Re: [Discuss] basic fiber optic phone service vs. Fios phone service

2014-09-15 Thread Dan Ritter
On Sun, Sep 14, 2014 at 10:46:06PM -0400, Tom Metro wrote:
 But then he went on point out that Verizon is offering two different
 products. One being Fios phone service, and the other being basic fiber
 optic phone service. As we know, Fios isn't regulated by the state
 utility regulators, but notably basic fiber optic phone service is. I
 hadn't heard of that before.
 
 A spokeswoman for the state Department of Telecommunications and Cable
 (DTC) said, Because this is a technology upgrade...the department does
 not have the authority to interfere with this change, so consumers must
 either switch to fiber or switch carriers.
 
 So I guess you are out of luck if Verizon picks you for a forced upgrade
 and you want to stick with copper.
 
 The reporter referenced the DTC's advisory on this matter:
 http://www.mass.gov/ocabr/docs/dtc/consumer/fiber-migration-advisory-final-6-27-14.pdf
 
 A quote from that:
 
   The DTC requires that Verizon make available to all residential
   customers in Verizon's service territory a regulated landline voice
   telephone service and Verizon claims its fiber service, where offered,
   will meet this obligation.

Try ordering that regulated fiber optic phone service.

-dsr-
___
Discuss mailing list
Discuss@blu.org
http://lists.blu.org/mailman/listinfo/discuss


Re: [Discuss] selecting a subnet

2014-09-15 Thread Bill Horne
On Sunday, September 14, 2014 10:53:22 PM Steven Santos wrote:
 If your corp network uses addresses in the 192.168.0.0 range, how about
 using an address in the 10.0.0.0 range?

Most small routers limit users to the 192.168.x.x ranges. 

Even if a router allowed use of the 172.16~ or 10~ spaces on it's LAN ports, 
there's no guarantee that a corporate renumbering wouldn't strand the router 
anyway. 

I'd say it's unlikely, but every time I do, there's a little voice in my head 
whispering Famous Last Words ... . 

Bill

-- 
Bill Horne
William Warren Consulting
339-364-8487
___
Discuss mailing list
Discuss@blu.org
http://lists.blu.org/mailman/listinfo/discuss


Re: [Discuss] selecting a subnet

2014-09-15 Thread Bill Horne
On Sunday, September 14, 2014 10:57:19 PM Derek Martin wrote:
 On Wed, Sep 10, 2014 at 04:04:12PM -0400, Stephen Adler wrote:
  I'm setting up a small network at work behind my own firewall. Typically
  I would use a 192.168.1.0/24 network but I'm afraid the IT people at
  work have used that for something in my work LAN environment.
 
 NEVER DO THIS.

Um, yeah, well, ah, I, um, guess I, ah, agree, sort of ...

But ...

There are exceptions to every rule, and when the 3rd-line manager of the 
company I'm working at tells me (always at 4:59 PM on Friday, of course) that 
his son's Boy Scout troop will be visiting on Saturday and that he'd like them 
to be able to use their BlackAndPad dumb phones while they're inside the 
firewall, I am disposed to remember the golden rule and to do what it takes to 
make his wish come true.

If the regular IT staff (who have, of course, left for the day) has set up a 
DMZ to accord visitors Internet access, then the process is simple. If not, 
well, I just try to remember who's name is on the door.

FWIW.

Bill

-- 
Bill Horne
William Warren Consulting
339-364-8487
___
Discuss mailing list
Discuss@blu.org
http://lists.blu.org/mailman/listinfo/discuss


Re: [Discuss] selecting a subnet

2014-09-15 Thread Gordon Marx
On Mon, Sep 15, 2014 at 9:17 AM, Bill Horne b...@horne.net wrote:
 If the regular IT staff (who have, of course, left for the day) has set up a
 DMZ to accord visitors Internet access, then the process is simple. If not,
 well, I just try to remember who's name is on the door.

And whose name is on the pink slip, should you happen to work for a
company with an AUP that you agreed to, and then willfully violated on
the say-so of someone without relevant authority. But hey, it's your
life.
___
Discuss mailing list
Discuss@blu.org
http://lists.blu.org/mailman/listinfo/discuss


Re: [Discuss] selecting a subnet

2014-09-15 Thread Jerry Feldman

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

I am with Derek in this case, but remember that 192.168.n.n, 10.n.n.n
and 172.16 - 172.31 are non-routable meaning that your router SHOULD
never expose these addresses beyond the subnet. So, in the case where
you have to set something up at the last minute, the 192.168 addresses
are not going to conflict. I would also make sure that the wifi is set
up with a pass code so that people outside the group can't use it
although in this case the risk is minimal. especially if you disconnect
the router after the boy scout meeting.


On 09/15/2014 09:17 AM, Bill Horne wrote:
 On Sunday, September 14, 2014 10:57:19 PM Derek Martin wrote:
 On Wed, Sep 10, 2014 at 04:04:12PM -0400, Stephen Adler wrote:
 I'm setting up a small network at work behind my own firewall. Typically
 I would use a 192.168.1.0/24 network but I'm afraid the IT people at
 work have used that for something in my work LAN environment.

 NEVER DO THIS.

 Um, yeah, well, ah, I, um, guess I, ah, agree, sort of ...

 But ...

 There are exceptions to every rule, and when the 3rd-line manager of the
 company I'm working at tells me (always at 4:59 PM on Friday, of
course) that
 his son's Boy Scout troop will be visiting on Saturday and that he'd
like them
 to be able to use their BlackAndPad dumb phones while they're inside the
 firewall, I am disposed to remember the golden rule and to do what it
takes to
 make his wish come true.

 If the regular IT staff (who have, of course, left for the day) has
set up a
 DMZ to accord visitors Internet access, then the process is simple. If
not,
 well, I just try to remember who's name is on the door.

 FWIW.

 Bill


- -- 
Jerry Feldman g...@blu.org
Boston Linux and Unix
PGP key id:3BC1EB90
PGP Key fingerprint: 49E2 C52A FC5A A31F 8D66  C0AF 7CEA 30FC 3BC1 EB90
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEVAwUBVBbpfHzqMPw7weuQAQJ0qAf9HkEBobS0y7hpr1xgzeVYjdLhjDmx6iYr
zpSO13s2whsoP5M+hvGevwF0UM50p/cS/ClSZCoQUGbcYCAyDfgXmzMZxeCTxdly
B3GcQsrgQgewrxFIR83B9j0Qp93Z84KibWKRhHfA5zRVj9Os9S2n1d7KS8zuUDWe
yitn/Iw4d/HCbSSN7+hHeETEF9L8ZaBOc6NJMxespm1ThyFBovr76TeNz6hRChjw
VNGEjfCdjchwN7Y69y9w4JqcMbB8L2oNirP0n54cywXW6XwSkBm6NlVOJ0+ir7YL
XozBW5yROlK2DUcBmMJDDjhgyc75EPNn7o5eaZV+I5KyARg6IlIMbA==
=+1Gh
-END PGP SIGNATURE-

___
Discuss mailing list
Discuss@blu.org
http://lists.blu.org/mailman/listinfo/discuss


Re: [Discuss] basic fiber optic phone service vs. Fios phone service

2014-09-15 Thread Chuck Anderson
On Mon, Sep 15, 2014 at 07:05:24AM -0400, Dan Ritter wrote:
 On Sun, Sep 14, 2014 at 10:46:06PM -0400, Tom Metro wrote:
  But then he went on point out that Verizon is offering two different
  products. One being Fios phone service, and the other being basic fiber
  optic phone service. As we know, Fios isn't regulated by the state
  utility regulators, but notably basic fiber optic phone service is. I
  hadn't heard of that before.
  
  A spokeswoman for the state Department of Telecommunications and Cable
  (DTC) said, Because this is a technology upgrade...the department does
  not have the authority to interfere with this change, so consumers must
  either switch to fiber or switch carriers.
  
  So I guess you are out of luck if Verizon picks you for a forced upgrade
  and you want to stick with copper.
  
  The reporter referenced the DTC's advisory on this matter:
  http://www.mass.gov/ocabr/docs/dtc/consumer/fiber-migration-advisory-final-6-27-14.pdf
  
  A quote from that:
  
The DTC requires that Verizon make available to all residential
customers in Verizon's service territory a regulated landline voice
telephone service and Verizon claims its fiber service, where offered,
will meet this obligation.
 
 Try ordering that regulated fiber optic phone service.

I don't know what it is called or how it is regulated, but my dad has
fiber phone service from Verizon, because when he travels every winter
he has his home phone deactivated, and one year when he came back in
the spring they told him they could only activate a new line on fiber.
My dad doesn't own any computers or mobile devices and hasn't
subscribed to any pay TV service since approximately 1983.  I believe
he has measured (pay per minute) phone service too.
___
Discuss mailing list
Discuss@blu.org
http://lists.blu.org/mailman/listinfo/discuss


Re: [Discuss] SysVinit vs. systemd

2014-09-15 Thread Bill Ricker
If anyone hasn't had enough of SystemD debate ...

G+ has

a SysVinit - SystemD command crib sheet
https://plus.google.com/u/0/116824676284814557701/posts/4Quj7FGTBBD

a full debate and index to blogs elsewhere on topic
https://plus.google.com/u/0/explore/Systemd



On Sat, Sep 13, 2014 at 9:28 AM, Edward Ned Harvey (blu)
b...@nedharvey.com wrote:
 From: discuss-bounces+blu=nedharvey@blu.org [mailto:discuss-
 bounces+blu=nedharvey@blu.org] On Behalf Of Mike Small

 systemd handles a lot of annoying infrastructure for you; for example,
 you do not have to arrange to daemonize programs you run.

 I don't understand this at all. Aren't daemons written as daemons
 (giving up controlling terminal and whatever else within their own
 code).

 Traditional daemons are, because the programmers *had* *no* *other* *choice.* 
  Besides the complexity of actually daemonizing and figuring out how to hook 
 up to a logging facility and manipulate the probably nonstandard running 
 environment, the developer needs to debug their app, so they *also* make it 
 able to run in console mode, and figure out how to manage running in both 
 modes, in both environments.

 But if you want to create something new, the ability to daemonize 
 any-random-command is a really nice convenience factor; you just write any 
 simple console application or shell script, and it behaves exactly the same 
 on your command terminal as it does when you make it a service under systemd.


 because it actively tracks unit status, conditional restarts are not
 dangerous; it shares this behavior with any competently implemented
 active init system.

 Don't understand this. What's a conditional restart and why is it
 dangerous? What's the difference between an active and passive init
 system?

 A passive system is like /etc/init.d scripts, which brainlessly do as they're 
 told when they're told, and don't make any decisions.  If something like 
 mysqld dies, it will not automatically come back up.  An active system will 
 notice mysqld died, recognize that it's not supposed to do that right now, 
 and restart it.  I know SMF will try to restart a failed service some 
 configurable threshold number of times in a configurable threshold period of 
 time, and if the service continually fails, then the service gets disabled.  
 I assume something similar exists for systemd.
 ___
 Discuss mailing list
 Discuss@blu.org
 http://lists.blu.org/mailman/listinfo/discuss



-- 
Bill Ricker
bill.n1...@gmail.com
https://www.linkedin.com/in/n1vux
___
Discuss mailing list
Discuss@blu.org
http://lists.blu.org/mailman/listinfo/discuss


Re: [Discuss] selecting a subnet

2014-09-15 Thread Bill Horne
On Monday, September 15, 2014 09:28:30 AM Jerry Feldman wrote:
 I am with Derek in this case, but remember that 192.168.n.n, 10.n.n.n
 and 172.16 - 172.31 are non-routable meaning that your router SHOULD
 never expose these addresses beyond the subnet. So, in the case where
 you have to set something up at the last minute, the 192.168 addresses
 are not going to conflict. I would also make sure that the wifi is set
 up with a pass code so that people outside the group can't use it
 although in this case the risk is minimal. especially if you disconnect
 the router after the boy scout meeting.

Although the Internet won't relay detached network addresses, that's not 
necessarily the case inside a corporate network. Moreover, the average 
corporate network is awash in accidental routers, including portable 
cellular terminals, laptops with network sharing enabled, and the ubiquitous 
consumer grade routers that are /always/ going to be plugged in at any 
company picnic or other event when IT isn't involved in advance.

I agree that passwords are an important security feature, but I've never seen 
them enabled on any router set up by the well-meaning civilians at company 
events. They aren't thinking about security; they concentrating on not burning 
the hot dogs. 

We could each write a book about the ways that self install technologies 
affect computer network security. It's just not something that anyone in a 
position of authority will ever read. 

FWIW. 

Bill


-- 
Bill Horne
William Warren Consulting
339-364-8487___
Discuss mailing list
Discuss@blu.org
http://lists.blu.org/mailman/listinfo/discuss


Re: [Discuss] selecting a subnet

2014-09-15 Thread Jerry Feldman

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

The reason I suggested password is that it just restricts the ad hoc
user from using the network. This is a short-term requirement for the
OP. And, assuming the WAN port of the router is plugged into the
corporate network. This way the nonroutable addresses will not be
exposed. However, I have seen (and done) routers connected to corporate
networks as switches with the wifi turned on.

In any case, agreeing with Derek that what the OP is doing is not a good
thing, but in this specific case, you are not going to expose those
addresses to the corporate network, but you are allowing them onto the
corporate network rather than an isolated guest network, which is a bad
thing. While the non-routable addresses are not exposed, anyone on that
subnet can go through the firewall. They can get at the company intranet
as well as the Internet.



On 09/15/2014 11:18 AM, Bill Horne wrote:
 On Monday, September 15, 2014 09:28:30 AM Jerry Feldman wrote:
 I am with Derek in this case, but remember that 192.168.n.n, 10.n.n.n
 and 172.16 - 172.31 are non-routable meaning that your router SHOULD
 never expose these addresses beyond the subnet. So, in the case where
 you have to set something up at the last minute, the 192.168 addresses
 are not going to conflict. I would also make sure that the wifi is set
 up with a pass code so that people outside the group can't use it
 although in this case the risk is minimal. especially if you disconnect
 the router after the boy scout meeting.

 Although the Internet won't relay detached network addresses, that's not
 necessarily the case inside a corporate network. Moreover, the average
 corporate network is awash in accidental routers, including portable
 cellular terminals, laptops with network sharing enabled, and the
ubiquitous
 consumer grade routers that are /always/ going to be plugged in at any
 company picnic or other event when IT isn't involved in advance.

 I agree that passwords are an important security feature, but I've
never seen
 them enabled on any router set up by the well-meaning civilians at
company
 events. They aren't thinking about security; they concentrating on not
burning
 the hot dogs.

 We could each write a book about the ways that self install
technologies
 affect computer network security. It's just not something that anyone
in a
 position of authority will ever read.

 FWIW.

 Bill



- -- 
Jerry Feldman g...@blu.org
Boston Linux and Unix
PGP key id:3BC1EB90
PGP Key fingerprint: 49E2 C52A FC5A A31F 8D66  C0AF 7CEA 30FC 3BC1 EB90
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEVAwUBVBcsHnzqMPw7weuQAQJBtggAq5Xb0ViE3xU9854O7IxxXaPFvmFBNzBz
eiQcjxowVNqPZcQqbu7OkWrmmKSowbaOfr5Lqjz/QwDFLt/QsbJn+jntsUNIHwoL
Qkf+wmQEwuH6NJ4Uz2b+zjrBwxgW3WbqJPqkHOM2TWwuWnuOBvwSJ5Lh0ZGUyd5H
fMrca3FlxxlgJ5FmU+Lo4/heKMNdjHJxrMDBAZTPeXw9y+1mNa9nBMYzsb/RTgrz
u5Xv6cJzxYEMbcac1nJhX3doGrbgbc1toCKDRqfFjhsjHHi12To8sJNQN5l5iupF
C+XJur9QX2CMbL4nM3PuwNABvE/Ws2DnYZpPm8eSB39EiwZKOJ2/UQ==
=wwaI
-END PGP SIGNATURE-

___
Discuss mailing list
Discuss@blu.org
http://lists.blu.org/mailman/listinfo/discuss


Re: [Discuss] selecting a subnet

2014-09-15 Thread Bill Horne
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Jerry Feldman wrote:
 The reason I suggested password is that it just restricts the ad hoc
 user from using the network. This is a short-term requirement for the
 OP. And, assuming the WAN port of the router is plugged into the
 corporate network. This way the nonroutable addresses will not be
 exposed. However, I have seen (and done) routers connected to corporate
 networks as switches with the wifi turned on.

 In any case, agreeing with Derek that what the OP is doing is not a good
 thing, but in this specific case, you are not going to expose those
 addresses to the corporate network, but you are allowing them onto the
 corporate network rather than an isolated guest network, which is a bad
 thing. While the non-routable addresses are not exposed, anyone on that
 subnet can go through the firewall. They can get at the company intranet
 as well as the Internet.

I'm not writing clearly, for which I apologize. The point I'm trying
to make is that users will *DEMAND* connectivity whenever *they* feel
they need it. It is not productive to say Call IT, or The rulebook
says ..., because users are unable to gauge security risks, unwilling to
admit that their actions may have negative consequences, and
unforgiving when told No.

I've been there. We've *all* been there. In a nutshell, the problem is
that evolution has not prepared human beings to appreciate long-term
costs in the face of short-term pleasure - that's why cigarettes are
still sold - and too many managers feel that technically adept
subordinates are talking gobbledygook just to feel important and that
the solution to every IT problem is to threaten to kick us in the butt
in order to make the magic bits flow.

At the heart of most security concerns is the simple truth that those
in charge often choose not to concern themselves with maybe warnings
about potential risks in the face of I want ... demands from
{anyone but us}. I feel this is a shortcoming of American management
in general, and I have never discovered a polite or effective way to
say You're being foolish - please don't do that.

FWIW. 

Bill

-BEGIN PGP SIGNATURE-
Version: GnuPG v1
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=Phhz
-END PGP SIGNATURE-

-- 
Bill Horne
William Warren Consulting
339-364-8487
___
Discuss mailing list
Discuss@blu.org
http://lists.blu.org/mailman/listinfo/discuss


Re: [Discuss] automatic daemon restarts

2014-09-15 Thread Tom Metro
Richard Pieri wrote:
 Edward Ned Harvey (blu) wrote:
 An active system will notice mysqld died, recognize that it's not
 supposed to do that right now, and restart it.
 
 Which is a stupid way to run in production. There's a reason why the
 daemon died. That reason needs to be identified so that corrective steps
 can be taken. Blind restarts can obfuscate this information, can cause
 damage to data, and can exacerbate existing damage.

Not to say your points are invalid, but Netflix would disagree with you.
They created a testing tool that intentionally kills random services on
their production systems just to test that automated recovery works
correctly.

 -Tom

-- 
Tom Metro
The Perl Shop, Newton, MA, USA
Predictable On-demand Perl Consulting.
http://www.theperlshop.com/
___
Discuss mailing list
Discuss@blu.org
http://lists.blu.org/mailman/listinfo/discuss


Re: [Discuss] selecting a subnet

2014-09-15 Thread Richard Pieri
On 9/15/2014 3:48 PM, Bill Horne wrote:
 I feel this is a shortcoming of American management in general,

No, not a shortcoming of American management. It's the irrational notion
that pessimism is bad.


 and I have never discovered a polite or effective way to
 say You're being foolish - please don't do that.

You hired me to do a job. If I'm not going to be allowed to do that job
then I will find employment elsewhere. With two weeks' notice ready
just in case said manager thinks you're bluffing. Because if your
manager won't take you seriously then you seriously need to find a new
manager.

-- 
Rich P.
___
Discuss mailing list
Discuss@blu.org
http://lists.blu.org/mailman/listinfo/discuss


Re: [Discuss] automatic daemon restarts

2014-09-15 Thread Richard Pieri
On 9/15/2014 4:15 PM, Tom Metro wrote:
 Not to say your points are invalid, but Netflix would disagree with you.
 They created a testing tool that intentionally kills random services on
 their production systems just to test that automated recovery works
 correctly.

Netflix is a highly available application system that is designed to be
robust in the face of isolated faults and to degrade gracefully under
failure conditions. Chaos Monkey is the tool that they use to test the
implementations of their designs. It works by shutting down random
Netflix-owned instances within the AWS scalable architecture. Automated
recovery in the Netflix environment is simple: spin up a new instance
that is configured identically to the one that failed. They don't try to
restart the faulted instance. It's down for the count and it stays that
way so they can analyze the fault that knocked it out.

This is a /very/ different scenario from what you might have with a
single LAMP instance where systemd keeps restarting MySQL after a
persistent fault of some sort keeps knocking it out. This isn't
automated recovery; it's an automated disaster looking to wreck your tables.

-- 
Rich P.
___
Discuss mailing list
Discuss@blu.org
http://lists.blu.org/mailman/listinfo/discuss


Re: [Discuss] selecting a subnet

2014-09-15 Thread Derek Martin
On Mon, Sep 15, 2014 at 09:17:24AM -0400, Bill Horne wrote:
 On Sunday, September 14, 2014 10:57:19 PM Derek Martin wrote:
  On Wed, Sep 10, 2014 at 04:04:12PM -0400, Stephen Adler wrote:
   I'm setting up a small network at work behind my own firewall. Typically
   I would use a 192.168.1.0/24 network but I'm afraid the IT people at
   work have used that for something in my work LAN environment.
  
  NEVER DO THIS.
 
 Um, yeah, well, ah, I, um, guess I, ah, agree, sort of ...
 
 But ...
 
 There are exceptions to every rule, and when the 3rd-line manager of the 
 company I'm working at tells me (always at 4:59 PM on Friday, of course) that 
 his son's Boy Scout troop will be visiting on Saturday and that he'd like 
 them 
 to be able to use their BlackAndPad dumb phones while they're inside the 
 firewall, I am disposed to remember the golden rule and to do what it takes 
 to 
 make his wish come true.

No, you aren't.  You tell him that setting that up for him last minute
could break the entire company network, and you're sorry but he'll
need to give you more notice than that and get the right people
involved so that this does not happen, because you're not willing to
crush your company's ability to do business for the convenience of his
boyscout troop.

FWIW, this should work, and if it doesn't, you should quit today.
I've been in this position, and I have in fact told a VP at my company
that he was disrupting operations and he needed to stop.  And he did.
And it was a situation very much like what you described.  You be
polite, you be earnest, but you be sure he understands that what he's
asking for is insane.

-- 
Derek D. Martinhttp://www.pizzashack.org/   GPG Key ID: 0xDFBEAD02
-=-=-=-=-
This message is posted from an invalid address.  Replying to it will result in
undeliverable mail due to spam prevention.  Sorry for the inconvenience.

___
Discuss mailing list
Discuss@blu.org
http://lists.blu.org/mailman/listinfo/discuss


Re: [Discuss] selecting a subnet

2014-09-15 Thread Bill Bogstad
On Tue, Sep 16, 2014 at 12:06 AM, Derek Martin inva...@pizzashack.org wrote:
 On Mon, Sep 15, 2014 at 09:17:24AM -0400, Bill Horne wrote:
 On Sunday, September 14, 2014 10:57:19 PM Derek Martin wrote:
  On Wed, Sep 10, 2014 at 04:04:12PM -0400, Stephen Adler wrote:.
...
 FWIW, this should work, and if it doesn't, you should quit today.
 I've been in this position, and I have in fact told a VP at my company
 that he was disrupting operations and he needed to stop.  And he did.
 And it was a situation very much like what you described.  You be
 polite, you be earnest, but you be sure he understands that what he's
 asking for is insane.

And if this doesn't work, write done exactly what you told him/her and get him
to sign a copy.   It's amazing how having to actually sign something tends to
get a manager's attention.

Bill Bogstad
___
Discuss mailing list
Discuss@blu.org
http://lists.blu.org/mailman/listinfo/discuss