Rocksolid Light

Welcome to novaBBS (click a section below)

mail  files  register  newsreader  groups  login

Message-ID:  

AUTHOR FvwmAuto just appeared one day, nobody knows how. -- FvwmAuto(1x)


computers / alt.folklore.computers / Re: oldusenet project

SubjectAuthor
* Re: oldusenet projectJorgen Grahn
+* Re: oldusenet projectDennis Boone
|`* Re: oldusenet projectPeter Flass
| `* Re: oldusenet projectTheo
|  `- Re: oldusenet projectJohnny Billquist
`* Re: oldusenet projectJohnny Billquist
 `* Re: oldusenet projectAhem A Rivet's Shot
  `- Re: oldusenet projectJorgen Grahn

1
Re: oldusenet project

<slrntqu510.h7h.grahn+nntp@frailea.sa.invalid>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=7459&group=alt.folklore.computers#7459

  copy link   Newsgroups: alt.folklore.computers
Path: i2pn2.org!i2pn.org!usenet.goja.nl.eu.org!3.eu.feeder.erje.net!feeder.erje.net!news-2.dfn.de!news.dfn.de!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: grahn+n...@snipabacken.se (Jorgen Grahn)
Newsgroups: alt.folklore.computers
Subject: Re: oldusenet project
Date: 30 Dec 2022 16:38:56 GMT
Lines: 35
Message-ID: <slrntqu510.h7h.grahn+nntp@frailea.sa.invalid>
References: <k06fg5F71hjU1@mid.individual.net>
<20221217184100.39310119445ca7b3b2a04ced@eircom.net>
<tnsg63$5tr$1@news.misty.com>
X-Trace: individual.net O3rLY1AzK7Qgo4YNFV1L4AziH51QYmUgYAshAOcft7YH9SUbGE
Cancel-Lock: sha1:qO/HHL+PPl9lidiCLqNpVlRuI1Q=
User-Agent: slrn/1.0.3 (OpenBSD)
 by: Jorgen Grahn - Fri, 30 Dec 2022 16:38 UTC

On Tue, 2022-12-20, Johnny Billquist wrote:
> On 2022-12-17 19:41, Ahem A Rivet's Shot wrote:
>> On 17 Dec 2022 18:18:45 GMT
>> Tavis Ormandy <taviso@gmail.com> wrote:
>>
>>> /\\ _o) _o) $ finger taviso@sdf.org
>>
>> Now that's the first publicly visible finger server I've seen in
>> decades.
>
> Gromit:bqt/mytcp> finger @mim.stupi.net
> [mim.stupi.net]
> RSX-11M-PLUS system MIM. Tue Dec 20 15:16:49 2022. Up: 0 days, 13:04.
>
> Luser Real name Term Idle Logged in
> BILLQUIST Johnny Billquist TT10: 10:57 20 Dec 04:18
> BILLQUIST Johnny Billquist TT11: 3 20 Dec 04:18
> BILLQUIST Johnny Billquist TT12: 33 20 Dec 14:09
> Gromit:bqt/mytcp>

% finger @snipabacken.se
Login Name Tty Idle Login Time Office Office Phone
grahn Jorgen Grahn p1 1:28 Fri 08:03
grahn Jorgen Grahn p3 - Fri 15:42

(I never understood what's so insecure about finger. It's not as if
I allow telnet access, or ssh access without public-key auth. People
can learn where I am and when, but right now -- and since it's under
my control -- I don't mind.)

/Jorgen

--
// Jorgen Grahn <grahn@ Oo o. . .
\X/ snipabacken.se> O o .

Re: oldusenet project

<Do6cnWonou5vrDL-nZ2dnZfqnPidnZ2d@giganews.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=7461&group=alt.folklore.computers#7461

  copy link   Newsgroups: alt.folklore.computers
Path: i2pn2.org!i2pn.org!usenet.blueworldhosting.com!feed1.usenet.blueworldhosting.com!peer02.iad!feed-me.highwinds-media.com!news.highwinds-media.com!Xl.tags.giganews.com!local-1.nntp.ord.giganews.com!news.giganews.com.POSTED!not-for-mail
NNTP-Posting-Date: Fri, 30 Dec 2022 18:46:10 +0000
Sender: Dennis Boone <drb@yagi.h-net.org>
From: drb...@ihatespam.msu.edu (Dennis Boone)
Subject: Re: oldusenet project
Newsgroups: alt.folklore.computers
References: <k06fg5F71hjU1@mid.individual.net> <20221217184100.39310119445ca7b3b2a04ced@eircom.net> <tnsg63$5tr$1@news.misty.com> <slrntqu510.h7h.grahn+nntp@frailea.sa.invalid>
User-Agent: tin/2.6.1-20211226 ("Convalmore") (FreeBSD/13.1-RELEASE-p2 (amd64))
Message-ID: <Do6cnWonou5vrDL-nZ2dnZfqnPidnZ2d@giganews.com>
Date: Fri, 30 Dec 2022 18:46:10 +0000
Lines: 14
X-Usenet-Provider: http://www.giganews.com
X-Trace: sv3-YhI45vdlw/ZqVD+/fFOjol4kf3yQyOPGX6BSoF2K7D55qL9KOFWYIRINVkgNV6N9DWle2urYvYbBy46!SlXJSqu2Iy7VBymR2e+wez7SfT7QyT8ct2HEcztmJiZqRVdnLXcnAvidHSBnwY9Gj0bHcdU=
X-Complaints-To: abuse@giganews.com
X-DMCA-Notifications: http://www.giganews.com/info/dmca.html
X-Abuse-and-DMCA-Info: Please be sure to forward a copy of ALL headers
X-Abuse-and-DMCA-Info: Otherwise we will be unable to process your complaint properly
X-Postfilter: 1.3.40
X-Received-Bytes: 1771
 by: Dennis Boone - Fri, 30 Dec 2022 18:46 UTC

> (I never understood what's so insecure about finger. It's not as if
> I allow telnet access, or ssh access without public-key auth. People
> can learn where I am and when, but right now -- and since it's under
> my control -- I don't mind.)

The original implementation tended to have the usual buffer management
issues, and also exposed actual live usernames, login status, etc.
This sort of thing gives away information that could be useful in an
attack.

Newer implementations that let you control what information is shown,
and have been better secured, etc.

De

Re: oldusenet project

<1931805675.694129506.151126.peter_flass-yahoo.com@news.eternal-september.org>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=7464&group=alt.folklore.computers#7464

  copy link   Newsgroups: alt.folklore.computers
Path: i2pn2.org!i2pn.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: peter_fl...@yahoo.com (Peter Flass)
Newsgroups: alt.folklore.computers
Subject: Re: oldusenet project
Date: Fri, 30 Dec 2022 14:45:33 -0700
Organization: A noiseless patient Spider
Lines: 24
Message-ID: <1931805675.694129506.151126.peter_flass-yahoo.com@news.eternal-september.org>
References: <k06fg5F71hjU1@mid.individual.net>
<20221217184100.39310119445ca7b3b2a04ced@eircom.net>
<tnsg63$5tr$1@news.misty.com>
<slrntqu510.h7h.grahn+nntp@frailea.sa.invalid>
<Do6cnWonou5vrDL-nZ2dnZfqnPidnZ2d@giganews.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Info: reader01.eternal-september.org; posting-host="22f6032da9c4423f3a3ebc834bf51d9b";
logging-data="824228"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+s8pHzAjqGVCuv2mGq8Sd2"
User-Agent: NewsTap/5.3.1 (iPad)
Cancel-Lock: sha1:H0qLK1/ZPR2pHHboZR49MtAz3s0=
sha1:d4t9lUErR50SAd3Ml2qF94X5dEI=
 by: Peter Flass - Fri, 30 Dec 2022 21:45 UTC

Dennis Boone <drb@ihatespam.msu.edu> wrote:
> > (I never understood what's so insecure about finger. It's not as if
> > I allow telnet access, or ssh access without public-key auth. People
> > can learn where I am and when, but right now -- and since it's under
> > my control -- I don't mind.)
>
> The original implementation tended to have the usual buffer management
> issues, and also exposed actual live usernames, login status, etc.
> This sort of thing gives away information that could be useful in an
> attack.

Sort of like Facebook, I guess.

>
> Newer implementations that let you control what information is shown,
> and have been better secured, etc.
>
> De
>

--
Pete

Re: oldusenet project

<topamh$9u4$2@news.misty.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=7479&group=alt.folklore.computers#7479

  copy link   Newsgroups: alt.folklore.computers
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!news.misty.com!.POSTED.82-209-141-190.cust.bredband2.com!not-for-mail
From: bqt...@softjar.se (Johnny Billquist)
Newsgroups: alt.folklore.computers
Subject: Re: oldusenet project
Date: Sat, 31 Dec 2022 13:41:53 +0100
Organization: MGT Consulting
Message-ID: <topamh$9u4$2@news.misty.com>
References: <k06fg5F71hjU1@mid.individual.net>
<20221217184100.39310119445ca7b3b2a04ced@eircom.net>
<tnsg63$5tr$1@news.misty.com> <slrntqu510.h7h.grahn+nntp@frailea.sa.invalid>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Sat, 31 Dec 2022 12:41:53 -0000 (UTC)
Injection-Info: news.misty.com; posting-host="82-209-141-190.cust.bredband2.com:82.209.141.190";
logging-data="10180"; mail-complaints-to="abuse@misty.com"
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
Gecko/20100101 Thunderbird/91.13.1
Content-Language: en-US
In-Reply-To: <slrntqu510.h7h.grahn+nntp@frailea.sa.invalid>
 by: Johnny Billquist - Sat, 31 Dec 2022 12:41 UTC

On 2022-12-30 17:38, Jorgen Grahn wrote:
> On Tue, 2022-12-20, Johnny Billquist wrote:
>> On 2022-12-17 19:41, Ahem A Rivet's Shot wrote:
>>> On 17 Dec 2022 18:18:45 GMT
>>> Tavis Ormandy <taviso@gmail.com> wrote:
>>>
>>>> /\\ _o) _o) $ finger taviso@sdf.org
>>>
>>> Now that's the first publicly visible finger server I've seen in
>>> decades.
>>
>> Gromit:bqt/mytcp> finger @mim.stupi.net
>> [mim.stupi.net]
>> RSX-11M-PLUS system MIM. Tue Dec 20 15:16:49 2022. Up: 0 days, 13:04.
>>
>> Luser Real name Term Idle Logged in
>> BILLQUIST Johnny Billquist TT10: 10:57 20 Dec 04:18
>> BILLQUIST Johnny Billquist TT11: 3 20 Dec 04:18
>> BILLQUIST Johnny Billquist TT12: 33 20 Dec 14:09
>> Gromit:bqt/mytcp>
>
> % finger @snipabacken.se
> Login Name Tty Idle Login Time Office Office Phone
> grahn Jorgen Grahn p1 1:28 Fri 08:03
> grahn Jorgen Grahn p3 - Fri 15:42
>
> (I never understood what's so insecure about finger. It's not as if
> I allow telnet access, or ssh access without public-key auth. People
> can learn where I am and when, but right now -- and since it's under
> my control -- I don't mind.)

Well, the theory is that even finding out the usernames existing on a
system is a security issue.

I myself disagree, and have no real issue with revealing that
information, so I keep finger running.

For the same reason, identd is sometimes being blocked, and can be
configured no not actually reveal usernames, but just UIDs.

Johnny

Re: oldusenet project

<20221231132032.667b069cf24663e613095074@eircom.net>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=7480&group=alt.folklore.computers#7480

  copy link   Newsgroups: alt.folklore.computers
Path: i2pn2.org!i2pn.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: ste...@eircom.net (Ahem A Rivet's Shot)
Newsgroups: alt.folklore.computers
Subject: Re: oldusenet project
Date: Sat, 31 Dec 2022 13:20:32 +0000
Organization: A noiseless patient Spider
Lines: 13
Message-ID: <20221231132032.667b069cf24663e613095074@eircom.net>
References: <k06fg5F71hjU1@mid.individual.net>
<20221217184100.39310119445ca7b3b2a04ced@eircom.net>
<tnsg63$5tr$1@news.misty.com>
<slrntqu510.h7h.grahn+nntp@frailea.sa.invalid>
<topamh$9u4$2@news.misty.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Injection-Info: reader01.eternal-september.org; posting-host="feb39cfa0fda3cdd37b82658cec069d1";
logging-data="1088371"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18tffYRtQ0ThfysczSuiaP5hs6s9KJAAUw="
Cancel-Lock: sha1:TgEp+NN+tJjgRbno8rMmIDD5IR8=
X-Clacks-Overhead: "GNU Terry Pratchett"
X-Newsreader: Sylpheed 3.7.0 (GTK+ 2.24.33; amd64-portbld-freebsd13.0)
 by: Ahem A Rivet's - Sat, 31 Dec 2022 13:20 UTC

On Sat, 31 Dec 2022 13:41:53 +0100
Johnny Billquist <bqt@softjar.se> wrote:

> Well, the theory is that even finding out the usernames existing on a
> system is a security issue.

On a typical university system with hundreds of student accounts it
could very well be enough to make a low rate dictionary attack yield an
entry point.

--
Steve O'Hara-Smith
Odds and Ends at http://www.sohara.org/

Re: oldusenet project

<oxk*8Zb7y@news.chiark.greenend.org.uk>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=7481&group=alt.folklore.computers#7481

  copy link   Newsgroups: alt.folklore.computers
Path: i2pn2.org!i2pn.org!aioe.org!nntp.terraraq.uk!nntp-feed.chiark.greenend.org.uk!ewrotcd!.POSTED.chiark.greenend.org.uk!not-for-mail
From: theom+n...@chiark.greenend.org.uk (Theo)
Newsgroups: alt.folklore.computers
Subject: Re: oldusenet project
Date: 31 Dec 2022 17:40:02 +0000 (GMT)
Organization: University of Cambridge, England
Message-ID: <oxk*8Zb7y@news.chiark.greenend.org.uk>
References: <k06fg5F71hjU1@mid.individual.net> <20221217184100.39310119445ca7b3b2a04ced@eircom.net> <tnsg63$5tr$1@news.misty.com> <slrntqu510.h7h.grahn+nntp@frailea.sa.invalid> <Do6cnWonou5vrDL-nZ2dnZfqnPidnZ2d@giganews.com> <1931805675.694129506.151126.peter_flass-yahoo.com@news.eternal-september.org>
Injection-Info: chiark.greenend.org.uk; posting-host="chiark.greenend.org.uk:212.13.197.229";
logging-data="2985"; mail-complaints-to="abuse@chiark.greenend.org.uk"
User-Agent: tin/1.8.3-20070201 ("Scotasay") (UNIX) (Linux/5.10.0-15-amd64 (x86_64))
Originator: theom@chiark.greenend.org.uk ([212.13.197.229])
 by: Theo - Sat, 31 Dec 2022 17:40 UTC

Peter Flass <peter_flass@yahoo.com> wrote:
> Dennis Boone <drb@ihatespam.msu.edu> wrote:
> > > (I never understood what's so insecure about finger. It's not as if
> > > I allow telnet access, or ssh access without public-key auth. People
> > > can learn where I am and when, but right now -- and since it's under
> > > my control -- I don't mind.)
> >
> > The original implementation tended to have the usual buffer management
> > issues, and also exposed actual live usernames, login status, etc.
> > This sort of thing gives away information that could be useful in an
> > attack.
>
> Sort of like Facebook, I guess.

I think there might have been some stalking incidents on university systems
where you could finger someone and find out how recently they read their
mail and where from. If the recently was 'now', that told you where they
were logged in currently. If it was from 'studentpc42.physics.example.edu'
then you knew their precise location. It could also leak sidechannel
information, eg if the student was an English major we can infer that they
knew somebody in physics who let them in to the physics building, etc.

Theo

Re: oldusenet project

<slrntr1epg.h7h.grahn+nntp@frailea.sa.invalid>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=7482&group=alt.folklore.computers#7482

  copy link   Newsgroups: alt.folklore.computers
Path: i2pn2.org!i2pn.org!usenet.goja.nl.eu.org!3.eu.feeder.erje.net!feeder.erje.net!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: grahn+n...@snipabacken.se (Jorgen Grahn)
Newsgroups: alt.folklore.computers
Subject: Re: oldusenet project
Date: 31 Dec 2022 22:44:00 GMT
Lines: 23
Message-ID: <slrntr1epg.h7h.grahn+nntp@frailea.sa.invalid>
References: <k06fg5F71hjU1@mid.individual.net>
<20221217184100.39310119445ca7b3b2a04ced@eircom.net>
<tnsg63$5tr$1@news.misty.com>
<slrntqu510.h7h.grahn+nntp@frailea.sa.invalid>
<topamh$9u4$2@news.misty.com>
<20221231132032.667b069cf24663e613095074@eircom.net>
X-Trace: individual.net cjNtCUgpRVCaiKG9WQXCvgDwSRZffO2gsGCq7NtimfCS4QHuUC
Cancel-Lock: sha1:AuMR+KneXhXyPVG3p2r5V6wpj64=
User-Agent: slrn/1.0.3 (OpenBSD)
 by: Jorgen Grahn - Sat, 31 Dec 2022 22:44 UTC

On Sat, 2022-12-31, Ahem A Rivet's Shot wrote:
> On Sat, 31 Dec 2022 13:41:53 +0100
> Johnny Billquist <bqt@softjar.se> wrote:
>
>> Well, the theory is that even finding out the usernames existing on a
>> system is a security issue.
>
> On a typical university system with hundreds of student accounts it
> could very well be enough to make a low rate dictionary attack yield an
> entry point.

Hopefully, today few expose plain password login over the network ...
although I don't know the challenges faces by a university sysadmin --
maybe they need insecure auth for legacy reasons.

Me, I just configure my personal ssh server with
'PasswordAuthentication no' and then I don't worry much.

/Jorgen

--
// Jorgen Grahn <grahn@ Oo o. . .
\X/ snipabacken.se> O o .

Re: oldusenet project

<tos6ns$q39$1@news.misty.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=7487&group=alt.folklore.computers#7487

  copy link   Newsgroups: alt.folklore.computers
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!news.misty.com!.POSTED.82-209-141-190.cust.bredband2.com!not-for-mail
From: bqt...@softjar.se (Johnny Billquist)
Newsgroups: alt.folklore.computers
Subject: Re: oldusenet project
Date: Sun, 1 Jan 2023 15:52:43 +0100
Organization: MGT Consulting
Message-ID: <tos6ns$q39$1@news.misty.com>
References: <k06fg5F71hjU1@mid.individual.net>
<20221217184100.39310119445ca7b3b2a04ced@eircom.net>
<tnsg63$5tr$1@news.misty.com> <slrntqu510.h7h.grahn+nntp@frailea.sa.invalid>
<Do6cnWonou5vrDL-nZ2dnZfqnPidnZ2d@giganews.com>
<1931805675.694129506.151126.peter_flass-yahoo.com@news.eternal-september.org>
<oxk*8Zb7y@news.chiark.greenend.org.uk>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Sun, 1 Jan 2023 14:52:44 -0000 (UTC)
Injection-Info: news.misty.com; posting-host="82-209-141-190.cust.bredband2.com:82.209.141.190";
logging-data="26729"; mail-complaints-to="abuse@misty.com"
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
Gecko/20100101 Thunderbird/91.13.1
Content-Language: en-US
In-Reply-To: <oxk*8Zb7y@news.chiark.greenend.org.uk>
 by: Johnny Billquist - Sun, 1 Jan 2023 14:52 UTC

On 2022-12-31 18:40, Theo wrote:
> Peter Flass <peter_flass@yahoo.com> wrote:
>> Dennis Boone <drb@ihatespam.msu.edu> wrote:
>>> > (I never understood what's so insecure about finger. It's not as if
>>> > I allow telnet access, or ssh access without public-key auth. People
>>> > can learn where I am and when, but right now -- and since it's under
>>> > my control -- I don't mind.)
>>>
>>> The original implementation tended to have the usual buffer management
>>> issues, and also exposed actual live usernames, login status, etc.
>>> This sort of thing gives away information that could be useful in an
>>> attack.
>>
>> Sort of like Facebook, I guess.
>
> I think there might have been some stalking incidents on university systems
> where you could finger someone and find out how recently they read their
> mail and where from. If the recently was 'now', that told you where they
> were logged in currently. If it was from 'studentpc42.physics.example.edu'
> then you knew their precise location. It could also leak sidechannel
> information, eg if the student was an English major we can infer that they
> knew somebody in physics who let them in to the physics building, etc.

Knowing if someone is online isn't done by looking at when mail was
read. That is silly. Finger directly reports if you are online or not.
And if not, when you last logged in.

But sure, you can certainly stalk someone, and then any kind of
information can be considered bad.

Johnny

1
server_pubkey.txt

rocksolid light 0.9.8
clearnet tor