental typo.
>
> That's why I said "avoid wish
thinking!).
You aren't being paranoid enough. If it happened as a result of
following some instructions or running a script, it's not just the box
that is compromised, it is everything you think you know. On the
other hand it could have just been an accidental typo.
--
Les Mikesell
changes. The latter
seems more likely to me.
--
Les Mikesell
lesmikes...@gmail.com
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos
eluctance (probably commercially inspired) not to fully
> respond to the challenges threatening all of us 'today'.
Let's start with why your /etc/shadow has read access. That's one of
the things that was right out of the box. What changed it a
do it right, the box might as well come that way or with just those
few choices to get a working default instead of requiring individual
attention to a million details.
--
Les Mikesell
lesmikes...@gmail.com
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos
On Wed, Feb 4, 2015 at 8:43 PM, Warren Young wrote:
>> On Feb 4, 2015, at 7:23 PM, Les Mikesell wrote:
>>
>> On Wed, Feb 4, 2015 at 6:32 PM, Warren Young wrote:
>>>
>>> An LPE can only be used against your system by logged-in users.
>>
>> Or any
pes of
> vulnerabilities are available at the same time.
No, you exploit the server application hole to tell you about the
kernel vulnerability. The last one I saw in the wild involved the
symlink race in the kernel around centos 5.2 or .3 and a struts java
library bug. But there are
hether the complexity
requirements imposed by the installer are really worth much against
the pre-hashed lists that would be used to match up the shadow
contents.
--
Les Mikesell
lesmikes...@gmail.com
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos
> How would I go about that under CentOS with traditional interface names? The
> 70-persistent-net.rules file doesn't exist. Do I have to create it from
> scratch?
>
Probably more than you want to know about this weirdness and the
multiple ways of doing it:
https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/pdf/Networking_Guide/Red_Hat_Enterprise_Linux-7-Networking_Guide-en-US.pdf
--
Les Mikesell
lesmikes...@gmail.com
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos
ox or VM and then
looking through the changes it makes to the pam and smb configs to
understand how it is supposed to work. If you are doing multiple
machines, the command line version of authconfig is handy to make
everything match once you get the arguments down.
On Wed, Feb 4, 2015 at 10:24 AM, Chris Adams wrote:
> Once upon a time, Les Mikesell said:
>> On Wed, Feb 4, 2015 at 10:05 AM, Chris Adams wrote:
>> > I have an existing office of Windows computers, in a domain, with a
>> > couple of Windows Server 2012 AD servers.
es being served, I
sometimes find it useful to have a public read-only share and avoid
the authentication mess entirely - copying the files in place with
linux tools or winscp. It is possible to maintain local accounts on
the linux side and add those to samba (an extra step) but it is
painfu
at this will make the attempts from many
different IPs - and sometimes cycle through a dictionary of different
login names too.
--
Les Mikesell
lesmikes...@gmail.com
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos
ee them applying their expertise to actually making
the code resist brute-force password attacks instead of stopping the
install until I pick a password that I'll have to write down because
they think it will take longer for the brute-force attack to succeed
against their weak code.
--
rather see some
real experts set up usable defaults instead of every person doing an
install having to second-guess it.
--
Les Mikesell
lesmikes...@gmail.com
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos
b in some other company. And might
as well have been the default or one of a small range of choices.
And in particular, rate limiting incorrect password attempts and/or
providing notifications about them by default would not be a bad
thing. Unless there's some reason you need brute-force atta
Yet, I'm sure, majority Unix sysadmins will still do what I do: go over
> everything themselves. No matter what someone says.
There are probably still people that take their cars apart to check
that they were assembled correctly too. But that doesn't mean that
things should not be sh
most like
> job security. As one of my friends says: all systems suck, and thanks to
> that got our jobs ;-)
But wouldn't you rather be doing something new/different instead of
just fixing things that should have been done right in the first
place?
--
Les Mikesell
lesmik
ld
rate-limit the failures by default or at least warn you about repeated
failures and their source, brute-force attacks would rarely succeed.
But fixing the problem doesn't seem to be the point here.
--
Les Mikesell
lesmikes...@gmail.com
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos
raid1 mirror you
aren't really doing anything to isolate the vms from each other or to
increase the odds that a head will be near the place the next access
needs it to be.
--
Les Mikesell
lesmikes...@gmail.com
___
CentOS mailing list
CentOS@c
On Mon, Feb 2, 2015 at 5:45 PM, Valeri Galtsev
wrote:
>
> On Mon, February 2, 2015 5:26 pm, Les Mikesell wrote:
>> On Mon, Feb 2, 2015 at 4:17 PM, Warren Young wrote:
>>>>
>>> Let’s flip it around: what’s your justification *for* weak
>>> passwords
meone else in the middle of trying to complete something, you are
very likely to have to write it down.
--
Les Mikesell
lesmikes...@gmail.com
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos
might help a lot. Or if you
know it is mostly different, just tar it up and stream it.
--
Les Mikesell
lesmikes...@gmail.com
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos
de. In our scheme of things, if
a node is not communicating correctly on the network the best thing to
happen is for it to die quietly and let the redundant systems fill in,
We don't want it trying to fix itself when things aren't working as
expected.
--
Les Mike
On Wed, Jan 21, 2015 at 7:53 AM, James B. Byrne wrote:
>
> On Tue, January 20, 2015 18:37, Les Mikesell wrote:
>>
>> There's also saltstack which is one of the newer of the bunch. It has
>> some chance of working reasonably across different platforms. How
>&
oduct on a rack server.
You can micro-manage this by putting a VM image on its own drive so
you don't lose seek time between the images. Or make a raid with a
very large number of members and hope the odds work out.
--
Les Mikesell
lesmikes...@gmail.com
___
ess configured otherwise. However, if the host needs interfaces
on multiple subnets, you can do it on a single network connection by
giving it a trunk connection from the switch and letting it split out
the vlan interfaces internally.
--
Les Mikesell
lesmikes...@gmail.com
> network) I would have no connection. Why? That's what I fail to understand.
Doesn't make sense to me - I think I've done it both ways
(with/without a vlan 0 address). I didn't think it took anything
special except the VLAN=yes in the file and the .number in the DEV
uld not normally
have an IPADDR, though, unless it is for an untagged vlan 0.
Assuming the connected switch port is configured as a trunk, you
shouldn't see vlan 48 addresses on the base (untagged) device.
--
Les Mikesell
lesmikes...@gmail.com
___
PXE boot into an
automated install instead of loading a prebuilt image. It is easy
enough to test clonezilla, though - just boot a clonezilla-live iso
and save/restore to some existing network share or over ssh. If you
like the results, then set up
till
need to play tricks on the server side to avoid TIME_WAIT.
--
Les Mikesell
lesmikes...@gmail.com
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos
to inertia.
There's also saltstack which is one of the newer of the bunch. It has
some chance of working reasonably across different platforms. How
you feel about it will probably depend on how you feel about python in
general - and how you expect upgrades to go in
eliver or make your db restore process add/configure
any missing packages needed at that point.
--
Les Mikesell
lesmikes...@gmail.com
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos
the packages needed for this particular
server and 'yum install ' them.
--
Les Mikesell
lesmikes...@gmail.com
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos
could open a new
> one.
The problem here is that if the other end isn't reading from the
socket - and a camera probably wouldn't - the writes will just queue
up until some buffer is filled.And, without keepalives enabled,
you still won't get an error on the write.
--
Les Mik
til you try to write to it.
--
Les Mikesell
lesmikes...@gmail.com
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos
been able to match with
anything else is that you can rsync a tree of log files from a farm of
servers into one place and invoke analog with a wild-card to expand
all of their names on the command line and it will digest them all
without the need to pre-sort in timestamp order.
--
Les Mik
k to see if you are getting a RST that doesn't
close the old connection.
--
Les Mikesell
lesmikes...@gmail.com
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos
date -s "`date`"). It was a kernel bug and is theoretically
fixed now.
But I agree that those open bugs on the tzdata package aren't all that
helpful except to show that someone is thinking about it.
--
Les Mikesell
lesmikes...@gmail.com
_
eformatthatworks)"]
>
Can you consolidate this to:
'if you have updated your kernel and rebooted later than Sept. 2012
you should have the fix'?
--
Les Mikesell
lesmikes...@gmail.com
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos
; server based stream for Fedora.
That's an interesting turn of events, but is this just a separation of
packages or is there really a group in Fedora that actually maintains
large server farms and has an interest in keeping their applications
working?
What is the state of the art for socks5 server software? I need to
replace a very old proxy system.'Yum search' and google aren't
turning up any clear winners unless '3proxy' is the thing you would
run on CentOS7.
--
Les Mikesell
unreasonable to expect anything else. Gnome3 vs gnome2 is a
practical matter, though, given that gnome3 doesn't work with x2go.
It's not really about 'differences' it is about making changes that
break existing infrastructure without regard to the damage to users.
--
Les Mi
icks buried inside the automated
6x-7x upgrade tool that could be separated out to help build a
working-but-parallel 7x system to test before cutting over? How are
others dealing with the end of freenx and the inability of x2go to run
gnome3? That's 'almost' a uniquely CentOS issue
ou
have to do tedious tasks like that from scratch or deal with interface
changes in the code that was supposed to handle it.
--
Les Mikesell
lesmikes...@gmail.com
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos
d CentOS will continue to be a copy with no
input. That still doesn't make it any better for the CentOS users of
things that now have an expiration date.
--
Les Mikesell
lesmikes...@gmail.com
___
CentOS mailing list
CentOS@centos.org
http:
stroyed to make
> room.
But it doesn't matter how pretty Gnome3 is on some other box. I use
remote connections through NX/freenx or x2go exclusively. Gnome3
won't work that way. And that's typical of the changes.
--
Les Mi
rever possible because it
used to be easier to manage and more stable. But now that I'm
approaching retirement and realizing that the current management
processes aren't going to continue to work, I think that may have been
a mistake.
--
Les Mikesell
lesmikes...@gmail.com
uot;) for higher IO concurrency, and SAS supports
> multipathing (dual porting) for higher IO bandwidth, also SAS has tagged
> command queueing which often performs better than SATA NCQ under high IO
> concurrency workloads, like database servers.
These particular drives are enterpr
siderably more systems
running windows than linux on this hardware and I don't think anyone
has noticed a systemic problem there.
--
Les Mikesell
lesmikes...@gmail.com
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos
e - not repeating on the same box, and rare enough
that it is hard to make any generalization except that it is painful
to talk some remote helper through the recovery process - usually
involving emailing some cell phone photos of the console to figure out
wh
ening as a repeatable thing or that I could
consider better/worse after replacing something. Maybe 3 times a year
across a few hundred machines and generally not repeating on the same
ones. But if there is anything in common it is on very 'active'
filesystems.
--
Les Mikesell
les
them. But, I don't see anything
that looks like scsi errors in this log and I'm surprised that after
running apparently error-free there would be problems detected after a
software reboot.
I think the newer M2 and later models went to a diff
oblem from the same causes there would be some way to automate or
re-use the knowledge of the fix instead of making everyone spend time
on their own new creative version.
--
Les Mikesell
lesmikes...@gmail.com
___
CentOS mailing list
CentOS@cent
if
that will be better or worse. It is mostly on aging hardware, so it
is possible that there are underlying controller issues. I also see
some rare cases on similar machines where a filesystem will go
read-only with some scsi errors logged, but didn't look for that yet
in this case.
--
on CentOS6 to run on CentOS7? Does the program that is
supposed to try to automatically upgrade versions have any tricks
hidden away to fix things so they work after the upgrade, and could
any of them be run separately?
--
Les Mikesell
lesmikes...@gmail.com
__
e is
> still a slim chance in these cases that the data still will not reach the
> platter before power off or reboot, especially in catastrophic cases.
>
This was a reboot from software, not a power drop. Does that do
something to kill the disk cache if anything happened to still be
the
s
don't seem to have completed. And they probably won't until all
distros ship multiple versions so programs can co-exist long enough to
fix the broken parts.
> Is that all this is? Trying to get someone else riled up enough that they’ll
> fork EL6 for you?
No - mostly hoping someone would point out something I had overlooked
that makes the transition easy. I thought the computers were supposed
to work for us instead of the other way around.
--
Les Mikesell
lesmikes...@gmail.com
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos
y conversions to keep things running.
I don't believe anyone involved in Fedora and their wild and crazy
changes actually has anything running that they care about
maintaining or a staff of people to retrain as procedures change.
There's no evidence that anyone has weighed the cost of
backward
there some time limit on the cache write with a 'reboot' (no
options) command or is ext4 that fragile?
--
Les Mikesell
lesmikes...@gmail.com
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos
mploy 128,000 people. [1]
>>
>> And you only get that with code that keeps users instead of driving them
>> away.
>
> Seriously? I mean, you actually believe that if RHEL sat still, right where
> it is now, never changing any ABIs,
On Wed, Dec 31, 2014 at 11:03 AM, Warren Young wrote:
> On Dec 29, 2014, at 10:07 PM, Les Mikesell wrote:
>
>> it's not necessary for either code interfaces or data structures
>> to change in backward-incompatible ways.
>
> You keep talking about the cost of copin
bt. Then when
> they did jump, it was a major undertaking, though one they apparently felt
> was worth doing.
And conversely, they felt is was worth _not_ doing for a very very
long time. So can the rest of us wait until we have google's
resources?
>> And why do you think it is a good thing
>> for this to be a hard problem or for every individual user to be
>> forced to solve it himself?
>
> I never said it was a good thing. I’m just reporting some observations from
> the field.
Maybe I misunderstood - I thought you were defending the status quo -
and the fedora developers that bring it to us.
--
Les Mikesell
lesmikes...@gmail.com
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos
missing the point, which is that while your
> resources aren’t as extensive as Google’s, your problem isn’t nearly as big
> as Google’s, either.
So again, quantify that. How much should it cost a business _just_ to
keep working the same way? And why do you think it is a good thing
ually just one OSX version needed
versus a bazillion linux flavors with arbitrary differences).
--
Les Mikesell
lesmikes...@gmail.com
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos
these days
- reconnecting automatically after sleep/wakeup and handling network
connection changes transparently, but those things don't need to break
existing usage.
--
Les Mikesell
lesmikes...@gmail.com
___
CentOS mailing list
CentOS@cent
y
changes across versions.
--
Les Mikesell
lesmikes...@gmail.com
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos
hat to encrypt the data, then use asymmetric
> encryption to encrypt only the symmetric key.
>
> GPG takes care of this all internally, so that's what you should be using.
>
Will GPG use the intel aes hardware acceleration - in the version
available for Centos5
ly if someone else has seen the same symptoms. I've got one box
that hangs every few weeks but I'm guessing it is something hardware
related...
--
Les Mikesell
lesmikes...@gmail.com
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos
ccess it easily from multiple computers without any setup and
it always stays in perfect sync with my phone, and partly because of
that search capability. One important thing to tweak for for
usability is to advance to the next message on archive/delete instead
of wasting time redrawing the in
ould have
a lot to do with picking the most convenient approach. One thing that
would be possible on an encrypted file system would be using a backup
approach that stores multiple copies, de-dupinng unchanged files as
you can do with rsync, rdiff-backup, backuppc, etc. Those can only
work if t
101 - 200 of 4538 matches
Mail list logo