|
CCL News
IPv6 Support |
20110106 |
Services are now being presented over IPv6 in addition to our existing IPv4
connectivity. See the new Your IP Address section in the sidebar for
an indication of the address from which we see your browser connecting.
|
Dropping Legacy Domains |
20071108 |
The k4d4th.org and srmud.net domains have not had their registration
renewed as of October. If anyone is interested in taking them over, I can renew
and transfer them to you until Discount Domain Registry/OpenSRS/Tucows Inc.
decides to return them to the available pool.
|
Replacement E-mail Server |
20060529 |
The new E-mail server, dagon.yuggoth.org, is a User-Mode Linux guest
virtual server. Note that the SMTP/TLS, IMAPS and POP3S certificates are
now signed by CA Cert (cacert.org), so you may see errors or warnings from
your E-mail client upon connecting for the first time. You may also have to
clear old cached ceritficates if your client does not handle this change
gracefully. The new dagon mounts its /home via NFS from azathoth, and will
will additionally be made available as symlinks from homedirs on cthulhu.
|
Replacement Shell Server |
20050623 |
The new shell server, cthulhu.yuggoth.org, is a User-Mode Linux guest
virtual server. The old shell server has been replaced with considerably more
stable/redundant hardware to act as a shared host for multiple UML guests. Home
directories are served from the host server via NFS and have been copied intact
from the old shell server. When you connect, you will notice the server has a
new RSA key fingerprint (48:c8:11:c2:96:31:57:5e:2a:9f:31:1b:fc:20:4b:f7).
Delete the old key from your client's ~/.ssh/known_hosts first, if necessary.
|
Weekend Maintenance |
20030801 |
Just a note that we're cleaning and reorganizing the lab. The build farm is
going to be offline all weekend and there will be intermittent outages as
equipment is relocated between racks. We'll also be replacing our NAT, which
will definitely result in an IPA change making everything unavailable for a
while. I'll upload a snapshot of the rig once maintenance concludes.
|
E-mail, Humor and Debian Buildservers |
20030602 |
We finally caved. For now, any E-mail outbound to aol.com or netscape.com users
is being routed through our ISP's MTA. Still suggest to your AOL/Netscape
friends that they consider switching to a less fascist ISP or at least start
using a free Webmail account somewhere.
A fun joke about Ashcroft and the USA Patriot Act has been added to the Geek
Humor repository (patriot.txt).
We now have Debian/sid buildservers with woody chroots for the following
ports/architectures: i386, m68k, sparc and mipsel. We also have hardware lined
up for alpha, mips, hppa, hurd-i386, netbsd-i386, netbsd-alpha, and
freebsd-i386. If anyone needs a development account one one or more of these or
has a source package that needs to be built/tested, please let us know.
|
No More E-Mail to AOL |
20030423 |
America On-Line, in an effort to curb SPAM, has ceased accepting SMTP
connections from residential IP addresses. If you need to E-mail an AOL
subscriber, suggest to them that they switch ISPs or get a free Webmail account
from a less fascist company. You will likely see bounces like this:
SMTP error from remote mailer after initial connection: host
mailin-01.mx.aol.com [152.163.224.26]: 550-The IP address you are using to
connect to AOL is... a dynamic (residential) IP address. AOL cannot accept
further e-mail transactions from your server until... your ISP removes your IP
address from their list of dynamic IP addresses.
Hopefully enough AOL subscribers will complain about missed E-mail messages
that this policy will be relaxed in the near future.
|
Webmail is Back |
20030421 |
It's been over a year, but I finally got around to setting up a new Webmail system with SquirrelMail. Members, use your normal
E-mail username and password to log in and give it a whirl. Let me know if you find any problems.
|
Mailserver Down for Upgrade |
20021005 |
After roughly a week of random crashes, it looks like azathoth's problem was
most likely overheating SDRAM. Even though it was registered ECC and showed no
signs of trouble during POST, replacement seems to have eliminated the
segfaults and kernel panics. Tonight I will be taking dagon down from 0100-0600
GMT both to upgrade it onto faster hardware and migrate data off a failing IDE
drive (replacing it with Ultra-2 SCSI). Expect periodic disconnects and
timeouts from mail-related services as the maintenance proceeds.
|
Unexpected Outage |
20020923 |
Due to an unforseen hardware failure, azathoth crashed around 1600 GMT. We are
recovering now but do not expect to have the server back on line until 0000 GMT
or later. No user data was lost but some operating system config files have to
be restored from tape. In the meantime, ssh has been redirected to dagon, the
mailserver, to give users a way to check their mail and get to the webserver.
|
New Shell Server |
20020827 |
The new drive array has finally been installed. The last vestiges of RedHat are
finally off the network, replaced by Debian. I've imported everyone's homedirs
and passwords, so the change should be transparent to most aside from the new
host key. When SSHing in for the first time, you'll need to remove the old key
from where ever your client stores it and verify the new key's fingerprint
matches 2a:7d:3c:e5:8c:5c:38:98:3e:b1:cd:91:2b:00:e1:4e. As this is a fresh
installation, it is likely there are some tools, docs, games, et cetera you are
used to running that no longer exist. I've tried to get the major ones already,
but if you're missing anything just E-mail root and I'll take care of it as
quickly as possible.
|
Planned Outage for Upgrades |
20020823 |
We have a slew of pending hardware upgrades coming this weekend, which will
result in sporadic service outages for the next few days. I was going to
publish a detailed outage plan, but hey, this is my hobby after all. Shouldn't
I be able to enjoy playing things by ear? It's more fun. I have to follow plans
at work, so instead I'm going on pure intuition, kung-foo and cheap beer. I
will post here again when the updates are completed.
|
More IRCS and CircleMUD |
20020623 |
A bitchx-ssl package finally made it into the official Debian repositories, so
I have removed mine. The official packages default to unencrypted connections
to the OPN servers, so to connect back here with them you'll need to
bitchx -s irc.yuggoth.org 994 from now on.
And with the passing of one project another springs forth to take its place. A
Debian package set for CircleMUD has
been added to the CCL unofficial Debian repository. Have fun, expect frequent
package updates, report bugs, not responsible if it corrupts your immortal soul,
et cetera.
|
IRCS Update |
20020320 |
The Debian Sid packages for bitchx-dev-ssl, bitchx-gtk-ssl, bitchx-ssl and
ircii-pana-ssl have been re-vamped and moved into an unofficial repository. You
can either add the following lines to your /etc/apt/sources.list:
- deb http://www.yuggoth.org/debian-CCL unstable unofficial
- deb-src http://www.yuggoth.org/debian-CCL unstable unofficial
...or download them (binary-i386: HTTPS|HTTP|FTP, source: HTTPS|HTTP|FTP). If you're
paranoid enough to be using these for IRCS then you should be paranoid enough
to grab my source package and diff it against the official one. I can't
promise it's bug-free, but it works flawlessly for me and my friends and it's
rarely more than a couple days behind whatever's in Sid. The only modification
I've made to the original source is to enable specifying SSL as a 6th field in
the server string: bitchx server:port::::ssl
That hack only touches a handful of lines in server.c and one in server.h, but
again I suggest you examine it yourself if you want to use it. Should allow
mixing of IRC and IRCS servers in a single list. If you have any comments,
questions or suggestions you can find fungi in #ccl on
irc.yuggoth.org:994::::ssl or irc.yuggoth.org:6667 most
of the time.
On a related note, thanks to B¦Z¤ñZ for a well-written mIRC SSL for
Windows Tutorial.
|
SSL-Secured Anonymous IRC |
20011022 |
Over the past week we've been working the kinks out of our new IRC server
running the Open Projects Network ircd variant. Additions we've made are an
SSL tunnel on the ircs port (994/tcp) thanks to stunnel and some hostname
spoofing configs to effectively anonymize the client IPA/hostname from other
users.
One problem that results from anonymization is an obvious inability to ensure
someone is who they claim to be. To help with this, regular users are
encouraged to register with our nickserv (/msg nickserv register
PASSWORD) and set it to kick (/msg nickserv set kill on)
anyone who uses that nick without authorization (/msg nickserv identify
PASSWORD).
Note that the password for your nick will travel unencrypted over the Internet
if you don't connect with an SSL-enabled IRC client. For UNIX users we
recommend BitchX 1.0c18 configured --with-ssl (requires OpenSSL libraries).
Since this can be hard to accomplish on older distributions like RedHat 6.2, a
generous user has provided us with custom-compiled binary RPMs (available in
/pub/irc/).
For Windows users many have had luck using the client mIRC with our modified
version of the suidnet stunnel wrapper module (also available with instructions
in /pub/irc/). Of course, an SSL wrapper will work just fine on either Windows
or UNIX as well. For example, stunnel -c -d 6667 -r
irc.yuggoth.org:994 will establish an encrypted tunnel with stunnel to
which you can connect your IRC client by specifying a server address of
127.0.0.1 or localhost.
We can't vouch for the effectiveness of any of these programs and are not
responsible if they do nasty things to your computer. Buyer beware, you get
what you pay for, and all that jazz. If you need help or have other questions
E-mail us or jump on #ccl and ask!
|
63-Hour Webserver Outage |
20010930 |
Well, libc6-2.2.4-2 brought us a lot of headache when it caused ithaqua to hang
a little after 1100GMT Thursday. Then after a reboot, apache-ssl kept
segfaulting on startup. A couple of Debian reinstalls, a hard drive replacement
and a full tape restore later, nothing had improved. Close inspection of the
Debian buglist revealed a libc6 update from early last week as the culprit and
now Web services have been restored. Our apologies to anyone this may have
inconvenienced. Mirrors should be re-synced by sometime tomorrow. If you notice
anything out of the ordinary please let us know!
|
Cyber Civil Disobedience |
20010926 |
Mirrors of the Cypherpunks FTP archive, Jon Johansen's DeCSS, Tim May's
Cyphernomicon, Cartome and Cryptome have been added under pub/crypto for those
interested. If anyone has other resources they think should be mirrored, let
us know. These are, as always, available via FTP, HTTP and HTTPS.
|
New Focus |
20010917 |
In light of last week's events we are battening down the hatches and
preparing for the coming storm. Now more than ever, inevitable
anti-anonymity, anti-crypto, anti-stego regulations are being discussed
by our "elected" officials under the guise of homefront defense. You can
already view most of our Web site content SSL-encrypted and we'll soon
be setting up a renegade certificate authority to vouch for our own
certs and those of anyone else who wants one signed. We'll offer SSL/TLS
versions of most of our current services (Telnet, SMTP, DNS, HTTP, POP3,
NNTP, IMAP, IRC) as well as general IPSec ESP and AH. Plans are also
underway for an anonymizing HTTPS proxy and an anonymous remailer.
Strong cryptography, steganography, anonymity and security auditing
tools are not a threat to the people of the USA. They are merely a
threat to those who would try to control our words and actions for their
own personal gain. Technological tyranny is still tyranny and no
revolution was ever won without a fight.
|
More Web Site Enhancement |
20010415 |
A few remaining bugs were rooted out and squished... A conflict between
mod_layout and mod_ssl encouraged us to just go with straight PHP for
layout. A new semi-virtual domain txt.yuggoth.org gets rendered without
the fancy formatting and, with a splash of browser detection, we're now
highly Lynx friendly as well! If anyone has any suggestions, send them our
way.
|
Web Site Rewritten |
20010407 |
Just a quick note... Over the past week our main site has been rewritten,
replacing the SSI calls and BASH CGI scripts with PHP. Additionally, the
sidebars have been redone to be modular and utilize mod_layout. Many bugs
were fixed (the Java SSH client works again) and a lot of other cleanup
work was done behind the scenes.
|
New Apache Modules |
20010331 |
After several brief outages in www service and 14 hours of recompiling
over the past week, httpd
on shub-niggurath has been enhanced (Apache 1.3.19) with many useful
modules. A few highlights...
mod_ssl: Now any URLs in the form https://www.yuggoth.org/* will be
served up via SSL/TLS. Both DSA and RSA keys have been enabled for added
flexibility and security. This doesn't work for virtual domains
(https://something-else.yuggoth.org/*) but will still work for userdir
URLs (https://www.yuggoth.org/~username/*). This was implemented in
preparation for IMP and CyberCalendar, since I wanted members
to be able to pass their authentication in an encrypted session.
The certificates are "Snake Oil" signed right now and will be for a few weeks
while I get a CA going here. Until then, you can ignore any warnings
your browser might throw up--the session is still encrypted, you just can't
be sure the server is who it claims to be.
mod_layout: A great tool for enforcing a consistent look and feel
throughout your site, this module 'wraps' each affected page with
any HTML of your choosing. The way it's configured, your easiest route
to implemenation will be via .ht files. An example resides in
shub-niggurath:~apache/html/.htaccess telling the server to insert
header.php after the <body *> tag in each file within that folder and
footer.php before each </body>. The CCL site will soon be redesigned
to use mod_layout throughout, so you'll have a good example from which
to start.
mod_php4: A very robust and industry standard server-side scripting
language, its capabilities are far too numerous to mention here. MySQL
has been added to enable PHP integration with a stable database backend.
This is a popular and exceptionally powerful combination, and was also
a prerequisite for IMP (part of the GNU Horde and our future replacement
for Webmail).
The above are just a subset of the new features that have been added. For
a full list, on shub-niggurath run '/usr/local/apache/bin/httpd -l'
and consult each module's home page for usage instructions. If
you're interested in how the server is configured,
'less /etc/httpd/conf/httpd.conf' for more detail.
|
New Web/FTP Server |
20010326 |
Web and FTP services have been migrated to shub-niggurath for increased
efficiency and security. Members with web pages will note that from
azathoth 'ssh shub-niggurath' will log you in (your www root is in
~/public_html just as before) and 'scp filenames shub-niggurath:' will
copy files to the new server. If you still need to ftp to azathoth from
outside, 'ftp yuggoth.org 2021' should work, but only in active mode. Note
that scp/ssh from outside still goes to azathoth by default.
And for added convenience, 'ssh -pPORT USERNAME@yuggoth.org' from outside
will log you onto various hosts where USERNAME is your username and PORT
corresponds to the server to which you wish to connect: azathoth=2022,
shub-niggurath=2122 (more as they move into production in coming weeks).
Please let me know if you have questions or you notice anything wrong!
|
Password Generator |
20010325 |
I've decided to put a random password generator script I wrote onto
ftp.yuggoth.org for any who care to play with it:
http://ftp.yuggoth.org/pub/linux/applications/pwgen
It's also installed as /usr/bin/pwgen on azathoth, dagon, hastur and
shub-niggurath for quick access when changing passwords. It can
generate seven types of passwords (including dictionary-based) with
any length desired. For instructions, 'head -n20 /usr/bin/pwgen' and
hopefully you can follow my notes. It's not the most efficient
password generator out there nor the most robust, but it's written
entirely in bash2 and is under 2.4KB, half of which is commentary and
indentation.
Some have questioned the strength of the RAND function I use in pwgen,
so I ran some quick stats. Over 94000 character picks (of 94 printable
characters so the target would be precisely 1000 picks per character),
the maximum variance was 9.2% and the average variance was 2.4%. This
means there was a character with slightly less than a 0.1% chance of
being picked less often than the others. I consider this to be
suitable for random password generation, even if it's not perfect.
If anyone wants to see some other password types added or finds a bug
(including obvious inefficiency in the algorithm) please let me know!
|
CCL Website Gets Facelift |
20010316 |
We've updated http://www.yuggoth.org/ccl.html adding, among
other things, a weblog for our news updates. If you want to
continue getting these updates by E-mail, respond to this
message (we'll get around to setting up an ezmlm discussion
group for it eventually). For the rest, the newest message
will always show on http://www.yuggoth.org/ccl.html and all
previous entries will be housed in
http://www.yuggoth.org/news.html for historical purposes.
If you notice any errors or want to suggest additions, let
us know.
|
BIND 9 and New DNS Servers |
20010312 |
On Saturday (20010310) I replaced named on azathoth with
two instances, one on shub-niggurath and another on dagon.
I used 9.1.1rc3 and configured them for split zones so the
proper IPAs are served to internal hosts and external hosts
alike. In doing so, I set up shub-niggurath as a silent
master to ns[12].granitecanyon.com and ns[15].zoneedit.com
so that I can make updates locally for external zones. All
this was driven by centralinfo.com's decision to stop
supporting free DNS services, requiring me to change
provider. I decided using two different free services would
increase our reliability but would be unwieldy if not
centrally managed, thus the current solution. If anyone
notices any problems, please report them immediately.
|
Azathoth Is Now A Free NTP Tertiary |
20010310 |
Last Sunday (20010304) I configured xntpd on azathoth to
synchronize with clock1.unc.edu and set the rest of
yuggoth.org to sync to azathoth. I have forwarded 123/tcp
and 123/udp inward from the NAT to allow anyone who wants
to sync with us via NTP to do so. And if you just want to
check the time, 'telnet ntp.yuggoth.org daytime' to get a
human-readable string in EST/EDT.
According to the USNO's convenient Web site
(http://www.usno.navy.mil/cgi-bin/millennium/TimeCheck.pl),
hastur (my workstation syncing to azathoth) claims to be
less than a second off from the atomic clocks (you have to
reload a few times to get an accurate result).
|
New Backup System |
20010107 |
This weekend I've replaced my custom-hacked tar script with
afbackup (http://www.muc.de/~af/software.html), a robust
and efficient open-source client/server backup system. The
benefits over our old system are as follows:
- slightly more reliable
- completes full cycle far more quickly
- spans entire network (not just azathoth anymore)
- users can restore their own files (man
/usr/local/afbackup/client/man/man8/afrestore.8)
Instead of daily full backups, we're generating weekly
fulls (0400EST Sunday) and daily incrementals (0400EST
Monday-Saturday). As soon as I'm satisfied with
performance, I'm probably going to switch that to monthly
fulls, daily differentials and hourly incrementals instead.
This change was necessary to acommodate migrating essential
services (www, ftp, mail) from azathoth to dagon and
shub-niggurath. I needed a reliable backup of all hosts on
our network and this package was the best fit. Once I'm
happy with stability and have finished load testing, I will
transfer all pertinent user files (~/public_html) and
officially point www and ftp at shub-niggurath (hopefully
some time later this week).
Let me know if you have any problems...
|
Outage Concluded |
20001229 |
The first reboot of cyaegha resulted in one very dead HDD.
Three hours later and I've rebuilt it on a slightly smaller
(425MB instead of 512MB) drive. On the up side, careful
fsck'ing, substitution of alternate superblocks and a
little disk tipping means that I was able to copy over my
old apps and configs with minimal hassle. And thanks to
Dante and Jon, physical RAM has doubled from 16MB to 32MB
in the past two weeks.
All this was precipitated by my interest in adding Snort,
an open-source intrusion detection system
(http://www.snort.org), which I have been testing for the
past week and will post progress notes on soon.
|
Intermittent Outages 20001228 (tonight) |
20001228 |
Tonight I will be testing replacement RAM for cyaegha,
whose reboots will result in several brief connectivity
outages between now (2130EST) and midnight EST. The chance
of a new IPA being issued is slim, but present. If you get
disconnected simply retry in a few minutes. I will send an
update once the testing has completed.
|
Service Outage 200012190012-1128EST |
20001219 |
Time Warner was dinking with our cable service starting at
midnight last night. Cable was basically unwatchable, but I
didn't think to check the network connection until I awoke
this morning. Because the DHCP server changed before time
for lease renewal (we were moved to a different IP block
entirely), dhclient on cyaegha started getting confused:
dhclient: DHCPREQUEST on fxp0 to 24.93.67.64 port 67
dhclient: send_request/send_packet: No route to host
I'm unsure as to why it never reattempted a DHCP broadcast
request. A manual restart of the outside interface would
likely have fixed the problem, however, I took advantage of
the situation to add a much needed 8MB of RAM to cyaegha,
bringing it up to a total of 24MB (it was dipping about
5-6MB into swap before, so more would be welcome if anyone
has another two 8MB or larger FP or EDO 72-pin SIMMs
collecting dust somewhere so I could get it up to a cool
32MB or more).
As mentioned before, our externally resolvable IPA was
moved from the 24.0.0.0/8 Class A block (24.162.224.133) to
the 66.0.0.0/8 block (66.26.48.151). DNS records for
yuggoth.org and k4d4th.org were updated immediately and
should be resolving correctly most places by now (I keep
short timeouts for instances such as this). I also updated
azathoth:/etc/ftpaccess to use cyaegha's new external IPA
for passive FTP negotiation. I can't think of anything else
I haven't automated that still has to change, but if
something's not working I likely overlooked a config file
somewhere. Please let me know immediately if anything isn't
functioning the way it used to.
For the moment everything has been tested and appears to be
working. Any mail deliveries attempted in the past 12 hours
could possibly be delayed for as much as another 12-24
hours, but current mail is arriving again. On a related
note, if anyone with a static IPA wants to offer secondary
MX for our domains, let me know. As soon as I can add DSL
here, I'll be doing redundant MX (and NS again finally)
myself.
And as always, if there's any service not offered here that
you're interested in, let me know. I have quite a few
additions planned (IRC, NNTP, better webmail interface, et
cetera), but I'm waiting until I can migrate SMTP/IMAP/POP
to dagon and HTTP/HTTPS/FTP/webmail to shub-niggurath so
that I can overhaul azathoth completely. I've already built
the machines and installed their OSes, and I'm likely to be
getting around to moving services while I'm on vacation
this week.
One service that has been added, however, is SSH2 protocol
support with DSA key auth for anyone who's interested. Just
ssh-keygen -d on each end and use the -v option with ssh to
at least be sure you can see it using DSA instead of RSA,
just as a confirmation. Requires OpenSSH 2.3 or any other
client that supports SSH2/DSA.
|
Maintenance Window Concluded |
20001202 |
The installation went fairly well. Since cyaegha normally
has no floppy drive, it took me a while of playing in the
BIOS config to figure out what all I had turned off to get
the thing to boot properly, turn it all back on and get a
loose floppy drive working. Then, it turns out 2.8 had a
bit of trouble with my SIS brand 1MB PCI VGA, quickly
remedied by the section in INSTALL.i386 entitled "SPECIAL
CARE FOR PCI BIOS."
A default installation ensued. I selected "y" when asked if
I wanted to use the entire drive for OpenBSD (it's only a
512MB IDE model, so there's no room for anything else
anyway). I kept the following partition table:
wd0a 64MB /
wd0b 64MB swap
wd0d 256MB /usr
wd0e 64MB /var
wd0f 32MB /tmp
wd0g 32MB /home
I did an FTP install from azathoth, choosing no X support
and adding the comp28.tgz component. The entire
installation took roughly 20 minutes on a slow P100/16MB
machine. Quick config to turn on IPF and NAT, addition of a
normal user account, installation of bash2 and portsentry,
a reboot and all was completed within 30 minutes. Of
course, only time will tell if the increased stability
claims are warranted...
Let me know immediately if any of you experience any
problems!
|
Scheduled outage 0800-1000EST |
20001201 |
A complete service outage will occur tomorrow, Saturday,
20001202 from 1200-1400GMT (0800-1000EST) to facilitate an
upgrade. Since I will be reinstalling hastur with OpenBSD
2.8 from a local FTP mirror and the current configuration
files will be copied back on with no appreciable changes, I
expect the outage to actually be far shorter than 2 hours.
There is a chance that hastur's IPA will change from
24.162.224.133 to something else in 24.162.224.0/23 (though
I am doing everything in my power to reduce this chance as
much as possible). In this event, I will change the
appropriate DNS records at centralinfo.net to reflect the
correct address immediately. Should this happen, remember
to allow for your DNS cache timeout which could linger
slightly beyond the scheduled outage window.
|
OpenBSD 2.8 |
20001130 |
Just in case anyone wants it, I have made available an i386
install mirror of OpenBSD 2.8 (thanks to the magic of
rsync) on ftp in /pub/OpenBSD/2.8
|
Outage on 11/21 |
20001122 |
Many of you may have noticed a service outage statring
sometime before midnight and stretching until 1530EST on
Tuesday. This was due to a system crash on cyaegha (our
network gateway)... the third crash since it was installed
a couple of months ago. As far as I can tell this is a
known issue with OpenBSD 2.7 and a patch to fix it does
exist, but since it's fixed in 2.8 I'm going to see if we
can weather it for another week. I'm planning a scheduled
outage in the morning a week from this Saturday,
200012021300-200012021500 or so [GMT], to upgrade cyaegha
to OpenBSD 2.8 final. Also note that OpenBSD 2.8 will be
mirrored on ftp.yuggoth.org starting sometime on 12/01 at
which point the 2.7 mirror will be dismantled to conserve
space. Of course, all this is dependent on the OpenBSD Dev
Team holding fast to their release schedule. More to come.
|
New Domain Name Announcement |
20001102 |
Some of you may have noticed several brief outages this
morning between 9am and noon EST. We've added a new domain,
yuggoth.org, which is synonymous and interchangeable with
k4d4th.org in every way. Default outbound E-mail addresses
for most console-based mail clients will show as
username@yuggoth.org unless otherwise configured by you.
Anyone who needs help with this, just let me know. All the
old E-mail addresses and URLs will still work fine, so
you're welcome to use whichever you prefer.
|
OpenOffice 6.0 and Mozilla M18 mirrored |
20001013 |
I have the i386 glibc Linux installation files for
OpenOffice (formerly Sun StarOffice) 6.0 and Mozilla
(Netscape Development) Milestone 18 mirrored at
ftp in /pub/linux/applications for those of
you who may be having trouble getting to the official
sites.
|
Proactive IDS Added |
20001010 |
I've added an intrusion detection system to c143g4 (the new
firewall) which has, as it's primary purpose, the ability
to block all network access from outside hosts suspected of
performing vulnerability scans. The upshot of this is that
if you attempt to connect to one of the trigger ports, all
subsequent connections from your machine will be blocked.
I'll get an E-mail and investigate pretty quickly, so if
one of you accidentally sets it off I can fix things
easily. The trigger ports to avoid are as follows:
TCP: 1, 7, 9, 11, 15, 70, 111, 138, 139, 512, 513, 514,
515, 540, 635, 1080, 1524, 2000, 2001, 4000, 4001, 5742,
6000, 6001, 30303, 32771, 32772, 32773, 32774, 31337,
40421, 40425, 49724, 54320
...and:
UDP: 1, 7, 9, 66, 67, 68, 69, 111, 137, 138, 161, 162, 474,
513, 517, 518, 635, 640, 641, 666, 700, 2049, 32770, 32771,
32772, 32773, 32774, 31337, 54321
If you think you may accidentally have blocked yourself
from access for any reason, you can E-mail me at work since
attempting to send mail to my address here will inevitably
time out.
|
Passive FTP working again |
20001009 |
I set wuFTPd to use passive ports 15000-15099 and
redirected these from the firewall. I've tested it from my
office and everything is working fine, but this will limit
ftp.k4d4th.org to 100 concurrent passive transfers (though
the number of actives is still unbound).
As a side note, the online connectivity logs have been
taken down for now. Since 4z4th0th is no longer plugged
directly into the internet these logs would not be
accurate. And once we have separate www and mail servers,
these logs would also be nearly useless. I'll probably be
putting up a NetSaint monitoring page shortly (looks a lot
like What's Up Gold for those of you who are familiar with
it) which is much better in the eyecandy department and
also much more flexible for connectivity/host monitoring
anyway...
Let me know if anything else looks broken!
|
Outage last Thu/Fri (10/5-6) |
20001007 |
Due to a clerical oversight on our part, our electricity
lapsed for a 24-hour period between roughly noon on
Thursday (200010051200EDT) and noon on Friday. We took
advantage of this outage to install an OpenBSD-based NAT
and firewall. This step was necessary as we plan to soon
spin www and mail off onto their own servers. Everything
appears to be working now, except for inbound passive mode
FTP. (For those of you who understand the difference
between passive and active FTP, no explanation is
necessary; for the rest, none is possible.) The upshot of
this is that FTP from most web browsers to our servers will
no longer work correctly. Most robust FTP clients should
have no problem with this however (particularly since they
all tend to default to active anyway). If anyone notices
anything that used to function but no longer does, please
let me know. Additionally, any requests/suggestions will be
more than welcome.
|
Webmail |
20000608 |
I may move Webmail services below port 6000, since the
borderguard at Foveon allows inbound from ports up to 5999
but not from 6000 and over (fairly typical from what I
understand). The link on /ccl.shtml will be updated
accordingly when that happens... Soon, however, I'm going
to install Imp from the GNU Horde, which looks more
functional than Webmail anyway. Then users will have a
choice, at least until I decide to stop supporting Webmail
and make all the stragglers move to Imp. Heh.
|
NetHack 3.3 |
20000323 |
For those interested in what has for years been called the
most addictive waste of time ever, NetHack 3.3 has been
installed and tested recently on 4z4th0th. There is a
sample configuration file in
/usr/games/lib/nethackdir/dot.nethackrc
and the heavily modified one I use is copied there as
/usr/games/lib/nethackdir/.nethackrc
which has things set up the way I usually like them (for
example, using the number pad 12346789 rather than bjnhlyku
for movement, though on my laptop I have to switch back--no
number pad with my keyboard). Just copy it into your $HOME,
pico .nethackrc until you have the settings you think you
want, and then just run
/usr/games/nethack
and follow the prompts. ? will pull up the help and / will
help you identify what's on the screen. There is a brief
manpage-style doc
/usr/games/lib/nethackdir/nethack.txt
which has brief syntax listings for the command-line
options (which are really not particularly necessary unless
you hate editing .nethackrc) and the Guidebook is available
as
/usr/games/lib/nethackdir/Guidebook.txt
though it is also available within the game from the ?
screen. Have fun.
|
|