Bitcoin Forum
May 28, 2024, 10:49:15 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 [25] 26 27 28 29 »
481  Local / Deutsch (German) / Re: Verschenke 0.5 Bitcoin Höher-Tiefer Spiel on: August 19, 2011, 06:20:10 PM
Auch ein herzliches Dankeschön an Dich
482  Local / Deutsch (German) / Re: Verschenke 0.5 Bitcoin Höher-Tiefer Spiel on: August 19, 2011, 05:34:05 PM
Danke und ja Smiley
483  Local / Deutsch (German) / Re: Verschenke 0.5 Bitcoin Höher-Tiefer Spiel on: August 19, 2011, 05:27:04 PM
54
484  Other / Beginners & Help / Re: Noisy HDD on: August 18, 2011, 02:11:49 PM
Sysinternals -> Diskmon
485  Other / Beginners & Help / Re: Ubuntu: cannot remove .bitcoin directory on: August 17, 2011, 04:19:38 PM
With "lsof .lock" you could check what program holds that file open. If that lists nothing, dig through "ps axu" (as root) and look for a bitcoin related program. Kill it and voila.
486  Other / Beginners & Help / Re: Ubuntu: cannot remove .bitcoin directory on: August 17, 2011, 03:39:20 PM
Switch to root and when in .bitcoin, do a "cd .." and then "rm -rf .bitcoin"
The directory most likely contains some hidden files, which are not shown with just a "ls"; do a "ls -la" instead.
487  Economy / Services / Re: 1 BTC for basic linux info - How to auto start namecoind and pushpoold on: August 16, 2011, 11:06:41 PM
Some things that come to mind:
- perhaps namcoind has an option to specify the data directory (bitcoin has, I'm using that)
- symlink (ln -s) or hardlink (mount -o bind) those directories (hardlinks need to go into /etc/fstab too iirc)

488  Economy / Services / Re: 1 BTC for basic linux info - How to auto start namecoind and pushpoold on: August 16, 2011, 08:54:18 PM
Hm, can you post the script you use?

Did you get any output when you did the update-rc.d?
Undo the previous: update-rc.d myscriptname remove
Set runlevels manually: update-rc.d myscriptname start 13 stop 06
Look into /etc/rc3.d/ to see if there's a symlink to your /etc/init.d/myscriptname

Logs should go into /var/log/. Usually, there's messages, boot, syslog or something similar which might contain some information about why the service start fails. dmesg perhaps too.
I'm running out of ideas sadly though, since Ubuntu isn't my preferred Linux distro. Oh, and you are in runlevel 3, right? Check with "who -r".

And "/etc/init.d/myscriptname start" works just fine when you do it manually? What user are you when doing that? Root?
489  Economy / Services / Re: 1 BTC for basic linux info - How to auto start namecoind and pushpoold on: August 16, 2011, 07:31:49 PM
Haven't used Ubuntu that often, but if I remember correctly you can have a service start automatically at boot with something like "update-rc.d myscriptname defaults" as root.
Or you can symlink to the script in init.d from rc3.d/S99myscriptname (don't forget that you probably also need to symlink rc1.d/K99myscriptname).
Don't forget to look into logs for error messages.
490  Bitcoin / Wallet software / Re: Bitcoin-Qt, the future Bitcoin client GUI [user input needed] on: August 15, 2011, 07:19:44 AM
I thought about something that might be pretty helpful and should be easy to implement: a "waiting for" list.

Basically a list of transaction you're expecting to arrive. You pick the address you gave to the other person and the amount he should transfer to it (perhaps also add a textbox for notes). Transactions which match entries in that list are highlighted. This way you can easily keep track of outstanding transfers. Right now I do that in a seperate textfile, but it would be nice to have that ability in the client itself.
491  Other / Off-topic / Re: PHP preg_match not working? on: August 11, 2011, 10:26:39 PM
Because the è isn't at the start of the line. Try the haystack 'èggs' and it will match.
492  Economy / Services / Re: 1 BTC for basic linux info - How to auto start namecoind and pushpoold on: August 07, 2011, 07:09:06 AM
Also...

I assume you don't mean "coinfig", but "config"
493  Economy / Services / Re: 1 BTC for basic linux info - How to auto start namecoind and pushpoold on: August 07, 2011, 07:00:56 AM
To capture all output (stdout+stderr), you can append ">> /var/log/bitcoinpool.log 2>&1".
Also, check your standard logs (messages, cron) for additional error messages.

In most cases such scripts fail because of relative paths. Cron has a different environment.
494  Other / Off-topic / Re: [SOLVED] Help with Ubuntu + MySQL on: August 04, 2011, 06:31:51 PM
@BCEmporium
You really think I'll go down to that level of yours now? You win, you're the greatest. If that gets you off, I'm glad I could help.  Roll Eyes
495  Other / Off-topic / Re: [SOLVED] Help with Ubuntu + MySQL on: August 03, 2011, 10:56:50 PM
I guess I don't understand the point of authenticating with a key vs a really long complicated password.  Aren't they both effectively the same thing?  And if I authenticated with a key, I would need a keyfile, right?  Which would require that I keep a keyfile on my person whenever I wanted to access the server, whereas right now, I have the password almost memorized (a few more entries should do the trick).
You would generate a private/public key pair and place the public key on the server. The private key (which should be protected with a passphrase) stays on your PC. When you log in, no password will ever be transferred. The more servers you have, the nicer it is. As long as your pubkey is on it, you can log in with your passphrase. I wouldn't want to carry around 2-3 pages of passwords to do my daily work. Just store your private key along with your portable Bitcoin in a Truecrypt container on your usb stick.
496  Other / Off-topic / Re: [SOLVED] Help with Ubuntu + MySQL on: August 03, 2011, 08:53:36 PM
So switch off your computer RIGHT NOW! And don't even think about switch it on again... as there's always a "theory" by where you may get attacked. Even using key-auth, your key can get compromised.
I made a note so I won't forget to laugh about it this weekend. When enough jokes have accumulated that is.

Again; if you install a "patched" (infected) sshd it's even stupid that the "patcher" need your password to whatsoever. That said, with that done the attacker can hook to your console and perform whatever he wants. That line of though is like if a robber was already inside the vault and you were concern about the doorstep.
That line of though is like if a robber was already inside the vault through the window and grabs the key you use with all your other vaults.

Let's just leave it at that. We're obviously having different ways to think about security. I've had several cases where my "paranoia" protected servers from a 0day attack.
497  Other / Off-topic / Re: [SOLVED] Help with Ubuntu + MySQL on: August 03, 2011, 08:03:24 PM
I'm not paranoid.  If an attack only exists in theory, then I'm not going to go out of my way to prevent it.  Especially when it costs me convenience (i.e., not being able to access the server from any computer). 
Using keys has nothing to do with being able/unable to access ssh from a remote computer. Controlling that access level is done via iptables. If the remote user is allowed to go through, then he has to authenticate to ssh. Either via key or password (and actually, keys are more convenient because you can use your public key on different machines).

I only use that password for root - nothing else.  There is no reason for someone to brute-force that password if they are already in the system.
That wouldn't require a brute-force; just a patched sshd because it received the password you typed in. A patch would make it dump that into a file, or mail it somewhere or whatever. But it's good you don't re-use passwords.

That said, I still appreciate your input on the matter.
I'm just pointing things like that out because I have to deal with people who do not think about security.
498  Other / Off-topic / Re: [SOLVED] Help with Ubuntu + MySQL on: August 03, 2011, 07:35:29 PM
- Theories... try to put that in practice (good luck)
Enough reason for me to drop password authentication.

- Under such the server is already compromised, there's no reason to sniff the password, as that is an "attack from inside out".
Of course there is. Do you have any idea how many use the same password over and over again, "because it's so convenient having to remember only one"?

Long story short: I will always tell users to use key based auth. There is no reason to use password auth anymore. Plus, it renders brute-force/dictionary attacks useless.
499  Other / Off-topic / Re: [SOLVED] Help with Ubuntu + MySQL on: August 03, 2011, 07:06:01 PM
And here starts the BS... SSH is an encrypted connection like SSL.
- you can do a downgrade attack on ssh connections
- on a compromised box, the attacker can patch sshd to dump your password
500  Other / Off-topic / Re: [SOLVED] Help with Ubuntu + MySQL on: August 03, 2011, 05:53:03 PM
So allowing SSH from any IP is unsafe, despite having a secure password?  Why?
Passwords can be sniffed.

Who needs access via ssh? Only you? Good, then why allow everybody to connect? Leaving it open (with key-auth only) can be an acceptable trade-off if you don't want to end up locked out. However, that should be the last choice. Of course, everything else adds a little work, but security isn't free.

Bascially security goes like this: lock down everything. Then open what you need, but only as much as required. VNC isn't really neccessary if you have set up your ssh correctly. In the worst case you'd need a DC monkey to disable your firewall temporarily.
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 [25] 26 27 28 29 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!