The small linux problem thread

Strange, xev is seeing no difference at all.

Quick search says this may be KDE doing weird things:

Or changing the settings in the BIOS may help:

apt-cache policy <package name>

should give you a list of your installed version and any available previous versions in the repoā€™s

then

sudo apt-get install <package name>=<version>
2 Likes

Youā€™ll find the available packages/versions here: http://ftp.debian.org/debian/pool/main/u/unzip/

If youā€™re trying to get a really old version of something, you may need to modify your /etc/apt/sources.list and perhaps add a line pointing to http://archive.debian.org/debian/.

But HEXiTā€™s advice may be what you really needā€¦

2 Likes

I suggest you try something that can read the /dev/input/eventā€™ -type devices, xev events might be filtered beforehand. Also, sometimes special keys show up on separate devices. That should also be independent of the desktop environment.

The main and unstable Debian archives donā€™t have the version of unzip 6.0-26 which is bizarre. It seems I have to get the .deb file from snapshots.debian.org and install with dpkg

1 Like

well at least you know why it wont install :wink:

2 Likes

Turns out timeshift works with rsync too. I was able to update the packages in small batches and narrow down the offending package then roll back and freeze those. Turns out it is a bug in GTK that affects cups printer discovery in system print dialogue box.

2 Likes

I amā€¦ slightly confused. I canā€™t push or pull to/from GitHub anymore and I donā€™t know why.

z% git push github --tags
Enter passphrase for key '/home/tarulia/.ssh/github_private': 
[email protected]: Permission denied (publickey).
fatal: Could not read from remote repository.

Please make sure you have the correct access rights
and the repository exists.

???

Naturally my first idea was well maybe GitHub removed my key for some reason. But no, itā€™s there. Itā€™s been in use since 2015 with no issues. For the last 2 years even. Not sure when it started since I havenā€™t used it much the last couple months.

Their help page doesnā€™t seem to help me hereā€¦

The only thing they list that I could try was this:

z% ssh -vT [email protected]
OpenSSH_8.8p1, OpenSSL 3.0.5 5 Jul 2022
...
cebug1: Trying private key: /home/tarulia/.ssh/github_private
Enter passphrase for key '/home/tarulia/.ssh/github_private': 
debug1: load_identity_file: Skipping key /home/tarulia/.ssh/github_private: Invalid key length
debug1: No more authentication methods to try.
[email protected]: Permission denied (publickey).

Uuuh OK? Anyone know if they changed anything regarding minimum requirements? If so they arenā€™t listed in the help pagesā€¦

This might be related, but I think this would be algo error, not key length. I guess I would check to see what your key length is and what algorithms it uses. 1024 bits is generally deprecatedā€¦ how old are your keys?


Note: GitHub improved security by dropping older, insecure key types on March 15, 2022.

As of that date, DSA keys (ssh-dss) are no longer supported. You cannot add new DSA keys to your personal account on GitHub.com.

RSA keys (ssh-rsa) with a valid_after before November 2, 2021 may continue to use any signature algorithm. RSA keys generated after that date must use a SHA-2 signature algorithm. Some older clients may need to be upgraded in order to use SHA-2 signatures.

How would I check that? :sweat_smile:

Well as mentioned itā€™s on the account since 2015 but I believe I created it before then already, so not entirely sure.

ssh-keygen -l -f ~/.ssh/github_private

This is very similar to a problem I was dealing with weeks ago. Trying to SSH into an old piece of network gear was quitting immedately with ā€œBad server host key: Invalid key lengthā€

The crypto-policies package on at least RHEL9 and Fedora were recently updated to set RequiredRSASize 2048 in /etc/crypto-policies/back-ends/openssh.config even in LEGACY mode which I use. ssh on my own PC was seeing the server used a 1024-bit RSA key and would refuse to continue connecting.

I didnā€™t find a better fix than modifying that line in the file myself, and setting the file immutable so future crypto-policies updates donā€™t/canā€™t change it without my allowing it (and having the opportunity to immedately change it back before an ssh process breaks).

1 Like

Thank you, however, Iā€™m getting this:

z% ssh-keygen -l -f ~/.ssh/github_private
/home/tarulia/.ssh/github_private is not a key file.
z% file ~/.ssh/github_private             
/home/tarulia/.ssh/github_private: PEM RSA private key

what D:

My mistakeā€¦ Try pointing ssh-keygen to the public side of the key. Your non-standard naming scheme must be preventing it from guessing the file name for that one.

And for the next question, ssh-keygen -y will generate the public key from an unencrypted private key, if you donā€™t have that handy.

1 Like

Thank you that worked

z% ssh-keygen -l -f ~/.ssh/github_public
1024 SHA256:cavzFgUdePDx17bL/BG8aRZmV5v6THVlJ8mZHYv+yg4 no comment (RSA)

This is freshly generated as per above.

I guess that matches with what you said earlier


Iā€™m guessing I canā€™t just keep the private key and just generate a newer longer public key? Probably need an entirely new pair?

Okay, Iā€™m feeling a little dumb here.

I had an unclean reboot of Ubuntu 22.04. I read that I should hit my SSD with fsck, but to make sure it isnā€™t mounted. I rebooted with a live CD, dropped to a terminal, and ran fsck /dev/nvme0n1p1 (which is my root drive) and it said it canā€™t run because it isnā€™t mounted. I mounted it (cautiously) and reran fsck which then warned me it would screw the partition up. So then I unmounted it again and re-ran fsck, which again refused to run because it wasnā€™t mounted. What am I missing here?

I just tested this on my /boot partition (bravo, not romeo) and it seemed to work as expected. I was only able to fsck when it wasnā€™t mounted. I wonder if the filesystem is corrupted and it is reported bad information. Also, what filesystem do you have on your root drive?

# fsck -fv /dev/nvme0n1p2 
fsck from util-linux 2.36.1
e2fsck 1.46.5 (30-Dec-2021)
/dev/nvme0n1p2 is mounted.
e2fsck: Cannot continue, aborting.

# umount -l /boot/

# fsck -fv /dev/nvme0n1p2 
fsck from util-linux 2.36.1
e2fsck 1.46.5 (30-Dec-2021)
Pass 1: Checking inodes, blocks, and sizes
Pass 2: Checking directory structure
Pass 3: Checking directory connectivity
Pass 4: Checking reference counts
Pass 5: Checking group summary information

         349 inodes used (1.07%, out of 32768)
           3 non-contiguous files (0.9%)
           1 non-contiguous directory (0.3%)
             # of inodes with ind/dind/tind blocks: 0/0/0
             Extent depth histogram: 341
       65278 blocks used (49.80%, out of 131072)
           0 bad blocks
           1 large file

         333 regular files
           7 directories
           0 character device files
           0 block device files
           0 fifos
           0 links
           0 symbolic links (0 fast symbolic links)
           0 sockets
------------
         340 files

# mount /boot/
1 Like

Iā€™m using ext4. It was weird. When it was mounted, fsck said donā€™t do that. So I unmounted it, and then fsck said mount it. LOL!

1 Like

EXT4 does support online fsck now. It has been there for about 10 years. I would still recommend doing it offline, just add the force flag maybe?

Also, if you modify the FSTAB entry to do a scan of the drive, your init should force the scan due to dirty shutdown.

1 Like

Thank you! I think I got it, now! :slight_smile:

Turned on my living room PC with 20.04 (desktop) and it hits the boot screen okay then it just goes to black with a flashing cursor ā€¦