Search results

  1. C

    [RFE] Add BuyPass as an ACME account

    @t.lamprecht Is this expected to work on PMG also? If I attempt to register via pmgconfig, I get the following: # pmgconfig acme account register BuyPass mail@domain.com -directory https://api.buypass.com/acme/directory Attempting to fetch Terms of Service from...
  2. C

    [RFE] Add BuyPass as an ACME account

    Awesome - that would be great. I found that IPv6 only hosts can't get certs from BuyPass - I've opened a ticket with them to see if they can fix that part.... but other than that, it all seems to work ok :)
  3. C

    [RFE] Add BuyPass as an ACME account

    Nice! I wasn't aware of this.... I managed to set it up using: pvenode acme account register BuyPass mail@example.invalid -directory https://api.buypass.com/acme/directory Then it appears in the Web UI. I didn't manage to come across this in the documentation... Is it documented?
  4. C

    [RFE] Add BuyPass as an ACME account

    ping @t.lamprecht / @Stoiko Ivanov - just for visibility....
  5. C

    [RFE] Add BuyPass as an ACME account

    The BuyPass Go SSL scheme uses the ACME protocol - like LetsEncrypt. They offer free certs with a 180 cert lifetime. Link: https://www.buypass.com/products/tls-ssl-certificates/go-ssl The directory URL is: https://api.buypass.com/acme/directory This should pretty much be a drop-in addition...
  6. C

    [URGENT] Intel downfall / AMD Inception kernel security updates & microcode

    Likely not the fixed versions. Follow the instructions from the Intel github link above and see what microcode version you end up with then...
  7. C

    [URGENT] Intel downfall / AMD Inception kernel security updates & microcode

    You can also get the microcode directly from: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/
  8. C

    [URGENT] Intel downfall / AMD Inception kernel security updates & microcode

    Oh god - I'm a moron hahahaha 9E == 158 - not 9F..... Don't worry about me..... Yeah - that is your CPU hahahah - and no, it will be `0xfa` - which is newer than `0xf4`
  9. C

    [URGENT] Intel downfall / AMD Inception kernel security updates & microcode

    Ah - more like upgrade to 8 ;) After a bit of hunting, fixed kernel versions are: * 6.4.9 * 6.1.44 * 5.15.125 * 5.10.189 * 4.19.290, and * 4.14.321 Anything older than these or in a different release branch won't get the kernel patches...
  10. C

    [URGENT] Intel downfall / AMD Inception kernel security updates & microcode

    This should translate to 06_9FH - which isn't listed on the Intel site at all. The "Stepping" would be D (in hex = 13 decimal) Thinking further, you might have to wait for a kernel update that adds the path for `/sys/devices/system/cpu/vulnerabilities/gather_data_sampling` to be able to tell...
  11. C

    [URGENT] Intel downfall / AMD Inception kernel security updates & microcode

    See the info in post #16 on how to check.... What you've posted isn't enough information.... You should be able to cross reference the info gathered in post #16 to check properly.
  12. C

    [URGENT] Intel downfall / AMD Inception kernel security updates & microcode

    For those following along, Intel have updated their vulnerable products list: https://www.intel.com/content/www/us/en/developer/topic-technology/software-security-guidance/processors-affected-consolidated-product-cpu-model.html#tab-blade-1-0 If you look at /proc/cpuinfo - look for: cpu family...
  13. C

    [URGENT] Intel downfall / AMD Inception kernel security updates & microcode

    Nice, thanks for the cherry picks etc.... Hit me up when its out and I'll try and test it all where I can. It's good that it'll add in `/sys/devices/system/cpu/vulnerabilities/gather_data_sampling` - which afaik, is the only way to easily check if you're vulnerable - and if you are, if the...
  14. C

    [URGENT] Intel downfall / AMD Inception kernel security updates & microcode

    Yeah - that's what I'd think too: # dmesg | grep -i microcode [ 4.412471] microcode: Microcode Update Driver: v2.2. # journal -b | grep -i microcode Aug 11 23:32:21 syd-pm kernel: microcode: Microcode Update Driver: v2.2. It did regenerate the initramfs in the package installation - but...
  15. C

    [URGENT] Intel downfall / AMD Inception kernel security updates & microcode

    Yeah - correct.... I added the `non-free-firmware` part to each line in /etc/apt/sources.list The debian wiki (https://wiki.debian.org/Microcode) has 3 different ways to check, but none of them return anything - so I'm not sure how to check if the updated microcode was loaded....
  16. C

    [URGENT] Intel downfall / AMD Inception kernel security updates & microcode

    Yep, I have: /etc/apt/sources.list deb http://ftp.au.debian.org/debian bookworm main contrib deb http://ftp.au.debian.org/debian bookworm-updates main contrib deb http://security.debian.org bookworm-security main contrib /etc/apt/sources.list.d/pve-no-subscription.list deb...
  17. C

    [URGENT] Intel downfall / AMD Inception kernel security updates & microcode

    I still haven't seen the update come through for either kernel or firmware / microcode :|
  18. C

    [URGENT] Intel downfall / AMD Inception kernel security updates & microcode

    It's kind of both - from the changelog of kernel 6.4.9 release:
  19. C

    [URGENT] Intel downfall / AMD Inception kernel security updates & microcode

    Background: * https://downfall.page/ * https://www.phoronix.com/news/New-Linux-Stable-Downfall * https://www.phoronix.com/news/Intel-20230808-Microcode The new stable point releases this afternoon that pick-up all of these AMD and Intel security fixes are Linux versions 6.4.9, 6.1.44, 5.15.125...
  20. C

    [SOLVED] Cluster died, can't get it going again

    Interestingly, this seems to come down to some kind of network adapter problem.... I'm stuck using a USB3 Ethernet adapter on this Intel NUC - as the e1000 driver has many problems that I can't seem to overcome - and simply switching the USB port that the USB ethernet adapter was plugged into...