• 0 Posts
  • 216 Comments
Joined 7 months ago
cake
Cake day: June 4th, 2025

help-circle
  • Can you still SSH to the machine when it’s in that state? If you can it’s likely to be a problem in the graphics stack, if you can I’d probably start by running memtest86+ for a full cycle to rule out memory issues. After that, checking things like CPU temps would be good.

    Assuming that’s all good, check for anyone else reporting issues with the same motherboard, CPU, GPU, or other components

    Good luck, this sort of thing can be quite frustrating to get to the bottom of.








  • notabot@piefed.socialtoPolitical Humor@lemmy.worldHe'll
    link
    fedilink
    English
    arrow-up
    32
    arrow-down
    1
    ·
    7 days ago

    It’s not well known, but the Allies had a top secret plan to end the war by parachuting Major into Germany, near Berlin, and showing him a picture of an ss officer kicking a puppy. The predicted extreme colateral damage was considered acceptable as it was expected that this action would end hostilities within 24 hours. The only reason the plan was not carried out was no one knew how to stop him afterwards.








  • Ah, you see, all those authors, translators, editors, and indeed committee members were influenced and guided by god to ensure the true word of god was passed down. The fact that different versions don’t agree with each other is neither here nor there.

    In the end we ended up with a weirdly written, contradictory work open to interpretation that is supposed to be treated as fact.

    Ah, um, it’s… yes, it’s all part of god’s plan. God works in mysterious ways, you know. Yes, that’s bound to be it…part of the plan, mysterious ways, etc.





  • The general process would look something like:

    1. Find all of the SSH keys you want to replace.
    2. For each of thise keys, identify everywhere you use it to authenticate, and write this down! This list will form the basis of the rest of the plan. Make sure you list all of the accounts/servers you log in to, and don’t forget things like github or other external systems if you use them.

    You’ll need to perform the following steps for each SSH key you are replacing:

    1. Rename the public and private keys to something like old_id_rsa and old_id_rsa.pub (obviously use the same type name as your key, just prefix old_)
    2. In your ~/.ssh/config, add a line telling SSH to use the old key as well as the new ones: IdentityFile ~/.ssh/old_id_rsa (change the key filename as aporopriate)
    3. Check you can still log in to the servers you could log in to before. It should still be using the old key, just with a different filename, so it should still work.
    4. Generate your new SSH keys ssh-keygen -t ed25519
    5. Log in to each server and ADD the new ~/.ssh/id_ed25519.pub key to the authorized_keys file or equivalent mechanism. Do not remove the old public key yet.
    6. Remove the IdentityFile line from your ~/.ssh/config
    7. Check you can log in to all your systems. This will validate that your new key is working.
    8. Remove your old public key from the authorized_keys file on each server you log in to.

    Depending on your threat model you’re going to want to do this more or less often, and so you may want to consider automating it with sonething like ansible if it’ll be a regular job.


  • That’s certainly an option, but depending on how paranoid you are that still typically means that a compromised server can overwrite all of its backup images on the NAS, which could leave you in trouble. If you can configure your NAS to only allow creation of new backups but not allow changing old ones, you might be ok.