Threads for jimh

    1. 2

      Nice, I’ll try it, I didn’t know about unbound+rpz. How is the energized list working for you?

      1. 2

        Really well.

        total.num.queries=115665
        num.rpz.action.nxdomain=15100
        

        add rpz-log: yes to each rpz: section to be able to keep count of how often the rpz action occur.

        1. 2

          Sorry, n00b to RPZ: how often does unbound refresh the list from github?

          1. 2

            unbound treats the RPZ list or feed as if it were a real domain zone. So it will fetch it based on the TTL specified. Which is every 2 hours, based off looking at the top of the file.

    2. 3

      I’m ok with a single ad at the top of the page.

    3. 1

      In this situation there is no dispute form or ramification for this. I would point my domain A record @ IN A 127.0.0.1 and move pages or sites to a sub domain and monitor.

      1. 1

        That would limit traffic, but make our domain (sans subdomain) unusable. I guess the best one can do aside from your suggestion, in Apache language, is to make a “VirtualHost” and return a 404 on everything for as far as http(s) goes. This mitigates it somewhat, but for any other service you’re still not out of the woods.

        The problem sadly isn’t limited to websites. Requesting the domain’s MX record also returns a CNAME to us. Not smart from the owner: we could enable email for this domain. We don’t, but we could. But aside from that, email is far less easy to redirect. So it’s a very nasty problem.

        1. 2

          There are a variety of things you could serve to visitors making requests for other sites; eg a ‘name and shame’ of the other domain owner.

          On 1 Apr 2017, at 8:31 am, voidzero voidzero@lobste.rs wrote:

          That would limit traffic, but make our domain (sans subdomain) unusable. I guess the best one can do aside from your suggestion, in Apache language, is to make a “VirtualHost” and return a 404 on everything for as far as http(s) goes. This mitigates it somewhat, but for any other service you’re still not out of the woods.

          The problem sadly isn’t limited to websites. Requesting the domain’s MX record also returns a CNAME to us. Not smart from the owner: we could enable email for this domain. We don’t, but we could. But aside from that, email is far less easy to redirect. So it’s a very nasty problem.

          – Vote: https://lobste.rs/c/sj84jb

    4. 6

      This is what 2nd Factor Authentication is designed to prevent and why I turn it on and use it. It’s adds a step where the hacker would have to get HostMonster to turn off 2FA via a support ticket which would require them to verify my identity.

      1. 3

        I know for a fact at least one major domain registrar accepts forged IDs without questioning it.

        No further comment.

      1. 4

        Indeed. Automakers have been fighting the same fight as John Deere for decades. We have consumer protection laws, for instance, that allow a 3rd party to change the oil and make repairs in a car without voiding its factory warranty. It will be interesting to see how Telsa and the rise of the “rolling computer” change things.

    5. 8

      dd < source > target

      Author seems ignorant of origin of dd specifically, and UNIX coventions generally.

      1. 5

        While we’re at it: why does the head(1) command even exist?

        sed 11q

        1. 29

          Like a great many “oh it’s so simple” replacement commands, it’s not actually the same. sed 10q *.c and head *.c produce quite different results. I’m sure with enough work, you could cook up a shell script that does about the same. In the mean time, I’ll be using head.

          This reminds that for a long time FreeBSD had a note in the ls manpage explaining that there was no option for sorting by file size because look how easy it is to pipe the output to this sort command. Oh, but remember if you use ls -i the column count changes, so use this other sort command. And if you use ls -h for human readable numbers, first pipe the output through awk so the numbers are scaled properly. Anyway, while you’re trying to piece this all together, take a moment to reflect on how fortunate you are to bask in such pure unix essence.

          Oh, I forgot the best part. ls escapes control characters in output, but only when writing to a terminal. sort isn’t a terminal, so unless you want your terminal getting jacked up, you also have to introduce everybody’s favorite command, cat -v, into the mix.

          1. 1

            There is no substitute for typing dumb things into the computer except not typing dumb things into the computer. There will always be trade-offs. Understanding what a given program does with its input is the first step.

            1. 1

              I would posit the commands have dumb requirements (using the ls example given above by tedu)

          2. 4

            Some of the things in that list are a bit of a stretch. My favourite is the positively masochistic:

            while (! ~ (`{ date }) (specific-time)); commands
            

            as an apparent stand-in for at(1).

            1. 3

              I think the assumption is that you’d write your own little shell (rc shell, obviously) script containing something similar to the suggested command and call it “at”.

              The nice thing about Plan 9 is you could put it in /bin and it would be there no matter where your code was actually running…

              1. 9

                I’m not great at rc, but isn’t that a busy loop? If I want to schedule a job for after hours, I’m not sure my corworkers will appreciate pegging the CPU running date 10000 times per second. So you can add a sleep and some stuff, but now you’re just reinventing a square wheel.

                I’ll add that the script’s error handling also really sucks. Accidentally mistype the specific time? Loops forever…

                1. 2

                  A simple shell script is not in every case a superior replacement for a featureful program (especially if the shell language is complex and full of easy-to-trip gotchas), but the point of that list of comparison commands is to illustrate that with carefully considered primitives you can go a long way with very little. Probably not all of those examples are golden.

                2. 1

                  I think there’s also a bit of tongue-in-cheek humor there too.

                  1. 7

                    Like a lot of the plan9 holy scriptures, not all of the true believers seem to be in on the joke. :)

                    1. 3

                      I don’t think the cat -v paper or THE UNIX PROGRAMMING ENVIRONTMENT were intended as jokes. None of this is really about Plan 9, specifically. Plan 9 comes up in these discussions because its primary architect was the same guy who co-wrote those earlier texts, and incorporated his strongly argued preferences into the new system. Those preferences include things like: don’t write unnecessary code. The guys in 1127 at the Labs never bought into a lot of what went into BSD or even other Labs versions of UNIX, anyway. I don’t think it’s fair to dismiss the (admittedly, famously misunderstood) pov of UNIX because some individuals forty years later made bad arguments on the Internet or because a decade-old article in the user-contributed Plan 9 wiki made silly comparisons between then-modern UNIX commonplaces and obviated similar functions in Plan 9. Reading for content, the underlying point remains the same: Keep it simple, stupid.

                      1. 2

                        Funny you mention the cat -v paper. Towards the end, they build a columnizer out of pr, but of course they give it an alias instead of always typing a bunch of arbitrary arguments. Then they go on to suggest rewriting useful utilities in C. So to return to the original question of why we have head instead of telling users to memorize sed commands, I think there’s your answer.

                        1. 2

                          Are you misunderstanding me on purpose.

          3. 2

            HISTORY The head utility first appeared in 1BSD.

            AUTHORS Bill Joy, August 24, 1977.

      2. 5

        There’s lots of features that dd can do rather than output to a raw device. It can read non seekable file descriptors without destroying them. It may not be as fast as cat, but it operates at the block level instead of just STDOUT.

    6. 11

      The dump is mostly junk from some contractor’s home directory, no code or exploits, but lots of PDFs of file lists for possibly interesting stuff. I can’t help but feel like this is a distraction from the Russia story to discredit one of the agencies that has a painful relationship with Trump. I’m generally in favor of fairly radical transparency efforts, but I’m suspicious that the intention of whoever gave this material to WL was to distract, rather than illuminate.

      1. 16

        WL seems to be primarily operating as a Russian infowar asset these days, wittingly or not.

        1. 4

          And yet, they’ve never been shown to publish falsehoods.

          1. 13

            So? Lying is certainly not necessary to pursue an agenda.

      2. 3

        Unit Tests! The CIA’s secret NOFORN weapon!

        https://wikileaks.org/ciav7p1/cms/page_11629048.html

        1. 2

          There’s also a PDF in the dump… vault7/cms/files/Why-Most-Unit-Testing-is-Waste.pdf

          1. 4

            Eh. The James Coplien rant that went by awhile back.

            Of course, it occurs to me there are all these documents in a trove of documents from a bunch who are world class experts in exploiting bugs in document readers to infect systems….

            I do sort of wonder whether we haven’t been epically trolled by the CIA…

      3. 2

        Well, it’s a hell of a distraction.

    7. 1

      With the plethora of news articles of Uber breaking laws and being deceitful; this comes as no surprise. I am sure they will now be served subpoena’s for data and sued by more municipalities.