Re: [DNG] ntp setup

2021-06-22 Thread Rick Moen
Quoting Olaf Meeuwissen (paddy-h...@member.fsf.org):

> I think it's fair to point out that systemd-timesyncd only promises
> Simple NTP (SNTP).  How good a job it does of that is another matter
> but at least it explains some of the "quirks" you mention below.

Put that way, fair point.  _But_, the larger context is that a
systematically better job of time sync, using better code and also (in
the case of ntimed-client), _smaller_ code, can be performed instead,
gaining all the advantages of a real NTP client.

Or, to put it a different way, with several excellent genuine NTP
clients to choose among, I deny the existence of a compelling use-case 
for any SNTP client, let alone one that's more than a little slipshod.
(systemd-timed's security history, which I didn't get into, is less than
reassuring.)

The SNTP protocol is what Windows users settle for, because that's what
they're offered by defaul, and mostly they don't know that they're
missing out.  On Linux, we don't need to settle.

___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] ntp setup

2021-06-20 Thread Rick Moen
Cheers, Grammarian's bar joke #22:  The past, present, 
Rick Moen   and future walked into a bar.  It was tense.
r...@linuxmafia.com   
McQ! (4x80)
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Multiple resignations from Freenode's staff ??? New drama shake the opensource

2021-05-20 Thread Rick Moen
Quoting Bernard Rosset via Dng (dng@lists.dyne.org):

> Thanks Rick, for this lighthearted take on this!
> Very much welcome and appreciated on my part.

Yr. very welcome.

> This actually is the "dream" of any infra person facing a relentless
> ego-bloated hijacker above in such a situation.

I was part of a Linux effort that went through this, when I was a senior
editor for the online monthly magazine Linux Gazette.  Our founding
editor John M. Fisk, MD had, around issue 4, accepted a kind offer from
SSC, Inc. (at that time publishers of Linux Journal) to provide Web
hosting for the magazine.  Many years later, SSC, Inc. announced without
consulting the magazine staff that it would be turning the
linuxgazette.com Web site into a continuously evolving Drupal site
without magazine issues or an editor.  (SSC's newly hired webmaster just
happened to be a Drupal enthusiast.)  

The magazine staff found this didn't meet the magazine's needs and moved
to new hosting the staff themselves built and paid for, at
linuxgazette.net .  To our surprise, SSC, Inc. objected bitterly,
claimed to own the branding (hence, trademark) rights to Linux Gazette
(a claim I later eviscerated by checking with Dr. Fisk), and threatened
us with trademark litigation and UDRP proceedings.  

Unfortunately for SSC, several members of the Gazette's staff including
me had a working knowledge of trademark and other tort law, we politely
called their bluff, and... nothing happened.  Despite numerous people
telling us very emotionally that we needed to capitulate and beg for
mercy, it turned out that SSC, Inc. had no leverage and no plausible
cause of action, and merely made a lot of noise (and attempted a USPTO 
trademark registration, which failed for bad drafting before we could
even file opposition[1]).  The magazine continued healthily for many years,
until it finally collapsed for unrelated staff reasons.

The people on LWN.net's reader feedback forums who confidently told me,
when LWN was covering SSC's legalistic blustering, that my analysis of
SSC's position being a paper tiger was delusional on my part, that I
needed to surrender instantly, that I was only a technogeek and should
meekly give in to the demands of an actual corporation, etc., somehow
never got back to me to say I was correct and to apologise.  Funny about
that.


FWIW, long ago, I wrote a mostly popular essay about the history of
forking in software projects:
http://linuxmafia.com/faq/Licensing_and_Law/forking.html


{1] I pointed out at the time that, because Linux Gazette was a
completely non-commercial magazine, even completely valid trademark
rights, being enforceable only in commerce, would be toothless to
prevent our continuing to use our name.  In addition, when I wrote to
Dr. Fisk and asked if he'd assigned any commercial rights to SSC
pursuant to the hosting offer, and he said "absolutely no", that killed
SSC's trademark-based monopoly effort stone-cold.

___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Multiple resignations from Freenode's staff ??? New drama shake the opensource

2021-05-20 Thread Rick Moen
Quoting Dimitris via Dng (dng@lists.dyne.org):

> there are lawyers-threats involved and he took infra too. so it's
> not that simple/light as you're presenting it.
> announced here as well : https://twitter.com/freenodestaff

As always, persons involve will need to judge for themselves whether
legal inevitable blustering must be paid any attention at all, and what
attention if any.  It is extremely common to threaten vaguely described
tort action against software and project forks, by the way.

You have not bothered to state what your point is.  So, I provisionally
conclude that you don't have one beyond "the person is making vague
legal threats against departed staff", which is of course exactly what
one expects in this situation.  And?  (Actually, no.  I'd rather you not
tell me.  Yes, I know that computer geeks throw their handkerchiefs and
have a fainting spell when someone issues bushwah tort threats, even
when those threats aren't against them.  I just don't think this mental
aberration warrants my time.)

> what's most troublesome is that thousands of user data passed
> control without any info/consent.. to the crown prince - mt gox
> scammer(!)

If you don't wish to have the association between your IRC nick and your
e-mail address, which ISTR is the entirety of what this term "thousands
of user data" refers to, then go tell Freenode's NickServ to "DROP" your
nick.  (Personally, I think that's pretty feeble 'user data'.)

Anyway, the above has no obvious connection to the prior discussion, but
you do you.

> p.s. most of the "spelling" paradigms you wrote, are not like that..
> but probably OT..

(1) It's a metaphor.  Obviously.
(2) In every case I cited, the core concept I spoke of applied, that
in essence the project continued but left the old name behind.

The point is that this is a frequent and somewhat normal pattern in 
software, and part of the grand tradition to fork if necessary in order
to get away from something that stands in the way of the project.

My point should be self-evident, so I don't intend to waste time arguing
with you just because you wish to debate the self-evidently true.


___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Multiple resignations from Freenode's staff ??? New drama shake the opensource

2021-05-19 Thread Rick Moen
Quoting Ludovic Belli??re (belliere.ludo...@proximus.be):

> What does it means for devuan? 

It's a spelling change!

1996:  NCSA HTTPd is now spelled "Apache HTTPd"
1997:  gcc is now spelled "egcs" (which then got called gcc, again)
1991:  GNU libc forked as Linux libc, and then, 1998: Linux libc is now
   spelled "GNU libc" again.
2003:  XFree86 is now spelled "X.org"
2002:  Open Projects Network is now spelled "Freenode"
2006:  Kanotix's leading edge is now spelled "Sidux"
2010:  Sidux is now spelled "Aptosid"[1]
2012:  OpenOffice[.org} is now spelled "LibreOffice"
2014:  Solaris is now spelled "Illumos"
2021:  Freenode is now spelled "LiberaChat"

See?  It's all about spelling reform.


It appears that Mr. Lee's corporate entity "freenode Limited" has,
at least for now, Registrant status for three Internet domains, 
freenode.net/org/com.  Mr. Lee appears to have no other assets relevant
to what until now was called Freenode and, probably by the end of Thursday,
his time, his three Internet domains will point to no Internet
infrastructure, as it will all disaffiliate and reconstitute itself as
"LiberaChat" -- as is happening in real time as I write this.


[1] This sound familiar?  "A press release dated September 11 came to
the community's attention Monday, September 13 of the renaming or, as
some reported, a fork of sidux to aptosid. Due to conflicts with the
commercial backer of the Debian-based distribution, sidux developers
have separated themselves from the Sidux e.V. association to continue
developing aptosid on their own."
https://www.linuxjournal.com/content/sidux-developers-provide-clean-upgrade-path-aptosid

___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] ..are we|Devuan safe from this systemd backdoor malware, taking our kernels from Debian?

2021-05-14 Thread Rick Moen
Quoting marc (marc...@welz.org.za):

> Hello

And almost certainly goodbye.  But before that:

> > It's irrational to talk about rootkits as if they were a security threat
> > (and my apologies in advance if, as seems likely, you're fully aware of
> > the difference; in these discussions, there will always be other readers
> > who don't.
> 
> Apologies accepted :) 

You know what's really tragic, here?  I was trying to be nice -- since
your wording had left it very unclear whether you actually thought
rootkits are an attack vector.  I said it's likely you didn't, being
generous of spirit, and apologised if that were the case -- an
obvious pro-forma apology, as a way to be nice.  It would, of course, be
obvious that I had objectively offered no offence, therefore I wasn't
actually apologising, just trying to be nice about your unclear wording.

But hey, if you want to be ungracious, and act like you don't want to be
friends, I guess you do you.

> > By definition, a rootkit is a set of coverup tools installed by an
> > intruder _after stealing root via other means entirely).  The point is
> > that focussing on what bad guys do after they broken into your system
> > and cracked the root account is largely a waste of time:  After they
> > have completely broken security, they can do anything at all, and what
> > particular thing they choose do isn't very interesting -- or relevant
> > to system administration.  What _is_ interesting and relevant is how 
> > the bad guys got in and how they escalated privilege to root.  And those
> > questions are the ones relevant to system administration.
> 
> Well, yes and no. Of course if the system is fully compromised, then
> all bets are off. It does also mean that if a bad guy has broken into
> a system with writable {disk,graphics,nic,bios} firmware, then the only
> safe response is to throw away the hardware (owners of RPIs earlier
> than v4 only need to throw away the sd card).

You purport to disagree with what I said, but then throw out a lot of
word salad that doesn't address it.

I'm going to ignore that and move on.


> However, most system administrators don't do that. At best they reformat,
> cross their fingers and continue.

Anyone who does that, I'd fire.


> And you will note the current rootkit under discussion has two modes - a root
> mode where it pretends to be a systemd component, and a userlevel mode where
> it pretends to be a bit of gnome.

Completely irrelevant to what I was saying.

> But more importantly: This is a mailing list for a distribution, and
> distributions are where supply chain attacks can (or might already have)
> happen(ed).

A tautologically true but also totally useless observation.


> Some people subscribe to "with sufficient eyeballs, all bugs are shallow",
> others to "three people can keep a secret, if two are dead". Interestingly
> both apply - the latter when talking about who has access to the build
> infrastructure...

Another totally useless observation -- and also completely irrelevant to 
what I said.  _If_ you know anything about distros with competent build
infrastructures (including for example Debian), you will know that it is
for obvious reasons accessible only to the most highly trusted people.
Unless one of those happens to be Moriarty the Napoleon of Crime,
authors of *ix ELF infectors, rootkits, UDP-based backdoors, etc. can
dick around with their creations all day long and not be able to
compromise the package collection via the build infrastructure.


> There is always a first time (or a time of first discovery). 

Send a telegram.

And I believe I'm done.  Run away and play elsewhere, sonny.  I'm busy.

[rest snipped per the Law of Diminishing Returns]

-- 
Cheers,There are really only two hard problems in computer science:
Rick Moen  o  Cache invalidation policy.
r...@linuxmafia.como  Name-space management.
McQ! (4x80)o  Off-by-one errors.
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] ..are we|Devuan safe from this systemd backdoor malware, taking our kernels from Debian?

2021-05-06 Thread Rick Moen
hen-employer:
http://linuxmafia.com/faq/Security/breakin-without-remote-vulnerability.html

If you were to speculate that my employer was VA Linux Systems and that
the embarassing theft of a token happened when a VA sysadmin ssh'd out
to shells.sourceforge.net (a shared public host that he didn't know
someone had rooted), and then ssh'd or scp'd back into the sensitive
corporate network, I would say "Hmm, no comment.'

-- 
Cheers,Grammarian's bar joke #16:  A run-on sentence walks into a
Rick Moen  bar it starts flirting. With a cute little sentence fragment.
r...@linuxmafia.com   
McQ! (4x80)
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] ..are we|Devuan safe from this systemd backdoor malware, taking our kernels from Debian?

2021-05-06 Thread Rick Moen
Quoting Dr. Nikolaus Klepp (off...@klepp.biz):

> And there's alway the possibillity of 3rd party software, e.g. Teams,
> Appimages, ...

Always.  Looking from a distro-management perspective, doing that falls
into the broad category of "User circumvents the distro's management
regime", and naturally any result, good or bad, can follow.

But by definition, that is not a distro problem, and there is basically
no way of absolutely preventing a naive admin from shooting at his or
her foot -- at least, not short of providing Tivoised appliances rather
than general-purpose, open source distros for general purpose computing.

-- 
Cheers, Grammarian's bar joke #20:  The subjunctive 
Rick Moen   would have walked into a bar, had it only known.
r...@linuxmafia.com   
McQ! (4x80)
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] ..are we|Devuan safe from this systemd backdoor malware, taking our kernels from Debian?

2021-05-04 Thread Rick Moen
Quoting Arnt Karlsen (a...@iaksess.no):

> ..very true.  Are there ways to trick common Devuan installs 
> into automatically installing these bad things?  
> (Other than tricking newbie etc users, sysadmins etc into 
> doing it?)

I don't see any particular structural accidents waiting to happen,
above and beyond the norm in Unix.  (OTOH, I don't spend a lot of time
studying Desktop Environments.  Someone else might do a better job
at spotting, e.g., software structures likely to lull unwary desktop 
users into carrying out dangerous actions.)


___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] ..are we|Devuan safe from this systemd backdoor malware, taking our kernels from Debian?

2021-05-04 Thread Rick Moen
Quoting Arnt Karlsen (a...@iaksess.no):

> On Fri, 30 Apr 2021 14:37:20 +0200, Arnt wrote in message 
> <20210430143720.7311bc82@d44>:
> 
> 
> > https://www.theregister.com/2021/04/29/stealthy_linux_backdoor_malware_spotted/
> >  
> 
> ..how it works:
> https://blog.netlab.360.com/stealth_rotajakiro_backdoor_en/

Answer:  Avoid installing and running it.

This isn't any kind of intrusion tool, just yet another backdoor program
that can be installed and activated after intrusion through other means
entirely -- indistinguishable except in fine detail from countless
others that have existed for decades.  And _TheReg_ was very clear about
that:

  The malware is not an exploit; rather it's a payload that opens a
  backdoor on the targeted machine. It might be installed by an
  unsuspecting user, an intruder, or through a dropper Trojan. How
  RotaJakiro has been distributed remains unanswered.

So, there ya go:  Avoid installing and running it.  It's called system
administration.

-- 
Cheers,  Grammarian's bar joke #26:  A gerund and an 
Rick Moeninfinitive walk into a bar, drinking to forget.
r...@linuxmafia.com   
McQ! (4x80)
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] connection manager as dns resolver?

2021-04-26 Thread Rick Moen
Quoting Hendrik Boom (hend...@topoi.pooq.com):

> Looks as if the connection manager is taking over dns.
> 
> Who knew?  And whom does it talk to?  Does it contain its own recursive 
> DNS resolver?  Or does it just pick up on the DHCP signals it gets from 
> elsewhere and take over?

connman (which I don't use, and have only read about) does _not_ appear
to include a recursive nameserver.  
https://launchpad.net/connman

The data you've posted so far that I've read in this thread (but I
haven't caught up with the full thread, yet) seem bizarre, in suggesting
that connman itself is hogging port 53 on localhost -- which would
definitely mean either it's handling any recursive requests or nothing
is.

I'd have been extremely surprised if any connection management utility
had an integral recursive nameserver.  The latter are complicated
projects, which is why there have been relatively few successful ones.

___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] rm not freeing space (SOLVED)

2021-03-21 Thread Rick Moen
Quoting Marc Shapiro via Dng (dng@lists.dyne.org):

> On 3/19/21 8:31 PM, tempforever via Dng wrote:
> >
> >To find files last modified in January:
> >(adjust the dates as needed; on Mar. 19 this should locate files dated
> >Jan 1 - 31 but it could be off a day or so)
> >
> >cd /media/archives
> >find -type f -mtime -78 -mtime +46 -ls
> 
> Thank you!
> 
> That found the files.  They were in a hidden directory
> '/media/archives/.Trash-0'.  

Aha!  For your future convenience, here is a Perl script I get a lot of
use from, when looking for the (individually) largest files within $PWD
and its subtrees:


:r /usr/local/bin/largest20

#!/usr/bin/perl -w
# You can alternatively just do:  
# find . -xdev -type f -print0 | xargs -r0 ls -l | sort -rn -k +5 | head -20
# Sometimes also handy:  du -cks * | sort -rn
use File::Find;

@ARGV = $ENV{ PWD } unless @ARGV;
find ( sub { $size{ $File::Find::name } = -s if -f; }, @ARGV );
@sorted = sort { $size{ $b } <=> $size{ $a } } keys %size;
splice @sorted, 20 if @sorted > 20;
printf "%10d %s\n", $size{$_}, $_ for @sorted

___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Is RSA broken? Or is it a hoax?

2021-03-13 Thread Rick Moen
Quoting Mike Tubby (m...@tubby.org):

> Try this:
> https://www.schneier.com/blog/archives/2021/03/no-rsa-is-not-broken.html

Thanks, yes.  Among the telling points made;

  The most important point from the StackExchange discussion is that if
  Schnorr could “destroy RSA”, he would have destroyed one of the RSA
  Challenge problems to prove it. He did not.

Schnorr is a real cryptologist and a real mathematician, though.  This
isn't a hoax; it just remains to be seen to what degree its claims 
check out in practice, and whether the maths prove valid when peer
reviewed.

___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Is RSA broken? Or is it a hoax?

2021-03-13 Thread Rick Moen
I wrote:

> > https://eprint.iacr.org/2021/232.pdf
> 
> Snakes.  Oil.  (**COUGH** Theranos **COUGH**)
> We've been here before with Crown Sterling.

Sorry, I take that back, having just assumed this was the Crown Sterling 
guys (again).  The current claim is _not_ from Crown Sterling
but rather from serious mathematician and cryptographer Claus Peter
Schnorr, who claims that prime factorization can be reduced to a much
less intractable ‘shortest vector’ problem.

My offhand reaction is that Schnorr's claim of greater efficacy 
has not yet been comprehensively demonstrated much less proven, so 
we will have to see whether the alleged advance in cryptoanalysis 
proves out in the real world.  As this paper is only two days old, 
that skeptical evaluation has only now just started.

(I haven't worked on number theory in decades, and so cannot comment
even if I hadn't just now cracked open the abstract of Schnorr's paper.)

___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Jitsi-meet server in DMZ

2021-03-13 Thread Rick Moen
Quoting Mike Tubby (m...@tubby.org):

> You'll be lucky of Jitsi works well with NAT due to the nature of
> NAT-encumbered protocols like SIP and RTP.

Yeah, the server end of Jitsi Meet really needs to be on a public IP
address, not behind NAT.  You cannot expect the latter to work reliably,
and would just need to do it again the right way.

-- 
Cheers,  "The market can stay irrational longer than you can stay solvent."
Rick Moen   --- John Maynard Keynes (attr.)
r...@linuxmafia.com  
McQ!  (4x80)
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Is RSA broken? Or is it a hoax?

2021-03-13 Thread Rick Moen
Quoting Bernard Rosset via Dng (dng@lists.dyne.org):

> This is what the last line of the abstract claims; however the whole
> paper goes beyond my understanding.
> 
> https://eprint.iacr.org/2021/232.pdf

Snakes.  Oil.  (**COUGH** Theranos **COUGH**)

We've been here before with Crown Sterling.
https://www.schneier.com/blog/archives/2019/09/crown_sterling_.html
https://www.schneier.com/blog/archives/2019/09/the_doghouse_cr_1.html

About the video where Crown Sterling CEO Grobert Grant ran a cooked
demonstration of Grant's claimed crypto-cracking algorithm (the stuff
talked about in the paper):

  Ars shared the video with Jake Williams, the founder of Rendition
  Infosec and a former member of the National Security Agency's Tailored
  Access Operations group. "I'm dumber for having watched that," Williams
  said. "Bragging that you can factor a 256 bit RSA key in 2019 is like
  bragging about hacking an unpatched Windows 2000 box. Sure you did it,
  but nobody should care." The 256-bit key, Williams said, was "absurdly
  small." (Digital certificates from recognized certificate authorities
  have used RSA 2048-bit keys for more than seven years.)

https://arstechnica.com/information-technology/2019/09/medicine-show-crown-sterling-demos-256-bit-rsa-key-cracking-at-private-event/

> Any way, pushing for ECDSA or even EdDSA, both of which are more and
> more supported out there (and have been for a almost a decade
> already), is IMHO the most future-proof take.

Maybe.  A counter-intuitive aspect of crypto is that older (if still not
significantly flawed) algorithms and their implementations are often
preferable than newer and theoretically more-promising ones -- because
the former have withstood determined and expert attacks for longer.

Schneier made this point a few years ago about why he felt that Blowfish
is still safer than Twofish, even though he felt the latter is
technically superior -- because it was too new to be nearly as
battle-tested.  (And, again, don't forget that weaknesses in the
implementation matter as much or more than theoretical weaknesses in the
algorithms themselves.  Cracking is cracking, no matter whether it 
was achieved through exploiting unintended side-channels or anything
else.)

-- 
Cheers,  "My generals are always right about other people's 
Rick Moenwars and wrong about our own."  -- LBJ
r...@linuxmafia.com  
McQ!  (4x80)
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Motel wifi: was web conferencing software

2021-03-12 Thread Rick Moen
Quoting Simon Hobson (si...@thehobsons.co.uk):

> That latter point means that you go to https://myfavouritewebsite.com
> and no you don't get the portal page - you get a certificate warning.
> Given that most people these days will have https URLs cached in their
> browser, you have to manually and explicitly try and connect to a site
> (doesn't matter what, any random URL will do) over HTTP.

Counter-tactic:  If you're in a place (hotel, motel, conference centre)
where you suspect there might be a captive portal, fire up first an
_alternate_ Web browser (after temporarily disabling one's bespoke
choice of DNS nameserver IP), and try to load something, to see if the
captive portal page shows up.  After navigating any captive portal,
switch to your production-use Web browser.

Equivalently (I think?), use a private-browsing tab for the first page
load.

-- 
Cheers,Foursquare is for people who wish they were Sims.
Rick Moen-- @kellyoxford
r...@linuxmafia.com
McQ! (4x80)  
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] I kinda sorta got opennic DNS working

2021-03-11 Thread Rick Moen
Quoting Steve Litt (sl...@troubleshooters.com):

> What's the problem? I'm now resolving with some opennic servers. Later
> I'll actually make a separate  root.hints for opennic, and one for the
> regular servers (which might be updated with my next Unbound update).

Glad it's working for you.

Earlier, it seemed like you were in trouble, and also that OpenNIC's 
instructions for Unbound suggested an approach different from what you
then had.

___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] I kinda sorta got opennic DNS working

2021-03-11 Thread Rick Moen
Quoting tito via Dng (dng@lists.dyne.org):

> To be honest you advised me:
> 
> me: Hi,
>   can this opennic.cache file be downloaded freely or do
>   you need to register?  
> 
> You: As mentioned, I have not experimented with alternative DNS roots in
> decades.
> 
> I could try to answer your question for you, but, seriously, if you are
> going to start experimenting with advanced DNS topics, you really need
> to be prepared to do basic data-discovery for yourself at _bare_
> minimum.  If you are not, I would advise staying away from such matters.

Yes, I did _also_ give the same general advice to you that I gave to Steve.

If you interpreted that as advising you to not experiment with software,
-- of all things -- then you badly erred.

Anyway, this is not even remotely of interest.  Please go away.

___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] I kinda sorta got opennic DNS working

2021-03-11 Thread Rick Moen
Quoting tito via Dng (dng@lists.dyne.org):

> On Wed, 10 Mar 2021 19:38:35 -0800
> Rick Moen  wrote:
> 
> > Quoting Dimitris via Dng (dng@lists.dyne.org):
> > 
> > > https://wiki.opennic.org/tier_2_unbound
> > > 
> > > eg. for opennic root servers :
> > > # dig . NS @161.97.219.84 > root.hints
> > 
> > Yeah, I _vaguely_ recall (after not paying attention to such matters
> > for some decades) that their alternate root servers supply records
> > for the consensus TLD nameservers along witn other ones.  But, point
> > is, people need to follow directions carefully, and also not play
> > with this stuff unless/until they are quite sure they know what they
> > are doing and are prepared to do relevant diagnosis if necessary.
> 
> This is a circular argument. How do you get prepared If you
> don't start playing with stuff.

D00d.

My friend Steve Litt is an intelligent guy, but he is relatively new to
DNS administration, and IMO ought to learn the basics of that field of
knowledge better before jumping into advanced, experimental
configurations.

Your presupposition that I advised Steve to not play with stuff is
both epically absurd and also actively annoying.

Go away, seriously.  You are either trolling (badly) or having some
comprehension problem that I really don't wish to deal with.

-- 
Cheers,My pid is Inigo Montoya.  You kill -9
Rick Moen  my parent process.  Prepare to vi.
r...@linuxmafia.com
McQ!  (4x80)
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Opennic

2021-03-11 Thread Rick Moen
Quoting Gabe Stanton via Dng (dng@lists.dyne.org):

> I'll be blunt as well. I think this argument is a strawman because you
> lumped opennic in with other dns providers and dismissed them

That is not what I said.

Your reading comprehension isssues are not my problem.

> > > You made a case for another possibly good alternative for dns
> > > providers as oppposed to opennic
> > 
> > That's not what I said.
> 
> Uh okay. Here's the quote. If you weren't talking about a hypothetical
> alternative dns provider here, then I'm not the only one here that's
> confused.

I wasn't talking about OpenNIC _at all_, there.

I was pointing out that contractual privity gives one theoretical
legal advantages (but not very generally useful ones).  I am not 
responsible for your erroneous readings.


> You lumped opennic in with cisco, google, and various others is what
> you did.

I'm not sure where your misunderstandings are coming from, but I'm
really not interested.

___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] web conferencing software (was Re: Any interest in a Devuan Meetup in Colorado Springs or Denver?)

2021-03-11 Thread Rick Moen
Quoting tito via Dng (dng@lists.dyne.org):

> > Forgive me, but it's rather late at night in my time zone, and I am
> > not at peak alertness, _but_ my guess is that Unbound got set up
> > somehow configured to forward outbound recursive queries to those
> > entities, leaving me perplexed about why anyone would do that.
> 
> Just by following one of the many tutorials out there.
> Initially I was just interested in using dns to filter out adservers 
> and the like.

OK, sure.  When I first encountered Unbound, I noticed that (like
pdns-recursor) it functioned extremely well without any modification
at all, by default, as a high-performance, high-security standalone
recursive server, and it just hadn't occurred to me to go out of one's
way to turn it into a forwarder.  (I mean, if all you want is a
forwarder, you can just use dproxy, pdnsd, or Dnsmasq, which are simpler
and don't have recursive code.)

On the other hand, if you want a fully autonomous recursive nameserver, 
then _don't_ configure it to forward all queries to some outsourced 
recursive nameserver elsewhere, but rather let it do its job, as
implementing the RD (recursion desired) bit makes handling of queries
faster and smarter.

In case the reasons why aren't obvious, I tried to cover this
humourously in my piece "The Village of Lan: A Networking Fairy Tale":
http://linuxmafia.com/~rick/lan.html

-- 
Cheers,My pid is Inigo Montoya.  You kill -9
Rick Moen  my parent process.  Prepare to vi.
r...@linuxmafia.com
McQ!  (4x80)
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Opennic

2021-03-10 Thread Rick Moen
Quoting Gabe Stanton via Dng (dng@lists.dyne.org):

> Of course using a local (or controlled by you) caching dns resolver
> ENHANCES privacy.

You really should have stopped there.

> That's not even a question and doesn't represent a
> real argument against the likelihood that, in the case of everyone
> running their own caching resolver, that second level nameservers would
> end up being a very good source of info to match dns requests to ip
> addresses, to be exploited just as any other big dns provider is likely
> to do. 

Again, I get the impression, to be blunt, that you don't have a
realistic understanding of how typical patterns of authoritative
nameservice data and caching work.  Spend some time logging and 
studying your recursive nameserver's traffic to TLD nameservers given
caching and try to estimate how revealing that data is.  

You seem to think "very revealing".  In which case, plainly there is no
basis for further discussion, and I wish you good luck in your further
endeavours.



> I'm open to any information you have  [...]

Nope.

You'll need to chew up someone else's time.


> You made a case for another possibly good alternative for dns providers
> as oppposed to opennic

That's not what I said.


> ...but I didn't hear any rebuttal to any of my
> arguments in their favor. 

I'm sorry, but (1) I don't work for you, and (2) I clarified tnat 
_all_ I said was that outsourcing recursive DNS to OpenNIC recursive
servers was a bad idea for the same reason outsourcing it to anyone else
is.

You ignored that, and are now wasting your time and mine.  I am ending
that.


> So, here are the good points about opennic.

Irrelevant to what I said.  Which fact you are ignoring, and thus
wasting my and everyone else's time.  I am ending (at least) the former.

___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] web conferencing software (was Re: Any interest in a Devuan Meetup in Colorado Springs or Denver?)

2021-03-10 Thread Rick Moen
Quoting wirelessduck--- via Dng (dng@lists.dyne.org):

> Au contraire, I’m running unbound right now on my laptop. There are
> some situations though where it’s not feasible to run one's own
> recursive DNS resolver, such as a home router for non-technical people
> that doesn’t support ddwrt/openwrt.

On the basis of decades of experience, I deny the premise.

> Unfortunately the current version of unbound packaged in Debian/Devuan
> has an annoying bug when running under non-systemd+apparmor.
> https://bugs.debian.org/947771

I'm minutely familiar with this fact.

Fortunately for Devuan admins, they can either hotfix Unbound or use any
of several other commodity recursive-only DNS nameservers, all of which 
I catalogue at http://linuxmafia.com/faq/Network_Other/dns-servers.html .

Nota bene:  I accept zero responsibility for ensuring that any or all of
those recursive-only nameservers is binary-packaged for the current,
past, or future releases of Devuan.  I note in passing the fact that, if
necessary, "./configure; make; make install" is not broken.

> I attempted to install knot-resolver as an alternative but it appears
> that the upstream packages have gained a hard dependency on systemd.

Case in point.

> MaraDNS/Deadwood packages in Debian are still using a release from
> 2015

_Second_ case in point.

> ...so I guess I’ll be trying powerdns-recursor next as that package
> appears to be reasonably up to date.

Whatever works for you.  But local packages/compiles are also a thing.

As the guy who wasted a metric lot of time futilely hating me on the
Internet, Prof. Daniel J. Bernstein, memorably observed:  "This is
Unix.  Stop acting so helpless."

___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] I kinda sorta got opennic DNS working

2021-03-10 Thread Rick Moen
Quoting tito via Dng (dng@lists.dyne.org):

> then please just don't do it. You are under no obligation to answer,
> As we say in Italy: "To ask is allowed, to answer is a courtesy",
> but once you take the time and effort to answer then it would
> make more sense to me to share your knowledge rather than
> tell me why you don't want to share it. 

Distinguo:  I didn't raise this topic.  IIRC, Mr. Steve Litt suddenly
asked about it.

The advice I gave, in response, was (I'm pretty sure) correct and
useful.

You're welcome, by the way.

___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] I kinda sorta got opennic DNS working

2021-03-10 Thread Rick Moen
Quoting Dimitris via Dng (dng@lists.dyne.org):

> https://wiki.opennic.org/tier_2_unbound
> 
> eg. for opennic root servers :
> # dig . NS @161.97.219.84 > root.hints

Yeah, I _vaguely_ recall (after not paying attention to such matters for
some decades) that their alternate root servers supply records for the
consensus TLD nameservers along witn other ones.  But, point is, people
need to follow directions carefully, and also not play with this stuff
unless/until they are quite sure they know what they are doing and are
prepared to do relevant diagnosis if necessary.

___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] I kinda sorta got opennic DNS working

2021-03-09 Thread Rick Moen
Quoting tito via Dng (dng@lists.dyne.org):

> Hi,
> can this opennic.cache file be downloaded freely or do you need
> to register?

As mentioned, I have not experimented with alternative DNS roots in decades.

I could try to answer your question for you, but, seriously, if you are
going to start experimenting with advanced DNS topics, you really need
to be prepared to do basic data-discovery for yourself at _bare_
minimum.  If you are not, I would advise staying away from such matters.

I am _not_ prepared to spoon-feed novices on such topics.

___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] web conferencing software (was Re: Any interest in a Devuan Meetup in Colorado Springs or Denver?)

2021-03-09 Thread Rick Moen
Quoting tito via Dng (dng@lists.dyne.org):

> Hi,
> just for fast information, is it enough for unbound to remove:
> 
> forward-zone:
> #forward-first: yes
> name: "."
> forward-tls-upstream: yes
> forward-addr: 1.1.1.1@853#cloudflare-dns.com
> forward-addr: 1.0.0.1@853#cloudflare-dns.com
> forward-addr: 8.8.4.4@853#dns.google
> forward-addr: 8.8.8.8@853#dns.google
> forward-addr: 9.9.9.9@853#dns.quad9.net
> forward-addr: 185.222.222.222@853#dns.sb
> forward-addr: 185.184.222.222@853#dns.sb

Answer below.

> Makes it sense to keep:
> 
> server:
> tls-upstream: yes
> tls-cert-bundle: /etc/ssl/certs/ca-certificates.crt

On that: yes.

On the former question, er, I'm actually a bit non-plussed about why
those forwarder lines are in your configuration file in the first place.

Forgive me, but it's rather late at night in my time zone, and I am not
at peak alertness, _but_ my guess is that Unbound got set up somehow 
configured to forward outbound recursive queries to those entities,
leaving me perplexed about why anyone would do that.

That having been said, I personally would definitely _not_ want to have
that configuration detail in my recursive nameserver state, without an
extremely compelling reason, because doing that appears to largely
defeat the entire purpose of running one's own recursive nameserver.
Analogously, it would be like setting up a fully capable SMTP smarthost 
on a stable public IP address with free routing to 25/tcp anywhere in
the world, but then configuring it to forward all outbound SMTP traffic
to an untrustworthy ISP external mail host.  Which would lead one to
wonder, why?

I hope that helps.  I have no idea what else you might have in your
configuration that ought not to be there, obviously.


> I ask because after reading the thread I've tried on one
> of my home's net dns servers and it worked (I could browse the web)
> but browsing speed was noticeably slower, does it improve
> in the long run or do we have to choose between 
> privacy and speed?

I'm seriously not sure why operating a local recursive nameserver would
be expected to reduce speed.  Obviously, at initial startup of that
process, it has nothing yet in cache and needs to do some queries of
often-used FQDNS, but I would expect that it would very quickly improve
DNS performance over _any_ nameserver on the far side of your uplink, 
because obviously your speed of local DNS resolution is really fast
relative to your uplink, right?


___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] web conferencing software (was Re: Any interest in a Devuan Meetup in Colorado Springs or Denver?)

2021-03-09 Thread Rick Moen
Quoting Gabe Stanton via Dng (dng@lists.dyne.org):

> In the absence of a "community of dns server operators and users", is
> the optimal option to have everyone run their own recursive server? But
> then the upstream servers still get the birds-eye view and will very
> likely abuse that information like the big companies do now. 

Please pardon my being blunt, but I don't think you have a realistic
understanding of how typical patterns of authoritative nameservice data
and caching work.  I rather suspect you haven't stopped to think about
that.

Let's say I run a local recursive DNS nameserver on my local LAN for use
by my and all other local hosts.  For the sake of discussion, let us
assume that it has what is misleadingly called an 'ICANN' root hints
file.

At service startup time, the instance starts getting and caching TLD,
SLD, etc. authoritative data and caching it for the duration of TTLs.  
Right, now, kindly tell me where on the planet is the network node that
provides a "birds-eye view" of query traffic processed by my recursive
server?  The root nameservers?  Nope, not hardly.  All they have is the
hits where my nameserver followed the RD-bit-marked queries to find
various TLD nameservers.  TLD zones' nameservers?  Nope, not hardly.  
They have only analogous logfile data when my nameserver first located
and then cached information about SLD nameservers.

In fact, the very fact that I am operating a recursive nameserver means
that I have greatly impoverished every possible spying vantage point.
The best of the bad choices in places to spy on my network's port-53 
activity is thus right on the far side of my network uplink, at my local
bandwidth provider.  And, even there, because of pervasive caching, even 
my uplink has extremely poor data about what the machines on my local
LAN are looking up.

Ideally, one has a contractual relationship with a reputable good
provider who looks after customer interests in accordance to local
business practices and law, such as (to cite the USA local legal
concept) the implied covenant of good faith and fair dealing.  However, 
that contract concept is (naturally) not a shield for privacy but rather
a cudgel to wield in civil litigation, so the best thing to do is to
limit what your immediate uplink can learn about your network traffic.
Various crypto schemes help limit that data, but -- my point -- so does 
operating a local recursive nameserver, rather than outsourcing to
-anyone- on the other side of the uplink.

___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] web conferencing software (was Re: Any interest in a Devuan Meetup in Colorado Springs or Denver?)

2021-03-09 Thread Rick Moen
Quoting wirelessduck--- via Dng (dng@lists.dyne.org):

> What’s the consensus on Quad9? Are they any better from a privacy
> standpoint?

To say again, why outsource recursive nameservice to _anyone_?

You seem like a large number of people who are weirdly resistant to 
the notion of basic control of one's own fundamental network
infrastructure and looking for some stranger to outsource the task to,
and I keep wondering why the obvious alternative of running a recursive
DNS nameserver instance locally isn't even considered, let alone the
obvious default choice.

But hey, whatever works for you.

___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] web conferencing software (was Re: Any interest in a Devuan Meetup in Colorado Springs or Denver?)

2021-03-09 Thread Rick Moen
Quoting Dimitris via Dng (dng@lists.dyne.org):

> so, i would be interested to know, if there's a privacy issue with
> opennnic?

I have no problem with people who decide to adopt alternate roots.

What I was talking about upthread was outsourcing one's recursive
nameservice to OpenNIC's public recursive nameserver IPs, or any other
stranger's.  Because, well, why?  Recursive service is dead-easy to do
with one's local computing resources, protecting one's autonomy,
security, performance, and privacy just that tiny bit more.


___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] I kinda sorta got opennic DNS working

2021-03-09 Thread Rick Moen
Quoting Steve Litt (sl...@troubleshooters.com):

> When I added four opennic root servers to my unbound's root.hints

{laughs}

Oh, you sweet summer child.  Experimenting with alternative DNS roots,
eh?

It's been decades since I've done so, but ISTR that the correct way to
do that is to re-point the root-hints line in your Unbound conf file
to opennic.cache.

> I'd really like to have both icann and opennic root servers in my
> root.hints.

No, you don't.

opennic.cache should include the standard TLD nameservers.

___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Any interest in a Devuan Meetup in Colorado Springs or Denver? (was "GNUPGP Web of trust")

2021-03-07 Thread Rick Moen
Quoting Steve Litt (sl...@troubleshooters.com):

> AND the tech chops to set it up.

I provided a simple copy/paste recipe.  My friend Michael Paoli even
scripted the entire process:  http://www.mpaoli.net/~michael/tmp/2jitsi
And just following the official instructions isn't actually difficult,
either.

"Tech chops" my great aunt.  Don't be such a technopeasant.

___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] web conferencing software (was Re: Any interest in a Devuan Meetup in Colorado Springs or Denver?)

2021-03-07 Thread Rick Moen
Quoting Steve Litt (sl...@troubleshooters.com):

> If I had demanded of myself to change the root cause instead of
> coathangering the symptom, I'd have needed to go to the Void Linux
> developers and ask them to find a way to accommodate DNS, in a
> travelling situation, without changing /etc/resolv.conf. 

[acknowledging your point, posted separately, that Void Linux devs could
doubtless cite some way to do so, if you asked them.]

> What I was trying to say was that if I wanted to change the *design* of
> the system, I'd have to petition the Void Linux packagers and the (urk)
> Freedesktop.org "upstream".
[...]
> I violently disagree with the design decision of having the likes of
> wicd or NetworkManager modify my /etc/resolv.conf, at least on a
> non-portable desktop. Even on a laptop, today you can DNS from 8.8.8.8
> and 8.8.4.4 anywhere you go, so there's no need to use the local ISP's
> suggested DNS servers. 

(I'll get to the 'no need' statement further down.)

I doubt you _truly_ aimed at a system redesign to the effect that
"Nothing shall be allowed to touch /etc/resolv.conf except me doing 
'chattr -i /etc/resolv.conf; vi /etc/resolv.conf; chattr +i /etc/resolv.conf'."
Because there are legitimate reasons to do otherwise.


TCP/IP-networked systems fall into two broad classes, those that are
DHCP clients and those statically IPed.

Statically IPed systems are the easy case,  I cannot presently think of
any system software sysadmins are tempted to run that would want to
alter /etc/resolv.conf .  That leaves DHCP clients.

There are three DHCP client implementations I'm aware of for Linux.
My Resolvconf page (link posted earlier) explains how to control what
each does to the nameserver line(s) in /etc/resolv.conf .  So, I've
documented how to override and control (if desired) those system utilities'
mucking about.  Likewise, My page details how to do likewise with either
of the two competing Resolvconf implementations (which is why the page
has that name).

That leaves 'network managers' like GNOME NetworkManager, wicd, and all
that lot.  wicd appears to invoke Resolvconf to manage /etc/resolv.conf,
so see above.  

GNOME NetworkManager keeps its grubby paws off /etc/resolv.conf if that
file's a symlink (including but not limited to use of Resolvconf, which 
like wicd, GNOME NetworkManager relies on).  So, do that.  _Or_, create
/etc/NetworkManager/conf.d/90-dns-none.conf containing 

[main]
dns=none

...and restarted the damned GNOME NetworkManager thing.


Theoretically, I could research and document how to do likewise for
every goshdarned ill-advised tool that occasionally mucks with the
nameserver line in /etc/resolv.conf -- systemd-resolvd, netctl, an
endless variety of crummy little utilities.  I won't, because (1)
there's no end to that, but -- more to the point -- (2) people who
run crummy little utilities like that need to understand the basics of
how they work.

Or, here's an idea:  Don't have them.

I have a standard joke about the "Facebook remedy".  People ask me how I
solve Facebook problems, and my cheery answer is "Simple!  No Facebook;
no Facebook problems!"  

I've not needed those crummy little network-administrative utilities.
If I adopted one, I'd take the trouble to research its basics, including
how to _properly_ instruct it to keep its grubby little paws off the
nameserver line in /etc/resolv.conf .

And, by the way, sadly, no you are incorrect that "you can DNS from
8.8.8.8 and 8.8.4.4 anywhere you go":

Leaving aside my being disappointed about people willingly outsourcing
their recursive DNS to the second-nosiest company on the planet[1]
instead of just running a local recursive nameserver, sorry, you'll find
that such a setup breaks when negotiating a "captive portal" on, e.g.,
most hotel and motel WiFi, where crummy artificial DNS on the WAP
redirects any initial HTTP query to the portal Web site, where you prove
that you're an authorised user before they give your client routing to
outside the service network.  Overriding that nameserver instruction
means you won't see the login Web page, so you won't be able to prove
you're a customer, so you won't get a usable connection.

The above is a vexing problem for travelers w/laptops who prefer to
specify their own choice of nameserver and still use hotel/motel WiFi
(and wired ethernet, actually).  Best case, you have to disable your
nameserver IP override long enough to navigate the captive portal, and
then can put the override back.  But, no, you cannot just leave your
choice of nameserver IPs in place (without disappointment).


[1] Nor is it any better to outsource to OpenNIC, Cisco Umbrella,
Comodo, Yandex, UncensoredDNS, etc.  Here's an idea:  How about 
not outsourcing recursive DNS to anyone?  It's not like it's 
even difficult.  We've had this conversation before.


___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Any interest in a Devuan Meetup in Colorado Springs or Denver? (was "GNUPGP Web of trust")

2021-03-07 Thread Rick Moen
Quoting Hendrik Boom (hend...@topoi.pooq.com):
> On Fri, Mar 05, 2021 at 11:36:57AM -0800, Rick Moen wrote:

> > More to the point, Jitsi Meet (reminder: that's its correct name) 
> > is open source (Apache License 2.0).  All it takes to run is a computer
> > with adequate RAM and a public IP address.
> 
> AND enough network bandwidth.

But less than you might think.  Locally, one LUG leader stands up a
Jitsi Meet instance occasionally for LUG use in a modest Qemu/KVM
virtual machine on a laptop that's on his residential ADSLv1.

When I was configuring the instance on Amazon EC2 for the New Zealand
Worldcon (Aug. 2020), I took a number of precautions against excessive
bandwidth draw, including setting the default to outbound video = off 
for people joining conferences.  That having been said, my main worry
was pegging RAM or CPU on the Jitsi Videobridge 2 component, that routes
all the video whizzing back and forth.  As it turned out, RAM & CPU
usage as recorded on Zabbix remained quite low.

I'll also mention that each connected user's video link automatically 
will step down resolution/framerate to reflect how much bandwidth is
available.

___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] web conferencing software (was Re: Any interest in a Devuan Meetup in Colorado Springs or Denver?)

2021-03-06 Thread Rick Moen
I wrote:

> Setting /etc/resolv.conf immutable, the classic case that was the first
> I saw you fall in love with, is a case in point.  There are multiple
> ways to ensure that a DHCP client respects and enforces your preference
> of recursive nameserver, averting the need for breaking system
> administration tools using the immutable bit.

Forgot to add:  Have documented.
http://linuxmafia.com/kb/Network_Other/resolvconf.html
(scroll to '3. Tweaking Your DHCP Client's Operation without Resolvconf')

___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] web conferencing software (was Re: Any interest in a Devuan Meetup in Colorado Springs or Denver?)

2021-03-06 Thread Rick Moen
Quoting Steve Litt (sl...@troubleshooters.com):

> My philosophy: One big hammer prevents a 100 step packaging system
> raindance.

The Big Hammer always seems a great idea for a temporary solution.  
And I assume you know what the catch is with those.

Every single time I've nailed down a sysadmin annoyance using the Big
Hammer, it's come back to haunt me later -- and, moreover, it turned out
that a further ten minutes of digging would have found a better solution
that didn't cripple the system's administrative framework but would,
instead, have worked with the framework.

Setting /etc/resolv.conf immutable, the classic case that was the first
I saw you fall in love with, is a case in point.  There are multiple
ways to ensure that a DHCP client respects and enforces your preference
of recursive nameserver, averting the need for breaking system
administration tools using the immutable bit.

It has been ever thus.

-- 
Cheers,HULK LIKE TO REMIND EVERYONE THAT "FEWER" MEAN YOU CAN COUNT IT, 
Rick Moen  "LESS" MEAN MUST BE MEASURED.  FEWER MISTAKES MEAN LESS SMASH! 
r...@linuxmafia.com  -- @EditorHulk
McQ! (4x80)
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] web conferencing software (was Re: Any interest in a Devuan Meetup in Colorado Springs or Denver?)

2021-03-06 Thread Rick Moen
Quoting Steve Litt (sl...@troubleshooters.com):
> >On Fri,  5 Mar 2021 22:01:33 +0100 (CET) k...@aspodata.se wrote:
>
> >I /had/ Jitsi Meet running (w/o local turn server and jigasi) on a
> >Odroid XU-4 with 2GB RAM. Tested with up to four participants and
> >running quite well. Downside: The reserved memory of the videobridge is
> >configured under /usr/share/ and thus is not update-proof.
> 
> chattr +i whatever_file

Beware this seductive lure towards wielding the Big Hammer, O
Grasshopper.  Dark is that path's attraction to any junior sysadmin, for
ultimately it leads to the Way of Hemsworth and to Cheesy Dialogue.

-- 
Cheers,My pid is Inigo Montoya.  You kill -9
Rick Moen  my parent process.  Prepare to vi.
r...@linuxmafia.com
McQ!  (4x80)
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Any interest in a Devuan Meetup in Colorado Springs or Denver? (was "GNUPGP Web of trust")

2021-03-05 Thread Rick Moen
I wrote:

> Gentle reminder:  The correcct name of this A/V conferencing server
> software is Jitsi Meet.  The Jitsi Project has published several pieces
> of software; Jitsi Meet is the best known among them.


Jitsi Project codebases so far:

o  Jitsi Desktop aka 'Jitsi' aka 'the SIP Communicator':  a VoIP and
   instant messaging application.  This was the first project, and 
   is now deemed mature and community-maintained.

o  Jitsi Meet:  videoconferencing server suite leveraging IETF's 
   WebRTC protocol suite.  Components include:

o  Jitsi Videobridge2:  media server engine, specifically a
   WebRTC-compatible video router or 'SFU' (Selective Forwarding Unit).  
   Jitsi Meet always includes at least one of these.

o  jicofo (JItsi COnference FOcus):  "focus" component required to run
   Jitsi Meet conferences.

o  Jigasi:  Optional SIP telephony gateway for Jitsi Videobridge2.

o  Jibri:  broadcaster and recorder used for saving video call
   recordings and streaming to YouTube Live

o  Jidesha:  Chrome/Chomium and Firefox extension for calendar
   integration (formerly also did screensharing).

o  jitsi-meet-electron: Bespoke desktop client for Jitsi Meet, built
   atop the Electron engine.

o  jitsi-meet-electron-utils:  what it says on the tin

o  lib-jitsi-meet:  Low-level JavaScript API for providing a customized
   UI for Jitsi Meet.

o  docker-jitsi-meet:  necessary tools to run a Jitsi Meet stack on
   Docker using Docker Compose.

o  jitsi-slack:   Slack chat/direct messaging integration to enable 
   starting video conferences from Slack and easily inviting Slack 
   members to conferences.

There are _lots more_, but those are the major ones.

Point is, the term "Jitsi" is ambiguous, and is not the correct name for
Jitsi Meet, at all.

___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Jitsi advice please

2021-03-05 Thread Rick Moen
Quoting g4sra via Dng (dng@lists.dyne.org):

> My biggest beef with Microsoft Teams, Zoom, and now Jitsi-meetthey
> all omitted an essential service.  What I want is (looking at you Rick
> :P) a test sever which simply echo's back the incoming video\audio to
> the client.

As mentioned, the straightforward way to do this is using two browser
tabs, each logged into the same video session, and verifying that you
can see and hear yourself.

However, the reason I'm posting is to provide tips about a testing site
that vets your browser's ability to fully perform the WebRTC
videoconferencing protocol suite:  https://test.webrtc.org/  My tip:
Don't be alarmed at yellow (warning) advisories like a failure of the 
"Reflexive connectivity" network test.  I always get that result, at home, 
with detailed reporting as follows:

[ INFO ] Gathered candidate of Type: srflx Protocol: udp Address: 96.95.217.102
[ WARN ] Could not connect using reflexive candidates, likely due to the
network environment/configuration.

Point is, above and similar appear to be harmless.  (Web-search the
detailed warning, if concerned.)


However, for a functional test, there's nothing better than the
two-tabs method.


A more-general tip:  _Please_ consider using earbuds or headphones for all 
Internet videoconferencing.  I can't tell you how much time gets wasted
on Jitsi Meet, Zoom, etc. sessions trying to figure out which
participant is locally re-injecting audio echoed from his/her PC
speakers to his/her nearby microphone.  It's a huge waste of time.  And,
as one of the participants using earbuds, I can at least say 'Not it',
every time that happens.

___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] web conferencing software (was Re: Any interest in a Devuan Meetup in Colorado Springs or Denver?)

2021-03-05 Thread Rick Moen
Quoting k...@aspodata.se (k...@aspodata.se):

> https://en.wikipedia.org/wiki/Comparison_of_web_conferencing_software
>  lists four open source systems:
> 
> https://en.wikipedia.org/wiki/Jitsi
> https://en.wikipedia.org/wiki/Jami_(software)
> https://en.wikipedia.org/wiki/OpenMeetings
> https://en.wikipedia.org/wiki/BigBlueButton

Thank you, sir.

> Anyone knows which one to choose for a smallish group (< 20 persons) ?

Logically, the only people truly qualified to answer your question 
would be people who've setup/administered at least a large subset of the
above four, or who are in close contact with someone who has.  I'm not
such a person;  I've set up, administered, and used Jitsi Meet (only) --
and I've been a user of BigBlueButton instances used by Linux Users of
Victoria (Aus.) and by Arizona Ubuntu LoCo.  It would be wonderful if a
qualified person is on this mailing list and can answer.

Until then, I can only say that Jitsi Meet struck me as quite practical
for a smallish group.  The server software grabs gobs of RAM (judged by
my old-school sysadmin standards), but that outcome is to be expected
because it's Java.

FWIW, I note that Jami does voice (SIP) and instant messaging, but not
videoconferencing.  The other three are generally similar WebRTC-based
systems.

___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Any interest in a Devuan Meetup in Colorado Springs or Denver? (was "GNUPGP Web of trust")

2021-03-05 Thread Rick Moen
Quoting Steve Litt (sl...@troubleshooters.com):

> So while a home-grown installation is all of our goal, until then,
> anything on meet.jit.si works pretty darn well, as long as your browser
> is Chromium if you're on Linux.

Looks like Jitsi Meet's supported browsers list has moved to
https://jitsi.github.io/handbook/docs/user-guide/supported-browsers and
been updated (2021-03-05, i.e., today).  

Firefox and Safari (versions unstated; recent isimplied) are now on the
supported browsers list, as are in general mobile-device Web browsers --
the main problem case remaining being Web browsers for iOS, which was
not possible before iOS 14.3 as the OS did not allow WebRTC, (Jitsi
Project say they are now checking out such browsers now that OS support
is there.)

That supported browsers list of course implies a server running a recent
release of Jitsi Meet.  Obviously meet.jit.si does; third-party servers 
might or might not.

Alternative client options include bespoke Jitsi Meet clients for iOS
and Android and the Electron-based bespoke desktop Jitsi Meet client.

___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Jitsi advice please

2021-03-05 Thread Rick Moen
Quoting Hendrik Boom (hend...@topoi.pooq.com):

> Technically, it's not Chrome.  I use Chromium for jitsi, zoom, Discord, 
> and Gathertown.

I'm more than a little fond of ungoogled-chromium, for such purposes.
https://github.com/Eloston/ungoogled-chromium
https://ungoogled-software.github.io/ungoogled-chromium-binaries/
https://github.com/ungoogled-software/ungoogled-chromium-debian

-- 
Cheers, And we all know the saying, which is true as well as witty,
Rick Moen   that a camel is a horse that was designed by a committee.  
r...@linuxmafia.com-- Allan Sherman, "Peter and the Commissar"
McQ! (4x80)
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Any interest in a Devuan Meetup in Colorado Springs or Denver? (was "GNUPGP Web of trust")

2021-03-05 Thread Rick Moen
Quoting Steve Litt (sl...@troubleshooters.com):

> The benefit of this list is if meet.jit.si ever dies during a meeting
> or classroom, there can be a predefined list of alternate URLs to go
> to. This makes Jitsi a much safer choice than I thought it was.

More to the point, Jitsi Meet (reminder: that's its correct name) 
is open source (Apache License 2.0).  All it takes to run is a computer
with adequate RAM and a public IP address.

BigBlueButton also has many adherents, and is generally similar
(including relying on WebRTC and being open source, LGPL).

-- 
Cheers, "2021 showed up, and told 2020 'hold my beer.'"
Rick Moen   -- @justinaireland
r...@linuxmafia.com
McQ! (4x80)
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Any interest in a Devuan Meetup in Colorado Springs or Denver? (was "GNUPGP Web of trust")

2021-03-05 Thread Rick Moen
Quoting Dimitris via Dng (dng@lists.dyne.org):

> a list of jitsi instances :
> https://framatalk.org/accueil/en/info

Ah, thank you (ευχαριστώ).  I've been trying to re-find that.

Gentle reminder:  The correcct name of this A/V conferencing server
software is Jitsi Meet.  The Jitsi Project has published several pieces
of software; Jitsi Meet is the best known among them.

___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Jitsi advice please

2021-03-05 Thread Rick Moen
Quoting goli...@devuan.org (goli...@devuan.org):

> I use vivaldi for jitsi (but nothing else).  It just works.

The proprietary Vivaldi browser is a good choice (other than being
proprietary) _because_ it is based on Chromium's Blink rendering engine,
hence has good WebRTC support and a decent Javascript engine.

Additionally, you get to use a software product coded by Norwegians,
which is always a plus.  (Vivaldi Technologies, ASA is an Oslo
company, and these are ex-Opera Software guys.)

___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Jitsi advice please

2021-03-05 Thread Rick Moen
Quoting Steve Litt (sl...@troubleshooters.com):
> >On 05/03 10:23, g4sra via Dng wrote:
> >> 
> >> Can anyone recommend a browser (other than Chrome) that they know
> >> works with Jitsi-meet ? Any other suggestions to fix the audio ?  
> >
> >If you use headphones you can open two tabs to the same meeting and
> >talk to yourself.
> 
> My psychiatrist told me to stop doing that. 
> 
> At least, in public.

Rumour has it that it's harmless to talk to yourself, as long as you
don't _listen_.

-- 
Cheers,  "Like looking both ways before crossing the street, and 
Rick Moenthen getting hit by a submarine."  -- Clarke Smith, age 9, 
r...@linuxmafia.com  winner of Washington Post's contest for best description
McQ! (4x80)  of the year 2020 in a single word or phrase.
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Any interest in a Devuan Meetup in Colorado Springs or Denver? (was "GNUPGP Web of trust")

2021-03-05 Thread Rick Moen
Quoting Steve Litt (sl...@troubleshooters.com):

> >In case anyone's interested in an extended and only semi-temperate rant
> >on this theme:
> >http://linuxmafia.com/faq/Essays/meetup.html
> 
> I love your essay, but you were much too kind to meetup.com.

;->   I'll work on that.

___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Any interest in a Devuan Meetup in Colorado Springs or Denver? (was "GNUPGP Web of trust")

2021-03-05 Thread Rick Moen
Quoting o1bigtenor via Dng (dng@lists.dyne.org):

> Asking to confirm - - - - so Firefox won't work?

Some folks have no problems with particular Firefox versions (talking to
Jitsi Meet), but it's not officially recommended as per
https://github.com/jitsi/jitsi-meet/wiki/Browser-support .[1]

tl;dr:  Jitsi Meet relies on browser support for WebRTC (the IETF
videoconferencing protocol suite) and some Javascript.  Reportedly, the
best WebRTC report is in Chromium and browsers that are based on its
Blink rendering engine.  E.g.:

  o  Chromium
  o  Google Chrome
  o  Microsoft Edge v. 79.0.309 or later
  o  Brave Browswer
  o  Opera Browser v 15 or later

Firefox, some others probably work if recent, but not guaranteed.

_Or_, use one of the bespoke Jitsi Meet clients, instead of a browser.



Longer version:
Generically, Web browsers and _versions_ of Web browsers that have good
WebRTC support (and a good Javascript engine) should do well.  Which is
why Chromium/Blink and derivatives are a good choie.  Problems with other 
browser types/versions including high load are sometimes reported.

The Jitsi project also has mobile clients (open source) plus
an odd desktop client that can, if wished, be used instead of a Web
browser.  My notes:

o Jitsi Meet Client (28MB APK) for Android  5.0 or newer, published via F-Droid:
  https://f-droid.org/en/packages/org.jitsi.meet/

o Jitsi Meet Client for Android, published on Google Play Store
  https://play.google.com/store/apps/details?id=org.jitsi.meet

o Jitsi Meet Client for iOS, published on Apple iTunes Store
  https://itunes.apple.com/us/app/jitsi-meet/id1165103905

o Jitsi Meet Electron client (86MB binary: Linux x86_64, MacOS, MS-WIndows),
  desktop client crafted as a special-purpose single application file
  using the Electron Javascript engine, which in turn is constructed from
  the Chromium Web browser and the Node.js runtime Javascript environment.
  https://github.com/jitsi/jitsi-meet-electron/releases


[1] Browser support is a moving target.  That page currently reflects
status as of May 3, 2020, and may be unmaintained.


___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Any interest in a Devuan Meetup in Colorado Springs or Denver? (was "GNUPGP Web of trust")

2021-03-05 Thread Rick Moen
Quoting o1bigtenor (o1bigte...@gmail.com):

> > Care to try reframing the question?
> 
> Quoting:
> Before any asks:  No, I didn't do that on Devuan because I was in a
> huge hurry and had a known-good Amazon EC2 AMI of Debian 10 at my
> disposal.  I expect that my setup instructions will work just great on
> Devuan.
> 
> above implies that that list of instructions might be available.
> 
> I was asking for said list.

URL was in my initial posting.  Once again, then:
http://linuxmafia.com/~rick/jitsi.txt
I hope it proves useful to you.

-- 
Cheers, "2021 showed up, and told 2020 'hold my beer.'"
Rick Moen   -- @justinaireland
r...@linuxmafia.com
McQ! (4x80)
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Any interest in a Devuan Meetup in Colorado Springs or Denver? (was "GNUPGP Web of trust")

2021-03-04 Thread Rick Moen
Quoting o1bigtenor (o1bigte...@gmail.com):

> I, for one,   p l e a s e ? (!?!)

{sigh}  

Care to try reframing the question?

___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Any interest in a Devuan Meetup in Colorado Springs or Denver? (was "GNUPGP Web of trust")

2021-03-04 Thread Rick Moen
Quoting Gabe Stanton via Dng (dng@lists.dyne.org):

> This is incentive for me to take another crack at getting a jitsi
> instance running. It will probably take me a couple months to get one
> working since time is limited and there are many things higher on the
> priorities list, but I'll work on that and get back to the list when I
> have that running.

Here are my (raw, and I stress, _raw_) notes from setting up Jitsi Meet
(on Amazon EC2, on Debian 10) in a tearing hurry for the 2020 World
Science Fiction Convention (the '2020 Worldcon'), which was forced by
the exploding pandemic to suddenly convert itself into a virtual event,
instead of being in Wellington, NZ:
http://linuxmafia.com/~rick/jitsi.txt

Here's the 2020 Worldcon's (CoNZealand's) Web site.
https://conzealand.nz/

The Worldcon is an all-volunteer-run, all-volunteer-staffed literary
science fiction convention held annually somewhere on planet Earth
(so far ;-> ).  Usual attendance is about 3000 people who fly in from
everywhere.  A big Worldcon, like London's in 2014, is about 8000
in-person attendees.

My instance of Jitsi Meet had no performance problems whatsoever for the 
usage CoNZealand made -- though I was prepared to spin up more instances
of Jitsi Videobridge2 if necessary to share the load.  Honestly, once I
stopped making a couple of dumb mistakes in site configuration
(preserved in my raw notes), it was pretty darned easy to configure.

There are sundry site-admin customisations that can be done, which I
didn't fully cover in my notes, but aren't that hard to find, and I
might even be able to refresh my memory about those if you need to ask.

As you might gather from my notes, I got directives from above that
changed during the project about whether to try to shim in an oauth2
authentication layer (non-default) and then whether or not to configure 
an operating mode where only a list of people (staff) with prearranged
admin credentials were permitted to create Jitsi Meet rooms.  The 
eventual deployment did not include the latter security controls --
making it work pretty much like meet.jit.si .  However, those security
controls weren't difficult to do if desired.


Before any asks:  No, I didn't do that on Devuan because I was in a
huge hurry and had a known-good Amazon EC2 AMI of Debian 10 at my
disposal.  I expect that my setup instructions will work just great on
Devuan.

___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Any interest in a Devuan Meetup in Colorado Springs or Denver? (was "GNUPGP Web of trust")

2021-03-04 Thread Rick Moen
Quoting Steve Litt (sl...@troubleshooters.com):

> From my point of view, meetup.com has inserted itself into LUG
> operations as an unneeded middle man for LUGs without an effective
> publicity officer.

In case anyone's interested in an extended and only semi-temperate rant
on this theme:
http://linuxmafia.com/faq/Essays/meetup.html

-- 
Cheers,My pid is Inigo Montoya.  You kill -9    
Rick Moen  my parent process.  Prepare to vi.
r...@linuxmafia.com
McQ!  (4x80)
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] My Qemu LAN-peer documentation is now in its first draft

2021-03-03 Thread Rick Moen
Quoting Steve Litt (sl...@troubleshooters.com):

> As you know, I was asking many Qemu LAN-peer questions on this list a
> week ago. My documentation on the subject has finally achieved
> first-draft status. If you'd like to see it, go to:
> 
> http://troubleshooters.com/linux/qemu/nobs.htm

This is a very nice piece of work, Steve, and will be endlessly useful.
Thank you.

-- 
Cheers,My pid is Inigo Montoya.  You kill -9
Rick Moen  my parent process.  Prepare to vi.
r...@linuxmafia.com
McQ!  (4x80)
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


[DNG] OT: Lewis Carroll (was: My Qemu LAN-peer documentation is now in its first draft)

2021-03-03 Thread Rick Moen
Quoting Ralph Ronnquist via Dng (dng@lists.dyne.org):

> I think Lewis Carroll had a stab at this issue as well in "Through The
> Looking Glass" where the name of the Black Knight was called
> something... or how it was.

The White Knight, but yes, exactly -- Carroll playing with what we now
call the "use-mention distinction".


  ‘You are sad,’ the Knight said in an anxious tone: ‘let me sing you a
  song to comfort you.’

  ‘Is it very long?’ Alice asked, for she had heard a good deal of poetry
  that day.

  ‘It’s long,’ said the Knight, ‘but very, VERY beautiful. Everybody that
  hears me sing it--either it brings the TEARS into their eyes, or else--’

  ‘Or else what?’ said Alice, for the Knight had made a sudden pause.

  ‘Or else it doesn’t, you know. The name of the song is called “HADDOCKS’
  EYES.”’

  ‘Oh, that’s the name of the song, is it?’ Alice said, trying to feel
  interested.

  ‘No, you don’t understand,’ the Knight said, looking a little vexed.
  ‘That’s what the name is CALLED. The name really IS “THE AGED AGED
  MAN.”’

  ‘Then I ought to have said “That’s what the SONG is called”?’ Alice
  corrected herself.

  ‘No, you oughtn’t: that’s quite another thing! The SONG is called “WAYS
  AND MEANS”: but that’s only what it’s CALLED, you know!’

  ‘Well, what IS the song, then?’ said Alice, who was by this time
  completely bewildered.

  ‘I was coming to that,’ the Knight said. ‘The song really IS “A-SITTING
  ON A GATE”: and the tune’s my own invention.’


The plot of the White Knight song (which he goes on to sing to Alice)
parodies Wordsworth's lyric poem "Resolution and Independence".

___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Netiquette

2021-03-03 Thread Rick Moen
Quoting g4sra via Dng (dng@lists.dyne.org):

> What is the netiquette on this list for changing subject lines.
> I hate hijacking threads but I also hate breaking them.
> Which is the lesser of the two evils ?

Standards-compliant mailers' threading doesn't get broken by altering
the Subject header.  (Last I heard, MS-Outlook still didn't follow 
the RFCs in that area, and thus gets adversely affected.  Probably, 
some other common mailers share that defect.)

In a standards-compliant mailer that relies on Message-IDs and the
In-Reply-To header to arrange threading, you will continue to see a
reply with changed Subject header sorted immediately below the
replied-to post within the conversation's tree of postings.

Therefore, changing Subject lines and breaking or not breaking threads
are (or, at least, should be) orthogonal concerns.  If you wish to
deliberately break threading in your reply, snip out the In-Reply-To
from your headers before posting.  If you don't wish to, then don't
do that.  Either way, changing or not changing the Subject header ought
to have zero effect on threading (except for MS-Outlook victims^W
users).

Since you're a GMail person, you _may_ find it to be non-trivial to assert
control over your SMTP headers, but I wish you good hunting, on that.
I'll be polite and not say how I prefer to cure GMail problems.  (It's
very similar to how I cure Facebook problems.)

Personally, I deliberately break the thread by snipping In-Reply-To (or
use mutt's new-message command, which amounts to the same thing) if the
new discussion will be semantically quite different from the old one.  
OTOH, if I'm just adjusting the Subject header to account for topic
drift, I don't break threading because I regard it as part of the
ongoing conversation.

___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] How to firewall on Devuan?

2021-02-24 Thread Rick Moen
Quoting Patrick Bartek via Dng (dng@lists.dyne.org):

> I've been using ufw for years.  It's a commandline front-end for
> iptables. There's also a GUI for it, too. 

For people's convencience, that would be gufw, a somewhat GNOME-ish
Python/GTK thingie.  https://github.com/costales/gufw

-- 
Cheers,   This limerick goes in reverse. If you start from the bottom-most verse
Rick Moen Unless I'm remiss, This limerick's not any worse.
rick@linu The neat thing is this:-- Zach Weiner
xmafia.com   McQ! (4x80)
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Synaptics Touchpad Fn+F9

2021-02-08 Thread Rick Moen
Quoting Steve Litt (sl...@troubleshooters.com):
> On Sat, 6 Feb 2021 22:40:36 +0100
> Florian Zieboll via Dng  wrote:

> > libre Grüße,
> 
> And don't bring me down Bruce!
> 
> If you don't get the reference, that's OK, you need to be over 60 to
> get it.

I skipped that decade's pop music -- but, for the (33 1/3 rpm
long-playing vinyl album-rock) record:
https://ultimateclassicrock.com/electric-light-orchestra-dont-bring-me-down-bruce/

-- 
Cheers, "2021 showed up, and told 2020 'hold my beer.'"
Rick Moen   -- @justinaireland
r...@linuxmafia.com
McQ! (4x80)
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Synaptics Touchpad Fn+F9

2021-02-05 Thread Rick Moen
Quoting Steve Litt (sl...@troubleshooters.com):

> > as you replied off-list and I don't know of any better way, I bring
> > the issue back to the list: Perhaps someone has a hint on resetting
> > the device, if you'd reveal its make and model?
> > 
> > Another idea out of thin air: Did you remove the CMOS battery - or
> > does the notebook provide a button (or pins) to reset the bios
> > password?
> > 
> > libre Grüße,
> > Florian
> > 
> 
> The following shellscript, called touchtoggle.sh, should do what you
> need.
> 
> ==
> #!/bin/sh
> 
> # touchtoggle.sh Copyright (C) 2019 by Steve Litt
> # All rights reserved.
> # Licensed via the 
> # Expat license: https://directory.fsf.org/wiki/License:Expat
[...]

It's a useful script, and thanks -- but I suggest you immediately
add a second line below that 'Licensed via the Expat license' one:

# Expat license's requirement to include permission notice text is waived.

Otherwise, anyone seeking to redistribute your script is committing the
tort of copyright violation unless he/she provides with it a copy of 
the ~20 lines of Expat License text.  I'm pretty sure you were not
meaning to impose such a legal obligation on redistributors.


BTW, it's some weird FSF fetish to refer to it as "Expat License".
Everyone else on planet Earth (including OSI:
https://opensource.org/licenses/MIT) refers to it as MIT License.

To be tiresomely pedantic, what you used is the commendably minimalist
form of MIT's licence that it issued for the Expat graphics library.  
MIT's slightly longer wording issued attached to the X Consortium
software and used (e.g.) for X.org code to this day differs only in
having a sentence prohibiting users from mentioning X Consortium in
advertising or promotion without written permission, and one stating
that "X Window System" is a trademark of X Consortium, Inc.  There is no
_functional_ difference.


___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Need install Devuan Beowolf but got "initramfs" prompt

2021-02-03 Thread Rick Moen
Quoting Steve Litt (sl...@troubleshooters.com):

> It *does* list a co-author. Funny thing is, the co-author's name seems
> kinda familiar, and I'm wondering where I heard his name before.

I think it's actually a franchise -- like Dread Pirate Roberts.

Westley:Well, Roberts had grown so rich, he wanted to retire.
So he took me to his cabin, and told me his secret.
"I am not the Dread Pirate Roberts", he said.  "My
name is Ryan.  I inherited the ship from the previous
Dread Pirate Roberts, just as you will inherit it
from me. The man I inherited it from was not the
real Dread Pirate Roberts either.  His name was
Cummerbund.  The real Roberts has been retired
fifteen years and living like a king in Patagonia."
Thank you.  Then he explained that the name was the
important thing for inspiring the necessary fear.
You see, no one would surrender to the Dread Pirate
Westley.  So we sailed ashore, took on an entirely
new crew, and he stayed aboard for a while as first
mate, all the time calling me Roberts.  Once the crew
believed, he left the ship, and I have been Roberts
ever since.

___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Need install Devuan Beowolf but got "initramfs" prompt

2021-02-01 Thread Rick Moen
Quoting Hendrik Boom (hend...@topoi.pooq.com):

> Someone did, as I expect you already know.  Here's Eric Stephen
> Raymond's version:
> 
> http://www.catb.org/~esr/faqs/smart-questions.html

All I can say is that Eric Steven Raymond's version would be _much_
better with a co-author credited right at the top of the essay who
is often hilariously forgotten in online mentions of the piece.  ;->

(Eric spells his middle name Steven, not Stephen.)

See if you can tell, reading the piece, which of its passages are in
Eric's writing style and which are in that other often-forgotten guy's
style.  The difference of authorial 'voice' seems night-and-day to me,
but -- horses for courses; à chacun son goût.

-- 
Cheers,   This limerick goes in reverse. If you start from the bottom-most verse
Rick Moen Unless I'm remiss, This limerick's not any worse.
rick@linu The neat thing is this:-- Zach Weiner
xmafia.com   McQ! (4x80)
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Need install Devuan Beowolf but got "initramfs" prompt

2021-02-01 Thread Rick Moen
Quoting Steve Litt (sl...@troubleshooters.com):

> I'm old, but I seem to remember a web page with a similar name. Years
> ago, I wrote those guys who run the web page, with my patented,
> always-succeeds method of getting an answer on a technical mailing
> list, and those guys didn't want to put my method on their page. They
> said my method was "manipulative".

Those guys?  They're total jerks.  You should definitely never trust
them; take my word for that.  

(One of them's a Scandinavian, and my Tante Bjorg warned me to never
trust _them_.)

> Because I have low self-esteem, I abandoned my method. Now, when I need
> email help, I always use the same subject line: "Computer doesn't work",
> and submit a 30KB or more file: Either an entire dmesg from the time it
> booted last year, or five complete source files in RAR format. To make
> sure I don't prejudice those who might help me, I never tell version
> numbers, or whether it's Linux, Windows, Mac or BSD. If it's a
> programming problem I never identify the language. I never say what I
> hope to accomplish, because it's their job to tell me what I want to
> accomplish. When I don't get answers, I send a whiny reminder every two
> hours. When all this doesn't work, I use a web search.

Your ideas are intriguing to me, and I wish to subscribe to your
newsletter.   https://www.youtube.com/watch?v=jXesMkAYh44

-- 
Cheers,   This limerick goes in reverse. If you start from the bottom-most verse
Rick Moen Unless I'm remiss, This limerick's not any worse.
rick@linu The neat thing is this:-- Zach Weiner
xmafia.com   McQ! (4x80)
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Need install Devuan Beowolf but got "initramfs" prompt

2021-02-01 Thread Rick Moen
Quoting Antony Stone (antony.st...@devuan.open.source.it):

> On Monday 01 February 2021 at 21:02:34, Rick Moen wrote:
> 
> > I think someone should write an online essay called something like 'How
> > to Ask Questions the Smart Way', to help such folks.
> 
> https://xkcd.com/927/

As the actual co-author of "How to Ask Questions the Smart Way", who
accordingly gets a tonne of irony-challenged e-mail from hopelessly
confused end-users with technical problems (who were pointed at our
essay, didn't read it, and imagined the authors are a universal
free-of-charge Internet helpdesk), sometimes I wish there _were_ 15
competing versions of our essay.

-- 
Cheers,   This limerick goes in reverse. If you start from the bottom-most verse
Rick Moen Unless I'm remiss, This limerick's not any worse.
rick@linu The neat thing is this:-- Zach Weiner
xmafia.com   McQ! (4x80)
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Need install Devuan Beowolf but got "initramfs" prompt

2021-02-01 Thread Rick Moen
Quoting Adrian Zaugg (devuan@mailgurgler.com):

> It is difficult to help, if you don't write what you exactly donwloaded,
> how you tried to install, on what system etc. It is somehow like: "I ate
> somethin' for dinner and now I have stomach ache. Please help me!!!" –
> what would you answer? Reading that on a mailing list you probably would
> just ignore such a person ...

I think someone should write an online essay called something like 'How
to Ask Questions the Smart Way', to help such folks.

-- 
Cheers,   This limerick goes in reverse. If you start from the bottom-most verse
Rick Moen Unless I'm remiss, This limerick's not any worse.
rick@linu The neat thing is this:-- Zach Weiner
xmafia.com   McQ! (4x80)
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] if2mac V0.3 init.d service for persistent network interface names

2021-01-13 Thread Rick Moen
Quoting tito via Dng (dng@lists.dyne.org):

> attached and inline you will find a improved and more robust version
> of if2mac initscript and a example configuration file.
[...]
> # if2mac v. 0.3 (C) 2020-2021 T.R.  GPLv2

For version 0.31, please consider a second line saying 
"Copyright owner waives the requirement to include a copy of GPLv2."

Otherwise, it is technically unlawful for others to redistribute your
short shell script _without_ including with it a copy of GPLv2's full 
licence text:  Recipients' right to redistribute or to make derivative
works hinges on their complying with that "include the licence test"
requirement, which obligation you'll find stated in GPLv2 clause 1 --
and I'm assuming that is not your intent.

-- 
Cheers, "2021 showed up, and told 2020 'hold my beer.'"
Rick Moen   -- @justinaireland
r...@linuxmafia.com
McQ! (4x80)
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Why X does keyboard and mouse.

2021-01-01 Thread Rick Moen
Quoting Hendrik Boom (hend...@topoi.pooq.com):

> My ancient experience with X was working on the team developing UIM/X in 
> the days before Linux.  I spent some time reading a manual caalled 
> something like IC (maybe ICCCM?) about communications between these 
> various network components, though I never had to do any coding directly 
> with that communication.

ICCCM (Inter-Client Communication Conventions Manual).
https://www.x.org/releases/X11R7.6/doc/xorg-docs/specs/ICCCM/icccm.html

   X deliberately specifies "mechanism, not policy" for how windows
   interact. As such, an additional specification beyond the X protocol
   itself was needed for client interoperation.

   The ICCCM specifies cut and paste buffers, window manager
   interaction, session management, how to manipulate shared resources and
   how to manage device colours. These low-level functions are generally
   implemented within widget toolkits or desktop environments. This
   isolates application programmers from working directly with the ICCCM
   itself, as this functionality is delegated to the implementing toolkit.

   The ICCCM is notorious for being ambiguous and difficult to correctly
   implement.  Furthermore, some parts are obsolete or no longer
   practical to implement.

   Efforts to update and clarify the ICCCM for current needs have resulted
   in the Extended Window Manager Hints (EWMH), which has gained fairly
   broad acceptance and continues to be extended as the need arises.

https://en.wikipedia.org/wiki/Inter-Client_Communication_Conventions_Manual

ICCCM came in for some memorable if passing derision in The UNIX-Hater's
Handbook.  http://www.art.net/~hopkins/Don/unix-haters/x-windows/disaster.html

-- 
Cheers,   "The plural of regex is regrets."
Rick Moen  -- old coder gag, seen on Reddit
r...@linuxmafia.com
McQ! (4x80)
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Finding installed packages, but from a backup

2020-12-31 Thread Rick Moen
Quoting Antony Stone (antony.st...@devuan.open.source.it):

> > this might be helpful :
> > https://unix.stackexchange.com/questions/161866
> 
> Hm, some lessons for naïve sysadmins in there :)

My _personal_ favourite part of that StackExchange page is where it says
there's a solution to that difficult and vexing problem in the
Linuxmafia.com Knowledgebase at
http://linuxmafia.com/faq/Debian/package-database-rebuild.html .  
(But probably that's just me.)

-- 
Cheers,  "Like looking both ways before crossing the street, and 
Rick Moenthen getting hit by a submarine."  -- Clarke Smith, age 9, 
r...@linuxmafia.com  winner of Washington Post's contest for best description
McQ! (4x80)  of the year 2020 in a single word or phrase.
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] double negative

2020-12-25 Thread Rick Moen
Quoting Didier Kryn (k...@in2p3.fr):

>     Just to remind, if you forgot it.
> 
>     There's one known case where double positive means negative: C++

   "Yeah, yeah."

(The gag may not travel well, so:  At least in some USA regions, 
the phrase "Yeah, yeah" is something of a dismissive phrase with 
meaning at least bordering on denial.)

___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Historical note on double negation.

2020-12-24 Thread Rick Moen
Quoting Ian Zimmerman (i...@very.loosely.org):

> But if "and" is a conjunction in this sentence pattern, the nouns or
> pronouns it joins together form the subject, and so they ought to be in
> the nominative, i.e. "John and I". 

Indeed.

I vaguely recall Hendrik suggesting that 'and' functioning as a
proposition makes 'John and me' a suitable subject for the sentence,
i.e., in the nominative case, which I thought a startling notion both
for the idea of 'and' being anything but a conjunction and for the
conclusion drawn.  I'd have to check the archive to see if I read that
entirely right -- but definitely the claim of 'and' being a preposition
was part of it.

Not that this is worth dwelling on, unless good for points of benevolent
entertainment.

___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Historical note on double negation.

2020-12-24 Thread Rick Moen
Quoting Hendrik Boom (hend...@topoi.pooq.com):

> I've been told that was the case in a long-gonne ancestor of modern
> English, possible Old English or the language of Beowulf.

It's not quite the same thing, but I am suddenly in a mind to provide a
link to a lovely piece by my acquaintance Poul Anderson, the
Danish-American science fiction author 'Uncleftish Beholding', in which
Poul briefly explains atomic theory in an alternate-universe English that
never received any Latin-derived vocabulary.

Here, my gift to thee and thee, for the Jul holiday (and let us remember
Poul and his wife Karen fondly):
https://msburkeenglish.files.wordpress.com/2010/04/uncleftish-beholding-aka-atomic-theory.pdf

(Watch out for that ymirstuff-235.  It can be troublesome.)

-- 
Cheers,My pid is Inigo Montoya.  You kill -9    
Rick Moen  my parent process.  Prepare to vi.
r...@linuxmafia.com
McQ!  (4x80)
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Historical note on double negation.

2020-12-24 Thread Rick Moen
Quoting Hendrik Boom (hend...@topoi.pooq.com):

> Another such an example is
>John and me went swimming.
> Here 'and' serves as a preposition.

I'm not sure where the location is, where 'and' fails to be a conjunction
when used between two nouns in that fashion, but I'm curious what colour
the sky is, there.

-- 
Cheers,  "Like looking both ways before crossing the street, and 
Rick Moenthen getting hit by a submarine."  -- Clarke Smith, age 9, 
r...@linuxmafia.com  winner of Washtington Post's contest for best description
McQ! (4x80)  of the year 2020 in a single word or phrase.
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Your system is not supported by certbot-auto anymore.

2020-12-11 Thread Rick Moen
Quoting Hendrik Boom (hend...@topoi.pooq.com):

> Good that that works for you.
> But for someone with attantion deficit, that couple of minutes a year is 
> difficult.

(1) Keep domains you care about registered with five years of runtime.
There really is not disadvantage worth mentioning.

(2) Run d-check as a weekly cron job to remind yourself of upcoming
domain registrations.
http://linuxmafia.com/~rick/preventing-expiration.html
http://linuxmafia.com/pub/linux/network/

___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Your system is not supported by certbot-auto anymore.

2020-12-11 Thread Rick Moen
Quoting wirelessduck--- via Dng (dng@lists.dyne.org):

> A good move to switch from godaddy. Doesn’t really matter where you
> switch to, but godaddy appear to be a seriously unethical company.
> 
> https://www.webpronews.com/godaddy-elephant-killing-nodaddy-venovix/
> https://www.wired.com/2007/01/godaddy-meet-no/

More:
http://web.archive.org/web/20110627205958/http://nodaddy.com/
http://www.theregister.co.uk/2011/07/12/godaddy_shuts_down_nodaddy/
https://web.archive.org/web/20130310014102/http://asifali.me/post/42323712160/godaddy-deletes-my-domains-and-charges-me-to-restore

___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Redhat EEEs CentOS?

2020-12-10 Thread Rick Moen
Quoting vmlinux (vmli...@charter.net):

> Embrace, Extend, Extinguish? Shocking but not surprising. Even more reason 
> for Devuan to exist.
> 
> https://arstechnica.com/gadgets/2020/12/centos-shifts-from-red-hat-unbranded-to-red-hat-beta/




From: Rick Moen via Sb 
Date: Thu, 10 Dec 2020 23:41:46 -0800
To: Birmingham Linux User Group 
Subject: Re: [SB] Strategic CentOS

Quoting Brian C via Sb (s...@mailman.lug.org.uk):

> CentOS Stream made no technical sense to me when I first read about
> it, and it still doesn't.  People use CentOS because they want
> stability.

Concur.

> So the recent strategic move I see as effectively killing the CentOS
> project, but keeping the name alive to attempt to minimise adverse
> reactions.
>  
> And I assume that someone is gambling on a large number of CentOS
> users finding it less expensive to switch to RHEL than to something
> else.
> 
> Hopefully information will leak about who's been pushing for the
> change and when they started.

All the signs I'm seeing make me think this is a high-level decision
already fully underway and highly unlikely to ever be reversed.  I share
your surmise about RH Corporate's aim.  Still, the suddenly
prospect-less CentOS user community can reasonably be grateful for Red
Hat, Inc.'s sponsorship of the project for many years until now.

Long ago (early 2000s), independent RHEL-rebuild projects sprang up and
thrived when a number of people, starting with John Morris (White Box
Enterprise Linux) realised that an unbranded RHEL-equivalent was
feasible.  Morris's work was followed by Tao Linux, Scientific Linux,
cAos Linux, NPACI Rocks Cluster Distribution, BioBrew Linux, X/OS Linux,
Pie Box Enterprise Linux, and others.  

I'm not clear on what new obstacles there might now be, e.g., on account
of RH, Inc. wishing to make things difficult for Oracle Linux.  In olden
days, the main task required was to swap in different contents for the
two trademark-encumbered non-software SRPMs, the ones named redhat-logos
and anaconda-images, and some other work to make the result self-hosting
and compile everything to create a binary distro.

At the time, there was a mailing list named rhel-rebuild, where the
pioneers of the above-cited projects and others hung out.  Its
information page still exists:
https://www.uibk.ac.at/zid/systeme/linux/linux-alt/rhel-rebuild-l.html

I'm betting the actual mailing list (hosted for a while on Sympa) 
is long gone.  (Untested, though.)

-- 
Cheers,   "2020 is pulling out more plot devices than 
Rick Moen a TV series on the brink of being canceled."
r...@linuxmafia.com  (Seen on Reddit, Oct. 2, 2020.)
McQ! (4x80)
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Let's Encrypt (was: snapd in Devuan? Dependency on systemd...)

2020-12-04 Thread Rick Moen
Quoting Adam Borowski (kilob...@angband.pl):

> Imagine that you tried and failed to find any door that would taken a
> skilled lockpicker more than three seconds to open.  Would you leave the
> entrance to your flat wide open without a door at all?  That's what you're
> suggesting.

No, I'm not.

As I've repeatedly clarified, my sites have correct, competently
generated certs.  People needing to vet their provenance can do so in a
variety of ways.  The CAs are merely not among those ways.

___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Obviousness (was: Let's Encrypt (was: snapd in Devuan? Dependency on systemd...))

2020-12-04 Thread Rick Moen
Quoting Bernard Rosset via Dng (dng@lists.dyne.org):

> >It makes me sad that this view is deemed 'contrarian'.  As a sysadmin, I
> >consider it obvious common sense.
> 
> I have no idea if it is contrarian or if it is the silent majority
> of opinions. However the opinion being more vocal definitely seems
> to be the one encouraging TLS encryption.

It makes me very sad to contemplate that you think I denigrated or
discouraged TLS encryption, as I certainly nowhere did.  I could have
sworn that I was clear that I encourage it, and in any event was _very_
clear that I was addressing the huge problems with the CA
infrastructure, which is a different thing entirely, and has nothing at
all to do with the merits of TLS or any other form of encryption.

I'm sorry that you so thoroughly misunderstood what I said.  Oh well.  

___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Let's Encrypt (was: snapd in Devuan? Dependency on systemd...)

2020-12-03 Thread Rick Moen
I posted a wrong link, oops.

> Retrospective case studies of some of the latter from over the prior decade:
> https://lists.dyne.org/lurker/message/20201203.213847.8bf66630.en.html

I meant this one:
http://linuxmafia.com/pipermail/conspire/2020-December/011311.html

___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Let's Encrypt (was: snapd in Devuan? Dependency on systemd...)

2020-12-03 Thread Rick Moen
Quoting Steve Litt (sl...@troubleshooters.com):

> What about the fact that Google gives higher rankings to secure
> accounts? For google togive that higher ranking, does self-signing
> suffice for enhanced rankings, or does one have to have a cert signed
> by a certification company like Let's Encrypt? This makes a big
> difference for business websites.

Obvious:  For my sites, I don't care.

If I were running IT operations at, say, my ex-employer Cadence Design
Systems, I would pay DigiCert for a relatively meaningful cert
attestation -- which, oddly enough, is exactly what they do, for obvious
business reasons (because oblivious people use the Web and have money
to spend.)  Business Web sites can justify the graft every 1-2 years to
get signatures that are not _quite_ as meaningless as those from Let's
Encrypt or one of the many low-end laugh factory CAs -- as Cadence does
in picking (apparently reputable, competent) DigiCert.[1]

Retrospective case studies of some of the latter from over the prior decade:
https://lists.dyne.org/lurker/message/20201203.213847.8bf66630.en.html


[1] I gave minor sideeye to DigiCert's acquisition in 2017 of
Symantec's gang-that-couldn't-shoot-straight CA/PKI division, but maybe 
they through out the rotten apples.  (Please note that nothing in this
post should be construed to endorse that or any other firm.)
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


[DNG] Let's Encrypt (was: snapd in Devuan? Dependency on systemd...)

2020-12-03 Thread Rick Moen
Quoting Arnt Karlsen (a...@iaksess.no):

> ..meanwhile, I too lean towards Ian's contrarianism:
> http://michael.orlitzky.com/articles/lets_not_encrypt.xhtml

I couldn't possibly agree more.  Let's Encrypt is a Potemkin Village
approach to the SSL cert problem; it's pretend security that pretends as
if a broken and unreliable CA infrastructure weren't that.

I continue to self-sign only, and if people want to know why they should
trust it, I'll say 'Either (a) don't, or (b) verify the hash with me via
any of a large variety of out-of-band methods, like any sensible person.'
If they counter that they want an automated lock icon on their Web
browsers so they are absolved of the need to think, I say 'Sounds like a
personal problem.'

It makes me sad that this view is deemed 'contrarian'.  As a sysadmin, I
consider it obvious common sense.

-- 
Cheers,   "2020 is pulling out more plot devices than 
Rick Moen a TV series on the brink of being canceled."
r...@linuxmafia.com  (Seen on Reddit, Oct. 2, 2020.)
McQ! (4x80)
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Beowulf: 32bit or 64 bit?

2020-11-27 Thread Rick Moen
Quoting Antony Stone (antony.st...@devuan.open.source.it):

> It isn't a can of worms, it's just potentially confusing terminology if you 
> think that "AMD64" means you have to have a CPU made by AMD.

'x86_64' is irritating to type.  Also, AMD deserves the credit, having
shown the necessary leadership.

-- 
Cheers,   "2020 is pulling out more plot devices than 
Rick Moen a TV series on the brink of being canceled."
r...@linuxmafia.com  (Seen on Reddit, Oct. 2, 2020.)
McQ! (4x80)
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Configuring cron and exim4 to send e-mail after running cronjob

2020-11-15 Thread Rick Moen
Quoting Florian Zieboll via Dng (dng@lists.dyne.org):

> 'msmtp' is a lightweight and simple option for sending messages to
> remote smtp servers from shell scripts. with a variable (e.g.
> "$mailcmd") it can be used as drop in replacement for mailx.

Generically, things like msmtp tend to be called 'nullmailers', after an
early example of the type.  I try to track the known options, here:
http://linuxmafia.com/faq/Mail/nullmailers.html

-- 
Cheers,   "The plural of regex is regrets."
Rick Moen  -- old coder gag, seen on Reddit
r...@linuxmafia.com
McQ! (4x80)
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Clarification please

2020-11-06 Thread Rick Moen
Quoting Simon Walter (si...@gikaku.com):

> Thanks for the bits of wisdom.
> 
> Do you know any papers/articles/sites that discuss and explain this more?

As Steve says, the crusty enfant-terrible of software, Prof. D.J.
Bernstein, had some useful things to say about this, so, sure, start
there.  I swear I've come across other pieces elaborating on why
separating recursive from authoritative nameservice is a recommended
precaution, but I failed to bookmark/save those, sorry.

-- 
Cheers,   "2020 is pulling out more plot devices than 
Rick Moen a TV series on the brink of being canceled."
r...@linuxmafia.com  (Seen on Reddit, Oct. 2, 2020.)
McQ! (4x80)
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Clarification please

2020-11-06 Thread Rick Moen
Quoting Dimitris via Dng (dng@lists.dyne.org):

> depends on the role...
> bind as a local caching dns for PCs might be overhead. some people
> would want something minimal/light for recursion, not the whole bind
> "beast"...
> unbound is very light in that perspective, and also found dqcache
> (packaged) a pretty nice alternative.

For a local recursive nameserver[1], I would urge consideration of 
PowerDNS Recursor, Deadwood, Knot Resolver, or (patched) dnscache, all
of which are small, fast, and have reasonable security prospects and
history.

I'll not be critical of people like Mason choosing to still run BIND9 in
that role -- if only because I still do that myself in places out of
inertia -- but for that application consider it overfeatured, slow,
ponderous, and a bit security-risky.

[1] Calling such software 'caching' doesn't really clarify what the core
functionality is, since every subvariety of DNS nameserver software
except for authoritative-only daemons includes caching.

-- 
Cheers,   "2020 is pulling out more plot devices than 
Rick Moen a TV series on the brink of being canceled."
r...@linuxmafia.com  (Seen on Reddit, Oct. 2, 2020.)
McQ! (4x80)
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Clarification please

2020-11-06 Thread Rick Moen
Quoting Olaf Meeuwissen (paddy-h...@member.fsf.org):

> I have a dnsmasq instance that does *authorative* resolution for an
> internal domain.

Well, pseudo-authoritative.

> Anything not in that domain is forwarded to the corporate DNS servers.
> Works fine for me so I think dnsmasq can be more than _just_ a
> forwarder (which is all I wanted to point out).

Yes, dnsmasq does do _stub_ (local-only) authoritative service, as 
is mentioned in my DNS software bestiary's entry.
http://linuxmafia.com/faq/Network_Other/dns-servers.html#dnsmasq

When I said '_just_ a forwarder', I meant that it doesn't do (real)
authoritative service or recursive resolving.  It cannot even
independently resolve RRs without processing the recursive flag
('iteratively'), i.e., it cannot resolve anything outside its
local-private-domain zonefile except by forwarding the query to a
separate recusive daemon elsewhere.

Naturally, the ability to have a stub zone is also useful.

My point is that dnsmasq is in _no way_ an adequate substitute for
having a locally based recursive nameserver.  However, it can be a nice
adjunct to one.

___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Clarification please

2020-10-29 Thread Rick Moen
Quoting g4sra via Dng (dng@lists.dyne.org):

> Can anybody suggest a suitable authoritative/recursive DNSSEC
> supporting name server for SOHO domain use on embedded systems.  What
> I am looking for is something like dnsmasq.

dnsmasq, it should be noted, is _just_ a forwarder.  It forwards
outbound queries to one or more IP-identified recursive servers you
specify.  Those recursive servers do the actual work.

Respectable recursive(-only) nameserver packages (that are open source):

o  Unbound
o  PowerDNS-recursor
o  dnscache (from the djbdns suite), if patched to modern standards
o  Deadwood
o  Knot Resolver
o  Bundy recursive portion (but it's probably scary betaware)

Respectable authoritative(-only) nameserver packages (that are open
source):

o  NSD
o  PowerDNS Authoritative Server
o  MaraDNS authoritative portion
o  rbldnsd
o  YADIFA
o  MyDNS-NG (which also does forwarding of out-of-bailiwick queries)
o  ldapdns
o  Knot DNS
o  gndsd
o  dnsjava
o  tinydns (from the djbdns suite), if patched to modern standards
o  Bundy authoritative portion (but it's probably scary betaware)

(Something that becomes apparent as one studies this field is that
writing an authoritative daemon is relatively easy and many folks have
done it.  Writing a recursive daemon without messing up is difficult,
so there are far fewer successful examples.)

I maintain a bestiary of all known DNS software for Linux, here:
http://linuxmafia.com/faq/Network_Other/dns-servers.html 
The above list is extracted from it.

The page is still missing one peculiar^W innovative package, called
Ironsides.  Coverage is coming, Real Soon Now.

I _hope_ the page is reasonably clear and complete about DNSSEC support,
but:  Errare humanum est, sed perseverare autem diabolicum.

FWIW, I am no longer comfortable with the idea of a combined
authoritative/recursive server on a publicly exposed static IP.
That has been deprecated for long decades as bad security, particularly
because it increases the risk of cache poisoning of the recursive
server.  IMO, a LAN connected to public networks, even a small one,
ought to have the authoritative service on a separate, public-facing
host, and the recursive service on a protected, internal-network machine
that is as shielded from public networks as possible.

I have personal experience with:  BIND9 (and predecessors), NSD,
Unbound, PowerDNS Recursor, PowerDNS Authoritative Server, dnscache,
tinydns.  I can enthusiastically recommend NSD and PowerDNS Server.
Before a recent troubling thing with Unbound where the developers made a
dumb decision to accomodate containerising, I was a huge Unbound
cheerleader and might be again.  

Necessary disclaimer:  I'm personal friends with Deadwood/MaraDNS author
Sam Trenholme (but have yet to substantially deploy his software).


As an administrator whose experience with BIND goes all the way back to
BIND4 days, I know well that it's the path of least resistance to just
deploy a do-it-all nameserver package like BIND9, but that's been known
to be a bad idea for a long time, and it's past time to stop doing that.

-- 
Cheers,"Rand Paul being patient zero for a Senate 
Rick Moen  viral outbreak is a sign of a writers' room 
r...@linuxmafia.comdropping too much acid, late in the season."
McQ! (4x80)-- @owillis (Oliver Willis)
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


[DNG] Self-hosted SMTP (was: TB and Enigmail)

2020-10-28 Thread Rick Moen
Quoting Bernard Rosset via Dng (dng@lists.dyne.org):

> It seems we're drifting away from the main subject.
> Count me in!

Roger that!  Subject header tweaked.

> ?
> If your emails are being refused by others, including major email
> hosters, I would kindly suggest you check you got at least correct
> SPF + DKIM entries. You can throw DMARC into the mix if you wish so,
> too.

Umm...

As I already mentioned upthread, my domains' e-mail continue to have
very high deliverability.  Those domains feature strongly asserted SPF
RRs in their auth DNS.

However, by carefully considered local policy, I decline to also
implement DKIM/DMARC, considering those extensions to have been botched
in design and implementation by Yahoo, Inc.  (DKIM seems to be the
keystone problem, there, particularly its hapless hostility to
MLM-mediated forwarding.)  Empirically, I so far perceive no measurable
loss of host reputation from declining to implement DKIM/DMARC.

I _do_ publish, in each of my domains' DNS, deliberately non-compliant
DMARC RRs, just to make my stance quite clear, e.g.:

:r! dig -t txt _dmarc.linuxmafia.com @ns1.linuxmafia.com +short
"DMARC: tragically misdesigned since 2012.  Check our SPF RR, instead."


> It's saddening to assess how little is known by the general public
> (including people who actually work on technical matters in IT) about
> key technologies, like DNS (the mother/father of all) or email.

True datum:  When I began hosting my own SMTP smarthosts, I was still a
staff accountant (UK: chartered accountant) for a living, not a
sysadmin.  Fortunately, nobody told me I couldn't do it, so it worked.

___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Zoom via Firefox

2020-10-28 Thread Rick Moen
Quoting d...@d404.nl (d...@d404.nl):

> I do not have experience with Zoom but with Jitsi and discovered that
> disabling WebRTC leakage in Firefox because of WebRTC leaking ip
> addresses also crippled Jitsi.

The first comment on this bug is said to address that (even though the
bug report is for the standalone Electron-based Jitsi Meet client,
'jitsi-meet-electron'):
https://github.com/jitsi/jitsi-meet-electron/issues/324

In short, yes, what you observe is correct, but you can accomplish your
objective by blocking WebRTC leakage using the block-WebRTC-leakage
feature of the uBlock Origin extension, rather than using the similar
feature in Firefox's about:config .


___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] TB and Enigmail

2020-10-28 Thread Rick Moen
Quoting Lars Nood??n via Dng (dng@lists.dyne.org):

> Google appears to be doing what it can to cut off not only MUAs like
^^
> Thunderbird but also competing mail providers.  
  ^^^

I believe you mean (specifically) cut off from access to GMail
send/receive access by GMail users, as an alternative to using GMail's
proprietary WebUI.  Yes, that's very strongly my understanding, too.

Of course, my own way of eliminating GMail problems is:  Don't use
GMail, and you thereby magically avoid GMail problems.  ;->

> It's increasingly hard to exchange e-mail between lesser known providers
> or even self-hosted servers and GMail accounts.

This does _not_ accord with my experience.  In my experience, if you run 
a spam-clean and RFC-compliant SMTP operation and take modest
anti-forgery measures (such as my domains' strongly asserted SPF RR), 
your mail domain will have no problem bidirectionally communicating with
GMail / Googlemail -- without spamboxing or teergrubing, etc.

I keep monitoring this situation, and it may change, but that is still
my honest assessment from many decades of self-hosted SMTP smarthost
operation.

-- 
Cheers, "I suppose the process of acceptance will pass through the usual
Rick Moen   four stages: (i) This is worthless nonsense; (ii) This is an 
rick@linux  interesting, but perverse, point of view; (iii) This is true, 
mafia.com   but quite unimportant; (iv) I always said so." -- JBS Haldane 
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] TB and Enigmail

2020-10-27 Thread Rick Moen
Quoting Dimitris T. via Dng (dng@lists.dyne.org):

> still recommending TB to clients/people though... 

In case it's useful, I keep a list of all known MUAs for Linux, here:
http://linuxmafia.com/kb/Mail/muas.html 
Necessary disclaimer:  As anyone who's ever kept alive over decades a
complex Web page on an evolving subject knows, it absolutely needs
updating and maintenance.  I just don't currently know what's missing
and needing fixing, and won't know until I can next waste a day
re-surveying the field, fixing bitrot, etc.

I can't remember exactly why I started that page, but sometimes in the
past it's been something like hearing, once too often, 'There aren't
enough mail clients for Linux', and wanting to rejoin something like
'Really, 123 isn't enough?  How many do _you_ use, from day to day?'

-- 
Cheers, Peter G. Neumann:  "Mars has been a tough target."
Rick Moen   Harlan Rosenthal:  "That's because the Martians keep
r...@linuxmafia.com shooting things down."   RISKS Digest, v. 20, #59&60
McQ!  (4x80)
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] TB and Enigmail

2020-10-27 Thread Rick Moen
Quoting John Crisp via Dng (dng@lists.dyne.org):

[snip much-appreciated picture of behind-the-scenes management
folderol at Thunderbird Project:]

> The problem is decent alternatives are not great [...]

Just in case people have lost track of this, the long-term nub of the
problem is:  revenue model.

Firefox brought in money.  Thunderbird did not.  When all is said and
done, Mozilla Foundation is an appendage of Mozilla, Inc., which as a
for-profit corporation is bound to a depressing pursuit of quarterly
earnings targets as a primary objective.  From the corporate
perspective, Thunderbird development resources are deadweight, a
dispensible community sponsorship that earns nothing.

I continue to like projects that are limited in feature scope enough to
not live or die by corporate underwriting.  E.g., mutt continues to be
maintainable by a small group of motivated developers.  When I want it
to be graphical, I run it in an xterm.  ;->

-- 
Cheers,
Rick Moen"The first rule of Dunning-Kruger club is
r...@linuxmafia.com  you don't know you're in Dunning-Kruger club."
McQ! (4x80)   -- @drankturpentine (Dennis Detwiller)
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] ?? chacun son go??t (was: Is it worth the effort for SPF, DMARC, DKIM, etc.?)

2020-10-04 Thread Rick Moen
Quoting Simon Hobson (li...@thehobsons.co.uk):

> > Sounds like a problem local to you.
> 
> No, not in the least bit "local to me".  I will be generous and assume
> that you simply misunderstood what I wrote - it happens a lot :-(
> 
> Prior to SPF, it was perfectly OK to (for example) :
> 
> Have an account (lets say f...@example.com) so that fred can have an
> email address that "goes with" his website.

So, when I said 'local to you', I meant 'local to people who want to use
practices that amount to forging the domain owner's Internet domain, in
ways many domain owners including me no longer find tolerable and wish
to make not work, i.e., to be rejected as forgeries.  Since we're using
the hypothetical example of Fred, my assessment then becomes 'Sounds
like a problem local to Fred.'  And since, as detailed below, no
Fred-types are among legitimate users of _my_ domains' mail, I'm not
only fine with illegitimate Freds being unable to successfully forge my
domain, I'm very happy with that outcome.

> For reasons we never understood*, Fred is adamant he is not prepared
> (even if we configure it for him) to have a second account in his mail
> client to directly collect mail from our mail server using POP or
> IMAP. He just wants mail to arrive in his inbox. So instead we simply
> forward his mail to his regular account - tends to be
> "somegibber...@btinternet.com" and things like that). Of course, some
> wanted "sales@...", "support@...", and so on as well - though mostly
> these clients were prepared to do it without forwarding to an external
> account.  For many years that worked just fine. ONLY when more players
> started implementing SPF did it break. 

Basically Fred relied on forging the various domains where he has
accounts for mail, in the sense of originating mail from arbitrary
originating IP addreseses on his outbound mail, IP addresses that the
domain owners have no particular wish to be accepted as sources of their
domains' mail (e.g., someone else's MTA).

I have no doubt that some Internet domain owners remain oblivious to the
reputation problem that results when UCE and other junk can believably
impersonate their domains as the claimed sources of outbound mail -- and
those oblivious domain owners can make Fred happy as long as that
arrangement continues to work for both.

The legitimate users of my domain linuxmafia.com (among others) do not
include any Freds, because I informed all my users around the year 2000, 
"Hey, if you're used to sending out your [myaccount]@linuxmafia.com 
accounts via SMTP lists _other_ than linuxmafia.com itself, please be
advised that, starting now, I'll be doing my best to ensure that any
such mail fails and is rejected.  Please switch to originating
linuxmafia.com mail from the linuxmafia.com server ONLY.  Thank you.'

It's a small operation with only a small number of clueful users.
Larger operations offer roving IP-address origination _of their domain's_ 
mail _from their authenticated users_ via the newer SMTP Submission port,
587/tcp.

https://www.mailgun.com/blog/which-smtp-port-understanding-ports-25-465-587/

If one of my users was a Fred, and he wanted his outbound linuxmafia.com
mail to be acceptable to end-destinations irrespective of what IP
address sent it outbound on 25/tcp, I'd say 'Sorry, Fred, not with my
domain.'  If you want to do that, feel welcome to register your own
domain and you can risk its reputation any way you want.




> We didn't change anything, others implemented policies explicitly
> designed to break it.

By 'others' you mean domain owners, and by 'break it', you mean break
deliverability of mail from unauthorised originating IPs forging those
owners' domains.

And that's the thing.  Fred (and you) don't own those domains.
Therefore, you don't decide those domains' SMTP deliverability policies,
because -not yours-.

If you're unclear on the meaning of 'not yours', try to forge SMTP from
linuxmafia.com, and the outcome will clarify the concept.


> BTW - I did try Sender Re-Writing (this was before DMARC & DKIM were
> popular).

SRS was a last-ditch attempt to preserve the ability of ~/.forward and
/etc/aliases ancient-style forwarding to function for cross-domain
delivery in the modern age of domain owners no longer being inclined to
permit SMTP forgery.  IMO, it was never worth the trouble.  By 2000,
the handwriting was on the wall that ~/.forward and /etc/aliases
cross-domain forwarding had been a casualty of the war on spammers' and
others' forgeries, so with almost no regret I ceased using those two
antique forwarding methods (except intra-domain).


> Again no. It's not about who sends mail purporting to be me, it's
> about allowing me to legitimately forward mail from "some random
> person" to one of our clients - where that client just wants the email
> to appear in his inbox.

Basically using someone else's MTA as a relay for your client without
prior arrangement.  Guess what?  Open relays became unacceptable even

[DNG] à chacun son goût (was: Is it worth the effort for SPF, DMARC, DKIM, etc.?)

2020-10-03 Thread Rick Moen
Quoting Simon Hobson (si...@thehobsons.co.uk):

> Rick Moen  wrote:
> 
> > My response inevitably is that I really couldn't care less whether
> > they like SPF or not. ...
> 
> May I respectfully pick you up on that one.

Well, you can _try_.

> Regardless of the arguments for and against which have been done to
> death for long enough, SPF did predictably break email in many ways -
> some of which I used to use, and some which my clients used to use. 

Sounds like a problem local to you.  Possibly you wish to originate 
port 25 mail on IP addresses you are not prepared to declare in an SPF
RR for reference by SMTP receivers.  Like, maybe your users think it's 
still 1995 and that they ought to be free to originate outbound port 25 
SMTP connections purporting to represent your domain from arbitary,
not-preplanned IP addresses at will.  I wouldn't know.

What I know is that all legitimate linuxmafia.com mail originates from
my MTA's static IPv4 address, and my declaring that in an SPF RR as the
sole legitimate origin helps others definitively detect and reject
forgeries.  Therefore, I publish such an SPF RR, and am happy with the
results.

You say that for some reason you cannot gain the same benefit?  OK, if
you say so.  But I don't think that such a local (alleged) inability has
anything to do with me.

> In a small way, by implementing SPF yourself, you've added to the
> support for something that broke existing LEGITIMATE mail activities. 

I doubt your premise that SPF 'breaks' anything -- and find it
highly suspicious that you don't support your assertion with anything
even remotely resembling specifics.  However, additionally, your
apparent inability or disinclination to publish information in your DNS
saying 'All SMTP mail _not_ originating from IP addresses following this
spec should be considered forgeries' (_which is the sum and substance_) 
utterly fails to be a reason why I ought not to, given that I can and
have done so.

> So your approach has a hint of "I don't do that, so I don't care about
> the people who do and now find it broken".

Since nobody else's mail (other than my users') purports to originate
from linuxmafia.com, I completely fail to see how my succesful
deployment of a precise and accurate SPF RR adversely affects anyone
else in the universe, let alone 'takes away their freedom'.  You can try
to show otherwise, if you want, but it's going to require some awfully
compelling evidence, and I'm pretty certain you don't have any nor can
acquire any.

I'll be frank, too.  Experience suggests that people making this
argument are unwilling to come to terms with the modern reality that 
SMTP forgery is a huge problem and that circa-1995 policies of SMTP port
25 origination are a bad idea, and somehow think it's my job to 
contend better with reality.  That actually just is not my job, and I
have a lot better things to do with my time.

> Hmm, didn't Devuan come into being partly due to someone pushing a
> policy of not caring what he breaks for other people ? Sorry, that was
> a bit below the belt but I hope it illustrates the issue. 

I wouldn't calling that hitting below the belt.  I'd call it dribbling
on your feet, since we're going for metaphorical imagery.

___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] X11: safe to remove?

2020-10-02 Thread Rick Moen
Quoting wirelessduck--- via Dng (dng@lists.dyne.org):
> > On 3 Oct 2020, at 00:12, Dimitri Minaev via Dng  wrote:
> 
> > Because of Swing, I suppose. Java allows one to create GUI apps,
> > too.
> 
> The headless jre package also has X11 dependencies.

Though I'm certainly aboard for avoiding and eliminating bloat, I'll 
point out that running selected X11 executables from a headless host, 
e.g., tunneled over 'ssh -Y' to a remote X server, is a very, very 
standard use case.  This of course includes Java bytecode that makes
X11 calls.

-- 
Cheers,   "2020 is pulling out more plot devices than 
Rick Moen a TV series on the brink of being canceled."
r...@linuxmafia.com  (Seen on Reddit, Oct. 2, 2020.)
McQ! (4x80)
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Is t worth the effort for SPF?, DMARC>, DKIM?, etc

2020-10-01 Thread Rick Moen
Quoting terryc (ter...@woa.com.au):

> On Sun, 27 Sep 2020 17:20:06 +0200
> Alessandro Vesely via Dng  wrote:
> 
> 
> > You can also publish DKIM and SPF records so as to produce
> > DMARC-aligned authentication for any hosted domain.  Users won't
> > notice any difference.
> 
> Does anyone have any figures on how effective these methods are?
> It seems we get a new idea every few years and none make the slightest
 ^^^
> difference in spam levels. 
  ^

You have made a fundamental, basic error.

SPF and DMARC are _antiforgery_ extensions to DNS and SMTP.  They permit
a domain owner to publish information in their authoritative DNS to
advise recipients of SMTP about what SMTP-originating IP addresses ought
to be considered _authorised_ SMTP senders for their domains, vs. which
others ought to be rejected as forgeries.

Nothing about SPF and DMARC say 'this will reduce spam'.  They're about 
making domain forgery (in received SMTP mail) be detectable and able to
be confidently rejected upon receipt.

DKIM is a (poorly designed, IMO) method for individual SMTP-mail
originating system to cryptographically sign outbound SMTP mail,
permitting receiving systems to verify that the mail contents hasn't
been tampered with en-route.

Since I personally refuse to have anything to do with DKIM or DMARC
(both designed by the same team at Yahoo), I'll illustrate SPF's 
value proposition to a domain owner.  I'm the owner/operator of domain
linuxmafia.com (among others).  Here is that domain's publicly
proclaimed SPF record:

:r! dig -t txt linuxmafia.com +short
"v=spf1 ip4:96.95.217.99 -all"

That record says, translated into English, "Please accept as from an
authorised SMTP source for domain linuxmafia.com _only_ mail originated
by IPv4 address 96.95.217.99.  Please hardfail (reject) mail received
from any other IP address."

My putting that information in my DNS is a huge win for my domain's good
reputation as a clean SMTP source, in that it states extremely clearly 
what mail _purporting_ to be from linuxmafia.com ought to be considered
by receiving MTAs (that honour my wishes) to be genuine.  Of course, I 
have zero ability to compel or persuade receiving SMTP systems to check
and honour my domain's SPF record, but many do, and every little bit
helps.

Occasionally, someone tries to convince me that SPF is A Bad Thing for
any of several uncompelling reasons, most often because they have been
accustomed to originating mail from _their_ domains from arbitrary IP
addresses on TCP port 25 (SMTP), and fear that widespread adoption of
SPF will somehow make it less likely that their carefree habit will
continue much longer.  My response inevitably is that I really couldn't
care less whether they like SPF or not.  It permits me to unambiguously 
declare to the public that IP address 96.95.217.99 is the only valid
source of SMTP mail from my domain, thereby exposing as forgeries mail
from anywhere else (falsely) claiming to be from my domain, so it is 
A Good Thing for my domain, and I don't give a tinker's damn whether my
interlocutor approves of it.

And none of this has anything particularly to do with 'reducing spam'.  
That just isn't the point, and the only people debating that supposed
issue are folks who never bothered to look up what the thing _is_.



> The only result is that there is now an industry of religious extremism
> in "blacklisting" sites that don't follow their desired implementation.

To be blunt:  You have not bothered to understand what you're writing
about.  I would suggest you do so.

___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] ..devuan to the rescue? Easiest possible newbie email server setup, ideas?

2020-09-24 Thread Rick Moen
Quoting Mark Rousell (mark.rous...@signal100.com):

> Option 1 is a bit embarrassing if anyone notices (e.g.
> "host-46462.static.bugtown.myisp.net" isn't too cool as the name of your
> mail server) but I don't see any technical downside, although DMARC
> might perhaps be an issue nowadays.

DMARC can be made to be a non-issue.  ;->

:r! dig -t txt _dmarc.linuxmafia.com +short
"DMARC: tragically misdesigned since 2012.  Check our SPF RR, instead."

I've had no problems _without_ DMARC/DKIM (but with a strongly asserted
SPF record).  Have been operating home *ix SMTP smarthosts on static IP
with matching rDNS, and maintaining a clean, high-reputation system
since the 1980s.

I've tried to always have rDNS always match exactly my main mail server's
primary identity, though it has several valid alternate public identities
(uncle-enzo.linuxmafia.com, hugin.imat.com, unixmercenary.net) that in
my experience _also_ enjoy high reputation, despite A-to-PTR mismatch.

Basically, in my experience, some operators may be assigning a _very small_
spamicity score to 'rDNS exists but doesn't match':  I cannot really
tell.  What's clear is that 'IP lacks rDNS' is (rightfully) penalised,
given RFC mandate for same and its usefulness as an antispam heuristic.

And, of course, 'IP is part of a dynamic netblock' is very definitely an
antispam heuristic (though operating a public-facing SMTP host on
Dynamic DNS is RFC-compliant), so Don't Do That, Then.


___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Danger: Debian POSIX hostility

2020-09-22 Thread Rick Moen
Quoting Ian Zimmerman (i...@very.loosely.org):

> I worry about a different kind of portability. If I ever have to switch
> to BSD (and this remains a possibility, unfortunately), /bin/* shebangs
> will not work except for /bin/sh, and /bin/sh is always ash. That is
> because on BSD everything not in the core system goes into /usr/local.

You know, if going for maximum portability, you can rely, within the
shebang, on /usr/bin/env.  Like:

#!/usr/bin/env bash

Although there's no absolute guarantee that env(1) will reside in
/usr/bin on all Unix machines ever made, it does live there on BSDs.
And I'm willing to bet that it's going to exist and be in /usr/bin on
Unixes made written the last quarter-century.

https://stackoverflow.com/questions/10376206/what-is-the-preferred-bash-shebang#10383546
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Danger: Debian POSIX hostility

2020-09-22 Thread Rick Moen
Quoting Peter Duffy (pe...@pwduffy.org.uk):

> With respect, I'd tend to disagree with that to some extent. The /bin/sh
> symlink is built in, and is there from the point that the system is
> installed.

That was a _second_ if lesser blunder (in that bash was, even at the
inception of Linux, a poor approximation of the Bourne shell), but
doesn't excuse the one of failing to put /bin/bash in the shebang if one
intends to write a bash-specific script.  Which is what was actually
under discussion.

> So it's a feature made available to users, and it's arguably
> not a blunder to use it.

It's not a blunder to use a /bin/sh -> /bin/bash symlink.  It's a
blunder to fail to specify bash in the shebang if you're writing a bash
script.

> I'd agree that best practice is specifying bash explicitly in the
> shebang, if it's required (something that I personally have always done
> since I first bitten by the bash/dash problem).

For values of 'best practices' approximating 'This will prevent your
script accidentally breaking if you use bash-specific features and 
your script ends up being run at a time or place where /bin/sh is
something other than bash.'

> I'm trying to remember what happens on systems that default to ksh and
> csh - I assume that on those, the shebang always needs to specify the
> shell to be used.

ksh and pdksh are fairly close approximations of the Bourne shell.  csh
and tcsh are very much not.
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Danger: Debian POSIX hostility

2020-09-21 Thread Rick Moen
Quoting marc (marc...@welz.org.za):

> Hmm - that might require some background: I'd venture that most of
> these scripts were written when sh was just a symlink to bash, and
> dash didn't exist, nevermind as a debian package.

But that was always a blunder.  The shebang should have been set to bash
explicitly, if bash-specific features are used:  In the cases of which
you spoke, the coder made a lazy and unsupportable assumption.

Also, the fact that Debian Almquist Shell (dash) didn't exist until 2002
is true but irrelevant.  Other Bourne clones did, e.g., Kenneth
Almquist's ash (Almquist Shell), which predated the Linux kernel, having
emerged in 1989.  As another example, pdksh has been available since
1983 and is closely Bourne compatible (compliant with the relevant
POSIX.2 specs).

> I, for one, never bought into the reasoning for migrating
> system scripts away from bash to sh. The argument that
> bash is too large struck me as odd - there were critical
> dependencies on perl and python with a much larger dependency
> graph, and much bigger startup costs... 

Many startup Bourne scripts and other root-run Bourne scripts became
about 3x faster when run by dash instead of bash.  I think it likely
that there are also many fewer potentially dangerous bugs lurking, too,
given the great reduction in codebase size.

> More importantly I think it is good that one uses the same language 
> that one types into the terminal every day when extending the 
> distribution - that makes a sysadmin equal to the distribution maintainer, 
> instead of specialising that into a different caste... 

Well, then:  Learn Bourne scripting.  When you're well informed about
that, learn bashisms as an optional extra feature set when and if
needed.

___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Danger: Debian POSIX hostility

2020-09-21 Thread Rick Moen
Quoting Arnt Karlsen (a...@iaksess.no):

[...]
> > I'm curious how many, if any, of those are going to enable the
> > systemd-homed service in their default installations.  My guess is few
> > or none, but I lack data. 
> 
> ..the bigger problems are how the ones in the know, acts on the ones
> they should be protecting:  1. distro packagers on the newbies, and 
> 2. sysadmins on their un-suspecting users, bosses, share holders etc
> owners.

I think you're disregarding my point.  (Which is mildly vexing, but I'm
not a newcomer to the Internet, so I'm used to it.)  To restate, once:

A bit of bloatware becoming potentially providable and potentially
enabled by default in a distribution doesn't make it a foregone
conclusion that it will be both.  And also it should be noted when that
bloatware can be trivially disabled because by its nature it is an
optional service.

Remember the hilarious security and functionality screwup with
systemd-resolved?  That was justifiably mocked, but also not the subject
of great concern because it was a bit of systemd bloatware that distros
were not enabling by default, and could also be trivially disabled
because it was an optional service.  I'll bet both continue to be case,
though I don't care enough to check.

Debian, among others, runs rsyslog by default even though
systemd-journald has been present since early days.  And so on.

OK, I've now made the point twice.  I'm done.

-- 
Cheers, "My hot flight attendant asked how I like my coffee.  
Rick Moen   And that's when she told me:  'That's cute, honey, but 
r...@linuxmafia.com the coffee's free.  You don't have to pay for it, here."
McQ! (4x80)(seen on Twitter)
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Danger: Debian POSIX hostility

2020-09-17 Thread Rick Moen
Quoting Steve Litt (sl...@troubleshooters.com):

> I've never been afraid to kludge when it comes to packages, so my
> solution was:
> 
> chattr i /etc/resolv.conf
> 
> :-)

Without the '+', that is not a solution, just a syntax error.  ;->

___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


  1   2   3   4   5   6   7   8   9   10   >