|
11/23 |
2002/7/2-3 [Reference/History, Computer/SW/Security, Politics/Domestic/President/Bush] UID:25265 Activity:nil |
7/2 The Prez has lots of experience with corporate fraud: http://www.nytimes.com/2002/07/02/opinion/02KRUG.html http://www.salon.com/politics/feature/2002/07/02/bush/index_np.html?x \_ so? if it really ends up leading to reform, i don't care what he did in the past. let's judge him by his current actions, not past actions. they're bad enough. \_ You really think we have any real chance of seeing reform? |
2002/7/1 [Computer/SW/Security] UID:25250 Activity:kinda low |
6/28 I've been looking at web-based calendars. Has anyone tried/been happy with one of these? I noticed prospector, in particular is GPLed, which I like because it guarantees no ads. http://prospector.sourceforge.net http://www.localendar.com http:/greatwebcalendar.com/ , etc. I've noticed that one of these web calendars had a nasty security hole, is one concern. \_ Which one has a hole? |
2002/6/29-7/1 [Computer/SW/Security, Computer/SW/OS/Windows] UID:25240 Activity:moderate |
6/28 http://www.theregister.co.uk/content/4/25940.html Analysis of MS Palladium scheme. It's even worse than I'd first thought. Very ugly stuff. \_ You expected any less? \_ It didn't occur to me such evil was possible but I'm not at all surprised it was MS that came up with it. \_ see also http://www.cl.cam.ac.uk/users/rja14/tcpa-faq.html \_ What is stopping people from just replacing the "fritz" chip with a FPGA that says yes to every query? \_ Destroying your MB because it'll be built in that way? Or worse, it'll be part of the CPU in v2? |
11/23 |
2002/6/28 [Computer/SW/Security] UID:25232 Activity:nil |
6/27 Anyone successfully used the UCB campus-licensed Windows SSH 3.1.0 client (from http://ssh.com) with Solaris 9 SSH server? It keeps telling me "key exchange failed" no matter what algorithm I choose (and this is with debugging on), but works with other SSH servers \_ Bug in Solaris 9 bundled SSH. Need to use version 3.0.0 which is also available on http://software.berkeley.edu |
2002/6/26-27 [Computer/SW/Security] UID:25205 Activity:moderate |
6/26 What happened to s/key? Is there an alternative way to get one-time passwords to login from a potentially insecure machine? \_ ask root (and / or the VP ) to recompile soda's kernel and turn s/key and keyinit back on \_ s/key still works for me. \_ You haven't run out of keys yet. skeyinit is turned off. |
2002/6/26-27 [Computer/SW/Security, Computer/SW/OS/FreeBSD] UID:25201 Activity:high |
6/26 Upgrade to OpenSSH 3.4 ASAP: http://www.openssh.com/txt/iss.adv \_ so is 3.3 fixed too (i thought) or just better because of PrivilegeSeparation. \_ 3.3 doesn't have a fix but if you enable priv sep on 3.3, the exploit won't result in a remote root explot \_ I don't know how you run your systems but i'd wager that for most people (certainly for me) any remote exploit is a remote root exploit. There are simply too many local exploits to always have them all fixed. \_ Agreed. However one advantage of priv sep is that even if sshd falls victim to a exploit, the intruder only has user level access and them must find out which of your local binaries have local exploits. This leaves a trail which you can use to track the intruder down. \_ Not really. By the time they find a local exploit, which will be about 18 seconds on a bad day, you won't be tracking anything. Once they get a local shell with any account it's all over. \_ Thanks for the link. I was happy to see a quick kludge in there. I don't have time to deal with a full upgrade for real right now. \_ Just so you know turning off ChallengeResponse is a hack to fix the one known exploit, but it isn't a fix for the whole class of exploits that were found and fixed by the OpenSSH team in 3.4. Try to upgrade as soon as you can. \_ On my list for tonight. I didn't want to do it remotely and fuck it up and cut myself off from my server. Thanks for pointing that out. |
2002/6/25-26 [Computer/SW/Security] UID:25188 Activity:moderate |
6/24 OpenSSH 3.3 with Privilege Separation now available. http://marc.theaimsgroup.com/?l=secure-shell&m=102485397824660&w=2 \_ and why should we care? \_ BIG security exploit in openssh if priv. sep. is not enabled and priv. sep. is available only in v 3.3 \_ The problem has NOT been fixed in the priv. sep. openssh. However, privelege separated openssh supposedly diminishes the possibility of root compromisse. Keep in mind that privelege separation is a new option and it does not work well on many non-*BSD platforms. \_ ?? Got a url for the openssh problem? I missed that one. tx |
2002/6/24-25 [Computer/SW/Security, Computer/SW/OS/Windows] UID:25180 Activity:nil |
6/24 The future of computer security is Palladium: http://www.infoworld.com/articles/hn/xml/02/06/24/020624hnpalladium.xml \_ Uhm, no it isn't. Only in BG's little brain. |
2002/6/24-25 [Computer/SW/Security] UID:25178 Activity:high |
6/24 I'd like to use Cygwin to manage my Redhat 7.2 box. I can ssh in no prob, but when I try to open an xterm, it fails, with: xterm Xt error: Can't open display: server:10.0 I can get X11 over ssh just fine from soda. This is a stock 7.2 install--nothing special. Any ideas? \_ first did you try ssh -X and then have you tried ssh -v for verbose mode. \_ Yes, -X works fine, -v lists the following X11 related stuff: debug1: Requesting X11 forwarding with authentication spoofing. debug1: channel request 0: x11-req debug1: channel request 0: shell debug1: fd 5 setting TCP_NODELAY debug1: channel 0: open confirm rwindow 0 rmax 16384 \_ have you installed xhost on the redhat box? I don't remember what rpm contains it. \_ yes, xhost is installed. \_ "xhost +" and try again. \_ tried it with no effect (BTW, thanks for this help-- I really appreciate it). \_ Found the solution. My ssh connection set the DISPLAY on the remote site to "machine:10.0" instead of "localhost:10.0". When I fix the display variable to use "localhost" it works just fine. \_ Just had the same problem a few days ago. Another way to deal with this is add your machine name ("machine" above) to /etc/hosts with your correct IP (if it's static). Then it'll work as-is, without requiring a manual reset of $DISPLAY every time. -alexf |
2002/6/21-23 [Computer/SW/Security, Computer/SW/WWW/Server] UID:25167 Activity:very high |
6/21 Big bad apache hole in the wild. Patch/upgrade now. See http://apache.org or your favorite security site for details. \_ So they finally learned from Microshit? "In order to gain free press we need to introduce security holes." \_ Does anyone think this vulnerability could lead to a fast spreading worm like Code Red, for example? \_ What's the point? Apache + modules (esp. php) are full of holes. \_ So, don't use the modules you don't trust. Patch one, and there are still a hundred others that the '1337 H4X0R5 will use to break in. Even if you patch all the modules, you still have all your executable content (perl cgi, ssi, php, servlet, jsp, etc) which is undoubtedly riddled with holes. \_ 1) try formatting. 2) just because there are other holes is no reason not to patch this one. 3) glad you're not the admin at my company. \_ It is possible but cracking a site by exploiting the holes in locally written code is much harder than exploiting a widely publicized and well understood vulnerability that possibly affects nearly every apache site out there. If you care about security, run publicfile. \_ publicfile does not support CGI scripts or any kind of server side programming which makes it fairly useless for lots of users. \_ Um, it's not actually that bad. It's a DoS exploit at worst on many architectures. \_ nnnn! go read the security alert, not msnbc. \_ Actually I read all three. Plus the apache one. Plus the debian security-announce summary. It's a DoS explot. \_ Well you didn't read the one that said it's a full root exploit. Whatever, go use telnet. Not my problem. \_ At least one exploit (for openbsd) has already been posted on bugtraq with intent to prove people like you wrong. \_ If your OS doesn't execute data off the stack, it's not exploitable (but it's still DOS). And it's not a root hole, just the user Apache runs as. Still, it's potentially bad. -tom \_ Lots of people run apache as root. Lots of sites that run apache as 'www' or whatever will also have local holes if they haven't fixed this one. Thus it is highly likely that getting in through apache is just one step from root. Layers.... \_ I challenge you to find one person running Apache as root. -tom \- the csua used to run a WEEB server on it's name server. there was a bug that let you get a shell running as the WEEB server uid. now it turned out the WEEB server uid owned the WEEB config file, so you could just changed the run-as user to root and repeat the process and you would have a root shell on the name server. this is detailed in some comment by myself and P. Norby some time ago. I dont think this is that big a deal and right now the "real" denial of service is all the people running around recommend things like vulnerabilty people immidiately delete their defaultroutes and such. --psb |
2002/6/21-22 [Computer/SW/Security] UID:25164 Activity:high |
6/21 Since keyinit has been disabled and ssh doesn't work for me (behind company firewall/proxy), what other options do I have to login to csua? Already tried ssh with http-tunnel and socks2http. -allenchu \_ Find someone who'll let you telnet into their shell account and ssh in from there. -Someone who ran out of keys too. \_ People like you are simply irresponsible bastards. You know the difference between telnet and ssh but you're still insisting on using telnet, potentially compromissing not only the security of your personal account on both machines but also compromissing the host security of both machines in general. Lots of root breakins start with sniffed passwords. But you, of course, don't give a flying f**k to this because you're probably not the one who will end up fixing the problems later. \_ If the company's firewall didn't block port 22, he would of use SSH. Just because you are an irresponsible idoit doesn't mean everyone else is. \_ that's not an excuse for using telnet and jeopardazing the security of the entire machine. I am also surprised that a company that filters outgoing ssh still allows outgoing telnet. \_ I doubt there is one. It's too stupid to comprehend. \_ How did you post your question without logging in? \_ Because I have ssh at home. Also have a few keys left. \_ can you ssh to port 80 on scotch.csua \_ Thank you. This might be it. Of couse this assumes the lovely M$ proxy that prevented http-tunnel to work will not do the same to this solution. -op \_ sorry, I haven't been paying attention: why is keyinit disabled anyway? \_ The answer I got was some sort of security hole w/ skey. |
2002/6/21 [Computer/Networking, Computer/SW/Security] UID:25163 Activity:moderate |
6/20 I'm so confused. Isn't 192.168.0.0 a non-routing network? ... \_ http://CNC.net should not be routing these packets. Neither should XO really, but they might have an agreement with CNC that makes it hard for them to filter traffic. \_ Welcome to the world of routing. Sadly, certain Network Operators are, shall we say, less than clued. \_ A lot of providers use RFC1918 addresses for 'private' interfaces; frame relay clouds are a good example of this. They're not supposed to be routed, but rather just used within a given cloud or circuit for routers to be able to contact each other. Sometimes routing information about these slips out, when someone exports a default route, or doesn't filter correctly (correct me if I'm wrong, but aren't some protocols, like OSPF, a pain to filter individual routes/networks with?) so people with different providers will see these addresses as "existing" in various places. Shouldn't do any harm, it's just not very clean. -John \_ still, one shouldn't be using RFC1918 addresses even for transit links, as it will get important ICMP messages generated by the routes filtered out. Things like unreachables and fragmentation-needed stuff. Its sloppy/bad practice. -ERic \- terminal administrative domains such as lbl.gov put on a lot of filters like this, but for some reason, various transit domains like esnet are refusing to do so ... they are saying there are some performance issues ... we didnt argue much or demand to see the evidence but it is possible there is sort of a reason, i.e. even if the overhead is small, the fraction of these packets is vanishingly small --psb |
2002/6/19-20 [Computer/SW/Security] UID:25150 Activity:kinda low |
6/19 Is there a free program that does scp on window 95? (This is for a machine at work, over which I have no control.) \_ I don't know if it works on Win95, but it works on Win2k and Win98: putty and pscp. Do a google search. \_ As the above person said, pscp works. Also try WinSCP. Has some issues with its interface (at least the version I have), but does the job. \_ The link is: http://winscp.vse.cz/download2.php?file=WinSCP2.exe \_ the scp (and ssh) programs for cygwin work pretty well. I realize that this is overkill for this problem, but you may find cygwin generally useful as well. |
2002/6/13 [Computer/SW/Security] UID:25085 Activity:high |
6/12 What's the ANSI escape sequence for setting colors 8-15? \_ colors 8-15 are just high-intensity versions of colors 0-7. to set the high-intensity attribute, use {ESC}[1m see also: http://perso.efrei.fr/~marnier/docs/ansi-esc.htm --jameslin \_ Hm... interesting. The reason behind this question is that colors 0-7 in SSH Secure Shell are very dark. I'd like to use termcap/terminfo to trick programs to using colors 8-15 (which look normal). I've tried using Esc[1m, but I get the brighter color along with a bold typeface. I'd like to get just the brighter color but not the bold typeface. Ideas? \_ don't use colorls? \_ Unless you can change something in your terminal program's options itself, you're fucked. Try another ssh client. PuTTY is good. Teraterm is usable but doesn't do ansi colors iirc. \_ Teraterm actually does. \_ Putty is nice when you need something fast for a one shot but for daily use I prefer terateam which doesn't feel like someone's HS project. \_ I'm curious -- name one thing that teraterm does better than the current stable version of putty. I've used all 3 (ssh.com client, tterm pro, putty) for quite a while and now just use putty because it's acted up much less often than the others. \_ For starters, putty is the only ssh client that will spontaneously drop my connection all day every day. It's not an idle time issue, it'll do it in the middle of typing. There were a few other personal preference differences but I consider disconnects a serious issue. \_ Strange; I've never had that happen over several months of using putty (unless the network went out with it). Are you sure it's not a problem with your server's sshd (which the other clients may be more tolerant toward)? |
2002/6/10-11 [Computer/Domains, Computer/SW/Security] UID:25057 Activity:kinda low |
6/9 I have a geocities website and my own domainname. Is there any free service to do DNS+Url Redirection of my domain to geocities? I couldn't figure out if http://freedns.com is what I needed. -fuless, not faithless \_ some domain registrars will do redirects for you as part of the service. shop around. maybe your own already does this. \_ I ended up using http://afraid.org. --opp |
2002/6/9-10 [Computer/SW/Security, Computer/SW/OS/Windows] UID:25049 Activity:high |
6/9 What is up with the logos of http://msdn.microsoft.com and http://amazon.com being identical? Same font, same arrow. \_ what about Lucent and Zachary's Pizza? \_ what about http://chickswithdicks.com and yermom? \_ Obviously, they are both part of a vast Washington state conspiracy to brainwash the rest of the country. \_ obYerMomAndMyDick |
2002/6/7-8 [Computer/SW/Security] UID:25023 Activity:high |
6/6 imap via ssl on csua is down: ports 585 and 993 both refuse connection. Why does csua require ssh when we are only allowed to use nonsecure imap? \_ You could always do IMAP over SSH like what I do. ssh -g -l jondoe -L 20143:csua.berkeley.edu:143 http://csua.berkeley.edu then connect to localhost:20143 from your client. -jeff \_ Works great, thanks so much for the great tip!!! Now I don't have to badger our sysadmins about this any more, they have resisted installing imap/ssl... \_ You are a moron. \_ well, no. this has been happening all too often lately. root has been pinged about putting ssl+imap into inetd, but as yet nothing has been done about it. They could get the complaints and the security concern out of their hair very quickly... Granted, the person could ssh tunnel themselves, but changing your config when it's soda's config that's broken is a time sink. \_ Or they could *GASP* read mail on soda! \_ If we offer a service, we should do at least the bare minimum to keep it running. it's not that hard to put it into inetd... \_ that's not the way of the true alumni! POP YER MAIL! \_ Fuck off, paolo. \_ That's no way to talk to an Dept Honored Officer! \_ Heh. \_ IMAP/SSL is now available. \_ how about POP/SSL? \_ how about SSH/SSL?? I want my secure link to be totally secure! |
2002/6/6-7 [Computer/SW/Security, Computer/Companies/Yahoo] UID:25011 Activity:nil |
6/5 Where is Yahoo options do I opt out of the mailing list? \_ http://subscribe.yahoo.com/showaccount also http://privacy.yahoo.com/privacy/us/pixels/details.html |
2002/5/27 [Academia/Berkeley/CSUA, Computer/SW/Security] UID:24952 Activity:nil |
5/26 Congrats on your award for service to the CS department through the CSUA paolo! |
2002/5/25-26 [Computer/SW/Security] UID:24945 Activity:high |
5/25 Which of the following is safer: ssh login to a remote host and read mail there use a command-line client or access my mails using an imap capable local client? -- crypto/protocol novice \_Using encrypted email. Otherwise, it just a matter of where on the network your attacker is sitting. \_ Or maybe they're reading your keys and monitor from a van parked across the street. It doesn't matter. It's just the dude's personal mail. No one cares what's in it. \_ Look, I am not worried about individual emails get sniffed on its way. I just want to have a reasonably secure way to check my emails from a long distance or a continent away without compromising my password etc. a continent away without compromising my password or having personal info. in my mails systematically collected in some database when they pass through rogue networks. \_ Ssh in and use your favorite local client. |
2002/5/23-24 [Computer/SW/Security] UID:24921 Activity:moderate |
5/22 Does anyone use Dragon? I currently use a service that charges $.10 for transcription and am thinking about switching to Dragon. They have standard, preferred, and professional, but it is unclear what you get for $100 and what you get for $700. \_ Yes, I mean Dragon Naturally Speaking 6.0. \_ You mean Dragon the PC software? \_ no, the big reptilian thing that breaths fire. \_ That was practically a gimme but funny anyway. Thanks! |
2002/5/8-9 [Computer/SW/Security] UID:24756 Activity:low |
5/8 I'm thinking about using a block cipher to encrypt pkts in my application, but I'm running into a problems wtr transmitting/receiving the encrypted pkts. Here is what I want to do (given values are secret key K, plain text PT): 1. Derive K1 (encryption key) from K and a random nonce N1 and derive K2 (HMAC key) from K and a random nonce N2 2. Encrypt PT and H(PT) using K1: e = E(H(PT)|PT,K1) 3. Calc. HMAC of the e: h = HMAC(e,K2) 4. Transmit N1|N2|e|h (this would be a fixed size pkt) 5. Recv. N1,N2,e,h 6. Derive K1 and K2 from K using recv'd N1 and N2 7. If HMAC(e) = h, then decrypt e: D(e,K2) = H(PT)|PT 8. If the decrypted H(PT) matches a computes H(PT) return PT. What I don't know how to do is recover from the following situations: * HMAC(e) of the recv'ed e != h * Decrypted H(PT) != computed H(PT) Since it it unlikely that the pkt was corrupted by trans. errors (I'm using TCP), the only way that this could happen is because of an active attacker. Is there any point in asking for a retransmit on the recv side if an active attacker is present? \_ post this to crypto@csua, you'll get better results than the motd. Motd is full of dropouts and sysadmins. \_ Hi paolo. You're delusional again. Go back to bed. \_ who is this paolo? \_ He was president for a long time, then he quit logging in. |
2002/5/4-6 [Computer/SW/Security, Computer/Theory] UID:24704 Activity:high |
5/3 If I want to learn about error correction, compression, and cryto, which class would I take? crypto? _/ \_ Info theory at Stanford. Berkeley does not teach ugrad info theory. \_ Information theory. Read Thomas & Cover. There is an information theory class using that book at Stanford. Berkeley does not teach information theory to undergrads. \_ 170 talks about the basics of both, 150 has some error correction too. specifics? \_ Crypto classes: 261 (well, security), 276 (protocol-level), and this semester Wagner taught a 294 which was block-cypher level. Even though I've managed not to pay any attention to 174, I remember somebody saying something about entropy, so likely has to do something with compression and/or random number generation. -chialea \_ "managed not to pay any attention to 174". Okey dokey, now who was making noise before about the best Cal ugrads not getting into Cal grad school? \_ Not best. Schmooziest. Big difference. \_ if you were as good as chialea, wouldn't you be bored by 174? --chialea #1 fan \_ several EE courses discuss compression (the multimedial related signal/image processing courses) \_ depending on the prof, Math 114 often covers coding theory, and error-correcting codes. - rory |
2002/5/3-5 [Computer/SW/Languages/Java, Computer/SW/Apps/Media, Computer/SW/Security] UID:24700 Activity:nil |
5/3 Finally we know who was the first borg, it was Prof. Steve Mann of the University of Toronto: http://chronicle.com/free/v48/i34/34a03101.htm \_ He's saying he had a wearable video display 20 years ago? \_ He's saying he was a freak 20 years ago just like now. |
2002/4/24-25 [Computer/SW/Security, Computer/SW/Unix] UID:24568 Activity:moderate |
4/24 Are you getting bounces from http://mail.yahoo.com? I tried responding to people, and I'm getting bounces. They are not spammers. I respond a few seconds after they email me. \_ so it has begun \_ Yes. It's been sporadic for a day or so. \_ Well did you pay your Yahoo E-Delivery Fee? You can only send mail to Yahoo users if you're a paying customer. |
2002/4/23-24 [Computer/SW/Security] UID:24543 Activity:very high |
4/23 Security question: assuming i have a "good" /dev/random and I read from /dev/random from 00:00 to 00:01 and save that in a file, will take make it trivial to attack someome who uses /dev/random on the same machine to "seed" a random passwd generator at 00:00:30? Or does each caller some how whiten it with his own environment? \_ Or say I read in 10k bytes from /dev/random or /dev/urandom at 00:00 and I start and another copy of the same process "at the same time", will I get overlapping random streams? at 00:00, which takes 2 seconds. I start and another copy of the same process a couple of millisenconds after 00:00, will I get overlapping or interleaved random streams? \_ no and no, if it is a "good" /dev/random \_ So what prevents two people "simultaneously" reading from /dev/random from letting the same stream? \_ The driver probably has a locking mechanism in the read entry point to prevent this: ep_read { lock ; copy bit to userspace ; unlock ; } |
2002/4/22 [Computer/SW/Security] UID:24532 Activity:high |
4/21 MOTD Poll. How many people use pgp (or gnupg) on soda? PGP: GnuPG: ... Neither, Because No One Cares What's In Your Email: .. I'm Not That Paranoid: .. The Feds Already Cracked It Or We Wouldn't Be Allowed To Use It: . the NSA paid for my fucking harddrive anyway so there's no point: . \_ and if anyone who got *ANY* sort of PGP filter worked with with pine, let me know. -kngharv \_ I tried. How I tried. I believe the problem is actually with soda's installation of pgp. I bought the bullet and started soda's installation of pgp. I bit the bullet and started using mutt. I can't say I'm an enthusiast but it does handle gpg better. I never did get pgp working. --ulysses \_ I couldn't get it working in pine. I gave up and switched to mh-e and mailcrypt. \_ Follow up poll. Do you: sign email: . sign news: sign + encrypt email: sign + encrypt news: |
2002/3/28 [Computer/SW/Security] UID:24260 Activity:high |
3/28 What exactly are the "Digital IDs" that Outlook Express blabs about when I click on "Security" in the program? ... specifcally, how do these relate to PGP encryption? \_ No, it's created by combining your SS#, DOB, Mother's maiden name, and CDL in a complex alogorythm that involves concatenation and rot13. This cryptographic innovation brought to you by Microsoft! The ecommerce version has your bank account and pin in there, too, for your convenience. |
2002/3/25-26 [Computer/SW/Security] UID:24222 Activity:moderate |
3/25 Has anyone heard about the CBDTPA? http://www.politechbot.com/docs/cbdtpa/hollings.s2048.032102.html It will be a disaster if this thing gets passed. \_ No one has ever heard of this or the SSSCA before. \_ dude! i just found the greatest web site! you should check it out: http://slashdot.org \_ cool thanks! its looks really low end and new are they working on improving it at all? it might stand a chance! "community" $ell$!! |
2002/3/23-24 [Computer/SW/Security] UID:24212 Activity:nil |
3/23 MacOS X's Preview bypasses PDF "security": http://www.macuser.co.uk/macsurfer/php3/openframe.php3?page=/newnews/newsarticle.php3?id=1854 Why is it that Adobe's attempts at "security" are always so damn stupid? |
2002/3/15 [Computer/SW/Security] UID:24123 Activity:high |
3/15 i want to take this opportunity to publicly insult newark electronics customer service. they suck donkey balls. their web site is lame was programmed by yermom. go digikey or allied! \_ This is the motd, not a customer satisfaction line. Your complaint is entirely too banal and does not once mention yermom. |
2002/3/15 [Computer/SW/Security] UID:24122 Activity:nil |
3/15 Any one uses pgp4pine and gpg? for some reason, my send filter worked, but display filter (for recieving encrypted / signed email) does not. What really puzzle me, is that when I open the file contains pgp (uses _BEGINNING("-----USE PGP")), my default editor (in this case, jove) launched, and has an error message in jove saying: "invalid switch -c" anyone has any clue? -kngharv |
2002/3/14 [Computer/SW/Security] UID:24112 Activity:moderate |
3/14 http://www.nytimes.com/2002/03/14/technology/circuits/14MANN.html \_ "He is now undergoing tests to determine whether his brain has been affected by the sudden detachment from the technology." |
2002/3/13 [Computer/SW/Security] UID:24092 Activity:high |
3/12 sshd has got vulnerabilities, fixes, and potential future vulnerabilities. If I TCP wrap and use hosts.allow/deny for sshd and other apps, so only listed hosts can connect, does that prevent intruders from exploiting future holes? That is, as long as it's TCP-wrapped or restricted by hosts.* files, even if I was running an exploitable version of sshd, nobody can break in via sshd, true? Same with all inetd.conf daemons, right? I only run one. (This assumes the hosts in my hosts.allow file are secure) \_ Here is a thought. Run sshd on a high number port as sshd rather than root. Then use your fw/nat/pat box redir 22 to the high number port. This way even if there is a breakin, they don't get root (assuming root can't login via ssh). \_ Assuming no holes in tcpwrappers, probably. ssh uses libwrap, which is a little different than being wrapped in inetd.conf, and possibly is less secure. -tom \_ why dont you just upgrade/patch ssh? \_ "potential future vulnerabilities", i.e. undiscovered bugs. \_ well then, why dont you jsut remove ssh. even safer, unplug your machine from the net. Nothing safer from network attacks than an airwall. \_ You're an idiot. -tom \_ No s/he has a point. If the OP is so afraid of being on the net that they want to be 'safe' from the future, they're on the wrong net. They need to power down and idiot." because that requires no thought or effort. go read a book in a park if they want that level of safety. No one can protect your net from unknown future bugs. If it was that easy everyone would be doing it. Of course it's much easier to just post "You're an idiot." because that requires no thought or effort. -i2 \_ Oh, and posting "disconnect from the net if you want to feel safe" requires effort? Guess what-- you're an idiot, too. -tom \_ i don't give a rats ass about this thread, i'm just going to point out that tom has proven himself to be a total idiot about a hundred times over on the motd. \_ Does that include his anonymous postings? \_ clearly you're dead to sarcasm. \_ "Sarcasm is hard! Let's go shopping!" \_ The post above by "i2" is not sarcasm. If you are i2 then you are a liar, if you are not then, Guess what -- -!tom \_ Wow... let it go. Time to move on. Try Prozac or Ritalin or something. \_ IP Spoofing isn't that hard and you will also need to ensure all of the hosts in your list are never compromised. If you are concerned about security you need to set up your network in a manner that is secure. \_ Isn't the known hole in ssh quite hard to exploit? \_ Yes, and that too only if you have a local account with a valid passwd and shell. |
2002/3/8-10 [Computer/SW/Security] UID:24063 Activity:nil |
3/7 Root people: http://www.pine.nl/advisories/pine-cert-20020301.html Allowing local users to gain root via openssh. \_ Root people, New York and California Root people, I was born on Jupiter \_ Ever heard of e-mail? \_ Like they read it? Like no one else here runs anything and might need to know this, too? Fuck off. |
2002/3/1 [Computer/SW/Security] UID:24005 Activity:nil |
2/28 Todd Solondz speaks! Saturday, Wheeler. 1 free ticket for all Cal students w/ Student ID at the Zellerbach Box Office. Would anyone in the CSUA be interested in possibly recording this (if possible) and hosting it on the web somewhere? I'm willing to help but don't have access to many of the needed resources. - rory \_ who is todd solondz? \_ Isn't he the kid in Mask with Cher? \_ Eric Stoltz. :) \_ Sadly, I think that kid is dead. ...wonder if he ever made it to Katmandu or wherever. \_ Indie movie director. \_ http://us.imdb.com/Name?Solondz,+Todd |
2002/2/26-27 [Computer/SW/Security] UID:23973 Activity:nil |
2/25 <DEAD>www.bsdi.com/date<DEAD> used to have a small gif showing where the sun was currently shining. Anybody know where I can find that image somewhere else? \_http://www.fourmilab.ch/cgi-bin/uncgi/Earth/action?opt=-p gets you a large image of that, plus access to a bunch of other cool stuff. \_ this is cool. |
2002/2/25-26 [Computer/SW/Security, Computer/SW/OS/Solaris] UID:23970 Activity:high |
2/25 Is there anyone out who understands the NT security API? All I'm trying to do is set permissions on a directory: Everyone group, full control, inheritable by child objects and containers. Then I need to know how to create files so that they don't override the parent ACL. Should they have a NULL SD, or a default SD with a NULL DACL? What I'm doing now is setting security on every file create and copy, which is error prone. CopyFile doesn't copy the SD, so I do SetNamedSecurityInfo(DACL_SECURITY_INFORMATION| PROTECTED_DACL_SECURITY_INFORMATION) on the new file. It would be better if it just obeyed the parent directory settings. -sky \_ I know how to do the similar on Solaris on but not NT. Sorry. In Solaris I set the parent directories ACL and mask and then all children (both files & directories) inherit ACL. At least when you do commands like cp/cat/vi. Okay, so it's not going thru the API so it's not similar thing. There are some oddities when on older versions of Veritas products though. Are you using Veritas? \_ Apparently no one understands the NT security API. What I _do_ know is it has nothing to do with the way Veritas or Solaris work. |
2002/2/25 [Computer/SW/Security] UID:23969 Activity:moderate |
2/25 I need to give a user console X access but no remote login access of any kind (translation: secure location, but a bad password). Other users need to have remote access. Setup is kde/freebsd. What's the easiest way to do this? \_sshd has allowuser/denyuser allowgroup/denygroup useful for an ftp-only account -dwc \_ Perfect, thank you. |
2002/2/22 [Computer/SW/Security, Computer/SW/Unix] UID:23943 Activity:very high |
2/21 My moronic boss asked me to write a batch file to auomate a telnet session and one requirement is it should not ask user for the password. How do I kindly tell him that he is an idiot? \_ setup ssh with passwordless public key or host-based authentication, symlink telnet to ssh and let him believe that the users are using telnet ;p \_ The batch file will be placed in hundreds of Windows 98 machine's at a client site; none of these machines have ssh. How do I tell him off? I told him it can't be done and he insisted that it can be done. \_ Why are you still even working there? I can't imagine working in a place with a boss that stupid and an OS that crappy. \_ This isn't 1998. \_ Include ssh along with the batch file. --dim \_ He's a moron, true, but you've done your duty by telling him so, now it is your job to make it work. I suggest a telnetd that auto-auths anyone with no password. Yes, this is frightfully stupid, etc, etc, but unless you want to polish your resume, swallow the bile and just do it. Now is not a good time to get fired. Make sure you have it documented that this is insecure and you told them so but were told to do it anyway. You're then free from serious fallout. C.Y.A. \_ I agree with the SSH suggestion. However, if you still need to use telnet, you can embed a known password into the batch script. You need to telnet to the same account, though. Or maybe have the user save the password somewhere, but not ask on every use. \_ Create a server on a random port that does what he wants and have your script telnet to that port. \_ write a telnet program that automates the password and ship it with your batch file. And document it that it's insecure. \_ Upgrade windows. Realize that even windows has better tools than telnet for running remote batch jobs. \_ Whatever you do ignore the idiots here who give the 1990's dotcom answer of "oh just quit!". Find a way to do the project and do it. Document the insecurity and the specs and forget about it. Your job is more important than religion. \_ maybe he's talking about telnet -F option with Kerberos V5 authentication being used. \_ acct with no passwd? |
2002/2/20-21 [Computer/SW/Security] UID:23926 Activity:high |
2/20 Quoting from instructions on how to send a Sony laptop in for non-warranty service. They fuck you so fantastically hard it's Awesome! >Should you choose to send the system for service, you will be >responsible for the following: ... >d. You MUST provide proper documentation with your shipment; > - Name, Return Shipping Address (no PO boxes), > - Day and Evening Phone Numbers > - Detailed Errors and symptoms > - Method of payment (MC, VISA, AMEX, DISCOVER, Money Orders > and Checks (no starters) > - Written letter authorizing charges up to $700. <======= Rad! ... >NOTE: There is a minimum $25 estimate fee and a $35 return shipping >fee. The estimate charge will be waived if the repairs are >performed at the Fremont facility. You will be notified of, and >must approve the estimate prior to the repair. Service estimates >are not available through email. The diagnosis of hardware >service issues cannot be handled via e-mail. The system must be >shipped in prior to receiving a service estimate quote. \_ you are getting a Dell dude! \_ we know you're supposed to get a macintosh. |
2002/2/20 [Computer/SW/P2P, Computer/SW/Security] UID:23921 Activity:high |
2/19 Tom posts an intelligent comment on usenet: http://groups.google.com/groups?hl=en&selm=a4u5df%241uvv%241%40agate.berkeley.edu \_ Charging is one possibility except then you get into the problem of exactly who to charge. Do you charge the student assigned to a workstation? Ok, another user logs in from another local machine and uses the other student's machine for external access. Do you charge the whole department or sub-unit and "let God sort it out"? That just means rich departments stay on the net and poorer ones take the net away from most of their users. You can't charge by IP address because IP != unique user and packets don't have user names on them. There's still no answer short of simply cutting off a lot of people from external net access and I don't think anyone wants that. \_ "tragedy of the commons" problems usually have no easy solution. The issue of access to national parks is a good example; you can't restrict access to Yosemite Valley in a way that's pleasing and fair, but you have to restrict access if you want Yosemite Valley to retain its value. At some point you have to make some decisions about tradeoffs. A campus phone isn't equivalent to a unique user, either, but we manage to bill people for phone service. -tom \_ I don't have a problem with the basic concept of billing for usage but it isn't the same as phones. Most people aren't on the phone all day. Most aren't making LD calls. And it is a bit difficult to login to your phone from my desk without your knowledge and rack up a huge bill to 976-hotsex. $300 in calls on my phone to my office mate's mother in Tokyo is easy to track down and bill properly. With the technology at hand I only see raising bandwidth or cutting a lot of people off from the public net. I don't see the latter as a good choice for a research/educational institution. It also wouldn't fly politically. \- i think this is naive. \_ How are you planning to pay for this increased bandwidth? \_ I don't think anyone wants to cut people off the net, but providing a certain amount of "free" service, and charging if you go over a certain amount of traffic, is probably a tenable model. Buying bandwidth indefinitely so kids can fill it up with more kazaa is untenable. -tom \_Just raise tuiton. Make net access a line item that people can elect not to pay for if they don't need it. \_ "Every complex problem has a solution that's simple, elegant, and won't work." -tom \_ isn that ken lindahl's or msinatra's quote? \- Why doesnt "disallow P2P except on certain subnets/via prior arragement" [say for people using gnutella for collaboration or maybe some- body in cs doing something researchy] solve the problem as long as someone in the dorms can get their own isp access [i am not sure if this is possible]. are students on the dormnet allowed to run WEEB servers? yes, a lot of the http is garbage but you have to attack what is viable and cost-effective. the comment about running the p2p server on port 80 to "hide" is not a real issue. at least with napster, gnutella, kazza, we can detect it on any port [although not in real time, although that doesnt seem important]. Also, the TotC comparison isnt quite right since the Commons is a natural endowment while bandwidth is sort of a "weakly- rival" good paid for by somebody. Say I build a lighthouse for my shipping company along my shipping lane. I dont care if some people use my lighthouses, however if this makes for "my shipping lanes" too crowded for me to use, well, i'd be better off switching technologies. it seems like if you throttled the dormnet traffic onto the routed internet but allowed significant bandwidth to campus, people could do their school work. [i assume most of the p2p sharing isnt local]. --psb [the lighthouse example is a little off because it is not a divisible but a binary good but that wasnt the point i was getting at. someone does own the bandwidth]. \_ dorm traffic is already handled under a separate cap. You can do things to discourage P2P sharing, but that only solves 25% of your problem, and the more you discourage it, the more incentive there is to find ways around it. -tom \_ MOTD WANKERY! None of you people are in position to do anything. \_ actually, I am. -tom \_ A chill falls across the room... \_ wanking is precisely what they are in the position to do. |
2002/2/13-14 [Computer/SW/Security, Computer/SW/Unix] UID:23861 Activity:high 54%like:23860 |
2/13 Each time I login, I would like to see my "Last Login" info, but not the motd. How do I do this? \_ Edit the .login file in your home directory. If you still see the motd scroll by, create a file called ".hushlogin" in your homedir (`touch .hushlogin` will do). \_ Right, but with .hushlogin I don't see my "Last Login" I can't seem to quell only the motd. Can I set something like "no-motd" in my .login? Also, my "Last Login" info gets shoved off the screen before I get a chance to read it. Why is that? Why is that? -brett (thanks & sorry) \_ Sign your name and make ur .login public so we can help you. Perhaps you have a 'clear' command in it. \_ Okay. |
2002/2/13 [Computer/SW/Unix, Computer/SW/Security] UID:23860 Activity:nil 54%like:23861 |
2/13 I want to see my "Last Login" info, but not the motd, each time I login. How do I configure this? |
2002/2/12-13 [Computer/Domains, Computer/SW/Security, Computer/HW] UID:23850 Activity:high |
2/12 Is there a good way to find all the HOSTS in an nis domain, assuming you have access to master and slave servers? It would be better if there was a log file to parse, but I can dump network traffic too. \_ ypcat passwd \_ ypcat hosts \_ That doesn't do anything useful. \- maybe "snoop rpc ypserv" --psb |
2002/2/11 [Computer/SW/Security, Computer/SW/Unix] UID:23833 Activity:high |
2/10 can some root type make install the Word file reader wv port? thanks \_ Done. --some root type \- Where do you get this software ? \_ the joy of /usr/ports/ on FreeBSD \_ http://www.wvWare.com |
2002/2/7-8 [Computer/SW/Security] UID:23806 Activity:high |
2/7 An attack on the SSHv2 Protocol (for those who don't follow sci.crypt): http://groups.google.com/groups?hl=en&group=sci.crypt&selm=MPG.16cb6c26ff1c3931989687%40chicago.usenetserver.com \_ The thing about all these newer 'attacks' is they all require the man in the middle to have all sorts of access you can't expect a typical hacker to get. Anyone who has the warrant or the skill to insert themself into my ssh2 datastream will probably find it easier to hack straight into the server or just get a warrant to put a van outside my building and 'listen in' on my keyboard and monitor through the walls. I'm not losing sleep over this one. \_ Yes it is theoretical, but the point is that it could be more secure. IPSec for example does not have the problem. |
2002/2/5-6 [Computer/SW/Security] UID:23789 Activity:nil |
2/5 When I try to PGP encrypt outgoing messages in conjunction with mutt, I get several screens of hex numbers and then a fault notification. Does anyone have mutt + PGP working on soda? Can I get a look at your muttrc? [ reformatted - motd formatting daemon ] |
2002/2/2 [Computer/SW/Security, Computer/SW/OS/Windows] UID:23750 Activity:nil |
2/1 Idiots Dos the World Economic Forum website. Claim some sort of bizarre victory. http://www.washingtonpost.com/wp-dyn/articles/A10521-2002Feb1.html \_ See next motd topic. |
2002/1/31 [Computer/SW/Security] UID:23732 Activity:high |
1/31 I used to get "You have mail." or "You have new mail." messages when I logged in but not anymore. What happened? Where do they come from? \_ the system sshd_config may have had CheckMail turned off. \_ CheckMail in sshd is deprecated http://www.monkey.org/openbsd/archive/misc/0111/msg00384.html \_ I think tcsh may have been upgraded. \_ look at your .login. if you dont have nfrm anywhere in the file, add it. \_ nfrm shows you who the mail is from, which is nice but takes way too long. I just want to see if I have new mail or not like it used to show. how do I get that? \_ RTFM, einstein. It's in there. |
2002/1/25-26 [Computer/SW/Security] UID:23669 Activity:high |
1/25 Crap. At a new job and the emc tech guy just sent mail that our emc service contract expired almost a year ago. $225/hr, minimum of 2 hours to do anything. \_ That's probably less than they would have charged you for a service contract. -tom \_ i doubt it.. cuz thats prob jus labor and not parts. -shac \_ that's just time, not materials. And you think they're going to be really zippy when its on an hourly paid basis? They already take 4+ hours to swap a disk or two. --fucked EMC admin |
2002/1/24-25 [Computer/SW/Security, Computer/SW/Unix] UID:23660 Activity:high |
1/24 Anyone have any ideas and/or pointers of how to crack Yahoo IM offline messages and archived chats and conferences without knowing the password of the account that you are trying to snoop on? \_ No, but I'm sure google does. -John \_ If google doesn't help you could try cracking it yourself. I'd make my own logs with my own account and see what comes out. Use long strings of each character in the alphabet, 1 per log, etc. I know they used to send everything over the net in clear text so I doubt the archive encryption is tougher than rot13 or des. \_ never used it but try http://www.elcomsoft.com/aimpr.html |
2002/1/15-16 [Computer/SW/Graphics, Computer/SW/Security] UID:23571 Activity:nil |
1/15 This is too funny. Go to http://www.bsa.org/usa and find the Flash movie halfway down and see the story of Meg A. Byte the software pirate. \_ That's hilarious. I especially like how they ripped of a few games in the video. Nothing makes the point better than hypocrisy. |
2002/1/14-15 [Computer/SW/Security, Computer/SW/OS/Windows] UID:23561 Activity:very high |
1/15 .name URLs now available \_ What is it? \_ Is it permanent? (I mean as permanent as http://www.csua.berkeley.edu/~mylogin \_ http://www.siliconvalley.com/docs/news/svfront/002411.htm \_ Gee. They might as well open up the name space for *anything* that is descriptive, e.g. "JohnDoe@university.of.california.at. berkeley", "JohnDoe@2345.dwight.way.apt12.berkeley.ca94704", "JohnDoe@510.643.1234.us" \_ worthless. Making a 4 letter extension is going to break all sorts of code out there. \_ Maybe badly written code... There have been >3 letter extensions for quite a while. \_ Not to mention 2-letter extensions like .tv and all the international extensions (.jp, .it, .ca, etc) \_ They're called TLDs people, not "extensions". This ain't DOS. \_ yeah baby, <DEAD>cum.cum.cum<DEAD> |
2002/1/13-14 [Computer/SW/P2P, Computer/SW/Security] UID:23552 Activity:very high |
1/13 http://www.nytimes.com/2002/01/13/edlife/13BAND.html?pagewanted=print The article mentions 'Direct Connect.' What other file sharing programs are in use these days besides this and Morpheus and other FastTrack variants. Any CSUA members in the dorms or otherwise with big pipes care to comment? \_ irc \_ yeah, I've got a big pipe for ya \_ http://vadim.berkeley.edu \_ hi paolo! \_ nice going vadim, taking scheme.xcf.berkeley and changing it to vadim.berkeley. fucking tactless egomaniac. \_ I thought the useless xcf was shut down years ago? -alum \_ It was. It has become... the Vadim Computing Facility. \_ This is probably funny but I don't know who Vadim is or the current xcf situation. Is it dead or what? \_ Not dead. There's one member. \_ Just using your powers of deduction, see if you can infer what that one member's name is. \_ check http://zeropaid.com for an extensive listing of file sharing prorams. -- jj \_ the Dec207 warez club! \_ The dorms don't have a big pipe anymore. They're collectively limited to ~20Mbit. That's 4,000+ hosts. UCB dorm net is pretty much useless these days. Residents keep trying to get DSL installed because it's faster. \_ Buncha whiners. I felt lucky to have 14.4 access after I got access to the staff/professor modem bank and off the busy and broken 1200-9600 student bank. Doing classwork on campus was better anyway. Easily block remote connections to your workstation and keep all those other pesky students dialing in at 2400 on some other machine. \_ in my day, we used smoke signals. on a clear day with a small enough wind we could get ten bits per minutes, and we were damn pleased with that. \_ They allowed you to have smoke? And you knew what the sun looked like? And wind? You had wind?? You must be new around here.... \_ Petition them to increase the size of the big pipe. This is not 1991 anymore, when I spent big bucks to upgrade to a 9600 modem. \_ The problem with the dorms is that they'll use (for napster clones, mostly) all the bandwidth you'll give them, and the campus pays for bandwidth used to the commodity net. Dorm traffic isn't limited if it goes over Internet 2. -tom \_ Cool. Now they just need a multi-campus I2 p2p thing going and they're set. I've got this idea for a business model... I just need $325m in funding now.... \_ Two words: traffic shaping. Eliminate this bandwidth cap bullshit, and use traffic shaping to limit obscene traffic caused by p2p filesharing apps. Dorm net becomes useable again. \_ A few more words: apathy, money, unimportant. It isn't worth anyone's time to fix the dorm net situation. Who cares? Let them eat cake! Is there a minimum bandwidth promised or an SLA in the current dorm contract? Do people *really* choose the dorms because they have net? Was the <DEAD>dorm.net<DEAD> the deciding factor for anyone's living arrangement? If so they need to get over it. \_ Clearly, that's the way campus wants to go, but it's rather difficult in our environment. -tom \_ that's 20Mbit to off campus. |
2002/1/10 [Computer/SW/Security] UID:23520 Activity:very high |
1/10 So I've decided that since my system is vulnerable to one kind of attack to not bother with any sort of defenses. I'm reinstalling telnetd, disabling ssh2, running an old version of ssh1, putting IIS 4.0 unpatched back into production, get 8.01 bind going and then setting the root password to "root". Does this make sense to anyone? Should I stop patching my computers because there might be a different way to get in that isn't covered by the current patches? \_ It makes no sense and you are an idiot. \_ So is this any different than not spending money on one form of national defense because the country would still be open to other forms of attack? \_ you're an idiot. -tom \_ At least now we have your best point against national defense. You're brilliant. You should be running the DoD. \_ sign your name, o brilliant one. -tom \_ Missle defence is analogous to building a huge titanium dome for your computer. It is expensive, impractical and won't defend against the likeliest threats. It will also distract you from defending against the threats you should be concerned about. \_ So you mean the most likely threat from nukes isn't nukes on warheads? When there's 5000+ of them out there in the hands of multiple nations and some of those nations aren't very friendly? You determined this was an unlikely threat? You're not qualified to make that analysis. \_ My titanium dome protects my computer against worms, viruses, DoS, and every exploit that exists. \_ The analogy is to a titanium dome that still has holes in it for network access. -tom \_ This is known as a "strawman argument" and it's considered bad debate form. Most people left this behind in the dorms. \_ And the original poster was not? |
2002/1/5-6 [Academia/Berkeley/CSUA, Computer/SW/Security] UID:23468 Activity:moderate |
1/4 csua/csua and user/pass are two short, many sites require 5-8 char names and passwords. What should is sign up as then? -goodCSUAer \_ ucbcsua with password ucbcsua1, ucbcsua2, etc. Or csua123 or csuacsua as username. Some site require pw diff from logins so either have a pw that is the reverse of the login or I dunno...? \_ cypherpunk/cypherpunk \_ csuamotd/csuamotd works fine for me at a few places. thanks to whoever set that up. \_ How about a /csua/pub file of websites with user/pass for each. \_ soda.csua/password was set up for NYT. |
2002/1/4-5 [Computer/SW/Security] UID:23459 Activity:very high |
1/4 http://news.cnet.com/news/0-1005-200-8358574.html?tag=mn_hd \_ Did nweaver post this because he was quoted in the article? :-) \_ This guy picked the Christmas week to notify AOL and then claimed waiting for a week is too long. Hmm. Maybe he just wanted the publicity. \_ The article I read said that AOL didn't even bother to respond to him. It's not just that they didn't fix it in the first week after he reported it -- they didn't even acknowledge that the problem *existed*. Then when he goes public they fix it in 24 hours? Sounds like he was right to go public. \_ At most tech companies, there was no one around to respond to anything from Dec. 22 - Jan. 1. \_ Sounds like the best time to exploit a hole :) \_ I can't think of any legitimate reason for their escalation path for security problems to be broken, even for holidays. Whether they failed to respond out of arrogance or incompetence doesn't make much of a difference. \_ suppose you find a major security hole in AIM. Whom do you email? Does AOL have a special email address hotline for reporting critical exploits? Do they publicize it? I'd guess that the answer to at least one of those questions is "no". So now you're left with filing a bug report using the standard support channels, which most likely get flooded with mail from clueless newbies. Do the real developers field all these questions, or does a low-paid grunt deal with them? Does this support grunt check email every day during his vacation? give him a break. \_ When I call AOL tech support, I usually get prompt and complete service. signed, AOLuser \_ You send it to support. It is the responsibility of their support organization to classify the incoming report correctly and advise their management so they can direct it to the appropriate engineers to repair. An organization the size of AOL doesn't have a single support grunt who goes on vacation and leaves the support email unanswered; they have a large group of people processing incoming support requests, and there's always somebody there. The front line people have more senior people they can escalate things to (usually multiple levels). Even during holidays and weekends, there should be somebody on call in engineering capable of addressing the problem. Coordintaing support and engineering like this is hardly a problem unique to AOL. Oh, and AOL never said they hadn't seen it; they said they wanted more time to work on it. |
2002/1/2-3 [Computer/Networking, Computer/SW/Security] UID:23431 Activity:high |
1/1 I'm using SecureCRT over a 33.6 modem to connect to soda, and my connection consistently is reset after typing just a few characters (for instance, I couldn't type this post using it). I've tried ssh 1 & 2; 3des, rc4, and blowfish; and several different server types, with no improvement. Why is this happening? \_ SecureCRT does that with DSL connections for me. Not that bad but enough for me to curse it or windows. \_ Could be flaky modem connections or so--although that usually happens with v.90 (56.6k)--doesn't ssh have some sort of error checking to make sure no funny business is going on with your connection? I would try to bring down the connection speed to 1200 and then gradually increase it and see what happens. Also for fun try another ssh client like TeraTerm to compare. -John \_ Try putty, it works better than SecCRT on dialup lines (at least that was my experience when I was in India and had to deal with the dial up lines there). \_ putty? barf! Putty was dropping me from a rock solid T1 line. This is definitely what they meant by "get what you pay for" when it comes to software. Tera Term takes an extra 30 seconds to setup, is free, and unlike putty, it works. I'd rather go back to whistling in the phone then use putty. \_ I use putty on both T1 and dial-ups. It never drops any connctions. \_ I've used SecureCRT on dial-up and over cable and, with the exception of campus network outtages, have never had problems. |
2001/12/31-2002/1/2 [Computer/SW/WWW/Browsers, Computer/SW/Security] UID:23421 Activity:moderate |
12/31 Anybody know what's going on with the National Park service web site? http://www.nps.gov It used to be the most complete web site on national parks and now it's gone. What the hell? \_ I think it's a GWB VRWC conspiracy. Soon it'll point to <DEAD>www.evil_white_men_in_office.com<DEAD> \_ Hacked by Chinese!!! \_ The ENTIRE Department of the Interior (which includes the NPS) was disconnected from the Internet by court order on December 5th (the result of a lawsuit against the government for poorly securing DOI computers handling Indian trust-fund accounts). If you visit http://www.doi.gov it'll tell you that the only Interior bureau currently allowed to connect to the Internet is the USGS. -- kahogan \_ I'll bet this was a Bush appointed judge. \_ Needless to say, the systems found so insecure the DOI had to be forced off the net were windows based... \_ http://forum.fuckedcompany.com/fc/phparchives/search.php?search=usgs \_ Does it only apply to only HTTP or does it apply to everything including e-mail? |
2001/12/27-28 [Computer/SW/P2P, Computer/SW/Security] UID:23378 Activity:very high |
12/30 is it just me, or is kazaa empty right now? did those busts actually kill it? \_ or maybe it's because most college kids are at home during winter break? \_ Those busts have nothing to do with the gutter-warez you find on Kazaa. They busted a wholly higher-class of warez-hosers. \_ DoD hadn't put out anything of note in 18 months. They didn't bust anyone important to the scene. \_ They will never bust the most cruical warez ring and that is the casual copier. They can never stop someone from copying office from work or giving a copy of the latest game to thier pals so that they can have a lan party. visiting a warez page be illegal? conspiracy charges? please. \_ Is it illegal to visit warez web sites? \_ why would it be? \_ because warez is illegal? own use and linking to computers software will be \_ downloading or distributing warez is illegal. why would visiting a warez page be? conspiracy charges? please. original. - Bill G. \_ that's surfing with intent to download! Better plead no contest and ask for leniency from the judge. \_ How do you legally distinguish mere surfing and downloading? Afterall all these packets of warez coming to your computer is an act by another computer while surfing and clicking on links is your action. \_ yeah... that's just stupid.. i mean, next thing you know, making copies of stuff you already own for your own use and linking to computer software will be illegal... \_ You shouldn't make copies, you should buy a spare original. Kids these days with thier Linux/Open Sources/Free Software. They make me sick. - Bill G. \_ YEAH! FUCK FAIR USE. FUCKING CONSTITUTION! FUCKING US CODE!! - Mini-Bill-Me \_ You napster, gnutella, audio galaxy and kaaza junkies don't know what "fair use" means. Fair use means that you have the right to listen to your original cd in your stereo and your car. It doesn't mean you can make a copy for your friends and it certainly doesn't mean that you can make a near-perfect digital copy that can be re-distribute illegally to strangers via the internet. Now you kids need to stop illegally copying music, movies and software and start buying it. Otherwise all the poor artists will have to go back to a career in food service and start suffering for thier art and we won't be able to make the kind of money that is necessary in order to maintain our land rovers, our pacific palasides bungalows and our all armani, versace and bally wardrobes. - RIAA \_ Start paying the artists instead of keeping all the money yourself and I'll consider it. \_ Strange thing is that all my artist friends are already on the verge of waiting tables although in terms of art it is the likes of Britney who should be in the personal service business. |
2001/12/23 [Computer/SW/OS/Linux, Computer/SW/Security] UID:23354 Activity:nil |
12/22 How do you make OpenSSH 2.5.2p2 works with Debian Linux 2.2 r4? ssh into this machine kept on getting denied while everything works fine with OpenSSH 1.2.3 (precompiled for Debian). Does that mean Debian 2.2r4 doesn't support ssh2x? Thx in advance! - jthoms |
2001/12/20 [Computer/SW/Mail, Computer/SW/Security, Computer/SW/Unix] UID:23321 Activity:nil |
12/19 I'm running Redhat 6.1 for about a year with no problems and over the last 5 days or so it's been taking a really long time to log into my machine through ssh or ftp. sendmail and samba don't seem to be working right either, though apache is fine. i'm not even sure what to look for, any advice? \_ look for timeouts due to dns - are your daemons waiting for dns to time out? \_ have you been applying security patches? if not, do a rootkit scan. everyone i know who ran such an old install without patching has been rooted via an ssh vulnerability. |
2001/12/19-20 [Computer/Networking, Computer/SW/Security] UID:23308 Activity:low |
12/19 Anyone ever tried ATT Broadband phone service? They have a good deal right now but I don't want to cancel PacBel, then find that quality sucks or something, and have to pay a re-instatement fee with PacBell. \_ I've got AT&T Digital Phone Service. It is excelllent. A couple interesting things though: 1) they install a small, shoebox sized battery somewhere in your house. It keeps the phone working in a power failure. 2) The installation USED to be done by a crappy subcontractor company. (inept) But the AT&T service employees that have since come out for misc. things have been VERY skilled and helpfull. Phone, Internet, CableTV all come in through a Single Coax cable. You can keep your phone number, which means getting worth from paying PacBells "Number Portability Charge" all those years. \_ thanks for the info... I was about to sign my post as "chialea" to try and solicit some responses. |
2001/12/19-20 [Computer/SW/Security] UID:23306 Activity:low |
12/19 http://www.theage.com.au/news/national/2001/12/20/FFXPK6KZDVC.html Mmmm! That new car smell! It's only cancer.... \_ One reason to buy used cars. |
2001/12/15-16 [Computer/SW/Security] UID:23258 Activity:kinda low |
12/15 I have cable srevice by at&t, but I don't think this is a problem with my cable service. Basically, I have a linux 2.2 natd box for connections from my internal network. I have win98/ win2k/linux behind the natd box. WHen I ssh out (OpenSSH_2.3.0p1 or ttssh), if I am idle for say, 5 mins, the connection is cut..reset by peer. Why does this happen, and how do I fix it? \_ I don't have this problem with a similar setup. Could the other side be idling you out? I _have_ had that problem. \_ This is a problem with ipchains. It doesn't have any state, so it has no idea about connections and things like that, so to keep from having NAT sessions open forever, it has timeouts for inactive NAT sessions. I forget where you change this (it's been years since I used ipchains, since iptables (linux 2.4 filtering) is so much better.) however, I'll bet money that that is your problem. Look it up in the ipchains HOWTO, I believe it is in there, and increase the timeout for TCP, since the default is something low, like 5 minutes. There may be a way to get ssh to send connection keep alive packets, which would solve the problem without having a large timout value, so I'd look into that as well. Or, just switch to 2.4, and use iptables. Stateful packet filtering is your friend. -- ajani \_ thanks! when i was using ipf on openbsd I kind of took this for granted. \_ NAT is stateful by definition. You can't do NAT without keeping session state information. NAT session timeouts exist in all implementations, not just ipchains because if you don't expire the idle sessions, there is a higher chance that the NAT session state table will eventually fill up. What Linux iptables adds is a session state tracking for non-NAT sessions as well. \_ Uh, the ipchains NAT session timeout default is way bigger than a few minutes. Check the HOWTO, it is more like several hours. |
2001/12/11-12 [Computer/SW/WWW/Browsers, Computer/SW/Security] UID:23214 Activity:very high |
12/11 http://www.google.com/googlegroups/archive_announce_20.html \_ http://groups.google.com/groups?selm=3lje5o%24n7h%40agate.berkeley.edu \_ Does "Usenet newsgroups" mean all the newsgroups I can see when I run trn? Are there newsgroups that are not Usenet newsgroups? Confused. \_ It means Usenet groups before the big re-org. talk.* and net.* stuff. It doesn't have my 1985 posts, but it does have some 1986 stuff I wrote... It scares me. \_ Say, what newsgroup did the Ahm/Blojo incident happen in? \_ ucb.erotica.sensual, but I can't find the exact original posting, just aftermath signs such as: http://groups.google.com/groups?start=100&hl=en&group=ucb.erotica.sensual&selm=4a1t98%24nk0%40agate.berkeley.edu http://groups.google.com/groups?start=100&hl=en&group=ucb.erotica.sensual&selm=frrawx7xfx.fsf%40sigma.veritas.com Anyone have the original ahm/blojo postings archived? -alexf \_ http://groups.google.com/groups?q=+%22tawei+liao%22&hl=en&scoring=d&rnum=8&selm=58t1r7%241ev%40agate.berkeley.edu \_ is this for real? real or not, did it work? \_ http://www.ereview.com/archive/tawei Status: single Must not have worked... \_ Hmm...what happened to Tawei? He was quite a character. \_ http://groups.google.com/groups?selm=3ljdjg%24mu6%40agate.berkeley.edu http://groups.google.com/groups?selm=31jp6o%24oc2%40agate.berkeley.edu http://groups.google.com/groups?selm=2ron5j%244iu%40agate.berkeley.edu |
2001/12/7-9 [Computer/SW/Security, Politics/Foreign/Europe] UID:23179 Activity:high |
12/7 What is the best way to transfer funds between accounts in U.S. and another country (in Europe) without fee or getting riped off by special conversion rate? The amount is small and just to cover my expenses when I travel or order internationally, i.e. < $2000. \_ My dad has a US checking account at B of A. Every month I make a deposit to his account at a branch here, and he withdraws the money at a branch in Hong Kong. No transaction fee, but I don't know if the conversion rate is the same as the standard rate. \_ I asked at the Bank of America in Hong Kong whether one can access his US account in HK, the answwer I get is plain no, as Bank of America Asia supposedly cannot access account of its parent bank in US. If you are converting from USD to a foreign currency, you are bound to pay a conversion fee (3% I think in most banks). You can open an USD account in a more established financial houses (like SG), so you can withdraw funds outside of US much more easily. But for $2000, it's easier to get travel's checks. \_Tnx for the reply. However often the need to transfer money arises and the amount becomes known while I am outside U.S., not to mention carrying traveler's check is like carrying cash other than being much safer. \_ I've heard from a lot of people that ATMs are good, you get better (minimal but still significant) fees. Better than changing cash out. \_ but you cannot deposit foreign currency to your account from abroad. \_ Go back and read the stated objective, duud. \_ Use your credit card. You'll get the best exchange rate and if you pay it off, the fee will be minimal. No cash that you need to carry which should eliminate the cost of foreign->US. \_ Depends. While I was in Europe this past summer, it was cheapest for me to just withdraw cash from ATMs: BofA was tacking a "foreign currency conversion fee" to each of my CC transactions, while for the ATM withdrawals, I was getting the interbank exchange rate without any additional fees. When I lived in Germany, I had my paychecks direct-deposited to my credit union account in the US and paid for everything in cash: if my needs exceeded the daily transaction limit, I planned ahead and visited the ATM multiple days in a row. If you want an account at a bank that has a presence on both sides of the Atlantic, I've heard that Citibank and HSBC are good choices for US->Europe expatriates, although I have no experience with either. -- kahogan \_ which ever route you choose, make sure you don't go to the foreign currency exchange booth at traverler's spots. Their rate is horrible. (something like 8%) \_ That's strange. Maybe my dad makes his withdrawal by writing himself a check and then cash it at a B of A branch there? I've never asked him. \_ The more I think about it, this is a good way for money laundry. \_ Yes, this is exactly how my father got money at a BofA branch in Taiwan. |
2001/12/6-7 [Computer/SW/Security] UID:23162 Activity:moderate |
12/5 Did anyone figure out why people are getting those "ssh_exchange_identification: Connection closed by remote host" errors? \_ Too many people were trying to connect to soda at once, and openssh started dropping connections. I've turned up the maximum number of unauthenticated connections, so everyone should be able to connect now; please let me know if these errors come back. --mconst \_ yer the best mconst! \_ i usually try "ssh -1"and it works. there's probably a big nasty security hole in there i don't care about. \_ This morning I tried logging in from outside and I got this error. I then tried it again right away and it worked. I've never seen this error before. |
2001/12/5 [Computer/SW/Security, Computer/SW/Unix] UID:23147 Activity:low |
12/4 Is there a way to run a proram from another machine, without having to log into that machine? Specifically, I'd like to run an xbiff icon from another machine, on my local machine (so I can tell when that account gets mail). I'd like not to have to keep the extra xterm open on my local machine. \_ "ssh -X foo@bar.com xbiff" might work. After you enter your password you can background the process (or you can & it if you have DSA stuff set up). \_ or just ssh -f foo@bar.com xbiff and it will background itself (you only have to give -X if whoever set up the client explicitly made X forwarding off by default) \_ Run a cron job on the remote host. Have it check if your xbiff is running and if not, run it with the appropriate parameters/env. |
2001/12/5-6 [Computer/SW/Security] UID:23144 Activity:moderate |
12/5 Has there been a ssh change? Protocol 1 no longer works, and protocol 2 has problem with ssh_exchange_identification: Connection closed by remote host \_ It could be AT&T (I've noticed the same thing) but there's also a recent vulnerability found in ssh1. \_ It's not AT&T -- this just happened to me and I have DSL. I was able to login after a couple of minutes though. Anyone know what's going on? \_ I had the same problem from work and we have a T3 (not att). \_ I've been having the same difficulty. I attribute it to rampant packet loss into/out of EECS. |
2001/11/9-10 [Computer/SW/Security] UID:22994 Activity:nil |
11/9 In case you though your money was safe: http://www.theregister.co.uk/content/55/22751.html |
2001/11/5-6 [Computer/SW/Security] UID:22943 Activity:high |
11/5 In ssh1, I can make passphraseless keys that let me login from one place to another without typing a password/phrase (yes, yes, I know). How can I do this with ssh2? My man pages aren't helping with what I need to put into what files to use passphrases instead of passwords. I know how to make the key, just not what to do with it. Thanks! \_ copy .ssh/id_dsa.pub from your local machine to .ssh/authorized_keys2 on the foreign machine. - danh \_ And chmod 600 ~/.ssh/authorized_keys2 --dbushong \_ Did both of these things and it still falls back to the password auth... help? Does it have something to do with either the IdentityFile or AuthorizationFile settings in sshd2_config? \_ add the "-v" flag when sshing, does that tell you anything useful? \_ Ok, I got it, thanks all. Our machines had the http://www.ssh.com version installed which works a little differently than soda. I needed to specify the dsa and pub files in the identification and authorization files with some trivial syntax. This is from a pdf off <DEAD>www.ssh.com's<DEAD> support website. Nothing in the man pages about it. I guess that's how they make money with support and services. What danh and dbhushong said worked perfectly with soda which had me confused for a bit. And -v was pretty useless, unfortunately. |
2001/11/5-6 [Computer/SW/Security] UID:22939 Activity:high |
11/5 I crossed the Dumbarton bridge westbound this morning. Not a single Coast Guard or cop I saw along the way. What tight security. \_ I drove my van across the Bay Bridge on Sunday. I saw a lot of Coast Guards but no one checked my van. What tight security. \_ the best security is security you dont see \_ Really... what... are the military using thier high tech cloaking device or holding on underneath the bridge? or do they have sniper men miles away.... \_ It's like the CDA in Monsters Inc. When shit happens, they just appear 3 seconds later. \_ You expected every truck and van to be stopped? Because of some vague warning? Yes, let's just stop everything everywhere because hey, ya know, something *might* happen. \_ This is why Davis should have kept his mouth shut. \_ Because it wasn't targeted. The Bay Bridge and Golden Gate were. I drive the SM and there are CHP patrol cars at both ends. \_ I usually take the San Mateo Bridge, but these few days I am so so paranoid that I take Dumbarton instead. \_ that's fine. But if they don't stop my van when I crossed Bay Bridge, how are they going to stop simultaneous attack on the bridges? Dumb fucks. \_ The bridges were built to withstand 7.0 earthquakes. There's not much your van can do to seriously damage them. The real risk is the cables on the suspension bridges. \_ You think if Timothy McVeigh could make one trunk bomb that could cut through the multi-story fed building like a cake, the Al Qaida folks can't make the same bomb and blow a big hold on the bridge surface(s)? blow a big hold on the bridge surface (or two surfaces if they explode it on lower-deck Bay Bridge)? Besides, for the suspension ones, if the cables are gone, the bridge falls, right? |
2001/10/29-30 [Computer/SW/Security, Computer/SW/OS/Solaris] UID:22862 Activity:nil |
10/29 I found "sftp" on my Solaris machine, but I couldn't find the man page. Can someone tell me how to specify a user name different from my current login? I tried "-l username" like in ssh, but it doesn't work. Thanks. \_ Well, if it's anything like sftp on soda: soda ~ [12:57pm] sftp -h usage: sftp [-1vC] [-b batchfile] [-osshopt=value] \ [user@]host[:file [file]] --dbushong |
2001/10/29-30 [Computer/SW/Security] UID:22857 Activity:very high |
10/29 I tried ssh'ing to my csua acct from my csua acct to test ssh-agent and X11 forwarding. Neither worked, so I created a ~/.ssh/config file with the following lines: Host * ForwardAgent yes ForwardX11 yes Now, X11 forwarding works, but ssh-agent forwarding still doesn't. Any ideas? \_ perhaps your ssh to CSUA from whereever you are (say at work) doesnt have X11 forwarding either, whether by buildtime lack of support or runtime option. ssh -v is your friend. -jon \_ But X11 forwarding works now, but not agent forwarding.... \_ oops sorry, got the order reversed when i read your sentence \_ Ok, it works if I use ssh -1 csua, but not otherwise. Is this a known issue? |
2001/10/24-25 [Computer/SW/Security] UID:22820 Activity:moderate |
10/24 My sshd used to accept connections from machines without matching reverse lookup. Then, all of a sudden, today, it stopped. I changed resolv.conf to use a nameserver with made up ptr records and it works fine, but the question remains, What changed? There is no indication that sshd has been restarted since the machine was 60 days ago. This is on solaris, using (foolishly) F-secure sshd 2.0-2 which is also the same as it has been. (i did stop some services 2 days ago, but nothing that should effect this). \_ You've been hacked. \_ Maybe you have edited the hosts.allow or hosts.deny files and added or removed some rules on those? This would apply if sshd was compiled with support for tcp wrappers. \_ Or it actually _was_ doing reverse lookups and your DNS broke. |
2001/10/21 [Computer/SW/Security] UID:22789 Activity:very high |
10/21 If I ssh into machine A and then ssh into machine B and then back into machine A, is that slower than if I ssh into machine A and stay there? \_ Yes, in theory but if your pipe from you to A is smaller than the pipe A <-> B it may not matter much. If you're only typing over this link it won't matter at all. If you're sending data through an ssh tunnel then it could matter a lot. \_ What kind of answer is this? Don't answer questions you know nothing about. The correct answer is that your latency will be increased by double the amount of the latency of your A->B link but your bandwidth should not be effected. \_ The verb you're looking for is "affected." \_ Unless your subject is psychology, you will seldom use the word affect. \_ wtf are you talking about? "affected" is the correct word here. "effect" is seldom used as a verb. |
2001/10/18 [Computer/SW/Security] UID:22766 Activity:high |
10/17 what language uses explicit scope? \_ what's explicit scope? \_ it's a language that lets you say, "function foo has access to var A, and function bar has access to var B"... no matter where they are. think of it as specifically putting an ACL My friend had to have his ACL replaced. He _/ was on crutches for weeks. on each variable as to what function can access it. \_ BASIC. |
2001/10/16 [Computer/SW/Security] UID:22752 Activity:low |
10/16 Soda's ssh host key appears to have changed in the past month or so. Is there a way to check the current fingerprint? -phr \_ Sure it's not just that newer versions of ssh also tie the host key to the resolved IP address, which just changed? |
2001/10/15 [Computer/SW/Security, Computer/SW/Unix] UID:22738 Activity:high |
10/15 I want to restrict a user on a linux box from logging in, i only want someone to be able to "su" to this account. how do i do that? \_ why? if they can su to the account, they get the same privs as if they'd logged in. If they can su, they are already logged in... \_ Set there starting shell in /etc/passwd to something that exits immediately. \_ then you won't be able to su to that account \_ Yes, you will. You won't be able to su - \_ when you su to a user, it exec's his shell. Get a clue. -tom \_ You mean su -m (or the equivalent) su - means "not only run their shell, but do it as a login process" \_ set the password to * in /etc/passwd or /etc/shadow; barring publickey ssh authentication, the account should be only su-able -max \_ Ding ding ding. Max rocks. --#1 max fan |
2001/10/14-15 [Computer/SW/Security, Computer/SW/OS/FreeBSD] UID:22734 Activity:very high |
10/14 What is the "best" (reliable, secure, supports IMAP) free web-based email service? Is hotmail good? \_ I have had no problems with squirrelmail. \_ IMP (component of horde) works great for me. \_ I installed IMP a couple of years ago. I wasn't impressed. Has it gotten better? \_ Bah! I use mail to read mail! Anything else is bloat! - freebsd #1 fan \_ Hi Paolo! |
2001/10/9-10 [Computer/SW/Languages, Computer/SW/Security, Computer/SW/WWW/Server] UID:22674 Activity:very high |
10/9 so when is Berkeley's DNS supposed to be updated with soda's new address? \_ when i get done working taking over the world. --phillip \_ that's my line - the brain \_ HAHAHAHAHAHA! \_ At 3am every day \_ also, when is the web server going to be running again? \_ the joyride is over! call verio! \_ Apache doesn't like it when you don't have a valid name. Probably tomorrow. -tom \_ will emails received during the downtime be cached, rejected, or sent to /dev/null? \_ /dev/yermomisabigfatbitchbiggestbitchinthewholewideworld -root \_ they should be delivered once the name gets updated tonight. -tom \_ root is just so ... rude!!11! \_ you get what you pay for. if you want quality service try a professional colo \_ they'll all be forwarded to the FBI. \_ ln -s /dev/null /dev/fbi |
2001/10/8 [Computer/SW/Security] UID:22665 Activity:nil |
10/7 I'm starting to dig rsync and ssh. There's some caveats that aren't clear to me yet such as how to create a passphraseless key but still be able to limit permissions on the key. Anyone know how to do that? \_ keychain might be the best you can get-- it keeps your ssh-agent running as long as the machine is not rebooted. That way, you can log in to foo, start ssh-agent running in the background, add your identities, and use 'em till foo reboots. http://www-106.ibm.com/developerworks/linux/library/l-keyc2 \_ What do you mean? Without a passphrase on your key, anyone with root on the machine your "identity" is on can read your key and use it. With a passphrase, someone with root can STILL get your key, but they have to work harder. If your key is on a machine that you're certain won't be compromised, with absolutely trustworthy root, then you don't need a passphrase. If your key is in an NFS-exported directory, you need a passphrase. [ reformatted ] \_ I think what he's trying to say, is that is there a way to set group permissions on a passphraseless key so the key can only be read by a certain gid (i.e. group foo). I don't think this is possible. \_ You don't need a passphraseless key; you can just use .shosts. \_ unless you don't administer the box.. grr... |
2001/10/6-7 [Computer/SW/Security, Computer/SW/RevisionControl] UID:22654 Activity:high |
10/05 I am have several accounts each with useful files and I often travel. I am looking for some software that create a virtual file system transparently and securely distributed over several locations that allow me to access them no matter where I am as if it is some file on whatever account/computer I am using. I have seen some "meta-frame" program for Win2000 on my friend's PC but it must be very expensive, for large companies and perhaps only works for win2000. Please recommend a low budget or free solution, either *nix or preferabbly multi-platform. Ok tnx. \_ You may try a file synchronizer, like /usr/ports/net/unison. It works on unixen and windows (and is written in Ocaml to boot!) -- ilyas \_ I assume that you will have net wherever you are...have you considered just scp'ing/running rdist via ssh? That's kludge-y but assuming your boxes are on the net, it'll work. Otherwise, if you run the machines, you can run an ipsec vpn between them and (ugh) nfs mount between machines. Both of those would be free. -John \_ It sounds like cvs would be a good solution. With cvs, you set up a repository somewhere on your home machine and then you can check out/check in files from wherever you are via ssh. Basically you set CVS_RSH to ssh and you set CVSROOT to something like :ext:me@mymachine.net:/home/cvsroot. Then use cvs checkout, cvs add, cvs update, cvs commit, etc. See the cvs info file for details. I've been using this method to work on files from home, school, and my laptop. -emin \_ Thanks for all the answers. It seems that VNC tunnled through ssh plus AFS are what I need, if I have the foo to manage it. By the way, can AFS traffic be encrypted, say over ssh? |
2001/10/6-7 [Computer/SW/Security] UID:22649 Activity:high |
10/5 Why do people think IMAP is betting than POP3 here? Is this an security issue? \_ Vegas has the best odds when you're betting. \_ IMAP has a superset of POP3 functionality. \_ IMAP stores messages and folders on the server. This means you can access them and from any machine that has an IMAP client. Email and folder content stored on the client is just a cache. This allows all IMAP clients to see the same view. In addition, clients can resync their folder cache and manage folders and email offline. This is useful when you read email from a number of different machines regularly and want one interface to all your various email accounts. \_ IMAP _can_ store folders on the server. That's how most clients are implemented. The protocol can also download and delete just like POP. |
2001/10/4 [Politics/Domestic, Computer/SW/Security] UID:22625 Activity:insanely high |
10/4 Someone please tell me why making airport security screeners to be federal employees going to help? I've seen government employees and they're still underpaid, laid back, and don't give a damn about you. \_ as opposed to airline employees? \_ just look at it this way: they can't get any worse. \_ Federalizing security means that the employees have to go through a basic security check, get paid on a wage scale, get benefits, and can make it into a career. It's also a draw for those just leaving the military. Crimes against airport security become federal crimes and can draw on the resources of the military. \_ The law also allows the fed to conduct polygraphs test on all Federal employees. \_ I thought the US military is not allowed to act against US civilians even if the civilians are criminals. civilians even if the civilians are criminals. Is it written in the constitution or something? \_ You have made an unpatriotic statement. Report to the termination vats immediately. \_ ^termination vats^Al Qaeda training camps \_ how is this statement relevant? -jon \_ The previous poster said "...... federal crimes and can draw on the resources of the military." \_ A better response might be "why is this bad engrish"? anyway, the US Military has been called upon to commit acts against US citizens before. EO 9066 --jon \_ I had also meant to write ".. draw on the resources of the federal government." I was thinking of the FBI and the newly created Office of Homeland Protection. Better resources than the local politzi. resources than the local politzi. Plus federal money to fund better security toys. |
2001/10/2 [Computer/SW/Security] UID:22622 Activity:nil |
10/2 Serious question: What should I do if I have my SSN, birth date, address, and other personal information stolen? \_ if you have material loss, report to the police. Not that they can help you much, but at least the court won't think you're making up stories of losses. Call up your banks/brokers, and let them know you have your id info stolen. Then tell them that no one from now on can access your account without a password which you will tell them. Check your account frequently. Unfortunately, this is about all you can do. You may choose to move your assets to a different, less popular bank so the theft will less likely to hit you again. \_ also call the credit agencies and put a fraud alert on your record, this will make it more difficult for whoever has your personal information to open new accounts in your name |
2001/9/21-22 [Transportation/Bicycle, Computer/SW/Security] UID:22583 Activity:high |
9/21 How is the government going to enforce the backdoors in the open source encryption software considering that it will be trivial to remove them given that you have access to the program source? \_ i just want to say something about all this encryption backdoor stopping the terrorist horseshit. If you have a good network of human couriers that can act as go betweens once a year or so, you can communicate the key to a one time pad generated by a random noise source like jonson noise or something. no one can break it, and even a moron can use it securely. The NSA knows this of course. they want to read YOUR mail, and make morons feel safe; this has nothing to do with stopping real threats. \_ Practically none of the security restrictions have to do with stopping real threats. You can drive across the Golden Gate but you can't bike across. You can hide a knife in your boot getting on a plane but not in your bag. It's a predictable reaction. -tom \_ Maybe they're worried about bikers/pedestrians getting killed by a bomb. Who cares about car drivers? \_ allowing unruly bikers across the bridge (which i may add has the variable # of lanes in either direction) would cause drivers to have more accidents, since bikers will swerve into traffic and assume the car drivers will sacrifice their vehicles to save the bikers life. (from experience in SF downtown traffic commute). \_ Are you a complete idiot? There are SIDEWALKS on the Golden Gate. -tom \_ What does your bike-across-the-bridges fetish have to do with terrorism and encryption? \_ They closed the sidewalks on the Golden Gate as a response to the terrorist attacks. -tom \_ Remove the backdoors from the source code? You mean removing them by altering the encryption scheme? \_ I think you should do a little reading on this kind of thing first. Then if you still don't understand you can ask your question. |
2001/9/21-22 [Computer/SW/Security] UID:22579 Activity:nil |
9/21 Encryption is in trouble: http://www.theregister.co.uk/content/55/21791.html |
2001/9/20 [Computer/SW/WWW/Browsers, Computer/SW/Security] UID:22556 Activity:moderate |
9/20 In Netscape for NT, how do I find out whether it's a 56-bit or 128-bit version? Thanks. \_ about: doesn't work for you? \_ It says" This version supports U.S. security with RSA Public Key Cryptography, MD2, MD5, RC2-CBC, RC4, DES-CBC, DES-EDE3-CBC." Does it mean 56-bit or 128-bit? \_ U.S. security probably means 128-bit (as opposed to 40-bit export security) |
2001/9/20 [Computer/SW/Security] UID:22545 Activity:very high |
9/20 There was something in the last meeting minutes about running crack/ripper on the passwords and emailing people about changing thier passwords. Has this been done? \_ aye. in process. \_ Any idea when emails will be sent out? \_ What's that all about? \_ I find this offensive and think logging in should be restricted for 24 hours. \_ Good, bring it before politburo, and I'm sure they'll be glad to hear your case. -dans \_ What does enforcing password changes have to do with login time? \_ What does enforcing password policy have to do with login time? \_ I think you are beginning to see his point. |
2001/9/20 [Computer/SW/Security] UID:22544 Activity:very high |
9/20 A problem for you: Tom is NATed behind a firewall. He SSHes out to a remote machine which is ALSO NATed and behind a firewall. (the remote FW has a redirect to the remote internal machine which is how he can ssh to there). Tom would like to run an X-term on the remote machine and have it (tunnled through ssh obviously) display on his local machine. Assuming he has root on the remote box and his box, but that any access to either firewall (especially the remote one) involves painful red-tape, What is the easiest way for tom to accomplish his objective. \_ "X11Forwarding yes" in your sshd_config and use "ssh -X" to get to machines. \_ Error: Can't open display: \_ chances are your error is unrelated to the NATing. \_ I agree with my esteemed collegue. \_ It is more likely due to your broken ass boxes \_ Indeed. If you can ssh successfully, it can forward X. |
2001/9/19 [Computer/SW/Security, Politics/Foreign/MiddleEast/Iraq, Computer/SW/Unix] UID:22516 Activity:nil |
ladenix 5.0 (jihad) login: _ |
2001/9/18 [Politics/Domestic/911, Computer/SW/Security] UID:22507 Activity:insanely high |
9/18 http://news.cnet.com/news/0-1005-200-7215723.html?tag=mn_hd " U.S. citizens back encryption controls " Right, only American companies can write encryption code/product, and the intelligence failure to warn the attack is due to, or partly due to encryption products! Classical "not my fault" syndrome. Let's ban commercial airlines because their planes are used in the attack. Let's ban all knives because they are used in the attack. \_ lets ban all people because they were used in the attack. \_ Let's ban religion. religion is the root of the Northern Ireland \_ Try economics. There's not much that was ever perpetrated solely because of religion. People aren't that pious, no matter what they may say. conflict, Palestine, Pakistan/India, and various historical atrocities. Not to mention the Holocaust, Cyprus, Kosovo, etc. atrocities. That's the one thing I didn't mind about China and USSR. Freedom FROM religion. I guess I don't mind Buddhists. They never slaughter anyone. (right? i'd be interested to learn otherwise.) \_ Tibetan Buddhism was the state religion of the Mongol Khans, \_ Tibetan Buddhism was the state religion of the the Mongol Khans, possibly the most murderous forces in known history. Zen Buddhism, as connected with Imperial Shinto during the years leading up to the Japanese expansion, was part and parcel with the philosophy that guided that set of warriors. \_ So is there such a thing as a religion that doesn't have significant blood on its hand? \_ Quakers? \_ Well, I see that as just being their personal philosophy, and not something that actively caused strife. I mean, I don't think they cared what religion other people were when they were conquering them, they just wanted to conquer them. That's good, honest conquest. They weren't haters. \_ Imperial Shinto? Zen Buddhism is very different from Shinto. What is your source? \_ The Shaolin monks in ancient China once fought for an emperor in the Tang dynasty against rebels in the region. I think in return the emperor gave the Shaolin temples exclusive rights among all Buddist temples to openly practise martial arts, or something like that. But that you can say they fought for a good cause. in the Tang dynasty against rebels in the region. But that you can say they fought for a good cause. \_ yeah, nothing wrong with that. no hatred, no frothy fervor. \_ lets ban the internet in the US! I guess I don't mind Buddhists and Hindus. They never slaughter anyone. I guess I don't mind Pengiuns. They never slaughter anyone. That's good, honest conquest. |
2001/9/13-14 [Computer/SW/Security] UID:22438 Activity:nil |
9/13 Well, the anti-crypto people are at it again: http://www.wired.com/news/politics/0,1283,46816,00.html \_ "They that can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety." -- Benjamin Franklin: Motto of the Historical Review of Pennsylvania, 1759 |
2001/9/13 [Computer/SW/Security, Politics/Domestic/911] UID:22421 Activity:high |
9/12 This is probably the scariest thing I've read all day: http://www.opinionjournal.com/extra/?id=95001106 \_ I heard the FAA is going to add another question at the checkin counters: "Why are you travelling." Yeah, they're going to block the terrorists when they answer "Well, I'm planning to hijack this plane." I feel safe now. plane." |
2001/9/13 [Computer/SW/Security] UID:22420 Activity:nil |
9/12 There are people looking for loved ones inside of New York City. C'mon computer geeks! Can't we setup an online forum/system service to help match people with loved ones in New York City? \_ This has been left as an excersize for the poster. But seriously, without adequate bandwidth and pubilicity I'm not sure how useful the effort would be? \_ that's why you are computer geeks, right? You are capable. Slashdot, newsgroups, people who want to donate ISP space... \_ There already is one. At Berkeley, too. \_ URL? \_ <DEAD>safe.millennium.berkeley.edu<DEAD> It has bw and server capacity. it's on the news. --jon \_ It's all over the wires as well, as a matter of fact. -alexf \_ some people can be so insensitive. They are adding names (on the other services) like Beavis and Butthead and Christina Aguilara. |
2001/9/11 [Computer/SW/Security] UID:22378 Activity:very high |
9/10 Why does OpenSSH default to "ForwardX11 no"? Given X11's lack of encryption, isn't this the best way to do X11? \_ X programs can do more than just open windows on your desktop -- they can also do things like capture images of your display (as xwd does) or intercept the keystrokes you type (as most window managers do). This means that, while it's safe to telnet to a random machine you don't trust -- it can't do anything to your local account -- it's *not* safe to ssh with X forwarding to a random machine, since that machine could (say) start monitoring the passwords you type into other windows. \_ Yes, but they believe X11 forwarding should be something you request as it can open security holes if you do it wrong. \_ So what can I do wrong when using SSH's X11 port forwarding \_ So what kind I do wrong when using SSH's X11 port forwarding that would open a security hole? \_ xhost +, which would then allow anyone on the remote machine to snoop everything you type, completely destroying the usefulness of ssh \_ This doesn't make sense. Why would someone who is using ssh want to use xhost at all and if you do "xhost +" it shouldn't matter whether you use ssh or not because either way there is a huge wide open hole at this point. \_ less things to try to hack. period. |
2001/9/7-8 [Computer/SW/Security] UID:22349 Activity:very high |
9/7 The DMCA just plain sucks: http://news.cnet.com/news/0-1003-200-7079519.html \_ Why are all you liberals trying to get things for free? \_ This is not about things being free. I don't mind paying for a good security solution. What I don't like is the fact that most people are scared into silence by the DMCA. Let's say that RSA, DH or AES was covered by DMCA and I found a weakness. I'd be scared of reporting my findings because I don't want to do hard time in a federal jail for violating the DMCA. If I don't report my findings people will continue to use a compromised security system. Someone less scrupulous than I may discover the same weakness and exploit it, which is very frightening. \_ yeah, everybody should pay for everything, all the time. listen to the whims of the corporations. screw fair use too! \_ As inconvenient as it might be to your conservative agenda, we still have the freedom to speak and think freely. \_ Liberals are the ones who try to limit freedoms. \_ Who is the one locking everyone up? \_ The Feds, regardless of political associations, have always been about locking up people. That's why we have the second amendment. So that they can't take your rights from you. |
2001/9/6 [Computer/SW/WWW/Browsers, Computer/SW/Security] UID:22322 Activity:low |
9/5 does shit like this still happen? http://www.techlawjournal.com/courts/kathleenr/20010306op.asp or is that only in backwater states? \_ um dude, that's livermore, ca. \_ and what's wrong with it? an idiot woman brought an idiot suit to court, and the case was dismissed. BFD. /- I think she IS an idiot, trying to make up for her own bad parenting skills. Obviously, this kid knew what he was doing; (printing his school schedule over the top of a "scantily clad woman"--how much money did he get for that from his buddies?) the library was just a means to an end. --sowings \_ I don't think the woman is an idiot. I think this scum is smart enough to realize that she can probably make some quick bucks by filing this idiot suit and reaching a settlement. Oh did she remember to get the media involved? Oh she might even be able to write a book afterwards on how her son's innocence was violated and how she was physically and emotionally hurt and how she spent years in turmoil before she recovered and blah blah blah. \_ You are right, this is terrible. Those librarians should be shot. |
2001/9/1 [Computer/SW/Security] UID:22315 Activity:nil |
8/31 check it out. Logged in from explorer on a mac (to csua/ssh)... SODA_1% which ssh /usr/bin/ssh SODA_2% ssh me@x.x.x.x SODA_2% history 1 23:09 which ssh 2 23:10 history it's like i just hit "enter" instead of the ssh command. what up? |
2001/8/31 [Computer/SW/Security] UID:22312 Activity:nil |
8/31 Is it ok to ssh to a remote machine as root? I need to write a script to do some administration jobs in a remote machine. Should I do ssh to the machine as root and then execute a command or ssh as a normal user and then use sudo to execute the command? \_ It really ends up equivalent. SSHing directly as root is probably easier. /etc/ssh/sshd_config PermitRootLogin yes IgnoreRhosts no RhostsAuthentication no RhostsRSAAuthentication yes Then, as root on the _server_ ssh back to the _client_ to get a copy of the client's host key in your known_hosts file. Now just make sure you have the client in the server's root's .shosts file, and you should be good to go. |
2001/8/30-31 [Computer/SW/Security] UID:22297 Activity:nil |
8/30 Well, it was bound to happen; a worm masquerading as a security advisory: http://www.theregister.co.uk/content/56/21376.html |
2001/8/29-30 [Computer/SW/Security] UID:22285 Activity:kinda low |
8/28 I use my cory account to ftp from campus labs when secure alternatives aren't available, so I basically treat it as hacked/hackable. But assuming that I need to get to soda from cory, which is more secure-- password-based normal logins, or password-protected DSA files? Or are they both about the same? \_ Why are secure alternatives not available? You can always use scp to transfer files or just log in with Java ssh with those library machines. \_ I use the NT/Mac machines in Evans/Wheeler/LeConte. I've never once been able to use scp/sftp... something about incompatible ssh versions. \_ probably not incompatible ssh versions, probably that they just have some free windows ssh client that doesn't support scp. Try just using the command-line windows ftp combined with s/key. That should do the trick. - rory \_ Is there a good web s/key calculator that doesn't need java? \_ Get WinSCP. Very good graphical scp for just this issue. http://winscp.vse.cz/eng --scotsman \_ WinSCP has some pretty nasty UI issues. Better than nothing though. \_ Also PuTTY/PSCP (Google search "putty") -- schoen \_ I think the problem is that these apps aren't installed in campus labs. I've mailed admin about it; no response. |
2001/8/23-24 [Computer/SW/Security] UID:22219 Activity:kinda low |
8/22 Someone mentioned something about using scotch to get to CSUA via port 80. How do I get an account on scotch? \_ if you drink enough scotch, you won't care about this stuff. \_ ask for an office acct. get your sid and come to 343. \_ scotch port 80 forwards to csua. \_ some nice person should post how to use the port forward on scotch, i can't remember right now \_ ssh http://scotch.csua.berkeley.edu -p 80. is that what you are asking? \_ though ssh is idiotic and doesn't include ports as part of the host definition in the known_hosts file, so this will tend to confuse it. You're better off putting: Host soda HostName http://scotch.csua.berkeley.edu Port 80 in your ~/.ssh/config file, and then just "ssh soda" --dbushong |
2001/8/21 [Computer/SW/Security] UID:22196 Activity:nil |
8/20 Anyone have exprience with Broadbandnow as a high-speed internet service provider? How is their service, bandwidth, etc.? thanks. |
2001/8/21-23 [Computer/SW/Security] UID:22195 Activity:high |
8/20 anybody have an ssh-over-http tunnel to soda that they're willing to share? \_ http://www.csua.berkeley.edu/ssh ? \_ doofus. he wants to run ssh using http as base for an IP layer. \_ I was looking for this a while ago. There's some stuff on the open source sites but I don't recall which. Try freshmeat and then sourceforge. I don't think it was on http://kernel.org. \_ use scotch \_ Actually I have been looking for a ssh-over-http tunnel that actually uses HTTP protocol, as tcp/80 can get intercepted by annoying http only things like caches and proxies. \_ That would be very painful. HTTP makes a very poor interactive protocol - the header overhead would kill you. \_ people behind corporate proxy servers don't have a choice. do you have any better alternatives? |
2001/8/20 [Academia/Berkeley/Ocf, Computer/SW/Security] UID:22191 Activity:high |
8/20 http://socrates.berkeley.edu:7015/email I've graduated many years ago. How are they going to enforce my soda account termination? \_ we can port and run re-reg (from the ocf). \_ the ocf hasn't run re-reg in years, and has no intention of running it anytime soon. \_ maybe. maybe it will now. Maybe you ought to think about options. Looks like a non-issue for now tho. \_ "years" meaning, what, 3? \_ What's the page about? My browser can't find it with the URL above. |
2001/8/20 [Computer/SW/Security, Computer/SW/Unix] UID:22180 Activity:very high |
8/20 [this is a copy of a message from Mike Clancy, posted here to gather ideas] I'm designing a "security" quiz for 9E. Topics I've thought of so far include file permissions (what should be readable/executable and what should not), the sequence of directories in $PATH, use of xhost, and setting up ssh access. I'd appreciate any other suggestions you might have. \_ why setuid/setgid shell scripts are bad and typically not supported. how to resolve of the problems with setuid shell scripts and chgrp, why chown is restricted to superusers. the limitations of those "solutions" Why setuid/setgid programs are good/bad chgrp, why chown is restricted to superusers. --jon \_ directory permissions: difference between r-x and --x and how command line args (e.g. vi filename) show up in ps output \_ What the sticky bit is, and why you would use it. \_ Why /etc/passwd is world readable but /etc/shadow is not. \_ Why anyone who has to take 9E having root is a bad idea. \_ What's 9E? - non ee/cs alum \_ self-paced unix course \_ How to tell when paolo is running a script that deletes the motd every 3 minutes. -tom \_ What's a jail, what does tripwire do. -John \_ Using my 1st amendment right, I disagree with tom. \_ How to figure out that paolo is running a script which deletes the motd every 3 minutes. -tom \_ Why you shouldn't use any English word, however uncommon it is, as your password. -- yuen \_ Why two bits of salt for a passwd is bad. \_ Why xhost should never be used and how to use xauth -alan http://www.xs4all.nl/~zweije/xauth.html \_ Why xauth is too much trouble and how to use ssh. \_ tom, are you still an undergrad? \_ no. \_ to paraphrase Theo: "Perhaps you should stay clear of discussions where the roles of undergraduate cs students -- especially what their responsibilities-- are being discussed." |
2001/8/19-20 [Computer/SW/Security, Computer/SW/OS] UID:22176 Activity:high |
8/19 Is this normal behavior: soda:~>dmesg | more <DEAD>kofthewest.com<DEAD>, AF_INET) failed pid 33773 (a.out), uid 1216: exited on signal 11 (core dumped) \_ as of: Sun Aug 19 20:42:43 PDT 2001 it is now saying: soda:~>dmesg | more : getaddrinfo(209-76-220-17.bankofthewest.com, AF_INET) failed pid 33773 (a.out), uid 1216: exited on signal 11 (core dumped) pid 24745 (trn), uid 30148: exited on signal 6 any ideas? \_ seems like the kernel message buffer got set really low. \_ I think some hackers from bankofthewest have gotten into your kernel. REBOOT IMMEDIATELY! \_ pid 9236 (sshd), uid 0: exited on signal 11 (core dumped) WTF is sshd dumping core? |
2001/8/19 [Computer/SW/Security, Computer/SW/Virus] UID:22175 Activity:high |
8/19 Hi Dr Nick! - http://www.computersecuritynow.com/article.php?sid=36&mode=thread&order=0 \_ I got tape worm... |
2001/8/18 [Computer/SW/Security, Computer/SW/WWW/Server] UID:22162 Activity:kinda low |
8/17 On 18 July, just as Code Red was starting to scan for vulnerable web servers, a CSX train carrying hazardous materials was derailed in the Howard Street tunnel in Baltimore, US. The derailment and subsequent fire severed cables running through the tunnel used by seven of the biggest net service providers to swap data. These companies started reporting disruption to the usual running of the net just as Code Red was hitting its stride, leading many people to assume that the worm was doing the damage. Analysis by Keynote has shown that even at its height, Code Red posed no threat to the running of the net. (http://news.bbc.co.uk/hi/english/sci/tech/newsid_1470000/1470246.stm - anyone else hear about the fire? \_ yes \_ It was in the news on TV. But I thought Code Red was later than the train accident. \_ What they DIDNT SAY, was that the train had a WBEM system, hosted under IIS, which caused the derailment once the web control interface crashed. \_ you gotta be kidding. \_ muah-hahahahahaha.... the sad thing is, it's plausible, eh? \_ It was noted right away in the RISKS digest (aka comp.risks) |
2001/8/15-16 [Computer/SW/Security] UID:22126 Activity:moderate |
8/15 security doesn't matter, my ass. Code red is running rampant on the financial aid office machines. I wonder how much sensitive information can be grabbed from there. \_ It does matter, but not many people are willing to spend money on them. I m very glad to see someone's finally pulled off code red just to make everyone aware network security is very important. \_ It hasn't raised enough awareness. The vast majority of Americans condone Microsoft for making such an insecure OS and accept the fact that worms and viruses are inevitable. If anything, Code Red is telling Americans that the time to deal with these problems is after the fact and that buggy software that requires a constant stream of security updates is acceptable. |
2001/8/13-14 [Computer/SW/Security, Computer/SW/OS/Windows] UID:22101 Activity:very high |
8/13 Edlin is the standard! Seriously, just wondering who has used edlin before. \_ oh baby yeah. my dad taught me edlin when i was 10 or so. it was easier than the funky diskedit clone he'd use for other things. --scotsman \_ I have... -geordan \_ I suppose you were using a pre-"edit" DOS version? \_ I remember editting autoexec.bat and config.sys with edlin. That must have been in the DOS 3.x era. \_ Yes. Boy, when "edit" came out (yeah, it was qbasic, but no one really cared) it was like a whole new world. Much better than the treebark I used to use. And I liked it. I loved it. -geordan \_ ditto. DOS 3.x or before had no edit. edit was so cool. What was the last official dos version? 6.11? \_ 6.3? \_ There was PC DOS 7.1. Don't know about MS-DOS. \_ I vaguely remember back in the pre-"edit" days I used something else other than edlin to change config.sys and autoexec.bat, but I forgot what program it was. I think I used edlin only once or twice. \_ copy con c:foo.sys and then hit ctrl-z when done - paolo \_ The truly lazy hit F6. -geordan |
2001/8/7 [Computer/SW/Security, Computer/SW/Unix] UID:22028 Activity:nil |
8/7 How is it that whenever I sign into my hotmail account, MSN Instant Messenger some how starts and re-registers itself to execute at login, without it ever asking me for permission? \_ Error: incorrect operating system detected. Please try again. |
2001/8/5 [Recreation/Food, Computer/SW/Security] UID:22008 Activity:high |
8/4 What do most bio majors do once they've applied to med school for two years on a row and got rejected both times? Do most of them just end up in the food service industry like history majors do? \_ is the food service industry big enough for english, history, AND bio majors? \_ Don't forget philosophy, psychology, ethnic studies, women's studies, religious studies, mass comm, sociology, and poli sci. \_ No. Philosophy majors (unless going to law school), upon graduation, immediately enter an eternal state of unemployment. \_ Soylent green is made of people! You've got to tell them! Soylent green is people! \_ I think many apply to med schools in other countries. And I got the impression that those doing bad enough to not even get into those have already changed majors by that point. \_ Agreed http://www.thinkgeek.com/images/zoom/despair-poster-stupidity.jpg \_ From what I understand, there are other options for bio majors besides med school. Some go into grad school, some go into pharma, and some go into completely different career paths. Most of the ones I know, however, ended up in pharma. -chaoS |
2001/7/28 [Computer/SW/Security] UID:21980 Activity:high |
7/27 In Applied Cryptography he basically comes out and says that IDEA is pretty much the cypher to use for max. security, but I keep hearing about this thing called AES that is "better". Anyone know where I can find a comparision of AES to IDEA in terms of the resitance to linear and differential crytanalysis. \_ from Schneier's mouth, he has no problem with AES/Rjendael; and things it should be used widlely. \_ Where did you hear this? AES isn't covered in ACv2. If there is a v3 I'd buy it just to read about AES. \_ See http://www.counterpane.com/crypto-gram-0010.html#8 -- misha. \_ Thanks this is perfect. \_ AC is somewhat out of date in this regard; I think IDEA isn't really a contender for use in new applications due to the patent and the fact that various newer ciphers are at least as good. I don't have any particular suggestions as to where to look for information beyond citeseer. --Galen \_ I had originally planned on (and still probably will) using either DES or 3DES (which ever I can get away with linking with without needing a export license). I was reading AC and found IDEA, which Schneier seemed to recommend. When I heard about AES I just wanted more info. Since I'm not an expert at this, I just wanted to read about how resistant AES is to known crytanalysis as compared to other cyphers. Anyway the above link had the info I needed. |
2001/7/27-28 [Computer/SW/Security] UID:21977 Activity:low |
7/27 Is there an easy way to use ssh-agent with KDM so that all my KDE processes can use my private key? \_ D00D U R 50 '1337 4 U51NG 57R0NG CRYP70! R U BL4CK H47 | WH173 H47? 1'M S7111 R3D H47! |
2001/7/24 [Computer/SW/Security] UID:21936 Activity:nil |
7/24 Its probably a good thing we are running OpenSSH instead of that commerical version: http://www.ssh.com/products/ssh/exploit.cfm \_ There was a hole in openssh a month ago. Get a clue. -tom \_ But the whole was not in the *default* config, this is a hole in the standard config. \_ My read of this "hole" is that it takes a password of two or fewer characters to open it up. Somehow, that doesn't have me quaking in my boots. Still, thanks for pointing it out. --PeterM \_ Some of the daemon accounts on *nix systems have NP as the password in /etc/shadow. |
2001/7/24 [Computer/SW/Security] UID:21921 Activity:nil |
7/23 All .mil sites no longer accessible to public! http://abcnews.go.com/sections/world/DailyNews/militarycyberattack_010723.html |
2001/7/23 [Computer/SW/Security, Computer/SW] UID:21915 Activity:moderate |
7/23 How do big employers catch employees surfing porn sites? Do they run software that checks employees' URL requests against a list of host names of known porn sites? Or do they actually check the content being transmitted? I don't think they'd hire an IT person to visually inspect every .JPG being transmitted, right? \_ i could require you to use a proxy to get out to surf the web, then i can just read the access logs and see you accessing the dirty pictures. there's also expensive software out there that will catalog and present in a nice gui to your manager your web surfing habits. i can't remember the names of any of them right now. you don't need to hire an employee, there is software that sits on the router that will do all the above. \_ Yes, that is my job. I examine all your dirty little pictures and decide which ones to keep on file. \_ use sameer's filter \_ URL? Google came up mainly with his current business and techno music stuff. |
2001/7/21 [Computer/SW/Security] UID:21894 Activity:nil |
7/20 Anyone here using megapath, speakeasy or telocity for dsl? If so, is the service reliable? I'm trying to decide between these three, as they seem to be the best rated in the SJ area according to dslreports. I'm leaning toward telocity because its $49/mo (128/1.5), while the other two are about $89/mo for the same. (Price isn't really an issue, I'm willing to pay ~ $100 for reliable highspeed service, but if the service is the same, I might as well go with the cheaper one). \_ I have IDSL (144/144) through MegaPath; had it about a year. Their tech support is a little annoying to reach, but the people you talk to actually seem to have clue (so very, very rare). I like them. --dbushong \_ I have ADSL through Telocity and it was fairly reliable since my service was restored after the Northpoint disaster. |
2001/7/19-20 [Computer/Networking, Computer/SW/Security] UID:21867 Activity:high |
7/19 I want to host a basic website running on my home computer. Any recs on a DSL provider that will let me have my own domain, whose service doesn't suck, and is under $100/mo? \_ First world has a 192K/1.5M line for $69/mo. The line comes \_ Firstworld has a 192K/1.5M line for $69/mo. The line comes with two static IPs and they don't care what domain name you register for those IPs. Alternatively you could try sprintbroadband (wireless). The "line" is 256K/2M for $49/mo and comes with one static IP. You need line of site to Monument Peak though. \_ Hey genius, Firstworld is dumping their DSL customers on Earthlink with no guarantees as of August 31st, so... \_ Where did you read this? I can't seem to find it on their web page, but if its true, I need to switch my line soon. \_ http://Speakeasy.net |
2001/7/18 [Computer/SW/Security] UID:21836 Activity:high |
7/17 ranga, http://www.ssh.com/products/ssh/cert/vulnerability.html is 404 today, but was there yesterday. What gives? - new guy #2 \_ Take a look at: http://www.google.com/search?q=cache:xWSTNSCGxl8:www.ssh.com/products/ssh/cert/vulnerability.html+ssh1+vulnerabilities+cert&hl=en (go google. fight the power). \_ Actually all you really need is: http://www.google.com/search?q=cache:xWSTNSCGxl8:www.ssh.com/products/ssh/cert/vulnerability.html Isn't web caching wonderful? I've also preserved a copy of just the text at: http://www.csua.berkeley.edu/~ranga/misc/sshv1.txt \_ Is it? http://www.google.com/search?q=cache:www.csua.berkeley.edu/motd \_ downright scary. \_ re ssh (not google cache) it seems that ssh1 is fine iff 1. you do not use RC4 2. you have valid host keys \_ There is also an intercept attack, but I'm not sure if that was covered in the cert stuff. |
2001/7/18 [Computer/SW/Security] UID:21834 Activity:low |
7/17 A Russian cryptographer was arrested in the US for giving talk on ebook security: http://www.planetebook.com/mainpage.asp?webpageid=165 \_ Clever. The First Amendment only applies to Americans. \_ ... that don't violate copyrights, or tell you how to make bombs, or .... |
2001/7/17 [Computer/SW/Security] UID:21822 Activity:high |
7/16 I'm also new to the csua -but not as "social minded" as the previous poster. What problems have you had using ssh1? I hear ssh1 is very vulnerable to certain attacks, but I've never been able to get someone claiming this to point me to urls/papers about ssh1 vulnerabilities. Is it something inherent in the ssh1 protocol (but not in ssh2)? Googling for "ssh1 vulnerabilities" doesn't seem to turn up much. \_ Not this all over again. \_ No. I don't want flammage about openssh vs ssh1 vs ssh2d. I want facts and urls to papers. \_ Take a look at: http://www.ssh.com/products/ssh/cert/vulnerability.html It has a summary of the cert warnings associated with ssh v1. ----ranga \_ thank you! - OG poster |
2001/7/11 [Computer/SW/Security] UID:21767 Activity:nil |
7/12 evoice is going away. any other service on the web out there like it? - danh \_ http://onebox.com |
2001/7/10 [Computer/SW/Security] UID:21753 Activity:moderate |
7/9 I accidentally clicked on "remember my password". How do I reverse this security mess? \_ click "forget" \_ what program? \_ internet explorer (application/login asked for it) \_ if it was "Remember my password" on a web page, delete your cookies. if it was the IE autocomplete thingie, Tools > Internet Options > Content > AutoComplete, uncheck the user/passwords box, click on the Clear Passwords button. \_ thx |
2001/7/9-10 [Computer/SW/Security] UID:21749 Activity:high |
7/9 W/ scp, is it possible to turn off encryption for a given data file while preserving encryption of the authentication process? (I'm sending a lot of large, nearly uncompressable files that aren't sensitive, and I just want to encrypt my password). \_ encryption != compression \_ Understood. I was merely mentioning that to make it clear any sort of benefits gained from the data munging are nil. \_ But what do you expect to gain by turning off encryption? today What's the best way to turn a movie into MPEG? \_ http://www.tmpgenc.com |
2001/7/9 [Computer/SW/Security, Politics/Foreign/Asia/Others] UID:21740 Activity:nil |
7/8 Speaking of M$, Any thoughts on why MSFT can't seem to get their instant messanger service running? I would think that with a co like MSFT the backup redundency would basically mean they can crash the entire system and it would still work within a day when they activate the mirror service sitting in line india or something-- but they have just been dead for a week now... |
2001/7/5-6 [Politics/Domestic/California, Computer/SW/Security] UID:21720 Activity:nil |
7/5 http://www.securityfocus.com/templates/article.html?id=221 \_ Computer security consultant and confessed cyber intruder Max Butler will serve out his 18-month prison term at the privately-run Taft Correctional Institution in central California, sources say. |
2001/7/4 [Computer/SW/Security, Computer/SW/Unix] UID:21712 Activity:insanely high |
7/4 I'm running win2k. when i leave my computer alone for a while and I come back, I have to enter in my password to "unlock" it. How do get rid of this? \_ M-X install-linux \_ disable the screen saver password. \_ no it's something else \_ works for me. dunno what weird config you have. \_ Control Panel -> Power Options \_ Repartition, install !win2k. |
2001/7/3 [Computer/Networking, Computer/SW/Security] UID:21706 Activity:nil |
7/3 Metricom has declared bankruptcy: http://news.cnet.com/news/0-1004-200-6442868.html?tag=tp_pr |
2001/6/30 [Reference/Law, Reference/Law/Court, Computer/SW/Security] UID:21688 Activity:nil |
6/30 fuck amihotornot: http://www.ratemyrack.com |
2001/6/28 [Computer/SW/Security] UID:21666 Activity:nil |
6/28 I'm trying to SSH into a PIX box. i've tried ssh -l "" HOSTNAME and that asks for the password for @HOSTNAME. I would think this would work but it doesn't. (the problem here being that the Cisco PIX just asks for a password not a username). What is the correct way to connect? \_ ssh -l <username> <hostname> \_ Maybe (s)he didn't want to reveal his remote login name to someone who can do a ps on the local host? \_ AFAIK you need to add a user to the PIX before it will allow you to login. - cisco alum |
2001/6/19 [Computer/SW/Security] UID:21580 Activity:high |
6/19 some fuck in russia the other day "found" a security hole in our system and sent us a letter that more or less said, "If you give me $150k I won't reveal this security hole to the public." Blackmail. One guy, some liberal dude, remained unconvinced that the intent was blackmail. Should we call the FBI? \_ What can the FBI do in this situation? \_ Yes. FBI Special Agent Kevin D. Johnson has helped us in exactly this matter: +1 (415) 553-7400. \_ Why are seemingly all FBIs "special" agents? Are there actually regular agents? \_ Most field agents who interact with the public are special agents. Whereas they have a supporting staff, such as lab techs and etc. who are just agents. it's all on the FBI www \_ Why are the FBI folks called "agents", why not just "officers" or "cops"? \_ why are real estate agents called agents instead of salesmen? |
2001/6/19 [Computer/SW/Security] UID:21577 Activity:high |
6/19 Here is another question for all you knowledgable crypto people. How bad is the ability of a PC to generate random numbers for cryptography? Is this at all a limiting factor in PC based encryption? If someone were to build a little box that made random numbers based on a physical process that was provably uncorrelated, would that interest people? \_ PC's running reasonable OS'es generate good random numbers. -tom \_ Depending on the sources of entropy used, a ordinary PC can generate sufficiently random numbers for use with cryptography. Look at how ssh does it for more info. \_ P3s can generate random numbers based on thermal noise, right? \_ I don't know. There IS a thermal diode on it, but I'm not sure of the response time. Actually, that might be an interesting little problem/implementation to do, since a lot of devices have thermal diodes these days, for over temperature protection. -nweaver |
2001/6/19 [Computer/SW/Security, Computer/Theory] UID:21573 Activity:high |
6/18 I have a question about diffie-hellman. After going through the initial key exchange and generating the session key k', how do you use this key with 3des or blowfish? Do you just trucate the key to the appropriate length (doesn't seem right) or is there some other method? tia. \_ Probably feed the key into a one way hash function (i.e. MD5) that outputs the appropriate number of bits. \_ This is correct. You would use a hash function. However, you should not use Diffie-Hellman straight, much the same as you should not use plain RSA. Get a cryptography book and read about it. \_ Okay, I understand the bit about the hash function, but I don't understand why the session key k' can't be used directly? I've been referring to Applied Cryptography, but I can't seem to find a place where he explains why the session keys should not be used directly. \_ Here's a hand-wavy argument: Your DH key must be larger than your 3DES key since otherwise it's easy to break DH. This means that you'll have to shrink your DH key to make your 3DES key. You want to make your 3DES key by using all of the randomness that you've got in your DH key, but you don't know if truncating the DH key will do this. However, you DO know that using a good hash function to make your 3DES key will conserve all of the randomness of your DH key. \_ I guess I wasn't clear. I understand that I need to hash the session key in a way that preserves the randomness of the key and that I need to use the hash value as the key for my crypto algorithm. The bit I don't understand is related to the following: I keep reading that one should use the hashed value of the session key *only* for encrypting a different secret key and then that encrypted secret key should be transmitted so that all other transmissions are encrypted with the secret key rather than the hash of the session key. Why can't I just keep using the hash of the session key? It seems much simpler to do this than to maintain a separate secret key. |
2001/6/14-7/20 [Computer/SW/Security] UID:21514 Activity:low |
6/13 Note that sprint just cancelled ION- who the hell knew what ION was anyway???? They had all these commercials but never once showed the product or what it does. Teledesic rocks! \_ I never saw an ION commerical, but I had read about it on several ng's. I was looking forward to migrating from 1.5 DSL to ION, but I guess that's not possible now. BTW, the ION web page doesn't have any info on the cancellation, though the check for service now says that the service is unavailable in my zip code (it was available last week). Teledesic looks good, but they won't be in wide service till 2005. I considered WildBlue for a bit, but they don't seem like they are *nix friendly (PC/Mac only). That leased line is looking better all the time. |
2001/6/12 [Computer/SW/Security] UID:21496 Activity:nil |
6/12 Here's the bottom line: The RIAA wants to control all channels of distribution. For a user to access his own "private" collection may infringe upon the notion of "ownership." Meaning that by leaving those mp3s on an "open" (yes it is open because you have access to it outside of the LAN) network exposes the user to "potential" distribution infringement. http://mp3.com attempted something like this but the RIAA nuked that idea right out the water. The way it would have to work is if the RIAA forces the user to license each component of music that he/she has access to, regardless if they had, indeed, purchased it. Why? Because the RIAA can track that information still. How? Through the networking software. Tapes and CDs prove to be untrackable in terms of distribution but software is trackable especially over networks. As long as the RIAA can track their distribution, no user truly can have that sense of privacy. In terms of tapes and CDs, the RIAA would have to invade each suspected user's home and then provide a warrant to search their premise. That's ridiculous in terms of overhead. Networking software makes usage tracking simple. The idea won't fly. I might've been talking about mp3 cell phones that are distributed by sony a while back. The reason why those are novel (albeit not necessarily popular) is because 1) it's Sony and DoCoMo doing the distribution; 2) the method of transmission is done through the memory chip. The memory chip is portable and removable so it's effectively like copying onto a tape. Supposedly the new G4 technology being pushed by DoCoMo will have a Java client that gets streaming audio/video to your phone. If it does, you can guarantee those lines won't be private and if they are it'll be challenged in court. - keithyw |
2001/6/1-3 [Computer/SW/Unix, Computer/SW/Security] UID:21404 Activity:very high |
5/31 Does anyone have the login/pw for the private space at http://ign.com? We shouldn't have to be paying for access..esp. things like the silent hill 2 full trailer. \_ Will somebody please provide a valid login/pass? They fucking cut off the last Hideo Kojima interview on the subject of mgs2...damnit..that chafes my hide. \_ sign yer name -shac \_ oh come on. the rest of the motd wants to know too. \_ l: phil p: vahmifqy \_ They have to pay reporters, editors, webmasters, sys admins, electricity bills, network connection bills, and much more - why shouldn't you have to pay them back for some of it? The dream of an advertiser-supported internet is dead - ads don't pay enough. \_ pay should be voluntary, like the PBS model. If you like what you get, you should donate some cash, but you shouldn't have to pay before seeing the goods. \_ that's ridiculous. \_ Communism is dead, kid. \_ YEAH, BECAUSE PBS IS AN EVIL COMMIE LIBERAL STATION. \_ psb is a communist? \_ This isn't communism. If it were communism, everyone would be forced to pay the government, and the government would be funding and running everything. Voluntary donations are than in a piece of shit rm or WMP format. Is that too much to ask? Damn ign bastards...*sigh* completely different. \_ "You shouldn't have to pay before seeing the goods." There is that "should" there that I don't like. The mentality seems to be that the consumer can dictate to the producer their terms. In a truly free society, all contracts are voluntary. for Linsux. \_ what's wrong with that? we're in a capitalist society driven by consumerism; why shouldn't consumers dictate what they want? \_ because you're an idiot. you don't get to decide *after* you use something whether you want to pay for it. -tom \_ you do if you have access to warez. long live warez! cd images galore! i wonder when someone will finally crack down on newsgroup piracy? \_ Property is theft! \_ regardless of what anyone agrees on, login: phil p: vahmifqy doesn't work. Someone please provide a valid login/pw. It's not like I can't get it at one of the other sites; I'd just rather have it in quicktime format than in a piece of shit rm or WMP format. Is that too much to ask? Damn ign bastards...*sigh* \_ COMMIE MAC USER!!! \_ QuickTime runs on Windows and there is even mov player for Linux. \_ The Windows Media Player much better than real, QT or anything similar out there. \_ WMP? Good? Surely you jest. AVI and ASF are total POS. The quality is terrible and the playback frequently hangs esp. if you try to stream a file. QuickTime at least has decent stream and playback. \_ I know not of AVI/ASF. What i know is that when i play the SAME file with REAL it looks like crap, when i play it with WMP it looks good. \_ you need to study harder. the correct answer is "M$ SUC|<Z U53 L1NUX!" and not worry about whether something works for you or not. |
2001/5/26-28 [Computer/SW/Security] UID:21366 Activity:insanely high |
5/25 If IPv6 encrypts everything (IPSec) as part of the standard, does this mean protocols like ssh would no longer be required? Will IPv6 allow telnet and ftp and other cleartext password protocols to live on? What use would there be for ssh if IPv6 was everywhere? \- i realize i am "begging the hypothetical" but the "if ipv6 was everywhere [and interoperating nicely, with reasonable key management, and transparancy]" is a pretty big if. "if ksh does everything sh does and more, why do we still have sh?" etc. --psb \_ It's a good question. I think the answer is mostly just inertia and history. \_ there will always be a need for application-level security \_ What does ssh do for me that ipsec doesn't? IPv6 encrypts, it compresses, QoS, and lots of other funs things. What does ssh get me in a pure IPv6 world? (Yes, I know this will take a while to happen, that's not my query). Don't get me wrong. I love ssh and use it for all sorts of stuff. I'm just not seeing a big role for it in IPv6. \_ Authentication? \_ I think a telnet prompt with memorised password is better auth than the keys-on-disk ssh standard auth. I can steal your private key. I can't read your mind. \_ you can require a key on disk, and protect the key with a passphrase \_ Is stealing someone's private key easier than reading their password out of the password file? \_ Yes. And can be more useful. \_ Of course -my- private key is encrypted. Go ahead and steal it. As for memorized password, it can be easily stolen as well with a use of a trojaned client or server, and I have seen this happen many times. \_ So you unencrypt your key before each use? Uh huh. If the server or client is trojaned all is lost anyway so it hardly matters what you use at that point, does it? \_ This is not true in general. It's easy to authenticate yourself without revealing your private key. \_ Yes, man ssh-agent. And if your are not using ssh-agent, then yes, you need to decrypt the key every time you use it. Ssh client does this for you. And yes, this is more secure because you don't have to send neither your password nor your private key to the remote ssh server. \_ I think you don't understand how ssh-agent or ssh itself works. ssh-agent is a local key manager that makes it so you don't have to retype your passphrase over and over for each new connection. Nothing more. I'd like to hear your explanation of how it auths to the server without sending any info. \_ do you even know what PKI means? \_ Same question: how are you doing auth without sending someone something? \_ i was speaking more broadly, e.g. SSL too. the main use of app-level security is authentication and integrity of data between app-level (not system-level) principals. \_ Is something like app-level ssl necessary when the underlying protocol (IPv6 in this case) deal with it? \_ yes, particularly for distributed systems. not only are there app-level principals that are not known at the system level to auth/authz, but you also want to reduce the extent of damage when one part fails. \_ Agent system, agent forwarding, x11 forwarding... \_ BTW, IPSec has nothing to do with IPv6. Implementations of both for *BSD systems happen to be codevelped by the same people (kame.net), but IPv6 !=, is not a superset of, does not imply, whathaveyou, IPSec. \_ Well, true, but what I read implied that IPv6 is assumed to use IPSec by default. |
2001/5/17 [Computer/SW/Security] UID:21299 Activity:nil |
5/16 OpenSSH 2.9 is released! And it supports rekeying, and all those other ssh2 features that people have been bitching about. When's soda going to upgrade? http://marc.theaimsgroup.com/?l=openssh-unix-dev&m=98883939725585&w=2 \_ Only tom's been bitching, the rest of us use OpenSSH and have no problems. \_ I have problems using OpenSSH. I keep getting these constant stream of emails from some guy named Tom Holub telling me to switch. \_ Hm, I suppose I should look into that upgrade to 2.5.2p2 that someone suggested a while back. --root \_ What's wrong with openssh? I'm using it and it works perfectly. \_ unless you are tom there is no problem \_ Prior versions of opensshv2 sucked when connecting to the non "open"ssh. even openssh2.5. I'm happy to report thta 2.9 has fixed my (20-40)-second delay problems. |
2001/5/16-17 [Computer/Networking, Computer/SW/Security] UID:21289 Activity:moderate |
5/15 http://edge.mcs.drexel.edu/GICL/people/sevy/airport/128bit.html (How to get 128-bit encryption from your Airport base station) \_ too bad you cant get 128bit from the builtin airport interface on their laptops. --jon \_ Rumor has it that 802.11b (including AirPort) are going to 54mbps w/128bit encryption in the coming months. Also, above url states AirPort has 64bit encryption, which is wrong, it's 40bit, which everyone knows you can pretty much break on the fly with your laptop and a little reciever. \_ 802.11b will never be 54 MBit. 802.11a will be. Its scheduled to be released in the fall/winter of this year. Most people say that you will probably need a new Airport card, but that you can probably upgrade your base station. \_ Uh, wtf is the point? The Gold and Silver levels of 802.11b encryption have both been cracked. Run IPsec with however many bits you want... \_ Its not "encryption" is Wireless Equivalent Privacy. The protection it provides is the same as what cat5 cable provides. No more, no less. |
2001/5/6-7 [Computer/SW/Mail, Computer/SW/Security, Computer/SW/Unix] UID:21182 Activity:high |
5/6 any web-based newsgroup posting sites out there now? deja/google not allowing at the moment...please advise? thanks. \_ http://www.mailandnews.com |
2001/4/30-5/1 [Computer/SW/Security] UID:21152 Activity:kinda low |
4/30 ForwardX11 is set to "yes" in my sshd2_config file (and was by default so i assume support was compiled into the default Fsecure ssh2 install that i have), but my DISPLAY is NOT being set upon connecting. What could be wrong? \_ That's ForwardX11 not ForwadX11. \_ fixed. It is spelled right in the conf file. \_ the remote sshd may not itself support X11 forwarding. |
2001/4/30-5/1 [Computer/SW/Security, Computer/SW/OS/FreeBSD] UID:21147 Activity:high |
4/30 And you though OpenBSD was strict about long hard to forge passwords: http://support.microsoft.com/support/kb/articles/q276/3/04.ASP \_ And the fun part is what happens when your admin account hits this fun little bug and you can't login to run the patch? FUCKED. \_ 03/08/2001 06:43p 5.0.2195.3351 331,536 Msgina.dll Software named after an SO? \_ Maybe but GINA actually stands for something. This isn't to say some random MS lackey didn't come up with something to fit the letters though. \_ Global Integer Non-Assigned for those of you who don't speak hungarian \_ Thanks. I was too lazy to look it up but I'm sure it was on google. |
2001/4/25 [Computer/SW/Apps/Media, Computer/SW/Security] UID:21107 Activity:nil |
4/25 http://news.cnet.com/news/0-1005-200-5726313.html?tag=tp_pr We should develop tech like this for the motd. Have a phantom "virtual sodan" bot that answers the dumb questions, and emits the obligatory RIDE BIKE and 'use google' remarks, and occasionally fetches useful info. \_ That's pretty useful for spreading rumors when you short a stock. \_ You mean getting sued and ruining your life? \_ It should also periodically initiate an Asian Chix post, post some obligatory trolls, insult tom, and accidentally overwrite some posts...just like a real person. |
2001/4/25 [Computer/SW/Security] UID:21100 Activity:high |
4/25 Where can I get the web based ssh stuff soda is running? I want to do the same thing at home to get around some workplace lame network setup issues. Thanks. \_ /usr/local/www/htdocs/ssh \_ or dl it from mindbright yourself: http://www.mindbright.com./products/mindterm \_ you do realize that it's just an ssh client in java, right? it's not ssh over http or anything, so if your network doesn't allow ssh packets to go through, it won't help you. \_ That can easily be remedied by having sshd listen to a port that the firewall allows instead of 22. \_ Ok, I dug further into it (I'm remote so this is all through email with the other person) and it appears they're doing http proxying. Nothing goes directly out. The workstation IP is 10.x.y.z. There is a unix box though, so I'm having them install sshd on that, running it on a high port, and then doing ssh NT->unix->home. The unix box has a real IP but only runs telnetd right now. You were right about the mindbright stuff not being what I wanted. \_ Hmmm... didn't know that. I'll have to check it out. Thanks for all the links and paths. \_ Ok, I found httptunnel. There's source, RPMs and a windows binary. Thanks for the help and info. Anyone bored is welcome to delete this thread. |
11/23 |