Re: OT: Banc of America Article

2003-01-29 Thread David Charlap

Al Rowland wrote:


The PIN is on your card ...


Not for any card I've ever owned.  I've changed my PIN several times 
over the years, and the bank has never re-encoded my card or sent me a 
new card as a result of doing so.

Maybe some banks do store the PIN on the card, but I'm certain that it's 
in the server for ever bank I've used.

I use a not-my-bank ATM in the lobby at work and it doesn't
initiate the call (you can hear the modem dial) until you're beyond the
PIN screen and are actually requesting a transaction.


I'm not surprised.  But the PIN is verified as a part of the transaction.

I've occasionally mistyped my PIN.  The ATM takes the mistake and goes 
straight to the menu.  It's only after requesting a transaction that it 
comes back with the invalid PIN message.

-- David



Re: Is it time to block all Microsoft protocols in the core?

2003-01-28 Thread David Charlap

Joe Abley wrote:


You're using mixed tense in these sentences, so I can't tell whether you 
think that syslog's network port is open by default on operating systems 
today.

On FreeBSD, NetBSD, OpenBSD and Darwin/Mac OS X (the only xterms I 
happen to have open right now) this is not the case, and has not been 
for some time. I presume, perhaps naïvely, that other operating systems 
have done something similar.

Current versions of Linux appear to be safe.  This is from the syslog 
package that ships with RedHat version 8 (sysklogd package version 
1.4.1-10).

	NAME
	sysklogd - Linux system logging utilities.

	...

	OPTIONS
	...
	-rThis option will enable the facility to receive
	  message from the network using an internet domain
	  socket with the syslog service (see  services(5)).
	  The default is to not receive any messages from
	  the network.

	  This option is introduced in version 1.3 of the
	  sysklogd package.   Please note that the default
	  behavior is the opposite of how older versions
	  behave, so you might have to turn this on.

The default RedHat installation does not turn on this option.

Looking through RedHat's FTP server, their 4.2 distribution (the oldest 
on on their server) is at version 1.3-15, and therefore incorporates 
this feature.  This release has a README dated 1997, and the sysklogd 
package on their server is dated December 1996.

I would assume that other Linux distributions from the same era (1997 
through the present) would also have sysklogd version 1.3 or later, and 
therefore have this feature.

-- David



Re: Networking in Africa...

2002-12-03 Thread David Charlap


So what exactly do people do in regards to Web spam?  I block tcp/80 
but would like to hear what others are doing.

Block or rate limit?  I would assume that blocking port 80 in a 
cybercafe wouldn't really work out in the long run.

One possible solution might be to force all traffic through a proxy, and 
have it cache all outgoing form traffic for several weeks.  This way, if 
someone reports abuse, you can search the cache and find out who is 
doing it.  From there, hopefully you'll have enough information to hand 
it over to law enforcement, or at least ban the customer from the cafe.

I don't know what (if any) legal right of privacy is in Nigeria, but I 
would suspect that a publicly posted policy notice (like management 
reserves the right to monitor all traffic and a strict TOS policy) 
should mitigate any legal concerns about doing this.

The only problems I see with this are hard drive space for the cache, 
and the possibility of spammers using secure web sites.  Do any web-mail 
sites use https these days?

-- David



Re: Experts: Don't dismiss cyberattack warning

2002-11-20 Thread David Charlap

Rajendra G. Kulkarni wrote:


I agree. Never underestimate power of a fringe lunatic group to
cause harm.  Now, I am going to go out on a thin limb and
ask the following: When Experts say,
don't dismiss cyberattack warning,  what can somebody like
me (just a regular user) or for that matter
others with several degrees of better knowledge in the workings
of cyber networks than I,  do to stop cyber attacks from happening?


I think the real question (at least for NANOG members) is not whether 
terrorists are ready willing and able to to launch attacks against 
networks.  It should be obvious that they are.

The real question is whether those attacks will be any worse than the 
attacks from other sources that have been hitting our networks on a 
regular basis for the past several years.

Are these terrorists actually trying to figure out ways to crack 
Windows, Linux, IOS and other popular operating systems or are they just 
downloading the same software that the script kiddies are already using?

-- David



Re: Even the New York Times withholds the address

2002-11-19 Thread David Charlap

Barry Shein wrote:


Before we get too, too, smug about this if you view the Manhattan
skyline, particularly downtown (e.g., SOHO/Tribeca) you'll see
house-sized water tanks on many, many buildings, particularly 3-10
story older buildings. I assume due to inadequate water pressure but I
honestly don't know why they're there, but they're all over.

I don't know if they're quite large enough for the proposed use, but
their existence would seem to defy most of the objections asserted
below.


It's my understanding that these tanks exist for the purpose of 
providing adequate water pressure for residential use (e.g. showers, 
faucets, toilets, etc.)  I don't think they could possible hold even a 
small fraction of the water necessary for emergency power generation.

-- David




Re: DNS Subdomains

2002-11-14 Thread David Charlap

Gawie Marais (Home) wrote:


Might be a simple question But... I've got no idea what the answer
could be...

In the early days, one only had a .com address space (amongst the most
popular ones). These days, there is .com(this) and .com(that) and any
kind of .(whatever) you can think of.

My question...

How does one start a .(whatever) ?? Who is actually controlling these
.(whatever) domains ?


Anybody can put a DNS server on the internet that serves a top-level domain.

The hard part is getting the rest of the world to recognize the 
existance of your new TLD, and getting them to recognize your server (or 
pool of servers) as the official server for that TLD.

The official way to get this recognition is to get ICANN 
(http://www.icann.org/) to recognize you.  If you are a government, and 
you want ICANN to recognize your server as serving the TLD corresponding 
to your ISO country code, I don't think it's too big a deal, although 
there may be a lot of red tape to cut through.

If you want to register some other TLD, however, it's almost impossible. 
 Note how long and drawn out (and politically charged) the process was 
in getting the most recent top-level domains (.aero, .biz, .coop, .info, 
.museum, .name and .pro) created.  There are many more proposed TLDs 
that have either been rejected or have been tied up in committees.

It is possible to bypass ICANN, but that approach isn't any better.

One way is to get listed with an alternate root server, but you will 
only be recognized by those service providers that choose to use that 
alternate root.  This is not the entire internet.  I don't even think 
it's a significant portion of it (although I might be wrong here.)

If you don't get listed with an alternate root, then your only choice is 
to get service providers to manually configure their DNS servers to 
point to you for resolving your TLD.  IMO, you've got no chance of 
getting even one major service provider to do this for you.

In short, if you want to create a new top-level domain, don't bother. 
Even if it's possible, I don't think it's worth the effort.

-- David



Re: VeriSign Moves DNS Server To Boost Security

2002-11-11 Thread David Charlap

Stephen Sprunk wrote:

Thus spake Gil Cohen [EMAIL PROTECTED]


In an effort to protect the Internet from future hacking attacks, VeriSign
(Nasdaq: VRSN - news) has moved one of the Net's root servers to an
undisclosed physical and virtual location.


Maybe I'm missing something...  J's virtual location aka IP address is now
available from every DNS server in the world, not to mention the public
announcement that VeriSign made to various lists.  How is this undisclosed?


And how does it help anybody if a root server's address is made secret?

Wouldn't an off-line backup be just as useful and cheaper to implement?

-- David




Re: How do you stop outgoing spam?

2002-09-11 Thread David Charlap


Brad Knowles wrote:
 
 B) KNOW WHO THE HELL YOU'RE GIVING ACCOUNTS TO so that (A) works. Get
 a credit card or verify the phone number and other info (e.g., call
 them back, insist on calling them back.)
 
 Do you know how many credit cards are out there?  Do you know how 
 many of them are fake or stolen?  You can't even get a decent charge 
 that you can reliably apply to them, because the bank at the other end 
 will refuse payment from a non-existent or closed account.

Then do what hotels do to avoid this problem.

When you are given the card number and info, you contact the bank and 
put a hold on the account for the expecte amount of the bill.  When the 
bill actually comes due, you put the charge through.  You know that the 
charge will succeed because the bank is already holding that amount.

If the card is stolen, bogus, overdrawn, etc., then you won't be able to 
place the hold.  In which case, you reject the application.

 CyberCafe's can't use (B), even if it did work.  That would violate 
 their basic premise.

What basic premise?  Free anonymous access?  That's new to me.  Every 
one I've seen charges for access.  They can easily require charge cards 
in advance, and place holds on them, in order to identify stolen cards 
and criminal users.  And once a known-valid card is in hand, it can be 
used to directly impose penalty charges on those that violate the cafe's 
AUP (which should exist and have no-spamming/no-hacking clauses.)

If customers don't want to use charge cards, they can require a large 
cash deposit up-front, just like the video rental stores do if you try 
to get a membership without a charge card.

-- David




Re: How do you stop outgoing spam?

2002-09-10 Thread David Charlap


Rafi Sadowsky wrote:
 
 AFAIK you can tunnel IP over(at least):
 
  1) HTTP(not just use port 80 for non HTTP traffic)
 
  2) ICMP ...
 
  3) DNS queries(needs an external custom cooperating DNS)

E-mail: http://detached.net/mailtunnel

-- David




Re: multicast (was Re: Readiness for IPV6)

2002-07-09 Thread David Charlap


Chris Parker wrote:
 It may be a bit higher, but the number who access multicast content
 is decidedly tiny.  More content would probably push it higher, as
 much fun as it is watching the ISS live on Nasa TV, it does get a
 bit dry.  :)

I think this is a case of if you build it, they will come.

RealPlayer's default configuration is to first attempt to use multicast, 
then fail-over to UDP, then fail-over to TCP.  In other words, if 
multicast is available, the program will use it.

I don't know about other streaming clients, but I would guess that 
others would behave similarly.

-- David




Re: How do I log on while in flight?

2002-06-27 Thread David Charlap


Leigh Anne Chisholm wrote:
 The FCC prohibits communication using a cellular telephone while in an
 aircraft in US airspace.  In Canada, I don't believe there is such a
 regulation.

The GTE airfones installed in most large planes have data ports if you 
must connect a computer.  But be prepared to pay a very steep per-minute 
charge for the connection.

-- David




Re: packet inspection and privacy

2002-06-25 Thread David Charlap


Steven M. Bellovin wrote:
 Mark Kent writes:

 I recently claimed that, in the USA, there is a law that prohibits an
 ISP from inspecting packets in a telecommunications network for
 anything other than traffic statistics or debugging.

 Was I correct?
 
 No.  Or at least you weren't; the Patriot Act may have changed it.
 (I assume you're talking about U.S. law.)
 
 There was a quirk in the wording of the law -- what you say is correct 
 for *telephone* companies, but not ISPs.

You're referring to common carrier status, I think.

This isn't exclusively restricted to phone companies, but that's the way 
it is right now.  I think it may also apply to non-voice carriers that 
sell circuits.  I'm pretty certain that it does not apply to ISPs.

A common carrier is not allowed to monitor/filter traffic on customer 
circuits.  They also can't be held responsible for the traffic on those 
circuits.

-- David





Re: SPEWS?

2002-06-20 Thread David Charlap


Dan Hollis wrote:
 
 Its my box, my hardware, my property. No one has an inherent right
 to force speech on an unwilling recipient.

If you're installing a blacklist on a mail server you keep at home for
yourself, then yes.

If you're running an ISP with thousands of customers, then you also have
to deal with how you're impacting them.  Sure, it may still be your
equipment, but that won't matter if you tick off your paying customers
and they decide to cancel their accounts and go to your competitors.

Blackholing grandma because a spammer uses the same ISP isn't going to
be an easy thing to get your customers to accept.

-- David



Re: SPEWS?

2002-06-20 Thread David Charlap


Dan Hollis wrote:
 On Thu, 20 Jun 2002, David Charlap wrote:

 Blackholing grandma because a spammer uses the same ISP isn't
 going to be an easy thing to get your customers to accept.
 
 if grandma is hosted on chinanet she is already blackholed by most
 western civilization anyway

Who said anything about chinanet?  You're the only one who keeps on
harping back to them.

In case you weren't paying attention, much of this discussion got
started because of a comment about blocking all of sprintlink.net.

-- David



Re: Routers vs. PC's for routing - was list problems?

2002-05-23 Thread David Charlap


Vinny Abello wrote:

 First off, you're right about moving parts generally being a bad
 thing. However, it is not always necessary to eliminate the hard
 drive.  Two drives in a RAID-0 configuration may be reliable
 enough.  Especially if the failure of a single drive sets off
 sufficient alarms so that it can quickly be hot-swapped for a new
 drive.
 
 I'm assuming you meant RAID-1. In RAID-0 if you 'swapped' any drive
 all your striped data is toast. ;)

Oops.  Yes.  of course I meant RAID-1.

 Then there's the issue of the PCI bus.  Standard PCI (32-bit 33MHz)
 has a theoretical maximum bandwidth of about 1Gbit/s.  But you can
 never use all of a PCI bus's bandwidth, so actual limits will be
 less than this.
 
 True... unless going for 64 bit PCI at 66MHz... 

64/66 PCI has 4 times as much bandwidth - about 4Gbit/s.  Much better
than standard PCI, but hard to find on a PC-compatible motherboard, and
expensive when you do find it.  Enough bandwidth for 10 line-rate 100M
Ethernet ports or six line-rate OC-3 ports (in theory, anyway).  But not
really enough for anything faster (OC-12 or GigE) if you want line-rate
forwarding.

-- David



Re: DoS on ftp port

2002-05-21 Thread David Charlap


Rob Thomas wrote:
 
 There is a huge increase in FTP scanning as well as the building of
 warez botnets.  The warez scanning is generally for anonymous FTP
 servers with plentiful bandwidth, copious disk space, and generous
 write permissions.  ...

One things I know of that helps here is to make sure you never have a
single directory that is both readable and writeable to an anonymous
user.

In general, restrict writing to users with logins and passwords.  If you
must have an anonymous-write directory (like an incoming folder), make
sure that that directory is not also readable by anonymous users.

This probably won't eliminate all the abuse, but it should make it
impractical enough that the warez servers will probably start looking
elsewhere.

-- David



Re: anybody else been spammed by no-ip.com yet?

2002-05-10 Thread David Charlap


Jim Hickstein wrote:
 
 My customers who reach me (a mail service) from Earthlink dialups
 are affected by this.  Apparently it's still happening.  I run a
 listener on another host and port, known only to this (so far)
 small subset of people, to be able to serve them.  In general, we
 advise people to use their ISP's relay for outgoing mail, but
 Earthlink won't let them relay because the sender domain is not
 one that Earthlink knows about (i.e. is charging them for).
  Apparently.

Something's weird here.

My home DSL line is Earthlink.  I send out mail through their server
(specifically through smtp.mindspring.com), and I have my mail client
cofigured to use my yahoo.com address as the return address.  They don't
seem to care about the message's sender address as long as it comes from
an Earthlink link.

Is the dial-up any different?

Now, I do know that I can't send through the Earthlink/Mindspring server
from outside their network.  But that's not a big deal for me.  When I'm
away from home, I just use the server of whatever network I'm connected
to at the time, which has never given me a problem.

I think Earthlink has an SMTP-AUTH mail server as well.  It's not the
same one that the default dialups use, however.  I think it's
smtpauth.earthlink.com, but I haven't actually tried using it.

-- David



Re: anybody else been spammed by no-ip.com yet?

2002-05-10 Thread David Charlap


Jim Hickstein wrote:
 
 One clarification: Can these users relay through that host, using
 SMTP AUTH, from anywhere, or only from within your network?  I
 observe, for instance, that the instructions for Outlook 2000
 (Windows) does not have them check my [outgoing SMTP] server
 requires authentication.
 
 If the former, great!  I'll inform my affected customers.  If the
 latter, they'll have to fool with settings as they move around --
 which you no doubt already know is asking too much of 99% of the
 population. :-)

According to a message posted to one of the EL support newsgroups a
while back, they run a separate SMTP AUTH mail server that will work as
you describe.  It's not the same server that customers use from an EL
line, however.

I haven't actually used this server.  I also don't know if it's a
permenant thing or if it's just an experiment at this time.

-- David