Files
oldlinux-files/mail-archive/linux-admin/Volume2/digest173
2024-02-19 00:25:02 -05:00

756 lines
30 KiB
Plaintext

From: Digestifier <Linux-Admin-Request@senator-bedfellow.mit.edu>
To: Linux-Admin@senator-bedfellow.mit.edu
Reply-To: Linux-Admin@senator-bedfellow.mit.edu
Date: Mon, 10 Oct 94 23:13:40 EDT
Subject: Linux-Admin Digest #173
Linux-Admin Digest #173, Volume #2 Mon, 10 Oct 94 23:13:40 EDT
Contents:
Spline (Jussi Kantola)
Re: Bug in Linux 'mv'? (Christopher Gori)
Re: strange lockups, bizarre networking... (Steve Kneizys)
Re: Why doesn't ftp work?? (Matti Aarnio)
Re: SLIP w/Dynamic IP Addresses (Diane L. Calleson)
Clock freq. for WD90C30?? (Josh N. Pritikin)
Re: catman in linux (Andries Brouwer)
Re: [help] user cannot update password (Bob Collie)
Re: Ftape works...Not yet (Bigfoot)
Re: Security hole - has noone noticed so far? (Damien P. Neil)
Linux box as Router ?? (Tony Schwartz)
WANTED: Contract Person for Linux - Routers (Tony Schwartz)
Re: XFree86-3.1 - Whoopee! (Dan Pop)
Re: Where to find acct for 1.1.49+? (Robert Sink)
Re: eth0: Inf. loop in interrupt, sometimes, with a 3c509 (Donald Becker)
Re: Please don't post security holess... (M. K. Shenk)
Solaris secondary DNS can't suck zones from Linux primary DNS (Kurt Klingbeil)
----------------------------------------------------------------------------
From: jkantola@paju.oulu.fi (Jussi Kantola)
Subject: Spline
Date: 10 Oct 1994 15:33:16 GMT
In our DECStation, there's a program called spline that interpolates
smooth curves... now, my roommate says it is part of System IV.
It seems like this is program is associated with something called 'graph'.
Anyway, given these very poor hints, could someone direct me to the
source of this program? I'd like it running in my linux box (so the
linux binary will do just as well).
Answers in email please, I don't read the newsgroup.
--
email: Jussi.Kantola@Oulu.Fi (Jussi Kantola) IRC: jute
Nobody passes the test of time
------------------------------
From: cgori@isengard.stanford.edu (Christopher Gori)
Subject: Re: Bug in Linux 'mv'?
Date: 10 Oct 1994 11:34:29 GMT
(fox@graphics.cs.nyu.edu (David Fox)) wrote:
>In article <1994Oct6.232625.625@spectre.apana.org.au> rjl@spectre.apana.org.au (Richard Lindner) writes:
>
>] : cp doesn't copy symlinks. If you want a completely messed up file tree, go
>] ^^^^^^^^^^^^^^^^^^^^^^^^^
>] hmm - could've fooled me (and cp - better tell it that it's getting it wrong!!)
>
>Well, There's GNU cp and "Unix" cp. If you need to use cp
>in a script or an alias, or you frequently find yourself
>sitting in front of different types of unix boxes, you may
>not want to assume that the cp -a option exists, better to
>stick to tar.
Thanks - I guess I didn't really read the man page for GNU cp very
thoroughly. Raised on Sun's - you use tar not cp, for the reason I gave.
(no symlinks copy)
I guess the cp -a is OK, but as David says - don't expect it to always
work portably. I'd like to know if that's what the person who said
"tar is safer" meant - or if there is something else I'm not catching.
Sorry for any confusion.
Chris Gori
cgori@isengard.stanford.edu
------------------------------
Crossposted-To: comp.os.linux.development,comp.os.linux.help
Subject: Re: strange lockups, bizarre networking...
From: STEVO@acad.ursinus.edu (Steve Kneizys)
Date: 10 Oct 94 11:26:37 EST
Rob Newberry (rob@eats.com) wrote:
: As was posted several days ago, my machine is one of those which has been
: having strange lockups the past weeks. Basically, when I upgraded from 1.1.10
: to 1.1.45 (and now 1.1.50), my system will occasionally hang hard. A
: power-reset is the only thing to bring it back.
[stuff deleted]
: Finally, one more bit of information. Often times the hangs are preceded by
: periods of sluggish network performance. My telnet logins to the machine will
: simply sit there as I type commands, then eventually they'll work.
: Also, tonight something VERY strange happened. My Linux machine stopped
: responding to my LAN, so I ran "arp -a". Only two machines were listed, but
: both had a hardware address of 00:00:00:00:00:00.
[more stuff deleted]
Some people notice, including me, that ARP did not seems to start up correctly
on these .45+ kernels. I had to put in a PING to another machine on my site
to get ARP jump-started in my rc.local ... very strange.
Steve...
------------------------------
From: mea@utu.fi (Matti Aarnio)
Subject: Re: Why doesn't ftp work??
Date: Mon, 10 Oct 1994 19:19:42 GMT
tom@metronet.com (Tom Griffing) writes:
>The title says it ... Why doesn't ftp work?
>
>It work from a remote machine with the anonymous user id,
>but won't work from any other id. I've modified the
>files /etc/ftpusers and /etc/ftpaccess, but am certainly
>missing something ... seems like defining a class with
>"real" in the typelist doesn't work.
>
>Can anybody offer any soultions?
You may have a version which uses /etc/shadow
for the passwords -- or which doesn't, and all
other systems use it..
If your /etc/passwd has crypted passwords (12 chars)
in the second field, then your system doesn't use
shadow-passwords, and your ftpd should neither.
(Yes, it did bite me..)
>--
> _____________________________________________________
>| Thomas L. Griffing | |
>| tom@metronet.com | (214) 352-3441 |
>|__________________________|__________________________|
/Matti Aarnio <mea@utu.fi>
------------------------------
From: dc3i@fermi.clas.Virginia.EDU (Diane L. Calleson)
Subject: Re: SLIP w/Dynamic IP Addresses
Date: Mon, 10 Oct 1994 23:27:44 GMT
HELP!!!! I have tried and tried but still NO luck!
Whenever I try to start up DIP dipscript or DIP -t I get:
(none): HOst lookup failure
Interestingly enough the (none) part is also in my prompt.
The default profile has PS1= \h:\s or something.... what is this '\h'
supposed to be?
I have read lots of other peoples posts who have also had this "hostname
lookup failure " error and I tried implementing some of the suggested
fixes to no avail.... I still get the same problem.
The NAG isn't much help either..... it really doesn't address STANDALONE DIP.
What do you do if you don't have a TCPIP network in your home and simply
want to use SLIP to get to a DYNAMIC slip server..... I have /etc/hosts
with:
127.0.0.1 localhost
127.0.0.1 calleson.virginia.edu calleson
128.143.2.7 nameserver
I have all of the nameservers in my resolv.conf
My understanding about the dynamic slip is that DIP will go ahead and let
you connect then it will let you set up the routes and default etc....
Please help me!!!!!
--
Diane L. Calleson calleson@virginia.edu
Computer Systems Administrator
UVA Dept. of Economics-Rouss Hall B12 UVA Dept.of Mathematics-MAB 127
924-3539 924-3774
------------------------------
From: joshp@panix.com (Josh N. Pritikin)
Subject: Clock freq. for WD90C30??
Date: 10 Oct 1994 19:38:03 -0400
Does anyone have the clock frequencies for the WD90C30 (actually
WD90C24)? I tried X -probeonly and I get this, which is wrong:
(**) SVGA: chipset: wd90c30
(--) SVGA: videoram: 512k
(--) SVGA: clocks: 28.26 28.32 28.27 28.26 28.27 28.27 28.30 28.27
(--) SVGA: clocks: 28.27 28.26 28.27 28.28 28.26 28.27 28.27 28.31
(--) SVGA: clocks: 44.29
(--) SVGA: Maximum allowed dot-clock: 90.000 MHz
(--) SVGA: There is no defined dot-clock matching mode "640x480"
Any suggestions? Thanks!
--
joshp@panix.com
------------------------------
From: aeb@cwi.nl (Andries Brouwer)
Subject: Re: catman in linux
Date: Mon, 10 Oct 1994 23:21:03 GMT
hoang1@litwin.com (Ted Hoang) writes:
>Does linux use catman?
Linux is an operating system, not a manual pager.
But there are several manual pagers around that will use,
say, /usr/man/cat1, to save a formatted version of
/usr/man/man1, provided that such a directory exists.
------------------------------
From: collieb@iia.org (Bob Collie)
Subject: Re: [help] user cannot update password
Date: 6 Oct 1994 17:50:29 GMT
Andrew_R._Mitz (arm@helix.nih.gov) wrote:
: In case this is of some value, running ls -l to see /etc gives:
: drwxr-xr-x 10 root root [stuff deleted] etc/
In this case, the values for the /etc directory are not as important as
the values for the passwd program. From the root user, you chould do a
chown root.root passwd and then make sure that it is set with s [SUID]
value. You can correct this by using chmod +s passwd.
Let me know if this helps,
Bob Collie
collieb@iia.org
: Any suggestions?
: -- andy
: --
: ----------------------------------------------------------------------------
: Andrew Mitz, Biomedical Eng., National Institutes | Opinions are mine alone
: of Health Animal Center, Poolesville, MD | arm@helix.nih.gov
: ----------------------------------------------------------------------------
------------------------------
From: bigfoot@pentagon.io.com (Bigfoot)
Subject: Re: Ftape works...Not yet
Date: 10 Oct 1994 20:25:09 -0500
I could not compile ftape1.13b under Linux 1.1.52. Anybody knows if I have
to apply some kind of patch to ftape 1.13b, to be able to compile it ?
------------------------------
From: damien@b63519.student.cwru.edu (Damien P. Neil)
Subject: Re: Security hole - has noone noticed so far?
Date: 8 Oct 1994 06:04:16 GMT
In article <LEE.94Oct7223327@netspace.students.brown.edu>,
Lee Silverman <lee@netspace.students.brown.edu> wrote:
>There's a good one! A sendmail bug was just reported a few months
>ago, adding yet another to the DOZENS of bugs reported about sendmail.
Sendmail is used on a very, very large number of machines, however. When
a bug is found, it gets fixed. The large user base means that bugs are
discovered faster, as well.
Incidentally, anyone have a history of Linux bug reports? :>
Any system of any real size has bugs.
>Sendmail (The standard one,
>anyway, 8.6.9) arguably the single hardest unix package to configure
>correctly.
I really don't think so. Maybe if you decide to write a sendmail.cf from
scratch. I can't comment on v5 sendmail (never used it), but v8's .cf
generation scripts make setting sendmail up an almost completely painless
process. I was able to compile and install sendmail from scratch in a
few hours. The one time I tried to install smail from scratch, I spend an
entire day wading through the manpage, trying to figure out which
configuration file affects which other configuration file.
Of course, you can use a canned configuration for smail. (The current
one supplied with Slackware appears to contain a major security hole,
as has been pointed out.) You can do the same for sendmail. I have
a sendmail.cf that should work for just about any machine using only
SMTP to deliver mail, with no funny tricks. Funny tricks are possible,
but mean you need to modify the configuration file.
>Smail is a damn good program, and I use it all the time.
I used smail for a while, because everyone told me sendmail was impossibly
difficult to set up and configure. Now that I've tried sendmail, I'm never
going to go back.
>I am going to check out Zmailer 2.97, but in the meantime, for ease
>and understandability, and for security reasons, I'm going to stick to
>smail rather than risk using sendmail.
For reasons including security and ease of use, I'm going to stick with
v8 sendmail.
The fact that I can easily gain root access on any machine running a
current version of smail does not make me especially enthralled with the
security of it. It is quite possible that a similar bug lurks in sendmail.
However, I'd rather stick with a proven, mature product.
Of course, to each his own. If smail does what you want, by all means
use it. However, sendmail is not the bug-ridden, horrendously difficult
security hole that you paint it as.
- Damien
------------------------------
From: tony@teleport.com (Tony Schwartz)
Subject: Linux box as Router ??
Date: Fri, 7 Oct 1994 22:41:44
I seemed to have missed the thread that was going a few weeks ago about using
a Linux system as a router. If there are any FAQs or other info, please pass
it my way.
I would love to hear from someone who has used a Linux system as their router.
My company is considering doing it for flexibility, cost, etc. Is it a good
idea???
Tony Schwartz
Transport Logic
Portland OR
------------------------------
From: tony@teleport.com (Tony Schwartz)
Subject: WANTED: Contract Person for Linux - Routers
Date: Fri, 7 Oct 1994 22:43:51
If anyone has some experience in setting Linux up as a router, I would be
interested in talking with them. If interested, we might want to contract
with that person to get a system setup and operational (router portion).
Please reply by email if interested.
Tony Schwartz
Transport Logic
Portland, OR
tony@teleport.com
(Not related to teleport. Only a client)
------------------------------
From: danpop@cernapo.cern.ch (Dan Pop)
Subject: Re: XFree86-3.1 - Whoopee!
Date: Mon, 10 Oct 1994 17:05:30 GMT
In <CxGBIA.3o7@info.swan.ac.uk> iialan@iifeak.swan.ac.uk (Alan Cox) writes:
>In article <36p94u$ltd@interport.net> carlos@interport.net (Carlos Dominguez) writes:
>>Will fvwm and its modules work in Xfree3.11?
>
>I can't get any of openlook or fvwm to work. I'm inclined to think this is
>probably X11R6 incompatibilities with these packages rather than bugs. So
>until they appear fixed I shall stay with 2.1.1.
>
The X11R5 fvwm does work with the Xfree3.1 servers if you still have
the X11R5 libraries installed. I've tested it on my laptop with the
VGA256 and VGA2 servers.
Dan
--
Dan Pop
CERN, CN Division
Email: danpop@cernapo.cern.ch
Mail: CERN - PPE, Bat. 31 R-004, CH-1211 Geneve 23, Switzerland
------------------------------
From: sinkr@universe.digex.net (Robert Sink)
Subject: Re: Where to find acct for 1.1.49+?
Date: 10 Oct 1994 11:32:51 -0400
andrewp@itwhy.bhp.com.au (Andrew PRUSEK) writes:
>Some time ago I had the address for the ftp site that had the process
>accounting patch for kernel above 1.1.18.
>As you may have guessed I have lost this address and therefore am now
>begging for someone to enlighten me as to where I might find this.
>I have looked in the regular places but have come up empty handed.
Good luck -- I have looked hard as well to no avail. I don't understand
why it isn't incorporated into the kernel distribution; it is a
'standard' UNIX feature.
And comprehensive ICMP support would be nice, too.. But that's in
a whole 'nother realm.
--
-------------------------------------------------------------------------
|:| Robert Sink | "I don't want to start any blasphemous |:|
|:| sinkr@universe.digex.net | rumors, but I think that GOD has a sick |:|
|:|--------------------------| sense of humor and when I die I expect |:|
|:| (c) 1994 Gurkware, Inc. | to find him laughing." -- Depeche Mode |:|
-------------------------------------------------------------------------
*PGP 2.6 Public Key Available By Fingering This Account*
*or via the PGP Server: pgp-public-keys@pgp.mit.edu*
------------------------------
From: becker@cesdis.gsfc.nasa.gov (Donald Becker)
Subject: Re: eth0: Inf. loop in interrupt, sometimes, with a 3c509
Date: 5 Oct 1994 15:51:00 -0400
In article <TAO.94Sep29114201@neuromancer.lib.uchicago.edu>,
Tod Olson <tao@neuromancer.lib.uchicago.edu> wrote:
>I'm stumped on this and hoping that one of you kind souls on the net
>has a few words of wisdom to share about this problem. Please reply
>by email, as this is probably not of general interest.
>
>I've got an AST Power Premium 4/33 (486, 33MHz, EISA) with a 3Com
>3c509 card, and an Adaptek 1510A SCSI card with a Hitachi CDR-6750 CD
>drive hanging off of it. I'm running Linux 1.1.0 from the Yggsdrasil
>Summer 1994 CD.
>
>The Problem: networking is unreliable, and I don't know whether to
>blame the card, the software, my config files, or the phase of the
>moon.
>
>The Symptoms: Sometimes I boot, log in, and have perfect network
>access. Sometime I boot, log in and any network access (eg. ping or
>telnet) will cause the following to loop infinitely on the screen:
>
> eth0: Infinite loop in interrupt, status 2013
This is bad. It probably means the processor couldn't keep up with removing
packets from the 3c509. About the only way this could happen is if you had
some really slow or processor-intensive device. BTW, I assume you have the
card switched to EISA mode, right? That should speed up transfers to the
3c509.
>and I have to do a hardware reset. Sometimes I boot, log in, and my
>first one or two attempts at network access will generate one of the
>following two messages:
>
> eth0: Missed interrupt, status then 2013 now 2013 Tx 00 Rx 3a1c
>or
> eth0: transmit timed out, tx_status 00 status 2002
This is a known problem with warm boots -- the interrupt isn't reset. Fixed
in the driver for 1.1.52.
>Also, syslogd sometimes spews messages like the following until I
>reboot; I've noticed no correlation between syslogd's spewage and the
>above eth0 messages:
>
>Sep 29 06:22:25 test-tod routed[32]: adding route to net/host 192.217.215.0 through gateway 192.217.215.0: Network is unreachable
Are you running 'routed'? Don't.
--
Donald Becker becker@cesdis.gsfc.nasa.gov
USRA-CESDIS, Center of Excellence in Space Data and Information Sciences.
Code 930.5, Goddard Space Flight Center, Greenbelt, MD. 20771
301-286-0882 http://cesdis.gsfc.nasa.gov/pub/people/becker/whoiam.html
------------------------------
From: mkshenk@u.washington.edu (M. K. Shenk)
Subject: Re: Please don't post security holess...
Date: 11 Oct 1994 01:19:24 GMT
In article <37c7kn$auc@hermes.sibylline.com>,
Patrick D. Ashmore <pda@procyon.com> wrote:
>M. K. Shenk (mkshenk@u.washington.edu) wrote:
>
>
>> Oh, criminals. Give me a break. The criminals are the ones that mess with
>> things.
>
>So, someone who breaks into your house/apartment, looks around, and then
>leaves is okay, and not a criminal?
>
Oh, my. I didn't expect this argument. I am suddenly enlightened.
How facile. In the strict denotative sense: someone who breaks the law. Yes
they are a criminal. However, most people are unable to think of a criminal
as someone who simply has broken the law. They have to be able to think
other bad things about the person. It's the law. A set of rules enforced
(notice the word force in enforced) by a dominant group holding a
geographical area by force. Nothing magical or holy about it. In the
best cases it is pragmatic. And that is a good thing.
NOTE: first time of many. A dwelling space is not a computer system.
Make of this what you will. It is simply a fact. Inferences are yours.
>
>That's not the point. If security is breached in any way, sensitive
>information, etc. may be at risk.
>
*may* be at risk. National security *may* be at risk. May is different from
is. That is *a* point. There are many points. Ooh, *sensitive information*
I think you should have used the phrase "could be comprimised" there.
It sounds more official and governmental.
>> I got in, to get in, or to use a compiler. Nothing criminal about
>> that (except in the eyes of the law.)
(note here I meant criminal in the sense most people have to think about
criminals...my error in being vague.)
>
>Someone breaks into your house, wanders around, then makes a few phone
>calls... Now, tell me... is there anything criminal about that? (He got
>in to get in, or to use the telephone.)
>
Criminal in the strict "against the law" sense. Lack of flexibility denotes
a weak mind. Along with the tendency to fight an opponents worst possible
meaning rather than a better one. Yes, it is criminal, in its denotative
sense. Criminal in my mind? No. If I can be sure he did nothing else
and put nobody at risk--I can't be. I said myself I wouldn't like it
from an admin's pt of view. But ( a stretch of the imagination here, but
go for it...) are you capable of imagining a situation in which this
could happen that you'd be ok with, knowing nothing else happened? It
all pretty much has to do with expectations--you don't mind folks looking
through the glass at the contents of your car (tho not too closely, because
this might make you think they wanted to break in) because you expect that.
You know not to leave anything you don't want seen there. Your house,
different--your personal dwelling space, and animals invest this with a lot
of weight..you expect to be able to do what you like without being
watched, be safe, leave what you like around. Do you expect these exact
things with a computer system? Some of them, if it is a personal system.
But it's not a dwelling space, and it can be very easily argued (of course,
antyhing can be easily argued by most folks) that infringements on a
virtual space, a computer system, should not be treated as seriously as
those on a dwelling space. It does not need to be argued that these are
sigificantly different things.
The big one: no physical danger. This is why humans have and have had such
a strong reaction to burglars and trespassers in the past.
Also: often no "breaking" occurs in situation 2. Can you differentiate
a physical space from a virtual one? Sometimes I think the GUI is a bad
thing...
It is entirely possible to want to fight dogmatic views even when one
is on the same side. I don't want anybody crawling around inside my system.
I never said I did. I merely said that responses to this sort of thing can
be way off the scale.
>> Penetrating the security of a
>> computer system is totally harmless in and of itself.
>
>This is your opinion, and you would probably find that 99% of
>administrators will disagree with you.
>
No. This is a true statement. READ. "In and of itself." Meaning--when
the system says "Password:" and I say "Susan" and I hang up, this is
totally harmless IN AND OF ITSELF. If 99% of admins disagree, well, then
99% of admins can't think straight. I did not say "just getting in and
not doing anything." I said "penetrating the security" and "in and of
itself." True statement. A password is not a door. A computer is not
a house. Anyone who can not get his mind away from standard ideas long
enough to give the issue a thorough turning-over without preconceptions
has a weak one. I'm not on the side of system crackers. I am against the
side of dogma, even when it seems to do good. Even when people like it.
It's still dogma, and evidence of a lapse of critical thought.
>> It's the defacing
>> of what one finds, or the spreading of info that are the problems, and
>> have made folks so paranoid they 'throw the book' at anybody who pokes
>> around a little. Hey, I'm gonna see where I can go.
>
>Where do you draw the line? If someone breaks in, and I know who it is,
>I'm not going to simply "bounce them off" and forget about it. I'm going
>to make sure this person doesn't get the chance to do it again or worse.
>
"Where do you draw the line?" My, you are so insightful, Socrates. You
draw it where you draw it. Dependant on the situation. Like a flexible
human and not a mousetrap. What you are responding to is an imagined
threat, not necessarily a real one. You don't know that they will do
"worse." How about telling them you know who they are and that they're
not welcome? This would've worked every time on me in HS. You jump
to the extreme not necessarily out of prudence, but some sort of
viciousness. It's ok for admins to keep people out, but do it like
a balanced human being and not a rabid dog. Why go to extremes when less
will do? Have they personally offended you by getting into your
system? Have you allowed animal territorial instincts to extend to
a computer system? Is it even yours? (i.e. are you someone's watchdog?
you don't even own the system, but the owners count on your territorial
instinct to keep their system safe?) Lighten up. Do your job, but
"throwing the book" at someone is usually an act of viciousness, a small
one. If they make it necessary, sure. Try to think about these
people as possibly just curious human beings, rather than having to
make them something nasty in your head by imagining what they *might*
do. You've got a job to do. Do it. But when I see admins actually brought
down to animal viciousness by something like this, it is truly pathetic.
>
>Breaking into and poking around is bad enough, and I don't consider it
>"pathetic and fascist." I consider it secure. (Relatively secure, that
>is... if you want a truly secure machine, turn the power off, put it in a
>safe, and bury it in 6 feet of concrete.)
>
Do you have need to be secure? (this is just a question. I'll make
a statement when that is what I mean to do.) Are there "trade secrets"
"sensitive info" etc? Do you back up your system? How "mission
critical" is your system (I hate that cliche.) Ever try a login
warning message that sounds like it is from a real person and not out
of a law book or "throw-the-book-at-them-speak?" I think often sysadmins
respond in a territorial way when "their" system is compromised. Most
systems have very little need of security. I think a lot of it is just
very self-important. (I know I'll catch flack here..)
>> Depends on how ingenious their attempts to enter a system are. This is a
>> dogmatic view. "Hacker" and "non-malicious-system-tourist" are not non-
>> intersecting sets. Back in HS i performed entries that qualified as
>> hacks.
>
>"Hacker" is not malicious at all... I would consider myself somewhat of a
>hacker. You're looking for the word "cracker." (I believe someone pointed
>the definitions out... check the jargon300.txt.gz at a GNU site.)
No. I'm not. Read. I was stating: "the sets of 1> people who are hackers
in its original sense and 2> people who have bypassed security on a system at
some point are NOT DISJOINT SETS."
"You believe someone pointed the definitions out.." No shit, eh? It was in
the post I was responding directly to. That exact paragraph, in fact, is
responding to it. You're really paying attention. Inform thyself before
you start arguing.
I am well aware of what each of the terms means. Don't tell me what I mean.
Ask. Now I suggest you go back and read the entire original response,
reading only what is there. With your mind and not your emotions. Don't
read what you want to. Read what is there.
I avoided the word "Cracker" because most folks are not logical beings and
the word has emotional baggage and may imply more than I meant. many
people append "+smasher" on to the end of "cracker." I was trying to
avoid that, and hopefully allow people to see that someone who secussfully
logs in to an account that is not his, or finds he is able to get root, is
not a bad guy. You may throw the book at him if you like, it is the
mental tricks you have to do to do it that disgust me. Not your actions,
but muddy thinking.
>
>Now "Cracker" and "non-malicious-system-tourist" are the same, IMO, if
>the "tourist" got in by bypassing system security.
>
As long as you are not appending "smasher" to "cracker."
>> Barring that, I might still poke around. Curiosity is not a crime.
>
>No, but breaking and entering is. Trespassing is. What is the difference
>whaehter they are breaking into your house and looking around, or
>breaking into your machine and looking around?
>
What is the difference? Well, you just stated it. One is breaking into your
house, one into your system. If you can't see a difference, you are
blind. They are different acts. One is the act of (usually) destroying
some locking mechanism to enter the physical dwelling space of one or more
people, usually with the intent of leaving with valuable objects. Very
few burglars enter w/curiosity in mind. The other is the pressing of
various buttons in such a way that one is allowed to enter the virtual
space of a computer system. No one "lives" there. No one is going to
get shot by this burglar. And his reason is often mere curiosity. He will
not leave with physical objects, but info. That info will also still be
there if he didn't wreck it. There, many differences. If the only thing
you are able to do when faced with new situations is draw (bad) parallels
to old situations and act mechanically, you are less than human.
Note--above, did I make value judgements on either act? No. I stated
facts. Don't assume anything. I don't care about which is 'worse' or
relative badness. I care about the fact that you asked "what is the
difference?" between two discrete acts. That is frightening.
Now go look up "devil's advocate" -- I'm not saying I want intruders in
my system or yours--I am saying that there is a lot of dogma and bad thinking
going on, and you can oppose something without losing mental integrity to
do so.
Now, go back and read every word. Don't skip up to something that triggers
an emotional response and respond. Read every word.
------------------------------
From: kurtk@ee.ualberta.ca (Kurt Klingbeil)
Subject: Solaris secondary DNS can't suck zones from Linux primary DNS
Date: 6 Oct 1994 07:21:57 GMT
I expect that it's YASB (yet another solaris bug), but would like some
insight as to how to debug/workaround the problem.
We're using Linux as a primary NS for our subdomain. Everything
checks out functionally, with doc, and with dnswalk. Problem is that
the SOlaris NS which serves as primary to our parent domain, and
secondary to our subdomain, can't suck the fwd and rev zones from our
primary.
All the other parallel subdomain NS's happen to be Solarii as well.
I vaguely remember something about Sun doing some non-standard
optimizations, but the other end insists that we're the cause of
the problem.
ANy ideas ?
thx, kk
------------------------------
** FOR YOUR REFERENCE **
The service address, to which questions about the list itself and requests
to be added to or deleted from it should be directed, is:
Internet: Linux-Admin-Request@NEWS-DIGESTS.MIT.EDU
You can send mail to the entire list (and comp.os.linux.admin) via:
Internet: Linux-Admin@NEWS-DIGESTS.MIT.EDU
Linux may be obtained via one of these FTP sites:
nic.funet.fi pub/OS/Linux
tsx-11.mit.edu pub/linux
sunsite.unc.edu pub/Linux
End of Linux-Admin Digest
******************************