Forwarding unwilling network programs (was: Evolution and Exchange ...)

2004-09-25 Thread bscott
On Sat, 25 Sep 2004, at 5:22am, [EMAIL PROTECTED] wrote:
> Little easier than mucking with iptables and less parts to break.

  Another interesting hack is the "dynamic port forwarding" feature of
OpenSSH's ssh(1) program (the "-D" switch).  For example:

ssh -D 1080 server.example.com

That opens the usual SSH session to , but it also puts a
SOCKS4 server listening on port 1080 on the local (client) system.  Now any
clients using that SOCKS server will be dynamically forwarded so they appear
to be originating from  instead.

  If you have a SOCKS aware application (such as Mozilla), you can just tell
it to use .

  For non-SOCKS aware programs (most of them), you can use a dynamic library 
preload to intercept normal sockets calls and turn them into SOCKS.  The 
dante package (a full SOCKS implementation) includes a "socksify" script 
which can do this automatically on a one-by-one basis.  For example,

socksify evolution

might work.  Combine that with the SSH dynamic port forwarding described
above, and Evolution will behave as if it is running on your remote SSH
server.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Re-installing W98 without endangering the Linux partitions?

2004-09-25 Thread bscott
On Wed, 22 Sep 2004, at 6:11pm, [EMAIL PROTECTED] wrote:
> Ben Scott said "me too" and then proceeded to tell us details far beyond
> the scope of the question in a language that uses only English words, but
> which isn't English.

  Heh.  :)  Seriously, if anyone has questions about what a particular
detail means, feel free to ask.  I can explain what stuff means; it's just
that doing so every time is extremely time consuming, and tends to confuse
things even more then they already were... :)

> If somebody has one of those it might be fun to see if theres a WIN98
> directory at root level ...

  FYI, the "other" location one will commonly find all the Windoze
installables in is

C:\WINDOWS\OPTIONS\CABS

> (my usual root and /boot are on hdd, which makes rerunning grub harder
> than for most folks)

  It shouldn't really make that big a diff.  Say your system's bootable
hard disk is hda, and your Linux boot partition is hdd1.  You should be able
to boot a GRUB floppy and then run these GRUB commands

root (hd3,0)
setup (hd0)

to install GRUB.

>   Everything was now back to normal.

  Or, at least, the way it was before.  ;-)

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Good International Domain Registrars?

2004-09-23 Thread bscott
On Wed, 22 Sep 2004, at 10:45pm, [EMAIL PROTECTED] wrote:
> I'm looking for recommendations for a "good" domain registrar who can
> handle international registrations.

  Technically speaking, each country is responsible for operating or
appointing their own registry for their ccTLD.  You can find the list of
ccTLD delegations (from the root zone) here, complete with links to the
registry for each:

http://www.iana.org/cctld/cctld-whois.htm

  So, for example, if I wanted register a domain in .UK, I would click on
the ".uk -- United Kingdom" hyperlink, which takes me to a page that points
me to http://www.nic.uk/ for registration services.

  Now, some countries consider their ccTLD to be a resource that can be
exported, and will enter into agreements with other companies to resell
registrations in their ccTLD.  The .cc and .tv domains are famous for this.  
That is done strictly on a country-by-country basis, however.  There is no
global authority or system which administers registrations across ccTLDs, as
there are with gTLDs.

  So, in all honestly, I don't think what you're looking for exists, period,
because countries are under no obligation to offer registrations in their
ccTLD via any particular method.

Glossary


ICANN = Internet Corporation for Assigned Names and Numbers
IANA = Internet Assigned Numbers Authority
TLD = Top Level Domain
ccTLD = Country-Code TLD (.US, .UK, .CC, etc.)
gTLD = Global/Generic TLD (.COM, .ORG, .NET, etc.)
registry = organization that operates a TLD
registrar = organization that accepts domain registrations for gTLDs
registrant = owner of a domain name (you)

  For gTLDs, registrants submit registrations to their registrar of choice.  
Registrars act as a middle-man.  Registrars submit your registration to the
gTLD registry, which operates the nameservers for a TLD.  This process is
formally administered by ICANN.

  For ccTLDs, it is up to each country's registry to decide how they want to
do things.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |


___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Sun "sells" Open Office to Microsoft?

2004-09-20 Thread bscott

  Coming into this a bit late, but knowledge seems to a bit scarce around
this thread, so:

On Wed, 15 Sep 2004, at 12:08pm, [EMAIL PROTECTED] wrote:
>  http://www.linuxelectrons.com/article.php/20040914141417417

  Ho-hum.  IANAL, but I'm pretty sure that agreement (the referenced
document in the SEC filing) is part of the Sun/Microsoft Java settlement.  
The Sun/MS Java fight makes the IBM/SCO thing look like a school-yard
shoving match.  After something close to a decade of litigation, both sides
have finally agreed to stop suing each other for everything imaginable.  
This agreement appears to be part of that.

  The bits about Open Office (Section IV) appear to be a statement that
while Microsoft agrees not to sue Sun over Open Office, Microsoft reserves
the right to sue anybody else over Open Office.  So no change.  Again,
ho-hum.

  The discussion elsewhere about "Open Office" vs "OpenOffice.org" is a red
herring; this document references OpenOffice.org implicitly ("generally
known").  The reason OpenOffice.org insists on OpenOffice.org is that some
*other* company already had a claim to the mark "OpenOffice".  Or so OO.org
has been claiming for years:

http://www.openoffice.org/FAQs/faq-other.html#6

  You can read each side's propaganda about the Sun/MSFT Java fight on their
web sites:

http://www.sun.com/lawsuit/

http://www.microsoft.com/mscorp/java/

  Yes, the 1 April 2004 date is legitimate, and not a joke.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |



___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Re-installing W98 without endangering the Linux partitions?

2004-09-20 Thread bscott
On Sat, 18 Sep 2004, at 4:36pm, [EMAIL PROTECTED] wrote:
> But I'm looking for tips, war stories, and warnings as to what to say to
> W98 install to minimize the likelihood of having to restore the Linux
> partitions.

  As others have noted, this is not really that big a problem.  Most
versions and flavors of Windows will be quite agreeable to installing on
part of a disk.

  Windows 9X needs to be installed on an active primary partition.  As Linux
largely ignores all that stuff, most simple dual-boot configurations just
leave the 'doze partition set active all the time, so this may not even be
an issue.  Assuming you have more then one primary partition, Windows will
use the active one.  Simple and straight-forward.

  Occasionally, one will encounter an "OEM" version of Windows that will
refuse to do anything but restore the entire disk to a factory image.  This
is usually the fault of the PC OEM (e.g., HP, Sony, etc.) and not Windows.

  One can run into problems when the Windows installer overwrites the disk's
MBR (Master Boot Record), as many Linux boot loaders install into the MBR by
default.  It really isn't fair to blame Windows for this, as the MBR was
never intended to contain an OS-specific boot loader -- it's really Linux
breaking the rules here.

  You can avoid MBR problems in a couple different ways.  One is to keep a
suitable rescue mechanism around.  If you are using GRUB as your loader,
simply create a GRUB boot floppy in advance.  If the MBR gets clobbered, you
can then boot the GRUB floppy and use it to reinstall GRUB into the MBR.  
For LILO, one generally needs to boot a Linux system and re-run the map
installer (/sbin/lilo) with the installed system.  You can either use a
self-contained rescue environment (i.e., boot from CD) for this, or prepare
a LILO boot floppy for your installed system in advance.

  The other thing you can do is to create a primary partition for Linux, and
install the boot loader in that partition.  You can also use that partition
for a /boot partition, small root (/) partition, or your entire Linux
system.  By keeping the Linux boot loader in a PBR (Partition Boot Record),
you make Linux play by the rules that other OSes expect.  You can then
switch between Linux and Windows by toggling the "Active" partition flag.  
This is especially useful for systems which contain an OEM "utility
partition" that the BIOS expects to access using a normal MBR.

  You can also optionally supplement the above by installing the first stage
of the Linux boot loader into the MBR as well, leaving the one in the PBR as
a stand-by in case the MBR gets clobbered.

  If you are unsure as to how to make a boot floppy for your particular
system, please post your distribution and release, and your boot loader
(GRUB, LILO, etc.) if you know it, and we can advise.

  Hope this helps,

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |



___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Verizon DSL and static IP address (was: Speakeasy DSL)

2004-09-09 Thread bscott
On Thu, 2 Sep 2004, at 1:56pm, [EMAIL PROTECTED] wrote:
>> Verizon will be cheaper for the speed, but their TOS specifically forbade
>> running servers last time I checked.
> 
> Yes, they do. And they do not plan on issuing static IP's. EVER.

  That is not correct.  You can purchase a static IP option in many (most?)
Verzion DSL areas.  There is a price premium, but it is very much possible.
You can even host services (mail, web, etc.) on the service.  We have
customers doing this right now, and they have been doing so for over a year.

  Note that their sales/support/customer-service is still absolutely
horrible.  Indeed, simply finding a salesdroid that knows they offer a
static IP address option is difficult.  And they still don't offer any real
SLA.  But if all you're after is a cheap static IP address, and Verizon DSL
is your only feasible option, it is possible.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |


___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Speakeasy DSL

2004-09-09 Thread bscott
On Thu, 2 Sep 2004, at 1:51pm, [EMAIL PROTECTED] wrote:
> The only problem I've had was the initial install.  Verizon came out to
> the house and ran two new lines (don't ask me why)

  *Two* new lines is rather odd.  Typically, Covad DSL (which is what
Speakeasy is using) brings in DSL on a dedicated line, so that means a new
loop has to be provisioned from Verizon.  This is in contrast to Verizon's
DSL, which typically "piggy-backs" on an existing POTS loop.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |


___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


(was: Verizon offering 3Mbps )

2004-09-09 Thread bscott
On Thu, 9 Sep 2004, at 10:37am, [EMAIL PROTECTED] wrote:
> What's the latency like on that?  I'm assuming with a 48K mile round-trip
> minimum for every packet, latency must be rather high?

  It's closer to 100K mile.  Geostationary orbit is about 25K miles up.  
For a round-trip, that means 25K from you to orbit, 25K to the ground
station, then 25K from ground to orbit and then 25K back to you.  That's
roughly 550 ms of latency *at the speed of light*.  And that's not even
including latency introduced by the regular terrestrial networks.

  When doing ping tests with a Starband feed a year or two ago, I never saw
a RTT less then 700 ms.  It frequently went to well over 1000 ms.  That is
*over one full second* round-trip time for a 64 byte ICMP datagram.

  For comparison, I typically see between 200 and 300 ms RTT latency on a
POTS dial-up link.

  Latency on satellite really, really sucks.  Anything user interactive
(SSH, games, VoIP, etc.) is going to suck, period.  Satellite works great
for streaming (large file downloads, multimedia, etc.), if the protocol
allows for high-bandwidth, high-latency links.  In TCP terms, that means you
need a very large window size.

  Recall that TCP has to complete a three-way handshake before any data
flows.  That means applications that make use of many short-lived TCP
connections also count as interactive.  Think web browsing.  You have to
wait a minimum of about 2.5 seconds for each page element to load.  This
makes interactive web browsing nearly unusable.

  To solve the TCP problem, satellite carries play games with the protocols.  
They configure a transparent proxy to sit between you and the satellite
uplink.  The proxy intercepts all the TCP requests and fakes the TCP
handshake locally, before the bits even hit the air.  This lets the HTTP
request get into the air without waiting for the "real" TCP handshake to
finish.  Of course, this is an incredible kludge.  I expect it could
conflict with other types of TCP usage, and I know it makes trouble-shooting
a bear.

  Back when I had to deal with it, Starband had also just switched from
doing that protocol magic in the "satellite modem" to doing it in software.  
That meant you had to run their funky and annoying Windows-only software.

  Satellite may be the best option if high-speed terrestrial links are not
available at the location, *and* latency is not a factor.  Otherwise, I
strongly recommend avoiding it.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Verizon offering 3Mbps

2004-09-01 Thread bscott
On Wed, 1 Sep 2004, at 2:01pm, [EMAIL PROTECTED] wrote:
> HB495 didn't get passed .. but it basically said that if somebody has
> their access point open that they did it like that on purpose.

  Uhh... if it didn't get passed then it does not matter *what* the bill
said.  A bill has precisely zero legal value until and unless it is signed
into law.

  Obviously, you never watched "School House Rock", or you would know this
stuff.  ;-)

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


RE: Verizon offering 3Mbps

2004-09-01 Thread bscott
On Wed, 1 Sep 2004, at 7:50am, [EMAIL PROTECTED] wrote:
> I wish I could get it, but not in my part of Merrimack, I would need
> Adelphia and I will not use them.

  I'd rather have Adelphia then dial-up.  Yah, Adelphia sucks, but when it
comes to ISPs, Sturgeon's Law is overly optimistic.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: BIOS updates still matter

2004-08-31 Thread bscott
On Tue, 31 Aug 2004, at 9:03am, [EMAIL PROTECTED] wrote:
> But now it seems that the hardware is getting its own firmware and that
> needs updating.

  Indeed.

  Some (rather esoteric) explanation, for those interested:

  The IBM-PC BIOS (Basic Input/Output System), strictly speaking, is the
part of the system that translates various well-known software interrupt
calls into hardware-specific functions.  For example, INT13 (software
interrupt 0x13)  provides low-level disk read/write functions.  The idea was
that hardware would provide a BIOS interface, and software would be written
to use the BIOS, giving the platform a measure of hardware abstraction.

  Unfortunately, the original BIOS design was junk to begin with, and poor
implementation quality generally made things even worse.  It was and is very
common for software to go "around" the BIOS, in order to get the features,
performance, and/or control needed.  That was the case when the BIOS was
brand new, and now it's twenty years old and hasn't aged well.

  In particular, almost all BIOS calls have to be made in real mode (16-bit
segmented memory).  That makes the BIOS useless to the Linux kernel, which
runs in protected mode (32-bit flat vitalized memory).  This is why you
need drivers for everything in Linux, while you can limp along sometimes
under 'doze and DOS.  Windows 95 and 98 can still fall back on the BIOS for
some things if they have to.  So, people say, correctly, that "Linux doesn't
use the BIOS".

  Now, on the original IBM-PC, most of the main ROM was dedicated to the
implementation of BIOS services [1].  There was practically nothing in ROM
that wasn't BIOS, so in the IBM-PC world, "BIOS" and "firmware" became
somewhat synonymous.

  However, as Mark Komarinski notes, these days, there is plenty that
happens in "firmware" that is not, technically speaking, part of the "BIOS".  
Hardware initialization and setup code was tiny in the IBM-PC ROM, but is
huge today.  PCI enumeration.  PCI interrupt routing.  ACPI.  ISA PnP.  
Microprocessor configuration.  Perhaps even FPGA or ASIC programming.  All
of that is done by the firmware.  Linux needs it to be done properly.  So if
the firmware is buggy, Linux may break.


Footnotes
-
[1] Also a BASIC interpreter, which I will ignore for this discussion.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |




___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Verizon offering 3Mbps

2004-08-31 Thread bscott
On Tue, 31 Aug 2004, at 10:06pm, [EMAIL PROTECTED] wrote:
> http://www.dslreports.com/shownews/53311

http://ars.userfriendly.org/cartoons/?id=19980609
http://ars.userfriendly.org/cartoons/?id=19980610
http://ars.userfriendly.org/cartoons/?id=19980611

  ;-)

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Boot weirdnesses

2004-08-31 Thread bscott

  I encountered a couple of weird problems booting my primary home computer
today, and I wanted to share.

  Possibly relevant details:

- Red Hat Linux 7.3
- GRUB 0.91-4
- Epox EP-8K7A+ motherboard (w/ latest BIOS)
- AHA-2940UW SCSI host adapter (BIOS 2.20)
- IDE hard disk
- Multiple SCSI CD/DVD drives

Weirdness #1


  All of a sudden, I couldn't boot Linux anymore.  I would still boot my
Wintendo partition, but not Linux.  GRUB appeared to process the "kernel"
and "initrd" commands properly, but when I issued a "boot" command, it would
simply hang -- no messages at all.  A three-finger-salute was required to
regain control.

  I figured my GRUB install must have been hosed somehow, so I tried booting
my GRUB floppy and loading the GRUB config file from the hard disk.  Same
problem.

  I could use the GRUB "root", "find", "cat", and "testload" commands to
explore my Linux boot partition without finding anything wrong.

  The "debug" command changed nothing -- still no messages after the "boot"
command.

  Eventually, I booted from CD (this led to the second weirdness; see
below).  I ran fsck on everything.  No problems.  So I mounted my hard disk
filesystems and started poking around.  Eventually, I did "cat grub.conf"
and that's when I found "it".

  My grub.conf file ended with a line with no trailing newline.  That is,
the file did not end with a newline character.  I added a newline to the
file, unounted, sync'ed, rebooted, and ta-da, it worked.

  There must be some kind of in-memory corruption that occurs when GRUB 
tries to process a config file without a trailing newline.  I say this 
because I have multiple stanzas in my config file for Linux (for various 
kernel choices), and *all* of them failed.  So it wasn't just the last 
stanza that was hosed.

  The reason my floppy boot didn't help is that I still loaded the config
file from the hard disk, which apparently triggered the same bug.

  This is an older version of GRUB; it may be fixed in newer releases.  
Regardless, though, it's something to be aware of.

Weirdness #2


  In the process of trying to figure out weirdness #1, I attempted to boot
from CD.  I used a CD-R burn of White Box Enterprise Linux 3.0 Respin 1,
mainly because that was what I had on my (physical) desktop when weirdness
#1 started.

  I loaded the CD in my Plextor CD-RW drive and reset the machine.  The
Adaptec BIOS found the bootable CD and said it was going to boot it.  Then
the GRUB menu I usually see when booting from HD appeared.  (The broken
one.)

  "Huh?  What happened to the CD that the Adaptec card was supposedly going
to boot from?"

  I even went so far as to tell my mainboard BIOS Setup not to boot from
anything but my SCSI adapter, and the weirdness still occurred.  I know the
BIOS option did *something*, because if I set it that way and did not put a
CD in any drive, the machine failed to boot anyway.

  I eventually discovered that if I boot that same exact CD in my Pioneer
DVD reader, everything works as I would expect it.

  Haven't had a chance to pursue this to my satisfaction yet.  If I find out
more, I'll let the list know.

  -- Ben "I hope your computer problems are less insane then mine" Scott

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


RE: Bookstores [Was: Re: Going OT [Was: Re: Replacing PBXes with Open Source]]

2004-08-29 Thread bscott

  As a counter-point...

  I've had nothing but positive experiences with Amazon's customer service,
both email and voice.  They respond quickly and are interested in helping.  
Likewise, they provide near-real-time information on availability and
shipping status.  All very impersonal, of course, but still very well done.  
At the same time, I get better prices, much better selection, and reader
reviews.

  The only advantage "brick-and-mortar" bookstores offer me is the ability
to browse the content, and that is slowly changing, too, as more and more
books becomes "pre-viewable" online.  Not only that, but more and more books
are becoming available in pure electronic form.  When there's nothing
physical to sell, the physical store becomes completely superfluous.

  Sure, sure, many still like the physical medium of paper and ink, for one
reason or another.  But in the future, when everybody has grown up with
e-books all around them, do you really think there will be that much call
for dead trees?

  We are witnessing the beginning of the end of an era.  Printed media is
becoming obsolete.  It will like tens, if not hundreds, of years to finish
doing so, but the wheel has begun to turn.  How appropriate that Gutenberg
bracket both the beginning[1] and the end[2].

[1] http://www.bl.uk/treasures/gutenberg/homepage.html
[2] http://www.gutenberg.net/

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Free WiFI at Panera Bread on Amherst St, Nashua

2004-08-29 Thread bscott

  Some additional commentary to add to this thread:

  * People have drawn the analogy to leaving your house unlocked and having
stuff stolen.  It's worth pointing out that, in the state of NH, if your
property is not clearly posted as being private, people who wander on to it
(or claim to have done so) cannot be charged with trespassing.  There was
even a movement in the state legislature to extend this provision to open
wireless networks (dunno how far it got).

  * My limited and outdated understanding is that ISPs do not necessarily
have the same "common carrier" status that traditional telephone companies
have.  Furthermore, being a "common carrier" includes not only protections
but obligations.  The saying "be careful what you wish for" applies.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


VoIP and paranoia (was: Replacing PBXes with Open Source)

2004-08-29 Thread bscott
On Wed, 25 Aug 2004, at 8:08pm, [EMAIL PROTECTED] wrote:
> From a big brother perspective I'd be unhappy about the enhanced privacy
> ...

  The VoIP providers have already been told by The Powers That Be that they
must make their services "available for monitoring" for legal reasons.

  Ironic that the cipherpunk dream of "ubiquitous private communications"  
appears more likely to arrive not via high-tech computer interfaces, but as
an enhancement to the old-fashioned telephone.

> In either case, I'd do my level best to prevent or at least cripple the
> widespread availability of PBX- and VoIP-enabled gear to the Great
> Unwashed...

  There's not really much The Powers That Be can do about it.  While they
might legislate that anything connected to the PSTN is this-or-that,
enforcement is practically impossible, and they have no control over
pure-Internet services.

  More interesting will be how this effects the private sector and
end-subscribers.  What happens when Big Companies get involved in this?  
For example, who do you want to control your voice comm links: Microsoft,
AOL, or Yahoo?  Will their different offerings interoperate, and if so, how
well?  How will this effect network operators who like to claim "common
carrier" status but don't provide common access to the government?

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Keep Password in KDE su

2004-08-29 Thread bscott
On Sun, 29 Aug 2004, at 10:27am, [EMAIL PROTECTED] wrote:
> Question:  What happens, and what are the dangers, when you check "Keep
> Password"?  How is the password stored and could this later be used as a
> hole by some malware?

  From reading the page you linked to, I surmise that the kdesud daemon
keeps a cached copy of the root password in memory.  Future connections
within the timeout period to that daemon will then reuse the password.  
Presumably, the password is never written to disk by the program itself.
However, if the kdesud daemon does not protect the memory containing the
root password, it could be written to swap space or a core file.

  I like the approach sudo uses better.  sudo runs SUID-root, uses your user
password, and simply keeps track of the last time you used sudo.  No
password caching needed, and the root password never even enters the picture
at all.  sudo is also not limited to KDE.

  Google search for kdesu and/or kdesud shows that the software in question
has had security vulnerabilities in the past.  Not in the password caching,
but in the implementation of the program itself.  That seems to be the usual
case; bugs are rarely in the "security feature" itself, but in the code
surrounding it.

  Overall, for single user systems, I suspect the threat posed by kdesu is
likely to be minor in comparison to the other threats most such systems face
(e.g., browser attacks, email attacks, direct attacks against public
services (especially privileges services like SSH)).

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: pcmcia vs pccard vs cardbus

2004-08-27 Thread bscott
On Thu, 26 Aug 2004, at 11:18pm, [EMAIL PROTECTED] wrote:
>> I know that pccard is the same is pcmcia (easier for consumers). What is
>> cardbus?
> 
> PCMCIA the next version (well, next in 1997)

  In particular, PCMCIA cards are 16-bit and use 5 volts.  CardBus cards (or
at least, can be) are 32-bit (faster) and 3.3 volts (saves battery power).  
CardBus slots can generally accept either type, but CardBus cards generally
will not work in an old PCMCIA slot.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Email security (was: Gmail..)

2004-08-24 Thread bscott
On Sun, 22 Aug 2004, at 7:00pm, [EMAIL PROTECTED] wrote:
>>> I've been waffling (heh, sorry) on whether or not I'm willing to trust to
>>> Gmail, but I'll never know unless I try (for my least sensitive mail, at
>>> least).
> > 
>> If you're sending sensitive email unencrpted, you're already in trouble
>> And you should know better, too.  :)
> 
>   Come on, Bruce, read Bruce Schneier's regular Cryptogram newsletter
> before making such broad statements.  Security is *always* a tradeoff. 

  "Security is a process, not a product."

  "There's no such thing as security -- only managed risk."

> Private email from me to another friend of mine on the same ISP who is
> also running his own TLS enabled SMTP server is plenty sufficient security
> for the type of communication I have with him.

  Sure.  But that would fit the definition of "encrypted", no?  :)

> Gmail (and other webmail-only services) is a whole different animal.  The
> email is ALWAYS on the server, no opportunity to POP it out of there as
> quickly as it comes in, which is what I do with another (low volume)
> externally hosted POP account.

  I don't understand how people construe a mail spool as a security feature.  
Presumably you consider the mail server untrusted.  That's reasonable.  But
if the mail server is untrusted, you have to assume all the mail going
through it is potentially compromised.  Recorded, analyzed, indexed, logged,
diverted, intercepted, blocked, modified, folded, spindled, or mutilated.
The fact that it gets spooled on a disk, or stored longer, is insignificant
compared to the larger security problem here.

> ... an entire record of my email life is not available in any one
> location, like it would be were I to switch entirely to Gmail.

  Let's say you switched "entirely" to POP on some nameless ISP.  We assume
that ISP is untrusted.  We don't know what they (or some intruder) might be
doing with their system.  We *do* know all your mail is flowing through
their systems, though.  There is certainly ample opportunity for anyone to
make an entire record of your email life, there.

  The only difference that I have seen with Gmail is that Google is overt
about it.  And is trying to turn a profit from it.  :)

> Except, of course, on my OWN servers.

  If the entire email transaction takes place on your servers, then we can
assume a real security gain.

  But chances are, you are exchanging email with other servers.  That means
your ISP, their ISP, *their* ISP, their peer, their transit provider, the
other guy's ISP's upstreams, the other guy's ISP, the other guy's mail
server operator, maybe the other guy's IT staff, employees, ex-employees,
ex-girlfriend, the hacker who has "0wned" the other guy's mail server, the
software company that wrote the other guy's mail server's OS, the NSA, FBI,
CIA, IBM, AT&T, and the Free Masons could all be reading your mail, for all
we know.  Oh, and maybe Google, too.

  Gmail seems to have highlighted the fact that we put a lot of trust in the
hands of Internet operators.  The thing I don't understand is why people are
not willing to trust Google, but *are* willing to trust all those other
elements.

  It's not that I think Google is particularly trustworthy.  It's that I
don't think anyone else is, either.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Auth/system-auth & POP3 daemon

2004-08-24 Thread bscott
On Tue, 24 Aug 2004, at 2:39pm, [EMAIL PROTECTED] wrote:
> Exactly. But... Why would it work fine over one interface but time out on
> the other?  xinetd is not bound to any specific interface.

  I doubt it has anything to do with the interfaces involved, but rather,
the networks (and firewalls and routers and filters (Oh my!) between you and
the other system.

  Let's say your server is named Giant and your client is named Tiny.

  You see, nominally, if Tiny does not support AUTH (i.e., Tiny is not
running identd or an equivalent), then there will be nothing listening on
TCP port 113 on Tiny.  If xinetd on Giant sends an AUTH request to Tiny,
then Tiny will respond with an ICMP "Destination Port Unreachable" message.  
xinetd on Giant then knows that it is not going to get an AUTH response, and
continues without the username.

  But suppose Tiny is out in the great big world.  Any number of ISP
routers, home NAT boxes, corporate firewalls, or network gremlins may drop
the AUTH request, or drop the ICMP "Destination Port Unreachable" response.  
(There are a lot of IWFs who think ICMP is a hacking tool.  *sigh*)

  So now, when Giant sends an AUTH request to Tiny, it gets... nothing...  
back.  So xinetd on Giant has to sit there for 30 seconds (or whatever),
until it times out, and assumes it is never going to get a response, one way
or the other.

On Tue, 24 Aug 2004, at 2:55pm, [EMAIL PROTECTED] wrote:
> Now the only possible setting I know of that might do this is (from
> /etc/xinetd.d/ipop3):
>
>  log_on_success  += USERID
>
> Could this be it?

  Absolutely.

> If so, how can I continue to log the userid without the auth request?

  xinetd cannot log the user ID without AUTH.  However, chances are, xinetd
will not be able to log the user ID even *with* AUTH.  Most systems don't
support AUTH these days.  Even if they did support it, AUTH is *completely*
untrustworthy.  All it does is ask the other system "Who are you?" and take
whatever the other system says as law.  You might as well just filter the
evil bit in your routers (see RFC-3514).

  So, basically, forget about xinetd logging the user ID.

  Your POP3 daemon, however, presumably requires a username and password.  
Those are much harder to fake.  I expect your POP3 daemon logs whatever
details about user authentication it gets.  So don't worry about xinetd
logging the user ID anyway; it's the wrong tool for that job.

  Of course, ordinary POP3 is still clear-text, meaning the
username/password are easily sniffed, and most email is hideously insecure
anyway.  But hey, you have to start somewhere.  :)

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Cannot receive broadcast,why?

2004-08-24 Thread bscott
On Wed, 25 Aug 2004, at 3:20am, [EMAIL PROTECTED] wrote:
> My system is redhat9. It cannot receive broadcast packages, I am sure the
> broadcast server send packages.

  I assume you mean "packets" and not "packages".

  What is happening (or not happening) that tells you your computer is not
receiving broadcast packets?

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Auth/system-auth & POP3 daemon

2004-08-24 Thread bscott
On Tue, 24 Aug 2004, at 9:18am, [EMAIL PROTECTED] wrote:
> You want to disable the identd service. 

  That isn't going to help at all.  The OP's system is *sending* AUTH
requests; identd only *responds* to ident requests.  Turning off his identd
isn't going to stop his box from sending requests (and waiting for
responses).

  :-)

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Auth/system-auth & POP3 daemon

2004-08-24 Thread bscott
On Tue, 24 Aug 2004, at 12:43am, [EMAIL PROTECTED] wrote:
> I'm beginning to wonder if the identd service is somehow sending the
> request to the client to identify itself to 10.x.x.x.

  AFAIK, identd doesn't initiate requests, it only responds to them.  I
expect either xinetd or the POP3 server you're using is sending the identd
request to the client system, not getting an answer, and timing out after 30
seconds.  I know xinetd can be configured to do this (see xinetd.conf(5)  
manpage).

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |



___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Connecting OO to a remote MySQL server

2004-08-23 Thread bscott
On 23 Aug 2004, at 9:36pm, [EMAIL PROTECTED] wrote:
> Yet another thing that the Linux community needs to fix. 

  s/Linux community/IT world/

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Connecting OO to a remote MySQL server

2004-08-23 Thread bscott
On 22 Aug 2004, at 8:49pm, [EMAIL PROTECTED] wrote:
>> (Yes, I have the appropriate .jar files in my ClassPath under the OO
>> Security setting).
> 
> I had a semi-colon instead of a colon in the classpath. Sigh.

  One of the laws in one of those "Laws of Public Forums" lists is that you
will only notice your obvious mistake immediately *after* you post about it.

  :-)

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: (New) GNU User Group

2004-08-22 Thread bscott
On Sun, 22 Aug 2004, at 2:11am, [EMAIL PROTECTED] wrote:
> I wish I could put more time into this announcement to explain the hows
> whats whys etc.

  FWIW: One thing trying to help GNHLUG has taught me is that the that the
organization and administration is the critical part, and the hard part,
about being a user group.  GNHLUG has web sites, mailing lists, even regular
meetings, but it is still currently suffering from a lack of cohesion and
direction, due mostly to a scarcity of free time.  As you note on your home
page, the people are the important part.  Something to keep in mind in your
own endeavors.

  On a more positive note, I'm pleased to see an effort to form a group
around local interest in Free Software, and I like the direction you're
taking the web site.  Creating a web resource for Linux and Free Software
users was one of the things I was trying to create when I took over
maintenance of www.gnhlug.org last year.

  Props for the creative name, too.  :)

> I *have* launched a website:  http://www.nbptgnus.org.

  FYI: That site took at least twenty seconds to come up for me (I'm on
cable right now), and has a broken image on the home page.  I dunno if you
know and expected that, or if something is really borken, so I figured I'd
mention it.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Email security (was: Gmail..)

2004-08-22 Thread bscott
On Sat, 21 Aug 2004, at 7:05pm, [EMAIL PROTECTED] wrote:
> I've been waffling (heh, sorry) on whether or not I'm willing to trust to
> Gmail, but I'll never know unless I try (for my least sensitive mail, at
> least).

  If you're sending sensitive email unencrpted, you're already in trouble
And you should know better, too.  :)

  Public Service Messagge: Internet email is just about exactly as secure as
a conventional post card.  Don't send anything in (unprotected) email you
wouldn't feel comfortable putting on a post card.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Security esoterica (was: wipe utility)

2004-08-17 Thread bscott
On Wed, 18 Aug 2004, at 11:51am, [EMAIL PROTECTED] wrote:
> On Tue, Aug 17, 2004 at 09:58:31PM -0400, [EMAIL PROTECTED] wrote:
>>   Most important of all, in order to make use of data in a filesystem
>> journal, you basically need to assume the attacker has achieved full root
>> compromise of your system.  
> 
> Or have gained physical access to the hard disk ...

  I was including that in "full root compromise".  :-)

> If the data were valuable to others in some way, it might even be worth
> breaking into your home for.

  Absolutely.  That's why I tell people that physical security always has to
come first.  It's amazing how many places have *literal* security holes.

>> If you were really serious, you would start by never connecting a system
>> containing sensitive information to a public network like the Internet.
> 
> For mere mortals with financial and logistical constraints, that's not
> always an option.

  Well, it all depends.  As far as capital costs go, with a removable hard
drive carrier, you could achieve this for less then $100.  I certainly
agree, though, that it's likely overkill for most personal users.

> Managing IA is about managing risks, but it's also about managing costs...

  Even more: They are the same thing.  Two sides of the same coin, as the
saying goes.  In the end, just about every decision comes down to one
question: Is it worth it?  (It's determining the inputs to that function
that make life so interesting.  :-) )

>> You physically secure the whole computer.  It's called "system high".
> 
> Really?  I've never heard that term before.  Have any links?

  Well, really, I'm abusing the term slightly.  What it *really* means is
that everyone who has access to the computer is cleared to have access for
all the information on the computer.  The most common way a system-high
configuration is achieved is to physically secure the whole thing.  Crude,
but very effective.

  The term comes from the classic NSA "Rainbow Series" on "Trusted Computer
Systems".  You can find the formal definition here:

http://www.fas.org/irp/nsa/rainbow/tg004.htm

Look under the entry for "modes of operation".

  The Rainbow books, despite their age, remain a very good resource for
people in the IA field.  The NSA, mission objectives aside, know what they
are doing.

  One thing I always liked about the NSA's policies in particular is that
they state and require that products alone *are not considered trusted*.  
Only an entire system (equipment, software, personnel and procedures) can be
certified as a trusted system.  That's still a rare attitude in the business
world.

> Well, IIRC, the best encryption that Linux can do to a partition is AES
> 256.

  A 256-bit symmetric AES cipher is considered extremely strong by today's
standards, provided it is used properly (e.g., the secret is truly random;
the cipher is cycled with each data block; the secret is adequately
protected; etc.).  I haven't seen any analysis, one way or the other, on
what's built-in to the Linux kernel.  But then, I haven't looked for any,
either.  :-)

> Do you think NSA can't crack AES 256?

  Well, some of the best minds in the world think it isn't feasible with
today's technology.  Of course, the NSA might have some kind of incredible
breakthrough algorithm or something.  Like that black box from the movie
"Sneakers", for example.  :)

  To answer the question: I don't know if the NSA can crack AES 256.  But I
do know that if they can, then nothing we do, short of absolute physical
security, will keep them out.

  So I run through the managed risk routine.  I believe it is a threat with
very low probability, and counter-measures have a very high cost.  I thus
conclude that the counter-measures are not justified.

> If you need to be certain, a dead-man timer may have value.

  Well, again, it's all about managed risk.  "Certain"  means different
things to different people.  In some circles, "certain"  means assets are
protected by 24-hour TPC (two party control) teams, and equipped with "rapid
destruction mechanisms" that can be triggered in the event of "imminent
compromise by hostile forces".  That's about as certain as you can get, I
think.

  Dead man timers don't give you certainty, though.  If you're compromised
before the dead man timer expires, you're hosed.  And if you miss the timer
reset, you're hosed.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Can't boot from Core 2 CD

2004-08-17 Thread bscott
On Wed, 18 Aug 2004, at 12:05pm, [EMAIL PROTECTED] wrote:
>>> dd if=/dev/cdrom of=FC2-i386-disc1B.iso
>> 
>>   In my experience, that does not work right.  Use
> 
> Interesting.  I've used exactly that approach a number of times recently,
> and had no troubles.  Perhaps the difference is bad sectors on the disc,
> or other copy protection mechanisms that dd doesn't handle well.

  I'm pretty sure it has something to do with esoteric features of the
various Compact Disc specifications.  CDs can have multiple sessions, each
with multiple tracks.  An ISO-9660 filesystem can have multiple namespaces,
and there does not have to be a one-to-one match of every file in every
namespace.  Plus the whole boot catalog thing, which is "outside" the
"regular" ISO-9660 filesystem, but still part of it.  How the heck do you
present that as a single

/dev/cdrom

device?  :-)

  I know it's made a difference with Red Hat Linux CDs (back when there
*was* a Red Hat Linux) made from MD5-verified images, so it isn't a copy
protection thing.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Can't boot from Core 2 CD

2004-08-17 Thread bscott
On Tue, 17 Aug 2004, at 10:15am, [EMAIL PROTECTED] wrote:
> The file i downloaded was FC2-i386-disc1.iso and then I sucked it back out
> of the cd using
>   
> dd if=/dev/cdrom of=FC2-i386-disc1B.iso

  In my experience, that does not work right.  Use

readcd dev=/dev/sgcdrom f=cdimage.iso

instead (where "/dev/sgcdrom" is the SCSI generic device for your CD-ROM
drive).

  Also, use the "-dao" switch to "cdrecord" when recording in the first 
place.  Someone else on this list gave me that tip, and it does appear to 
create a more "exact" burn of the original image.

  Of course, IME, when I had trouble doing a read-and-compare of CDs I 
burned, the discs generally still worked fine.  So I'm not sure how much it 
matters.  But it certainly can't hurt.

  Another compare trick I use is:

mount -o loop -r /path/to/original/cdimage.iso /mnt/image
diff -qr /mnt/image /mnt/cdrom

That will at least verify everything in the regular filesystem is a match.  
Of course, your problem appears to be with the boot catalog, which is
"outside" the regular filesystem.  :-/

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: MS Exchange Server competition

2004-08-17 Thread bscott
On Tue, 17 Aug 2004, at 1:03am, [EMAIL PROTECTED] wrote:
> And one more link that seems to be the most comprehensive, most up-to-date
> on the subject
> 
> http://www.linuxmafia.com/faq/Mail/groupware.html

  Hm.  Some of that stuff appears *very* interesting.  I also see why I
never found some of this before; everybody I talked to kept trying to sell
me a server first, and never mentioned client-side support.

On Tue, 17 Aug 2004, at 12:57am, [EMAIL PROTECTED] wrote:
> Hey, where you've been?  You must have just come back from vacation or 
> something and had a massive jones to post.  All of a sudden I see you 
> posting on every thread for the last week.  ;-)

  Actually, I've just been incredibly busy.  And I figured replying to
messages more then a week old would just confuse matters more.  :)

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |


___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: GRUB and two HDs

2004-08-17 Thread bscott
On Tue, 17 Aug 2004, at 10:51am, [EMAIL PROTECTED] wrote:
> Unfortunately, this only works if both drives are in the system. If
> there's only the built-in drive, it boot to greet me with "GRUB " and a
> blinking cursor. I had expected that I still would have seen the menu, but
> only the Windows option would have worked. So, grub has only inserted a
> loader into the MBR, and still needs to read the menu from the second
> drive?

  GRUB has multiple stages.  Stage 1 typically lives in the MBR.  Stage 1
has just enough marbles to find a larger stage, load it, and jump to it.  
In many cases, that larger stage will be stage 2.  Stage 2 is the main GRUB
program, which gives you the menu, CLI, and boot loader functions.  You may
also have a stage 1.5, which gets used when more marbles then stage 1 has
are needed before stage 2 can be loaded.

  In most Linux distros, stage 2 is in /boot/grub/ on either the root
partition, or a special partition just for /boot/.  For you, that would be
on the second physical disk.  So when you remove it, there is no stage 2 to
load.

  LILO works pretty much the same way, BTW.  There's just less of it to load
in stage 2.  If you've ever seen LILO die after printing just "LI", that
means it failed to find and load LILO's stage 2.

  I think other people have given you some good options.  I suspect the
option that uses the NT boot loader to chain to GRUB is best.

  Another option, if GRUB supports it, is to install GRUB into your NTFS
partition on the first disk.  I kinda doubt GRUB supports that, though.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |




___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: CDROM question

2004-08-17 Thread bscott
On Tue, 17 Aug 2004, at 7:24am, [EMAIL PROTECTED] wrote:
> Nothing exciting - just a backup program.  In a given week, I accumulate
> about 10-15 CD's worth of data that needs to be backed up and the company
> is too cheap to go with tape.

  Penny wise, pound foolish.  But I'm sure I'm preaching to the choir.

  You might look into DVD recorders, though.  They're pretty cheap, and at
least you can stuff more data onto a single disc.

> I'm just trying to write the application to be friendly enough that I
> don't really have to engage my brain at all to perform the backups - the
> friendly little program tells me everything I need to do.

  Well, as far as *that* goes, I imagine you could make most of it happen
just by using the "eject" command.  It even has an option (-t) to close an
open tray.

  About the only tricky part is checking for the existence of media.  Aside
from that "dd" hack I posted before, the "cdrecord" command has a number of
options that may be useful.  The "-toc" and "-atip" switches, in particular,
can give you details about media.  The only problem is, they also cause any
open CD tray to close.  At least, they do on my Plextor and Yamaha SCSI
CD-RW drives.

  I'm pretty sure there's a SCSI command that will test if a drive tray is
open or closed, but I suspect you'd have to write some custom code to
actually make use of it.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Slightly-Offtopic - Networking audit question

2004-08-17 Thread bscott
On Tue, 17 Aug 2004, at 7:38pm, [EMAIL PROTECTED] wrote:
> I can't really go portscanning/pinging the crap out of the network ... We
> had a couple customers say that they would leave if we did it again, even
> if it was a planned event and announced.

  IWF detected.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: wipe utility

2004-08-17 Thread bscott

  WARNING: This message deals with Information Assurance (IA) topics.  IA is
a harsh field.  There is no room for hurt feelings here.  If you prefer not
to have personal opinions challenged, stop reading now.

On Tue, 17 Aug 2004, at 7:13pm, [EMAIL PROTECTED] wrote:
> All joking aside, the *actual* threat can be hard to assess at times ...

  Absolutely.
 
> ... so one sometimes must make "paranoid" or worst case scenario
> decisions.

  Sure.

> Some minimal approaches such as not using journaled filesystems on
> sensitive data may not be perfect, but at least I sleep a bit better at
> night.

  Here's where I think you're going wrong.

  I think all you're buying yourself a false sense of security.

  First, there's comparative vulnerability assessment.  Of all the things one
could worry about, worrying about data being recovered from a filesystem
journal is a bit like worrying about the lock on a medicine cabinet on the
Titanic.

  Information assurance also includes more then just confidentiality;  
availability and integrity is also key.  Journaling filesystems help
protect that.

  Most important of all, in order to make use of data in a filesystem
journal, you basically need to assume the attacker has achieved full root
compromise of your system.  At that point, you're pretty much fscked, no
matter what.  They could just as easily modify your kernel to divert a copy
of everything you do to their system, with you none the wiser.

  So, sure, if it gives you a warm fuzzy, go right ahead with the
"non-journaling filesystems are safer" idea.  Wear a tin-foil hat, too.  
You never know -- there might really *be* secret government mind-control
satellites.  :-)

> If I were really serious, I'd set up an encrypted partition with a running
> cron job that expected a response from me every so often, and if it didn't
> get that it would shred the partition along with the private keys.

  If you were really serious, you would start by never connecting a system
containing sensitive information to a public network like the Internet.  
You physically secure the whole computer.  It's called "system high".

  Another valid technique is to encrypt data using a long asymmetric key
kept on removable media, and protected with a strong pass-phrase.  
Decryption is to volatile storage only (i.e., RAM).  This achieves much
better confidentiality then any automated system that has access to the
secret keys, and also achieves much better availability, as forgetting to
reset the deadman timer won't destroy anything.

  Deadman timers are usually a sign of an amateur.  Real systems are secure
regardless of how long they sit idle.

> Some hard drives, btw, do come with their own security shredding abilities
> built in.

  I haven't seen that.  I'm interested.  Got any links?

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: rant on pathetic example of Microsoft FUD

2004-08-17 Thread bscott
On Tue, 17 Aug 2004, at 7:01pm, [EMAIL PROTECTED] wrote:
>> Alas, human-friendly HTML is becoming rarer and rarer everyday.  These
>> days, it almost seems like HTML is seen more like program output (like
>> object code) then something you can actually design and write yourself.
> 
> Tell that to my daughter. She prefers to crank out HTML by hand ...

  Me too.  I strongly suspect we're a tiny minority.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: MS Exchange Server competition

2004-08-17 Thread bscott
On Tue, 17 Aug 2004, at 8:20am, [EMAIL PROTECTED] wrote:
>> Do either support MAPI?  That is, do they provide seamless Microsoft
>> Outlook integration?
> 
> What does MAPI give an end-user ...

  MAPI stands for "Messaging Application Programming Interface".  In typical
Microsoft fashion, it can mean a couple different things.

  One is the wire protocol the Exchange client modules in Outlook use to
talk to the Exchange server's Information Store.  That I'm not really
interested in.

  The other thing MAPI can mean is the API that Outlook provides for storage
and services.  Basically, everything in Outlook -- contacts, calendar, mail,
tasks, etc. -- use MAPI to actually store stuff.  The details I'm a little
fuzzy on.  But if you have a back-end that supports MAPI, then Outlook will
work "just like it does with Exchange", at least for all the client-side
stuff.  (You don't get Event Sinks, Forms, or any of the other fancy
server-side stuff Exchange has, but most people don't use that.)

  While we have used Outlook with IMAP with some success, it is far from
perfect.  It is mail only.  Contacts, calendar, and so on are still stored
in a .PST file on each workstation.  (PST is a self-destructing file format
that even Microsoft Exchange fans hate.)  Outlook also insists on putting
"Sent Items" and "Drafts" in the PST file, which means they are not
available via IMAP.  There's no shared calendar or contact list, which a
lot of organizations *do* want.

  Of course, you can pretty much everything most small organizations need
with a combination of Outlook or Outlook Express, IMAP, phpGroupWare,
SquirrelMail, and so on.  It works pretty well, but it lacks the
"all-in-one" package of Outlook and Exchange.  Right or wrong, a lot of
people are willing to pay big bucks for Windows and Exchange just so they
can get that.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: MS Exchange Server competition

2004-08-16 Thread bscott
On Mon, 16 Aug 2004, at 9:18pm, [EMAIL PROTECTED] wrote:
> I recently did an investigation for a client of Linux based alternatives
> to Exchange. I found two that were very good at providing full blown
> Exchange capabilities and compatibility.

  Do either support MAPI?  That is, do they provide seamless Microsoft
Outlook integration?  Not just IMAP mail (which Outlooks has limits with
anyway), but contacts, calendar -- the whole Outlook store.  Right or wrong,
that's what a lot of people want.

  Based on a cursory examination, it would appear Bynari's stuff does not.  
OpenExchange is kinda fuzzy on the details of their "Outlook Connection",
but screen shots of Outlook are conspicuous by their absence.

> My primary beef with [SuSE OpenExchange] is the cost. For small shops the
> cost, while cheaper than Exchange by 1/2 to 1/3 less, is still
> substantial.

  That doesn't concern me so much.  The issue I usually face is that people
want the kind of Outlook integration that Exchange provides, but I would
like to be using a Linux server.  Since nothing on Linux I know of can meet
their needs, we go with Windows instead.

  The only product I've found that does MAPI that runs on Linux is Samsung
Contact (formerly HP OpenMail), and Samsung won't talk to you unless you're
buying 500 or more seats.

  Again, I can do things like IMAP and LDAP in Outlook, and web-based
systems for the rest, right now, for free.  Spending more to get the same
doesn't make sense.  I'm willing to spend more to get more, but I want to
see that I'm actually getting more.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |


___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Can't boot from Core 2 CD

2004-08-16 Thread bscott
On Mon, 16 Aug 2004, at 10:56pm, [EMAIL PROTECTED] wrote:
>> It's unclear from your message how far it gets before it "stops dead".  
>> Does it display any messages at all?
> 
> Absolutely zip. The screen stops dead black as soon as I hit return.

  Wow.  That's really weird.  At that point, everything should still be
using BIOS calls; Linux technically hasn't entered the picture yet.  In
fact, the system should basically think it's running from a floppy disk
(emulated by the CD).

  I'd check BIOS settings, both in the motherboard BIOS, and in the SCSI
host adapter.  Check for firmware updates from the manufacturers for both,
too.

  I'd also try using an old-fashioned floppy disk to boot the system, to see
if that makes a difference.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |


___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: wipe utility

2004-08-16 Thread bscott
On Mon, 16 Aug 2004, at 8:33pm, [EMAIL PROTECTED] wrote:
>> The US DoD says that "Secret" and higher level classified data cannot be
>> sanitized off of a hard disk by software alone ...
> 
> That is simply not true. DoD does allow for software only sanitization of
> hard disks for data classified at the secret level under some conditions.
> 
> http://www.dss.mil/infoas/index.htm
> 
> Right site bar has Assessed Products list.

  That link didn't really shed any light on the subject; as you note, most
of it is access-controlled.  It doesn't really matter.  My point was to
illustrate that risk management means making intelligent decisions about
assets, threats, vulnerabilities, and counter-measures.  Not unreasoning
fear of journaled filesystems.  :-)

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: CDROM question

2004-08-16 Thread bscott
On Mon, 9 Aug 2004, at 3:54pm, [EMAIL PROTECTED] wrote:
> A) If a given cdrom drive is open or closed?

  I think this will be drive, and maybe bus, dependent.  Some drives don't
even have a tray, come to think of it.  I've got a slot-load, SCSI bus,
CD/DVD reader on my PC here at home.

> B) If there is a disc in the drive?

  Well, something like this might work:

if dd if=/dev/cdrom of=/dev/null bs=1 count=1 ; then
# something readable is there
else
# could not read disc
fi

The 'dd' command will fail with a "No medium found" error if no disc is 
loaded.

  Of course, there are other reasons you might not be able to read the
device besides no being loaded.  Permissions; blank CD-R/CD-RW; non-data
disc; etc.

> If the answer is that I have to try mounting the CD, etc, etc, it's more
> work than it's worth.  This isn't a big deal, I was mostly just curious.

  Okay, well, now I'm curious: What's your application?

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: rant on pathetic example of Microsoft FUD

2004-08-16 Thread bscott
On Sat, 14 Aug 2004, at 1:07am, [EMAIL PROTECTED] wrote:
> I was developing a CD-ROM product which contains multiple Microsoft 
> PowerPointless (tm) presentations.

  You might as well give up on any hope of doing anything
standards-compliant right there.  :-/

  Pedantic clarification: This isn't FUD (Fear, Uncertainty, Doubt).  It is
EEE (Embrace, Extend, Extinguish).  The former scares people who are
considering using non-Microsoft option.  The later turns non-Microsoft
options into Microsoft products.

> Microsoft PowerPoint's idea of HTML is not anything you would recognize
> surfing the web and 'viewing source'.

  Alas, human-friendly HTML is becoming rarer and rarer everyday.  These
days, it almost seems like HTML is seen more like program output (like
object code) then something you can actually design and write yourself.

> [HTML is a] perfectly standardized and specified language.

  Hah!  I think that lasted for about a week after WorldWideWeb was
released.  Mosaic and Netscape left a grand tradition of inventing their
very own flavor of HTML.  Indeed, it was Microsoft's object model that was
chosen by the W3C, and not Netscape's, for HTML 4.0.  Remember, it was
Netscape who brought us the BLINK tag.

  (Not defending Microsoft; rather, pointing out that there are many guilty
parties here.)

> This strange tongue seems to have been originated by a multi-billionaire
> cult leader from Redmond, WA.  His followers have unwittingly or through
> no intelligence of their own spread this Word to the far reaches of the
> planet.

  Now *that's* funny!  May I quote you?

> [Microsoft's programs] also generate a crateful of JavaScript, including a
> browser-detection routine that basically says:
> 
>  "You're not using Microsoft Internet Explorer.  This page may
>  contain features unsupported by your browser.  Do you wish to
>  continue?"

  This is a long-standing Microsoft technique.  Microsoft once added code to
Hotmail that blocked non-IE browsers, only to take it down a bit latter,
saying it was a "mistake".  Sections of Microsoft's technical web pages have
things like tree menus that are perfectly standard HTML and JavaScript
(well, as standard as JavaScript can get), but have an explicit check to
disable them on non-Microsoft browsers.  Going back further, there was that
infamous check in Windows 3.mumble that aborted the load if it found you
were running DR-DOS.

  "DOS ain't done 'till Lotus won't run!"

> I call this whole thing pathetic because it is exactly opposite of what
> their customer needs or wants.

  For-profit companies do what generates the most profit.  That may or may
not be what their customer needs or wants.

> Why don't they create a converter that says ...

  Because that would reduce their vendor lock-in leverage?

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Site defaced - what next?

2004-08-16 Thread bscott
On Sun, 8 Aug 2004, at 12:10pm, [EMAIL PROTECTED] wrote:
> *The cast of attackers*
> Saudi Arabia - the cracker who defaced my site was
> from Saudi Arabia (e.g. cache3-2.jed.isu.net.sa).  As soon as he put up a
> new homepage for me, he obviously told a friend (cache7-4.ruh.isu.net.sa),
> who visited the site moments later.

  Correction: The connection(s) which carried the attacks originated from
those servers.  That is all you can say for sure.

  From the name, we can suppose they are caching proxy servers.  A huge
problem on the Internet today is that attackers relay their attacks through
third-party proxy servers.  It is entirely possible that the attacker is 
somewhere else entirely, and was using those servers for cover.  Indeed, 
that "friend" might have just been an alternate route for the same attacker.

  Of course, it is equally possible that the attacker was a "legitimate
user" (I use the phrase loosely) of those proxy servers.  We have no way of
knowing for sure without getting in touch with the operator(s) of those
servers.  (And maybe not even then.)

  This is why I don't get excited about random probes (of the type mentioned
in another recent thread here).  They're practically at the level of
continuous background noise at this point, and they are generally nearly
impossible to trace.  Keep your system secure, and someone checking the
handle to see if you locked the door won't matter.

  Of course, that doesn't help when your system is found to be not secure,
as you have discovered, Greg.  :-/ You have my sympathy.  It can happen even
if you do everything you should, and most of us (myself included) don't even
do everything we know we should.

> Google -helps script kiddies find my exploitable file phpexplorer.  I 
> didn't put this script on my server, and I don't know how Google found 
> it.  All I can tell you from my server logs is that people are searching 
> for this script and my site comes at the top of the list.

  It is possible that the details of your compromised server were disclosed
by the attacker(s), and that information was then picked up by Google.

  Another possibility is web logs.  Are you web logs available to anyone who
happens to know the right URL?  If so, it is amazing how easy it is for that
information to get caught by a spider.  From there, the situation becomes a
positive feedback loop.

  Don't forget that your system may have been compromised long before your
web site was defaced.  (Cheery thought, I know.)

> Of course some people think I should just be quiet about it because the
> fact that my site was compromised could make me look bad.

  Not that I think you're serious in that statement, but worth pointing out
anyway: As you have discovered, information, once disclosed, tends to be
very hard to control.
 
-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Topic (was: Site defaced - what next?)

2004-08-16 Thread bscott
On Tue, 10 Aug 2004, at 11:29pm, [EMAIL PROTECTED] wrote:
> These factors combine to ensure that political topics will be discussed on
> Linux-related mailing lists.

  While true, we also hope to keep the noise level sufficiently low that it
doesn't overwhelm the signal.  GNHLUG's primary focus is Linux and Free
Software.  GNHLUG exists because you cannot find a forum for that focus
elsewhere.  You can, however, find an (over)abundance of political forums
elsewhere.  While political discussions are by no means always inappropriate
here, they may sometimes be more appropriate elsewhere.

  As someone here said, policing ourselves is the way to go.  I suggest to
everyone that the next time you feel like adding to a thread that really
might better belong elsewhere, that you take it elsewhere instead.  It's the
responsible thing to do.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |



___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: MS Exchange Server competition

2004-08-16 Thread bscott
On Fri, 13 Aug 2004, at 11:30pm, [EMAIL PROTECTED] wrote:
> People are often looking for Linux work-alikes for MS Exchange Server.  
> Novell just announced that they are making SUSE OpenExchange GPL.

  Last I looked (which was admittedly some time ago), OpenExchange was
nothing more then an IMAP server bolted on to a glorified web calendar.  
While a useful product, about all it had in common with Microsoft Exchange
was the word "Exchange" in the name.  More importantly, you could get the
same thing for free with any IMAP server and phpGroupWare.  So OpenExchange
always struck me as more of a marketing effort then a unique product.  
That's a valid business technique, of course.  It works for Microsoft, after
all.

  But, IMO, releasing OpenExchange as GPL isn't such a big deal, from a
technical stand-point.  I find it far more interesting that *Novell* -- the
same company that used to threaten legal action for reverse-engineering
their protocols and data structures -- is releasing major products under the
GPL.

> Also, there is a project called OpenGroupware which is GPL
> http://opengroupware.org/en/users/faq/index.html

  Also these:

  - http://www.phpgroupware.org 
  - http://www.phprojekt.com/ 

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: wipe utility

2004-08-16 Thread bscott
On Fri, 13 Aug 2004, at 12:53pm, [EMAIL PROTECTED] wrote:
> I keep my /tmp partition as ext2 for that sole reason. Anything sensitive
> goes there, and I can shred it afterwards.

  Just to tweak the paranoid a bit further: The US DoD says that "Secret"  
and higher level classified data cannot be sanitized off of a hard disk by
software alone, as most hard disks automatically copy-and-remap degraded
sectors before the host OS even sees them, so parts of the disk could still
contain the data.  Only physical methods are sufficient.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Lost my partition table - can I recover?

2004-08-16 Thread bscott

  I saw that you already decided to go ahead with the restore from tape
(often the best call in that kind of situation), but I figured this might be
useful to know anyway, so:

On Thu, 5 Aug 2004, at 9:38am, [EMAIL PROTECTED] wrote:
> My situation: I have an HP server with two hot-swap SCSI drive bays. It's
> got a RAID controller in it ...

  I know some of HP's RAID controllers are just re-badged AMI (now LSI)
MegaRAID controllers.  So are some of Dell's.  Nice cards, really.

  The MegaRAID line presents logical drives (LDs) to the OS.  It builds LDs
out of physical disks (PDs).  The OS doesn't know about the physical disks;  
it just sees one big logical unit.  The controller does whatever is needed
(striping/mirroring/parity/etc) to turn your PDs into LDs.

  The controller keeps configuration information in NVRAM and on disk.  
When you deleted the LD, it wrote that fact to NVRAM and disk.  That means
no more LD for the OS to see.

  In theory, if you re-create the LD with the *exact same parameters* that
it had before, the contents of the LD will still be there.  Things get a bit
tricky, depending on the RAID level you use, the firmware rev you have, and
the type of RAID array (e.g., a RAID-1 mirror member looks just like a
regular disk in most respects, but a RAID-5 array will be totally
scrambled).  But it can work.  It's not guaranteed, of course, but I have
done it before.

> I am certain that all that's happened is the RAID controller re-wrote a
> new partition table with no partitions.

  Not exactly a partition table.  The RAID configuration information lives
"outside" the LD the OS normally sees.  I think it is kept at the end of
each PD, although I'm not sure on that.  The OS then puts a partition table
inside the LD.  If the LD-recreate trick described above works, then your 
partition table will re-appear, along with everything else that used to be in 
the LD.

> Can I recover from this without having to do a reinstall? This is, ahem, a
> time-critical problem. :( :( :(

  866-NTI-LINUX, $95/hour is our regular rate.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: rant on pathetic example of Microsoft FUD

2004-08-16 Thread bscott
On Sun, 15 Aug 2004, at 12:19am, [EMAIL PROTECTED] wrote:
> Please take the time to trim quoted material from your posts.

On Sun, 15 Aug 2004, at 12:19am, [EMAIL PROTECTED] wrote:
> Please take the time to trim quoted material from your posts.

  Please take the time to trim duplicated list-posting addresses from your
posts.  We already read your response; we didn't need to see the whole thing
again, verbatim.

  ;-)

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Rockingham Park and the Northern Computer Shows: Sept. 28th (sic)

2004-08-16 Thread bscott
On Sun, 15 Aug 2004, at 1:09am, [EMAIL PROTECTED] wrote:
> AND the two tables will cost $200 + $10. for electricity.a lot more
> expensive than Hoss Traders.  (sigh)

  This concerns me more then the morning.  Not that I'm a morning person by
any stretch of the imagination, but I can do it if I have to.  But I'm not
sure it's worth $210 just to go there and tell people they should use Linux.  
Most people at those shows just want to buy stuff cheap.  It doesn't strike
me as a good environment for education/evangelism.

  Of course, I'm a pessimist, so maybe listening to me isn't a good idea.  
In fact, it probably isn't.  (Did I mention I'm a pessimist?  :-)  )

  If you do decide you want to go through with it, and could use another
warm body, I'll still be happy to volunteer.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Can't boot from Core 2 CD

2004-08-16 Thread bscott
On Mon, 16 Aug 2004, at 4:46pm, [EMAIL PROTECTED] wrote:
> Does anyone have any idea how I can debug this problem? I can boot from
> other CDs, but FC2 just stops dead.

  It's unclear from your message how far it gets before it "stops dead".  
Does it display any messages at all?

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: UPS recommendations wanted

2004-08-16 Thread bscott
On Mon, 16 Aug 2004, at 3:24pm, [EMAIL PROTECTED] wrote:
> I've used APC SMART-UPS 1400 at a few installations with NUT and it's
> worked properly.  I haven't specified them, they just seem to be popular -
> I think it's the biggest 120V unit they make in that model range.

  FYI: The Smart-UPS 1400 is discontinued.  The similar Smart-UPS 1500
provides 120 volt out with a 120 volt, 15 amp input -- what the "regular
outlets" most people in the US are familiar with provide (NEMA 5-15).  
That's the largest current Smart-UPS that uses a NEMA 5-15 input.  Larger
models can still take a 120 volt input, but require 20 or 30 amp circuit
("funny outlets").

> I'd be surprised if there is different firmware on different capacities
> within the SMART-UPS line, but I'm no APC expert.

  All the current Smart-UPS units provide similar communications features.  
Some of the really old units have more limited functions, but unless the
unit is 8+ years old, that won't matter.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: UPS recommendations wanted

2004-08-16 Thread bscott
On Mon, 16 Aug 2004, at 11:11am, [EMAIL PROTECTED] wrote:
> Is anyone willing to comment on their experiences with specific UPSes with
> Linux?

  In my opinion, you can't go wrong with APC's Smart-UPS, Matrix, and
Symmetra lines.  They may not be the cheapest, but they always work, and
well.  Any Smart-UPS will work with apcupsd, NUT, and/or APC's own
PowerChute tools on Linux.  The current PowerChute stuff is agent only on
Linux (needs Windoze for GUI), but I've still got a copy of PowerChute for
X11 that works fine if that's what one whats.  apcupsd works fine
everywhere, of course.  I haven't played with NUT much, because apcupsd did
what I needed, but I understand the results are similar.

> I'm sure some of you will say things depend on how I'm going to use it.  
> Well, initially like to buy an inexpensive one to use at home with RH8 and
> get familiar with apcupsd and NUT.

  Well, the Smart-UPS 420 (the smallest model APC offers) lists for $180,
which may or may not be too much for your budget for simple experimentation.

  APC's Back-UPS line also works with apcupsd, at least for the few models
I've tried.  The Back-UPS line only supports "simple signaling" --
basically, an indication that the UPS is running on battery.  The Smart-UPS
and fancier lines support "smart signaling", which provide two-communication
and data reporting (temperature, voltage, etc.).

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Google gives into the DMCA?

2004-07-30 Thread bscott
On Fri, 30 Jul 2004, at 12:46pm, [EMAIL PROTECTED] wrote:
> When I search for Kazza Lite Download, for non-illeageal reasons, of
> course, I get this at the bottom of the page ... [DMCA stuff removed]

  Yah, Google has been doing this for awhile.  The DMCA says they have to,
and Google's not about to open themselves up to lawsuit city by trying to
fight it.  I believe one of the first groups to hit Google under the DMCA
was the Church of Scientology, back in 2002.

  "Here in America, we have the best government money can buy!"
  
-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: This monday: Webmin, Gentoo

2004-07-30 Thread bscott
On Thu, 29 Jul 2004, at 10:48pm, [EMAIL PROTECTED] wrote:
>  Gentoo - an awesome file manager. 

  I thought Gentoo was a distribution?

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Sound issue

2004-07-29 Thread bscott
On Thu, 29 Jul 2004, at 9:01pm, [EMAIL PROTECTED] wrote:
> The most likely thing is you don't have the proper cable running from the
> back of the CD-ROM drive to the sound card. If you built the machine
> yourself, one should have come with the CD-ROM drive, if not, I'm not sure
> if anyone sells them ...

  Just about any decent computer parts vendor should have them.  Radio Shack
and CompUSA might have them, too.  If you frequent local computer sales
shows (http://www.ncshows.com), you can get them for cheap cheap cheap.  
Otherwise, try your local neighboorhood whitebox vendor.  If all else fails:

http://www.cyberguys.com/templates/searchdetail.asp?T1=120+0240

> ... and I don't know exactly what they are called.

  "CD-ROM drive audio cable" seems to be common.  Be warned that while there
seems to be a fairly reliable de facto standard for the connector on the
drive, there are a couple different connectors one will see on the sound
card side.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: automated social engineering at it's best (maybe?)

2004-07-29 Thread bscott
On Thu, 29 Jul 2004, at 2:25am, [EMAIL PROTECTED] wrote:
> I didn't get what I asked for ...

  Well, you were rather vague in what you asked for.  What are you looking
for, other than a magic-wand or a big-foam-clue-bat?

  The following procmail recipe will route everything claiming to be from
the address you posted, along with a hypothetical similar address, to the
bit-bucket.  If you never send mail to yourself, this will block the exact
case you were complaining about.  I'm not sure if that's really what you're
after, though.

:0:
* ^From:.*(blu|gnhlug)@sophic.org
/dev/null

> I didn't know anything about SPF before I posted, and I still don't know
> much about it (I've been too busy to check into it in detail), so I'm not
> yet sure if it will be less trouble than it's worth...

  In a nutshell: SPF lets a domain holder publish information about what
hosts are approved to send mail as "From" the domain.  This means a
receiving MTA can check an incoming message against SPF.  If SPF exists and
says the sending MTA is bogus, the receiving MTA can immediately reject the
message without doubt.

  For example, you could publish SPF records saying that only your mail
server can originate mail as "From" the  domain.  If you then
also configured your MTA to check SPF, it would find the incoming mail (with
your 'From' address listed) in violation, and could take appropriate action.

> With my "e-mail environment" such as it is, it may be difficult or
> impossible to set up something like this which will work reliably for me.

  SMTP AUTH works very well for making sure all the mail you send comes from
a particular server.  Even Microsoft Lookout supports it.  :)

> Also, a significant percentage of the viruses I receive come from cute
> Korean girls that I want to date, so telling them to get a clue about
> their computer is probably the wrong option... ;-)

  Oh, that's easy.  Just say you think their PC might have a virus, but
you'll happily take care of it for them, just because you like 'em so much.  
You do a good deed, solve a problem, and win karma, all at the same time.

> The granddaddy of which is that users generally just don't want to be
> bothered to (learn how to) mainain their computers.

  Exactly.  Or, more broadly stated, "people generally just don't want to be
bothered to think".  People need to realize that not thinking is harmful,
even dangerous.

  Example: Every year people get hit trains.  *It's a train.*  It isn't like
they can sneak up on you unexpectedly.  They generally follow the tracks.  
Yet people still find themselves in the position of being hit by them.  
This never fails to astound me.

  But I digress.  :)

> It is unfortunate that No Anti-virus software seems to install properly
> configured by default.

  The latest Norton Anti-Virus is actually really good at this.  Rather
expensive compared to "free", though.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |





___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Sound issue

2004-07-29 Thread bscott
On Thu, 29 Jul 2004, at 11:51am, [EMAIL PROTECTED] wrote:
>> ...  This requires more computrons ...
>>
>
> So that's the most fundmental element of computing physics, it explains so
> much.  ;-)

  Absolutely!

http://www.catb.org/~esr/jargon/html/C/computron.html

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


tar and stdio (was: Anyone know of a random data generator?)

2004-07-29 Thread bscott
On Fri, 30 Jul 2004, at 5:21am, [EMAIL PROTECTED] wrote:
> Only as the argument to the 'f' flag...
> 
>   $ cat intro |tar cf plah.tar -
>   tar: -: Cannot stat: No such file or directory
>   tar: Error exit delayed from previous errors
> 
> The intended result in this case can be acheived by just leaving off
> the '-' at the end.  Then tar will read its input from stdin.

  Er, not with my 'tar', and I don't think in the general case, either.

$ cat .bashrc | tar cf foo.tar  
tar: Cowardly refusing to create an empty archive
Try `tar --help' for more information.
$ 

  The 'tar' program works with tar archives and filesystems, not arbitrary
data streams.  You can't just take the output of "cat" (or the contents of
any other file or program via a file descriptor) and put them in a tar
archive as an archive member.

  When it comes to working with a tar archive, you can use stdio because a
tar archive, like any other file in Unix, is just a data stream.  But the
filesystem side of tar needs to be the filesystem.

  If you just want to move a data stream on to or off of a device, just use
"dd" or "cat", or plain shell redirection.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |


___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Sound issue

2004-07-29 Thread bscott
On Wed, 28 Jul 2004, at 11:07am, [EMAIL PROTECTED] wrote:
> When I put in a music CD, it brings up the CD player just fine, that goes
> out and finds disk info to display, the CD plays, and I can hear it
> through the headphone jack on the front of the drive, but no sound comes
> out of the speakers.  Sometimes.

  There are two ways to play CDDA (Compact Disc Digital Audio, i.e., "music
CDs") on using a computer drive.

  One is to have the drive read the CDDA, convert it to analog audio
internally, and pipe it out an analog feed.  That is what the headphones do.  
That is also what a connector on the back of the drive does.  The idea is
you run a cable from the drive to an input on your sound card, and the sound
card's built-in mixer/amp makes the speakers go.  You don't even need an
operating system for this, if the drive has a front-panel "Play" button.

  The other method is DAE (Digital Audio Extraction, AKA "ripping").  Here,
the drive reads the CDDA and sends it to the host computer using the data
cable (IDE, ATA, SCSI, USB, FireWire, whatever).  The host computer does
something with the CDDA, such as use the sound card's DSP to turn it into
analog sound.  This requires more computrons and more sophisticated
software, but also enables things like encoding as MP3/OGG, or digital
effects processing.

  Most likely cause of difference behaviors: When the sound works, the
software is using DAE, and when it does not, it is using analog playback.  
This would also explain why your headphones do work.

  Most likely cause of the analog failures: You have a connection problem
between the drive and the sound card.  It could be the cable simply was
never installed, or is loose, or whatever.

  Other possible causes of the analog failures:

  It could be your sound card is fried or otherwise defective.  It could
also be the mixer is not being programmed by the OS correctly.  You do
indicate the mic has never worked.  The mic input and the CD input are
basically two channels of the same thing, so I suspect they may be related.

  I usually tell people to also check their mixer settings, but you say
you've done that already.  If you set the mixer, exit the mixer program, and
then go back in, are the settings retained?  If not, that is a sign of
trouble.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Samba Question

2004-07-27 Thread bscott
On Sat, 24 Jul 2004, at 5:31pm, [EMAIL PROTECTED] wrote:
> the logs say that Samba is started but I can not get it to show up on my
> windows network.

  Issue all of the following commands at the shell prompt on your
Linux/Samba computer.

  Try:

ps ax | grep smbd

If you do not see at least one "smbd" process running, then Samba is not
running.  It may be that Samba is attempting to start but failing.


  Try:

testparm

The above will test your Samba configuration file.  If it complains of
problems, fix them.

  Try:

smbclient -L //localhost

That should list the shares on the local Samba server.  If it fails, post 
the error message.  If it works, at least part of Samba is working.


  If the above works, try:

smbclient -L //foo

where "foo" is the name of your Samba server.

  Let us know the results of the above, and we'll go from there.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |


___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Samba Question

2004-07-27 Thread bscott
On Sat, 24 Jul 2004, at 5:31pm, [EMAIL PROTECTED] wrote:
> ( I now it is old but it is what I have)

  You know that Linux is free, right?  You can go and download the latest
Red Hat Linux (now called Fedora Linux) for free:

http://fedora.redhat.com

  If you don't have the bandwidth, you can have CDs mailed to you for less
then nine dollars:

http://www.cheapbytes.com/

  Or try one of the many other Linux distros:

http://www.linux.org/dist/

  Debian and Slackware are fairly mainstream (as such things go) and run
well on older hardware.

  Or show up at one of the GNHLUG meetings, and you'll likely find someone
willing to burn you a copy of whatever you want for free (or maybe cost of
media).

  I can understand when people don't want to upgrade a network based on
proprietary software; it can cost thousands and thousands of dollars, even
on a very small network.  But for what you're describing, the cost of a
brand new version of Linux should basically be free.  It's worth it.

  Reply to the Samba question will be in a separate message.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |


___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: automated social engineering at it's best (maybe?)

2004-07-27 Thread bscott
On Wed, 28 Jul 2004, at 2:07am, [EMAIL PROTECTED] wrote:
> So, anyone have any good procmail recipies for this bogosity?

  Since you're dealing with a message that forged the sender as coming from
*your domain*, you might look into things such as SPF.  If you can get away
with it, you could configure your public MX to refuse anything that claims
to be from your own domain.

  If you can get away with it, a procmail rule that blackholes anything with
an executable Microsoft attachment is a wonderful thing.

> I'm still getting basically no spam, but what can you do when your friends
> don't know how to take care of their PCs?

  Educate them.  Or find better friends.  ;-)

> If you're cluless or lazy about keeping your PC in good health, you might
> want to save your freinds' inboxes and check out some of the links
> below...

  Alas, people who have clue don't need to be told, and those who don't have
clue don't seem to listen.  :-(

  Most of the worms of late are of the "Trojan horse" variety: They depend
on social engineering attacks to trick people into running an attached
executable.  "If someone else can convince you to run their software on your
computer, it isn't your computer anymore."  Until people wake up and
*think*, this problem will continue.

> All the security fixes that Microsoft has finally gotten around to
> fixing in their spare time (it must be the right link, it comes up
> completely blank in Mozilla):
> 
>   http://windowsupdate.microsoft.com/

  While always a good idea, this does not solve the major problem (see
above).

> Good free personal firewall software:
> 
>   http://www.zonelabs.com/

  Might help.  The problem is that the same lusers who ran the Trojan tend
to authorize it to "Use the Internet" when asked by ZoneAlarm.  I wish I was
kidding.

> Good free (for personal use) Anti-virus software:
> 
>   http://www.free-av.com/

  Good anti-virus software does do a good job of protecting lusers from
themselves.  The problems with AV are (1) you have to use it, (2) it is
reactive (and thus lusers are vulnerable until the sigs update), (3) lusers
don't make sure their sigs get updated.

> [There was meant to be some humor in this message, albeit sarcastic. If
> you didn't see it, try harder next time...  ;-)]

  Ha ha.  Only serious.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Libranet redistribution (was: InstallFest)

2004-07-07 Thread bscott
On Wed, 7 Jul 2004, at 10:59am, [EMAIL PROTECTED] wrote:
>> Fantastic news: we're having an Installfest, hosted by Bruce Dawson at
>> Miles Smith Farm. Anyone is welcome to come - you can get your machine
>> installed with a high quality Free operating system...
> 
> Hmm.  Sounds like Libranet. 

  Since you're a Libranet fan, Bill, maybe you can point me at some
authoritative information.  Exactly what terms is Libranet distributed under?  
I'm not trolling, believe it or not; this is actually relevant to me.  One
thing I try to do is keep a local library of Linux distros so I can burn
copies on request.  However, not ever distro allows that.  Examples are SuSE
Linux Pro and Red Hat Enterprise Linux.  What's the story with Libranet?  
I'm after a particular website or file I can verify; word-of-mouth or
assumptions are not a grant of license.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: FTP Download issues (was: Destination show up twice in traceroute)

2004-07-05 Thread bscott
> Speaking of NAT issues, I've got one which is driving me nuts.
> 
> Simple FTP downloads are failing to complete on my Linux box which is
> behind a firewall/NAT setup on a Linksys router.
>
> I have 6 or 7 computers behind the firewall, all sharing the same IP on
> the cable modem (Comcast).

  General fault isolation:

  Does the same problem happen on all hosts behind the LinkSys?

  Does the problem happen if you place a system outside the LinkSys,
directly on the cable feed?  (Be sure to take appropriate precautions (like
a host-based firewall) when you test this.)

> What happens is that the download dies part way through the download and
> just hangs. It always seem to hang at the same percentage, though the
> actual percent download varies from file to file.  ... In fact, typically
> I will download something to that remote server, then scp it in to my home
> workstation.

  What you describe sounds suspiciously like a data-dependent line problem.  
I've seen this kind of thing twice in about fifteen years.  It occurs when
there is some problem in a data line that is only triggered by a particular
bit pattern.  So you can pump data through it all day long and never have a
problem, but try to send a few dozen bytes of a particular pattern and it
gets scrambled.

  The reason I suspect this kind of problem is that you say it always
happens at the same point in the same files.  That would indicate something
at that point in the file is triggering the problem.  You also say that SCP
works.  Since SCP encrypts the payload, the lines don't "see" the pattern
that causes the problem.

  Most recently, this happened to me a couple of years ago at a client.  
They had an Internet feed that would drop packets if you tried to send a
packet filled with bit pattern

1001100110011001100110011001

(which corresponded to the capital letter 'A' in ASCII, repeated over and
over again).  It took forever to track down.

  To see if you are having the same problem, you need to use a packet
sniffer.  Start sniffing on the sending host, and then start your transfer.  
Wait until the sender stops getting ACKs back from the receiver.  Find the
first packet being sent that was *not* successfully ACK'ed, and look for a
data pattern.

  If you think you've found it, use the "ping" command, with the "-p" and 
"-s" switches to test.  For example, I used

ping -s 300 -p 41 remote-host.example.net

to send packets padded with with 300 bytes of 0x41 (41 hex = 65 decimal =
'A' ASCII) to a remote host.

  Good luck getting this fixed on a consumer feed.  I had to provide
byte-level packet dumps and scream bloody murder and threaten to cancel the
feed, and even then the ISP only grudgingly looked into it.  And this on a
frame-relay line with a 4-hour response time in the contract.  You'll
probably need a signed note from God before Comcast does anything about it.

> Someone somewhere suggested the Linksys router might be suspect ...

  Well, I would certainly suggest testing that.  The problem could just as
easily lie in your equipment.  So make sure you've tried different
*everything* (routers, computers, cables, operating systems, brands of
network card, etc.) before you go blaming the ISP.  But the Principle of
Maximum Aggravation says that it will most likely be the ISP.

  Hope this helps,

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Destination show up twice in traceroute

2004-06-30 Thread bscott
On Wed, 30 Jun 2004, at 8:21pm, [EMAIL PROTECTED] wrote:
> This isn't really a Linux question but with all the networking experts on
> the list, I figured this is as good a place to ask as any.

  To understand what you are seeing, one will have to know how IP and
traceroute work.

  Every IP packet has a TTL (Time To Live) field.  The TTL normally starts
out at some reasonably high value, and gets decreased as it travels the
network.  In theory, TTL is decreased on a "cost" or "time" basis. In
practice, most routers just decrement TTL by one no matter what.  If TTL
hits zero, the packet is assumed to have been "in transit" for too long, and
dropped.  Among other things, this keeps a routing loop from spinning
packets forever.  When a router encounters a packet with a TTL of zero, it
normally sends a "Time Exceeded" ICMP Message to the system listed in the
source address of the packet.

  The "traceroute" utility (TR for short) works by crafting special packets
with artificially low TTL values.  TR starts out by sending packets with a
TTL of one.  Thus, the first router that gets the packet expires it.  TR
gets the "Time Exceeded" Message, and reports that as the first hop.  TR
then sends a packet with a TTL of two.  It makes it past the first router,
which decreases TTL to one.  The next router then expires the packet, and
sends back the ICMP Message, which TR reports as the second hop.  And so on.

  Eventually, the packet hits the destination system with a non-zero TTL.  
Traceroute needs some way to know that, too.  Traditional traceroute sends
UDP packets to port 33434, on the assumption that that port will be unused.
When the destination host gets a packet for an idle port, it should send an
ICMP "Port Unreachable" Message back to the sender, which TR uses to know it
has found the destination.  Some implementations (notably Microsoft's
TRACERT.EXE) use ICMP "Echo Request" packets instead of UDP, and watch for
the ICMP "Echo Response" packet.

  Now, back to your problems.

> I'm wondering why a machine at work shows up twice on the traceroute
> output (see below) when I do the trace route from home.

  Well, in your output, 134.241.121.88 shows up as the final destination, as
well as the "gateway" before the last hop.  That would indicate that TR
received a "Time Exceeded" when it sent packets with a a TTL of 11, and a
"Port Unreachable" with a TTL of 12.  As for why *that* is happening, there
are multiple possibilities.

  One possibility is a buggy IP stack on the destination host, that checks
for TTL = 1 rather then TTL = 0.  I would expect to see the same behavior
for LAN traffic, then, though.  Another is that the last-hop router has a
bug which forwards TTL = 0 packets, causing them to reach the destination
host with TTL = 0.  I could also imagine some brain-damaged NAT
implementation or firewall somewhere causing trouble.

  If you really want to know, put a sniffer between the host you are running
traceroute on and its router.  (Be warned that this could be considered a
"security attack" in some organizations.)

> Could it be that 134.241.121.88 is set up as to route packets and is 
> routing to itself?

  All IP hosts route packets to themselves.  Some just also forward packets
that are not to themselves.  So that should not matter.  (I do say "should".  
There are a great many subtle bugs in a great many IP stacks.)

> On a side note, two routers that I might expect to be there, don't show up
> at all. One is the external interface for my 10.* network at home and the
> other is the main router for my site at work. As you can see, I don't even
> get a * * * for either of them.

  When a router has to send an ICMP Message in response to a packet that
cannot be forwarded (such as for "Time Exceeded"), it has to pick an IP
interface (address) to originate the ICMP message from.  This will typically
be the interface that is closest to the destination (the host which sent the
original packet).

  So you will not see your router's *external* interface;  you will see the
internal one (which is closer, and thus the router will originate the ICMP
from there).

  I imagine your router at work falls into this category, too.

  In the general case, this means that running traceroute from A to B and
then from B to A will generally yield different IP addresses for each hop.  
For that matter, there is nothing that says the path a packet travels will
be the same each time, or each way.  IP routing is a stateless operation.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |













___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Announcements (was: GNHLUG Nashua meeting)

2004-06-23 Thread bscott
On Wed, 23 Jun 2004, at 8:21am, [EMAIL PROTECTED] wrote:
> I suggest that, when we secure a speaker, we make an immediate
> announcement.

  Ooops, sorry, this was supposed to go to  and not
.  I must have removed the wrong header when I hit "Reply".  
My mistake.  Sorry for the noise.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Announcements (was: GNHLUG Nashua meeting)

2004-06-23 Thread bscott
On Tue, 22 Jun 2004, at 5:27pm, [EMAIL PROTECTED] wrote:
> Sorry about the late announcement, I had the speaker some time ago ...

  I suggest that, when we secure a speaker, we make an immediate
announcement.  Even if we don't know the exact *date*.  This way, there is
nothing to remember -- get speaker, make announcement.  Stateless operation.  
Make the information available as it comes in.

  I don't have general easy answers to our organizational issues (and, as
always, I include myself in the list of people guilty of not being
organized), but I think this particular idea should be easy to do.

  Comments?

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: GNHLUG Nashua meeting, Tomorrow, June 22nd at Marthas

2004-06-23 Thread bscott
On Tue, 22 Jun 2004, at 3:12pm, [EMAIL PROTECTED] wrote:
> Either way these last minute announcements make it difficult for those
> with busy lives to plan for and attend a distant meeting which is of
> interest as this one definitely is.

  Me too!

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: SCSI Tape drive question

2004-06-17 Thread bscott
On Thu, 17 Jun 2004, at 7:19am, [EMAIL PROTECTED] wrote:
> I've set up a SCSI tape drive on a system.  The drive is a SONY AIT
> *mumble mumble* on a symbios based card. 

  Oh, that's easy.  The answer is mumble mumble.

  Seriously, to help, we need information.  We're not psychic.  Model of
tape drive.  Model or chipset of SCSI host adapter (or at least the name of
the Linux driver).  Linux distribution and release.  Kernel version.  Come
on Cole, you know we need this.  :-)

  The contents of the "files" in the /proc/scsi/ directory branch are likely
to be of use in determine some of this information.

> I have to reboot the system to get rid of the mt process, and then power
> cycle the tape drive to make it work again.  If I don't power cycle the
> tape drive, all mt commands will just hang and not even respond to a kill
> -9.

  If you look as "ps aux", I'm sure you'll see the "mt" process has status
of 'D', which is short for "uninterruptible sleep".  That means the process
is sleeping on a kernel system call.  You can send the SIGKILL signal, but
the process will not receive it until the kernel call completes and the
process wakes up again.  The kernel system call in question is doubtless a
call to the SCSI device layer.

  The question is, what is the SCSI driver doing?  Have you checked syslog
and dmesg for any messages?

> By "locks up", I mean that the current mt command (seemingly always
> "erase") runs forever.

  The "erase" command typically takes a really long time to complete.  That
might indicate a problem with SCSI device disconnection.  That is when the
initiator sends a command to the target, and then the target "disconnects"
from the SCSI bus while the command completes.  This frees the SCSI bus for
other operations.  If I knew anything about your equipment, I might be able
to give further insight, but since all I know is that you have a tape drive,
I can only speak in generalities.

  BTW, why are you running erase, anyway?  It's typically not needed for
modern tape technologies (such as AIT).

> Any thoughts?

  Aside from giving us the vital information already requested: I would
recommend checking firmware revisions on the tape drive, host adapter, and
mainboard.  See if updates are available, and if so, install them.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Recommendations for VPN end point appliances?

2004-06-16 Thread bscott
On Tue, 15 Jun 2004, at 9:38am, [EMAIL PROTECTED] wrote:
> These will be the last Linksys VPN boxes I buy ... based on my experience
> trying to configure them.

  Yah, like I said, LinkSys is pretty horrible for VPN stuff.

  The thing that really worries me is: A VPN box that is doing things
incorrectly will appear to work just like a VPN box that is doing things
correctly.  Unless you actually try and crack it, you'll never know that it,
say, is using the same session key over and over again.  I would have to say
that I would not trust LinkSys to get a protocol suite as complex as IPsec
right.  It may be that all you're getting is a false sense of security.

> They may have solved some of their stability problems with the latest
> firmware ...

  The stability problems do not appear to manifest nearly as often if you
only have a couple of users.  Put 15 or 20 active users on the network,
though, and they start crashing on a depressingly regular basis.  Where I
work, we recommend against LinkSys for VPN stuff, but some people ignore our
warnings and buy them anyway, because they are cheap.  Everybody who has
done that has regretted it.  This is definitely a case of getting what you
pay for.

On 15 Jun 2004, at 11:14am, [EMAIL PROTECTED] wrote:
> Well, just to voice the other side, we've had a BEFSR81 at the house ...

  Totally different product, with a totally different implementation.  The
BEFSR81 actually has more capable firewall settings then the BEFSX41!  (The
BEFSX41 is limited to a total of four firewall rules.)

  Also, totally different usage.  You're just using it as a simple NAT box.  
You're not using it as a VPN endpoint.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: GNHLUG LBS logo

2004-06-14 Thread bscott
On Mon, 14 Jun 2004, at 7:57pm, [EMAIL PROTECTED] wrote:
> Just thought that I would point out that I discovered the GNHLUG Linux
> Business Show logo as part of a presentation out there.  ... It's from a
> Linux-conversion presentation from a Albany-based cardiology practice.

  Quick!  Get ahold of SCO's lawyers!  I'm sure we can sue them for...  
for... I dunno... something!  Copyright infringement.  Misrepresentation.
Communism.  Jaywalking.  Who cares?  Just sue 'em!  We demand a license and
royalty payments on all past, present, and future profits, for them, their
family members, their descendants, and their ancestors!  We demand
compensation for all the lack of unfair competition!  We demand that we have
something to demand!  We--(erk)

  [The persons responsible for this message have been sacked.  We apologize
for the inconvenience.]

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: 1U Personal colo

2004-06-14 Thread bscott
On 14 Jun 2004, at 2:43pm, [EMAIL PROTECTED] wrote:
> (Sorry if this is off-topic or ill-received).

  I, personally, find it very much on-topic, since I've been
(half-heartedly) looking for just such a service.  I know others here have
as well, too.  Perhaps we could get a GNHLUG group discount?  :)

> I am setting up a new program at my work ...

  Which is who and where?  :)

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |


___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Recommendations for VPN end point appliances?

2004-06-14 Thread bscott
On Mon, 14 Jun 2004, at 10:13am, [EMAIL PROTECTED] wrote:
> Public-key crypto in SNMP would probably be unweildy, especially since
> SNMP is supposed to have a light footprint to make it easy to put into
> small embedded systems.

  That's not the point I was making.

> A lot of customers just want to flip the power on in these things and have
> things work

  Convenience is generally inversely proportional to security.

> Besides, in my experience, SNMPv3 is merely a "checkoff item" in the
> vast majority of deals.

  I find *most* things fall into that category.  When was the last time
you saw anyone use more then 10% of the features in MS-Word?  MS-Excel?

> I haven't seen much else that approaches SNMP's usefulness.

  I also never said SNMP was not useful.  Just that it does not concern
itself much with security.  (One could make the argument that security is
the job of the network layer (i.e., IPsec).  Consider it made.)

  :-)

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Recommendations for VPN end point appliances?

2004-06-14 Thread bscott
On Mon, 14 Jun 2004, at 9:32am, [EMAIL PROTECTED] wrote:
> He dropped one line that really annoyed me. He stated that Windows Server
> 2003 performed a new authentication protocol that would break most Samba
> network share setups.

  It's not new.  There has long been a feature in NT that supports "signing"  
of Server Message Blocks.  Samba doesn't support it.  You could also set a
system to require signing.  With Win2K3, that is on by default.  You can
make it optional again with a registry tweak.  You also need to do this if
you have Win9X/ME boxes in your network.  Ho-hum.

> I may be miss-remembering this because he was also describing the new
> Windows XP SP2 release which he described as "a total re-write".

  Yah, they totally rewrote the "1" to a "2".  ;-)

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Recommendations for VPN end point appliances?

2004-06-13 Thread bscott
On Sun, 13 Jun 2004, at 9:40pm, [EMAIL PROTECTED] wrote:
>> ... shared secrets went out in the 1980s ...
> 
> Maybe, but SNMP V3 still uses it..

  That's hardly an endorsement.  SNMP's approach to security issues has
generally been to ignore them.  (SNMP = Security?  Not my problem!)  The
fact that SNMPv3 has any security at all is a huge advance.  Now you want it
to be modern, too?

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Recommendations for VPN end point appliances?

2004-06-13 Thread bscott
On 13 Jun 2004, at 1:32pm, [EMAIL PROTECTED] wrote:
>> I've had someone recommend SnapGear to me ...
>
> If you're speaking of the ClearPath SNAP box...

  No, I'm speaking of SnapGear.  http://www.snapgear.com

  Hmmm... they appear to have been bought by CyberGuard.  Since I don't
really know anything about either company, the net change in my practical
knowledge is zero.  :-)

  Their products exist as something you can buy and touch, as one of our
customers got them as part of a larger package from another vendor.  They
appeared to work.  The advertised prices were very attractive.  That's as
much as I know.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Recommendations for VPN end point appliances?

2004-06-13 Thread bscott
On Fri, 11 Jun 2004, at 10:51pm, [EMAIL PROTECTED] wrote:
> ... does anyone have any recommendations for VPN end point appliances.

  Of all the appliances I've used, my favorite is NetScreen.  Outstanding
features and performance at a competitive price.  Gotta love that SSH CLI.

  SonicWall is okay.  They used to require a subscribe just to use 
certificates, but I believe that has changed.

  I've had someone recommend SnapGear to me; it is apparently a Linux-based 
appliance.  Haven't had a chance to actually look into it, though.

  For maximum flexibility, there is always the possibility of an SBC running
Linux out of flash.

> I ordered a pair of BEFSX41 LinkSys routers ...

  My experience with LinkSys VPN boxes is that they are flakey and have an
abysmal feature set.  They tend to need to be rebooted on a regular basis.  
No support for public key crypto (come on', shared secrets went out in the
1980s).  Their firewall/filtering settings are a joke.

  I frequently recommend LinkSys NAT boxes for SOHO use, but IMO, they just
don't cut it for VPN use.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: SCO Group stock plummets

2004-06-11 Thread bscott
On Thu, 10 Jun 2004, at 6:27pm, [EMAIL PROTECTED] wrote:
> I'm wondering if there's another gamble involved.  At today's
> closing price the total market cap for SCOX is $70.49M. 

  Let's wait a few more weeks, and we'll buy it with the change I have left
over from lunch...

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Gigabit Ethernet cards?

2004-06-10 Thread bscott
Hello world!

  Anyone here have any practical opinions on good Gigabit Ethernet interface
cards?  Likewise, bad experiences, teaching things to avoid, are also
valuable.

  I'm especially interested in how well the card works with Linux.  
Performance, stability, and driver support. Ideally, I like finding a
full-featured, GPL driver in a mainline kernel.  Third-party Open Source
drivers are also okay.  Binary-only modules are unacceptable.

  The motherboard of the server in question has some free 64-bit, PCI ver
2.1 slots, so that, at least, is not an issue.  System is currently running
a recent 2.4.x kernel.  Upgrading to the latest 2.4.x is no problem.  I
would prefer not to have to up to 2.6 just to get the driver to work, if
possible.

  We're in a situation where we are adding a card to an existing system.  
Up until now, all our work with gig has been with new stuff that shipped
with gig onboard, so the decision was largely made for us.  :)

  advTHANKSance

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Bittorrent Fedora Core 2 MD5 failures?

2004-05-20 Thread bscott
On Thu, 20 May 2004, at 3:34pm, [EMAIL PROTECTED] wrote:
>> Anyone got suggestions for an ISO repair kit? Or am I SOL?

  If the MD5 checksum does not match, it means the CD image you have does
not match the one that Red Hat/Fedora released.  This most likely means one
or more of the files on the CD is corrupt in some way.  There really isn't
any way to "repair" that.

  It would appear BitTorrent is not immune to the Slashdot effect after all.
I would wait until the flash crowd around the Fedora images dissipates a
bit, and then try downloading fresh images.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |


___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Need some help with a hacker exorcism....

2004-05-18 Thread bscott
On Mon, 17 May 2004, at 12:34pm, [EMAIL PROTECTED] wrote:
> I have been hacked ...

  Quick answer: Copy any important data/files off to another computer, then
wipe the hard disk(s) and reinstall everything from scratch.  It's the only
way to be sure the attacker hasn't subverted some part of the system.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


SPF and spam (was: spam filters)

2004-05-17 Thread bscott
On Sun, 16 May 2004, at 5:41pm, [EMAIL PROTECTED] wrote:
> 2.  SPF.  This seems to be promoted as something we should really want -
> tightening the loose SMTP rules which permit spammers to pretend to be
> sending from arbitrary addresses (including yours).

  Background information (for the list): SPF = Sender Policy Framework.  
Quite simply, it lets a domain owner publish information on which hosts(s)
are allowed to send mail claiming to be from that domain.  For example,
Yahoo can specify that only their mail servers can originate mail claiming
to be from <@yahoo.com>.  Since most spam forges the "From" address, this
helps.

  SPF is a great idea.  However, it is important to understand what SPF will
do, and what it won't do.  In particular, it cannot stop spam.  At most, it
will make spam accountable.  And I rather doubt it will do even that much.

  The first problem is that, for SPF to be really effective at stopping
spam, everybody has to use it.  For everybody to use it, everybody will need
to have clue.  And if everybody had clue, we wouldn't have a spam problem in
the first place.

  The second problem is that, even if everybody starts using SPF, there is
nothing keeping spammers from registering throw-away domains by the
truckload.  In this world, people routinely get away with murder,
gun-running, drug smugging, etc.  I'm sure registering some domain names
with fake credentials will not be a problem.

  That being said, SPF will help fight the spam problem.  Specifically, it
will let operators create a subsection of the Internet where the worst of
the spam (which is also the bulk of the spam) is prevented.  If everybody
you want to receive mail from is using SPF, SPF will solve spam for you.

  Alas, many cannot exclude those who are not using SPF.  In particular,
businesses tend to want to receive mail from all their paying customers,
even the clueless ones.

  There is also the problem of legitimate businesses sending you spam to try
and get you to buy a legitimate product.  For example, you register your new
cordless screwdriver with Black & Decker, so now Black & Decker starts
sending you advertisements for more power tools.  This, however, is less of
a problem.  Legitimate businesses can be made to play by the rules.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: spam filters

2004-05-17 Thread bscott
On Sun, 16 May 2004, at 5:41pm, [EMAIL PROTECTED] wrote:
> OTOH, my honest answer is that only after I 'fessed up to myself that
> there's no free lunch have we been able to be in control of the spam mess.

  Indeed.  Spam-filtering is a great "one size does NOT fit all" case.  One
person's spam is another person's ham.  So anything that claims to be "set
it and forget it" is lying, pure and simple.

  A good anti-spam system, as you note, will incorporate continuous feedback
from the end-user.  By continuously training the anti-spam system as to what
is spam and what is not-spam, you can keep up with most of the tactics the
spammers use to try and bypass filters.  Continuous training means little
additional effort on a day-to-day basis, but keeps the anti-spam system
up-to-the-minute accurate with your email patterns.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: spam filters

2004-05-17 Thread bscott
On Fri, 14 May 2004, at 9:09pm, [EMAIL PROTECTED] wrote:
> I am looking for recommendations for spam filtering.

  As others have said, SpamAssassin is a very good foundation.  Even in the
untrained "factory install" configuration, I find it does a very good job.  
I just used the canned procmailrc rules linked to from the SA Wiki (see the
"Documentation" section of the SA web site).  I was already using procmail
extensively, which helped, but the canned rules are pretty self-explanatory
even so.

  Training SpamAssassin for better results is pretty easy in an environment
where people are familiar with *nix.  You train SA by giving it samples of
ham (not-spam mail) and spam mail.

  For the not-spam, I just ran it on my "saved mail" collections.  Since I
have well over ten-thousand saved messages, it had plenty of samples.

  For spam, it just meant that, rather then deleting spam, I moved it to an
"also-spam" mail folder.  Then I periodically run the SA learning program on
that folder.

  With regular training, SA does an absolutely fantastic job of separating
the wheat from the chaff -- or the ham from the spam, if you prefer.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Anti-spam methods (was: Re: Comcast blocking port 25? (not what you think))

2004-05-10 Thread bscott
On Mon, 10 May 2004, at 7:05pm, [EMAIL PROTECTED] wrote:
> I think what the problem that people have is what they think the internet
> is..

  Exactly.  And regardless of what people *think* it is, the situation is as
I described it.  You cannot connect to an intangible like the Internet.  
You can only connect to someone's equipment -- be it Comcast or MV
Communications.  This only matters if you're unhappy, of course.  But then,
if you were happy, we wouldn't be having this discussion.

  One usually does try to pick the best "somebody" available, of course.  
Given the choice between a national, mass-market, clueless provider like
Comcast, or a local, cluefull, friendly ISP like MV, I'd take the local guy
every time.

> Luckally there are ISPs that understand this (MV is a great example)  
> where they give you an IP and as long as you don't break the law and do
> other stupid stuff you're left alone.

  They're small enough to handle the spam problem on a case-by-case basis.  
Large ISPs have little choice but to resort to rather heavy-handed tactics.  
One more reason to choose the local guy.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Anti-spam methods (was: Re: Comcast blocking port 25? (not what you think))

2004-05-10 Thread bscott
On Mon, 10 May 2004, at 6:00pm, [EMAIL PROTECTED] wrote:
>> I do predict that spammers will adapt to this new authenticated email
>> world rather quickly.  Namely, they will modify their spam-cannon-laden
>> viruses ... 
> 
> That seems likely, but how much email is send from virus-attacked
> computers?

  All we can tell for sure is that quite a lot of spam currently comes
direct from consumer Internet feed address space.  Possible sources include:

  - People who manage to configure open relays or open proxies, either
through poorly designed software, or user incompetence.  These people
get relay-raped.

  - Spammers who buy Internet feeds, use them until they get caught, and
then fade back into the woodwork.

  - Users who unintentionally run spam-relay software.  These include
Trojan software (the game that also sends spam or whatever), "click me"
worms that depend on the user, and self-propagating software that 
attacks vulnerable software.

  - Users who intentionally run spam-relay software, because the spammers
claim (truthfully or not) they will pay the users for doing so.

> The SPF approach seems to have the goal on making DNS-based blacklists
> reasonable, not addressing the spam-from-a-virus problem.

  SPF prevents spammers from spoofing a domain that does not want to be
spoofed.  That has value by itself, as it means you can now whitelist on
selected "From" addresses reliably.  It is unlikely SPF will actually stop
spam.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Anti-spam methods (was: Re: Comcast blocking port 25? (not what you think))

2004-05-10 Thread bscott
On Mon, 10 May 2004, at 2:21pm, [EMAIL PROTECTED] wrote:
> I'm basically on the side of individual freedoms and don't like that port
> 25 egress filtering is being implemented by broadband vendors.

  Geeks (I include myself in this category) like to romanticize this idea of
the big, happy Internet, where all people are equal, censorship is treated
as damage, and so on.  I'm afraid that is a myth.  That mythical "Internet"  
does not exist, and never has.

  You can connect your equipment to somebody else's equipment.  That's it.  
If you're big enough, the "somebody else" might be a peer.  Most people just
pay for a link or two to companies that specialize in network connections.  
Regardless, you're connecting to *their* equipment, and they can run it
however they see fit.  If nobody is willing to give you connection on their
terms, you do not get connected.  It has always been this way.

  I find it helps to keep this in mind, when people start feeling their
"freedom" has been infringed because their ISP doesn't let them do
everything they want to.

> But as long as there are vendors that will give you an unfiltered
> connection (even for a larger fee), with fixed IPs, I'll be happy.

  Indeed.  Paying a higher fee for a higher class of service will always get
you better treatment.  Here, too, realize you're not just paying for IP
address space, you're paying for the promise of support.  Not just the guy
answering the phone when you have trouble, but support in the sense that
your ISP won't mess you up like this.

> I do predict that spammers will adapt to this new authenticated email
> world rather quickly.  [...] But we will still be in a better place when
> it comes to spam.  When enough clueless users get disconnected from their
> ISPs for spam propagation ...

  Heck, just the fact that it adds an audit trail to the message headers (so
I, as a mail abuse victim, can trace it back more easily) is worth it.  It
also means an ISP will be able to notice that Subscriber #53429 is sending
way more mail then is reasonable, and thus take action to cut off the spam
before as much spam gets sent.

> [Users] will either take more proactive measures to keep their systems
> clean of viruses, or put more pressure on their operating system vendors
> of choice to put security where it belongs: at a much higher priority than
> convenience.  Or both.

  Add to that: After Joe Luser has had his feed cut a few times, maybe he
will think twice before installing whatever random software he finds on the
net.

> Sadly, I'd suggest that we all get used to this up and coming
> authenticated email world.

  s/email//

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Comcast blocking port 25? (not what you think)

2004-05-10 Thread bscott
On Mon, 10 May 2004, at 11:23am, [EMAIL PROTECTED] wrote:
>>   Mail abuse.  A great deal of spam and other mail abuse comes from
>> computers on consumer feeds that are incorrectly configured as a mail
>> relay (don't ask me how, but it happens more often then you would think),
>> or have been compromised by some kind of malware and are being used as
>> same.  At the same time, SMTP was designed to move mail between static,
>> well-connected systems.  Hosts on dynamic, consumer feeds do not meet
>> that definition.
> 
> My parents are not running any kind of server.

  You'll notice I never said they were.

  Comcast doesn't (and can't) know you're not using TCP port 25 for mail
abuse, though.  By forcing you to authenticate to their system, and pass
your mail through their system, though, they can monitor things, enforce
limits, add an audit trail to the headers, etc.

> That is exactly what they are trying to do, send the mail to my server so
> I can do the job of dealing with their mail.

  Then you should be using an MSA, not an MTA.  Or at least, that's what
conventional net.wisdom says.  Didn't you get the memo?  :)

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Comcast blocking port 25? (not what you think)

2004-05-10 Thread bscott
On Mon, 10 May 2004, at 11:04am, [EMAIL PROTECTED] wrote:
> The solution is to add yet more and more entries into my mailertable file
> in sendmail.

  Why don't you just relay everything through your ISP?

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Comcast blocking port 25? (not what you think)

2004-05-10 Thread bscott
On Mon, 10 May 2004, at 10:53am, [EMAIL PROTECTED] wrote:
>>> Yah, that's what I'm going to have to do.. BLAH.. stupid comcast.
>>  
>>   Get used to it.  More and more ISPs are adding this.  And I cannot say I
>> entirely disagree with the policy.
> 
> Why?

  Mail abuse.  A great deal of spam and other mail abuse comes from
computers on consumer feeds that are incorrectly configured as a mail relay
(don't ask me how, but it happens more often then you would think), or have
been compromised by some kind of malware and are being used as same.  At the
same time, SMTP was designed to move mail between static, well-connected
systems.  Hosts on dynamic, consumer feeds do not meet that definition.  It
makes more sense for such hosts to submit mail to a smart host which can do
the job right.

  Of course, then you have to deal with the fact that a great many MUAs are
incapable of doing anything themselves, and need to be able to submit mail
to an SMTP-like listener.  That is why the concept of an MSA (Mail
Submission Agent) was created.  The idea is to separate mail submission from
mail exchange.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Comcast blocking port 25? (not what you think)

2004-05-10 Thread bscott
On Mon, 10 May 2004, at 10:25am, [EMAIL PROTECTED] wrote:
> Yah, that's what I'm going to have to do.. BLAH.. stupid comcast.

  Get used to it.  More and more ISPs are adding this.  And I cannot say I
entirely disagree with the policy.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Comcast blocking port 25? (not what you think)

2004-05-10 Thread bscott
On Mon, 10 May 2004, at 6:47am, [EMAIL PROTECTED] wrote:
> Recently my parents (that use Comcast) can no longer connect to port 25 of
> my server.. one that is legit, has correct reverse and MX records.
> 
> Has anybody else seen this?

  More and more ISPs are blocking port 25 outbound on consumer feeds to
fight spam.  I'm pretty sure that's what you're seeing.

  You have two options: (1) Configure their system to relay through
Comcast's SMTP relay when on Comcast's network, or (2) use an alternate
means of submission.

  An "alternate means of submission" might mean adding an additional SMTP
listener on a non-standard port; using an MSA (Mail Submission Agent); using
a tunnel of some kind (such as with SSH or IPsec).

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |


___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Large HD, old BIOS

2004-05-03 Thread bscott
On Mon, 3 May 2004, at 10:17am, [EMAIL PROTECTED] wrote:
> That's what I was wondering.  Not knowing much of anything about hardware,
> I didn't know if the linux distro's ability to see the whole drive would
> bypass the problem of the BIOS being able to see it.

  Well, remember, "Linux distro" means a whole lot of smaller parts.  The
Linux kernel might see the whole drive, but the boot loader might not.

  When the PC is first turned on, there is no OS IDE driver available.  The
only way to read the disk is by using INT13 (software interrupt 13 hex).  
The disk controller's BIOS has to provide an INT13 interface for the disks
it controls.  If you have an onboard disk controller, that BIOS is part of
the motherboard firmware.  If you have an add-in card, it has to provide a
BIOS for that card, or you cannot boot from it (i.e., you need to boot from
another device, and then load an OS driver -- this is common with cheaper
add-in SCSI cards).

  The system BIOS (also part of the motherboard firmware), after it has
finished all the other power-on tasks it is responsible for, will look for a
bootable device.  When it finds a hard disk with the right boot signature,
it loads the first block (the master boot record) and jumps into it.  The
MBR code now has control.

  With LILO, the MBR is the first-stage boot loader.  It is responsible for
finding the second-stage boot loader (/boot/boot.b by default) and loading
that.  It has to use INT13 to do so.  The second-stage loader is responsible
for presenting the boot menu (if any), and then loading the kernel and
initrd (if any).  All of these components use INT13 (with or without LBA
extensions).  Not until the kernel is booted does the BIOS leave the
picture.

> Hmmm, that's a thought.  Anybody know of a brand/model that plays well
> with linux?

  The $50 Belkin card I bought from CompUSA works with the kernel that comes
with Red Hat Linux 9.  I'd give you a model number, but I can't find the
card right now.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Large HD, old BIOS

2004-05-03 Thread bscott
On Mon, 3 May 2004, at 10:15am, [EMAIL PROTECTED] wrote:
> I dunno - what is LBA?  How do I find out if my drive "is LBA" or not?  

  LBA = Logical Block Addressing.

  The original IBM-PC BIOS (and MS-DOS) used C/H/S "physical block
addressing".  Each block (AKA sector) on the disk was addressed by cylinder
(track), head (side), and sector.  This is a really poor way to do things,
for any number of reasons.  The biggest was that each C/H/S field has a
fairly small number of bits allocated to it, and as drives got bigger, these
limits were reached.

  To work around C/H/S limits, the industry came up with "geometry
translation".  The BIOS (or sometimes, a small "drive overlay" program that
loaded before MS-DOS) would change the presentation of disk blocks around to
make use of space in other fields.  For example, it might present the drive
as having 255 heads to keep it under 64K sectors-per-track.

  Of course, geometry translation is ultimately a kludge.  It can be a real
problem if everything isn't on the same page when it comes to the
translation.  The thing you're likely to care about is that the Linux kernel
doesn't use the BIOS, so it has to guess as to what geometry translation
scheme the BIOS might be using.  If it guess wrong, the disk becomes
scrambled between the two.

  The more intelligent way to solve this problem is LBA.  LBA just addresses
the entire disk as a linear series of blocks, numbered from 0 to
total-number-of-sectors.  Of course, not all software supported LBA.  In
particular, LILO lagged way behind Microsoft in implementing LBA, although
that has been fixed for some time now.

> How do I find out if my BIOS can handle it?

  Well, you could check the manual, or contact the manufacturer for support.  
You can also go poking around in the BIOS setup screen looking for an option
for "LBA" or "Large Disk Support".  This is sometimes a column in the basic
hard disk settings (where you type in C/H/S numbers).

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |







___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Large HD, old BIOS

2004-05-03 Thread bscott
On Mon, 3 May 2004, at 9:08am, [EMAIL PROTECTED] wrote:
> With lilo, it seems to just hang.  I get LI  and then nothing.

  That means LILO loaded what it though should be the second-stage boot
loader, but had a problem executing it (possibly because it loaded the wrong
thing).  This might mean a geometry mismatch between the kernel and the
BIOS.

  You can try installing the boot loader and kernel image on a floppy disk,
and booting from that.  That will typically bypass any issues with the BIOS
and the hard drive, and gives you a more useful debugging platform.

> With grub, I get various and sundry errors.  It claims to "be loading" and
> then it'll give me a (inconsistent) numeric error code.

  Inconsistent results often mean bad hardware.  You might try running
Memtest86 and/or "badblocks -w".  Note that running that badblocks command
will DESTROY ALL DATA on the disk.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Large HD, old BIOS

2004-05-03 Thread bscott
On Sun, 2 May 2004, at 9:24pm, [EMAIL PROTECTED] wrote:
> I bought a motherboard, cpu and memory off a friend (P3 based).  When I
> got the system put together, the BIOS (which I did flash to the latest
> version) only seems to recognize it as a 8.5 GB drive.  However, even
> though the BIOS only sees it as such, several of the distributions I've
> tried see that it is indeed a 200GB drive.

  There are several places you can encounter limits: The disk controller
itself, the system BIOS, and the OS.  Multiple limits can pile up.

  The reasons for these limits are usually fairly arbitrary.  For example,
you can hit all sorts of things which just assume drives will never have
more then X of one thing or another (sectors per track, cylinders per head,
heads, total sectors, total bytes, etc., etc.).  These can often be fixed
via a simple update or patch, be it to firmware or software.  Of course,
there is no guarantee that a given vendor will bother to release an update.  
It may be that your motherboard's vendor has EOL'ed the product and you're
stuck with a semi-broken BIOS.

  There is another limit one should be aware of, though, that is rather
harder to get around.  The original spec for ATA says that LBA (Logical
Block Addressing) uses a 22-bit field.  That works out to 128 GB (128 * 2^30
= approx 137 billion bytes).  Drives bigger then that use an extension for
44-bit LBA.  Patching for 44-bit LBA is generally a lot harder -- impossible
if it's a hardware limit in a disk controller.

  I can also envision the following scenario: The kernel talks to the IDE
device and gets a capacity report of 200 GB; however, the disk controller is
incapable of actually handling transfer requests for blocks above 128 GB.  
Just because the kernel thinks it can see the whole disk doesn't mean it can
access the whole disk.  I do not know enough about IDE internals to know if
this scenario can actually happen, but if it can, it would certainly add to
the confusion.  You could test this by running "badblocks" on the disk in
question.

  As far as the BIOS vs Linux thing goes: The Linux kernel almost completely
ignores the BIOS.  For example, if you set the BIOS HD type to "None", Linux
will still find it (assuming you can get the kernel booted).

  The boot loader is the only place where the BIOS really matters.  The BIOS
has to find and load the boot record.  The code in the boot record has to
load any additional boot loader code, and that has to find, load, and boot
the kernel and initrd (if any).  All that has to be done using the BIOS.  
So a BIOS problem can easily kill the boot loader.

  You can often work around BIOS limits by putting the boot loader within
the part of the disk that the BIOS can access.  This typically means
creating a small (10 MB or so) /boot partition at the start of the disk.  
However, one can also run into problems where the disk that the Linux kernel
sees is not the same disk the BIOS sees -- geometry translation is not
always consistent.

  Also, check the jumpers on the hard disk.  Some HDs can be set to lie
about their capacity, in order to workaround BIOSes which lock-up when
presented with disks beyond certain limits.

  If you have one, you can try an add-in PCI IDE controller card, which will
bypass mainboard controller and BIOS problems.  You can purchase such
controllers for less then $50.

> Despite this however, I can't seem to get the boot loader to cooperate.

  Information, please.  Which boot loader, and what version?  What behavior
do you see?  What error message(s), if any, and when?  What distro and
release?  What kernel version?

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: FOSS group in education

2004-04-28 Thread bscott
On 28 Apr 2004, at 9:03am, [EMAIL PROTECTED] wrote:
> I think they mostly need volunteers (and more interest) at this point.

  Where have I heard that before?  ;-)

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: 1U servers..

2004-04-27 Thread bscott
On Tue, 27 Apr 2004, at 12:02pm, [EMAIL PROTECTED] wrote:
> That alone would make me say no thanks to buying it.

  Most 1U systems tends to have some kind of funkiness to them.  That's the
price you pay for stuffing hardware into such a small form-factor.  In
particular, the CD/FDD are very often non-standard.  The only exceptions to
this that I've seen are when someone takes a generic motherboard and just
stuffs it into a generic 1U case, which generally yields a pretty poor
feature set, plus a tendency for thermal problems.

  That being said, Compaq (which is where the design for the "HP" Proliant
in question came from) is notorious for gratuitous incompatibilities. So it
may not be as bad with other systems.  But in general, expect some
funkiness, or don't buy a 1U.

  FWIW, Dell makes some decent 1U servers.  One of them "starts" at $600,
although that's after rebates and before shipping and taxes.  That does
include 3-year on-site NBD warranty service, though.

  One word of warning: Dell sometimes uses hardware which is only supported
by binary-only drivers on Linux.  That's generally not an issue if you're
running one of the two big commercial distros (SuSE or Red Hat), but it can
be a real problem if you're not.  Of course, Dell is hardly alone in this.

  In general (in life, not just with computers), the more you ask, the
higher the price.  So you have to decide where on the price/convenience
graph you want to be.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |


___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Cyrus/sieve/etc (was: Stop the maddness!)

2004-04-27 Thread bscott
On Tue, 27 Apr 2004, at 3:11am, [EMAIL PROTECTED] wrote:
> I'd be perfectly happy to expound on my cyrus-imapd / sieve / sendmail /
> mysql (or postgresql) / SMTP AUTH solution complete with virtual hosting
> if anyone's interested :-).

  Well, I'm definitely interested.  Would you be foolish^Wbrave^Wnice enough
to volunteer to give a presentation at one of the local meetings?  Or would
you prefer just to stick to this list?  Either one is cool with me.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.  |

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


Re: Policy routing and Linux

2004-04-26 Thread bscott
On Mon, 26 Apr 2004, at 7:27pm, [EMAIL PROTECTED] wrote:
> ... the commands I type don't seem to work.  The system accepts them, and
> appears to make changes to the routing tables, but the packets still end
> up going out the wrong interface.

  Turns out that is not entirely true.  I was testing my routing
configuration by using a NetFilter DNAT (port forwarding) rule.  That
appears to be where things are not working.  My policy routing configuration
works just fine if I connect to a service running on the firewall itself.  
Our firewall normally doesn't run any publicly exposed services, for
security reasons.  So I temporarily added the "echo" service, and found it
worked as desired.

  So it appears that NetFilter DNAT and iproute2 policy routing are not
working together.  Looking at a diagram of kernel routing internals, I begin
to suspect why.  I think NetFilter is not reversing the DNAT translation on
the outbound until the packet has already transversed the kernel router, so
the routing policy database thinks the packet is coming from the LAN, and
thus does not apply the right policy rule.

  Solving this problem will have to wait for until another day.  If anyone 
knows the answer already, your assistance will be welcomed.

-- 
Ben Scott <[EMAIL PROTECTED]>

___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss


  1   2   3   4   5   6   7   8   >