Page 12 of 20

2020 Updated Nemesis Base Modules

Posted: 12 Oct 2020, 11:54
by beny
hi M.Eire i have used your script in nemesis fresh boot and i have started with core and gui extra and xfce4 changed all from base and work...seem, i write in firefox from my new nemesis,core new is 150 mb instead the 125. tell me if i have to do something to check system there are warning on the go when the build run but seem all permission user or root.

2020 Updated Nemesis Base Modules

Posted: 12 Oct 2020, 12:14
by beny
hi first issue with su or sudo i can't use it

2020 Updated Nemesis Base Modules

Posted: 12 Oct 2020, 13:15
by ncmprhnsbl
M. Eerie wrote:
12 Oct 2020, 09:11
same was reported in this topic sometime ago: here
what's the output of:

Code: Select all

ping -q -w 1 -c 1 `ip r | awk '/default/{print$3}'|head -n1`
(that's function: is_online from /usr/share/porteus/porteus-functions called by setup-pman)

2020 Updated Nemesis Base Modules

Posted: 12 Oct 2020, 13:22
by M. Eerie
ncmprhnsbl wrote:
12 Oct 2020, 13:15
what's the output of:

Code: Select all

[guest@porteus ~]$ ping -q -w 1 -c 1 `ip r | awk '/default/{print$3}'|head -n1`
PING 192.168.0.1 (192.168.0.1) 56(84) bytes of data.

--- 192.168.0.1 ping statistics ---
1 packets transmitted, 0 received, 100% packet loss, time 0ms
However, in firefox I can reach my router entering that ip

:%)

2020 Updated Nemesis Base Modules

Posted: 12 Oct 2020, 13:35
by M. Eerie
beny wrote:
12 Oct 2020, 12:14
hi first issue with su or sudo i can't use it
Hi Beny,

Yes, that's the same result I got.

As I've said, the core module does not update properly. Whenever pacman finishes updating packages, post-transaction hooks take place and then some errors appears. I've noticed "20-sysusers.hook" yields errors creating groups/users.

Here is my last attempt pacman.log

Thanks for the feedback :)

2020 Updated Nemesis Base Modules

Posted: 12 Oct 2020, 13:46
by ncmprhnsbl
M. Eerie wrote:
12 Oct 2020, 13:22
:%)
hmm, havn't had a problem with that myself...been using wired connection, havn't tested on wifi.. can't see what difference that would make tho..

RE update script: --overwrite: for what reason are you using this?

2020 Updated Nemesis Base Modules

Posted: 12 Oct 2020, 14:11
by M. Eerie
ncmprhnsbl, Sorry, forget about setup-pman issue. With base_only parameter, it's working fine. I have to investigate what is causing this. /etc/local.d/firewall.start was...
ncmprhnsbl wrote:
12 Oct 2020, 13:46
RE update script: --overwrite: for what reason are you using this?
It's needed because sometimes, pacman fails syncing aborting the process whenever it detects existing files in some system areas. I'm pretty sure this is causing the problem, but otherwise, modules cannot be updated if conflicting files are present. :(

Thanks.

Edit 1: error: invalid option '--force' (deprecated) :no:
Edit 2: Need to check --sysroot option

2020 Updated Nemesis Base Modules

Posted: 12 Oct 2020, 17:42
by beny
hi switching on another tty i can use root account also in terminal with the toor password yes seem a permission mix trouble

2020 Updated Nemesis Base Modules

Posted: 12 Oct 2020, 20:03
by beny
hi after this command i can use sudo as guest but the su option not run yet: chown root:root /usr/bin/sudo && chmod 4755 /usr/bin/sudo
i have two desktop one guest and one root and work twice at same time,

2020 Updated Nemesis Base Modules

Posted: 13 Oct 2020, 19:44
by M. Eerie
beny wrote:
12 Oct 2020, 17:42
switching on another tty i can use root account also in terminal with the toor password yes seem a permission mix trouble
Yes, I can confirm that.

I don't really know how to solve this. :oops:

I've tried to update with --ignore '*' instead of --overwrite '*', but no luck.

This is the pacman.log

Code: Select all

[2020-10-13T20:42:31+0200] [ALPM] upgraded archlinux-keyring (20200422-1 -> 20200820-1)
[2020-10-13T20:42:31+0200] [ALPM-SCRIPTLET] ==> Appending keys from archlinux.gpg...
[2020-10-13T20:42:33+0200] [ALPM-SCRIPTLET] ==> Locally signing trusted keys in keyring...
[2020-10-13T20:42:33+0200] [ALPM-SCRIPTLET]   -> Locally signing key D8AFDDA07A5B6EDFA7D8CCDAD6D055F927843F1C...
[2020-10-13T20:42:33+0200] [ALPM-SCRIPTLET] ==> ERROR: D8AFDDA07A5B6EDFA7D8CCDAD6D055F927843F1C could not be locally signed.
[2020-10-13T20:42:33+0200] [ALPM-SCRIPTLET]   -> Locally signing key DDB867B92AA789C165EEFA799B729B06A680C281...
[2020-10-13T20:42:33+0200] [ALPM-SCRIPTLET] ==> ERROR: DDB867B92AA789C165EEFA799B729B06A680C281 could not be locally signed.
[2020-10-13T20:42:33+0200] [ALPM-SCRIPTLET]   -> Locally signing key 91FFE0700E80619CEB73235CA88E23E377514E00...
...
While the outdated packages had been upgraded, as you can see here, the log reaveals some commands are skipped because "Current root is not booted"...
And it's pretty clear these tasks involve users/groups management.

So,

Pacman has the --sysroot option supposedly to replace --root. This potentially would allow to simulate a chroot into the "real" filesystem, but I have no clue how to use it.
From arch wiki, it seems you have to recreate some mountpoints to be able to act as a the real root account. :unknown:

Code: Select all

...
[2020-10-13T20:42:37+0200] [ALPM] upgraded zstd (1.4.4-1 -> 1.4.5-1)
[2020-10-13T20:42:37+0200] [ALPM] transaction completed
[2020-10-13T20:42:37+0200] [ALPM] running '20-sysusers.hook'...
[2020-10-13T20:42:37+0200] [ALPM] running '30-openrc-upgrade.hook'...
[2020-10-13T20:42:37+0200] [ALPM-SCRIPTLET]   Skipped: Current root is not booted.
[2020-10-13T20:42:37+0200] [ALPM] running '30-tmpfiles.hook'...
[2020-10-13T20:42:37+0200] [ALPM-SCRIPTLET] /usr/lib/tmpfiles.d/dhcpcd.conf:1: Failed to resolve user 'dhcpcd': No such process
[2020-10-13T20:42:37+0200] [ALPM-SCRIPTLET] /usr/lib/tmpfiles.d/dhcpcd.conf:2: Failed to resolve user 'dhcpcd': No such process
[2020-10-13T20:42:37+0200] [ALPM-SCRIPTLET] /usr/lib/tmpfiles.d/static-nodes-permissions.conf:12: Failed to resolve group 'audio'.
[2020-10-13T20:42:37+0200] [ALPM-SCRIPTLET] /usr/lib/tmpfiles.d/static-nodes-permissions.conf:13: Failed to resolve group 'audio'.
[2020-10-13T20:42:37+0200] [ALPM-SCRIPTLET] /usr/lib/tmpfiles.d/static-nodes-permissions.conf:14: Failed to resolve group 'disk'.
[2020-10-13T20:42:37+0200] [ALPM-SCRIPTLET] /usr/lib/tmpfiles.d/static-nodes-permissions.conf:17: Failed to resolve group 'kvm'.
[2020-10-13T20:42:38+0200] [ALPM] running '30-sysctl.hook'...
[2020-10-13T20:42:38+0200] [ALPM-SCRIPTLET]   Skipped: Current root is not booted.
[2020-10-13T20:42:38+0200] [ALPM] running '30-udev-hwdb.hook'...
[2020-10-13T20:42:38+0200] [ALPM] running '30-udev-reload.hook'...
[2020-10-13T20:42:38+0200] [ALPM-SCRIPTLET]   Skipped: Device manager is not running.
[2020-10-13T20:42:38+0200] [ALPM] running '40-update-ca-trust.hook'...
[2020-10-13T20:42:38+0200] [ALPM] running '50-sysvcompat.hook'...
[2020-10-13T20:42:38+0200] [ALPM-SCRIPTLET] 	==> Found openrc-init
[2020-10-13T20:42:38+0200] [ALPM] running '55-initswitch.hook'...
[2020-10-13T20:42:38+0200] [ALPM-SCRIPTLET] 	==> Activated openrc-init
[2020-10-13T20:42:38+0200] [ALPM] running '80-cronie.hook'...
[2020-10-13T20:42:38+0200] [ALPM-SCRIPTLET]  * WARNING: cronie is already starting
[2020-10-13T20:42:38+0200] [ALPM] running 'dbus-reload.hook'...
[2020-10-13T20:42:38+0200] [ALPM-SCRIPTLET]   Skipped: Current root is not booted.
[2020-10-13T20:42:38+0200] [ALPM] running 'detect-old-perl-modules.hook'...
[2020-10-13T20:42:38+0200] [ALPM-SCRIPTLET] perl: error while loading shared libraries: libcrypt.so.2: cannot open shared object file: No such file or directory
[2020-10-13T20:42:38+0200] [ALPM-SCRIPTLET] WARNING: '/usr/lib/perl5/5.32' contains data from at least 3 packages which will NOT be used by the installed perl interpreter.
[2020-10-13T20:42:38+0200] [ALPM-SCRIPTLET]  -> Run the following command to get a list of affected packages: pacman -Qqo '/usr/lib/perl5/5.32'
[2020-10-13T20:42:38+0200] [ALPM] running 'gio-querymodules.hook'...
[2020-10-13T20:42:38+0200] [ALPM] running 'glib-compile-schemas.hook'...
[2020-10-13T20:42:38+0200] [ALPM] running 'openrc-install.hook'...
[2020-10-13T20:42:39+0200] [ALPM-SCRIPTLET] 	==> Add a service to runlevel:
[2020-10-13T20:42:39+0200] [ALPM-SCRIPTLET] 	rc-update add <service> <runlevel>
[2020-10-13T20:42:39+0200] [ALPM-SCRIPTLET] 	==> Start/stop/restart a service:
[2020-10-13T20:42:39+0200] [ALPM-SCRIPTLET] 	rc-service <service> <start/stop/restart>
[2020-10-13T20:42:39+0200] [ALPM] running 'texinfo-install.hook'...
Thanks so much for your feedback.

2020 Updated Nemesis Base Modules

Posted: 13 Oct 2020, 21:43
by beny
hi M.Eire the module made by ncmprhnsbl have permission set to 4755 your module have the permission set to 755:
[porteus ~]# stat -c "%a %n" '/usr/bin/su'
4755 /usr/bin/su

[porteus ~]# stat -c "%a %n" '/usr/bin/su'
755 /usr/bin/su
[porteus ~]# stat -c "%a %n" '/sys'
555 /sys





i don't know how to do this....

2020 Updated Nemesis Base Modules

Posted: 14 Oct 2020, 01:18
by francois
Thanks ncmprhnsbl for maintaining nemesis. Its great to have these nemesis iso from neko. He makes our lives so easy. With guys like you, we kinda get lazy.

2020 Updated Nemesis Base Modules

Posted: 14 Oct 2020, 06:51
by M. Eerie
beny wrote:
13 Oct 2020, 21:43
ncmprhnsbl have permission set to 4755 your module have the permission set to 755:
Thanks beny, will try to set those permissions and report back.

Cheers!

2020 Updated Nemesis Base Modules

Posted: 15 Oct 2020, 09:14
by M. Eerie
New attempt, same results.

Log here

This was the fixPERMS routine used:

Code: Select all

fixPERMS() {
	chmod -f 700 $1/var/db/sudo/lectured/ $1/var/lib/NetworkManager/ $1/etc/NetworkManager/system-connections/
	chmod -f 750 $1/root $1/etc/sudoers.d/ $1/etc/openvpn/client/ $1/etc/openvpn/server/ $1/001-core/usr/share/polkit-1/rules.d/ $1/001-core/etc/polkit-1/rules.d/
	chmod -f 755 $1/etc $1/etc/local.d $1/usr $1/usr/local $1/usr/local/bin
	chmod -f 555 $1/{proc,sys}/ $1/srv/ftp >/dev/null 2>&1
	chmod -f 4555 $1/usr/bin/{su,sudo}  >/dev/null 2>&1 ### beny advice
	find $1/usr/share/icons -type d -exec chmod 755 {} + >/dev/null 2>&1
	find $1/usr/share/icons -type f -exec chmod 644 {} + >/dev/null 2>&1
}
and this was the pacman command used:

Code: Select all

pacman -Sddur 001-core --overwrite * --noconfirm --needed -
Some captures of uncommon attributes/owners/groups in /usr/bin in standard ncmprhnsbl core module:

Image

Image

Image

Last attempt shows a twin filesystem in Thunar DEVICES PANEL, so I presume there are 2 root accounts active, as beny said. Don't know where they come from

:unknown:

2020 Updated Nemesis Base Modules

Posted: 03 Dec 2020, 09:09
by M. Eerie
beny wrote:
13 Oct 2020, 21:43
hi M.Eire the module made by ncmprhnsbl have permission set to 4755 your module have the permission set to 755:
[porteus ~]# stat -c "%a %n" '/usr/bin/su'
4755 /usr/bin/su
M. Eerie wrote:
15 Oct 2020, 09:14
chmod -f 4555 $1/usr/bin/{su,sudo} >/dev/null 2>&1 ### beny advice
:wall:

Need to try that.

Also, maybe I need to figure out another method to update the running system without interfere the already set permissions...

:hmmm: