FOSSCON 2016 –Event Recap

FOSSCON 2016: Free & Open Source Software CONference was hosted at the International house of Philadelphia on Aug 20th 2016, and showcased nearly  20 vendors and nearly as many talks (plus ‘lightning talks’) and a Key Signing party.

This year saw nearly 600 folks attend during the 9 hour conference,  and had several interesting talks including:

  • A Tour of OpenStack Deployment Scenarios
  • Secrets of the Dead: What Modern Programmers can Learn form COBOL
    • This one was rather thought provoking and mostly went into the modern disease of  fast to market, and screw fuzzing (the manual, qa style testing and debugging)
  • WeeChat, Always on all the things
    • Despite the botched demo (blame a lack of  demo god sacrifice, lol) this talk was Very informative regarding what is possible with this popular Bouncer for IRC and XMPP (jabber, whatsapp,etc)
  • Using FreeBSD, Jails,Poudriere, and ZFS for fun and profit
    • This was much like the COBOL talk very secure the things centric and very informative.

Back at the Fedora booth,  I had a steady flow of interested folks before and after the installfest, which also was the co-location of a impromptu key signing party where at least 3  folks were walked thru a Fedora 24 install (one on a now dual booted Mac Book Pro –without bootcamp) and much teaching on best practices  for installs, Out of Band (OOB) vetting / validation of keys was taught to new comers.

We distrubuted around 40 DVDs to booth visitors most of whom were already Linux users and about half of those Fedora 23 /24 users.  Several visitors this year were repeat visitors from last year’s conferencem, where most folks had never seen much less handled / played with the XO which has become a stable attention getter for the booth.

Also, several ‘test drives’ were had on the Event Thinkpad T510 with F24 updated Multi-boot (Not generally published with the usual Updated ISOs — http://tinyurl.com/live-respins2 , however available on request.)

For more info on planned events to meet with the Ambassadors team, stay up to date with where we will be at:

https://fedoraproject.org/wiki/Events#North_America_.28NA.29

NGA Hackathon series: AngelHacks w/ Blue Compass to host two Hackathons in Sept & Nov

NGA Hackathon / Demothons in Sept & Nov 2016

This back to school season, look at these two prize money / possible job placement Hackathons/Demothons.

The NGA ( National Geo-Spatial Intelligence Agency  — https://nga.gov ) is looking for new fresh ideas for big data analysis and dataset collection and has opened the Disparate Data Challenge.  This Hackathon & Demothon is a 2 stage engagement with stage 1 open to US citizens and stage 2 only open to stage 1 winners. Stage 1 submissions due by Sept 19, 2016.

Also part of NGA’s Hackathon series and backed by the AngelHack as well as Blue Compass LLC, is  ExpeditionHacks, hosted at Hunter College, NYC On  Nov 12-13,2016. This Event is more of the traditional 24 hr hackathon. Where teams of UP TO 5 can show their merit on a Geo-spatial conservation and efficiency hack session.  Show you can provide a sustainability, or ‘come-up’ solutions for indigenous communities.

 

 

 

F24-20160823 Updated Lives Available (Last of the 4.6.x Kernel updates)

Today we have the newest installment of the  F24 Updated Lives, carrying on average 690 Mb of updates over the Gold Images from two months ago.

These updates carry the 4.6.7-300 Kernel and all updates from 20160815 up to 0800 20160823.

As will be the new standard there is CHECKSUM512-20160823 & HASHSUM512-20160823, which includes the raw CHECKSUMS & HASHSUMS , aka checksums of the ISOs and the torrent hashes (fully searchable type).

F24 Updated Lives

NO Source Torrent is made, if you have a need for one contact me either via email or in a comment here. The contents of both files are embedded below. Notably absent fora second update is the SOAS spin which again failed to build.  There have been a few tracker issues with this series, if you experience any please contact myself or Southern_Gentlemn|kk4ewt in the #fedora  channel on Freenode or via email — linuxmodder(@)fedoraproject(dot)org or jbwillia(@)fedoraproject(dot)org.  We have also asked last series for testing of the KDE-JAM spin that was in last series, if you’d be interested in testing this spin for stability and usability again please contact one of us vai means mentioned above.

 user@localhost $ cat CHECKSUM512-20160823

eaa2d96de1da8615a6c34b8e98ec50c8384aaa7fe2df6ab40d41f4524cea9981ff9c50a7055a6fbdacf6589d37d5ee48fe1eb07049bcbf096f8649e5edb5f85b F24-x86_64-CINN-20160823.iso


34cffbe15c58823b390baf2d7f889080cd3f9d3643da1b017337192c792c1666e165dc49de5f3efa5c9c510f185cdc48f14245caef3310b61e1acb96b49150ba F24-x86_64-KDE-20160823.iso

0df2de6d6f743869ce9352e8d4983d28574e331a9cbf0bd2fa58d4bde9b9d67332b766696769fbf6a747e988dc5c508c979c9882b8ef7f3f393e3d0fb550f33a F24-x86_64-LXDE-20160823.iso

710d68037978c4db4acdf164aa13ba0a483782212b98b81a7e138718d452ccb609cd95e66f9e0b1cfb1cd4696b37f0b5849e2a7d26a1bae69bf1f0e84b33d8c7 F24-x86_64-MATE-20160823.iso

3d532525cfbe1b93c64bcddd84cab2ea364b3fee76e8d7d7c8efa441c7e27fd2b8209f7b4b6d5ff6b56bdeebc1b24e805e01fc18883a7fcb84e3719642ce2821 F24-x86_64-WORK-20160823.iso

bb71a74c42f73f89c98daa53c0707494da07beb82b101eec4635cd9385cec2029a7eed23690e9b1d2a35d28c8b08a234ff2ca590d5fd8c44a59570a4891d9b97 F24-x86_64-XFCE-20160823.iso

user@localhost$ cat HASHSUM512-20160823:

 

7b18a13a4f088b7a2e5a97d63879c8db9a1d3d9f F24-x86_64-CINN-20160823.iso


0a4ba0362b59746d860fceba690c145df88ed4ce F24-x86_64-KDE-20160823.iso

31ab072a41551a876ea200503c897ddd4dbbe9d5 F24-x86_64-LXDE-20160823.iso

76c63de699188cc4331fdaf7d26e4e132b578bc1 F24-x86_64-MATE-20160823.iso

20f3d161d99209725420a0e958b709f8da647deb F24-x86_64-WORK-20160823.iso

ce07d9593525f957f607cd07a5a2a2b44492f8f3 F24-x86_64-XFCE-20160823.iso

LastPass 0Day — Why Using cleartext tokens in the URL is bad practice.

Source: lastpass password manager tell all

This is yet another reason why sanitizing OpenAuth or  other token urls to the minimal allowed to resolve (the hostname) is good practice.

So exactly what is the issue at hand?

Well LastPass as with most password managers that in some way connect to a sync or cloud mechanism,  uses a  cookie of sorts on all sites you setup with autofill ( no typing needed,  great defense against keyloggers),  however the issue is that the parser to determine if such a site is accessed / logged in leaves cleartext tokens in the url and takes a malformed url as username:password @ foo.tld i.e. johndoe/mypassword@facebook.com which allows an attacker on a machine that is logged in (without 2fa –more on this later) to spill the beans about all passwords in 2 ways.

Method 1:  log in or access a machine that is logged in and not locked out (Lock screens are useful folks) to access without any further password/credential prompts the password store and click ‘show password’ and then jig is up.  As alluded to earlier if 2fa (two factor auth) is enabled this is thwarted as it requires that secondary challenge for anything account or password store related.

Method 2: Typing in the username (in plaintext in password store) and the target site and the password becomes visible in plaintext in the url.

The really scary part is that now 2  security researchers have exposed these attacks and its still unpatched.

Original article courtesy of https://www.thehackernews.com

First round of Fedora 24 Updated Lives now available. (torrents expected later this week)

As noted by my colleague on his blog   the first round of  F24  Updated Lives are now available and carry the date 20160720, Also as mentioned last week on his blog F23 Respins are not  going to be actively made, however we and the rest of the volunteer team will field off-off requests as time and resources permit.  We are considering a new/second tracker for the Updated Spins but as of  today there are only  .ISO files available at https://alt.fedoraproject.org/pub/alt/live-respins [shortlink] F24 Live-Respins .  The F24 respins carry the 4.6.4-200 Kernel and roughly ~500M of updates since the Gold ISOs were released just 5 weeks ago.  (some ISOs have more updates, some less)

CHECKSUM512-20160720 is hosted on above link as well as on my  usual people space fedorapeople hosting

HASHSUM512-20160720 is also hosted on my  fedorapeople space tracker should be back up and running within the week.

Updates & Notables:

4.6.4-200 Kernel

 

Linux Mint: Hacked 2.0 (Official Unofficial Notice) UPDATED: 2016-07-18

UPDATE: 20160718T12Z

Torrent server has been reset and  a  ‘private dht seed’ made greatly increasing the security of the seed pool and  denying most WAREZ trackers from leeching or  connecting back.

paste.linuxmint.com also seems to be fully back up and functioning fully / correctly (irc logs in #linux-dev this morning show both were reset and restarted)

GPG keys are again retrievable normally  and the proper commands for retrieving them and checking the sha256sum files updated to reflect proper / best practice methods.

Changes to overall mentality are still likely needed but a start in the proper direction seems to finally have been made.  Updates to follow as they present themselves.

It is with deep despair that today I have to write that at least portions of the Linux Mint Infrastructure seem to have  come under a coordinated attack and that the Development Team has to date NOT responded to subtle non standard channel requests for info on this.

Late last night, US East Coast time, it became apparent to several of the users presently in #linuxmint-help on the Linux Mint IRC Network housed over at  ircs://irc.spotchat.org  that links returning from  https://paste.linuxmint.com were acting ‘funny’ or  not even loading, later it became that the main page irregardless of the /view/foo   was no longer loading without the aid of a VPN with an Endpoint  from within the EU / Asian Geographic area of the globe.

Some snippets of these that became alarming follow:

/usr/local/bin/pastebin   is supposed to be  .noarch aka does not care if the system is 32 or 64 bit  as it runs same regardless and only needs added / used once in the build process, however if you run a ls -la OR sha256sum operation on the file you will see one of 3 outcomes

 ls -la /usr/local/bin/pastebin     No such file or directory

 

sha256sum /usr/local/bin/pastebin

5e11507cacfa516b3c2e0610cf3d437b07aeaddb388bcf92a89f19b1bca54d55

 

sha256sum /usr/local/bin/pastebin

74901a0a6884104ccaa6fba5858622bcd7603bf3b666ae5db2fddd9a38b2ca16 /usr/local/bin/pastebin (valid hash)

 

Furthermore: The troubled https://linuxmint.com/verify.php fails to indicate how to download the sha256sum.txt and sha256sum.txt.gpg files are they need a non standard way  i.e. wget or cURL.

Complicating things is the fact that since around 930-945 PM US EST last night (7-16-16) the following commands were failing:

gpg –list-keys –with-fingerprint

gpg –verify sha256sum.txt.gpg sha256sum.txt

gpg –recv-keys A25BAE09

gpg –recv-keys A25BAE09

In large part because Linux Mint comes WITHOUT a default –keyserver, which I can understand the desire to not force any one or series of keyservers on the user, but knowing this and that Clem the fearless leader only  directly pushes to keyserver.ubuntu.com  those above –recv-keys commands should include –keyserver keyserver.ubuntu.com .

But all that aside the keys are not even obtainable from:    keyserver.ubuntu.com, possibly in part to Ubuntu’s response to their own hack of their Forums: Ubuntu’s Forums Hacked, 2 Million usernames stolen .

Due to this:  last week I emailed Clem about ways to clean up the readability and even made the following gist paste available for use or  straight scraping.

Linux Mint 18 ISO GPG validation steps

This went on seemingly deaf ears after an apparent initial response of sure we can do that.

UPDATE:  AS OF:  17 Jul 2016 1845UTC   whois record for http://paste.linuxmint.com  indicates it is UP FOR SALE.  Discontinue use immediately.

AS OF 2000utc  17 Jul 2016 , 18 hours after community confirmation of compromise no word what so ever from the dev team.

Some other enlightening links for the scope of shit going down unanswered:

http://status.linuxmint.com

http://65.19.183.167/ameridea  look at Screenshots on that page

https://www.irccloud.com/pastebin/2Rfo6Oh9

https://www.irccloud.com/pastebin/7TG8pwGW (contains valid hash for the script that is /usr/local/bin/pastebin )

http://www.omgubuntu.co.uk/2016/07/ubuntu-forums-hacked-2-million-usernames-stolen  (mentioned above as well)

whois |  traceroute | mtr | dig      141.8.244.93 and compare to same for 208.92.233.240

https://gist.github.com/linux-modder/053f1da7bf247aa448a128ad7799557d  (decrypted copy of email originally sent to Clem  root@linuxmint.com at 1300UTC 3 Jul 2016.)

http://network-tools.com/default.asp?prog=dnsrec&host=paste.linuxmint.comand

 

And some IRC chat logs that are telling: Times unless stated otherwise in logs are  US EST (utc -4)

FROM ircs://irc.spotchat.org/#linuxmint-dev

[Sat, 16 July ://: 19:18:03] .:linuxmodder:. ANYONE from admin@ or root@ here? seems a major set of issues with paste.lm.c
[Sat, 16 July ://: 19:19:48] «— notis (notis@SpotChat-bdrdnk.dyn.forthnet.gr) has Quit (Quit: Leaving)
[Sat, 16 July ://: 19:29:39] .:r00t:. Said that in here ~6 hours ago **
[Sat, 16 July ://: 19:31:53] .:linuxmodder:. r00t, a paste sourced from -help is seemingly proxy aware and asking for openkeychain for some and for my setupvpn browser login creds SOMEONE from the infra side needs to do some serious checking
[Sat, 16 July ://: 19:33:44] .:r00t:. It seems normal to me now. But then, I don’t use a proxy
[Sat, 16 July ://: 19:34:34] .:linuxmodder:. what seems normal now?
[Sat, 16 July ://: 19:34:59] .:r00t:. I mean I click on a link and it shows the text
[Sat, 16 July ://: 19:35:06] .:r00t:. Normal
[Sat, 16 July ://: 19:35:29] .:r00t:. I talked about something being strange a few hours ago, and they must’ve fixed it
[Sat, 16 July ://: 19:36:14] .:linuxmodder:. nope does not look that way
[Sat, 16 July ://: 19:37:01] .:r00t:. I know what I’m seeing right in front of me. Maybe your proxy is doing something
[Sat, 16 July ://: 19:40:29] .:r00t:. Besides, only clem has access to the servers so nobody here can do anything about it (if it is actually messed up)
[Sat, 16 July ://: 19:41:37] .:linuxmodder:. r00t, that’s just it I’m not over proxy (besides tor on the nic)
[Sat, 16 July ://: 19:48:42] —» calexil_SteamBox (jd@SpotChat-e6ogl5.de.comcast.net) has Joined #linuxmint-dev
[Sat, 16 July ://: 19:52:29] —» LunarEclipse120 (LunarEclips@unaffiliated/lunareclipse120) has Joined #linuxmint-dev
[Sat, 16 July ://: 19:56:08] .:linuxmodder:. calexil, you have a way to wake / get hold of clem ?
[Sat, 16 July ://: 19:56:35] .:linuxmodder:. i know its like 2am there but think its warranted

** [Sat, 16 July ://: 13:55:44] .:r00t:. For some reason paste.linuxmint.com makes someone download the paste, and makes it a .bin extension


[Sat, 16 July ://: 21:27:12] .:linuxmodder:. calexil, ??

[Sat, 16 July ://: 21:28:21] —» Testing567 (Testing567@SpotChat-hegnee.dyn.optonline.net) has Joined #linuxmint-dev
[Sat, 16 July ://: 21:30:48] «— bario (bario@I.am.not.your.friend) has Quit (Quit: Leaving)
[Sat, 16 July ://: 21:30:55] <JosephM> linuxmodder: he can’t do anything. Clem will be here when he gets here
[Sat, 16 July ://: 21:31:02] »» maccarone is now known as bario
[Sat, 16 July ://: 21:31:28] .:linuxmodder:. RECHECK servers and gpg keys Something is —-seriously not right http://65.19.187.163/ameridea/ 2nd-4th screenshots


[Sat, 16 July ://: 23:56:27] .:linuxmodder:. when clem gets up Purge the servers

[Sat, 16 July ://: 23:56:44] .:linuxmodder:. routing from traceroute is using a known hacker spoof route


[Sun, 17 July ://: 03:42:16] .:linuxmodder:. your infra and keys are going to shit you gonna do anything yet?


[Sun, 17 July ://: 15:07:05] 19.:2823linuxmodder19:. someone needs to come out and explain the loss of paste..linuxmint.com and other oddities today



 

FROM ircs://irc.spotchat.org/#linuxmint-help (again all times shown or utc -4 unless specified)

[Sun, 17 July ://: 16:22:38] 19.:2823linuxmodder19:. mtn, so we are gonna forget or ignore that facts that BOTH paste.linuxmint.com and linuxmint.com BOTH show NX on a whois lookup?
[Sun, 17 July ://: 16:22:41] 31-31-19-19» 19juanjo (juanjo@SpotChat-nfu.6c1.71.90.IP19) has Joined #linuxmint-help
[Sun, 17 July ://: 16:22:48] 28.:1924mtn28:. hippo: what, you just want to start the update manager from the command line?
[Sun, 17 July ://: 16:22:49] 31-31-19-19» 19c (c@SpotChat-6f2ide.pa.comcast.net19) has Joined #linuxmint-help
[Sun, 17 July ://: 16:22:54] 26«26-31-31- 26juanjo (juanjo@SpotChat-nfu.6c1.71.90.IP26) has Quit (Quit: Leaving26)
[Sun, 17 July ://: 16:22:56] 26«26-31-31- 26c (c@SpotChat-6f2ide.pa.comcast.net26) has Quit (Connection closed26)
[Sun, 17 July ://: 16:22:59] 31-31-19-19» 19bona (bona@SpotChat-n7q6ik.p9ot.juqq.120b.2a02.IP19) has Joined #linuxmint-help
[Sun, 17 July ://: 16:23:07] 04<mtn04>04 linuxmodder: I have to say it does not matter to me


[Sun, 17 July ://: 15:48:32] 19.:2823linuxmodder19:. mtn, where the hell is clem with a response to last night and today’s oddities?/
[Sun, 17 July ://: 15:48:49] 19.:2823linuxmodder19:. or anyone form the dev team for that matter


[Sun, 17 July ://: 15:51:01] 04<mtn04>04 linuxmodder: which oddities?
[Sun, 17 July ://: 15:51:03] 31-31-19-19» 19shadowmaster (shadowmaste@SpotChat-074v1o.res.rr.com19) has Joined #linuxmint-help
[Sun, 17 July ://: 15:51:25] 31-31-19-19» 19Guest8229 (john@SpotChat-5iv951.east.verizon.net19) has Joined #linuxmint-help
[Sun, 17 July ://: 15:51:31] 19.:2823linuxmodder19:. mtn, in a few minutes you can read about them from my blog
[Sun, 17 July ://: 15:51:44] 26«26-31-31- 26SimonNL (Simon@i.am.the.true.idiot26) has Quit (Quit: Leaving (Close)__If I have said something clever. my apologies\o26)
[Sun, 17 July ://: 15:51:48] 31-31-19-19» 19oem (oem@SpotChat-rvs.utr.20.159.IP19) has Joined #linuxmint-help
[Sun, 17 July ://: 15:51:50] 31-31-19-19» 19notis (notis@SpotChat-r0bbk5.dyn.forthnet.gr19) has Joined #linuxmint-help
[Sun, 17 July ://: 15:52:33] 19.:2823linuxmodder19:. but some quick hits http://paste.linuxmint.com has been beeing blocked from all BUT eastern EU / Asian IPs (or vpns) and is now according to whois up for sale
[Sun, 17 July ://: 15:52:34] 31-31-19-19» 19mint (mint@SpotChat-mei.265.172.178.IP19) has Joined #linuxmint-help
[Sun, 17 July ://: 15:52:38] 26«26-31-31- 26mint (mint@SpotChat-mei.265.172.178.IP26) has Quit (Connection closed26)
[Sun, 17 July ://: 15:52:47] 19.:2823linuxmodder19:. it has been hanging and timing out for over 16 hours


[Sun, 17 July ://: 15:51:31] 19.:2823linuxmodder19:. mtn, in a few minutes you can read about them from my blog
[Sun, 17 July ://: 15:51:44] 26«26-31-31- 26SimonNL (Simon@i.am.the.true.idiot26) has Quit (Quit: Leaving (Close)__If I have said something clever. my apologies\o26)
[Sun, 17 July ://: 15:51:48] 31-31-19-19» 19oem (oem@SpotChat-rvs.utr.20.159.IP19) has Joined #linuxmint-help
[Sun, 17 July ://: 15:51:50] 31-31-19-19» 19notis (notis@SpotChat-r0bbk5.dyn.forthnet.gr19) has Joined #linuxmint-help
[Sun, 17 July ://: 15:52:33] 19.:2823linuxmodder19:. but some quick hits http://paste.linuxmint.com has been beeing blocked from all BUT eastern EU / Asian IPs (or vpns) and is now according to whois up for sale
[Sun, 17 July ://: 15:52:34] 31-31-19-19» 19mint (mint@SpotChat-mei.265.172.178.IP19) has Joined #linuxmint-help
[Sun, 17 July ://: 15:52:38] 26«26-31-31- 26mint (mint@SpotChat-mei.265.172.178.IP26) has Quit (Connection closed26)
[Sun, 17 July ://: 15:52:47] 19.:2823linuxmodder19:. it has been hanging and timing out for over 16 hours
[Sun, 17 July ://: 15:52:48] 26«26-31-31- 26oem (oem@SpotChat-rvs.utr.20.159.IP26) has Quit (Quit: Sto andando via26)
[Sun, 17 July ://: 15:52:49] 26«26-31-31- 26shadowmaster (shadowmaste@SpotChat-074v1o.res.rr.com26) has Quit (Quit: Leaving26)
[Sun, 17 July ://: 15:52:55] 31-31-19-19» 19zodian (zodian@SpotChat-pjirop.home.otenet.gr19) has Joined #linuxmint-help
[Sun, 17 July ://: 15:52:57] 31-31-19-19» 19neosunaru (neosunaru@SpotChat-operb0.u42h.g04k.c1a0.2a00.IP19) has Joined #linuxmint-help
[Sun, 17 July ://: 15:53:04] 26«26-31-31- 26neosunaru (neosunaru@SpotChat-operb0.u42h.g04k.c1a0.2a00.IP26) has Quit (Quit: Leaving26)
[Sun, 17 July ://: 15:53:06] 26«26-31-31- 26martin_ (martin@SpotChat-59s6tu.starnet.cz26) has Quit (Ping timeout: 121 seconds26)
[Sun, 17 July ://: 15:53:15] 31-31-19-19» 19zodian_ (zodian@SpotChat-pjirop.home.otenet.gr19) has Joined #linuxmint-help
[Sun, 17 July ://: 15:53:18] 19.:2823linuxmodder19:. gpg keys for BOTH 17.x and 18 have been unreliably recieveable for same period
[Sun, 17 July ://: 15:53:21] 19.:2823linuxmodder19:. and others
[Sun, 17 July ://: 15:53:26] 26«26-31-31- 26zodian_ (zodian@SpotChat-pjirop.home.otenet.gr26) has Quit (Quit: Leaving26)
[Sun, 17 July ://: 15:53:31] 31-31-19-19» 19ciber (ciber@SpotChat-sue.jq7.236.201.IP19) has Joined #linuxmint-help
[Sun, 17 July ://: 15:53:34] 26«26-31-31- 26zodian (zodian@SpotChat-pjirop.home.otenet.gr26) has Quit (Quit: Leaving26)
[Sun, 17 July ://: 15:53:38] 19.:2823linuxmodder19:. cat is out of the bag FOLKS


[Sun, 17 July ://: 15:55:22] 19.:2823linuxmodder19:. I personally can not recommend or vouch for the sanity / integrity of servers / mirrors

[Sun, 17 July ://: 15:56:45] 04<mtn04>04 linuxmodder: not good at all😦

[Sun, 17 July ://: 15:57:20] 19.:2823linuxmodder19:. mtn, no shit ( pardon the language) but I’ve been helping others pinpoint that for over 18 hours on a distro I don’t even daily use
[Sun, 17 July ://: 15:57:32] 19.:2823linuxmodder19:. and been crickets from clem et al
[Sun, 17 July ://: 15:58:16] 28.:1924bario28:. where can I read about these oddities?
[Sun, 17 July ://: 15:58:22] 19.:2823linuxmodder19:. I’ve been alerting folks around the globe and across projects more than I do for me beloved Fedora Release day
[Sun, 17 July ://: 15:58:28] 28.:1924javier_28:. Im Javier, nice to meet you. Im using Mint 18 a 2 days ago and Im really impresed, almost love it
[Sun, 17 July ://: 15:58:32] 26«26-31-31- 26Dragoon (cyber_drago@SpotChat-os6.ve6.7.179.IP26) has Quit (Quit: Leaving26)
[Sun, 17 July ://: 15:58:36] 19.:2823linuxmodder19:. bario, try loading http://paste.linuxmint.com
[Sun, 17 July ://: 15:58:43] 26«26-31-31- 26ciber (ciber@SpotChat-sue.jq7.236.201.IP26) has Quit (Quit: Leaving26)
[Sun, 17 July ://: 15:58:45] 19.:2823linuxmodder19:. whois paste.linuxmint.com in a terminal

[Sun, 17 July ://: 16:02:45] 19.:2823linuxmodder19:. traceroute 208.92.233.240 and see the blocks and redirects


[Sun, 17 July ://: 16:45:30] 04<revdjenk04>04 linuxmodder: I am not seeing any signs, notifications, alerts about this at all.
[Sun, 17 July ://: 16:45:51] 28.:1924revdjenk28:. paste is down, only
[Sun, 17 July ://: 16:45:52] 19.:2823linuxmodder19:. that is the problem
[Sun, 17 July ://: 16:45:57] 31-31-19-19» 19iceunicorn (iceunicorn@SpotChat-o95.a02.203.67.IP19) has Joined #linuxmint-help
[Sun, 17 July ://: 16:46:05] 26«26-31-31- 26aron (aron@SpotChat-9t323c.078h.76to.a601.2605.IP26) has Quit (Quit: Leaving26)
[Sun, 17 July ://: 16:46:13] 19.:2823linuxmodder19:. revdjenk, my blog post with the signs for those unaware will be up shortly.

 

 

F23-20160428 Updated Lives Available NOW!! (4.4.8-300)

Hello again fellow Fedorians,

Last night, 4.4.8-300 was deemed stable and we have new updated lives f23-{i386,x86_64}-{CINN,KDE,LXDE,MATE,SOAS,WORK,XFCE}-20160428.

%CHANGELOG

20160428 Kernel Fixes / Package Updates

Kernel Update info (bodhi)

  • 4.4.8-300
  • CVE 2016-3961 — xsa174 xen: hugetblfs crashing guests (PV Guests) rhbz # 1323956
  • rhbz # 1309980 skylake p_state won’t boot
  • CVE 201-3955 —  kernel usbip: buffer overflow trusting length of  IP packets rhbz #1328479
  • rhbz # 1309487 RTL8723BE chipset has  weak signal

Package  Updates:  285  in total

Notable updates:

  • abrt including addons
  • avahi
  • bluez
  • cinnamon-devel
  • cinnamon-docs
  • cinnamon itself
  • eclipse
  • OCE

https://linuxmodder.fedorapeople.org/live-respins/updates.txt

Where to get them? F23 Live-Respins (ISOs) (updated to 20160428/4.4.8-300)

Want to torrent pull? F23 Live Respins (Torrents) (updated to 201604028/4.4.8-300)

Need Torrent Hashes ? F23-20160420 ISO Checksums & Torrent Hashes

New Feature: rsyncd is now running for the respins  you can obtain them via this method at:

rsync://dl.fedoraproject.org/fedora-live-respins

Per request from a few folks I have  pgp signed  the  hash files and  a non gpg signed hash files (which  both match for those that have  shown fears of a  modified  hash / MiTM… The key used is my  Fedora key: OxD2264944  FP: 6292 9ABD 6374 6AA7 6D4B 730F 5927 6298 D226 4944

Want to run a installfest / have options for install? F23-20160428 Multi Boot ISO (x86_64 Only) — I can help you create a Multi Arch or host one elsewhere if desired however with the reduction in i686 installs in this day and age it’s not something I will host normally.  (Due to migration the MultiBoot will be delayed however the checksum is  available in its the usual location.

F23-20160420 Updated Lives Available NOW!!!

Hello again fellow Fedorians,

Last night, 4.4.7-300 was deemed stable and we have new updated lives f23-{i386,x86_64}-{CINN,KDE,LXDE,MATE,SOAS,WORK,XFCE}-20160420.

%CHANGELOG

20160420 Kernel Fixes / Changelog

https://bodhi.fedoraproject.org/updates/FEDORA-2016-8e858f96b8

4.4.7-300

 

Where to get them? F23 Live-Respins (updated to 20160420/4.4.7-300)

Want to torrent pull? F23 Live Respins (updated to 201604020/4.4.7-300)

No Torrent Hashes ? F23-20160420 ISO Checksums & Torrent Hashes

Per request from a few folks I have  pgp signed  the  hash files and  a non gpg signed hash files (which  both match for those that have  shown fears of a  modified  hash / MiTM… The key used is my  Fedora key: OxD2264944  FP: 6292 9ABD 6374 6AA7 6D4B 730F 5927 6298 D226 4944

Want to run a installfest / have options for install? F23-20160420 Multi Boot ISO (x86_64 Only) — I can help you create a Multi Arch or host one elsewhere if desired however with the reduction in i686 installs in this day and age it’s not something I will host normally.

Badlock: Samba Vulns & Patching your machines

Hello again folks,

Unless you are living in a black hole aka SCIF, or otherwise totally disconnected from various news outlets, you have likely heard about the numerous vulns that dropped as a series of CVEs better known as  ‘badlock’ Tuesday. Well, there is good news for those on Redhat based distros! Patches are already in the default repos for Fedora / RHEL / CentOS.

So  a  quick  layman’s rundown and then on to how to patch / update:  (hyperlinks direct to the respective Red Hat Access Customer Portal advisories), below are  tl;dr  briefs of each vulnerability.

For those desiring the more technical read:  Badlock: Red Hat Security Announcement

CVE-2015-5370

Multiple flaws were found in Samba’s DCE/RPC protocol implementation in which a condition was created where a remote, authenticated attacker could cause a denial of service against the Samba server (high CPU load or a crash) or, possibly, execute arbitrary code with the permissions of the user running Samba (root). This flaw could also be used to downgrade a secure DCE/RPC connection by a man-in-the-middle (MITM) attacker taking control of an Active Directory (AD) object and compromising the security of a Samba Active Directory Domain Controller (DC).

CVE-2016-2110

Several flaws were found in Samba’s implementation of NTLMSSP authentication. An unauthenticated, man-in-the-middle attacker could use this flaw to clear the encryption and integrity flags of a connection, causing data to be transmitted in plain text. The attacker could also force the client or server into sending data in plain text even if encryption was explicitly requested for that connection.

LDAP (with NTLMSSP authentication) is used as a client by various administrative Samba project tools (for example, “net”, “samba-tool”, “ldbsearch”, or “ldbedit”).

CVE-2016-2111

It was discovered that Samba configured as a Domain Controller (DC) would establish a secure communication channel with a machine using a spoofed computer name (aka rogue machine). A remote attacker would then in this  scenario be able to observe network traffic to obtain session-related information about the spoofed machine.

This flaw only affects Samba running as a classic primary DC, backup DC, or Active Directory DC.

CVE-2016-2112

It was found that Samba’s LDAP implementation did not enforce integrity protection for LDAP connections. A man-in-the-middle (MITM) attacker could use this flaw to downgrade LDAP connections to use no integrity protection, allowing them to hijack such connections.

This flaw affects all possible roles Samba can operate in.

The security advisory patch for this flaw introduces a new smb.conf option: smb.conf

Note: The LDAP server does not have an option to enforce strong 
authentication yet. The security patches mentioned herein introduce a new 
option called ldap_server_require_strong_auth, possible values of which are
 no, allow_sasl_over_tls and yes.

As the default behavior was set to no before, you may have to explicitly change this option until all clients have been adjusted to handle LDAP_STRONG_AUTH_REQUIRED errors. Windows clients and Samba member servers already use integrity protection.

CVE-2016-2113

It was found that Samba did not validate SSL/TLS certificates in certain connections. A man-in-the-middle attacker could use this flaw to spoof a Samba server using a specially crafted SSL/TLS certificate. (like the one  made famous recently  known as ‘Drown‘)

This flaw affects all possible roles Samba can operate in.

The security advisory patch for this flaw introduces a new smb.conf option: smb.conf

CVE-2016-2114

It was discovered that Samba did not enforce Server Message Block (SMB) signing for clients using the SMB1 protocol. A man-in-the-middle attacker could use this flaw to modify traffic between a client and a server.

This flaw affects the following server roles: standalone server, member server, classic primary DC, backup DC, and Active Directory DC. Samba server roles

Mitigation:

An explicit server signing = mandatory configuration option in the [global] section of the smb.conf file together with server min protocol = SMB2, should prevent connections without signing protection. However, this may cause older clients without support for SMB2 (or higher) to not be able to connect.

Patched versions are in default repos: 

4.4.2 (in f24), 4.3.8 (in f23) and 4.2.11 (in f22)

CVE-2016-2115

It was found that Samba did not enable integrity protection for IPC traffic by default. A man-in-the-middle attacker could use this flaw to view and modify the data sent between a Samba server and a client. (Very similar to 2016-2114 but  via  a different  packet  modification vector)

The security advisory patch for this flaw introduces several new smb.conf options: smb.conf

Mitigation:

An explicit client signing = mandatory configuration option in the [global] section of the smb.conf file.

This flaw affects all possible roles Samba can operate in.

Patched versions are in default repos: 

4.4.2 (in f24), 4.3.8 (in f23) and 4.2.11 (in f22)

CVE-2016-2118

DCE/RPC is the specification for a remote procedure call mechanism that defines both APIs and an over-the-network protocol. The Security Account Manager (SAM) Remote Protocol (Client-to-Server) provides management functionality for an account store or directory containing users and groups. The protocol exposes the “account database” for both local and remote Microsoft Active Directory domains. The Local Security Authority (Domain Policy) Remote Protocol is used to manage various machine and domain security policies. This protocol, with minor exceptions, enables remote policy-management scenarios. Both SAMR ( security Account Manager –Remote) and LSA (Local Security Authority) protocols are based on the DCE 1.1 RPC protocol.
These protocols are typically available to all Windows installations, as well as every Samba server. They are used to maintain the Security Account Manager database. This applies to all roles (for example, standalone, domain controller, or domain member).

PATCH TIME:


Fedora 22
sudo yum update samba
Fedora 23 / 24 Alpha
sudo dnf update samba
Centos 6 / 7:
 sudo yum update samba
 

LATE POST: F23-20160408 Updated Lives Availabel (4.4.6-301 + Several bug fixes)

Hello again fellow Fedorians,

Last friday, 4.4.6-301 was deemed stable and we have new updated lives  f23-{i386,x86_64}-{CINN,KDE,LXDE,MATE,SOAS,WORK,XFCE}-20160408.

%CHANGELOG

20160408 Kernel Fixes / Changelog

  • 4.4.6-301

 

Where to get them? F23 Live-Respins (updated to 20160408/4.4.6-301)

Want to torrent pull? F23 Live Respins (updated to 20160408/4.4.6-301)

No Torrent Hashes ? F23-20160408 ISO Checksums & Torrent Hashes

Want to run a installfest /  have options for  install? F23-20160408 Multi Boot ISO (x86_64 Only) — I can help you create a  Multi Arch or host one elsewhere if desired however with the reduction in i686 installs in this day and age it’s not something I will host normally.

Look out for posts | tutorials  | github repo creation / modifications for  this as well in the coming  week(s).

Some help with rsyncd overload?

So you love  Fedora so much you have  decided to mirror it ?  Great! However some of you are causing undo strain on the master servers by doing  partial rsyncs ( times out mid way  or  connection tanks).   So how to know if you are one of strainers and /or  why would | should you care one iota? Well  those partials are  `stat`ed and  take a very large toll on  remaining open connections for others, seeing as in the default rsync the master servers have to check your current copy  against its copy to see what you have and still need.  These partials of  (often 1Tb-10Tb trees like alt, development (Alpha builds for Fedora 24), and rawhide) take up bandwidth, IOPS, and available connections for other folks namely the registered `Tier 0` and `Tier 1` mirrors (aka the ones we  average mortals  get updates from).  Makes sense that if they  can’t  get timely  copies of  updates on their  drives they  surely  can’t get them to you can they?

So you think you may be one of these offenders or  wanna help someone (friend who is mirroring or the admin of your local mirror) stop / prevent being one,  what can you do?

  • Read Mirroring Guidelines: Recommended rsyncd timing
  • Set your cron jobs to a more sane and practical 6-8 hours OR 2/3x daily
  • Let your main internal use mirror source your machines in your environment, updating your local master daily
  • Ensure you are on the master list of official mirrors, and the mirroring mailing list, which keeps you (or the admin running it) up to date of  high traffic  days or  pre-release `bit-flip` times when rsyncs that are not  deltas are  requested to stay at a minimal
  • Once you are fully  updated that first time  use delta pulls `–delta –delete-after`  which only  pulls in  what is  missing not  re-downloading the entire mirror

 

HAPPY MIRRORING !!

Source: partial rsyncs causing undo stress on main servers

Promising use of 3d printing

Organ Harvesting on the Black market seeing the beginning of  its demise?

A team in China,  saved a 9 month old baby with a  3d printed  Heart.  My  first thought was how many  poor cancer and kidney / liver sufferers could benefit IF (hopefully only when not if) this  becomes something that is the new medical norm, and then the reality of  cloning and  using this to revive less than desireable individuals (like violent offenders) also came to the forefront. I can only hope a reasonable and  sane minded (if that can truly be  quantified and agreed on) body  can regulate this in a way where everyone wins.

Source:http://futurism.com/3d-printed-heart-replica-helps-save-baby

F23-20160324 Updated Lives Available (4.4.6-300 Kernel)

Hello again fellow Fedorians,

Last night 4.4.6-300 was deemed stable and today we have new updated lives  f23-{i386,x86_64}-{CINN,KDE,LXDE,MATE,SOAS,WORK,XFCE}-20160324.

%CHANGELOG

20160324 Updates Changelog

  • 4.4.6-300

Nearly  815  assorted updates, among them were several large update suites for:

  • cinnamon
  • kde
  • playonlinux
  • wine
  • eclipse
  •  evolution
  • git
  • glusterfs
  • libpurple
  • libcacard (smartcards)
  • libvirt
  • qemu/kvm
  • owncloud
  • php
  • python2/3 (various updates)
  • qtwebkit
  • xen

Where to get them? F23 Live-Respins (updated to 20160324/4.4.6-300)

Want to torrent pull? F23 Live Respins (updated to 20160324/4.4.6-300)

No Torrent Hashes ? F23-20160324 ISO Checksums & Torrent Hashes

Want to run a installfest /  have options for  install? F23-20160324 Multi Boot ISO (x86_64 Only) — I can help you create a  Multi Arch or host one elsewhere if desired however with the reduction in i686 installs in this day and age it’s not something I will host normally.

Look out for posts | tutorials  | github repo creation / modifications for  this as well in the coming  week(s).

F23-20160318 Updated Lives Available NOW! (4.4.5-300 kernel)

Hello again fellow Fedorians,

Last night 4.4.5-300 was deemed stable and today we have new updated lives  f23-{i386,x86_64}-{CINN,KDE,LXDE,MATE,SOAS,WORK,XFCE}-20160318.

%CHANGELOG

  • 4.4.5-300  — MINOR CHANGES TO HELP FIX A KNOWN ARM64 BOOT ISSUE
  • assorted updates

Where to get them? F23 Live-Respins (updated to 20160318/4.4.5-300)

Want to torrent pull? F23 Live Respins (updated to 20160318/4.4.5-300)

No Torrent Hashes ? F23-20160318 ISO Checksums & Torrent Hashes

Want to run a installfest /  have options for  install? F23-20160318 Multi Boot ISO (x86_64 Only) — I can help you create a  Multi Arch or host one elsewhere if desired however with the reduction in i686 installs in this day and age it’s not something I will host normally.

Look out for posts | tutorials  | github repo creation / modifications for  this as well in the coming  week(s).

 

F23-20160311 Updated Lives Available (4.4.4-301)

It’s that  time again,  another kernel dropped to stable updates.  This respin cycle  also includes a series of updates (shown below).

Changelog:

Kernel:  4.4.4-301

RHBZ Fixes:

  • 1314253 / 1314255  Partial SMAP bypass on x86_64 Kernels
  • 1316133 integer overflow  (libotr 4.1.0 ->  4.1.1)

Updates:

  • Require updated XFS Utilities
  • Switch back to using ` CONFIG_ACPI_REV_VERSION_OVERRIDE_POSSIBLE`
  • Several Updates for:
    • libreoffice
    • wine
    • xorg-X11
    • xen-libs
    • firefox 45 (stable tag)
    • chrome 49 (stable tag)
    • cinnamon | nemo
    • libotr-4.1.1 ( patch update for rhbz 1316133)
    • flash-plugin-11.2.202.577-release
    • kde
    • evince
    • transmission-gtk
    • dnf

For the full list take a look here (117 Updates in total):

20160311 Updates list

As usual the  respins are  available here at this link: F23 Live Respins.  The link has  traditional .iso and  .torrent  files for your download  method of  choice.

Checksums are  sha512 are  are  below:

F23-201560311-TORRENTHASH

F23-20160311-CHECKSUM

 

Fedora at FOSDEM

===============================================================Re Posting for a fellow Fedorian. Well written post showing  not only how focused efforts geared toward  on-boarding and retaining contributors worked better than expected showcasing a powerful called Datagrepper…

===============================================================

  • Introduction blatantly copied from mattdm’s Five Things in Fedora This week post in Magazine . ” Fedora spends quite a bit of energy, time, money, and other resources on Fedora’s pres…

Source: Fedora at FOSDEM

WordPress: Got Plugins? (4 Plugins you need to check)

Thanks to a wordfence blog post, we have a fuller understanding of a previously  disclosed backdoored official plugin ( CCTM ) and  3 more  plugins which within the last  week or so have been publicly  disclosed and patched.  For full details read teh wordfence blog post  below:

1 Backdoored Plugin, 3 Other Publicly Vulnerable ones

F23-20160303 Updated Lives Available NOW. (4.4.3-300 Kernel)

It’s that  time again,  another kernel dropped to stable updates.  This respin cycle  also includes a series of updates (shown below).

Changelog:

Kernel:  4.4.3-300

RHBZ Fixes:

  • Fix automounting behavior of ATA drives (rhbz 1310682)
  • Fix suspend blacklight blanking behavior
  • Fix deferred nouveau module loading on tegra

– CVE-2016-2550 af_unix: incorrect accounting on in-flight fds (rhbz 1311517 1311518)

Updates:

Generic  Updates of  various packages.

As usual the  respins are  available here at this link: F23 Live Respins.  The link has  traditional .iso and  .torrent  files for your download  method of  choice.

Checksums are  sha512 are  are  below:

F23-201560229-TORRENTHASH

F23-20160229-CHECKSUM

 

Also noted at:  https://jbwillia.wordpress.com/2016/03/03/f23-20160303-update-lives-released/

Fedora Safe from DROWNing Attack

If you are familiar with security , you likely  saw the disclosure yesterday of the openssl v2 vulnerability given the sensational name  “Drown”.  Good news if you use Fedora (and it’s updated  — Update with 20160229 ISOs) you don’t need to worry about  a  0 day  vuln fix.  Openssl-1.0.2g  IS the patched version and  is on all Fedora Infrastructure and  openssl that is shipped in fedora  DEFAULTS to having the v2 AND v3  protocols  not  built-in “Compiled without openSSLv2/v3 support”.

Have a read at the  official Fedora Magazine article to this effect Fedora Not “Drown”ing.

 

 

 

F23-20160229 Updated Lives Available Now.

It’s that  time again,  another kernel dropped to stable updates.  This respin cycle  also includes a  plethora of updates including several recent bugzilla reports (shown below).

SIDENOTE: regarding DROWN,  ALL fedora servers are patched and not vulnerable to this sslv2 attack vector, statement form security-team or admins expected in the coming days to this effect.  For personal systems ensure you are NOT  still allowing  sslv2 connections to your critical instances and that you are updated to openssl-1.0.2g.

Changelog:

Kernel:  4.4.2-301

rhbz  fixes:

CVE 2015-7547 | redhat CVE 2016-0235 (glibc)

1303270,1306987,1303532,1309548,131058

1305803 & 1305804  — CVE 2016-0617

1308452 & 1308453 — CVE 2016-2383

1308444 & 1308445 — CVE 2016-2384

As usual the  respins are  available here at this link: F23 Live Respins.  The link has  traditional .iso and  .torrent  files for your download  method of  choice.

Checksums are  sha512 are  are  below:

F23-201560229-TORRENTHASH

F23-20160229-CHECKSUM

 

F23-20160202 Updated Lives Available. Complete with 4.3.4-300 Kernel

Updated Lives for 23  are  available in torrent and raw iso download format from: (Includes GNOME,KDE,LXDE,MATE,CINNAMON,SOAS,XFCE)

Fedora 23 Updated Lives

Additional Spins available from:

Fedora Spins

All Versions also available  via Official Torrent from:

All Official Fedora Torrents

F23-20160127 Live Respins are available now.

Updated Lives for 23  are  available in torrent and raw iso download format from: (Includes GNOME,KDE,LXDE,MATE,CINNAMON,SOAS,XFCE)

Fedora 23 Updated Lives

Additional Spins available from:

Fedora Spins

All Versions also available  via Official Torrent from:

All Official Fedora Torrents

Health Insurer Missing Hard Drives and Patient Data

ComputerWorld Article — Health Insurer reports 6 Hard Drives Missing

As mentioned in the above article,  Centene has  reported having lost  (or misplaced) 6 hard drives with patient data from 21 states totaling 95k patients.   They claim it has no reason to believe anything malicious has been done with the data but  its reporting in an effort to show an abundance of caution and transparency.

From the article above:

The hard drives contained the personal health information of customers who received laboratory services from 2009 to 2015. The personal information on its customers includes their name, address, date of birth, Social Security number, member ID number and health information.

The hard drives do not include any financial or payment information, Centene stated.

Neidorff said the hard drives were part of a data project using laboratory results “to improve the health outcomes of our members.”

As has become the de-facto aftermath effort  Centere has indicated they will be  contacting any possible patients that were / could be effected and offering monitoring for credit and healthcare accounts for an undisclosed time and from a undisclosed vendor.

Let’s hope this was a simple misplacement or  shoddy logs of  transfer / maintenance  but to any and all effected folks please take due diligence to check and monitor your data.

 

 

 

OpenSSH Vulnerabilities CVE-2016-0777/0778

For a very  clear explanation and non techy why do I care?  head to the link below or  any others of the tech world, most  folks are  doing a swell job of  barney ‘ing it down so everyone understands (without talking down to the less techy).

https://fedoramagazine.org/openssh-vulnerability-expose-private-credentials/

 

F24-20160815 Updated ISOS Available NOW.

Today we have the newest installment of the  F24 Updated Lives, carrying on average 580 Mb of updates over the Gold Images from two months ago.

Some great news for intel cpu / gpu users: 4.6.6-300 has patch fixes for the screen tearing.

You will notice this round there is HASHSUM512-20160815 AND HASHSUMS-20160815,  the 512 are the sha512sums of the torrents and HASHSUMS are straight torrent hashes (fully searchable type).

F24 Updated Lives

CHECKSUM512-20160815:

NO Source Torrent is made if you have a need for one contact me either via email or in a comment here.

daa06ee7a8e277fc39b7b614dfce0e581823f95e68c7d6491cbffc1504e9a998a43c50da98400ba16af1be69d7ab6f9515adbe7f682eb6d3549853b4b8a7ba0e F24-source-20160815.iso

2439b2fb5f2c1b260ebaf560b9b680cec774bd890baebfb1d35fd6e8ed10e6b787bd2c978505a91f30de9757984ddff140d13ce0a9a41d1dbff2c38e8be8ba1c F24-x86_64-CINN-20160815.iso

914b61c3bb2524420239b1d0adea1c986f726e9eac135f3ba49dda7c1b1f1dc6d21b69541172e33a2ae4617461041cfe13ac09f7e30faae4c4b2584bc4b9e4fc F24-x86_64-KDE-20160815.iso

e2cb9cbb7b72a1bfb90c3de4f495fc45351d0121ba27e6cb4a0715e25a2123f8324862579105c839fd72ed52a790c6571afcffb2b0bd0058e8058b909d6e6d76 F24-x86_64-LXDE-20160815.iso

c50fd8e41b2a738eb6b0c8cfb7bed5f1e98d9504b6b65a8eb1930c075c502e30c64cb384b1316f9de240eb33258389d4c40eb0efabd902396dc8f9592895ea64 F24-x86_64-MATE-20160815.iso

bd808438d9ee0b4171490719d54fa3172440fd664b1187bf3e8a569cf73eefbc3b3cde36b113d43084565481b6f51a74ba58cbf99b29062b16f35c914e0f9a19 F24-x86_64-WORK-20160815.iso

01b97737fcfd709db3461026cd7705d957d93e196a80c97d200510c868c63ee34c9896b02499294bc216cf238af6fd1dbbde667a281cbaebf374b16bc7c7331a F24-x86_64-XFCE-20160815.iso

HASHSUM512-20160815:

b66a07ac15a1a0f148b3dade7bd17520f0fd123bb8801786ff628b4b89ed02325c52052790ca02400bc8d143a3e3ae2d827dca2a49f09acdeec2ea028c844811 /seedbox/F24-x86_64-CINN-20160815.torrent

f8ebaba5a0271b33519d71b4adf6ede4c13e76bc9e5a0f7c63bc108b2d7ca1e65b2a7753b565bd5d3efaedb0b8870c6e46fe336ae9cfa695d9d5ed9699f21e2c /seedbox/F24-x86_64-KDE-20160815.torrent

55eadd80a7eec36ed2ca3f535edb668ea398bd3d00eb1645d22d80db0b6d96670c6ab16c26ed405c3153718b9ff433e46fc1b879eeca84114002c2c3fd3d54f8 /seedbox/F24-x86_64-LXDE-20160815.torrent

b2c2dc103f149e54292feefb3de94e3d106d18361c73f9e499ed72165d8084d02084623c7cdb656c0aaa181aa539f759cb83d84aee5405e77f5dcca5c14eec1b /seedbox/F24-x86_64-MATE-20160815.torrent

35f0404f181164612c1ca641ca3faf86f36c226fb568fbf61ff801d824bad9107bdda76a546c54ac049a824e26a56d4936fa13a6bee294d9acffdf604fa2288a /seedbox/F24-x86_64-WORK-20160815.torrent

fa05a9a713266e01796bc80d34391081477e74425b2fbe0ee135ee794a1a10a6ee038879efc7ab3839201506c79f41a03981b213aae6cb10b58c404d380cf983 /seedbox/F24-x86_64-XFCE-20160815.torrent

7f231fa325578fd52a7b9315fa589bbb3b469b7efe988e9a383a9fbd26cab8ecca5b73d782ddc9d146c96a223e6d73ddd3695cb6abb70f128714ed2da08566de /seedbox/HASHSUMS-20160815