| ||||||
| 5/16 |
| 2006/4/11-24 [Academia/Berkeley/CSUA, Computer/SW/Security] UID:42732 Activity:nil |
4/12 Soda - very unstable. Is POP3/S disabled?
\_ Alright, who keeps rebooting soda?
\- soda is currently rebooting itself for an unknown reason.
someone on root is working on it, or if not, will be very soon.
-lin
\_ V FOR VENDETTA!
\_ From the csua home page:
Soda was recently compromised and the root staff have rebuilt it
from scratch. Soda was down all weekend for repairs. Due to the
scope of the attack, all user accounts have been disabled. Please
note, that if you logged into another machine from Soda in the
last two weeks, that account is compromised or if you used
keyboard authentication to access soda, your password has been
logged. The root staff has not yet restored POP and IMAP, but
plan to do so in the near future. In addition, certain parts of
~user public_html pages are presently disabled.
. |
| 2006/4/11-18 [Computer/SW/Security] UID:42729 Activity:nil |
4/11 so any suggestions how I can try and verify that other machines
to which I have access have not been compromised? in which case
hopefully it shoudl be enough to change my passwords. I dont
think I logged in anywhere from soda but woudl like to be sure.
\_ If you have logged in with keyboard interactive to soda, or ssh'ed
with keyboard interactive from soda your passwords are likely
compromised. Sorry for the instability.
\_ The machine I logged into soda from's password is
compromised? How does that work? |
| 2006/4/11-17 [Computer/SW/Security] UID:42724 Activity:low |
4/11 So is there a trail of evidence as to where this compromise came from?
\_ A theory is that someone caused the crash by trojanning
ssh/sshd and then instaling a rootkit when he temporarily had root.
\_ ZOMG remember remember, the 5th of november!
\_ Well, yeah that letter was involved.
\_ Let's go through some suspects. Who are some of the past
disgruntled root members?
\_ Historically the most digruntled root members are those who
still HAVE root (not by choice). --dbushong
\_ Yeah, but, erm, doesn't that kind of beg the question?
\_ A certain person installed and put the old vulnerable sendmail
back even on this current incarnation of soda. Seems like
maybe you should question him/his motiVes.
ssh/sshd and then instaling a rootkit when he temporarily
had root. |
| 2006/4/6-7 [Computer/SW/Security, Reference/Law/Court] UID:42708 Activity:kinda low |
4/6 http://csua.org/u/fg6 (orlandosentinel.com) Lawyer for DHS ICE Operation Predator chief (who pleaded no contest to exposing sexual organs and disorderly conduct), says he could have won the case: "The victim's account is not credible, Phillips said, saying that if the teen could see 2 centimeters of flesh from 20 feet away when others sitting much closer to Figueroa didn't notice anything, 'she has the visual acuity of most birds of prey.'" \_ 2 centimeters? Now I feel sorry for the guy ... \_ It's not too hard to see 2cm at 20 feet distance. \_ He thinks the average juror Joe would know how long a centimeter is? \_ because clearly, 20 feet from someone is a safe distance to be masturbating. |
| 2006/4/6-7 [Computer/SW/Security, Computer/SW/Unix] UID:42706 Activity:low |
4/6 /var/mail is full. I'd mail root, but...
\_ soda: [~] % du -h /var/mail/kislyuk
16G /var/mail/kislyuk
\_ Last login Sun Dec 4 18:44 (PST) on ttyB5 from ....
New mail received Thu Apr 6 09:12 2006 (PDT)
Unread since Sat Dec 3 12:47 2005 (PST)
\_ Isn't there a 25M quota on /var/mail? How did it get to 16G? |
| 2006/4/6-7 [Computer/SW/Security, Computer/SW/Unix] UID:42704 Activity:nil |
4/5 Problem: sshd acting weird. Platform: Linux 2.6.x. Symptoms: Ssh
\_ I thought Soda ran FreeBSD
connection got stuck all of a sudden. Cannot ssh into the machine.
Ping ok, and apache2 apparently working. Console log-in takes +5 min &
nothing weird in /var/log/*.log. Restarted sshd a few times, no luck.
Restarted the machine, everything's normal. Two hours later, sshd
is weird again. Same symptoms. What are some possible culprits?
\_ NIS or NFS?
\_ Hmm... any chance you have a bad disk? sshd's virtual memory is
writing to bad blocks, which causes it to run very slow? Or the
blocks where your auth.log or something else that gets written to
on login? -dans
\_ NFS mounted home dir on remote file server. DNS lookup failure
on that NFS mount, or DNS reverse lookup failure on remote host
but the console login delay implies NFS failure. Or it could be
something entirely different. :-) But I'd check those two first. |
| 5/16 |
| 2006/4/6 [Computer/SW/Security] UID:42696 Activity:high |
4/5 Problem: sshd acting weird. Platform: Linux 2.6.x. Symptoms: Ssh
connection got stuck all of a sudden. Cannot ssh into the machine.
Ping ok, and apache2 apparently working. Console log-in takes +5 min &
nothing weird in /var/log/*.log. Restarted sshd a few times, no luck.
Restarted the machine, everything's normal. Two hours later, sshd
is weird again. Same symptoms. What are some possible culprits?
\_ NIS or NFS?
\_ Hmm... any chance you have a bad disk? sshd's virtual memory is
writing to bad blocks, which causes it to run very slow? Or the
blocks where your auth.log or something else that gets written to
on login? -dans |
| 2006/4/5-7 [Computer/SW/Security] UID:42685 Activity:nil |
4/5 A few days ago someone asked for technical details for BART's fuckup.
Here it is: http://www.bart.gov/news/press/news20060405.asp
\_ well, they seem well-intentioned. I don't think anyone's
about to boycott Bart because of the downtime anyway.
\_ In one of those links posted I found it interesting to read that
one of BART's design goals is that a technical incident that
causes the shutdown of all trains for more than 5 seconds is
supposed to occur with a mean frequency of no more than once in
20,000 service hours. I think if you count the recent screwups
as a single incident, they probably meet that goal. Individual
trains obviously fail more often though. |
| 2006/4/4 [Computer/SW/Security, Computer/SW/Apps/Media, Industry/Startup] UID:42653 Activity:nil |
4/4 http://news.yahoo.com/s/ap/20060404/ap_on_bi_ge/computer_sciences Computer Sciences Cutting 5,000 Jobs. Don't worry it's not CS CS, but CS Corp. What a dumb ass company name, it's like Merck naming itself "Pharmaceuticle Company" \_ How do you feel about Microchip, LSI, or VLSI? \_ Or Analog Devices. But yea, CSC is bad. My company uses them and they are incompetent. \_ Usually they are called 'CSC'. As other have noted, how is that much different from, say, SAIC? |
| 2006/4/3-4 [Computer/SW/Security] UID:42641 Activity:nil |
4/3 Can someone explain why some people where getting "Connection Closed" when
trying to SSH to soda? -clueless
\_ something is wrong w/ password authentication. try ssh -v to get
more info.
\_ yea i did that. ssh -vvv What could be wrong with password
authentication?
\_ on putty/win32. I checked "x-forwarding." and it worked for
some reason |
| 2006/4/3-4 [Computer/SW/Security] UID:42632 Activity:nil 75%like:42634 |
4/3 Any idea why soda's SSH has been flaky the past few days?
\_ It has something to do with LDAP being a terrorist and sshd dying
randomly.
\_ I always knew El-Dap was fishy. |
| 2006/4/3-7 [Computer/SW/Security] UID:42630 Activity:nil |
4/3 SSH is being flaky. We are working on the issue. Please be patient.
In the meantime, we suggest using screen. Soda's ssh key has been
changed, sorry about that (ssh was restarted, as well).
We will post more as we work on the problem.
Thanks, students-not-in-class - edilaic |
| 2006/4/2-3 [Computer/SW/Security] UID:42607 Activity:nil |
4/2 Anyone been getting a "Connection closed by 128.32.112.233" when
attempting to ssh into soda? I'm getting this when using OS X's
OpenSSH but not when using Java SSH. [motd format god was here]
\_ I've been getting this too from OS X and from a Linux machine.
Clever idea to use the Java SSH client though -- i hadn't thought
of that.
\_ Works fine with putty. Something wonky happened recently.
Local ssh also fails. The sshd must have been broken.
\_ I am using putty and I am not able to get in.
\_ Further investigation: I added my key to authorized_hosts2
and can login from my OS X box now. It seems that the
keyboard-interactive method is broken. -pp
\- Starting last thursday around 5-6pm or so, we saw
some RSTs resetting ssh connections of certain network
segments I cant go into details about. We haven't figured
out where they came from and a fair number of people
are quite converned about this. I'd may attention to
chaning hostkeys and generally go to DEFCON4 for a while.
This was not in the http://berkeley.edu domain. If you see
this is other domains, can you list them here. Tnx. |
| 2006/3/31-4/3 [Computer/SW/Apps/Media, Computer/SW/Security] UID:42568 Activity:high |
3/31 Anyone want to engage in wild speculation on 30th anniversary Apple
announcements?
\ OMFG TEH 1337 LIMITED EDITION 30th ANNIVERSARY IPOD! -John
\_ More very expensive consumer electronics toys that lock you in.
\_ The iPod locks you in how? Well, ITMS does but frankly, ITMS
is lame. (Not the implementation, the whole DRM + too damn
much a song)
\_ I have plans to write an application that adds some of your
fair use rights back in to iTunes, but does not circumvent
the terms of the DMCA. -dans
\_ That's cute dan.
\_ I'm not sure how to interpret this. -dans
\_ Ignoring the fact that you will likely be in violation
of the itms terms of use, how exactly do you propose to
go about doing this in light of the 2d cir's ruling in
Corely (273 F.3d 429 (2d Cir 2001)) that "fair use"
doesn't mean that you have a right to use in your pre-
fered format?
And if you do decide to take up the challenge, you may
wish to speak to Robin Gross who handled the Corley
matter.
\_ I don't know how you can make such wild claims.
\_ Reckless posting like this will destabilize the motd for
generations!
\_ I bet BUD DAY never posts recklessly!
\_ Probably just an accident, but I find it odd that this thread from
the middle of 3/31 was nuked while threads with fewer comments or
responses from 3/30 and 3/29 were not. In response to the person
who mentioned terms of use as well as the Corley case: Actually,
the app I plan to release is something that facilitates legal
sharing, not format shifting. Also, isn't there more recent case
law that does support format and time-shifting as fair use?
Basically, it allows you to authorize a friend's computer for your
iTunes purchases for a limited amount of time, and then
automatically deauthorize. This in no way allows you to circumvent
having more than the max (5?) machines authorized at any one time.
I still need to look at the iTunes EULA to see if *using* this app
violates the terms of service. Even if it does, it's a contract
violation, not an illegal act. Regardless, it's definitely legal
for me to write and distribute it since it is intended to
facilitate legitimate, non-infringinging fair use of copyrighted
works. Also, I'm not 100% certain that my app is feasible, I still
need to look into some technical odds and ends to verify this.
Fortunately, we have many very good electronic rights lawyers in
and around this area, Robin Gross among them, as well as Berkeley's
own Pamela Samuelson, Lawrence Lessig, and Fred von Lohmann to name
a few. -dans
\_ AFAIK, most of there haven't been any recent cases of any
significance wrt time/space shifting.
You are probably thinking of the 9th Cir. ruling in RIAA v.
Diamond, 180 F. 3d 1072 (9th Cir 1999). Diamond dealt w/
what constitutes a digital audio recorder; not w/ DMCA
violations. The DMCA wasn't at issue b/c (1) it hadn't been
passed when the case was brought, (2) may not have taken
effect until 2000 (Sec 1201(a)(1) 2d sentence) and (3) CDs
don't have DRM/TPM so they are not covered under the DMCA.
Corley was 2 yrs later (2001) and dealt w/ the DMCA directly.
My understanding is that the Corley view that fair use doesn't
mean you have the right to make a digital reproduction pretty
much dominates.
It is of some note that the USSC avoided the whole time/shape
shifting Sony argument in Grokster. I'd personally be VERY
hesitant to get involved in any US effort in this area (but
then again I don't want to have to cool my heels in the
clink).
Re production of the app, I'm not sure that your interpretation
of Sec. 1201 is correct. You might be making a "device" whose
primary purpose is to circumvent Apple's access control mechan-
ism under Sec 1201(a)(2) (if one were to adopt the view of the
unholy hordes of darkness). You might also be making a device
whoe primary prupose is to circument a copy control mechanism
under Sec 1201(b)(2)(A) (perhaps the RIAA could use some 100W
bulbs in their offices so that they would not be forced to take
so dim a view of the law).
BTW, I took a class from Robin last summer and could probably
put you in touch w/ her if needed "more/better" info re the
DMCA, &c.
\_ Oh, cool. Thanks. I'm fairly confident that writing and
releasing the app is not going to get me sued. Of course,
before it comes to that, I'll almost certainly get a cease
and desist letter. I'll cross that bridge when I come to it.
I'm good friends with a former EFF staff technologist, and
reasonably acquainted with (one of?) the current one(s) so I
should have some inroads. As I understand it the law is
ultimately about arguments. So if this actually came to a
challenge, it would be up to a judge to determine whether or
not this consitutes a device who's primary purpose is
circumventing an access control or if this is a device who's
primary purpose was to facilitate contributory copyright
infringement. Is that a reasonable assessment? Thank you
anonymous motd legal advisor, I appreciate the insights.
-dans
\_ I love it when someone is more pedantic and long winded
on the motd. it makes me so hot.
\_ wtf? I asked a question. I'm not a lawyer or a law
student. Whoever posted the post I was responding to
clearly knows his/her shit. If my understanding of
theory or process is flawed, I'd like to know it. -dans
\_ Wow, so you post an honest question addressing
something your ignorant about, someone gives a
something you're ignorant about, someone gives a
snarky reply...and you get all pissy about it? I
remember you having a similar conversation not so
long ago, only with positions reversed....
long ago, only with positions reversed and you
getting very righteous about being snarky....
\_ My MOTD with Dans:
1. Sweeping comment Made by Dans.
2. Disagreement expressed.
3. Dans goes nuts and says "where are the facts"
(not that he has really presented any)
May remind you that he is Jewish.
4. You or somebody else tries to give a short
reply ... Dans broadens/changes the topic ...
and spends a lot of time ignorantly but
occasionally entertainingly (isn't that what
make it all worth it?) foaming.
5. You or somebody else takes the time to
post a long informed reply in an area of
expertise or experience.
6. Dans now says "I'm glad we had a civilized
discussion," not realizing he has been taken
to skool.
\_ sic --dans #1 Fan
\- that is olde english, used by
people too cool for school
\_ Please support your statement with facts!!
--dans #1 Fan
\_ Yup. Get over it. Hey look, I got my answer
below, which is all I care about! -dans
\_ Typical Jew.
\_ This is such an obvious troll, but say
that to my face some time and see what
happens. -dans
\_ Well, at least you're honest about your
hypocrisy....
\_ Your posts lack either insight or humor?
Do you have a point? If your goal is to
upset me, you failed. -dans
\_ You are mostly in the ballpark. There is more to
the law than simply arguments, and judges are
usually limited in their application of a statute
to a higher ct's interpretation of that statute.
I am not 100% sure, but iirc the word "primarily"
has pretty much been read out of the Sec 1201(a)
(2)(A). Note also that Sec 1201(a)(1) doesn't even
require "primarily."
There are two theories of vicarious liability you
probably need to know about:
1. Contributory Infringment - You knew that users
were infringing and either caused or contributed
to the infringment.
2. Inducement - You knew that users were infringing,
you materially contributed to that infringement
and you encouraged them to infringe for personal
gain.
If you gave the software away, you probably could
avoid the whole Inducement issue (the Grokster
theory of liability), but this is still an open
issue. hic sunt dracones.
After reading the itms music license, contributory
infringement seems like it could be a problem for
you. If you look at Section 9(b) Use of Products,
one may not actually own the bits that constitute
a song purchased from itms:
http://www.apple.com/support/itunes/legal/terms.html
[ This is one reason I won't buy from itms, even
though I drink a considerable amt of iKoolAid ]
\_ Cool, thanks! -dans |
| 2006/3/15-17 [Computer/SW/Security, Politics/Domestic/911] UID:42248 Activity:nil |
3/15 Homeland Security is everyone's business:
http://www.twotigersonline.com/banners.html -John |
| 2006/3/15-16 [Computer/SW/Security] UID:42246 Activity:kinda low |
3/14 http://news.yahoo.com/s/nm/20060315/od_nm/media_discovery1_dc Look you can look smart in front of your kids by relearning things you forgot in school! (In other words, people become dumber and dumber as they get older). \_ No, people forget things they don't use as they learn new things. \_ Just finished reading a Time article where it talks about how your brain becomes more efficient until around age 60 or so, when it starts to deteriorate. Of course, if you DON'T USE IT, then yes you will become dumber and dumber as you get older. |
| 2006/3/15-16 [Computer/SW/Security] UID:42245 Activity:nil |
3/15 Zfone Beta is out (secure VoIP software from Phil "PGP" Zimmermann):
http://www.philzimmermann.com/EN/zfone/index.html
\_ What do you have to hide? Hmmmm? |
| 2006/3/13-14 [Computer/SW/Security] UID:42206 Activity:nil |
3/13 "Big Boost Begins March 19"
http://www.actransit.org/news/articledetail.wu?articleid=c1e6ca52
New transbay bus lines crossing the Bay Bridge and San Mateo Bridge,
service increase to many existing lines, and the new All Nighter
service. |
| 2006/3/10-13 [Computer/SW/Security, Computer/SW/OS/FreeBSD] UID:42188 Activity:low 72%like:42184 |
3/10 Isn't posner supposed to be smart?
http://csua.org/u/f7i (news.com.com)
\- What is your point? also since he would have been hearing it
at the appelate level, his comment may be on some narrow legal
point. i imagine he approaches this in interms of his econ
approach about what ruling produces "efficient outcomes".
\_ this is so fcuked up.
\_ The guy who wrote the http://news.com.com must have read a different
opinion than the linked Posner one. Reading the linked Posner
decision, what the http://news.com.com article claims are "two
remarkable leaps" are actually just direct application of the
US Code ("damage" includes "any impairment to the integrity or
*availability* of data" [emphasis added]) or a previous decision
\_ I disagree. That US Code is "unconstitutionaly vague".
Simply deleting the files constitutes "impairent" to the
"availability of data." If attempting to delete the files
was a violation, then fine. But the fact that he happened
(unlike most people) to know how to *actually* delete the
files, is, im(ns)ho, irrelevant.
("violating the duty of loyalty, or failing to disclose adverse
interests, voids the agency relationship" State v. DiBiulio).
\_ The way I read the statute, IAC needs to show the following
in order to state a claim under the statute:
1. Citrin knowingly transmitted a program
2. To a protected computer; AND
3. Citirn intentionally used that program
4. To cause damage to the data on the computer; AND
5. Citrin was not authorized to cause that damage.
Posner is hearing the case on appeal from a dismissal for
failure to state a claim. Basically, at this point his
job is to assume that Citrin actually did all the things
IAC says he did and figure out if that would be enough
for IAC to get relief.
Added to this is the suggestion that some of the data
that was deleted may have been incriminating evidence
re a breach of contract or breach of the duty of loyalty
claim.
Given that it is so early in the game and the potential
destruction of evidence Posner seems to think that it is
probably a good idea to have Citrin tell the trial judge
his side of the story before the case is dismissed.
Re "damage" == "delete": To me, it seems clear that it is
within Congress' power to reach unauthorized deletions of
data from a protected computer under the Commerce Clause.
If you access my computer w/o my authorization, intentionally
install srm(1) and then srm /bsd, I think Congress has the
power to hold you liable.
I don't see the 5th amend vaguness argument, please explain. |
| 2006/3/2 [Computer/SW/Security, Computer/SW/Unix] UID:42066 Activity:nil |
3/2 very bizarre pass login behavior on soda ... I am able to login
using an old password, and variations of that password ... anyone
ever heard of this behavior before? I emailed root ... is anyone
checking that now???? |
| 2006/3/1-2 [Computer/SW/Security] UID:42050 Activity:nil |
3/1 Every once in a while my ssh and X11 via port forwarding would get
stuck and wouldn't respond anymore and I'd have to reconnect.
Does anyone know why this is happening and how to fix it? Thanks.
\_ Does this only happen after you've been idle for a while? |
| 2006/2/16-17 [Computer/SW/Security] UID:41894 Activity:kinda low |
2/16 When are these people going to realize how to correctly black out text
in a PDF file? It's fortunate it's only driver's license numbers that
were "blacked out".
link:csua.org/u/f05 (latimes.com) Sheriff's report on Cheney shooting
\_ I don't see what is wrong, give me a clue?
\_ Try to copy out the blacked out text.
\_ Try to think of the most stupid way imaginable to try to black
out text in an electronic document. Bingo.
\_ Hey, it might not be the stupidest. Never (mis)underestimate
stupidity.
\_ Beautiful. This happens almost too often in court, and people are
constantly calling to see if they can get what they thought was a
redacted copy off the website. --erikred
\_ "I was to report to the main house." "I was instructed to park my
vehicle ..." "I ... was turned over to another agent ...". Gee,
how submissive. County Sheriffs work for the county, not the Fed,
right? This Chief Deputy has no balls. That is, unless his report
on a typical highway pullover also reads like this:
"I was to report to the speeding driver's window."
"I was instructed that the driver's license has expired."
"I was turned over to the passenger who judged my (lack of) genital
size."
"I humbly submitted the written citation to the driver. Then I
excused myself back to the insignificant patrol car."
\_ Well, if he just ignored the secret service he'd be liable to
get his ass shot. Does he have authority over them?
\_ I know a guy who used to drive in nuke convoys when he was in
the army. The Colorado highway patrol used to try to pull
them over. They had helicopter gunship and F-15 escorts,
and U.S. gov't plates, generally were not speeding, and these
fuckers would come up with their little cop pistols and try
to start shit. It did not generally end well for the cops.
No one was ever hurt beyond a bruised ego, but they were very
very lucky.
\_ How do F-15 jets escort trucks going 65mph?
\_ Secret Service *is* law enforcement. They can make arrests,
etc. They most likely have jurisdiction wherever they are.
\_ If the County Sheriff don't have jurisdiction over this
incident, why was the Chief Deputy taking statements? |
| 2006/2/15 [Computer/SW/Security, Computer/SW/Unix] UID:41851 Activity:low |
2/15 Can one of you root guys please explain how tom has been
eearily and correctly identifying anonymous motd posters? Is he
abusing root or abusing his connection to root?
\_ I don't think tom's been abusing root. Unfortunately, it's not
too hard to identify most motd posters even without root. If you
have ideas for how to make it harder, please let us know. --root
\_ why should it be hard to identify who is posting to the MOTD?
Do we really think the MOTD is a better place for not having
the basic auditing capability that every other forum on the
net has? -tom
\_ I bet tom doesn't need technical means to know identify most
posters.
\_ Several of us have various scripted ways of figuring out who other
posters are but only a childish schmuck would descend to that
level in a cheap attempt to 'score' points on the motd. And his
predictive abilities are hardly "eery". He has a terrible track
record of identifying people especially considering how often he
names names.
\_ ooh, big bad tom naming names... Grow up, reiffin.
\_ nice try but wrong. |
| 2006/2/14-15 [Computer/SW/Security, Computer/SW/Languages/Misc, Recreation/Computer/Games] UID:41841 Activity:moderate |
2/14 Related to the gaming thread below. What made you/inspired you to
take CS? Computer gaming as a kid?
\_ Hott CS women. I was obviously misled.
\_ Isn't karen hot?
\_ Note that the comment is plural.
\_ If you're CS, yes.
\_ I liked computers and liked the idea of controlling them. I guess
I got started with LOGO and a toy robot that could be given simple
programs like "go forward, turn left, go forward, flash lights" etc.
\_ When I was 7 years old I used a Heathkit computer that my uncle had
bought. Just seeing some of the retarded games on it got me
interested.
\_ Anthro 193 survey form filled out by 200+ undergrads: all but a
trivial number said "money" or "parents made me for money".
\_ must have been during the boom years. I liked CS because it
was interesting.
\_ Early 90s. Definitely pre-boom. It was a recession.
\_ Writing really simple games in basic/pascal.
\_ Writing really simple but cool graphics code on an old Atari.
Pixels and sprites 4 life!
\_ Writing machine code on Apple II with no assembler to read some
hardware switches, and interfacing it with BASIC, was fun.
\_ Fuckin' a.
\_ Reminds me of when I wrote machine code to access the sectors of
a disk directly so I could read the Ultima IV map off the disks.
Then I remapped the character set of my dot-matrix printer to
match the game. The map was 256x256 squares. Ah, those were the
days of hand-assembled 6502.
\_ Just goes to show that practical application is a powerful
motivator; I learned ResEdit just so's I screw around with
hex code in Prince of Persia.
\_ We made our own maps on Ultima IV & III once we learned what
all the codes stood for.
\_ My mom was a ai researcher. |
| 2006/2/3-7 [Computer/SW/Security] UID:41689 Activity:nil |
2/3 OpenSSH 4.3 is out. Mostly bug fixes.
http://marc.theaimsgroup.com/?l=secure-shell&m=113881090315376&w=2 |
| 2006/2/1-3 [Consumer/CellPhone, Computer/SW/Security] UID:41652 Activity:low |
2/1 Dear old farts. What was the consumer end of telecomm like before
the 1983 divestiture of AT&T into 7 baby Bells, in terms of price
for consumers, sound quality, reliability, and service?
\_ Most of you youngin' were too young to remember this but back
then long distance calls were prohibitively expensive. On the
other hand, you didn't have tons of long distance carriers to
choose from each with confusing plans, and you didn't have to
worry about MCI or 1010220 or 1010-RIPOFF that exist today, each
ripping you off one way or another because you didn't read the
fine prints. The quality and reliability of service was CONSISTENT,
meaning it wasn't all that great by today's standards but at least
you knew that your line sucked as much as everyone elses. Nowadays
the quality varies so much (cell, landline, voip) that it's hard
to make an informed decision on choosing a good plan-- e.g. in
one year Cingular's great, but next year it'll be oversaturated
again. To sum up, I miss the accountability and consistency of
service in the old days. I miss not having to read 10 different
plans before choosing one. I miss the easy to read telephone
bills-- you ever read today's bills and see how confusing it
is? I wish that today's companies would offer more
accountability, more independent auditing of quality of service,
and above all else making plans and fine prints much clearer for
consumers to make informed decisions. -old man
\_ i thought it's just AT&T :p the quality and reliability was
pretty good in my experience. During Chinese New Year time,
however, I would have to keep dialing for hours at the time to
get the international phone call through. Long Distance phone
call was expensive. The most important thing, IMHO, is that there
isn't much innovation when AT&T dominated the phone landscape.
Call-waiting, call-forwarding, caller-ID, i think all these things
cames up *AFTER* the break up of AT&T.
- cant wait to see wave of innovation comes out after we
breaks up Microsoft
\_ Let's see how many units M$ can break up to: OS, browser and web
server, dev tools, games, office apps. Browser and web server
might need to break up further into two.
\_ I remember standing in line with my dad so he could get a phone.
You would rent your phone from AT&T, you didn't own it. I read
an article about little old ladies who have been paying the phone
rental fees for 20+ years because the phone companies never bothered
to tell them they can have their own phones for free now. It's
a not-insignificant revenue stream.
\_ I might be wrong, but from what I recall you could own a
phone or rent one. However, it was expensive to buy one
and most people rented.
\_ You could own a cheap one, but it voided out your AT&T service
agreement. If something happened, they would "check the line"
since your non-standard equipment might have caused the
problem. Since your agreement was now void, they could charge
you whatever and take care of it whenever they felt like.
Mmmm... Taste that monopoly goodness. Then AT&T figured they
could get around complaints and make money by selling AT&T
approved phones. Welcome Princess and Slimline phones!
\_ Cost of long-distance calls (let alone international calls) was
prohibitive. For a modern equivalent, cf. Japan's NTT five to
ten years ago, complete with phone renting, no competition.
\_ "So I feel like a real consumer fool about my money, and now
I have to feel like a fool about my phone, too. I liked it
better back when we all had to belong to the same Telephone
Company, and phones were phones -- black, heavy objects
that were routinely used in the movies as murder weapons
(try that with today's phones!). Also, they were
permanently attached to your house, and only highly trained
Telephone Company personnel could "install" them. This
involved attaching four wires, but the Telephone Company
always made it sound like brain surgery. It was part of the
mystique. When you called for your installation
appointment, the Telephone Company would say: "We will have
an installer in your area between the hours of 9
A.M. October 3 and the following spring. Will someone be at
home?" And you would say yes, if you wanted a phone. You
would stay at home, the anxious hours ticking by, and you
would wait for your Phone Man. It was as close as most
people came to experiencing what heroin addicts go through,
the difference being that heroin addicts have the option of
going to another supplier. Phone customer's didn't. They
feared the power of the Telephone Company.
I remember when I was in college, and my roommate Rob
somehow obtained a phone. It was a Hot Phone. Rob hooked it
up to our legal, wall-mounted phone with a long wire, which
gave us the capability of calling the pizza-delivery man
without getting up off the floor. This capability was
essential, many nights. But we lived in fear. Because we
knew we were breaking the rule -- not a local, state, or
federal rule, but a Telephone Company rule -- and that any
moment, agents of the Telephone Company, accompanied by
heavy black dogs, might burst through the door and seize
the Hot Phone and write our names down and we would never
be allowed to have phone service again. And the dogs would
seize our pizza." --Dave Barry |
| 2006/1/25-27 [Academia/Berkeley/CSUA, Computer/SW/Security, Computer/SW/Unix] UID:41509 Activity:nil |
1/25 to root: just curious... what might be the causes of recent
Soda unstability? are you guys doing something that may crash soda?
are you guys trying to fix something?
\_ The root of the problem is that the root used to be run by
experienced late 20/early 30 something folks, and when the
root was handed down by the new gen-Y 20 year old kids, they
don't know how to run the system. In fact they prefer soda
running on Windown XP.
\_ http://csua.org/u/erg
Rest assured, when Soda recovers from its Jan. 24th funk, it
will be much happier and stable. -mrauser
\_ I prefer the more straight-forward approach of the VP bat.
- jvarga |
| 2006/1/21-24 [Computer/SW/Security, Computer/SW/OS/OsX] UID:41471 Activity:low |
1/21 How does one usually write a log file from a multi-threaded
server? Is there a way to avoid using locks around the file
writes? Relying on some kind of low-level atmoic writes and
fsync() or something?
\_ I would create a class to act as the single point of access
to the log file. Have the other threads go through the logger
singleton to write the info into a ring buffer and signal
a separate thread to actually write to the file. - ciyer
\_ Well you will need a lock to write into the ring buffer, and once
one thread has that lock then if the buffer is getting full you
can have that thread write the buffer and flush the output stream
right? -!op
\_ That should work too. I work with audio and parts of my
code run in realtime threads which should not block, so
I've implemented a lockless ring buffer (using
CompareAndSwap on OS X) so the thread writing into the log
never takes a lock and can't access the disk |
| 2006/1/10-12 [Computer/SW/Security] UID:41329 Activity:nil |
1/10 I added X11 forwarding (said "yes") in /etc/ssh/ssh*_config
and /etc/init.d/ssh restart. However, my win ssh client
still says "server does not allow X11 forwarding." What's up?
\_ Silly question (or maybe not).. Are you running an X server
on your windows box? Another silly question. Is X installed
on said server? sshd needs to be able to find xauth, etc to
do X forwarding. Make sure they're in your path.
\_ THANK YOU. After thinking about this, I simply did an
apt-get install xbase-clients which then pulled in all
the X dependencies. Afterwards, I can do X!!! Yay!
Thank you so much. By the way how do I check which
package depends on others? I have no idea what package
I pulled in.
\_ rpm -q --requires xbase-clients -tom |
| 2006/1/4-6 [Computer/Theory, Computer/SW/Security] UID:41226 Activity:nil |
1/4 "Mo. Researchers Find Largest Prime Number"
http://news.yahoo.com/s/ap/20060104/ap_on_sc/largest_prime_number
Why are people interested in finding large prime numbers? They already
know that there are infinte number of primes, so what's the point of
finding them?
\_ because they are there. finding more may help with proving
(or disproving) conjectures about dist. of primes, etc
\_ You know that prime numbers have a lot to do with public key
cryptography right?
\_ Yeah, but with a prime as large as 30 million bits?
\_ This is usually tangential to burning in a new supercomputer.
They let it sit there and compute prime for a bit. As computers
get ever faster, they find new primes and it generates a little
PR for the guys running the new computer. At least this is how
most of these ginormous primes are discovered.
\_ Learning how to work with large primes has value. We used to
compute pi to billions of digits. Now we test primes.
\_ This particular project is more like SETI-at-home and
is validating a s/w concept re: distributed computing.
Lots of these primes are incidental discoveries.
\_ This is usually tangential to burning in a new supercomputer.
They let it sit there and compute prime for a bit. As computers
get ever faster, they find new primes and it generates a little
PR for the guys running the new computer. At least this is how
most of these ginormous primes are discovered. |
| 2005/12/26-28 [Academia/Berkeley/CSUA, Computer/SW/Security] UID:41141 Activity:nil |
12/25 I can't log into soda from my home machine. (I can ssh to beer
and ssh to soda from there, however) -jrleek |
| 2005/12/20-22 [Computer/SW/Security, Politics/Domestic/SocialSecurity] UID:41088 Activity:nil |
12/20 Update on the "DHS visits student for book ILL" story. At least one
fact is wrong. The ILL doesn't require a social security number:
http://acrlblog.org/2005/12/19/interlibrary-loan-causes-a-stir |
| 2005/12/12-14 [Computer/SW/Security] UID:40978 Activity:nil |
12/12 On the hardware page the SSH rsa and dsa keys are listed as:
RSA - 96:0d:44:65:af:9b:c2:9a:b3:19:6f:28:bc:07:85:e4
DSA - 91:cc:22:95:03:1d:92:3f:a3:4b:1d:5c:0c:44:d6:69
I think these are the keys for coke. Anyway, when I run
ssh-keygen -l on soda (or when I get the keys via keyscan)
I get the following values:
RSA - e1:9c:e5:c7:f9:9f:f3:af:04:ef:df:2d:63:b0:84:4a
DSA - 2a:5f:0c:23:c2:80:dc:ef:d4:ee:bb:4e:a5:80:25:d5
Can someone fix the webpage?
http://www.csua.berkeley.edu/computing/hardware
tia.
\_ Finally did it. - jvarga
\_ Thanks. You rock. |
| 2005/12/10-12 [Academia/Berkeley/CSUA, Computer/SW/Security] UID:40952 Activity:nil |
12/10 Where can I find the new ssh keys?
\_ http://csua.berkeley.edu/computing/hardware |
| 2005/12/9-11 [Recreation/Computer, Academia/Berkeley/CSUA, Computer/SW/Security] UID:40941 Activity:nil 77%like:40940 |
12/9 Looking for a job? Come work with us at Snapfish (now a service of HP).
It's fun and neat and all that stuff. Take a look at
/csua/pub/jobs/Snapfish for the latest postings, and feel free to
drop me a line with questions or whatnot. - ajani |
| 2005/12/7-9 [Computer/SW/Database, Computer/SW/Security, Industry/Jobs] UID:40906 Activity:nil |
12/7 We're looking for interns for a 3-5 month project helping us
populate our security policy database for various windows applications.
The work involves installing the application, using it for a while,
determining the appropriate security policy, and entering it
in to a database. Work is 15+ hours a week (however much you want
to work above min. 15 is fine), pays $12-$15 an hour, and can be
done offsite from the comfort of your own home.
email sking@zonelabs.com if you are interested.
--sky
\_ Don't you know students don't read motd?
\_ Good point. i should email jobs@csua |
| 2005/12/4-6 [Computer/SW/Security, Computer/SW/Unix] UID:40845 Activity:nil |
12/3 Free rootcow!
\_ Freed. --mconst
\_ What does this mean?
______________________________
< Someone may be abusing root! >
------------------------------
\ ^__^
\ (oo)\_______
(__)\ )\/\
||----w |
|| || |
| 2005/12/4-6 [Computer/SW/Security] UID:40837 Activity:low |
12/3 Hey root, did someone p0wn soda? Why'd the host keys change?! Is
this a man in the middle attack? Do we all have to change our
passwords and keys now? [Someone had to do it. ;-)] Thanks jvarga,
you're the best.
\_ I stole all your passwords. hahahahaha. Or something like that.
I figure I'll actually field this question: I actually intentionally
did not keep old-soda's keys. I'll post the new keys on the website
when I am a bit more conscious. For anyone that is interested:
http://soda.berkeley.edu/computing/hardware/soda-mark-vii.html
- jvarga |
| 2005/11/22-24 [Computer/SW/OS/Windows, Computer/SW/Security] UID:40691 Activity:kinda low |
11/21 In windows I can disconnect anyone who's using shares on my computer.
How do I disconnect from shares I'm using on another computer--for
instance because I'm using a common computer and I want to revoke my
authentication?
\_ right-click and hit 'disconnect'? -John
\_ "net use /?" from cmd shell. --sky
\_ No, not a mapped drive. I mean I browse to \\server\dir and want
to close the explorer windows and when I browse again I get
reauthenticated.
\_ Uh, as sky said: net use. It has nothing to do with whether
the drives are mapped.
\_ "net use \\server\dir /del". On the other hand, please tell
me how to disconnect anyone who's using shares on my computer.
Thanks.
\_ Right click on My Computer > Manage > System Tools >
Shared Folders > Sessions |
| 2005/11/16-18 [Computer/SW/Security, Politics/Domestic/President/Bush] UID:40626 Activity:moderate |
11/16 So, it was Hadley who was Woodward's source.
He was Deputy Natl Security Advisor at the time (NSA was Rice), and is
NSA now.
\_ url?
\_ http://news.google.com/news?q=hadley+woodward
\_ "In his book, Plan of Attack, Woodward says he was given access to
classified minutes of National Security Council meetings. Both
Rice and Hadley were major players in these meetings."
Okay, so he was given access to classified minutes and info. If he
was aware that the information was classified and he revealed it,
then he's guilty of revealing classified info. If he did not
reveal it, then Woodward's a dead-end in this investigation,
except perhaps to point out that the Administration tried to leak
the info from multiple sources.
\_ Are you suggesting that Woodward had some sort of s00perd00per
sekr!t clearance, and thus revealing classified info to him
would not be a crime?
\_ If not, then yes, it's a crime, and Hadley should be charged.
If he _was_ given clearance, then no. Either way, Scooter's
still in the fryer.
\_ NYT has hinted the Senior administration official might be Cheney.
\_ but the NYT is a proven fraud, many times over.
\_ You don't know what the word "fraud" means. It has not
been 100% correct, nothing is, but it has won many
Pulitzers for fine reporting. It has certainly got
more integrity than the Bush Administration. At least
they fire the liars in house, instead of promoting them
and giving them Freedom medals. |
| 2005/11/16-18 [Computer/SW/Security] UID:40622 Activity:nil |
11/16 Why doesn't Yahoo Mail use secure web pages? Does it take a lot more
hardware resource to run a secure web site? Thanks.
\_ Yes. You need to actually encrypt the pages, which is probably about
10x as expensive as serving them unencrypted. So, while not
resource intensive by modern standards in an absolute sense, 10x
means 10x as many servers to serve the same load. That's nothing to
sniff at for a big provider.
\_ there are SSL engine systems they could put in front of the
actual web servers to handle the encryption load and separate
it from the mail servers. They're not cheap however. What
were you paying for Yahoo Mail's secure mail service, again?
\_ Are you saying they aren't making any money off of me? |
| 2005/11/12-14 [Computer/SW/Security, Computer/SW/OS/Windows] UID:40559 Activity:low |
11/11 I'm phone shopping and looking for suggestions. I don't need anything
but good phone service and the ability to swap files easily with a
computer. I'm on Cingular. I just found out the only data swap package
for the Samsung phone I bought (SGH-X497) uses a serial port. No USB
options available which kind of blows. -- ulysses
\_ what kind of file you need to swap? Best addressbook /desktop
integration belongs to Microsoft :( If you want to swap photos,
ringtone, wall papers, etc, both Nokia and SonyEricsson has good
data suite for their phones.
\_ The addressbooki is all I care about. The rest is fluff AFAIAC. |
| 2005/11/9-11 [Computer/SW/Security] UID:40516 Activity:nil |
11/9 Does anyone know of a web hosting service that provides unix shell
access that can access IMAP files? I was looking at 1and1, which
offers good space/bdw and ssh access, but their mail is maintained
separately from the hosted files, which is kind of lame. I'd like
to be able to easily import or backup IMAP files using something
like scp. Thanks! -mds
\_ price range?
\_ Yes.
\_ 1and1 with shell access an 10GB of space is $10/month. I'd
like something similar (e.g. < $20/month if possible) that
has a shared pool of mail and web data. It would have to be
less than the cost of co-hosting my own box (which I don't
have time for right now). Alternatively, I guess some means
of doing bulk transfers of IMAP data might work in a pinch, but
I haven't seen a client capable of doing that? -mds
\_ Typically your IMAP data is owned by one of the mail server
accounts and couldn't be read by your UNIX account.
\_ so then you're completely at the mercy of the server
backups? I'd think there would be some way to take
a dump of those remote files as well? Haven't found
a thunderbird plug-in or similar to do so, though.
\_ belay that, found the link below. Thanks! -mds_
http://gemal.dk/blog/2004/02/19/backup_your_imap_mail
\_ How about fetchmail? --dbushong |
| 2005/11/8-10 [Computer/SW/Security] UID:40487 Activity:nil |
11/8 Don't forget, there's talk on software election security by one
of the leaders in the field, Dr. David Jefferson. It's tonight
at 6pm in 306 Soda,
\_ How long is the talk supposed to run?
\_ Probably about 1 hour.
\_ Why is it not held before the election day?
\_ Basically logistical reasons. David Jefferson is a busy
guy, and originally he was going to speak on something
totally different. We didn't get it all figured out until
last week, and the room is availible today. -jrleek |
| 2005/10/31-11/1 [Computer/SW/Security, Computer/Networking] UID:40347 Activity:moderate |
10/31 What's the best tool out there to crack WEP?
\_ pissed that your neighbor finally enabled encryption?
\_ Can't hack into the webcam in their daughter's bedroom?
\_ mmm, daughter cam.
\_ Auditor collection. http://www.remote-exploit.org and make a donation
to Max. You owe me a coke. -John |
| 2005/10/30-31 [Computer/Networking, Computer/SW/Security] UID:40339 Activity:nil |
10/29 I'm using ssh X port forwarding and just got a DLINK game router.
Which port should I prioritize?
\_ its all over ssh -- port 22 |
| 2005/10/28-31 [Computer/SW/Security, Computer/SW/Mail] UID:40324 Activity:nil |
10/28 Abandon the Web! guerrilla platform warfare: http://csua.org/u/dus |
| 2005/10/27-29 [Computer/SW/Security, Computer/SW/Unix] UID:40291 Activity:low |
10/27 Okay, is ftp completely gone? I'd search the motd archives but,
wait for it, there are none.
\_ try sftp or scp. most sftp clients that I've used have scp
support for transfering multiple files or directories.
\_ Hm, does WS_FTP do sftp?
\_ Use Filezilla.
\_ putty has a free command line scp binary that I use all
the time. I've never tried their sftp client, but it can
be found here: http://www.putty.nl/download.html -sax
\_ See section 3 of last week's minutes. -gm |
| 2005/10/22-24 [Computer/SW/Security, Computer/SW/WWW/Server] UID:40230 Activity:nil |
10/22 I want to set up a Wiki site for users of a software framework, but
I'm concerned about security. Are there any Wiki engines that are
particularly good about security? Any good sites discussing this?
Thanks. - ciyer
\_ Not twiki.
\_ google for natswiki. It's a mod of twiki. |
| 2005/10/22-24 [Computer/SW/Security] UID:40227 Activity:nil |
10/22 How come .nofinger does not prevent people from getting my last login
remotely?
\_ Make sure fingerd has permission to access your home directory --
otherwise it can't see your .nofinger file. Try "chmod a+x ~".
\_ Can't reproduce. Sanity check: soda has a hacked up fingerd. Are
you trying to put a .nofinger somewhere else? |
| 2005/10/16-19 [Computer/SW/Security, Computer/SW/Unix] UID:40126 Activity:nil |
10/16 I accidently overwrote a file in my home dir. Is there a process
where I can request the version of this file from, say, 1 month
ago? Or are there even backups/archives like this at all?
\_ mail root
\_ Yes, backups do exist. Right now, they are not mounted, so
you will need to email root. Be aware that backups do rotate out,
and are currently being sporadically manually done, so email sooner
than later -- njh (the guy who runs backups)
\_ Thanks!! Now that I think about it, I might actually have my
own backup from the time I want, though it would be on a PC
that I don't have access to today. I'll check for my own
backup before emailing root, but it's good to know that root
can help me if necessary. Thanks! -op |
| 2005/10/15-16 [Computer/SW/Security, Computer/SW/Unix] UID:40104 Activity:nil |
10/15 Here is a proposal, a compromise for both parties. Split
/etc/motd.public into two files-- one is /etc/motd.civil
which is logged and viewable by root only, and is viewed in
default .login. The other one is /etc/motd.wild, which is
unlogged and is pretty much like our current motd.
\_ The problem with this "solution" is that it does not fix
the problem of threats, slander, etc, from the point of
view of the politburo. They are still responsible for
hosting it. -ausman
\_ Your welcome to create ~user/cesspool.motd if you really want a
place where you can be threatened at will by anyone. Root will
not breach the anonimity of the logs unless there is a specific
post which requires it. -mrauser
\_ I have a better idea. We'll have one file called /etc/motd.public
which is an open forum for discussing politics, fundamental
computer science, the computer industry, general science, sex,
and the meanining of life in a lively, free form, while also
posting timely links about current events and giving recent grads
a leg up on their careers. Then we'll have another file called
/etc/motd.jamf, where a small group of people can have a
carefully logged and moderated discussion of vi/EMACS, the
latest linux kernel and monty python. Anyone who mentions
politics, sex, violence, industry, uses a swear word, or says
anything remotely useful or interesting on /etc/motd.jamf
will recieve a demerit. Three demerits will banish them forever
from /etc/motd.jamf. |
| 2005/10/14-2010/9/30 [Academia/Berkeley/CSUA, Computer/SW/Security, Computer/SW/Unix] UID:40095 Activity:nil |
**/** Do not mail individual members of root for assistance. You will be
ignored! Your root staff are: steven, edilaic, mconst, jvarga,
mikeh, mrauser, kimbrel, toulouse, vaheder
Your Politburo are: kimbrel (P), steven (VP), toulouse (S),
yns88 (T), vidya (L), steven (E), bordicon (A)
Your new Politburo are: toulouse (P), steven (VP), eyung (T),
stevenk (S), sakura (L), dw5ight (E), scotspin (A)
The uncensored messages below this line may not reflect opinions of the CSUA. |
| 2005/10/13-14 [Computer/SW/Unix, Computer/SW/Security] UID:40061 Activity:very high |
10/12 [moved to top]
I strongly suggest everyone read the minutes from the last
meeting. Both changes to the motd and soda itself were
discussed. -jrleek
\_ (Put up front since it's relevant) One thing that was left out of
the minutes is this: although we decided to enable logging of the
MOTD, we would like the implementation to be put in place by the
users OF the MOTD. The decision stands and is not debatable, but
the flavor of it is up to you guys. The current proposition is
to enable kernel auditing, such that only root can view the logs.
If you have a more palatable idea, you're welcome to submit your
opinions to root@csua. Of course, 'ideas' are not nearly as
useful as 'implementations', if you propose something non-trivial.
\_ I don't have any complaint on any of this. I just like to
ask if you guys can consider making the list of people who
have root public, and tighten access control to only those
who should have root. Secondly, I'd like to ask if you guys
can make all user complaints and requests to expose offenders
public. I'd hate to see root exercising power under the hood
without any form of auditing. Without public auditing
there is no check and no balance.
\_ Why perpetuate the scam and make us lend the logging an air of
respectability?
\_ I am amused by the fact that this was posted anonymously. -gm
\_ Exact proposition: "To allow, when necessary, root-types to
identify exactly who posted any message in the MOTD"
\_ If I read these correctly, the change that will be implemented is
a foolproof way for root-types to know who is posting to the motd,
so that people who make direct threats can be found. Somehow I
doubt this is gonna raise the quality of the discourse around
here.
\_ The problem is we've apparently seen root-type people abuse their
root in the past to un-anon people on the motd they simply don't
like. I'd like to know who the root-type people are and that
there is some official (as official as the csua can get) process
in place to a) make sure no one else has root and b) make sure
the very limited set of people with root are known and c) revoke
root privs of abusers. I was once in favor of a totally anon
motd, but given some of the vicious and excessive personal
attacks, threats, and named posts clearly intended to destroy
other people, I've changed my mind on the topic. Free speech
is a good thing but yelling fire in a theatre is not ok nor is
abusing anonymity to harass or ruin others.
\_ The root list has been getting cleaned up, and I have made
sure that the only people with root on any of the new
machines are active, trustworthy root types. Furthermore,
abuse of root power by anyone to un-anonymify someone for
any reason other than official business is an immediately
squishable offense in my book. If I caught someone using
root logs to spite someone on the motd, I would not hesitate
to not only revoke the root cookie, but also sorry that
person's account. I would even take such action on a
current member of Politburo if they did such. I consider
the privacy of the people on this server, and the
professionalness of those who have access to priviledged
information on this server very important. - jvarga
\_ You are a thin-skinned idiot.
\_ Haven't been around here that long, huh?
\_ Only about 8 years. What'd I miss?
\_ Pfft. n00b! -meyers
\_ You missed the part where not abusing root is a good
thing, and an obvious thing. Where have you been?
\_ Vicious and excessive personal attacks? Perhaps, but the
motd is not for the faint of heart. This is less "fire" in a
theater and more theater of the absurd. More Sproul Plaza than
debate club. Keep it anon. How else am I supposed to make my
snide "yermom" comments without looking like a total sleeze?
\_ yer mom doesn't mind looking like a total sleaze.
\_ You're correct that too many people have root. We'll get
an automatic reset when we switch to new soda, we should
set up some new rules then.
\_ So let's say some user provides a web- or e-mail based front-end to
let anonymous types modify motd. The soda log will show that the
creator of the interface is making changes, even though it could be
Joe Loser off the Internet. I suppose at the first abuse then that
interface should be shut off?
\_ Before the first abuse; it's against policy to share your
account. -tom
\_ Has this specific example been tested yet? ("share your
account" encompasses providing a web/e-mail interface for
people outside soda to anonymously modify motd)
\_ "share your account" means whatever they want it to mean.
\_ This would also qualify under "don't be a hoser." -tom
\_ Just curious, but how many of you outraged motders are actual
csua voters?
\_ I'm disappointed that the CSUA would run Linux, I'm not sure what
the issue was with BSD. There was a big push to get it working
at the end of last year, and as far as I know it was. What
happened? --jwm
\_ How competent is the vp? This is not intended to be a put
down as such, but failing to get bsd to boot may be
\_ How competent is the vp? Failing to get bsd to boot may be
meaningful or meaningless, depending on vp cluefulness.
\_ As freebsd developers have trouble getting 5.4 to run on
certain amd boxes, I wouldn't use this as a guide to VP
cluefulness
\_ You do know that my question regarding vp cluefulness
still applies until you show (boot_bsd(clueless admin)
== 1) for all values of clueless admin.
\_ What's wrong with Linux these days? (Aside from TRADITION!)
\_ If you have to ask, you don't know.
\_ Yes, that would be why I'm asking.
\_ Install the 2.6 kernel and see how long it lasts
under load.
\- can you elaborate on this a little. i have some
crunching farms and the people who run them for
me appear to slowly be moving toward 2.6. tnx. |
| 2005/10/13 [Computer/SW/Unix, Computer/SW/Security, Politics/Domestic/President/Bush] UID:40060 Activity:nil |
10/12 root, please do not squish me for posting this treasonous
url anonymously. also the picture is wrong, p bush
was funding them until 1951.
http://www.indybay.org/uploads/p1090147a.jpg - danh
\_ It's been nice knowing you danh, I shall miss you after your
mysterious disappearance.
\_ Huh, I didn't realize we were into punishing the sons for the
sins of the fathers. |
| 2005/10/8-9 [Computer/SW/Security] UID:40023 Activity:nil |
10/7 putty seems to lock up on Windows about 10 minutes after I don't type
anything ... Even with the keepalive with a "Network error: Software
caused connection abort" ... Adding the keepalives didn't make any
difference. Had to switch since soda no longer supports ssh1 ...
How do I stop this from happening?
\_ are you implying that your previous ssh client didn't do this?
\_ Yes teraterm + ttssh never had this problem.
\_ Same problem here--I am behind a firewall with a timeout setting
(haven't checked yet how long). This is the same for OpenSSH
3.8.1p1 on OSX, commercial SSH on XP and Mindterm. Use spinner,
that usually works for me. -John
\_ try both TCPKeepAlive and ServerAliveInterval on openssh...
curious to know if one helps and not the other. |
| 2005/10/6-9 [Computer/SW/Security] UID:40007 Activity:nil |
10/6 What's the easiest way to get the ip from the env var
SSH_CLIENT="10.10.10.10 1212 22" in bash? I want to use it to
set the DISPLAY env var.
\_ see man pages for any/all of: sed, awk, perl, cut, tr (and many
others).
\_ Why are you doing this? ssh will set DISPLAY itself if you
run it with the right options, and it will do it securely. -tom
\_ Ah, thx.
\_ ssh -X -l mylogin hostname
\_ ssh -Y -l mylogin hostname
\_ Ok, now it's slow. ;) What's the fastest cipher and mac
to use? The choices are:
rc4/blowfish/aes-128/192/256/twofish/3des...
\_ plaintext.
\_ IMO, blowfish is the best blend of speed and security
\_ RC4 is by far the fastest, and secure enough for joe averages
using SSH2.
\_ After you log in, how do you see what cipher/mac is in use?
\_ depends on what ssh you use, obviously. i don't know of
a way for openssh. use -v to see what's being
negotiated.
\_ Ok, now it's slow. ;) What's the fastest cipher and mac to use? |
| 2005/10/4-6 [Computer/SW/Security] UID:39972 Activity:nil |
10/4 New AC Transit Transbay Service Begins December 5th
http://www.actransit.org/news/articledetail.wu?articleid=35e17163 |
| 2005/10/3-5 [Computer/SW/Security] UID:39961 Activity:nil |
10/3 I would like to download my work calendar to my personal
laptop which is running XP outlook whilst the server is
Exchange 2003. The computer is not a member of the domain;
the standard " add exchange account" fails once it can not
resolve the username via check name. I have no problems using
imap or the web access to get access to the mail. I can also
log into shares on the machine as well. is there a way to
download the calendar via the cli ?
\_ You don't need to use 'check name'. It'll be something like
windowsloginname@exchangeserver.domain.com where domain is your
AD domain (AD usually but not always corresponds to your DNS
domain.) Check with a co-worker's outcrook that works. If you
can't figure it out, let me know and I'll check in a few days. -John
-- I found out what the problem was. There is a value in
mapisvc.inf called PR_RESOURCE_FLAGS that needed to be
changed in MSEX section. Thanks for responding |
| 2005/9/21-23 [Computer/SW/Languages/C_Cplusplus, Computer/SW/P2P, Computer/SW/Security] UID:39809 Activity:nil |
9/21 http://tinyurl.com/7swro It's the dawn of the age of uninhibited file sharing! LionShare is creates a neat, private sheltered place where people could shop music and movies to their heart's content without entertainment companies ever knowing. |
| 2005/9/20-21 [Computer/SW/Security] UID:39782 Activity:high |
9/20 what is 'fan service' in anime?
\_ scantily clad female characters
\_ It has more to do with very extraneous scenery that doesn't
enhance plot, character, etc. Mostly yeah, it's little
revealing clips (random upskirt shots, etc) but depending on the
feature and subject "fan service" can refer to anything 'extra'.
\_ I think wikipedia is pretty good here:
http://en.wikipedia.org/wiki/Fan_service
\_ Wikipedia failed on the word BBFS, bare back full service
\_ Go in and fix it! |
| 2005/9/17-20 [Computer/SW/Security] UID:39722 Activity:nil |
9/17 While using eMule, after some hours, it loses the internet
connection, sort of. eMule continues to work fine. If I have an
open ssh connection to csua, that's working fine. But I can no
longer go to any web pages, open any new ssh connections, and some
of the IM programs lose their connection and won't reconnect. The
only solution I've found is to reboot. Is there any other way? |
| 2005/9/11-13 [Politics/Foreign/Asia/China, Computer/SW/Security] UID:39626 Activity:nil |
9/10 One more data point that libertarianism leads to chaos:
http://news.bbc.co.uk/2/hi/programmes/click_online/4227578.stm
\_ "It can be used for many good things, like giving the oppressed a
voice, but users can also preach race-hatred or share child
pornography with complete impunity." Gee, what else does that sound
like to you... I know! Speech! Hands! Computers! Brains!
Ban them all!
\_ Any politcal/economic system can be a problem if unchecked. That
why we have limits on speech, captialism, etc. |
| 2005/9/9 [Computer/SW/Security, Computer/SW/WWW/Browsers] UID:39585 Activity:kinda low |
9/9 Dear Park B1 (Firefox 1.5) is out:
\_ "Deer" Park you moron.
http://www.mozilla.org/projects/firefox
OpenSSH 4.2 is out as well:
http://marc.theaimsgroup.com/?l=secure-shell&m=112558710925132&w=2
Portable: http://www.openssh.org/portable.html
OpenBSD: http://www.openssh.org/openbsd.html
\_ fyi, that B1 means Beta 1 (didn't know myself) |
| 2005/9/7-9 [Computer/SW/Security, Politics] UID:39549 Activity:nil |
9/7 Awesome, London's mayor thinks the bombers families should be
allowed to attend the national memorial service for the victims.
http://news.bbc.co.uk/1/hi/england/london/4220836.stm
\_ I think it's a good gesture. Or shall the sins of the father be
visited upon the son, and his son, and further unto 5 generations?
\_ Ob affirmative action.
\_ It would be a nice gesture if the victim's families invited
them (highly unlikely), not the frinkin' mayor. Inviting
the murder's family to the victim's funeral is asking for
trouble.
\_ True, but it's suicide 'victims' too. |
| 2005/9/6-8 [Computer/SW/Security, Computer/SW/Unix] UID:39525 Activity:nil |
9/7 Is there a way to change passwords on windows from the cmd line?
I only have a telnet session... Thx.
\_ Your google fu is weak.
http://support.microsoft.com/?kbid=149427 -John |
| 2005/9/6-7 [Computer/SW/Editors, Computer/SW/Security] UID:39523 Activity:low |
9/6 Probably old news to some of you, but what do you all think of the
"Street Performer Protocol"?
http://www.firstmonday.org/issues/issue4_6/kelsey
\_ I'd probably never go for it.
\_ I think the ideas sounds interesting in parts, but I don't
see how it could work as the primary mechanism for funding of
copyrighted works. An author who wishes to publish his first
novel will not be able to get donations, so he needs someone
else (i.e., a publishing house) to decide he is worth it,
market the book and put it in stores. That publishing house
needs to have control of the copyright to at least some extent,
because they publish and promote a lot of books by first-time
authors and most of them don't make money, so to fund their
operations they need to make their money from the few successful
books.
The idea might work for Stephen King. -tom
\_ Stephen King tried it and it failed him if I recall.
\_ King tried putting his books up for download by serial,
with small payments, but without any escrow. So very
few people actually paid for them because they were all
available on the the file-swapping services for free.
If he said "OK I want to make $100K off this book" and
waited until there was $100K in escrow, the file-swapping
problem would be mitigated. -tom
\_ It's overly optomistic about a performer's skill. One of the
greatest resource of a publishing house is it's editors. First
novels are hardly ever insta-classics without the vicious advice
of an editor. Plotholes, meandering writing, lack of character,
inaccurate facts, etc. sinks books even before they are finished.
A good editor will fix that. Plus, a partially written book does
nobody any good. Authors should create a finished product or they
will find themselves lost like a potter trying to glaze a wet
piece of clay. |
| 2005/9/2-3 [Computer/Rants, Computer/SW/Security] UID:39448 Activity:low 52%like:39356 |
9/2 Evil Corporation Wal-Mart response to New Orleans looters:
http://informationweek.com/story/showArticle.jhtml?articleID=170102839
\_ $15m in goods at retail prices or Wal-Mart prices?
\_ When is Bill Gates going do donate some Office 97 to the victims?
\_ I wish you'd post your names so I could hate you both properly.
Fucktards.
\_ What do you think the "sandbags" are filled with? |
| 2005/8/30-31 [Computer/SW/Security, Consumer/TV] UID:39354 Activity:nil |
8/30 http://cbs5.com/business/finance_story_228124420.html Interesting map idea, but I think would would be even cooler is a 3-D satellite map. Right now Google has a 2D satellite map, but if they can scan, interpret, and re-render the terrain in 3-D that'd be even cooler |
| 2005/8/29 [Computer/SW/Security, Academia/Berkeley/CSUA] UID:39326 Activity:nil |
8/28 The yellow triangle "Time Warner Full Service Network" poster has
been taken down from the CSUA Office. If this has any lore-value
to anyone, come grab it ASAP. First come, first serve. - amckee |
| 2005/8/23-24 [Computer/SW/Security, Computer/SW/Unix] UID:39241 Activity:nil |
8/23 Looking for a good backup software for Windows. Preferably free,
or something cheap with encryption. I'm sick and tired of manually
using MS's backup software to create a tar-like file and then
using my pirated Nero to burn it on the DVD. ok thx.
\_ Check out the backup reviews first.
http://www.backup-software-reviews.com
I downloaded a copy of Genie Backup Manager, trial version.
It is very good. I got it from Bittorrent with serial keys
but I liked it so much that I decided to buy it from them.
\_ I use Acronis True Image to back up my Windoze disk to an
external hard drive. It's fast: 1 gigabyte / minute over
FireWire or an efficient Hi-Speed USB 2.0 interface.
Image is password-protected (though not encrypted, but I think
the password protection is good enough). Buy the download version
off http://newegg.com. |
| 2005/8/23-24 [Computer/SW/Security] UID:39233 Activity:low |
8/23 Hi motd. I recently got a Dell Latitude D610 from work. There is a
"Hard Drive Password" feature in BIOS. After setting it, now every
time I boot it asks me for this before it loads the OS.
Does anyone know if this password is stored on the drive or on the
mobo? E.g., if the latter, I can just put the drive in an external
enclosure and access all files. Thanks. I suspect the latter.
Okay, I see here it looks like the former:
http://www.pcreview.co.uk/forums/thread-1942031.php
\_ Depends on the make & model. A lot of mfgrs deal with the password
with a combination of bios and either an eeprom or a reserved area
on the drive. Generally it's some variant of the bios being a
sort of "handler" for the password info which is stored elsewhere.
The good news is, there are ways of breaking this with some
understanding of electronics diagrams and a degree of proficiency
with a soldering iron. With some IBMs, for example, you need to
nuke the password on the particular laptop it was set on before you
can use it for something else (unless of course you break it, which
is difficult-but-not-impossible.) I did some research on this a
while ago for a project, but my info may be out of date. -John
\_ fyi, I downloaded the spec doc for the Hitachi 5K80 Travelstar,
and there's a whole section on this, which leads with: "With a
device lock password, a user can prevent unauthorized access to a
device even if it is removed from the computer." It sounds like
\_ fyi, I downloaded the spec doc for the Hitachi 7K100 Travelstar,
and there's oodles about password set/clear/change. Presumably
this is all stored on the HD.
Upon further reading, it looks like the drive supports a Master
Password and User Password. Presumably the Master Password is
known only to Dell and is different for different service tags,
and is used to unlock the drive if the user forgets the User
Password that he or she used to lock the drive.
Unfortunately it looks like all you need is a keygen program
to get the Master Password for Dell Latitudes:
http://www.techspot.com/vb/topic18780-pg4.html&pp=20
Doh! -op
I do agree that if you speak with Dell they'll probably tell
you a special way of clearing the "Hard Drive Password" if
you authenticate with them completely. And DriveSavers probably
knows exactly how to do it without any trouble.
After googling for a while, it looks like this is the only way to
clear the hard drive password: http://dp.allhyper.com
Much easier to clear the non-hard-drive passwords. -op
\_ OK the mechanism I found consisted of soldering together a
bit of electronic gymcrackery according to a set of wiring
specs I found, which would slurp the password hash off the
laptop via serial and let you dump it on a PC in order to
crack it. I'd be very interested in what you find, so if you
would like to look at the bit of poking around that I did,
drop me a mail (non-bouncing email in my .plan) -John
\_ Oh, it's just the link I posted -- run the keygen
against the reported hard drive code, obtain the password
which clears the other passwords. Apparently another
mechanism involves a paperclip shorting some pins. -op
\_ Good news. That keygen only works for old service tags
(ending with extension -D35B). Then, I e-mailed the owner of
the document that describes how to unlock passwords using
a paperclip (shorting some pins). He says his method is
only for the BIOS passwords, and there is nothing he knows
of that can unlock the "hard drive password". Yay. -op
\_ See above, offer still stands (dunno if it'll be of any use
but might give you some pointers of where to look.) -John |
| 2005/8/8-11 [Computer/SW/Security] UID:39058 Activity:nil |
8/8 Any tips on getting a bank, cell phone company, or utility to properly
acknowledge a change of address? With my recent move, both PG&E and
Cingular fucked up the change. In PG&E's case, they moved the
location of the account (i.e., where the gas and electricity was
being delivered), but not where the bill was being sent. In Cingular's
case, they just dropped the ball completely and failed to move the
account at all. In both cases I called specifically ahead of time to
move the account. Since the Post Office acknowledged my forwarding
request, but never forwarded any of my mail, I never got any
bills and got hit with all sorts of "surprise" disconnection notices
recently.
\_ You could try praying.
\_ Cingular's customer service is so f*cked up. Best bet is to
contact their customer service and get someone to give you their
direct phone number for future inquiries. If you get a different
person for each customer service inquiry, then just start praying.
\_ I moved several times in the past. Every time PG&E always sent the
bills of the old and new accounts to my new address properly. USPS
forwarded most of my mail properly for a year or so. Once a while a
piece of mail slipped USPS's forwarding mechanism and went to the
old addresse.
\_ I had a serious snafu with PG&E that took 6 months to resolve.
The short version is they couldn't keep track of what money was
supposed to go toward a deposit and what was towards my bill.
Even after you call them, the rate they actually fix things
is much slower than the rate the computers send out "we're
shutting off your electricity" notices, so I had to call a lot
to confirm with someone "Yes, I see the notes here, the
paperwork just hasn't gone through yet. Don't worry, we won't
shut you off." I'd say call once a month until things are
resolved, and when you call, just give them your account
number so they can bring up your case history and catch up
on the story. Thank goodness I don't have to deal with
PG&E anymore. -bz |
| 2005/8/8 [Science, Computer/SW/Security] UID:39036 Activity:nil |
8/7 I heard something about someone attempting to utilize NIS
authentication on Sloda. What was the exact nature for this,
was it to allow for a centralized system to manage users
amongst the different computers within the CSUA? What is
currently being utilized for this, and why was NIS chosen
vs. a less obsolete technology like LDAP?
\_ Why do you think somebody owes anonymous you an
explanation? Check the wall, motd logs. |
| 2005/8/4-19 [Academia/Berkeley/CSUA, Computer/SW/Security] UID:38981 Activity:nil |
8/3 Soda home directory quotas increased. Don't spend it all in one place.
--dlong
\_ So quit your bitchin'.
\_ Home dirs are now mounted off the new file server. Quota increases
abound, faster home dir access (no more home dirs on TDA!), etc.
*prepares for flames* Logins unified under NIS.
Everything appears to be working. Please email root if not. I need
a very long vacation. Hopefully new soda will be up soon. - jvarga
\_ Looks like keg is having issues with updating quotas on the fly.
Looking into it. - jvarga
\_ Anyone with a UID over 20000 didn't get a home dir quota
assigned to them. I've fixed that. Sorry! - jvarga |
| 2005/8/2-4 [Computer/SW/Security, Computer/SW/Unix] UID:38939 Activity:nil |
8/2 How do you create an NDMP user/pass on a netapp? The docs seem to
tell me how to check a given user for a password but not set up a
new user. thanks.
\_ Just use the admin/root user. |
| 2005/7/26 [Computer/SW/Security] UID:38825 Activity:high |
7/26 Doing the jobs American's won't do...
Mexican accused of leading document-fraud ring - Millions
of phony IDs for illegal aliens
http://www.freerepublic.com/focus/f-news/1450601/posts
\_ Yay, freeper is back! --freeper #1 fan
\_ And Freeper doesn't know how use an apostrophe! What a
dolt.
\_ Nice way to duck the issue raised with a weak personal attack.
I don't read freeperlinks or like freeperguy but you're
making yourself look more stupid than freeperguy. Either
respond intelligently, putting him in his place, or ignore it
if you have nothing worth saying.
\_ What's the issue to duck? Freeperguy hates immigrants.
This has been long established. There really isn't much
to do except make fun of him.
<<<<<<< /home/sgi/dcs/tms
\_ I'm not ducking anything. I didn't even read the article,
sounds boring. He didn't even make a point.
=======
\_ You haven't made fun of him. You've made yourself
look petty, stupid, and childish, assuming it was you
getting personal above. Just ignore it. Why can't
you see you're only encouraging it?
\_ FWIW, I wasn't the one making fun of freeperguy's
grammatical problems. --pp
\_ And he's getting incredibly good at hiding his identity
>>>>>>> /etc/motd.public |
| 2005/7/18 [Computer/SW/Security] UID:38675 Activity:nil |
7/18 I'm trying to infiltrate into the freeper site but apparently they
already blocked off an entire class D network, both at school and at
home. Does anyone have a similar problem? Can I get an anonymizer
to work? Anyone recommend a good and FREE anonymizer? Sameer's
<DEAD>anonymizer.com<DEAD> stops working after clicking a few times.
\_ Don't you have anything better to do?
\_ A real hacker would know how w/o using crap like anonymizer. |
| 2005/7/14-16 [Computer/SW/Security, Computer/HW/Drives] UID:38619 Activity:moderate |
7/14 Anybody upgrade to PGP desktop 9.0? I'm wondering how the
"Whole Disk" encryption is working out. Comments would be
appreciated. Thanks.
\_ I would also appreciate if anyone could give any feedback
on this. We are thinking about using it as an encryption
system where multiple users need access to the files.
-mrauser
\_ Go to class, mrauser. - jvarga
\_ Why? Are you hiding porn from Cisco's tough anti-porn initiatives?
\_ I consider it the ultimate crime to hide porn on any server I
administer. If you have pr0n on soda, you must make it publicly
accessible or face my wrath. Pr0n is a glorious resource that
should be shared freely with all who seek it. To summarize: no
hiding porn! - jvarga
\_ Addenum: if I have to su to get to it, you're making me do
too much work. - jvarga
\_ I vote jvarga as the most humorous admin EVER!!!
\_ I may have a backup of the j-pr0n archive lying around (from
around the same time as safari, I think.) Let me know if you
want this magnificent piece of CSUA history. -John
\_ upgrading to 9.0 broke a lot of stuff. we downgraded back to
8.x. |
| 2005/7/14-15 [Computer/SW/Unix, Computer/SW/Security] UID:38611 Activity:moderate |
7/13 Soda is back up, and the rest of the servers are slowly being brought
back. We're fixing lots of errors on all machines. We'll keep you
all posted. - jvarga
\_ DikuMUD doesn't work anymore. Can you please restore it, or if
you can't find it at least install a new version? I'd like to
start as level 29, one level before immortal. Thanks jvarga!
\_ Office accounts are going to be dead until I can figure out why the
*(#)&^*)#$ debian doesn't like netgroups. Anyone with insight on
this, please email me/root. Thanks. - jvarga
\_ Looks like I've fixed office accounts on everything but martini.
Problems to root. Moving on to the next stupid issues that came
out of this move... - jvarga (needs a life, and a raise)
\_ Great work. Thanks.
\_ Thanks for the time and effort you've put into this.
\_ Many thanks for seeing this through.
\_ Come now, all this nicey nice is unbecoming. Where's the
obligatory alumni bitchfest?
\_ Err, I still remember what it was like being a ugrad in cs.
I appreciate the work being put in for little reward. -mice
\_ Perhaps most of us are used to the trials and tribs of this
sort of thing.
\_ Awesome, thanks. But when do we get new soda?
\_ This is the first step to getting new soda online. But in the
interim, new soda needs to stop doing things like playing the
"OS not found" game on boot, and tell me why sshd is dead.
- jvarga |
| 2005/7/14-8/4 [Computer/SW/Unix, Computer/SW/Security] UID:38609 Activity:nil |
7/13 Scotch will be coming down tonight. Expect disruption in CSUA service
between 7pm and wheneverweactuallyfinish. We don't intend on bringing
soda down for more than a few minutes to rotate it in the rack (so
that it cooks evenly). Probability of list disruption will be high.
Office accounts will be unavailable. Njh will be piss drunk. - jvarga
\_ 7/14 Soda is back up, scotch is back up, lists are down, office
accounts are down. We're working on things, but I have to be
up at 6am for work. - jvarga
\_ 7/15 Office accounts are working again after much mudwrestling with
all systems involved. Debian mirror and other services on
screwdriver are back up. Send booze to root. - jvarga
\_ 7/24 Just realized that soda's FTP was being mounted off of scotch
(wtf?) and that's the cause of people's complaining. Am
looking at possible solutions. Please be patient. - jvarga
\_ 7/24 Lounge machines should be working again for the most part.
Still screwing with xterm logins. Send booze. Now. - jvarga
/
/
July 12, 2005
Root is planning to swap out scotch.CSUA for a newer machine in the next few
days as part of planned server upgrades. Scotch serves DNS, NIS for the
office, mailing lists, and is soda's backup mail server. During the
downtime, some or all of these services will be unavailable. The length of
the outage depends on our luck, but we hope to have everything back
available within a few hours with as little disruption as possible. Note
that the soda motd will continue to be as troll-filled as usual.
Additionally, the scotch replacement will bring in phase 1 of the new soda
upgrade. We will be unifying soda logins and office logins (but not home
directories), which means that I will be pulling the password database off
of soda to serve as the master list for office logins. This means that if
you have an office account, your office password will be the same as your
soda password. If you did not have an office account before, this change
will not grant you an office account.
The exact date and time of this switchover will be announced soon. Please
direct all questions/comments/concerns to root.
jvarga |
| 2005/7/13-14 [Politics/Foreign, Computer/SW/Security, Politics/Domestic/Crime] UID:38600 Activity:nil |
7/13 http://csua.org/u/cp6 (findlaw.com) "Whoever, having or having had authorized access to classified information that identifies a covert agent, intentionally discloses any information identifying such covert agent to any individual not authorized to receive classified information, knowing that the information disclosed so identifies such covert agent and that the United States is taking affirmative measures to conceal such covert agent's intelligence relationship to the United States, shall be fined under title 18 or imprisoned not more than ten years, or both." ... so, what do you think? I don't see "name" in the above, just "identifies", so I guess it depends on what the meaning of "identifies" is. A lot of it is also intent and foreknowledge. \_ Rove's claim that "I didn't know her name" is totally irrelevant. Identifying someone as "his wife" uniquely establishes her identity, except possibly in Utah. |
| 2005/7/12-13 [Computer/SW/Unix, Computer/SW/Security] UID:38553 Activity:low |
7/13 Scotch will be coming down tonight. Expect disruption in CSUA service
between 7pm and wheneverweactuallyfinish. We don't intend on bringing
soda down for more than a few minutes to rotate it in the rack (so
that it cooks evenly). Probability of list disruption will be high.
Office accounts will be unavailable. Njh will be piss drunk. - jvarga
/
/
July 12, 2005
Root is planning to swap out scotch.CSUA for a newer machine in the next few
days as part of planned server upgrades. Scotch serves DNS, NIS for the
office, mailing lists, and is soda's backup mail server. During the
downtime, some or all of these services will be unavailable. The length of
the outage depends on our luck, but we hope to have everything back
available within a few hours with as little disruption as possible. Note
that the soda motd will continue to be as troll-filled as usual.
Additionally, the scotch replacement will bring in phase 1 of the new soda
upgrade. We will be unifying soda logins and office logins (but not home
directories), which means that I will be pulling the password database off
of soda to serve as the master list for office logins. This means that if
you have an office account, your office password will be the same as your
soda password. If you did not have an office account before, this change
will not grant you an office account.
The exact date and time of this switchover will be announced soon. Please
direct all questions/comments/concerns to root.
jvarga |
| 2005/7/8 [Computer/SW/Security] UID:38481 Activity:nil |
7/8 Anybody use PGP mobile (from http://pgp.com) for PalmOS? How is it? It doesn't seem to support the "encrypted virtual disk" feature like on the PGP desktop versions. I'm wondering if that's even possible under PalmOS. I have files on my PC that I dump into the PGP disk. I want to take that PGP disk (just a file actually) and view it on a Palm PDA. Is that possible? http://pgp.com discontinued their pgp mobile product. Note that file-by-file encryption is not practical. I don't want to do this manually one by one. Thanks. [reposted; not sure why it was deleted -thanks] |
| 2005/7/7 [Computer/Networking, Computer/SW/Security] UID:38458 Activity:nil 80%like:38453 |
7/6 Steal someone else's wife, go to jail:
http://news.yahoo.com/s/ap/techbits_wi_fi_theft |
| 2005/7/1 [Computer/SW/Unix, Computer/SW/Security] UID:38391 Activity:moderate |
7/1 Is there some way for a non-root person to figure out when
someone's account was created?
\_ How would a root person figure this out?
\_ The adduser script used to keep a log file. -tom
\_ You're an idiot. |
| 2005/6/30-7/1 [Politics/Domestic/California, Computer/SW/Security] UID:38384 Activity:high |
6/30 Whenever I watch celebrity news I hear so and so is guilty in the
court and have to perform community service. They don't get fined or
go to jail, but have to perform community service. What's so bad
about serving your community? I mean, isn't it noble to serve food
for the homeless, paint houses for the poor, and clean up highways
trash? Imagine the United States drafting men between 18-25 to
perform mandatory community service for just one year. We'd
have a huge [free] labor force to clean up grafitti, recycle
cans, and other wonderful things that make our community more
beautiful. In our ever increasingly busy digital lives, we rarely
have time to even help ourselves, let alone help others out. We
are increasingly isolated from one another, and have very little
understanding on this "sense of community" that our grandparents
talked about. Perhaps incentives and rewards should be given to
those that help our community, to make everyone's lives better.
Community service is an honor performed by those who honor community
and brotherhood. It is sad and ironic that criminals have the honor
to serve our community. Just my two cents for today. -2 cents guy
\_ For reasons I won't elaborate on, I had to spend some time cleaning
up trash with the other "community service" people in People's
Park at one point. There is actually a pretty huge pool of
people who have "community service" hours to do at any given time.
Several of the people there had 1000 hours of service they had to
do. I was, as far as I could tell, the only person there who was
actually working. Mostly people would just show up and loaf around
all day, then get double that number of hours signed off for by
the dude who runs the park. If the dude who runs any given park
doesn't want to be corrupt, people just migrate somewhere where
it *is* corrupt. Of all those community service hours that get
handed out by judges, very little real service gets done (although
I busted ass cleaning up the park).
\_ This is a fairly old idea. This was called a 'subbotnik' in
USSR (only this was done on Saturdays, hence the name 'subbota =
saturday'.) You should ask someone who participated in a subbotnik
what they think of it. -- ilyas
\_ why didn't you participate in a subbotnik?
\_ I was too young. -- ilyas
\_ Switzerland requires you to serve the military or perform
substitute service (community service). Maybe John can tell
you all about it.
\_ Yes, and it's pointless, a waste of money, bad for the
economy (by forcing people to take a large, unproductive
gap between school and work, and by forcing employers,
including SMEs, to subsidize long absences), and exposes
young men to drugs and cigarettes. In the abasence of
enemies or funding for all these recruits, there are many
make-work projects to occupy the ~60% or so who don't
manage to get out of it. It's state slavery; totally
pointless and philosophically repulsive. -John
\_ One might obtain a somewhat less grim view of such matters by
looking at the Works Projects Administration established in the
US during the great depression. I believe modern Germany has a
similar program where one may choose between military or
`alternative' civilian service, but don't know much about it.
Also, why constrain this sort of thing to men only? That seems
backwards and silly. That said, if you're going to encourage
community service, I don't think picking up trash and cleaning
up graffiti are particularly inspiring tasks or the most useful
application of that sort of workforce. What made the WPA cool
was that it took on really ambitious projects. Even if you take
all this into account, I don't know how much it's going to do
for instilling a sense of community in people. I know there's a
geographic component to this: Many of my grandparents'
present-day friends are people they grew up with on the same
*block* in Brooklyn. They joined the service together. After
the war they settled on Long Island together. In their later
years, part of the group moved to the same communities in
Florida. Of your friends today, how many lived on the same
street you did when you were young? Do you still keep in touch
with your friends from high school? Personally, I think my
sense of community is as strong as my grandparents, just
oriented along different axes (e.g. cultural vs. geographic).
-dans
\_ I think the CCC also did something similar in the same time
frame.
\_ Why community service? Because we supposively live in a classless
society. Billioniares pay the same amount for a moving violation
as the average Joe. Community service forces the culprit to give
up time, which means the rich don't get off easy and the poor
aren't forced to pay fines. Both beat jail which puts the burden
on society. All of this is separate from enforcing a draft
(military or community works) or volunteerism. Much of the
reasons behind why not lay with the relationship of citizens and
government and society in general. And those discussions get ugly.
\_ Where is the claim made that we live in a classless society?
There have never been, and perhaps never will be a classless
society. -- ilyas
\_ I never claimed it was a classless society in reality.
It's just one of those things that American democracy
aims for. Probably a silly thing to put in the motd...
\_ I think the best you can say along these lines is
American society was in part a rejection of solidified
class lines of European society. I don't think the
founding fathers were specifically aiming to create a
classless society, merely to reject aristocracy in the
European conception of the word. Classless society is
probably impossible, and almost certain undesirable,
as a goal. Even an ant colony has 'classes.' -- ilyas
\_ Yes, and we should never seek to surpass the utopian
efficiency and elegance of ant society.
\_ If you seriously want to make men into an
ant colony, you should read Hellstrom's Hive.
Also, a certain quote from John involving a baseball
bat comes to mind. Do you actually maintain American
society has a classless society as an explicit goal?
Do you have a source for this claim, or are you just
making stuff up to suit your agenda? -- ilyas
\_ I think you were trolled. -John
\_ I think you're being needlessly pedantic.
"classless" in the context of government applies
to equal treatment under the law, one-person-one-
vote, etc. I think this type of classlessness is
an explicit goal of American society; that people
have equal opportunity etc. --!op
\_ When someone talks about a 'classless society,'
especially if they talk about ant colonies
being utopian in the same breath,
I understand them to be using the common
definition the Marxists use. I don't think
I am being pedantic at all, I think you
misunderstood the previous poster. -- ilyas
\_ I didn't write the "ant" comment, but I did
write the original "classless society" one.
The original thought was towards the equal
treatment of Man under law as opposed to
a more communistic "equality of Man" ideal.
The followup use of "American democracy"
was an attempt to point in that direction.
Apologies to those who may have been misled.
\_ What kind of "classes" do chimpanzees have?
\_ Chimpanzees have a society? (Actually, to the extent that
great apes are social animals and live in hierarchies you
may well say they have 'classes.' So do wolves. An
interesting question I thought about recently is why do
all functional wolf packs have at least one Omega).
-- ilyas
all functional wolf packs have at least one Omega).-- ilyas
\- I have discovered a remarkable proof for this but:
(0. Hola)
1. it requires the Axiom of Choice
2. the motd is too small to contain it.
3. ok tnx. |
| 2005/6/30 [Computer/SW/Security] UID:38367 Activity:moderate |
6/30 Whenever I watch celebrity news I hear so and so is guilty in the
court and have to perform community service. They don't get fined or
go to jail, but have to perform community service. What's so bad
about serving your community? I mean, isn't it noble to serve food
for the homeless, paint houses for the poor, and clean up highways
trash? Imagine the United States drafting men between 18-25 to
perform mandatory community service for just one year. We'd
have a huge [free] labor force to clean up grafitti, recycle
cans, and other wonderful things that make our community more
beautiful. In our ever increasingly busy digital lives, we rarely
have time to even help ourselves, let alone help others out. We
are increasingly isolated from one another, and have very little
understanding on this "sense of community" that our grandparents
talked about. Perhaps incentives and rewards should be given to
those that help our community, to make everyone's lives better.
Community service is an honor performed by those who honor community
and brotherhood. It is sad and ironic that criminals have the honor
to serve our community. Just my two cents for today. -2 cents guy
\_ For reasons I won't elaborate on, I had to spend some time cleaning
up trash with the other "community service" people in People's
Park at one point. There is actually a pretty huge pool of
people who have "community service" hours to do at any given time.
Several of the people there had 1000 hours of service they had to
do. I was, as far as I could tell, the only person there who was
actually working. Mostly people would just show up and loaf around
all day, then get double that number of hours signed off for by
the dude who runs the park. If the dude who runs any given park
doesn't want to be corrupt, people just migrate somewhere where
it *is* corrupt. Of all those community service hours that get
handed out by judges, very little real service gets done (although
I busted ass cleaning up the park).
\_ This is a fairly old idea. This was called a 'subbotnik' in
USSR (only this was done on Saturdays, hence the name 'subbota =
saturday'.) You should ask someone who participated in a subbotnik
what they think of it. -- ilyas
\_ why didn't you participate in a subbotnik?
\_ I was too young. -- ilyas
\_ Switzerland requires you to serve the military or perform
substitute service (community service). Maybe John can tell
you all about it.
\_ One might obtain a somewhat less grim view of such matters by
looking at the Works Projects Administration established in the
US during the great depression. I believe modern Germany has a
similar program where one may choose between military or
`alternative' civilian service, but don't know much about it.
Also, why constrain this sort of thing to men only? That seems
backwards and silly. That said, if you're going to encourage
community service, I don't think picking up trash and cleaning
up graffiti are particularly inspiring tasks or the most useful
application of that sort of workforce. What made the WPA cool
was that it took on really ambitious projects. Even if you take
all this into account, I don't know how much it's going to do
for instilling a sense of community in people. I know there's a
geographic component to this: Many of my grandparents'
present-day friends are people they grew up with on the same
*block* in Brooklyn. They joined the service together. After
the war they settled on Long Island together. In their later
years, part of the group moved to the same communities in
Florida. Of your friends today, how many lived on the same
street you did when you were young? Do you still keep in touch
with your friends from high school? Personally, I think my
sense of community is as strong as my grandparents, just
oriented along different axes (e.g. cultural vs. geographic).
-dans
\_ I think the CCC also did something similar in the same time
frame.
\_ Why community service? Because we supposively live in a classless
society. Billioniares pay the same amount for a moving violation
as the average Joe. Community service forces the culprit to give
up time, which means the rich don't get off easy and the poor
aren't forced to pay fines. Both beat jail which puts the burden
on society. All of this is separate from enforcing a draft
(military or community works) or volunteerism. Much of the
reasons behind why not lay with the relationship of citizens and
government and society in general. And those discussions get ugly.
\_ Where is the claim made that we live in a classless society?
There have never been, and perhaps never will be a classless
society. -- ilyas |
| 2005/6/29-30 [Computer/SW/Security] UID:38364 Activity:moderate |
6/29 Does anyone have a well-reasoned essay on why it's a bad idea to force
your users to change their passwords regularly? I have a strong
password and changing it frequently means I have to keep it on a
piece of paper or use dictionary words.
\_ I'm sure there's something obvious I'm missing here, but why can't\
computers just have either a rfid reader, a barcode scanner or a
\_ I'm sure there's something obvious I'm missing here, but why can't
computers just have either a rfid reader, a barcode scanner or a
magnetic strip reader, and just let users swipe a card? If carrying
an artifact on your keychain is good enough security for your car
and home, it's good enough for your computer. I think passwords
are fundamentally flawed for normal people (and I have *worse* than
normal ability to remember passwords.)
\_ Because optimally you want two-factor auth (remember, a combo
of what you have, are and know.) If you can only do one-factor
auth, you'd rather limit yourself to the last than the first
which can be more easily, well, swiped. -John
\_ I'm not sure I see the problem. I use a key I carry in my
pocket as the only form of security for my car (sure, people
may have some electronic thing, but they always have it
on their keychain also). So why does some office email
system have to have better than that? If the physical
security of the building is based on a key it seems that
should be fine for the computers in most offices. I'm
a totaly neophyte about computer security, but I've always
found passwords to be impossible to remember and I think I'm
not alone. Isn't a physical key better than a password that's
written on a post-it note right over the terminal?
not alone. Isn't a physical key better than a password
that's written on a post-it note right over the terminal?
\_ Why do you need well-reasoned? Everyone I know who has to change
passwords regularly switches between two passwords.
\_ That's nice, because lots of software remembers the old
passwords and this won't work. Personally, I have a good
memory and changing my password often isn't a problem. For
people who have trouble, simply store your passwords in a PDA
in encrypted format.
\_ At Intel, it remembered the last 8 passwords. Most people I
knew cycled through pass1, pass2, ... pass8, and then set
whatever they wanted. -emarkp
\_ http://www.securityfocus.com/infocus/1554 is a start. If you
drop me a mail (other address in my .plan) I will gladly find you
some very strongly worded essays on the topic--there were a few
good ones written on this area in the last year. Constant
password change policies and restrictive password histories are
a solution for weak-minded security managers. -John
\_ If you have an ACM account, I suggest looking up "Users are not
the enemy" by Adams and Sasse. Excerpt (from Firewalls and Internet
Security) in /csua/tmp/uante. -gm
\_ http://www.useit.com/alertbox/20001126.html --jameslin |
| 2005/6/29-30 [Computer/SW/Security] UID:38362 Activity:moderate |
6/29 Anyone have experience with monarch computer? They arn't shipping my
stuff when they said they would, and I'm starting to get concerned.
\_ used them once, no problems. but now i just use newegg.
\_ ordered an athlon x2 did you? anyway, http://newegg.com only lists when
they have stock, or they'll put an auto-notify link.
\_ No, I ordered an Athlon64 3700. Nothing special, and they say
it is in stock. At the moment I consider it poor customer
service, but if they keep this up I will consider it fraud.
It's a shame too they seemed to have a good reputation, but
they are just lying to me.
\_ No, I ordered an Athlon64 3700. They have now promised to get
it out tomorrow with expedited shipping which would be great if
it happens. |
| 2005/6/29-30 [Computer/Networking, Computer/SW/Security] UID:38359 Activity:low |
6/30 I don't want to crack WEP, but I'd like to learn more about it.
For example, is it a link layer encryption or is it tied to the
physical layer? If it is link layer encryption (something built
on top of link layer), then is it possible to "sniff" sequences
of packets on a regular computer then brute force crack it? Does it
take a super computer to do it or can anyone with a regular
laptop do it?
\_ go read http://www.tomsnetworking.com/Sections-article118.php - danh
\_ Looking at how some of the crackers work is a great way of
learning how WEP works. Have a look at Auditor at
http://www.remote-exploit.org for good tools and docs. -John
\- This may be more relevant to people with a greater interest
in wireless security than the OP but i looked at draft of
a book on wireless sec by william arbaugh of university of
maryland [i forgot the other authors, see AMAZONG] which
is going to be more indepth and theoretical than random
"how to" web pages, but is more practical than a berkeley-type
textbook. oh it looks like the book is out now:
http://csua.org/u/ck2 anyway, if that is what you are
lookig for, the book is decent (looks like it is 2yrs old
an unrevised, so may be lean on some recent things and
cover some things that died on the vine). ok tnx. |
| 2005/6/29-30 [Computer/SW/Security] UID:38356 Activity:nil |
6/29 Am in PST, still Wednesday over here ... quick follow-up to post re:
anonymizer. Looked into TOR, it seems to only protect the transport.
Privoxy or JAP would be alternatives to <DEAD>anonymizer.com<DEAD>. Actually
bought anonymizer at Fry's, and it seems to work pretty well. Now if
I can only disavow ever writing this message ... How do you people
figure out who wrote a post anyways?? |
| 2005/6/28-29 [Computer/SW/Security] UID:38337 Activity:nil |
6/28 Sorry for going back in time here, but where I am, it's still Tuesday
the 28th of June ... anyways, I had a couple of posts about how much
people trust http://www.anonymizer.com if people had experience with how
much anonymizer can protect your information, especially if they are
subpoenaed to turn over evidence. Please leave this post up a couple
of days, cuz I don't get to check the MOTD that many times a day.
If nobody wants to comment, leave a note to that extent.
\_ I used to work for a company in the same space. We kept access logs
for 7 days, mainly to get statistics and bill advertisers. If we
recieved a subpoena for access logs within 7 days of an event, we
would turn over those logs (as required). If the request came more
than 7 days after the event, we had no data to provide. The
Anonymizer privacy policy states that they will disclose privacy
information when required by law; however, they also say that
"Anonymizer does not hold any personal information on our customers
that could result in compromising their privacy and security", so I
don't know what they might give up. I seem to recall their policies
being about the same as ours, but it was a long time ago. -gm
\_ Screw anonymizer. Use TOR.
\_ Is TOR anything like Freenet? I tried out Freenet a while ago,
but it was unreliable and slow as hell. Looks like it's still
being actively developed, but haven't installed it on my new
computer. Does either TOR or Freenet rely on a lot of
participants? -- op.
\_ TOR is a serious mix-network crypto system. Pretty
industrial strength. Latency is gonna blow, but thats
the price.
\_ Nothing you do online is anonymous, the trick is to make as
cumbersome as possible for someone to track you. If you go to
a random library in another city, avoid cameras, use a public
terminal and use an anonymizer, your "less likely" to be
tracked than say logging into your home PC or local Computer Lab
while using your private e-mail account. It depends on what
risks you're wiling to take (cost/ benefit). |
| 2005/6/23-25 [Computer/SW/Security, Computer/SW/Unix] UID:38277 Activity:low |
6/23 I was not too smart to believe what I read on SBC Yahoo!'s web
site (that after merging my Yahoo! ID with a SBC sub-account ID,
I can reverse the merge by simply deleting the sub-account) and
went ahead with the merge. The merge did NOTHING as claimed--
I did not get any extra storage nor any extra service. So I
wanted to reverse the process only to find out that I can only
'suspend' an sub-account, but not delete. I called customer
service and was told it is impossible to delete an sub-account
and hence impossible to undo the merge. I have spoken to 5
people including one manager and one level 2 support person.
None was able to offer any help. I tried suspending the
sub-account, only to find out that I could no longer access my regular
Yahoo! account. Has anyone had to deal with this issue? How
was it resolved? Are the 5 people I talked to not too bright
or their web site is just lying?
\_ I have evidence that Yahoo is controlled by Scientologists.
\_ When this was first offered (2+ years ago), I distinctly remember
reading that it was not reversible. It's possible that the 5 people
you spoke with are still operating under that assumption. Print
out the page with the relevant promise and direct support
personnel to the url.
\_ I did. I pointed the support people to the URL that states
the process is reversible. All I get was a defensive
comment, "I am telling you the truth! It cannot be done!". |
| 2005/6/19-20 [Computer/SW/Security, Academia/Berkeley/CSUA/Troll] UID:38195 Activity:nil |
6/19 Stupid question. how do we implement POP and IMAP access on Soda?
\_ imap and pop over SSL works fine - danh
\_ Stupid answer. Slave monkeys and Google page-rank pigeons. - jvarga |
| 2005/6/15-17 [Computer/Networking, Computer/SW/Security] UID:38143 Activity:low |
6/15 Wanna have WiFi access on transbay buses, free for you and free for AC
Transit? Voice your support by taking the survey:
http://www.actransit.org/news/articledetail.wu?articleid=d5f2ff4a
\_ If they combine it with GPS so I know where the buses are...
\_ I put GPS and a coffee service in the suggestions box.
\_ It sure will get your responses ignored.
\_ Said the suicide bomber...
\_ I hope this is facetious, and if not, I hope you never ever
get your hands on a top secret DHS triple grade red
classified bus schedule.
\_ I already get this using my PDA GPRS/EDGE/UTMS cell with laptop
You are wasting money.
\_ Didn't I mention it'd be free? |
| 2005/6/15-17 [Computer/SW/Security, Academia/Berkeley/CSUA/Motd] UID:38139 Activity:nil |
6/15 Attempting to sftp to http://csua.berkeley.edu. Got password from key. Entered password and got back: Received message too long 1701996907 Wtf? \_ password from key. since sftp uses ssh, shouldn't you just use your normal password? \_ Trying to do anonymous motd? \_ No, trying to send files from my PC to my CSUA account. \_ Just use scp. \_ I just tried ssh from SunOS 5 and it worked. \_ I'm trying sftp http://csua.berkeley.edu from CSUA. I'm running tcsh as my shell. \_ tunneling ftp through ssh for sftp is a total lost cause. just use scp. google for winscp \_ he's not tunnelling ftp through ssh, he's using sftp. \_ he's doomed, it's not going to work. USE WINSCP \_ I use putty's psftp all the time. As well as FileZilla for xfering files to and from soda. Why is he doomed? \_ Update: so scp seems to do the trick (on soda and from my Mac). Purely for curiosity's sake, any idea why sftp isn't working? \_ It works for me on windows. \_ sftp seems to be working fine too from freebsd machine \_ A ssh1/ssh2 mismatch? Just a guess, I have never used sftp. scp works fine for all my needs. |
| 2005/6/13-15 [Computer/SW/Mail, Computer/SW/Security] UID:38098 Activity:nil |
6/13 Any recommendations for a free webmail service that doesn't charge for
POP3 download, SMTP? I want to be able to access it using VersaMail
on Treo 650. Using GMail right now, but I'm not a big fan of their
privacy practices. So the requirements are: free, respects privacy, a
viable company.
\_ I think you're just going to have to suck it up and use Gmail.
\_ Agreed. No company is gonna offer free popS service for free
besides google. At least not right now. |
| 2005/6/6-7 [Computer/SW/Security, Computer/SW/Unix] UID:37988 Activity:nil |
6/6 s/key confusion and confirmation: I must have reading deficiency. I
read the s/key howto over and over but I couldn't grasp the idea. So
maybe someone can confirm my understanding of it. The s/key stuff
only dictates which machine I can access the csua server from. That
is, if I have entered the one time password from my home desktop, then
I can log in from my home desktop with my unix login/pass. I can not
log in to cusa from my work machine if I haven't entered the one-time
pass on that machine.
Basically, since ssh2 is in effect now, I downloaded PuTTY. After I
enter the login as value, it shows "s/key 92 hi97345", then "password".
However, I used the s/key calculator, and put in 92 hi97345, and got
a one-time pass, with that pass I can not log in. But I tried with my
unix password, I'm no logged in. So I am confused why it has "s/key"
stuff and didn't expect a s/key one-time pass phrase? I basically
just use my unix login/pass just like before ssh was enabled.
\_ Same here--that is, I've been seeing the s/key stuff when logging in
since the ssh change, but I'm loggin in via putty, and just use my
normal login.
\_ Thanks for overwriting my changes fucktard.
\_ vi should have locked the file if you opened it for write. others
can only open it read-only. So you must not have the lock on
the file when you tried to edit it.
\_ 1, you're wrong. 2, you overwrote someone else when adding
this post.
\_ 3, I thought we went over this, using VI will ensure a
lock on the file you are editing. Or should we run a
command before editing a file? |
| 2005/6/3-6 [Computer/SW/Security] UID:37962 Activity:nil |
6/2 yaBlueToothHack:
http://www.newscientist.com/article.ns?id=dn7461
\_ So Bluetooth uses symmetric key exchange in an unencrypted
wireless channel? Is that correct? If that's true then
whoever developed the Bluetooth encryption protocol wasn't
thinking too hard.
\_ Math is hard. |
| 2005/6/3 [Computer/SW/Security] UID:37953 Activity:nil |
6/2 yaBlueToothHack:
http://www.newscientist.com/article.ns?id=dn7461&feedId=online-news_rss20 |
| 2005/6/2-5 [Computer/SW/Security] UID:37940 Activity:low |
6/2 My TeraTerm SSH no longer works on soda. What other software should
I try now?
\_ putty
\_ Cygwin + OpenSSH. Related request - can root (or someone) add a
webpage w/ the ssh public key fingerprints for soda and the other
login systems? Soda's fingerprints are:
RSA - df:69:f5:98:d5:68:d2:4b:9a:77:4b:53:75:b0:21:51
DSA - b2:2b:32:26:6e:19:d3:f0:f2:51:70:25:30:c1:54:22
\_ Done, see CSUA main page. - jvarga
\_ Dude, whatever they're paying you, ask for a raise. -mice
\_ Dude, whatever they're paying you, ask for a raise. Get a
life, man, you're making me feel guilty. :) -mice
\_ While you are on a roll, how about the wall log archiver
and the tmp and var cleaners.
\_ Get the SSH2 extension to TeraTerm
http://sleep.mat-yan.jp/~yutaka/windows
\_ Great! Thanks.
\_ will http://csua.berkeley.edu/ssh be updated as well? |
| 2005/6/2-7/12 [Computer/SW/Security] UID:37939 Activity:nil |
6/1 SSH got restarted with the new changes (no more SSH1). As a result,
it may look like soda's key has changed. This is just because you may
be used to using SSH1 and therefore the SSH1 key. The SSH2 key has not
recently changed, but your SSH client may not recognize it unless you
usually use SSH2 to connect to soda. |
| 2005/6/2-3 [Computer/SW/Security] UID:37935 Activity:low |
6/2 In the 'official' part of the motd it says ssh1 would be shut off,
weeks ago no less, and yet it still seems to be on. What up with that?
\_ Whoever did the change neglected to restart sshd. Fixed. -jvarga
\_ I just tried ssh from a Solaris machine to soda and I got "ssh:
connect to host http://soda.csua.berkeley.edu port 22: Connection
refused". I tried both with and without the "-2" option. Now if
I log out from this session I won't be able to log in again!
\_ Using putty forcing to ssh2 doesn't connect either.
\_ That's the last time I trust someone's changes to "just
work"... fucking dammit where'd all these sshd_config
errors come from??? - jvarga
\_ What say we strip some people (person?) of their root
cookie?
\_ I say we strip karen.
\_ I say you're a chauvinist and an ass.
\_ Dang, you've been in CS how long and you only just
figured THAT one out? :P -jrleek
\_ I'm glad it was caught before soda rebooted... it
would suck to have to go and be physically present to
fix this. - jvarga
\_ wait, if you're not a current student, what the
\_ Who said he wasn't? School's not in session,
dumbass.
hell are current students doing? It used to be
the case that current students run, manage, fix,
install everything. What the hell do they do now?
Playing with Windows NT servers because UNIX is
too hard?
\_ Do you object to me fixing crap? Because if so
I can just leave all the broken shit for
"current politburo" to eventually get to or
notice. Do you object to njh, dlong, mconst,
etc also fixing soda problems? - jvarga
\_ Man, lazy/apathetic kids today (current
politburo). As a mentor, how about teaching
them how to fish instead of giving them
fish?
\_ Hey yeah, and while we're at it let's
un-root all the non students; they have
no business working on soda. Thanks for
all the cool shee-it, jvarga, you are de
man. -John
\_ Maybe that's the reason whoever did the change didn't
restart sshd in the first place. He didn't think his
own change would work either.
\_ Then he should have reverted sshd_config to a known-
working state so that an accidental (or intentional)
soda reboot wouldn't fuck over sshd. - jvarga
\_ seems ok now.
\_ will the csua website recommend an ssh2 client we can use?
will http://csua.berkeley.edu/ssh be upgraded as well? |
| 2005/5/27-31 [Computer/SW/Security, Computer/SW/Unix] UID:37869 Activity:nil |
5/27 I'm the guy who was asking for software for organizing web links.
I tried the sdidesk software somebody recommended but it's too
complicated (I don't have time to learn wiki). So my focus has now
shifted to generic note-taking software. Anybody use one?
There are tons of those programs on the web. If you use one, please
let us know what you use. Thanks.
\_ Check out SafeSex from Nullsoft if you want something somewhat
protected and small. It can get a bit annoying what with having
to give it a password all the time. -John |
| 2005/5/24-26 [Computer/SW/Security, Computer/SW/OS/Windows] UID:37826 Activity:low |
5/23 On XP, can I use encryption on the swap file?
\_ Doesn't answer the question, but provides workaround
http://csua.org/u/c6c (microsoft.com)
http://csua.org/u/c6c
http://tinyurl.com/b9oxc
\_ Thanks. Too bad it doesn't help when it crashes. I'll have to
remember to boot it up again and then do a clean shutdown. |
| 2005/5/24-26 [Computer/SW/Security, Industry/Jobs] UID:37825 Activity:moderate |
5/24 How common are contract-based bonuses for service-oriented software
companies as a form of profit-sharing?
E.g., the company wins a 1 million dollar contract.
The sales guy for the contract gets x% of $1 million;
The lead engineer on the project gets y%;
Other engineers who will be working on the project get z%.
Yes, the sales guy has a base salary and makes much more from
commissions, which is how this normally works.
Currently our bonus system is the standard annual bonus (the boss
decides at the end of the year how much bonus you get, which ends
up being ~ 5%).
\_ Why is this a question? You can structure payment for services
any way you want as long as it is not unconscionable.
\_ "how common are ... for ...", not "is it possible"
\_ "how common are ... for ..."
\_ Very good, you apparently understand basic semantics.
I still don't understand why this is a question. If you
want your firm to move towards a direct percentage based
system based on profits vs. a fixed annual bonus then
bring it up with your super. Why should it matter if it
is followed by a majority of other consulting firms?
\_ I've never seen a commission system for anyone other than sales.
For IT/Engineering, if there is a bonus system is usually "up to
x% of salary per quarter". One place I worked at did profit
sharing at .1% of profits for most, while some with seniority
got more.
\_ <yeah, like your retarded nonsensical comment, dipshit>
\_ OP: you should deal with retarded but critical sounding comments
by deleting them. --!OP
\_ I am going to guess "not common"
\_ Haha. Are you the poster whose comment I deleted?
Did you experience a flush of anger when you saw I
deleted your pathetic comment?
\_ <stop deleting someone else's shit and we'll stop deleting
your shit>
\_ Deleting a "followup" which consists of "that's a dumb
question" is a service not an abuse.
\_ <right, which is why this is a service>
\_ Little losers: you guys really couldn't tell the difference
between your lame answers and the one above?
\_ I've had that kind of deal offered to me to finish a project at
a company that 1. had no prospect of a liquidity event, and 2. had
a co-development deal with another company that would bring in cash
with each milestone met. A more common version of this happens
when a company gets acquired for $(n+m+o+...), with $(m+o+...)
tied to project milestones. |
| 2005/5/17-18 [Computer/SW/Security, Computer/SW/OS/Windows] UID:37725 Activity:low |
5/17 http://blogs.washingtonpost.com/securityfix "A system administrator, angered by his diminished role in a thriving defense manufacturing firm whose computer network he alone had developed and managed, centralized the software that supported the company's manufacturing processes on a single server, and then intimidated a coworker into giving him the only backup tapes for that software. Following the system administrator's termination for inappropriate and abusive treatment of his coworkers, a logic bomb previously planted by the insider detonated, deleting the only remaining copy of the critical software from the company's server. The company estimated the cost of damage in excess of $10 million, which led to the layoff of some 80 employees." \_ Whose fault was this? Now consider: whose responsibility is it (not for failing to look over his shoulder, but for allowing this much "power" to concentrate in one set of hands)? -John \- fault is not zero sum. poor decision making on part of the company doesn't remove his culpability. legally it may be up in the air to what extent can say a shareholder hold the negligent management responsible vs the malicious employee but ethically, the failure is on the "evil employee". \_ Well, the company holds the evil employee liable in its turn, but it's kind of a case of where the buck stops. That said, dingdingding. -John |
| 2005/5/11-13 [Computer/SW/Security] UID:37640 Activity:nil |
5/11 Maybe this is old news, but there is a mit project to prevent addr
harvesting from known_hosts files:
http://nms.csail.mit.edu/projects/ssh
Their paper on ssh worms propogating via info discovered from the
known_hosts files is interesting:
http://nms.csail.mit.edu/projects/ssh/sshworm.pdf |
| 2005/5/11 [Computer/SW/Security, Academia/Berkeley/CSUA/Motd] UID:37630 Activity:high |
5/11 I know kchang's de-anonymizer is putting a crimp in your style, but
can you people who scp to /etc/motd.public please stop overwriting?
\_ A little thought should help you realize that's impossible.
\_ A little quality thought should help you realize that:
"Overwriting" is being used in the context of "screwing up
other people's changes".
If you turn off brain and assume the literal definition of
overwrite, you might realize you're "overwriting" [literally]
/etc/motd.public every time you save it in an editor.
Finally, scp users can reduce frequency of overwriting
[contextual meaning] by reducing the lag time between the scp
"get" and "put".
\_ Well, they should be diffing and merging as the final step
\_ No, they should be diffing and merging as the final step
before putting. This leaves a pretty tiny window for potential
overwrites. But can someone tell me how kchang is logging
file access? What OS features help with this? I'm curious to
know for other possible applications.
\_ I signed a pact with Satan
\_ Hm, how about this feature. If you put in "-anon" at the end of
your post, then my Ashcroft script will not reveal your id? -kchang
\_ Note that "tiny window for potential overwrite" is a
longwinded way of saying "that's impossible".
\_ it shouldn't be hard to modify motdedit to do this.
\_ Play nice, or we'll take away your cookies. Or, perhaps, make it
so that you can't scp the motd. - almighty root
\_ hmm, maybe make it so that the motd is only editable through
motdedit and make that a suid file w/ sudo'er perms for everyone.
everyone should then be anon, and no more scp. yes, I'm replying
to myself. =)
\_ I concur. Let's enforce some type of lock/unlock mechanism.
\_ Make the trains run on time while you're at it.
\_ locking and semaphores - the first step towards fascism.
\_ You missed the "enforce" part didn't you?
\_ So tell me, if you've done any work with databases
or file systems, how useful is a lock that is not
enforced?
\_ Hey, I didn't realize the motd was that
important to you.
\_ fuck motdedit. In the ear. It's not a technical problem.
\_ Technically, yes it is a technical problem. Access is
provided throuh a mechanism that causes corruption. Any
time such a mechanism exists and is exploitable, it puts
the infrastructure at risk. Asking users nicely not to do
it is not a solution Either you live with the corruption
or you fix it. As a CS grad, you should know this.
\_ Uhm, we're talking about motd...wtf are you talking
about? This isn't a general "all locks and
synchronization are bad" thread, this is a "motdedit
is a shitty technical solution which doesn't even
really address all the problems" thread. As a high
school grad this should be obvious to you.
\_ First of all, tell us why motdedit is broken, and
maybe we can come up with something better.
\_ Because of patronizing motdedit users. Anything
without patronizing evangelists that works would
be better.
\_ As important as MOTD is for a bunch of users here,
most of whom are CS grads, I'd wager any technical
problem could be ironed out quickly. Anyways,
whatever, this is your guys' problem. I don't use
MOTD and everytime I read it, I feel less inclined to
put as much time into maintaining this system as I
do. I was offering solutions to a real problem of
corruption. But hey, if you people like broken, then
broken you get.
\_ Broken >> supercilious motdedit nazi assholes
Go or stay, use it or don't use it, it's a free
country, and nobody is particularly pining for
you either way. Go, and be happy, my son.
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
\_ No offsense, but go fuck yourself. As root, VP,
\_ No offsense, but go eat a carrot. As root, VP,
and now president of the CSUA my policies on
sorrying non-student accounts is much more
draconian than that of my predecessors. You
may have been a student once, but our ultimate
mission is to provide service to current
students - and when people make this a hostile
environment, I won't blink to kick them off our
server. Although I value the insight and
participation of alumni in the CSUA, I'd advise
you not to fuck it up for everyone. If you
disagree with an idea, then voice your reasons
- not some immature tirade and rant. This is
not your personal soap box, this is a server
for use by university students.
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
\_ I suggest we first solve the problem of people
posting lines longer than 80 columns or people
with their tabstop not set at 8.
\_ I suggest pliers or a heavy bludgeon. There's
nothing like broken bones to keep columns
down to a reasonable size.
\_ Hm, how about this feature. If you put in "-anon" or some type of
identity at the end of your thread, then my Almighty Ashcroft
script will not reveal your id? -kchang
\_ How about we just squish your ass right now? -anon
\_ I wouldn't do that. John Ashcroft is watching you.
\_ But...but...I put "-anon" at the end! Pretty please let me
be anonymous? -anon
\_ Well I haven't implemented it, I'm just soliciting
opinions and should there be enough demand, I'll do it.
\_ Anyone who has worked with group-writable files
has come to the conclusion that locking and
logging is important; I'd like to see motdedit
(or something functionally similar like RCS)
required. -tom
\_ Because the motd is mission critical! Seriously,
if this were source code, I'd agree. An anonymous
posting board where anyone can add or delete? Feh.
\_ It blows me away how worked up people get
about a lame ass world writeable file.
\_ kchang, I like to troll. the motd is too boring. can you include
an 'exclude' list of names? ;) we need to revive the motd of
better topics!!!
\_ Perhaps the de-anonimizer is a good thing. Its like that old
Donald Duck count to 10 before you explode cartoon. You have
to think about whether or not your really want to write that
comment before you do. It makes the discussion more civilized. |
| 2005/5/10-12 [Computer/SW/Security] UID:37604 Activity:nil |
5/10 will putty w/ ssh work tomorrow?
\_ "putty w/ ssh"?
\_ Putty should work, but make sure you have a recent version.
It's what I use, at least. - amckee
\_ putty supports ssh2, so yes.
\_ If you have a session defined for soda, you may want to change your
"preferred SSH protocol version" to 2, or "2 only" in the
Connection->SSH options.
\_ Logging in with putty to write this on 5/11 -erikred. |
| 2005/5/6-8 [Computer/SW/Security, Computer/SW/Unix] UID:37555 Activity:nil |
5/6 A lot of web sites now have a login snippet on their main page,
which forefox does not display a SSL icon
(http://www.bankofamerica.com Are those logins safe? You can
usually find a specific login page within the website that
have the SSL icon. I assume bank sites are usually safe in
their design, but what about sites like
http://www.officedepot.com Some sites's login page
(http://www.bookpool.com/ac does not have a SSL icon, but
their login button specifically says "secure login", how does
it work? As an end user, how can one be sure the login/pw
information is encrypted while in transit?
\_ It's usually good practice to put the login page under SSL to
preempt concerns like yours. Many places don't have a login box
on their front page, and make you click through to an https link
to get a login box. Others put the login box on their front
page to save you that step, but the load of putting their front
page under SSL is prohibitive. If they say it's a secure login,
the HTTP Post that sends your information will be under ssl. If
you want to test this, put in a bogus login/password and watch it
jump to SSL when you click "login".
\_ For verification:
http://www.bankofamerica.com/signin/security_details_popup.cfm
\_ So you have to 'observe' the flashing by of the SSL icon
to distinguish these sites from sites that indeed uses
no security. I guess a better question is, how do you
tell if the HTTP post used to send your login
information is under SSL?
\_ Best course of action: don't worry about it. if someone's
really intent on stealing your info, there are easier ways
to do it. There are non-technical ways to protect yourself
better. keep an eye on your account activity. get your
annual credit check (or more frequently if you're worried).
SSL is no guarantee no matter how Verisign wants to package
it.
\_ I find security policy varies significantly
between sites. Your password can be as strong as
you like, but often times the "I lost my password"
feature is typically implemented with very little
security in mind. Better sites will allow you to
reset your password after you verified who you are
(via secret questions, etc), never revealing what
your actual password was. But some no so security
conscious sites will simply email your password in
plain text, and sometimes all you have to do is to
provide your email address. Some sites will also
reset your password with only the email address.
You can only guess how careful those sites will
treat your data (such as credit card info).. I am
trying to sort out the sites that have my login
information so that the lesser secure sites do not
share the same password as the more
secure/important sites...
\_ The guy I spoke to said it used to be configurable but was
taken out. If I turn any of my URLs into https, it stays
https, including turning all the links into ssl, but I know
of several people where it redirects to http. No clue why
it varies. -John
\_ The only way to be sure is to look at the source and see
how it's posting the login. But even then, you won't know
for sure that the authentication server is using weak
encryption.
\_ What's pretty funny is that gmail defaults back to http when you've
logged in, and they seem to have removed the setting the security
guy I mentioned which lets you set ssl for all mail access. -John
\_ My gmail still stays https and always has. I know yahoo
switches back to http after login.
\_ The guy I spoke to said it used to be configurable but was
taken out. If I turn any of my URLs into https, it stays
https, including turning all the links into ssl, but I know
of several people where it redirects to http. No clue why
it varies. -John
\_ You're right. I just never noticed it, because my
bookmark specified https. Thanks for the tip. |
| 2005/5/4-5 [Computer/SW/Security] UID:37521 Activity:kinda low |
5/4 Has anyone checked in a cardboard box for a flight recently? Will
the security screener tape the box back to shipping condition if
they open it for inspection?
\_ Haven't recently, but expect it to be opened and no way to seal
it. Of course you can bring your own or hit one of the "inside"
stores for some tape (don't expect shipping tape).
\_ I took my bike in a cardboard box and they didn't bother opening
it. But then again, it's probably easily identified using the x-ray
machines. Your best bet is to either not put anything suspicious, or\
use one of those huge tupaware looking storage boxes as they atleast
machines. Your best bet is to either not put anything suspicious, or
use one of those huge tupaware looking storage boxes as they atleast
close up resonably afterwards. -scottyg
\_ I was asking for checked-in luggage. I don't mind bring
tapes but since security screening of checked in luggage
is done without my presence, how can I make sure the screener
seal it back? |
| 2005/4/29-7/12 [Computer/SW/Mail, Computer/SW/Security] UID:37426 Activity:nil |
4/29 From the official motd above:
As of May 11 Soda will discontinue SSH 1 and secure telnet support. We
will also be discontinuing support for unauthenticated/unencrypted
mail services in compliance with university security requirements.
Please see your email for more information (assuming you're on
csua@csua). Questions, comments, complaints, and cheap floozies to
root.
\_ Does this mean that I will not be able to access csua using
ssh, or simply that there will be no one to help with problems,
or that I need to use a new secure version of ssh? Also, can
I still use pine on csua?
\_ SSHv1 is the old insecure version of the protocol. Most
ssh clients now support SSHv2. If you are using OpenSSH
you should have no problems.
\_ Does this mean we will be able to use soda as an smtp gateway
when off of campus net?
\_ From the email sent out a few hours ago:
To comply with UC Berkeley departmental standards, we must
terminate support for unauthenticated/unencrypted external
access to all mail services. If you access Soda via POP, IMAP,
or send mail through our SMTP server you MUST switch to use
both authentication and SSL/encryption. These options should
be easily found within most mailers,
IMAP / http://soda.csua.berkeley.edu port 993 (w/ssl)
SMTP / http://soda.csua.berkeley.edu port 465 (w/ SSL + login is
user@soda.csua.berkeley.edu and password)
POP / http://soda.csua.berkeley.edu port 995 (w/ auth + SSL)
\_ Per request, a copy of the email has been saved to the following
location: /csua/pub/SodaChanges0505
- jvarga
\_ As an aside, I've found that for some bizarre reason,
Mozilla mail doesn't like some SMTP AUTH/TLS authentication
setups, while SMTP AUTH/SSL is just fine. This is with
Postfix/SASL2 & Dovecot/imaps under FreeBSD 5.3-R. I just
went through some trouble setting this up, and if anyone
wants my configs I'm happy to share. -John
\_ I'm off campus-net and I can send mail fine using SSL on port
25.
\_ Does that mean the ssh client at
http://www.csua.berkeley.edu/ssh will no longer work? |
| 2005/4/29-5/1 [Computer/SW/Security, Computer/SW/OS/Solaris] UID:37425 Activity:moderate |
4/29 Why did Sun decide to implement SMF in Solaris 10? Was it just to
piss off customers or is there some technical advantage?
\_ Are you talking about the new way to start/stop programs,
&c.? If so, I must agree that the only purpose was to piss
off customers and prove that Sun can do something stupid and
different than Linux (chkconfig may not be great, but it
mostly works and everyone knows how to write init scripts)
BTW, SMF pissed off a lot of ppl inside sun who have to ship
products on other *nix than Solaris.
\_ I guess Sun should be on http://fuckedcompany.com if it isn't
already.
\_ Can someone give me a list of reasons why SMF is bad?
\_ Complicated new way to do something that has already been
done. Like I said, if there's some technical advantage then
I'd like to know what it is. Maybe there is one. If not, it
is just change for change's sake.
\_ 1. SMF uses non-standard commands - you can't simply
start/stop a process by calling its init script,
you have to know what its SMF "name" is. Even if
you don't have to deal w/ other *nix, SMF makes
switching btwn S9 and S10 a pain.
2. SMF enable/disable semantics are bizarre - you
can't just say enable/disable X like in chkconfig
and assume that the daemon is enabled
3. SMF fails to provide adequate feedback re failures
of configuration. Often, you can't tell if a fault
needs to be cleared in order for it be enabled.
service can be enabled.
4. SMF's files are non-standard and their contents
are not explained well - the purpose of SMF is
to make fault recover/mgmt easier, however if
most of your admins don't/can't figure out how
to fix config problems, faults will take longer
to remedy. Developers and Admins should not have
to read some guys blog on http://blogs.sun.com in order
to get details on how the system works.
\_ http://docs.sun.com/app/docs/doc/817-1985/6mhm8o5n0?q=smf&a=view
\_ Yes there are docs, but the docs don't
really have anything useful in the. Ex.
tell me where in that page it specifies
how to use svcadm to disable a process
from being started or how to tell if
the reason a particular process is not
starting automatically is b/c SMF thinks
that the process is in 'fault' state and
must be cleared.
5. The fault mgmt functionality provided by SMF could
easily have been provided through additions to
existing functionality (specific args to init
scripts, allowing apps to dump monitoring scripts
into a given directory, &c.)
\_ Sounds like one of those numerous cases where Sun was trying
to solve the problem which has been already solved
by others and comes up with some terribly complicated and
non-standard way of doing things. *sigh* |
| 2005/4/29-5/1 [Computer/SW/Security] UID:37424 Activity:moderate |
4/29 How does data cracking work? I guess someone intercepts some encoded
data, and then try to apply many different conversions on the data to
find the right conversion that yields the original data. But then how
does he know which conversion is the right one when he doesn't even
know what the original data is? -- newbie
\_ Related question: What were the problem(s) with SSH1?
-- not-so-newbie
\_ iirc, SSHv1 used the same dh key for both encryption and
hmac w/o deriving separate keys for each.
\_ Depends on application--some apps use poor randomness, insufficient
keylength, static keys, re-used keys, etc. Cracking can be done
a couple of ways, including pattern analysis and just plain brute
forcing--you're pretty unlikely to get, say, two different clear
text tcp streams that both look "right". Very often you're also
not "cracking" anything, but rather relying on a buffer overflow or
similar (as with the SSH CRC32 exploit.) -John
\_ What John said. Also, the TLA agencies do things like pattern
and traffic analysis to try and look for information in the
bitstream. A surprising amount of information can be figured
just by looking at things like the frequency of certain
sequences.
\- hola, i do not know what "data cracking" means however, based
on the followup comments, you may want to look at I GOLDBERG's
[UCB] PhD thesis on the design of the "anonymized IP wormhole"
which 1. presents a useful framework to think about "the problem
space" 2. has an interesting discussion on confounding "generic
traffic analysis". it may be more than you are looking for but
isnt that long ... i image there is a shorter version of the
"freedom" project [IG gaves some talks], but i dont know if
there is something downloadable. --psb
\- I note in passing IG uses the example of "you would never
expect the us govt and the libyan govt to collude!" which
is sort of funny given that MQ is now our good buddy.
is sort of funny given that MQ is now our good friend.
better add the north korean and syrian govts. the probabilty
of north korea becoming our friend = how many bits of crypto
strength? --psb |
| 2005/4/29-5/1 [Computer/SW/Security] UID:37422 Activity:nil |
4/29 When I run winver.exe, it displays a string "Version 5.1 (Build
2600.xpsp2.050301-1526 : Service Pack 1)". Since it says Service Pack
1, what does the "sp2" after "xp" stand for? Thanks.
\_ I have (Build 2600.xpsp_sp2_gdr.050301-1519 : Service Pack 2)
\_ http://blogs.msdn.com/oldnewthing/archive/2005/03/18/398550.aspx |
| 2005/4/21-22 [Computer/SW/Security, Computer/SW/OS/Windows] UID:37302 Activity:nil |
4/21 Prank Paper accepted for publication:
http://www.cnn.com/2005/EDUCATION/04/21/academic.hoax.ap/index.html
\_ Wow, that only took CNN about 2 weeks to report.
\_ Dude that's already been reported on motd:
http://csua.com/?entry=37223
\_ it's already been reported twice on the motd.
\_ Conferences are just social gatherings. |
| 2005/4/20-22 [Computer/SW/Security] UID:37288 Activity:low |
4/20 SSH X forwarding question: I hook up my laptop to corpoprate net
and am able, via cygwin and ssh -X to run X stuff w/o a problem from
my corporate PC. But, when I am at home; I get authentication
errors when my laptop is on hooked up to my dsl. The only
difference is that, in order to get through my work's firewall;
I need to ssh through another host (i.e. ssh -X shost.corp and
then ssh -X mypc. I can run apps from the shost machine w/o a
problem. Ideas ? Suggestions? shost is freebsd 4.10 while my
machine is freebsd 5.3. thanks
\_ On which machine are you getting the errors? Are you going
directly from the home laptop to mypc? -John
\_ ssh -g -L 4567:mypc:22 shost.corp
ssh -X localhost -p 4567
\_ The formatting and punctuation is just painful to look at.
\_ [ Edited for readability -formatd ] |
| 2005/4/18-19 [Computer/SW/Security] UID:37241 Activity:nil |
4/18 How do I do all that dsa_id public thingie so that I can ssh/scp into
my cluster of machines (that happen to have the same NFS mount)
without having to type password? -dsa ssh idiot
\_ http://www.arches.uga.edu/~pkeck/ssh
\_ http://www.csua.berkeley.edu/~ranga/notes/ssh_nopass.html
\_ Assuming that all of the systems in your cluster mount your
home directory the following will probably work for you:
1. Generate a dsa key pair (can be on any system):
$ cd && ssh-keygen -t dsa -f .id_dsa -P ''
This creates .id_dsa (private key) and .id_dsa.pub (public
key) in your home directory
2. Copy .id_dsa.pub into your nfs accessible home directory:
$ scp .id_dsa.pub user@host:.ssh/authorized_keys
$ scp .id_dsa.pub user@host:.ssh/authorized_keys2
(This assumes that you don't have authorized keys
already)
3. Test it out:
$ ssh -i .id_dsa user@host
You should not be promted for a password. If you
are try ssh -v and/or make sure that the authorized
keys files are 0600 and the .ssh dir is 0700.
4. If you always want to present the same id to all hosts
add the following to your ~/.ssh/config:
Host *
IdentityFile ~/.id_dsa
If you want to restrict (on your cluster systems) the
hosts from which you will accept a particular id, try
adding 'from="ip range" ' before ssh-dsa. |
| 2005/4/17-18 [Computer/Networking, Computer/SW/Security] UID:37232 Activity:nil |
4/17 Anyone know if Yahoo Messenger is encrypted? I use it in internet
cafes a lot with my 802.11 and I'm wondering if my password is
protected or not. I don't care about the communication, just my
password. -ok thx
\_ Probably not. If you want to know definitively, run tcpdump.
Alternatively, set up a VPN and pipe all your connections through
that.
\_ Your clear text password is not saved in your machine nor is it sent
in the clear text through the internet. |
| 2005/4/15-17 [Computer/SW/Security, Computer/SW/Apps, Computer/HW/CPU] UID:37199 Activity:nil |
4/15 http://www.cnn.com/2005/TECH/science/04/14/mit.prank.reut/index.html The lead author is a (recent) cal alum. |
| 2005/4/14-15 [Computer/SW/Unix, Computer/SW/Security] UID:37186 Activity:high |
4/13 Hey, if you're going to update nethack, update angband, too. You
could also install a variant, like NPPAngband:
http://home.comcast.net/~nppangband
\_ Interesting. Thanks for the pointer.
\_ there's even a competition:
http://mysite.wanadoo-members.co.uk/angband_comp/compo.html
\_ Installed angband (there was a ports version) - amckee
\_ NPPAngband is trivial to install. Why not install that too?
\_ Because I was up until 2:30 upgrading Perl and did this
between compiles? MAYBE I'll install it, though. =) amckee
\_ If by 'trivial' you mean 'completely manual', yes it was trivial.
I've installed it as NPPAngband, I did not overwrite angband
\_Oh no! There goes my weekend/life! -scottyg
\_ NetHack, Copyright 1985-2003
By Stichting Mathematisch Centrum and M. Stephenson.
See license for details.
No write permission to lock perm!
Hit space to continue:
\_ Unable to replicate with my two user-land accounts,
do you have any stale files around? Anyone else seeing this?
Send email to amckee/root, iff you see this and want it
looked at.
\_ i don't think you quite understand what userland means.
\_ You do realize that, in addition to OS, process, and
object level privileges, root accounts can run in
increased kernel priority levels? Granted, in this case
the problem is most likely to do with file permissions,
it is not an atypical usage of the word 'userland' to
refer to non-root/non-privileged users. Thanks for the
snideness, though.
\_ i still don't think you quite understand what
userland means. try looking it up in, say, the jargon
file. root accounts are not any different from
normal ones in terms of where they run (i.e., they do
not run in the kernel). the kernel will allow you to
do privileges things by being root, yes, but they are
still done by the kernel, not because you as root are
in the kernel mucking around. |
| 2005/4/13-15 [Computer/SW/Security] UID:37183 Activity:kinda low |
4/13 Comcast internet service SUCKS!!!
If you want to be a national ISP you've got to know how to run a DNS
server.
\_ Agreed. It could be worse, though -- at least broken DNS is easy
to work around.
\_ Whiny bitches. If people wanted reliable service, the free
market would reward a company for providing it. Clearly,
people are happy to pay for spotty service.
\_ One of the great things about "the free market" is that
it provide for many a niche. Some, like me, pay a
small premium to a company like speakeasy for reliable
and reasonable service (no shutting off access to ports
without notice) and others who want a cheap services,
without notice) and others who want a cheap service,
get it.
\_ You know, I think I agree with this. I'm getting what
\_ You know, I think you're right. I'm getting what
I pay for. --second poster |
| 2005/4/12-14 [Transportation/Car, Computer/SW/Security] UID:37151 Activity:nil |
4/12 Free transbay bus service for one month:
http://www.actransit.org/news/articledetail.wu?articleid=ae28f29b
Pretty attractive when gas price is high.
\_ It's only free westbound. Return trip still costs $3. But I
think it's a good publicity for the new park & ride lot. |
| 2005/4/11-13 [Computer/SW/Security] UID:37143 Activity:nil |
4/11 I called Berkeley's fraud alert hotline and the only info the thieves
had are: My full name, SSN, and the money I made. That's weird, I
don't remember putting down how much money I made when I applied to
Berkeley. Anyways, they told me to call Experian 888-397-3742
Option 2, 2, 3, 2, 1, 2 to put myself on fraud alert.
\_ Is this pre-emptive or has somebody already started using the
stolen ID info? -- ulysses
\_ I don't think there's been any evidence that the stolen ID info
has been used. -tom
\_ who is deleting useful replies?
There is as of yet no evidence that the stolen data have been
used. -tom |
| 2005/4/11 [Computer/SW/Security, Computer/SW/OS/OsX] UID:37142 Activity:very high |
4/11 What's the best way to transfer files between Macs and PCs? I don't
want to install NFS (too heavy weight), there must be another way.
Like, I don't want to use SCP because it doesn't do recursive copy...
\_ my problem with WinSCP is that it doesn't like to copy file
names with foreign letters (accented e, Ooo, etc). What other
alternatives are there besides WinSCP which I like a lot?
\_ You were given the correct answer and deleted it. go away.
\_ scp doesn't do recursive copy? have you tried scp -r?
\_ scp -r. windows scp clients do this too. fool
\_ samba on the Mac. -tom
\_ Why not just connect to the PC from the Mac? OS X has a built-in
SMB client or you can just enable Windows Sharing on OS X for
the opposite direction.
\_ my problem with WinSCP is that it doesn't like to copy file
names with foreign letters (accented e, Ooo, etc). What other
alternatives are there besides WinSCP which I like a lot?
\_ You were given the correct answer and deleted it. go away.
\_ scp doesn't do recursive copy? have you tried scp -r?
\_ USB2.0/IEEE1394 hard drive enclosure
\_ Why was this deleted?
\_ rsync over ssh.
\_ car full of cdrs!
\_ Only if copied and driven by a hot naked chick, who you have sex
with during the copying.
\_ Only if the data is lisp code.
\_ 4" floppy disk
\_ smb share + net.
\_ seconded. If you have OpenSSH installed on your Win* box,
then you can even use ssh tunneling. |
| 2005/4/6-8 [Computer/SW/Security, Computer/SW/Unix] UID:37085 Activity:nil |
4/6 In Linux, when I type "limit" I get to see the max # of file
descriptors I can have. How do I check the number of descriptors
I'm holding and how do I change it? "limit descriptors 8096"
doesn't work (think I might need root or something)
\_ limit/ulimit work at the shell level. You can see the number of
descriptors held in /proc/self/fd. To change the max fd's, you
may need to change the hardcoded limits in /etc/security/limits.conf
your syntax is right, but you are probably trying to go past the
hard limit (limit -h to view) Yes, you will need root access to
change the hard limit. |
| 2005/4/6-7 [Computer/SW/Languages, Computer/SW/Security] UID:37084 Activity:high |
4/6 My banks, brokers and credit card companies are promoting paperless
statements. If I tell them to stop mailing me paper statements, and
later there's a gitch on their computers, will I be in a disadvantage
proving my case with prinouts from their web pages compare to if I
have their paper statements? I'm trying to see if it's a good idea to
stop the paper statements in my mailbox in order to avoid ID theft.
Thx.
\_ Can you ask them whether they can somehow sign their statements
that they send to you (x.509 cert, pgp, etc.?) What's the
situation on digital signing/non-repudiation in the US right now
anyway? Even if there's no precedent or legal basis for it, it
might still be better than just an occasional email or web page
printout. If you're worried about ID theft from paper statements,
there are easier ways of doing it (credit card slips, for example.)
You could just get a PO box too. If your bank is putting info that
could be used to compromise your authentication details on paper
statements, find a new bank. -John
\_ All my bank and credit card paper statements have account numbers
on them. I think stealing mail from my mailbox at the front of
my house in broad daylight is very easy.
\_ my friends in comp security all say digital signature and
non-repudiation is a non-issue. the courts don't care and will
accept all kinds of strange records if presented w/ an
avidavit/oath of truth. hell, fax'd signatures are enough,
and anyone can forge one of those. records are the starting
point for deliberation, not the endpoint.
\_ It's an issue in countries with a proper legal framework, and
with banks that give a rat's ass (American banks are
notorious in that regard, and for not paying a lot of
attention to proper authentication.) Will a paper statement
serve as proof in court in case of a dispute? I'm asking
because you're essentially trusting their record keeping
(such as transaction serial #s, etc.) to verify the
authenticity of the documentation. -John
\_ I think you should do a risk assessment of using the bank's
record keeping vs. your own and see which is more likely to fail.
\_ Yes my record is more likely to fail, but that's not the issue.
If my record has a mistake, the bank is not going to go by my
record to determine how much I have left in my account. But if
the bank record has a mistake, the bank will most likely go by
its record unless I can prove otherwise. Now my question is:
does a printout from a web page as good a proof as the fancy
paper statement from the bank?
\_ I think you'll find neither of them can prove a balance.
the record of transactions is useful so you can ask for
details on any transactions that occured which are not
in your records, e.g. reconciliation of accounts.
\_ I filed a small claims lawsuit and needed to print out a statement.
8 months passed between when I filed for the claim and when the
trial's gonna happen. That month I tried to print out bank
statements but it said "Sorry we only go back to 6 months." I
had no choice but to delay the trial date. What a drag.
\_ I think if you care about these sort of things, then you should
keep the paper copy. I do the same thing for the very same reason. |
| 2005/4/2-5 [Computer/SW/Security] UID:37045 Activity:nil |
4/2 Where do I enter computer equipment expense for my
consulting service? Is it Office Expense? Misc expense?
Home Office expense? Thanks.
\_ I put it under misc. on the Schedule C (not the 8859) |
| 2005/3/30-31 [Computer/SW/Unix, Computer/SW/Security] UID:36971 Activity:kinda low |
3/30 ssh port forwarding/X11 issue: Any ideas on how to solve this
problem: I ssh over to a remote host that shares my same home
directory. My forward X11 works okay until I sudo to root.
I get a message about wrong authentication. Any ideas ?
Being root on the base machine works just fine for X11.
\_ xhost
\_ NFS mount root squash making your $HOME/.Xauthority not readable
perhaps.
\_ Another possibility is sudo not retaining $HOME. But anyway,
look into the xauth command. |
| 2005/3/30-31 [Computer/SW/Security, Computer/SW/OS/Windows, Computer/SW/Unix] UID:36959 Activity:nil |
3/30 In Windows XP, when I share [export] a folder with read/write/execute
permissions for ALL, it still asks for username/password. How do I
configure it so that it never asks for user/password?
\_ You need to enable the Guest account. |
| 2005/3/25-31 [Computer/SW/Security, Computer/SW/Unix] UID:36883 Activity:moderate |
3/25 My team (Yahoo! login/registration/access) has several
software engineer positions open at all experience levels. -atom
\_ I need a part time job, please give me a flexible part time
job because school sucks. -kchang
\_ How about fucking change the default login to be secure login??
Every other fucking website in the world uses secure login. Why
does Yahoo insist on using non-secure login as default????!!!
\_ Because it is secure, dufus. Assuming you have javascript
enabled anyway. They issue a random challenge string that
you answer by hashing together your password and the challenge.
\_ Oh wow, we don't really need SSL don't we?
\_ Oh wow, we don't really need SSL I guess.
\_ Wow, no, it's needed for some things.
\_ Why doesn't yahoo use SSL login by default?
\_ Well, the obvious reason is they don't want to buy
hardware that can handle craploads of SSL connections,
which is a lot more expensive than the hashing scheme.
\_ Aren't you in LA? |
| 2005/3/25-28 [Computer/SW/Security] UID:36868 Activity:nil |
3/24 Where can I dispose of a dead CRT for free? Office Depot had a free
service, but it looks like it's over. Thanks. -slow
\_ http://csua.com/?entry=25428
\_ In a dumpster. Seriously. Otherwise, wait for one of those
days where you can dispose of toxics for free. I favor a random
dumpster, though. Yes, I have done that.
\_ Free on Fridays at http://www.accrc.org |
| 2005/3/23-24 [Computer/SW/Languages/Misc, Computer/SW/Security, Transportation/Car/Hybrid] UID:36839 Activity:nil 50%like:36690 |
3/23 Now you can RIDE ELECTRIC BIKE!
http://tinyurl.com/59b77 (gizmodo)
\_ Electric bikes are not new. -tom |
| 2005/3/23-24 [Recreation/Dating, Computer/SW/Security] UID:36827 Activity:high |
3/26 One more reason to use PGP, and maybe the Anonymizer. And by the way,
only 1700 porn pictures? I have at least 100X that:
http://news.bbc.co.uk/2/hi/entertainment/4376959.stm
\_ You have over 170,000 porn pictures?
\_ I do.
\_ Assuming no repeats an a minimal 10 seconds per picture,
\_ Assuming no repeats and a minimal 10 seconds per picture,
it would take you 472.2 hours to looks at all that pr0n.
Where are you getting the time?
\_ 10 seconds? Try 1.
\_ 472 hrs? Spread that over five years and you are talking
about an hour a week.
\_ Just another slow work week.
\_ How about yet another reason to get your mind out of the
gutter and use your higher cognitive functions for something
more useful than viewing pictures of women in various states
of undress?
\_ How about two or more women?
\_ I agree. He should spend more time getting out of the house
to find women willing to undress live and in person. There's
no cognitive function more useful than that. |
| 2005/3/22-24 [Computer/SW/Security, Politics/Domestic/SocialSecurity] UID:36815 Activity:nil |
3/22 CNN front page: "But when 443 of the 909 polled were asked whether
they supported private retirement accounts in exchange for a reduction
of guaranteed retirement benefits, support fell to 33 percent, while
opposition rose to 59 percent [+/- 4.5 points]. ...
Fifty percent said they understood the debate over Social Security
"somewhat well," and 31 percent said they understood it "very well."
Only 18 percent said they did not have a good grasp of the matter. |
| 2005/3/22-5/9 [Computer/SW/Security] UID:36803 Activity:nil |
3/22 imap, pine, pop3s, ssh/sshd, and (most importantly) nethack
updated. Okay, a bunch of other random stuff that no one
ever probably uses has also been updated. Send bugs
(other than high score resetting) to root. |
| 2005/3/18-19 [Computer/SW/Security] UID:36748 Activity:kinda low |
3/15 Someone asked about popular backup options?
http://www.engadget.com/entry/1234000710036562
\_ I appreciate the helpfulness, but as usual, they all suck. The
closet thing to easy I've heard of are the one-touch backup drives
closest thing to easy I know of are the one-touch backup drives
from Western Digital, but I just wish they did encryption too.
\_ It's kludgey, but have you considered backing up encrypted
content rather than encrypting backed up content? -John
\_ Yes. But it would be nice if, on the backup, the whole
drive is encrypted.
\_ How non-interactive must it be? Can you back up to a
pgpdisk or EFS, or cfs/encfs on FreeBSD/Linux? -John
\_ Well, when I said "closest thing to easy" I really
meant for yermom, I mean, my mom or my boss to use it,
and ideally easy for me to setup as well. |
| 2005/3/18-4/4 [Computer/SW/Unix, Computer/SW/Security] UID:36744 Activity:nil |
3/18 Office account holders - please clean up your directories, or
we'll have to unleash the wrath of root (and karen) on you! =) |
| 2005/3/11-14 [Computer/SW/P2P, Computer/SW/Security] UID:36651 Activity:high |
3/11 What do I need to do to make sure I don't get sued when I use
bittorrent? I am still a newbie. Thx.
\_ Azureus bittorrent client w/ safepeer plug-in supposedly
blacklists evil MPAA spy machines...
\_ Don't download copyrighted materials, or run it on someone else's
machine.
\_ How about a real answer? I don't care much for music/movie,
only apps/games.
\_ It is a real answer. Bittorrent was not conceived to
provide any sort of anonymity; Bram Cohen states as much
somewhere on http://bittorrent.com. The fact that you have a
tracker file hosted somewhere makes your IP show up. -John
\_ That's illegal and you can never fully "make sure" you don't
get sued.
\_ Under bittorrent, how would they trace me? Just give me
the technical info, if they were to do so? does the .torrent
file contains my info? ip?
\_ If you don't know enough to figure this out yourself,
you really shouldn't attempt it.
\_ In other words "I don't know".
\_ In other words, "You're a dumbass, and I'll laugh
my ass the fuck off if you get prosecuted"
\_ Sniff. Please sir, don't call me names.
\_ AFAIK, the underlying d/l stream in BT is not
encrypted. Someone w/ a pkt sniffer can tell
tell that you are using BT and what you are
d/l'ing. If they record the pkts, (which may
not be protected under 4 amd) the recorded
stream may be used as evid of your copyright
violation.
The best way to avoid this is to not become
an attractive target by d/l'ing high value
items frequently. The ONLY 100% safe way is
to not d/l copyrighted material.
\_ Isn't it easier than that to track someone?
I mean, if you're downloading Revenge of the Sith,
that means you're also serving it.
If I'm the Feds, and I turn on my bittorrent
client and start grabbing the movie, I should get
a list of IP addresses of everyone I'm getting
packets from. I just tell the movie companies to
ask the ISPs to match IP addresses to people's
names for those people sending the most packets.
It doesn't matter if the data are encrypted, since
the IP addresses in the IP headers are in cleartext.
(although I feel stupid putting it this way)
\_ ISPs do not have to disclose the names of
people for a particular IP addr unless the
cops get a warrant by showing prob. cause.
To show prob. cause, the cops need to prove
that the IP addr actually served or d/l'ed
copyrighted content thus violating the
copyright. (simply having copyrighted
content on your computer that you own may
be covered under fair use and does not
show that you have likely violated the law).
If the content is encrypted, then the cops
can't really prove to the judge issuing
the warrant that you served or d/l'ed
copyrighted content and may not be able
to meet the prob cause requirement.
(Some judges might say that having the
files there was enough to est. prob
cause so you have to be careful)
If you use authentication, and the feds
lie to you to get a valid passwd, then
you may have all sorts of other legal
protections.
\_ Maybe that's why there are so few torrent
users being sued. Anyways, since I don't
think the torrent data are encrypted anyway,
maybe it's not worth arguing about.
From a "I might get sued!" standpoint, I
personally would take the assumption that
encryption won't help for the Revenge of
the Sith example, but, YMMV.
\_ Uhm, it is a real answer. You want to use it for illegal
purposes, so you risk getting sued.
\_ From what I've heard they've only sued 7 bittorrent users
(non-ISPs). It's not as bad as MP3 sharing ... yet.
Basically, you are a target if you have fat upstream, you leave your
computer on all the time so you have the double whammy of always
serving files and your IP address never changing, and you serve a
lot of new movies.
You're probably not a juicy target, but for the average user, I
would just avoid grabbing new mainstream movies, lots of recent
movies, or serving lots of ISOs like WinXP or Office 2003.
\_ Thanks! And to the guy above, f*** off!
\_ Uhm, so you basically posted to get someone to pat you on the
back and say "Oh no, baby, it's okay. No one's going to sue
you!" That's pretty retarded. I mean, honestly, if you're
going to trade in copyrighted materials, you become vulnerable
to a variety of legal actions. Period. If you can't accept
that, the just buy the fucking thing and quite wringing your
that, then just buy the fucking thing and quite wringing your
hands.
\_ Every piece of software on your computer is legally
obtained?
\_ No clue...but I know the risks and am willing to
accept them. *shrug*
\_ I see, so all that no stealing lecture does not
apply to yourself. I am speachless.
\_ You do realize that more than two people can post
right? I haven't campaigned for or against the
morality of the issue, only the OP's retardation
about playing games with legality and essentially
entering a state of denial. You're an idiot,
by the way, just in case that wasn't clear in your
post.
\_ He didn't ask for a lecture, just how to avoid the law.
\_ So if op had asked you how to shoplift, you would
have told him w/o informing him that (1) it was
wrong to steal and (2) he may be subject to criminal
liability?
What I find more disturbing is the fact that op
feels entitled to download games (and whatever
else he wants) w/o paying for it. Regardless of
the civil/criminal liability associated w/ this
sort of activity, op OUGHT to realize that actual
people worked on the games that he is stealing
and if everyone acted like him and stole these
games there would be no incentive for people to
work on future games. If the hard work of others
brings you benefit, PAY FOR IT or we all lose in
the long run.
\_ I'm not going to disagree with you about games, but
I don't agree that stealing software always costs
companies money in lost business. I've used stolen
copies of very expensive software to get the feel
for them and figure out how to use them and then
spent huge amounts of Other People's Money to buy
the real thing based on having tried it for free.
In some cases I would probably not have made that
purchasing decision had I not been able to try it out.
So in the end, the company made *more* money than
they would had I not stolen a copy while I was a poor
student who couldn't afford it anyway.
\_ I can see your rationale. If you end up
buying a copy of the software or deleting
it b/c you don't want to buy it, there is
no violation of the principle that one ought
pay for things from one which one derives a
benfit. Unfortunately the law does not (and
probably cannot ever) allow for this.
The general principle could be applied to
games/music/books/movies/&c. if there were
no public library or private rental systems,
however, it is so easy and affordable to
rent things it doesn't really make sense to
steal.
\_ Well, the way for this to be legal is for the
company to have the foresight to give away
a version that's good enough to learn the
commands and get a feel for it so poeple like
me don't *have* to break the law to try their
damn product. Wasn't there a free version of
Doom in the begining to get people hooked?
After that, I was more than happy to shell
out the money for the real thing which I
probably wouldn't have done otherwise.
\_ right...I'm sure companies which provide
demo versions never get their software
stolen. -tom
\_ Join a private forum. No, really.
\_ Would decentralization, using SSL encryption, and only using
centralized servers to randomly connect people, and always
use another node as a middle-man when xferring data make it
really hard to track? Sort of a cross between filetopia and
bittorrent...
\_ onion routing, so nobody's sure what data is going through them,
taht would be more like it. See 'freenet' |
| 2005/3/11-14 [Computer/SW/Security] UID:36644 Activity:nil |
3/11 I'd like a way to have Terminal.app change the window's background
color when I ssh to another machine-- really cool would be to have
some sort of mapping of hostname to RGB value so that the window
for machine1 looks different than machine2. Is there a way to do
this? TIA.
\_ If I wanted to do this for one machine only, I would replace ssh
with a wrapper that outputs some ANSI sequences before calling
the real ssh. (You might want to put in some logic to only do this
for interactive sessions.) To set it up on a number of systems, I
would put the ANSI sequences in my .profile. That way, if you ssh
from A to B, then from B to C, your colors will match machine C
instead of machine B. -gm
\_ You might be able to do this w/ saved .term files. Just set
the background to the color you want and then do File->Save
and specify the cmd to execute as /usr/bin/ssh user@host.
Then when you click on a particular term file, it will have
the color set and will ssh into that host. |
| 2005/3/10 [Computer/SW/Security] UID:36614 Activity:kinda low |
3/10 If I run to run X11 through NAT, is it better to set up raw forwarding
of port 6000, or ssh-tunnel the connection? I'm not using WPA or WPA2.
\_ SSH tunnel--use -c for compression, it helps a bit. Unless you
have serious computer (not net) performance issues, port forwarding
through SSH is very often a good idea out of principle. Also, does
X11 now let you use just 6000? Used to use 6001..2..n as well, or
has someone fixed that? -John
\_ my understanding is you can use just 6000, defaulting to 0.0,
6001, ..., n for 0.1 ... n, if desired, but not necessary. |
| 2005/3/9-10 [Computer/SW/Security, Computer/SW/OS/FreeBSD] UID:36594 Activity:nil |
3/9 OpenSSH 4.0 is out:
Announcement: http://tinyurl.com/5aea4
Portable: http://www.openssh.com/portable.html
OpenBSD: http://www.openssh.com/openbsd.html
Nifty new feature is the connection multi-plexing.
\_ What is that?
\_ Once you start one connection to a remote system, other
connections will use the same key pair so you don't have
to pay the cost of a new DH exchange (at least this is
the impression I got from reading the mailing list) |
| 2005/3/8-9 [Transportation/Car, Computer/SW/Security] UID:36586 Activity:low |
3/8 "It was certainly an accident ... The car was traveling at a velocity
that couldn't have been more than 40 kilometers (25 miles) per hour
... The government has a duty to point out that the reconstruction of
the tragic event ... from the direct account of our secret service
official who was with Dr. Calipari does not coincide, totally, with
what has been said so far by the U.S. authorities."
[Fini] said Calipari, an experienced officer who had negotiated the
release of other hostages in Iraq in the past, "made all the
necessary contacts with the U.S. authorities," both with those in
charge of airport security and with the forces patrolling areas next
to the airport.
-G. Fini, Italian foreign minister (http://csua.org/u/bb0 CNN)
Another article: [The security agent in the car] said that a light
was flashed at the car after a curve and that gunfire -- lasting 10 or
15 seconds -- started immediately afterward, disputing U.S. military
claims that several attempts were made to get the car to stop before
shooting. |
| 2005/3/7-8 [Computer/SW/Security, Computer/SW/Unix] UID:36560 Activity:nil |
3/7 Are there any ISPs that still offer generic dial-up PPP accounts that
works with the Windoze generic dialer and don't require custom dial-up
clients? I have an AT&T Global Dialer account, but it needs the Global
Dialer client. I remember the old days where all I needed was to enter
the phone number, login and password into the Windoze dialer, and it'd
work. Thanks.
\_ SBC Global works for me when I'm on the road. - jvarga
\_ http://ispwest.com works well for that. even works with linux.
\_ http://sonic.net
\_ They've always had the at&t dialer, but you've been able to
authenticate with PAP and with login in the past with the
8764287346@worldnet.att.net and the gibberish password. Look for
an account.txt file -dwc |
| 2005/3/3-5 [Consumer/CellPhone, Consumer/PDA, Computer/SW/Security] UID:36517 Activity:nil |
3/3 Anyone know of a good stopwatch/timer that works on a Treo? I've
tried a few and they all seem to crash when I try to access any
of the menus. tia. |
| 2005/3/3-5 [Computer/SW/Security] UID:36515 Activity:moderate |
3/3 Is there a way I can set up my cell phone so it only rings if
the person calling knows a secret code, and otherwise just goes to
voicemail? Or, can it be set up to first go to a message where
the person calling can choose to leave me a voicemail or to ring the
phone? In the latter scenario, this would enable people to call and
leave a voicemail in the middle of the night without waking me, but
they would still have the option to ring the phone if they really
want to talk to me at that minute.
\_ If you come up with a decent way to do this, could you please let
me know? (For now, I have a profile on my phone called "Asleep",
which is mostly silent; if I expect someone to call at night, then
I set a non-silent ring tone for that person. It works okay, but
what you suggested would be much nicer.) --mconst
\_ I think you would need an answering service to handle the
decision-making and a distinctive ring to only wake you when
the answering service dials through. Once your phone has
forwarded the call to voicemail, it would be up to the voicemail
provider (usually your cell provider) to handle things.
\_ In the latter scenario the caller already has an option: if they
don't want to wake you, don't call in the middle of the night!
Send email or call in the morning. As for the first scenario,
you can get a silent ringtone, set that as the default, and
assign non-default ones to people you know.
\_ Yes, but I could have a seperate outgoing message for
when I'm sleeping and for when I'm awake. Sometimes I'm up
at 11pm, sometimes I'm in bed. The caller doesn't know. -op
\_ on my cell phone feature wish list: a way to just leave someone
a voicemail w/out ringing their phone. Sometimes I want to just
leave someone some info but dont want to talk. Also I HATE
checking voicemail... but txt msgs are often too cumbersome.
It'd be great if each persons phone had a voice-to-text thing
that they could use to create txt msgs.
\_ If both people are on AT&T, at least, you can send voicemail
directly: call your own voicemail, and select 2 from the main
menu. |
| 2005/3/2-3 [Computer/SW/Security] UID:36498 Activity:kinda low |
3/2 I can read mail through CalMail or BearMail but can't POP. Anyone else
having this problem?
\_ You probably shouldn't've ignored the 3 (or was it 4?) warnings
that the CalMail people sent out in the past month that vanilla
POP3, being blatantly insecure by way of transmitting passwords
in cleartext, will be (and now has been) permanently disabled
as of 03/01/2005. Set up your mailer to use secure POP (or SIMAP),
on the default port, 995 (or, respectively, 993). -alexf |
| 2005/2/23-24 [Computer/SW/Security] UID:36377 Activity:very high |
2/23 Hi, my girlfriend's mom is in Taiwan. Her computer stopped booting;
it shows BIOS, but it won't show the WinXP screen. So, it sounds like
a virus (less likely, partial drive failure / OS corruption, but let's
assume it's a virus).
She is concerned about recovering her files.
Normally if I were on-site I'd just pull out the drive, put it in an
enclosure, and bam.
Is there any convenient way for her to recover her files without my
being on-site? I am thinking something along the lines of a bootable
CD-ROM I can mail her that could mount an NTFS partition and also a
USB memory key. It would show an easy Explorer-like tree with which
she can explore the C: drive and copy files over.
\_ The only convenient way I can think of is for her to buy a new
computer, then open up the old computer, take the disk out and
put it in the new computer as a secondary drive. Even this is
not "easy", but it is relatively straightforward for a non-
technical user. Can you trust her to be able to operate a
screwdriver? If not, she needs to bring it in to a data
recovery service, which will be much more expensive.
\_ have somebody in Taiwan make a KNOPPIX CD.
You make the same knoppix CD here and talk her through it.
She copies the files from HDD to the USB key.
In these situations avoid the screwdriver if you can.
\_ Thanks, I'm downloading KNOPPIX 3.7 English now and will try it
out. I'll let motd know how it goes.
\_ Also, if you could get remote access to her computer,
that would probably make things easy for you. You might try
setting up a remote access tunnel. Have her run (as root)
\_ Also, if you get remote access to her computer,
that would probably make things go faster.
You might try setting up a ssh tunnel like this:
Have her type:
(at the boot: prompt) knoppix 2 vga=normal
# passwd (to set the root password)
# /etc/init.d/ssh start
# ssh -R 2222:localhost:22 account@yourserver
then you ssh to you@yourserver and run
$ ssh -p 2222 root@yourserver
This should give you root on her server. I haven't tried
this specificaly but I'll test it out later tonight.
Then you ssh to yourserver like normal and run
$ ssh -p 2222 root@localhost
at the password prompt, type her new root password.
This should give you knoppix root on her computer.
I just tested it and it works. -brett
\_ Sounds cool. She gets net via PPPoE, though. So I guess
I will need to fish for the PPPoE settings in KNOPPIX and
tell her how to do that?
\_ D'oh. She doesn't she have a firewall/router device?
That could explain how her computer got comprimised.
\_ That's what I told my gf. But my gf does Windows
Remote Assistance all the time with her family and
didn't want to mess with unblocking ports.
...
"It ain't broke, so why fix it?"
"Because you might get p0wn3d one day"
"But I have everyone on Windows Automatic Update"
"Okay"
"Dang, I got p0wn3d!"
The real answer is that we need to test the port
unblocking in the U.S., and move them to the
D-Link gateway next time we visit Taiwan.
\_ Your girlfriend should either:
1) fix it herself now (or)
2) follow your advice ahead of time.
3) Get Macs for her parents.
Your gf doesn't understand inbound/outbound rules:
"If you are using Network Address Translation (NAT) in a
home environment, you can use Remote Assistance without
any special configurations."
\_ You have never had a girlfriend, have you?
\_ Doesn't she have any computer savvy acquaintances in Taiwan?
Isn't Taiwan a high tech island?
\_ Friends we used to ask are in gr4d sk00l in the U.S. |
| 5/16 |