Skip to content

Category: Uncategorized

KDE patch, and my cat

Linux: So, I like being able to move windows around using the keyboard very quickly. In particular, one nifty feature of Sawfish was corner.jl, a Sawfish lisp snippet which ‘provides functions to move a window into a screen corner.’

Getting Postfix to use an SSH tunnel for outgoing SMTP

Given all the fuss over blocking dynamic IPs due to spam, I’ve long sent outgoing SMTP via my server (which lives on a static IP). I download my mail from that using fetchmail over an SSH tunnel, and have done for a while. It’s very reliable, and that way it really doesn’t matter where I download from — quite neat. Also means I don’t have to futz with SMTP AUTH, IMAP/SSL, Certifying Authorities, or any of the other hand-configured complex PKI machinery required to use SSL for authentication.

SPF again

Spam: Craig is publishing SPF records. Worth noting that I’ve been publishing SPF records for jmason.org for a month or two, even though the protocol hasn’t even stabilised yet — working on the ‘if you build it, they will come’ approach ;)

‘It will solve starvation among shareholders, but not the developing world’

EU broadside at GM firms’ ‘lies’ (Ananova):

‘They tried to lie to people, they tried to force it upon people … it is the wrong approach and we simply have not accepted that and European citizens have not accepted it. You simply cannot force it upon Europe.

‘So I hope they have definitely learned a lesson from it and especially when they now try to argue that this will try to solve the problems of starvation in the world. After all, why didn’t they start with such products, so they could prove to the world that this was exactly what they were interested in doing?

‘It will solve starvation among shareholders, but not the developing world unfortunately.

That’s the EU Environment Commissioner, Margot Wallstrom, launching a broadside against ‘US biotech companies’, accusing them of ‘forcing’ unsuitable GM technology onto Europe.

Ouch.

It’s interesting to note that much of their biotech companies’ tactics seem to work well in the US, but overseas, the tactics play out predominantly as blatant strong-arming, astroturfing support, and being ‘economical with the truth’, as the phrase goes.

Some rethinking of their strategy might be helpful — although really, IMO, some thought as to how to make their products relevant to consumers, instead of money-spinning for their shareholders, might work best of all. Making some moves towards the much-vaunted ‘solving starvation in the developing world’ might just be the best way to that.

BitTorrent and Google’s IP

Tech: Sam Ruby on Foo Camp. Foo camp sounds cool; a little bit circle-jerky, but still interesting. But that’s not what I wanted to write about — the thing I wanted to mention was BitTorrent; it just struck me recently — one key thing about BT that makes it great is that it’s designed by the UNIX philosophy — make one tool that does one thing very well, and make it pluggable, so it can be used by other things easily.

SMTP Sender Authentication

SMTP Sender Authentication, by David Jeske of Y! Groups (pointer from Jeremy.

Schemes similar to this — calling back to a sending server to verify that a mail was really sent via that host — have been proposed before in several venues, the most high-profile and public being the ASRG list. Here is a message I sent to that list in April 2003 discussing a few of those schemes:

  • J C Lawrence’s ‘forward chained digital signatures’ on Received headers
  • William at elan.net’s ‘complex callback verification requirying full message tracking server functionality with dns extensions’
  • Russ Nelson’s Q249
  • Our own ‘porkhash’

I still like this style of system, I think, but in terms of deployability and simplicity, I’m supporting Sender-Permitted From for now — which similarly forces senders to use registered relays for a given SPF-supporting domain, but using DNS as the protocol and IP addresses as the hard-to-forge identity component.

Another bonus of SPF is that it’s simple, easy to implement, has *running code* out there now, and is being pushed strongly by a pragmatic and sane driving person (in the form of Meng Weng Wong). It’s not always easy in the anti-spam field to find a solution like that ;)

BTW, SPF also, similarly, breaks envelope sender forging. However, I agree, this is one egg that has to be broken to help stop spam (or at least force spammers to use their own domains and IPs.)

Iraq: guerrilla tactics planned from the start?

Parallels with Vietnam becoming ominous for US commanders (Irish Times, subscriber-only). An interesting view on the situation Iraq:

US commanders in Iraq now believe that during the invasion, lower-echelon Iraqi troops mounted a token defence against US armour and air power while thousands of Republican Guard members went to ground in order to wage a prolonged guerrilla war during the subsequent occupation.

As the current attacks evolve in sophistication and momentum, US troops believe that the current phase of the war is not an ad-hoc development, but part of a pre-planned strategy designed to frustrate US plans to rebuild Iraq.

Further indicators as to the source of the insurgency lie in the weaponry and tactics employed. US convoys and patrols are repeatedly attacked with IEDs configured as roadside bombs along with RPG strikes. … It is believed that the plastic explosives and RPGs were released from military stores in the run-up to the invasion and pre-deployed among the population for a war of attrition.

Wounding rather than killing the enemy is a classic feature of this type of war of attrition. By wounding as many enemy troops as possible, the guerrilla army ties up the resources of the occupying force as it seeks to evacuate and treat its personnel.

The architects of the current attacks recognise that it is far more expensive for the US to medically evacuate and treat injured soldiers than to simply process them for burial. For the insurgents, the psychological effect of their attacks is greatly enhanced with families and politicians in the US confronted with mutilated and disfigured soldiers returning from Iraq.

It would appear that the war in Iraq did not end on May 1st. It simply entered a new phase designed to render Iraq ungovernable.

No ‘US commanders’ are named, so it’s all off-the-record.

Humour: on a lighter note, BBC Radio 4’s Loose Ends, recorded in the Spiegeltent in Dublin last weekend, featuring ‘writers Anne Enright and John Arden, Desmond Guinness of the Irish Georgian Society, comedian Dara O’Briain, Chieftain Paddy Moloney and Loose Ends regular Emma Freud.’

Happiness measured

Science: Fantastic article in New Scientist volume 180 (4 Oct 2003), covering how science is beginning to identify the keys to a happy life, and perform studies measuring people’s happiness.

EMusic is dead

Music: All good things must come to an end. EMusic has been bought out by some bunch called ‘Dimensional Associates’, and will no longer offer its excellent download service; instead you’re limited to a measly 40 MP3s per month. (For context — last time I downloaded some listening material was on Monday, and I picked up about 80 MP3s in a single sitting.)

Whoops

Funny: So, I guess this is the Korean equivalent of Dublin’s Mao restaurant? Hitler Bar. (thx Eoin)

Diebold voting machines, DMCA, Michael Moore

e-Voting: Wired has an absolutely mind-numbing list of issues with the security of Diebold voting machine procedures, including passwords printed in manuals which the staff can take home, that same password being reused for multiple systems including the on-site machines at polling stations, tamper-resistance measures being omitted, poll supervisors hired without background checks, bicycle locks being used to secure voting machines, one shared key used to ‘secure’ the memory cards, etc.

Idyllwild and Language Trivia

Life: so myself and C took a one-night-only trip up to Idyllwild this weekend, hiking up to that rock formation and camping overnight. Great fun.

Another bad USPTO software patent

MS patents ‘phone-home’ failure reporting.

There’s a catch, in that it’s not just plain old ‘phone home’, as seen in probably a hundred products since 1960 — they’ve added a ‘match the reported error messages against a db of known issues on the server side’ step. So that’s vaguely inventive — well, no, it’s totally obvious, but at least nobody I can think of off the top of my head has done that before. (Well, I lie, it sounds a bit like KDE’s crash reporting tool which does a similar search before reporting a bug.)

The notable comment, though, is
this:

There is a significant institutional culture issue that has a strong influence on how the Office functions that took root several decades ago and has, regretfully, increased, monotonically, over time. The management attitude, in a nutshell, is that patents aren’t ‘examined’, they are ‘processed’. The examination process is driven by production ‘goals’; to be rated in the key rating category of ‘Production Goal Achievement’ as ‘fully successful’ you must have at least 95%; less than that you are marginal; less then 90% you are ‘unsatisfactory’, meaning your entire rating is ‘unsatisfactory’ meaning a ’90 day letter’ to get it ‘fully successful’ else you are fired. Also there are other time related requirements to meet, such as no amended application pending more than two months without an action. Persons get fired (yes, this does happen) almost always for low production or exceeding time limits for actions, almost never for improperly allowing claims.

Great.

Tech: It seems it’s stunningly easy to rip off GPRS customers. Another well-designed system I don’t think.

Shark Sandwich

Comedy: some Spinal Tap snippets:

Daytime Fireballs

APOD: A Daytime Fireball Over South Wales. Great picture
of a fireball disintegrating in the daytime sky.

I saw a similar daytime fireball streak through the sky when I was in Fraser Island in Australia last year; a little bit smaller than this one, mind you ;) Unfortunately, I didn’t get a picture in time. Very cool though!

find-hidden-word-text – read hidden text in Word docs

find-hidden-word-text – a command-line UNIX tool to ease the task of discovering hidden text in MS Word documents.

More specifically, it is an implementation of Method 2 from Simon Byers’ paper, Scalable Exploitation of, and Responses to Information Leakage Through Hidden Data in Published Documents.

In other words, it’ll display just the hidden text (if any exists) in Word docs. Go forth and discover accidental leaks!

Art-Market, ArtPrice, Servergroup, Groupe Serveur etc. spamhaus

So a few months ago, I setup a cookie-producing mailto honeypot page at foojlist.php.

Well, I just got the first bite — and it’s a live one. It’s our old friends at artprice.com. They’re a French spamhaus, operating from Saint-Romain-au-Mont-d’Or, France, and reports claim that it’s all the work of one guy — Thierry Ehrmann.

There’s lots of reports in USENET, and here’s their SBL listing, noting ‘extremely intense french spam source.’

This posting to NANAE notes that Colt France are not responding to complaints about them, either — but notes that ‘in France collecting e-mail addresses with the intention to send commercial mails without permission of the holders can be punished by law (article 226-18 of the Code Pe’nal – up to 5 years of prison or 300.000 euro)’. Interesting!

Full details of the spam, and the access_log entries from their web-scraper’s accesses, are attached.

The Google File System

Boing Boing links to a paper on the design of the Google Filesystem, Google’s in-house redundant-array-of-inexpensive-PCs cluster filesystem.

It’s very, very nice — and full of interesting tidbits about Google’s architecture.

  • ‘the system must efficiently implement well-defined semantics for
    • multiple clients that concurrently append to the same file. Our files are often used as producer- consumer queues or for many-way merging. Hundreds of producers, running one per machine, will concurrently append to a file. Atomicity with minimal synchronization overhead is essential. The file may be read later, or a consumer may be reading through the file simultaneously.’
  • ‘The workloads also have many large, sequential writes that append data to files. Typical operation sizes are similar to those for reads. Once written, files are seldom modified again. Small writes at arbitrary positions in a file are supported but do not have to be effcient.’

A perfect example of traditional UNIX system design!

You Might Be An Anti-Spam Kook If…

You Might Be An Anti-Spam Kook If… — very funny list from Vernon Schryver, concerning the many Final Ultimate Solutions to the Spam Problem (FUSSP) (link via Raph).

Raph says he, too, has a FUSSP, but says ‘I realize that using a trust metric to defeat spam, while probably effective, won’t be easy.’ Nevertheless, I’d be interested in hearing it, for one. Go on Raph, write it up! ;)

Funny: Whisky boss ‘amazed’ by spy interest: ‘The boss of a tiny Scottish distillery says he is amazed to learn that US spies have been monitoring his whisky plant for weapons of mass destruction.’

Ishkur’s Guide

Ishkur’s Guide to Electronic Music v2.0, via MeFi.

Not bad at all! It actually has 2 Congo Natty tracks listed — even if it gets the name wrong for one of them ;) I’ll nitpick, though; the categories around drum and bass, ragga jungle, jungle, and breakbeat are a bit randomly-connected together; they didn’t really tie together that way at all IMO. And he randomly decided that hardcore should be renamed ‘breakcore’, created a new category for all that gabba shite, then called it hardcore. But hey… if you’re going to try to make some kind of sense out of it, you have to break some eggs, and never mind — there’s lots of nice samples!

BTW I can’t believe he lists Rob Hubbard’s theme music to Zoids in the Techno/VGM category. Has someone really released that?

And in passing, I should note, the description for ‘Not Trance’ under ‘Trance’ is spot on. As are many of the other recent trance/house-related categories. And, alright, some of the recent d’n’b categories too…

Happy 20th birthday, GNU!

20 years ago tomorrow, on 27th September 1983, the GNU project was announced:

Free Unix!

Starting this Thanksgiving I am going to write a complete Unix-compatible software system called GNU (for Gnu’s Not Unix), and give it away free to everyone who can use it. Contributions of time, money, programs and equipment are greatly needed. ……

So that I can continue to use computers without violating my principles, I have decided to put together a sufficient body of free software so that I will be able to get along without any software that is not free.

Thanks to Ciaran O’Riordan for pointing this out!