[Bug 1859180] [NEW] Uninformative, repetitive and extremely long MOTD message
Dan Watkins
daniel.watkins at canonical.com
Fri Jan 10 13:47:36 UTC 2020
Public bug reported:
I just SSH'd into my desktop, and was greeted with an additional _182_
lines of MOTD output thanks to fwupd (this content is in
/run/private/motd.d/85-fwupd, which is how I know fwupd is at fault).
There are a few problems here:
* The same content appears to be repeated 3 times
* It has no indication of what this tree output is, you just have to guess that it's to do with firmware updates
* The tree output itself is very wasteful of vertical space; it take 3 lines to give me the name of my device, and ~20 before I can work out that this is even describing updates
* It has no call to action; I have no idea how I would apply these updates to my system
I've included my full MOTD to demonstrate just how bad this looks:
Welcome to Ubuntu Focal Fossa (development branch) (GNU/Linux
5.4.5-050405-generic x86_64)
* Documentation: https://help.ubuntu.com
* Management: https://landscape.canonical.com
* Support: https://ubuntu.com/advantage
* Overheard at KubeCon: "microk8s.status just blew my mind".
https://microk8s.io/docs/commands#microk8s.status
B450M DS3H
│
└─Unifying Receiver:
│ Device ID: cf3685ba249d3d98602047341d6f5a5556a6ac05
│ Summary: A miniaturised USB wireless receiver
│ Current version: RQR12.07_B0029
│ Bootloader Version: BOT01.02_B0014
│ Vendor: Logitech, Inc. (USB:0x046D)
│ Install Duration: 30 seconds
│ GUIDs: 9d131a0c-a606-580f-8eda-80587250b8d6
│ fcf55bf5-767b-51ce-9c17-f6f538c4ee9f
│ 279ed287-3607-549e-bacc-f873bb9838c4
│ Device Flags: • Updatable
│ • Supported on remote server
│
├─Unifying Receiver (RQR12) Device Update:
│ New version: RQR12.10_B0032
│ Remote ID: lvfs
│ Summary: Firmware for the Logitech Unifying Receiver (RQR12.xx)
│ License: Proprietary
│ Size: 56.8 kB
│ Vendor: Logitech
│ Duration: 30 seconds
│ Flags: is-upgrade
│ Description: This release addresses an encrypted keystroke injection vulnerability sent by pointing devices. The vulnerability is complex to replicate and would require a hacker to be physically close to a target.
│
│ A few of Logitech's devices used to send select buttons in an unencrypted way, and in an effort to protect against this vulnerability, Logitech removed the feature. Affected hardware is:
│
│ • Wireless Mouse M335
│ • Zone Touch Mouse T400
│ • Wireless Mouse M545
│ • Wireless Mouse M560
│ • Touch Mouse M600
│ • Touch Mouse T620
│ • Wireless Rechargeable Touchpad T650
│
│ Although Logitech does not recommend it, these features may be re-activated by keeping/downgrading the receiver to an older firmware.
│
└─Unifying Receiver (RQR12) Device Update:
New version: RQR12.08_B0030
Remote ID: lvfs
Summary: Firmware for the Logitech Unifying Receiver (RQR12.xx)
License: Proprietary
Size: 72.7 kB
Vendor: Logitech
Duration: 30 seconds
Flags: is-upgrade
Description: This release addresses an encrypted keystroke injection issue known as Bastille security issue #13. The vulnerability is complex to replicate and would require a hacker to be physically close to a target.
A few of Logitech's devices used to send select buttons in an unencrypted way, and in an effort to protect against this vulnerability, Logitech removed the feature. Affected hardware is:
• Wireless Mouse M335
• Zone Touch Mouse T400
• Wireless Mouse M545
• Wireless Mouse M560
• Touch Mouse M600
• Touch Mouse T620
• Wireless Rechargeable Touchpad T650
Although Logitech does not recommend it, these features may be re-activated by keeping/downgrading the receiver to an older firmware.
B450M DS3H
│
└─Unifying Receiver:
│ Device ID: cf3685ba249d3d98602047341d6f5a5556a6ac05
│ Summary: A miniaturised USB wireless receiver
│ Current version: RQR12.07_B0029
│ Bootloader Version: BOT01.02_B0014
│ Vendor: Logitech, Inc. (USB:0x046D)
│ Install Duration: 30 seconds
│ GUIDs: 9d131a0c-a606-580f-8eda-80587250b8d6
│ fcf55bf5-767b-51ce-9c17-f6f538c4ee9f
│ 279ed287-3607-549e-bacc-f873bb9838c4
│ Device Flags: • Updatable
│ • Supported on remote server
│
├─Unifying Receiver (RQR12) Device Update:
│ New version: RQR12.10_B0032
│ Remote ID: lvfs
│ Summary: Firmware for the Logitech Unifying Receiver (RQR12.xx)
│ License: Proprietary
│ Size: 56.8 kB
│ Vendor: Logitech
│ Duration: 30 seconds
│ Flags: is-upgrade
│ Description: This release addresses an encrypted keystroke injection vulnerability sent by pointing devices. The vulnerability is complex to replicate and would require a hacker to be physically close to a target.
│
│ A few of Logitech's devices used to send select buttons in an unencrypted way, and in an effort to protect against this vulnerability, Logitech removed the feature. Affected hardware is:
│
│ • Wireless Mouse M335
│ • Zone Touch Mouse T400
│ • Wireless Mouse M545
│ • Wireless Mouse M560
│ • Touch Mouse M600
│ • Touch Mouse T620
│ • Wireless Rechargeable Touchpad T650
│
│ Although Logitech does not recommend it, these features may be re-activated by keeping/downgrading the receiver to an older firmware.
│
└─Unifying Receiver (RQR12) Device Update:
New version: RQR12.08_B0030
Remote ID: lvfs
Summary: Firmware for the Logitech Unifying Receiver (RQR12.xx)
License: Proprietary
Size: 72.7 kB
Vendor: Logitech
Duration: 30 seconds
Flags: is-upgrade
Description: This release addresses an encrypted keystroke injection issue known as Bastille security issue #13. The vulnerability is complex to replicate and would require a hacker to be physically close to a target.
A few of Logitech's devices used to send select buttons in an unencrypted way, and in an effort to protect against this vulnerability, Logitech removed the feature. Affected hardware is:
• Wireless Mouse M335
• Zone Touch Mouse T400
• Wireless Mouse M545
• Wireless Mouse M560
• Touch Mouse M600
• Touch Mouse T620
• Wireless Rechargeable Touchpad T650
Although Logitech does not recommend it, these features may be re-activated by keeping/downgrading the receiver to an older firmware.
B450M DS3H
│
└─Unifying Receiver:
│ Device ID: cf3685ba249d3d98602047341d6f5a5556a6ac05
│ Summary: A miniaturised USB wireless receiver
│ Current version: RQR12.07_B0029
│ Bootloader Version: BOT01.02_B0014
│ Vendor: Logitech, Inc. (USB:0x046D)
│ Install Duration: 30 seconds
│ GUIDs: 9d131a0c-a606-580f-8eda-80587250b8d6
│ fcf55bf5-767b-51ce-9c17-f6f538c4ee9f
│ 279ed287-3607-549e-bacc-f873bb9838c4
│ Device Flags: • Updatable
│ • Supported on remote server
│
├─Unifying Receiver (RQR12) Device Update:
│ New version: RQR12.10_B0032
│ Remote ID: lvfs
│ Summary: Firmware for the Logitech Unifying Receiver (RQR12.xx)
│ License: Proprietary
│ Size: 56.8 kB
│ Vendor: Logitech
│ Duration: 30 seconds
│ Flags: is-upgrade
│ Description: This release addresses an encrypted keystroke injection vulnerability sent by pointing devices. The vulnerability is complex to replicate and would require a hacker to be physically close to a target.
│
│ A few of Logitech's devices used to send select buttons in an unencrypted way, and in an effort to protect against this vulnerability, Logitech removed the feature. Affected hardware is:
│
│ • Wireless Mouse M335
│ • Zone Touch Mouse T400
│ • Wireless Mouse M545
│ • Wireless Mouse M560
│ • Touch Mouse M600
│ • Touch Mouse T620
│ • Wireless Rechargeable Touchpad T650
│
│ Although Logitech does not recommend it, these features may be re-activated by keeping/downgrading the receiver to an older firmware.
│
└─Unifying Receiver (RQR12) Device Update:
New version: RQR12.08_B0030
Remote ID: lvfs
Summary: Firmware for the Logitech Unifying Receiver (RQR12.xx)
License: Proprietary
Size: 72.7 kB
Vendor: Logitech
Duration: 30 seconds
Flags: is-upgrade
Description: This release addresses an encrypted keystroke injection issue known as Bastille security issue #13. The vulnerability is complex to replicate and would require a hacker to be physically close to a target.
A few of Logitech's devices used to send select buttons in an unencrypted way, and in an effort to protect against this vulnerability, Logitech removed the feature. Affected hardware is:
• Wireless Mouse M335
• Zone Touch Mouse T400
• Wireless Mouse M545
• Wireless Mouse M560
• Touch Mouse M600
• Touch Mouse T620
• Wireless Rechargeable Touchpad T650
Although Logitech does not recommend it, these features may be re-activated by keeping/downgrading the receiver to an older firmware.
ProblemType: Bug
DistroRelease: Ubuntu 20.04
Package: fwupd 1.3.5-1
Uname: Linux 5.4.5-050405-generic x86_64
NonfreeKernelModules: nvidia_modeset nvidia
ApportVersion: 2.20.11-0ubuntu15
Architecture: amd64
Date: Fri Jan 10 08:32:23 2020
InstallationDate: Installed on 2019-05-07 (247 days ago)
InstallationMedia: Ubuntu 18.04.2 LTS "Bionic Beaver" - Release amd64 (20190210)
SourcePackage: fwupd
UpgradeStatus: Upgraded to focal on 2019-11-15 (55 days ago)
** Affects: fwupd (Ubuntu)
Importance: Undecided
Status: New
** Tags: amd64 apport-bug focal
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to fwupd in Ubuntu.
https://bugs.launchpad.net/bugs/1859180
Title:
Uninformative, repetitive and extremely long MOTD message
Status in fwupd package in Ubuntu:
New
Bug description:
I just SSH'd into my desktop, and was greeted with an additional _182_
lines of MOTD output thanks to fwupd (this content is in
/run/private/motd.d/85-fwupd, which is how I know fwupd is at fault).
There are a few problems here:
* The same content appears to be repeated 3 times
* It has no indication of what this tree output is, you just have to guess that it's to do with firmware updates
* The tree output itself is very wasteful of vertical space; it take 3 lines to give me the name of my device, and ~20 before I can work out that this is even describing updates
* It has no call to action; I have no idea how I would apply these updates to my system
I've included my full MOTD to demonstrate just how bad this looks:
Welcome to Ubuntu Focal Fossa (development branch) (GNU/Linux
5.4.5-050405-generic x86_64)
* Documentation: https://help.ubuntu.com
* Management: https://landscape.canonical.com
* Support: https://ubuntu.com/advantage
* Overheard at KubeCon: "microk8s.status just blew my mind".
https://microk8s.io/docs/commands#microk8s.status
B450M DS3H
│
└─Unifying Receiver:
│ Device ID: cf3685ba249d3d98602047341d6f5a5556a6ac05
│ Summary: A miniaturised USB wireless receiver
│ Current version: RQR12.07_B0029
│ Bootloader Version: BOT01.02_B0014
│ Vendor: Logitech, Inc. (USB:0x046D)
│ Install Duration: 30 seconds
│ GUIDs: 9d131a0c-a606-580f-8eda-80587250b8d6
│ fcf55bf5-767b-51ce-9c17-f6f538c4ee9f
│ 279ed287-3607-549e-bacc-f873bb9838c4
│ Device Flags: • Updatable
│ • Supported on remote server
│
├─Unifying Receiver (RQR12) Device Update:
│ New version: RQR12.10_B0032
│ Remote ID: lvfs
│ Summary: Firmware for the Logitech Unifying Receiver (RQR12.xx)
│ License: Proprietary
│ Size: 56.8 kB
│ Vendor: Logitech
│ Duration: 30 seconds
│ Flags: is-upgrade
│ Description: This release addresses an encrypted keystroke injection vulnerability sent by pointing devices. The vulnerability is complex to replicate and would require a hacker to be physically close to a target.
│
│ A few of Logitech's devices used to send select buttons in an unencrypted way, and in an effort to protect against this vulnerability, Logitech removed the feature. Affected hardware is:
│
│ • Wireless Mouse M335
│ • Zone Touch Mouse T400
│ • Wireless Mouse M545
│ • Wireless Mouse M560
│ • Touch Mouse M600
│ • Touch Mouse T620
│ • Wireless Rechargeable Touchpad T650
│
│ Although Logitech does not recommend it, these features may be re-activated by keeping/downgrading the receiver to an older firmware.
│
└─Unifying Receiver (RQR12) Device Update:
New version: RQR12.08_B0030
Remote ID: lvfs
Summary: Firmware for the Logitech Unifying Receiver (RQR12.xx)
License: Proprietary
Size: 72.7 kB
Vendor: Logitech
Duration: 30 seconds
Flags: is-upgrade
Description: This release addresses an encrypted keystroke injection issue known as Bastille security issue #13. The vulnerability is complex to replicate and would require a hacker to be physically close to a target.
A few of Logitech's devices used to send select buttons in an unencrypted way, and in an effort to protect against this vulnerability, Logitech removed the feature. Affected hardware is:
• Wireless Mouse M335
• Zone Touch Mouse T400
• Wireless Mouse M545
• Wireless Mouse M560
• Touch Mouse M600
• Touch Mouse T620
• Wireless Rechargeable Touchpad T650
Although Logitech does not recommend it, these features may be re-activated by keeping/downgrading the receiver to an older firmware.
B450M DS3H
│
└─Unifying Receiver:
│ Device ID: cf3685ba249d3d98602047341d6f5a5556a6ac05
│ Summary: A miniaturised USB wireless receiver
│ Current version: RQR12.07_B0029
│ Bootloader Version: BOT01.02_B0014
│ Vendor: Logitech, Inc. (USB:0x046D)
│ Install Duration: 30 seconds
│ GUIDs: 9d131a0c-a606-580f-8eda-80587250b8d6
│ fcf55bf5-767b-51ce-9c17-f6f538c4ee9f
│ 279ed287-3607-549e-bacc-f873bb9838c4
│ Device Flags: • Updatable
│ • Supported on remote server
│
├─Unifying Receiver (RQR12) Device Update:
│ New version: RQR12.10_B0032
│ Remote ID: lvfs
│ Summary: Firmware for the Logitech Unifying Receiver (RQR12.xx)
│ License: Proprietary
│ Size: 56.8 kB
│ Vendor: Logitech
│ Duration: 30 seconds
│ Flags: is-upgrade
│ Description: This release addresses an encrypted keystroke injection vulnerability sent by pointing devices. The vulnerability is complex to replicate and would require a hacker to be physically close to a target.
│
│ A few of Logitech's devices used to send select buttons in an unencrypted way, and in an effort to protect against this vulnerability, Logitech removed the feature. Affected hardware is:
│
│ • Wireless Mouse M335
│ • Zone Touch Mouse T400
│ • Wireless Mouse M545
│ • Wireless Mouse M560
│ • Touch Mouse M600
│ • Touch Mouse T620
│ • Wireless Rechargeable Touchpad T650
│
│ Although Logitech does not recommend it, these features may be re-activated by keeping/downgrading the receiver to an older firmware.
│
└─Unifying Receiver (RQR12) Device Update:
New version: RQR12.08_B0030
Remote ID: lvfs
Summary: Firmware for the Logitech Unifying Receiver (RQR12.xx)
License: Proprietary
Size: 72.7 kB
Vendor: Logitech
Duration: 30 seconds
Flags: is-upgrade
Description: This release addresses an encrypted keystroke injection issue known as Bastille security issue #13. The vulnerability is complex to replicate and would require a hacker to be physically close to a target.
A few of Logitech's devices used to send select buttons in an unencrypted way, and in an effort to protect against this vulnerability, Logitech removed the feature. Affected hardware is:
• Wireless Mouse M335
• Zone Touch Mouse T400
• Wireless Mouse M545
• Wireless Mouse M560
• Touch Mouse M600
• Touch Mouse T620
• Wireless Rechargeable Touchpad T650
Although Logitech does not recommend it, these features may be re-activated by keeping/downgrading the receiver to an older firmware.
B450M DS3H
│
└─Unifying Receiver:
│ Device ID: cf3685ba249d3d98602047341d6f5a5556a6ac05
│ Summary: A miniaturised USB wireless receiver
│ Current version: RQR12.07_B0029
│ Bootloader Version: BOT01.02_B0014
│ Vendor: Logitech, Inc. (USB:0x046D)
│ Install Duration: 30 seconds
│ GUIDs: 9d131a0c-a606-580f-8eda-80587250b8d6
│ fcf55bf5-767b-51ce-9c17-f6f538c4ee9f
│ 279ed287-3607-549e-bacc-f873bb9838c4
│ Device Flags: • Updatable
│ • Supported on remote server
│
├─Unifying Receiver (RQR12) Device Update:
│ New version: RQR12.10_B0032
│ Remote ID: lvfs
│ Summary: Firmware for the Logitech Unifying Receiver (RQR12.xx)
│ License: Proprietary
│ Size: 56.8 kB
│ Vendor: Logitech
│ Duration: 30 seconds
│ Flags: is-upgrade
│ Description: This release addresses an encrypted keystroke injection vulnerability sent by pointing devices. The vulnerability is complex to replicate and would require a hacker to be physically close to a target.
│
│ A few of Logitech's devices used to send select buttons in an unencrypted way, and in an effort to protect against this vulnerability, Logitech removed the feature. Affected hardware is:
│
│ • Wireless Mouse M335
│ • Zone Touch Mouse T400
│ • Wireless Mouse M545
│ • Wireless Mouse M560
│ • Touch Mouse M600
│ • Touch Mouse T620
│ • Wireless Rechargeable Touchpad T650
│
│ Although Logitech does not recommend it, these features may be re-activated by keeping/downgrading the receiver to an older firmware.
│
└─Unifying Receiver (RQR12) Device Update:
New version: RQR12.08_B0030
Remote ID: lvfs
Summary: Firmware for the Logitech Unifying Receiver (RQR12.xx)
License: Proprietary
Size: 72.7 kB
Vendor: Logitech
Duration: 30 seconds
Flags: is-upgrade
Description: This release addresses an encrypted keystroke injection issue known as Bastille security issue #13. The vulnerability is complex to replicate and would require a hacker to be physically close to a target.
A few of Logitech's devices used to send select buttons in an unencrypted way, and in an effort to protect against this vulnerability, Logitech removed the feature. Affected hardware is:
• Wireless Mouse M335
• Zone Touch Mouse T400
• Wireless Mouse M545
• Wireless Mouse M560
• Touch Mouse M600
• Touch Mouse T620
• Wireless Rechargeable Touchpad T650
Although Logitech does not recommend it, these features may be re-activated by keeping/downgrading the receiver to an older firmware.
ProblemType: Bug
DistroRelease: Ubuntu 20.04
Package: fwupd 1.3.5-1
Uname: Linux 5.4.5-050405-generic x86_64
NonfreeKernelModules: nvidia_modeset nvidia
ApportVersion: 2.20.11-0ubuntu15
Architecture: amd64
Date: Fri Jan 10 08:32:23 2020
InstallationDate: Installed on 2019-05-07 (247 days ago)
InstallationMedia: Ubuntu 18.04.2 LTS "Bionic Beaver" - Release amd64 (20190210)
SourcePackage: fwupd
UpgradeStatus: Upgraded to focal on 2019-11-15 (55 days ago)
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/fwupd/+bug/1859180/+subscriptions
More information about the foundations-bugs
mailing list