2023/05/07

2023-05-07 00:23:07 +0000tremon(~tremon@83.80.159.219) (Quit: getting boxed in)
2023-05-07 00:30:14 +0000 <geekosaur> albatross, why were you trying to restart it?
2023-05-07 00:30:44 +0000 <geekosaur> if you make chyanges to your config and you want them to take effect, you press (by default) mod-q.
2023-05-07 00:31:10 +0000 <albatross> I wasn't in X to do that
2023-05-07 00:31:33 +0000 <geekosaur> `xmonad --restart` is only half of that, and it restarts the existing configuration without rebuilding it. you need `xmonad --recompile` to do that part
2023-05-07 00:32:07 +0000 <albatross> neither command worked, gave an error message like "user error (openDisplay)"
2023-05-07 00:32:18 +0000 <geekosaur> also `xmonad --recompile` and `xmonad --restart` need to be run within X because thjey send X messages
2023-05-07 00:32:40 +0000 <albatross> X was still running, I just wasn't in X
2023-05-07 00:32:41 +0000 <geekosaur> well, recompile should work but restart won't be able to connect to the X server
2023-05-07 00:33:01 +0000 <albatross> like I could use vtty
2023-05-07 00:33:07 +0000 <geekosaur> but because you weren't in X, restart couldn't connect to it
2023-05-07 00:35:17 +0000 <albatross> surely those commands have no one to distinguish being run from a vtty or an xterminal? so long as there is an x server running they would work, I would think
2023-05-07 00:35:29 +0000 <geekosaur> and even if it somehow managed to authorize with the X server from outside, it still wouldn't have done anything noticeable unless you had changed your config and rebuilt it with `xmonad --recompile`
2023-05-07 00:36:40 +0000 <geekosaur> X used to work that way. it meant anyone who could get into your syste,m from a network connection could do things like sniff passwords. X is insecure enough as it is
2023-05-07 00:36:42 +0000 <albatross> or does xterm set up some env variables with information about the x server that is missing from a virtual console
2023-05-07 00:37:22 +0000 <albatross> hmmm so is there some way for me to cleanly restart xmonad from command line then?
2023-05-07 00:37:33 +0000 <albatross> if I'm stuck in a virtual console
2023-05-07 00:38:25 +0000 <albatross> or somehow get back to X. It is academic at this point anyhow
2023-05-07 00:39:27 +0000 <geekosaur> you need to find out where the Xauth tickets are stored and point to them with the XAUTHORITY environment variable. sometimes it's stored in ~/.Xauthority and things will work fairly easily, but sometimes they're hidden away by the display manager
2023-05-07 00:40:12 +0000 <albatross> I see. That doesn't sound any more secure haha. Good to know for next time I guess...
2023-05-07 00:40:55 +0000 <geekosaur> the default isn't, but display managers as I said can hide them away better
2023-05-07 00:41:11 +0000 <geekosaur> I'm not sure why more of them don't
2023-05-07 00:41:52 +0000 <geekosaur> it was a much simpler world in 1986 when this stuff was designed
2023-05-07 00:42:16 +0000 <albatross> I feel like if someone other than me can log in to my system I have bigger issues, really.
2023-05-07 00:42:56 +0000 <geekosaur> you mostly do, yes. but this doesn't require full log in to exploit, sadly
2023-05-07 00:43:55 +0000 <albatross> ok well I won't pretend to understand the majesties of X internals haha
2023-05-07 00:44:41 +0000 <immibis> albatross: is the $DISPLAY environment variable set?
2023-05-07 00:44:53 +0000 <immibis> on most/all distributions, just set: export DISPLAY=:0
2023-05-07 00:45:05 +0000 <immibis> and then your X-related commands know which X server to connect to
2023-05-07 00:45:16 +0000 <albatross> I can't go back in time to check but I'll keep that in mind for future
2023-05-07 00:45:23 +0000 <immibis> that's for your typical case. on weird or multi-user systems it might not be :0
2023-05-07 00:45:54 +0000 <immibis> xauth is usually stored in a place that's accessible to any process in your user account, so it's not an issue, but there is also a way to transfer it to other user accounts if you need that
2023-05-07 00:46:16 +0000 <immibis> but DISPLAY is (more-or-less) specific to the terminal
2023-05-07 00:59:40 +0000 <geekosaur> it does go a little beyond that; AIUI Fedora uses cgroups to limit access to the session
2023-05-07 01:00:06 +0000 <geekosaur> (Debian/Ubuntu/Mint use an older version of cgroups and systemd isn't configured to make use of it anyway)
2023-05-07 01:00:41 +0000 <geekosaur> liskin knows more about this, I believe he's got his system set up to use systemd for session control
2023-05-07 02:24:08 +0000td_(~td@i5387090E.versanet.de) (Ping timeout: 240 seconds)
2023-05-07 02:26:07 +0000td_(~td@i53870927.versanet.de)
2023-05-07 03:17:34 +0000rekahsoft(~rekahsoft@bras-base-orllon1122w-grc-04-174-88-193-177.dsl.bell.ca)
2023-05-07 03:54:21 +0000rekahsoft(~rekahsoft@bras-base-orllon1122w-grc-04-174-88-193-177.dsl.bell.ca) (Ping timeout: 256 seconds)
2023-05-07 05:25:08 +0000werneta(~werneta@70-142-214-115.lightspeed.irvnca.sbcglobal.net) (Ping timeout: 240 seconds)
2023-05-07 05:25:23 +0000werneta(~werneta@70-142-214-115.lightspeed.irvnca.sbcglobal.net)
2023-05-07 06:19:25 +0000werneta(~werneta@70-142-214-115.lightspeed.irvnca.sbcglobal.net) (Ping timeout: 240 seconds)
2023-05-07 06:21:31 +0000werneta(~werneta@70-142-214-115.lightspeed.irvnca.sbcglobal.net)
2023-05-07 06:35:54 +0000thyriaen(~thyriaen@91.197.68.193)
2023-05-07 07:19:29 +0000thyriaen(~thyriaen@91.197.68.193) (Ping timeout: 256 seconds)
2023-05-07 07:34:21 +0000chomwitt(~chomwitt@2a02:587:7a1f:b500:1ac0:4dff:fedb:a3f1)
2023-05-07 08:04:18 +0000th3m45t3rm1nd(~th3m45t3r@2401:4900:4048:9364:ac35:cb57:fe94:51d0)
2023-05-07 08:18:28 +0000thyriaen(~thyriaen@91.197.68.193)
2023-05-07 08:25:42 +0000thunderrd(~thunderrd@183.182.115.197) (Remote host closed the connection)
2023-05-07 09:00:11 +0000liskin[m](~liskinmat@2001:470:69fc:105::768) (Quit: You have been kicked for being idle)
2023-05-07 09:00:11 +0000unclechu(~unclechu@2001:470:69fc:105::354) (Quit: You have been kicked for being idle)
2023-05-07 09:29:57 +0000th3m45t3rm1nd(~th3m45t3r@2401:4900:4048:9364:ac35:cb57:fe94:51d0) (Quit: Client closed)
2023-05-07 11:01:31 +0000 <liskin> Debian definitely uses cgroupsv2 these days
2023-05-07 11:01:39 +0000 <liskin> And so does its systemd build
2023-05-07 11:01:43 +0000liskin[m](~liskinmat@2001:470:69fc:105::768)
2023-05-07 11:01:57 +0000unclechu(~unclechu@2001:470:69fc:105::354)
2023-05-07 11:37:52 +0000th3m45t3rm1nd(~th3m45t3r@2401:4900:4048:9364:ac35:cb57:fe94:51d0)
2023-05-07 12:25:07 +0000th3m45t3rm1nd(~th3m45t3r@2401:4900:4048:9364:ac35:cb57:fe94:51d0) (Quit: Client closed)
2023-05-07 12:51:59 +0000chomwitt(~chomwitt@2a02:587:7a1f:b500:1ac0:4dff:fedb:a3f1) (Remote host closed the connection)
2023-05-07 14:54:56 +0000tremon(~tremon@83.80.159.219)
2023-05-07 16:00:07 +0000liskin[m](~liskinmat@2001:470:69fc:105::768) (Quit: You have been kicked for being idle)
2023-05-07 16:00:07 +0000unclechu(~unclechu@2001:470:69fc:105::354) (Quit: You have been kicked for being idle)
2023-05-07 17:00:36 +0000mc47(~mc47@xmonad/TheMC47)
2023-05-07 17:10:23 +0000werneta_(~werneta@70-142-214-115.lightspeed.irvnca.sbcglobal.net)
2023-05-07 17:14:56 +0000tremon(~tremon@83.80.159.219) (*.net *.split)
2023-05-07 17:14:56 +0000werneta(~werneta@70-142-214-115.lightspeed.irvnca.sbcglobal.net) (*.net *.split)
2023-05-07 17:23:30 +0000tremon(~tremon@83.80.159.219)
2023-05-07 18:19:00 +0000Maeda(~Maeda@91-161-10-149.subs.proxad.net)
2023-05-07 18:39:11 +0000Natch(~natch@c-9e07225c.038-60-73746f7.bbcust.telenor.se) (Read error: Connection reset by peer)
2023-05-07 18:43:08 +0000Natch(~natch@c-9e07225c.038-60-73746f7.bbcust.telenor.se)
2023-05-07 20:14:38 +0000thyriaen(~thyriaen@91.197.68.193) (Quit: Leaving)
2023-05-07 21:39:13 +0000mc47(~mc47@xmonad/TheMC47) (Remote host closed the connection)
2023-05-07 23:32:25 +0000tremon(~tremon@83.80.159.219) (Quit: getting boxed in)