The Tarot of the Bohemians.
- 0 Posts
- 20 Comments
gedhrel@lemmy.worldto Asklemmy@lemmy.ml•Does each language have "lefty loosey righty tighty"?63·9 months agoI think it’s fairly parochial, and sounds quite infantile to me. Growing up (uk) we just used clockwise to tighten.
gedhrel@lemmy.worldto Asklemmy@lemmy.ml•People often point to the terrible things in the world as evidence we're living in "the worst timeline". What examples are there of things that suggest our timeline is actually better than it seems?3·9 months agoThat was my, admittedly bitter, point, yes. You do have to wonder what the hell weretcollectively playing at.
gedhrel@lemmy.worldto Asklemmy@lemmy.ml•People often point to the terrible things in the world as evidence we're living in "the worst timeline". What examples are there of things that suggest our timeline is actually better than it seems?91·9 months agoWe live in a world of plenty where we still produce enough food that nobody need go hungry.
gedhrel@lemmy.worldto Asklemmy@lemmy.ml•People often point to the terrible things in the world as evidence we're living in "the worst timeline". What examples are there of things that suggest our timeline is actually better than it seems?8·9 months agoIt does make me wonder about quantum suicide.
gedhrel@lemmy.worldto Asklemmy@lemmy.ml•What movie would have ended at the beginning if the people in it acted like normal people?6·9 months agoThe Sixth Sense.
gedhrel@lemmy.worldto Linux@lemmy.ml•why can't I connect to my ssh server UNLESS I enter eval "$(ssh-agent -s)" first?1·11 months agoMinimise your windows one at a time and check that the gnome keyring hasn’t popped up a dialog box sonewhere behind everything else that’s asking you if it’s okay to proceed.
gedhrel@lemmy.worldto Linux@lemmy.ml•why can't I connect to my ssh server UNLESS I enter eval "$(ssh-agent -s)" first?4·11 months agoIt’s the gnome key ring ssh agent.
It’s possible that this has popped up a window asking gor permission / a passphrase / something and you’re not seeing that.
gedhrel@lemmy.worldto Linux@lemmy.ml•why can't I connect to my ssh server UNLESS I enter eval "$(ssh-agent -s)" first?2·11 months agoThat’s only part of the handshake. It’d require agent input around that point.
gedhrel@lemmy.worldto Linux@lemmy.ml•why can't I connect to my ssh server UNLESS I enter eval "$(ssh-agent -s)" first?1·11 months agoIs this problem a recurring one after a reboot?
If it is it warrants more effort.
If not and you’re happy with rhe lack of closure, you can potentially fix this: kill the old agent (watch out to see if it respawns; if it does and that works, fine). If it doesn’t, you can (a) remove the socket file (b) launch ssh-agent with the righr flag (
-a $SSH_AGENT_SOCK
iirc) to listen at the same place, then future terminal sessions that inherit the env var will still look in the right place. Unsatisfactory but it’ll get you going again.
gedhrel@lemmy.worldto Linux@lemmy.ml•why can't I connect to my ssh server UNLESS I enter eval "$(ssh-agent -s)" first?1·11 months agoOkay, that agent process is running but it looks wedged: multiple connections to the socket seem to be opened, probably your other attempts to use ssh.
The ssh-add output looks like it’s responding a bit, however.
I’d use your package manager to work out what owns it and go looking for open bugs in the tool.
(Getting a trace of that process itself would be handy, while you’re trying again. There may be a clue in its behaviour.)
The server reaponse seems like the handshake process is close to completing. It’s not immediately clear what’s up there I’m afraid.
gedhrel@lemmy.worldto Linux@lemmy.ml•why can't I connect to my ssh server UNLESS I enter eval "$(ssh-agent -s)" first?6·11 months agoPlease don’t ignore the advice about SSH_AGENT_SOCK. It’ll tell yoy what’s going on (but not why).
gedhrel@lemmy.worldto Linux@lemmy.ml•why can't I connect to my ssh server UNLESS I enter eval "$(ssh-agent -s)" first?81·11 months agoWithout the ssh-agent invocation:
- what does
ssh-add -L
show? - what is the original SSH_AUTH_SOCK value?
- what is listening to that? (Use
lsof
)
This kind of stuff often happens because there’s a ton of terrible advice online about managing ssh-agent - make sure there’s none if that baked into your shellrc.
- what does
gedhrel@lemmy.worldto Selfhosted@lemmy.world•Stop services while creating snapshots during backup?English2·11 months agoThe other thing to watch out for is if you’re splitting state between volumes, but i think you’ve already ruled that out.
gedhrel@lemmy.worldto Selfhosted@lemmy.world•Stop services while creating snapshots during backup?English2·11 months agoI’d be cautious about the “kill -9” reasoning. It isn’t necessarily equivalent to yanking power.
Contents of application memory lost, yes. Contents of unflushed OS buffers, no. Your db will be fsyncing (or moral equivalent thereof) if it’s worth the name.
This is an aside; backing up from a volume snapshot is half a reasonable idea. (The other half is ensuring that you can restore from the backup, regularly, automatically, and the third half is ensuring that your automated validation can be relied on.)
gedhrel@lemmy.worldto Asklemmy@lemmy.ml•To those with 2+ monitors on your machine: What's your use case, and how much does it actually boost your productivity?1·1 year agoDare I ask what the adjective “hella” means in this context?
gedhrel@lemmy.worldto Open Source@lemmy.ml•The Xz Backdoor Highlights the Vulnerability of Open Source Software—and Its Strengths1·1 year agoThe test case purported to be bad data, which you presumably want to test the correct behaviour of your dearchiver against.
Nothing this did looks to involve memory safety. It uses features like ifunc to hook behaviour.
The notion of reproducible CI is interesting, but there’s nothing preventing this setup from repeatedly producing the same output in (say) a debian package build environment.
There are many signatures here that look “obvious” with hindsight, but ultimately this comes down to establishing trust. Technical sophistication aside, this was a very successful attack against that teust foundation.
It’s definitely the case that the stack of C tooling for builds (CMakeLists.txt, autotools) makes obfuscating content easier. You might point at modern build tooling like cargo as an alternative - however, build.rs and proc macros are not typically sandboxed at present. I think it’d be possible to replicate the effects of this attack using that tooling.
C++ is one if those languages where writing a library feels hugely different from using it. Boost is a case in point here: there are brilliant peiple behind it, but (error messages aside) the ergonomics of using thise libs in an application are usually pretty good.
(Scala felt similar to me. There are other languages where it feels much less like I’m swapping hats as I flip between parts of a codebase.)