Home Blog Page 20

Linux Kernel 6.9 Released. This is What’s New

0
Linux Kernel 6.9 Released. This is What's New

A new mainline Linux Kernel 6.9 is now available. Find out what are the best new features of this version.

Following almost two months of development effort, Linus Torvalds released Linux Kernel 6.9. This release brings the usual CPU, GPU updates across upcoming product line-ups, performance and security upgrades, networking, filesystem and more. Key highlights include improved experience with 4K displays thanks to larger frame-buffers, faster boot times in advanced systems with many GB’s of RAM and many more.

So 6.9 is now out, and last week has looked quite stable (and the whole release has felt pretty normal). Below is the shortlog for the last week, with the changes mostly being dominated by some driver updates (gpu and networking being the big ones, but “big” is still pretty small, and there’s various other driver noise in there too).

Outside of drivers, it’s some filesystem fixes (bcachefs still stands out, but ksmbd shows up too), some late selftest fixes, and some core networking fixes.

And I now have a more powerful arm64 machine (thanks to Ampere), so the last week I’ve been doing almost as many arm64 builds as I have x86-64, and that should obviously continue during the upcoming merge window too. The M2 laptop I have has been more of a “test builds weekly” rather than “continuously”.
Linus

In this article, we will touch upon on the key highlights of Linux Kernel 6.9.

Linux Kernel 6.9: What’s New

Processor: AMD

Linux 6.9 kernel introduces support for AMD Preferred Core, a feature that allows the kernel scheduler to prioritize tasks on higher-performing CPU cores, improving system performance and efficiency. With this update, modern AMD Zen systems with Preferred Core support enabled in the BIOS will automatically utilize this feature on Linux 6.9+, assuming the AMD P-State driver is used instead of the generic ACPI CPUFreq driver.

This release also has been updated with more AMD SEV-SNP bits, bringing EPYC processor support closer to the mainline kernel and paving the way for “the ultimate goal of the AMD confidential computing side” to be ready for Linux 6.10 later this year. This milestone follows years of upstreaming work by AMD to integrate SEV, SEV-ES, and SEV-SNP extensions on newer EPYC processors.

A significant change to the EDAC subsystem arrives, with a focus on AMD-specific updates, including the upstreaming of the FRU Memory Poison Manager, which allows memory error information to persist across reboots. Additionally, the kernel now includes row retirement support for the MI300 series, enabling the retirement of problematic memory rows to prevent repeated errors, and the FRU Memory Poison Manager can optionally persist this information across reboots.

Processor: Intel

Intel’s Meteor Lake laptop processors has received patches to improve the performance and power efficiency, which adjust the Energy Performance Preference (EPP) settings to optimize system power and performance. The patches allow for model-specific EPP overrides and update the default EPP values for Meteor Lake, enabling more tailored power management and performance tuning.

The Linux 6.9 kernel has merged the Intel FRED (Flexible Return and Event Delivery) support code, which enables lower latency transitions between privilege levels and more robust software use. Intel FRED replaces IDT event delivery and is a significant step forward for future Intel processors, with the code being merged without objections by Linus Torvalds.

The Linux 6.9 kernel includes more x86S (formerly X86-S) bits, a specification published nearly a year ago by Intel to simplify the architecture and remove support for 16-bit and 32-bit operating systems. The latest updates include improvements to the x86 early start-up code, position-independent code support, console enhancements, and X86S-related cleanups, such as the reworking of the “trampoline_start64” code for accommodating the removal of compatibility mode in ring 0.

Processor: ARM and others

This mainline Kernel release brings RISC-V architecture updates, such as support for vector-accelerated crypto routines, including AES-{ECB,CBC,CTR,XTS}, ChaCha20, GHASH, SHA-256, SHA-384, SHA-512, SM3, and SM4 algorithms. The new kernel also enables system hibernation support for portable kernel builds, fast GUP handling, and other additions, such as ACPI LPI and CPPC support.

Like in each mainline Kernel release, the LoongArch architecture updates also arrives, enabling objtool support for validations and transformations during the kernel build process, ORC stack unwinder support, kernel live-patching for applying security/bug fixes without rebooting, and additional kernel configuration features. These updates continue the progress of the LoongArch processor port for the upstream Linux kernel.

The Linux Kernel 6.9 also includes a secondary set of power management subsystem changes, with the ARM SCMI CPUFreq driver now enabling CPU boost support by default. This update allows ARM System Control and Power Interface (SCMI) CPU frequency scaling driver to enable boost support out-of-the-box on platforms where it is supported.

On the ARM64 space, support for building the kernel’s Rust language support, reorganization of the virtual address space, and LPA2 52-bit VA/PA address range support using 4KB and 16KB pages are available. Additionally, the kernel now enables 2023 dpISA extension support, exposing new floating point features and hardware capabilities for user-space checking.

Graphics

One of the key highlights of the Kernel 6.9 is the support for larger console fonts in the frame-buffer device (FBDEV) subsystem, allowing a maximum VT console font width of 64 and height of 128 pixels. This update, proposed by Samuel Thibault, increases the maximum console font size and switches to a bitmap for better handling of today’s high-resolution displays.

Also arrives in this release as part of DRM_NEXT, is the DisplayPort tunneling and bandwidth allocation support, additional Alder Lake N PCI IDs, fastboot support for older platforms, a DebugFS option for enabling big-joiner, and other updates for the i915 driver.

Storage and Misc changes

The FUSE (Filesystem in Userspace) passthrough mode arrives in Linux Kernel 6.9. This feature aims to improve the performance of user-space file systems by avoiding the daemon overhead on a per-file basis. With FUSE passthrough, read/write operations are forwarded directly by the kernel to the lower file system.

To utilize this feature, the new FUSE_PASSTHROUGH Kconfig switch must be enabled, allowing specific FUSE operations to bypass the FUSE server via mapping to the backing file. This enhancement will help reduce the overhead associated with FUSE daemons and improve the overall efficiency of user-space file systems.

The latest file-system driver update for Linux Kernel 6.9 includes significant improvements to the exFAT file-system, focusing on optimizing the “dirsync” performance.

The new exFAT Linux driver with dirsync enabled likely to perform significantly better and is much closer to the performance levels of testing exFAT without the dirsync option. These optimizations not only enhance the user experience but also contribute to the overall efficiency and reliability of the system.

Another key update in this Kernel release is the ratelimiting of unknown NMI messages. The excessive NMI debug messages on some unnamed AMD systems were causing performance issues. These Non-Maskable Interrupt (NMI) messages were printed on the console continuously when using the ‘perf’ command with IBS, ultimately slowing down the kernel. This patch ensures that these messages are not printed excessively, preventing potential performance degradation.

Key Sound Updates

Elsewhere, under the sound updates, code clean-ups and support for new hardware like Microchip SAM9x7, NXP i.MX95, and Qualcomm WCD939x have been added. Expanded Cirrus HD audio codec support, fixes for the Scarlett2 audio mixer, VirtIO audio driver improvements, Firewire sound updates, and more work on SoundWire for both AMD and Intel platforms are included.

For AMD systems, SoundWire support for systems using the AMD Audio Co-Processor (ACP) v6.3 IP has been added, which is used by the Ryzen 7040 series laptop “Phoenix” SoCs. Intel systems have gained DSP-less mode support for their SoundWire platforms.

These updates enhance audio functionality, stability, and compatibility across various platforms, providing a better user experience for Linux users.

That’s more about the key highlights of this release.

How to Download and Install Linux Kernel 6.9

Remember that using the bleeding-edge mainline Linux Kernel in your production systems/daily-drive laptops/desktops is not wiser unless you have a specific requirement.

For general users, it’s always best to wait for a few weeks until all the major Linux Distributions bring this version via their official stable channel after proper testing.

That being said, if you still want to install this version on Ubuntu and related distributions, visit the below pages:

Firstly, visit the mainline kernel page

There are two types of builds available – generic and lowlatency. You can download generic builds that work most of the time for standard systems.

For audio recordings and other setups that require low latency (like real-time feeds), download the lowlatency one.

Secondly, download the four deb packages for generic via the terminal and install them.

wget -c https://kernel.ubuntu.com/mainline/v6.9/amd64/linux-headers-6.9.0-060900-generic_6.9.0-060900.202405122134_amd64.debwget -c https://kernel.ubuntu.com/mainline/v6.9/amd64/linux-headers-6.9.0-060900_6.9.0-060900.202405122134_all.debwget -c https://kernel.ubuntu.com/mainline/v6.9/amd64/linux-image-unsigned-6.9.0-060900-generic_6.9.0-060900.202405122134_amd64.debwget -c https://kernel.ubuntu.com/mainline/v6.9/amd64/linux-modules-6.9.0-060900-generic_6.9.0-060900.202405122134_amd64.deb

sudo dpkg -i *.deb

After installation, reboot the system.

The instruction for lowlatency and other architecture (e.g., ARM) installations are the same. Replace the package name in the above wget commands. You can find them on the mainline Kernel page.

You can also compile sources on your own from the below links.

Distro support

Arch Linux users should get this version by 1st/2nd week of June 2024 via monthly ISO refresh.

Other distributions should get this via their usual package refresh.

Wrapping up

To sum up, the release of Linux Kernel 6.9 introduces numerous important updates and enhancements, such as updates to CPU and GPU, 4k display support, security, core changes, and improvements to file systems and networking.

This release initiates the merge window for Kernel 6.10.

Top Tips to Protect Your Linux System

0
Top Tips to Protect Your Linux System

Linux-based operating systems have a reputation for their high-security level. That’s one of the reasons why the market share for Linux has been growing. The most commonly used operating systems such as Windows are often affected by targeted attacks in the form of ransomware infections, spyware, as well as worms, and malware.As a result, many personal, as well as enterprise users, are turning to Linux-based operating systems such as the Ubuntu-based Linux OS for security purposes. While Linux based systems are not targeted as frequently as other popular operating systems, they are not completely foolproof. There are plenty of risks and vulnerabilities for all types of Linux devices which put your privacy as well as your identity at risk. Here are a few tips to enhance your Linux security:Installing a VPNDownloading a Virtual Private Network (VPN) helps protect your internet traffic from prying eyes. That includes malicious attackers who may be in control of various routing equipment between you and the resource you are trying to access. A VPN also prevents your Internet Service Provider (ISP) from logging your internet activity and keeps your Wi-Fi provider from peeking into your business. You can also use a VPN to access restricted content on YouTube, Netflix, Hulu, etc. Choosing a good VPN for Linux will provide the most security and highest performance when you are going about your business. A VPN allows you to hide your computer’s IP and location to prevent the logging of metadata and browsing activity by your ISP. Moreover, you will be able to bypass internet censorship and firewalls. You don’t have to worry about your online privacy and security.Keep Your System Up to DateKeeping your operating system up to date is one of the most effective ways to protect your devices no matter what operating system you are using. However, this seemingly obvious task is also easy to neglect, especially if you don’t understand the importance of keeping your system updated. In addition to your operating system, keep your applications such as video players, PDF readers, and web browsers up to date. Most Linux-based operating systems make it extremely easy for users to keep their systems up to date. Ubuntu, for instance, installs security updates automatically by default. Go to System Settings > Software & Updates > Updates to double-check. Make sure that all the important updates are turned on. This ensures that there are no vulnerabilities that hackers can exploit to create a way into your system. Enable Your FirewallThe role of a firewall is to block access to insecure services on your computer. A few years ago, it was considered extremely risky to access the internet without a firewall. Today, some operating systems such as Linux-based Ubuntu don’t have a firewall enabled by default. That’s because Ubuntu does not have internet-based services running on a standard installation thus rendering a firewall unnecessary. Broadband routers include a firewall by default, though. When it comes to Ubuntu, all it takes to compromise your security is to install something that’s vulnerable or to accidentally mess with the configuration. If that happens, you will find yourself in need of a firewall. Luckily, it’s easy to install a firewall on Linux. The Linux kernel has a firewall functionality by default, and all you need to do is add a graphical front end. Ubuntu systems have a command-line utility known as UFW. It is installed, but not enabled. You can use this utility to start the firewall and block all incoming connections. Use Antivirus SoftwareWindows is the most common operating system. As a result, most malware out there is generally designed for Windows systems and won’t be activated on your Linux devices. For that reason, some consider anti-virus completely unnecessary for Linux-based systems. However, what most Linux users don’t know is that there is more sophisticated malware designed to attack Linux OS. The likelihood of such an attack is low, though. However, there are arguments that the number of malware and viruses targeting Linux is on the rise. Once you are attacked by them, you have no way of defending yourself. It’s always a good idea to stay protected even against the least expected attacks. After all, feeling safe just because the risk of a breach is low means that the attacker is already one step ahead of you. Use Linux antivirus just to be safe. There are many of them out there, find one that provides the best protection for your situation. Encrypt Your Drive (Full Disk Encryption)The newer versions of Linux distribution will ask you whether you want to encrypt your drive during the installation process. Always make sure that you choose to encrypt your drive when you install Xubuntu, Kubuntu, BackTrack, or any other type of Linux distribution to protect your data. Your data remains 100 percent safe if it is encrypted, whether you are using a hard drive or an SSD drive. Only you will be able to access the contents of the drive once you have chosen to encrypt it. Upon login, you will be required to enter your password to decrypt the drive. The ability to encrypt your drive comes in pretty handy when you are using a mobile device or laptop. As long as your drive is encrypted, nobody will be able to access your important data even if your laptop gets stolen. In addition to full-disk encryption, Linux also allows users to encrypt their home directory and create a fully protected system. Don’t Run as Root for Everything One of the most notable differences between Windows and Linux is that standard user accounts can’t destroy the integrity of the system when running Linux. When running Linux, you can only do that when using the system administrator. You will have to use the root account for certain administrative tasks, but it’s important that you keep these tasks separate from regular desktop management and day-to-day monotony. You will be required to enter your password for all administration tasks when you are not running root. A lot of users find the unending password requests tedious and resort to using root for everything. That’s a mistake. Do not be tempted to run as root for everything as it compromises the security of your device. There’s a high probability of making a mistake that ends up destroying the integrity of your system if you spend a lot of time as root. Disable USB MountWhen dealing with someone who can physically tamper with your computer, disabling the USB mount is a crucial method you can use to ensure higher security. The only downside is that you will have to find another method of transferring data safely once you disable the USB mount on your Linux device. However, the existence of sophisticated malware that activates automatically once the pen drive is inserted into your computer makes it worth it. Use Strong PasswordsLast but not least, use strong passwords to secure your device. We have been advised, time and again, to use strong passwords to protect our personal data. Still, most of us don’t give passwords enough attention. Your password is the key to your entire online identity, not just a simple barrier to your desktop. A password needs to be strong and unique. Use a combination of upper- and lower-case letters, numbers, symbols, and other characters to create strong passwords for your Linux devices and online accounts. Linux is one of the most secure operating systems out there. Running on only about 2 percent of desktop computers in the world, Linux doesn’t attract much attention from cybercriminals. But being part of a small minority doesn’t guarantee security. Linux malware exists and Linux devices get hacked, stolen, or lost. Use these tips to keep your Linux computer protected at all times.Writer’s bio:Jack is an accomplished cybersecurity expert with years of experience under his belt at TechWarn, a trusted digital agency to world-class cybersecurity companies. A passionate digital safety advocate himself, Jack frequently contributes to tech blogs and digital media sharing expert insights on cybersecurity and privacy tools. 

How To Setup mod_rewrite In Apache

0
Mod_rewrite on Apache

mod_rewrite is a Apache module installed on linux servers to manipulate URLs submitted in the browser to perform other functions than it appears. Mod_rewrite can improve SEO appearing to give it a static appearance.This guide assumes you already have Apache installed, if you do not please see How to Install ApacheEnable mod_rewriteYou will want to edit the main Apache configuration filenano /etc/httpd/conf/httpd.confAdd or un-comment the following lineLoadModule rewrite_module modules/mod_rewrite.soOnce you have saved the file you can go ahead and restart Apachesystemctl restart httpdor  in CentOS 6 or belowservice httpd restartYou should now see the module loaded by doing the following command# httpd -M 2>&1|grep rewrite
rewrite_module (shared)That is for enabling the module.  Mod_rewrite rules can either be inserted directly into the VirtualHost block for a specific domain or in a .htaccess for that given domain.Mod_rewrite ExamplesRewrite domain.com to www.domain.comRewriteEngine On
RewriteCond %{HTTP_HOST} !^www\. [NC]
RewriteRule ^(.*)$ http://www.%{HTTP_HOST}%{REQUEST_URI} [R=301,L]The above redirect will take all requests to the non-www domain and redirect them with a 301 code to the www.domain.com url and appendedthe rest of the url to it.Redirect all requests to https / SSLRewriteEngine On
RewriteCond %{HTTP_HOST} ^domain\.com [NC]
RewriteCond %{HTTPS} off
RewriteRule ^(.*)$ https://%{HTTP_HOST}%{REQUEST_URI}The above redirect will take all non-ssl requests and redirect them to https:// URLs.Redirect request from one directory to anotherRewriteRule ^subdirectory/(.*)$ /anotherdirectory/$1 [R=301,NC,L]The above redirect will take any requests towards a single directory and redirect it to another directory with the rest of  URL appended to it.Redirect one domain to anotherRewriteEngine On
RewriteCond %{HTTP_HOST} ^olddomain.com [NC,OR]
RewriteCond %{HTTP_HOST} ^www.olddomain.com [NC]
RewriteRule ^(.*)$ http://newdomain.com/$1 [L,R=301,NC]This will redirect any requests with the destination of the olddomain and change them to the new domain.  There are numerous redirects you can perform with mod_rewrite these are just a couple of common examples. Sep 5, 2017LinuxAdmin.io

Migrate Plex Server – Ubuntu

0
Migrate Plex Server - Ubuntu

To migrate your Plex server to a new Ubuntu server, you can follow these steps:

1. Set up the new Ubuntu server:
Install Ubuntu on the new server and ensure that it is up to date with the latest updates and packages.
2. Install Plex Media Server:
On the new Ubuntu server, download and install the Plex Media Server package. You can obtain the latest version from the Plex website.
$ wget https://downloads.plex.tv/plex-media-server-new-version.deb
$ sudo dpkg -i plex-media-server-new-version.deb
Replace “new-version” with the actual version number you downloaded.
3. Stop the Plex Media Server service:
Use the following command to stop the Plex Media Server service:
$ sudo service plexmediaserver stop
4. Copy Plex data directory:
On the old Ubuntu server, locate the Plex Media Server data directory. The default directory is /var/lib/plexmediaserver/Library/Application Support/Plex Media Server/. Copy the entire directory to a temporary location.
$ sudo cp -R /var/lib/plexmediaserver/Library/Application\ Support/Plex\ Media\ Server/ /path/to/temp/location/
Replace /path/to/temp/location/ with the path to your temporary location.
5. Transfer data to the new server:
Copy the Plex Media Server data directory from the temporary location on the old server to the corresponding location on the new server.
$ scp -r /path/to/temp/location/Plex\ Media\ Server/ new-server-ip:/var/lib/plexmediaserver/Library/Application\ Support/
Replace new-server-ip with the IP address of the new server.
6. Set ownership and permissions:
On the new server, set the ownership and permissions for the copied Plex data directory.

$ sudo chown -R plex:plex /var/lib/plexmediaserver/Library/Application\ Support/Plex\ Media\ Server/
$ sudo chmod -R 755 /var/lib/plexmediaserver/Library/Application\ Support/Plex\ Media\ Server/

7. Start the Plex Media Server service:
Finally, start the Plex Media Server service on the new server.

$ sudo service plexmediaserver start

8. Verify and update settings:
Access the Plex web interface on the new server and ensure that all your media libraries, settings, and metadata are intact. Make any necessary updates or adjustments.
That’s it! Your Plex server should now be migrated to the new Ubuntu server. Remember to update any firewall or router settings, if necessary, to allow access to the new server.

How to Install Docker on Ubuntu 24.04 Step-by-Step

0
How to Install Docker on Ubuntu 24.04 Step-by-Step

In this blog post, we will explain how to install docker on Ubuntu 24.04 step-by-step.Docker provides container run time environment which allow developers to build, share and package the application inside a container. This container will have all the libraries, system tools along with the code, later using this container we can quickly deploy the application. System on which we install docker is known as docker engine.PrerequisitesPre-Install Ubuntu 24.04 LTSRegular User with sudo rights2 GB RAM and Dual core processorInternet Connectivity1) Add Docker Official GPG KeyTo install latest docker on Ubuntu 24.04 LTS, first we need to add docker docker repository GPG key using below set of commands. So, start the terminal and execute these commands one after the another.$ sudo apt update
$ sudo apt install ca-certificates curl -y
$ sudo install -m 0755 -d /etc/apt/keyrings
$ sudo curl -fsSL https://download.docker.com/linux/ubuntu/gpg -o /etc/apt/keyrings/docker.asc
$ sudo chmod a+r /etc/apt/keyrings/docker.asc2) Add Docker Official APT RepositoryAfter Installing docker gpg key, add its official apt repository by running the following echo command.$ echo \
  “deb [arch=$(dpkg –print-architecture) signed-by=/etc/apt/keyrings/docker.asc] https://download.docker.com/linux/ubuntu \
  $(. /etc/os-release && echo “$VERSION_CODENAME”) stable” | \
  sudo tee /etc/apt/sources.list.d/docker.list > /dev/null3) Install Docker on Ubuntu 24.04As we have enabled the docker official apt repository, so we are good to start the docker installation. Run following apt command to install latest version of docker on your Ubuntu 24.04 system.$ sudo apt update
$ sudo apt install docker-ce docker-ce-cli containerd.io docker-buildx-plugin docker-compose-plugin -yOnce docker and its dependencies are installed then add your local user to docker group so that local user can run docker command with sudo.$ sudo usermod -aG docker $USER
$ newgrep docker
$ docker –versionVerify the docker service status,$ systemctl status dockerWhenever we install docker then it’s service should be started automatically, in case docker service is not running then execute following to start its service.$ systemctl start docker4) Test Docker InstallationIn order to test docker installation, let’s try to spin up a container using hello-world image. Run following docker command.$ docker run hello-worldAbove highlighted Informational message confirms that our docker installation is working fine.That’s all from this post, I hope you have found it informative and useful. Feel free to post your queries and feedback in below comments section.

Rilasciato Curl 8.9 – Aggregatore GNU/Linux e dintorni

0
Curl 8.9

cURL o più comunemente curl è uno strumento da linea di comando che può essere utilizzato per recuperare automaticamente informazioni dai siti Web. Il nome dello strumento è l’acronimo di Client URL (cURL). In pratica curl è un potente strumento di trasferimento dati utilizzato per inviare e ricevere informazioni e file su vari protocolli di rete, inclusi HTTP, FTP e SMTP. Ciò rende curl una risorsa fondamentale sia per gli sviluppatori web che per gli amministratori di sistemi.

cURL è stato sviluppato dallo sviluppatore svedese Daniel Stenberg nel 1997. Originariamente chiamato “httpget”, il progetto è stato rinominato in cURL nel 1998 per riflettere il suo supporto a più protocolli oltre HTTP. Da allora, curl è diventato uno dei progetti open source più popolari e ampiamente utilizzati, con una comunità di migliaia di collaboratori che continuano a migliorarlo e aggiornarlo.

Recentemente, Daniel Stenberg ha annunciato il rilascio di Curl 8.9. Questo aggiornamento, il 258° consecutivo, contiene importanti miglioramenti e novità come 260 correzioni di bug e 11 modifiche funzionali, oltre alla correzione di 2 falle di sicurezza.

Nuove funzioni

Curl 8.9 introduce 1 nuova opzione curl_easy_setopt() e 4 nuove opzioni della riga di comando. Queste estensioni estendono la funzionalità di Curl, offrendo agli utenti più strumenti e flessibilità.

Correzioni di bug

Questa versione include un record di 260 correzioni di bug, il numero più alto mai registrato nella lunga storia di Curl. I miglioramenti coprono varie aree, inclusi molti miglioramenti a CMake e alla configurazione degli script.

Le funzioni di documentazione e aiuto sono state perfezionate per una migliore esperienza utente. Il team ha risolto perdite di memoria e arresti anomali nelle implementazioni DNS su HTTPS (DoH).

È stata migliorata la gestione delle connessioni HTTPS, QUIC e TLS. La versione include anche un migliore supporto per diversi sistemi operativi e librerie SSL, rendendo Curl più versatile su tutte le piattaforme.

Di seguito è riportato un elenco delle correzioni di bug rilevate in questa versione:

cmake: 26 correzioni di bug separate.

configurare: 10 correzioni di bug separate.

Pulizia delle categorie di aiuto: miglioramento dell’output di aiuto elencando le categorie e ripulendo la presentazione.

Risposte 3xx: consenti la disposizione etag e contenuto per le risposte 3xx.

Documentazione: innumerevoli correzioni, perfezionamenti e correzioni.

Riepilogo test: visualizza i nomi e le parole chiave dei test non riusciti nel riepilogo.

GetAddrInfoExW: evitare di utilizzarlo indiscriminatamente.

AWS Sigv4: ​​​​codifica l’URL del percorso canonico.

DoH (DNS su HTTPS): varie correzioni tra cui pulizia, perdite di memoria e arresti anomali su HTTPS RR di lunghezza zero.

AppleIDN: corretta la gestione di ß.

OpenSSL 1.x: risolti i problemi di compilazione con md4 disabilitato.

Aggiornamenti sull’avanzamento: aggiunto un aggiornamento finale sull’avanzamento in caso di errore di connessione.

Multi: Polset fisso durante la fase di RISOLUZIONE.

QUIC: abilitato UDP GRO e aggiunto il supporto per lo spegnimento, con OpenSSL 3.3 ora richiesto.

Conversione di input: conversione di input CRLF fissa.

SMTP: fissi gli starttl per SMTP.

Keepalive TCP: modificato da millisecondi a secondi su DragonFly BSD e parametri supportati su Solaris <11.4.

TLS e TCP: arresto migliorato.

GnuTLS: nome SNI inviato invece del nome host durante il controllo dei certificati e corretti i controlli della versione TLS per QUIC.

mbedTLS v3.6.0: aggiunte soluzioni alternative.

Parser X509 ASN.1: diverse correzioni. Con innumerevoli correzioni di bug, nuove opzioni e miglioramenti della sicurezza, questa versione garantisce che Curl rimanga uno strumento di trasferimento dati potente e affidabile.

I nuovi miglioramenti della sicurezza includono correzioni per due vulnerabilità specifiche: CVE-2024-6197, che riguarda un errore nel parser ASN1, e CVE-2024-6874, che coinvolge errori nelle conversioni di codice nell’API URL. Queste correzioni aiutano a rafforzare la sicurezza di Curl.

Oltre agli aggiornamenti di sicurezza, Curl 8.9 introduce nuove opzioni della riga di comando come il supporto per Multipath TCP, che può migliorare le prestazioni della rete e la possibilità di specificare la priorità VLAN per il traffico IP. Questi miglioramenti hanno lo scopo di rendere Curl ancora più versatile e utile in una varietà di ambienti di rete.

La prossima versione pianificata, Curl 8.10, è già in vista con un ciclo di sviluppo più rapido previsto e promette innovazione e miglioramenti continui.

Fonte: https://daniel.haxx.se/blog/2024/07/24/curl-8-9-0/Fonte: https://www.linux.se/curl-8-9-ar-slappt/
Visited 22 times, 5 visit(s) today

Sparky 2024.05 Special Editions – SparkyLinux

0
SparkyLinux

There are new iso images of Sparky 2024.05 Special Editions out there: GameOver, Multimedia and Rescue. It is based on Debian testing “Trixie”.
The May update of Sparky Special Edition iso images features Linux kernel 6.7, updated packages from Debian and Sparky testing repos as of May 12, 2024, and most changes introduced at the 2024.05 release.
The Linux kernel is 6.7.12, and there are 6.9.0, 6.6.30-LTS, 6.1.90-LTS, 5.15.158-LTS in Sparky repos.
There is no need to reinstall Sparky rolling, simply keep Sparky up to date.
New iso images of Sparky semi-rolling can be downloaded from the download/rolling page

Facebook
Twitter
Reddit
Tumblr

Kali Linux 2023.4 Release (Cloud ARM64, Vagrant Hyper-V & Raspberry Pi 5)

0


With 2023 coming to an end and before the holiday season starts, we thought today would be a good time to release Kali 2023.4. Whilst this release may not have the most end-user features in it again, there are a number of new platform offerings and there has still been a lot of changes going on behind-the-scenes for us, which has a positive knock-on effect resulting in a benefit for everyone.
News, platforms, and features aside, it would not be a Kali release if there was not a number of changes to our packages – both new tools and upgrades to existing ones.
If you want to see what is new for yourself download a new image or upgrade if you already have a Kali Linux installation.The summary of the changelog since the 2023.3 release from August is:Cloud ARM64 MarketplacesStarting from Kali 2023.4, we will now be offering both Kali Linux AMD64 and ARM64 on Amazon AWS and Microsoft Azure marketplaces.The advantage that ARM64 brings to the table is more options and flexibility in instance offerings, which leads to improved price-to-performance ratio.
The draw back is, even though Kali Linux has always treated ARM a first class citizen, not every package has an ARM64 offering – most do and we are working on improving this every day!
Try setting up a lab in the cloud and performing your own benchmarks to compare performances.Amazon AWS:Microsoft Azure:If you need some help using Kali Linux in the cloud, be sure to check our documentation.
Otherwise, if you want to see how we generate these images, see our cloud build-scripts.Vagrant Hyper-V SupportWith our recent work with adding support to our VM build-scripts to create Microsoft Hyper-V virtual machines, we have kept on going down the rabbit hole of development. Our Vagrant offering now includes a Hyper-V environment!If you are not too familiar with Vagrant, think of it as a command-line interface for VMware, VirtualBox, and now Hyper-V.At a higher level, in the same way that Docker uses Dockerfile, Vagrant uses Vagrantfile.
These files go on to define how to create the virtual machine and further provisions, such as which operating system to use, CPU, RAM, storage, networking, and also any scripts or commands that the VM should execute to further install and configure.That means our our Vagrant offering has support for:Hyper-VQEMUVirtualBoxVMwareIf this is something you like the sound of, we have further reading on our documentation:We also have our vagrant build-scripts public if you want to see how it is done.Raspberry Pi 5If you have been lucky enough to get your hands on the newest Raspberry Pi, Kali Linux can now be used on a Raspberry Pi 5!We have created a new dedicated image which can either be downloaded direct, or automated using Raspberry Pi Imager.You can build the image yourself if you wish to tinker and customize any aspect of it, such as changing the default desktop environment, packages, settings etc.Please note, Nexmon support is not yet working with the in-built Wi-Fi (so no monitor mode or frame injection without an external card).You can keep an eye on progress by checking our documentation about it. Please keep in mind that while the image is now available for use, we would consider it to be in a BETA state. For the time being, the image is for ARM64 architecture, hopefully additional flavors will come later.We want to give a huge shout-out as there were a lot of volunteers from the community who were willing to test and report issues with the image.
There was one person who really stood out, and this image would not be possible without BakaValen’s assistance, support, reporting of issues, and ideas.Additionally, David Bombal’s Raspberry Pi 5 Kali Linux install in 10 minutes came out to show off our initial work of Kali Linux on the Raspberry Pi 5.GNOME 45With GNOME 45 hot off the press, Kali Linux is now supporting it! And is looking pretty in the process!For people who opt to use GNOME as their desktop environment, GNOME 45 is now here! If you do not read their changelog, below is a quick summary mixed with some of our tweaks:Full-height sidebars in many updated appsHighly improved speed of search in nautilus file managerUnfortunately the update for nautilus was not ready for this release, but it will arrive as a later update soonImproved settings app (gnome-control-center)Updated color-schemes for gnome-text-editorUpdated themes for shell, libadwaita, gtk-3 and gtk-4Updated gnome-shell extensionsShell updates, including a new workspace indicator, replacing the previous “Activities” buttonIt is also possible to scroll your mouse wheel while hovering over the indicator to switch between workspacesInternal InfrastructureWe are still undergoing big changes with our infrastructure, and as always, it is taking longer than planned! The wait has been worth it, and long standing items are getting fixed or replaced!Enters MirrorbitsOne of the projects which is now complete is the migration of our “mirror redirector”. This is our biggest user-facing service, as without this, all default Kali installations would not be able to use apt (aka http.kali.org), or being able to download Kali image (cdimage.kali.org). This service sits in-front of our mirrors (archive*.kali.org), community mirrors and Cloudflare (kali.download). It is responsible for redirecting every request to its nearest mirror, based on a few factors such as geographic location, mirror speed, and mirror “freshness”.Since Kali was launched back in March 2013, until November 2023 we had been using MirrorBrain. Unfortunately, the project has been unmaintained since 2015, and so after 10 years in production, it was really time to say good-bye. Today, we are now using Mirrorbits.The first thing we can say is that, with Mirrorbits, we find ourselves lucky: this is a rock-solid piece of software, built on modern tech (Go and Redis), initially released 10 years ago, and running in production for just as long. It was initially developed by Ludovic Fauvet from VideoLAN in order to distribute the VLC media player. And over these years, it has been adopted by a growing number of FOSS projects such as GNOME, Jenkins, Lineage OS, and many others.As it happens, our use-case of Mirrorbits is different to what it was originally created for: distributing VLC, or in other words, a rather small set of static files. Kali Linux being a complete Linux distribution, it means that we distribute a huge number of files (at times there can be millions of files in our repo). Being a rolling distribution means that Mirrorbits must cope with fast-changing metadata in the repository. We also need to distribute Kali over both HTTP and HTTPS, which was not well supported.Thus, the transition to Mirrorbits was not trivial, it did not work “out-of-the-box” for us, and we had to rework some pieces here and there, and basically hammer at it until it does the job. But it was well worth it, and in the end our modifications were clean enough that we could submit it all upstream. We really hope that all of this work will be accepted, thus making it easier for Linux distributions in general to use Mirrorbits going forward. Oh, and we have created and are maintaining the Debian package!Much more could be written on the topic, and we plan a longer blog post dedicated to it. But for now, enough’s been said.It would not be a Kali release if there were not any new tools added! A quick run down of what has been added (to the network repositories):cabby – TAXII client implementationcti-taxii-client – TAXII 2 client libraryenum4linux-ng – Next generation version of enum4linux with additional features (a Windows/Samba enumeration tool)exiflooter – Finds geolocation on all image URLs and directoriesh8mail – Email OSINT & Password breach hunting toolHavoc – Modern and malleable post-exploitation command and control frameworkOpenTAXII – TAXII server implementationPassDetective – Scans shell command history to detect mistakenly written passwords, API keys, and secretsPortspoof – All 65535 TCP ports are always open & emulates servicesRaven – Lightweight HTTP file upload serviceReconSpider – Most Advanced Open Source Intelligence (OSINT) Frameworkrling – RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rliSigma-Cli – List and convert Sigma rules into query languagessn0int – Semi-automatic OSINT framework and package managerSPIRE – SPIFFE Runtime Environment is a toolchain of APIs for establishing trust between software systemsThere have also been numerous packages updates and new libraries as well. We also bump the Kali kernel to 6.5.0!There have been multiple tools submitted from the community, ready to be merged into Kali:For more information about this, please see our blog post from previous release.MiscellaneousBelow are a few other things which have been updated in Kali, which we are calling out which do not have as much detail on:Kali NetHunter UpdatesWe have seen a few things from the community worth calling out:Kali ARM UpdatesThere are not a lot of changes to the ARM images this release, aside from the previously mentioned Raspberry Pi 5 support. However, they are no less important.The Raspberry Pi Zero W image now properly starts up into the command line interface instead of launching X.Accessing network configuration remotely now properly works again.eyewitness is now available for ARM64 platform.Kali Website UpdatesWe have recently created a Frequently Asked Questions with answers that we commonly keep seeing crop up.Our Kali documentation has had various updates to existing pages as well as new pages:We also want to say a little thank you to following for their work on the sites:These are people from the public who have helped Kali and the team for the last release. And we want to praise them for their work (we like to give credit where due!):AI Program – Helped testing base imagesBakaValen – Helped with testing, troubleshooting and offering ideas with the Raspberry Pi 5 imageDavid Bombal – Helped with testing the Raspberry Pi 5 imageSalty_ – Helped with testing base imagesX0RW3LL – Helped with testing base imagesAnyone can help out, anyone can get involved!New Kali MirrorsWe have some new mirrors! Those are:If you have the disk space and bandwidth, we always welcome new mirrors.Kali Team Discord ChatOnce the Kali release is over, we have been doing an hour long voice chat with a number of Kali team members. This is where anyone can ask questions to us about Kali or the information security industry as a whole.The next session will be held slightly differently to our previous ones, later in the day, on the Friday that is coming up, and on OffSec’s Discord – Friday, 8th December 2023 18:00 -> 19:00 UTC/+0 GMT (Discord link & iCalendar invite).Please note, there will not be a recording of this – its live only.Get Kali Linux 2023.4Fresh Images:
So what are you waiting for? Go and grab Kali already!Seasoned Kali Linux users are already aware of this, but for the ones who are not, we do also have weekly builds that you can use as well. If you cannot wait for our next release next quarter to get the latest packages or bug fixes you can download these images instead.
Just know that these are automated builds that we do not QA like we do our standard point release images. We also welcome any bug reports about those images too!!Existing Installs:
If you already have an existing Kali Linux installation, remember you can always do a quick update:┌──(kali㉿kali)-[~]
└─$ echo “deb http://http.kali.org/kali kali-rolling main contrib non-free non-free-firmware” | sudo tee /etc/apt/sources.list
[…]

┌──(kali㉿kali)-[~]
└─$ sudo apt update && sudo apt -y full-upgrade
[…]

┌──(kali㉿kali)-[~]
└─$ cp -vrbi /etc/skel/. ~/
[…]

┌──(kali㉿kali)-[~]
└─$ [ -f /var/run/reboot-required ] && sudo reboot -f
You should now be on Kali Linux 2023.4!
We can do a quick check by doing:┌──(kali㉿kali)-[~]
└─$ grep VERSION /etc/os-release
VERSION=”2023.4″
VERSION_ID=”2023.4″
VERSION_CODENAME=”kali-rolling”

┌──(kali㉿kali)-[~]
└─$ uname -v
#1 SMP PREEMPT_DYNAMIC Debian 6.5.6-1kali1 (2023-10-09)

┌──(kali㉿kali)-[~]
└─$ uname -r
6.5.0-kali3-amd64
NOTE: The output of uname -r may be different depending on the system architecture.As always, should you discover any issues with Kali, please search then submit a report on our bug tracker. We will never be able to fix what we do not know is broken! And social networks are not bug trackers!Want to keep up-to-date? Easy!
We have a RSS feeds and newsletter of our blog to help you. Our social networks are in the footer of this page!

Python Scripting for the Ethical Hacker Part II – The Wandering Irishman

0
Python Scripting for the Ethical Hacker Part II – The Wandering Irishman

Welcome back to LSB my fellow ethical hackers, this is the second part to our Python scripting tutorial. Today we will be installing PyCharm and creating our first Python script. Pycharm is an integrated development environment (IDE) and we will be using this throughout the tutorial, so let’s get started. We are using Kali Linux… Welcome back to LSB my fellow ethical hackers, this is the second part to our Python scripting tutorial. Today we will be installing PyCharm and creating our first Python script.
Pycharm is an integrated development environment (IDE) and we will be using this throughout the tutorial, so let’s get started.
We are using Kali Linux OS also as we have for the first part of this series, so if you have not already installed it you can find it here.
$199 ENROLLS YOU INTO OUR SELF PACED COURSE – LFS264 – OPNFV FUNDAMENTALS!

So when you have Kali installed, open up your browser and search for PyCharm. The reason we are usingPyCharm is because it has a nice debugger and it helps maintain your coding libraries.

You will need to choose your operating system, Windows, Linux or Mac, for us it will be Linux. Also, we can either choose the professional version or the community version, we will just choose community for this tutorial.
Once you download the file, open up a command terminal and navigate to the Downloads folder.
cd Downloads
ls

As we can see the file we have downloaded is compressed with Gunzip, so let’s decompress the file.
tar -xvf pycharm-community-2017.2.3.tar.gz

ls

Next we just need permissions so that we can read, write and execute as root.
chmod 777 pycharm-community-2017.2.3
Then move into the folder.
cd pycharm-community-2017.2.3

ENROLL TODAY IN THE SELF PACED COURSE – LFS263 – ONAP FUNDAMENTALS FOR $199!

We are using the 2017 version of PyCharm, just because we are comfortable with it, but please install the latest version for yourself, installation will be the same. Above is the contents of the directory. Next we want to move into the bin folder.
cd bin

ls

As we can see the pycharm.sh file is already in green so we don’t need to change permissions for that file.
So to start up PyCharm it’s simple.
./pycharm.sh
This will open a dialogue box to complete the installation.

We have it already set up so we will not be importing any new settings, but you probably will not, so simply choose a folder to install the software.
Once that is done it will present us with a privacy policy and we just need to accept it and move on.

Once you hit Accept it will start up PyCharm. Next we will be presented with some configuration options. We will leave everything as default and just hit the OK button.
$299 REGISTERS YOU FOR OUR NEWEST SELF PACED COURSE! LFD201 – INTRODUCTION TO OPEN SOURCE DEVELOPMENT, GIT, AND LINUX!

And that’s it, we should have PyCharm installed on our Kali Linux VM.

So now we have the software installed we are going to create a new project. Name it and choose the folder you want the project in. For this tutorial we will just save it to our Desktop and hit OK and the Create.

Once you have done that it may take some time for the software to open as it installs some packages needed for scripting. So be patient with the installation. Once the installation is complete we can create our first Python script.
REGISTER TODAY FOR YOUR KUBERNETES FOR DEVELOPERS (LFD259) COURSE AND CKAD CERTIFICATION TODAY! $499!    $299 now!!

Right click on the Desktop folder on the left hand side panel and choose New/Python Script.

Let’s give it a name. We will call ours PythonRocks but you can name it whatever you want to. Then hit OK. This will create the Python file for us.

Perfect. So now let’s print out something simple just to make sure it works.
print “Python Rocks!”
Then we need to save it somewhere, so we will save it again to our Desktop.

Once the file is saved, go to the Desktop to see that the file has been saved there.

Perfect, now let’s run the file in the terminal. Open a command prompt gain and navigate to the Desktop folder.
cd Desktop
Before we run the file we have to make it executable.
chmod 777 PythonRocks.py

Cool, green means it is executable. So let’s run the file.
python PythonRocks.py

Beauty! As you can see this is a very basic script but will get you started in how to use Python, we will be going into more depth in future tutorials so stay tuned and thanks for reading!! 😉
QuBits 2020-06-09

 
 

Combining exploration, city-building and complex resource management, Scorchlands 1.0 is out now

0
Combining exploration, city-building and complex resource management, Scorchlands 1.0 is out now

Available now with Native Linux support and full Steam Deck support with the 1.0 release, Scorchlands has left Early Access. There’s no Steam Deck rating just yet from Valve, but the developer made it clear the 1.0 update is “fully compatible with the Steam Deck” and they have “added full controller support and UI scaling to enhance the gameplay experience”.
What is it? Well, it’s kind of complicated to describe. It’s a strategy game that has elements of a city builder, with complex resource management. Where you travel across the land to keep expanding much like you do in Factorio for example, you’re not some nameless thing in the sky. Eventually you’ll be transforming barren surfaces into meadows, forests, lakes and vibrant settlements. It’s a real interesting mix and now has a Very Positive rating on Steam.
Check out the launch trailer:

Features:

Hex grid-based city-building – construct various buildings in your colonies. Each structure’s productivity depends on neighboring resources and other constructions.
Complex resource management – it’s not only about extracting materials. Scorchlands takes account of logistics – the movement of resources between colonies and combining them in robust processing chains. And yes, we move resources using LASERS!
Terraforming for the greater good – utilize magic and technology to change the biomes on procedurally generated maps and exploit the new environment to gain its unique resources.
Technology designed to give fun – there’s no fun in a sandbox, if you don’t have the toys to play with. The technology system in Scorchlands is key for player progression and new discoveries open up new ways to play with the game world.
Minimalistic combat system – when you get into a fight, positioning will be key. Destroy your enemies by surrounding them and placing your forces in optimal locations.

Available to buy from:
Fanatical
GOG (Windows only)
Steam
Article taken from GamingOnLinux.com.