Friday, May 29, 2015

Inappropriate ioctl for device MSG=cannot create job file for Torque

I encountered this error on the cluster.

qsub: submit error (PBS_Server System error: 
Inappropriate ioctl for device MSG=cannot create job file 
/var/spool/torque/server_priv/jobs/497741.headnode-h00.cluster.com 
(28 - No space left on device)) 

I did a df -h and notice that there is still space. But when I did a df -i, I've noticed all the spaces iUSE% is almost 100% used up. To bring up the

# find / -xdev -printf '%h\n' | sort | uniq -c | sort -k 1 -n


References:
  1. Find where inodes are being used

Thursday, May 21, 2015

Beware of Trojanized version of Putty SSH client distributed in the Wild

Summary
Reports of a trojanized version of Opensource SSH PUTTY client is found to the distributed in the wild.

Attacks
 According to the report, if appear to occur in the following manner
  1. The victim performs a search for PuTTY on a search engine.
  2. The search engine provides multiple results for PuTTY. Instead of selecting the official home page for PuTTY, the victim unknowingly selects a compromised website.
  3. The compromised website redirects the user several times, ultimately connecting them to an IP address in the United Arab Emirates. This site provides the user with the fake version of PuTTY to download.

Mitigation
  1. Always ensure that you only download the software from the authors/publisher official homepage.
  2. Check the Software’s “About Information”. According to the report, the malicious version will show this. 
 References:


  1. http://www.net-security.org/malware_news.php?id=3041 
  2. http://www.symantec.com/connect/blogs/check-your-sources-trojanized-open-source-ssh-software-used-steal-information

Friday, May 15, 2015

Buffer Overflow vulnerability within the QEMU system emulator

Red Hat Product Security is now aware of a 'buffer overflow' vulnerability within the QEMU system emulator, which is widely installed and used for virtualization purposes on Linux systems. QEMU is also used by Red Hat’s cloud and virtualization products.

The vulnerability is known as VENOM and is assigned the identifier CVE-2015-3456.

This vulnerability affects the Floppy Disk Controller (FDC) emulation implemented in QEMU and could cause VM guests to crash the host's hypervisor and potentially facilitate arbitrary code execution on the host via guests. Even if the guest does not explicitly enable an FDC, all x86 and x86_64 guests are vulnerable.


For more more detailed information, do take a look at Redhat Security Blog: VENOM, don't get bitten 

  1. https://access.redhat.com/articles/1444903 
  2. https://securityblog.redhat.com/2015/05/13/venom-dont-get-bitten/

Resolving downed Interface Group on NetApp Cluster-Mode

netapp-cluster1::*> network port show
Auto-Negot  Duplex     Speed (Mbps)
Node   Port   Role         Link   MTU Admin/Oper  Admin/Oper Admin/Oper
------ ------ ------------ ---- ----- ----------- ---------- ------------
netapp-cluster1-01
a0a    data         down  1500  true/-     auto/-      auto/-
e0a    data         up    1500  true/true  full/full   auto/1000
e0b    data         up    1500  true/true  full/full   auto/1000
e0c    data         up    1500  true/true  full/full   auto/100
e0d    data         up    1500  true/true  full/full   auto/1000
2. If you have a LIF that should be on that node; do the following: The purpose is to let another node within the cluster to be the home-node for the data and mgmt while you up and down the interface group
netapp-cluster1::*> net int modify -vserver vs_StorageVNode11  -lif vs_StorageVNode11_data1 -home-node netapp-cluster1-02 -home-port a0a
netapp-cluster1::*> net int modify -vserver vs_StorageVNode11  -lif vs_StorageVNode11_mgmt1 -home-node netapp-cluster1-02 -home-port a0a
net int revert *
3. Remove the Interface Group from the -port e0c and down and up the e0c port
netapp-cluster1::*> ifgrp remove-port -node netapp-cluster1-01 -ifgrp a0a -port e0c
netapp-cluster1::*> net port modify -node netapp-cluster1-01 -port e0c -up-admin false
netapp-cluster1::*> net port modify -node netapp-cluster1-01 -port e0c -up-admin true
netapp-cluster1::*> net port show -node netapp-cluster1-01 -port a0a,e0c
Once If e0c shows up and at auto/1000, add the interface and return the interface group back to netap-cluster-01
netapp-cluster1::*> ifgrp add-port -node netapp-cluster1-01 -ifgrp a0a -port e0c
netapp-cluster1::*> net port show -node netapp-cluster1-01 -port a0a
netapp-cluster1::*> net int modify -vserver vs_StorageVNode11 -lif vs_StorageVNode11_data1 -home-node netapp-cluster1-01 -home-port a0a
netapp-cluster1::*> net int modify -vserver vs_StorageVNode11 -lif vs_StorageVNode11_mgmt1 -home-node netapp-cluster1-01 -home-port a0a
netapp-cluster1::*> net int revert *

Wednesday, May 13, 2015

Friday, May 8, 2015

Open-Source Remote Desktop Solution X2Go

X2Go is a interesting Remote Desktop Solutionfor Linux and has the following features (from their website)


  1. Graphical Remote Desktop that works well over both low bandwidth and high bandwidth connections
  2. The ability to disconnect and reconnect to a session, even from another client
  3. Support for sound
  4. Support for as many simultaneous users as the computer's resources will support (NX3 free edition limited you to 2.)
  5. Traffic is securely tunneled over SSH
  6. File Sharing from client to server
  7. Printer Sharing from client to server
  8. Easily select from multiple desktop environments (e.g., MATE, GNOME, KDE)
  9. Remote support possible via Desktop Sharing
  10. The ability to access single applications by specifying the name of the desired executable in the client configuration or selecting one of the pre-defined common applications

Tuesday, May 5, 2015

Calculate the fingerprint of a key file


# ssh-keygen -l -f id_rsa.pub
2048 ....................................................     yournode@headnode.com