Re: a small C program to test xdm's /dev/mem reading on your architecture

2002-08-26 Thread Richard Zidlicky
On Mon, Aug 26, 2002 at 09:10:54PM +0200, Marcus Brinkmann wrote:
> On Mon, Aug 26, 2002 at 12:50:22PM -0500, Branden Robinson wrote:
> > > I can't believe he actually intends to keep it like this..
> > 
> > I'm going to #define DEV_RANDOM /dev/random for Linux systems.
> 
> That's bad, because that will drain the entropy a lot, and it might
> block for a long time, and that for no good reason as I don't think the
> magic cookie needs strong cryptographical security (for comparison: The
> secret key of a public key cryptography key pair should be created using
> /dev/random, while for session keys /dev/urandom is good enough).

/dev/random? /dev/urandom? You are kidding. This randmomness is used 
to create authorisation cookies for X which in my understanding provide 
ZERO security. Use plain libc rand() and the security is exactly the same.

Richard



FW: a small C program to test xdm's /dev/mem reading on your arch itecture

2002-08-26 Thread TEETER,VINCE \(HP-USA,ex1\)
 OK folks, the banter is getting excessive.  I'll have to bail if the dialog
can't be kept more point to point instead of broadcast.

[EMAIL PROTECTED]

-Original Message-
From: Marcus Brinkmann
To: [EMAIL PROTECTED]; debian-x@lists.debian.org
Sent: 8/26/02 3:59 PM
Subject: Re: a small C program to test xdm's /dev/mem reading on your
architecture

On Mon, Aug 26, 2002 at 02:43:09PM -0500, Branden Robinson wrote:
> xdm doesn't read the same amount of data when it's reading from a
> (presumably) entropic device node.

I didn't assume that.

> It reads eight size_t's.  Surely that is not excessive.

It's eight size_t's good entropy wasted for no important use still.  In
some
environments, good entropy is really hard to get at.

Thanks,
Marcus


-- 
`Rhubarb is no Egyptian god.' GNU  http://www.gnu.org
[EMAIL PROTECTED]
Marcus Brinkmann  The Hurd http://www.gnu.org/software/hurd/
[EMAIL PROTECTED]
http://www.marcus-brinkmann.de/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact
[EMAIL PROTECTED]



Re: a small C program to test xdm's /dev/mem reading on your architecture

2002-08-26 Thread Marcus Brinkmann
On Mon, Aug 26, 2002 at 02:44:26PM -0500, Branden Robinson wrote:
> On Mon, Aug 26, 2002 at 03:28:18PM -0400, Jeff Sheinberg wrote:
> > Why does anyone need to read megabytes of urandom?
> 
> Nobody does.  Or, at least, xdm doesn't.  Markus is opining without the
> benefit of having checked the facts.

Uh, I never, ever said that xdm would read megabytes from any /dev/ but
/dev/mem.  Some people have too much phantasies.

Thanks, Brandon,
Marcus

-- 
`Rhubarb is no Egyptian god.' GNU  http://www.gnu.org[EMAIL PROTECTED]
Marcus Brinkmann  The Hurd http://www.gnu.org/software/hurd/
[EMAIL PROTECTED]
http://www.marcus-brinkmann.de/



Re: a small C program to test xdm's /dev/mem reading on your architecture

2002-08-26 Thread Marcus Brinkmann
On Mon, Aug 26, 2002 at 02:43:09PM -0500, Branden Robinson wrote:
> xdm doesn't read the same amount of data when it's reading from a
> (presumably) entropic device node.

I didn't assume that.

> It reads eight size_t's.  Surely that is not excessive.

It's eight size_t's good entropy wasted for no important use still.  In some
environments, good entropy is really hard to get at.

Thanks,
Marcus


-- 
`Rhubarb is no Egyptian god.' GNU  http://www.gnu.org[EMAIL PROTECTED]
Marcus Brinkmann  The Hurd http://www.gnu.org/software/hurd/
[EMAIL PROTECTED]
http://www.marcus-brinkmann.de/



Re: a small C program to test xdm's /dev/mem reading on your architecture

2002-08-26 Thread Branden Robinson
On Mon, Aug 26, 2002 at 03:28:18PM -0400, Jeff Sheinberg wrote:
> Why does anyone need to read megabytes of urandom?

Nobody does.  Or, at least, xdm doesn't.  Markus is opining without the
benefit of having checked the facts.

-- 
G. Branden Robinson| What influenced me to atheism was
Debian GNU/Linux   | reading the Bible cover to cover.
[EMAIL PROTECTED] | Twice.
http://people.debian.org/~branden/ | -- J. Michael Straczynski


pgpflELhmC3Qe.pgp
Description: PGP signature


Re: a small C program to test xdm's /dev/mem reading on your architecture

2002-08-26 Thread Branden Robinson
On Mon, Aug 26, 2002 at 09:10:54PM +0200, Marcus Brinkmann wrote:
> On Mon, Aug 26, 2002 at 12:50:22PM -0500, Branden Robinson wrote:
> > > I can't believe he actually intends to keep it like this..
> > 
> > I'm going to #define DEV_RANDOM /dev/random for Linux systems.
> 
> That's bad, because that will drain the entropy a lot,

xdm doesn't read the same amount of data when it's reading from a
(presumably) entropic device node.

It reads eight size_t's.  Surely that is not excessive.

Please read the thread.

-- 
G. Branden Robinson|  Measure with micrometer,
Debian GNU/Linux   |  mark with chalk,
[EMAIL PROTECTED] |  cut with axe,
http://people.debian.org/~branden/ |  hope like hell.


pgpXes5PcCmwz.pgp
Description: PGP signature


Re: a small C program to test xdm's /dev/mem reading on your architecture

2002-08-26 Thread Jeff Sheinberg
Marcus Brinkmann writes:
 > On Mon, Aug 26, 2002 at 12:50:22PM -0500, Branden Robinson wrote:
 > > > I can't believe he actually intends to keep it like this..
 > > 
 > > I'm going to #define DEV_RANDOM /dev/random for Linux systems.
 > 
 > That's bad, because that will drain the entropy a lot, and it might
 > block for a long time, and that for no good reason as I don't think the
 > magic cookie needs strong cryptographical security (for comparison: The
 > secret key of a public key cryptography key pair should be created using
 > /dev/random, while for session keys /dev/urandom is good enough).

Here is how I create the magic cookie in my ~/.xserverrc shell script,

cookie ()
{
dd if=/dev/urandom 2>/dev/null bs=16 count=1 | od -x | awk ' NR==1 { 
print $2 $3 $4 $5 $6 $7 $8 $9 } '
}

e.g.,

$ cookie
a0de8e57919780bbc5ff16e66e1af2a9

and I use it in .xserverrc like this,

mcookie=`cookie`
# Add this cookie to the X server auth file.
xauth -f "${auth}" \
  -v add "0.0.0.0:${xdpnum}"   "${access}"  "${mcookie}"
# Add necessary new display entries to .Xauthority file.
xauth -v add "${eth0}:${xdpnum}"   "${access}"  "${mcookie}"
xauth -v add "${host}:${xdpnum}"   "${access}"  "${mcookie}"
xauth -v add "${host}/unix:${xdpnum}"  "${access}"  "${mcookie}"

Why does anyone need to read megabytes of urandom?  If it really
is random, then 16 bytes should be enough.

-- 
Jeff Sheinberg



Re: a small C program to test xdm's /dev/mem reading on your architecture

2002-08-26 Thread Marcus Brinkmann
On Mon, Aug 26, 2002 at 08:16:06PM +0100, Matthew Wilcox wrote:
> On Mon, Aug 26, 2002 at 09:10:54PM +0200, Marcus Brinkmann wrote:
> > Also, reading /dev/mem doesn't sound very secure at all (even if it works)
> > because the patterns in the memory of a computer are probably predictable
> > and a lot of information can be observed from the outside (which processes
> > are running etc).
> 
> why do you assume that xdm uses the raw result from /dev/mem?

I don't.  That would be obviously too foolish.  It would also not make sense
by Branden's original mail which clearly stated that xdm can read several
megabytes from /dev/mem.  I assume they do this because they know that
/dev/mem doesn't contain much entropy, and as such they try to get enough
randomness squeezed out of it by reading more and more of it.  This is a
dubious approach.

> running,
> say, md5 over the results would give you something as close to random
> as i doubt you could find a difference.

You are mistaken.  Do yourself a favour and get a book about (pseudo)
random number generators, entropy, hash functions and cryptography.
If you don't start with random numbers, you can turn the numbers upside
down, it won't get any more random than what you started with.

Thanks,
Marcus

-- 
`Rhubarb is no Egyptian god.' GNU  http://www.gnu.org[EMAIL PROTECTED]
Marcus Brinkmann  The Hurd http://www.gnu.org/software/hurd/
[EMAIL PROTECTED]
http://www.marcus-brinkmann.de/



Re: a small C program to test xdm's /dev/mem reading on your architecture

2002-08-26 Thread Matthew Wilcox
On Mon, Aug 26, 2002 at 09:10:54PM +0200, Marcus Brinkmann wrote:
> Also, reading /dev/mem doesn't sound very secure at all (even if it works)
> because the patterns in the memory of a computer are probably predictable
> and a lot of information can be observed from the outside (which processes
> are running etc).

why do you assume that xdm uses the raw result from /dev/mem?  running,
say, md5 over the results would give you something as close to random
as i doubt you could find a difference.

-- 
Revolutions do not require corporate support.



Re: a small C program to test xdm's /dev/mem reading on your architecture

2002-08-26 Thread Marcus Brinkmann
On Mon, Aug 26, 2002 at 12:50:22PM -0500, Branden Robinson wrote:
> > I can't believe he actually intends to keep it like this..
> 
> I'm going to #define DEV_RANDOM /dev/random for Linux systems.

That's bad, because that will drain the entropy a lot, and it might
block for a long time, and that for no good reason as I don't think the
magic cookie needs strong cryptographical security (for comparison: The
secret key of a public key cryptography key pair should be created using
/dev/random, while for session keys /dev/urandom is good enough).

Also, reading /dev/mem doesn't sound very secure at all (even if it works)
because the patterns in the memory of a computer are probably predictable
and a lot of information can be observed from the outside (which processes
are running etc).

Thanks,
Marcus

-- 
`Rhubarb is no Egyptian god.' GNU  http://www.gnu.org[EMAIL PROTECTED]
Marcus Brinkmann  The Hurd http://www.gnu.org/software/hurd/
[EMAIL PROTECTED]
http://www.marcus-brinkmann.de/



BUSINESS RELATIONSHIP

2002-08-26 Thread CAPT. PAUL DIMANGO.
CAPT. PAUL DIMANGO.
 TEL. 27 73 234 9108.
 FAX 27 72 486 3248.
 Dear Sir,
URGENT INVESTMENT OFFER
I know you will be surprise to receive this email from me,
but please this letter is a request from
 someone in dare need of assistance. I Capt. PAUL DIMANGO from Angola, a 
personal aide
 to the late Jonas Savimbi of UNITA Angola who was ambushed and killed on 
Friday 22 of
 February 2002. I got your name and address from a business desk chamber of 
commerce
 and industry in Johannesburg South Africa. I decided to solicit for your 
business assistance
 to transfer the sum of US$26. 5 Million (Twenty Six Million Five Hundred 
Thousand
United State Dollars only) from my Boss safe deposit into your personal or 
company's account.
 Before the death of Jonas Savimbi, I was in charge of overseeing his personal 
finances and the
 up keep of his family expenses. I have access to most of the money he starched 
away in a private
 security firm in South Africa. This was made possible because he entrusted me 
with the authority
 to use my name in depositing these funds, which he realized from the sales of 
Diamond in Angola.
 This is to avert any suspicion prior to when this money will be used for the 
purchase of Arms and
 Ammunitions. Before his death I received on his behalf a payment of US$26.5 
Million
 (Twenty Six Million Five Hundred Thousand Unites State Dollars ) in cash, 
which I deposited in
 a vault of private security company here in Johannesburg, South Africa but I 
deposited the funds
 as Diplomatic Archival Antique? this I did for my security. I am now living in 
South Africa,
 as a political Asylum seeker because the situation in my country is not safe 
for me to go back as
 there is bound to be serious power tussle and the fate of UNITA the 
organization that my late
 Boss was the head before he was killed. I have made up my mind to divert this 
money and to
 make a living out of it, since my former boss and I are the only people who 
have the knowledge
 about this last payment. Regulatory law of South Africa does not permit asylum 
seeker certain
financial rights. In view of this, I cannot invest this fund in South Africa 
hence I am seeking your
 assistance to move out this money out of South Africa to a foreign country for 
investment purpose
 which you are going to be the investment manager. For your assistance and 
effort, I am prepared
to offer you 20% of the total fund while 5% will be set aside for any 
incidental expenses that will
 be incurred on the course of this transaction and also we are going to donate 
5% to the Charity
Organization in your country. Please note that this transaction is 100% risk 
free as I have made
adequate arrangement with a bank Director here that will assist us in moving 
out the money
 through a Bank network. The major thing I demand from you is assuring me 
safety of this money
 when it finally gets to you. Further information and arrangement will commence 
as soon as trust;
 confidence and good working relationship is established between us. I shall be 
most grateful if
 you maintain the confidentiality of this matter. Please confirm your interest 
via above telephone
 and fax numbers. And your urgent reply will be highly appreciated.
 Best regards,
CAPT. PAUL DIMANGO.




Re: a small C program to test xdm's /dev/mem reading on your architecture

2002-08-26 Thread Branden Robinson
On Mon, Aug 26, 2002 at 10:23:06AM -0400, Joey Hess wrote:
> matthew green wrote:
> > bad ideas often hang around for a long time.  the only surprising
> > thing to me is how long this one has taken to surface...
> 
> Perhaps Branden is gathering information about what a bad idea this
> really is, to show upstream the error of their ways.

Well, I hadn't reached that conclusion a priori.

> I can't believe he actually intends to keep it like this..

I'm going to #define DEV_RANDOM /dev/random for Linux systems.

-- 
G. Branden Robinson|You should try building some of the
Debian GNU/Linux   |stuff in main that is
[EMAIL PROTECTED] |modern...turning on -Wall is like
http://people.debian.org/~branden/ |turning on the pain. -- James Troup


pgplHz4js2jgu.pgp
Description: PGP signature


Re: a small C program to test xdm's /dev/mem reading on your architecture

2002-08-26 Thread Matthew Wilcox
On Mon, Aug 26, 2002 at 09:06:00AM -0400, Carlos O'Donell wrote:
> Done. I've submitted the output for HPPA boxes running 32 and 64-bit
> kernels. Looks like they pass without any problem. I'll pass on the 

yes, but it may well crash them.  some parts of /dev/mem map random IO
addresses which may not take kindly to being read in an unprovoked manner.

-- 
Revolutions do not require corporate support.



Re: a small C program to test xdm's /dev/mem reading on your architecture

2002-08-26 Thread Joey Hess
matthew green wrote:
> bad ideas often hang around for a long time.  the only surprising
> thing to me is how long this one has taken to surface...

Perhaps Branden is gathering information about what a bad idea this
really is, to show upstream the error of their ways. I can't believe he
actually intends to keep it like this..

FWIW, the program doesn't crash my old 486, which is a bit suprising, I
know that this kind of thing is capable of crashing ISA systems.

-- 
see shy jo



Re: a small C program to test xdm's /dev/mem reading on your architecture

2002-08-26 Thread Carlos O'Donell

Branden,

> The long story, for those interested:
> http://lists.debian.org/debian-x/2002/debian-x-200208/msg00091.html
> (and read the whole thread)
> The short story:
> I need people with root on machines of your given architecture to
> compile and run the attached C program.  It consists of code borrowed
> from xdm's genauth.c program.
> 

Done. I've submitted the output for HPPA boxes running 32 and 64-bit
kernels. Looks like they pass without any problem. I'll pass on the 
test results for an older 715/50 box (the other boxes were an A500 and
C3K).

Secondly, I will open a big can a whoopass on anyone else I see
complaining about /dev/mem reading without providng a patch >:)

Branden is merely asking you to _test_ something.

c.



Re: sparc 5 printing

2002-08-26 Thread Steffan Baron
>
>When compiling the kernel on the sun box its possible to use pc style
>parports. And then if I remember correctly you can use the same modules:
>parport and parport_pc and then print using lp.

No, old SPARC's do not have this PC-style hardware.

Gruss
Steffan



RE: sparc 5 printing

2002-08-26 Thread Matthew Reath
When compiling the kernel on the sun box its possible to use pc style
parports. And then if I remember correctly you can use the same modules:
parport and parport_pc and then print using lp.

I have a printer working on my Ultra10 running debian 2.2r6.

Matt

-Original Message-
From: Simon Ross [mailto:[EMAIL PROTECTED]
Sent: Monday, August 26, 2002 6:51 AM
To: debian-sparc@lists.debian.org
Subject: sparc 5 printing


Hello,

I'm running Debian woody on a SPARC 5 with kernel 2.4.19. I also run an
Intel laptop with Debian woody and kernel 2.4.17. My printer is a
Lexmark Optra E310.

I have managed to setup and print with the Intel setup. The modules
parport, parport_pc and lp worked great! The Optra E310 is also a well
supported postscript printer.
But I want to move the printer onto the SPARC 5 and use it as a network
printer. I've mirrored the setup I had on the Intel box. The only change
was using parport_sunbpp instead of parport_pc. parport_pc would not
complile due to it not seeing a pc parport on the SPARC.

So all is looking ok, prints go into and out of the queue. But nothing
gets printed. No lights flash. Nothing. Any ideas what I'm missing??
Anything I should check??

Cheers
Simon




Re: a small C program to test xdm's /dev/mem reading on your architecture

2002-08-26 Thread Niels Möller
matthew green <[EMAIL PROTECTED]> writes:

> my point is that on modern systems we simply should not read
> from /dev/mem for these purposes _ever_.

It would make some sense to read all the physical memory in the
machine. Unfortunately, I'm not aware of any reasonably way to do
that. Reading /dev/mem does something quite different.

I was about to put /dev/mem reading into my own seed-generation
program a while back, but then [EMAIL PROTECTED] explained to me that it was
a really bad idea. A safer thing to do is to read the raw partitions
on which /var, /tmp and perhaps also swap lives, but I gave up that
plan after I read the GNU df source code looking for a way to get to a
device, given a directory (such as /var) in the filesystem.

But programs such as xdm should not do things like that, regular
generation of cookies etc should use some decent randomness generator
provided with the operating system, be that /dev/urandom or prngd or
whatever.

/Niels



sparc 5 printing

2002-08-26 Thread Simon Ross
Hello,

I'm running Debian woody on a SPARC 5 with kernel 2.4.19. I also run an
Intel laptop with Debian woody and kernel 2.4.17. My printer is a
Lexmark Optra E310.

I have managed to setup and print with the Intel setup. The modules
parport, parport_pc and lp worked great! The Optra E310 is also a well
supported postscript printer.
But I want to move the printer onto the SPARC 5 and use it as a network
printer. I've mirrored the setup I had on the Intel box. The only change
was using parport_sunbpp instead of parport_pc. parport_pc would not
complile due to it not seeing a pc parport on the SPARC.

So all is looking ok, prints go into and out of the queue. But nothing
gets printed. No lights flash. Nothing. Any ideas what I'm missing??
Anything I should check??

Cheers
Simon



signature.asc
Description: This is a digitally signed message part


Re: Sound Config on Ultra 1

2002-08-26 Thread Joshua Uziel
* Tim Chettle <[EMAIL PROTECTED]> [020826 00:52]:
> Hi im getting an error telling me that the sound Driver device cant open 
> /dev/dsp and that the sound server willcontinue using the null device. 
> 
> Can any one point me in the right direction as to how to configure up the 
> sound support. 

You might want to try /dev/audio instead.



I can't bootstrap gcc-3.3 on sparc32/woody...

2002-08-26 Thread Christian Jönsson
I'm trying to build experimental versions of the gcc suite, see
http://gcc.gnu.org, on a sun4m, ie SS20, machine. 

I have two such ones, one dual SuperSparc-II and one quad ROSS. On
both systems I get the following error:

stage1/xgcc -Bstage1/ -B/usr/sparc-linux/bin/ -c   -g -O2 -DIN_GCC   -W -Wall 
-Wwrite-strings -Wstrict-prototypes -Wmissing-prototypes -Wtraditional 
-pedantic -Wno-long-long   -DHAVE_CONFIG_H-I. -I. 
-I/opt/gcc+binutils/gcc/gcc -I/opt/gcc+binutils/gcc/gcc/. 
-I/opt/gcc+binutils/gcc/gcc/config -I/opt/gcc+binutils/gcc/gcc/../include 
/opt/gcc+binutils/gcc/gcc/cppfiles.c -o cppfiles.o
stage1/xgcc -Bstage1/ -B/usr/sparc-linux/bin/ -c   -g -O2 -DIN_GCC   -W -Wall 
-Wwrite-strings -Wstrict-prototypes -Wmissing-prototypes -Wtraditional 
-pedantic -Wno-long-long   -DHAVE_CONFIG_H-I. -I. 
-I/opt/gcc+binutils/gcc/gcc -I/opt/gcc+binutils/gcc/gcc/. 
-I/opt/gcc+binutils/gcc/gcc/config -I/opt/gcc+binutils/gcc/gcc/../include 
/opt/gcc+binutils/gcc/gcc/cpptrad.c -o cpptrad.o
stage1/xgcc -Bstage1/ -B/usr/sparc-linux/bin/ -c   -g -O2 -DIN_GCC   -W -Wall 
-Wwrite-strings -Wstrict-prototypes -Wmissing-prototypes -Wtraditional 
-pedantic -Wno-long-long   -DHAVE_CONFIG_H-I. -I. 
-I/opt/gcc+binutils/gcc/gcc -I/opt/gcc+binutils/gcc/gcc/. 
-I/opt/gcc+binutils/gcc/gcc/config -I/opt/gcc+binutils/gcc/gcc/../include 
/opt/gcc+binutils/gcc/gcc/cpphash.c -o cpphash.o
stage1/xgcc -Bstage1/ -B/usr/sparc-linux/bin/ -c   -g -O2 -DIN_GCC   -W -Wall 
-Wwrite-strings -Wstrict-prototypes -Wmissing-prototypes -Wtraditional 
-pedantic -Wno-long-long   -DHAVE_CONFIG_H-I. -I. 
-I/opt/gcc+binutils/gcc/gcc -I/opt/gcc+binutils/gcc/gcc/. 
-I/opt/gcc+binutils/gcc/gcc/config -I/opt/gcc+binutils/gcc/gcc/../include 
/opt/gcc+binutils/gcc/gcc/cpperror.c -o cpperror.o
/opt/gcc+binutils/gcc/gcc/cppfiles.c:1168: error: parse error before '%' token
/opt/gcc+binutils/gcc/gcc/cppfiles.c:1378: error: syntax error at '#' token
/opt/gcc+binutils/gcc/gcc/cppfiles.c:1383: error: syntax error at '#' token
/opt/gcc+binutils/gcc/gcc/cppfiles.c:1383: error: syntax error at '#' token
/opt/gcc+binutils/gcc/gcc/cppfiles.c:1386: error: syntax error at '#' token
/opt/gcc+binutils/gcc/gcc/cppfiles.c:1386: error: syntax error at '#' token
/opt/gcc+binutils/gcc/gcc/cppfiles.c:1451:25: warning: null character(s) ignored
/opt/gcc+binutils/gcc/gcc/cppfiles.c:1451: confused by earlier errors, bailing 
out
make[2]: *** [cppfiles.o] Error 1
make[2]: *** Waiting for unfinished jobs
make[2]: Leaving directory `/opt/gcc+binutils/objdir/gcc'
make[1]: *** [stage2_build] Error 2
make[1]: Leaving directory `/opt/gcc+binutils/objdir/gcc'
make: *** [bootstrap-lean] Error 2

The thing is that the file cppfiles.c ends on line no 1168, an empty line...

This was on a Debian 3.0 (Woody) quad ROSS sun4m system with these
packages:

binutils   2.12.90.0.1-4
dejagnu1.4.2-1.1
gcc2:2.95.4-14 (Debian prerelease)
gcc-2.95   1:2.95.4-7 (Debian prerelease)
gnat   3.14p-3
self compiled 2.4.19-rc3 SMP kernel running during build and test


Any ideas what is going on? 

Cheers,

/ChJ




Re: a small C program to test xdm's /dev/mem reading on your architecture

2002-08-26 Thread Wichert Akkerman
Previously Kimmo K. I. Surakka wrote:
> I think the "safe" way of getting random data without a decent random
> source would be to write one. This, however, would be more that just
> a small patch.

There is existing code to generate randomness from userland, look at
what current OpenSSH does for example.

Wichert.

-- 
  _
 /[EMAIL PROTECTED] This space intentionally left occupied \
| [EMAIL PROTECTED]http://www.wiggy.net/ |
| 1024D/2FA3BC2D 576E 100B 518D 2F16 36B0  2805 3CB8 9250 2FA3 BC2D |



Re: a small C program to test xdm's /dev/mem reading on your architecture

2002-08-26 Thread Thomas Horsten
> On Mon, Aug 26, 2002 at 05:04:26PM +1000, matthew green wrote:
> > actually, i hadn't, but there wasn't very much there besides the
> > fact that people found it was xdm reading /dev/mem and a small
> > patch for debian to enable /dev/random (i'd suggest /dev/urandom).
>
> If any of these it should be /dev/random. /dev/urandom would stall most of
> the time on headless systems, which is the only place where I (and very
> likely a lot of other people too) run xdm in the first place.

No, it's random that stalls if the entropy pool is not full.

// Thomas



RE: a small C program to test xdm's /dev/mem reading on your architecture

2002-08-26 Thread Julian Mehnle
Filip Van Raemdonck <[EMAIL PROTECTED]> wrote:
> On Mon, Aug 26, 2002 at 05:04:26PM +1000, matthew green wrote:
> > actually, i hadn't, but there wasn't very much there besides the
> > fact that people found it was xdm reading /dev/mem and a small
> > patch for debian to enable /dev/random (i'd suggest /dev/urandom).
>
> If any of these it should be /dev/random. /dev/urandom would stall most of
> the time on headless systems, which is the only place where I (and very
> likely a lot of other people too) run xdm in the first place.

You're mistaken here: /dev/random blocks, /dev/urandom doesn't.

Julian.



Re: a small C program to test xdm's /dev/mem reading on your architecture

2002-08-26 Thread Kimmo K. I. Surakka
On Mon, 26 Aug 2002 17:04:26 +1000
"matthew green" <[EMAIL PROTECTED]> wrote:

> actually, i hadn't, but there wasn't very much there besides the
> fact that people found it was xdm reading /dev/mem and a small
> patch for debian to enable /dev/random (i'd suggest /dev/urandom).
> 
> my point is that on modern systems we simply should not read
> from /dev/mem for these purposes _ever_.  so far it has shown to
> be unsafe on at least:

I believe the /dev/mem gets read only in systems where no /dev/(u)random
exists. There really are such systems. Agreed, reading raw memory is an
unstable and dangerous way of getting enthropy, but xdm needs some way
of getting it. If I understood the thread correctly, the preferred way
indeed is the /dev/(u)random way. Still, the unlucky ones with no
/dev/(u)random should not be forgotten.

I think the "safe" way of getting random data without a decent random
source would be to write one. This, however, would be more that just
a small patch. A simple random number generator doesn't do, since it's
all too predictable. One approach could be using two separate threads
to read the same rnd-generator, so the system's scheduler would make
the resulting data sequence unpredictable. However, I believe this is
not very portable approach either: it is only possible, if threads are.
And even if the system supports mt-programming, how can we be sure
that the thread switching happens unpredictably? So, a better solution
is needed. Probably one even exists.

Just my 2 cents,

Kusti



Re: a small C program to test xdm's /dev/mem reading on your architecture

2002-08-26 Thread Filip Van Raemdonck
Hi,

On Mon, Aug 26, 2002 at 05:04:26PM +1000, matthew green wrote:
>
> > > why don't you use /dev/urandom if it exists, as it does on pretty
> > > much all modern UNIX platforms?
> >
> > I see you haven't read the thread.
>
> 
> actually, i hadn't, but there wasn't very much there besides the
> fact that people found it was xdm reading /dev/mem and a small
> patch for debian to enable /dev/random (i'd suggest /dev/urandom).

If any of these it should be /dev/random. /dev/urandom would stall most of
the time on headless systems, which is the only place where I (and very
likely a lot of other people too) run xdm in the first place.


Regards,

Filip

-- 
 shorty: its not exactly intuitive, since women dont follow boolean
 logic
 or any logic known to man, for that matter



G'Day from Australia

2002-08-26 Thread BIZOP

Hello,

We understand you are interested in "genuine" home-based businesses that offer 
security and peace of mind, as well as an excellent income.

If this is the case, we sincerely believe we may have just what you are looking 
for ... superb incomes from low risk, financially sound companies backed by 
stable management.

Be assured, this is NOT a scam. It is a genuine opportunity that has been fully 
researched.

You will find full details on our web page at: http://x-elle.com 


(Please note, we have taken particular care to ensure this email is sent to 
only those who are interested in home-based businesses (or working from home). 
Despite our efforts, there are always exceptions and you might have received 
this in error. If this is the case, please accept our sincere apologies. This 
is a once-off mailing and you will not hear from us again. Thanks.)


Kind regards,

Pieter and Pam
(Living the Dream in sunny Australia !)



Sound Config on Ultra 1

2002-08-26 Thread Tim Chettle
Hi im getting an error telling me that the sound Driver device cant open 
/dev/dsp and that the sound server willcontinue using the null device. 

Can any one point me in the right direction as to how to configure up the 
sound support. 


Thanks

Tim 



Re: a small C program to test xdm's /dev/mem reading on your architecture

2002-08-26 Thread Helge Kreutzmann
Hello !
I'll run it later on different alphas, but I checked it on a
ppc-machine running AIX if this is of any interest to you:

[EMAIL PROTECTED]: /root # ./readmem.aix.x 
Reading data from /dev/mem...
read #2 of 8192 bytes 
...
read #1024 of 8192 bytes 
done with read of /dev/mem (returned 1).
sumFile() succeeded.

There are 1023 lines starting with "read" (starting with number 2).

Greetings

Helge
-- 
Helge Kreutzmann, Dipl.-Phys.   [EMAIL PROTECTED]
  gpg signed mail preferredgpg-key: finger [EMAIL PROTECTED]
64bit GNU powered  http://www.itp.uni-hannover.de/~kreutzm
   Help keep free software "libre": http://www.freepatents.org/


pgpNHP54rOldi.pgp
Description: PGP signature


re: a small C program to test xdm's /dev/mem reading on your architecture

2002-08-26 Thread matthew green
   
   On Mon, Aug 26, 2002 at 04:28:38PM +1000, matthew green wrote:
   > wow, this is such a bad idea.
   
   It originated upstream.

mmm, xdm.
   
   In fact, judging by CVS logs it has been in xdm's source for many, many
   years.

bad ideas often hang around for a long time.  the only surprising
thing to me is how long this one has taken to surface...

   
   > why don't you use /dev/urandom if it exists, as it does on pretty
   > much all modern UNIX platforms?
   > 
   > *shudder*
   
   I see you haven't read the thread.


actually, i hadn't, but there wasn't very much there besides the
fact that people found it was xdm reading /dev/mem and a small
patch for debian to enable /dev/random (i'd suggest /dev/urandom).

my point is that on modern systems we simply should not read
from /dev/mem for these purposes _ever_.  so far it has shown to
be unsafe on at least:

- ia64
- arm
- mips
- ultrasparc

i'm sure there are more...

i don't see the purpose in running the program you posted - we
shouldn't care whether it works, just don't do it.  i'm going to
patch NetBSD xsrc shortly to fix this if it isn't already...


.mrg.



Re: a small C program to test xdm's /dev/mem reading on your architecture

2002-08-26 Thread Branden Robinson
On Mon, Aug 26, 2002 at 04:28:38PM +1000, matthew green wrote:
> wow, this is such a bad idea.

It originated upstream.

In fact, judging by CVS logs it has been in xdm's source for many, many
years.

> why don't you use /dev/urandom if it exists, as it does on pretty
> much all modern UNIX platforms?
> 
> *shudder*

I see you haven't read the thread.

-- 
G. Branden Robinson|
Debian GNU/Linux   | De minimis non curat lex.
[EMAIL PROTECTED] |
http://people.debian.org/~branden/ |


pgp7FmERy363V.pgp
Description: PGP signature


re: a small C program to test xdm's /dev/mem reading on your architecture

2002-08-26 Thread matthew green
   
   Be warned: on at least some architectures (notably IA-64), this sort of
   read has been known to cause untrapped machine checks (a.k.a., lockups
   or spontaneous reboots).  Arguably the kernel should trap this sort of
   nonsense, so you may be in the mood to file a bug against "kernel" after
   running this program.

wow, this is such a bad idea.  the kernel *can't* trap that sort of
thing in a lot of cases.  simply the hardware goes catatonic.  this
is true of ultrasparc machines as well. you may also access some random
"device" memory causing it do do something unexpected.  "read" can be
very destructive of device state...


why don't you use /dev/urandom if it exists, as it does on pretty
much all modern UNIX platforms?


*shudder*


.mrg.



a small C program to test xdm's /dev/mem reading on your architecture

2002-08-26 Thread Branden Robinson
The long story, for those interested:

http://lists.debian.org/debian-x/2002/debian-x-200208/msg00091.html

(and read the whole thread)

The short story:

I need people with root on machines of your given architecture to
compile and run the attached C program.  It consists of code borrowed
from xdm's genauth.c program.

The X Strike Force is trying to determine for which architectures it's a
bad idea to read several megabytes of data sequentially from /dev/mem,
because this is exactly what XDM currently does when generating an
XDM-AUTHORIZATION-1 cookie.

Be warned: on at least some architectures (notably IA-64), this sort of
read has been known to cause untrapped machine checks (a.k.a., lockups
or spontaneous reboots).  Arguably the kernel should trap this sort of
nonsense, so you may be in the mood to file a bug against "kernel" after
running this program.

I and the other folks at the X Strike Force need to know the following
things:

1) whether or not this program works when you run it without arguments
2) if scenario 1) causes problems, what the last line of output was
3) if scenario 1) causes problems, whether invoking this program with
the argument "fragile" helps it
4) if scenario 3) causes problems, what the last line of output was

Remember, this program must be run as root.  If normal users can read
from /dev/mem on your machine, you're in trouble.  :)

-- 
G. Branden Robinson| No math genius, eh?  Then perhaps
Debian GNU/Linux   | you could explain to me where you
[EMAIL PROTECTED] | got these...   PENROSE TILES!
http://people.debian.org/~branden/ | -- Stephen R. Notley
#include 
#include 
#include 
#include 
#include 
#include 
#include 

#define FILE_LIMIT 1024

static int
sumFile (char *name, long sum[2], int dofragile)
{
longbuf[1024*2];
int	cnt;
int	fd;
int	loops;
int	reads;
int	i;
int ret_status = 0;

fd = open (name, O_RDONLY);
if (fd < 0) {
	fprintf(stderr, "Cannot open randomFile \"%s\" (%s)\n", name, strerror(errno));
	return 0;
}
if (dofragile) {
	if (strcmp(name, "/dev/mem") == 0) lseek (fd, (off_t) 0x10, SEEK_SET);
}
reads = FILE_LIMIT;
sum[0] = 0;
sum[1] = 0;
while ((cnt = read (fd, (char *) buf, sizeof (buf))) > 0 && --reads > 0) {
	printf("read #%d of %d bytes \n", (FILE_LIMIT - reads + 1), sizeof (buf));
	loops = cnt / (2 * sizeof (long));
	for (i = 0; i < loops; i+= 2) {
	sum[0] += buf[i];
	sum[1] += buf[i+1];
	ret_status = 1;
	}
}
if (cnt < 0)
	fprintf(stderr, "Cannot read randomFile \"%s\" (%s)\n", name, strerror(errno));
close (fd);
return ret_status;
}

int main(int argc, char *argv[])
{
int status;
int dofragile = 0;
long checksum[2];
char *filename = "/dev/mem";

if (argv[1] != NULL && (strncmp(argv[1], "fragile", 7) == 0)) {
	dofragile = 1;
}
printf("Reading data from %s%s...\n", (dofragile ? "(fragile) " : ""), filename);
status = sumFile(filename, checksum, dofragile);
printf("done with read of %s%s (returned %d).\n", (dofragile ? "(fragile) " : ""), filename, status);
printf("sumFile() %s.\n", (status ? "succeeded" : "failed" ));

exit(0);
}


pgp1AslsoG9Qu.pgp
Description: PGP signature