Improve login security with challenge-response authentication

Introduction

Today, Fedora offers multiple ways to improve the secure authentication of our user accounts. Of course it has the familiar user name and password to login. It also offers additional authentication options such as biometric, fingerprint, smart card, one-time password, and even challenge-response authentication.

Each authentication method has clear pros and cons. That, in itself, could be a topic for a rather lengthy article. Fedora Magazine has covered a few of these options previously:

One of the most secure methods in modern Fedora releases is offline hardware challenge-response. It’s also one of the easiest to deploy. Here’s how.

Challenge-response authentication

Technically, when you provide a password, you’re responding to a user name challenge. The offline challenge response covered here requires your user name first. Next, Fedora challenges you to provide an encrypted physical hardware token. The token responds to the challenge with another encrypted key it stores via the Pluggable Authentication Modules (PAM) framework. Finally, Fedora prompts you for the password. This prevents someone from just using a found hardware token, or just using a user name and password without the correct encrypted key.

This means that in addition to your user name and password, you must have previously registered one or more encrypted hardware tokens with the OS. And you have to provide that physical hardware token to be able to authenticate with your user name.

Some challenge-response methods, like one time passwords (OTP), take an encrypted code key on the hardware token, and pass that key across the network to a remote authentication server. The server then tells Fedora’s PAM framework if it’s is a valid token for that user name. This is great if the authentication server(s) are on the local network. The downside is if the network connection is down or you’re working remote without a network connection, you can’t use this remote authentication method. You could be locked out of the system until you can connect through the network to the server.

Sometimes a workplace requires use of Yubikey One Time Passwords (OTP) configuration. However, on home or personal systems you may prefer a local challenge-response configuration. Everything is local, and the method requires no remote network calls. The following process works on Fedora 27, 28, and 29.

Preparation

Hardware token keys

First you need a secure hardware token key. Specifically, this process requires a Yubikey 4, Yubikey NEO, or a recently released Yubikey 5 series device which also supports FIDO2. You should purchase two of them to provide a backup in case one becomes lost or damaged. You can use these keys on numerous workstations. The simpler FIDO or FIDO U2F only versions don’t work for this process, but are great for online services that use FIDO.

Backup, backup, and backup

Next, make a backup of all your important data. You may want to test the configuration in a Fedora 27/28/29 cloned VM to make sure you understand the process before setting up your personal workstation.

Updating and installing

Now make sure Fedora is up to date. Then install the required Fedora Yubikey packages via these dnf commands:

$ sudo dnf upgrade
$ sudo dnf install ykclient* ykpers* pam_yubico*
$ cd

If you’re in a VM environment, such as Virtual Box, make sure the Yubikey device is inserted in a USB port, and enable USB access to the Yubikey in the VM control.

Configuring Yubikey

Verify that your user account has access to the USB Yubikey:

$ ykinfo -v
version: 3.5.0

If the YubiKey is not detected, the following error message appears:

Yubikey core error: no yubikey present

Next, initialize each of your new Yubikeys with the following ykpersonalize command. This sets up the Yubikey configuration slot 2 with a Challenge Response using the HMAC-SHA1 algorithm, even with less than 64 characters. If you have already setup your Yubikeys for challenge-response, you don’t need to run ykpersonalize again.

ykpersonalize -2 -ochal-resp -ochal-hmac -ohmac-lt64 -oserial-api-visible

Some users leave the YubiKey in their workstation while using it, and even use challenge-response for virtual machines. However, for more security you may prefer to manually trigger the Yubikey to respond to challenge.

To add that manual challenge button trigger, add the -ochal-btn-trig flag. This flag causes the Yubikey to flash the yubikey LED on a request. It waits for you to press the button on the hardware key area within 15 seconds to produce the response key.

$ ykpersonalize -2 -ochal-resp -ochal-hmac -ohmac-lt64 -ochal-btn-trig -oserial-api-visible

Do this for each of your new hardware keys, only once per key. Once you have programmed your keys, store the Yubikey configuration to ~/.yubico with the following command:

$ ykpamcfg -2 -v
debug: util.c:222 (check_firmware_version): YubiKey Firmware version: 4.3.4

Sending 63 bytes HMAC challenge to slot 2
Sending 63 bytes HMAC challenge to slot 2
Stored initial challenge and expected response in ‘/home/chuckfinley/.yubico/challenge-9992567’.

If you are setting up multiple keys for backup purposes, configure all the keys the same, and store each key’s challenge-response using the ykpamcfg utility. If you run the command ykpersonalize on an existing registered key, you must store the configuration again.

Configuring /etc/pam.d/sudo

Now to verify this configuration worked, in the same terminal window you’ll setup sudo to require the use of the Yubikey challenge-response. Insert the following line into the /etc/pam.d/sudo file:

auth required pam_yubico.so mode=challenge-response

Insert the above auth line into the file above the auth include system-auth line. Then save the file and exit the editor. In a default Fedora 29 setup, /etc/pam.d/sudo should now look like this:

#%PAM-1.0
auth required pam_yubico.so mode=challenge-response
auth include system-auth
account include system-auth
password include system-auth
session optional pam_keyinit.so revoke
session required pam_limits.so
session include system-auth

Keep this original terminal window open, and test by opening another new terminal window. In the new terminal window type:

$ sudo echo testing

You should notice the LED blinking on the key. Tap the Yubikey button and you should see a prompt for your sudo password. After you enter your password, you should see “testing” echoed in the terminal screen.

Now test to ensure a correct failure. Start another terminal window and remove the Yubikey from the USB port. Verify that sudo no longer works without the Yubikey with this command:

$ sudo echo testing fail

You should immediately be prompted for the sudo password. Even if you enter the password, it should fail.

Configuring Gnome Desktop Manager

Once your testing is complete, now you can add challenge-response support for the graphical login. Re-insert your Yubikey into the USB port. Next you’ll add the following line to the /etc/pam.d/gdm-password file:

auth required pam_yubico.so mode=challenge-response

Open a terminal window, and issue the following command. You can use another editor if desired:

$ sudo vi /etc/pam.d/gdm-password

You should see the yubikey LED blinking. Press the yubikey button, then enter the password at the prompt.

Modify the /etc/pam.d/gdm-password file to add the new auth line above the existing line auth substack password-auth. The top of the file should now look like this:

auth [success=done ignore=ignore default=bad] pam_selinux_permit.so
auth required pam_yubico.so mode=challenge-response
auth substack password-auth
auth optional pam_gnome_keyring.so
auth include postlogin

account required pam_nologin.so

Save the changes and exit the editor. If you use vi, the key sequence is to hit the Esc key, then type wq! at the prompt to save and exit.

Conclusion

Now log out of GNOME. With the Yubikey inserted into the USB port, click on your user name in the graphical login. The Yubikey LED begins to flash. Touch the button, and you will be prompted for your password.

If you lose the Yubikey, you can still use the secondary backup Yubikey in addition to your set password. You can also add additional Yubikey configurations to your user account.

If someone gains access to your password, they still can’t login without your physical hardware Yubikey. Congratulations! You’ve now dramatically increased the security of your workstation login.

Source

OpenWrt based distro claimed to be first fully open source bitcoin mining software

Oct 26, 2018 — by Eric Brown

Braiins has released an open source, OpenWrt based ASIC bitcoin miner stack called Braiins OS, featuring AsicBoost to reduce power usage. It’s compatible with Antminer and Dragonmint mining rigs and works with Braiins’ Slush Pool mining pool.

Braiins Systems launched the first bitcoin mining pool with its eight year old Slush Pool (formerly Bitcoin.cz Mining), and has now released an alpha version of a new Linux distribution designed for ASIC mining. Based on OpenWrt, Braiins OS is billed as being the “first fully open-source, Linux-based system for cryptocurrency embedded devices.”

Braiins OS is optimized to work with Slush Pool, but you can use it with other mining pools as well. Images are available for Bitmain’s Xilinx Zynq-7000-based Antminer S9 and Halong Mining’s currently out of stock, Xilinx based DragonMint T1 mining rigs. According to the Bitcoin Magazine story that alerted us to Braiins OS, the company plans to slowly expand to other hardware, such as Pangolin Miner’s Whatsminer M10. The website also notes plans to support “images built for SBCs including Bitcoin & Lightning software.”

Antminer S9 (left) and DragonMint T1
(click images to enlarge)

 

Like other bitcoin mining packages, Braiins OS is designed to monitor hardware and its working conditions, as well as handle errors and report on performance. The firmware includes hacking tools to enable customized images. The OPKG packaged software offers “seamless firmware updates,” says Braiins. All factory transitional images are signed with GPG and uploaded to a set of GPG servers for verification.

Braiins OS can make use of bitcoin ASIC mining chips with AsicBoost technology, which is claimed to reduce power consumption by up to 20 percent. For the industry leading Antminer S9, Braiins taps Bitmain’s own algorithm, but the company intends to “switch to our custom open-source bitstream as soon as possible.”

Braiins OS screen
(click image to enlarge)

 

In the Bitcoin Magazine story, Braiins CEO Jan Čapek says that while Bitmain’s own Linux-compatible software for its Antminer systems is claimed to be open source, many features are covertly closed off. This makes it impossible to provide a proper software image to record the state of the mining system at a given time. Čapek also notes that the Bitmain software lacks open source FPGA code for the dual Cortex-A9 enabled Xilinx Zynq SoC, and other components are missing.

“The problem is that most of the people out there are not able to build a complete S9 image as it is not quite obvious that all the components are provided by Bitmain,” Čapek was quoted as saying. “To build a complete system you need the first stage bootloader (sometimes called SPL), u-boot, Linux kernel, Linux system (buildroot/openwrt?), FPGA bitstream (+ sources) and cgminer sources. So, there is quite more things that are to be reviewed that are still closed source.”

Bitmain also offers a backdoor called Antbleed designed to police stolen or hijacked hardware. It was the revelation of the existence of Antbleed that led Čapek to build the backdoor-free Braiins OS.

Further information

An alpha version of Braiins OS is available now. More information may be found on the Braiins OS website.

Source

How to Accept Bitcoin Payments with WordPress – ThisHosting.Rocks

Have you ever found it difficult to accept payments while using WordPress? As in, something somehow always goes wrong and then you have to take the longer route to accept payments.

But, what if I told you that there was a way for you to get rid of this problem? How would you feel?

Want to know a secret? You can accept payment on your own WordPress website.

Shocked? And want to know how to do this for your own website?

All you’ve got to do is read on and find out.

But, we need to some basics.

What is Bitcoin?

Be honest, you already know what I’m going to tell you. But, there’s no harm in knowing the basics, right?

For starters, Bitcoin is a cryptocurrency. This cryptocurrency was introduced to the world in 2009.

Furthermore, Bitcoin is a decentralized digital currency that does not need the assistance of any banks or middlemen.

It can be transferred directly from peer-to-peer.

Bitcoins are logged in the form of blockchains which are nothing but online ledgers.

Now, let’s see how you can accept Bitcoin payments with WordPress.

How do you accept Bitcoin payments on WordPress

This is one of the best ways to accept payments. That’s because you can send or receive payments from almost anyone from across the world. And you don’t have to worry about additional charges nor middlemen – like banks. It’s slowly evolving as a payment method.

To be able to accept Bitcoin payments on WordPress you’ll need to go by the following steps:

Create a bitcoin wallet.

First, you will have to choose which Bitcoin wallet you’ll use.

Before doing anything else, you will have to save it locally onto your computer/laptop.

Once you’ve set it up, you’ll have to disconnect your computer from the internet and do the rest of the work offline.

Now that you’re offline, open the saved file on your desktop and type in some random characters into the text box.

In the end, you will get one public and one private key.

These keys are essential for your transaction.

The public key – This key is the one that you can share with others to pay or receive payments.

The private key – This key is the one that is private and allows Bitcoin to be spent.

Finally, you’ve set up your Bitcoin wallet.

Let’s move on to the next step.

Sign up with a digital payment service

Fact: the digital payment service that is used commonly on WordPress is Coinbase.

But, you can use any of the other payment services that you’re comfortable with.

The payment service that you choose will let you accept Bitcoin or other altcoins.

These will then get directly added to your Bitcoin wallet.

How do you sign up on a payment service?

Let’s take Coinbase as an example.

Pretty simple really,

Step 1Go to your browser and go to the main page of Coinbase. Click on the sign-up button on the top-right corner.

Step 2Fill in the fields with accurate information. Make sure that you use the same name as the one mentioned on your Passport or any other ID. If you provide a fake name, the verification process may take longer.

Step 3Choose a password and make sure that you use – uppercase, lowercase, and at least one number.

Step 4Check the ‘I am not a robot’ box and the ‘Terms and Conditions’ box.

Step 5Press the create button.

Step 6You will get a confirmation email, on the account that you have given to the Coinbase account. Click on the link that has been provided in the email. This will activate your Coinbase account.

That is how you make an account on Coinbase.

The steps mentioned above are a basic blueprint of how each websites registration process is.

Install a WordPress plugin.

There are more WordPress plugins to choose from. Let’s continue using Coinbase as an example.

Step 1 Download the plugin as a zip file.

Step 2 Add the plugin to your WordPress blog.

Step 3 Upload the zip file.

Step 4 Click on install now and then activate the plugin.

Step 5 Go to WooCommerce, then settings, and then click on the checkout tab on top of the screen.

Step 6 Click on Coinbase.

Step 7 Enter your API credentials and then click on save changes.

This is how you can add Bitcoin payments to your WordPress.

Isn’t it simple?

Whoever thought that it would be so easy?

So, now you know how you can unlock those special hosting features and add Bitcoin to your WordPress.

This can help you accept payments, make payments and add some special features to your WordPress account.

You can even start a cryptocurrency website and sell crypto-related stuff with the help of these WordPress themes.

No one ever thought WordPress would be so cool and so much until Bitcoin finally came into our lives to introduce such amazing ways to deal with a transaction.

WordPress is a great platform to express yourself and get known as well. It provides its users with a wide range of opportunities and options to be themselves.

Plus, now that we have something as amazing as Bitcoin become a part, it enhances the qualities and applications.

Now that you’ve come to the end of the articles, you are bound to have some thought.

Source

Nordic Theme And Zafiro Icons Looks Amazing Together On Desktop – NoobsLab

If you are fond of dark theme whether it’s your personal liking or for comfort of your eyes, then you landed on the right page. Today, we introduce you to the very elegant theme called ”

Nordic

“. This Gtk theme is created using the awesome Nord color pallete which looks amazing on the desktop, it is released under GNU General Public License V3. Nordic also pack theme for Gnome Shell, and support almost every desktop environment such as Gnome, Cinnamon, Mate, Xfce, Mate, Budgie, Panteon, etc. If you are using distribution other than Ubuntu/Linux Mint then download the theme directly from its page and install it in this location “~/.themes” or “/usr/share/themes”. Since Nordic theme pack is in active development that means if you find any kind of bug or issue with it then report it to get fixed.

Zafiro

icon set is a perfect blend with Nordic theme for your desktop. Minimalist icons created with the flat-desing technique, utilizing washed out colors and always accompanied by white. The priority is simplicity. Both are designed by the same person and are fairly new in the eye-candy town and released under AGPLv3 license. We should always have a door opened for new stuff and should always give a try, who know new things could be our next favorite. The icons are compatible with most of the Linux desktop environments such as Gnome, Unity, Cinnamon, Mate, Lxde, Xfce and others. You will find many application icons in this pack, if you want to add new icons or want to report missing icons or bug then report it to creator and hopefully it will get fixed as soon as possible in the next update.

Available for Ubuntu 18.04 Bionic/18.10/and other Ubuntu based distributions
To install Nordic GTK theme in Ubuntu/Linux Mint open Terminal (Press Ctrl+Alt+T) and copy the following commands in the Terminal:
Available for Ubuntu 18.10 Cosmic/18.04 Bionic/16.04 Xenial/14.04 Trusty/Linux Mint 19/18/17/and other related Ubuntu derivatives
To install Zafiro icons in Ubuntu/Linux Mint open Terminal (Press Ctrl+Alt+T) and copy the following commands in the Terminal:

Don’t forget to give your feedback to creator, who put lots of his time in making this stuff for us for free!

Source

System76 Shares With Us More Details On Thelio Open Hardware, Pricing Starts At $1,100 USD

While System76 is officially announcing their Thelio systems next week on 1 November with plans to then begin shipping these “open hardware” systems in December, today the Linux-friendly PC vendor shared with us some more exclusive details on the forthcoming hardware being manufactured in Denver, Colorado. Here are those exciting details — much more than just some digital web saga.

 

 

First up they have provided us some pictures for Thelio Io and confirmation that it’s OSHWA certified open hardware (#US000145) and that their other open hardware components will be certified as well after the first. With this 4-port SATA backplane they are also using it as a chassis controller for managing thermal conditions with dynamic fan-speed adjustment. Previously they teased the FreeCAD diagram of this board.

 

 

New pictures being shared with Phoronix are of Thelio-Io-SAS, which is an unannounced board they have been working on. Thelio-Io-SAS supports four hot-swap SAS ports for 2.5-inch NVMe drives in their workstation performance desktop: Thelio Massive.

 

 

Besides System76 manufacturing these parts for use in their systems, they also mentioned they are working with a possible distributor for making pre-bundled parts SKUs available for anyone wishing to manufacturer their own boards.

 

 

System76 founder Carl Richell also mentioned to us that Thelio has been in development for almost three years.

 

One of the details they shared with us early shows their Apple-esque attention to detail. About the power button being promoted as a feature, “The power button LED, for instance, is programmed in the EC to display at 100% brightness when depressed, which visually confirms that the button has been activated. It’s set to 35% when on. It’s set to 2.35% when off so that it’s not too bright in a dark room but still easy to find. And it pulses between 2.35% and 25% while suspended.”

 

 

Another interesting level of detail is that there is built-in screw storage for being able to fill up every drive slot in the system — no more losing the screw bag! Thelio systems will also be pre-wired to fully leverage multiple graphics cards and other peripherals with the power cables being within easy reach while being nice and tidy.

 

One of the most surprising details was finally having some pricing information. These “high-end, high-performance systems” will start out at $1,100 USD. This is actually cheaper than I was anticipating with being manufactured in the USA using their new factory and investing so much into this open hardware effort… It will be very interesting to learn more next week at System76.com, Thanks to System76 for sharing these extra details with us ahead of the official launch on 1 November.

Source

PinePhone: Pine64 Is Making An Affordable Linux Smartphone Running KDE Plasma

Following the demise of Ubuntu Phone, Purism’s Librem 5 seems like the next big thing in the budding world of Linux smartphones. Purism has already partnered with big names like GNOME and KDE, and we can expect the device to start shipping in April 2019.

It seems like another hardware vendor is looking to develop its own Linux smartphone. As reported by It’s FOSS, Pine64 is working to create inexpensive Linux-based smartphones and tablets.

KDE Neon creator Jonathan Riddell revealed this at Open Source Summit, Europe Edition. Upon contacting Pine64 founder TL Lim, It’s FOSS found that the devices are called PinePhone and PineTab — so, no surprises there.

Starting November 1, Pine64 will start shipping the first PinePhone developer kits to the selected devs for free. The kit will include baseboard, SOPine module, 7″ Touch Screen Display, Camera, Wifi/BT, Playbox enclosure, Lithium-Ion battery case, and LTE cat 4 USB dongle.

As per the current schedule, Plasma Mobile-running PinePhone’s actual design won’t be finalized until 2019 Q2.

As Pine64 is known for its low-cost laptops, PinePhone won’t break your backbone when it comes to pricing. You can expect this open source Linux smartphone to cost $100+ for 2GB RAM and 16GB storage variant.

What are your views on this upcoming Linux smartphone? Share your thoughts on PinePhone in the comments section and keep reading Fossbytes.

Also Read: Linus Torvalds Discusses His Return To Linux Development

Source

Lightweight Linux Distribution Bodhi Linux 5.0 Released

Last updated August 22, 2018 By Ankush Das

It has been a few years of good progress for Bodhi Linux. It is always interesting to see what a lightweight Linux distribution has to offer.

Bodhi Linux 5.0 Desktop Screenshot

In case you didn’t know about Bodhi Linux – it is an impressive Linux distribution on top of Ubuntu with minimal but essential features. It utilizes an unusual but interesting desktop – Moksha desktop – which is based on the Enlightenment desktop.

Now, they have come up with the next major release – Bodhi Linux 5.0.0 – with the latest Ubuntu core (18.04). In addition to the updated core, it also includes some visual overhaul giving it a modern look.

The devs have also mentioned in their latest blog update that even though it is a major release – not much as changed, except an up-to-date Ubuntu core with a better/modern look.

In their official blog, they have also informed about the upgrade process – for someone who might be already running a pre-release of Bodhi 5.0.0 or the previous version of it.

Here’s what they explained:

If you installed a pre-release of Bodhi 5.0.0 you will simply need to run your system updates to grab all the latest goodies that are in these ISO images. Keep in mind that system updates will not adjust the look of your desktop automatically though because this would require messing with custom configurations you might otherwise have already.

If you have a previous Bodhi release installed you will need to do a clean install to upgrade to Bodhi 5.0.0. We do not support in place upgrades between major Bodhi releases. Keep in mind that Bodhi 4.5.0 will have support until Ubuntu 16.04 runs out in April 2021 though, so there is no hurry to upgrade if you are happy with your existing system.

In other words, you cannot upgrade from an existing Bodhi Linux install to the new Bodhi Linux 5.0 release. So, if you want to download the latest ISO or check out the system requirements to try it out, you should head to the official download page of Bodhi Linux.

Bodhi Linux is perhaps not as popular as Ubuntu or Linux Mint but it’s a good little distribution for slightly older machines.

Have you ever used Bodhi Linux? How’s your experience with it? Would you recommend it to others?

About Ankush Das

A passionate technophile who also happens to be a Computer Science graduate. He has had bylines at a variety of publications that include Ubergizmo & Tech Cocktail. You will usually see cats dancing to the beautiful tunes sung by him.

Source

The OpenStack Summit in Berlin: A Touch of Nostalgia and a Great Deal of Pride

Share with friends and colleagues on social media

The next OpenStack Summit will be hosted in Berlin from November 13-15. With the event now only a few weeks away, I’m sure I’m not the only one thinking back over the history of OpenStack with a touch of nostalgia and a great deal of pride.

I’m reminded of the old proverb “mighty oaks from little acorns grow”.

That’s certainly true when it comes to OpenStack. What started way back in 2010 as a joint project between Rackspace and NASA has grown into a truly global community. It now boasts over 94,000 members from 676 supporting companies spread across 186 countries. It continues to be one of the fastest growing open source projects, largely because of its ability to adapt and remain at the forefront of all the relevant technology trends.

Given that so much has changed over the past 8 years, this is truly inspirational. OpenStack now goes way beyond its initial remit of simply delivering IaaS services for private and public clouds. It now embraces DevOps, CI/CD, IoT, Edge computing, HPC, Telecoms, NFV and many other use cases, technologies and initiatives.

From a personal perspective, I first heard about OpenStack when I worked at IBM. There were discussions about which open source cloud project the company was going to support. Once it was decided OpenStack was the way to go, the IBM Power Systems team that I was part of began working on and delivered a solution based on OpenStack – IBM PowerVC. It was a great introduction to OpenStack and that experience guided me to my next job at Rackspace, where I worked on their private cloud solution powered by OpenStack. This was at a time when organizations were starting to realize the genuine benefits it could deliver and it was also my first chance to attend an OpenStack Summit (Atlanta 2014). The excitement and open collaboration of the community was infectious.

These days, I lead the product, technical and solution marketing team at SUSE, which just so happens to have an OpenStack powered solution. SUSE is a founding member of the OpenStack Foundation and was the first to launch a commercially supported enterprise-grade OpenStack distribution back in 2012. Since then, SUSE OpenStack Cloud has become the ideal OpenStack platform for hosting bare metal, virtualized and containerized workloads, with all the agility and scalability needed to support business innovation.

In fact, the beta program for SUSE OpenStack Cloud 9 has just been announced. If you want to try out the latest version of the OpenStack platform of choice for enterprise business, you won’t be disappointed. Here’s the link for more information.

At the Berlin Summit, we’ll have live SUSE OpenStack Cloud demos running at our booth, great folks to talk with you about how we can help address your challenges and of course we’ll have some great give-aways. We’ll also be showcasing SUSE CaaS Platform on OpenStack to highlight the benefits of deploying and integrating Kubernetes, as well as SUSE Enterprise Storage to show how Ceph can play a key role in your cloud environment.

We’re also delivering a host of sessions with topics ranging from OpenStack training; monitoring and troubleshooting; security principles; Kubernetes integration; container performance and security; and OpenStack project updates.

 

Share with friends and colleagues on social media

Source

A Painting Created by Open-Source AI Sells for $432K, SELKS5 Beta Released, Mirantis Launches the Mirantis Cloud Platform Edge, the MixedEmotions Open-Source Toolkit Announced and Red Hat Improving the GFS2 Filesystem

News briefs for October 26, 2018.

A painting created by an open-source neural network sold this week for $432K at a London auction house. Obvious is the group behind the
work that “used 19-year-old Robbie Barrat’s GAN package, available here on
Github, and sourced paintings from Wiki Commons” to create the painting. See the post on TNW for details on the “first portrait ever sold at auction that was made with the assistance of an AI“.

The SELKS5 beta, the live and installable network security management ISO based
on Debian, was released today. New features include the latest Suricata
intrusion-detection engine, major upgrade from Elasticsearch/Kibana/Logstash
(ELK) 5.x to the ELK 6 stack, Scirius 3.0 and more. See the release
announcement
for download links, setup instructions and a visual tour.

Mirantis recently announced its new Mirantis Cloud Platform Edge (MCP Edge), a “Kubernetes-based effort to enable containers and virtual machines to run at the edge of the network”, eWeek reports. MCP Edge does not run OpenStack; it’s Kubernetes plus
Virtlet. eWeek quotes Mirantis co-founder Boris Renski, “You can still run VMs [virtual machines] using
Virtlet, with direct access to hardware acceleration like SRI-OV [Single-Root
Input/Output Virtualization], but Kubernetes is the only resource scheduler.”

A team of European researchers has created MixedEmotions, an open-source toolkit
that can automatically assess emotions in text, audio and video. According to PhysOrg, “There
is a growing demand for automatic analysis of emotions in different fields. The
possible applications are wide, including call centers, smart environments,
brand reputation analysis and assistive technology.”
Read more here
about emotion detection and the complexities involved in adapting these tools
to other languages.

Red Hat developers are improving the GFS2 filesystem. According
to Phoronix
, “recent developments around the GFS2 shared-disk file-system
include performance optimizations around iomap writes, new resource group
header fields, expanded journal log header information, and other low-level
improvements.” Future plans include “a faster fsck for GFS2 that uses
AIO and larger reads, process-shared resource group locking, trusted xattrs,
and deprecating the “meta” GFS2 file-system fork”.

Source

WP2Social Auto Publish Powered By : XYZScripts.com