Date: Tue,  8 Jun 93 04:30:08 PDT
From: Advanced Amateur Radio Networking Group <tcp-group@ucsd.edu>
Errors-To: TCP-Group-Errors@UCSD.Edu
Reply-To: TCP-Group@UCSD.Edu
Precedence: Bulk
Subject: TCP-Group Digest V93 #148
To: tcp-group-digest


TCP-Group Digest            Tue,  8 Jun 93       Volume 93 : Issue  148

Today's Topics:
                            Broken address
                            Compiling NOS
                          Linking with Janet
                Network Unreachable Proposal (4 msgs)
                          Password security 
                        Przyszlowsc INTERNETU
                     RFC 791, IP options (2 msgs)
                                wampes
                     Wampes Dk5sg-bbs .bbsrc file

Send Replies or notes for publication to: <TCP-Group@UCSD.Edu>.
Subscription requests to <TCP-Group-REQUEST@UCSD.Edu>.
Problems you can't solve otherwise to brian@ucsd.edu.

Archives of past issues of the TCP-Group Digest are available
(by FTP only) from UCSD.Edu in directory "mailarchives".

We trust that readers are intelligent enough to realize that all text
herein consists of personal comments and does not represent the official
policies or positions of any party.  Your mileage may vary.  So there.
----------------------------------------------------------------------

Date: Mon, 07 Jun 1993 20:35:53 PDT
From: "Jeffrey D. Angus" <jangus@skyld.tele.com>
Subject: Broken address
To: tcp-group@ucsd.edu

Recently while replying to Mike Bilow, I got this back from the host.

> From: bongo!netcomsv.netcom.com!ids.net!Postmaster
> Subject:  Undeliverable Mail
> To: <netcomsv!bongo!skyld!skyld.tele.com!jangus>
> Comment:  Bad address -- <ids.netMIKEBW!MIKEBW>
> Comment:   %MAIL-E-USERSPEC, invalid user specification '!MIKEBW'
> 
> Start of returned message
> 
>   From: "Jeffrey D. Angus" <jangus@skyld.tele.com>
>   Message-Id: <2c13c9c2.skyld@skyld.tele.com>
>   Organization: Grendel's Lair
>   To: "Mike Bilow, <MIKEBW@ids.net>" <MIKEBW@ids.net>

The original message with various address lines was:

> From: MIKEBW@ids.net (Mike Bilow, <MIKEBW@ids.net>)
> Message-Id: <930527003925.2dca@ids.net>
> To: jangus@skyld.tele.com
> 
> -- Mike Bilow, <mikebw@ids.net>  (Internet)
>    N1BEE @ WA1PHY.#EMA.MA.USA.NA (AX.25)

Does anyone out there have a "Reply-To:" address for Mike that works?
73 es GE from Jeff
-- 
J. Angus: jangus@skyld.tele.com -- "Als ik Kan", Gustav Stickley
US Mail:  PO Box  4425  Carson, CA  90749-4425  1 (310) 324-6080

------------------------------

Date: Mon, 7 Jun 93 23:20:08 -0700
From: chuckb@babbage.ecs.csus.edu (Chuck Bland)
Subject: Compiling NOS
To: tcp-group@ucsd.edu

 Well gang, as most of you probably already know, BCC 3.1
 is the compiler to use.

 The "Sage Advice" award goes to Mike C. (k3mc) for his
 rule of thumb to use the same version the author uses.

 AAAAAAAAAAAAAAAmen.

 Thanks for your replies.

 Now, any comments on my RAM disk question ?

 Chuck
 chuckb@babbage.ecs.csus.edu

------------------------------

Date: Mon Jun 7 13:18:12 1993
From: iiitac@pyr.swan.ac.uk
Subject: Linking with Janet
To: tcp-group@ucsd.edu

The first quick answer is to be careful.

Coming off the packet network onto JANET is not feasible. All that has
to happen is you connect from radio to JANET someone does a write request
at you (off JANET) and if they are not a licensed radio amateur you've probably
just broken the rules.
Going the other way is more viable (at least on-campus). It's still a thing
we are looking at doing here (once we get the Perq2 PSU fixed). All you need
is KA9Q and a password file so that you have to log into the campus/radio
link machine to go from one to the other.
The final stage is mail forwarding which is reasonably easy. Mail from radio
sites onto the internet to radio amateurs is fine, and mail the other way
can be checked by hand before sending.

The encryption problem you describe is not easily solved. A public key
encryption system would do it , but upset the RA.

Alan

------------------------------

Date: Mon, 7 Jun 1993 10:12:36 -0600
From: ke9yq@ke9yq.ampr.org (Bob Van Valzah, ke9yq)
Subject: Network Unreachable Proposal
To: tcp-group@ucsd.edu, gateways@mpg.phys.hawaii.edu

Wouldn't it be nice to get an ICMP network unreachable message back from a
router on net-44?  I find it very frustrating when doing a traceroute (hop
check) to just see the echoes just stop at some point with no ICMP message
when I know it's not a failed link problem.

Here's a question/proposal for folks familiar with NOS iproute.c (or
whatever is the appropriate file).  Is there any sort of existing routing
table entry I can create that'd cause a network unreachable to be sent
back?  I could probably just create an infinite loop by sending packets
back to myself via loopback, but that'd be no fun.

What I'm thinking of would look something like this:

        route add 44.a.b/24 encap host1     #\
        route add 44.c.d/20 encap host2     #---All this exists already
        route add 44.e/16   encap host3     #/
        route add 44/8      unrch localhost # this is new

I can assert that I have routes to all reachable subnets of net-44 (as do
most gateways).  If a packet made it down my route table to the "unrch"
pseudo interface, I'd like to return it wrapped in a network unreachable
message and returned to the sender.

This proposal probably violates all kinds of rules since it's not that
*all* of net-44 is unreachable (or does it?).  It sounds to me like it'd be
literally just a few lines of code.  So if it doesn't break too many rules
and isn't much harder than that, I'd love to see such a feature included in
some of the mainstream distributions of NOS.

Do commercial routers (e.g. cisco) have any mechanism for generating an
unreachable message when all known routes to subnets of a larger network
are exhausted?  I've sent a few random probes into net-15 (MIT) and net-18
(HP) and gotten unreachables from MIT but not from HP.  Maybe even the
non-existence of an HP network is a secret :-)

73, Bob, ke9yq

------------------------------

Date: Mon, 07 Jun 1993 08:46:38 -0700
From: Paul Traina <pst@cisco.com>
Subject: Network Unreachable Proposal 
To: ke9yq@ke9yq.ampr.org (Bob Van Valzah, ke9yq)

  Do commercial routers (e.g. cisco) have any mechanism for generating an
  unreachable message when all known routes to subnets of a larger network
  are exhausted?
 
Yes

  I've sent a few random probes into net-15 (MIT) and net-18
  (HP) and gotten unreachables from MIT but not from HP.  Maybe even the
  non-existence of an HP network is a secret :-)

ICMP unreachables can be disabled
  
  73, Bob, ke9yq
  
  

------------------------------

Date: Mon, 07 Jun 1993 08:46:38 -0700
From: Paul Traina <pst@cisco.com>
Subject: Network Unreachable Proposal 
To: ke9yq@ke9yq.ampr.org (Bob Van Valzah, ke9yq)

  Do commercial routers (e.g. cisco) have any mechanism for generating an
  unreachable message when all known routes to subnets of a larger network
  are exhausted?
 
Yes

  I've sent a few random probes into net-15 (MIT) and net-18
  (HP) and gotten unreachables from MIT but not from HP.  Maybe even the
  non-existence of an HP network is a secret :-)

ICMP unreachables can be disabled
  
  73, Bob, ke9yq
  
  

------------------------------

Date: Tue, 8 Jun 93 8:54:53 DST
From: Martin W Freiss <freiss.pad@sni.de>
Subject: Network Unreachable Proposal
To: ke9yq@ke9yq.ampr.org (Bob Van Valzah ke9yq)

Bob writes:

> Wouldn't it be nice to get an ICMP network unreachable message back from a
> router on net-44?  I find it very frustrating when doing a traceroute (hop
> check) to just see the echoes just stop at some point with no ICMP message
> when I know it's not a failed link problem.
  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
This is exactly the problem - an ICMP network unreachable does not
really tell you what happens. Quoting RFC 1122 from memory: "Receiving
an ICMP network unreachable should be regarded as a hint, not as proof
that a network is unreachable".
Therefore, existing IP implementations tend to throw away the unreachables -
in real life, they are caused by transients more often than not.

(meaning that when you send unreachables for packets that you cannot route,
other people might ignore you :-)).

> Do commercial routers (e.g. cisco) have any mechanism for generating an
> unreachable message when all known routes to subnets of a larger network
> are exhausted?

Yes.

>  I've sent a few random probes into net-15 (MIT) and net-18
> (HP) and gotten unreachables from MIT but not from HP.  Maybe even the
> non-existence of an HP network is a secret :-)

No, but sending some ICMP messages can be completely disabled, and some ICMPs
often are routed with lower priority. When you send unreachables for
every packet that you can't route, you'll use up a _lot_ of the available
bandwidth just for ICMPs.

Just my .02 $ worth.

73, Martin

--
 Martin Freiss               | R&D computer center | freiss.pad@sni.de 
 Siemens Nixdorf Infosystems | Dept. MR STO SI 325 | NIC MF194
"This mind intentionally left blank"

------------------------------

Date: Mon, 7 Jun 93 12:05:53 PDT
From: djc@samisen.UVic.CA
Subject: Password security 
To: tcp-group@ucsd.edu

Here's a note I sent to J.R.Jagger that sounds like it would be of
interest to some of the rest of the group.  I believe that this code
essentially solves the problem of password security on a broadcast
medium like radio or ethernet.  It does not solve the IP authentication
problem.  I forgot to tell him that it can also be compiled with MD4,
which is another algorithm that is faster than MD5 and still quite secure,
though less so than MD5.

> From djc Fri Jun 04 13:01:14 1993
> Date: Fri, 4 Jun 93 13:01:14 PDT
> Reply-To: sol.uvic.ca!samisen!djc
> To: J.R.Jagger@sheffield-hallam.ac.uk
> Subject: Password security
> 
> I wrote some code that does secure password security that you are welcome
> to.  It's purpose was to secure radio logins to a Unix box and for that
> purpose did not require any mods to NOS.  It is simple but slightly clunky
> to use in that mode but the mods to NOS to make it totally automatic
> would be trivial.
> 
> It is based on the MD5 message digesting algorithm and works as follows:
> 
> 1) choose a password, call it S0.
> 2) use MD5 to hash it securely getting S1.
> 3) repeat 2) until you have S100 and store it locally.
> 4) communicate S100 to the host you wish to log in to and store it there.
> 
> Now to log in to the host you must present a string that produces S100
> when hashed by MD5.  This is S99 - but knowing S100 does not help you
> find S99 because MD5 is a one-way hash.  So it is secure from observers
> who saw S100.
> 
> Here's how a login works:
> YOU:  connect, ask for a login.
> HOST: asks for a password.
> YOU:  start up a little program, type in S0, and the program will MD5 until
>       it has the S100 stored previously.  Then it has S99, whatever hashed
>       to S100.  The program stores this in the file and sends it to the host.
> HOST: hashes whatever it gets once and compares it with what is in its
>       file.  If it does not match you are an imposter and it kicks you out.
>       If it does match it stores what you sent (S99) in its file and
>       lets you in.
> 
> When you log out you are all ready to start all over again with S98 instead
> of S99.  You can continue this process until you get to S0; then you have
> to call up the sysadmin and get your account reset so you can start with
> a new S0.
> 
> This sounds complex but it is really very simple to use:  just type in
> your password and the programs on both ends take care of all the rest.
> The actual code I have extends the concept to allow S98,S97,or S96 to
> be used when it is expecting S99 - this allows for some screw-ups on either
> end, which are bound to occur.  The string is nice and long, 12 chars or
> so, which makes brute-force impossible.  The MD5 algorithm is very fast
> so 2 or 3 hundred iterations is no problem on any reasonable computer.
> I use it on a 12 MHz XT and it only takes a few seconds to calculate
> 200 MD5s even though the XT is a VERY slow machine.
> 
> But best of all, nothing useful to an interloper is kept anywhere on
> either side!  The one-way nature of MD5 makes it very difficult to
> calculate Sn-1 if you know Sn.


-- 
/\/\/\/\/\/
Doug Collinge, try: sol.uvic.ca!samisen!djc
  or:  samisen!djc@sol.uvic.ca
  or:  dcolling@ve7frg.ampr.org
VE7GNU  PBBS: VE7GNU@VE7VBB.#ISLAND.BC.CAN.NOAM

------------------------------

Date: Mon, 7 Jun 1993 14:07:38 CET
From: JAN POLESZCZUK <POLAN%PLEARN.BITNET@plearn.edu.pl>
Subject: Przyszlowsc INTERNETU
To: Ryszard Korwin-Mikke <rmikke@MIMUW.EDU.PL>

OTRZYMALEM Z LISTY DYSKUSYJNEJ W USA KOMUNIKAT, KTORY Z PEWNOSCIA
                ZAINTERESUJE CIUW-LISTOWCOW.

Most of you are probably aware of a plan to limit free use of
INTERNET to "scientists" transmitting huge files and to start
charging for e-mail.  Apparently, this is the result of private
telecommunications interests putting pressure on the National
Science Foundation.

If this plan is realized, it will mean that the majority of the
approximately 15 million users of INTERNET will be cut off.
Sadly, this is occurring just when the potential of this network
was starting to be realized.

Something must be DONE.  We can not let private interests deprive
us of access to INTERNET.

I suggest that all concerned users register their protest/concern
directly with Clinton and Gore via e-mail.  Their e-mail address
have recently been posted and they are:

Clinton= PRESIDENT@WHITEHOUSE.GOV
Gore = VICE.PRESIDENT@WHITEHOUSE.GOV

In addition, I also suggest that we identify the office in the
NSF which is responsible for INTERNET and register electronic
protests with them.

Any help or suggestions would be appreciated, especially in
locating the e-mail address for the office in the NSF.

**********************************************************************
* Carl H.A. Dassbach            BITNET:  DASSBACH@MTUS5              *
* Dept. of Social Sciences      INTERNET: DASSBACH@MTUS5.CTS.MTU.EDU *
* Michigan Technological Univ.  PHONE: (906)487-2115                 *
* Houghton,  MI  49931          FAX: (906)487-2468                   *
* U.S.A.                                                             *
**********************************************************************

------------------------------

Date: Mon, 7 Jun 93 15:43:47 PST
From: "Jerzy Tarasiuk" <JT@zfja-gate.fuw.edu.pl>
Subject: RFC 791, IP options
To: J.R.Jagger@sheffield-hallam.ac.uk

1. I see a problem which occurs when packets are sent frequently enough
 to have same time (at clock granularity). If consecutive numbers are
 used to get different timestamps, it is easy to derive encoding method
 having few packets only (I suppose 4-5 can be enough).
 To avoid it, must use timestamp increments which are random numbers.
 Or encode something different than just timestamp.
2. I just realized there is very simple way to make much more harder
 stealing the one-shot passwords: use kind of checksum of packet data
 for additional encoding of the timestamp, when hacker simply replaces
 data and sends the packet, its password is invalid. A problem: method
 of computing the checksum must be secret, e.g. it can be CRC which
 polinom is known to valid user and the server only.
   Eventually can use the CRC without timestamp, but with thing more
 (since CRC polinom can be guessed after collecting sufficient amount
 of packets): after computing the CRC add some randomly selected number
 matching some criteria, receiver should compute difference between the
 value sent in packet and CRC of data and check the criteria. In this
 case the data must also contain some "global sequence number" (global
 for all sessions) to avoid use of exact copy of a packet by a hacker.
   This method without timestamp has also less chance to be forbidden
 by Amateur Radio rules (I hope can put CRC of data in packet? :-).

------------------------------

Date: Mon, 7 Jun 93 18:59:59 PST
From: "Jerzy Tarasiuk" <JT@zfja-gate.fuw.edu.pl>
Subject: RFC 791, IP options
To: J.R.Jagger@sheffield-hallam.ac.uk

> It might be easy to derive the coding method, but a hacker could
> not create any codes, since he does not know the DES key, and
> in cyclic mode every password is affected by the previous password.

I meant if you used just timestamp (with additional increment by 1 if
time was not changed between packets) and sent quickly 5-6 packets,
they would contain consecutive numbers encoded and probably the key
would be too easy to derive from encoded values (a hacker would be
able to detect the numbers are consecutive and derive key).

> I just put a header in the data that provides two things.
>    1. a time:stamp
>    2. a CRC check on the packet data.

Hope you put them as ONE NUMBER, and most of its bits depend on BOTH
timestamp and CRC? I know CRC polinom can be derived, even when very
long polinom is used - it requires only some patiency in collecting
and analysing data, need few thousands of packets of equal length
and method similar to Gauss elimination can be used...

> So a date:time stamp to the granularity of the of the system clock
> with the extra fine granularity part being based on the data contents
> of the packet sounds just about perfect.

Seems if you append 16 bit (or more) CRC to timestamp and make the
timestamps always different (ahead real clock when would be same as
previous) and encode the value, this will be enough.
Another way can be: use 32(or more)-bit number and add a random value
in range up to few thousands every time you send packet and encode
the value - using random numbers should protect against deriving key.

------------------------------

Date: Mon, 7 Jun 93 21:33:14 EDT
From: Antoon Milatz <antoonm@pa3bwe.fdc.iaf.nl>
Subject: wampes
To: tcp-group@ucsd.edu

Has anyone WAMPES running on a TEKTRONIX 6130 / UTek 3.0 ?

Regards, Antoon

-- 
-----------------------------------------------------------
      Antoon Milatz | email    : antoonm@pa3bwe.fdc.iaf.nl
    de Bentlanden 2 | ----------- packet radio ------------
 2731 HA Benthuizen | smtp     : pa3bwe@pa0okc
    The Netherlands | ax25 bbs : pa3bwe@pi8eae

------------------------------

Date: Mon, 7 Jun 93 6:07:10 MDT
From: Dieter Deyke <deyke@deyke2.fc.hp.com>
Subject: Wampes Dk5sg-bbs .bbsrc file
To: BTITMARS%ESOC.BITNET@vm.gmd.de, tcp-group@UCSD.EDU

> Does any users of wampes have a copy of the bbs config file .bbsrc that
> can be posted to this group for use as an example.. I have found that to get
> this file from existing German users of the Dk5sg bbs in the wampes pack is
> impossible  Permission denyed when trying to read the file
> It lives in /tcp/bbs/.bbsrc as far as i know.
> Thanks. Barry. g8sau

Each user of the BBS may create their own, optional .bbsrc file in their
$HOME  directory.  This file may  contain  any valid  BBS  command.  For
example, this is the file ~root/.bbsrc on DB0SAO:

PROMPT '***ROOT-bbs***> '

The .bbsrc  file is read and  executed  by the BBS  whenever  the BBS is
started, and before any user input can be made.

Dieter

------------------------------

Date: Mon, 07 Jun 1993 16:52:14 +0100 (MET)
From: G8KBB%PI8VNW@pa2aga.UCSD.EDU
To: TCPAGA%pa2aga@pi8mac.UCSD.EDU

>From g8kbb@g8kbb.ampr.org Sun Jun 06 20:40:03 1993
Received: from gb7txm.ampr.org by gb7txm.ampr.org with SMTP
id AA20779 ; Sun, 06 Jun 93 20:40:01 GMT
Received: from g8kbb.ampr.org by gb7txm.ampr.org with SMTP
id AA20777 ; Sun, 06 Jun 93 20:38:06 GMT
Date: Sun, 06 Jun 93 19:34:54 GMT
Message-Id: <565@g8kbb.ampr.org>
From: g8kbb@g8kbb.ampr.org (Dave Roberts - Ipswich - JO02NA)
Reply-To: G8KBB@GB7MXM.#36.GBR.EU
To: tcpaga@pi8vnw.#zh2.ndl.eu
Subject: 
Lines: 80
X-Mailer: PCelm 2.1

Hi I wonder if you can post this for me...


------

Hi,

I have seen one or two messages about a digi bug in TheNet X1H.
This was the subject of a patch a few months ago but it does
not seem to have propagated.

The bug causes ARP responses to have a garbage digipeat address list.
The patch fixes it.

TheNet X1J will be out soon - if anyone has any other problems please mail
me. Don't use Usenet and assume I get it - I get only a small fraction
of the mail feed.

73's
Dave G8KBB @ GB7MXM.#36.GBR.EU

========
Msg# 4890   Type: B  Stat: $  Date: 06 Apr  Time: 2157
To : THENET @ WWW
>From : G8KBB
Path : GB7MXM!
Subject : TheNet X-1H - patch info
>From : G8KBB @ GB7MXM.#36.GBR.EU
The documentation that accompanies TheNet X-1H describes a number
of patches that can be done to increase the MTU sizes for IP use.

In addition, here are two more patches. One is to cure the ARP
digipeat garbage bug, the other is to lower the minimum transport
retries to 1.

1. The Arp garbage bug.

Took ages to find this - in the event it was trivially silly.
The problem is that when an arp request is sent tothe node it
replies with a garbage filled digi list. The patch cures this.

In the file THENET2.X1H, patch the byte at offset 0x77cf from 0x2a to 0x21.

2. The transport retries.

In some networks, transport retries are not wanted, but the node does
not allow the retry counter to be set below 2. This patch allows it
to be set to 1.

In the file THENET2.X1H, patch the byte at offset 0x7933 from 0x02 to 0x01.

An easy way to patch the files is to use debug - but remember to add 0x100
to the addresses. Hence to perform the arp patch, type :

debug thenet2.x1h
e 78cf
21
w
q

Line 1 invokes debug on the file
Line 2 edits the byte at offset 77cf ( it is at address 78cf )
Line 3 changes it to 0x21 - note that it should read 0x2a !
Line 4 writes out the changed file
Line 5 exits from debug.

These patches only apply to thenet-x1h. If you are using x-1g you need
to upgrade first. In addition, if you are using x-1g you will also find
that ip frames sent out as UI frames will have garbage digi lists. This
was fixed in X-1H together with a couple of other bugs.

73's
Dave
G8KBB @ GB7MXM.#36.GBR.EU

<End of message 4890>
GB7MXM BBS >
bye
73s TroubleBrewing. Thank you for calling GB7MXM. Log off time 22:09
AX25 session 2 closed: Normal





PLEASE reply to the list, NOT to the From: address
because this mail is sent through a one-way gateway!

------------------------------

End of TCP-Group Digest V93 #148
******************************
******************************