Re: possible bug - fsck shows perfect results, linux refuses to mount

2003-03-30 Thread Oleg Drokin
Hello! On Sun, Mar 30, 2003 at 11:49:57PM -0800, Robin H. Johnson wrote: > > Can you please make a metadata dump for us? > > "debugreiserfs -p /dev/hdb1 | bzip2 -9c >metadata.bz2" and make this file > > available for us to download. > Stderr output of debugreiserfs here: > http://www.orbis-terraru

Re: possible bug - fsck shows perfect results, linux refuses to mount

2003-03-30 Thread Robin H. Johnson
On Mon, Mar 31, 2003 at 11:34:46AM +0400, Oleg Drokin wrote: > Hello! > > On Sun, Mar 30, 2003 at 11:22:50PM -0800, Robin H. Johnson wrote: > > The drive still refused to mount. > > I dug in fsck.reiserfs --help, and saw '--scan-whole-partition'. Tried > > --rebuild-tree with that on. It showed a

Re: possible bug - fsck shows perfect results, linux refuses to mount

2003-03-30 Thread Oleg Drokin
Hello! On Sun, Mar 30, 2003 at 11:22:50PM -0800, Robin H. Johnson wrote: > The system refused to mount it originally, so I ran just plain > --fix-fixable. It showed nothing wrong at all. By a fluke of terminals, > I have a copy of this first output > [http://www.orbis-terrarum.net/~robbat2/reiserf

[SPAM] guaranteed proposal

2003-03-30 Thread Ann
Start SpamAssassin results 11.00 points, 8 required; * 0.9 -- From: ends in numbers * 0.6 -- Subject GUARANTEED * 3.0 -- X-Mailer contains malformed Outlook Express version * 0.3 -- Message-Id has no @ sign * 2.0 -- BODY: Nigerian scam key phrase (million dollars) * 1.0 -- BODY: Nigerian

possible bug - fsck shows perfect results, linux refuses to mount

2003-03-30 Thread Robin H. Johnson
Greetings, A server of mine suddenly started acting very wonky and spontaneously rebooting. I've been pulling my hair out trying to narrow down what the problem was. Today after one of the reboots, it showed a lot of damage to several of the data partitions (not the system ones luckily), so I ran

[SPAM] Wanna be hung like a horse?

2003-03-30 Thread Taylor Perry
Start SpamAssassin results 20.40 points, 8 required; * 0.9 -- From: ends in numbers * 1.0 -- BODY: Talks about a bigger drive for sex * 0.2 -- BODY: Tells you how to stop further spam * 1.7 -- BODY: Information on getting a larger penis or breasts (2) * 1.0 -- BODY: Stop with the offers,

[SPAM] Jemand hat Ihnen eine Video-Botschaft hinterlegt

2003-03-30 Thread Tina
Start SpamAssassin results 10.10 points, 8 required; * 0.9 -- From: ends in numbers * 0.3 -- Message-Id has no @ sign * 0.9 -- Missing Date: header * 1.0 -- Received contains 'CacheFlowServer' IDENT name * 4.0 -- BODY: Written in an undesired language * 1.0 -- BODY: Message is 50% to 60%

[SPAM] bFk YqUYi AckOu4A nVB66 ZqJ

2003-03-30 Thread Åëåíà
Start SpamAssassin results 11.80 points, 8 required; * 0.3 -- Message-Id has no @ sign * 0.9 -- Missing Date: header * 1.0 -- BODY: Body includes 8 consecutive 8-bit characters * 1.4 -- BODY: Incorporates a tracking ID number * 2.8 -- BODY: Urges you to call now * 0.3 -- BODY: HTML font

Re: Proposal for keying encrypted filesystem

2003-03-30 Thread Pierre Abbat
On Sunday 30 March 2003 05:12, Hendrik Visage wrote: > In this whole discussion I'm still missing some references to research > papers on this technique, as it still sounds to me like security by > obscurity. I didn't find this in research papers. I thought of it in the bathtub. The credential co

Re: Proposal for keying encrypted filesystem

2003-03-30 Thread Pierre Abbat
On Saturday 29 March 2003 13:17, Edward Shushkin wrote: > Any collision can be used by attacker for access to remained decrypted data > in memory, so you should assign the *whole* output of any crypto-stable > hash function (20 bytes for SHA1). If you use 19 bytes for ID, there is no > any guarante

Re: nfsd-fh: found a name that I didn't expect

2003-03-30 Thread Bernd Schubert
Hello! > See the patch below. > It should not break anything. > I just tried to cause the problems again, but without any success. I simply don't get the messages today. I tried to call /usr/bin/uptime from all clients as endless loop, rebooted the server -- no success. Then I stopped the nfs-

Re: Proposal for keying encrypted filesystem

2003-03-30 Thread Hendrik Visage
On Sat, Mar 29, 2003 at 03:49:07PM -0500, Pierre Abbat wrote: > On Saturday 29 March 2003 13:17, Edward Shushkin wrote: > > Any collision can be used by attacker for access to remained decrypted data > > in memory, so you should assign the *whole* output of any crypto-stable > > hash function (20 b