Berkeley CSUA MOTD:2001:August:19 Sunday <Saturday, Monday>
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2001/8/19-22 [Computer/SW/Languages/Java, Computer/SW/Mail] UID:22168 Activity:high
8/18    I stole the jar for the MindTerm Java SSH client off Soda a
        long time ago and it has always worked fine.  Now, out of the
        blue i'm getting the mesg.:
        "Found prieinstalled 'known_hosts' file.

        Error connecting to http://me.net, reason:
        -> -l

        I have NOT changed the server key and there is no file on the
        client called "known_hosts"  Someone please tell me where the
        java ssh client keeps it's known host_file or speculate on
        what might be wrong.
        \_ You are the weakest link... goodbye.
        \_ Just a crazy guess here: did you add a file named "known_hosts"
           to your system lately?
            \_ there is NO file on the client called "known_hosts". There are
               no new known_hosts files on the server.
               Both clients that fail are running win2k recently updated to
               SP2.  A new install of netscape on the same machine works AND
               the same iexplorer that fails to <DEAD>my.net<DEAD> WORKS on SODA! It is
               the same damn code!  Unless the java ssh client has a "known_
               hosts" file that it is called something else on the client, and
               which has a corrupted entry for <DEAD>my.net<DEAD>, and which is different
               for iexplorer and netscape, i can't think of where to look.
               \_ Its a windows box, have you tried looking in the registry
                  yet?
        \_ Get a real operating system.
2001/8/19 [Uncategorized] UID:22169 Activity:nil
8/18    Looking for contractor(s) to design and setup
        e-commerce site for martial arts studio.
        Email me for more information.  --sony
2001/8/19 [Uncategorized] UID:22170 Activity:high
8/18    christopher reed will die within the year.
                        \_ reeve, you idiot
        \_ Who is that and why should we care?
        \_ Do you mean "Reeve", as in Superman?
        \_ but where are the h07 42N ch1x?
           \_ that's H0T 42N CH1X0R to you
                                \_ pixP
2001/8/19 [Reference/Military] UID:22171 Activity:nil
8/19    The truth about the Second Amendment
        http://www.FreeRepublic.com/forum/a3b7f78c351b6.htm
2001/8/19 [Science/Electric, Reference/Military] UID:22172 Activity:nil
8/20    Electromagnetic tank armor
        http://www.freerepublic.com/forum/a3b7f55073fe9.htm
2001/8/19 [Computer/Theory, Uncategorized/Spanish] UID:22173 Activity:nil
8/20    I'm having a hard time figuring out some of the math behind
        diffe-hellman. The "key", pardon the pun, to the security of
        dh seems to be is that calculating g**(x*y) mod n is hard
        for an attacker.  Say x and y are small, less than 1024,
        couldn't an attacker just precompute all possible K (and K')
        based on n and g and then do a table lookup based on the X
        and Y values that are exchanged to get K (or K')?
        It seems to me that you need to make x and y quite large to
        have any sort of confidence that K and K' are secure. BUT,
        a large x and y means the compute time per key exchange is
        exteremely long. What are commonly used upper bounds on x
        and y?
        Sorry, if my questions are exteremely simple, I don't have
        a good handle on this material yet.
2001/8/19 [Computer/SW/Unix, Academia/Berkeley/CSUA/Troll] UID:22174 Activity:nil
8/19    [ Censoring trolls are the worst.  -- stupid troll deletion daemon ]
2001/8/19 [Computer/SW/Security, Computer/SW/Virus] UID:22175 Activity:high
8/19    Hi Dr Nick! -
   http://www.computersecuritynow.com/article.php?sid=36&mode=thread&order=0
        \_ I got tape worm...
2001/8/19-20 [Computer/SW/Security, Computer/SW/OS] UID:22176 Activity:high
8/19    Is this normal behavior:
        soda:~>dmesg | more
        <DEAD>kofthewest.com<DEAD>, AF_INET) failed
        pid 33773 (a.out), uid 1216: exited on signal 11 (core dumped)
        \_ as of: Sun Aug 19 20:42:43 PDT 2001
           it is now saying:
           soda:~>dmesg | more
           : getaddrinfo(209-76-220-17.bankofthewest.com, AF_INET) failed
           pid 33773 (a.out), uid 1216: exited on signal 11 (core dumped)
           pid 24745 (trn), uid 30148: exited on signal 6
        any ideas?
        \_ seems like the kernel message buffer got set really low.
        \_ I think some hackers from bankofthewest have gotten into
           your kernel. REBOOT IMMEDIATELY!
        \_ pid 9236 (sshd), uid 0: exited on signal 11 (core dumped)
           WTF is sshd dumping core?
Berkeley CSUA MOTD:2001:August:19 Sunday <Saturday, Monday>