Log in

No account? Create an account
Linux Community's Journal
[Most Recent Entries] [Calendar View] [Friends View]

Wednesday, June 26th, 2002

Time Event
UT works
yes i just got UT to work on linux!!!!!!!! what i had to do was set up the offical nvidia drivers not the ones that came with mandrake. i also now get alot faster fps(frames per second) in all my ogl stuff. but now i get this compiler error.

g++ main.cpp -B /usr/X11R6/lib -o ng -lX11 -lXi -lX
mu -lglut -lGL -lGLU -lm
/usr/X11R6/lib/libGL.a(glxext.o): In function `glXMakeCurrent':
glxext.o(.text+0xb2b): undefined reference to `pthread_key_create'
glxext.o(.text+0xb4b): undefined reference to `pthread_getspecific'
glxext.o(.text+0xbea): undefined reference to `pthread_key_create'
glxext.o(.text+0xc0c): undefined reference to `pthread_getspecific'
glxext.o(.text+0xc9b): undefined reference to `pthread_key_create'
glxext.o(.text+0xcbb): undefined reference to `pthread_getspecific'
glxext.o(.text+0x100a): undefined reference to `pthread_key_create'
glxext.o(.text+0x1030): undefined reference to `pthread_getspecific'
glxext.o(.text+0x1219): undefined reference to `pthread_key_create'
glxext.o(.text+0x1236): undefined reference to `pthread_setspecific'
glxext.o(.text+0x12b4): undefined reference to `pthread_key_create'
glxext.o(.text+0x12d2): undefined reference to `pthread_setspecific'
/usr/X11R6/lib/libGL.a(glxext.o): In function `glXGetCurrentContext':
glxext.o(.text+0x132a): undefined reference to `pthread_key_create'
glxext.o(.text+0x134b): undefined reference to `pthread_getspecific'
/usr/X11R6/lib/libGL.a(glxext.o): In function `glXGetCurrentDrawable':
glxext.o(.text+0x138a): undefined reference to `pthread_key_create'
glxext.o(.text+0x13ab): undefined reference to `pthread_getspecific'
/usr/X11R6/lib/libGL.a(glxext.o): In function `glXGetCurrentDrawableEXT':
glxext.o(.text+0x13ea): undefined reference to `pthread_key_create'
glxext.o(.text+0x140a): undefined reference to `pthread_getspecific'
/usr/X11R6/lib/libGL.a(glxext.o): In function `__glXGetCurrentContext':
glxext.o(.text+0x150a): undefined reference to `pthread_key_create'
glxext.o(.text+0x152a): undefined reference to `pthread_getspecific'
/usr/X11R6/lib/libGL.a(glxext.o): In function `__glXSetCurrentContext':
glxext.o(.text+0x155a): undefined reference to `pthread_key_create'
glxext.o(.text+0x1577): undefined reference to `pthread_setspecific'
/usr/X11R6/lib/libGL.a(glxext.o): In function `__glXSetupForCommand':
glxext.o(.text+0x15b1): undefined reference to `pthread_key_create'
glxext.o(.text+0x15d1): undefined reference to `pthread_getspecific'
/usr/X11R6/lib/libGL.a(glxext.o): In function `__glXCloseDisplay':
glxext.o(.text+0x1651): undefined reference to `pthread_key_create'
glxext.o(.text+0x1671): undefined reference to `pthread_getspecific'
glxext.o(.text+0x169a): undefined reference to `pthread_key_create'
glxext.o(.text+0x16b7): undefined reference to `pthread_setspecific'
/usr/X11R6/lib/libGL.a(glthread.o): In function `_glthread_InitTSD':
glthread.o(.text+0x1e): undefined reference to `pthread_key_create'
/usr/X11R6/lib/libGL.a(glthread.o): In function `_glthread_GetTSD':
glthread.o(.text+0x6a): undefined reference to `pthread_key_create'
glthread.o(.text+0x9e): undefined reference to `pthread_getspecific'
/usr/X11R6/lib/libGL.a(glthread.o): In function `_glthread_SetTSD':
glthread.o(.text+0xca): undefined reference to `pthread_key_create'
glthread.o(.text+0x102): undefined reference to `pthread_setspecific'
collect2: ld returned 1 exit status
g++: file path prefix `/usr/X11R6/lib' never used
Linux 2.5.24 beta kernel
I used the Beta 2.5.24 kernel for a day without issues. 20+ hours on a Thunderbird 1.4 Gigaherts 512megs ram system. (Abit kt7-raid)

Has anyone worked on getting the audigy drivers to work with it?

And does anyone have a Dual AMD Athlon XP system? (As opposed to the dual Athlon MP)..

I ask because evidently the dual XP can work, but its not guarantee'd.. From an article I read on acehardware?

Can anybody help?
Sorry for stupid question but...

The problem is:

I have local network with IP and one of the computers in this network, let's say is the gateway to Internet.

There are two modems are plugged to this computer and connected to my ISP.

ppp0 - 212.x.x.1
ppp1 - 212.x.x.2

All I need to do is to setup system on the gateway in the way they will give internet access for local IPs throug ppp0 and for local IPs throug ppp0?

It seems like it's easy but I have no idea HOW?

PS: sorry for my English...
Theo can bite me. [or OpenSSH "vulnerability"]
I will admit from the start, that Theo de Raadt annoys me. I've seen and participated in e-mail discussions with him before, and I've nearly never seen a pleasant discussion where he's involved. I don't like him.

However, the whole thing with the recent OpenSSH security vulnerability really annoys me. His poor handling of the "exploit" has cost a lot of people a great deal of time, effort, and hard work, and for many of us, unnecessarily so.

Here are the basic facts, as I understand them:
  • All versions of OpenSSH < 3.4 are vulnerable to exploit. (Rumor has it that versions prior to 3.0 are not vulnerable, but I've not been able to verify this.)

  • Theo de Raadt has been telling everyone that they must upgrade to OpenSSH 3.3 immediately, while admitting that this does not fix the security hole (it does reduce the impact it has, though).

  • Theo (falsely) claimed that there was no patch or fix available for this security exploit, and wouldn't be until a new release of OpenSSH was released.

  • Thousands of people were left with very little information, and were forced to spend the time and effort to protect their systems, upgrade OpenSSH, then test and verify it. Additionally, OpenSSH 3.3 has known bugs on many platforms (compression doesn't work on all operating systems, including Linux 2.2.x kernels, PAM support isn't complete, and breaks on many systems, etc).

  • The claim that all systems making use of OpenSSH < 3.4 are vulnerable is untrue.

  • The majority of systems out there using OpenSSH are in fact not vulnerable by the default setup. (Although, OpenBSD is.)

  • Your OpenSSH installation is only vulnerable to this security problem if you have RSA based rhosts authentication turned on, AND you have S/KEY authentication turned on. Both of these options must be compiled in and enabled (most default setups leave both of these disabled, even if compiled in)

  • You can ensure that your systems are safe and secure from this bug simply by editing the sshd_config (in /etc/ or /etc/ssh/), and adding the directive: ChallengeResponseAuthentication no, or if you already have that directive listed, change it to no. That's correct, no additional patching or upgrades are needed.

  • As far as I can tell, the only real reason that Theo didn't release this fix sooner, was so that he could ram his Privilege Separation feature in OpenSSH >= 3.3 down our throats. While I think this is a good feature in the long run, I seriously dislike running a program, especially one like ssh, that was released less than a week ago, on a production server. Especially when there are known bugs with it. I doubt all of these bugs have been fixed in OpenSSH 3.4.

I hope I haven't annoyed everyone too much with this little rant, but a someone who spent a considerable amount of time upgrading half a dozen machines in the past two days, only to find out that none of them were ever even vulnerable to this exploit, I'm really pissed off.

[Note: This was cross-posted to a couple of places, and I apologize if you see it more than once. I know it's a rant, but my main purpose for writing it was to distribute information on the OpenSSH vulnerability, and how to fix it, so that no one gets bit by the exploit. If anyone feels I shouldn't have posted it as I have, please let me know and I'll refrain from doing so next time.]

Current Mood: annoyed
In response to all this OpenSSH bullshit, someone pointed me in the direction of this nifty little item, which I think is spot on.

<< Previous Day 2002/06/26
Next Day >>
About LiveJournal.com