Re: Google Earth for Linux beta is available

2006-06-19 Thread Oleg Goldshmidt
Shlomo Solomon [EMAIL PROTECTED] writes:

 The subject says it all - this program is really fantastic. Try
 looking at the pedestrians crossing the street in New York or look
 for your street in Israel (they don't have super-high resolution for
 our part of the world).

 http://earth.google.com/download-earth.html

Call me paranoid, but I believe they really are out there to get me.

I downloaded GoogleEarthLinux.bin and ran it as a normal user. It popped up
a license agreement that I read, and considered really fishy and
unclear. It is quite unclear to me what information I will allow
Google to collect, use, and disseminate outside of Israel and outside
of Google. It is not clear to me whether agreeing to the license is
considered signing for services, creating a Google account (which I
don't have and don't intend to have), and what privacy implications
this entails. Yes, I read Google's privacy policy, and it is not clear
to me which parts apply and which don't. I suspect that all parts
apply.

It is clear to me that I am agreeing to let Google automatically
install updates on my computer as they see fit, and that while I can
terminate the agreement and uninstall the program (I don't know how
easy it is) significant parts of the agreement will still be in force
even after termination.

Has anyone actually studied the agreement and *really* understood its
implications? Google is not a company I would trust implicitly, and I
feel extra paranoid.

-- 
Oleg Goldshmidt | [EMAIL PROTECTED] | http://www.goldshmidt.org

=
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word unsubscribe in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]



Re: Google Earth for Linux beta is available

2006-06-19 Thread Marc A. Volovic
Quoth Oleg Goldshmidt:

 Call me paranoid, but I believe they really are out there to get me.

They are. They, in this case, being they - the faceless and largely
anonymous forces of both evil and good, not to mention several forces in
between and a few at an angle.

[snip running GEL]
 implications? Google is not a company I would trust implicitly, and I
 feel extra paranoid.

Is there a company (or, to take matters to an extreme, a state) that you DO
trust implicitly? Or, as the case may be, EXplicitly. Would you trust
Microsoft? Adobe? CA? IBM? Lenovo? Eplication? Sun Microsystems? Yahoo?
Which?

Would you trust, again implicitly or explicitly, Israel? USA? Russia?
Uganda? Pakistan? Palestine? South Africa? Mexico? Brasil? Togo? Australia?
Canada?

If you trust any one entity, I suggest you read up on nacht und nebel and
its application by various states. Read up on such illustrious people as
Yechiel Horev, Lavrenti Beriya, Ernst Kaltenbrunner who all had a hand in
development of the NuN system.

As for the specific question of GEL - if you want, play with it a bit from
a jail filesystem (which is what I did) and if you like it (which I did
not) - obliterate it.

M

-- 
---MAV
Marc A. Volovic [EMAIL PROTECTED]
Swiftouch, LTD +972-544-676764

=
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word unsubscribe in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]



RE: Writing I/O intercepting driver in Linux

2006-06-19 Thread Michael Sternberg


Michael Sternberg wrote:


We have to write driver that intercept all I/O to disk and notifies
user-mode application with following data: block length and device
number. What is a proper way to implement it: to write a block driver
above disk layer or to implement a file system filter ? If we'll
implement a file system filter could we miss some direct I/O to the disk
? What kind of I/O could we miss ?


There were propositions to use kprobe, systemtap and 
/proc/sys/vm/block_dump.. Unfortunately (as far as I know) those are 
features of 2.6.xx kernels. We have to write for RHEL 3 which uses 2.4.xx 
kernel :( and of course we're not allowed to apply our patches to kernel, 
have to use the RH standard one..


=
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word unsubscribe in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]



Re: 32-bit chroot environement for amd64

2006-06-19 Thread Amit Aronovitch
Avraham Rosenberg wrote:

 packages only. Anyway, I went immediately for it and for transfig.
 I was less lucky with octave2.9:
 Package octave2.9 is not available, but is referred to by another package.
 This may mean that the package is missing, has been obsoleted, or
 is only available from another source
 E: Package octave2.9 has no installation candidate
   
Hmm... Seems that the amd64 version is only available for unstable
(which is the flavor I use)...

http://packages.debian.org/cgi-bin/search_packages.pl?keywords=octave2.9searchon=namessubword=1version=allrelease=all

If you really need it, you could add unstable to your sources.list
(just make sure to put
Apt::Default-Release testing;
in your apt.conf if you wish to avoid a wholesale upgrade to sid).
 The 64-bit octave2.1 does work with the 32-bit xv without problems. I
 still intend to try and build the 64-bit xv version, but this is not
 urgent matter.
 As for submitting it to debian, I am affraid that xv's licence is not
 politically corect enough for them. I prefer it, nevertheless, to
   
Indeed - seems that it's a personal use only license (distributing
binaries is illegal, even if you buy the site license), so even in
non-free it would be illegal.
  However, I'm sure an automatic installer in contrib (like the ones
for Java or MS truetype fonts) would be appreciated.
But, of course, let's not put the cart before the horse - we must have a
working compilation first...

   Amit


=
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word unsubscribe in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]



Re: Google Earth for Linux beta is available

2006-06-19 Thread Ira Abramov
Quoting Marc A. Volovic, from the post of Mon, 19 Jun:
  implications? Google is not a company I would trust implicitly, and I
  feel extra paranoid.
 
 Is there a company (or, to take matters to an extreme, a state) that you DO
 trust implicitly? Or, as the case may be, EXplicitly. Would you trust

well put. I would not trust implicitly any one person or even scientific
factoids I didn't test myself.

then again, I have little trust of my own self. I never give me the root
password, sudo is just fine.

But this is the future, should I quote? You have NO privacy, get over
it!

-- 
Always there for you
Ira Abramov
http://ira.abramov.org/email/

=
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word unsubscribe in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]



Re: Google Earth for Linux beta is available

2006-06-19 Thread Ira Abramov
Quoting Tal Peer, from the post of Mon, 19 Jun:
 Last time I looked into it, I understood the common belief is that
 they are stored in moshav Zakariya (Bet Shemesh area), under the
 grocery store or something

this is getting a bit of topic, but wouldn't you agree it would make
little to no sense to store it all in one place? Some is in the Galilee
aimed at Syria and Iraq, I'm sure... and not for shooting, just as a
scare tactic. Israel knows that Syria knows, and want them to know.

-- 
Purged voter
Ira Abramov
http://ira.abramov.org/email/

=
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word unsubscribe in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]



Preventing email spoofing

2006-06-19 Thread E Leibovich
Is there any automated tool to bounce email not from
the original server? That is, is there a tool that
bounces back emails claiming they're from hostA (their
from:[EMAIL PROTECTED]) however they're really from hostB
(that is, recieved: from hostB...).
This seems a good way to prevent many spam messages
that claim to originate from your server.
Is it a good idea?
Is there any written script that does so?

__
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around 
http://mail.yahoo.com 

=
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word unsubscribe in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]



Re: Preventing email spoofing

2006-06-19 Thread Ehud Karni
On Mon, 19 Jun 2006 04:44:25 -0700 (PDT), E Leibovich wrote:

 Is there any automated tool to bounce email not from
 the original server? That is, is there a tool that
 bounces back emails claiming they're from hostA (their
 from:[EMAIL PROTECTED]) however they're really from hostB
 (that is, recieved: from hostB...).
 This seems a good way to prevent many spam messages
 that claim to originate from your server.
 Is it a good idea?
 Is there any written script that does so?

This is NOT a good way. Many mailing lists and other sources (e.g.
small offices sending their mail through their ISP) will bounce.
Even your email - from: [EMAIL PROTECTED] - had come from
[EMAIL PROTECTED] Remember - all the headers (except
the last Received:, created by your computer) may be forged.

Ehud.


--
 Ehud Karni   Tel: +972-3-7966-561  /\
 Mivtach - Simon  Fax: +972-3-7966-667  \ /  ASCII Ribbon Campaign
 Insurance agencies   (USA) voice mail and   X   Against   HTML   Mail
 http://www.mvs.co.il  FAX:  1-815-5509341  / \
 GnuPG: 98EA398D http://www.keyserver.net/Better Safe Than Sorry

=
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word unsubscribe in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]



RE: Preventing email spoofing

2006-06-19 Thread Kovriga, Gregory
This shouldn't be that easy. For example, I send my mails through my ISP
outgoing mail server while my From: field is always set to my gmail
account.

Regards,
Gregory.

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of E Leibovich
Sent: Monday, June 19, 2006 2:44 PM
To: linux-il
Subject: Preventing email spoofing

Is there any automated tool to bounce email not from
the original server? That is, is there a tool that
bounces back emails claiming they're from hostA (their
from:[EMAIL PROTECTED]) however they're really from hostB
(that is, recieved: from hostB...).
This seems a good way to prevent many spam messages
that claim to originate from your server.
Is it a good idea?
Is there any written script that does so?

__
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around 
http://mail.yahoo.com 

=
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word unsubscribe in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]

To unsubscribe, 
send mail to [EMAIL PROTECTED] with
the word unsubscribe in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]



Re: Preventing email spoofing

2006-06-19 Thread Oded Arbel

--=-RbnXbV2+yK88GJ6KFsTs
Content-Type: text/plain
Content-Transfer-Encoding: 7bit

On Mon, 2006-06-19 at 04:44 -0700, E Leibovich wrote:

 Is there any automated tool to bounce email not from
 the original server? That is, is there a tool that
 bounces back emails claiming they're from hostA (their
 from:[EMAIL PROTECTED]) however they're really from hostB
 (that is, recieved: from hostB...).
 This seems a good way to prevent many spam messages
 that claim to originate from your server.
 Is it a good idea?


You might want to read up on SPF.

--

Oded

::..
If you're in a war, instead of throwing a hand grenade at the enemy,
throw one of those small pumpkins. Maybe it'll make everyone think how
stupid war is, and while  they are thinking, you can throw a real
grenade at them.
-- Deep Thoughts by Jack Handey


--=-RbnXbV2+yK88GJ6KFsTs
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: 7bit

!DOCTYPE HTML PUBLIC -//W3C//DTD HTML 4.0 TRANSITIONAL//EN
HTML
HEAD
  META HTTP-EQUIV=Content-Type CONTENT=text/html; CHARSET=UTF-8
  META NAME=GENERATOR CONTENT=GtkHTML/3.10.1
/HEAD
BODY
On Mon, 2006-06-19 at 04:44 -0700, E Leibovich wrote:
BLOCKQUOTE TYPE=CITE
PRE
FONT COLOR=#00Is there any automated tool to bounce email not 
from/FONT
FONT COLOR=#00the original server? That is, is there a tool that/FONT
FONT COLOR=#00bounces back emails claiming they're from hostA 
(their/FONT
FONT COLOR=#00from:[EMAIL PROTECTED]) however they're really from 
hostB/FONT
FONT COLOR=#00(that is, recieved: from hostB...)./FONT
FONT COLOR=#00This seems a good way to prevent many spam messages/FONT
FONT COLOR=#00that claim to originate from your server./FONT
FONT COLOR=#00Is it a good idea?/FONT
/PRE
/BLOCKQUOTE
BR
You might want to read up on SPF.BR
BR
TABLE CELLSPACING=0 CELLPADDING=0 WIDTH=100%
TR
TD
--
PRE
Oded
/PRE
::..BR
quot;If you're in a war, instead of throwing a hand grenade at the enemy, 
throw one of those small pumpkins. Maybe it'll make everyone think how stupid 
war is, and whilenbsp;nbsp;they are thinking, you can throw a real grenade at 
them.quot;BR
nbsp;nbsp;nbsp;nbsp;-- Deep Thoughts by Jack HandeyBR
BR
/TD
/TR
/TABLE
/BODY
/HTML

--=-RbnXbV2+yK88GJ6KFsTs--


=
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word unsubscribe in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]



Subversion-friendly Shell hacking?

2006-06-19 Thread Omer Zak
I am now reading about Subversion.

Turns out that in order to get Subversion to properly manage and keep
track of history of files even when they are copied or renamed, one
should use 'svn copy' instead of 'cp' and 'svn move' instead of 'mv'.

I wonder whether shells (such as bash) have a facility to do
directory-dependent aliasing.  For example, when your pwd is a directory
checked out from a svn repository (could be identified as having .svn
subdirectory or declared as such in .bash_profile), then your 'cp'
becomes alias to a script which processes cp's arguments and issues the
appropriate 'svn copy' command/s.

 --- Omer
-- 
You haven't made an impact on the world before you caused a Debian
release to be named after Snufkin.
My own blog is at http://tddpirate.livejournal.com/

My opinions, as expressed in this E-mail message, are mine alone.
They do not represent the official policy of any organization with which
I may be affiliated in any way.
WARNING TO SPAMMERS:  at http://www.zak.co.il/spamwarning.html


=
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word unsubscribe in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]



Re: Preventing email spoofing

2006-06-19 Thread Elazar Leibovich

That's very true, I haven't thought of that. Thanks.
Any smarter idea? Maybe I can filter emails coming from my host email
address and then make sure they're not recieved: from unknown source
(spammers has the habbit of including your hostname in the from:
field, so that you'll whitelist them)

On 6/19/06, Ehud Karni [EMAIL PROTECTED] wrote:

On Mon, 19 Jun 2006 04:44:25 -0700 (PDT), E Leibovich wrote:

 Is there any automated tool to bounce email not from
 the original server? That is, is there a tool that
 bounces back emails claiming they're from hostA (their
 from:[EMAIL PROTECTED]) however they're really from hostB
 (that is, recieved: from hostB...).
 This seems a good way to prevent many spam messages
 that claim to originate from your server.
 Is it a good idea?
 Is there any written script that does so?

This is NOT a good way. Many mailing lists and other sources (e.g.
small offices sending their mail through their ISP) will bounce.
Even your email - from: [EMAIL PROTECTED] - had come from
[EMAIL PROTECTED] Remember - all the headers (except
the last Received:, created by your computer) may be forged.

Ehud.


--
 Ehud Karni   Tel: +972-3-7966-561  /\
 Mivtach - Simon  Fax: +972-3-7966-667  \ /  ASCII Ribbon Campaign
 Insurance agencies   (USA) voice mail and   X   Against   HTML   Mail
 http://www.mvs.co.il  FAX:  1-815-5509341  / \
 GnuPG: 98EA398D http://www.keyserver.net/Better Safe Than Sorry



=
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word unsubscribe in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]



Re: Preventing email spoofing

2006-06-19 Thread Ilya Konstantinov
The thought-work was already done for you. As Oded said, read about 
Sender Policy Framework (SPF). Using a mail server with SPF is about all 
you can do; it ain't good news, but trust the smart people who thought 
SPF up there isn't a better option.


Elazar Leibovich wrote:


That's very true, I haven't thought of that. Thanks.
Any smarter idea? Maybe I can filter emails coming from my host email
address and then make sure they're not recieved: from unknown source
(spammers has the habbit of including your hostname in the from:
field, so that you'll whitelist them)

On 6/19/06, Ehud Karni [EMAIL PROTECTED] wrote:

On Mon, 19 Jun 2006 04:44:25 -0700 (PDT), E Leibovich wrote:

 Is there any automated tool to bounce email not from
 the original server? That is, is there a tool that
 bounces back emails claiming they're from hostA (their
 from:[EMAIL PROTECTED]) however they're really from hostB
 (that is, recieved: from hostB...).
 This seems a good way to prevent many spam messages
 that claim to originate from your server.
 Is it a good idea?
 Is there any written script that does so?

This is NOT a good way. Many mailing lists and other sources (e.g.
small offices sending their mail through their ISP) will bounce.
Even your email - from: [EMAIL PROTECTED] - had come from
[EMAIL PROTECTED] Remember - all the headers (except
the last Received:, created by your computer) may be forged.

Ehud.


--
 Ehud Karni   Tel: +972-3-7966-561  /\
 Mivtach - Simon  Fax: +972-3-7966-667  \ /  ASCII Ribbon Campaign
 Insurance agencies   (USA) voice mail and   X   Against   HTML   Mail
 http://www.mvs.co.il  FAX:  1-815-5509341  / \
 GnuPG: 98EA398D http://www.keyserver.net/Better Safe Than Sorry



=
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word unsubscribe in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]




=
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word unsubscribe in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]



Re: Subversion-friendly Shell hacking?

2006-06-19 Thread Baruch Even
Omer Zak wrote:
 I am now reading about Subversion.
 
 Turns out that in order to get Subversion to properly manage and keep
 track of history of files even when they are copied or renamed, one
 should use 'svn copy' instead of 'cp' and 'svn move' instead of 'mv'.
 
 I wonder whether shells (such as bash) have a facility to do
 directory-dependent aliasing.  For example, when your pwd is a directory
 checked out from a svn repository (could be identified as having .svn
 subdirectory or declared as such in .bash_profile), then your 'cp'
 becomes alias to a script which processes cp's arguments and issues the
 appropriate 'svn copy' command/s.
 
  --- Omer

I don't think you can really do that with a simple alias.

What you can do is create a shell function called mv that will check if
the file is in a subversion directory and do svn move on it. The
function will override the call to mv and you'll need to call the real
mv with /bin/mv.

This will require some work since you need to have 'mv a b' and 'svn
x/y/z/a b' and also handle the case when some files are in a subversion
controlled directory but are not version controlled (just temp files of
generated files).

This seems like quite a bit more work than just learning to do svn move IMO.

Baruch

=
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word unsubscribe in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]



Re: Preventing email spoofing

2006-06-19 Thread Elazar Leibovich

Thanks! That's about the tool I've needed.
But do you have experience with it? Does it has many (any) false
positives? Will it reject many valid clients?

On 6/19/06, Ilya Konstantinov [EMAIL PROTECTED] wrote:

The thought-work was already done for you. As Oded said, read about
Sender Policy Framework (SPF). Using a mail server with SPF is about all
you can do; it ain't good news, but trust the smart people who thought
SPF up there isn't a better option.

Elazar Leibovich wrote:

 That's very true, I haven't thought of that. Thanks.
 Any smarter idea? Maybe I can filter emails coming from my host email
 address and then make sure they're not recieved: from unknown source
 (spammers has the habbit of including your hostname in the from:
 field, so that you'll whitelist them)

 On 6/19/06, Ehud Karni [EMAIL PROTECTED] wrote:
 On Mon, 19 Jun 2006 04:44:25 -0700 (PDT), E Leibovich wrote:
 
  Is there any automated tool to bounce email not from
  the original server? That is, is there a tool that
  bounces back emails claiming they're from hostA (their
  from:[EMAIL PROTECTED]) however they're really from hostB
  (that is, recieved: from hostB...).
  This seems a good way to prevent many spam messages
  that claim to originate from your server.
  Is it a good idea?
  Is there any written script that does so?

 This is NOT a good way. Many mailing lists and other sources (e.g.
 small offices sending their mail through their ISP) will bounce.
 Even your email - from: [EMAIL PROTECTED] - had come from
 [EMAIL PROTECTED] Remember - all the headers (except
 the last Received:, created by your computer) may be forged.

 Ehud.


 --
  Ehud Karni   Tel: +972-3-7966-561  /\
  Mivtach - Simon  Fax: +972-3-7966-667  \ /  ASCII Ribbon Campaign
  Insurance agencies   (USA) voice mail and   X   Against   HTML   Mail
  http://www.mvs.co.il  FAX:  1-815-5509341  / \
  GnuPG: 98EA398D http://www.keyserver.net/Better Safe Than Sorry


 =
 To unsubscribe, send mail to [EMAIL PROTECTED] with
 the word unsubscribe in the message body, e.g., run the command
 echo unsubscribe | mail [EMAIL PROTECTED]





=
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word unsubscribe in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]



Re: 32-bit chroot environement for amd64

2006-06-19 Thread Avraham Rosenberg
On Mon, Jun 19, 2006 at 10:43:56AM +0300, Amit Aronovitch wrote:
 Avraham Rosenberg wrote:
 

 Hmm... Seems that the amd64 version is only available for unstable
 (which is the flavor I use)...
 
 http://packages.debian.org/cgi-bin/search_packages.pl?keywords=octave2.9searchon=namessubword=1version=allrelease=all
 
 If you really need it, you could add unstable to your sources.list
 (just make sure to put
 Apt::Default-Release testing;
 in your apt.conf if you wish to avoid a wholesale upgrade to sid).
 But, of course, let's not put the cart before the horse - we must have a
 working compilation first...
 
Amit
Hi Amit,
1-I do have the unstable sources. But they only allow me to
install specific programs, using the -t unstable option, as my
preferences file only lists stable and testing packages. For the
time being I won't install the unstable octave, as it is a big
package with lots of dependencies and would practically mean
going over to unstable, which I am still reluctant to do. The big
advantage of a build from sources is that it erects a separate
subsystem in /usr/local, which is easily thrown away if it affects 
too much the stability of the syatem.
2-Another possibility which does not take much more disk space
(and with nowadays' big disks, who cares anyway ?), is to install
a separate unstable distribution, just for that. I tried to do
it, but, during the bootstrap of the 32-bit chroot system, I
received a cannot download the base configuration package
message. I retried a couple of days later with the same result.
Did you have a similar experience? I used the same mirror 
(http://debian.inode.at/debian-amd64/debianat) which allowed me
to build the first 64-bit system.
3-I did not know about the possibility of tweaking the apt.conf 
that you mentioned. Where can I read about that ? I only know
about pinning (I was never able to guess what numbers should I
write to get the desired result) and the way I mentioned before.
Cheers, Avraham

=
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word unsubscribe in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]



Re: Preventing email spoofing

2006-06-19 Thread Ilya Konstantinov

Elazar Leibovich wrote:


Thanks! That's about the tool I've needed.
But do you have experience with it? Does it has many (any) false
positives? Will it reject many valid clients?
SPF is not about guesswork and false positives. For one, it requires 
the active participation of every domain you wish to be safe about. 
Since that's probably less than 1% of the domains in today's Internet, 
you cannot just refuse mail from domains which don't participate in the 
SPF game. The only thing sensible to do right now, is to refuse messages 
which fail the SPF test for the domain they *claim* to come from; 
everything else should be considered neutral.


The result? You'd be still left with as much scams coming from random 
info domains, but when it comes to some high-profile domains which 
already deployed SPF (microsoft.com, ebay.com, gmail.com, 
hotmail.com...), you'd filter out all scams pretending to be them.


Note that SPF is not something reserved for high-profile domains. Every 
Nigerian scam domain can deploy SPF and then it'll be verifiable fair 
and square. So, no easy way of killing off all those Nigerian scams? You 
betcha there isn't.


=
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word unsubscribe in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]



Re: Subversion-friendly Shell hacking?

2006-06-19 Thread Nadav Har'El
On Mon, Jun 19, 2006, Baruch Even wrote about Re: Subversion-friendly Shell 
hacking?:
  Turns out that in order to get Subversion to properly manage and keep
  track of history of files even when they are copied or renamed, one
  should use 'svn copy' instead of 'cp' and 'svn move' instead of 'mv'.
  
  I wonder whether shells (such as bash) have a facility to do
  directory-dependent aliasing.  For example, when your pwd is a directory
  checked out from a svn repository (could be identified as having .svn
  subdirectory or declared as such in .bash_profile), then your 'cp'
  becomes alias to a script which processes cp's arguments and issues the
  appropriate 'svn copy' command/s.
...
 What you can do is create a shell function called mv that will check if
 the file is in a subversion directory and do svn move on it. The
 function will override the call to mv and you'll need to call the real
 mv with /bin/mv.

Another possible trick is to change cd itself to a function (or, in zsh,
create a new chpwd), and after each directory change, re-alias the cp
and mv commands.


-- 
Nadav Har'El|   Monday, Jun 19 2006, 24 Sivan 5766
[EMAIL PROTECTED] |-
Phone +972-523-790466, ICQ 13349191 |How to become immortal: Read this
http://nadav.harel.org.il   |signature tomorrow and follow its advice.

=
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word unsubscribe in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]



Re: Subversion-friendly Shell hacking?

2006-06-19 Thread Omer Zak
On Mon, 2006-06-19 at 23:57 +0300, Nadav Har'El wrote:
 On Mon, Jun 19, 2006, Baruch Even wrote about Re: Subversion-friendly Shell 
 hacking?:
  What you can do is create a shell function called mv that will check if
  the file is in a subversion directory and do svn move on it. The
  function will override the call to mv and you'll need to call the real
  mv with /bin/mv.
 
 Another possible trick is to change cd itself to a function (or, in zsh,
 create a new chpwd), and after each directory change, re-alias the cp
 and mv commands.

I like this idea.  The 'cp' and 'mv' commands would retain their
efficiency.
In bash, it should be possible to set PROMPT_COMMAND so that it'll also
invoke a re-aliasing script.
  --- Omer
-- 
You haven't made an impact on the world before you caused a Debian
release to be named after Snufkin.
My own blog is at http://tddpirate.livejournal.com/

My opinions, as expressed in this E-mail message, are mine alone.
They do not represent the official policy of any organization with which
I may be affiliated in any way.
WARNING TO SPAMMERS:  at http://www.zak.co.il/spamwarning.html


=
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word unsubscribe in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]



Re: Preventing email spoofing

2006-06-19 Thread Arik Baratz

On 6/19/06, Ilya Konstantinov [EMAIL PROTECTED] wrote:


Note that SPF is not something reserved for high-profile domains. Every
Nigerian scam domain can deploy SPF and then it'll be verifiable fair
and square. So, no easy way of killing off all those Nigerian scams? You
betcha there isn't.


That's because SPF is not intended to solve the spam problem, it's
intended to solve the domain masquarading problem. It's basically an
authentication method where you trust a trusted 3rd party (the DNS
server) to tell you which hosts are allowed to send mail on behalf of
the domain that you're querying about.

For example, my SPF record is:

arik.baratz.org.43200   IN  TXT v=spf1
include:aspmx.googlemail.com ~all

This means that I trust aspmx.googlemail.com to tell which hosts are
allowed to send email on my behalf. Google's SPF record is:

aspmx.googlemail.com.   7200IN  TXT v=spf1
redirect=_spf.google.com

and

_spf.google.com.274 IN  TXT v=spf1
ip4:216.239.56.0/23 ip4:64.233.160.0/19 ip4:66.249.80.0/20
ip4:72.14.192.0/18 ?all

so these are the addresses that can send email for my domain.

The immediate benefit from SPF is that it prevents joe-jobs, some
spammer using your domain to send spam from.

The future benefit when it is widely deployed would be black-list of
domains that have sent spam. Since you can't forge your domain, you'd
have to send spam from a domain you own, therefore you'd have to keep
on buying domains as the existing ones get into the blacklist.

-- Arik

=
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word unsubscribe in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]



Re: Subversion-friendly Shell hacking?

2006-06-19 Thread Amos Shapira

On 20/06/06, Omer Zak [EMAIL PROTECTED] wrote:

On Mon, 2006-06-19 at 23:57 +0300, Nadav Har'El wrote:
 On Mon, Jun 19, 2006, Baruch Even wrote about Re: Subversion-friendly Shell 
hacking?:
  What you can do is create a shell function called mv that will check if
  the file is in a subversion directory and do svn move on it. The
  function will override the call to mv and you'll need to call the real
  mv with /bin/mv.

 Another possible trick is to change cd itself to a function (or, in zsh,
 create a new chpwd), and after each directory change, re-alias the cp
 and mv commands.

I like this idea.  The 'cp' and 'mv' commands would retain their
efficiency.


I don't like the idea - it assumes that you always touch only files in
your current directory. Baruch's suggestion sounds much more general
to me. Efficiency differences are negligible here.

BTW - regardless of the aliasing mechanism you adopt - how are you
going to handle files which are copied/moved between an SVN directory
and a non-SVN one?

--Amos
--
(a grizzly) can tear through a tree like a Jewish mother
through self-esteem.  - The Simpsons

=
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word unsubscribe in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]



(no subject)

2006-06-19 Thread aamehl


Hi all,

I am looking for an elegant solution to my internet connecivity.

I use actcom and connect with a script.
What I want is some fine tuning. I would like the script to run.
When my computer reboots (which isn't often, its Linux after all) When my
connection dies (this is the most important since I often access my home
computer from work)

I was given a script to use with cron, but I never found that it worked for me,
but I could be something I am doing wrong.

I would prefer a more elegent approach which checks to see if I am connected,
the way I do manually ie ifconfig and pinging a known address. If the connection
is down then run the connect script.

Any ideas would be most helpful. I will paste the various scripts I have at the
end of this email.
Thanks,
Aaron

-
[EMAIL PROTECTED]:/usr/sbin# cat ptstart
#!/bin/sh
# Put your connection startup commands here VPN=172.26.255.198
USER=[EMAIL PROTECTED]
MTU=1350
CABLEGW=`route -n | grep ^0.0.0.0 | awk '{ print $1 }'`

cat /etc/ppp/resolv.conf  /etc/resolv.conf

route del default
#route add 172.26.255.198 gw $CABLEGW
route add 172.26.255.198 gw 172.25.96.1
PPTP=`which pptp`
$PPTP $VPN user $USER defaultroute noauth mtu $MTU exit 0 [EMAIL 
PROTECTED]:/usr/sbin#  

---

[EMAIL PROTECTED]:/usr/sbin# cat ptstop
#!/bin/bash
#Put your connection stop commands here
killall pptp
exit 0
/etc/init.d/networking restart
[EMAIL PROTECTED]:/usr/sbin#

-
[EMAIL PROTECTED]:/usr/sbin# cat ptcron
#!/bin/sh
TESTHOST=198.133.219.25 #Host to ping-test: cisco.com
STOPSCRIPT=/usr/sbin/ptstop #Script to stop a connection
STARTSCRIPT=/usr/sbin/ptstart #Script to start a connection #Make sure we
don't have 2 instances on this script running at once [ -e /var/run/ptcron.pid ]
 exit 0 touch /var/run/ptcron.pid # The actual connectivity testing is right
here PING=`which ping` if $PING -c 3 -n $TESTHOST  /dev/null; then exit 0 rm -f
/var/run/ptcron.pid fi

echo -e Link is dead, reloading
$STOPSCRIPT
# wait a little while to let the pppd processes to shut down sleep 2
$STARTSCRIPT rm -f /var/run/ptcron.pid exit 0 [EMAIL PROTECTED]:/usr/sbin#
--

:)



=
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word unsubscribe in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]



RE: (no subject)

2006-06-19 Thread Kovriga, Gregory
There was smth called ppp-watch once. Personally, I use ip.up and
ip.down scripts called by ppp when connection goes up or down to notice
this events and check if the connection down was intentional. If it is
not - a script is being run that attempts to re-connect each 5 minutes
until successful.

Regards,
Gregory.

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of [EMAIL PROTECTED]
Sent: Tuesday, June 20, 2006 8:13 AM
To: linux-il@linux.org.il
Subject: (no subject)



Hi all,

I am looking for an elegant solution to my internet connecivity.

I use actcom and connect with a script.
What I want is some fine tuning. I would like the script to run.
When my computer reboots (which isn't often, its Linux after all) When
my
connection dies (this is the most important since I often access my home
computer from work)

I was given a script to use with cron, but I never found that it worked
for me,
but I could be something I am doing wrong.

I would prefer a more elegent approach which checks to see if I am
connected,
the way I do manually ie ifconfig and pinging a known address. If the
connection
is down then run the connect script.

Any ideas would be most helpful. I will paste the various scripts I have
at the
end of this email.
Thanks,
Aaron

-
[EMAIL PROTECTED]:/usr/sbin# cat ptstart
#!/bin/sh
# Put your connection startup commands here VPN=172.26.255.198
USER=[EMAIL PROTECTED]
MTU=1350
CABLEGW=`route -n | grep ^0.0.0.0 | awk '{ print $1 }'`

cat /etc/ppp/resolv.conf  /etc/resolv.conf

route del default
#route add 172.26.255.198 gw $CABLEGW
route add 172.26.255.198 gw 172.25.96.1
PPTP=`which pptp`
$PPTP $VPN user $USER defaultroute noauth mtu $MTU exit 0
[EMAIL PROTECTED]:/usr/sbin#  

---

[EMAIL PROTECTED]:/usr/sbin# cat ptstop
#!/bin/bash
#Put your connection stop commands here
killall pptp
exit 0
/etc/init.d/networking restart
[EMAIL PROTECTED]:/usr/sbin#

-
[EMAIL PROTECTED]:/usr/sbin# cat ptcron
#!/bin/sh
TESTHOST=198.133.219.25 #Host to ping-test: cisco.com
STOPSCRIPT=/usr/sbin/ptstop #Script to stop a connection
STARTSCRIPT=/usr/sbin/ptstart #Script to start a connection #Make sure
we
don't have 2 instances on this script running at once [ -e
/var/run/ptcron.pid ]
 exit 0 touch /var/run/ptcron.pid # The actual connectivity testing is
right
here PING=`which ping` if $PING -c 3 -n $TESTHOST  /dev/null; then exit
0 rm -f
/var/run/ptcron.pid fi

echo -e Link is dead, reloading
$STOPSCRIPT
# wait a little while to let the pppd processes to shut down sleep 2
$STARTSCRIPT rm -f /var/run/ptcron.pid exit 0 [EMAIL PROTECTED]:/usr/sbin#
--

:)



=
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word unsubscribe in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]

To unsubscribe, 
send mail to [EMAIL PROTECTED] with
the word unsubscribe in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]



Re: (no subject)

2006-06-19 Thread Geoffrey S. Mendelson
On Tue, Jun 20, 2006 at 08:12:57AM +0300, [EMAIL PROTECTED] wrote:
 I am looking for an elegant solution to my internet connecivity.

I use a script called cablecheck. It runs every minute and if there is no
PPP connection, it runs a script called cablestart.

---
#!/bin/bash

X=`ifconfig ppp0 2/dev/null`
if [  $X ==   ] ; then
/usr/local/bin/cablestart
fi
---

The relevant parts of cablestart are:
---
#!/bin/bash

CPS=`ps -ax | grep cablestart | grep -cv grep `

echo cps is  $CPS

if [ 2 == $CPS ] ; then
echo ok starting cable connection
else
echo cablestart is already running.
exit
fi

PS=`ps -ax | grep dhclient | grep eth1 | awk {print \\$1}`

if [   !=  $PS ] ; then
echo killing dhcp client for eth1 psid  $PS
kill -KILL $PS
else
echo no dhcp client running for eth1 (good)
fi

PS=`ps -ax | grep cable.netvision.net.il | grep pptp-linux | awk {print \\$1}`

if [   !=  $PS ] ; then
echo killing pptp client for netvision psid  $PS
kill -KILL $PS
else
echo no pptp client running for netvision (good)
fi


echo shutting down eth1
/sbin/ifdown eth1
echo restarting eth1
/sbin/ifup eth1

---

It's probably sloppy code, but it works. It check to make sure there is
not already a cablestart running  and if there is none, starts one.

Geoff.

-- 
Geoffrey S. Mendelson, Jerusalem, Israel [EMAIL PROTECTED]  N3OWJ/4X1GM
IL Voice: (07)-7424-1667  IL Fax: 972-2-648-1443 U.S. Voice: 1-215-821-1838 
Visit my 'blog at http://geoffstechno.livejournal.com/

=
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word unsubscribe in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]



Re: (no subject)

2006-06-19 Thread aamehl
Thanks that is what I was looking for,

Aaron


Quoting Geoffrey S. Mendelson [EMAIL PROTECTED]:

 On Tue, Jun 20, 2006 at 08:12:57AM +0300, [EMAIL PROTECTED] wrote:
  I am looking for an elegant solution to my internet connecivity.
 
 I use a script called cablecheck. It runs every minute and if there is no
 PPP connection, it runs a script called cablestart.
 
 ---
 #!/bin/bash
 
 X=`ifconfig ppp0 2/dev/null`
 if [  $X ==   ] ; then
   /usr/local/bin/cablestart
 fi
 ---
 
 The relevant parts of cablestart are:
 ---
 #!/bin/bash
 
 CPS=`ps -ax | grep cablestart | grep -cv grep `
 
 echo cps is  $CPS
 
 if [ 2 == $CPS ] ; then
   echo ok starting cable connection
   else
   echo cablestart is already running.
   exit
 fi
 
 PS=`ps -ax | grep dhclient | grep eth1 | awk {print \\$1}`
 
 if [   !=  $PS ] ; then
   echo killing dhcp client for eth1 psid  $PS
   kill -KILL $PS
   else
   echo no dhcp client running for eth1 (good)
 fi
 
 PS=`ps -ax | grep cable.netvision.net.il | grep pptp-linux | awk {print
 \\$1}`
 
 if [   !=  $PS ] ; then
   echo killing pptp client for netvision psid  $PS
   kill -KILL $PS
   else
   echo no pptp client running for netvision (good)
 fi
 
 
 echo shutting down eth1
 /sbin/ifdown eth1
 echo restarting eth1
 /sbin/ifup eth1
 
 ---
 
 It's probably sloppy code, but it works. It check to make sure there is
 not already a cablestart running  and if there is none, starts one.
 
 Geoff.
 
 -- 
 Geoffrey S. Mendelson, Jerusalem, Israel [EMAIL PROTECTED]  N3OWJ/4X1GM
 IL Voice: (07)-7424-1667  IL Fax: 972-2-648-1443 U.S. Voice: 1-215-821-1838 
 Visit my 'blog at http://geoffstechno.livejournal.com/
 






=
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word unsubscribe in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]