Demo Discussion
Forum Config Examples Contributions Vulnerabilities
  Discussion forum about ELOG, Page 13 of 237  Not logged in ELOG logo
icon5.gif   Edit entry from command line and appending attachment, posted by Andrea Capra on Sun Jun 26 01:47:02 2022 
I would like to edit an existing entry by adding new attachments at each call of elog
from the command line.

If I issue
icon1.gif   ladp Invalid user name or password!, posted by Fred Nerks on Wed May 11 09:54:17 2022 
Hi I am running elog on windows 2022 server and trying to use ldap for Auth.

No matter what i do I cannot get it to authenticate against the DC.

Invalid user name or password!
    icon2.gif   Re: ladp Invalid user name or password!, posted by Fred Nerks on Mon May 23 07:48:40 2022 
 




Fred
Nerks wrote:



Hi I am running elog on windows 2022 server and trying to use ldap
icon4.gif   PDF preview special steps to enable, posted by Konstantin Olchanski on Fri May 6 21:12:11 2022 
Ubuntu LTS 20.04 and others have elog PDF preview disabled by default. To enable,
please follow these steps, see https://daq00.triumf.ca/DaqWiki/index.php/Ubuntu#Enable_elog_PDF_preview
    icon2.gif   Re: PDF preview special steps to enable, posted by Stefan Ritt on Tue May 10 22:40:26 2022 img.pdf.gz
I have a PDF file created by root which ImageMagic cannot convert to a .png file. If I do

convert img.pdf img.png
icon5.gif   elog root path, posted by Antonio Bulgheroni on Thu May 5 11:14:20 2022 
Dear all, 

I have a question for you. On my elog server I have plenty of images not included in any logbook entry, but that nevertheless I would the user
to have access to that via the browser. In order words, I would like to have a link like this https://myelog/my_pics_folder/my_pic.png
icon5.gif   Vulnerability?, posted by Alessandro Petrolini on Thu Mar 3 08:26:40 2022 
Hi, I have been using elog for years at CERN.

Now I installed in my local workstation at my home inistitue

and sysadmin reported the following vulnerabilities:
    icon2.gif   Re: Vulnerability?, posted by Konstantin Olchanski on Thu Mar 3 16:49:40 2022 
The CVEs you refer to are very old and have been fixed a long time ago.

Please refer to:
       icon2.gif   Re: Vulnerability?, posted by Alessandro Petrolini on Fri Mar 4 08:51:24 2022 
Ok, many many thanks!
I will pass the info to my sysadmin.
Best Regards.
          icon2.gif   Re: Vulnerability?, posted by Alessandro Petrolini on Sun Mar 6 09:00:33 2022 
> Ok, many many thanks!
> I will pass the info to my sysadmin.
> Best Regards.
             icon2.gif   Re: Vulnerability?, posted by Konstantin Olchanski on Sun Mar 6 17:33:04 2022 
> > > The CVEs you refer to are very old and have been fixed a long time ago.

> Am I wrong that the windows executable version on the site is dated 2018? 3.1.4-2?
                icon2.gif   Re: Vulnerability?, posted by Stefan Ritt on Mon Mar 7 08:49:41 2022 
> I trust Stefan is reading this thread and will do something about it. My vote would
> be to remove the download link to the windows executables and ask Debian to remove
> the elog package. I think they have a way for upstream developers (Stefan) to request
                   icon2.gif   Re: Vulnerability?, posted by Daniel Pfuhl on Mon Mar 7 14:30:16 2022 


> Yeah, I have to recompile the Windows version. Unfortunately my old Windows PC is gone, I
                   icon2.gif   Re: Vulnerability?, posted by Jan Just Keijser on Mon Mar 7 17:46:39 2022 
> > I trust Stefan is reading this thread and will do something about it. My vote would
> > be to remove the download link to the windows executables and ask Debian to remove
> > the elog package. I think they have a way for upstream developers (Stefan) to request
                      icon2.gif   Re: Vulnerability?, posted by Jan Just Keijser on Wed Mar 9 17:55:31 2022 elog-3.1.4-1ebfd06c-win64.zip
I've built the last C version of elog in git, revision 1ebfd06c using mingw-64 ; the resulting binaries work for me on Windows 2019.
Attached is a zip file with the binaries.
I was not able to create a new installer, these are just the executables
                         icon2.gif   Re: Vulnerability?, posted by Daniel Pfuhl on Tue Apr 19 15:47:59 2022 
> I've built the last C version of elog in git, revision 1ebfd06c using mingw-64 ; the resulting binaries work for me on Windows 2019.
> Attached is a zip file with the binaries.
> I was not able to create a new installer, these are just the executables
                            icon2.gif   Re: Vulnerability?, posted by Jan Just Keijser on Tue Apr 19 17:02:57 2022 
> > I've built the last C version of elog in git, revision 1ebfd06c using mingw-64 ; the resulting binaries work for me on Windows 2019.
> > Attached is a zip file with the binaries.
> > I was not able to create a new installer, these are just the executables
                               icon2.gif   Re: Vulnerability?, posted by Daniel Pfuhl on Tue Apr 19 20:13:04 2022 
> > > I've built the last C version of elog in git, revision 1ebfd06c using mingw-64 ; the resulting binaries work for me on Windows 2019.
> > > Attached is a zip file with the binaries.
> > > I was not able to create a new installer, these are just the executables
                                  icon2.gif   Re: Vulnerability?, posted by Jan Just Keijser on Fri Apr 22 17:10:24 2022 
> > > > I've built the last C version of elog in git, revision 1ebfd06c using mingw-64 ; the resulting binaries work for me on Windows 2019.
> > > > Attached is a zip file with the binaries.
> > > > I was not able to create a new installer, these are just the executables
                   icon2.gif   Re: Vulnerability?, posted by Laurent Jean-Rigaud on Mon Mar 7 22:07:54 2022 elog-3.1.4-395e101.zip
> > I trust Stefan is reading this thread and will do something about it. My vote would
> > be to remove the download link to the windows executables and ask Debian to remove
> > the elog package. I think they have a way for upstream developers (Stefan) to request
                   icon2.gif   Re: Vulnerability?, posted by Florian Heigl on Mon Apr 18 19:16:36 2022 
> > I trust Stefan is reading this thread and will do something about it. My vote would
> > be to remove the download link to the windows executables and ask Debian to remove
> > the elog package. I think they have a way for upstream developers (Stefan) to request
                      icon2.gif   Re: Vulnerability?, posted by Konstantin Olchanski on Tue Apr 19 21:15:19 2022 
> it would be good if the current state was listed in https://elog.psi.ch/elogs/Vulnerabilities/
> It seems there's now updated builds for at least windows
                         icon2.gif   Re: Vulnerability?, posted by Konstantin Olchanski on Fri Apr 22 21:15:37 2022 
> > debian package still outdated?
> We reached to the package maintainer
                            icon2.gif   Re: Vulnerability?, posted by Konstantin Olchanski on Tue Apr 26 17:39:49 2022 
> > > debian package still outdated?
> removed from debian-unstable
> https://tracker.debian.org/pkg/elog
                               icon2.gif   history of long-removed freebsd package, Re: Vulnerability?, posted by Konstantin Olchanski on Tue Apr 26 18:03:03 2022 
> > > > debian package still outdated?

the freebsd elog package was removed back in 2014 during
                               icon2.gif   Re: Vulnerability?, posted by Konstantin Olchanski on Wed Apr 27 19:36:25 2022 
> next is to request removal of ubuntu package.

contacted ubuntu security team, got very quick response.
                      icon12.gif   Re: Vulnerability?, posted by Andreas Luedeke on Fri Apr 22 12:55:21 2022 
 
> it would be good if the current state was listed in https://elog.psi.ch/elogs/Vulnerabilities/ 
> It seems there's now updated builds for at least windows, and the debian package still outdated?
       icon2.gif   Re: Vulnerability?, posted by Konstantin Olchanski on Sat Apr 23 18:05:57 2022 
> The CVEs you refer to are very old and have been fixed a long time ago.

> Please refer to:
icon5.gif   Download attachments from command line, posted by Maarten de Jong on Sat Apr 16 10:37:24 2022 
Would it be possible to download attachments (e.g. with elog or wget) from the command line?
    icon2.gif   Re: Download attachments from command line, posted by Stefan Ritt on Tue Apr 19 10:24:47 2022 
Sure. Just figure out the URL from your browser and then use it in wget, e.g.

wget https://elog.psi.ch/elogs/Forum/220309_175728/elog-3.1.4-1ebfd06c-win64.zip

to download one attachement from this forum.
       icon2.gif   Re: Download attachments from command line, posted by Maarten de Jong on Thu Apr 21 14:19:35 2022 
Thanks - I can confirm that the given command works.
However, for an e-log with username and password protection, this no longer seems to work.
It would be very useful if the elog command can be used to also download attachments (and not only a message).
icon5.gif   recovery of elog from backup disk, posted by neerajan nepal on Wed Apr 13 16:31:27 2022 
Hello,

I do have a backup of elog repository in an external disk (with a directory name .elog). I want to install this repository to a new linux (either
ubuntu 20.xx or Cent OS 7) computer. I am new to this, can someone please provide me an instructions sheet. 
    icon2.gif   Re: recovery of elog from backup disk, posted by Konstantin Olchanski on Mon Apr 18 21:01:23 2022 
unfortunately instructions do not exist to cover every possible situation.

but in general, to migrate elog to a new machine, I would say do this:
       icon2.gif   Re: recovery of elog from backup disk, posted by neerajan nepal on Thu Apr 21 03:45:20 2022 
> unfortunately instructions do not exist to cover every possible situation.

> but in general, to migrate elog to a new machine, I would say do this:
icon5.gif   Dynamic substitution with date , posted by Antonio Bulgheroni on Wed Apr 20 14:19:08 2022 
Dear all, 

I would need your help with an incremental index with date information.

I want to have an incremental number made by the last two digits of the year, the two digits of the month and an incremental four digits number. 
ELOG V3.1.5-3fb85fa6