From rubinson at email.arizona.edu Thu Sep 4 14:32:29 2003 From: rubinson at email.arizona.edu (Claude Rubinson) Date: Thu, 4 Sep 2003 14:32:29 -0700 Subject: [buug] Regarding wireless access points Message-ID: <20030904213229.GB30823@wagner> I'm wanting to add a wireless access point to our office and I want to make sure that my understanding is correct (I'm realizing that my understanding of networking is pretty much negligible -- enough to get a small home network set up, nothing more). Here's the deal: my university provides DHCP access to the network, authenticated by MAC address. You register your machine with IT and then you can plug in anywhere on campus. I assume that this is a fairly common setup. My cohort all share a single office (there are ten of us but it's a big office -- used to be a classroom -- so it's not bad) with a single ethernet jack. Can I simply plug a wireless hub into the ethernet jack and bring wireless access to the entire office (and, hopefully, the department)? Or is it more complicated than that? And, assuming that I can simply connect a wireless hub to the ethernet jack, I'm thinking that I don't need to worry about security since the campus network will still be authenticating the individual clients by MAC address. That is, I wouldn't be opening any security holes in the campus network. Correct? Or no? Finally, assuming that all of the above is correct, can someone recommend a wireless access point (802.11b or g). Cheaper is better as I'm living on a student's stipend once again. Or if I'm completely off the mark, can someone recommend some decent reference material so that I can bring myself up to speed? Thanks, Claude From atporter at primate.net Thu Sep 4 14:49:43 2003 From: atporter at primate.net (Aaron T Porter) Date: Thu, 4 Sep 2003 14:49:43 -0700 Subject: [buug] Regarding wireless access points In-Reply-To: <20030904213229.GB30823@wagner> References: <20030904213229.GB30823@wagner> Message-ID: <20030904214943.GG447@primate.net> On Thu, Sep 04, 2003 at 02:32:29PM -0700, Claude Rubinson wrote: > My cohort all share a single office (there are ten of us but it's a > big office -- used to be a classroom -- so it's not bad) with a single > ethernet jack. Can I simply plug a wireless hub into the ethernet > jack and bring wireless access to the entire office (and, hopefully, > the department)? Or is it more complicated than that? > > And, assuming that I can simply connect a wireless hub to the ethernet > jack, I'm thinking that I don't need to worry about security since the > campus network will still be authenticating the individual clients by > MAC address. That is, I wouldn't be opening any security holes in the > campus network. Correct? Or no? Assuming the university maintains ethernet jacks in open public spaces (most do) and assuming you configure your wirless base station as a bridge not a router, you should be mostly correct. From rubinson at email.arizona.edu Thu Sep 4 15:02:41 2003 From: rubinson at email.arizona.edu (Claude Rubinson) Date: Thu, 4 Sep 2003 15:02:41 -0700 Subject: [buug] Regarding wireless access points In-Reply-To: <20030904214943.GG447@primate.net> References: <20030904213229.GB30823@wagner> <20030904214943.GG447@primate.net> Message-ID: <20030904220241.GD30823@wagner> On Thu, Sep 04, 2003 at 02:49:43PM -0700, Aaron T Porter wrote: > Assuming the university maintains ethernet jacks in open public > spaces (most do) and assuming you configure your wirless base station as a > bridge not a router, you should be mostly correct. Excellent. Anyone got any recommendations for base stations or should I just buy by price? From alex at myzona.net Thu Sep 4 15:12:24 2003 From: alex at myzona.net (Aleksandr Melentiev) Date: Thu, 04 Sep 2003 15:12:24 -0700 Subject: [buug] Regarding wireless access points In-Reply-To: <20030904213229.GB30823@wagner> References: <20030904213229.GB30823@wagner> Message-ID: <3F57B8C8.2010302@myzona.net> Hi Claude, I am a volunteer for San Francisco Wireless running my own public wireless node in the city. Everything you have said is pretty much correct. Wireless APs (at least most of them) have their own MAC addresses, on some you can even change the MAC via web config. So it should be no problem registering the MAC address with the IT department and plugging it in the rj-45 jack. If you are concerned with security beyond what the university offers, APs have their own security settings including MAC address filtering and etc. There are some nice APs available, but having in mind your budget issues I would recommend Netgear, 802.11g would be the way to go since "b" will die more or less soon, but intercompatibility between the two is not a big issue either. There are some good resources you can get yourself familiar with: http://www.sfwireless.net http://www.personaltelco.net By the way, you can home-build your own AP if you have some old Unix/Linux box available and a wireless card, can be cheaper and much more versatile configuration. Alex Claude Rubinson wrote: > I'm wanting to add a wireless access point to our office and I want to > make sure that my understanding is correct (I'm realizing that my > understanding of networking is pretty much negligible -- enough to get > a small home network set up, nothing more). > > Here's the deal: my university provides DHCP access to the network, > authenticated by MAC address. You register your machine with IT and > then you can plug in anywhere on campus. I assume that this is a > fairly common setup. > > My cohort all share a single office (there are ten of us but it's a > big office -- used to be a classroom -- so it's not bad) with a single > ethernet jack. Can I simply plug a wireless hub into the ethernet > jack and bring wireless access to the entire office (and, hopefully, > the department)? Or is it more complicated than that? > > And, assuming that I can simply connect a wireless hub to the ethernet > jack, I'm thinking that I don't need to worry about security since the > campus network will still be authenticating the individual clients by > MAC address. That is, I wouldn't be opening any security holes in the > campus network. Correct? Or no? > > Finally, assuming that all of the above is correct, can someone > recommend a wireless access point (802.11b or g). Cheaper is better > as I'm living on a student's stipend once again. > > Or if I'm completely off the mark, can someone recommend some decent > reference material so that I can bring myself up to speed? > > Thanks, > > Claude > _______________________________________________ > Buug mailing list > Buug at weak.org > http://www.weak.org/mailman/listinfo/buug > > From nick at zork.net Thu Sep 4 15:12:47 2003 From: nick at zork.net (Nick Moffitt) Date: Thu, 4 Sep 2003 15:12:47 -0700 Subject: [buug] Regarding wireless access points In-Reply-To: <20030904220241.GD30823@wagner> References: <20030904213229.GB30823@wagner> <20030904214943.GG447@primate.net> <20030904220241.GD30823@wagner> Message-ID: <20030904221247.GG31618@zork.net> begin Claude Rubinson quotation: > On Thu, Sep 04, 2003 at 02:49:43PM -0700, Aaron T Porter wrote: > > Assuming the university maintains ethernet jacks in open public > > spaces (most do) and assuming you configure your wirless base > > station as a bridge not a router, you should be mostly correct. > > Excellent. Anyone got any recommendations for base stations or > should I just buy by price? Linksys WAP11s are pretty good straight bridges, and they even have mostly-standard plugs for antennas. On the MAC address issue, consider that each wireless card will need to be registered with the university. Consider also that people can sniff traffic and forge MAC addresses. Consider still further that that last bit is Not Your Problem. -- Support your droogs! end From wfhoney at pacbell.net Thu Sep 4 15:20:00 2003 From: wfhoney at pacbell.net (Bill Honeycutt) Date: Thu, 04 Sep 2003 15:20:00 -0700 Subject: [buug] Regarding wireless access points In-Reply-To: <20030904220241.GD30823@wagner> References: <20030904213229.GB30823@wagner> <20030904214943.GG447@primate.net> <20030904220241.GD30823@wagner> Message-ID: <3F57BA90.1030005@pacbell.net> I have Aaron's old NetGear 802.11b box. I'm not doing anything with it at the moment. Claude Rubinson wrote: > On Thu, Sep 04, 2003 at 02:49:43PM -0700, Aaron T Porter wrote: > >> Assuming the university maintains ethernet jacks in open public >>spaces (most do) and assuming you configure your wirless base station as a >>bridge not a router, you should be mostly correct. > > > Excellent. Anyone got any recommendations for base stations or should > I just buy by price? > _______________________________________________ > Buug mailing list > Buug at weak.org > http://www.weak.org/mailman/listinfo/buug > From unixjavabob at yahoo.com Thu Sep 4 15:29:15 2003 From: unixjavabob at yahoo.com (Bob Read) Date: Thu, 4 Sep 2003 15:29:15 -0700 (PDT) Subject: [buug] Regarding wireless access points In-Reply-To: <20030904214943.GG447@primate.net> Message-ID: <20030904222915.65059.qmail@web13807.mail.yahoo.com> > > Assuming (...) > and assuming (...), > you should be mostly correct. > I think that's what NASA told the crew of the Columbia when they asked "Is it OK to re-enter Earth's atmosphere?" ===== ----------------------------------------- Bob Read Exit Code Incorporated cell (510)-703-1634 unixjavabob at yahoo.com ----------------------------------------- __________________________________ Do you Yahoo!? Yahoo! SiteBuilder - Free, easy-to-use web site design software http://sitebuilder.yahoo.com From sneakums at zork.net Thu Sep 4 16:41:43 2003 From: sneakums at zork.net (Sean Neakums) Date: Fri, 05 Sep 2003 00:41:43 +0100 Subject: [buug] Regarding wireless access points In-Reply-To: <20030904222915.65059.qmail@web13807.mail.yahoo.com> (Bob Read's message of "Thu, 4 Sep 2003 15:29:15 -0700 (PDT)") References: <20030904222915.65059.qmail@web13807.mail.yahoo.com> Message-ID: <6u8yp4qfyg.fsf@zork.zork.net> Bob Read writes: >> Assuming (...) >> and assuming (...), >> you should be mostly correct. > > I think that's what NASA told the crew of the Columbia when they > asked "Is it OK to re-enter Earth's atmosphere?" How fortunate that there are no lives at risk here, then! -- Ah bay tsay day vitamin. From rubinson at email.arizona.edu Thu Sep 4 19:36:34 2003 From: rubinson at email.arizona.edu (Claude Rubinson) Date: Thu, 4 Sep 2003 19:36:34 -0700 Subject: [buug] Regarding wireless access points Message-ID: <20030905023634.GA29786@wagner> I'm assuming that you didn't mean to take this message off-list and am redirecting it to the group. Does anyone have any thoughts/comments? ----- Forwarded message from Jerry Asher ----- Claude Rubinson said: > > And, assuming that I can simply connect a wireless hub to the ethernet > jack, I'm thinking that I don't need to worry about security since the > campus network will still be authenticating the individual clients by > MAC address. That is, I wouldn't be opening any security holes in the > campus network. Correct? Or no? My understanding is that you are opening a security hole. MAC addresses of various wireless authorized cards can be sniffed. When the user of such a card goes offline, the wiley h4x0r can set his wireless card to mimic that of the marks. And then before you can cry out Nimba, soon you have little blasters all over the campus network, release from inside the firewall. This can be filtered to some degree on various waps, but I don't think there is any preventable way of doing this short of setting up a full fledged boingo like authenticating service. Those wiley h4x0rs why do they hate America? Jerry ----- End forwarded message ----- From atporter at primate.net Thu Sep 4 22:10:04 2003 From: atporter at primate.net (Aaron T Porter) Date: Thu, 4 Sep 2003 22:10:04 -0700 Subject: [buug] Regarding wireless access points In-Reply-To: <20030905023634.GA29786@wagner> References: <20030905023634.GA29786@wagner> Message-ID: <20030905051004.GK447@primate.net> > Jerry Asher said: > > MAC addresses of various wireless authorized cards can be sniffed. When > the user of such a card goes offline, the wiley h4x0r can set his wireless > card to mimic that of the marks. And then before you can cry out Nimba, > soon you have little blasters all over the campus network, release from > inside the firewall. > > This can be filtered to some degree on various waps, but I don't think > there is any preventable way of doing this short of setting up a full > fledged boingo like authenticating service. The same is true of a wired network with open physical access. From rubinson at email.arizona.edu Fri Sep 5 10:47:51 2003 From: rubinson at email.arizona.edu (Claude Rubinson) Date: Fri, 5 Sep 2003 10:47:51 -0700 Subject: [buug] Regarding wireless access points In-Reply-To: <20030905051004.GK447@primate.net> References: <20030905023634.GA29786@wagner> <20030905051004.GK447@primate.net> Message-ID: <20030905174751.GA5967@wagner> On Thu, Sep 04, 2003 at 10:10:04PM -0700, Aaron T Porter wrote: > > Jerry Asher said: > > > > MAC addresses of various wireless authorized cards can be sniffed. When > > the user of such a card goes offline, the wiley h4x0r can set his wireless > > card to mimic that of the marks. And then before you can cry out Nimba, > > soon you have little blasters all over the campus network, release from > > inside the firewall. > > > > This can be filtered to some degree on various waps, but I don't think > > there is any preventable way of doing this short of setting up a full > > fledged boingo like authenticating service. > > The same is true of a wired network with open physical access. Ahh, of course. Which explains Nick's comment of why this isn't my problem. Thanks all. Here comes wireless access to the Univ of Arizona Soc dept. From benjamin_j_liu at yahoo.com Sat Sep 6 13:04:20 2003 From: benjamin_j_liu at yahoo.com (Benjamin Liu) Date: Sat, 6 Sep 2003 13:04:20 -0700 (PDT) Subject: [buug] Xchat download onto Archos Jukebox fails. Message-ID: <20030906200420.64672.qmail@web21406.mail.yahoo.com> Happy weekend! I would like to download files through Xchat onto my Archos Jukebox usb device, but the downloads keep failing. My fstab line is: /dev/sda1 /home/benj/movies auto noauto,user,rw 0 0 When benj mounts the usb device, it is accessible read/write to him, but Xchat downloads seem to not have access. I don't think the problem is with permission settings in Xchat because downloads to the harddrive work fine with the current file permissions. Any suggestions on how to make my usb device accessible for writing? Thanks, Ben __________________________________ Do you Yahoo!? Yahoo! SiteBuilder - Free, easy-to-use web site design software http://sitebuilder.yahoo.com From john at jjdev.com Sat Sep 6 15:20:15 2003 From: john at jjdev.com (John de la Garza) Date: Sat, 6 Sep 2003 15:20:15 -0700 Subject: [buug] redundant squid Message-ID: <4A059A16-E0B8-11D7-B286-000393CB11D4@jjdev.com> Anyone have any info on setting up squid in some kind of cluster? basically I want a proxy server that has fail over From jel at idiom.com Sun Sep 7 23:57:44 2003 From: jel at idiom.com (John Levine) Date: Sun, 7 Sep 2003 23:57:44 -0700 Subject: [buug] Regarding wireless access points In-Reply-To: <20030905174751.GA5967@wagner> Message-ID: You might want to look into this if you are considering buying an access point. I'm certainly not an expert, though. It's a linksys router running linux. http://www.batbox.org/wrt54g-linux.html Found from a link from slashdot. On Friday, Sep 5, 2003, at 10:47 US/Pacific, Claude Rubinson wrote: > On Thu, Sep 04, 2003 at 10:10:04PM -0700, Aaron T Porter wrote: >>> Jerry Asher said: >>> >>> MAC addresses of various wireless authorized cards can be sniffed. >>> When >>> the user of such a card goes offline, the wiley h4x0r can set his >>> wireless >>> card to mimic that of the marks. And then before you can cry out >>> Nimba, >>> soon you have little blasters all over the campus network, release >>> from >>> inside the firewall. >>> >>> This can be filtered to some degree on various waps, but I don't >>> think >>> there is any preventable way of doing this short of setting up a full >>> fledged boingo like authenticating service. >> >> The same is true of a wired network with open physical access. > > Ahh, of course. Which explains Nick's comment of why this isn't my > problem. > > Thanks all. Here comes wireless access to the Univ of Arizona Soc > dept. > _______________________________________________ > Buug mailing list > Buug at weak.org > http://www.weak.org/mailman/listinfo/buug > From holiver at ieee-occs.org Mon Sep 8 13:10:43 2003 From: holiver at ieee-occs.org (James F. Lu - Publicity Chair) Date: Mon, 8 Sep 2003 13:10:43 -0700 Subject: [buug] Upcoming Symposium - COSST Message-ID: <009301c37645$48ba5d60$220110ac@FLUFFY> ======================================================= Coast Open Source Software Technology (COSST) Symposium by IEEE Computer Society - Orange County Chapter ======================================================= WHAT: Applying Open Source Web Technologies COSST Symposium WHEN: Saturday Oct. 18. 9am-6pm WHERE: Jazz Semiconductor auditorium, Conexant Systems Overview -------- Our technical focus will be on using LAMP and Java open-source technologies. The LAMP acronym is used to describe a typical open-source platform "stack" for web applications: * Linux operating system * Apache web server * MySQL/PostgreSQL databases * Perl/PHP/Python languages The symposium will open with foundation talks providing an overview of open-source software and Linux as an open-source web application platform. A series of application-tier talks will provide insight from the point of view of widely used web application development languages: Perl, PHP, Python, and Java. The final session will be an experience panel, which will provide an opportunity for experience reports from actual development projects to illustrate real-life problems and opportunities of OSS. Target Audience --------------- The target audience for the symposium is professional software engineers and technical management. The audience is expected to have a diverse background involving many operating systems and languages, with experience in software system development for a variety of industrial, military and commercial purposes. Attendees will include experienced professionals who have had little or no exposure with open-source software and are looking for a good introduction. Symposium Goals --------------- The goal of the symposium is to provide participants with a high-level, technically sophisticated overview of major open source software (OSS) technologies for web application development. The symposium will provide information about technology, resources, and supporting tools and processes of the OSS community. The attendee will take away from the symposium a basic understanding of the available technologies, information about how to acquire and learn more about the various packages, and insight that will enable them to make informed decisions about using and deploying specific OSS technology in web applications. The technical sessions will address: * overview - what is it, what does it do, what problems does it solve * key features - description of key features with short examples * application examples - a few simple examples of doing something useful or where/how to apply the technology * applicability - when should you use it? [or when not!] * resources - where to get it, who maintains it, where to find help, documentation, assistance, mailing lists Sessions -------- 9:00 Symposium Welcome 9:10 Introduction to open-source software Walt Scacchi Sr Research Scientist. UCI Institute of Software Research 10:00 Linux and OSS in Enterprise Development Bill Hilf Sr Architect and Linux Technical Leader. IBM 11:00 Web Application Development with Perl Eric Hammond Director of Technology. Rent.com 12:00 Lunch (Included for paid registrants) 1:OO Introduction to PHP and PEAR Jesus Castagnetto Co-author of "Professional PHP Programming" (Wrox Press) 2:00 Python-Powered Web Application Development Chuck Esterbrook Software Consultant and Creator of Webware for Python 3:00 Mid-afternoon break 3:15 Java OSS Web Technologies Dave Ford Java Consultant and Trainer. SmartSoft. 4:15 Experiences in OSS Web Application Development Panel Facilitated by Prakash Malani Principal Software Engineer. eBuilt.com 5:15 Closing Closing remarks and symposium wrapup. Cost and Registration --------------------- Your registration fees will be discounted according to your IEEE and/or Computer Society membership, as shown below: Standard $75 IEEE Member $60 IEEE Student Member $30 Student $45 You may register online at https://www.regonline.com/Checkin.asp?EventId=9769 If you are one of the first 75 paid registrants, you will get a chance to win one of two Oreilly's "Linux Server CD Bookshelf" (retail value: $119.95), or one of many other LAMP related Oreilly reference books. COSST Volunteers will get in free. There may also be T-Shirts. To volunteer, contact Sebastian: seguti at ics.uci.edu or call 1-949-509-9628 Direction --------------------- Conexant Systems-Jazz Semiconductor 4321 Jamboree Road Newport Beach, CA 92660 A map of the area may be found at http://www.jazzsemi.com/docs/jazz-directions.pdf For more information, please visit us at http://cosst.ieee-occs.org or call Toll Free 1-888-548-1969 -------------- next part -------------- An HTML attachment was scrubbed... URL: From wfhoney at pacbell.net Wed Sep 10 13:33:40 2003 From: wfhoney at pacbell.net (Bill Honeycutt) Date: Wed, 10 Sep 2003 13:33:40 -0700 Subject: [buug] gcc-3.2.2 Message-ID: <3F5F8AA4.9070109@pacbell.net> Okay, I'll bite. Are my compiles taking a lot longer with gcc-3.2.2 as compared to gcc-2.95? I confess to using the out-of-the-box Shrike compiler. If so, why? From jan at caustic.org Wed Sep 10 13:43:51 2003 From: jan at caustic.org (f.johan.beisser) Date: Wed, 10 Sep 2003 13:43:51 -0700 (PDT) Subject: [buug] cheap-ass colo Message-ID: <20030910134315.J381@pogo.caustic.org> anyone know of a cheap colo ($100/mo) around the bay area? -------/ f. johan beisser /--------------------------------------+ The other day I asked former Yankees pitcher Jim Bouton what he thought of our great victory over Iraq, and he said, "Mohammed Ali versus Mr. Rogers." -- kurt vonnegut, 5.9.03 From harpo at thebackrow.net Wed Sep 10 13:56:10 2003 From: harpo at thebackrow.net (Will Lowe) Date: Wed, 10 Sep 2003 13:56:10 -0700 Subject: [buug] cheap-ass colo In-Reply-To: <20030910134315.J381@pogo.caustic.org> References: <20030910134315.J381@pogo.caustic.org> Message-ID: <20030910205610.GA31793@thebackrow.net> If you're not-for-profit only, check out communitycolo.net. -- thanks, Will From brian at dessent.net Wed Sep 10 18:30:51 2003 From: brian at dessent.net (Brian Dessent) Date: Wed, 10 Sep 2003 18:30:51 -0700 Subject: [buug] cheap-ass colo References: <20030910134315.J381@pogo.caustic.org> Message-ID: <3F5FD04B.EBF4FCD3@dessent.net> "f.johan.beisser" wrote: > > anyone know of a cheap colo ($100/mo) around the bay area? You might want to check WebHostingTalk: I saw a couple of deals for 1Mbit/s and 2U space at Hurricane Electric's Fremont NOC for $100/mo, e.g. and Brian From evans at ncseweb.org Mon Sep 15 16:27:32 2003 From: evans at ncseweb.org (Skip Evans) Date: Mon, 15 Sep 2003 19:27:32 -0400 Subject: [buug] ldm_validate_partition_error Message-ID: <3F664AE4.9030809@ncseweb.org> Hey all, I just installed Mandrake Linux 9.1 on a workstation to see if I can use it to dump Windows. All I need is openoffice, email, and the AOL IM (because that's what they use here in the office), and I pretty much have all I need to get started sans Windows, except that I would like to keep my Windows drive bootable as a second drive because there is stuff on it I will have to get back to now and again. All seems well with the ML install, except that when it is booting up and says 'finding module dependencies' I get the following error: ldm_validate_partition_table(): disk read failed. I searched around a bit for this and could only find references in discussion groups to people getting it on older Mandrake installs, but that it should have been fixed in 9.1. Anyone know what this error is? I'm also having trouble getting the Windows drive to boot as HDD-1. Basically, I thought I could plug one in as the master (ML), and one as the slave and select in the bios which to boot from. I'm quite sure I got the jumpers all set right. I also tried putting them both as masters on each cable of the IDE controller, and booting from the bios as HDD-0 and HDD-2, but any time I try and boot either one as the second drive I get a non-system disk error. My computer is a very generic standard type machine, no fancy hardware installed. Amy ideas? Thanks from a newbie. (In case you're wondering, as someone else quizzed me about, the 'Network' in my job title has nothing to do with computer networks, more the fleshy kind full of blood and yuck.) -- Skip Evans Network Project Director National Center for Science Education 420 40th St, Suite 2 Oakland, CA 94609 510-601-7203 Ext. 308 510-601-7204 (fax) 800-290-6006 evans at ncseweb.org http://www.ncseweb.org NCSE now has a one way broadcast news list. Please note that this is NOT a discussion list. You cannot post messages for members to receive. We use this list to broadcast news about the creationism/evolution issue to interested parties. To sign up send: subscribe ncse your at email.address.here to: majordomo at ncseweb2.org To unsubscribe send: unsubscribe ncse your at email.address.here to: majordomo at ncseweb2.org From brian at planetshwoop.com Wed Sep 17 07:11:09 2003 From: brian at planetshwoop.com (Brian Sobolak) Date: Wed, 17 Sep 2003 09:11:09 -0500 (CDT) Subject: [buug] Spam DOS -- ideas? Message-ID: <52132.63.73.213.5.1063807869.squirrel@webmail.psys.org> Hey guys - This is an email from my sysadmin and is also affecting mail at my domain. Any ideas? brian ---------------------------- Original Message ---------------------------- Subject: [UFO Chicago] Spam DOS -- ideas? From: "David W. Harks" Date: Wed, September 17, 2003 7:22 am To: ufo at tastytronic.net -------------------------------------------------------------------------- Greetings, UFOers, I'm faced with a problem: One of the domains I host is getting flooded with spam. Literally thousands of simultaneous connections from thousands of servers worldwide are beating on my exim system. To temporarily solve this, I've modified my MX to point to a server that can be dedicated to the purpose of handling this flood. Also, I've configured exim with jealous connection limits and to use SMTP VRFY, along with several DNSBL's. But this isn't stopping the thousands of connections which end up acting as an effective email DOS. The servers sending the mail are actually (mostly) legitimate, and when checked via ORDB and SpamCop, come back clean, but they're attempting to send to thousands of nonexistent addresses @mydomain. Of course, VRFY doesn't allow this, but the flood continues. Any thoughts on how to fight back against this sort of thing? Would it be better to NOT use VRFY, and just let thousands of bounces go out? I'm pretty sure the senders are spoofing their addresses, so I think that would get lots of bounces to the wrong folks. (although, perhaps THOSE folks might have better luck contacting their various ISPs...) Firewalling off the addresses isn't practical, since these are generally 'legitimate' servers (and, the list of rules gets long -- over 11,000 unique addresses so far). Any suggestions, experience, or ideas are welcome. Thanks! dave -- David W. Harks http://dwblog.psys.org _______________________________________________ UFO Chicago -- Users of Free Operating Systems Free Software Rules -- Proprietary Drools! http://ufo.chicago.il.us/cgi-bin/mailman/listinfo/ufo -- Brian Sobolak http://www.planetshwoop.com/ From abhay_srivastava at infosys.com Thu Sep 18 06:46:54 2003 From: abhay_srivastava at infosys.com (Abhay Kumar Srivastava) Date: Thu, 18 Sep 2003 19:16:54 +0530 Subject: [buug] FreeBSD Multicast Message-ID: <882B7E812BE14E4BA7E86387242C8DB9070534@kecmsg11.ad.infosys.com> I am trying to multicast a message from FreeBSD machine. This code works on a machine FreeBSD 4.7 but gives an error " route not found" on 2 another machines FreeBSD 4.2. while sending the message to Class D Address. I have changed the /etc/hosts of all the machine to incorporate the same Class D address. Please tell me what needs to be done. Regards, Abhay #include #include #include #include #include #include #include /* close */ #define SERVER_PORT 1500 #define MAX_MSG 100 int main(int argc, char *argv[]) { int sd, rc, i; unsigned char ttl = 1; struct sockaddr_in cliAddr, servAddr; struct hostent *h; if(argc<3) { printf("usage %s ... \n",argv[0]); exit(1); } h = gethostbyname(argv[1]); if(h==NULL) { printf("%s : unknown host '%s'\n",argv[0],argv[2]); exit(1); } servAddr.sin_family = h->h_addrtype; memcpy((char *) &servAddr.sin_addr.s_addr, h->h_addr_list[0],h->h_length); servAddr.sin_port = htons(SERVER_PORT); /* check if dest address is multicast */ if(!IN_MULTICAST(ntohl(servAddr.sin_addr.s_addr))) { printf("%s : given address '%s' is not multicast \n",argv[0], inet_ntoa(servAddr.sin_addr)); exit(1); } /* create socket */ sd = socket(AF_INET,SOCK_DGRAM,0); if (sd<0) { printf("%s : cannot open socket\n",argv[0]); exit(1); } /* bind any port number */ cliAddr.sin_family = AF_INET; cliAddr.sin_addr.s_addr = htonl(INADDR_ANY); cliAddr.sin_port = htons(0); if(bind(sd,(struct sockaddr *) &cliAddr,sizeof(cliAddr))<0) { perror("bind"); exit(1); } if(setsockopt(sd,IPPROTO_IP,IP_MULTICAST_TTL, &ttl,sizeof(ttl))<0) { printf("%s : cannot set ttl = %d \n",argv[0],ttl); exit(1); } printf("%s : sending data on multicast group '%s' (%s)\n",argv[0], h->h_name,inet_ntoa(*(struct in_addr *) h->h_addr_list[0])); /* send data */ for(i=2;i From m-tomita at uf.cnt.neec.jp.nec.com Thu Sep 18 23:13:43 2003 From: m-tomita at uf.cnt.neec.jp.nec.com (Masahide Tomita) Date: Fri, 19 Sep 2003 15:13:43 +0900 Subject: [buug] To dump core for sure Message-ID: <20030919150801.5516.M-TOMITA@uf.cnt.neec.jp.nec.com> Hi, I'm new in this list but I'm almost desperate, so let me ask a question. I'm developping multi-threaded application on RedHat Linux 7.2. The application still contains some bugs and sometimes abort by SIGSEGV, but it doesn't dump core everytime. Funny thing is that it sometime does. It seems like dumping might be controlled by something environmental, not by application. So, what I want to know is: 1. Is there some way to force applications to dump core? (Like, calling some function in the source? if any...) 2. What would be the case that application don't dump ocre even if it's SIGSEGV? I checked taht limit is set to "unlimited". Please tell me if someone knows the answer. Thank you for your help, in advance. Regards, Masahide Tomita -- Masahide Tomita From John.Clarke at LibertyMutual.com Fri Sep 19 05:37:11 2003 From: John.Clarke at LibertyMutual.com (Clarke, John) Date: Fri, 19 Sep 2003 08:37:11 -0400 Subject: [buug] Grep command Message-ID: Ha all, I want to grab data from either side of a matched criteria from grep. Any one got any other ideas of a command and if it does work please tell me what OS and version and what shell. Also if anyone does do this how do you just get lines below or lines above the match rather than both. This is what I am trying to do Inputfile A B C D E F G Grep -2 'D' inputfile Expected result B C D E F Cheers, John DB2 - UDB DBA RAM - Liberty Mutual Ph(317) 581 8673 ------------------------------------------------------------------------ ------------------------------------- CONFIDENTIALITY NOTICE: If you have received this e-mail in error, please immediately notify the sender by e-mail at the address shown. This e-mail transmission may contain confidential information. This information is intended only for the use of the individual(s) or entity to whom it is intended even if addressed incorrectly. Please delete it from your files if you are not the intended recipient. Thank you for your compliance. Copyright (c) 2003 Liberty Mutual ------------------------------------------------------------------------ ------------------------------------- -------------- next part -------------- An HTML attachment was scrubbed... URL: From sneakums at zork.net Fri Sep 19 05:53:16 2003 From: sneakums at zork.net (Sean Neakums) Date: Fri, 19 Sep 2003 13:53:16 +0100 Subject: [buug] Grep command In-Reply-To: (John Clarke's message of "Fri, 19 Sep 2003 08:37:11 -0400") References: Message-ID: <6uk785q6rn.fsf@zork.zork.net> "Clarke, John" writes: > I want to grab data from either side of a matched criteria from grep. > Any one got any other ideas of a command and if it does work please tell > me what OS and version and what shell. Also if anyone does do this how > do you just get lines below or lines above the match rather than both. GNU grep has some options that seem do what you want: $ grep --help [...] Context control: -B, --before-context=NUM print NUM lines of leading context -A, --after-context=NUM print NUM lines of trailing context -C, --context=NUM print NUM lines of output context -NUM same as --context=NUM [...] $ grep -2 D testfile B C D E F -- B C D E F $ grep --version grep (GNU grep) 2.5.1 [...] From pong at taft.org Fri Sep 19 07:20:23 2003 From: pong at taft.org (Pong-TC) Date: Fri, 19 Sep 2003 07:20:23 -0700 Subject: [buug] Grep command In-Reply-To: References: Message-ID: "Clarke, John" writes: >Ha all, >I want to grab data from either side of a matched criteria from grep. >Any one got any other ideas of a command and if it does work please tell >me what OS and version and what shell. Also if anyone does do this how >do you just get lines below or lines above the match rather than both. > >This is what I am trying to do I am not good, but I think you can do this. YOu can do it with grep. grep D -v, this will give you the another result set. YOu can try this ls -la | grep d -v You will get the list of file, except the directories. Pong From John.Clarke at LibertyMutual.com Fri Sep 19 08:13:39 2003 From: John.Clarke at LibertyMutual.com (Clarke, John) Date: Fri, 19 Sep 2003 11:13:39 -0400 Subject: [buug] RE: Buug digest, Vol 1 #547 - 4 msgs Message-ID: Thanks for getting back to me Sean. Sorry for my possible ignorance but is GNU is Linux's flavor ,correct? Unfortunately, I have Solaris and AIX. Cheers, John -----Original Message----- From: buug-request at weak.org [mailto:buug-request at weak.org] Sent: Friday, September 19, 2003 9:38 AM To: buug at weak.org Subject: Buug digest, Vol 1 #547 - 4 msgs Send Buug mailing list submissions to buug at weak.org To subscribe or unsubscribe via the World Wide Web, visit http://www.weak.org/mailman/listinfo/buug or, via email, send a message with subject or body 'help' to buug-request at weak.org You can reach the person managing the list at buug-admin at weak.org When replying, please edit your Subject line so it is more specific than "Re: Contents of Buug digest..." Today's Topics: 1. To dump core for sure (Masahide Tomita) 2. Grep command (Clarke, John) 3. Re: Grep command (Sean Neakums) 4. Re: Grep command (Pong-TC) --__--__-- Message: 1 Date: Fri, 19 Sep 2003 15:13:43 +0900 From: Masahide Tomita To: buug at weak.org Subject: [buug] To dump core for sure Hi, I'm new in this list but I'm almost desperate, so let me ask a question. I'm developping multi-threaded application on RedHat Linux 7.2. The application still contains some bugs and sometimes abort by SIGSEGV, but it doesn't dump core everytime. Funny thing is that it sometime does. It seems like dumping might be controlled by something environmental, not by application. So, what I want to know is: 1. Is there some way to force applications to dump core? (Like, calling some function in the source? if any...) 2. What would be the case that application don't dump ocre even if it's SIGSEGV? I checked taht limit is set to "unlimited". Please tell me if someone knows the answer. Thank you for your help, in advance. Regards, Masahide Tomita -- Masahide Tomita --__--__-- Message: 2 Date: Fri, 19 Sep 2003 08:37:11 -0400 From: "Clarke, John" To: Subject: [buug] Grep command This is a multi-part message in MIME format. ------_=_NextPart_001_01C37EAA.BF393A31 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Ha all, I want to grab data from either side of a matched criteria from grep. Any one got any other ideas of a command and if it does work please tell me what OS and version and what shell. Also if anyone does do this how do you just get lines below or lines above the match rather than both. This is what I am trying to do Inputfile A B C D E F G Grep -2 'D' inputfile Expected result =20 B C D E F Cheers, John DB2 - UDB DBA RAM - Liberty Mutual Ph(317) 581 8673 ------------------------------------------------------------------------ ------------------------------------- CONFIDENTIALITY NOTICE: If you have received this e-mail in error, please immediately notify the sender by e-mail at the address shown. This e-mail transmission may contain confidential information. This information is intended only for the use of the individual(s) or entity to whom it is intended even if addressed incorrectly. Please delete it from your files if you are not the intended recipient. Thank you for your compliance. Copyright (c) 2003 Liberty Mutual ------------------------------------------------------------------------ ------------------------------------- ------_=_NextPart_001_01C37EAA.BF393A31 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Grep command

Ha all,
I want to grab data from either side = of a matched criteria from grep.  Any one got any other ideas of a = command and if it does work please tell me what OS and version and what = shell.  Also if anyone does do this how do you just get lines below = or lines above the match rather than both.

This is what I am trying to do

Inputfile
A
B
C
D
E
F
G

Grep  -2 'D' inputfile
Expected result
 
B
C
D
E
F

Cheers,
John

DB2 - UDB = DBA
RAM - Liberty = Mutual
Ph(317) 581 = 8673
--------------------------------------------------------- -= ---------------------------------------------------
CONFIDENTIALITY NOTICE: If you have = received this e-mail in error, please immediately notify the sender by = e-mail at the address shown. This e-mail transmission may contain = confidential information. This information is intended only for the use = of the individual(s) or entity to whom it is intended even if addressed = incorrectly. Please delete it from your files if you are not the = intended recipient. Thank you for your compliance. Copyright (c) 2003 = Liberty Mutual

-------------------------------------------------------- -= ----------------------------------------------------



------_=_NextPart_001_01C37EAA.BF393A31-- --__--__-- Message: 3 To: buug at weak.org Subject: Re: [buug] Grep command From: Sean Neakums Date: Fri, 19 Sep 2003 13:53:16 +0100 "Clarke, John" writes: > I want to grab data from either side of a matched criteria from grep. > Any one got any other ideas of a command and if it does work please > tell me what OS and version and what shell. Also if anyone does do > this how do you just get lines below or lines above the match rather > than both. GNU grep has some options that seem do what you want: $ grep --help [...] Context control: -B, --before-context=NUM print NUM lines of leading context -A, --after-context=NUM print NUM lines of trailing context -C, --context=NUM print NUM lines of output context -NUM same as --context=NUM [...] $ grep -2 D testfile B C D E F -- B C D E F $ grep --version grep (GNU grep) 2.5.1 [...] --__--__-- Message: 4 Date: Fri, 19 Sep 2003 07:20:23 -0700 Subject: Re: [buug] Grep command To: "Clarke, John" , buug at weak.org From: "Pong-TC" "Clarke, John" writes: >Ha all, >I want to grab data from either side of a matched criteria from grep. >Any one got any other ideas of a command and if it does work please tell >me what OS and version and what shell. Also if anyone does do this how >do you just get lines below or lines above the match rather than both. > >This is what I am trying to do I am not good, but I think you can do this. YOu can do it with grep. grep D -v, this will give you the another result set. YOu can try this ls -la | grep d -v You will get the list of file, except the directories. Pong --__--__-- _______________________________________________ Buug mailing list Buug at weak.org http://www.weak.org/mailman/listinfo/buug End of Buug Digest From atporter at primate.net Fri Sep 19 09:16:35 2003 From: atporter at primate.net (Aaron T Porter) Date: Fri, 19 Sep 2003 09:16:35 -0700 Subject: [buug] RE: Buug digest, Vol 1 #547 - 4 msgs In-Reply-To: References: Message-ID: <20030919161635.GN6926@primate.net> On Fri, Sep 19, 2003 at 11:13:39AM -0400, Clarke, John wrote: > Thanks for getting back to me Sean. Sorry for my possible ignorance but > is GNU is Linux's flavor ,correct? Unfortunately, I have Solaris and > AIX. For solaris packages, check http://sunfreeware.com (or a mirror, the main site gets very slow). For AIX, you might have to compile your own with sources from ftp.gnu.org. From sneakums at zork.net Fri Sep 19 11:18:23 2003 From: sneakums at zork.net (Sean Neakums) Date: Fri, 19 Sep 2003 19:18:23 +0100 Subject: [buug] RE: Buug digest, Vol 1 #547 - 4 msgs In-Reply-To: <20030919161635.GN6926@primate.net> (Aaron T. Porter's message of "Fri, 19 Sep 2003 09:16:35 -0700") References: <20030919161635.GN6926@primate.net> Message-ID: <6ud6dwr6a8.fsf@zork.zork.net> Aaron T Porter writes: > On Fri, Sep 19, 2003 at 11:13:39AM -0400, Clarke, John wrote: >> Thanks for getting back to me Sean. Sorry for my possible ignorance but >> is GNU is Linux's flavor ,correct? Unfortunately, I have Solaris and >> AIX. > > For solaris packages, check http://sunfreeware.com (or a mirror, > the main site gets very slow). For AIX, you might have to compile your own > with sources from ftp.gnu.org. This may be worth a shot: http://aixpdslib.seas.ucla.edu/packages/grep.html (There's some HP-UX archive somewhere carrying a bunch of free software that also asserts that the software is public domain. Most aggravating.) From evans at ncseweb.org Wed Sep 24 16:48:16 2003 From: evans at ncseweb.org (Skip Evans) Date: Wed, 24 Sep 2003 16:48:16 -0700 Subject: [buug] Code editor suggestions? Message-ID: <3F722D40.5070707@ncseweb.org> Hey all, I now have my Redhat 9 install pretty sorted out, and also have the Crossover Office Windows emulator running, allowing me to run some of the Office stuff I need around here. However, I have been using Homesite for a PHP editor, but it doesn't seem to want to install or run under Crossover. Does anyone know of a good code editor for Linux I can get ahold of? The thing I like about Homesite is the way it colors the code so that you can easily spot syntax errors, and this especially helpful when code mixes source, SQL, html, etc, as is the case with scripting languages like PHP. I would like to preserve this feature, if I can. Any and all recommendations welcome. -- Skip Evans Network Project Director National Center for Science Education 420 40th St, Suite 2 Oakland, CA 94609 510-601-7203 Ext. 308 510-601-7204 (fax) 800-290-6006 evans at ncseweb.org http://www.ncseweb.org NCSE now has a one way broadcast news list. Please note that this is NOT a discussion list. You cannot post messages for members to receive. We use this list to broadcast news about the creationism/evolution issue to interested parties. To sign up send: subscribe ncse your at email.address.here to: majordomo at ncseweb2.org To unsubscribe send: unsubscribe ncse your at email.address.here to: majordomo at ncseweb2.org From rick at linuxmafia.com Wed Sep 24 18:32:56 2003 From: rick at linuxmafia.com (Rick Moen) Date: Wed, 24 Sep 2003 18:32:56 -0700 Subject: [buug] Code editor suggestions? In-Reply-To: <3F722D40.5070707@ncseweb.org> References: <3F722D40.5070707@ncseweb.org> Message-ID: <20030925013256.GL20106@linuxmafia.com> Quoting Skip Evans (evans at ncseweb.org): > Does anyone know of a good code editor for Linux I can > get ahold of? I like vim; some heretics like emacs. But there's also: http://linuxmafia.com/~rick/linux-info/applications-ides.html -- Cheers, "Heedless of grammar, they all cried 'It's him!'" Rick Moen -- R.H. Barham, _Misadventure at Margate_ rick at linuxmafia.com From john at jjdev.com Fri Sep 26 12:43:53 2003 From: john at jjdev.com (johnd) Date: Fri, 26 Sep 2003 12:43:53 -0700 Subject: [buug] commercial linux proxy servers Message-ID: <20030926194353.GA6167@stang.jjdev.com> Has anyone here ever ran a commercial proxy server on Linux that they would recommend? I need to put together a pros and cons list of a commercial proxy server and squid for the IT group at my work. I've found many commercial proxy servers on google but have never used anything other than squid. Any input would be helpful. Also, if anyone has had any luck with a 'proxy appliance' that would be cool, too. -- Those who do not understand Unix are condemned to reinvent it, poorly. --Henry Spencer (Usenet signature, November 1987) From nick at zork.net Fri Sep 26 21:42:11 2003 From: nick at zork.net (Nick Moffitt) Date: Fri, 26 Sep 2003 21:42:11 -0700 Subject: [buug] commercial linux proxy servers In-Reply-To: <20030926194353.GA6167@stang.jjdev.com> References: <20030926194353.GA6167@stang.jjdev.com> Message-ID: <20030927044211.GK2755@zork.net> begin johnd quotation: > Has anyone here ever ran a commercial proxy server on Linux that > they would recommend? I need to put together a pros and cons list > of a commercial proxy server and squid for the IT group at my work. > > I've found many commercial proxy servers on google but have never > used anything other than squid. Any input would be helpful. Also, > if anyone has had any luck with a 'proxy appliance' that would be > cool, too. Since squid is included on commercially-sold GNU/Linux distributions, I think it counts as a commercial proxy server. It's certainly used quite a bit in commerce. -- Support your droogs! end From john at jjdev.com Sat Sep 27 08:37:00 2003 From: john at jjdev.com (johnd) Date: Sat, 27 Sep 2003 08:37:00 -0700 Subject: [buug] commercial linux proxy servers In-Reply-To: <20030927044211.GK2755@zork.net> References: <20030926194353.GA6167@stang.jjdev.com> <20030927044211.GK2755@zork.net> Message-ID: <20030927153700.GA7514@stang.jjdev.com> what I meant was something that you can purchase from a company that will offer support. I guess I wasn't clear, I was trying to say that I need something to offer as a alternative to squid. On Fri, Sep 26, 2003 at 09:42:11PM -0700, Nick Moffitt wrote: > begin johnd quotation: > > Has anyone here ever ran a commercial proxy server on Linux that > > they would recommend? I need to put together a pros and cons list > > of a commercial proxy server and squid for the IT group at my work. > > > > I've found many commercial proxy servers on google but have never > > used anything other than squid. Any input would be helpful. Also, > > if anyone has had any luck with a 'proxy appliance' that would be > > cool, too. > > Since squid is included on commercially-sold GNU/Linux > distributions, I think it counts as a commercial proxy server. It's > certainly used quite a bit in commerce. > > -- > Support your droogs! > > end > _______________________________________________ > Buug mailing list > Buug at weak.org > http://www.weak.org/mailman/listinfo/buug -- Those who do not understand Unix are condemned to reinvent it, poorly. --Henry Spencer (Usenet signature, November 1987) From nick at zork.net Sat Sep 27 10:18:42 2003 From: nick at zork.net (Nick Moffitt) Date: Sat, 27 Sep 2003 10:18:42 -0700 Subject: [buug] commercial linux proxy servers In-Reply-To: <20030927153700.GA7514@stang.jjdev.com> References: <20030926194353.GA6167@stang.jjdev.com> <20030927044211.GK2755@zork.net> <20030927153700.GA7514@stang.jjdev.com> Message-ID: <20030927171842.GC14447@zork.net> begin johnd quotation: > what I meant was something that you can purchase from a company that > will offer support. I guess I wasn't clear, I was trying to say > that I need something to offer as a alternative to squid. The aforementioned Linux distributions will allow you to purchase copies, and will offer support. Enjoy. -- Support your droogs! end From unix at theunixman.com Sat Sep 27 11:00:55 2003 From: unix at theunixman.com (Evan Cofsky) Date: Sat, 27 Sep 2003 18:00:55 +0000 Subject: [buug] commercial linux proxy servers In-Reply-To: <20030926194353.GA6167@stang.jjdev.com> References: <20030926194353.GA6167@stang.jjdev.com> Message-ID: <20030927180055.GF2563@valinor.arda.theunixman.com> On 09/26 12:43, Johnny Rocket wrote: > Has anyone here ever ran a commercial proxy server on Linux that they would > recommend? I need to put together a pros and cons list of a commercial > proxy server and squid for the IT group at my work. Well, here are a few places to start: http://zeus.com/ - Zeus is okay, and has some pretty useful web controls, but I didn't really like it too much. It's also a software-based solution. http://cisco.com/ - Cisco makes "Content Engines" which also do caching. They're Cisco, so they're extremely stable, if not the fastest. They're also relatively straightforward to use. If you're in an environment where monkeys will be interacting with such a device, having thick manuals to keep them and their managers occupied is always a plus, and Cisco has some of the thickest, most obfuscated manuals around. http://nortelnetworks.com/ - Their Alteon products are some of the best. Yahoo even uses them (and I think Google, too, but I'm not sure). I'd recommend these over a Squid box, actually, if the budget is there, since you can buy a few of these, go through some instructions, and set up a fully redundant environment. -- Evan Cofsky, President, CEO The UNIX Man