The Good Old Days: Networking in UK Academia 25 Years Ago

For those of us who were lucky enough to be around in the UK academic community in the late 80’s and early 90’s there’s a nice reminder of just how, well, interesting things were in the paper “The Good Old Days: Networking in UK Academia 25 Years Ago” by Jim Reid (who was at Strathclyde then) from the 7th UK Network Operators’ Forum in 2007.

Those were the days when we had to think about obtaining RFC’s by email rather than FTP (no, there was no WWW in 1988) and waiting until 2am to play MIST at Essex, hoping not to get disconnected from JANET 15 minutes later because of the Aberystwyth Ethergate of Death. 🙂

*** TS RESET
*** TS RESET
*** TS RESET

00 00 Call Disconnected

Vacation 1.2.7.0 Released!

I’m happy to announce the release of Vacation 1.2.7.0.

This is a complete rebase of the current Vacation code base from the closely related version at http://savannah.nongnu.org/cvs/?group=vacation which had been released under the two clause BSD license (no advertising clause).

This means Vacation finally links legally with the GPL’d GDBM (something I don’t believe people previously realised)!

New features in this version are:

  • Vacation will not reply to emails that have the SpamAssassin “X-Spam-Status: Yes” header, thanks to Roberto Piola.
  • It uses the OpenBSD secure string handling functions strlcat and strlcpy and use of sprintf has been changed to snprintf to enhance resilience.
  • Vacation now uses Eric Raymonds rfc822.c library from his Unix Cookbook for much better parsing RFC2822 email addresses.
  • Should (hopefully!) compile on FreeBSD thanks to Marshal Newrock.
  • Vacation will silently create its database if it is missing (previously it just crashed!).
  • Lots of bug fixes!

This version (still) does not implement support for folded headers for those headers it worries about (From:, Reply-To:, etc), that requires a major reworking of the code that is currently underway in the trunk of the Subversion repository.

Thanks to all those who’ve submitted bug fixes, requested enhancements and sent patches, especially Roberto Piola, Marshal Newrock and Daniel Pittman.

You can download the program from http://sourceforge.net/project/showfiles.php?group_id=3852&package_id=3820&release_id=611078.

Recovering files from a ZFS/FUSE snapshot under Linux

A week ago I had a hairy crash when stopping ZFS/FUSE on my box, which I mentioned on the ZFS/FUSE mailing list. I upgraded from 2.6.25.4 to 2.6.26-rc7 and in the process blew away the kernel build tree for the 2.6.25.4 kernel to recover the disk space. Shortly after that I received a query off-list from Miklos Szeredi, the FUSE maintainer, asking if I could supply him a disassembly of the offending function from the kernel build – which was now consigned to the bit bucket. 🙁

Fortunately I’ve been regularly rsync’ing various important parts of my computer onto ZFS/FUSE partitions and snapshoting them with timestamps so I (theoretically) was only a few commands away from getting to the defunct kernel tree once more. The problem is that unfortunately you can’t look at a ZFS/FUSE snapshot directly at the moment, it’s one of the parts that is still to be gotten working under Linux.

Luckily there is a trick to be able to get access, which is is to create a clone of the snapshot. The ZFS Administration Guide describes a clone thus:

A clone is a writable volume or file system whose initial contents are the same as the dataset from which it was created. As with snapshots, creating a clone is nearly instantaneous, and initially consumes no additional disk space. In addition, you can snapshot a clone.

The magic command to do this was just:

zfs clone ZFS/home@20080606-2201 ZFS/temp

and suddenly I had /srv/ZFS/temp, a fully working version of this machines /home directory as it was around 10pm on the 6th June and in it was the kernel tree.

Very nice!

Applying Graphics Cards to Password Cracking

On the Beowulf list there has been a long thread on GPGPU and especially nVidia’s CUDA language. As part of it Prentice Bisbal posted about a friend of his, Mario Juric, who decided to write a proof of concept MD5 password hashing program to take advantage of CUDA.

In his message to the Beowulf list Prentice quoted Mario saying:

If you attempt to compute a single hash on an entire card, you won’t get any improvement. Same as you wouldn’t if you tried it on a single vs. quad core CPU. But if you compute four hashes, than single vs. quad makes a huge difference. And the GPU cards are effectively 128 core CPUs, so when you need to compute millions of hashes…

Now Mario Juric (who organised the AstroGPU workshop) has put up a web page on the program, which gives details of the sort of performance he got with a quick hack.

One way of visualizing this is noting that a single 8800 Ultra could brute-force break an MD5 hashed password of eight or less characters+numbers (A-Z, a-z, 0-9) in about ~16 days.

But this really is just a quick hack:

The MD5 code used here was written in less than 2 days, as a proof-of-concept, and with only a single one-liner GPU-specific optimization.

Of course if people do want to try playing with it the program is available, though at the moment there isn’t a software license included with it. I’ve emailed Mario about the license to see if he can clarify what the rules are.

Searching Photos by Drawing a Picture

OK, so maybe you’ve got a few hundred, or thousand, photos that you’ve taken, but how do you search them ? You could try and tag them for everything (if you’ve got the time) but wouldn’t it be nice if you could just draw a picture and search for that ?

Well the Digikam folks are working on that by incorporating some of the existing ImgSeek projects code into the KDE4 version of Digikam (0.10.0).

They’ve got a short video demo of it up on YouTube (embedded below).

Golden Shield – the brave new world of surveillance

The Rolling Stone has a good article (though a bit heavy on the breathless hype at times) about Golden Shield, China’s country-wide surveillance system that is in continuous development. It’s an ambitious project to pull together all sorts of data from HD-CCTV to mobile phone triangulation to Internet monitoring.

But the cameras that Zhang manufactures are only part of the massive experiment in population control that is under way here. “The big picture,” Zhang tells me in his office at the factory, “is integration.” That means linking cameras with other forms of surveillance: the Internet, phones, facial-recognition software and GPS monitoring.

One test that is about to happen (or probably already has happened) is the “10-million faces” test:

Yao is managing director of Pixel Solutions, a Chinese company that specializes in producing the new high-tech national ID cards, as well as selling facial-recognition software to businesses and government agencies. The test, the first phase of which is only weeks away, is being staged by the Ministry of Public Security in Beijing. The idea is to measure the effectiveness of face-recognition software in identifying police suspects. Participants will be given a series of photos, taken in a variety of situations. Their task will be to match the images to other photos of the same people in the government’s massive database. Several biometrics companies, including Yao’s, have been invited to compete. “We have to be able to match a face in a 10 million database in one second,” Yao tells me. “We are preparing for that now.

They can already match a face to multiple pictures of the same person in their internal database of 600,000 records in just over a millisecond.

The point of the test though is not just how bad surveillance is in China, it’s the fact that Western companies are clamouring to be involved, even using loopholes in legislation to avoid prohibitions on selling software for law enforcement use. Worse still is that post-9/11 Western obsession with surveillance has given China a golden opportunity to legitimise their own strategies:

Such efforts have provided China’s rulers with something even more valuable than surveillance technology from Western democracies: the ability to claim that they are just like us. Liu Zhengrong, a senior official dealing with China’s Internet policy, has defended Golden Shield and other repressive measures by invoking the Patriot Act and the FBI’s massive e-mail-mining operations. “It is clear that any country’s legal authorities closely monitor the spread of illegal information,” he said. “We have noted that the U.S. is doing a good job on this front.” Lin Jiang Huai, the head of China Information Security Technology, credits America for giving him the idea to sell biometric IDs and other surveillance tools to the Chinese police. “Bush helped me get my vision,” he has said. Similarly, when challenged on the fact that dome cameras are appearing three to a block in Shenzhen and Guangzhou, Chinese companies respond that their model is not the East German Stasi but modern-day London.

Sounds like a world that Eric Blair would recognise..

Indian comments on Microsoft pressure over OOXML

So we have now had a number of appeals from national bodies over the farcical approval of OOXML at the ISO BRM, so hopefully now we’ll get a proper review (and maybe even a final draft) of the standard that not even Microsoft is implementing.

As part of the associated fallout a letter from the Indian refusal to bow to Microsoft pressure to depart from common sense and to vote against OOXML Dr. Deepak B. Phatak has published an open letter to his fellow committee members detailing Microsofts inappropriate behaviour towards Indian organisations, government and individuals which includes the classic line:

My greatest angst against Microsoft is in their arrogance in telling Indian government about Indian ‘national interest’, particularly at the highest levels of the leadership. One really wonders whether they even properly understand what a nation is.

Good on ya!

Designing and Building Parallel Programs available online

Found via Ian Fosters blog on “Free Books“, his paper book “Designing and Building Parallel Programs: Concepts and Tools for Parallel Software Engineering” is available online at ANL for reference for no cost (though you’re not allowed to archive a copy without permission).

This isn’t something new, mind you, it was done 13 years ago in 1995 – quite forward thinking!