You are not logged in. Login Now
 0-24   14-38   39-57        
 
Author Message
19 new of 57 responses total.
scg
response 39 of 57: Mark Unseen   Dec 4 23:34 UTC 1998

If I'm remembering the bylaws correctly, member votes and board votes carry
the same weight, so if the members vote for something the board is free to
overturn it the next day if it wants, but the members could then overturn 
the board's overturning of the member vote, or recall the board members, or
something like that.  Bylaw ammendments can only be done by member vote, and
the board is obligated to obey the bylaws, so if the members really want a
policy set in stone and don't trust the board, they can do their poilcy as
a bylaw ammendment.  Otherwise, if a member vote and a board vote contradict
eachother, the more recent one wins.  The board, of course, is elected by the
members, and the members probably won't vote for people who are likely to
overrule them.

The decision to allow everybody to use Lynx to access the web was made by the
board, a couple of years after the member vote.  Technology changes, and that
decision did seem to fit in with the intent of the earlier member vote.  I
think it's safe to say, at this point, that most people who use the Internet
and think they know it is wouldn't even recognize the names of most of the
programs and protocols that were talked about in the proposal that the members
voted on.  WAIS and Archie, for example, and probably gopher as well.  Also,
lots of the people who were members when that proposal was voted on are no
longer around, and lots of our current members weren't around then.  If we're
developing new policies now, I'd be rather hesitant to use that vote from five
years ago or whenever it was as anything more than a very rough guideline of
what the membership once thought Grex should be doing in a different
technological era.

re IRC:
        Allowing IRC for the masses would be a mess, given the fights that tend
to break out on IRC, which often lead to denial of service attacks that can
really create havoc on a network.  At a commercial ISP that does allow people
to use IRC, I'd say about 90% of the ping floods, smurf attacks, winNukings,
etc. have involved kids getting mad at eachoter on IRC and trying to make
eachoters computers crash, causing large problems for the networks inbetween
them.  I have nothing against IRC's protocols, or against probably most IRC
users, but IRC seems to have a culture that's not really compatible with
having a low budget, low bandwidth, maintainable system.
aruba
response 40 of 57: Mark Unseen   Dec 5 00:17 UTC 1998

Hmmm, I can't seem to find the board vote you're referring to, Steve, and I
don't remember voting on it.  Do you remember when it was?
scg
response 41 of 57: Mark Unseen   Dec 5 01:36 UTC 1998

I remember the discussion, but I don't remember when, and I don't remember
voting.  Perhaps it was discussed at a staff meeting instead, but I'm assuming
staff wouldn't have opened http to the masses without getting authorization
from the board first.
rcurl
response 42 of 57: Mark Unseen   Dec 5 08:08 UTC 1998

It was voted on here. Did Steve Weiss write it up? 

Re #39: so you think, Steve, that since the U.S. Constitution is pretty
old and has lots of provisions that haven't been voted on for a long time,
that we can just ignore it? A vote is a pact, which should be as firm as
the day it was adopted, until it is changed. However, since it wasn't a
bylaw, the board can change any policy on its own, and did in this
instance, without re-running a member vote on the revision.


mdw
response 43 of 57: Mark Unseen   Dec 5 10:22 UTC 1998

I think it's already been observed that there's a fair amount of
continuity amongst grex staff and members (see the cliquishness item in
agora).  Once these kinds of decisions get made, they tend to propagate
themselves, as new people who come on board either decide they like the
result, and stay around, or don't like it, and leave fairly quickly.  So
it would be quite surprising if if the memberhips's opinion as whole has
changed all that much.
scg
response 44 of 57: Mark Unseen   Dec 5 16:48 UTC 1998

re 42:
        No, I don't thik that at all, Rane.  I'm not saying that the staff
shoudl feel free to ignore the policy.  I'm saying that we have procedures,
either through board votes or membership votes, to change the policies, and
I was suggesting that the current policy, being rather specific about some
obsolete protocols while not covering the current common protocols very well,
might be something that our policy changing mechanisms should be taking a look
at.

Likewise, the US Constitution also has mechansims to change it when parts of
no longer make sense.  If it didn't, slavery would still be legal in the US.
mdw
response 45 of 57: Mark Unseen   Dec 5 23:24 UTC 1998

Between 29 nov 1998 01:20:44 and 5 dec 1998 17:37:41, approximately
32562 attempts by 511 people were made to bypass the kernel blocks.
31330 of these attempts were made by only 4 people.

31 programs were run to do this, as follows:
1 <server.c.out>  2 <rusers>        13 <bnc>          540 <telnet>
1 <thamind>       3 <tt++>          29 <irc-2.8.2>    767 <b>
1 <trn_real>      3 <ytalk>         33 <portscan>     818 <sc>
1 <wh00f>         4 <datapipe>      34 <pine>         2481 <perl>
1 <xnet>          4 <tf>            38 <netscan>      3720 <eggdrop>
2 <hr>            6 <irc-2.8.2.old>                   10895 <bo>
2 <nc>            9 <a.out>         245 <ftp>         12591 <nmap>
2 <redir>         11 <mt>           392 <lynx271>
(the #'s here are the number of runs of each program detected.)

Some of these programs are port forwarding programs; used by vandals
to hide their tracks, and used by people behind firewalls to
bypass firewall policies.  Eggdrop is used by irc users to hold
party channels open; it is probably *the* most popular program
people try to run on grex.

Telnet attempts were made to 369 destinations.  The top 40 are as
follows:

2 207.167.112.10:23,    3 152.163.210.13:23,    4 198.202.86.17:23,
2 207.211.200.71:23,    3 152.163.210.24:23,    4 198.41.0.6:23,
2 207.99.5.2:23,        3 152.163.210.25:23,    4 198.59.118.51:23,
2 208.244.48.1:23,      3 152.163.210.27:23,    4 208.217.205.11:23,
2 209.51.183.2:23,      3 152.163.210.28:23,    4 209.73.132.137:23,
2 210.34.0.12:23,       3 152.163.210.29:23,    4 24.234.16.135:23,
3 129.24.96.10:110,     3 152.163.210.7:23,     5 192.168.1.3:23,
3 144.16.203.107:23,    3 152.163.210.8:23,     5 208.217.205.12:23,
3 144.16.78.240:23,     3 152.163.210.9:23,     6 207.170.104.32:23,
3 149.132.130.48:4000,  3 198.59.115.24:19,     7 129.24.96.10:25,
3 151.196.216.252:23,   3 206.124.29.1:23,      12 207.82.252.251:23,
3 152.163.210.10:23,    3 206.210.93.60:2323,   14 209.142.209.161:23,
3 152.163.210.11:23,    4 192.35.39.37:23,      15 207.126.100.96:23,
3 152.163.210.12:23,

(format: count ip-address:port.  port 23 = telnet.  port 25 = smtp.
port 19 = chargen.  port 110 = pop-3.)

DNS names for some selected sites here:
152.163.210.10 = www04a.web.aol.com
208.217.205.12 = 12.0.205.217.208.IN-ADDR.ARPA (who is Trent Arsenault?)
207.170.104.32 = sdf.lonestar.org
129.24.96.10 = callisto.unm.edu         (someone eager to forge mail?)
251.252.82.207 = hotmail.com
209.142.209.161 = m-net.arbornet.org
207.126.100.96 = diversion.com

diversion.com is apparently a for-pay live chat/multi-player game/internet
services system based in Palo Alto, CA.
steve
response 46 of 57: Mark Unseen   Dec 6 01:33 UTC 1998

   These are typical of what we see in a given week.

   Some of those programs are most likely:

   nc - netcat a program to display network traffic.  A useful
   tool, but also usable as something to sniff networks; with a
   small perl program can be a good password sniffer.

   redir and datapipe - IP "repeaters" which can redirect packets
   to another site/port.  Great too to run on several machines to
   pass a telnet session between multiple machines, so as so really
   hide ones tracks.

   mt - don't know which one this is: could be a simple tiny fuge
   program, or it could be a port scanner that looks for specific
   things and does a ping flood based on what its sees.  I've also
   seen other less interesintg things called mt.

   portscan - program to see what ports on a given machine are active,
   for further probing.  I've seen versions which then tried poking
   various ports after its discovered what ports are free.  Rumored
   Rumored other versions are far more nasty but I haven't seen those
   yet.

   netscan - something similar to portscan, but I've never seen a
   version which worked here.

   sc - another port scanning program

   bo - the wonderful Back Ofifice program, designed to cause havok
   with MicroSoft back office

   I have quite a collection of these little things at this point.
   I've given up on keeping track of all of them.  For a while, I
   kept track of what was being brought over here but I abandoned
   numerical recordkeeping after I'd encountered my 400th copy of
   telnet--and I mean the 400th copy.  These days, I keep track of
   things I can't automatically identify.
dpc
response 47 of 57: Mark Unseen   Dec 6 16:23 UTC 1998

Good Goddess!  It's amazing we're still alive in this environment.
Thanx (again) to the staff.
srw
response 48 of 57: Mark Unseen   Dec 6 20:24 UTC 1998

My thoughts mirror scg's resp:39 fairly closely, but I will put them in 
my own words.

There was a long gap of time between when the member vote took place 
regarding which services should be open-access and the subsequent 
implementation of that policy. During that interval, as I recall (only 
vaguely after this much time) there was a big shift in usage. Most 
notably, gopher services on the net were substantially replaced with 
http services. Although this was gradual, the substantial conversion 
from gopher to http took a surprisingly short amount of time. Note: 
there still are gopher servers out there, but very few.

When the policy was implemeted I do remember a discussion about the 
question of whether we should implement a modified version of the kernel 
blocks, including http along with gopher among the open-access services, 
since it had largely replaced gopher by the time of implementation. 
I am confident it was discussed at a board meeting. 

My interpretation is that the staff implemented what it thought was 
the intent (if not the letter) of the member vote by transferring http 
to the open-access side. As I recall from my memory of the many 
discussions regarding this vote, the intent was primarily to open some 
things up (as opposed to restrict opening things). I definitely played a 
role in this staff decision, but I would *never* implement what the 
voters did not want me to. Probably the disparity between the member 
vote and the actual code in the kernel blocks was never reconciled by 
having another vote, although it should have been.

The system has worked this way for along time now. I think it would be a 
huge mistake to block outgoing http access to free accounts. If we were 
to vote now on this one access issue, I would support keeping it open.
aruba
response 49 of 57: Mark Unseen   Dec 6 22:59 UTC 1998

I certainly don't want to change the de facto policy either, but I think
we should make it official, so I'll propose it at the next board meeting
(unless someone beats me to it.
remmers
response 50 of 57: Mark Unseen   Dec 7 00:45 UTC 1998

I fired up Grex's mighty online search engine (otherwise known as
"grep") and managed to track down the online discussion on opening
up http. It's in Coop 7, Item 93 (item:coop7,93). The reasoning
presented there for doing so was essentially as Steve recollects
it in resp:48.

The feeling seems to have been that board ratification would be
sufficent, and there was mention of bringing the issue to a board
meeting, but that apparently never happened. There's nothing on
it in the agenda item for that month's board meeting (item:coop7,102)
or the minutes (item:coop7,107). So that step evidently just got
forgotten, until now.

(I do recommend reading the agenda item -- Coop 7, item 102 -- for
its entertainment value. It goes on for 93 responses, most of them
having to do with the concept and propriety of the board having
pre-meeting dinners. Amazing stuff. I'd totally forgotten the
discussion ever took place.)
rtg
response 51 of 57: Mark Unseen   Dec 11 04:40 UTC 1998

As I read this whole discussion, I find myself boiling it down to a single
question: What is the maximum level of service we can provide with the
limited resources we have available?

In the light of this, and the general feeling that our internet connection
bandwidth is the single most limiting factor,  I ask why we allow ANY
protocols to pass twice over that link?  It seems ridiculous to me for
anybody to be using telnet to come into grex, and then expect to go back
out the same link with http or ftp or whatever.

We are here to serve as a community bulletin board, and as an educational
resource.  To me, this means that we provide our local services such as
bbs, party, and the tools necessary to write and compile simple programs
so that people can get an idea of how these magic boxes work.  As a
service to our geographical community, we provide dialups, email, lynx,
and possibly telnet access to other systems.

I have made the assumption that if a user has the capability to run a
telnet client to access our locally-provided services, then they also have
the capability to run lynx or ftp locally, so it's a waste of our cpu and
especially bandwidth to run them here.

There are lots of people who share internet access with family members, or
have their only internet access at work, so I see us providing a real
service to allow our 'remote' users to receive e-mail here. (aside:  What
is the total cumulative data flow for a POP3 session downloading n
messages, vs a telnet session running pine, paging through the same
messages slowly? Would POP3 allow us to serve more users more
efficiently?) 
  The other protocols they can run themselves, so why do we allow them to
telnet in, then surf from here?

  I would support a proposal to broaden the access we allow to dialin
local users, whether they are paying members or not, and severely restrict
the use of any outgoing protocols by remote telnet users, whether they are
paying members or not.

  I guess I'm making the assumption that if someone comes here to do
something they could just as easily do at home, then they must be up to no
good, and they're trying to hide behind us. 
mary
response 52 of 57: Mark Unseen   Dec 11 11:23 UTC 1998

Good response.  
davel
response 53 of 57: Mark Unseen   Dec 11 12:17 UTC 1998

As to why someone might reasonably telnet in & then access the web, consider
me.  If I am telnetted in to Grex, it's from a shell account at work.  From
that system (and in fact from anywhere) I do not have an ISP account providing
web access.  Coming in from work I'm most likely (not always, but usually)
on to get some kind of information for my job.  I may find something that has
a URL in it.  I can run lynx as well from work, but not while I'm telnetted
in to Grex.  (In principle I can suspend the telnet session, but in practice,
when I'm telnetted to Grex in particular, that usually means my connection
will be hung when I get back to it, for some reason.)
steve
response 54 of 57: Mark Unseen   Dec 11 13:01 UTC 1998

   There certanly are legimiate reasons to do that, yes.  I don't think
we can make blanket statements about the validity of this kind of thing
which of course only makes it harder, trying to come up with policies to
restrict it.
sironi
response 55 of 57: Mark Unseen   Dec 14 08:05 UTC 1998

From Italy I reach better (more speed) north-american sites with lynx on
Grex than using lynx on my own machine.
luca_
rtg
response 56 of 57: Mark Unseen   Dec 16 06:08 UTC 1998

I hear you luca, and just read essentially the same comment from spiff in
another item.  Thanks for your input.
janc
response 57 of 57: Mark Unseen   Dec 16 06:13 UTC 1998

I think I'd be willing to support opening telnet and ftp to non-members
coming in on the dial-ins, but I'm not willing to reduce any of the
access now given to people coming in over telnet.  I don't see a need
for any reductions in services now.
 0-24   14-38   39-57        
Response Not Possible: You are Not Logged In
 

- Backtalk version 1.3.30 - Copyright 1996-2006, Jan Wolter and Steve Weiss