The Journal of AUUG Inc.minnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V21.3.pdf · go figure!2...

40
The Journal of AUUG Inc. Volume 21 ¯ Number 3 September 2000 Features: Images from AUUG2K 6 5 points for running an Installfest 11 Revamping the BSD multiprocessor code 12 Images from the LinuxSA Installfest 14 Fragments from the Usenix Security Symposium 20 News: Upcoming AUUG Events Draft AUUG AGM Minutes Chapter News: Victoria 9 28 31 Regulars: My Home Network The Open Source Lucky Dip Unix Traps and Tricks 23 26 33 ISSN 1035-7521 Print post approved by Australia Post - PP2391500002

Transcript of The Journal of AUUG Inc.minnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V21.3.pdf · go figure!2...

Page 1: The Journal of AUUG Inc.minnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V21.3.pdf · go figure!2 However the firewall did allow SSH through - good, a nice secure protocol for secure

The Journal of AUUG Inc.

Volume 21 ¯ Number 3September 2000

Features:

Images from AUUG2K 65 points for running an Installfest 11Revamping the BSD multiprocessor code12Images from the LinuxSA Installfest 14Fragments from the Usenix Security

Symposium 20

News:

Upcoming AUUG EventsDraft AUUG AGM MinutesChapter News: Victoria

92831

Regulars:

My Home NetworkThe Open Source Lucky DipUnix Traps and Tricks

232633

ISSN 1035-7521 Print post approved by Australia Post - PP2391500002

Page 2: The Journal of AUUG Inc.minnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V21.3.pdf · go figure!2 However the firewall did allow SSH through - good, a nice secure protocol for secure
Page 3: The Journal of AUUG Inc.minnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V21.3.pdf · go figure!2 However the firewall did allow SSH through - good, a nice secure protocol for secure

AUUG Membership andGeneral CorrespondenceThe AUUG SecretaryPO Box 366Kensington NSW 2033Telephone: 02 8824 9511or 1800 625 655 (Toll-Free)Facsimile: 02 8824 9522Emaih [email protected]

AUUG Management CommitteeEmaih auugctee@auug,org.au

President=David [email protected] e-commerce solutionsThe Tea HouseLevel 1, 28 Clarendon StreetSouth Melbourne VIC 3205

Vice-President=Malcolm [email protected] uNorthern Territory UniversityCasuarina CampusDarwin NT 0909

Secretary=Michael [email protected] Ltd245 Racecourse RoadFlemington VIC 3031

Treasurer=Lulgi [email protected] Box 51North Perth WA 6906

Committee Members=Sarah [email protected] of South AustraliaSchool of Computer and InformationScienceRoom F2-65,Mawson Lakes Campus SA 5095

Alan [email protected]

Greg [email protected] Inc.PO Box 460Echunga SA 5153

Peter GrayPeter.Gray@a uug.org.a uInformation Technology ServicesUniversity of WollongongWollongong NSW 2522

David NewallDavid~Newall@a uug.org.auTellurian Pty Ltd.272 Prospect RoadProspect SA 5082

AUUG Business IVlanagerElizabeth [email protected] Box 366Kensington NSW 2033

EditorialG0nther [email protected]

It had to happen eventually. It is with (some) sadness that I write mylast Editorial. This will be my last issue of AUUGN as Editor.

Increasingly over the last 12 months, I have struggled with puttingAUUGN together, due to more and more external commitments, andfinally I realised earlier this year, that I just didn’t have the timeanymore. It was time to concede that I couldn’t keep this up.

But, standing in the wings, willing to take the helm was Con Zymaris,our "Open Source Lucky Dip" Sub-Editor, who will be taking over fromthe next issue.

I’d like to say thanks to all of my Sub-Editors (Past and Present) for alltheir help. I’ve been at the helm since late 1996, and I’ve had thechance to meet and work with a great group of people.

To all of you who contributed, and dropped me a note with thoughtsand ideas, thank you!

Bye, and best wishes ..

Thanks to ourSponsors:

i

AUREMA

1 - September 2000

Page 4: The Journal of AUUG Inc.minnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V21.3.pdf · go figure!2 However the firewall did allow SSH through - good, a nice secure protocol for secure

Book ReviewsSub-Editor wanted:

Our resident Book Reviews Sub-Editor, Mark Neely,will be stepping down from his current position

due to other commitments.

If you are interested in coordinating the BookReviews for AUUGN, then this is a wonderful

opportunity to join the AUUGN Editorial team.

Drop us a note at:

[email protected]

Contribution Deadlinesfor AUUGN in 2000/2001Volume 21 ¯ Number 4 - November 2000:

Volume 22 ¯ Number 1 - March 2001’

Volume 22 ¯ Number 2 - June 2001:

Volume 22 ¯ Number 3 -August 2001:

October 17~, 2000

February 17~, 2001

May 17~, 2001

July 17~, 2001

AUUGN Editorial Committee

The AUUGN Editorial Committee can bereached by sending email to:

[email protected]

Or to the following address:AUUGN EditorPO Box 366Kensington NSW 2033

Editor:GOnther Feuereisen

Sub-Editors:Frank CrawfordMark NeelyJerry VochtelooCon Zymaris

Public Relations and Marketing:Elizabeth Carroll

AUUGN Submission Guidelines

Submission guidelines for AUUGNcontributions can be obtained from theAUUG World Wide Web site at:

www.auug.org.au

Alternately, send email to the abovecorrespondence address, requesting acopy.

AUUGN Back Issues

A variety of back issues of AUUGN are stillavailable. For price and availability pleasecontact the AUUG Secretariat, or write to:

AUUG Inc.Back Issues DepartmentPO Box 366Kensington NSW 2033

Conference Proceedings

A limited number of copies of theConference Proceedings from previousAUUG Conferences are still available.Contact the AUUG Secretariat for details.

Mailing Lists

Enquiries regarding the purchase of theAUUGN mailing list should be directed tothe AUUG Secretariat.

Disclaimer

Opinions expressed by the authors andreviewers are not necessarily those ofAUUG Inc., its Journal, or its editorialcommittee.

Copyright Information

Copyright © 2000 AUUG Inc.

All rights reserved.

AUUGN is the journal of AUUG Inc., anorganisation with the aim of promotingknowledge and understanding of OpenSystems, including, but not restricted to,the UNIX® operating system, userinterfaces, graphics, networking,programming and developmentenvironments and related standards.

Copyright without fee is permitted,provided that copies are made withoutmodification, and are not made ordistributed for commercial advantage.

AUUGN Vol.21 ¯ No.3 - 2 -

Page 5: The Journal of AUUG Inc.minnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V21.3.pdf · go figure!2 However the firewall did allow SSH through - good, a nice secure protocol for secure

President’s ColumnDavid [email protected]

security (si-’kyur-&-tE), noun, 1. thequality or state of being secure: as (a)freedom from danger (b) freedom from fearor anxiety (c) freedom from the prospect ofbeing laid off (job security) -Merriam-Webster’s College Dictionary

I will be writingl about security, but as this is aPresident’s Column I will not be giving you anew procedure for locking hackers out of yoursystem, but rather talking about ideas,approaches and responsibilities, with a fewpertinent examples.

But I want to start by making a bold statement:

The Personal Computer was the worst thingto happen to computing.In the good old days it took heaps of trainingbefore you could use a computer - chances werethat you could not use one at all unless you hadbuilt it yourself. Computers were only used bythose who understood them and were qualifiedto use them.

But Personal Computing means that any idiotcan use computers. There are books devoted tothe idiots who use computers. This means that"ease of use" becomes a priority, and this leadsus to any number of pitfalls - but I shall returnto this theme...

Let’s look at an example, which I have borrowedfrom New Scientist.

The year is 2005, and Feed The World, Inc.,release their latest genetically engineered grain.It will grow in any soil, it reseeds itself, and isresistant to 90% of known pests. We can grow~ itin the deserts of Africa and no one need starveagain.

It also has one other feature - as we learn aboutthe genes that resist the other 10% of pests,Feed The World, Inc. can modify the grain’s DNAby releasing a virus into the crop.

How soon will it be before we discover that notonly can Feed The World, Inc. modify the DNA,but natural viruses can as well? How longbefore malicious viruses from competing geneticlabs are released? How long before we haveprotests in the streets (a lgt Montreal) andGreenpeace is breaking down the doors at FeedThe World, Inc.?

The point is that we do not accept this behaviourin our food - so why do we accept it in ourcomputer operating systems?

1 This column is a transcript of the footnote talkgiven by David Purdue at AUUG2K.

The answer is ease of use. If all I know aboutmy computer is that there is a problem, and Iam not a geek, then I want it fixed as easily aspossible. So I point my browser at the Microsoftweb site and automatically download and applya patch. In fact I was offered an Office 2000patch that way while I was preparing thiscolumn.

So we can see, and I think we have allexperienced, that there is a trade off betweenconvenience and security. Trivial example: it iseasier to log in when you have a null password.We are also seeing that there is a trade-offbetween features and security. New features aremore marketable than bug fixes, but newfeatures also imply a larger code base and hencea harder job of establishing and maintainingsecurity. But the market demands morefeatures - as a marketer, I must keep up!

Viruses only exist because programmabledevices communicate. In the beginning thatcommunication was the exchange of floppydisks. Now it is the instantaneous exchange ofemail via the Internet.

Guess what! Increasingly we find that more tohave features implies making a deviceprogrammable.

Take the next generation of mobile phones.They will provide more and more genericcommunications functions. To speed time tomarket, and to ensure new features can beadded in the field, they are programmable.

Could we see a "Melissa" or "I LOVE YOU" formobiles - one that arrives on your phone theninstantly sends itself via SMS message or emailto everyone in your address book? The phonemakers say that this is an unlikely scenario, butour experience is that if an attack can happen itwill happen.

What about the humble Palm Pilot? I boughtone recently and it is a great tool - but everytime I talk to a fellow Palm owner they say, "Hey,let me beam you this great piece of softwarel"Surely this is a mechanism for viruspropagation.

As an aside - the IS department of onemultinational sent a message to all employeesalong the lines, ’"I’here is a virus that will arrivein a message with the subject, ’I love you.’ If yousee such a message please assume that nobodyloves you and delete it immediately."

Scott McNealy stood up at Java One this yearand pointed out to the assembled masses that"Melissa" and "I LOVE YOU" are not Internetviruses, they are Microsoft Outlook viruses. Fairenough.

But he went on to assert that if only we all usedJava we would be immune from such viruses.

- 3 - September 2000

Page 6: The Journal of AUUG Inc.minnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V21.3.pdf · go figure!2 However the firewall did allow SSH through - good, a nice secure protocol for secure

Well, I’m sorry, Scott, but it’s not that simple -the Java Virtual Machine is a programmabledevice with network access, and so thepossibility exists for a virus to be written. Andmaybe the Java security model means that thisvirus can not harm your data, but it couldcertainly cause a denial of service attack, and inthese days of electronic commerce that can costyou just as much.

One final note on viruses - Microsoft released anOutlook patch that stops "Melissa" and :I LOVEYOU" cold. It blocks attachments of certaintypes (.bat, .exe, .vbs - it blocks based onextension rather than content), it stopsprograms accessing the address book and blocksscripting. According to a report in NetworkWorld, the user community hated the patchbecause it removed functionality and removedconvenience!

Let’s turn our attention to the universal Internetsecurity panacea - the firewall. If we lookcarefully, we will see that they don’t always dowhat we think they do.

On Sunday (at the AUUG2K tutorials) I sat downwith someone who had hooked his laptop to theANU network and had come up against the ANUfirewall pplicy. The policy prevented thedownload of software (executables, even gzipfiles) and apparently images (GIF, JPEG) couldonly be downloaded during library open hours -go figure!2

However the firewall did allow SSH through -good, a nice secure protocol for secure access tosecure systems. But if you use the SSH magicproperly you can encapsulate other protocols,and one thing you can encapsulate is PPPoE.Now all bets are off: PPP over SSH from laptop tofriendly machine outside the firewall, a bit ofrouting magic and you can run any protocol youlike from the laptop to the Internet with nofiltering.

So - it is obvious that the ANU firewall operatorsare kittens, they are weak. I am the BastardOperator From Hell, and all my firewall allows isvalid HTML passed over HTTP - because forsome strange reason the staff and studentsinsist on using the web. They think it some sortof research tool.

A few days later, my logs show this conversation:

Client browser (student linux box) to web server

2 One of the ANU network engineers whoattended this talk pointed out that the "firewall"was just a router that ensured HTTP traffic wentthrough a proxy, and that the "image duringlibrary hours" policy was motivated by the desireto reduce network costs by avoiding largedownloads that incur volume charges. I contendthat any set of devices that attempts to enforce anetwork policy is a firewall, that this firewall wasenforcing a financial rather than a securitypolicy, and that it failed to do so.

(somewhere on the net):

GET login%3A%20

Server to client:

Content-Type:text/html<HTML><HEAD><TITLE>A Hack</TITLE></HEAD><BODY><P>root</P></BODY></HTML>

Client to server:

GET Password%3A%20Serverto client:

Content-Type:text/html<HTML><HEAD><TITLE>A Hack</TITLE></HEAD><BODY><P>3blindmice</P></BODY></HTML>

Client to server:

GET Welcome%20to%20my%20 machine.%0aThis looks something like the client offering theHTTP server a remote login.

How could this happen?

Well, just point your browser tohttp://www.disgruntled-employee.org and wewill send you the software, which will connectback to http://hack.disgruntled-employee.org.Sure the firewall maintainer can make this verydifficult - he can block cookies and ensure thehttp connection is dropped after each request,so there is no state preserved betweentransactions. But this means that legitimateusers of theweb are going to have worseperformance and are not going to be able toreach sites they may want to look at.

Is this too far fetched? Well the powers that bewant to make it even easier.

A new protocol called SOAP (Simple ObjectAccess Protocol) is in the W3C standards track.SOAP is a system independent remote procedurecall mechanism that represents objects as XMLand passes them back and forth over HTTP. Asthe nice folks at Microsoft say, "Currentlydevelopers struggle to make their distributedapplications work across the Internet whenfirewalls get in the way... Since SOAP relied onHTTP as the transport mechanism, and mostfirewalls allow HTTP to pass through, you’ll haveno problem invoking SOAP endpoints from eitherside of a firewall."

One final illustration - where do we place ormisplace trust? I am one of about two million

AUUGN Vol.21 ¯ No.3 - 4 -

Page 7: The Journal of AUUG Inc.minnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V21.3.pdf · go figure!2 However the firewall did allow SSH through - good, a nice secure protocol for secure

people who run SETI at home. This is a piece ofsoftware you download that uses the idle timeon your CPU to analyse signals from spacelooking for E.T. phoning home. The combinedmight of all those CPU’s mean that the projecteffectively has access to a 14 TeraFLOPsupercomputer -that is 14 million millionoperations per second. But am I reallysearching for E.T.? To preserve the scientificintegrity of the project you can only run anofficial binary that you download from Berkeley,and they do not give access to source. So, as faras I know, I could be cracking RSA keys for theNSA. But hey, man, these guys are fromBerkeley, they wouldn’t do that to us!

So where does that leave us? The conclusion isthat there are no security absolutes. All we haveis risk mitigation - if I want to do this thing Imust accept that these other things may

happen. If I want to be part of society, I mustaccept that not every member of society is a niceas I am.

As IT professionals we have a lot ofresponsibility - we must educate our users onbenefits vs. risk in what they do, and we mustensure that our applications allow users tomake sensible and informed benefit vs. riskdecisions. I recognise that this is a tremendouschallenge.

Am I saying we should all be security experts?No, but we do need to be security aware and weneed to know our own limitations. If you needhelp, ask for it.

Tellurian Pty LtdCome to us if you need seriously capable people to help with yourcomputer systems, We’re very good at what we do.

¯ Unix, Macintosh and Windows experts

¯ Legacy system re-engineering and integration

¯ System management and support

¯ Internet access

Our two current major projects:

¯ Support and development of an integrated environment coveringapplications running on IBM3090, DEC Alpha, SCO Unix and Nortelswitches, Just imagine the cost benefits of supporting over 500concurrent users on four little 486 and Pentium PCs,

¯ From the ground-up implementation of MFC and Windows API on AppleMacintosh. We’ve got our client’s Windows MFC application running,bug-for-bug, on Apple Macintosh.

Tellurian Pty Ltd (08) 8408 9600272 Prospect Road www.tellurian.com.auProspect SA 5082 [email protected]

- 5 - September 2000

Page 8: The Journal of AUUG Inc.minnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V21.3.pdf · go figure!2 However the firewall did allow SSH through - good, a nice secure protocol for secure

Images fromAUUG2KPhotos: David [email protected]: Elizabeth [email protected]

Liz Carroll with our sponsors fromBorland - Cocktail evening

Greg Rose demonstrates how to balance a glass ofwine while standing on a balloon?!!!

Adrian and Susie Close show off thelatest in hair accessories!

.... John Terpstra, Turbolinux- delivers ....his keynote presentation

"The Panel" - Anthony Rumble with the Linux Panel

AUUGN Vol.21 * No.3 - 6 -

Page 9: The Journal of AUUG Inc.minnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V21.3.pdf · go figure!2 However the firewall did allow SSH through - good, a nice secure protocol for secure

Michael Paddon - gets into the Conference spirit

Mark White and Andrew McRaeunwind at the Conference Dinner

Liz Carroll, Lawrie Brown and Michael Lightfoot checkout the wine offerings at the Conference Dinner

Another packet wings it’s way acrossthe Conference Dinner

Andrew Tridgell, with one too many Red Hats

7 - September 2000

Page 10: The Journal of AUUG Inc.minnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V21.3.pdf · go figure!2 However the firewall did allow SSH through - good, a nice secure protocol for secure

Euan Pryde - the Birthday Boy - celebratesat the Conference Dinner

..

Peter Gray shows us how a "Red Hat" red hatshould be worn.

David Purdue (Auctioneer for the night!) - withLinuxcare, the new owners of the

’Unix Sacred Objects’

Our Linuxcare team check out their purchase!

Michael Paddon, eSec, enlightens us on"The Art of Keeping Secrets"

The Linux Penguin oversees our sponsorsfrom Borland Inprise

’The Panel’- Part II - headed up by David Purdue

AUUGN Vol.21 ¯ No.3 - 8 -

Page 11: The Journal of AUUG Inc.minnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V21.3.pdf · go figure!2 However the firewall did allow SSH through - good, a nice secure protocol for secure

Upco ingAUUG Events

SECURITY SYMPOSIUM

The AUUG Security Symposium will be held inMelbourne on:

3 November 2000

The purpose of this event is to exchange ideason the improvement of the security for thesystems and networks we manage.

AOSS2

The second Australian Open Source Symposiumwill be held in Adelaide on:

25 November 2000

The purpose of this event is to bring together theAustralian Open Source community on anannual basis.

÷ ÷

AUUG2001

Our annual conference will be held next year inSydney, back in its traditionalSeptembertimeslot:

23-28 September 2001

SPONSORSHIP OPPORTUNITIES:

If you are interested in sponsoring any of theseevents, please contact the AUUG BusinessManager, Elizabeth Carroll on:

Telephone: 02 8824 9511or 1800 625 655 (Toll-Free)

or by email: busmgr@auug, org. au

r ansu//."

ersource~.~OrViC~_,~ ACN: 053 904 082

Cybersource has been a Professional Services consultancy,specialising in the areas of Unix, Windows and TCP/IP since1991. Cybersource also offers accredited, professional-gradesupport for Red Hat Linux and other open source (free) software.Therefore, the last ’valid’ reason for not taking advantage ofgreat software like Perl, Linux, SAMBA and Apache has justdisappeared. Organisations can benefit from the robustness,flexibility and value of open source software, and know theyhave an experienced team of IT professionals available toprovide commercial-level support, when needed.

Contact us for full details.

Telephone:URL:Emaih

03 9642 5997http://www.cyber.com.au/info @ cyber.com.au

- 9 - September 2000

Page 12: The Journal of AUUG Inc.minnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V21.3.pdf · go figure!2 However the firewall did allow SSH through - good, a nice secure protocol for secure

JOIN THE

JOIN CLUB O’REILLY. BUY 50’REILLY BOOKS,AN[GET A FREE BOOKTOTHEVALUE OF UPTO $50.

OR BUY I0 BOOKS FOR A FREE BOOK VALUEDAT UP TO $100.

If your card is missing, please e-ma:Woodslane ([email protected]) treceive your Club O’Reilly member card

Just collect 10 stampshere and keepyour receipts

Ring Woodslane customerservice foy your nearestClub O’Reilly store

1800 803 443I~lolo] ~1,1 !:! ~ I :~

O’Reilly publications are distributed throughoutAustralia and New Zealand byWoodslane,

Page 13: The Journal of AUUG Inc.minnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V21.3.pdf · go figure!2 However the firewall did allow SSH through - good, a nice secure protocol for secure

5 points for runningan InstallfestSarah [email protected]&Richard [email protected]

{ Editor’s Note: recently LinuxSA held a LinuxInstallfest, where local LUG members got togetherto help new Linux users install and configure Linux.Here follows the definitive guide to running anInstallfest in your local area. ]

1. ORGANISATION

¯ Plan ahead¯ Consider legal issues and insurance¯ Have a queuing/registration system for

installeesHave a method of allocating IP addresses andnetwork information

¯ Provide a means of identifyinginstallers/helpers eg. T-Shirts

¯ Have a way of matching installers toinstallees, some installations may requirespecial skills or knowledge.

¯ Make sure that the helpers know what isgoing on

¯ Have a whiteboard or three -- an area whereany problems and people needing help arelisted, an area where helpers can list theirspecial skills

¯ Large numbers of labels, and a well-known (tohelpers) labeling systemSECURITY! A way of ensuring people leavewith what they brought, nothing more andnothing less.

¯ Figure out in advance, a way of dealing withswarms of people

2. VENUE

¯ Lots of space¯ Power outlets¯ Tables, benches¯ Parking facilities¯ Space to store equipment¯ Convenient location for lugging equipment¯ A quiet area for people giving talks

3. TIME

¯ Carefully consider the timing of the event toensure optimum attendance numbers

¯ Allow enough time for installations

This can be an issue -- you really need to have apolicy on what will and won’t be done.., it is quitepossible to spend three days setting up a Linux

system and teaching newbies how to use it... youreally want to get new systems to a state wherethey can connect to the Internet, and then tellpeople to subscribe to the mailing list. Otherwisepeople stay forever...

¯ Plan the date in advance so that you haveenough time to advertise the event and venue,allow 2 weeks.Make sure t-shirts, posters, website, andwhatever other publicity material is ready...Contact the press at least a week before.

4. PEOPLE

¯ Helpers, installers, techies� Presenters and people giving talks¯ Non techies, someoneto person

registration desk¯ Installees¯ A security person/team

the

You need to have a roster of sorts, andinstructions on how to do these jobs...instructions are particularly important, becauseyou don’t want to have to explain things ten

,times.., it’s also important to rotate people arounda bit so they don’t get bored...

5. EQUIPMENT

¯ Power boards, extension cables, you can’thave too many.., label them all though!

¯ Hubs, network cables¯ Whiteboards, whiteboard markers,normal

markers, pens and paper¯ Duct tape, masking tape, string¯ Coffee, tea, sugar, milk, mugs, teaspoons¯ Demo computers¯ Floppies, blank and boot floppies¯ Linux/BSD CD’s¯ Labels¯ Clue stick (for delegating "CLUE")

*whack*

It helps if you have an idea of who is attending.You want a healthy installer:instalee ratio. Themore installers, the better.

The other thing is that installers need to be awarethat it’s OK not to know something, as long asthey seek the answer from someone who knows,or from the web, and that it is important forknowledgeable folk to make themselves availablewhenever possible, rather than sitting therewatching an entire RedHat installation...

Michael Davies has released the source code forhis on-line Installfest registration web page. Theweb interface allows installees and installers topre-register on-line. The requirements are PHP,Postgres and Apache.

11 - September 2000

Page 14: The Journal of AUUG Inc.minnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V21.3.pdf · go figure!2 However the firewall did allow SSH through - good, a nice secure protocol for secure

Get the code:http : //users. senet, com. au/-michaeld

It’s licensed under the GPL, so if you use it, pleasekeep the GPL intact. Or else...

.:.

Revamping the BSDmultiprocessor codeGreg [email protected]

[ Editor’s Note: This is an excerpt of an article whichwas originally in "’Daemon News",http: //www. daemonnews, o rg / 2 0 0 0 0 8 / dadvo c a t e.html Our thanks to Greg for permission toreproduce this article in A UUGN. ]

This time last year Mindcraft publishedbenchmarks showing that Microsoft NT couldoutperform Linux in some very specific areas. Youmay also have noted that nobody in the BSD campgot up and said "’we can do better". We werepretty sure it would still not have been as good asMicrosoft. In this article I’ll explain thebackground and what the FreeBSD project isdoing about it.

THE SMP PROBLEM

UNIX was written for single processor machines,and many of the design choices are not onlysuboptimal for SMP, they’re just plain ugly. Inparticular the synchronization mechanisms don’twork well with more than one processor. Briefly:

The process context, including the upper halfof device drivers, doesn’t need to protect itself.The kernel is non-preemptive: as long as aprocess is executing in the kernel, no otherprocess can execute in the kernel. If anotherprocess, even with higher priority, becomesrunnable while a process is executing kernelcode, it will have to wait until the activeprocess leaves the kernel or sleeps.

Processes protect themselves against theinterrupt context, primarily the bottom half ofdevice drivers, by masking interrupts. Theoriginal PDP-11 UNIX used the hardwarepriority levels (numbered 4 to 7), and eventoday you’ll find function calls like spl4 ()and spl7 () in System V code. BSD changedthe names to more descriptive terms likesplbio (), splnet ( ) and splhigh( ), andalso replaced the fixed priorities by interruptmasks in processors which support theconcept, but the principle remains the same.It’s not always easy to solve the question ofwhich interrupts need to be masked in whichcontext, and one of the interestingobservations at this meeting was that as time

goes on, the interrupt masks are getting"’blacker": each spl () is masking off moreand more bits in the interrupt mask register.This is not good for performance.

Processes synchronize with each other usingthe sleep() or tsleep () calls. TraditionalUNIX, including System V, uses sleep(), butBSD prefers tsleep(), which provides nicestrings which ps (1) displays to show whatthe process is waiting for. FreeBSD no longerhas a sleep() call, while BSD/OS has both,but sleep ( ) is deprecated, tsleep ( ) is usedboth for voluntary process synchronization(e.g. send a request to another process andwait until it is finished), and for involuntarysynchronization (e.g. wait for a sharedresource to become available).

Processes sleep on a specific address. Inmany cases, the address in itself has nomeaning, and it’s probably easier to think of itas a number. When a process sleeps, it is puton a sleep queue. The wakeup() functiontakes the sleep address, walks through thesleep queue, and wakes every process which issleeping on this address. This can causemassive problems even on single processormachines; UNIX was never really intended tohave hundreds of processes waiting on thesame resource, and a number of Apacheperformance problems center around thisbehaviour. As a partial solution, FreeBSDalso has an additional function,wakeup_one(), which only wakes the firstprocess it finds on a specific wait queue.

There are a number of reasons why this concept isnot a good solution for SMP. Firstly, the simplisticassumption "’nothing else can be executing in thekernel while I am" falls fiat. FreeBSD currentlyhasn’t implemented a solution for this. Instead,we found a way of enforcing this illogical state, theBig Giant Lock (BGL). Any process entering thekernel must first obtain the BGL; if a processexecuting on another processor has the lock, thenthe current processor spins (it sits in a tight loopwaiting for the lock to become available); it can’teven schedule another process to run, becausethat requires entering the kernel. This methodworks surprisingly well for compute boundprocesses, but for a large number of applications,including database and networking, it can giverise to performances which are only a fraction ofwhat the hardware is capable of. This is thebackground to the success of the Mindcraftbenchmark: at the time, Linux was also using thiskind of synchronization.

The other issue is with masking interrupts. Thisis also quite a problem for SMP machines, since itrequires masking the interrupts on all processors,which requires an expensive synchronization.

SOLVING THE PROBLEM

There’s no quick and easy solution to thissynchronization problem. Sun Microsystems has

AUUGN Vol.21 ¯ No.3 - 12 -

Page 15: The Journal of AUUG Inc.minnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V21.3.pdf · go figure!2 However the firewall did allow SSH through - good, a nice secure protocol for secure

probably spent more effort on a good SMPimplementation than anybody else, but it hastaken them the best part of 10 years to do so, andonly now is their Solaris 2 operating systemshowing the benefits.

The Linux people started working on improvingtheir SMP support shortly after the Mindcraftresults became known, and they have madesignificant progress. By comparison, in theFreeBSD camp, we have done almost nothing.NetBSD and OpenBSD haven’t even released anySMP support at all. Why?

For some time, I have had a theory that the opensource model works well for small projects, but itis not optimal for really big undertakings. Evenbefore the Mindcraft incident I had decided thatgetting good SMP support for BSD would be aproof of this theory. Well, we’re on the way tobetter support now, but the way it happened israther unexpected.

BSDI TO THE RESCUE

A few months ago, Berkeley Software Design, Inc.(BSDi) and Walnut Creek CDROM merged. At thetime of the merger, we had been told that FreeBSDand BSDi’s proprietary operating system,BSD/OS, would be merged. It didn’t take long forBSDi to announce that this wasn’t going tohappen, and there was some dissatisfaction as aresult. BSDi did agree, however, to let theFreeBSD project merge some BSD/OS code intoFreeBSD. In mid-May, BSDi made a snapshot oftheir development source tree available to theFreeBSD developers.

On the 15th and 16th June we had a meeting ofBSDi and FreeBSD developers at Yahoo!’s facilityin Sunnyvale CA. Chuck Patterson, BSDi’s leadSMP developer, spent Thursday presenting howBSDi implemented SMP in BSD/OS 5.0 (as of yetunreleased). Chuck also briefly explained BSD/OS4.x’s SMP implementation. On Friday wediscussed how to incorporate the structures intoFreeBSD.

The BSD/OS 4.x SMP implementation is mainlycomprised of a giant lock, but with a twist.Whenever a processor tries to acquire the giantlock it can either succeed or fail. If it succeeds,then it’s business as usual. However, if theacquisition fails, the processor does not spin onthe giant lock (in other words, it doesn’t just keeplooping until the lock becomes free). Instead, itacquires another lock, the scheduler lock orschedlock, which protects scheduler-relatedportions of the kernel, and schedules anotherrunnable process, if any. This technique.worksextremely well for heavy work loads that have lessthan one CPU worth of system (kernel processing)load. It is very simple, and it achieves goodthroughput for these workloads.

The meeting concentrated on the BSD/OS 5.0SMP implementation, which is more complex:

The BGL remains, but becomes increasinglymeaningless. In particular, it is not alwaysnecessary to obtain it in order to enter thekernel. The main reason for its existence is toprovide a default synchronization mechanismfor system components which haven’t beenconverted yet.

Instead the system protects shared datastructures with mutexes. These mutexesreplace calls to tsleep() when waiting onshared resources (the involuntary processsynchronization mentioned above). In contrastto traditional UNIX, mutexes will be usedmuch more frequently in order to protect datastructures which were previously implicitlyprotected by the non-preemptive nature of thekernel. This mechanism replaces calls totsle~p () for involuntary context switches.

Compared with the use of ksleep ( ), mutexeshave a number of advantages:

Each mutex has its own wait (sleep)queue. When a process releases a mutex,it automatically schedules the nextprocess waiting on the queue. This ismore efficient than searching a possiblyvery long, linear sleep queue.It alsoavoids the flooding when multipleprocesses get scheduled, andmost ofthem have to go back to sleep again.

Mutexes can be a combination of spin andsleep mutexes: for a resource which maybe held only for a very short period oftime, even the overhead of sleeping andrescheduling may be higher than waitingin a tight loop. A spin/sleep lock mightfirst wait in a tight loop for 2microseconds and then sleep if the lock isstill not available at that time. This is anissue which Sun has investigated in greatdetail with Solaris. BSDi has not pursuedthis yet, though the BSD/OS threadingprimitives make this an easy extension toadd. It’s possibly an area for us toinvestigate once the system is up andlimping again.

Interrupt lockouts (spl0s) go away completely.Instead, interrupt functions use mutexes forsynchronization. This means thataninterrupt function must be capableofblocking, which is currently impossible.Inorder to block, the function must have a"’process" context (a stack and a processstructure). In particular, this could includekernel threads.

BSD/OS on Intel currently uses light-weightinterrupt threads to process interrupts, whileon SPARC it uses normal ("heavyweight")processes. Chuck indicated that the decisionto implement light-weight threads initially wasprobably the wrong one, since it gave rise to alarge number of problems, and although theheavyweight process model would give lousyperformance, it would probably make it easier

- 13 - September 2000

Page 16: The Journal of AUUG Inc.minnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V21.3.pdf · go figure!2 However the firewall did allow SSH through - good, a nice secure protocol for secure

to develop the kernel while the light-weightprocesses were being debugged. There is alsothe possibility of building a kernel with one orthe other support, so that in case of problemsduring development it would be possible torevert to the heavy-weight processes whilesearching for the bug.

THE FREEBSD WAY

On the Friday we discussed how to implement thiscode in FreeBSD. There are a number of things weneed to do. During the meeting we didn’t getbeyond deciding the first couple of things:

First remove the BGL (currently a spinlock)and replace it with two, maybe three mutexes,one for the scheduler (schedlock), and ablocking mutex for the kernel in place of theBGL. BSD/OS also has an ipending lock forposting interrupts. At the time, we thought itmight be a good idea to implement it as well.

In addition, implement the heavy-weightinterrupt processes. These would remain inplace while the light-weight threads werebeing debugged.

PROGRESS WITH FREEBSD SMPNG

Since that meeting, we have made significantprogress. As this article went to press in mid-August, We now have implemented these first twosteps on Intel single processor machines, and theyrun stably. Strangely, we didn’t find the expectedperformance decrease; despite a number ofdebugging tools in the kernel, performance dropwas only about 1% instead of the up to 50% wehad been fearing.

We have also made progress on Intel SMPmachines, but there is still a lot to do before wecan run stably with more than one processor.

WHAT ABOUT NETBSD AND OPENBSD?

I’m not aware of the state of negotiations betweenBSDi and the NetBSD and OpenBSDcommunities. The people I’ve spoken to at BSDisounded very interested in supplying the code toNetBSD and OpenBSD as well, and hopefullythey’ll be able to come to an agreement on how touse the code.

FURTHER READING

Jason Evans, the project manager, has a web pageat http: //people. FreeBSD. org/-j asone/smp/which tracks the progress of the project. It alsocontains pointers to a number of facilities,including the source code of the curren[development.

Images from theLinuxSA Installfest

Before the event

Just foolin’ around

Installing some demo systems

AUUGN Vol.21 ¯ No.3 - 14 -

Page 17: The Journal of AUUG Inc.minnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V21.3.pdf · go figure!2 However the firewall did allow SSH through - good, a nice secure protocol for secure

Penguins sleeping before their big day

Greg Lehey

Kevin Macuinus

Doors open for 30 minutes

Richard Russell

Dan Shearer giving a seminar

- 15 - September 2000

Page 18: The Journal of AUUG Inc.minnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V21.3.pdf · go figure!2 However the firewall did allow SSH through - good, a nice secure protocol for secure

Richard Sharpe explaining Linux

David Newall and Richard Russell

Doors open for 60 minutes

Running out of space; set up on the floor!

David Newall looking chuffed atthe event’s success

"Can I help?"

AUUGN Vol.21 ¯ No.3 - 16 -

Page 19: The Journal of AUUG Inc.minnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V21.3.pdf · go figure!2 However the firewall did allow SSH through - good, a nice secure protocol for secure

No more bench space, but plenty of boxes :-)

Dave Bennett (Cisco), Dan Shearer (LinuxCare) andRichard Sharpe (Ethereal)

"FreeBSD? Looks like Linux. Can I have a CD?"

NetCraft’s booth

Geoffrey Bennett (owner of the Toshiba WindowsRefund cheque)

Checkin desk

- 17 - September 2000

Page 20: The Journal of AUUG Inc.minnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V21.3.pdf · go figure!2 However the firewall did allow SSH through - good, a nice secure protocol for secure

Equipment Waiting Room - These boxes don’t haveLinux on them yet

Why write for AUUGN?AUUGN is looking for articles, so why should you write one?

o It is good experience.

o It looks good on your CV - many jobs these days call for "good communicationskills."

o It is your moral duty to share your experience with other AUUG members.

o You could get paid for it.AUUG is launching a refereed article section in AUUGN. Articles submitted will be reviewed(anonymously) by our esteemed panel, and if your article is accepted for publication, you willbe paid an honorarium of $200.

If you would like to submit an article for review, please contact David Purdue atDavid. Purdue@auug. org. au

AUUGN Vol.21 ¯ No.3 - 18-

Page 21: The Journal of AUUG Inc.minnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V21.3.pdf · go figure!2 However the firewall did allow SSH through - good, a nice secure protocol for secure

AOSS 2Call for Participation

The second Australian Open Source Symposium (AOSS 2) will be heldin Adelaide on Saturday November 25, 2000. The purpose of this eventis to bring together the Australian Open Source community on an annualbasis.

AOSS is run by developers, for developers. Our goals are to promotethe sharing of information and experience, give the community a placeto interact, and nurture and harness synergies between Open Sourceprojects.

Just as Open Source is a little different, so is AOSS. While we welcomeformal papers, we are actively encouraging informal (but well prepared)presentations that are both .timely and interesting. We know that OpenSource changes fast, and that developers would rather write code thanpapers.

The first AOSS event was a resounding success. If you are an OpenSource Developer, get involved and make the next one be even better.

Particular topics we are looking for:

¯ Open Source ideology and/or economics.¯ "Work in progress" for an ongoing project.¯ "Life in the trenches" experiences from a project (successful or not).¯ "Cool ideas" for those who want to start a new project.

TIMETABLE:

Abstracts (around 100 words) are due Monday, 25 September 2000.

PRESENTERS WILL RECEIVE FREE REGISTRATION.

Please email submissions to aoss@ esec.com.au

AOSS 2 is proudly supported by AUUG Inc, ISOC-AU, and SAGE-AU.

AUUG Website: http://www.auug.org.auPhone: 1800 625 655 or +61 2 8824 9511

- 19 - September 2000

Page 22: The Journal of AUUG Inc.minnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V21.3.pdf · go figure!2 However the firewall did allow SSH through - good, a nice secure protocol for secure

Fragments from theUsenix SecuritySymposiumThe Anonymous Delegate

Denver, Colorado, USAAugust 16-17th 2000

When I mTived in Denver it was unusually quiet.But that was not to last.

The night preceding the conference saw the barpacked to the gills with all manner of strange anddangerous people. Weird concoctions wereguzzled, tall tales told, wild plans hatched. MarcusRanum held forth on the virtues of the HarleyDavidson as the pinnacle of the motorcycle art,and the perfection of the chopper form. He wasnot seen again.

The wireless LAN covering the bar ensured thatthe gentle light of laptop screens illuminated thescene with an otherworldly ambiance. It wasimpossible to visually distinguish lemonade frommargaritas...

The next morning the main gig was opened by DrBlaine Burnham, who reviewed all the things weused to know about security but seem to haveforgotten. He also reviewed the dress code atDEFCON. These are strange connections, indeed.In any case, he rightly pointed out that if we’dstop periodically reinventing the wheel, we mightactually make progress forward and build somesecure systems. He especially said good thingsabout orange book, so it might be time to blow thedust off your copy and give it a reread.

Then the dastardly plan became clear. There weretwo tracks; invited talks and refereed papers. Alas!We actually had to exercise both brain and freewill, and all before the hangover has faded. So if Isaw things that others didn’t, then they must havebeen in the other room. Hell, who am I kidding?I’d been seeing things that other people couldn’tsince the eleventh glass last night.

Dave Dittrich gave a taxonomy of distributeddenial of service attacks, including a blow by blowdescription of the discovery of the early Trinoo,TFN and stracheldhrat populations. Amazingly,traces of these agents were picked up monthsbefore that late 1999, early 2000 large scaleattacks, but the whole shebang was kept underwraps. Full disclosure, notI The sense of the talkwas the best is yet to come... DDoS is here to stayand is evolving stealth technology rapidly.

Duncan Campbell’s presentation was aboutEchelon. He seems to have spent a great deal ofhis recent life tracking down details about thesatellite communications interception stationsthat you find in places like NZ, Britain, Australiaand the US. A whole lot is known about Echelon

nowadays, thanks to the book "Secret Power"(which apparently still can’t be ordered fromamazon.corn). However, there were a bunch ofinterception facilities that Duncan showed photosof whose purpose is still unknown. Cool.

The last session of the day saw Mark Chen doing aquick tour of PKI technology, and then explaininghow it can all fall over in the real world. Markseems to be one of a growing chorus of securityexperts who aren’t exactly falling over themselvesrecommending the wholesale adoption of PKIsystems. Apparently, not everything the CAvendors promise comes true, and some of themare even fibbin!!

I snuck out of the last part of Mark’s talk to catchJohn Scott Robin’s analysis of the Pentiumarchitecture’s capability to support a securevirtual machine monitor. Guess what the answerwas? Ah well, maybe next time, Intel.

Day 1 was a wrap. All I needed to do was tosurvive the reception and retire early. Quellechance?, as they say. Theo de Raadt and themotley OpenBSD band set up in the bar,strategically placed to ensure optimum visibility tothe waiting staff and minimum delivery time forfine beverages. As we discovered, fine beveragesdoes not include beer in Denver. Given previousexcesses with tequila, however, caution was thebetter part of valour. So I stayed away from thehard liquor and performed a sequential search foran acceptable ale.

Neat things are happening in the OpenBSD world.Encrypted file systems, cool. Encrypted virtualmemory, paranoid and cool. Kick ass IPSEC, withmulti hundred megabit throughput.

I also learned that order N algorithms are to beavoided.

The next morning I hit the refereed papers.Intrusion detection was the name of the game,starting with Calvin Ko’s explaining how to usesoftware wrappers to detect and counter systemintrusion. These wrappers are a layer inserted intothe kernel, so that you can audit what is going on,detect attack profiles and take appropriatecountermeasures. Like all the IDS-in-the-kernelpeople, the claim was that the performance hitsare insignificant.

Yin Zhang was next with a talk on detectingbackdoors and stepping stones. This was done bypassively watching traffic going past on thenetwork, and picking up on the signature trafficgenerated by an attacker’s presence. When thesetechniques were run against real traffic tracesfrom LBNL and UCB, they were effective atidentifying real instances with only a few falsepositives.

Anil Somayaji finished up the intrusion detectionblock with a description of an ingenious intrusioncountermeasure. By tracing kernel calls, he buildsup a profile of a given program working correctly.When it exceeds the parameters of that profile,

AUUGN Vol.21 ¯ No.3 - 20 -

Page 23: The Journal of AUUG Inc.minnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V21.3.pdf · go figure!2 However the firewall did allow SSH through - good, a nice secure protocol for secure

delays are added to each system call. The biggerthe deviation, the greater the delays, until theprocess effectively freezes. The trick seemed to beto get a good starting profile (how do you knowyou aren’t compromised already), but the systemobviously fails soft if it isn’t a perfect profile.

After lunch, Robert Stone described a method forbacktracing DoS packet floods. The obviousapproach of querying each router in the path, inturn, apparently doesn’t work well, because not allrouters have sufficient debugging facilities to beuseful. Instead, he suggests creating an overlaynetwork, where interesting packets are sent tospecial tracking routers, connected to edge routersvia tunnels. Note which tunnel the packet camedown, and bingo! you know the ingress point.

Yongguang Zhang started from the observationthat the use of IPSEC makes it impossible to dothings like bandwidth reservation, traffic shaping,proxying, etc. An answer, he proposed to applytwo different cryptographic transforms.., one tothe header and one to the body. Routers sharingkeys could therefore peek inside the header topursue routoid goals, while the payload remainedsafe from all but the intended recipient. I have tosay that I was left with the feeling that in thefuture we are going to have to decide whether wewant security or fancy router parlour tricks, andthat the two may be mutually exclusive.

Matthew Smart finished the session describing abrilliant means of slowing the attackers down.One of the things that kiddies often do is runnmap (and friends) on networks, not only to scanfor machines and ports but to identify operatingsystems so that they know which exploits to run.Matthew has built a bridge that tweaks the trafficflowing through it to remove the uniqueidiosyncrasies that different systems exhibit; hecalls this a "fingerprint scrubber".

I switched back to the invited talk stream to hearwhat the justifiably famous Mudge had to sayabout antisniff. Now this is truly inspiredtechnology, and if you are not across it go to theL0pht website right now (www.10pht.com) and findout more. Go on, I’ll wait...

OK, back again? Devilishly clever, eh?. I guess youcould circumvent antisniff by cutting the TX leadon the ethernet cable, or equivalently performingsurgery on pr_ouput0 on a captured system. Butthen people are probably going to notice you’rethere in other ways: "Hey, the quake server isn’tresponding!", or "Who is that guy with a laptopplugged into the wall?" In general, therefore,antisniff is truly useful and should be in everysysadmin’s toolbox.

I was really taken by Mudge’s logic when he wasdescribing what he called the "war college"approach. The sense of it was, we study how toattack our own systems, so that when the enemyattacks we know how to turn them back. This is atodds with the other high profile viewpoint beingfloated at the conference, being that you don’tneed to attack systems to learn how to make them

secure, with the corollary that full disclosure isbad. That, my friends, is what we call misguided.

The symposium was capped off by a bewilderingarray of around a dozen five minute work inprogress talks, which I shan’t try to summarise.You had to be there.

Next year, I’m working up a multiple personalitydisorder so I can attend all the streams at once. Ireally hate it though, when you run into yourselfin the bar, buy yourself a drink, and then skip outwhen it’s your shout.

If you are kicking yourself for missing the primosecurity gathering of 2000, then don’t despair. Thewritten papers were excellent, and I’m sure youcould talk Usenix into selling you a set(www.usenix. org).

Dear AUUG Members,

Over some Japanese beer it wasconcluded that AUUG members wouldbenefit from a discussion list. The purposefor this list is to provide a means for AUUGmembers to communicate, ask questions,network, discuss random geek stuff andthe finer points of beer.

To join the list, send a message to [email protected] with the subject of"subscribe talk"

Sarah [email protected]

- 21 - September 2000

Page 24: The Journal of AUUG Inc.minnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V21.3.pdf · go figure!2 However the firewall did allow SSH through - good, a nice secure protocol for secure

AMERICANBOOK STO RE

173 Elizabeth St, Brisbane Queensland 4000Ph: (07) 3229 4677 Fax: (07) 3221 2171 Qld Country Freecall: 1800 177 395

american_bookstore @ compuserve.com

Name:

Address"

Phone Number:-

Payment Method:

Card Number:

Expiry Date"

Cheque

Diners

This is a: ~ Special Order

QUANTITY . TITLE

Date:

Post Code:

Money Order

Mastercard

Amex

Visa

~ Bankcard

Signature:

Mail Order Book on Hold

PRICE

SUBTOTAL

LESS--10% DISCOUNT

POST & PACK

TOTAL

POSTAGE AND HANDLING FEES: 1 BOOK $6.00 2-4 BOOKS $7.00BOOKS OVER $70.00 WE WILL SEND CERTIFIED - PLEASE ADD ANOTHER $1.50 OR WAIVECERTIFIED DELIVERY.

FOR SPECIAL ORDERS, PLEASE ENCLOSE $10,00 PER BOOK AS A DEPOSIT.

Page 25: The Journal of AUUG Inc.minnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V21.3.pdf · go figure!2 However the firewall did allow SSH through - good, a nice secure protocol for secure

My Home NetworkFrank [email protected]

This column is late, being written just after thestart of Daylight Savings. In fact, this year’sDaylight Savings is early, being moved forward forthe Olympics. The early start to each day(including waking up in the dark) is a majorproblem with the change to the time, but there isalso one reason I like it, it gives me a reason to setthe times on all the clocks in the house.

Of course there is one problem with setting all theclocks, what do you use as a standard? Mostpeople I know just believe what is on their watch,others phone up Telecom, others believe theirradio. In my case, I believe the time on mycomputer.

If you wander around any office you will find thatthe computers are set to random times, most ofwhich cluster around the correct one, but, in factcomputers and the Internet form one of the mostaccurate time systems widely available. Mostpeople know of atomic clocks, and many knowthat there are ways to set the time across theInternet, but most don’t think of the applicationsfor their home.

In reality, anywhere there are two or morecomputers it is trivial to synchronise the timebetween them, and further, if you have someexternal connection, you can synchronise with it.While there are at least three different time

synchronisation protocols, and most can be runeither as a single shot or as a daemon, I find thebest, at least for the Unix world is the NetworkTime Protocol (NTP).

NTP is a protocol that allows continuoussynchronisation between both a server-client formor in a peer arrangement. The daemon thatimplements the protocol is call xntpd, and comeswith a number of monitoring and controlprograms. Even more importantly, when xntpd isrunning it gradually shifts the system time tobring it in line, ensuring that there are no stepsbackwards or dramatic steps forward. Certainly,this requires assistance from the kernel, but theadj time system call is fairly standard these days.

Along with xntpd is the program ntpdate, whichis a one-shot program, generally used at boot timeto the initial time. ntpdate can either shift thetime in one hit (best used at boot-time) or throughthe adj time system call.

The standard distribution of xntp for Red Hat(xntp3-5.93-14 at the time of writing this) issimple to set up and includes configurationoptions to run ntpdate prior to starting xntpd.The only information you require is the hostnameor IP address of a suitable time server. While youcan try and connect to a top level server, in mostcases it would be better to connect to onespecifically set up by your ISP (often with thename ntp or time).

xntpd is controlled by a configuration file, whichis normally found in /etc/ntp.conf, and lookssomething like:

## Undisciplined Local Clock. This is a fake driver intended for backup# and when no outside source of synchronized time is available. The# default stratum is usually 3, but in this case we elect to use stratum# 0. Since the server line does not have the prefer keyword, this driver# is never used for synchronization, unless no other# synchronization source is available. In case the local host is# controlled by some external source, such as an external oscillator or# another protocol, the prefer keyword would cause the local host to# disregard all other synchronization sources, unless the kernel# modifications are in use and declare an unsynchronized condition.#server 127.127.1.0 # local clockfudge 127.127.1.0 stratum 15

## Drift file. Put this in a directory which the daemon can write to.# No symbolic links allowed, either, since the daemon updates the file# by creating a temporary in the same directory and then rename() ’ing# it to the file.#driftfile /etc/ntp/drift#multicastclient # listen on default 224.0.1.1broadcastdelay 0.008

- 23 - September 2000

Page 26: The Journal of AUUG Inc.minnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V21.3.pdf · go figure!2 However the firewall did allow SSH through - good, a nice secure protocol for secure

## Authentication delay. If you use, or plan to use someday, the# authentication facility you should make the programs in the auth_stuff# directory and figure out what this number should be on your machine.#authenticate no

## Keys file. If you want to diddle your server at run time, make a# keys file (mode 600 for sure) and define the key number to be# used for making requests.# PLEASE DO NOT USE THE DEFAULT VALUES HERE. Pick your own, or remote# systems might be able to reset your clock at will.#keys /etc/ntp/keystrustedkey 65535requestkey 65535controlkey 65535

server ntp.crawford.emu.id.au prefer

If you look at this file, you will see that there are alot of possible options, most of which aren’timportant for a home network. The two importantlines here are the "server" lines. One of them setsthe preferred server to ntp. crawford, emu. id. au,i.e. my local time server, and the second, as thecomment say, is a fake driver, to follow the localclock if no connection is possible. The additional"fudge" line set the local clock to a low "reliability"(NTP clock start at 1 and count up for each levelbelow that).

For my server system, instead of setting the timeto ntp. crawford, emu. id. au, I would set it to theNTP server of my ISP, in which case, when theconnection is down, the local clock is important.

Along with /etc/ntp.conf, Red Hat has aconfiguration file, / etc/ntp/step-tickers,which contain the names or IP addresses of hoststo use to set the initial time at boot.

Okay, so now your Unix and Linux hosts arerunning fine, keeping time, and generally tickingalong, what about those other poor machines youhave in your home network. Don’t despair, help isat hand. In fact, the simplest is to run NTP onthose as well. xntpd has been ported to MicrosoftWindows NT, it runs as a service and works well.In fact it works so well that Microsoft haveincorporated a cutdown version of NTP, calledSNTP (Simple NTP) in Windows 2000. Ignoring thedifficulty of getting through Microsoft’sdocumentation, it synchronises well against a fullNTP version.

To complete the set, Apple now ship NTP asstandard in MacOS 9, and again you can happilysynchronise "with your Unix system.

Of course if you are stuck with some old systemthat doesn’t easily have NTP available, doesn’tmean you have to go "unsynched". NetBIOS haslong had the ability to synchronise with a timeserver, using the command:

net time \\server /set

where server is your time server.

You can put this in a batch file to be executed atstartup and then every time you boot, your clockwill be right. (BTW Windows 2000 systems in adomain automatically synchronise with the masterserver for the domain.)

To enable your Unix box to act as a server, youneed to run Samba (and who doesn’t these days :-)) and add the line:

time server = yes

to you/etc/smb, conf configuration file.

Of course, if you have an old Macintosh, thiswouldn’t work, but don’t worry, there is a solutionfor you too. Some years ago, the University ofMelbourne wrote a program called tardis forMacOS, which allowed it to synchronise using aproprietary protocol. They also wrote a serverwhich works -with Netatalk, the Linux packagewhich supports AppleTalk. Unfortunately, theserver program, timelord, has a few byte orderingproblems on Intel platforms, so you will need topick up a few patches which are available on theNetatalk home page, or from me (as I wrote themoriginally - see I do some other things occasionally:-)).

So given all these tools, it is easy to keep all yourcomputers running with the correct time, ofcourse, if you are on Unix, you also need to makesure you have the correct timezone, a totallydifferent problem I won’t go into now.

For those of you who read this far each time, youwill notice I still haven’t written about security. Iwill some time, but only when I have sufficientdetail, so keep reading, let me know what youthink, and send in some interesting ideas.

AUUGN Vol.21 ¯ No.3 - 24 -

Page 27: The Journal of AUUG Inc.minnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V21.3.pdf · go figure!2 However the firewall did allow SSH through - good, a nice secure protocol for secure

Call for Participation

The AUUG Security Symposium will be held in Melbourne on Friday 3 November 2000.

The purpose of this event is to exchange ideas on the improvement of the security forthe systems and networks we manage.

AUUG Inc invites proposals for papers relating to:

¯ Network Security¯ Host Security¯ Risk Assessment and Mitigation¯ Intrusion Detection¯ Distributed Security Solutions¯ Authentication and Authorisation Methods

Speakers may select one of two presentation formats:

Technical presentation:A 25-minute talk, with 5 minutes for questions.

Management presentation:A 20-25 minute talk, with 5-10 minutes for questions (i.e. a total 30 minutes).

Panel sessions will also be time-tabled in the day and speakers should indicate theirwillingness to participate, and may like to suggest panel topics.

TIMETABLE:

Abstracts (around 100 words) are due Monday, 18 September 2000. Please note thatformal papers will not be required, since there will be no proceedings for this event.

All submissions to be sent via Email to: [email protected] Faxed to AUUG at: +61 2 8824 9522

Further information can be obtained by calling AUUG on:Phone: 1800 625 655 or +61 2 8824 9511

- 25 - September 2000

Page 28: The Journal of AUUG Inc.minnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V21.3.pdf · go figure!2 However the firewall did allow SSH through - good, a nice secure protocol for secure

The OpenSource Lucky DipCon [email protected]

Welcome back.

I’m whipping up this edition’s cocktail of code andcomment in between preparing for the MelbourneIT 2000 trade show. I’m helping man a stand inthe Linux Pavilion, which should be lot of fun. Wewere involved in something like this at last yearsevent, and I can tell you that the Linux and OpenSource arena was the hit of the show. We talked toover 5,000 people, many of them new to LinuxOpen Source and Unix.

The reaction from this event highlighted, in mymind, something of great importance; there’s onething that this industry needs; something that itneeds to keep the ’buzz’ alive; something to keepnew talented practitioners joining the industry;something it needs to sell hardware and services;something that it needs which helps differentiatethe technical computing arena from say the Car orToaster industry. That something is an idea,technology or promise which, in a sense,overthrows most everything that preceded it. I’veseen it happen on three occasions during the 21or so years that I’ve been coding or usingcomputers. Here’s a whirlwind re-count.

The first time was around 1979, when, incredibly,someone managed to fit a whole computer intosomething that could sit on a desk! Somethingthat an individual enthusiast can claim of: "it’smine! All mine!" That something, of course, wasthe 8-bit microcomputer, denoted by the likes ofApples, CP/M and MicroBees (all of which I usedand admired.) These systems, I was sure, wouldone day change the World. And they did.

The second time this happened was around 1989.At the time, I had an account on a few systems atMelbourne Uni. On these, I’d discovered aboutthis wonderful universe called the Internet. Simplyamazing. Here, in it’s as yet unrealised proto-form,was something I thought was the simple mostimportant method of generating and spreadingideas developed since Gutenberg’s press. I wassure, this Internet thing would one day change theWorld. _And it did.

The last of the trifecta of ’disruptive’ technologiesor ideas, is, of course, Open Source. W-hile I’vebeen using Linux (and it’s spiritual precursor,Minix) at the office for almost a decade, it’s onlybeen the last few years when I finally came tounderstand the power of its underlying meme.Here, yet again, is something, (that yes, has beenin ’backroom’ practice for decades,) is turning ourindustry on its head, right here, right now. Andthe industry loves Linux and Open Source for thatvery reason. We thrive on riding the bow-wakes of’these’ disruptive ideas, like excited buoys when aspeed boat zooms past. Our industry feeds off thatexcitement. It’s like throwing accelerant on a

camp-fire. So, here’s to the technical IT industry.Let there be many more ’buzz’ inducing disruptiveideas to come. Oh, and I did mention that I thinkLinux and Open Source will one day change theWorld, didn’t I? ;-)

+ ÷

Let’s now take a look at this edition’s grab-bag oftools and apps.

÷ ÷

In a press release issued earlier today, Microsoftattacked Stallman’ s outlandish requests. "AtMicrosoft, we don’t scream at people who sayWindows instead of Microsoft/Windows..."--<smirk>

wxWINDOWS/GTK

For the cross-platform coders amongst you,wxW±ndows, a long available cross -platform GUIlibrary, is now available with GTK widget support.According to the wxWindows team, this newoffering has classes for all common GUI controlsas well as a comprehensive set of helper classesfor most common application tasks, ranging fromnetworking to HTML display and imagemanipulation. There are also Python bindingsavailable for the GTK and the MS Windows port,and documentation available for practically allclasses.

License: BSDGrab it at :

http://wesley.informatik.uni-freiburg.de/-wxxt/

÷ ÷

WEB2LDAP

For those experimenting with LDAP, check thisout. web2idap.py is a full-featured LDAP clientwritten in Python designed, according to authorMichael Stroeder, to run as a stand-alone Webgateway, as a CGI-BIN under the control of aVvSVW server, or as handler module under ApacheWith mod_python.

License: GPL

http://www.web21dap.de/

+ +

AUUGN Vol.21 ¯ No.3 - 26 -

Page 29: The Journal of AUUG Inc.minnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V21.3.pdf · go figure!2 However the firewall did allow SSH through - good, a nice secure protocol for secure

VISUALOS

Something cool to get your students into! Forgetthose drab Turing machine simulations ;-)VisualOS was developed as an educational visualsimulator of an operating system forGNOME/GTK+. It represents a working operatingsystem visually, allowing the user to select thedifferent algorithms to use for each of thesimulated subsystems: CPU, Memory and diskI/O. I’m sure if I had this way-back-when, I wouldhave achieved greater marks for comp-sci. That’smy story and I’m sticking to it...

License: GPL

http://VisualOS.sourceforge.net/

+ +

TOMAHAWK

This is an interesting one. Tomahawk claims to bean Apache-based Web server with integratedSquid object cache capabilities running on anintuitive Web-based UI. It also claims dramaticallyincreased server performance. Go figure ;-)

License: GPL

http://www.elctech.com/

+ +

MOTION

For all you site-security mavens out there: motionuses a video41inux device for detecting movement.It makes snapshots of the movement which laterwill be converted to MPEG movies, making itusable as an observation or security system. Itcan send out email and SMS messages whendetecting motion.

License: GPL

http://motion.technolust.cx/

+ +

MCFEELY

There are probably dozens of job-control systemsour there for Unix/Linux, but here’s another toadd to the list. McFeelg, its author claims, makesit possible to run multiple programs, in a specifiedorder, on multiple hosts. It was created to solvethe problem of automatically managing users atan ISP where the users have resources like homedirectories on multiple machines.

License: GPL

http://web.systhug.com/mcfeely/

÷ +

HELIX CODE

If you want the latest and sexiest Linux/Unixdesktop around, look no further than Gnome’sHelix Code.

License: GPL

http : //www. helixcode, com/

Gnome Helix Code

If you have any experiencesusing Linux that you would liketo share with other AUUGNreaders, drop us a line at:

[email protected]

We’d love to hear from you!

- 27 - September 2000

Page 30: The Journal of AUUG Inc.minnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V21.3.pdf · go figure!2 However the firewall did allow SSH through - good, a nice secure protocol for secure

DRAFT:

AUUG AGM Minutes

Thursday 29 June 2000

Committee present:David Purdue - DPMichael Paddon - MPMark White - MWLuigi Cantoni - LC

Minutes taken by:Elizabeth Carroll - EC

I) Meeting opened at 1700 by DP

2) Apologies:Stephen Boucher

3) Minutes of the previous AGM:Motion for the minutes to be accepted: GregRoseSeconded: Anthony RumbleCarried.

4) President’s report: DPWe currently have a financially stableorganisation, thanks to a profitable AUUG2K,generous sponsorship and a healthy bankbalance. AUUG has tightened up many of itsinternal processes and expense, includingbringing things like membership processingback in-house.

AUUG is weak in respect that we currentlyhave low membership numbers. This meansthat we rely on the annual conference, as wellas membership fees, to fund our activities.

We would like to see more delegates at events.AUUG2K had slightly lower attendance thathoped, however we knew that the unusual dateof the conference would likely have that effect.We also suspect that some members couldn’tattend due to the implementation of the GST.

In the coming financial year, AUUG will not behaving an annual conference; the next isscheduled for September 2001, in Sydney.Therefore, we will be concentrating ondelivering smaller events, such as the opensource and security symposia. By returningmore value, in more ways, to our members weintend to attract new people to AUUG.

We also need to call upon the membership toremind you that AUUG is a member drivenorganisation. You should not be asking, "Whatcan AUUG do for you?", but rather "What canyou do for AUUG?". We challenge all membersto get more involved.

5)

Motion to accept the President’s report: AndrewMcRaeSeconded: Don GriffithsCarried.

Treasurer’s report: LCl am Luigi and I took office as treasurer in Julyof last year. I was unable to immediately takeover my role as treasurer as the previousaccounts and books were incomplete, and thusall the information I required was not available.I was given the cheque and deposit booksshortly after and was thus able to control theflow of funds into and out of our accounts.

Since last year’s conference, I have had fullcontrol (in my capacity as treasurer) of theaccounts and how they are maintained. Theaccounts I will be presenting represent acomplete and accurate record from that point.

In the middle of last year, the executive decidedthat AUUG should take over more of the rolespreviously done externally, such asmemberships and conference management.This would both save costs and provide moreaccurate information and control in theseareas. This conference has been the first formany years where we have managed all theorganisation and logistics for ourselves.

The executive would appreciate your feedbackto know how successful we have been. Wewould like to know if you feel this conference’sregistration, administration etc. have been animprovement over the past. We would also liketo know if your membership handling has beenbetter, more accurate and faster. These are theareas of administrative improvement we haveconcentrated on this year and by doing them inhouse we have also saved your membershipmoney.

We began to implement these new ideas duringthe 1999 conference. This resulted in asignificantly better than expected financialresult for that event.

At that time a separate cheque account wasmaintained for conferences. I am unable toprovide an audited report for either thisaccount or for the general AUUG account as wedo not possess complete records for thatperiod. However, what I can say is that theaccumulated funds from the last fewconferences (including 1999) in the conferenceaccount was $50,943.87, and I believe that thesurplus from the 1999 conference representsmore than 50% of this amount. The conferenceaccount has now been closed and all fundstransferred to the general AUUG account.

We now trade entirely from one account butmaintain separate budgets and costing areasfor conferences, tutorials etc.

To summarise this year’s tutorial program andconference:

AUUGN Vol.21 ¯ No.3 - 28 -

Page 31: The Journal of AUUG Inc.minnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V21.3.pdf · go figure!2 However the firewall did allow SSH through - good, a nice secure protocol for secure

For the tutorial program:- All tutors have been paid and there onlyremain printing costs of ,91,273.56 andvenue costs of ‘92,076.00 to be paid. Thereis ,916,550 of income from attendees that isyet to be received.

If all monies owed are received, thetutorial program should create a forwardestimated surplus of ‘926,583.25. This is thefirst year that all tutors have been paidbefore the conference finishes.

For the conference program:- All suppliers have been paid, exceptingonly printing and venue/food costs of about,922,000. There is about ‘98,250 of incomefrom attendees that is yet to be received.

If all monies owed are received, theconference should create a forwardestimated surplus of about $34,000.

The total number of attendees isapproximately 150. This is slightly downfrom previous years but given the differenttime of year in which the conference isbeing held, and the fact that it is not beingheld in Sydney or Melbourne, I feel thenumbers are still good.

Once again we are very keen to receivefeedback. What are your thoughts on this typeof venue and format? We have over a yearbefore the next conference and we would like togive you the type of event you want.

General accounts:

- Membership funds have brought in ‘952,200.Since September, when I tookover theaccounts, the main costs have been:

* AUUGN - about ’911,500* General office costs - about ‘97,800* Wages and associated costs about,937,000

Here it should be noted that a great deal of thisarea was actually spent on conference workand in reorganising everything to the new in-house way of recording and administration. Infuture we will be costing this more directly tothe areas where it is spent.

* Executive meeting costs - about ‘98,600

- It must also be noted that during this periodwe also paid off previous liabilities of ,916,500.

- Our accounting systems are now improved tothe point where we are able to give a morecomplete financial position at the AGM.

- Currently we have ,9116,857 in the bank. Weare owed about ,931,550. Uncashed chequesand money we owe comes to about ‘940,000.Therefore, we have about ,9108,000 as funds togo forward with.

- This improved financial position and bettercontrols should enable us to maintain ourcurrent fee structure over the next period.

- Chapters with their own funds have not beenreported on here, and this is one area which wewill be concentrating on during the next year.

In my opinion AUUG is definitely solvent andhas sufficient funds to enable us to worktowards providing a better service for you, themembers.

The John Lions Fund now has over ‘930,000 init and we are changing the investment strategyto make it self sustaining. Nevertheless thisshould not be seen as a reason for no longeradding to that fund. We still need to nurturenew open systems talent amongst our studentsand a growing fund will help achieve that aim.

The following questions were put to LC by themembership:

A) Don Griffiths:Q: In regards to the GST, will AUUG accept theGST or absorb it?A: AUUG will not absorb the GST, althoughmembership rates remain the same.

B) Lawrie Brown:Q: What is floating out there finance wise?A: Basically, AUUG looks after the chapterscentrally, with the exception of ACT, QLD andVIC.

C) Greg Rose:Q: Did we get a copy of the old members’ listduring the changeover?A: Yes

D) Catherine Allen:Q: If you can’t audit, does it affect us with theATO?A: No, unless members request an audit. Weneed to have a full year’s activity, thereforenext year we will be in that position. Havingthe chapters managed under the standardisedcontrols will be a great help.

DP stated that chapters can have AUUGcentrally handle their funds, in that case weneed a full record of transactions from them.

MP stated that the Exec feels that our accountsare well under control, and that there isabsolutely no evidence present of improperactivities anywhere within AUUG and itschapters.

Motion to accept the Treasurer’s report: FrankCrawfordSeconded: Lawrie BrownCarried.

6) Secretary’s report

There was no Secretary’s Report.

7) Other business

- 29 - September 2000

Page 32: The Journal of AUUG Inc.minnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V21.3.pdf · go figure!2 However the firewall did allow SSH through - good, a nice secure protocol for secure

- General discussion re: AUUGN.

It has been noted, that from past surveys andexperience, AUUGN is usually cited as beingthe best member benefit provided by AUUG.

Gunther Feuereisen, the editor, has found itfrustrating over the past year, due to the factthat the contribution for content has fallen.This is reflected in the June edition, which onlycontains 32 pages.

As Gunther has stated, he wishes to produce aquality journal, but at the end of the day, hehimself, can only write so much.

Gunther has indicated that he will stay onuntil the end of the year, as editor, at whichtime AUUG will need to find a new one.

The question, also arises, do the AUUGmembers still want to receive AUUGN in itscurrent form, maybe a monthly A4 flyer wouldsuffice?

The following issues were discussed by theme .mbership:

- What about the web.., it reduces cost?* Many people prefer hardcopy.* Printed journal carries prestige.* Web delivery has it’s own costs.* Risk of losing historic aspect.

- How about producing an A4 sheet?* Easy to confuse with junk mail.

Up until now, copy from Login was free forAUUGN to reprint, however Usenix is beginningto charge other user groups for this right.AUUG can purchase reprint rights, or simplyredistribute Login complete.

Catherine Allen stated that she does not wantto read Login. If she did, she would have joinedUsenix. She would rather see Australiancontent.

Suggestions from the membership astopossible ways of obtaining quality articles:

- Try the Computer Science Departments at theuniversities, possibly offer a free 1 yearsubscription.

- Pay contributors up to 8200 an article, via arefereed process.- A refereed process possibly makes AUUGNmore attractive to academia.- AUUGN is primarily a professional journal,not academic.

- Deadline dates should be emailed to auug-announce.

- Look towards the Linux market for articles,eg. through the various Linux User Groups.

The best member benefit is the other membersof the user group. It provides the opportunityto exchange ideas etc. AUUGN is an extensionof this. Although we have events, not allmembers are in a position to attend, thereforeAUUGN is there for them. If a member is doingsomething interesting, it provides them theopportunity to let other members know aboutit.

DP called for volunteers to edit AUUGN, withkey goals being to grow the amount of content.

- General discussion re: the LinuxSAinstallfest.

To be held on 15 July in Adelaide. This event isbe sponsored by AUUG, and is an opportunityhelp kick start the SA Chapter. The publicliability insurance for the event will be coveredby AUUG.

- New committee.

The Executive Committee which comes intooffice on 1 July 2000, consists of:

PresidentVice PresidentSecretaryTreasurerGeneral Committee

- David Purdue- Malcolm Caldwell- Michael Paddon- Luigi Cantoni- Alan Cowie- Peter Gray- David Newall

There are two vacancies for GeneralCommittee, therefore AUUG is looking forvolunteers. Nominations were taken from thefloor.

Volunteers nominated:- Sarah Bolderoff- Adrian Close- Greg Lehey- David Shaw

The Executive Committee will interview thenominees and second two individualsaccording to the procedures laid out in theAUUG constitution.

- Thank you to the auug2k programme chair.

Motion to thank Frank Crawford, the AUUG2KProgramme Chair, for his efforts: Greg RoseSeconded: Shane MatsonCarried.

- Membership.

Andrew McRae stated that in regard tomembership, it is a very hard task to gain newmembers and asked the Committee what ideasthey had in order to achieve this.

MP stated that the focus on generic chapteractivities has become less effective over recentyears, and was being supplanted by specialisedsymposia. The intention of this change is to

AUUGN Vol.21 ¯ No.3 - 30 -

Page 33: The Journal of AUUG Inc.minnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V21.3.pdf · go figure!2 However the firewall did allow SSH through - good, a nice secure protocol for secure

attract new members.

General discussion:- AUUG currently has over 600 members, froma peak of 1300. This peak was skewed by thelarge joint WWW conferences run in 95-96.- The approach of running many small eventshas attracted many members to Usenix.

- What does AUUG stand for?We can say that it is the, Australian UnixUsers’ Group. Our focus is open systems andopen source. Unix is a large part of this, butnot to the exclusion of all else.

8) Meeting closed by DP at 1805.

.:.

Chapter News:

VictoriaEnno [email protected]

Well its been a long time between drinks, at leastas far as writing one of these columns isconcerned for me. But changes are upon us andso it seems apt that I jot down a few notes to keepeveryone informed.

First off, those of you who have been coming toour regular meetings or indeed those who haven’tbut were meaning to, should be aware that we’rechanging our venue. For some time we’ve beenmeeting at Asti’s in Carlton but with the change ofowners has come a change of direction for therestaurant and so we’re casting about for a newvenue. We tried the Carlton CUlTy House thisweek past and may yet try a few more placesbefore settling on a new semi permanent venue.We have some alternatives and we’ll be tryingthem in the upcoming months. To hear aboutthese arrangements, its best to subscribe to themembers-announce list at v±c. auug. org. au andyou can do this by sending email with subscribein the Subject to the usual -request address, i.e.:

[email protected]

Note that that’s the vic. auug. org. au server andnot auug. org. au though.

Meetings are still mostly on the third Wednesdayof the month so expect an announcement at leastimmediately before the meeting and committeeorganisational skills allowing a week ahead of theevent as well. .....

If any of you know good venues in or near theCBD that you feel we should be considering, nowis the time to drop us a suggestion. As we’resampling a few alternatives, we can always try onor two more till we find the right fit.

Next, its worth noting that as we missed out onorganising a Summer conference this year we’regoing to try to have one in November. So if youhad a paper working up or indeed if you havesomething interesting you’d like to talk about, nowis the time to start polishing your notes. In thestyle of AOSS-1 we’re thinking of making thepaper itself optional. This is mostly to reduce theburden on speakers of preparing, given the othergross calls on our time that all of us seem subjectto these days. Given fewer papers, we expect littleof no printed material for the delegates which inturn will mean a low cost of attendance. Whatpapers & supplementary material we get will bepublished on the Web for delegates to downloadand print at their discretion. Dates are still beingfinalised but expect the big day to be in Novemberas I noted.

Finally, just an advance warning that the pre-Christmas Go-Kart night is going to be on onceagain. Why am I noting this now? Well as a friendnoted, there are only 16 weeks left to Christmas(as I write this), what a scary thought. Anyway,time to get out the driving gloves, dust off thehelmet and try that zen thing to get into theSchumacher/Hakkinen/Montoya mindset. Eitherthat or just have fun. Both seem to work. Dinnerafterwards to clear out the petrol fumes as usual.

For the latestnews onAUUG

Check out the AUUG websiteat:

www.auug.org.au

- 31 - September 2000

Page 34: The Journal of AUUG Inc.minnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V21.3.pdf · go figure!2 However the firewall did allow SSH through - good, a nice secure protocol for secure

AUUG CorporateMembersas at 31 August 2000

Andersen ConsultingANI Manufacturing GroupANSTOAurema Pty LtdAustralian Bureau of StatisticsAustralian Geological Survey OrganisationAustralian Industry GroupAustralian National UniversityAustralian Taxation OfficeAustralian Water Technologies P/LBHP Information TechnologyBritish Aerospace AustraliaBunnings Building SuppliesBureau of MeteorologyC.I.S.R.A.CamtechCape Grim B.A.P.S.Central Queensland UniversityCentrelinkCITECCommercial DynamicsComputer Science, Australian DefenceForceAcademyCorinthian Industries (Holdings) Pty LtdCorporate Express Australia LimitedCrane Distribution LimitedCSC Australia Pty. Ltd.CSC Financial Services GroupCSIRO Manufacturing Science and TechnologyCurtin University of TechnologyCyberscience Corporation Pty. Ltd.Cybersource Pry. Ltd.Daimler Chrysler Australia - PacificDawn TechnologiesDeakin UniversityDepartment of DefenceDepartment of Land & Water ConservationEducation QLDEnergexeSec Limited

Everything LinuxG.James Australia Pty. Ltd.Great Barrier Reef Marine Park AuthorityIP AustraliaIT Services Centre, ADFALand Informatibn CentreLand Titles OfficeMacquarie UniversityMercantile Mutual HoldingsMotorola Australia Software CentreMultibase WebAustralis Pty LimitedNamadgi Systems Pty LtdNokia AustraliaNSW AgricultureNSW Public Works & Services,InformationServicesPeter Harding & Associates Pty. Ltd.Qantas Information TechnologyRinbina Pty. Ltd.SCOSecurity Mailing Services Pty LtdSnowy Mountains AuthoritySt. John of God Health Care Inc.St. Vincent’s Private HospitalStallion Technologies Pty. Ltd.Standards AustraliaState Library of VictoriaTAB Queensland LimitedTellurian Pty. Ltd.The Fulcrum Consulting GroupThe University of Western AustraliaThiess Contractors Pty LtdTower Technology Pty. Ltd.University of New South WalesUniversity of SydneyUniversity of Technology, SydneyVictoria University of TechnologyWestrailWorkcover Queensland

AUUGN Vol.21 ¯ No.3 - 32 -

Page 35: The Journal of AUUG Inc.minnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V21.3.pdf · go figure!2 However the firewall did allow SSH through - good, a nice secure protocol for secure

Unix Traps and TricksJerry [email protected]

A while back I asked people what they wanted from this column, there seemed to be some interest incovering some of the basics again. I have written a little article on UNIX file permissions, I apologise if it isa little Linux ext2 centric.

If anyone else would like to contribute with a short article on anything that they found initially tricky oranything else please contribute. Those people that emailed me and said that they would contribute, thatwould be gratefully accepted. We need contributors.

Thanks

SHORT PRIMER ON UNIX FILE PERMISSIONS

All resources in UNIX are viewed as files. It is therefore not surprising that access permissions are filebased. Every process in UNIX has associated with it a user id and a group id. These id’s determine theaccess that each process has on each file. There are three main operations that can be performed on afile: read, write and execute. All files in UNIX also have an owner, and belong to a group. Rights to a fileare specified by three sets of permissions. The first is the rights of the owner, the next set determineswhat rights the group members have, while the last set determines what rights all other users have.

unix> iduid=lO371(jerry) gid:lO371(jerry)unix> groupsjerry mungi accstaffunix> is -itotal 1130

rw 1 jerry jerryrw 1 jerry jerry

-rw 1 jerry jerrydrw-r-x--- 1 jerry mungi-rw 1 jerry jerry-rw-r ..... 1 jerry mungi

19129 Oct 30 11:35 dead.letter22190 Oct 12 1996 grub-ext2fs-floppy.gz28400 Jul 30 09:03 in-mail

1024 Jul 30 09:02 mungi-src8142 Jul 30 09:04 newgive.doc322 Jul 30 08:02 proposal

In the above example, the user id of the process is 10371 for user jerry. User jerry also belongs togroups jerry, mungi, and accstaff. When the files in a directory are listed, the rights are represented as9 characters following the letter indicating the file type. The first three letters indicate the rights that theowner jerry has on the file; rw- in the case of file dead. letter, corresponding to read and writepermissions. The next three indicate the rights that the group has. In the case of the file proposal, whichbelongs to the group mungi, the permissions are r--. This means that all members of the group mungihave read permissions on the file. The last three letters indicate the rights that other users in the systemhave on the files. All of the files in the example have rights --- in this field. This means that others usershave no access to these files.

UNIX provides a protected procedure call through the use of set-user-id programs. When executed, theseprograms run with the user id of the program’s owner, usually root (the superuser to whom no accessrights checks are applied). An example of this on Linux is

unix> is /usr/bin/passwd-r-s--x--x 1 root root 22312 Sep 26 1999 /usr/bin/passwd

In the above example, the execute bit on the passwd file is set to s instead of x. This means that if anyuser executes this file it will run with the user id of root. This allows users to modify the passworddatabase, which is an operation which they are normally prevented from doing.

The access permissions on files are reasonably obvious, how they interact with directories I will coveranother time.

The UNIX protection model is simple and well known. It does, however, have a number of drawbacks anda couple of tricks that we can use.

- 33 - September 2000

Page 36: The Journal of AUUG Inc.minnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V21.3.pdf · go figure!2 However the firewall did allow SSH through - good, a nice secure protocol for secure

The first problem is the granularity of protection. A file can only ever have one owner and belong to onegroup. This prevents more than one group having access to a file. Compounding this problem is the factthat only the system administrator is able to create groups in UNIX, restricting the users ability to tailorprotection for their files. For example sharing a file with a person that shares no groups with you isdifficult, the only options we have are: share with group, or share with all other users. The default, I tendto find, is that files that are meant to be shared are usually made world readable.

Note: Most modem UNIXes do provide full Access Control Lists (that is allow you to specify the level ofaccess to a file for any user), Linux exk2 seems to have source code hooks for it, but no implementationas yet.

The second problem is that set-user-id programs have been the cause of many security breaches in UNIXsystems, Set-user-id programs that are used to perform system duties (such as adding a file to the printerqueue) usually are set to be uid rook, as rook is the only user that is guaranteed to be able to access thecaller’s file. This is in gross violation of the principle of least privilege, in that a process that only needs tohave the rights to access a user file and a printer spooler actually has access to all the files in the system.

The third problem is that there are no permission checks for rook (at least on linux exk2, I don’t haveaccess to a non-linux box that I have rook on). This means that if you have a file that is read-only to rookthen the permissions will not remind you that the file should not be writable. (which is why we shouldalias rrn to rm -±)

A little useful trick to finish off. In UNIX Permissions are checked in the order user, group, other. As soonas permissions are found to be denied the search stops. This means that if you have

unix> is testfile-rw ..... rw- 1 jerry mungi 22 Oct 15 1996 testfile

permissions on a file, any members of the group mung± would NOT have permission on this file, while allother users would. This allows you deny access particular group of people.

I hope that this has given some insight to UNIX file permissions, ’till next time, I will talk aboutpermissions on directories and what they mean

Dear AUUG members,

As an incentive to submit itemslarticleslphotos/whatever to AUUGN, we areintroducing AUUGN Donor Points.

You can use your AUUGN Donor Points to purchase random stuff provided fromtime to time by the AUUG Management Committee. Perhapsmembership/conference/symposium discounts, T-shirts, software distributions,mugs, caps or other geeky paraphernalia.

To qualify for AUUGN donor points, you merely submit an article (and have itpublished) in AUUGN. The better the article the more AUUGN Donor Points...

The awarding of AUUGN Donor Points is entirely at the discretion of the AUUGNEditor.

The topic is open for discussion. We want to know what you think of this idea, soplease join the new AUUG mailing list [email protected] and tell us what you wantfor your AUUGN points.

AUUGN Vol.21 ¯ No.3 - 34 -

Page 37: The Journal of AUUG Inc.minnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V21.3.pdf · go figure!2 However the firewall did allow SSH through - good, a nice secure protocol for secure

AUUG Chapter Meetingsand Contact Details

BRISBANE Inn on the Park For further information, contact theQAUUG507 Coronation Drive Executive Committee via email(qauug-Toowong [email protected]). The techno-logicallydeprived

can contact Rick Stevenson on (07) 5578-8933.

To subscribe to the QAUUG announcementsmailing list, please send an e-mail message to:<maj [email protected], au> containing the

message "subscribe qauug <e-mail address>" in thee-mail body.

CANBERRA Australian National University AUUG (Canberra) run (semi) regular monthlymeetings held at 7:30pm in Cellar Bar/FellowsGarden at University House, Balmain Cres, ANU;on the second Tuesday of the month

HOBART University of Tasmania

MELBOURNE Various. For updated informationThe meetings alternate between TechnicalSee: presentations in the odd numbered months and

purely social occasions in the even numberedhttp://www.vic, auug.org, au/auugmonths. Some attempt is made to fit other AUUGvic/av_meetings.html activities into the schedule with minimum

disruption.

PERTH The Victoria League Meeting commences at 6.15pm276 Onslow RoadShenton Park

SYDNEY The Wesley CentrePitt StreetSydney 2000

Up-to-date information is available by calling AUUG on 1800 625 655.

- 35 - September 2000

Page 38: The Journal of AUUG Inc.minnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V21.3.pdf · go figure!2 However the firewall did allow SSH through - good, a nice secure protocol for secure

AUUGN Vol.21 ¯ No.3 - 36 -

Page 39: The Journal of AUUG Inc.minnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V21.3.pdf · go figure!2 However the firewall did allow SSH through - good, a nice secure protocol for secure

Section A: MEMBER DETAILSThe primary contact holds the full member voting rights and two designated representatives will be given membership rates to AUUGactivities including chapter activities. In addition t-o tee prima~ and two representatives, additional representatives can be included at arate of $88 each. Please attach a separate sheet with details of all representatives to be included with your membership.

NAME OF ORGANISATION:

Primary Contact

Surname First NameTitle: PositionAddressSuburb StateTelephone: Business FacsimileEmail Local Chapter Preference

Postcode

Section B: MEMBERSHIP INFORMATION.

Renewal/New Institutional Membership of AUUG ~ $429.00(including Primary and Two Representatives)

Surcharge for International Air Mail [~ $132.00

Additional Representatives Number [~ @ $88.00

Rates valid as at 1 March 2000. Memberships valid through to 30 June 2001 and include 10% GST.

Section C: PAYMENTCheques to be made payable to AUUG Inc (Payment in Australian Dollars only)

For all overseas applications, a bank draft drawn on an Australian bank is required.

Section D: MAILING LISTSAUUG mailing lists are sometimes made available to vendors. Pleaseindicate whether you wish your name to be included on these lists:

[~ Yes [~ No

Section E: AGREEMENTI/We agree that this membership will be subject to rules and by-laws of AUUG asin force from time to time, and that this membership will run from time of join-ing/renewal until the end of the calendar or financial year.

I/We understand that I/we will receive two copies of the AUUG newsletter, andPlease do not send purchase orders.

Please debit my credit card for AS,

[~ Bankcard

Name on CardCard NumberExpiry DateSignature

Visa Q Mastercard

Please mail completed form with payment to:

Reply Paid 66AUUG Membership SecretaryPO Box 366KENSINGTON NSW 2033

Or Fax to:

AUUG Inc(02) 8824 9522

may send two representatives to AUUG sponsored events at member rates,though I/we will have only one vote in AUUG elections, and other ballots asrequired.

Signed:

Title:

Date:

Chq: bank bsbA/C: #Date: $Initia# Date Processed:Membership#:

UNIX~AND OPEN SYSTEMS USERS

AUUG IncPO Box 366, Kensington NSW 2033, Australia

Tel: (02) 8824 9511Free Call: 1 800 625 655

Fax: (02) 8824 9522email: [email protected]

ACN A00 166 36N (incorporated in Victoria)

Page 40: The Journal of AUUG Inc.minnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V21.3.pdf · go figure!2 However the firewall did allow SSH through - good, a nice secure protocol for secure

AUUG Inc is the Australian UNIX andOpen Systems User Group, providing

users with relevant and practicalinformation, services and educationthrough co-operation among users.

Educatio.n

AUUGNTechnical Newsletter

AUUG’s quarterly

t publication, keeping youup to date with the

Tutorials world of UNIX andWorkshops open systems.

!Events ..... Events ...... Events

Annual Conference & Exhibition¯ Overseas Speakers ¯ Local Conferences

¯ Roadshows ¯ Monthly Meetings

IDISCOUNTS

to all A UUG events andeducation.

Reciprocal arrangements withoverseas affiliates.

Discounts with variousinternet service providers,software, publications and

more...Lt

¯ Newsgroupaus.org.auug

Section A: PERSONAL DETAILS

SurnameTitle:OrganisationAddressSuburbTelephone: BusinessFacsimile:

Section B: MEMBERSHIP INFORMATIONPlease indicate whether you require Student or Individual Membership byticking the appropriate box.

First NamePosition

State PostcodePrivate

E-mail

Section F: PAYMENTCheques to be made payable to AUUG Inc(Payment in Australian Dollars only)

RENEWAL/NEW INDIVIDUAL MEMBERSHIP

Renewal/New Membership of AUUG

RENEWAL!NEW STUDENT MEMBERSHIP

Renewal/New,Membership of AUUG(Please comptete Section C)

SURCHARGE FOR INTERNATIONAL AIR MAIL l---]l

$110.00

$27.50

$66.00

For all overseas applications, a bank draft drawn on an Australian bankis required. Please do not send purchase orders.

-OR-

Please debit my credit card for A$

[~ Bankcard [~ Visa ~ Mastercard

Rates valid as at 1 March 2000. Memberships valid through to 30 June 2001 and include 10% GST.

Section C: STUDENT MEMBER CERTIFICATIONFor those applying for Student Membership, this section is required to becompleted by a member of the academic staff.

I hereby certify, that the applicant on this form is a full time student and that thefollowing details are correct.

NAME OF STUDENT:

Name on CardCard NumberExpiry DateSignature

Please mail completed form with payment to:

Reply Paid 66

Or Fax to:

AUUG Inc

INSTITUTION:

STUDENT NUMBER:

SIGNED:

NAME:

TITLE:

DATE:

Section D: LOCAL CHAPTER PREFERENCE

AUUG Membership SecretaryPO Box 366KENSINGTON NSW 2033AUSTRALIA

(02) 8824 9522

Section G: AGREEMENTI agree that this membership will be subject to rules and by-laws of AUUG as in force from time to time, and that thismembership will run from time of joining/renewal until the endof the calendar or financial year.

By default your closest local chapter will receive a percentage of yourmembership fee in support of local activities. Should you choose to elect anotherchapter to be the recipient please specify here:

Section E: MAILING LISTSAUUG mailing lists are sometimes made available to vendors. Please indicatewhether you wish your name to be included on these lists:

[~ Yes [~ No

Signed:Date:

Chq: bank bsbA/C: #Date: $Initial’. Date Processed:Membership#: