Berkeley CSUA MOTD:Entry 40061
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/05/24 [General] UID:1000 Activity:popular
5/24    

2005/10/13-14 [Computer/SW/Unix, Computer/SW/Security] UID:40061 Activity:very high
10/12   [moved to top]
        I strongly suggest everyone read the minutes from the last
        meeting.  Both changes to the motd and soda itself were
        discussed. -jrleek
        \_ (Put up front since it's relevant) One thing that was left out of
           the minutes is this: although we decided to enable logging of the
           MOTD, we would like the implementation to be put in place by the
           users OF the MOTD. The decision stands and is not debatable, but
           the flavor of it is up to you guys. The current proposition is
           to enable kernel auditing, such that only root can view the logs.
           If you have a more palatable idea, you're welcome to submit your
           opinions to root@csua. Of course, 'ideas' are not nearly as
           useful as 'implementations', if you propose something non-trivial.
           \_ I don't have any complaint on any of this. I just like to
              ask if you guys can consider making the list of people who
              have root public, and tighten access control to only those
              who should have root. Secondly, I'd like to ask if you guys
              can make all user complaints and requests to expose offenders
              public. I'd hate to see root exercising power under the hood
              without any form of auditing. Without public auditing
              there is no check and no balance.
           \_ Why perpetuate the scam and make us lend the logging an air of
              respectability?
           \_ I am amused by the fact that this was posted anonymously. -gm
        \_ Exact proposition: "To allow, when necessary, root-types to
           identify exactly who posted any message in the MOTD"
        \_ If I read these correctly, the change that will be implemented is
           a foolproof way for root-types to know who is posting to the motd,
           so that people who make direct threats can be found.  Somehow I
           doubt this is gonna raise the quality of the discourse around
           here.
           \_ The problem is we've apparently seen root-type people abuse their
              root in the past to un-anon people on the motd they simply don't
              like.  I'd like to know who the root-type people are and that
              there is some official (as official as the csua can get) process
              in place to a) make sure no one else has root and b) make sure
              the very limited set of people with root are known and c) revoke
              root privs of abusers.  I was once in favor of a totally anon
              motd, but given some of the vicious and excessive personal
              attacks, threats, and named posts clearly intended to destroy
              other people, I've changed my mind on the topic.  Free speech
              is a good thing but yelling fire in a theatre is not ok nor is
              abusing anonymity to harass or ruin others.
              \_ The root list has been getting cleaned up, and I have made
                 sure that the only people with root on any of the new
                 machines are active, trustworthy root types.  Furthermore,
                 abuse of root power by anyone to un-anonymify someone for
                 any reason other than official business is an immediately
                 squishable offense in my book.  If I caught someone using
                 root logs to spite someone on the motd, I would not hesitate
                 to not only revoke the root cookie, but also sorry that
                 person's account.  I would even take such action on a
                 current member of Politburo if they did such.  I consider
                 the privacy of the people on this server, and the
                 professionalness of those who have access to priviledged
                 information on this server very important. - jvarga
              \_ You are a thin-skinned idiot.
                 \_ Haven't been around here that long, huh?
                    \_ Only about 8 years.  What'd I miss?
                       \_ Pfft. n00b!  -meyers
                       \_ You missed the part where not abusing root is a good
                          thing, and an obvious thing.  Where have you been?
              \_ Vicious and excessive personal attacks? Perhaps, but the
                 motd is not for the faint of heart. This is less "fire" in a
                 theater and more theater of the absurd. More Sproul Plaza than
                 debate club. Keep it anon. How else am I supposed to make my
                 snide "yermom" comments without looking like a total sleeze?
                 \_ yer mom doesn't mind looking like a total sleaze.
              \_ You're correct that too many people have root. We'll get
                 an automatic reset when we switch to new soda, we should
                 set up some new rules then.
        \_ So let's say some user provides a web- or e-mail based front-end to
           let anonymous types modify motd.  The soda log will show that the
           creator of the interface is making changes, even though it could be
           Joe Loser off the Internet.  I suppose at the first abuse then that
           interface should be shut off?
           \_ Before the first abuse; it's against policy to share your
              account.  -tom
              \_ Has this specific example been tested yet?  ("share your
                 account" encompasses providing a web/e-mail interface for
                 people outside soda to anonymously modify motd)
                 \_ "share your account" means whatever they want it to mean.
                    \_ This would also qualify under "don't be a hoser."  -tom
        \_ Just curious, but how many of you outraged motders are actual
           csua voters?
        \_ I'm disappointed that the CSUA would run Linux, I'm not sure what
           the issue was with BSD.  There was a big push to get it working
           at the end of last year, and as far as I know it was.  What
           happened?  --jwm
           \_ How competent is the vp?  This is not intended to be a put
              down as such, but failing to get bsd to boot may be
           \_ How competent is the vp?  Failing to get bsd to boot may be
              meaningful or meaningless, depending on vp cluefulness.
              \_ As freebsd developers have trouble getting 5.4 to run on
                 certain amd boxes, I wouldn't use this as a guide to VP
                 cluefulness
                 \_ You do know that my question regarding vp cluefulness
                    still applies until you show (boot_bsd(clueless admin)
                    == 1) for all values of clueless admin.
           \_ What's wrong with Linux these days?  (Aside from TRADITION!)
              \_ If you have to ask, you don't know.
                 \_ Yes, that would be why I'm asking.
                    \_ Install the 2.6 kernel and see how long it lasts
                       under load.
                       \- can you elaborate on this a little. i have some
                          crunching farms and the people who run them for
                          me appear to slowly be moving toward 2.6. tnx.
ERROR, url_link recursive (eces.Colorado.EDU/secure/mindterm2) 2025/05/24 [General] UID:1000 Activity:popular
5/24    

You may also be interested in these entries...
2012/9/20-11/7 [Computer/SW/Unix, Finance/Investment] UID:54482 Activity:nil
9/20    How do I change my shell? chsh says "Cannot change ID to root."
        \_ /usr/bin/chsh does not have the SUID permission set. Without
           being set, it does not successfully change a user's shell.
           Typical newbie sys admin (on soda)
           \_ Actually, it does: -rwsr-xr-x 1 root root 37552 Feb 15  2011 /usr/bin/chsh
	...
2012/5/8-6/4 [Computer/SW/Unix] UID:54383 Activity:nil
5/8     Hello everyone!  This is Josh Hawn, CSUA Tech VP for Spring 2012.
        About 2 weeks ago, someone brought to my attention that our script
        to periodically merge /etc/motd.public into /etc/motd wasn't
        running.  When I looked into it, the cron daemon was running, but
        there hadn't been any root activity in the log since April 7th.  I
        looked into it for a while, but got lost in other things I was
	...
2012/2/9-3/26 [Computer/SW/Security, Computer/SW/Unix] UID:54305 Activity:nil
2/9     Reminder: support for mail services has been deprecated for *several
        years*. Mail forwarding, specifically .forward mail forwarding, is
        officially supported and was never deprecated.
        \_ There is no .forward under ~root.  How do we mail root and how do
           we get responses?
           \_ root@csua.berkeley.edu is and always has been an alias.
	...
2011/9/14-12/28 [Computer/SW/Unix] UID:54172 Activity:nil
9/12    We've restored CSUA NFS to something vaguely resembling normal
        functionality -- plus, with some luck, we should now have something
        vaguely resembling normal uptime, too!  Ping root@csua.org if you
        notice any problems.  --jordan
--------------------------------------------------------------------------------
        \_  Oh, and http://irc.CSUA.Berkeley.EDU is online again.
	...
2011/6/5-8/27 [Computer/HW/Memory] UID:54127 Activity:nil
6/5     In an effort to stabilize our services, we'll be rebuilding parts of
        the CSUA infrastructure over the course of this summer.  To give us
        some wiggle room, I've temporarily decreased soda's allocated RAM from
        8GB to 2GB.  If you need to run something that requires large amounts
        of memory, please send mail to root@csua.org and we'll try to
        accommodate your request.  --jordan
	...
2011/4/27-7/30 [Computer/SW/Security, Computer/SW/Unix] UID:54096 Activity:nil
4/28    Will wall be fixed?   - jsl
        \_ What's wall?
           \_ An anachronism from a bygone era, when computers were hard to
              comeby, the dorms didn't have net, there was no airbears, and
              when phones didn't come standard with twitter or sms.
           \_ A non useful implementation of twitter.
	...
2011/5/19-7/30 [Computer/SW/Security] UID:54110 Activity:nil
5/19    Uh, is anyone still using this? Please mark here if you post and
        haven't added this yet. I'll start:
        \_ person k
        \_ ausman, I check in about once a week.
        \_ erikred, twice a week or so.
        \_ mehlhaff, I login when I actually own my home directory instead of
	...
2010/12/13-2011/2/19 [Computer/SW/Unix] UID:53978 Activity:nil
12/21   Help, all my files are owned by nobody! -ausman
        (yes I emailed root)
        \_ Things should be fine now. As usual, the NFS server caused a cascade
           of errors.
	...
2013/10/24-11/21 [Computer/Companies/Apple] UID:54747 Activity:nil
9/19    "No, A Severed Finger Will Not Be Able to Access a Stolen iPhone 5S"
        http://mashable.com/2013/09/15/severed-finger-iphone-5s
        I'm sure the Apple QA department has tested extensively that a severed
        finger will not be able to access a stolen iPhone 5S.
        \_ It doesn't matter whether or not a severed finger can be used.  It
           matters whether or not a robber thinks that a severed finger can be
	...
2013/6/6-7/31 [Politics/Foreign/Asia/China, Computer/SW/Security] UID:54690 Activity:nil
6/6     Wow, NSA rocks. Who would have thought they had access to major
        data exchangers? I have much more respect for government workers,
        crypto experts, mathematicans now than ever.
        \_ flea to Hong Kong --> best dim-sum in the world
           \_ "flee"
        \_ The dumb ones work for DMV, the smart ones for the NSA. If you
	...
2012/8/29-11/7 [Computer/SW/Security] UID:54467 Activity:nil
8/29    There was once a CSUA web page which runs an SSH client for logging
        on to soda.  Does that page still exist?  Can someone remind me of the
        URL please?  Thx.
        \_ what do you mean? instruction on how to ssh into soda?
           \_ No I think he means the ssh applet, which, iirc, was an applet
              that implemented an ssh v1 client.  I think this page went away
	...
2012/8/7-10/17 [Computer/SW/Security] UID:54455 Activity:nil
8/6     Amazon and Apple have lame security policies:
        http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all
        "First you call Amazon and tell them you are the account holder, and
         want to add a credit card number to the account. All you need is the
         name on the account, an associated e-mail address, and the billing
         address. "
	...