Berkeley CSUA MOTD:Entry 22120
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/05/25 [General] UID:1000 Activity:popular
5/25    

2001/8/15-16 [Computer/Networking, Computer/SW/OS/Windows] UID:22120 Activity:nil
8/14    Could someone please repost the link to that article about the
        TCP/MS theory and how M$ is going to take over the internet?
        What were people's thoughts on this?
        \_ I found the link in a motd archive... still really curious to
           hear others' thoughts on it though.
           http://www.pbs.org/cringely/pulpit/pulpit20010802.html
        \_ Cringely was just reiterating stuff from Gibson.
           http://grc.com/dos/intro.htm
           http://grc.com/dos/sockettome.htm
2025/05/25 [General] UID:1000 Activity:popular
5/25    

You may also be interested in these entries...
2009/11/4-17 [Computer/SW/P2P, Computer/Networking, Computer/SW/Security] UID:53495 Activity:nil
11/4    Holy cow, I got a warning from my ISP that they were notified
        by BSA/baytsp.com that I was copying music/video/software.
        Do they do port scan or something? That's a first for me.
        \_ They hang out on P2P networks and track IP addresses.  -tom
           \_ I believe they are paid by content providers to perform this
              monitoring service, so you should only run this risk with content
	...
2008/11/7-13 [Computer/Networking] UID:51876 Activity:low
11/7    Need help on http proxy. After I VPN to work, I'd like to tunnel
        all the traffic to my machine. How do I setup my machine (Linux)
        as a proxy server so that my home computers can route through it?
        I'm asking because the site we're testing on requires that we
        come from the same IP. If I use VPN, the server will reject me
        based on the fact that it's a different IP than my work Linux.
	...
2008/8/5-10 [Computer/Networking] UID:50788 Activity:nil
8/5     It looks like my company has started blocking HTTPS tunneling.
        I used to do this by tunneling SSH through the HTTP/HTTPS proxy
        server, but this seems to have stopped working. Does anyone know
        how the implementation of tunneling detection works, and whether
        there are widely available implementations? We run a bunch of MS
        stuff, so I imagine we're running an MS proxy server or something.
	...
2007/6/28-7/2 [Computer/Networking] UID:47104 Activity:nil
6/28    what?
        We are deeply, deeply sorry to say that due to licensing constraints,
        we can no longer allow access to Pandora for most listeners located
        outside of the U.S. We will continue to work diligently to realize
        the vision of a truly global Pandora, but for the time being we are
        required to restrict its use. We are very sad to have to do this, but
	...
2006/2/18-23 [Computer/Networking] UID:41923 Activity:low
2/18    My DSL modem's ip address is 192.168.0.1, my internal network
        behind my router is 10.0.0.x. Is there a way I can configure
        the router so I can access the DSL modem from my 10.0.0.x
        network directly without re-wiring? Static routes? I tried it
        but no much luck. I also tried changing my internal network to
        192.168.0.x, but still does not work. Thanks.
	...
2006/1/22-24 [Computer/Networking] UID:41477 Activity:nil
1/21    I am trying to setup a small network for my girlfriend's
        mom's company.  They just bought an accounting package
        which requires windows 2003 server.  And they want internet
        access from each computer.  How should the network be setuped?
        Would it be dumb to use static IP for each computer and a
        computer as internet gateway?
	...
2005/8/29-30 [Computer/Networking] UID:39329 Activity:moderate 54%like:37400
8/29    What's the difference between a hub, a switch and a router?  Thx.
        \_ AFAIK, probably be corrected by someone:
           hub: Allows communication on a LAN with bandwith shared amongs all
                the nodes on the hub and maxing out at the max line speed.
           switch: Allows communication on a LAN with bandwith greater than
                the max line speed (point to point)
	...
2005/6/2-3 [Computer/Networking] UID:37941 Activity:moderate
6/2     I've been to many places and almost every place I go to have
        802.11b/g. However, almost all of them have protected access,
        which I presume they use because they don't want people stealing
        their bandwidth. So here is one idea I think will really
        revolutionize 802.11X... an option in the router that allows you to
        specify the percentage of unprotected bandwidth you are willing to
	...
2005/2/25-27 [Computer/Networking] UID:36421 Activity:moderate
2/25    What is the smallest (physical and price) cisco router that can
        handle BGP?  It should be able to have more than 256 ram.
        \_ When you say ``handle BGP'', do you mean supports the bgp
           protocol or supports enough ram to keep a reasonable (what do you
           consider to be reasonable) number of routes in memory?  Do you want
           to be peering at PAIX, or do you just need a router to run the T1
	...
2005/1/13-14 [Computer/Networking] UID:35697 Activity:high
1/13    I need help fixing someone's Win2K box.  Setup:  Win2K box -> D-Link
        router -> DSL modem.  The Win2K box cannot obtain a DHCP address
        (other computers can).  So, I assign a static IP, and set the default
        gateway and DNS server to be the D-Link router.  After this, the Win2K
        box can access web pages on the Internet as long as you specify the
        web site IP address directly -- but DNS doesn't work.  Computer used
	...
2005/1/10-11 [Computer/SW/OS/VM] UID:35635 Activity:kinda low
1/10    VMware question for VMware gurus only. I've installed a WinXPsp1
        on top of WinXPsp2. How do you do the followings:
        1) transfer data between the two machines? I've tried mounting
           raw partition from WinXPsp1 but when I disable write, it
           doesn't boot up anymore (WinXP insists on writing)
        2) communicate between the two machines? I can ping WinXPsp1
	...
2003/2/6-7 [Computer/SW/OS/Windows] UID:27326 Activity:kinda low
2/6     Can somebody tell me about installing/upgrading to WinXP?
        I deal with MS as little as possible but it's for a friend who
        refuses any alternative.  There are 2 computers, both w/ Win98.
        I want to do a clean install on both-- will XP let me use
        any old Win98 product key to install, and will it let me reformat
        beforehand?  I'm not sure he has his old keys.  Thanks
	...
2002/1/21 [Computer/SW/OS/Windows] UID:23612 Activity:insanely high
1/20    Is there some way to minimize all the open windows in XP (like in
        Win2k or Win98, with that button?)
        \_ Have you tried the <Windows key>-M chord? This has worked on
           95/98/NT4/2k, and is probably still working in XP. -alexf
           \_ What is this "Windows key"?  Is that for people who bought one
              of those lame keyboards that has "Internet" and "email" keys?
	...
2001/5/22-23 [Computer/SW/OS/Windows] UID:21317 Activity:very high
5/21    Is it worth buying a new wintel PC right now or should I wait until
        the Pentium4/Athlon prices drop more? I looking into buying a 1GHz
        Pentium3 or similar system, I just went and configured a Dell Dimension
        with 933MHz CPU, 256MB RAM (SDRAM) 32MB GeForce2. No monitor, with
        RedHat Linux, no windows. Came out at like $985
        \_ Sounds about right, you can probably save $100 or $200 if you
	...
Cache (8192 bytes)
www.pbs.org/cringely/pulpit/pulpit20010802.html
AUGUST 2, 2001 The Death of TCP/IP Why the Age of Internet Innocence is Over By Robert X. Cringely As events of the last several weeks have shown, Microsoft Windows, e-mail and the Internet create the perfect breeding ground for virus attacks. They don't even have to exploit Windows flaws to be effective. Any Visual BASIC programmer with a good understanding of how Windows works can write a virus. All that is needed is a cleverly titled file attachment payload, and almost anyone can be induced to open it, spreading the contagion. It is too darned easy to create these programs that can do billions in damage. The only sure way to fix the problem is to re-stripe the playing field, to change the game to one with all new rules. Some might argue that such a rule change calls for the elimination of Microsoft software, but that simply isn't likely to happen. It's true that Linux and Apache are generally safer than Windows 2000 and IIS, but Microsoft products aren't going to go away. I promised you an answer to how to secure the Internet, and I mean to come through. First, we'll start with the way I would do it, then follow with a rumor I have heard about one way Microsoft might want to do it. If it were not for Microsoft's carefully worded user license agreement, which holds the company blameless for absolutely anything, they would probably have been awash in class action lawsuits by now. Of course, it is not as though Microsoft intended things to be this way. But you must understand that Microsoft limits its investments to things that will enhance a product's market share. While it is true that virus authors will target platforms that give them the most bang for their programming buck, the Windows platform has virtually no security to even slow them down. I believe the lack of security in Microsoft software was a deliberate business decision. Alas, things are only likely to get worse in the near term. So far, we've been lucky in that most virus authors have been impatient and want to see the immediate effects of their work. It is far more effective to be patient and let the virus spread quietly for months. If the virus does nothing, the defense against it will be slow and/or too late. If the virus does very little on one's PC (for awhile), it won't be discovered easily. I won't go into specifics for obvious reasons, but if you think about how virus detection software works, it isn't hard to trip it up. Even if 98 percent of the world's computers had current anti-virus software (which they don't), the remaining two percent would still be millions of devices capable of bringing down the entire Internet if infected. And now, we have the impending release of Windows XP, and its problem of raw TCP/IP socket exposure. As I detailed two weeks ago, XP is the first home version of Windows to allow complete access to TCP/IP sockets, which can be exploited by viruses to do all sorts of damage. Windows XP uses essentially the same TCP/IP software as Windows 2000, except that XP lacks 2000's higher-level security features. In order to be backward compatible with applications written for Windows 95, 98, and ME, Windows XP allows any application full access to raw sockets. What is wrong with telling application developers, "Your application can't have access to raw sockets," or, "When XP ships you need to have a non-raw socket version ready for your customers," or, "If your application needs to access raw sockets, these are the security rules and interfaces you will have to use"? The bottom line is that Microsoft's choice to provide access to raw sockets was based on the market share litmus test, period. Unless this feature is changed before XP is released, it will mean that millions of new computers will be manufactured as perfect little virus machines. Virus authors who are anticipating these new PCs will be able to pre-position their digital vermin to take advantage of the socket flaw as the new machines appear. The result is that, in all likelihood, there will be massive data security problems, as well as massive damage to files and property, all as a result of Windows XP. But as consumers, guess what--we won't even get a choice. Microsoft will require the PC makers to install XP in the factory. It will come on your PC, and you won't have the choice or option to pick something different. When Microsoft issues a new OS, it is forced into the market. We could implement a secure user identity system precisely like telephone Caller ID. People wouldn't be forced to participate, but if they remain anonymous, I might choose to block them. I know you hate this idea, but I think the Internet needs a fingerprint. It does not have to have personal information, but if you break the law it can be traced to you. You can choose not to have a fingerprint, but then your ability to communicate with others may be limited--a price many people may choose to pay. I am not opposed to people being anonymous--just to anonymous people receiving public assistance. Send all the anonymous love or hate mail you like, but don't expect to attach a file. The new model will not run attachments as they do today. E-mail attachments should not have access to the e-mail client, APIs, etc. Attachments should not have access to the operating system by default. The user should approve the use of some APIs, like having to give permission before device drivers are updated. Any application that wants to send bits onto the Internet must first be permitted to do so. Applications would be registered to send outgoing traffic. You would register your e-mail program as the only application that could talk SMTP, POP3, etc. If Microsoft Word wanted to send an e-mail, your e-mail program would pop up, ask you to authenticate yourself and explicitly send the message. At that point, you would be in complete control of what was happening on your PC. For mail-enabled applications, there would be an application user account registered on the post office. The account would be unique, and registered to a unique application. If kids want to install an Internet game, the game's IP port would be registered and permitted to operate, hopefully by the parent. If kids wanted to install an Internet chat program, too bad--it wouldn't work if Dad didn't want it to work. By default, under this scenario, your PC becomes a TCP/IP read-only device. By running applications like Gibson's Zone Alarm you can--right now--severely limit the use of TCP/IP by applications on your PC. So rather than ripping the protocol stack wide open, let's do the exact opposite. The only e-mail activity on my PC should be initiated by me, personally. Nothing else should access my address book or send out messages without my express permission. The story came to me from people I have come to trust, and I have looked into it closely enough to think it might have some validity. But for the sake of keeping lawyers off my back, let's just call it a rumor, and only use it as a basis for discussion. To be perfectly clear, I am not claiming that the following is true--just that I have heard it from more than one source,and think it accurately characterizes some past behaviors of Microsoft. Perhaps by bringing it into the light, we can insure that Redmond takes a more thoughtful course. Programmers who ought to be familiar with Microsoft's plans have suggested that the real motive for raw socket support is for Microsoft to use Windows XP to exploit a bad situation, to deliberately make things worse. According to these programmers, Microsoft wants to replace TCP/IP with a proprietary protocol--a protocol owned by Microsoft--that it will tout as being more secure. Actually, the new protocol would likely be TCP/IP with some of the reserved fields used as pointers to proprietary extensions, quite similar to Vines IP, if you remember that product from Banyan Systems. First, make the old one unworkable by placing millions of exploitable TCP/IP stacks out on the Net, ready-to-use by any teenage sociopath. When the Net slows or crashes, the blame would not be assigned to Microsoft. Then ship the new protocol with every new copy of Windows, and install it with eve...
Cache (1704 bytes)
grc.com/dos/intro.htm
But by listening to their responses to my arguments, I discovered that Microsoft does not understand Security. According to The Register, Scott spent most of the time laughing about these issues. As you will see from my analysis, he also introduced a lot of spin. If you feel strongly about this issue -- either way -- you might consider helping Microsoft formulate their plans by sharing your feelings. As packets of Internet data move across the globe, the responsibility for each packet's delivery is distributed at every point along its path. Local failures are tolerated by a system designed to distribute this responsibility. But just as the responsibility for the delivery of data is distributed throughout every layer of the Internet, so the responsibility for the prevention of deliberate abuse of this system is distributed throughout every layer. Suggestions have been made that I am wrong to focus upon the conduct of individual users and their Internet-connected machines -- especially the future risks associated with Windows XP. Detractors argue that, rather, it is the internet's communication providers, our ISP's, who bear the responsibility for carrying malicious traffic that could be easily detected and blocked. Unfortunately, today we see only the operation of blind self-interest from Microsoft and the Internet's ISP's This must change before the Internet can become a sufficiently safe and secure network upon which we can collectively build a solid future. The contents of this page are Copyright 2003 Gibson Research Corporation. Spinrite, ShieldsUP, NanoProbe, and the slogan "It's MY Computer" are registered trademarks of Gibson Research Corporation, Laguna Hills, CA, USA.
Cache (2553 bytes)
grc.com/dos/sockettome.htm
Please take a look at this page containing excerpts from Microsoft's own current web pages explaining how all access to raw sockets is deliberately restricted to administrative users. It is clear that raw sockets are not necessary for typical personal computer users, and that Microsoft themselves never intended common users to have them. This is in keeping with traditional industry-wide support for the Berkeley raw socket interface. Berkeley 20 years ago, were not a security risk for users, for systems, and for the Internet, then WHY has this interface always been restricted from casual use everywhere it has ever appeared? I have NO PROBLEM with RESTRICTED access to the raw socket interface, and no problem with the SYSTEM having access to the interface. That is traditionally what has always been done on Unix, Linux, and similar systems and, as we have seen on Microsoft's own pages, in Windows. But HERE is what has suddenly changed: Under the Home Edition of Windows XP, ALL users are Administrators by default. Microsoft's reasons for doing this are clear, reasonable, and understandable: Many Windows 9x/ME legacy applications would fail to operate within an environment that suddenly imposes security restrictions. Microsoft's solution to this for Windows XP has been to run all users in the system as administrators. I have only one (now famous) concern about Microsoft's decision to default all users to full administrative privilege: As a result, the deliberately restricted raw socket interface has become available to ALL system users. Microsoft's own documentation, the Berkeley raw socket interface was NEVER intended to be unprotected and globally available for abuse in this fashion. This is why it has always required "root" or administrative-level access. But an unfortunate side effect of Microsoft's need to elevate everyone to administrative privilege is that raw sockets have become globally available. Since NO USERS -- administrative or otherwise -- have ANY practical need for raw sockets, ALL I ASK is that Microsoft restrict raw socket access to the SYSTEM, so that traditional safeguards against raw socket abuse will be retained. Consumer versions of Windows have never had full raw socket access. So not one of the hundreds of malicious Trojans or Zombie/Bots floating around the Internet employs the more potent raw socket attacks. But, if future versions of Windows freely permit raw socket access, a new era of Internet exploitation will begin. This is such a simple argument, and such a simple issue to repair.