Server maintenance tomorrow

I’ll be performing maintenance on servers this Friday night (Feb. 4) between 10pm and midnight (Mountain Time.)  Many servers will require a reboot due to a kernel update. The maximum expected downtime for each server is only a few minutes. Please email me if you have concerns or questions.

UVEF Crunch Lunch Presentation Video

In September, I presented at Crunch Lunch and the video of my presentation is now online. Each presenter was given exactly five minutes to present using 20 slides.  Slides automatically advanced every 15 seconds.  Enjoy watching me fumble over my words as I try to pass on too much information in that short timeframe.

The original video is available on the UVEF website.

Slides from my presentation are available here:
http://uvef.net/crunchlunch/crunch_lunch_michael_jensen.pdf

More information on other presenters is available here:
http://crunchlunch.com/crunch-lunch-at-uvef-september-2010/

OpenSSL vulnerability

There is a new OpenSSL vulnerability that has been discovered, which might be quite critical:

Rob Hulswit discovered a race condition in the OpenSSL TLS server
extension parsing code when used within a threaded server. A remote
attacker could trigger this flaw to cause a denial of service
or possibly execute arbitrary code with application privileges.
(CVE-2010-3864)

Be sure to update your servers with a patched version of OpenSSL.

New Millcreek Systems Package Repository is Online

The new Millcreek Systems .deb package repository is now online.  We will be using this repository to post customized software and systems management software specific to servers managed by Millcreek Systems.   It is currently for Debian and Ubuntu systems only and can be added by running the following command(s):


sudo wget --output-document=/etc/apt/sources.list.d/millcreeksys.list http://apt.millcreeksys.com/sources.list.d/$(lsb_release -cs).list && sudo apt-get --quiet update && sudo apt-get --yes --quiet --allow-unauthenticated install millcreeksys-keyring && sudo apt-get --quiet update

The PGP key id that we will use to sign packages is 8A87ABCB and its fingerprint is 0DDA 22E2 2FBB 71E1 51B9 17B3 CCA8 C173 8A87 ABCB