the joy of whois, was Re: after attacks ar logged.

2000-02-08 Thread Nate Waddoups

On Tue, 8 Feb 2000, Wayne Dyer wrote:

> What I do is this:
> 
> $ whois 209.96.41.

Neat trick, I didn't realize you could query like that.

Queries like whois [EMAIL PROTECTED] give additional information about
the offender and/or their ISP.
 
> $ whois [EMAIL PROTECTED]
> 
> This gives the admin contact.

Speaking of which, does anyone know of a command-line tool that will let
you do:

$ whobe anyrandomdomain.com

...and give you the results like whois when netsol had everything
monopolized?  It'd kind of tedious to do whois in two steps and before I
write a perl script to automate the process I figure I should ask if it's
already been done.



-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.



blank screen

2000-02-08 Thread Nate Waddoups


I tend to leave my server's monitor on all the time in character mode. On
my old machine (MDA adaptor and monochrome monitor), the screen would go
blank and stay that way.  I'm used to the monitor going blank,
screen-saver-style, and waking up with you press a key, but after a few
days (or weeks?) it would just stay blank no matter what.  Rebooting would
fix it, but I couldn't find anything else that would wake it up.  

Since I never used the monitor much anyhow, I didn't think much of it...  
Then I upgraded to new hardware and RH 5 and the problem went away.  I
assumed it was fixed.  Then I moved to a new machine and RH6 and the
problem is back.

I've tried killing and restarting mingettys to no effect.  Even tried
SvgaTextMode but no luck there either.  I hate the idea that I might have
to reboot to see my screen again.  That just sounds so Gatesian.  Anyone
have a better idea?

---
Assume just 4 million businesses on the Internet today...
If 1% of them sent you one piece of junk email per year,
you'd still have to wade through over 100 messages per day.



-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.



RE: Disk Druid

2000-02-07 Thread Nate Waddoups

On Mon, 7 Feb 2000, Manuel Antonio Camacho Quesada wrote:

> Disk DruidRobert: using DiskDruid after you finished your installation will
> ruin your partitions, and erase your information. If you want to keep your
> actual information, you should look for a repartitioning tool such as
> PartitionMagic or FIPS.

Suppose you're installing a new drive - can you start druid from the
command line?  Is there any reason you wouldn't want to?  I hope to find
time to put a new drive in this week, so I'm curious.

Thanks.


-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.



RE: Syslogd murders Named??

2000-02-04 Thread Nate Waddoups

On Fri, 4 Feb 2000, Ounsted, Toby wrote:

>   I'm pretty sure it's the logrotate - the presumption being
> that named is trying to write to the file, the file gets rotated, named
> commits suicide.  The obvious one is to have named log to a file other than
> 'messages' and ot rotate that file but it's not a real fix and I don't think
> that named should behave that way in the first place..

How are you testing named's live/dead status? 

Specifically, what happens when you use nslookup to interrogate it after
the logs are rotated?

Does "ps aux | grep named" suggest that the process is still running?

I ask because I have named and logrotate coexisting happily.  However,
watching the log with "tail -f" had me puzzled once upon a time - until I
realized that named wasn't gone, it just wasn't logging where I was
looking.



-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.



Re: cron

2000-02-04 Thread Nate Waddoups

On Thu, 3 Feb 2000, Nate Waddoups wrote:

> My /etc/crontab is set up to run 'daily' jobs at 4am.  But they run at
> 4pm.  'date' returns a proper time - it doesn't seem to have any am/pm
> confusion.  Any idea where the problem might lie?

...and, by popular demand, here's the relevant line from crontab:

02 4 * * * root run-parts /etc/cron.daily

My understanding is that the "4" means "run this at 0400 hours, aka 4am."
And if I wanted 4pm I'd make that 4 a 16.
But it runs at 4pm anyhow.

What am I missing?

Many thanks.


-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.



Re: Syslogd murders Named??

2000-02-04 Thread Nate Waddoups

On Thu, 3 Feb 2000, Ounsted, Toby wrote:

> My named is dying! Here's what I'm seeing: named chugging gracefully along
> doing its stuff every hour and responding to queries. The only thing going
> on in between is SYSLOGD RESTART - after which named takes no further
> interest in doing anything until I reset named (KILL -HUP) at 9:42 at which
> point everything is happy again. Has anyone else experienced similar
> behaviour?? (I think) I've now seen this behaviour 2 Mondays in a row..
> 
> It's a stock 6.1 installation with no component updates.  If it's happening
> to me then it's got to be happening somewhere else

How are you watching the log?  If it's with "tail -f" then chances are the
name server IS still doing it's thing, but it's being logged to a file
other than the one you're watching.  Try restarting your "tail" after
syslog restarts, you'll probably see it there.

The syslog restart, by the way, is most likely just a sign that logrotate
is doing it's thing.  You'll probably find a logrotate script in your
/etc/cron.daily and "killall -HUP syslogd" in your /etc/logrotate.conf

Cheers.


-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.



Re: cron

2000-02-04 Thread Nate Waddoups


A different cron question...

My /etc/crontab is set up to run 'daily' jobs at 4am.  But they run at
4pm.  'date' returns a proper time - it doesn't seem to have any am/pm
confusion.  Any idea where the problem might lie?


-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.



Re: multiple receives

2000-02-01 Thread Nate Waddoups

On Tue, 1 Feb 2000, LomYst wrote:

> Is it just me or do I receive each email from this list four times?


It's just you.


It's just you.


It's just you.


It's just you.





-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.



Re: renaming the 'nobody' account

2000-01-31 Thread Nate Waddoups

On Mon, 31 Jan 2000, Brad 'GreyBear' Davis wrote:

> Bouncing a message is going to eat at least as many, and almost certainly
> more, CPU cycles than quietly flushing it out the port, but it does have the
> satisfaction of knowing that you are spamming them as much as they are
> spamming you.

I figure every time they send "RCPT TO" to my SMTP server, my machine does
a lookup (a vrfy and/or an expn, for those of you following along at
home).  I'd rather hang up on them at that point than go through the
immense trouble of delivering the message data to /dev/null. :-)

OK, really now...  It's the principle! 

> And of course you can always send back a canned message alerting them of the
> fact that their spam is unsolicited and therefore technically illegal in
> many parts of the globe.

Actually, most of the time, you CAN'T do that.  It's increasingly rare
(oxymoron?) to see a valid email address in an unsolicited commercial
email message.  1-800 numbers seem to be catching on though, and I rather
like the personal touch.  Not sure if FCC prohibitions on calling people
and cursing at them apply in this scenario, so be careful out there. You
can also note the web site (if they have one) and notify the admins there
(angelfire is usually quick to pull the plug).

If you feel like joining in, help me bitch at sprint until the they pull
the plug on http://www.bulkisp.com




-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.



wandering OT, was Re: renaming the 'nobody' account

2000-01-31 Thread Nate Waddoups

On 31 Jan 2000, Dominic Mitchell wrote:

> By any chance are these messages with full headers?  I have to fight
> badly formated chinese spam.  What is happening here is that the mail
> message getting split in 2 parts.  One of the part has incomplete
> headers (missing "from" and "received" field).  I have not find an
> easy to get rid of them even with procmail recipes.

Yes, I do have the full headers of these messages - they were sent by way
of a poorly configured SMTP server in Japan.  The server doesn't include
the IP address of the machine that sent the message, so the usual header
detective work doesn't help much.  On the other hand, it was a traditional
make.money.fast chain letter, so I do have the address of a post office
box belonging to the sender (spammers are not rocket scientists).

The "from" header is optional anyhow - when one mail server talks to
another, the recipient's email address is communicated separately from the
message itself, and the "from" header is basically just part of the
message.

IMO procmail filtering is more trouble that it's worth.  I used to use
this approach, but spammers rarely use the same "from" address twice (nor
any other recognizable message attribute, really).  This worked when
AGIS.net would let people like Sanford Wallace and Walt Rines send email
from their own domain names, but that's pretty rare now.  It's no use
adding a new line to your procmail filter if the spammer is going to
send their next message from a completely different throwaway dialup
account and a completely different third-party SMTP relay.



-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.



Re: renaming the 'nobody' account

2000-01-31 Thread Nate Waddoups

On Mon, 31 Jan 2000, Brad 'GreyBear' Davis wrote:

> Why not use procmail or even a redirect in /etc/alias to /dev/null? If all
> you care about is not filling the account's email bin up, this is easier to
> do, and doesn't force you to futz with the account.

I have moral objections to allowing spammers to commandeer my clock cycles
(and it's just a Pentium-90, so I haven't many to spare).  I'd rather
bounce the messages than receive them.  Plus there's a small (very small)
chance that bouncing messages to that address will limit the spammers' use
of the address.

No, these are not highly rationally defensible reasons. :-)  I am apalled
by spam for a number of reasons and simply ignoring the situation (e.g.
redirect to /dev/null) is the least attractive solution I can imagine.

Something from a .signature file I use from time to time:  If you'll
assume for a moment that there are just 4 million businesses on the
Internet today... If ONE percent of them sent you ONE piece of junk email
per year, you'd still have to wade through over 100 messages per day.

Nate "defender of the free world" Waddoups


-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.



renaming the 'nobody' account

2000-01-31 Thread Nate Waddoups


The "nobody" account on my system is receiving spam on a pretty regular
basis now.  Before I rename "nobody" to something else and start bouncing
mail to that address, is there anything I should consider?  Any software
that might have that userid/email address hard coded?

Thanks


-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.



Re: @Home & Port Scan Activity

2000-01-31 Thread Nate Waddoups

On Mon, 31 Jan 2000, Christopher Molnar wrote:

> On another note, is it legal what they are doing? They are doing something
> that the FBI goes around and arrests people for. They are entering
> mycomputr system, wihout authorization.

Read the fine print on your contract before getting TOO enthused about
that idea.  You may have already agreed to let them do various creepy
things in the name of keeping the peace.  

On the other hand, you may not have.  In which case it might be gratifying
to slap them around a little. :-)


-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.



RE: expn and vrfy

2000-01-29 Thread Nate Waddoups

On Fri, 28 Jan 2000, Tony Johnson wrote:

> [useful info about turning off expn/vrfy]
> 
> these options give outside users the ability to see if a paticular username
> is valid on your system by telnetiing to smtp port.  Someone, for example,
> could get all the users who are subscribed to this mailing list through expn
> and them spam them...

They're also handy for troubleshooting mail delivery problems, for example
they will let you verify (vrfy) whether an email address is valid or not,
and expand (expn) an alias.

Telnet to your own port 25.  You might be surprised how user-friendly smtp
servers are, considering what they're intended for. :-)

Try typing things like:

expn root
vrfy root
expn yourownusername
vrfy yourownusername
expn bogususername
vrfy bogususername
expn something-list

Do this on your own machine, or a machine run by someone who knows you
well, lest your learning experience be mistaken for a pre-attack
surveillance exercise. :-)

Expanding a majordomo list won't give you the names of the subscribers (at
least not on my machine, maybe it depends on configuration), but if you
set up a simple list with your /etc/aliases file you will see the
addresses on that list.

[If you want to know who is on a list, try sending "who something-list" to
the majordomo address.  Sometimes it works, sometimes it doesn't.]

Back in the early days of spam hunting, expn/vrfy was a somewhat useful
way to determine whether or not an address was real or bogus, sometimes
you'd find that a spammer had set up a temporary address that forwarded to
their "real" account, stuff like that.  They can reveal more than you'd
want an outsider to know though, so more and more servers are disabling
them.  I kinda miss it sometimes. :-)



-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.



updating with rpm

2000-01-29 Thread Nate Waddoups


To date I've always downloaded and built tar/tgz distributions, but I'm
trying to get on the rpm bandwagon... I seem to be doing something wrong
though.  I tried:

rpm -v --freshen ftp://updates.redhat.com/6.1/i386/sysklogd-1.3.31-14.i386.rpm

...but "syslogd -v" reports "syslogd 1.3-3" and my /sbin/syslogd has a
timestamp that's a couple months old (around the time of the install, I
think).

Anyone want to venture a guess as to what I'm doing wrong?

Thanks.


-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.



Re: I also have lots of attacks from this place.

2000-01-27 Thread Nate Waddoups


Interesting.  It had been my understanding that everything under
.da.uu.net was assigned dynamically.  Rumour has it that the "tnt" in
1Cust190.tnt1.iowa-city.ia.da.uu.net refers to the Lucent "max tnt" access
boxes, which I assumed meant 56k dialups for your average dialup internet
access.  I just read that these things support ISDN and DSL as well as
analog modems, though...

Not that it really matters...  As someone pointed out a moment ago, you
would do well to document the attacks, and email the relevant logs to
[EMAIL PROTECTED] There's a fair chance you can get the offender booted.  
If you both write, and if the same customer has been using that IP address
for days, it's even more likely that uu.net will take some kind of action.

In fact, if you see it happen again, pick up the phone... here's something
from their web site:

For live incidents, please contact UUNET Internet Abuse Investigations at
1-800-900-0241, option 2,3,1 24 hours a day.


On Thu, 27 Jan 2000, Sean Clarke wrote:

> No just for information.   I seen a post from another person with the same
> host name that had attacked them and I get this one at least 2 time a day.
> But fortunately I have everything blocked and no one can get acces (
> Ihope)  So far so good.  If it is a dial up then possible a spoof because
> I have the same hostname everyday...
> 
> 


-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.



Re: I also have lots of attacks from this place.

2000-01-27 Thread Nate Waddoups

On Thu, 27 Jan 2000, Sean Clarke wrote:

> Be warn this hostname/ip have been causing me alot of grief.
> 
> Host:  1Cust190.tnt1.iowa-city.ia.da.uu.net

Two things come to mind...

First, that's a uu.net dialup IP, so there's a good chance that the person
attacking your system has another IP address by now, and the person using
that IP address now is not the same person who was attacking.

Second, I prefer to disable access to every service other than WWW and
(maybe) FTP from *.da.uu.net entirely.  Ditto for every other dynamic-IP
dialup address space I learn of.  

This goes double for SMTP.  Legitimate uu.net users for the most part use
uu.net SMTP servers to send mail.  To my knowledge, every single
connection to my own port 25 from *.da.uu.net has been from a spammer.

There's a "dial-up list" blackhole system for SMTP, but I haven't been
able to get it to work.  :-/  If anyone wants to share tips on configuring
this, I'm all ears!

Blocking access like this is a topic of some debate, but personally I
think it's worth the trouble.  YMMV, it's your machine and your decision.

It's not just da.uu.net, of course.  Some of the other "big" dialup
domains include:

popsite.net 
dial-access.att.net 
pub-ip.psi.net 
dialsprint.net 
dialup.earthlink.net 




-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.



Re: System Access Attempts

2000-01-19 Thread Nate Waddoups


Best way, as in most definite: turn of your telnet server - comment out
the appropriate line in /etc/inetd.conf, then killall -HUP inetd

Then use SSH for your own connections.  

Nobody will be able to get in via your telnet daemon if it isn't
running... but these folks will probably just go after other services
after that (pop imap ssh ftp dns, whatever).

Keep track of the IPs they're using - they may just be coming from an
ISP's dialup pool, or from two or three such pools, coordinating via IRC.
Block those ISPs netblocks via hosts.deny or null routing or firewalling.

On Mon, 17 Jan 2000, William B. Herman wrote:

>  It seems that I have people who are trying to telnet into my machine.  They
> seem to be either changing their ISP or spoofing their IP address.  There is
> no reason these addresses should be telneting into our machine.  My guess is
> they are trying brute force to gain access.  What is the best way to protect
> our system against such an attack?
> 
> -Bill Herman
> Technology Chairman
> Pi Kappa Alpha - Gamma Tau Chapter
> [EMAIL PROTECTED]
> [EMAIL PROTECTED]
> 
> 
> 
> 
> -- 
> To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
> as the Subject.
> 

---
Assume just 4 million businesses on the Internet today...
If 1% of them sent you one piece of junk email per year,
you'd still have to wade through over 100 messages per day.


-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.



Re: Opinions

2000-01-11 Thread Nate Waddoups

On Tue, 11 Jan 2000, Jeremy Bradley wrote:

> Please do not take this as a flame, I am serious about this.  I would like
> to hear opinions of why users of this list are so happy with Redhat compared
> to Microsoft.  

The four things that mean the most to me, personally: 

1: It gives me a way to get mileage out of old PCs that Gates would like
us all to think of as doorstops because they will never, ever, run a
Microsoft operating system other than DOS at an acceptable speed.

2: It never crashes.  At least I haven't seen it crash yet in the five
years I've been using it.  Not counting the day I made a shell script that
called itself recursively - and even that was before I realized that
"killall thatdamnscript.sh" would have saved me.

3: It supports multiple concurrent users.

4: Complete remote administration.  I confess to adding ssh for security,
but even without it, you can address pretty much any system configuration
problem from pretty much anywhere, up to an including a reboot.  Just
don't hose up your networking config if you're further away than the next
room. :-)  I'm still waiting for command-line replacement of NICs, video
cards, faulty hard drives, and the like, but NT doesn't have that either.
  
(and 5: Linux and its cousins use /forward/slashes/ instead of \backward\.
I was at a computer shop the other day snickering at three adjacent
'ergonomic' keyboards, each of which put the backslash key in a different
location, all inaccessible without a hand contortion or a brief
abandonment of 'home row.' Meanwhile, all three had the forward slash
located just under the typist's right pinky.)

I run a small ISP just for grins.  There are maybe ten users, three of
whom use it every day and two more of whom use it every few days.  Until
about a year ago, we were all hosted from a 486/33 with two 200MB disks
and 24MB of RAM.  For two, maybe three years, this little box did SMTP,
POP3, HTTP, FTP, DNS, various other acronyms, and a couple of us ran Pine
on it via telnet to read email.

Try that with Microsoftware. :-)

I recently moved everything to a whopping big Pentium 90 (not Pentium III,
not II, not even Pro, just Pentium 90) with 14GB disk space and 64MB RAM.
Pine is a little snappier, I have space for my budding collection of
homebrew MPEGs, and if the disks fail I can replace them with
currently-available new drives.  

The 486 is destined for firewall duty elsewhere, so we won't all have to
spend quite so much time waiting for the NT Proxy Server to reboot for one
reason or another.  The 486 probably wouldn't know what to do with a disk
bigger than 400MB, but if the disks crap out, I'll boot from floppy and
NFS.  This is the cheapest firewall solution I could think of.  We were
using a similar box on our T1 at work to great effect for a couple years.
(65-120 employees, depending on how far back you look look, and to be
honest I think we could just use a half-T1 and still not clog the pipe)

> I downloaded RH 6.1 and installed it on the second drive of my 200 MMX
> at home.  I found it to be a little tricky configuring things such as
> the internet connection and such.

Installation is my biggest gripe...  even been through the process 4-5
times at least, and I still hate it.  Some of the complexity is a natural
side effect of the large feature set, but still...  I would be nice if you
could go forward and backward through the installation 'wizard' screens
without having to retype stuff all the time.

And the linux hardware compatibility list is still small, compared to
microsoft's.  That's changing, but I don't expect parity anytime soon.

> I am sure if I had a little UNIX background it wouldn't have been that
> bad.  I had though that most users went to Linux to get away from
> Microsoft bugs and patches and all of that crap, but now after being
> on the lists I see that users are constantly adding patches and
> recompiling kernels and such. Is this type the type of stuff that has
> to be done, or is this mostly just the little hacker and developer
> type things?

I think your perceptions are skewed by the sample group you're looking at.  
Many of the people who post to the lists are probably linux enthusiasts,
who see such things as opportunities to play with their toys, not as
hassles that impede their progress toward some other goal.  I myself fall
in the middle.  I don't mind recompiling, I even prefer .tgz distributions
to .rpm, but still wish I could have had added NFS with a command line
trick instead of a kernel rebuild.

I don't bother with patches except in the case of security issues - Linux
and MS seem to be on par with each other there, with Linux having a small
advantage perhaps (owing to the longer history of recreational hacking on
open source).

> What would be the next step?  You guys start talking about configuring
> modules and compiling kernels, it makes my head hurt and makes me want
> to run back to my NT server!  I don't think I could compile a kernel
> to save my 

Re: Best Partition Plan

2000-01-10 Thread Nate Waddoups

On Mon, 10 Jan 2000, Todd A. Jacobs wrote:

> [...] stick with /, /boot, and /home plus a swap partition. Keeping
> /home seperate lets you reformat without hosing your data. 

Sound advice.  I didn't think to put /boot on its own partition, but
perhaps for my next install...  

I put /usr/local/ on its own partition for the same hoseless reformatting
reason.  If you wanted to get creative I guess you could symlink
/usr/local/ to /home/usr.local and get the same advantage with one less
partition...

I also created a separate partition for /var/log and /var/spool so the
system wouldn't get too hosed in the event of a DOS attack on on the mail
spool or system logs (mailbombs, etc).  

Plus I had all this disk space to play with. :-)

There is no 'right' answer of course...  Back in the days of 200MB disks,
I put / on one drive and /usr on the other, because that was the only way
to get everything to fit!

---
Assume just 4 million businesses on the Internet today...
If 1% of them sent you one piece of junk email per year,
you'd still have to wade through over 100 messages per day.


-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.



Re: viewing of /var/logs

2000-01-06 Thread Nate Waddoups

On Fri, 7 Jan 2000, Bruce Williams wrote:

> Whats the best way of viewing the log files, and what are the main files to look at.
> I seem to remember that there was  a X program to view log files.

Dunno if this is the 'best' way, but I run the following in a telnet
window or at the console:

/usr/bin/tail -f \
/var/log/messages \
/var/log/maillog  \
/var/log/secure   \
/var/log/httpd/*[a-z] \
/var/log/xferlog 

I've only got a handful of users, so this is a convenient way to keep an
eye on things.  On a busier system, maillog and httpd logs would probably
get out of hand.

If I want to dig through a particular log file, I use less.
If I want to know if something in particular has happened, I grep.


-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.



Re: four IDE interfaces

2000-01-04 Thread Nate Waddoups

On Tue, 4 Jan 2000, A. Gent wrote:

> This message was sent from Geocrawler.com by "A. Gent" <[EMAIL PROTECTED]>
> Be sure to reply to that address.
> 
> Has anyone set up 3 or 4 IDE interfaces, supporting 6-8 hard drives under RH 6.1?
> 
> It needs probably an extra PCI card - anyone can recommend one?

I recently installed a Promise Ultra66 PCI card with two IDE channels.
Theoretically this should support 8 drives (2 momboard channels, 2 PCI
card channels, 2 drives per channel).  I've only got two drives installed
(an ata/33 drive on the momboard and an ata/66 drive on the PCI card) but
I have no reason to doubt that 8 would work fine.

The promise driver I have is a module, which (as far as I can tell) means
that I can't boot from drives on the PCI card, but that's not a problem
for me as I'm booting from the other drive anyhow.  There may be
compiled-in kernel drivers too, I haven't looked very hard since I got it
working with the module driver.

---
Assume just 4 million businesses on the Internet today...
If 1% of them sent you one piece of junk email per year,
you'd still have to wade through over 100 messages per day.


-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.



Image download from Sony TRV-510

2000-01-04 Thread Nate Waddoups


Anyone know if there is a linux tool that will download images via the
Sony TRV-510 or even any other Sony camera that uses the serial port?

And if anyone wants to suggest a better mailing list for this question,
I'm all ears.

Thanks.

---
Assume just 4 million businesses on the Internet today...
If 1% of them sent you one piece of junk email per year,
you'd still have to wade through over 100 messages per day.


-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.



Re: Quick Cracked maybe ?

2000-01-04 Thread Nate Waddoups

On Tue, 4 Jan 2000, JAMES VANETTEN wrote:

> I have had some really weird things happen to my web server over the
> last week. The name server stops for no reason, sometimes apache
> stops. When I login nothing seems to work right. I checked my login
> file and it is a differant size from my mail server login file. I have
> suspected someone has cracked the system.

A couple years ago some kids cracked an account I had on a friend's
system.  The first thing I noticed was that my login files were changed.
You'd think someone that didn't want to get caught would be smarter that
than, but apparently not. :-)

Anyhow, I suggest a "ps aux" and some investigation to see if they're
running any nefarious processes behind your back.  In my case they had
installed an IRC server, renamed the executable to "mail," and left it
running.  It still stuck out like a sore thumb, since nothing named "mail"
is normally running under my userid, but it was a nice try.

> I am going to rebuild the system from scratch. For now can I just copy
> the /bin/login file from my mail server and put it on my web server??

You could, but I recommend also limiting IP access from just one or two
other machines, except port 80.  Set all of the shells to /bin/false,
except root and other accounts that absolutely need the shell, and change
the passwords on all of those accounts.  When you change the passwords, do
so via ssh or the console.  The aforementioned account was originally
compromised with a packet sniffer (and I've been using ssh ever since).

And rebuild the machine ASAP.  You never know what tentacles may have been
installed when you weren't looking.

---
Assume just 4 million businesses on the Internet today...
If 1% of them sent you one piece of junk email per year,
you'd still have to wade through over 100 messages per day.


-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.



Re: ssh2 w/o password for root (was rsh for root)

2000-01-04 Thread Nate Waddoups

On Mon, 3 Jan 2000, Hiten Sonpal wrote:

> I've done this (well, I'm using ssh2, and I've enabled host-based
> authentication according to the man page), and set up a .rhosts file
> for root allowing root to connect from the local machine (host2).

Try "cp .rhosts .shosts" and try it again.  No promises though. 

I'd probably have more to offer if I hadn't just erased and un-set all of
this stuff on my own machine.  It took me a while to find the winning
combination myself, but after I finished with the rdist stuff, it was more
of a liability than an asset.

---
Assume just 4 million businesses on the Internet today...
If 1% of them sent you one piece of junk email per year,
you'd still have to wade through over 100 messages per day.



-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.



RE: IRC

2000-01-03 Thread Nate Waddoups


If memory serves, the irc command line syntax is:

irc nickname server

So, "irc M1K3 irc.core.com" would connect you to irc.core.com with the
K-rad ultra-3L33T3 nickname of "M1K3"  :-)

But I haven't done much IRC in a long time, so no promises!


On Mon, 3 Jan 2000, Wilde, Jeff wrote:

> /server irc.core.com
> 
> -Original Message-
> From: Michael J. McGillick [mailto:[EMAIL PROTECTED]]
> Sent: Thursday, December 30, 1999 2:41 PM
> To: [EMAIL PROTECTED]
> Subject: IRC
> 
> 
> Afternoon folks:
> 
> when using irc from a command line in Linux, how do I tell it to connect
> to a specific IRC server?  I've tried irc  name and it always sems
> to come up to some default server.  Is there an rc file somewhere that
> needs to be modified, or is there an argument I can give to irc to tell it
> to connect to a different server than the default?
> 
> - Mike
> 
> 
> -- 
> To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
> as the Subject.
> 
> 
> -- 
> To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
> as the Subject.
> 

---
Assume just 4 million businesses on the Internet today...
If 1% of them sent you one piece of junk email per year,
you'd still have to wade through over 100 messages per day.


-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.



Re: How small is small?

1999-12-30 Thread Nate Waddoups

On Thu, 30 Dec 1999, Kerry Blalock wrote:

> I am trying to salvage some old hardware for as much of a system as
> possible as a project for my grandson. I have a 486sx25 with 16 meg ram,
> and two small harddrives. One, a 245 M ibm, the other a 202 Calvalier.

I was using a 468/33 with about 400 MB disk and 16 of ram until just a
couple days ago.  It's bound for duty as a firewall as soon as I can find
the time.

> When setting up Redhat 6.0, I can not get disk druid to partition the
> drives to a usable state. Everything works, until I try to go forward
> from here, but I get a message that I have not set up a swap file. I
> have actually set it up, but when I go back, is has been erased. 
> I removed the second drive, and am able to get a bare, bare system
> going. Only editor is vi, and no xwindows, gnome, or any other modules
> from the popup selector. 

On my 486, I went through some trouble ("custom" install, and "select
packages individually") to get rid of X, but I was able to keep the
C compiler and perl.  It's tedious, but you can do it.

As far as your swap file issues, have you tried putting the swap file on
the "other" disk?  Or, once the system in installed and functioning with a
single disk, install the second disk, use fdisk and mkfs to get it ready,
copy /usr onto it (or something equally big), then mount it on /usr.

> How can I get the second drive enabled for use? Part of the project
> was to get my grandson to start playing with C programing. Would at
> least like to get that module operating.

It should be possible.

---
Assume just 4 million businesses on the Internet today...
If 1% of them sent you one piece of junk email per year,
you'd still have to wade through over 100 messages per day.


-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.



Re: rsh for root

1999-12-28 Thread Nate Waddoups

On Tue, 28 Dec 1999, Hiten Sonpal wrote:

> > > Does anyone know what needs to be done to enable rsh access for root? 
> > 
> > Yeah, spell it "ssh" instead of "rsh" and you're in business. :-)
> 
> I'm basically trying to run rdist here, and I'd like to be able to have it
> run automatically via cron and not have to store the password in some
> file. I guess I don't really care if I use ssh, rsh or tftp... :-)

No problem, then.  I did the same thing earlier this month when I moved my
system from one box (with old bad drives) to another (with new ones).  
You can run rdist over ssh if you just set ssh to use rhosts
authentication.

The rdist command looks something like:

rdist   -f distfile \
-P /usr/local/bin/ssh \
-l file=rdist.log=notice,nerror,ferror,warning

And check these lines in /etc/sshd_config:

IgnoreRhosts no
RhostsAuthentication yes
AllowSHosts [space-separated list of IP addresses]

---
Assume just 4 million businesses on the Internet today...
If 1% of them sent you one piece of junk email per year,
you'd still have to wade through over 100 messages per day.


-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.



Re: rsh for root

1999-12-27 Thread Nate Waddoups

On Mon, 27 Dec 1999, Hiten Sonpal wrote:

> Does anyone know what needs to be done to enable rsh access for root? 

Yeah, spell it "ssh" instead of "rsh" and you're in business. :-)

Seriously, though, it's a piece o' cake with ssh, and much more secure,
too.  

I disabled telnet and rsh and pop3 on my system after my account on
a friend's box got cracked with a packet sniffer.  We talked with the kids
who did it on IRC, and surprisingly enough they were quite willing to
explain how it all worked.  I've been using ssh ever since.

---
Assume just 4 million businesses on the Internet today...
If 1% of them sent you one piece of junk email per year,
you'd still have to wade through over 100 messages per day.


-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.



Re: Installing onto a 34.2 GB IDE drive

1999-12-22 Thread Nate Waddoups

On Wed, 22 Dec 1999, Chuck Mead wrote:

> Sadly... Red Hat doesn't have on-line archives. I archive the list at
> moongroup.com.
> 
> Try http://www.moongroup.com/redhat.phtml

On the one hand, I applaud your efforts... on the other hand, I'm not real
keen about having my email address posted on the web in machine-readable
form.  This attracts spam as well as legitimate email.  There's even a
company based not far from my office that sells spamming software
specifically designed to facilitate this kind of thing.

I don't know what percentage of the list I can speak for when I say this,
but I really don't like spam and I do all I can to avoid it.  This
includes keeping my email addresses off the web (and using temporary
aliases for public forums (fora?) like this one - "linuxlists" is not my
regular userid).

Anyhow, when I ran and archived my own mailing list, I used a perl script
to munge all of the email addresses in the hypermail archive.  
"[EMAIL PROTECTED]" gets turned into "user(at)host.com" thoughout the archive.  
I figured that was just bad enough to escape the spam spiders but still
just good enough to allow real people to make contact.  The perl thing is
not the most efficient thing by any means (my list had only a dozen or so
people on it) but it might be a place to start.  I'd be happy to provide
you with a copy.

---
Assume just 4 million businesses on the Internet today...
If 1% of them sent you one piece of junk email per year,
you'd still have to wade through over 100 messages per day.


-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.



RE: [OT] History of the mouse

1999-12-22 Thread Nate Waddoups

On Wed, 22 Dec 1999, Alan Mead wrote:

> As for SmallTalk being an OS, I dont know but IIRC BASIC was essentially
> the OS of the early Macs.

I don't know much about the early macs, but I do know that BASIC was part
and parcel of the OS for several micros of that era - Commodore PET and
64, Apple and Apple II, maybe even the earliest IBM PC/XT machines.  I
would have guessed that the first Macs were Apple's first departure from
BASIC-as-OS, but I've never been much interested in Macs so I don't really
know.

If memory serves, I saw reference to part of the system ROM for an old 386
being designated for BASIC (alongside the BIOS).  It was of course used
for other things (or nothing) by that time, but there were still traces of
it in the documentation.  This was backs when serial and parallel port
pinouts and even timing diagrams were commonly included with the
computers..

I had some exposure to Smalltalk in college, and wouldn't be at all
surprised to see it used as an OS.  Heck, if Java had an inherent
development environment, the two would be interchangeable. :-)

---
Assume just 4 million businesses on the Internet today...
If 1% of them sent you one piece of junk email per year,
you'd still have to wade through over 100 messages per day.


-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.



name server / nslookup

1999-12-20 Thread Nate Waddoups


I'm running my own name server, and have been for quite some time.  I've
also been getting this error when I run nslookup:

*** Can't find server name for address (my IP address): Non-existent host/domain
Default Server:  (backup server)

My resolv.conf has my machine and a backup name server (my ISP's) listed,
so it falls back to the ISP server.  After this I can set it to use my
server using the 'server' command, and it works fine.  Since my name
server has always worked well other than this, I've never given it much
thought... but if anyone knows what's causing this and how to make the
error message stop (other than "don't run nslookup!") I'd like to hear
about it.

Cheers.

---
Assume just 4 million businesses on the Internet today...
If 1% of them sent you one piece of junk email per year,
you'd still have to wade through over 100 messages per day.


-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.



Re: exporting filesystems

1999-12-20 Thread Nate Waddoups

On Mon, 20 Dec 1999, Hidong Kim wrote:

> > So, I can use NFS to share / and /root and /var and /etc, since they're on
> > the same disk partition.  But /usr/local and /home will not work - I get
> > "getfh: operation not permitted" every time.  /usr/local is on a different
> > partition than /, and /home is on a whole nother disk.
> 
> Have you looked into root squashing?  Try 'man exports' for more info. 
> Good luck,

I have, but I don't see how user ID mapping would change things...  and
since I definitely WANT root-squashing turned off, I'd hate to think I
would need to tinker with it.

It's kind of a moot point anyhow, because I solved the problem using
rdist, but I'm still curious if this is a bug or if there's a way to make
things work.

---
Assume just 4 million businesses on the Internet today...
If 1% of them sent you one piece of junk email per year,
you'd still have to wade through over 100 messages per day.


-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.



Re: exporting filesystems

1999-12-20 Thread Nate Waddoups

On Mon, 20 Dec 1999, Hidong Kim wrote:

> > I'm now able to get my two machines to mount each others' root partitions,
> > and directories on the root filesystem.  Other filesystems (/usr/local or
> > /home, for example) still don't work.  :-/
> 
> If you're trying to export things like /usr/local from one machine to
> another, do you have the correct entries in your /etc/exports and
> /etc/fstab?  

Yep, I have fstab and exports entries all figured out, and I'm able to
mount anything I want ** if it's on the same disk partition as the
server's root (/) filesystem. **

So, I can use NFS to share / and /root and /var and /etc, since they're on
the same disk partition.  But /usr/local and /home will not work - I get
"getfh: operation not permitted" every time.  /usr/local is on a different
partition than /, and /home is on a whole nother disk.

I'm stumped.

---
Assume just 4 million businesses on the Internet today...
If 1% of them sent you one piece of junk email per year,
you'd still have to wade through over 100 messages per day.


-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.



Re: named on aliased IPs?

1999-12-20 Thread Nate Waddoups

On Sat, 18 Dec 1999, JWalsh wrote:

> Within each named.conf the global options 'directory', 'listen-on',
> and 'pid-file' should each be uniquely defined:
>
> named.conf1:
> options { directory "/var/named1"; listen-on { 1.2.3.4; }; pid-file
> "named1.pid"; };

Most excellent.  The 'listen-on' option is the thing I most wanted to
know, the rest follows naturally...  Thanks for your help.

> This supposedly works even on one interface with aliased ip addresses, but
> I've only ever did it with separate interfaces.

Can't see why not...  at the application level, it's just a matter of
specifying which IP address to listen on - which piece of hardware the
data gets routed through is for the bowels of the OS to decide.

Real-world tests coming soon...

Thanks again.
---
Assume just 4 million businesses on the Internet today...
If 1% of them sent you one piece of junk email per year,
you'd still have to wade through over 100 messages per day.


-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.