Re: wiki log of #dragonfly irc channel

2007-03-09 Thread Helge Rohde
On Friday 09 March 2007 17:54, Clemens Hintze wrote:

> > countries. I believe the reasoning goes along the lines of: they
> > have an
> > urgent suspicion that there is evidence against you (the encrypted
> > partition ), so they can put you into 'Beugehaft' (= coercive
> > detention)
>
> As I understand it, this cannot happen that way in Germany! If your
> e.g. friend are under investigation and they mean *you* have anything
> to tell to help them (e.g. you having the passphrase to your friend's
> crypto container), they can put you into coercive detention, if you
> do not want to coorperate.
>
> But if they suspect *you* have done something criminal, they cannot
> force you to help them to get any evidence against you!

AFAIK they made a special law to be allowed to force you to give out 
passphrases. That law does not take into account the possible existence of a 
second key, so as long as you hand 'em one key per encrypted file/partition 
they find, they cannot put you into coercive detention. 
But I2ANAL, so this is only what i read & heard.

regards,
Helge


Re: wiki log of #dragonfly irc channel

2007-03-09 Thread Clemens Hintze


Am 09.03.2007 um (09) 02:28 schrieb Helge Rohde:

(...)

countries. I believe the reasoning goes along the lines of: they  
have an

urgent suspicion that there is evidence against you (the encrypted
partition ), so they can put you into 'Beugehaft' (= coercive  
detention)


As I understand it, this cannot happen that way in Germany! If your  
e.g. friend are under investigation and they mean *you* have anything  
to tell to help them (e.g. you having the passphrase to your friend's  
crypto container), they can put you into coercive detention, if you  
do not want to coorperate.


But if they suspect *you* have done something criminal, they cannot  
force you to help them to get any evidence against you!


But I am not a lawyer, so I may err here ...


cheers,
Helge


Ciao,
Clemens.


Re: wiki log of #dragonfly irc channel

2007-03-09 Thread Bill Hacker

Joerg Sonnenberger wrote:

On Fri, Mar 09, 2007 at 01:28:10AM +, Helge Rohde wrote:
Yeah, i would have thought so too. But apparently they do bend their rules 
when the see the need, atleast in Germany they *can* put you into jail until 
you tell them the passphrase and i have heard similar from other european 
countries.


That's only partly true. First of all, without the consent of a judge,
you can be put into jail only until the next day. Second, to keep you in
prison they have to have enough evidence to warrant it. Third, you can
not be forced to answer the questions.

Joerg


Dream on, guys, dream on.

'They have to...' have been much in the news of late for NOT doing what they 
allegedly 'have to'.


Bigtime.  And not just in the Yew-Ass-A, either.

And that's just what is public information.

But might we let this not-specifically-related-to-DragonFly thread sort of 
wander off to a more appropriate venue?


Of which there is no shortage.

Bill



Re: wiki log of #dragonfly irc channel

2007-03-09 Thread Joerg Sonnenberger
On Fri, Mar 09, 2007 at 01:28:10AM +, Helge Rohde wrote:
> Yeah, i would have thought so too. But apparently they do bend their rules 
> when the see the need, atleast in Germany they *can* put you into jail until 
> you tell them the passphrase and i have heard similar from other european 
> countries.

That's only partly true. First of all, without the consent of a judge,
you can be put into jail only until the next day. Second, to keep you in
prison they have to have enough evidence to warrant it. Third, you can
not be forced to answer the questions.

Joerg


Re: wiki log of #dragonfly irc channel

2007-03-09 Thread Dmitri Nikulin

On 3/9/07, Helge Rohde <[EMAIL PROTECTED]> wrote:

Which is precisly why i always envyid that windoze partition encryption
thingy, cant remember the name now, but it provides 2 keys, one will open the
(actual) container and another one will open another encrypted container with
all legal and perfectly harmless files. That way they cannot crack down on
you for destruction of evidence (what second password ? häh? no idea what you
mean!). But afaik theres is no such thing on any of the BSD systems. Which is
sad, because -as you point out pretty precisely - it refutes most of the
points file/HD encryption could be useful for - They will just order you to
give them the PW as soon as they find an encrypted Partition/File.


As clever as this is, isn't it obvious to anyone investigating that
the decrypted partition is much smaller than the encrypted one? Or
however it's split - maybe it's two partitions. I don't know, I
haven't heard of this.

The problem with that scheme is that it requires re-associating the
keys (or their hashes, or whatever) with the containers. So while it
is fine in a highly opaque, secret-based system like Windows, in any
Unix everything is too transparent to hide an association like that.
Even if you keep it in the kernel, the information has to be reloaded
somehow, and as soon as authorities find out it exists they'll just
detect it in use on your machine. It's unreasonable to expect you can
hide it - as soon as you use it they'll know for whatever reason.

I guess the best you can do is sort-of rootkit yourself, and hide the
information even from the kernel (e.g. df, fdisk, etc). They can't
fault you for using a kernel that doesn't match any public kernel
checksums. A really smart investigator will boot from a live CD and
use a trusted kernel, but you can claim you use a homebrew encryption
module and that their kernel won't work with it. It's like the inverse
of trusted computing - using the technology against yourself so it's
also against anyone investigating you.

You know what? Talking about this has probably earned us our own
investigation squads. The unmarked vans are probably outside right
this moment.

---
Dmitri Nikulin

Centre for Synchrotron Science
Monash University
Victoria 3800, Australia



Re: wiki log of #dragonfly irc channel

2007-03-09 Thread Erik Wikström

On 2007-03-09 02:28, Helge Rohde wrote:

On Friday 09 March 2007 00:57, Martin P. Hellwig wrote:

Helge Rohde wrote:


> Which is precisly why i always envyid that windoze partition encryption
> thingy, cant remember the name now, but it provides 2 keys, one will open
> the (actual) container and another one will open another encrypted
> container with all legal and perfectly harmless files. That way they
> cannot crack down on you for destruction of evidence (what second
> password ? häh? no idea what you mean!). But afaik theres is no such
> thing on any of the BSD systems. Which is sad, because -as you point out
> pretty precisely - it refutes most of the points file/HD encryption could
> be useful for - They will just order you to give them the PW as soon as
> they find an encrypted Partition/File.
>
> regards,
> Helge

In most western legal systems you are not enforced to participate in
gathering evidence against yourself. Though it could be enforced that
you are not allowed to alter current situation which can influence
evidence against you. In short with a warrant they may be allowed to
search your home and take your computer as evidence but they may not
enforce you to tell them your pass phrase, that contradicts with the
"You have the right to remain silent" thing :-)

>
Yeah, i would have thought so too. But apparently they do bend their rules 
when the see the need, atleast in Germany they *can* put you into jail until 
you tell them the passphrase and i have heard similar from other european 
countries. I believe the reasoning goes along the lines of: they have an 
urgent suspicion that there is evidence against you (the encrypted 
partition ), so they can put you into 'Beugehaft' (= coercive detention) 
until you stop hiding the evidence and cooperate with the authorities. The 
mentioned two-container system has prooven to be an effective countermeasure 
(well, atleast until now). 


As long as they do not suspec you to be a terrorist I doubt that they 
can lock you up more than a month or two unless they have other evidence 
than those they suspect to be on the disk. To do otherwise would be an 
crime against the human rights


--
Erik Wikström


Re: wiki log of #dragonfly irc channel

2007-03-09 Thread Martin P. Hellwig

Helge Rohde wrote:

Yes that's true but look on the bright side as long as you don't 
cooperate you're still not convicted, though you may still be rotting in 
a cell. The legal hook in this case is that they argue that they have 
strong suspicion on evidence present in the encrypted data and they hold 
you as long as they need to decrypt the data. Your own choice at that 
moment is, does it take them longer to decrypt by brute force then my 
sentence could be? If yes, well you know you go to jail but you probably 
get out being alive :-). On the other hand most things that are not 
illegal or immoral (which is a very stretchable state) but are private 
do have a tendency to lose their sensitive part over time.


But the thing I really want to know, is when you do cooperate and there 
is no evidence, how do they compensate your invasion on privacy, loss of 
freedom and being restrained from basic human rights?


--
mph


Re: wiki log of #dragonfly irc channel

2007-03-08 Thread Helge Rohde
On Friday 09 March 2007 00:57, Martin P. Hellwig wrote:
> Helge Rohde wrote:
> 
>
> > Which is precisly why i always envyid that windoze partition encryption
> > thingy, cant remember the name now, but it provides 2 keys, one will open
> > the (actual) container and another one will open another encrypted
> > container with all legal and perfectly harmless files. That way they
> > cannot crack down on you for destruction of evidence (what second
> > password ? häh? no idea what you mean!). But afaik theres is no such
> > thing on any of the BSD systems. Which is sad, because -as you point out
> > pretty precisely - it refutes most of the points file/HD encryption could
> > be useful for - They will just order you to give them the PW as soon as
> > they find an encrypted Partition/File.
> >
> > regards,
> > Helge
>
> In most western legal systems you are not enforced to participate in
> gathering evidence against yourself. Though it could be enforced that
> you are not allowed to alter current situation which can influence
> evidence against you. In short with a warrant they may be allowed to
> search your home and take your computer as evidence but they may not
> enforce you to tell them your pass phrase, that contradicts with the
> "You have the right to remain silent" thing :-)
Yeah, i would have thought so too. But apparently they do bend their rules 
when the see the need, atleast in Germany they *can* put you into jail until 
you tell them the passphrase and i have heard similar from other european 
countries. I believe the reasoning goes along the lines of: they have an 
urgent suspicion that there is evidence against you (the encrypted 
partition ), so they can put you into 'Beugehaft' (= coercive detention) 
until you stop hiding the evidence and cooperate with the authorities. The 
mentioned two-container system has prooven to be an effective countermeasure 
(well, atleast until now). 

cheers,
Helge



Re: wiki log of #dragonfly irc channel

2007-03-08 Thread Martin P. Hellwig

Helge Rohde wrote:

Which is precisly why i always envyid that windoze partition encryption 
thingy, cant remember the name now, but it provides 2 keys, one will open the 
(actual) container and another one will open another encrypted container with 
all legal and perfectly harmless files. That way they cannot crack down on 
you for destruction of evidence (what second password ? häh? no idea what you 
mean!). But afaik theres is no such thing on any of the BSD systems. Which is 
sad, because -as you point out pretty precisely - it refutes most of the 
points file/HD encryption could be useful for - They will just order you to 
give them the PW as soon as they find an encrypted Partition/File. 


regards,
Helge


In most western legal systems you are not enforced to participate in 
gathering evidence against yourself. Though it could be enforced that 
you are not allowed to alter current situation which can influence 
evidence against you. In short with a warrant they may be allowed to 
search your home and take your computer as evidence but they may not 
enforce you to tell them your pass phrase, that contradicts with the 
"You have the right to remain silent" thing :-)


--
mph


Re: wiki log of #dragonfly irc channel

2007-03-08 Thread Helge Rohde
On Wednesday 07 March 2007 19:53, Dmitri Nikulin wrote:

> All of this is entirely possible. So either you encrypt something and
> accidentally reveal the key through normal use or OS compromise, or
> you hide the key perfectly and are charged with destruction of
> evidence, which is no picnic. They'll know you did it because when the
> random seizure occurs, you'll have the encrypted files somewhere. Even
> a complete encrypted partition doesn't look like old-file noise - its
> apparent entropy is too high.
>
> Either way, cryptography doesn't really help you once you're under
> investigation. At best, it can help you discuss questionable issues
> without being caught by the many indiscriminate monitoring systems out
> there, but it takes a lot less than cryptography.

Which is precisly why i always envyid that windoze partition encryption 
thingy, cant remember the name now, but it provides 2 keys, one will open the 
(actual) container and another one will open another encrypted container with 
all legal and perfectly harmless files. That way they cannot crack down on 
you for destruction of evidence (what second password ? häh? no idea what you 
mean!). But afaik theres is no such thing on any of the BSD systems. Which is 
sad, because -as you point out pretty precisely - it refutes most of the 
points file/HD encryption could be useful for - They will just order you to 
give them the PW as soon as they find an encrypted Partition/File. 

regards,
Helge




Re: wiki log of #dragonfly irc channel

2007-03-07 Thread Martin P. Hellwig



And always remember it's easier to create fake evidence that hold up in 
any court then it's to brute force a cipher text.
I think the key is that you just don't do the things that makes 
government officials creative, they hate to be creative ;-)


--
mph


Re: wiki log of #dragonfly irc channel

2007-03-07 Thread Dmitri Nikulin

On 3/7/07, Joerg Sonnenberger <[EMAIL PROTECTED]> wrote:

Sorry, but this is complete bull shit. The average policy agency
*anywhere* does have no fucking chance to deal with cryptography. Even
the secret services have no chance dealing with it from the stored data
alone. It is somewhat different when you can actively monitor the
encryption process, but in that case you have no reason to deal with the
cryptography itself anyway because you can just watch the plain text.


Which is what I just said. "Side-step", right? I didn't say break.
They have way too much monitoring or seizure power to need to break
ciphers. In fact many can require you decrypt data to present as
evidence, and if you don't or can't, it's considered destruction.

However, it's not fair to say brute-forcing of archived files is out
of the question. Even an otherwise clever criminal is most likely to
use plain passwords to protect regular files, and it's especially easy
to retroactively determine that password after the monitoring begins.
It's either the same as, or extremely similar to, another password the
criminal will use, so the likely search space is low enough to run on
a single machine over a lunch break. It's still side stepping the
cryptography, and it's still not an actual cryptographic break. All it
takes is monitoring, at which governments and agencies have proven
unnervingly good.

If they don't use a plain password on the file, they'll use it on
their private or pre-shared key, and that's even more likely to be
used once monitoring begins. If that's on an encrypted partition,
that'll be the part using a plain password, and so on. Even carrying
around a USB bar with a random 256 bit key on it isn't good enough -
that key is in plaintext on the bar. If you're a monk who has trained
for decades to be able to remember any amount of entropy, and you've
memorized the entire key and are happy to enter it into RAM for a
computing session, you'll either be monitored outright or have your
operating system's security or authentication broken in any of the
many ways this can be done.

All of this is entirely possible. So either you encrypt something and
accidentally reveal the key through normal use or OS compromise, or
you hide the key perfectly and are charged with destruction of
evidence, which is no picnic. They'll know you did it because when the
random seizure occurs, you'll have the encrypted files somewhere. Even
a complete encrypted partition doesn't look like old-file noise - its
apparent entropy is too high.

Either way, cryptography doesn't really help you once you're under
investigation. At best, it can help you discuss questionable issues
without being caught by the many indiscriminate monitoring systems out
there, but it takes a lot less than cryptography.

I may not have been perfectly clear with my previous message, but I
also don't think it's fair to fly off the handle based on mistaken
inference. I hope now I've clarified my position. Thank you for noting
that I wasn't clear enough, at least for you.

---
Dmitri Nikulin

Centre for Synchrotron Science
Monash University
Victoria 3800, Australia


Re: wiki log of #dragonfly irc channel

2007-03-07 Thread Joerg Sonnenberger
On Tue, Mar 06, 2007 at 06:45:27AM +1100, Dmitri Nikulin wrote:
> And if you've upset the government enough that a warrant is issued,
> any amount of their impressive technology will completely side-step
> the cryptography anyway - e.g. tempest emissions or a surprise seizure
> of belongings.

Sorry, but this is complete bull shit. The average policy agency
*anywhere* does have no fucking chance to deal with cryptography. Even
the secret services have no chance dealing with it from the stored data
alone. It is somewhat different when you can actively monitor the
encryption process, but in that case you have no reason to deal with the
cryptography itself anyway because you can just watch the plain text.

Joerg


Re: wiki log of #dragonfly irc channel

2007-03-05 Thread B. Estrade
On Tue, Mar 06, 2007 at 06:57:13AM +1100, Dmitri Nikulin wrote:
> ...
> Still, the code is so short and simple all of this could be fixed in
> less time than it took to write this email. But it's something you'll
> have to get used to doing yourself, because you will soon love Python
> and be unable to keep from writing more of it.
> 

I would have just said, "because it's not written in Perl.." ;)

/me ducks

Cheers,
Brett

> ---
> Dmitri Nikulin
> 
> Centre for Synchrotron Science
> Monash University
> Victoria 3800, Australia

-- 
225.578.1920
AIM: bz743
LONI/LSU HPC 
http://www.loni.org/

"By the time they had diminished from 50 to 8, the other dwarves began to 
suspect "Hungry." -- a Larson cartoon


Re: wiki log of #dragonfly irc channel

2007-03-05 Thread Dmitri Nikulin

On 3/6/07, Adrian Michael Nida <[EMAIL PROTECTED]> wrote:

Just curious what's not beautiful about it?  I appreciate the criticism, but
it would be more beneficial for me to hear what it needs to look like,
rather than hearing it's ugly :-)

Feel free to reply to me directly, if you wish.


It's too obviously an independent hack, that's all. Mostly not split
into functions, not following the Python code style conventions, not
internally documented by comments or pydoc. Run pylint over it, it
will whine about a lot of things, but some of its suggestions are
pretty reasonable.

There are some other style issues which obviously bleed over from a
C-like language, such as wrapping if constructs in brackets, and using
constants on the left hand side of ==, both of which are unnecessary
and rather ugly in Python.

Inconsistent naming as well - some things are all lower case, others
are in full uppercase, others are in first-letter uppercase. Compare
Success = True to readbuffer="" and FILENAME= Path + 

Still, the code is so short and simple all of this could be fixed in
less time than it took to write this email. But it's something you'll
have to get used to doing yourself, because you will soon love Python
and be unable to keep from writing more of it.

---
Dmitri Nikulin

Centre for Synchrotron Science
Monash University
Victoria 3800, Australia


Re: wiki log of #dragonfly irc channel

2007-03-05 Thread Dmitri Nikulin

On 3/6/07, Matthew Dillon <[EMAIL PROTECTED]> wrote:

Yah, it's pretty silly.  People have been logging IRC sessions and
putting them up on the web for over a decade.  Nobody should have
any expectation of privacy on IRC.


Some organizations in many nations have been logging everything
possible anyway, and putting them in archives for ~ever. Strong
cryptography with trusted software is the only way to go now, and even
trusted software is a bit scary. And if you've upset the government
enough that a warrant is issued, any amount of their impressive
technology will completely side-step the cryptography anyway - e.g.
tempest emissions or a surprise seizure of belongings. I'd like to be
able to pretend that's only used for the "Bad guys".

---
Dmitri Nikulin

Centre for Synchrotron Science
Monash University
Victoria 3800, Australia


RE: wiki log of #dragonfly irc channel

2007-03-05 Thread Jeremy C. Reed
> Now, I'm happy to add whatever changes need to be done.  When a consensus is
> reached, I'll do it.

I think the last irc log had last 1000 lines or something like that. Maybe 
just keep a short time period like last 12 hours or last 1000 lines.


RE: wiki log of #dragonfly irc channel

2007-03-05 Thread Adrian Michael Nida
Wow, this is getting wild o_O.  I never thought a simple bot would cause
such chatter.

I created this bot the way it is (recording everything for historical
purposes) because:

1)  I thought that historical archives were what people wanted.
2)  It was the easiest way I knew how to accomplish assumption 1)

Now, I'm happy to add whatever changes need to be done.  When a consensus is
reached, I'll do it.

Thanks,

Adrian

: -Original Message-
: From: [EMAIL PROTECTED] [mailto:users-
: [EMAIL PROTECTED] On Behalf Of Kevin L. Kane
: Sent: Monday, March 05, 2007 13:08
: To: users@crater.dragonflybsd.org
: Subject: Re: wiki log of #dragonfly irc channel
: 
: > Here it is as it has some stuff from before the bot started
: recording,
: > it goes back to Dec 20, 2006:
: 
: On second thought I think it was irresponsible to post this
: without asking permission as it logs things that happened
: back before the issue of logging was raised(?), and to be
: courteous to those that thought their words wouldn't be
: "published" I wont be make them available to the world.
: 
: -Kevink
: 
: --
: Kevin L. Kane
: kevin.kane at gmail.com
: 




Re: wiki log of #dragonfly irc channel

2007-03-05 Thread Kevin L. Kane

Here it is as it has some stuff from before the bot started recording,
it goes back to Dec 20, 2006:


On second thought I think it was irresponsible to post this
without asking permission as it logs things that happened
back before the issue of logging was raised(?), and to be
courteous to those that thought their words wouldn't be
"published" I wont be make them available to the world.

-Kevink

--
Kevin L. Kane
kevin.kane at gmail.com


Re: wiki log of #dragonfly irc channel

2007-03-05 Thread Kevin L. Kane

Yah, it's pretty silly.  People have been logging IRC sessions and
putting them up on the web for over a decade.  Nobody should have
any expectation of privacy on IRC.


I thought even the default(?) install of irssi logs all the channels
you join so I just checked and my machine has been logging
#dragonflybsd(and all other channels I lurk in) for quite some time.

Here it is as it has some stuff from before the bot started recording,
it goes back to Dec 20, 2006:

http://www.uberstyle.net/~kevin/dragonflybsd.log

-Kevink

--
Kevin L. Kane
kevin.kane at gmail.com


Re: wiki log of #dragonfly irc channel

2007-03-05 Thread Matthew Dillon
:When I read the original message I thought it was a joke.  Now that we're
:getting serious, could we please stop?  The idea of obscuring an IRC log
:is preposterous.  IRC isn't authenticated, and the log is only going to
:show nicknames.  What the point of obscurity?  My vote is just leave it
:as is.
:
:--Peter

Yah, it's pretty silly.  People have been logging IRC sessions and
putting them up on the web for over a decade.  Nobody should have
any expectation of privacy on IRC.

-Matt
Matthew Dillon 
<[EMAIL PROTECTED]>


Re: wiki log of #dragonfly irc channel

2007-03-05 Thread Joerg Sonnenberger
On Mon, Mar 05, 2007 at 10:50:23AM +, B. Estrade wrote:
> 
> To be honest, I was halfway serious.  I generally don't hide my
> identity when on irc because I don't go on to just 'hang out', but I
> do like to monitor the #dragonflybsd channel.

You know that most IRC users also log the channels they are in? Many of
those are 24/7 online, So this literally doesn't help much...

Joerg


Re: wiki log of #dragonfly irc channel

2007-03-05 Thread B. Estrade
On Mon, Mar 05, 2007 at 11:27:55AM -0500, Peter Avalos wrote:
> On Mon, Mar 05, 2007 at 08:16:04AM -0500, Adrian Michael Nida wrote:
> > 
> > : I'm guessing you're serious, so I'll mention why this is a risky idea.
> > : IRC has chewing-gum authentication and it's almost trivial for a
> > : malicious bot to fool a server into ignoring people by pretending to
> > : be them, and this can be done in many points*. Basically, the entire
> > : utility of the logging bot is broken because it allows virtually
> > : unauthenticated modifications to its behavior. Not to mention the
> > : confusion that arises if an entire participant in a conversation has
> > : their messages removed.
> > 
> > 
> > I agree here.  I'd be willing to perform some s/USERNAME/ANONYMOUS/g magic
> > in the messages.  That way, the message would be preserved, but it can't be
> > tracked back to a given user.
> > 
> 
> When I read the original message I thought it was a joke.  Now that we're
> getting serious, could we please stop?  The idea of obscuring an IRC log
> is preposterous.  IRC isn't authenticated, and the log is only going to
> show nicknames.  What the point of obscurity?  My vote is just leave it
> as is.

To be honest, I was halfway serious.  I generally don't hide my identity when 
on irc because I don't go on to just 'hang out', but I do like to monitor the 
#dragonflybsd channel. The easy solution for me is to just mask myself from now 
on, but the main point of suggesting that people be able to opt out of the log 
is that I don't want my comments logged as the real me if there is no real 
benefit.  I thought the log of the last 1000 lines was cool because it allowed 
me to catch up, but I don't know why we need a historical archive of chat 
sessions.  Again, I am going to do what I need to on my end, so it is really a 
moot issue for me now anyway. 

Cheers.


Re: wiki log of #dragonfly irc channel

2007-03-05 Thread Peter Avalos
On Mon, Mar 05, 2007 at 08:16:04AM -0500, Adrian Michael Nida wrote:
> 
> : I'm guessing you're serious, so I'll mention why this is a risky idea.
> : IRC has chewing-gum authentication and it's almost trivial for a
> : malicious bot to fool a server into ignoring people by pretending to
> : be them, and this can be done in many points*. Basically, the entire
> : utility of the logging bot is broken because it allows virtually
> : unauthenticated modifications to its behavior. Not to mention the
> : confusion that arises if an entire participant in a conversation has
> : their messages removed.
> 
> 
> I agree here.  I'd be willing to perform some s/USERNAME/ANONYMOUS/g magic
> in the messages.  That way, the message would be preserved, but it can't be
> tracked back to a given user.
> 

When I read the original message I thought it was a joke.  Now that we're
getting serious, could we please stop?  The idea of obscuring an IRC log
is preposterous.  IRC isn't authenticated, and the log is only going to
show nicknames.  What the point of obscurity?  My vote is just leave it
as is.

--Peter


pgpzWM7zmmkwK.pgp
Description: PGP signature


RE: wiki log of #dragonfly irc channel

2007-03-05 Thread Justin C. Sherrill
On Mon, March 5, 2007 8:16 am, Adrian Michael Nida wrote:
> 
> : I'm guessing you're serious, so I'll mention why this is a risky idea.
> : IRC has chewing-gum authentication and it's almost trivial for a
> : malicious bot to fool a server into ignoring people by pretending to
> : be them, and this can be done in many points*. Basically, the entire
> : utility of the logging bot is broken because it allows virtually
> : unauthenticated modifications to its behavior. Not to mention the
> : confusion that arises if an entire participant in a conversation has
> : their messages removed.
> 
>
> I agree here.  I'd be willing to perform some s/USERNAME/ANONYMOUS/g magic
> in the messages.  That way, the message would be preserved, but it can't
> be
> tracked back to a given user.

Here's different reasons for the logs:

1: Catchup for people who have been off IRC for 24-48 hours
2: An introduction for people who want to see what the general tone and
topic is in the channel
3: A historical log that keeps things people are interested in from a year
or two years ago.

Saving the last 2-3k lines of the log will work for purposes 1 and 2, and
enough people seem nervous about 3 that I would say maybe we should stick
to just holding recent dialogue.  I don't know of any scenario where
long-term history for IRC proved useful - mailing lists, yes, but not
something transitory like IRC conversations.




RE: wiki log of #dragonfly irc channel

2007-03-05 Thread Adrian Michael Nida

: I recommend using Twisted Python as a framework, which gives you an
: IRC protocol client out of the box, good efficiency, and very neat
: daemon behavior (using twistd, for instance).


I will take your suggestion about Twisted and look into a rewrite.  Thanks
for pointing it out.

: It's not beautiful but it's also not much work to clean up.


Just curious what's not beautiful about it?  I appreciate the criticism, but
it would be more beneficial for me to hear what it needs to look like,
rather than hearing it's ugly :-)

Feel free to reply to me directly, if you wish.

Adrian




RE: wiki log of #dragonfly irc channel

2007-03-05 Thread Adrian Michael Nida

: I'm guessing you're serious, so I'll mention why this is a risky idea.
: IRC has chewing-gum authentication and it's almost trivial for a
: malicious bot to fool a server into ignoring people by pretending to
: be them, and this can be done in many points*. Basically, the entire
: utility of the logging bot is broken because it allows virtually
: unauthenticated modifications to its behavior. Not to mention the
: confusion that arises if an entire participant in a conversation has
: their messages removed.


I agree here.  I'd be willing to perform some s/USERNAME/ANONYMOUS/g magic
in the messages.  That way, the message would be preserved, but it can't be
tracked back to a given user.

Adrian




Re: wiki log of #dragonfly irc channel

2007-03-04 Thread Dmitri Nikulin

On 3/4/07, B. Estrade <[EMAIL PROTECTED]> wrote:

Nice one.  Just realize that most people don't mind the last 100-1000
lines of chatting up so that others can "catch up", but providing 24/7
logging of a channel is a bit unnerving ... to me anyway.  Maybe you
can either only do the last few hundred lines or allow people to
register themselves to be ignored:


I'm guessing you're serious, so I'll mention why this is a risky idea.
IRC has chewing-gum authentication and it's almost trivial for a
malicious bot to fool a server into ignoring people by pretending to
be them, and this can be done in many points*. Basically, the entire
utility of the logging bot is broken because it allows virtually
unauthenticated modifications to its behavior. Not to mention the
confusion that arises if an entire participant in a conversation has
their messages removed.

* Such as the client's machine, the server, and any gateways involved.
Yes, the same machines can be exploited to change or ignore the
messages anyway, but this is more complicated than spoofing an IRC
message and, notably, would have a very different effect on the
appearance of the conversation.

---
Dmitri Nikulin

Centre for Synchrotron Science
Monash University
Victoria 3800, Australia


Re: wiki log of #dragonfly irc channel

2007-03-04 Thread Dmitri Nikulin

On 3/3/07, Adrian Michael Nida <[EMAIL PROTECTED]> wrote:

This is only my second python program, so it could probably use some work.
Some features I'd like to add are:

* Reconnect after disconnect
* Ability to fork into "server" mode so I can write startup/shutdown scripts

If any phython hackers on this list want to tutor me in the form of
examples, I'll be grateful.


I recommend using Twisted Python as a framework, which gives you an
IRC protocol client out of the box, good efficiency, and very neat
daemon behavior (using twistd, for instance).

For anyone who hasn't found it, this is the code:
http://www.labthug.com/~adrian/LabBot/LabBot.py

It's not beautiful but it's also not much work to clean up. I
recommend the next iteration get Twisted Python treatment. It's an
extra dependency, true, but it also gives you a lot more for free and
lends itself to much better reuse.

---
Dmitri Nikulin

Centre for Synchrotron Science
Monash University
Victoria 3800, Australia


Re: wiki log of #dragonfly irc channel

2007-03-03 Thread B. Estrade

I tried my hand at some python the other day and pieced together an IRC
logging bot.  I placed it within the channel last night, and it's keeping
the logs under:

http://www.labthug.com/~adrian/LabBot/dragonflybsd/

In /MM/DD.html format

This is only my second python program, so it could probably use some work.
Some features I'd like to add are:

* Reconnect after disconnect
* Ability to fork into "server" mode so I can write startup/shutdown scripts

If any phython hackers on this list want to tutor me in the form of
examples, I'll be grateful.

Thanks,

Adrian


Nice one.  Just realize that most people don't mind the last 100-1000
lines of chatting up so that others can "catch up", but providing 24/7
logging of a channel is a bit unnerving ... to me anyway.  Maybe you
can either only do the last few hundred lines or allow people to
register themselves to be ignored:

example interaction with logbot:

me> logbot: ignoreme
logbot> me: ignored
me> logbot: status
logbot> me: ignored
me> logbot: unignoreme
lognot> me: unignored
me> logbot: status
logbot> me: unignored

In my mind this would ignore *any* message or action pertaining to
this person this person.  I think it goes with out saying that you
only ignore/unignore for explicit windows of time - I don't think
going back and erasing all mention of a person is required unless
explicitly requested:

me> logbot: eraseme
logbot> me: fo' real?
me> logbot: yes
...
me>logbot: uneraseme
logbot>me: lol. you are on teh crack.
me> :)

Anyway, it is just a thought.

Cheers,
Brett


RE: wiki log of #dragonfly irc channel

2007-03-02 Thread Adrian Michael Nida
: On Sun, February 25, 2007 8:28 am, Ja'far Railton wrote:
: > Hi
: >
: > I was very interested in the above but it seems to have been
: > withdrawn from service.  Is this a temporary disruption 
: > or not?  Being on dialup it is not feasible for me to lurk 
: > live.
: 
: It was coming from Andreas Hauser's IRC bot, which he has taken out of
: commission.  We're moving the wiki to sit on leaf, and a new logging
: bot
: would have to sit on leaf to reinstate that log there.  I have no
: experience in setting up something like that.  (It's Matt's call if he
: even wants to have an IRC bot on the system.)  If someone else could
: provide a running log, it'd be helpful.
: 

Hi,

I tried my hand at some python the other day and pieced together an IRC
logging bot.  I placed it within the channel last night, and it's keeping
the logs under:

http://www.labthug.com/~adrian/LabBot/dragonflybsd/

In /MM/DD.html format

This is only my second python program, so it could probably use some work.
Some features I'd like to add are:

* Reconnect after disconnect
* Ability to fork into "server" mode so I can write startup/shutdown scripts

If any phython hackers on this list want to tutor me in the form of
examples, I'll be grateful.

Thanks,

Adrian



Re: wiki log of #dragonfly irc channel

2007-02-26 Thread Matthew Dillon

:It was coming from Andreas Hauser's IRC bot, which he has taken out of
:commission.  We're moving the wiki to sit on leaf, and a new logging bot
:would have to sit on leaf to reinstate that log there.  I have no
:experience in setting up something like that.  (It's Matt's call if he
:even wants to have an IRC bot on the system.)  If someone else could
:provide a running log, it'd be helpful.

I am not particularly fond of running IRC bots or servers.

-Matt
Matthew Dillon 
<[EMAIL PROTECTED]>


Re: wiki log of #dragonfly irc channel

2007-02-25 Thread Justin C. Sherrill
On Sun, February 25, 2007 8:28 am, Ja'far Railton wrote:
> Hi
>
> I was very interested in the above but it seems to have been withdrawn
> from service.  Is this a temporary disruption or not?  Being on dialup
> it is not feasible for me to lurk live.

It was coming from Andreas Hauser's IRC bot, which he has taken out of
commission.  We're moving the wiki to sit on leaf, and a new logging bot
would have to sit on leaf to reinstate that log there.  I have no
experience in setting up something like that.  (It's Matt's call if he
even wants to have an IRC bot on the system.)  If someone else could
provide a running log, it'd be helpful.