Berkeley CSUA MOTD:Entry 37017
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/05/24 [General] UID:1000 Activity:popular
5/24    

2005/4/1-2 [Computer/Networking] UID:37017 Activity:low
4/1     This year's April 1 RFCs:
        ftp://ftp.rfc-editor.org/in-notes/rfc4041.txt
        ftp://ftp.rfc-editor.org/in-notes/rfc4042.txt  -John
        \_ Okay, those are hilarous...in an embarrassingly geeky sort of way.
                                    -mice
           \_ OK here's one for the non-geeks:
              http://csua.org/u/bk3  -John
2025/05/24 [General] UID:1000 Activity:popular
5/24    

You may also be interested in these entries...
2007/6/28-7/2 [Computer/Networking] UID:47104 Activity:nil
6/28    what?
        We are deeply, deeply sorry to say that due to licensing constraints,
        we can no longer allow access to Pandora for most listeners located
        outside of the U.S. We will continue to work diligently to realize
        the vision of a truly global Pandora, but for the time being we are
        required to restrict its use. We are very sad to have to do this, but
	...
2007/4/19-21 [Computer/Networking] UID:46375 Activity:nil
4/19    After installing Logitech wireless mouse, my friend cannot connect from
        his PC to his wireless broadband router via a USB wireless network
        device.  It said that it cannot obtain IP address from the router.  Even
        uninstalling the Logitech wireless mouse doesn't help.  Do you know how
        to fix the wireless LAN problem, so that his PC can obtain IP address
        again?
	...
2006/8/29-31 [Computer/SW/Mail] UID:44187 Activity:kinda low
8/29    What SMTP settings should I be enabling/disabling for soda?  I can
        receive csua mails over IMAP on my treo just fine, but I always
        get relay denied errors when sending outside http://csua.berkeley.edu.
        \_ Dunno the answer, but I have the same problem.  I ended up
           using Gmail's SMTP server.  The only thing is that you'll have
           register your CSUA email account with Gmail so that it'll let
	...
2006/1/22-24 [Computer/Networking] UID:41477 Activity:nil
1/21    I am trying to setup a small network for my girlfriend's
        mom's company.  They just bought an accounting package
        which requires windows 2003 server.  And they want internet
        access from each computer.  How should the network be setuped?
        Would it be dumb to use static IP for each computer and a
        computer as internet gateway?
	...
2005/8/29-30 [Computer/Networking] UID:39329 Activity:moderate 54%like:37400
8/29    What's the difference between a hub, a switch and a router?  Thx.
        \_ AFAIK, probably be corrected by someone:
           hub: Allows communication on a LAN with bandwith shared amongs all
                the nodes on the hub and maxing out at the max line speed.
           switch: Allows communication on a LAN with bandwith greater than
                the max line speed (point to point)
	...
2005/6/2-3 [Computer/Networking] UID:37941 Activity:moderate
6/2     I've been to many places and almost every place I go to have
        802.11b/g. However, almost all of them have protected access,
        which I presume they use because they don't want people stealing
        their bandwidth. So here is one idea I think will really
        revolutionize 802.11X... an option in the router that allows you to
        specify the percentage of unprotected bandwidth you are willing to
	...
2005/2/25-27 [Computer/Networking] UID:36421 Activity:moderate
2/25    What is the smallest (physical and price) cisco router that can
        handle BGP?  It should be able to have more than 256 ram.
        \_ When you say ``handle BGP'', do you mean supports the bgp
           protocol or supports enough ram to keep a reasonable (what do you
           consider to be reasonable) number of routes in memory?  Do you want
           to be peering at PAIX, or do you just need a router to run the T1
	...
2005/1/13-14 [Computer/Networking] UID:35697 Activity:high
1/13    I need help fixing someone's Win2K box.  Setup:  Win2K box -> D-Link
        router -> DSL modem.  The Win2K box cannot obtain a DHCP address
        (other computers can).  So, I assign a static IP, and set the default
        gateway and DNS server to be the D-Link router.  After this, the Win2K
        box can access web pages on the Internet as long as you specify the
        web site IP address directly -- but DNS doesn't work.  Computer used
	...
2005/1/3-5 [Computer/Networking] UID:35531 Activity:kinda low
1/3     So I installed Debian (Sarge) on a home server for various reasons
        (including learning about Apache 2) and have a question:  how do I get
        all the useful information about my machine that I get in Windows with
        ipconfig /all?  And how do I turn DHCP on or off?  Set the host
        name/ip?
        \_ ifconfig, man ifconfig for full details. ifup/ifdown to
	...
2004/12/1-3 [Computer/Networking] UID:35136 Activity:nil
12/1    Anyone ever heard of a VPN service provider, e.g. someone who would
        provide a well-connected endpoint for you to establish an IPsec or CIPE
        VPN connection (over whatever consumer ISP and changing IP addresses
        you have locally)? --karlcz
        \_ I don't think I understand correctly, but you actually want a
           middleman on your supposedly secure channel?
	...
Cache (8192 bytes)
csua.org/u/bk3 -> www.ietf.org/internet-drafts/draft-lohsen-ip-burrito-00.txt
edu IP over Burrito Carriers draft-lohsen-ip-burrito-00 Status of this Memo This memo defines an Experimental Protocol for the Internet community. Discussion and suggestions for improvement are requested. By submitting this Internet-Draft, I certify that any applicable patent or other IPR claims of which I am aware have been disclosed, and any of which I become aware will be disclosed, in accordance with RFC 3668. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet- Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." INTERNET-DRAFT IP over Burrito Carriers April 2005 Abstract IP over Burrito Carriers describes an experimental method for the creation of edible data packets. This standard is intended to be implemented in metropolitan area networks due to the preexisting burrito delivery infrastructure. While currently only flour tortillas have been found acceptable for encapsulating the data contained in the packet, tests are underway to determine the viability of using corn tortillas. One must be wary of disreputable IP over Burrito service providers as packet corruption and bad data handling can result in damage to the receiving unit and may result in an extremely messy packet rejection. Conveniently, there is a rating system already in place. While the rating by the health department doesn't ensure proper data encapsulation, it does allow the end user to determine if the service provider's quality to cost ratio is adequate. This is an experimental standard, not a recommended standard. Introduction In today's wireless hotspot, WAP enabled, WiFi zoned world of dining there exists a discrimination against diners who prefer to eat outside the established confines of the restaurant. The IP over Burrito standard was developed to create an edible solution to the growing rift in the availability of free internet access between sit-down and delivery/carry out diners. While considerable research has yet to be performed on the IP over Burrito standard, multiple simulations in a controlled environment have proven to be both successful and filling. Some concerns that must be addressed in the future include the ability of the hosts buffer to accommodate a large number of packets while they are processed. Also the fact that a buffer overflow would cause a catastrophic system failure resulting in a purging of all previously processed datagrams is of major concern. Currently datagrams are encapsulated in a flour tortilla. Future projects will determine the viability of using corn tortillas but for now the standard requires the use of a flour tortilla for all datagram encapsulation. INTERNET-DRAFT IP over Burrito Carriers April 2005 Version: Obvious The Version field is indicated by the obvious. As the IP over Burrito standard is designed to work solely with modern equipment, it supports only IPv4 packets. IHL: Onion Internet Header Length is specified by the number of onions placed in the burrito. Type of Service: Jalapenos The 8 bits of this header are specified by 8 jalapeno slices. A half slice indicates a zero and a whole slice indicates a one. Total Length: Physical Burrito Length The length of the burrito in centimeters multiplied by 4096 gives the total length of the datagram, in octets. Flags: Type of Beans Black Beans = Don't Fragment Red Beans = Fragment Pinto Beans = Last Fragment Kidney Beans = More Fragments Fragment Offset: Total Number of Beans. Commonly in the range of 35-45 minutes, given traffic conditions. Protocol: Guacamole The chunkiness, quality, and amount of Guacamole determine this data. INTERNET-DRAFT IP over Burrito Carriers April 2005 Header Checksum: Receipt The data on the receipt should match the specifications of the burrito datagram. Source Address: Lettuce Given the size of this field it is necessary to break it down into subsections. Also, the lettuce is colored with food coloring to be either red, green, or blue. Red lettuce indicates the most significant digit, green the middle digit, and blue the least significant digit. Thus limiting the amount of lettuce on the burrito to a manageable level in respect to determining the data and fitting in the tortilla. Destination Address: Rice Given the size of this field it is necessary to break it down into subsections. Also, the rice is colored with food coloring to be either red, green, or blue. Red rice indicates the most significant digit, green the middle digit, and blue the least significant digit. Thus limiting the amount of rice on the burrito to a manageable level in respect to determining the data and fitting in the tortilla. Data: Beef The data will be transmitted in a beef representation of hexadecimal. Each beef cluster will be counted as a decimal representation of a hexadecimal digit. Each beef field will be separated by a slice of chicken. There will be a maximum of 15 chunks of beef and a minimum of 0 chunks of beef per unit chicken. Approximately 16 bytes of data can be stored per burrito packet. Packet Routing Should a node become damaged or congested (ie traffic jam, construction, etc) and be unable to accommodate Burrito encapsulated packets in a timely fashion then the packet will be routed by the delivery boy around any obstructions in an attempt to make a delivery inside of the packets given TTL. INTERNET-DRAFT IP over Burrito Carriers April 2005 Security Considerations The IP over Burrito service can be considered secure for almost any non-tactical use. Before transmission, the data contents of the packet are sterilized, killing most viruses that might be transmitted via the packet. Unfortunately, due to the nature of the packet, this uninfected state is only temporary. Unlike the current IP transmission standard, packets created by the IP over Burrito Carrier service are vulnerable to infection during transmission. Infected packets will usually be detected two to four hours after the packet is destroyed. As every packet is encapsulated in an opaque wrapper, the data inside the packet is impossible to access via standard packet sniffing procedures. Attempts to breach the encapsulation of the package in transit will likely cause permanent damage to the encapsulation, thereby signaling to the original recipients of the packet that data interception was attempted. Re-encapsulation of the original data is impossible, as the packet data is tightly integrated with the encapsulation. Due to the long delay between packet transmission and packet reception, however, there is sufficient time for a third party to duplicate the packet data and forward it to the original recipient. The detection of this interception is likely only if the recipient should follow the standard packet disposal process and be well acquainted with the peculiarities of packets created by a given server. Packet transportation uses a highly advanced algorithm to prevent damage to the packet and to prevent its reception by third parties. As the packet transportation system is highly vulnerable to social engineering, however, the use of encryption is recommended for the transmission of any secure data. Although the packets decay naturally over time, the slow rate of natural packet decay will likely make user-induced destruction mandatory to prevent third parties from examining the packet data after the packet has been received. Unfortunately, the packet delivery system works poorly in a tactical environment, as the packet can be easily waylaid by hostile forces. Due to the extended time that packet creation requires, servers will be highly vulnerable to message flooding. however, the likeliness of a IP over Burrito DOS attack can be considered negligible, as the clients are charged for each packet that the server sends to them. INTERNET-DRAFT IP over Burrito Carriers April 2005 Of more concern is the extended time that packet processing r...