You are not logged in. Login Now
 0-24   25-49   50-74   75-99   100-124   125-149   150-174   175-199   200-224 
 225-249   250-274   275-299   300-324   325-349   350-374   360-384   385-409   410-434 
 435-459   460-484   485-509   510-534   535-547      
 
Author Message
25 new of 547 responses total.
aruba
response 385 of 547: Mark Unseen   May 29 03:07 UTC 2003

We finally received our OpenBSD CDs today - it took them 16 days to get here
from Calgary.  Stickers were included.
spooked
response 386 of 547: Mark Unseen   May 29 11:00 UTC 2003

I have an inkling Marcus won't ditch sendmail as readily as you might
wish, Dan.  It seems to be one of his favourite hacking toys.
janc
response 387 of 547: Mark Unseen   May 29 13:43 UTC 2003

I don't know what his plans are, but I'd be surprised if he didn't seriously
consider alternatives.  I think the port to OpenBSD is going to be a bit of
a "start over" for him even if he decides to stay with sendmail, because
moving all his modifications into a current sendmail release is going to
be nearly as much work as switching to a different program.  I don't think
he's really all that fond of sendmail.
cross
response 388 of 547: Mark Unseen   May 29 16:01 UTC 2003

He was talking about exim recently, but I still think postfix is a better
choice.  Grex isn't for people's personal hacking toys, anyway.
gull
response 389 of 547: Mark Unseen   May 29 17:05 UTC 2003

I use Exim, and it's certainly easier to configure than sendmail.  It
has a good, flexible filter language, too.  It doesn't have the same
privilage seperation features as Postfix, though -- it's still a
monolithic binary.
cross
response 390 of 547: Mark Unseen   May 29 19:31 UTC 2003

Yeah, that's one of my problems with exim.  I honestly believe that
postfix is just as powerful, can be made to do everything that grex
wants/needs, and is more secure.  I also argue that it's better documented.
mdw
response 391 of 547: Mark Unseen   Jun 3 07:14 UTC 2003

Major overload here.  Hm.

Regarding old hardware.  Even when we switch over, we'll want to keep
the old stuff intact for at least a bit in case of some sort of truely
disastrous problem with the new hardware.  Once we're comfortable, then
we can decommission it.  The disks, being slightly newer, may have some
slight use for other small projects.  Much of the data on them doesn't
really matter, but for mail, spool, user files, swap, and /etc, we
certainly want to scrub those before using them for other purposes or if
we decide to sell or give away any of them (even to my basement
collection).  Scrubbing them *is* going to be an easier way to ensure
reasonable security than destroying the disks.  This is because
sufficient physical destruction has its own issues.  Disassembling
things then bashing them with a hammer and using a bulk eraser may make
data recovery more difficult, but it may still leave traces of data that
could be recovered by the same sort of determined adversary that could
recover data from a "single overwrite of all 0" drive.  If that is the
level of security you want, then physical destruction would require
either a fairly good acid bath of all disk surfaces, or probably better
yet incineration of the aluminum platters.  No doubt we have pyromaniacs
would would enjoy doing this, and there are certainly services that will
do this (for a fee), but we'd probably be better off reserving these
drives for future small projects (such as offloading mail processing,
kerberos, etc.) or doing a multiple overwrite scrub procedure then
selling them on ebay.

Regarding kerberos.  Cross and I clearly have a unreconciable difference
of opinion here.  I'm clearly not going to change his opinion, there
seems little likelyhood he'll change mine, and I doubt most others share
even my level of paranoia or care all that much.  So I don't want to
waste time arguing this.  Cross (and any others who care) is welcome to
change his password just before & after switching to kerberos, which
should cover any personal concerns he may have.  Root & other passwords
will almost certainly change or be addressed by new mechanisms - this is
almost inherent in any switchover in any case.  Once we switch to k5,
baring unexpected changes to the standard, changing one's password will
likely result in a standards compliant k5 key at least potentially
useful from other machines.

Regarding mail.  Hm, I think some of this scrolled off.  Yes, we want to
keep hierarchical mail boxes.  The 4 possible mta's include exim,
postfix, current sendmail, & legacy/hacked sendmail.  Unfortunately,
mail is an area where we have significant functional requirements, which
means any stock solution out of the box will almost certainly prove
unacceptable.  One functional requirement is mailbox quotas, which at
least has simple design parameters.  Another functional requirement is
anti-spam logic, which is both controversial and important.  A final
functional requirement, unfortunately, is that this all needs to come up
in some finite amount of time.  I intend to look at exim & postfix, with
a view that one of these should a good enough base to support the
functionality we want.  As a fallback position, I am at least somewhat
willing to consider installing the current legacy/hacked sendmail, with
the understanding that it's both temporary and very very undesirable.  I
hope to spend time coding to avoid this possibility rather than
composing lengthy responses defending whatever choices I make here.

Hm.  Surely I've said at least half of this somewhere already?  Is this
useful?
cross
response 392 of 547: Mark Unseen   Jun 3 07:23 UTC 2003

Yes, it's useful.

Tell me, what do you think is so unique about grex's mail setup that
a stock solution won't work?  Surely postfix+procmail+spamassassin
could handle the load grex would put on it, complete with hierarchial
directories and mailbox quotas.  Much larger sites use that combo and it
works well.  In fact, if you went with putting mail in $home/Mailbox,
you'd get hierarchial mail directories for free, and eliminate a
filesystem.

Regarding Kerberos: I'd feel more comfortable with using your hashing
algorithm if the guarantee was made that it would disappear from
the system's Kerberos implementation no more than one year after its
introduction, or some other suitable timeframe.  There's no reason not
to agree to that.
carson
response 393 of 547: Mark Unseen   Jun 3 08:10 UTC 2003

(re: anti-spam logic:  I agree that a procmail/spamassassin combo would be
a good move.  nearly all of the spam that I receive at my Grex account is
sent via open relays, which both SpamAssassin and SpamCop [via reporting]
recognize and flag as such.  whatever Grex is currently using, obviously,
does not.  given Grex's culture, I understand the reluctance to outright
block mail from open relays, but I'd like to think that, with Next Grex,
we should have sufficient processing capability to flag such mail.) 

mdw
response 394 of 547: Mark Unseen   Jun 3 11:59 UTC 2003

Mail has enough issues that perhaps it ought to be discussed in its own
item.  At some point, I will need to come up with a list of what grex
mail currently has as "custom hacks"; that's not the same as a list of
functional specs, but might beat idle speculation that just because
there are "a lot" of solutions out there there's necessarily a set that
matches our needs.  I hope we will be able to take advantage of other
people's work as much as possible.  But I don't think there are any
guarantees that we will necessarily find exactly what we want.

Regarding procmail+spamassassin; this can't reject mail, which would be
a significant step backwards spam-wise from what we can currently do.
There are other issues regarding procmail+spamassassin (such as
enforcing mailbox quotas, running perl on every piece of mail) that I
don't find particularly attractive on a system-wide basis.  I don't have
a problem with this as a user option, but I'm much more concerned what
to do for everybody else as a default.

Regarding RBL - grex gets listed on them just often enough there's no
way I can see us wanting to do this.  RBL would be less unpalatable when
used in conjunction with other stuff as just one more clue something
"might" be spam.  I hope that whatever we end up will have the
flexibility to allow us such options, but not a sufficient or reasonable
solution on its own.

Regarding kerberos - there's no guarantee that *the* standard will
necessarily do what grex needs, especially right off.  Just for
starters, des/des3 have inadequate etype info, preauth methods to
reinforce weak passwords is lacking, aes is not yet fully standardized,
and there is argument that the default aes string to key ought to be
computationally intensive - fine for single/user workstations, not at
all a good match for a popular timesharing system.  I very much hope the
standard evolves to a point where it fully meets the needs I think we
have for it here on grex.  For the short-term, our schedule means we
probably shouldn't be, and when the standard converges to our needs is
not something we can dictate.  So, I don't think such a promise as you
ask would be in grex's best interest.

It may be worth keeping in mind that until we deploy useful kerberoized
distributed applications from grex, the ability to kerberos authenticate
to grex from elsewhere will be almost entirely only of academic
interest.  The real compatibility issue we have to sort out in the short
term is not kerberos standards compliance, but how well does it fit into
openbsd supplied interfaces and the grex environment?  We aren't even
close to worrying about distributed desktop applications, single
sign-on, or making sure user passwords never leave the desktop.
cross
response 395 of 547: Mark Unseen   Jun 3 17:02 UTC 2003

That begs the question, why bother with Kerberos at all, then?

I don't understand how other, much larger sites get away with stuff like
using spamassassin on all incoming mail, and otherwise working on stock
anti-spam solutions, but grex can't do it.

Regarding timeframes; well, grex has already blown its one year timeframe.
Given that, it seems most profitable to just use the BSD login API to
deal with the custom hash algorithm and skip Kerberos for a later day.
cross
response 396 of 547: Mark Unseen   Jun 3 17:05 UTC 2003

Oh yes, regarding the Kerberos standard; I'm fairly sure the idea of
burning a bunch of CPU time has been discredited and rejected.  If not,
it's a tunable parameter, anyway.
gull
response 397 of 547: Mark Unseen   Jun 3 18:34 UTC 2003

I think the problem he has with spamassassin is more the principle of it.  We
still have to accept the mail, we can't slam the door in the spammer's face. 
With the new system the extra processing penalty of having to accept the
whole message before deeming it spam is probably not as important.

I've seen some really poor spamassassin results on a few mailing lists I've
been on, but part of that may have been poor configuration.  On one list in
particular spamassassin seemed to flag every message sent from Mozilla as
spam, while missing a lot of *real* spam.  I've kind of shied away from it
for that reason.
cross
response 398 of 547: Mark Unseen   Jun 3 20:04 UTC 2003

I hate to break it to you guys, but 99% of the time, you're not slamming
the door in the spammer's face as it is now.
carson
response 399 of 547: Mark Unseen   Jun 3 21:45 UTC 2003

(my vague recollection is that Kerberos will allow Grex to offload mail
processing to another machine in the future.)
cross
response 400 of 547: Mark Unseen   Jun 3 21:50 UTC 2003

I don't think that'll buy much on the new machine, frankly.  btw- I've
started a new item, #156 in garage, for discussing mail issues.
gelinas
response 401 of 547: Mark Unseen   Jun 3 22:40 UTC 2003

(The problem we are trying to solve, if I recall correctly, is network
bandwidth, NOT CPU/disk/etc.  In that sense, the door is being closed
fairly quickly:  my understanding is that the mail is being rejected
before the SMTP 'data' command.)
cross
response 402 of 547: Mark Unseen   Jun 4 02:05 UTC 2003

Postfix will do that.  btw- has anyone ever measured how much bandwidth
grex is really using?
mdw
response 403 of 547: Mark Unseen   Jun 4 05:53 UTC 2003

Kerberos does 3 things for us: gives a more graceful way to deal with
our existing password hash data, allows us to start developing
distributed applications (such as file service, mail, conferencing,
etc.), and eventually (if standards and availability permit) may allow
us to offload client side stuff to user workstations.  The first is
immediately useful to us all on its own.  The 2nd could be useful in the
next 1-5 years.  The 3rd is "pie in the sky" for now, but not
impossible.
janc
response 404 of 547: Mark Unseen   Jun 4 13:33 UTC 2003

Did I misunderstand that?  The modified password hash algorithm was justified
because it would ease the transition to Kerberos.  Now Kerberos is justified
because it works better with the modified password hash algorithm?  Seems
like the case for kerberos has to rest on points two and three.
cross
response 405 of 547: Mark Unseen   Jun 4 17:11 UTC 2003

Again, I think it would be easier to use the BSD login API to deal with
the custom hash algorithm now, and find some other way to transition to
a standard Kerberos KDC.  Particularly if you're not considering moving
to distributed services for another 1 to 5 years.
jp2
response 406 of 547: Mark Unseen   Jun 4 20:34 UTC 2003

This response has been erased.

mdw
response 407 of 547: Mark Unseen   Jun 5 02:31 UTC 2003

The first is the reason to do kerberos now rather than wait another 1-5
years.  The second is the reason we want to do kerberos.  The third is
the biggest but longest term and least likely win.

kerberos 5 does do md5.  But the md5 there has nothing to do with Unix
md5 password hash.  The unix md5 password hash was an early example of
"computationally expensive" hash logic -- see above.
cross
response 408 of 547: Mark Unseen   Jun 5 03:22 UTC 2003

It's an extremely bad idea to take the hashed passwords from /etc/shadow
and use them as keys in a Kerberos KDC.  I already advocated a method for
solving this problem cleanly and easily, but Marcus basically ignored it.
See item 134 in the Garage conference.
dang
response 409 of 547: Mark Unseen   Jun 6 03:48 UTC 2003

(Spamassassin can be used to reject mail in the MTU, rather than via procamail. This is not as good as the spam rejection we do now, because the entire mail must be on Grex to run spamassassin against it. However, it will reject considerably more spam. It's a tradeoff.)
 0-24   25-49   50-74   75-99   100-124   125-149   150-174   175-199   200-224 
 225-249   250-274   275-299   300-324   325-349   350-374   360-384   385-409   410-434 
 435-459   460-484   485-509   510-534   535-547      
Response Not Possible: You are Not Logged In
 

- Backtalk version 1.3.30 - Copyright 1996-2006, Jan Wolter and Steve Weiss