libera/#devuan/ Saturday, 2022-09-03

systemdleteThis might or might not be off-topic.  I am trying to recall how, back in "the day," one was able to peruse (I think a file similar to utmp) to get the exit code of a process that terminated.   I am not seeing this in today's utmp or wtmp files, they seem to only log login sessions these days.05:19
systemdleteI used to work on a AT&T 3B20, and there was a command line tool that you could use to get information about any process, including things like start time, end time, exit code, user and group IDs, etc, etc.05:20
systemdleteIstr, though, that years later, that feature seemed to be slowly defecated out of existence.05:20
systemdleteAny other old farts like me who remember something like this?   Probably c. 198505:21
systemdleteI had a hung system, shelled out to a console because the desktop was not responding, and found out it was thunderbird hanging up everything.  So I terminated it.  But when I returned to the desktop, all my open terminals were gone.   So I thought if I could use that old feature somehow, I could find out why they all disappeared even though I only terminated the one process (t-bird).05:23
systemdleteWell, give me some idea anyway.05:23
systemdleteI suppose oomkiller might be the culprit here, but still, it would be nice to know exactly how/why this happened.05:24
* systemdlete thinks sometimes the old ways were better for certain things...05:24
systemdleteIOW, I am looking for a tool that has historical information on terminated processes.   That might be impractical these days, and maybe why it has been defecated.05:26
onefangI suspect you meant "deprecated" not "defecated".  It's important that us old farts get that right.05:48
rwpsystemdlete, Do you mean something more than $? which is the exit status of the last foreground pipeline?06:00
rwpOr do you mean using "wait" to get the exit status of the background process?06:00
systemdleteThis was a system-wide (kernel) facility that logged this info to--I think, but not sure--the utmp file.   Again, my memory is VERY fuzzy about this.06:01
rwpAFAIK the exit status of processes have not been stored anywhere other than passed to the parent when the parent wait(2)'s on the child.06:01
systemdleteEven on very old svr5 systems?06:01
rwpI worked for 20 years on HP-UX systems.  I don't recall any way to do it there.06:02
systemdleteThis is not a Linux-specific thing, which is why I started out saying I am not sure if this is the right venue for my question.06:02
rwpHP-UX is a System V userland with a kernel based upon the BSD 4.2 kernel.06:02
systemdleteIt might have been something specifically configured on 3B20, but I really don't remember the details.06:02
rwpI never worked on VMS or many of the other classic systems.  I could certainly believe that the IBM mainframe OS had a storage for it.06:03
systemdleteI've worked on HP-UX also.  As well as Solaris, SunOS, AIX, and a number of other *nix systems from the mid-80s, which were referred to as "supermicros"06:03
systemdleteI've worked with IBM MVS a little bit, I got to the point where I could almost write JCL06:04
systemdleteBut this was def not MVS06:04
rwpI have worked on a few SunOS, Solaris, and AIX systems too.  They were our competitors.  But some necessary things were vendor locked.  So we used them.06:04
systemdleteSo no one here recalls a facility like this on old *nix systems.  I should expect that...06:05
rwpI could also believe that some utility in the "accounting" system of tools would log this information too.  Seems plausible.06:06
systemdleteOh, that much I *do* remember--it logged this info.06:06
systemdleteI just don't remember exactly where or how it was accessed.   That was 35+ years ago.06:07
systemdleteI was still learning at that point.06:07
rwpPerhaps pcacct process accounting?  https://stackoverflow.com/questions/29246631/how-does-linux-process-accounting-psacct-work06:08
systemdleteah!06:08
systemdleteyes, ty ty ty06:08
rwpBut if we are going to talk about that let's do it in -offtopic.06:08
systemdletesure.  No need.  Now I recall what I was looking for.  Thanks again for stimulating some old neurons for me.06:08
rwpYou are welcome.  Happy to help.  I very often need a second brain to get a neuron to connect.06:09
systemdleteMight be a lack of certain minerals that make the synapses fire.06:10
noogieThe main repo key expired?12:41
hagbardThe error message says it did.13:01
onefangOops, I see that to.13:09
u-amarsh04I'm getting signature errors when attempting an aptitude -u - EXPKEYSIG BB23C00C61FC752C Devuan Repository (Amprolla3 on Nemesis) <repository@devuan.org>14:09
ltsYes14:09
ltsI trust devs are very much on it14:11
onefangYep, we are.14:11
blargliblouphi, i assume i'm not alone but I can't update any of my devuan machines since a few hours now: the repo key is apparently expired?14:24
onefangWe are working to fix that.14:25
blarglibloupok thanks14:25
u-amarsh04and for those using chromium on unstable I filed this bug report: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=101893714:28
Chain-Qyeah, I just ran into apt keys expiring too, glad to know it's being worked on.14:33
av6time to write a cron script to check the expiry date?15:32
onefangPerhaps a job for apt-panopticon.15:34
Guest9050Hi it seems like gpg key expired, when new keyring will drop?15:43
onefangWe are working on it now.15:43
Guest9050I see, thx for info15:44
rustyaxesuddenly my apt update tells me all my dpkg keys are expired. Tried installing the keyring deb from here https://beta.devuan.org/os/keyring to no resolution. Ideas?16:05
rustyaxenot uising the 2017 keyring of course16:05
iceman1hi same here16:05
iceman1me too16:06
rustyaxeaha16:06
iceman1I check the dev1galaxy and its seems to be happening to other users16:06
iceman1someone mention New keyring just got built and needs to get into the repos and propagate to the mirrors.16:06
onefangThe ideas I have been telling everyone - wait for us to fix it.  We are working on it.16:06
iceman1@onefang , gotcha16:07
sgagebefore descending on the IRC and repeating the report of the key being expired:16:07
sgageyou really ought to consider reviewing the IRC log before, because this16:07
sgagehas been reported and discussed now for a while.16:08
sgageLog at http://reisenweber.net/irclogs/libera/_devuan/latest.log.html16:08
iceman1sgage we just hope and it was a simple question, I understand everyone is most likely overwhelm16:08
iceman1sgage we just hop on I mean16:09
onefangWell it's past midnight here, so I hope someone else can take over keeping people informed that we are working on it.16:10
iceman1I can do that16:11
rustyaxeapologies for asking something apparently been asked a bunch this morning. can i tell apt to ignore signing for now? i rather need to install bluez-cups so i can carry on with this morning.16:11
bb|hcbrustyaxe: yep, that will help16:13
ltsPerhaps use the channel topic?16:13
rustyaxelts: Might help, was the first place i looked before asking, actually. Didnt see anything there ;)16:14
iceman1I just the dev1galay and updating the chat their16:15
iceman1I am keeping people informed at https://dev1galaxy.org/viewtopic.php?pid=37308#p3730816:15
bb|hcbhttps://pkginfo.devuan.org/cgi-bin/policy-query.html?c=package&q=devuan-keyring&x=submit16:20
iceman1also maybe we meantion this in reddit,16:20
bb|hcb^^^ here you can check and in case you manually install the 2022.09.03 version, it will not work. wait for the 2022.09.0416:20
onefangHopefully I'll still be awake when the fix hits the mirrors, and can let people know when all the mirrors have updated.16:24
iceman1reddit posted, hopefull this will reduce the load of questions a little16:29
APicHeya16:30
APicHow can i let the Kernel-OOM-Killer trigger a Coredump of the killed Process please?16:30
iceman1echo 1 > /proc/sys/vm/oom_dump_tasks16:32
APicThanks16:33
APicAlready have that set16:34
APicWhere does the Kernel dump the Process?16:34
iceman1To check where the core dumps are generated, run: sysctl kernel.core_pattern or16:41
iceman1cat /proc/sys/kernel/core_pattern16:41
APicThanks!16:42
APicErr:1 https://deb.devuan.org/devuan/merged chimaera InRelease16:42
APic  Certificate verification failed: The certificate is NOT trusted. The name in the certificate does not match the expected.  Could not handshake: Error in the certificate verification. [IP: 2a0a:e5c0:2:2:400:c8ff:fe68:bef3 443]16:42
APicHow can i fetch a new Cert please?16:42
APicAnd trust it?16:42
APic[5.8]root@APic:~# cat /proc/sys/kernel/core_pattern16:43
APiccore16:43
* APic needs a Directory16:43
APicMy irssi got killed. I cannot find the Coredump in /usr/local/bin where the Binary resides or in /tmp16:44
iceman1dev are working on it https://dev1galaxy.org/viewtopic.php?pid=37308#p3730816:45
APicOk16:45
APicThanks16:45
iceman1need to step away but I will come and check in later16:55
iceman1need to step away but I will come and check in later17:18
debuse42Someone recognized signing keys end of life?17:20
iceman1yes17:21
iceman1https://dev1galaxy.org/viewtopic.php?id=5211 for details17:21
iceman1please pass this along17:21
iceman1https://www.reddit.com/r/devuan/comments/x4vr62/apt_update_error/ reddit feed17:21
onefangI was about to thank iceman1 for helping to spread the word, so I can sleep now.  lol17:22
APicktnx17:41
APicWorks!17:46
APicEpic!17:46
APic♥♥♥17:46
___usedThe latest Windows update which reflashes BIOS "Secure Boot" invalidating certs on which Linux signed bootloaders rely, is the BEST advertisement for not dual booting windows.18:27
___usedHas anyone here been affected?18:27
rustyaxe___used: no i dont own windows18:57
___usedMicrosoft owns Windows, everyone else "rents" from them...18:58
shibbolethused: wat?18:58
shibboletha windows update that touches spi flash?18:59
___usedUEFI flash18:59
shibbolethwhich is spi-connected flash18:59
___usedapparently. News headline is from heise.de in German18:59
shibbolethstill, i doubt this is the case18:59
shibboleththere are a plethora of uefi/mobo vendors and even more flash vendors19:00
___usedBeen trying to find an external ref, apparently this is a thing, updates for W10 and 11 tend to applt crl's19:00
shibbolethi find it exceedingly unlikely that this is the case19:00
___usedhttps://www.heise.de/hintergrund/Bootloader-Signaturen-per-Update-zurueckgezogen-Microsoft-bootet-Linux-aus-7250544.html the article proper is paywalled alas19:00
___usedhttps://www.ghacks.net/2022/08/15/kb5012170-windows-update-error-0x800f0922-uefi-bios-update-may-resolve-it/ closest I could find19:02
shibbolethehm19:02
___used?19:03
shibbolethgerman isn't my first language but my understanding of the language in that article is the opposite case19:03
rustyaxeno clue, windows never appealed to me, ended up moving to linux from unix proper in the late 90s. tried windows some times, wasnt impressed. I treat it like demo OS on new machines. try the hardware then install something useful19:03
___usedRight, read the ghacks article instead please.19:03
shibbolethmsfts new bootloaders are signed with a new cert not necessarily trusted by older mobos19:04
___used"An advisory page on Microsoft's website provides additional information on the issue. According to Microsoft, the security issue was found in the GRUB bootloader, which is commonly used by Linux."19:05
shibbolethalso, the update doesn't "flash your bios", it makes a few changes in efivars19:05
___usedplease use the provided info: @ghacks19:05
___usedIt installs a DBX crl list which disallows all known linux signed bootloaders.19:06
___usedAfter that you can only boot into linux with secure boot disabled.19:06
golinux___used: This subject isn't for devuan support.  Please take it to OT19:11
___usedok. But is Devuan affected? As in, not booting when on a dual boot machine or live image?19:12
xrogaanI hate it when I have text editor trouble, and it removes part of my text. Sent an email with 'dpkg package.deb' instead of 'dpkg -i package.deb'.19:30
joerghttps://www-heise-de.translate.goog/hintergrund/Bootloader-Signaturen-per-Update-zurueckgezogen-Microsoft-bootet-Linux-aus-7250544.html?_x_tr_sl=de&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp19:32
joergfor those who got trouble with german language in that article19:33
joergand yeah, sorry, as golinux already said19:34
debdogthe question was whether devuan is affected by that.19:36
joergI don't see a reason why devuan would be immune to that19:43
* joerg just reads "secure boot2 and feels nausea19:50
joergs/2/"/19:50
___usedThey basically found one (?) version of grub which could "install malware"?! and put all the grub signatures on the DBX crl list19:51
___usedI suggest reciprocation, put all Windows sigs on the DBX crl list and push a linux update >;-)19:51
___usedTaking it to #offtopic19:51
brocashelmThe following signatures were invalid: EXPKEYSIG BB23C00C61FC752C Devuan Repository (Amprolla3 on Nemesis) <repository@devuan.org>19:52
brocashelm^ just got this while updating19:52
___usedneat. Not. And you can't secure boot?19:52
joergplease see /topic !19:54
joergapt-get update keyring errors? See https://dev1galaxy.org/viewtopic.php?pid=37309#p3730919:54
joergit's probably not helping to discuss it here, read the thread linked in topic19:56
brocashelmok, just installed the new keyring and it worked19:58
joerg:thunbs-up:19:58
mshinasThanks guys for your hard work, I applied the solution from https://dev1galaxy.org/viewtopic.php?pid=37309#p37309 and it worked for me!:]20:01
brocashelmsame here20:02
bb|hcbAbout the expired key - devuan-keyring 2022.09.04 has made it to the repos (maybe not on all mirrors yet). The best way to fix it is:20:25
bb|hcbapt update --allow-insecure-repositories && apt install devuan-keyring --allow-unauthenticated20:26
bb|hcbPlease someone update the forum post - this avoid the manual step and does not rely on a fixed version of the keyring package20:26
rwpxrogaan, Please see bb|hcb's update above.  ^^20:34
brocashelmbb|hcb: posted :)20:35
bb|hcb:)20:35
iceman1hi20:37
iceman1back20:37
iceman1did everything went ok?20:37
XenguyThanks brocashelm20:41
brocashelmnp20:43
iceman1was the package signed for this? wget http://deb.devuan.org/devuan/pool/main/d/devuan-keyring/devuan-keyring_2022.09.04_all.deb do we have a check sum for it? sorry to ask a lot20:50
joergbrocashelm: private message?21:05
D-HUNDwhat's the state with the signatures? in case it's fixed yet, do I have to run something?21:15
joerghttp://reisenweber.net/irclogs/libera/_devuan/_devuan.2022-09-03.log.html#t2022-09-03T20:25:5821:15
D-HUNDok, that worked, thanks!21:20
joerg[3 Sep 2022 20:25:58] <bb|hcb> About the expired key - devuan-keyring 2022.09.04 has made it to the repos (maybe not on all mirrors yet). The best way to fix it is:21:21
joerg[3 Sep 2022 20:26:01] <bb|hcb> apt update --allow-insecure-repositories && apt install devuan-keyring --allow-unauthenticated21:21
joergiceman1: I noticed your question. Still checking what's the situation21:27
iceman1@joerg ok, should we post the apt update ... in reddit21:28
joergplease not yet21:29
joergno idea if this helps in any way https://termbin.com/wa1z it's the md5sum I see here, doesn't mean this is correct and in any way certified, I could not tell from here21:34
fsmithredjoerg, I got the same md5sum and I downloaded the package shortly after it went into pkgmaster21:36
joergfsmithred to the rescue :-) Glad you chime in21:37
joergweird I can't reproduce same checksum via https download21:39
fsmithred???21:39
fsmithredI used wget http://...21:39
fsmithredno21:39
fsmithredhttps://...21:40
joergprolly PECAK, I might need more coffee21:40
joergPEBCAK21:40
fsmithredI do get the same. Just downloaded it again in browser this time. Same md5sum.21:41
joergugh indeed, I didn't notice the 40421:41
joergfsmithred: https://termbin.com/uhz2f21:46
rwpThe deb.devuan.org is unsuitable for https due to it being a round robin of many other servers behind it.22:04
rwpFor https one would need to specify a server name that matches a particular server.  Otherwise it is http for deb.devuan.org round robin dns.22:05
fsmithredrwp, I used pkgmaster.devuan.org for both downloads (1 wget, 1 browser)22:27
joergrwp: many thanks :-) absolutly plausible22:27
brocashelmi use beard.ly as a secondary mirror, just in case deb.devuan.org fails (usually the blendbyte server in taiwan)22:30
rwpI am currently seeing that mirrors are not yet all in sync yet.  Which is expected.  So at this moment I can only reliably use pkgmaster for it.22:32
rwpBut I don't want to use pkgmaster all of the time.  Since that would overload it.22:33
rwpI am not in am emergency here.  I have one copy of the deb.  I can manually install it around.  Or!  I can wait a few hours and I am sure the mirrors will be in sync then.22:33
blastwavetest23:15
blastwaveDevuan Repository GPG key expired today ?23:15
blastwaveapt-key adv --recv-keys --keyserver keys.gnupg.net BB23C00C61FC752C23:15
blastwavethat says the GPG keys expired today23:16
sixwheeledbeastread topic?23:17
brocashelmblastwave: solution provided by bb|hcb: http://reisenweber.net/irclogs/libera/_devuan/_devuan.2022-09-03.log.html#t2022-09-03T20:25:5823:21
fsmithredor read this post: https://dev1galaxy.org/viewtopic.php?pid=37315#p3731523:37
AndroUserI'm trying to connect to a Hotel WiFi network with no password but despite that ESSID network being scanned by iw, it refuses to connect via iw nor nmcli at all.23:44
AndroUserI'm typing this on my Android device.23:45
gnarfaceanything in the log?23:45
AndroUsercan you elaborate more in regards to the log?23:45
gnarfacecheck /var/log/daemon.log for error messages coming from wpa_supplicant or your dhcp client23:46
gnarfaceif you tail it (tail -f /var/log/daemon.log) there should be some noise from both during your connection attempt. you might need to edit the configs for both to increase verbosity to get anything meaningful.23:47
AndroUserhttps://ibb.co/1XBhJLP23:50
AndroUserhere's my output23:51
AndroUserafter I tailed daemon.log23:51

Generated by irclog2html.py 2.17.0 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!