From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on inbox.vuxu.org X-Spam-Level: X-Spam-Status: No, score=0.0 required=5.0 tests=DKIM_SIGNED,DKIM_VALID autolearn=ham autolearn_force=no version=3.4.4 Received: (qmail 29393 invoked from network); 30 Sep 2023 21:20:31 -0000 Received: from 9front.inri.net (168.235.81.73) by inbox.vuxu.org with ESMTPUTF8; 30 Sep 2023 21:20:31 -0000 Received: from pb-smtp20.pobox.com ([173.228.157.52]) by 9front; Sat Sep 30 17:18:41 -0400 2023 Received: from pb-smtp20.pobox.com (unknown [127.0.0.1]) by pb-smtp20.pobox.com (Postfix) with ESMTP id 2B47937476 for <9front@9front.org>; Sat, 30 Sep 2023 17:18:36 -0400 (EDT) (envelope-from unobe@cpan.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed; d=pobox.com; h=message-id :to:subject:date:from:in-reply-to:mime-version:content-type :content-transfer-encoding; s=sasl; bh=0IAQr0NMCVmWJZCK+FenOuEp3 UKtR/gb13tBoiMyrwU=; b=xx5Tfq0Je39PZvOd9BrZaUAMKyPzwL21QyRtvhY3M t3zL+EgkfVvOgnYXnI+K97OB9Ox8jxV6SVKJ6awFfrItfLSPx/8vxqUBqzWsxhLE fcU7aX0XVTeYL2sDBHY84h2V/Pd+kpTEPCqJZ70KgRqAM3OehBbJ3n4GgG4Z10Gi OI= Received: from pb-smtp20.sea.icgroup.com (unknown [127.0.0.1]) by pb-smtp20.pobox.com (Postfix) with ESMTP id 23D4937475 for <9front@9front.org>; Sat, 30 Sep 2023 17:18:36 -0400 (EDT) (envelope-from unobe@cpan.org) Received: from strider.localdomain (unknown [75.237.252.53]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by pb-smtp20.pobox.com (Postfix) with ESMTPSA id 563EA37474 for <9front@9front.org>; Sat, 30 Sep 2023 17:18:32 -0400 (EDT) (envelope-from unobe@cpan.org) Message-ID: To: 9front@9front.org Date: Sat, 30 Sep 2023 14:18:29 -0700 From: unobe@cpan.org In-Reply-To: <1E6A72B281D5BDD996600F597B69633D@smtp.pobox.com> MIME-Version: 1.0 Content-Type: text/plain; charset="US-ASCII" Content-Transfer-Encoding: 7bit X-Pobox-Relay-ID: E88F1BB4-5FD6-11EE-8520-F515D2CDFF5E-09620299!pb-smtp20.pobox.com List-ID: <9front.9front.org> List-Help: X-Glyph: ➈ X-Bullshit: extended basic SVG metadata injection manager Subject: Re: [9front] tlssrv: auth_chuid: can't open /lib/namespace: file does not exist: '/lib/namespace' [SOLVED] Reply-To: 9front@9front.org Precedence: bulk FYI, just as a follow-up, I figured it out. As MJD has yelled before, "reading the error message!" Since rcpu(1) uses tcp17019, I considered trying to replicate that listener with a one-shot listener, but aux/listen had already started and even if I moved tcp17019 to !tcp17019, it was still listening on that port. 'kill listen' returned nothing, and I was considering to attempt a kill on the pid corresponding with the listen process run as none, but decided first to use auth/none to see if that showed anything. Indeed it did: cirno# ls -ld /lib d-rwxrwx--- M 22 sys sys 0 Jun 1 16:49 /lib So the none user couldn't access anything under /lib. running 'auth/as sys chmod o+rx /lib' resolved this issue. I have no idea *how* that occurred; I don't think I ever chmod'd that directory, particularly within the last 48 hours. Quoth unobe@cpan.org: > Anyone come across a situation that would make tlssrv throw this error > on the client side when trying to connect via rcpu? I didn't see anything > in the e-mail archives. > > This just started occurring in the last 24 hours. I can 'touch' the > file as hostowner. I thought it might have been a stale secstore pw, > but I've updated that for the hostowner, and still no go. > > % ls -l /lib/namespace > --rw-rw-r-- M 22 sys sys 805 Sep 30 01:40 /lib/namespace > > On the client side, tlsclient throws an error: > > tlsclient: tlsclient: i/o on hungup channel > >